Delay Tolerant Networks enable data transmission in different applications, mainly in environments where communication infrastructure is missing. The existence of links is casual and even when links are created, they are short in time and unstable/unreliable in terms of connectivity. Thus, underwater network applications tend to be delay tolerant. In this paper, we propose a mobility-aware routing protocol for underwater wireless sensor networks. The protocol is based on Focused Beam Routing (FBR) protocol and considers nodes’ next destination location when making forwarding decisions. The routing protocol is called Destination-aware Focused Beam Routing (D-FBR) protocol and we compare its performance with FBR protocol for different FBR angles and different applications. We use Delivery Probability (DP), Average Number of Hops (ANH), Overhead Ratio (OR) and simulate our scenarios by The ONE simulator. Simulation results show that, for D-FBR protocol, when FBR angle is 30 ∘ , OR and ANH is improved by 34.5 % and 23.1 %, respectively, while DP is 6.5 % lower, compared to FBR protocol. Both D-FBR and FBR outperform Epidemic Routing Protocol.
{"title":"Destination-Aware Focused Beam Routing (D-FBR): A routing protocol for underwater wireless sensor networks","authors":"Elis Kulla","doi":"10.3233/jhs-220675","DOIUrl":"https://doi.org/10.3233/jhs-220675","url":null,"abstract":"Delay Tolerant Networks enable data transmission in different applications, mainly in environments where communication infrastructure is missing. The existence of links is casual and even when links are created, they are short in time and unstable/unreliable in terms of connectivity. Thus, underwater network applications tend to be delay tolerant. In this paper, we propose a mobility-aware routing protocol for underwater wireless sensor networks. The protocol is based on Focused Beam Routing (FBR) protocol and considers nodes’ next destination location when making forwarding decisions. The routing protocol is called Destination-aware Focused Beam Routing (D-FBR) protocol and we compare its performance with FBR protocol for different FBR angles and different applications. We use Delivery Probability (DP), Average Number of Hops (ANH), Overhead Ratio (OR) and simulate our scenarios by The ONE simulator. Simulation results show that, for D-FBR protocol, when FBR angle is 30 ∘ , OR and ANH is improved by 34.5 % and 23.1 %, respectively, while DP is 6.5 % lower, compared to FBR protocol. Both D-FBR and FBR outperform Epidemic Routing Protocol.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"31 1","pages":"1-11"},"PeriodicalIF":0.9,"publicationDate":"2022-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84173445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trust-based secure routing in IoT network based on rider foraging optimization algorithm","authors":"Kore Amit Vijay, M. Mishra","doi":"10.3233/JHS-220680","DOIUrl":"https://doi.org/10.3233/JHS-220680","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"28 1","pages":"75-94"},"PeriodicalIF":0.9,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70072088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-01DOI: 10.1007/978-3-030-88841-1
J. Crichigno, Elie F. Kfoury, E. Bou-Harb, N. Ghani
{"title":"High-Speed Networks: A Tutorial","authors":"J. Crichigno, Elie F. Kfoury, E. Bou-Harb, N. Ghani","doi":"10.1007/978-3-030-88841-1","DOIUrl":"https://doi.org/10.1007/978-3-030-88841-1","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"33 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75881294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nowadays, mobile users are equipped with multi-mode terminals allowing them to connect to different radio access technologies like WLAN, 3G (HSPA and HSPA+), and Long term evolution (LTE) each at a time. In this context, the challenge of the next-generation networks is to achieve the Always Best Connected (ABC) concept. To this end, solving the problem of selecting the most suitable radio access technology (RAT) from the list of available RAT is at the heart of the next-generation systems. The decision process is called access network selection and it depends on several parameters, such as quality of service, mobility, cost of each RAT, energy consumption, battery life, etc. Several methods and approaches have been proposed to solve the network selection problem with the fundamental objective which is to offer the best QoS to the users and to maximize the usability of the networks without affecting the users’ experience. In this paper, we propose an adaptive KNN (K nearest neighbour) based algorithm to solve the network selection problem, the proposed solution has a low computation complexity with a high level of veracity is compared with the well-known MADM methods.
{"title":"Adaptive Knn-based algorithm for network selection in next-generation networks","authors":"Fayssal Bendaoud","doi":"10.3233/jhs-210669","DOIUrl":"https://doi.org/10.3233/jhs-210669","url":null,"abstract":"Nowadays, mobile users are equipped with multi-mode terminals allowing them to connect to different radio access technologies like WLAN, 3G (HSPA and HSPA+), and Long term evolution (LTE) each at a time. In this context, the challenge of the next-generation networks is to achieve the Always Best Connected (ABC) concept. To this end, solving the problem of selecting the most suitable radio access technology (RAT) from the list of available RAT is at the heart of the next-generation systems. The decision process is called access network selection and it depends on several parameters, such as quality of service, mobility, cost of each RAT, energy consumption, battery life, etc. Several methods and approaches have been proposed to solve the network selection problem with the fundamental objective which is to offer the best QoS to the users and to maximize the usability of the networks without affecting the users’ experience. In this paper, we propose an adaptive KNN (K nearest neighbour) based algorithm to solve the network selection problem, the proposed solution has a low computation complexity with a high level of veracity is compared with the well-known MADM methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"38 1","pages":"305-318"},"PeriodicalIF":0.9,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85702848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Machine-to-machine (M2M) communications on Long-term evolution (LTE) networks form a substantial part for the Internet-of-things (IoT). The random access procedure is the first step for M2M devices to access network resources. Many researchers have attempted to improve the efficiency of the random access procedure. This work revisits the performance of the hybrid random access protocols which combine congestion control techniques with collision resolution techniques. In particular, we investigate two hybrid protocols. The first one combines the pre-backoff (PBO) with tree random access (TRA), and the second one combines dynamic access barring (DAB) with TRA. The probability analysis is presented for both protocols. The performance is evaluated based on the access success rate, the mean throughput, the mean delay, the collision rate and the mean retransmissions. The simulation results show that the hybrid protocols achieve the highest success rate and throughput with moderate delay and low collision rates with a lower mean number of retransmissions compared to three benchmarks that apply either a congestion control or a collision resolution. The opportunities of future developments of hybrid protocols are listed at the end of this paper to highlight the issues that could be investigated to improve the performance of hybrid random access protocols.
{"title":"Opportunities of hybrid random access protocols for M2M communications in LTE/LTE-A networks","authors":"H. Althumali, M. Othman, N. Noordin, Z. Hanapi","doi":"10.3233/jhs-210672","DOIUrl":"https://doi.org/10.3233/jhs-210672","url":null,"abstract":"Machine-to-machine (M2M) communications on Long-term evolution (LTE) networks form a substantial part for the Internet-of-things (IoT). The random access procedure is the first step for M2M devices to access network resources. Many researchers have attempted to improve the efficiency of the random access procedure. This work revisits the performance of the hybrid random access protocols which combine congestion control techniques with collision resolution techniques. In particular, we investigate two hybrid protocols. The first one combines the pre-backoff (PBO) with tree random access (TRA), and the second one combines dynamic access barring (DAB) with TRA. The probability analysis is presented for both protocols. The performance is evaluated based on the access success rate, the mean throughput, the mean delay, the collision rate and the mean retransmissions. The simulation results show that the hybrid protocols achieve the highest success rate and throughput with moderate delay and low collision rates with a lower mean number of retransmissions compared to three benchmarks that apply either a congestion control or a collision resolution. The opportunities of future developments of hybrid protocols are listed at the end of this paper to highlight the issues that could be investigated to improve the performance of hybrid random access protocols.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"44 1","pages":"361-380"},"PeriodicalIF":0.9,"publicationDate":"2021-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76842003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the vigorous development of blockchain technology represented by bitcoin, blockchain technology has gradually entered the stage of blockchain 3.0 characterized by “programmable society”. And the application of blockchain technology in all walks of life has achieved actual results. Blockchain technology has typical characteristics of decentralization, Tamper-resistant data, information openness and transparency, and natural fit with the application requirements in the field of certificate tracing, which makes the development of the applications of blockchain deposit and traceability in full swing. First, this paper describes the concept, application process, key technology of blockchain deposit and traceability, the three application architectures of blockchain deposit and traceability, and the overall architecture of its system. Then, it introduces the application of scenarios and the blockchain deposit and traceability in various fields. Next, it discusses the issues existing in the development of the application of blockchain deposit and traceability. Finally, the paper also expresses the best wishes for the future of its application.
{"title":"A review of the technology and application of deposit and traceability based on blockchain","authors":"Jie Xu, Wenhui Zhou, Suzhi Zhang, Jinhua Fu","doi":"10.3233/jhs-210671","DOIUrl":"https://doi.org/10.3233/jhs-210671","url":null,"abstract":"With the vigorous development of blockchain technology represented by bitcoin, blockchain technology has gradually entered the stage of blockchain 3.0 characterized by “programmable society”. And the application of blockchain technology in all walks of life has achieved actual results. Blockchain technology has typical characteristics of decentralization, Tamper-resistant data, information openness and transparency, and natural fit with the application requirements in the field of certificate tracing, which makes the development of the applications of blockchain deposit and traceability in full swing. First, this paper describes the concept, application process, key technology of blockchain deposit and traceability, the three application architectures of blockchain deposit and traceability, and the overall architecture of its system. Then, it introduces the application of scenarios and the blockchain deposit and traceability in various fields. Next, it discusses the issues existing in the development of the application of blockchain deposit and traceability. Finally, the paper also expresses the best wishes for the future of its application.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"27 1","pages":"335-359"},"PeriodicalIF":0.9,"publicationDate":"2021-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81745236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Admir Barolli, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, L. Barolli, M. Takizawa
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous work, we implemented a simulation system to solve the node placement problem in WMNs considering Particle Swarm Optimization (PSO) and Distributed Genetic Algorithm (DGA), called WMN-PSODGA. In this paper, we compare chi-square and uniform distributions of mesh clients for different router replacement methods. The router replacement methods considered are Constriction Method (CM), Random Inertia Weight Method (RIWM), Linearly Decreasing Inertia Weight Method (LDIWM), Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that for chi-square distribution the mesh routers cover all mesh clients for all router replacement methods. In terms of load balancing, the method that achieves the best performance is RDVM. When using the uniform distribution, the mesh routers do not cover all mesh clients, but this distribution shows good load balancing for four router replacement methods, with RIWM showing the best performance. The only method that shows poor performance for this distribution is LDIWM. However, since not all mesh clients are covered when using uniform distribution, the best scenario is chi-square distribution of mesh clients with RDVM as a router replacement method.
{"title":"A comparison study of chi-square and uniform distributions of mesh clients for different router replacement methods using WMN-PSODGA hybrid intelligent simulation system","authors":"Admir Barolli, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, L. Barolli, M. Takizawa","doi":"10.3233/jhs-210670","DOIUrl":"https://doi.org/10.3233/jhs-210670","url":null,"abstract":"Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous work, we implemented a simulation system to solve the node placement problem in WMNs considering Particle Swarm Optimization (PSO) and Distributed Genetic Algorithm (DGA), called WMN-PSODGA. In this paper, we compare chi-square and uniform distributions of mesh clients for different router replacement methods. The router replacement methods considered are Constriction Method (CM), Random Inertia Weight Method (RIWM), Linearly Decreasing Inertia Weight Method (LDIWM), Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that for chi-square distribution the mesh routers cover all mesh clients for all router replacement methods. In terms of load balancing, the method that achieves the best performance is RDVM. When using the uniform distribution, the mesh routers do not cover all mesh clients, but this distribution shows good load balancing for four router replacement methods, with RIWM showing the best performance. The only method that shows poor performance for this distribution is LDIWM. However, since not all mesh clients are covered when using uniform distribution, the best scenario is chi-square distribution of mesh clients with RDVM as a router replacement method.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"618 1","pages":"319-334"},"PeriodicalIF":0.9,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77073737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multimedia is inconvenient to use, difficult to maintain, and redundant in data storage. In order to solve the above problems and apply cloud storage to the integration of university teaching resources, this paper designs a virtualized cloud storage platform for university multimedia classrooms. The platform has many advantages, such as reducing the initial investment in multimedia classrooms, simplifying management tasks, making maximum use of actual resources and easy access to resources. Experiments and analysis show the feasibility and effectiveness of the platform. Aiming at the problems of the single-node repair algorithm of the existing multimedia cloud storage system, the limited domain is large, the codec complexity is high, the disk I/O (Input/Output) cost is high, the storage overhead and the repair bandwidth are unbalanced, and a network coding-based approach is proposed. Multimedia cloud storage. System single node repair algorithm. The algorithm stores the grouped multimedia file data in groups in the system, and performs XOR (exclusive OR) on the data in the group on the GF(2) finite field. When some nodes fail, the new node only needs to be connected. Two to three non-faulty nodes in the same group can accurately repair the data in the failed node. Theoretical analysis and simulation results show that the algorithm can reduce the complexity and repair of the codec, and reduce the disk I/O overhead. In this case, the storage cost of the algorithm is consistent with the storage cost based on the minimum storage regeneration code algorithm, and the repair bandwidth cost is close to the minimum bandwidth regeneration code algorithm.
{"title":"Single node repair algorithm for a multimedia cloud storage system based on network coding","authors":"Xin Niu, Jingjing Jiang","doi":"10.3233/JHS-210661","DOIUrl":"https://doi.org/10.3233/JHS-210661","url":null,"abstract":"Multimedia is inconvenient to use, difficult to maintain, and redundant in data storage. In order to solve the above problems and apply cloud storage to the integration of university teaching resources, this paper designs a virtualized cloud storage platform for university multimedia classrooms. The platform has many advantages, such as reducing the initial investment in multimedia classrooms, simplifying management tasks, making maximum use of actual resources and easy access to resources. Experiments and analysis show the feasibility and effectiveness of the platform. Aiming at the problems of the single-node repair algorithm of the existing multimedia cloud storage system, the limited domain is large, the codec complexity is high, the disk I/O (Input/Output) cost is high, the storage overhead and the repair bandwidth are unbalanced, and a network coding-based approach is proposed. Multimedia cloud storage. System single node repair algorithm. The algorithm stores the grouped multimedia file data in groups in the system, and performs XOR (exclusive OR) on the data in the group on the GF(2) finite field. When some nodes fail, the new node only needs to be connected. Two to three non-faulty nodes in the same group can accurately repair the data in the failed node. Theoretical analysis and simulation results show that the algorithm can reduce the complexity and repair of the codec, and reduce the disk I/O overhead. In this case, the storage cost of the algorithm is consistent with the storage cost based on the minimum storage regeneration code algorithm, and the repair bandwidth cost is close to the minimum bandwidth regeneration code algorithm.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"59 1","pages":"205-214"},"PeriodicalIF":0.9,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84501430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"List of Illustrations","authors":"","doi":"10.2307/j.ctv1jk0k1d.3","DOIUrl":"https://doi.org/10.2307/j.ctv1jk0k1d.3","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"81 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83966422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INDEX","authors":"","doi":"10.2307/j.ctv1jk0k1d.17","DOIUrl":"https://doi.org/10.2307/j.ctv1jk0k1d.17","url":null,"abstract":"","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"14 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90228075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}