Search results

1 – 10 of 821
Article
Publication date: 4 December 2020

M. Angulakshmi, M. Deepa, M. Vanitha, R. Mangayarkarasi and I. Nagarajan

In this study, we discuss three DTN routing protocols, these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic…

Abstract

Purpose

In this study, we discuss three DTN routing protocols, these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic network environment (ONE) to create a network environment. Spray and wait has highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others. This analysis of the performance of DTN protocols helps the researcher to learn better of these protocols in the different environment.

Design/methodology/approach

Delay-Tolerant Network (DTN) is a network designed to operate effectively over extreme distances, such as those encountered in space communications or on an interplanetary scale. In such an environment, nodes are occasional communication and are available among hubs, and determinations of the next node communications are not confirmed. In such network environment, the packet can be transferred by searching current efficient route available for a particular node. Due to the uncertainty of packet transfer route, DTN is affected by a variety of factors such as packet size, communication cost, node activity, etc.

Findings

Spray and wait have highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others.

Originality/value

The primary goal of the paper is to extend these works in an attempt to offer a better understanding of the behavior of different DTN routing protocols with delivery probability, latency and overhead ratio that depend on various amounts of network parameters such as buffer size, number of nodes, movement ratio, time to live, movement range, transmission range and message generation rate. In this study, we discuss three DTN routing protocols: these are epidemic, PRoPHET and spray and wait routing protocols. A special simulator will be used; that is opportunistic network environment (ONE) to create a network environment. Spray and wait have highest delivery rate and low latency in most of the cases. Hence, spray and wait have better performance than others. This analysis of the performance of DTN protocols helps the researcher to learn better of these protocols in the different environment.

Details

International Journal of Intelligent Unmanned Systems, vol. 9 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 November 2005

Giuseppe Anastasi, Marco Conti, Enrico Gregori, Andrea Passarella and Luciana Pelusi

Pervasive services and smart environments are becoming more and more popular as an ever‐increasing number of people enjoys these services typically by means of portable devices…

Abstract

Pervasive services and smart environments are becoming more and more popular as an ever‐increasing number of people enjoys these services typically by means of portable devices. These devices are battery‐fed and, thus, energy efficiency is a critical factor for the deployment of pervasive services. In this paper we focus on multimedia streaming services for mobile users. Specifically, we consider a scenario where mobile users with Wi‐Fi devices access the Internet to receive audio files from a remote streaming server. We propose a proxybased architecture and an energy‐efficient streaming protocol that minimize the energy consumption of the Wi‐Fi interface at the mobile device, while guaranteeing the real‐time constraints of the audio streaming. The experimental analysis performed on a prototype implementation shows that our solution allows an energy saving ranging from 76% to 91% of the total consumption due to the network interface. Moreover, it also preserves a good user‐level Quality of Service.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 10 May 2023

Shazib Ahmad, Saksham Mishra and Vandana Sharma

Purpose: Green computing is a way of using the computer resource in an eco-friendly while maintaining and decreasing the harmful environmental impact. Minimising toxic materials…

Abstract

Purpose: Green computing is a way of using the computer resource in an eco-friendly while maintaining and decreasing the harmful environmental impact. Minimising toxic materials and reducing energy usage can also be used to recycle the product.

Need for the Study: The motivation of the study is to use green computing resources to decrease carbon emissions and their adverse effect on the environment.

Methodology: The study uses a qualitative method of collecting resources and data to address the opportunities, challenges, and future trends in green computing for Sustainable Future Technologies. The study focusses on multiple kinds of cloud computing services collected and executed into single remote servers. The service demand processor offers these services to the client per their needs. The simultaneous requests to access the cloud services, processing and expertly managing these requests by the processors are discussed and analysed.

Findings: The findings suggest that green computing is an upcoming and most promising area. The number of resources employed for green computing can be beneficial for lowering E-waste so that computing can be environmentally friendly and self-sustainable.

Practical Implications: Green computing applies across all industries and service sectors like healthcare, entertainment, tourism, and education. The convergence of technologies like Cloud Computing, AI, and Internet of Things (IoT) is greatly impacting Green Supply Chain Management (GSCM) market.

Details

Contemporary Studies of Risks in Emerging Technology, Part A
Type: Book
ISBN: 978-1-80455-563-7

Keywords

Article
Publication date: 14 December 2018

De-gan Zhang, Ya-meng Tang, Yu-ya Cui, Jing-xin Gao, Xiao-huan Liu and Ting Zhang

The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the highly…

Abstract

Purpose

The communication link in the engineering of Internet of Vehicle (IOV) is more frequent than the communication link in the Mobile ad hoc Network (MANET). Therefore, the highly dynamic network routing reliability problem is a research hotspot to be solved.

Design/methodology/approach

The graph theory is used to model the MANET communication diagram on the highway and propose a new reliable routing method for internet of vehicles based on graph theory.

Findings

The expanded graph theory can help capture the evolution characteristics of the network topology and predetermine the reliable route to promote quality of service (QoS) in the routing process. The program can find the most reliable route from source to the destination from the MANET graph theory.

Originality/value

The good performance of the proposed method is verified and compared with the related algorithms of the literature.

Details

Engineering Computations, vol. 36 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

Article
Publication date: 17 August 2010

Allan H. Weis

This purpose of this paper it to examine the historical forces shaping the new paradigm and the possible directions in which the new commercial Internet might evolve.

6261

Abstract

Purpose

This purpose of this paper it to examine the historical forces shaping the new paradigm and the possible directions in which the new commercial Internet might evolve.

Design/methodology/approach

The Internet is undergoing a major paradigm shift. The factors influencing this shift, the commercial models that are emerging, and the resulting constraints that accompany these models are deeply rooted in the history of the Internet.

Findings

The Internet has been the incubator for new network technologies, far surpassing the expectations of worldwide network suppliers. Its growth has been the steepest shortly after new technology has been deployed and new applications executed. Two basic reasons underlie the Internet's success: the Internet satisfies the needs of its users and its technologies were developed by solving real problems.

Originality/value

The Internet is unique, and concepts cannot be readily borrowed from other business situations and applied to the Internet without risking adverse consequences on its effectiveness and utility. The key issues of the commercial Internet's future, such as management of the boundaries between networks, the establishment of an environment that fosters continued rapid technological progress, and the “carrots‐and‐sticks” imposed by the funding sources will be critical factors in its success.

Details

Internet Research, vol. 20 no. 4
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 1 March 1992

Allan H. Weis

The Internet is undergoing a major paradigm shift. The factors influencing this shift, the commercial models that are emerging, and the resulting constraints that accompany these…

Abstract

The Internet is undergoing a major paradigm shift. The factors influencing this shift, the commercial models that are emerging, and the resulting constraints that accompany these models are deeply rooted in the history of the Internet. This paper examines the historical forces shaping the new paradigm and the possible directions in which the new commercial Internet might evolve.

Details

Internet Research, vol. 2 no. 3
Type: Research Article
ISSN: 1066-2243

Open Access
Article
Publication date: 4 December 2018

Daxin Tian, Weiqiang Gong, Wenhao Liu, Xuting Duan, Yukai Zhu, Chao Liu and Xin Li

This paper aims to introduce vehicular network platform, routing and broadcasting methods and vehicular positioning enhancement technology, which are three aspects of the…

1705

Abstract

Purpose

This paper aims to introduce vehicular network platform, routing and broadcasting methods and vehicular positioning enhancement technology, which are three aspects of the applications of intelligent computing in vehicular networks. From this paper, the role of intelligent algorithm in the field of transportation and the vehicular networks can be understood.

Design/methodology/approach

In this paper, the authors introduce three different methods in three layers of vehicle networking, which are data cleaning based on machine learning, routing algorithm based on epidemic model and cooperative localization algorithm based on the connect vehicles.

Findings

In Section 2, a novel classification-based framework is proposed to efficiently assess the data quality and screen out the abnormal vehicles in database. In Section 3, the authors can find when traffic conditions varied from free flow to congestion, the number of message copies increased dramatically and the reachability also improved. The error of vehicle positioning is reduced by 35.39% based on the CV-IMM-EKF in Section 4. Finally, it can be concluded that the intelligent computing in the vehicle network system is effective, and it will improve the development of the car networking system.

Originality/value

This paper reviews the research of intelligent algorithms in three related areas of vehicle networking. In the field of vehicle networking, these research results are conducive to promoting data processing and algorithm optimization, and it may lay the foundation for the new methods.

Details

Journal of Intelligent and Connected Vehicles, vol. 1 no. 2
Type: Research Article
ISSN: 2399-9802

Keywords

Open Access
Article
Publication date: 26 October 2020

Mohammed S. Al-kahtani, Lutful Karim and Nargis Khan

Designing an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for an…

Abstract

Designing an efficient routing protocol that opportunistically forwards data to the destination node through nearby sensor nodes or devices is significantly important for an effective incidence response and disaster recovery framework. Existing sensor routing protocols are mostly not effective in such disaster recovery applications as the networks are affected (destroyed or overused) in disasters such as earthquake, flood, Tsunami and wildfire. These protocols require a large number of message transmissions to reestablish the clusters and communications that is not energy efficient and result in packet loss. This paper introduces ODCR - an energy efficient and reliable opportunistic density clustered-based routing protocol for such emergency sensor applications. We perform simulation to measure the performance of ODCR protocol in terms of network energy consumptions, throughput and packet loss ratio. Simulation results demonstrate that the ODCR protocol is much better than the existing TEEN, LEACH and LORA protocols in term of these performance metrics.

Details

Applied Computing and Informatics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 3 April 2009

Rodrigo Roman and Javier Lopez

This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology…

2695

Abstract

Purpose

This paper aims to analyze the security issues that arise when integrating wireless sensor networks (WSN) and the internet. Also, it seeks to review whether existing technology mechanisms are suitable and can be applied in this context.

Design/methodology/approach

The paper considers the possible approaches that can be used to connect a WSN with the internet, and analyzes the security of their interactions.

Findings

By providing the services of the network through a front‐end proxy, a sensor network and the internet can interact securely. There are other challenges to be solved if the sensor nodes are integrated into the internet infrastructure, although there exists interesting advances on his matter.

Research limitations/implications

The complete integration of sensor networks and the internet still remains as an open issue.

Practical implications

With the current state of the art, it is possible to develop a secure sensor network that can provide its services to internet hosts with certain security properties.

Originality/value

The paper studies the interactions between sensor networks and the internet from the point of view of security. It identifies both solutions and research challenges.

Details

Internet Research, vol. 19 no. 2
Type: Research Article
ISSN: 1066-2243

Keywords

Article
Publication date: 15 August 2008

Maria Ude´n

The purpose of this paper is to investigate an entrepreneurial process with unusual characteristics, focusing on Sámi micro and mezo level entrepreneurial logics and terms.

Abstract

Purpose

The purpose of this paper is to investigate an entrepreneurial process with unusual characteristics, focusing on Sámi micro and mezo level entrepreneurial logics and terms.

Design/methodology/approach

The case study is a Sámi community in Sweden, where a gender equality project developed into involvement with global innovations systems, in advanced networking development. The paper builds on ethnological methodology and an interactive approach. Market signalling theory is applied, uniquely for this paper, to public funding decisions.

Findings

The paper found anticipation among Sámi of mobile ICT to take over the key role in herding, from the present mechanized and motorized era. The many‐faceted entrepreneurial process contradicts a fundamental split between survival and self expression mode for economic strategy taken for granted in, e.g. Richard Florida's theory on the creative class. Regarding public funding for research and entrepreneurial initiatives, the paper finds that the national level has made itself accessible, while the regional level administrator has pushed the initiative to “other” markets.

Research limitations/implications

Conclusions cannot be but provisional based on one case. As very few cases of this type are known the findings are yet of value for the design of further research and policy.

Originality/value

Indigenous peoples' and women's roles in the information society are not self‐evident. The case shows fruitful possibilities. Turning to market signaling theory prepares for further development of quantitative evaluation, e.g. equal opportunity and inclusion policy implementation, and has not previously been done in relation to this case.

Details

Journal of Enterprising Communities: People and Places in the Global Economy, vol. 2 no. 3
Type: Research Article
ISSN: 1750-6204

Keywords

1 – 10 of 821