Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (33)

Search Parameters:
Keywords = unicast communication

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 552 KiB  
Article
Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol
by Jingyu Sun, Zhimin Yi, Ziyi Zhuang and Shengming Jiang
J. Mar. Sci. Eng. 2025, 13(2), 386; https://doi.org/10.3390/jmse13020386 - 19 Feb 2025
Viewed by 814
Abstract
The automatic identification system (AIS) is an essential tool for modern ships, enabling the broadcast of identification and location information. However, the current AIS standard lacks security features, meaning that messages exchanged via AISs are transmitted in plaintext, which leads to security issues [...] Read more.
The automatic identification system (AIS) is an essential tool for modern ships, enabling the broadcast of identification and location information. However, the current AIS standard lacks security features, meaning that messages exchanged via AISs are transmitted in plaintext, which leads to security issues such as privacy leakage. Most existing solutions rely on public key cryptography. This paper proposes a physical-layer key generation protocol based on the current AIS standard (ITU-R M.1371-5). In the case of unicast AIS communication, the protocol utilizes channel randomness to generate symmetric keys for securing communications. Compared to public key cryptography, the proposed protocol offers advantages such as low overhead, elimination of third parties, and ease of implementation. Finally, this paper discusses the security of the protocol against various threats as well as evaluates its performance and overhead. Under common speed and signal-to-noise ratio (SNR) conditions, The protocol generates Advanced Encryption Standard (AES) keys of different lengths in under 4000 ms, and these keys successfully pass the National Institute of Standards and Technology (NIST) randomness test. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

20 pages, 4631 KiB  
Article
An On-Chip Architectural Framework Design for Achieving High-Throughput Multi-Channel High-Bandwidth Memory Access in Field-Programmable Gate Array Systems
by Xiangcong Kong, Zixuan Zhu, Chujun Feng, Yongxin Zhu and Xiaoying Zheng
Electronics 2025, 14(3), 466; https://doi.org/10.3390/electronics14030466 - 24 Jan 2025
Viewed by 1456
Abstract
The integration of High-Bandwidth Memory (HBM) into Field-Programmable Gate Arrays (FPGAs) has significantly enhanced data processing capabilities. However, the segmentation of HBM into 32 pseudo-channels, each managed by a performance-limited crossbar, imposes a significant bottleneck on data throughput. To overcome this challenge, we [...] Read more.
The integration of High-Bandwidth Memory (HBM) into Field-Programmable Gate Arrays (FPGAs) has significantly enhanced data processing capabilities. However, the segmentation of HBM into 32 pseudo-channels, each managed by a performance-limited crossbar, imposes a significant bottleneck on data throughput. To overcome this challenge, we propose a transparent HBM access framework that integrates a non-blocking network-on-chip (NoC) module and fine-grained burst control transmission, enabling efficient multi-channel memory access in HBM. Our Omega-based NoC achieves a throughput of 692 million packets per second, surpassing state-of-the-art solutions. When implemented on the Xilinx Alveo U280 FPGA board, the proposed framework attains near-maximum single-channel write bandwidth, delivering 12.94 GB/s in many-to-many unicast communication scenarios, demonstrating its effectiveness in optimizing memory access for high-performance applications. Full article
Show Figures

Figure 1

15 pages, 830 KiB  
Article
Performance Analysis of Reconfigurable Intelligent Surface (RIS)-Assisted Satellite Communications: Passive Beamforming and Outage Probability
by Minchae Jung and Hyukmin Son
Mathematics 2024, 12(23), 3781; https://doi.org/10.3390/math12233781 - 29 Nov 2024
Viewed by 1658
Abstract
Reconfigurable intelligent surfaces (RISs), which consist of numerous passive reflecting elements, have emerged as a prominent technology to enhance energy and spectral efficiency for future wireless networks. RISs have the capability to intelligently reconfigure the incident wave, reflecting it towards the intended target [...] Read more.
Reconfigurable intelligent surfaces (RISs), which consist of numerous passive reflecting elements, have emerged as a prominent technology to enhance energy and spectral efficiency for future wireless networks. RISs have the capability to intelligently reconfigure the incident wave, reflecting it towards the intended target without requiring energy for signal processing. Consequently, they have become a promising solution to support the demand for high-throughput satellite communication (SatCom) and enhanced coverage for areas inaccessible to terrestrial networks. This paper presents an asymptotic analysis of an RIS-assisted SatCom system. In this system, an unmanned aerial vehicle equipped with an RIS operates as a mobile reflector between a satellite and users. In particular, a passive beamformer is designed with the aim of asymptotically attaining optimal performance, considering the limitations imposed by practical SatCom systems. Moreover, the closed-form expressions for the ergodic achievable rate and outage probability are derived considering the proposed passive beamforming technique. Furthermore, we extend the system model to a multicast system and asymptotically analyze the optimality of the proposed scheme, leveraging the derived asymptotic results in the unicast system. The results of the simulations confirm that our analyses can precisely and analytically assess the performance of the RIS-assisted SatCom system, confirming the asymptotic optimality of the proposed scheme. Full article
Show Figures

Figure 1

42 pages, 1312 KiB  
Article
Mobility–Multihoming Duality
by Ryo Yanagida and Saleem Noel Bhatti
Future Internet 2024, 16(10), 358; https://doi.org/10.3390/fi16100358 - 1 Oct 2024
Viewed by 1364
Abstract
In modern Internet-based communication, especially mobile systems, a mobile node (MN) will commonly have more than one possibility for Internet Protocol (IP) connectivity. For example, an MN such as a smartphone may be associated with an IEEE 802.11 network at a site while [...] Read more.
In modern Internet-based communication, especially mobile systems, a mobile node (MN) will commonly have more than one possibility for Internet Protocol (IP) connectivity. For example, an MN such as a smartphone may be associated with an IEEE 802.11 network at a site while also connected to a cellular base station for 5G. In such a scenario, the smartphone might only be able to utilise the IEEE 802.11 network, not making use of the cellular connectivity simultaneously. Currently, IP does not allow applications and devices to easily utilise multiple IP connectivity opportunities—multihoming for the MN—without implementing special mechanisms to manage them. We demonstrate how the use of the Identifier Locator Network Protocol (ILNP), realised as an extension to IPv6, can enable mobility with multihoming using a duality mechanism that treats mobility and multihoming as the same logical concept. We present a network layer solution that does not require any modification to transport protocols, can be implemented using existing application programming interfaces (APIs), and can work for any application. We have evaluated our approach using an implementation in Linux and a testbed. The testbed consisted of commercial equipment to demonstrate that our approach can be used over existing network infrastructure requiring only normal unicast routing for IPv6. Full article
Show Figures

Figure 1

19 pages, 3409 KiB  
Article
Evaluation of Radio Access Protocols for V2X in 6G Scenario-Based Models
by Héctor Orrillo, André Sabino and Mário Marques da Silva
Future Internet 2024, 16(6), 203; https://doi.org/10.3390/fi16060203 - 6 Jun 2024
Viewed by 2143
Abstract
The expansion of mobile connectivity with the arrival of 6G paves the way for the new Internet of Verticals (6G-IoV), benefiting autonomous driving. This article highlights the importance of vehicle-to-everything (V2X) and vehicle-to-vehicle (V2V) communication in improving road safety. Current technologies such as [...] Read more.
The expansion of mobile connectivity with the arrival of 6G paves the way for the new Internet of Verticals (6G-IoV), benefiting autonomous driving. This article highlights the importance of vehicle-to-everything (V2X) and vehicle-to-vehicle (V2V) communication in improving road safety. Current technologies such as IEEE 802.11p and LTE-V2X are being improved, while new radio access technologies promise more reliable, lower-latency communications. Moreover, 3GPP is developing NR-V2X to improve the performance of communications between vehicles, while IEEE proposes the 802.11bd protocol, aiming for the greater interoperability and detection of transmissions between vehicles. Both new protocols are being developed and improved to make autonomous driving more efficient. This study analyzes and compares the performance of the protocols mentioned, namely 802.11p, 802.11bd, LTE-V2X, and NR-V2X. The contribution of this study is to identify the most suitable protocol that meets the requirements of V2V communications in autonomous driving. The relevance of V2V communication has driven intense research in the scientific community. Among the various applications of V2V communication are Cooperative Awareness, V2V Unicast Exchange, and V2V Decentralized Environmental Notification, among others. To this end, the performance of the Link Layer of these protocols is evaluated and compared. Based on the analysis of the results, it can be concluded that NR-V2X outperforms IEEE 802.11bd in terms of transmission latency (L) and data rate (DR). In terms of the packet error rate (PER), it is shown that both LTE-V2X and NR-V2X exhibit a lower PER compared to IEEE protocols, especially as the distance between the vehicles increases. This advantage becomes even more significant in scenarios with greater congestion and network interference. Full article
Show Figures

Figure 1

37 pages, 12102 KiB  
Article
Firmware Updates over the Air via LoRa: Unicast and Broadcast Combination for Boosting Update Speed
by Victor Malumbres, Jose Saldana, Gonzalo Berné and Julio Modrego
Sensors 2024, 24(7), 2104; https://doi.org/10.3390/s24072104 - 25 Mar 2024
Cited by 2 | Viewed by 2719
Abstract
The capacity to update firmware is a vital component in the lifecycle of Internet of Things (IoT) devices, even those with restricted hardware resources. This paper explores the best way to wirelessly (Over The Air, OTA) update low-end IoT nodes with difficult access, [...] Read more.
The capacity to update firmware is a vital component in the lifecycle of Internet of Things (IoT) devices, even those with restricted hardware resources. This paper explores the best way to wirelessly (Over The Air, OTA) update low-end IoT nodes with difficult access, combining the use of unicast and broadcast communications. The devices under consideration correspond to a recent industrial IoT project that focuses on the installation of intelligent lighting systems within ATEX (potentially explosive atmospheres) zones, connected via LoRa to a gateway. As energy consumption is not limited in this use case, the main figure of merit is the total time required for updating a project. Therefore, the objective is to deliver all the fragments of the firmware to each and all the nodes in a safe way, in the least amount of time. Three different methods, combining unicast and broadcast transmissions in different ways, are explored analytically, with the aim of obtaining the expected update time. The methods are also tested via extensive simulations, modifying different parameters such as the size of the scenario, the number of bytes of each firmware chunk, the number of nodes, and the number of initial broadcast rounds. The simulations show that the update time of a project can be significant, considering the limitations posed by regulations, in terms of the percentage of airtime consumption. However, significant time reductions can be achieved by using the proper method: in some cases, when the number of nodes is high, the update time can be reduced by two orders of magnitude if the correct method is chosen. Moreover, one of the proposed methods is implemented using actual hardware. This real implementation is used to perform firmware update experiments in a lab environment. Overall, the article illustrates the advantage of broadcast approaches in this kind of technology, in which the transmission rate is constant despite the distance between the gateway and the node. However, the advantage of these broadcast methods with respect to the unicast one could be mitigated if the nodes do not run exactly the same firmware version, since the control of the broadcast update would be more difficult and the total update time would increase. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Graphical abstract

24 pages, 1131 KiB  
Article
Provisioning of Fog Computing over Named-Data Networking in Dynamic Wireless Mesh Systems
by Roman Glazkov, Dmitri Moltchanov, Srikathyayani Srikanteswara, Andrey Samuylov, Gabriel Arrobo, Yi Zhang, Hao Feng, Nageen Himayat, Marcin Spoczynski and Yevgeni Koucheryavy
Sensors 2024, 24(4), 1120; https://doi.org/10.3390/s24041120 - 8 Feb 2024
Cited by 3 | Viewed by 1583
Abstract
Fog computing is today considered a promising candidate to improve the user experience in dynamic on-demand computing services. However, its ubiquitous application would require support for this service in wireless multi-hop mesh systems, where the use of conventional IP-based solutions is challenging. As [...] Read more.
Fog computing is today considered a promising candidate to improve the user experience in dynamic on-demand computing services. However, its ubiquitous application would require support for this service in wireless multi-hop mesh systems, where the use of conventional IP-based solutions is challenging. As a complementary solution, in this paper, we consider a Named-Data Networking (NDN) approach to enable fog computing services in autonomous dynamic mesh formations. In particular, we jointly implement two critical mechanisms required to extend the NDN-based fog computing architecture to wireless mesh systems. These are (i) dynamic face management systems and (ii) a learning-based route discovery strategy. The former makes it possible to solve NDN issues related to an inability to operate over a broadcast medium. Also, it improves the data-link layer reliability by enabling unicast communications between mesh nodes. The learning-based forwarding strategy, on the other hand, efficiently reduces the amount of overhead needed to find routes in the dynamically changing mesh networks. Our numerical results show that, for static wireless meshes, our proposal makes it possible to fully benefit from the computing resources sporadically available up to several hops away from the consumer. Additionally, we investigate the impacts of various traffic types and NDN caching capabilities, revealing that the latter result in much better system performance while the popularity of the compute service contributes to additional performance gains. Full article
(This article belongs to the Special Issue Cloud/Edge/Fog Computing for Network and IoT)
Show Figures

Figure 1

17 pages, 1263 KiB  
Article
Maximizing the Capacity of Edge Networks with Multicasting
by Peiyan Yuan, Ming Li, Shuhong Li, Chunhong Liu and Xiaoyan Zhao
Appl. Sci. 2023, 13(14), 8424; https://doi.org/10.3390/app13148424 - 21 Jul 2023
Viewed by 1398
Abstract
Edge networks employ local computing and caching resources to process data, thus alleviating the bandwidth pressure on backbone networks and improve users’ quality of experience. System capacity is one of the key metrics to evaluate the performance of edge networks. However, maximizing system [...] Read more.
Edge networks employ local computing and caching resources to process data, thus alleviating the bandwidth pressure on backbone networks and improve users’ quality of experience. System capacity is one of the key metrics to evaluate the performance of edge networks. However, maximizing system capacity in edge scenarios faces challenges due to the dynamical user sessions and the changing content popularity. This study reports on the influence of multicast communication on the capacity of edge caching networks. When large amounts of content are requested simultaneously or over a short period, one-to-one unicast transmission will consume copious network resources due to repetitious transmission. To solve this problem, this study used the one-to-many multicast scheme to realize cooperative transmission between edge servers. First, multiple copies of the content are distributed to multiple small base stations (SBSs) based on the content’s popularity and the SBSs’ cache sizes. Second, a multicast tree is constructed by using, as the root node, the SBS that stores the content. Third, the content is transmitted along the path of the multicast tree to each end-user. Finally, a simulation platform is constructed to analyze the performance of the two transmission schemes. The results of simulating on edge caching networks show that multicast communication responds well to users’ requests even when the requested content requires sudden transmission, is highly popular or is requested often within short time. This system’s capacity has been significantly improved compared to the classical methods. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

20 pages, 969 KiB  
Article
Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security
by Conghuan Ye, Shenglong Tan, Zheng Wang, Binghua Shi and Li Shi
Entropy 2023, 25(7), 1031; https://doi.org/10.3390/e25071031 - 7 Jul 2023
Cited by 3 | Viewed by 1702
Abstract
With the advent of cloud computing and social multimedia communication, more and more social images are being collected on social media platforms, such as Facebook, TikTok, Flirk, and YouTube. The amount of social images produced and disseminated is rapidly increasing. Meanwhile, cloud computing-assisted [...] Read more.
With the advent of cloud computing and social multimedia communication, more and more social images are being collected on social media platforms, such as Facebook, TikTok, Flirk, and YouTube. The amount of social images produced and disseminated is rapidly increasing. Meanwhile, cloud computing-assisted social media platforms have made social image dissemination more and more efficient. There exists an unstoppable trend of fake/unauthorized social image dissemination. The growth of social image sharing underscores potential security risks for illegal use, such as image forgery, malicious copying, piracy exposure, plagiarism, and misappropriation. Therefore, secure social image dissemination has become urgent and critical on social media platforms. The authors propose a secure scheme for social image dissemination on social media platforms. The main objective is to make a map between the tree structure Haar (TSH) transform and the hierarchical community structure of a social network. First, perform the TSH transform on a social image using social network analysis (SNA). Second, all users in a social media platform are coded using SNA. Third, watermarking and encryption are performed in a compressed domain for protecting social image dissemination. Finally, the encrypted and watermarked contents are delivered to users via a hybrid multicast–unicast scheme. The use of encryption along with watermarking can provide double protection for social image dissemination. The theory analysis and experimental results demonstrate the effectiveness of the proposed scheme. Full article
(This article belongs to the Special Issue Image Encryption and Privacy Protection Based on Chaotic Systems)
Show Figures

Figure 1

15 pages, 538 KiB  
Article
Intersection-Based Unicast Routing Using Ant Colony Optimization in Software-Defined Vehicular Networks
by Hao Zhu, Jingru Liu, Li Jin and Guoan Zhang
Electronics 2023, 12(7), 1620; https://doi.org/10.3390/electronics12071620 - 30 Mar 2023
Cited by 11 | Viewed by 2014
Abstract
A vehicular ad hoc network (VANET) is a mobile ad hoc network composed of communication between vehicles, between vehicles and roadside units, and between vehicles and pedestrians, in order to achieve traffic safety and entertainment services. The design of the routing protocol is [...] Read more.
A vehicular ad hoc network (VANET) is a mobile ad hoc network composed of communication between vehicles, between vehicles and roadside units, and between vehicles and pedestrians, in order to achieve traffic safety and entertainment services. The design of the routing protocol is very important for the realization of the service function of VANET. Local optimum and network congestion problems are restraints of traditional geographic routing protocols for VANET. In this paper, a software-defined network (SDN) based unicast routing scheme in an urban traffic environment is proposed, which uses Dijkstra’s algorithm to find a global optimal anchor path. The RSU neighbor discovery protocol is proposed, through which each RSU can discover its neighbor RSUs, and then each RSU periodically sends ant packets to its neighbor RSUs, evaluates the communication connection quality of each street segment according to the statistical data of the ant packets received, and sends the evaluation value to the SDN server in time. The SDN server has the connection quality evaluation values of all street segments in the global scope, from which an optimal anchor path can be calculated. The simulation results show that the proposed scheme has better packet delivery ratio than other related schemes. Full article
(This article belongs to the Special Issue Multi-Scale Communications and Signal Processing)
Show Figures

Figure 1

39 pages, 2283 KiB  
Article
An Optimization Framework for Data Collection in Software Defined Vehicular Networks
by Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Kalupahana Liyanage Kushan Sudheera, Gammana Guruge Nadeesha Sandamali and Peter Han Joo Chong
Sensors 2023, 23(3), 1600; https://doi.org/10.3390/s23031600 - 1 Feb 2023
Cited by 13 | Viewed by 2750
Abstract
A Software Defined Vehicular Network (SDVN) is a new paradigm that enhances programmability and flexibility in Vehicular Adhoc Networks (VANETs). There exist different architectures for SDVNs based on the degree of control of the control plane. However, in vehicular communication literature, we find [...] Read more.
A Software Defined Vehicular Network (SDVN) is a new paradigm that enhances programmability and flexibility in Vehicular Adhoc Networks (VANETs). There exist different architectures for SDVNs based on the degree of control of the control plane. However, in vehicular communication literature, we find that there is no proper mechanism to collect data. Therefore, we propose a novel data collection methodology for the hybrid SDVN architecture by modeling it as an Integer Quadratic Programming (IQP) problem. The IQP model optimally selects broadcasting nodes and agent (unicasting) nodes from a given vehicular network instance with the objective of minimizing the number of agents, communication delay, communication cost, total payload, and total overhead. Due to the dynamic network topology, finding a new solution to the optimization is frequently required in order to avoid node isolation and redundant data transmission. Therefore, we propose a systematic way to collect data and make optimization decisions by inspecting the heterogeneous normalized network link entropy. The proposed optimization model for data collection for the hybrid SDVN architecture yields a 75.5% lower communication cost and 32.7% lower end-to-end latency in large vehicular networks compared to the data collection in the centralized SDVN architecture while collecting 99.9% of the data available in the vehicular network under optimized settings. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

22 pages, 764 KiB  
Article
Efficient and Privacy-Preserving Certificate Activation for V2X Pseudonym Certificate Revocation
by Jan Wantoro and Masahiro Mambo
J. Sens. Actuator Netw. 2022, 11(3), 51; https://doi.org/10.3390/jsan11030051 - 1 Sep 2022
Cited by 1 | Viewed by 3327
Abstract
Vehicle to everything (V2X) technology allows the broader development of driving safety, efficiency, and comfort. Because the vehicles can quickly send and receive frequent messages from other vehicles and nearby devices, e.g., cooperative awareness message applications on the intelligent transport system (ITS), V2X [...] Read more.
Vehicle to everything (V2X) technology allows the broader development of driving safety, efficiency, and comfort. Because the vehicles can quickly send and receive frequent messages from other vehicles and nearby devices, e.g., cooperative awareness message applications on the intelligent transport system (ITS), V2X requires a good security and privacy protection system to make the messages reliable for the ITS requirements. The existing standards developed in the US and Europe use many short valid period pseudonym certificates to meet the security and privacy requirements. However, this method has difficulty ensuring that revoked pseudonym certificates are treated as revoked by any vehicles because distributing revocation information on a wireless vehicular network with intermittent and rapidly changing topology is demanding. A promising approach to solving this problem is the periodic activation of released pseudonym certificates. Initially, it releases all required pseudonym certificates for a certain period to the vehicle, and pseudonym certificates can be used only after receiving an activation code. Such activation-code-based schemes have a common problem in the inefficient use of network resources between the road-side unit (RSU) and vehicles. This paper proposes an efficient and privacy-preserving activation code distribution strategy solving the problem. By adopting the unicast distribution model of modified activation code for pseudonym certificate (ACPC), our scheme can obtain benefits of efficient activation code distribution. The proposed scheme provides small communication resource usage in the V2X network with various channel options for delivering activation codes in a privacy preserved manner. Full article
(This article belongs to the Special Issue Advances in Intelligent Transportation Systems (ITS))
Show Figures

Figure 1

23 pages, 3788 KiB  
Article
A Multicast Routing Scheme for the Internet: Simulation and Experimentation in Large-Scale Networks
by Davide Careglio, Fernando Agraz and Dimitri Papadimitriou
Appl. Sci. 2021, 11(18), 8645; https://doi.org/10.3390/app11188645 - 17 Sep 2021
Cited by 3 | Viewed by 2832
Abstract
With the globalisation of the multimedia entertainment industry and the popularity of streaming and content services, multicast routing is (re-)gaining interest as a bandwidth saving technique. In the 1990’s, multicast routing received a great deal of attention from the research community; nevertheless, its [...] Read more.
With the globalisation of the multimedia entertainment industry and the popularity of streaming and content services, multicast routing is (re-)gaining interest as a bandwidth saving technique. In the 1990’s, multicast routing received a great deal of attention from the research community; nevertheless, its main problems still remain mostly unaddressed and do not reach the acceptance level required for its wide deployment. Among other reasons, the scaling limitation and the relative complexity of the standard multicast protocol architecture can be attributed to the conventional approach of overlaying the multicast routing on top of the unicast routing topology. In this paper, we present the Greedy Compact Multicast Routing (GCMR) scheme. GMCR is characterised by its scalable architecture and independence from any addressing and unicast routing schemes; more specifically, the local knowledge of the cost to direct neighbour nodes is enough for the GCMR scheme to properly operate. The branches of the multicast tree are constructed directly by the joining destination nodes which acquire the routing information needed to reach the multicast source by means of an incremental two-stage search process. In this paper we present the details of GCMR and evaluate its performance in terms of multicast tree size (i.e., the stretch), the memory space consumption, the communication cost, and the transmission cost. The comparative performance analysis is performed against one reference algorithm and two well-known protocol standards. Both simulation and emulation results show that GCMR achieves the expected performance objectives and provide the guidelines for further improvements. Full article
(This article belongs to the Special Issue Next Generation Inter-Domain Policy Routing)
Show Figures

Figure 1

16 pages, 464 KiB  
Article
A Cognitive Anycast Routing Method for Delay-Tolerant Networks
by Ricardo Lent
Network 2021, 1(2), 116-131; https://doi.org/10.3390/network1020008 - 30 Jul 2021
Cited by 3 | Viewed by 3152
Abstract
A cognitive networking approach to the anycast routing problem for delay-tolerant networking (DTN) is proposed. The method is suitable for the space–ground and other domains where communications are recurrently challenged by diverse link impairments, including long propagation delays, communication asymmetry, and lengthy disruptions. [...] Read more.
A cognitive networking approach to the anycast routing problem for delay-tolerant networking (DTN) is proposed. The method is suitable for the space–ground and other domains where communications are recurrently challenged by diverse link impairments, including long propagation delays, communication asymmetry, and lengthy disruptions. The proposed method delivers data bundles achieving low delays by avoiding, whenever possible, link congestion and long wait times for contacts to become active, and without the need of duplicating data bundles. Network gateways use a spiking neural network (SNN) to decide the optimal outbound link for each bundle. The SNN is regularly updated to reflect the expected cost of the routing decisions, which helps to fine-tune future decisions. The method is decentralized and selects both the anycast group member to be used as the sink and the path to reach that node. A series of experiments were carried out on a network testbed to evaluate the method. The results demonstrate its performance advantage over unicast routing, as anycast routing is not yet supported by the current DTN standard (Contact Graph Routing). The proposed approach yields improved performance for space applications that require as-fast-as-possible data returns. Full article
Show Figures

Figure 1

25 pages, 1075 KiB  
Review
Opportunistic Large Array Propagation Models: A Comprehensive Survey
by Farhan Nawaz, Hemant Kumar, Syed Ali Hassan and Haejoon Jung
Sensors 2021, 21(12), 4206; https://doi.org/10.3390/s21124206 - 19 Jun 2021
Cited by 1 | Viewed by 3348
Abstract
Enabled by the fifth-generation (5G) and beyond 5G communications, large-scale deployments of Internet-of-Things (IoT) networks are expected in various application fields to handle massive machine-type communication (mMTC) services. Device-to-device (D2D) communications can be an effective solution in massive IoT networks to overcome the [...] Read more.
Enabled by the fifth-generation (5G) and beyond 5G communications, large-scale deployments of Internet-of-Things (IoT) networks are expected in various application fields to handle massive machine-type communication (mMTC) services. Device-to-device (D2D) communications can be an effective solution in massive IoT networks to overcome the inherent hardware limitations of small devices. In such D2D scenarios, given that a receiver can benefit from the signal-to-noise-ratio (SNR) advantage through diversity and array gains, cooperative transmission (CT) can be employed, so that multiple IoT nodes can create a virtual antenna array. In particular, Opportunistic Large Array (OLA), which is one type of CT technique, is known to provide fast, energy-efficient, and reliable broadcasting and unicasting without prior coordination, which can be exploited in future mMTC applications. However, OLA-based protocol design and operation are subject to network models to characterize the propagation behavior and evaluate the performance. Further, it has been shown through some experimental studies that the most widely-used model in prior studies on OLA is not accurate for networks with networks with low node density. Therefore, stochastic models using quasi-stationary Markov chain are introduced, which are more complex but more exact to estimate the key performance metrics of the OLA transmissions in practice. Considering the fact that such propagation models should be selected carefully depending on system parameters such as network topology and channel environments, we provide a comprehensive survey on the analytical models and framework of the OLA propagation in the literature, which is not available in the existing survey papers on OLA protocols. In addition, we introduce energy-efficient OLA techniques, which are of paramount importance in energy-limited IoT networks. Furthermore, we discuss future research directions to combine OLA with emerging technologies. Full article
(This article belongs to the Special Issue Green Sensors Networking)
Show Figures

Figure 1

Back to TopTop