首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
The explosive growth of mobile data traffic has made cellular operators to seek low‐cost alternatives for cellular traffic off‐loading. In this paper, we consider a content delivery network where a vehicular communication network composed of roadside units (RSUs) is integrated into a cellular network to serve as an off‐loading platform. Each RSU subjecting to its storage capacity caches a subset of the contents of the central content server. Allocating the suitable subset of contents in each RSU cache such that maximizes the hit ratio of vehicles requests is a problem of paramount value that is targeted in this study. First, we propose a centralized solution in which, we model the cache content placement problem as a submodular maximization problem and show that it is NP‐hard. Second, we propose a distributed cooperative caching scheme, in which RSUs in an area periodically share information about their contents locally and thus update their cache. To this end, we model the distributed caching problem as a strategic resource allocation game that achieves at least 50% of the optimal solution. Finally, we evaluate our scheme using simulation for urban mobility simulator under realistic conditions. On average, the results show an improvement of 8% in the hit ratio of the proposed method compared with other well‐known cache content placement approaches.  相似文献   

2.
Multicasting for delay-tolerant networks (DTNs) in sparse social network scenarios is a challenge due to the deficiency of end-to-end paths. In social network scenarios, the behaviors of their nodes are controlled by human beings, and node mobility is the same as that of humans. To design the multicasting algorithms for DTNs, therefore, it would be promising to capture the intrinsic characteristics of relationships among these nodes. In this paper, multicasting in DTNs is regarded as a message dissemination issue in social networks, and an egocentric network focused community aware multicast routing algorithm (ENCAR) is proposed. As distinct from some social-based routing algorithms which only focus on centrality analysis, ENCAR is an utility based and hierarchical routing algorithm, its utility function is constructed on the basis of centrality analysis and destination-oriented contact probability. We take notice of clustering phenomenon in social networks, and present the community aware forwarding schemes. In addition, to simulate the mobility of individuals in social networks, a novel community based random way point mobility model is also presented. In this paper, the performance of ENCAR is theoretically analyzed and further evaluated on simulator ONE. Simulation results show that ENCAR outperforms most of the existing multicast routing algorithms in routing overhead, on condition that delivery ratio is relatively high, with other significant parameters guaranteed to perform well.  相似文献   

3.
Groups of people with mobile phones using short‐range connections such as WiFi and Bluetooth to propagate messages can be modeled as, with regard to regular absence of end‐to‐end connection, mobile social networks (MSNs), which can be exploited to offload a significant amount of mobile content from the overloaded infrastructure networks such as 3G. The study of content transmission delay for the applications of mobile content dissemination in MSNs is an important problem, because to enhance the network capacity, the traffic is offloaded at the cost of inducing longer delay. In contrast to existing works, which ignore the factors of contact duration limits and large content size, we present a contact duration aware framework to model the content dissemination process in MSNs, give an explicit expression for the average content dissemination delay, and reveals its relationship with various system parameters of content size, users’ selfishness, number of involved subscribers, infecting ratio, and so on. We apply our proposed model to real‐life traces to assess its reliability by comparing the theoretical results with measured statistics and present extensive upshots to evaluate the influence of various parameters on system performance. The results demonstrate the accuracy of our proposed framework and reveal that system parameters of content size, system infecting ratio and intragroup transmission are the most important factors to influence the content dissemination delay. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

4.
In this paper, a Delay Tolerant Network environment is considered where the source is in full control of the two-hop spreading mechanism by setting key parameters such as the number of copies allowed to be spread in the network and the delay bound of the messages. The introduced analysis allows for a differentiation between the source of the message and the intermediate nodes (in terms of e.g. transmission power, speed or cooperation degree). Analytical expressions for the cumulative distribution function (cdf) of the delivery delay and the induced overhead are extracted, taking into account the fact that the source node may continue spreading copies after the message delivery. In addition, a fairly accurate approximate expression for the cdf of the delivery delay is also derived and validated through simulations.  相似文献   

5.
Wang  Weitao  Bai  Yuebin  Feng  Peng  Huang  Jun  Sha  Mo  Tantai  Jianpei 《Wireless Personal Communications》2021,118(1):575-598

In delay-tolerant networks (DTNs), intermittent network connectivity and lack of global system information pose serious challenges to achieve effective data forwarding. Most state-of-the-art DTN routing algorithms are based on hill-climbing heuristics in order to select the best available next hop to achieve satisfactory network throughput and routing efficiency. An adverse consequence of this approach is that a small subset of good users take on most of the forwarding tasks. This can quickly deplete scarce resources (e.g. storage, battery, etc.) in heavily utilized devices which degrades the network reliability. A system with a significant amount of traffic carried by a small number of users is not robust to denial of service attacks and random failures. To overcome these deficiencies, this paper proposes a new routing algorithm, DTN-Balance, that takes the forwarding capacity and forwarding queue of the relay nodes into account to achieve a better load distribution in the network. For this, we defined a new routing metric called message forwarding utility combining nodal available bandwidth and forwarding workload. Applying small world theory, we impose an upper bound on the end-to-end hop count that results in a sharp increase in routing efficiency. Queued messages in a forwarding node are arranged by DTN-Balance based on message dropping utility metric for a more intelligent decision in the case of a message drop. The performance of our method is compared with that of the existing algorithms by simulations on real DTN traces. The results show that our algorithm provides outstanding forward efficiency at the expense of a small drop in the throughput.

  相似文献   

6.
Cordero  Juan Antonio  Lou  Wei 《Wireless Networks》2019,25(6):3385-3403
Wireless Networks - The explosion of traffic demands in the edge of the Internet, mostly by mobile users, is putting under pressure current networking infrastructures. This is particularly acute...  相似文献   

7.
In Delay Tolerant Networks (DTNs), mobile nodes exploit encounter chances to transmit data via the established opportunistic link between encounter nodes. The transmission capacity between two encounter nodes is constrained by the duration of opportunistic links. How to transmit data efficiently is one of the fundamental and most important issues in DTNs. Recently, Random Linear Network Coding (RLNC) is proposed as a promising approach to improve data transmission efficiency in DTNs. To facilitate the development of deployment of RLNC based routing protocols, it is imperative to quantify the performance gain brought by RLNC in a rigorous and systematic way. In this paper, we develop an analytical model to evaluate the data transmission performance of RLNC based epidemic routing in DTNs. In the model, we consider that multiple unicast communication sessions compete for limited \capacity. Numerical results validate the effectiveness of our analytical model and demonstrate the significant performance improvement for data transmission in DTNs brought by RLNC. Our work of this paper provides a general tool for performance evaluation and useful guidelines for designing RLNC based routing protocols in DTNs. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

8.
9.
Supporting Fair Exchange in Mobile Environments   总被引:1,自引:0,他引:1  
Mobile commerce over the Internet always includes the exchange of electronic goods. Fair exchange protocols establish fairness and ensure that both participants can engage in the exchange without the risk of suffering a disadvantage (e.g., losing their money without receiving anything for it). In general, fair exchange protocols require the continuous availability of an external trusted third party (TTP), a dedicated site which is trusted by both participants. Implementations of TTPs for fair exchange have been proposed to be based on carefully secured Internet hosts in order to establish trust. In this paper we present solutions to the fair exchange problem in mobile environments, where customers frequently disconnect from the network and thus continuous availability of the external TTP is not given. Our approach utilizes tamper-poof hardware on the customer's side partly taking over the duties of the TTP. Besides supporting disconnected operations our approach also allows the proper handling of time-sensitive items (i.e., items which lose value over time), a feature which previous protocols lack.  相似文献   

10.
In this paper, a new data dissemination algorithm for wireless sensor networks is presented. The key idea of the proposed solution is to combine concepts presented in trajectory-based forwarding with the information provided by the energy map of the network to determine routes in a dynamic fashion, according to the energy level of the sensor nodes. This is an important feature of an autonomic system, which must have the capacity of adapting its behavior according to its available resources. Simulation results revealed that the energy spent with the data dissemination activity can be concentrated on nodes with high-energy reserves, whereas low-energy nodes can use their energy only to perform sensing activity or to receive information addressed to them. In this manner, partitions of the network due to nodes that ran out of energy can be significantly delayed and the network lifetime extended.  相似文献   

11.
In this article, we utilize the idea of multipoint relays (MPRs) found in literature (Jacquet et al. in Proceedings of IEEE INMIC, 2001), to propagate accident information in a restricted way (e.g., only backwards). We devise an algorithm to identify MPRs that are geographically situated behind a particular node using only its neighbor table, and speed information of the neighboring vehicles. With the identification of the backward MPRs, it is possible to restrict the information dissemination to vehicles behind a particular vehicular ad-hoc network (VANET) node only. This might benefit the approaching vehicles so that the driver could take preventive measures in real-time since he/she will have an indication of the severity of road conditions ahead. We assume that there exists an inter vehicular network using optimized link state routing (OLSR) where accident information can be propagated to all nodes using on-going OLSR control packets. We envision our application will run on top of existing routing protocols (e.g., OLSR), thereby resulting in very little integration effort, and retaining OLSR’s reduced network traffic advantage through the use of MPRs. We analyze our back MPR identification algorithm in a detailed manner. We also show that by using our approach the location of the accident alert instigator node could be pinpointed if a subset of the nodes in the same VANET know their geographical positions. We use VANET mobility models generated by SUMO into NS-3 for our simulations, and also perform preliminary experiments to verify the algorithm’s effectiveness. Our analysis and experiments show favorable results.  相似文献   

12.
During medical emergencies, the ability to communicate the state and position of injured individuals is essential. In critical situations or crowd aggregations, this may result difficult or even impossible due to the inaccuracy of verbal communication, the lack of precise localization for the medical events, and/or the failure/congestion of infrastructure-based communication networks. In such a scenario, a temporary (ad hoc) wireless network for disseminating medical alarms to the closest hospital, or medical field personnel, can be usefully employed to overcome the mentioned limitations. This is particularly true if the ad hoc network relies on the mobile phones that people normally carry, since they are automatically distributed where the communication needs are. Nevertheless, the feasibility and possible implications of such a network for medical alarm dissemination need to be analysed.  相似文献   

13.
Internet of Things (IoT) is connected to heterogeneous devices. Efficient adaptive scheduling with encoding and decoding of data is an unaddressed issue in IoT. This paper processes the data under three major hierarchy: namely, adaptability, scheduling of data, and network coding for that data. The reliable access to the information is ensured by a device which is a primary eminence in IoT. Device must be able to adapt itself according to the changes in the network and to maintain its reliability as well as transparency and seamless access to the resources. To enhance the performance of the data dissemination, the scheduling process is investigated using the spatial grouping in IoT devices; this is achieved by joint spatial and code domain scheduling scheme, and the novel preconfigured access scheme is coined in order to minimize the collision rate of arbitrary access; during the data dissemination, the erasure coding scheme is used for the encoding and decoding of packets which provides optimal redundancy. We carried the simulation using Contiki and it shows the proposed Polymorphic Erasure Coding with Markov decision Adaptability and Neural networks (PECMAN) improves in terms of cost, overhead, and delay when compared with Multi‐user Shared Access (EMUSA), Polynomial‐time Optimal Storage Allocation (OSA) scheme, and Event‐Aware Back pressure Scheduling Scheme (EABS).  相似文献   

14.
Fair scheduling in wireless packet networks   总被引:2,自引:0,他引:2  
Fair scheduling of delay and rate-sensitive packet flows over a wireless channel is not addressed effectively by most contemporary wireline fair-scheduling algorithms because of two unique characteristics of wireless media: (1) bursty channel errors and (2) location-dependent channel capacity and errors. Besides, in packet cellular networks, the base station typically performs the task of packet scheduling for both downlink and uplink flows in a cell; however, a base station has only a limited knowledge of the arrival processes of uplink flows. We propose a new model for wireless fair-scheduling based on an adaptation of fluid fair queueing (FFQ) to handle location-dependent error bursts. We describe an ideal wireless fair-scheduling algorithm which provides a packetized implementation of the fluid mode, while assuming full knowledge of the current channel conditions. For this algorithm, we derive the worst-case throughput and delay bounds. Finally, we describe a practical wireless scheduling algorithm which approximates the ideal algorithm. Through simulations, we show that the algorithm achieves the desirable properties identified in the wireless FFQ model  相似文献   

15.
In this work, we propose an end‐to‐end retransmission framework for dynamically calculating efficient retransmission time‐out intervals in delay‐tolerant networks (DTNs) with scheduled connectivity. The proposed framework combines deterministic and statistical information about the network state to calculate worst‐case estimates about the expected round trip times. Such information includes connectivity schedules, convergence layer protocols specifics, communication link characteristics, and network statistics about the maximum expected packet error rates and storage congestion. We detail the implementation of the proposed framework within the end‐to‐end application data conditioning layer proposed for the DTN architecture, realized by the Delay‐Tolerant Payload Conditioning protocol, as part of the Interplanetary Overlay Network–DTN reference implementation, and evaluate its performance in a complex deep‐space emulation scenario in our DTN testbed. Our results show that our approach achieves great accuracy in round‐trip time estimations and, therefore, faster retransmissions of lost data, in comparison to the statically configured retransmission mechanism of the original Delay‐Tolerant Payload Conditioning protocol. As a result, in‐order data reception rate and storage requirements on the receiver side are significantly improved, at minimum or even zero extra cost in transmission overhead due to duplicate transmissions.  相似文献   

16.
Opportunistic social dissemination of micro-blogs   总被引:1,自引:0,他引:1  
  相似文献   

17.
公平的移动小额支付协议   总被引:1,自引:0,他引:1  
为了实现具有完全公平性和非单元支付功能的小额支付协议,该文首先提出了双PayWord链(DPWC)的概念和非单元支付的实现机制。利用DPWC,并基于数据业务管理平台(DSMP)提出了一种新的公平的移动小额支付协议(FMMP)。该协议由注册、支付、仲裁、结算和注销5个子协议组成。分析结果表明,该协议能提供支付的完全公平性和非单元支付功能,并且具有安全、高效和不可否认的特点。  相似文献   

18.
异步转移模式ATM作为一种新的交换和复接体制,已经被国际电联ITU挑选为宽带综合业务数字网B-ISDN的核心技术。ATM技术的主要目的是使数据业务、视频业务、话音业务等能在统一的全数字网络中实现传输和交换,同时提供灵活简捷有效的动态资源分配。文章在说明通信业务各自千差万别特征的基础上,进行业务归类,并给出几种公平排队服务算法。  相似文献   

19.
We demonstrate the non-uniqueness of proportional fairness prices, and show that the model of Kelly et al. [9] falls into the category of models that can be generalized to allow optimization of the link prices, with a view toward profit maximization. However, through this framework, we also show that the total revenue that can be obtained through proportional fairness pricing on a network is unique.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号