THE RESEARCH OF PRODUCTIVITY OF SENSOR NETWORK: THE KEY AND AUXILIARY PERFORMANCE INDICATORS

Author(s):  
Valery Hladkykh ◽  
Oleg Toroshanko

Ad Hoc sensor network with mobile network nodes is considered. The basic parameters of the bandwidth and quality of the data exchange channel constructed on the sensor network are analyzed. Statistical analysis of network service quality uses a parameter based on Mean Opinion Score (MOS). This parameter takes into account characteristics such as jitter, delay time, and packet loss rate, and allows you to quantify call quality for calls in the range of 1.0 to 5.0. At the stage of designing the sensor network and in the process of its development, the task of choosing a routing algorithm is very important. To solve the problem of optimal routing in the sensor network a partial mathematical model of the network, consisting of N switching nodes and M lines of wireless communication, has been developed. The average time for messages to remain in the line between two network nodes is determined. To improve methods and algorithms for routing in sensory networks, a generalized mathematical model of the routing process in complex networks and methodology has been developed to select the best route or a set of best routes by a set of criteria.For the most complete comparative evaluation of the effectiveness of a route, it is advisable to consider the route metric ‒ the generalized distance selected for the selected service class and the administrative distance ‒ the route parameter by which the degree of confidence in information received from neighboring devices is determined. It is shown that for optimal organization of data flows in a heterogeneous network it is advisable to use routing algorithms with many quality criteria. To do this, you must conduct an ongoing analysis of the characteristics of the network segments and automatically modify the routing tables. The basis of quality functionality is the route metric. In order to increase the reliability of the data on the state of the route, a quantitative (functional) measure of the administrative distance was introduced into the mathematical model. As a tool for evaluating and managing criteria by their relative importance, it is proposed to use the method of analysis of the Saati hierarchy.

2012 ◽  
Vol 6-7 ◽  
pp. 1177-1182
Author(s):  
Jian Zou ◽  
De Min Li ◽  
Min Zhang

In order to avoid the network partitioning and nodes died too early in ZigBee audio guide system, we designed an energy-balanced routing algorithm in this paper, which can manage the rest energy of all network nodes effectively. The simulation results indicate that this algorithm can balance the entire network energy, extend the survival time of the whole network and increase the stability of the system relative to the original routing protocol.


Author(s):  
Mohammed Amin Almaiah ◽  
Ziad Dawahdeh ◽  
Omar Almomani ◽  
Adeeb Alsaaidah ◽  
Ahmad Al-Khasawneh ◽  
...  

Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.


Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


2020 ◽  
pp. 1199-1225
Author(s):  
Anwesha Mukherjee ◽  
Priti Deb ◽  
Debashis De

Nature inspired computing has been widely used to solve various research challenges of mobile network. Mobile network refers to mobile network, sensor network and ad hoc network. This chapter has focused on the application of nature inspired computing in mobile network. In this chapter, the bio-inspired techniques for wireless sensor network, mobile ad hoc network and mobile cloud computing are discussed. Ant colony optimization is used in sensor network and mobile cloud computing for efficient routing and scheduling respectively. Bee swarm intelligence is used to develop routing schemes for mobile ad hoc network. Bird flocking behavior is used for congestion control in wireless sensor network. The research challenges of bio-inspired mobile network are also illustrated.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Honghai Wu ◽  
Qianqian Sang ◽  
Yingda Wang ◽  
Huahong Ma ◽  
Ling Xing

The Flying Ad Hoc Network (FANET) is a kind of mobile network which is composed of flying UAVs (Unmanned Aerial Vehicles) as network nodes. With the high node mobility and dynamic topology, data transmission in FANETs is faced with severe challenges, such as unstable communication links and limited resources in the network. Due to the uncertainty of node encounters, data transmission is usually carried out by opportunistic transmission. However, the opportunistic delivery of data using multicopy routing not only consumes a large amount of network resources but also causes too much transmission overhead and low delivery quality. Thus, this paper designs a connectivity-based copy adaptive transmit routing algorithm (CCAT). Considering the network interruptions caused by high-speed node movement, CCAT makes packet forwarding decisions by estimating network connectivity and uses node transmit prediction value as forwarding utility value to control the number of copies of packets. Simulation results show that the delivery rate of CCAT can be improved by about 30% at the peak compared with traditional multicopy routing strategies and the transmission latency of CCAT is minimal.


Author(s):  
Krishan Kumar ◽  
Poonam

Wireless networking grows rapidly because of the human desires for mobility and for freedom from tethers, i.e., from physical connections to communication networks. Recent advances in wireless technology have equipped portable computers, such as notebook computers and personal digital assistants with wireless interfaces that allow networked communication even while a user is mobile. We will focus on a particular kind of wireless network: mobile ad hoc networks. A mobile ad hoc network is a self organizing and rapidly deployable network in which neither a wired backbone nor a centralized control exists. The network nodes communicate with one another over scarce wireless channels in a multi-hop fashion. The ad hoc network is adaptable to the highly dynamic topology resulted from the mobility of network nodes and the changing propagation conditions. Generally, protocols used at medium access and physical layers of ad hoc networks are similar to those used in infrastructure based wireless networks. It is a common practise in infrastructure based wireless networks to use pre-data exchange of control information to eliminate the hidden terminal" problem.


2020 ◽  
Vol 14 (3) ◽  
pp. 325-336
Author(s):  
Niranjan Panda ◽  
Pankajini Panda

In Mobile Ad hoc Networks (MANETs), setting up an ideal and proficient route linking the conveying bodies is the essential objective of the routing protocols. But any assault during the routing stage may upset the communication, paralyzing the whole network. So, providing security in routing for a protected communication between nodes has become a prime concern. In the present study, we propose a Secure Energy Efficient Ant Routing Algorithm (SEEARA) based on Ant Colony Optimization (ACO) algorithm and cryptographic primitives that exercises on power control and secure routing between a pair of network nodes and increases the performance and longevity of the network. Also, it can be realized during simulation studies that SEEARA shows a better solution in comparison with the previously proposed routing protocols.


2014 ◽  
Vol 556-562 ◽  
pp. 3988-3994
Author(s):  
Yang Tao ◽  
Ya Wang

. To meet the needs of voice, video and other large multimedia data transmission services, a new multi-path routing protocol, which is named MP-QAODV, with QoS guarantees for MANET was proposed. The Routing method based on disjoint nodes and backup multiple paths was used in the protocol. Through introducing two weights constraints based on single-source and single-path network model, a non-deterministic optimal constraints algorithm was proposed. After introducing and instantiating the path stability factor and the path length factor, mathematical model of their relationship was built. The mathematical model was used to improve AODV protocol and the improved protocol has QoS guarantee. Simulation results showed that MP-QAODV is better than AODV, AOMDV in the aspects such as average end to end delay, packet delivery ratio and route control overhead. The experiment demonstrated the effectiveness of MP-QAODV protocol.


Author(s):  
Anwesha Mukherjee ◽  
Priti Deb ◽  
Debashis De

Nature inspired computing has been widely used to solve various research challenges of mobile network. Mobile network refers to mobile network, sensor network and ad hoc network. This chapter has focused on the application of nature inspired computing in mobile network. In this chapter, the bio-inspired techniques for wireless sensor network, mobile ad hoc network and mobile cloud computing are discussed. Ant colony optimization is used in sensor network and mobile cloud computing for efficient routing and scheduling respectively. Bee swarm intelligence is used to develop routing schemes for mobile ad hoc network. Bird flocking behavior is used for congestion control in wireless sensor network. The research challenges of bio-inspired mobile network are also illustrated.


2011 ◽  
pp. 273-301 ◽  
Author(s):  
Erdal Cayirci

A wireless sensor network is deployed either inside the phenomenon or very close to it. Unlike some existing sensing techniques, the position of sensor network nodes need not be engineered or predetermined. This allows random deployment in inaccessible terrains. On the other hand, this also means that sensor network protocols and algorithms must possess self-organizing capabilities. Another unique feature of sensor networks is the cooperative effort of sensor nodes. Sensor network nodes are fitted with an onboard processor. Instead of sending the raw data to the nodes responsible for the fusion, sensor network nodes use their processing abilities to locally carry out simple computations and transmit only the required and partially processed data. Realization of sensor networks requires wireless ad hoc networking techniques. In this chapter, we present a survey of protocols and algorithms proposed thus far for wireless sensor networks. Our aim is to provide a better understanding of the current research issues in this field. We also attempt an investigation into understanding design constraints and outline the use of certain tools to meet the design objectives.


Sign in / Sign up

Export Citation Format

Share Document