• Title/Summary/Keyword: Reliable connectivity

Search Result 57, Processing Time 0.032 seconds

Dynamic Reverse Route for On-Demand Routing Protocol in MANET

  • Zuhairi, Megat;Zafar, Haseeb;Harle, David
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1354-1372
    • /
    • 2012
  • Route establishment in Mobile Ad Hoc Network (MANET) is the key mechanism to a successful connection between a pair of source and destination nodes. An efficient routing protocol constructs routing path with minimal time, less routing overhead and capable of utilizing all possible link connectivity. In general, most on-demand MANET routing protocols operates over symmetrical and bidirectional routing path, which is infeasible due to the inherent heterogeneous properties of wireless devices. Simulation results show that the presence of unidirectional links on a network severely affect the performance of a routing protocol. In this paper, a robust protocol independent scheme is proposed, which enable immediate rediscovery of alternative route for a path blocked by a unidirectional link. The proposed scheme is efficient; route rediscovery is locally computed, which results in significant minimization of multiple route packets flooding. Nodes may exploit route information of immediate neighbors using the local reply broadcast technique, which then redirect the control packets around the unidirectional links, therefore maintaining the end-to-end bidirectional connection. The proposed scheme along with Ad Hoc On-demand Distance Vector (AODV) and AODV-Blacklist routing protocol is investigated over three types of mobility models. Simulation results show that the proposed scheme is extremely reliable under poor network conditions and the route connectivity can be improved by as much as 75%.

Topological Modeling using Sonar Grid Map (초음파 격자 지도를 이용한 위상학적 지도 작성 기법 개발)

  • Choi, Jin-Woo;Choi, Min-Yong;Chung, Wan-Kyun
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.2
    • /
    • pp.189-196
    • /
    • 2011
  • This paper presents a method of topological modeling using only low-cost sonar sensors. The proposed method constructs a topological model by extracting sub-regions from the local grid map. The extracted sub-regions are considered as nodes in the topological model, and the corresponding edges are generated according to the connectivity between two sub-regions. A grid confidence for each occupied grid is evaluated to obtain reliable regions in the local grid map by filtering out noisy data. Moreover, a convexity measure is used to extract sub-regions automatically. Through these processes, the topological model is constructed without predefining the number of sub-regions in advance and the proposed method guarantees the convexity of extracted sub-regions. Unlike previous topological modeling methods which are appropriate to the corridor-like environment, the proposed method can give a reliable topological modeling in a home environment even under the noisy sonar data. The performance of the proposed method is verified by experimental results in a real home environment.

Secure Cluster Selection in Autonomous Vehicular Networks

  • Mohammed, Alkhathami
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.11-16
    • /
    • 2023
  • Vehicular networks are part of the next generation wireless and smart Intelligent Transportation Systems (ITS). In the future, autonomous vehicles will be an integral part of ITS and will provide safe and reliable traveling features to the users. The reliability and security of data transmission in vehicular networks has been a challenging task. To manage data transmission in vehicular networks, road networks are divided into clusters and a cluster head is selected to handle the data. The selection of cluster heads is a challenge as vehicles are mobile and their connectivity is dynamically changing. In this paper, a novel secure cluster head selection algorithm is proposed for secure and reliable data sharing. The idea is to use the secrecy rate of each vehicle in the cluster and adaptively select the most secure vehicle as the cluster head. Simulation results show that the proposed scheme improves the reliability and security of the transmission significantly.

An Algorithm based on Evolutionary Computation for a Highly Reliable Network Design (높은 신뢰도의 네트워크 설계를 위한 진화 연산에 기초한 알고리즘)

  • Kim Jong-Ryul;Lee Jae-Uk;Gen Mituso
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.4
    • /
    • pp.247-257
    • /
    • 2005
  • Generally, the network topology design problem is characterized as a kind of NP-hard combinatorial optimization problem, which is difficult to solve with the classical method because it has exponentially increasing complexity with the augmented network size. In this paper, we propose the efficient approach with two phase that is comprised of evolutionary computation approach based on Prufer number(PN), which can efficiently represent the spanning tree, and a heuristic method considering 2-connectivity, to solve the highly reliable network topology design problem minimizing the construction cost subject to network reliability: firstly, to find the spanning tree, genetic algorithm that is the most widely known type of evolutionary computation approach, is used; secondly, a heuristic method is employed, in order to search the optimal network topology based on the spanning tree obtained in the first Phase, considering 2-connectivity. Lastly, the performance of our approach is provided from the results of numerical examples.

A Novel Architecture for Dynamic Mobile Networks with IPv6-based Multiple Network Interfaces (IPv6 기반의 다중 네트워크 인터페이스를 갖는 새로운 동적 이동형 네트워크 아키텍쳐)

  • Kim Wan-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.8 s.350
    • /
    • pp.25-34
    • /
    • 2006
  • In this paper DynaMoNET is suggested as a novel IPv6-based multi-homed mobile network architecture which is composed of nested mobile ad hoc networks dynamically coming together through wireless personal area networks. Each ad hoc network has a mobile router which may work as a root mobile router instead of fixed mobile routers in a DynaMoNET. A root mobile router provides the reliable Internet connectivity for the entire mobile network. This paper includes a innovative handover protocol for multi-homed mobile networks, network switchover algorithm considering multiple decision factors, root mobile router election process based on token-based algorithm fast root mobile router discovery algorithm and fault avoidance mechanism to support reliable Internet connectivity. Finally the system architecture of a mobile router is given in detail.

The Use of E-journals by Health Researchers: A Case Study of the Nigerian Institute of Medical Research (NIMR)

  • Olayemi, Olalekan Moses;Abolarinwa, Timothy Shola;Olayemi, Kemi Jummai
    • Journal of Information Science Theory and Practice
    • /
    • v.5 no.3
    • /
    • pp.61-70
    • /
    • 2017
  • This study investigated the use of e-journals by health researchers in the Nigerian Institute of Medical Research (NIMR). A descriptive survey method was adopted for the study and a questionnaire was used for data collection. The study population was comprised of fifty-four (54) respondents who are health researchers in the institute. The data collected were presented and analyzed using tables, frequency distribution, simple percentages, and charts. The result of the study revealed that all the respondents are aware of the availability of e-journals and attest to making use of them. The study revealed that electronic journals were mostly used for the purpose of conducting research work and the PDF format was preferred for downloading e-journals. However, it was observed that low Internet connectivity and intermittent electricity supply constitute a major obstacle to the use of e-journals. The study, therefore, recommended that the institute's management invest more resources on network connectivity, particularly its bandwidth, and ensure reliable power supply.

Location-Based Spiral Clustering Algorithm for Avoiding Inter-Cluster Collisions in WSNs

  • Yun, Young-Uk;Choi, Jae-Kark;Yoo, Sang-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.665-683
    • /
    • 2011
  • Wireless sensor networks (WSN) consist of a large amount of sensor nodes distributed in a certain region. Due to the limited battery power of a sensor node, lots of energy-efficient schemes have been studied. Clustering is primarily used for energy efficiency purpose. However, clustering in WSNs faces several unattained issues, such as ensuring connectivity and scheduling inter-cluster transmissions. In this paper, we propose a location-based spiral clustering (LBSC) algorithm for improving connectivity and avoiding inter-cluster collisions. It also provides reliable location aware routing paths from all cluster heads to a sink node during cluster formation. Proposed algorithm can simultaneously make clusters in four spiral directions from the center of sensor field by using the location information and residual energy level of neighbor sensor nodes. Three logical addresses are used for categorizing the clusters into four global groups and scheduling the intra- and inter-cluster transmission time for each cluster. We evaluated the performance with simulations and compared it with other algorithms.

The Research of Q-edge Labeling on Binomial Trees related to the Graph Embedding (그래프 임베딩과 관련된 이항 트리에서의 Q-에지 번호매김에 관한 연구)

  • Kim Yong-Seok
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.1
    • /
    • pp.27-34
    • /
    • 2005
  • In this paper, we propose the Q-edge labeling method related to the graph embedding problem in binomial trees. This result is able to design a new reliable interconnection networks with maximum connectivity using Q-edge labels as jump sequence of circulant graph. The circulant graph is a generalization of Harary graph which is a solution of the optimal problem to design a maximum connectivity graph consists of n vertices End e edgies. And this topology has optimal broadcasting because of having binomial trees as spanning tree.

Finding Needles in a Haystack with Light: Resolving the Microcircuitry of the Brain with Fluorescence Microscopy

  • Rah, Jong-Cheol;Choi, Joon Ho
    • Molecules and Cells
    • /
    • v.45 no.2
    • /
    • pp.84-92
    • /
    • 2022
  • To understand the microcircuitry of the brain, the anatomical and functional connectivity among neurons must be resolved. One of the technical hurdles to achieving this goal is that the anatomical connections, or synapses, are often smaller than the diffraction limit of light and thus are difficult to resolve by conventional microscopy, while the microcircuitry of the brain is on the scale of 1 mm or larger. To date, the gold standard method for microcircuit reconstruction has been electron microscopy (EM). However, despite its rapid development, EM has clear shortcomings as a method for microcircuit reconstruction. The greatest weakness of this method is arguably its incompatibility with functional and molecular analysis. Fluorescence microscopy, on the other hand, is readily compatible with numerous physiological and molecular analyses. We believe that recent advances in various fluorescence microscopy techniques offer a new possibility for reliable synapse detection in large volumes of neural circuits. In this minireview, we summarize recent advances in fluorescence-based microcircuit reconstruction. In the same vein as these studies, we introduce our recent efforts to analyze the long-range connectivity among brain areas and the subcellular distribution of synapses of interest in relatively large volumes of cortical tissue with array tomography and superresolution microscopy.

GA-based Two Phase Method for a Highly Reliable Network Design (높은 신뢰도의 네트워크 설계를 위한 GA 기반 두 단계 방법)

  • Jo, Jung-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.1149-1160
    • /
    • 2005
  • Generally, the network topology design problem, which is difficult to solve with the classical method because it has exponentially increasing complexity with the augmented network size, is characterized as a kind of NP-hard combinatorial optimization problem. The problem of this research is to design the highly reliable network topology considering the connection cost and all-terminal network reliability, which can be defined as the probability that every pair of nodes can communicate with each other. In order to solve the highly reliable network topology design problem minimizing the construction cost subject to network reliability, we proposes an efficient two phase approach to design reliable network topology, i.e., the first phase employs, a genetic algorithm (GA) which uses $Pr\ddot{u}fer$ number for encoding method and backtracking Algorithm for network reliability calculation, to find the spanning tree; the second phase is a greedy method which searches the optimal network topology based on the spanning ree obtained in the first phase, with considering 2-connectivity. finally, we show some experiments to demonstrate the effectiveness and efficiency of our two phase approach.