end to end delay
Recently Published Documents


TOTAL DOCUMENTS

788
(FIVE YEARS 203)

H-INDEX

25
(FIVE YEARS 5)

Author(s):  
Suha Sahib Oleiwi ◽  
Ghassan N. Mohammed ◽  
Israa Al_Barazanchi

The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN technology as a problem of reducing network lifetime; thus, in this paper, we utilize cooperative routing protocol (CRP) to improve package delivery via end-to-end latency and increase the length of the network lifetime. The end-to-end latency was used as a metric to determine the significance of CRP in WBAN routing protocols. The CRP increased the rate of transmission of packets to the sink and mitigate packet loss. The proposed solution has shown that the end-to-end delay in the WBAN is considerably reduced by applying the cooperative routing protocol. The CRP technique attained a delivery ratio of 0.8176 compared to 0.8118 when transmitting packets in WBAN.


2022 ◽  
Vol 12 (2) ◽  
pp. 846
Author(s):  
Oleksandr Lemeshko ◽  
Jozef Papan ◽  
Maryna Yevdokymenko ◽  
Oleksandra Yeremenko

The advanced tensor solution to the problem of inter-domain routing with normalized Quality of Service under hierarchical coordination in a communication network is proposed in the paper. The novelty of the method based on the tensor model lies in the more flexible load balancing over the network due to the presence of requirements to average end-to-end delay of packets. The framework of the method comprises a decomposed flow-based routing model that includes the inter-domain routing interaction conditions and ensures the normalized Quality of Service derived from the tensor model. Considering the mentioned above, the advanced inter-domain Quality of Service routing task was formulated in the optimization form, using the quadratic optimality criterion. The conducted analysis of the numerical research results confirmed the efficiency and adequacy of the proposed method when the desired solutions were obtained during the finite number of iterations under a provision of the normalized Quality of Service. It should be noted that the reduced number of such iterations during the operation of the method will decrease the amount of service traffic transmitted over the network needed for obtaining the final solution in the process of inter-domain routing with normalized Quality of Service.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 587
Author(s):  
David Segura ◽  
Emil J. Khatib ◽  
Raquel Barco

The fifth-generation (5G) network is presented as one of the main options for Industry 4.0 connectivity. To comply with critical messages, 5G offers the Ultra-Reliable and Low latency Communications (URLLC) service category with a millisecond end-to-end delay and reduced probability of failure. There are several approaches to achieve these requirements; however, these come at a cost in terms of redundancy, particularly the solutions based on multi-connectivity, such as Packet Duplication (PD). Specifically, this paper proposes a Machine Learning (ML) method to predict whether PD is required at a specific data transmission to successfully send a URLLC message. This paper is focused on reducing the resource usage with respect to pure static PD. The concept was evaluated on a 5G simulator, comparing between single connection, static PD and PD with the proposed prediction model. The evaluation results show that the prediction model reduced the number of packets sent with PD by 81% while maintaining the same level of latency as a static PD technique, which derives from a more efficient usage of the network resources.


2022 ◽  
Vol 70 (1) ◽  
pp. 19-41
Author(s):  
Mykola Beshley ◽  
Natalia Kryvinska ◽  
Halyna Beshley ◽  
Orest Kochan ◽  
Leonard Barolli

Author(s):  
Sourav Das ◽  
Nitin Awathare ◽  
Ling Ren ◽  
Vinay J. Ribeiro ◽  
Umesh Bellur

Proof-of-Work (PoW) based blockchains typically allocate only a tiny fraction (e.g., less than 1% for Ethereum) of the average interarrival time (I) between blocks for validating smart contracts present in transactions. In such systems, block validation and PoW mining are typically performed sequentially, the former by CPUs and the latter by ASICs. A trivial increase in validation time (τ) introduces the popularly known Verifier's Dilemma, and as we demonstrate, causes more forking and hurts fairness. Large τ also reduces the tolerance for safety against a Byzantine adversary. Solutions that offload validation to a set of non-chain nodes (a.k.a. off-chain approaches) suffer from trust and performance issues that are non-trivial to resolve. In this paper, we present Tuxedo, the first on-chain protocol to theoretically scale τ/I ≈1 in PoW blockchains. The key innovation in Tuxedo is to perform CPU-based block processing in parallel to ASIC mining. We achieve this by allowing miners to delay validation of transactions in a block by up to ζ blocks, where ζ is a system parameter. We perform security analysis of Tuxedo considering all possible adversarial strategies in a synchronous network with maximum end-to-end delay Δ and demonstrate that Tuxedo achieves security equivalent to known results for longest chain PoW Nakamoto consensus. Our prototype implementation of Tuxedo atop Ethereum demonstrates that it can scale τ without suffering the harmful effects of naive scaling up of τ/I in existing blockchains


2021 ◽  
Author(s):  
Tayeb Diab ◽  
Marc Gilg ◽  
Frederic Drouhin ◽  
Pascal Lorenz

Abstract Providing security and anonymity within VANet requires application of robust and secure models that meet several characteristics of VANet. I2P as a secure protocol designed to anonymize the communication on the internet, can be used as a reference model to develop new mechanisms of security and anonymity in VANet. I2P uses robust mechanisms and strong algorithms to reinforce the security and the anonymity of the communication. However, the difference between internet and VANet in terms of mobility and connectivity of nodes presents a big issue that needs to be treated when using I2P mechanisms in VANet. In the previous work [1], we propose a protocol based on tunnels and encryption algorithms that use digital signatures and authentication mechanisms. Tunnels are created in static scenarios and without maintaining their existence. In this paper, we complete the last version of the proposed protocol (I2P Vehicular Protocol) by integrating a tunnel maintenance algorithm for maintaining the existence of the created tunnels during the communication. This algorithm allows the implementation of the protocol in mobile scenarios of VANet. The effectiveness and security of IVP protocol are proved by analyzing the added part related to the tunnel maintenance process and showing performance results (end-to-end delay, PDR and overhead). Simulation scenarios were executed using NS3 simulator.


Author(s):  
Ngoc Anh Le ◽  
Tan Duy Nguyen ◽  
Quy Khanh Vu

Internet-assisted MANETs architecture is an emerging solution, strongly introduced in recent years. In fact, MANETs are self-configurable wireless network models for convenient communication between mobile nodes in the network. Because of simplicity, MANETs are applied in a series of domains to serve humanity, such as intelligent agriculture, intelligent transport system, and IoT ecosystem. To extend the ability of MANETs,  the integration of Internet and MANETs to form Internet-assisted MANETs architecture was introduced in many studies. However, one of the biggest problems of this solution is how to choose the optimal Internet gateway. This study proposes a gateway selection mechanism based on parameters, including hop number and gateway traffic. To evaluate the effectiveness of the proposed mechanism, we compare the proposed solution with previous solutions. The simulation results demonstrated that our solution improved end-to-end delay, routing overload, and loss packet ratio compared to previous protocols.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Felicia Engmann ◽  
Kofi Sarpong Adu-Manu ◽  
Jamal-Deen Abdulai ◽  
Ferdinand Apietu Katsriku

In Wireless Sensor Networks, sensor nodes are deployed to ensure continuous monitoring of the environment which requires high energy utilization during the data transmission. To address the challenge of high energy consumption through frequent independent data transmission, the IEEE 802.11b provides a backoff window that reduces collisions and energy losses. In the case of Internet of Things (IoTs), billions of devices communicate with each other simultaneously. Therefore, adapting the contention/backoff window size to data traffic to reduce congestion has been one such approach in WSN. In recent years, the IEEE 802.11b MAC protocol is used in most ubiquitous technology adopted for devices communicating in the IoT environment. In this paper, we perform a thorough evaluation of the IEEE 802.11b standard taking into consideration the channel characteristics for IoT devices. Our evaluation is aimed at determining the optimum parameters suitable for network optimization in IoT systems utilizing the IEEE 802.11b protocol. Performance analysis is made on the sensitivity of the IEEE 802.11b protocol with respect to the packet size, packet delivery ratio (PDR), end-to-end delay, and energy consumption. Our studies have shown that for optimal performance, IoT devices using IEEE 802.11b channel require data packet of size 64 bytes, a data rate of 11Mbps, and an interpacket generation interval of 4 seconds. The sensitivity analysis of the optimal parameters was simulated using NS3. We observed PDR values ranging between 27% and 31%, an average end-to-end delay ranging within 10-15 ms while the energy remaining was between 5.59 and 5.63Joules. The results clearly indicate that scheduling the rate of packet generation and transmission will improve the network performance for IoT devices while maintaining data reliability.


Author(s):  
Viswanathan Ramasamy ◽  
Jagatheswari Srirangan ◽  
Praveen Ramalingam

In Intelligent Transport Systems, traffic management and providing stable routing paths between vehicles using vehicular ad hoc networks (VANET's) is critical. Lots of research and several routing techniques providing a long path lifetime have been presented to resolve this issue. However, the routing algorithms suffer excessive overhead or collisions when solving complex optimization problems. In order to improve the routing efficiency and performance in the existing schemes, a Position Particle Swarm Optimization based on Fuzzy Logic (PPSO-FL) method is presented for VANET that provides a high-quality path for communication between nodes. The PPSO-FL has two main steps. The first step is selecting candidate nodes through collectively coordinated metrics using the fuzzy logic technique, improving packet delivery fraction, and minimizing end-to-end delay. The second step is the construction of an optimized routing model. The optimized routing model establishes an optimal route through the candidate nodes using position-based particle swarm optimization. The proposed work is simulated using an NS2 simulator. Simulation results demonstrate that the method outperforms the standard routing algorithms in packet delivery fraction, end-to-end delay and execution time for routing in VANET scenarios.


2021 ◽  
pp. 1525-1531
Author(s):  
Yujing Zhao ◽  
Qi Wang ◽  
Xiaoyong Qi ◽  
Lei Feng ◽  
Jing Gao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document