Do you want to publish a course? Click here

A Game Model for the Hidden Terminal Problem in Ad-Hoc Networks

نَموذَج لعبَة لِمسْأَلة العُقدَة المُخْتَفيَة في الشّبكات اللاّسلكيّة الغائيّة

1498   0   6   0 ( 0 )
 Publication date 2016
  fields Mathematics
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

In this paper we introduce a game model that explains our proposed approach aiming at preventing the disappearance of the intermediate nodes.

References used
DREW F, JEAN T, 1990 - Game Theory. The MIT Press
Jacobson V, J Karels, 1988 - Congestion Avoidance and Control
Jan R, 1990 - Congestion Control in Computer Networks: Issue and Trends, IEEE Network Magazine

Artificial intelligence review:
Research summary
يتناول البحث مشكلة العقدة المختفية في الشبكات اللاسلكية الغائية، وهي مشكلة تحدث عندما تتداخل إشارات العقد المتوسطة مما يؤدي إلى اختفائها وانهيار الشبكة. يقترح الباحثون نموذج لعبة يعتمد على استراتيجية ناش للتحكم في الازدحام عند العقد المتوسطة. يتم استخدام بروتوكول توجيه يعتمد على مصفوفة التكلفة لتجنب الازدحام، وتم التحقق من فعالية النموذج المقترح من خلال محاكاة أظهرت تحسينات في تقليل عمليات التوجيه الفاشلة والحد من الازدحام. يتضمن البحث أيضًا تقديم آلية جديدة للتحكم في الازدحام باستخدام طرود تحكم تمكن العقد المتوسطة من تنظيم عملية إرسال الطرود، مما يساهم في تحسين أداء الشبكة بشكل عام.
Critical review
دراسة نقدية: يُعد هذا البحث إضافة قيمة لمجال الشبكات اللاسلكية الغائية، حيث يقدم حلاً لمشكلة العقدة المختفية باستخدام نموذج لعبة يعتمد على استراتيجية ناش. ومع ذلك، يمكن تحسين البحث من خلال تقديم تحليل أكثر تفصيلاً لتأثير عدد العقد في الشبكة على فعالية النموذج المقترح. كما يمكن توسيع الدراسة لتشمل أنواعًا أخرى من الشبكات اللاسلكية وتقييم أداء النموذج في بيئات مختلفة. بالإضافة إلى ذلك، قد يكون من المفيد تقديم مقارنة مع حلول أخرى موجودة في الأدبيات لتوضيح المزايا والعيوب النسبية للنموذج المقترح.
Questions related to the research
  1. ما هي مشكلة العقدة المختفية في الشبكات اللاسلكية الغائية؟

    مشكلة العقدة المختفية تحدث عندما تتداخل إشارات العقد المتوسطة في الشبكة اللاسلكية الغائية، مما يؤدي إلى اختفائها وانهيار الشبكة.

  2. ما هو الهدف الرئيسي من البحث؟

    الهدف الرئيسي من البحث هو تقديم نموذج لعبة يعتمد على استراتيجية ناش للتحكم في الازدحام عند العقد المتوسطة في الشبكات اللاسلكية الغائية.

  3. كيف تم التحقق من فعالية النموذج المقترح؟

    تم التحقق من فعالية النموذج المقترح من خلال محاكاة أظهرت تحسينات في تقليل عمليات التوجيه الفاشلة والحد من الازدحام.

  4. ما هي الآلية الجديدة المقترحة للتحكم في الازدحام؟

    الآلية الجديدة المقترحة للتحكم في الازدحام تتضمن استخدام طرود تحكم تمكن العقد المتوسطة من تنظيم عملية إرسال الطرود، مما يساهم في تحسين أداء الشبكة.

rate research

Read More

In this search, we provide a study about the security in VANET networks which are considered to be a part of mobile wireless networks and designed to work between moving vehicles. The most important security flaws of this networks and its applica tions are studied. In fact, we study the most important and dangerous attacks that may target VANET networks and analyze its main risks. Furthermore, we simulate some of these attacks Specifically Denial-of Service (DOS) attack using prober tools depending on chosen parameters that characterize the network performance. moreover, we provide some Security solutions to help counter measuring these attacks and minimize this effects, and Finally we apply these solutions and evaluate them.
Product quantization (PQ) is a widely used technique for ad-hoc retrieval. Recent studies propose supervised PQ, where the embedding and quantization models can be jointly trained with supervised learning. However, there is a lack of appropriate form ulation of the joint training objective; thus, the improvements over previous non-supervised baselines are limited in reality. In this work, we propose the Matching-oriented Product Quantization (MoPQ), where a novel objective Multinoulli Contrastive Loss (MCL) is formulated. With the minimization of MCL, we are able to maximize the matching probability of query and ground-truth key, which contributes to the optimal retrieval accuracy. Given that the exact computation of MCL is intractable due to the demand of vast contrastive samples, we further propose the Differentiable Cross-device Sampling (DCS), which significantly augments the contrastive samples for precise approximation of MCL. We conduct extensive experimental studies on four real-world datasets, whose results verify the effectiveness of MoPQ. The code is available at https://github.com/microsoft/MoPQ.
Decoupling the decision-making process from the data forwarding process is the heart of software-defined networks technology. One of the most important components of this technology is the controller, which is the smartest component in the network. Many of the controllers have been developed since the technology originated, and many researches have been done to compare the performance of these controllers for productivity, delay and protection. And due to the importance of selecting the appropriate controller according to different parameters and network states, we studied the performance of four controllers: Floodlight, Beacon, Nox, RYU in terms of productivity, RTT, time of establishing connection with an OpenFlow switch and the time for adding an input to the switch flow table. The results showed that the Beacon control was superior in performance when the number of switches in the network was equal to the number of processor cores used by the controller. For RTT and the time needed to add an input to the flow table, the NOX controller achieved less time. Finally, the Floodlight controller was the best in terms of establishing connection with the switch because it needed less time.
Mobile Ad-Hoc Networks are used for data transfer. The nodes of such networks do not require presetting. They are characterized by dynamic data transfer during their movement of the nodes. MANET could be targeted by potential security breaches. Bl ack hole attack is one of the serious attacks targeting wireless AD_HOC networks through a false point whichcan absorb data and send them to another place or neglect them. This is due to the lack of central control node which is able to manage communications. This research investigates the effects of the black hole on the performance of hybrid routing protocol Temporally Ordered Routing Algorithm (TORA) and proactive routing protocol Optimized Link State Routing (OLSR) for a variable number of mobile nodes in different speeds in a high load environment.
Distributed Denial of Service attack (DDOS) on Vehicular Ad Hoc Networks (VANETs) is considered to be one of the most serious types of attacks that can be targeted to those networks. The danger of this attack is in the difficulty of detection becau se of the cooperation of several attacking nodes in the network, and its impact on the availability requirement that is one of the most important security requirements in a network offering real-time applications .In our research, we study the effect of this attack on VANET network in the city, taking into consideration two cases. In the first case the target of the attack is the nodes, while in the second one, the target is the road side units (RSU). Simulation results have shown that this attack has a significant impact on both cases, by comparing the basic parameters of the network, such as throughput in/out and the number of dropped packets, before and after the attack.

suggested questions

comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا