In this PAPER, we perform a study and extensive comparative between
the well-known link quality estimators and CTP, a tree-based routing
protocol provided by TinyOS for different network topology and simulate
it using TOSSIM simulator to evaluate
the performance of these
estimators.
Mobile wireless sensor network (MWSN) is a wireless ad hoc network that consists
of avery large number of tiny sensor nodes communicating with each other in which
sensornodes are either equipped with motors for active mobility or attached to mobile
objectsfor passive mobility. A real-time routing protocol for MWSN is an exciting area of
research
because messages in the network are delivered according to their end-to-end
deadlines
(packet lifetime) while sensor nodes are mobile. This paper proposes an enhanced
realtime
with load distribution (ERTLD) routing protocol for MWSN which is based on our
previousrouting protocol RTLD. ERTLD utilized corona mechanism and optimal
forwardingmetrics to forward the data packet in MWSN. It computes the optimal
forwarding nodebased on RSSI, remaining battery level of sensor nodes and packet
delayover one-hop. ERTLDensures high packet delivery ratio and experiences minimum
end-to-end delay in WSNand MWSN compared to baseline routing protocol. . In this paper
we consider a highly dynamic wireless sensor network system in which the sensor nodes
and the base station(sink) are mobile.ERTLD has been studied and verified and compared
with baseline routing protocols RTLD,MM-SPEED , RTLCthrough Network Simulator-
2(NS2)
شبكات الحساسات اللاسلكية
RTLD (Real-time with load distributed routing) Protocol
شبكات الحساسات اللاسلكية النقالة
بروتوكول التوجيه بالزمن الحقيقي مع توزيع الحمولة
بروتوكول التوجيه بالزمن الحقيقي المحسن مع توزيع الحمولة
معدل استقبال الرزمة
خيار التوجيه الأفضل
مؤشر قوة الاشارة المستقبلة
WSN(wireless sensor networks)
MWSN) Mobile wireless sensor networks)
ERTLD ( Enhanced Real-time with load distributed routing) Protocol
PRR(Packet Reception Rate)
Optimal Forwarding (OF)
RSSI: Received Signal Strength Indicator
MN(Mobile Node)
MS(Mobile sink)
المزيد..
The purpose of this study is to offer help to patients through the employment of
databases applications of existing and available telecommunication systems in medical
services ,particularly treatment. So that it can be possible to avoided what can
be avoided
of health disasters that a human being encounter without warning. This study examines
how modern technologies can be employed in controlling and processing some vital signs
of human beings,particulary those who suffer some health problems affiliated with some
diseases ,and keeping these problems under control in order to maintain the stability of the
patients health statues.
The vital signs that the study is applied to are blood pressure, pulse and blood
glucose, since any of change in the value of any of these signs, positive or negative, may
cause the patient to have a sudden health problems.
شبكات الحساسات اللاسلكية
العلامات الحياتية
شبكات الحساسات اللاسلكية الحيوية
بروتوكول التوجيه بالزمن الحقيقي
استدعاء الطرق عن بعد
Vital signs
(WSN (wireless sensor networks
(WBSN (wireless body sensor networks
RTLD (Real-time with load distributed routing) Protocol
(RMI (Remote method invocation
المزيد..
A Vehicular Ad-hoc Network (VANET) is a collection of nodes forming a
wireless network, but the nodes of this network are vehicles with special equipment that
enable them to communicate with each other. VANET protocols have to face high
challenges
due to dynamically changing topologies, link breakage and low vehicular
density. A suitable and effective routing protocol helps to ensure that messages are reached
to their destinations and achieve the desired aim of the application.
In this research, we present an analysis of the performance of two major routing
protocols used in these networks, which are AODV (Ad hoc On-Demand Distance Vector)
and GPSR (Greedy Perimeter Stateless Routing). This analysis is based on various
parameters such as end-to-end delay and average dropped packets, in order to find the best
protocol which can be used in the network with low density at the junctions. To achieve
this purpose, we used a simulator OPNET_17.5. Depending on the simulation results, we
have obtained and the analysis and comparison of two protocols at different low density
contract. We found that GPSR protocol has better performance end-to-end delay and
average dropped packets are used as the performance metrics, and is better for VANET
under the low vehicular density simulation scenario at junctions.
This paper focuses on securing zone routing protocol (ZRP) from
one of the most possible attacks such as bogus route attack and
black hole attack. This paper provides a solution against this attack
using identity based cryptography(IBC), We implement, evaluate
our proposal using NS-2 network Simulator.
Vehicular Ad Hoc Network (VANET) is a form of Mobile Ad Hoc
Networks, but the nodes of this network are vehicles with special equipment to enable
them to communicate with each other. These networks need to implement protocols to
ensure that messag
es are reached to their destinations and achieve the desired goal of the
application.
In this paper, we present an analysis of the performance of a number of major routing
protocols used in these networks which protocols AODV (Ad hoc On-Demand Distance
Vector), DSR (Dynamic Source Routing), and OLSR (Optimized link state routing). This
analysis is based on various parameters such as packet delivery ratio and end-to-end delay,
in order to find the best protocol can be used in the network with low density.
To achieve this purpose, we used a simulator OPNET_17.5. Depending on the
simulation results we have obtained and the analysis and comparison of these protocols at
different low density contract .We found that the protocol AODV is the best among the
studied protocols under the conditions set out in this study.
Mobile ad-hoc Networking MANETS is a promising concept to provide flexible, adaptive, and reconfigurable architecture, cost effective solution.In the mobile ad hoc network security is the basic concern for network functions work properly.Routing is t
he corner stone in Mobile ad-hoc Networks, A lot of known vulnerabilities and security threats can be exploited to attack routing messages, so it is important to provide secure routing protocol for MANETs.In this paper, we present a secure extension for ad-hoc On Demand Distance Vector Protocol (AODV). The default routing protocol for MANETs. The proposed protocol ensures that discovery of the route between the nodes is functioning properly and securely, achieving mutual authentication between nodes, routing message integrity, generating a security key of data sent and exchanges it securely to ensure confidentiality and all of these are in one stage. By this we save in wireless band, resource consumption, preventing duplicate of authentication algorithms.
The Protocol Independent Multicast - Sparse Mode (PIM-SM) uses one center (referred here as the Rendezvous Point “RP”) for all sources in a multicast group. PIM-SM distributes the multicast traffic of a source through a so-called shared distribution
tree, whose root is at a predefined core called Rendezvous Point (RP). It also builds source-specific trees to the sources whose data rates exceed a defined threshold. In the literature, several investigations are done to improve and provide an efficient mechanism for the dynamic relocation of the RP depending on the sources or the members of the multicast group. In this paper, we extend the investigation of three search algorithms used to find the optimal RP position. To evaluate the performance of these algorithms, Estimated Tree Cost (ETC) and our improvement Enhanced Estimated Tree Cost (EETC), are used. The reason behind our choice these two methods is a comparative investigation of the RP-selection methods proposed in the literature. From the comparison we can see that ETC finds the most optimal position of the rendezvous point. The Hill-Climbing algorithm and the standard PIM-SM protocol with static RP-selection are used as a reference for comparison. Our algorithms result in a lower network load compared to RP-selection algorithm. However, they need additional control messages.