44 research outputs found

    Efficient video transfer using LAN caching assisted by cloud computing

    Get PDF
    There is a good probability of accessing same video content multiple times from a cloud based Video Streaming Server by same peer or different peers of a given LAN, effectively increasing Internet bandwidth or data flow for same content from server to client, thereby over loading routers between server and client and also resulting in higher power consumption at routers. This proposed concept tries to avoid multiple streaming of high volume video files from Server by caching first successful streamed data on to LAN peer which is currently viewing the video data and subsequently the same LAN peer streaming the video to other desiring peers when demanded for. Proposed implementation model retains all other server activities with server except for allowing an available LAN peer copy of video to be streamed to another peer of the same LAN when requested for

    Fault tolerant BeeHive routing in mobile ad-hoc multi-radio network

    Get PDF
    In this paper, fault tolerance in a multi-radio network is discussed. Fault tolerance is achieved using the BeeHive routing algorithm. The paper discusses faults added to the system as random fluctuations in hardware radio operation. The multi-radio nodes are designed using WiMAX and WiFi Radios that work in conjunction using traffic splitting to transfer data across a multi-hop network. During the operation of this network random faults are introduced by turning off certain radios in nodes. The paper discusses fault tolerance as applied to multi radio nodes that use traffic splitting in the transmission of data. We also propose a method to handle random faults in hardware radios by using traffic splitting and combining it with the BeeHive routing algorithm

    IOBR: Interoperable bee-hive routing in a heterogeneous multi-radio network

    Get PDF
    WiMAX and WiFi are the two proliferating wireless technologies with different physical and Media Access Control (MAC) layers. Today, WiFi radio is present in almost all the devices, and most of the devices are equipped with WiMAX radio. Both these technologies can be utilized, if the devices are equipped with both of them, to improve the performance. To cope up with the scenario, a method for routing in a heterogeneous infrastructure based mesh network is proposed. The heterogeneous network consists of a coordinator node and a subscriber node. In this paper, we assume that the coordinator nodes are equipped with both WiMAX and WiFi radios, whereas, the subscriber nodes need not have WiMAX radio. The protocol used for routing data is based on the bee-hive algorithm, in which the entire network is divided into foraging zones/regions. We propose a technique in which the intra-foraging zone communication happens through WiFi and the nodes across the foraging zone communicate via the coordinator using WiMAX. It is observed through simulations that our technique improves the overall network performance by making use of both the radios efficiently

    Cloud enabled 3D tablet design for medical applications

    Get PDF
    The prime objective of any technological innovation is to improve the life of people. Technological innovation in the field of medical devices directly touches the lives of millions of people; not just patients but doctors and other technicians as well. Serving these care givers is serving humanity. Growth of Mobil Devices and Cloud Computing has changed the way we live and work. We try to bring the benefits of these technological innovations to the medical field via equipment which can improve the working efficiencies and capabilities of the medical professionals and technicians. The improvements in the camera and image processing capabilities of the Mobile Devices coupled with their improved processing power and an infinite processing and storage offered by Cloud Computing infrastructure opens up a window of opportunity to use them in the specialized field like microsurgery. To enable microsurgery, surgeons use optical microscope to zoom into the working area to get better visibility and control. However, these devices suffer from various drawbacks and are not comfortable to use. We build a Tablet with large stereoscopic screen allowing glasses free 3D display enabled by cameras capable of capturing 3D video and enhanced by an image processing pipeline, greatly improves the visibility and viewing comfort of the surgeon. Moreover using the capabilities of Cloud computing, these surgeries can be recorded and streamed live for education, training and consultation. An expert sitting in a geographically remote location can guide the surgeon performing the surgery. All vital parameters of the patient undergoing surgery can be shown as an overlay on the Tablet screen so that the surgeon is alerted of any parameter going beyond limit. Developing this kind of complex device involves engineering skills in hardware and software and huge amount of investments in terms of time, resources and money. To accelerate the development, we make use of open source hardware and software and demonstrate how we can accelerate the development using these open source resources

    DMN2SC: Detecting Malicious Nodes with 2-hop Secure Channel Support in Wireless Sensor Networks

    Get PDF
    Security in wireless sensor networks is critical due to its way of open communication. In this paper we have considered suite of attacks and provided a solution to detect malicious nodes. In literature, many schemes have been proposed to mitigate such attacks but very few detect the malicious nodes effectively and also no single solution detects all attacks. In the proposed approach, each node chooses the parent node for forwarding the packet towards Sink. Each node adds its identity as a routing path marker and encrypts only the bytes added by a node in packet before forwarding to parent. Child node observes the parent, handles acknowledgement from 2-hop distance node and decides the trust on parent based on successful and unsuccessful transactions. Data transmission is divided into multiple rounds of equal time duration. Each node sends a trust value report via multiple paths to Sink at the end of each round. Sink identifies the malicious node based on the number of packets a node participates in forwarding and also based on the trust value report sent from each node for its parent. Each node chooses the parent node at the beginning of a round based on its own observation on parent to recover itself from malicious parent node. With the combination of trust factor, 2-hop acknowledgement and fixed path routing to detect malicious activity, simulation results show that proposed method detect malicious nodes efficiently and early, and also with low percentage of false detection, compared to other recently proposed approaches

    CFT: Co-operative file transfer algorithm for multi network interface sessions

    Get PDF
    File transfer is one of the important operations on the Internet. Generally files are transferred from one machine to another machine through one interface. File transfer can occur through multiple interface connections also. Protocols such as SCTP, transfers data in multiple data stream within a single connection and LFTP transfers file sourced from multiple servers to a single host. Here, we present the concept of using multiple network interfaces for transferring files from a single server. This would ensure the utilization of combined bandwidth of all the interfaces used, so that the rate of file transfer would increase considerably compared to single bandwidth transfer. In this work, we use two interfaces i.e, IEEE 802.3 (Ethernet) and IEEE 802.11 (WiFi) to accomplish the above task. We use a non pre-emptive context switching framework Twisted where threading is avoided for an effective resource utilization. The required file is downloaded utilizing two interfaces instead of one unlike normal file transfer. We analyze the improvement in performance by observing the time taken to download a file using two different interfaces (Ethernet and WiFi) and comparing that with a single interface download (using either Ethernet or WiFi) in real time scenario. We attempt to deal with the issue of when and how to connect through two interfaces which combines the bandwidths of both these interfaces, aiding in improving the performance of file transfer when compared to file transfer using single interface

    Throughput Analysis in an Infrastructure-based Mesh Network using BeeHive Algorithm

    Get PDF
    WiMAX and WiFi are among the major wireless technologies escalating today. Both these technologies provide last mile connectivity and differ in their Media Access Control (MAC) layer and physical (PHY) layers. Since most of the devices are equipped with WiFi, and WiMAX is prevailing in today’s devices, an efficient way of routing the data is by making use of both these technologies simultaneously. This work presents such a technique based on the Bee-hive routing algorithm for an infrastructure-based mesh network, which promotes interoperability between the WiMAX and WiFi technologies. The network consists of two types of nodes-1) coordinator node 2) subscriber node, and divides the entire network into regions called foraging regions/zones based on the hop count from the coordinator node. A detailed implementation of this algorithm is presented in this work. The algorithm is tested for various mobile and static topologies by varying the parameters such as the speed of motion of the mobile nodes and the hop limit

    Analysis of Throughput in Infrastructure based Multi-Radio Network

    Get PDF
    This paper deals with the design of an infrastructure based network consisting of Multi-radio Hybrid mobile nodes that perform traffic splitting over the network. The multi- radio mobile nodes have a WiMAX and a WiFi Radio that are used in transmitting data traffic over two different radio channels. Data traffic is split statically over a node and transmitted over the two radio channels. We analyse the Throughput and End-to-End delay for data transmission in the network

    Performance analysis of bee-hive routing in multi-radio networks

    Get PDF
    In recent years, wireless communication technology has reduced the distance between people and has hence become a significant part of our lives. Two such technologies are WiFi(IEEE 802.11) and WiMAX(IEEE 802.16) where the latter is a long range system covering many kilometers, whereas former is a synonym for WLAN providing a coverage of only short ranges. This work describes the implementation of a framework in which a multi-hop, ad-hoc network is deployed with hybrid nodes to enhance network throughput. The data traffic received is split between the WiFi and WiMAX radios on the basis of th e split coefficient value statically. The routing algorithm being implemented in this paper is the be e-hive algorithm. Bee-hive algorithm is a multi-path routing algorithm inspired by the social behavior of swarms of bees. It is dynamic, robust and flexible yet simple algorithm which can prove helpful for optimal
    corecore