Advances in Wireless Technologies and Telecommunication - Evolution of Software-Defined Networking Foundations for IoT and 5G Mobile Networks
Latest Publications


TOTAL DOCUMENTS

10
(FIVE YEARS 10)

H-INDEX

0
(FIVE YEARS 0)

Published By IGI Global

9781799846857, 9781799846864

Author(s):  
Shakti Kumar

Plant disease is a mutilation of the normal state of a plant that changes its essential quality and prevents a plant from performing to its actual potential. Due to drastic environment changes, plant diseases are growing day by day, which results the higher losses in quantity of agricultural yields. To prevent the loss in the crop yield, the timely disease identification is necessary. Monitoring the plant diseases without any digital mean makes it difficult to identify the disease correctly and timely. It requires more amounts of work, time, and great experience in the plant diseases. Automatic approach of image processing and applying the different data science techniques to classify the disease correctly is a good idea for this which includes acquisition, classification, feature extraction, pre-processing, and segmentation all are performed on the leaf images. This chapter will briefly discuss the data science techniques used for the classification of the images like SVM, k-nearest neighbor, decision tree, ANN, and convolutional neural network (CNN).


Author(s):  
Neetu Faujdar

Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with the internet of things can help in getting the greater extend of data sharing. Little attention has been provided to the security of the various stakeholders that are the part of the system. IoT cloud integration involved privacy, security, and personal safety risk of the stakeholders. Not only are these types of security attacks possible, but there is also the possibility of attack on the IoT components like hardware manipulation to disrupt the services. As we are on the network, all the communication attacks of network are also possible. This chapter will cover common aspects of regarding the cloud and internet of things (IOT) with 5G networks.


Author(s):  
Pooja Chaturvedi ◽  
Ajai Kumar Daniel

Wireless sensor networks have gotten significant attention in recent times due to their applicability in diverse fields. Energy conservation is a major challenge in wireless sensor networks. Apart from energy conservation, monitoring quality of the environmental phenomenon is also considered a major issue. The approaches that addressed both these problems are of great significance. One such approach is node scheduling, which aims to divide the node set into a number of subsets such that each subset can monitor a given set of points known as targets. The chapter proposes a priority coding-based cluster head selection approach as an extension of the energy efficient coverage protocol (EECP). The priority of the nodes is determined on the basis of residual energy (RE), distance (D), noise factor (N), node degree (Nd), and link quality (LQ). The analytical results show that the proposed protocol improves the network performance by reducing the overhead by a factor of 70% and hence reduces the energy consumption by a factor of 70%.


Author(s):  
Prabhat Singh ◽  
Harsh Khatter ◽  
Sunil Kumar

The day-to-day advancements have brought the biggest challenge to network providers as it has become difficult to keep up the traditional networks with the ever-advancing technologies for them. It also result as a motivation for vendors to grow by developing, innovating, deploying, and migrating in their services, upgrading to new hardware and infrastructure, as well as hiring newly trained people, which requires a large amount of money and time to implement. It results to a need of a new network architecture who has a capability of supporting future technologies along with solving all sorts of issues known as the network proposal by software. For meeting highly increasing demands, various proposals of load balancing techniques come forward in which highly dedicated balancers of loads are being required for ever service in some of them, or for every new service, manual recognition of device is required. In the conventional network, on the basis of the local information in the network, load balancing is being established.


Author(s):  
Ashish Sharma ◽  
Sunil Kumar

The research and development along the 5th generation are moving with extreme speed around the global world. In this paper, the authors are going put light on the concepts of network slicing architecture of the 5G network at multi-level stages. The network slicing concept is another challenge faced by the 5G network. Further, the broad description of 5G architecture and analysis on infrastructure design and applications of network slicing in terms of 5G are done. This technique plays a major part in 5G technology deals with virtualization and software-defined technology. Due to low latency and its explosive growth, it is a technology to look into the deep knowledge it inculcates within. The chapter also focuses on the applications that the industry is looking into, and it has made a large impact on the user's life. With quantitative examples to show, this research will give a proper estimation for network slicing networking.


Author(s):  
Manish Bhardwaj ◽  
Neha Shukla ◽  
Arti Sharma

In MANET, every hub is fit for sending message (information) progressively without prerequisite of any fixed framework. Portable hubs oftentimes move in/out from the system powerfully, making arrange topology unsteady in portable specially appointed system (MANET). Therefore, it turns into an incredibly moving errand to keep up stable system. In this chapter, the authors have proposed an upgraded stable bunching calculation that will give greater soundness to the system by limiting the group head changes furthermore, diminishing grouping overhead. In proposed optimum stable bunching calculation (OSBC), another hub is presented which goes about as a reinforcement hub in the bunch. Such reinforcement hub goes about as group head, when real bunch head moves out (or passed on) from the bunch. Last mentioned, the group head reelect another reinforcement hub. This training keeps arrange accessibility without aggravation. Further, the need of group head and reinforcement hub is determined dependent on the hub degree and the rest of the battery life for portable hubs.


Author(s):  
Harsh Khatter ◽  
Prabhat Singh

Huge-scale highly-dense networks integrate with different application spaces of internet of things for precise occasion discovery and monitoring. Because of the high thickness and colossal scope, the hubs in these systems must play out some basic correspondence jobs, in particular detecting, handing-off, information combination, and information control (collection and replication). Since the vitality utilization and the unwavering correspondence quality is one of the significant difficulties in large-scale highly-dense networks, the correspondence jobs ought to be facilitated so as to efficiently utilize the vitality assets and to meet a palatable degree of correspondence dependability. Right now, the authors propose an on-request and completely dispersed system for job coordination that is intended to distinguish occasions with different levels of basicity, adjusting the information total and information replication as per the desperation level of the recognized event.


Author(s):  
Kaushal Kumar ◽  
Ajit Kumar Singh ◽  
Sunil Kumar ◽  
Pankaj Sharma ◽  
Jaya Sharna

Energy and speed are very important parts in this fast-growing world. They also play a crucial role in economy and operational considerations of a country, and by environmental concerns, energy efficiency has now become a key pillar in the design of communication networks. With the help of several of base station and millions of networking devices in the fifth generation of wireless communications, the need of energy efficient devices and operation will more effective. This chapter focused on following areas to enhance efficiency, which incorporate EE improvement utilizing radio access techniques like synchronously remote endurance and force move. In this research paper, the authors have searched various methods or techniques that are working with 5G wireless networks and got techniques that can address to increase speed with the help of 5G wireless network. It discusses energy-efficiency techniques that can be useful to boost user experience on 5G wireless network and also discusses the problems that can arrive in and addressed in future.


Author(s):  
Pradeep Kumar Garg

The internet of things (IoT) is the network of physical objects—devices, vehicles, buildings, and other objects—embedded with software, electronic devices, sensors, and network connectivity that enable these objects to collect and share information or data. Its applications include smart homes, healthcare, industries, transportation systems, logistics, and energy. Building an IoT real-time-based application involves the proper selection of combination of sensors, technology, networks, and communication modules, supported with the concepts of data processing, remote sensing, cloud computing, etc. This chapter highlights advantages and disadvantages IoT and various techniques, such as computer vision, remote sensing, artificial intelligence, cloud computing, big data, ubiquitous computing, which are widely used in various applications. Many new IoT-based applications will evolve, as new devices, sensors, chips, and computational techniques are developed.


Author(s):  
Rashmi Mishra ◽  
R. K. Yadav

The evolving area of the upcoming technology in the era of “Mobile Security” is a 5G network. The aim of this technology is to provide security to the mobile nodes for the load balancing, for the voice security, capacity, quality of services, secure end-to-end communication, connectivity of the devices in a highly mobile network with reliable and scalable networks. The enhancement towards technology leads to connect home appliances with IoT devices, industries, business. Therefore, security-related issues will also increase. In wireless communication, devices want to connect all the time, which primes the vulnerabilities, increases network traffic at the device side on the channel, and creates the backdoor for the hacking and cracking mechanisms for the wireless devices.


Sign in / Sign up

Export Citation Format

Share Document