Current Issue : October - December Volume : 2016 Issue Number : 4 Articles : 6 Articles
While Internet traffic is currently dominated by elastic data transfers, it is anticipated that\nstreaming applications will rapidly develop and contribute a significant amount of traffic in the\nnear future. Therefore, it is essential to understand and capture the relation between streaming\nand elastic traffic behavior. In this paper, we focus on developing simple yet effective approximations\nto capture this relationship. We study, then, an analytical model to evaluate the end-to-end\nperformance of elastic traffic under multi-queuing system. This model is based on the fluid flow\napproximation. We assume that network architecture gives the head of priority to real time traffic\nand shares the remaining capacity between the elastic ongoing flows according to a specific\nweight....
Recent years have witnessed major innovations in mobile crowdsourcing networks. For selfish participants,\nconventional methods resort to incentive mechanism design for resource utilization, which might overlook the\ninherent equilibrium property among mobile users. In contrast to these proposals, we investigate the problem that\nwhether or not the selfish users could be enabled to endorse stable task sharing with balanced allocations without\nincentive mechanism designs. Before making a positive answer to this problem, we need to address the following\nchallenge, i.e., users have to make their balancing decisions with only very limited and dynamic local load information,\nwhich could possibly incur longer convergence time and imbalanced task allocations. In tackling this difficulty, we\npropose two distributed selfish load balancing schemes, the max-weight best response policy for strong information\nscenario, where load information could be sufficiently collected; and the proportional allocation policy for weak\ninformation scenario. We make experimental studies to validate proposed schemes. In our simulation study with real\ntrace data, the proposed schemes converge fast in many typical settings with fairly good balancing performance. As\nfor data traces from RollerNet (Tournoux et al., The accordion phenomenon 2009), the performance of load balancing\nand convergence property are further validated....
Cognitive Radio SensorNetwork (CRSN), incorporating cognitive radio capability in wireless sensor networks, is a newparadigm of\nthe next-generation sensor network. Sensor nodes are usually battery powered and hence have strict energy constraints. As a result,\nenergy efficiency is also a very critical problem in the CRSN. In this paper, we focus on energy consumption because of spectrum\nsensing. Furthermore, we present an adaptive spectrum sensing time interval strategy, in which SUs can adjust the next spectrum\nsensing time interval according to the current spectrum sensing results (namely, channel status). In order to find an optimal\nspectrum sensing time interval, we introduce theMarkovmodel. Then, we establish aMarkovmodel-based mathematical modeling\nfor analyzing the relationship between spectrum sensing time interval and prior spectrum sensing results. Finally, numerical results\ndemonstrate that the proposed strategy with dynamic adaptive spectrum sensing time interval exceeded listen before talk (LBT)\nstrategy which is widely used for traditional wireless sensor networks....
Wireless Sensor Network (WSN) is a special type of communication medium through distributed\nsensor nodes. Popular wireless sensor nodes like ZigBee have splendid interoperability after IEEE\n802.15.4 standardization in the domain of wireless personal area network (WPAN). ZigBee has\nanother great feature mobility that makes the ZigBee network more versatile. The mobility feature\nof ZigBee mobile nodes has a greater impact on network performance than fixed nodes. This\nimpact sometimes turns into more severe because of network structure and mobility model. This\nstudy mainly focuses on the performance analysis of the ZigBee mobile node under Random and\nOctagonal mobility management model with the Tree routing method. The Riverbed academic\nmodeler is used to design, implement and simulate the ZigBee network under certain conditions.\nThis study also presents a competitive performance analysis based on ZigBee mobile nodes\ntransmitter and receiver characteristics under the observation of the mobility model. This indicates\nthat Octagonal mobility model exhibits better performance than the Random mobility model.\nThis study will constitute a new way for further designing and planning a reliable and efficient\nZigBee network....
A mobile ad hoc network (MANET) consists of a self-configured set of portable mobile nodes without any central infrastructure\nto regulate traffic in the network. These networks present problems such as lack of congestion control, reliability, and energy\nconsumption. In this paper, we present a new model for MANET multicasting called Reliable and Energy Efficient Protocol\nDepending on Distance and Remaining Energy (REEDDRE). Our proposal is based on a tone system to provide more efficiency\nand better performance, and it combines solutions over the Medium Access Control (MAC) layer. The protocol consists of a new\nconstruction method for mobile nodes using a clustering approach that depends on distance and remaining energy to provide\nmore stability and to reduce energy consumption. In addition, we propose an adjustment to the typical multicast flow by adding\nunicast links between clusters. We further present in our model a technique to provide more reliability based on a busy tone\nsystem (RMBTM) to reduce excessive control overhead caused by control packets in error recovery. We simulate our proposal\nusing OPNET, and the results show enhancement in terms of reliability, packet delivery ratio (PDR), energy consumption, and\nthroughput....
Mobile ad hoc network (MANET) is one of the most widely used networks, which has attracted attentions, having features such\nas limited energy resources, limited bandwidth, and security weaknesses due to lack of a central infrastructure. Safe and suitable\nrouting is one of the research aspects ofMANET. In this paper, a proposedmethod, calledM-AODV, which is a type of overhearing\nbackup protocol, based on AODV, is presented. The simulation results of this protocol, applied by NS2 simulator, showed the\nimprovement of packet delivery rate and reduction of overhead and delay.Moreover, to assess the security of the proposed protocol,\nwe simulated M-AODV and AODV protocols under black hole and wormhole attacks, using no security solution. The results\nshowed thatM-AODV had been improved in terms of packet delivery ratio, and the delay had been reduced as well, but the amount\nof overhead had been increased....
Loading....