Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH006
P. Verma, R. Verma, A. Prakash, R. Tripathi
This chapter proposes a new hybrid MAC protocol for direct communication among M2M devices with gateway coordination. The proposed protocol combines the benefits of both contention-based and reservation-based MAC schemes. The authors assume that the contention and reservation portion of M2M devices is a frame structure, which is comprised of two sections: contention interval (CI) and transmission interval (TI). The CI duration follows p-persistent CSMA mechanism, which allows M2M devices to contend for the transmission slots with equal priorities. After contention, only those devices which have won time-slots are allowed to transmit data packets during TI. In the proposed MAC scheme, the TI duration follows TDMA mechanism. Each M2M transmitter device and its corresponding one-hop distant receiver communicate using IEEE 802.11 DCF protocol within each TDMA slot to overcome various limitations of TDMA mechanism. The authors evaluate the performance of the proposed hybrid MAC protocol in terms of aggregate throughput, average transmission delay, channel utility, and energy consumption.
{"title":"Massive Access Control in Machine-to-Machine Communications","authors":"P. Verma, R. Verma, A. Prakash, R. Tripathi","doi":"10.4018/978-1-5225-5693-0.CH006","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH006","url":null,"abstract":"This chapter proposes a new hybrid MAC protocol for direct communication among M2M devices with gateway coordination. The proposed protocol combines the benefits of both contention-based and reservation-based MAC schemes. The authors assume that the contention and reservation portion of M2M devices is a frame structure, which is comprised of two sections: contention interval (CI) and transmission interval (TI). The CI duration follows p-persistent CSMA mechanism, which allows M2M devices to contend for the transmission slots with equal priorities. After contention, only those devices which have won time-slots are allowed to transmit data packets during TI. In the proposed MAC scheme, the TI duration follows TDMA mechanism. Each M2M transmitter device and its corresponding one-hop distant receiver communicate using IEEE 802.11 DCF protocol within each TDMA slot to overcome various limitations of TDMA mechanism. The authors evaluate the performance of the proposed hybrid MAC protocol in terms of aggregate throughput, average transmission delay, channel utility, and energy consumption.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125601881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH004
Abira Banik, Abhishek Majumder
Wireless mesh network (WMN) is a widely accepted network topology due to its implementation convenience, low cost nature, and immense adaptability in real-time scenarios. The components of the network are gateways, mesh routers, access points, and end users. The components in mesh topology have a dedicated line of communication with a half-duplex radio. The wireless mesh network is basically implemented in IEEE 802.11 standard, and it is typically ad-hoc in nature. The advantageous nature of WMN leads to its extensive use in today's world. WMN's overall performance has been increased by incorporating the concept of multi-channel multi-radio. This gives rise to the problem of channel assignment for maximum utilization of the available bandwidth. In this chapter, the factors affecting the channel assignment process have been presented. Categorizations of the channel assignment techniques are also illustrated. Channel assignment techniques have also been compared.
{"title":"Classification of Channel Allocation Schemes in Wireless Mesh Network","authors":"Abira Banik, Abhishek Majumder","doi":"10.4018/978-1-5225-5693-0.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH004","url":null,"abstract":"Wireless mesh network (WMN) is a widely accepted network topology due to its implementation convenience, low cost nature, and immense adaptability in real-time scenarios. The components of the network are gateways, mesh routers, access points, and end users. The components in mesh topology have a dedicated line of communication with a half-duplex radio. The wireless mesh network is basically implemented in IEEE 802.11 standard, and it is typically ad-hoc in nature. The advantageous nature of WMN leads to its extensive use in today's world. WMN's overall performance has been increased by incorporating the concept of multi-channel multi-radio. This gives rise to the problem of channel assignment for maximum utilization of the available bandwidth. In this chapter, the factors affecting the channel assignment process have been presented. Categorizations of the channel assignment techniques are also illustrated. Channel assignment techniques have also been compared.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130848971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH007
Tamer Z. Emara
The IEEE 802.16 system offers power-saving class type II as a power-saving algorithm for real-time services such as voice over internet protocol (VoIP) service. However, it doesn't take into account the silent periods of VoIP conversation. This chapter proposes a power conservation algorithm based on artificial neural network (ANN-VPSM) that can be applied to VoIP service over WiMAX systems. Artificial intelligent model using feed forward neural network with a single hidden layer has been developed to predict the mutual silent period that used to determine the sleep period for power saving class mode in IEEE 802.16. From the implication of the findings, ANN-VPSM reduces the power consumption during VoIP calls with respect to the quality of services (QoS). Experimental results depict the significant advantages of ANN-VPSM in terms of power saving and quality-of-service (QoS). It shows the power consumed in the mobile station can be reduced up to 3.7% with respect to VoIP quality.
IEEE 802.16系统为诸如VoIP (voice over internet protocol)等实时业务提供了II类节能算法。然而,它没有考虑到VoIP会话的静默期。本章提出了一种基于人工神经网络(ANN-VPSM)的节能算法,该算法可应用于WiMAX系统上的VoIP业务。针对ieee802.16节能类模式的休眠周期,提出了一种基于单隐层前馈神经网络的人工智能模型,用于预测节能类模式的相互沉默周期。从研究结果的含义来看,ANN-VPSM在VoIP呼叫期间降低了与服务质量(QoS)相关的功耗。实验结果表明,ANN-VPSM在节能和服务质量(QoS)方面具有显著优势。它显示移动站中消耗的功率可以在VoIP质量方面减少3.7%。
{"title":"Adaptive Power-Saving Mechanism for VoIP Over WiMAX Based on Artificial Neural Network","authors":"Tamer Z. Emara","doi":"10.4018/978-1-5225-5693-0.CH007","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH007","url":null,"abstract":"The IEEE 802.16 system offers power-saving class type II as a power-saving algorithm for real-time services such as voice over internet protocol (VoIP) service. However, it doesn't take into account the silent periods of VoIP conversation. This chapter proposes a power conservation algorithm based on artificial neural network (ANN-VPSM) that can be applied to VoIP service over WiMAX systems. Artificial intelligent model using feed forward neural network with a single hidden layer has been developed to predict the mutual silent period that used to determine the sleep period for power saving class mode in IEEE 802.16. From the implication of the findings, ANN-VPSM reduces the power consumption during VoIP calls with respect to the quality of services (QoS). Experimental results depict the significant advantages of ANN-VPSM in terms of power saving and quality-of-service (QoS). It shows the power consumed in the mobile station can be reduced up to 3.7% with respect to VoIP quality.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131269048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH003
Bhuvaneswari Mariappan
Heterogeneous networks are comprised of dense deployments of pico (small cell) base stations (BSs) overlaid with traditional macro BSs, thus allowing them to communicate with each other. The internet itself is an example of a heterogeneous network. Presently, the emergence of 4G and 5G heterogeneous network has attracted most of the user-centric applications like video chatting, online mobile interactive classroom, and voice services. To facilitate such bandwidth-hungry multimedia applications and to ensure QoS (quality of service), always best-connected (ABC) network is to be selected among available heterogeneous network. The selection of the ABC network is based on certain design parameters such as cost factor, bandwidth utilization, packet delivery ratio, security, throughput, delay, packet loss ratio, and call blocking probability. In this chapter, all the above-mentioned design parameters are considered to evaluate the performance of always best-connected network under heterogeneous environment for mobile users.
{"title":"Predictive Methods of Always Best-Connected Networks in Heterogeneous Environment","authors":"Bhuvaneswari Mariappan","doi":"10.4018/978-1-5225-5693-0.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH003","url":null,"abstract":"Heterogeneous networks are comprised of dense deployments of pico (small cell) base stations (BSs) overlaid with traditional macro BSs, thus allowing them to communicate with each other. The internet itself is an example of a heterogeneous network. Presently, the emergence of 4G and 5G heterogeneous network has attracted most of the user-centric applications like video chatting, online mobile interactive classroom, and voice services. To facilitate such bandwidth-hungry multimedia applications and to ensure QoS (quality of service), always best-connected (ABC) network is to be selected among available heterogeneous network. The selection of the ABC network is based on certain design parameters such as cost factor, bandwidth utilization, packet delivery ratio, security, throughput, delay, packet loss ratio, and call blocking probability. In this chapter, all the above-mentioned design parameters are considered to evaluate the performance of always best-connected network under heterogeneous environment for mobile users.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115078640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH009
E. Novikova, Igor Kotenko
Mobile money transfer services (MMTS) are widely spread in the countries lacking conventional financial institutions. Like traditional financial systems they can be used to implement financial frauds. The chapter presents a novel visualization-driven approach to detection of the fraudulent activity in the MMTS. It consists in usage of a set of interactive visualization models supported by outlier detection techniques allowing to construct comprehensive view on the MMTS subscriber behavior according to his/her transaction activity. The key element of the approach is the RadViz visualization that helps to identify groups with similar behavior and outliers. The scatter plot visualization of the time intervals with transaction activity supported by the heat map visualization of the historical activity of the MMTS subscriber is used to conduct analysis of how the MMTS users' transaction activity changes over time and detect sudden changes in it. The results of the efficiency evaluation of the developed visualization-driven approach are discussed.
{"title":"Visualization-Driven Approach to Fraud Detection in the Mobile Money Transfer Services","authors":"E. Novikova, Igor Kotenko","doi":"10.4018/978-1-5225-5693-0.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH009","url":null,"abstract":"Mobile money transfer services (MMTS) are widely spread in the countries lacking conventional financial institutions. Like traditional financial systems they can be used to implement financial frauds. The chapter presents a novel visualization-driven approach to detection of the fraudulent activity in the MMTS. It consists in usage of a set of interactive visualization models supported by outlier detection techniques allowing to construct comprehensive view on the MMTS subscriber behavior according to his/her transaction activity. The key element of the approach is the RadViz visualization that helps to identify groups with similar behavior and outliers. The scatter plot visualization of the time intervals with transaction activity supported by the heat map visualization of the historical activity of the MMTS subscriber is used to conduct analysis of how the MMTS users' transaction activity changes over time and detect sudden changes in it. The results of the efficiency evaluation of the developed visualization-driven approach are discussed.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH002
Sander Soo, Chii Chang, S. Loke, S. Srirama
The emerging Internet of Things (IoT) systems enhance various mobile ubiquitous applications such as augmented reality, environmental analytics, etc. However, the common cloud-centric IoT systems face limitations on the agility needed for real-time applications. This motivates the Fog computing architecture, where IoT systems distribute their processes to the computational resources at the edge networks near data sources and end-users. Although fog computing is a promising solution, it also raises a challenge in mobility support for mobile ubiquitous applications. Lack of proper mobility support will increase the latency due to various factors such as package drop, re-assigning tasks to fog servers, etc. To address the challenge, this chapter proposes a dynamic and proactive fog computing approach, which improves the task distribution process in fog-assisted mobile ubiquitous applications and optimizes the task allocation based on runtime context information. The authors have implemented and validated a proof-of-concept prototype and the chapter discusses the findings.
{"title":"Dynamic Fog Computing","authors":"Sander Soo, Chii Chang, S. Loke, S. Srirama","doi":"10.4018/978-1-5225-5693-0.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH002","url":null,"abstract":"The emerging Internet of Things (IoT) systems enhance various mobile ubiquitous applications such as augmented reality, environmental analytics, etc. However, the common cloud-centric IoT systems face limitations on the agility needed for real-time applications. This motivates the Fog computing architecture, where IoT systems distribute their processes to the computational resources at the edge networks near data sources and end-users. Although fog computing is a promising solution, it also raises a challenge in mobility support for mobile ubiquitous applications. Lack of proper mobility support will increase the latency due to various factors such as package drop, re-assigning tasks to fog servers, etc. To address the challenge, this chapter proposes a dynamic and proactive fog computing approach, which improves the task distribution process in fog-assisted mobile ubiquitous applications and optimizes the task allocation based on runtime context information. The authors have implemented and validated a proof-of-concept prototype and the chapter discusses the findings.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117290626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH010
T. Mantoro, M. A. Ayu, A. Ibrahim
3D maps have become an essential tool for navigation aid. The aim of a navigation aid is to provide an optimal route from the current position to the destination. Unfortunately, most mobile devices' GPS signal accuracy and the display of pathways on 3D maps in the small screen of mobile devices affects the pathway architectural from generating accurate initial positions to destinations. This chapter proposed a technique for visualizing pathway on 3D maps for an interactive user navigation aid in mobile devices. This technique provides visualization of 3D maps in virtual 3D workspace environments which assists a user to navigate to a target location. The Bi-A* path-finding algorithm was used for establishing dynamic target location in Voronoi diagram/Delaunay triangulation. This approach could navigate more than two users in a 3D walk-space and at the same time showing their whereabouts on 3D projections mapped. The map shows the users' location in the scene to navigate from source to the target and the target also moves to the source to meet on the same physical location and image plane.
{"title":"Visualizing Pathway on 3D Maps for an Interactive User Navigation in Mobile Devices","authors":"T. Mantoro, M. A. Ayu, A. Ibrahim","doi":"10.4018/978-1-5225-5693-0.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH010","url":null,"abstract":"3D maps have become an essential tool for navigation aid. The aim of a navigation aid is to provide an optimal route from the current position to the destination. Unfortunately, most mobile devices' GPS signal accuracy and the display of pathways on 3D maps in the small screen of mobile devices affects the pathway architectural from generating accurate initial positions to destinations. This chapter proposed a technique for visualizing pathway on 3D maps for an interactive user navigation aid in mobile devices. This technique provides visualization of 3D maps in virtual 3D workspace environments which assists a user to navigate to a target location. The Bi-A* path-finding algorithm was used for establishing dynamic target location in Voronoi diagram/Delaunay triangulation. This approach could navigate more than two users in a 3D walk-space and at the same time showing their whereabouts on 3D projections mapped. The map shows the users' location in the scene to navigate from source to the target and the target also moves to the source to meet on the same physical location and image plane.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130728415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.4018/978-1-5225-5693-0.CH001
Varun G. Menon, Joe Prathap P. M.
Mobile ad hoc networks (MANETs) are a collection of wireless devices like mobile phones and laptops that can spontaneously form self-sustained temporary networks without the assistance of any pre-existing infrastructure or centralized control. These unique features have enabled MANETs to be used for communication in challenging environments like earthquake-affected areas, underground mines, etc. Mobility and speed of devices in MANETs have become highly unpredictable and is increasing day by day. Major challenge in these highly dynamic networks is to efficiently deliver data packets from source to destination. Over these years a number of protocols have been proposed for this purpose. This chapter examines the working of popular protocols proposed for efficient data delivery in MANETs: starting from the traditional topology-based protocols to the latest opportunistic protocols. The performances of these protocols are analyzed using simulations in ns-2. Finally, challenges and future research directions in this area are presented.
{"title":"Moving From Topology-Dependent to Opportunistic Routing Protocols in Dynamic Wireless Ad Hoc Networks","authors":"Varun G. Menon, Joe Prathap P. M.","doi":"10.4018/978-1-5225-5693-0.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-5693-0.CH001","url":null,"abstract":"Mobile ad hoc networks (MANETs) are a collection of wireless devices like mobile phones and laptops that can spontaneously form self-sustained temporary networks without the assistance of any pre-existing infrastructure or centralized control. These unique features have enabled MANETs to be used for communication in challenging environments like earthquake-affected areas, underground mines, etc. Mobility and speed of devices in MANETs have become highly unpredictable and is increasing day by day. Major challenge in these highly dynamic networks is to efficiently deliver data packets from source to destination. Over these years a number of protocols have been proposed for this purpose. This chapter examines the working of popular protocols proposed for efficient data delivery in MANETs: starting from the traditional topology-based protocols to the latest opportunistic protocols. The performances of these protocols are analyzed using simulations in ns-2. Finally, challenges and future research directions in this area are presented.","PeriodicalId":251066,"journal":{"name":"Algorithms, Methods, and Applications in Mobile Computing and Communications","volume":"245 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121944722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}