首页 > 最新文献

Algorithms, Methods, and Applications in Mobile Computing and Communications最新文献

英文 中文
Massive Access Control in Machine-to-Machine Communications 机器对机器通信中的大规模访问控制
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH006
P. Verma, R. Verma, A. Prakash, R. Tripathi
This chapter proposes a new hybrid MAC protocol for direct communication among M2M devices with gateway coordination. The proposed protocol combines the benefits of both contention-based and reservation-based MAC schemes. The authors assume that the contention and reservation portion of M2M devices is a frame structure, which is comprised of two sections: contention interval (CI) and transmission interval (TI). The CI duration follows p-persistent CSMA mechanism, which allows M2M devices to contend for the transmission slots with equal priorities. After contention, only those devices which have won time-slots are allowed to transmit data packets during TI. In the proposed MAC scheme, the TI duration follows TDMA mechanism. Each M2M transmitter device and its corresponding one-hop distant receiver communicate using IEEE 802.11 DCF protocol within each TDMA slot to overcome various limitations of TDMA mechanism. The authors evaluate the performance of the proposed hybrid MAC protocol in terms of aggregate throughput, average transmission delay, channel utility, and energy consumption.
本章提出了一种新的混合MAC协议,用于网关协调的M2M设备之间的直接通信。该协议结合了基于争用和基于保留的MAC协议的优点。假设M2M设备的争用和保留部分是一个帧结构,它由争用间隔(CI)和传输间隔(TI)两部分组成。CI持续时间遵循p-persistent CSMA机制,该机制允许M2M设备以相同的优先级竞争传输时隙。在竞争之后,只有那些赢得时隙的设备才被允许在TI期间传输数据包。在提出的MAC方案中,TI持续时间遵循TDMA机制。每个M2M发送设备及其对应的一跳远端接收器在每个TDMA槽内使用IEEE 802.11 DCF协议进行通信,以克服TDMA机制的各种限制。作者从总吞吐量、平均传输延迟、信道利用率和能耗等方面评估了所提出的混合MAC协议的性能。
{"title":"Massive Access Control in Machine-to-Machine Communications","authors":"P. Verma, R. Verma, A. Prakash, R. Tripathi","doi":"10.4018/978-1-5225-5693-0.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH006","url":null,"abstract":"This chapter proposes a new hybrid MAC protocol for direct communication among M2M devices with gateway coordination. The proposed protocol combines the benefits of both contention-based and reservation-based MAC schemes. The authors assume that the contention and reservation portion of M2M devices is a frame structure, which is comprised of two sections: contention interval (CI) and transmission interval (TI). The CI duration follows p-persistent CSMA mechanism, which allows M2M devices to contend for the transmission slots with equal priorities. After contention, only those devices which have won time-slots are allowed to transmit data packets during TI. In the proposed MAC scheme, the TI duration follows TDMA mechanism. Each M2M transmitter device and its corresponding one-hop distant receiver communicate using IEEE 802.11 DCF protocol within each TDMA slot to overcome various limitations of TDMA mechanism. The authors evaluate the performance of the proposed hybrid MAC protocol in terms of aggregate throughput, average transmission delay, channel utility, and energy consumption.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125601881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Channel Allocation Schemes in Wireless Mesh Network 无线网状网络中信道分配方案的分类
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH004
Abira Banik, Abhishek Majumder
Wireless mesh network (WMN) is a widely accepted network topology due to its implementation convenience, low cost nature, and immense adaptability in real-time scenarios. The components of the network are gateways, mesh routers, access points, and end users. The components in mesh topology have a dedicated line of communication with a half-duplex radio. The wireless mesh network is basically implemented in IEEE 802.11 standard, and it is typically ad-hoc in nature. The advantageous nature of WMN leads to its extensive use in today's world. WMN's overall performance has been increased by incorporating the concept of multi-channel multi-radio. This gives rise to the problem of channel assignment for maximum utilization of the available bandwidth. In this chapter, the factors affecting the channel assignment process have been presented. Categorizations of the channel assignment techniques are also illustrated. Channel assignment techniques have also been compared.
无线网状网络(Wireless mesh network, WMN)具有实现方便、成本低、实时适应性强等优点,是一种被广泛接受的网络拓扑结构。网络的组成部分包括网关、网状路由器、接入点和最终用户。网状拓扑中的组件具有与半双工无线电通信的专用线路。无线网状网络基本上是在IEEE 802.11标准中实现的,本质上是典型的ad-hoc。WMN的优点使其在当今世界得到了广泛的应用。WMN的整体性能通过合并多通道多无线电的概念得到了提高。这就产生了最大限度利用可用带宽的信道分配问题。在本章中,介绍了影响信道分配过程的因素。还说明了信道分配技术的分类。信道分配技术也进行了比较。
{"title":"Classification of Channel Allocation Schemes in Wireless Mesh Network","authors":"Abira Banik, Abhishek Majumder","doi":"10.4018/978-1-5225-5693-0.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH004","url":null,"abstract":"Wireless mesh network (WMN) is a widely accepted network topology due to its implementation convenience, low cost nature, and immense adaptability in real-time scenarios. The components of the network are gateways, mesh routers, access points, and end users. The components in mesh topology have a dedicated line of communication with a half-duplex radio. The wireless mesh network is basically implemented in IEEE 802.11 standard, and it is typically ad-hoc in nature. The advantageous nature of WMN leads to its extensive use in today's world. WMN's overall performance has been increased by incorporating the concept of multi-channel multi-radio. This gives rise to the problem of channel assignment for maximum utilization of the available bandwidth. In this chapter, the factors affecting the channel assignment process have been presented. Categorizations of the channel assignment techniques are also illustrated. Channel assignment techniques have also been compared.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Power-Saving Mechanism for VoIP Over WiMAX Based on Artificial Neural Network 基于人工神经网络的WiMAX VoIP自适应节能机制
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH007
Tamer Z. Emara
The IEEE 802.16 system offers power-saving class type II as a power-saving algorithm for real-time services such as voice over internet protocol (VoIP) service. However, it doesn't take into account the silent periods of VoIP conversation. This chapter proposes a power conservation algorithm based on artificial neural network (ANN-VPSM) that can be applied to VoIP service over WiMAX systems. Artificial intelligent model using feed forward neural network with a single hidden layer has been developed to predict the mutual silent period that used to determine the sleep period for power saving class mode in IEEE 802.16. From the implication of the findings, ANN-VPSM reduces the power consumption during VoIP calls with respect to the quality of services (QoS). Experimental results depict the significant advantages of ANN-VPSM in terms of power saving and quality-of-service (QoS). It shows the power consumed in the mobile station can be reduced up to 3.7% with respect to VoIP quality.
IEEE 802.16系统为诸如VoIP (voice over internet protocol)等实时业务提供了II类节能算法。然而,它没有考虑到VoIP会话的静默期。本章提出了一种基于人工神经网络(ANN-VPSM)的节能算法,该算法可应用于WiMAX系统上的VoIP业务。针对ieee802.16节能类模式的休眠周期,提出了一种基于单隐层前馈神经网络的人工智能模型,用于预测节能类模式的相互沉默周期。从研究结果的含义来看,ANN-VPSM在VoIP呼叫期间降低了与服务质量(QoS)相关的功耗。实验结果表明,ANN-VPSM在节能和服务质量(QoS)方面具有显著优势。它显示移动站中消耗的功率可以在VoIP质量方面减少3.7%。
{"title":"Adaptive Power-Saving Mechanism for VoIP Over WiMAX Based on Artificial Neural Network","authors":"Tamer Z. Emara","doi":"10.4018/978-1-5225-5693-0.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH007","url":null,"abstract":"The IEEE 802.16 system offers power-saving class type II as a power-saving algorithm for real-time services such as voice over internet protocol (VoIP) service. However, it doesn't take into account the silent periods of VoIP conversation. This chapter proposes a power conservation algorithm based on artificial neural network (ANN-VPSM) that can be applied to VoIP service over WiMAX systems. Artificial intelligent model using feed forward neural network with a single hidden layer has been developed to predict the mutual silent period that used to determine the sleep period for power saving class mode in IEEE 802.16. From the implication of the findings, ANN-VPSM reduces the power consumption during VoIP calls with respect to the quality of services (QoS). Experimental results depict the significant advantages of ANN-VPSM in terms of power saving and quality-of-service (QoS). It shows the power consumed in the mobile station can be reduced up to 3.7% with respect to VoIP quality.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131269048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Methods of Always Best-Connected Networks in Heterogeneous Environment 异构环境下始终最佳连接网络的预测方法
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH003
Bhuvaneswari Mariappan
Heterogeneous networks are comprised of dense deployments of pico (small cell) base stations (BSs) overlaid with traditional macro BSs, thus allowing them to communicate with each other. The internet itself is an example of a heterogeneous network. Presently, the emergence of 4G and 5G heterogeneous network has attracted most of the user-centric applications like video chatting, online mobile interactive classroom, and voice services. To facilitate such bandwidth-hungry multimedia applications and to ensure QoS (quality of service), always best-connected (ABC) network is to be selected among available heterogeneous network. The selection of the ABC network is based on certain design parameters such as cost factor, bandwidth utilization, packet delivery ratio, security, throughput, delay, packet loss ratio, and call blocking probability. In this chapter, all the above-mentioned design parameters are considered to evaluate the performance of always best-connected network under heterogeneous environment for mobile users.
异构网络由微型基站(BSs)的密集部署与传统的宏基站(BSs)叠加而成,从而使它们能够相互通信。互联网本身就是一个异构网络的例子。目前,4G和5G异构网络的出现,吸引了大部分以用户为中心的应用,如视频聊天、在线移动互动课堂、语音服务。为了方便这种带宽要求很高的多媒体应用,并保证服务质量(QoS),需要在可用的异构网络中选择始终最佳连接(ABC)网络。ABC网络的选择是基于一定的设计参数,如成本系数、带宽利用率、分组分发率、安全性、吞吐量、延迟、丢包率、呼叫阻塞概率等。在本章中,考虑上述所有设计参数来评估移动用户在异构环境下始终最佳连接网络的性能。
{"title":"Predictive Methods of Always Best-Connected Networks in Heterogeneous Environment","authors":"Bhuvaneswari Mariappan","doi":"10.4018/978-1-5225-5693-0.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH003","url":null,"abstract":"Heterogeneous networks are comprised of dense deployments of pico (small cell) base stations (BSs) overlaid with traditional macro BSs, thus allowing them to communicate with each other. The internet itself is an example of a heterogeneous network. Presently, the emergence of 4G and 5G heterogeneous network has attracted most of the user-centric applications like video chatting, online mobile interactive classroom, and voice services. To facilitate such bandwidth-hungry multimedia applications and to ensure QoS (quality of service), always best-connected (ABC) network is to be selected among available heterogeneous network. The selection of the ABC network is based on certain design parameters such as cost factor, bandwidth utilization, packet delivery ratio, security, throughput, delay, packet loss ratio, and call blocking probability. In this chapter, all the above-mentioned design parameters are considered to evaluate the performance of always best-connected network under heterogeneous environment for mobile users.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services 可视化驱动的移动转账服务欺诈检测方法
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH009
E. Novikova, Igor Kotenko
Mobile money transfer services (MMTS) are widely spread in the countries lacking conventional financial institutions. Like traditional financial systems they can be used to implement financial frauds. The chapter presents a novel visualization-driven approach to detection of the fraudulent activity in the MMTS. It consists in usage of a set of interactive visualization models supported by outlier detection techniques allowing to construct comprehensive view on the MMTS subscriber behavior according to his/her transaction activity. The key element of the approach is the RadViz visualization that helps to identify groups with similar behavior and outliers. The scatter plot visualization of the time intervals with transaction activity supported by the heat map visualization of the historical activity of the MMTS subscriber is used to conduct analysis of how the MMTS users' transaction activity changes over time and detect sudden changes in it. The results of the efficiency evaluation of the developed visualization-driven approach are discussed.
移动转账服务(MMTS)在缺乏传统金融机构的国家广泛普及。像传统的金融系统一样,它们可以被用来实施金融欺诈。本章提出了一种新的可视化驱动的方法来检测MMTS中的欺诈活动。它包括使用一组由离群值检测技术支持的交互式可视化模型,允许根据MMTS订户的事务活动构建有关其行为的全面视图。该方法的关键要素是RadViz可视化,它有助于识别具有相似行为和异常值的组。MMTS订阅者历史活动的热图可视化支持事务活动时间间隔的散点图可视化,用于分析MMTS用户的事务活动如何随时间变化,并检测其中的突然变化。讨论了所开发的可视化驱动方法的效率评价结果。
{"title":"Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services","authors":"E. Novikova, Igor Kotenko","doi":"10.4018/978-1-5225-5693-0.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH009","url":null,"abstract":"Mobile money transfer services (MMTS) are widely spread in the countries lacking conventional financial institutions. Like traditional financial systems they can be used to implement financial frauds. The chapter presents a novel visualization-driven approach to detection of the fraudulent activity in the MMTS. It consists in usage of a set of interactive visualization models supported by outlier detection techniques allowing to construct comprehensive view on the MMTS subscriber behavior according to his/her transaction activity. The key element of the approach is the RadViz visualization that helps to identify groups with similar behavior and outliers. The scatter plot visualization of the time intervals with transaction activity supported by the heat map visualization of the historical activity of the MMTS subscriber is used to conduct analysis of how the MMTS users' transaction activity changes over time and detect sudden changes in it. The results of the efficiency evaluation of the developed visualization-driven approach are discussed.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Dynamic Fog Computing 动态雾计算
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH002
Sander Soo, Chii Chang, S. Loke, S. Srirama
The emerging Internet of Things (IoT) systems enhance various mobile ubiquitous applications such as augmented reality, environmental analytics, etc. However, the common cloud-centric IoT systems face limitations on the agility needed for real-time applications. This motivates the Fog computing architecture, where IoT systems distribute their processes to the computational resources at the edge networks near data sources and end-users. Although fog computing is a promising solution, it also raises a challenge in mobility support for mobile ubiquitous applications. Lack of proper mobility support will increase the latency due to various factors such as package drop, re-assigning tasks to fog servers, etc. To address the challenge, this chapter proposes a dynamic and proactive fog computing approach, which improves the task distribution process in fog-assisted mobile ubiquitous applications and optimizes the task allocation based on runtime context information. The authors have implemented and validated a proof-of-concept prototype and the chapter discusses the findings.
新兴的物联网(IoT)系统增强了各种移动无处不在的应用,如增强现实,环境分析等。然而,常见的以云为中心的物联网系统在实时应用所需的敏捷性方面面临限制。这激发了雾计算架构的发展,物联网系统将其流程分配给数据源和最终用户附近边缘网络的计算资源。尽管雾计算是一个很有前途的解决方案,但它也对移动无处不在的应用程序的移动性支持提出了挑战。缺乏适当的移动性支持将会增加延迟,这是由于各种因素造成的,比如丢包、给雾服务器重新分配任务等等。为了解决这一挑战,本章提出了一种动态和主动的雾计算方法,该方法改进了雾辅助移动泛在应用程序中的任务分配过程,并基于运行时上下文信息优化了任务分配。作者已经实现并验证了一个概念验证原型,本章讨论了研究结果。
{"title":"Dynamic Fog Computing","authors":"Sander Soo, Chii Chang, S. Loke, S. Srirama","doi":"10.4018/978-1-5225-5693-0.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH002","url":null,"abstract":"The emerging Internet of Things (IoT) systems enhance various mobile ubiquitous applications such as augmented reality, environmental analytics, etc. However, the common cloud-centric IoT systems face limitations on the agility needed for real-time applications. This motivates the Fog computing architecture, where IoT systems distribute their processes to the computational resources at the edge networks near data sources and end-users. Although fog computing is a promising solution, it also raises a challenge in mobility support for mobile ubiquitous applications. Lack of proper mobility support will increase the latency due to various factors such as package drop, re-assigning tasks to fog servers, etc. To address the challenge, this chapter proposes a dynamic and proactive fog computing approach, which improves the task distribution process in fog-assisted mobile ubiquitous applications and optimizes the task allocation based on runtime context information. The authors have implemented and validated a proof-of-concept prototype and the chapter discusses the findings.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117290626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visualizing Pathway on 3D Maps for an Interactive User Navigation in Mobile Devices 移动设备中交互式用户导航的3D地图路径可视化
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH010
T. Mantoro, M. A. Ayu, A. Ibrahim
3D maps have become an essential tool for navigation aid. The aim of a navigation aid is to provide an optimal route from the current position to the destination. Unfortunately, most mobile devices' GPS signal accuracy and the display of pathways on 3D maps in the small screen of mobile devices affects the pathway architectural from generating accurate initial positions to destinations. This chapter proposed a technique for visualizing pathway on 3D maps for an interactive user navigation aid in mobile devices. This technique provides visualization of 3D maps in virtual 3D workspace environments which assists a user to navigate to a target location. The Bi-A* path-finding algorithm was used for establishing dynamic target location in Voronoi diagram/Delaunay triangulation. This approach could navigate more than two users in a 3D walk-space and at the same time showing their whereabouts on 3D projections mapped. The map shows the users' location in the scene to navigate from source to the target and the target also moves to the source to meet on the same physical location and image plane.
3D地图已经成为导航辅助的重要工具。导航辅助设备的目的是提供从当前位置到目的地的最佳路线。不幸的是,大多数移动设备的GPS信号精度和路径在移动设备小屏幕上3D地图上的显示影响了路径架构从生成精确的初始位置到目的地。本章提出了一种在移动设备中用于交互式用户导航辅助的3D地图上可视化路径的技术。该技术在虚拟3D工作空间环境中提供3D地图的可视化,帮助用户导航到目标位置。在Voronoi图/Delaunay三角剖分中,采用Bi-A*寻路算法建立动态目标位置。这种方法可以在一个3D行走空间中为两个以上的用户导航,同时在3D投影地图上显示他们的位置。地图显示用户在场景中的位置,从源导航到目标,目标也移动到源,在同一物理位置和图像平面上相遇。
{"title":"Visualizing Pathway on 3D Maps for an Interactive User Navigation in Mobile Devices","authors":"T. Mantoro, M. A. Ayu, A. Ibrahim","doi":"10.4018/978-1-5225-5693-0.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH010","url":null,"abstract":"3D maps have become an essential tool for navigation aid. The aim of a navigation aid is to provide an optimal route from the current position to the destination. Unfortunately, most mobile devices' GPS signal accuracy and the display of pathways on 3D maps in the small screen of mobile devices affects the pathway architectural from generating accurate initial positions to destinations. This chapter proposed a technique for visualizing pathway on 3D maps for an interactive user navigation aid in mobile devices. This technique provides visualization of 3D maps in virtual 3D workspace environments which assists a user to navigate to a target location. The Bi-A* path-finding algorithm was used for establishing dynamic target location in Voronoi diagram/Delaunay triangulation. This approach could navigate more than two users in a 3D walk-space and at the same time showing their whereabouts on 3D projections mapped. The map shows the users' location in the scene to navigate from source to the target and the target also moves to the source to meet on the same physical location and image plane.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130728415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving From Topology-Dependent to Opportunistic Routing Protocols in Dynamic Wireless Ad Hoc Networks 动态无线自组织网络中从拓扑依赖路由协议到机会路由协议的转变
Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-5693-0.CH001
Varun G. Menon, Joe Prathap P. M.
Mobile ad hoc networks (MANETs) are a collection of wireless devices like mobile phones and laptops that can spontaneously form self-sustained temporary networks without the assistance of any pre-existing infrastructure or centralized control. These unique features have enabled MANETs to be used for communication in challenging environments like earthquake-affected areas, underground mines, etc. Mobility and speed of devices in MANETs have become highly unpredictable and is increasing day by day. Major challenge in these highly dynamic networks is to efficiently deliver data packets from source to destination. Over these years a number of protocols have been proposed for this purpose. This chapter examines the working of popular protocols proposed for efficient data delivery in MANETs: starting from the traditional topology-based protocols to the latest opportunistic protocols. The performances of these protocols are analyzed using simulations in ns-2. Finally, challenges and future research directions in this area are presented.
移动自组织网络(manet)是移动电话和笔记本电脑等无线设备的集合,可以自发地形成自我维持的临时网络,而无需任何预先存在的基础设施或集中控制的帮助。这些独特的功能使manet能够在地震灾区、地下矿井等具有挑战性的环境中用于通信。manet中设备的移动性和速度变得高度不可预测,并且日益增加。在这些高度动态的网络中,主要的挑战是有效地将数据包从源传输到目的。这些年来,为此目的提出了若干议定书。本章研究了为在manet中有效传输数据而提出的流行协议的工作:从传统的基于拓扑的协议到最新的机会协议。在ns-2中进行了仿真,分析了这些协议的性能。最后,提出了该领域面临的挑战和未来的研究方向。
{"title":"Moving From Topology-Dependent to Opportunistic Routing Protocols in Dynamic Wireless Ad Hoc Networks","authors":"Varun G. Menon, Joe Prathap P. M.","doi":"10.4018/978-1-5225-5693-0.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH001","url":null,"abstract":"Mobile ad hoc networks (MANETs) are a collection of wireless devices like mobile phones and laptops that can spontaneously form self-sustained temporary networks without the assistance of any pre-existing infrastructure or centralized control. These unique features have enabled MANETs to be used for communication in challenging environments like earthquake-affected areas, underground mines, etc. Mobility and speed of devices in MANETs have become highly unpredictable and is increasing day by day. Major challenge in these highly dynamic networks is to efficiently deliver data packets from source to destination. Over these years a number of protocols have been proposed for this purpose. This chapter examines the working of popular protocols proposed for efficient data delivery in MANETs: starting from the traditional topology-based protocols to the latest opportunistic protocols. The performances of these protocols are analyzed using simulations in ns-2. Finally, challenges and future research directions in this area are presented.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121944722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
Algorithms, Methods, and Applications in Mobile Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1