scholarly journals Autonomic Diffusion Based Spray Routing in Intermittently Connected Mobile Networks with Multiple Copies

Author(s):  
G. Manohar ◽  
D. Kavitha ◽  
S. Sreedhar

Intermittently connected mobile Network systems represent a challenging environment for networking research, due to the problems of ensuring messages delivery in spite of frequent disconnections and random meeting patterns. These networks fall into general category of Delay Tolerant Networks. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, traditional routing schemes fail, because they try to establish complete end-to-end paths, before any packet is sent. To deal with such networks, researches introduced flooding based routing schemes which leads to high probability of delivery. But the flooding based routing schemes suffered with contention and large delays. Here the proposed protocol “Spraying with performed by a node upon reception of an Acknowledgment message”, sprays a few message copies into the network, neighbors receives a copy and by that relay nodes we are choosing the shortest route and then route that copy towards the destination, if packets reach its destination which that node diffuse Acknowledment with Autonomic behaviour and discard messages. Previous works assumption is that there is no contention and unreachable nodes. But we argue that contention and unreachable nodes must be considered for finding efficiency in routing. So we are including a network which has contention and unreachable nodes and we applied the proposed protocol. So, we introduce new routing mechanism for Diffusion Based Efficient Spray Routing in Intemittently Connected Mobile Networks with Multiple Copies.

Sensors ◽  
2019 ◽  
Vol 19 (17) ◽  
pp. 3788 ◽  
Author(s):  
Lionel Nkenyereye ◽  
Lewis Nkenyereye ◽  
S. M. Riazul Islam ◽  
Yoon-Ho Choi ◽  
Muhammad Bilal ◽  
...  

There is a strong devotion in the automotive industry to be part of a wider progression towards the Fifth Generation (5G) era. In-vehicle integration costs between cellular and vehicle-to-vehicle networks using Dedicated Short Range Communication could be avoided by adopting Cellular Vehicle-to-Everything (C-V2X) technology with the possibility to re-use the existing mobile network infrastructure. More and more, with the emergence of Software Defined Networks, the flexibility and the programmability of the network have not only impacted the design of new vehicular network architectures but also the implementation of V2X services in future intelligent transportation systems. In this paper, we define the concepts that help evaluate software-defined-based vehicular network systems in the literature based on their modeling and implementation schemes. We first overview the current studies available in the literature on C-V2X technology in support of V2X applications. We then present the different architectures and their underlying system models for LTE-V2X communications. We later describe the key ideas of software-defined networks and their concepts for V2X services. Lastly, we provide a comparative analysis of existing SDN-based vehicular network system grouped according to their modeling and simulation concepts. We provide a discussion and highlight vehicular ad-hoc networks’ challenges handled by SDN-based vehicular networks.


Author(s):  
Bodhy Krishna .S

A wireless ad hoc network is a decentralized type of wireless network. It is a type of temporary computer-to-computer connection. It is a spontaneous network which includes mobile ad-hoc networks (MANET), vehicular ad-hoc networks (VANET) and Flying ad-hoc networks (FANET). A MANET is a network that has many free or autonomous nodes often composed of mobile devices that can operate without strict top-down network administration [1]. A VANET is a sub form of MANET. It is a technology that uses vehicles as nodes in a network to create a mobile network. FANET is an ad-hoc network of flying nodes. They can fly independently or can be operated distantly. This paper discusses the characteristics of these three ad-hoc networks.


2018 ◽  
Vol 7 (3) ◽  
pp. 37 ◽  
Author(s):  
Ricardo Mühlbauer ◽  
João Kleinschmidt

The establishment of trust in vehicular ad hoc networks (VANETs) will require the application of non-conventional measures of information security, such as reputation of the participants. The system proposed in this paper uses the concept of certified reputation, in which vehicles communicate providing digital certificates that include their own reputation level. The vehicles periodically come in contact with certification and traffic control authorities to update their reputation levels, which are determined by the validation of their behavior on the network. Decision-making mechanisms in the receiver vehicles are responsible for evaluating whether the messages are true or false, based on the reputation of the communication nodes. The quantitative analysis of simulated scenarios showed the combination of the central reputation scheme with an appropriate vehicular decision mechanism achieved a total of correct decisions superior than without reputation systems. Considering the constraints of a high mobile network, the proposed system is a feasible way to reduce the risk of anomalous or malicious behavior in a vehicular network.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati ◽  
Jhum Swain

With faster expansion of mobile networks and quicker increment of web clients, more individuals approach worldwide data and communication innovation, because of which the issues of utilizing web as a worldwide stage and empowering the savvy protests and machines to coordinate, discuss, register, and ascertain slowly develops. In mobile ad-hoc networks (MANETs) and vehicular ad-hoc networks (VANET), the mobile stations and vehicles are self-reconfigurable as per the difference in network topology. Joint action between convenient centers is more basic because of the way that they confront significant difficulties, for example, frailty to work securely while protecting its advantages and performing secure guiding among center points. In the presence of vindictive hubs, one of the rule challenges in MANET is to plot ground-breaking security course of action that can shield MANET from different routing assaults.


Author(s):  
Phan Cong-Vinh

In mobile environments (MEs) such as vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), wireless sensor networks (WSNs), and so on, formal specification of self-configuring P2P networking (SPN) emerges as a need for programming, and verifying such mobile networks. Moreover, well-specified SPN in MEs becomes a requirement of developing middleware for the mobile networks. The chapter is a reference material for readers who already have a basic understanding of the MEs for their applications and are now ready to know how to specify and verify formally aspect-oriented self-configuring P2P networking (ASPN) in MEs using categorical language, assured that their computing needs are handled correctly and efficiently. ASPN in MEs is presented in a straightforward fashion by discussing in detail the necessary components and briefly touching on the more advanced components. Several explanatory notes and examples are represented throughout the chapter as a moderation of the formal descriptions. Significant properties of ASPN in MEs, which emerge from the specification, create the firm criteria for verification.


The Vehicular Ad-hoc network, or VANET, is for sharing of emergency and safety information among vehicles to ensure safe travelling of users in road. It is the technology that considers moving cars as nodes to create a mobile network. VANET turns every participating car into wireless router or node, allowing cars to establish communication. Vehicles can communicate within themselves (V2V) and also with the road side units (V2I). Vehicles communicating with other vehicles are likely to enhance the driving experience, awareness, situation perception and thus safety. In response to the problem of drastically increasing road accidents and climatic disasters like smoke, fog etc., we have designed and tested in various traffic scenarios of Kathipara(area in Chennai Tamilnadu), T.Nagar(area in Chennai, Tamilnadu), highway and a village . Each scenario is very different from each other; like Kathipara having moderate real time traffic, T.Nagar having extensive dense traffic, highways with irregular traffic and villages which having very few vehicles for most time. We designed the placement of RSUs(Road Side Units) in each scenario and we analyzed the delay and packet delivery ratios(PDR) in each scenario. These results would guarantee the use of VANET in real time. Yet another traffic scenario we have considered is what happens in marine environment. Unintentional International border crossing by fishermen and hardships encountered by fishermen due to extreme weather conditions are the motivation behind our conceptualizing a network for communication among boats which can be called a BANET (Boat Adhoc Vehicular Network)


2009 ◽  
pp. 2827-2832
Author(s):  
Mike Burmester

This chapter introduces the notion of trust as a means to establish security in ubiquitous mobile network systems. It argues that trust is an essential requirement to enable security in any open network environments, and in particular, in wireless ad hoc environments where there is no network topology. In such environments, communication can only be achieved via routes that have to be trusted. In general it may be hard, or even impossible, to establish, recall, and maintain trust relationships. It is therefore important to understand the limitations of such environments and to find mechanisms that may support trust either explicitly or implicitly. We consider several models that can be used to enable trust in such environments, based on economic, insurance, information flow, and evolutionary paradigms.


2011 ◽  
pp. 251-272
Author(s):  
Hitha Alex ◽  
Mohan Kumar ◽  
Behrooz A. Shirazi

Service discovery is an important component of wireless and mobile network systems. An efficient service discovery mechanism would ensure high availability of services to users and applications, and high utilization of services. In this chapter, we discuss various issues and challenges facing the design and selection of a proper service discovery mechanism. This chapter also investigates service discovery mechanisms such as SLP, Jini, Salutation, and others, and assesses their suitability for applications in wireless and mobile environments.


Sign in / Sign up

Export Citation Format

Share Document