Beruflich Dokumente
Kultur Dokumente
Abstract
Idle-listening is the biggest challenge for energy efficiency and longevity of multihop wireless sensor network (WSN) deployments. While existing coordinated sleep/wakeup scheduling protocols eliminate idle-listening for simple traffic patterns, they are unsuitable to handle the complex traffic patterns of the random routing protocols. We present a novel coordinated sleep/wakeup protocol POWERNAP , which avoids the overhead of distributing complex, large sleep/wakeup scheduling information to the nodes. POWERNAP piggybacks onto the relayed data packets the seed of the pseudo-random generator that encodes the scheduling information, and enables any recipient/snooper to calculate its sleep/wakeup schedule from this seed. In essence, POWERNAP trades off doing extra computation in order to avoid expensive control packet transmissions.
is executed unsuccessfully, none of the two parties can show the validity of intermediate results to others. Technical details are provided to analyze the security and performance of the proposed protocol. In summary, we present the first abuse-free fair contractsigning protocol based on the RSA signature, and show that it is both secure and efficient.
On demand Temporary Route Recovery for Frequent Link Failures in Adhoc Networks
Abstract
Adhoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure or centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. There is a frequent link failure in adhoc Networks, which causes packet to be lost or packets doubt to reach destination. In this scenario a different mechanism and a scheme is proposed and implemented to make the important time critical data like real time or voice data to reach the destination without any loss. The mechanism used is a special propagation which propagates a unique kind of route discovery for real time application scenario to send the time critical data safely. The scheme used is temporary path between the nodes during link failure. The important node then forwards the buffered packets to the destination without any loss which is on-demand based on type of information a node forwards. Special buffer is allocated for the nodes marked important during special propagation.
ABSTRACT A recent trend in Ad Hoc network routing is the reactive on demand philosophy where routes are established only when required. Security and Power efficiency are the major concerns in this field. This paper is an effort to combine these factors of security and power to achieve more reliable routing. Most of the protocols in this category are either incorporating security features or considering power factor. In the study no existing protocol is merging the two factors to see results. The ad hoc environment is accessible to both legitimate network users and malicious attackers. The ad hoc environment has the constraint of power factor. The proposed scheme is intended to incorporate both factors on existing protocols. The study will help in making protocol more robust against attacks and implementing power factor to achieve stable routing in routing protocols
trace-driven simulations to evaluate the effectiveness and efficiency of this design, and compare it with previous approaches. We also introduce some early experiences on RR implementations.
ABSTRACT Web applications' traffic demand fluctuates widely and unpredictably. The common practice of provisioning a fixedcapacity would either result in unsatisfied customers (underprovision) or waste valuable capital investment (overprovision). By leveraging an infrastructure cloud's ondemand,pay-per-use capabilities, we finally can match the capacity with the demand in real time. This paper investigates how we can build a large-scale web server farm in the cloud. Our performance study shows that using existing cloud components and optimization techniques, we cannot achieve high scalability. Instead, we propose a client-side load balancing architecture, which can scale and handle failure on a milli-second time scale. We experimentally show that our architecture achieves high throughput in a cloud environment while meeting QoS requirements.