Professional Documents
Culture Documents
Image Pixel
Delivery 3. JSON Return Tag 4. User Data API * In Server Data Transfer the campaign data is
Almost all the routing protocols considered in this chapter assume that users are willing to help each
other in data delivery. However, network and device resources such as energy, cache and bandwidth in
real applications are limited, and a user might not be interested in relaying messages for the other
nodes. In other words, some nodes may have selfish behaviors in relaying data, which could significantly
degrade the performance of a DTN routing algorithm. According to (Li et al., 2012), two kinds of selfish
behavior can be defined for a non-cooperative node. In some cases, a selfish user wants to help other
nodes with whom he has social relationships (e.g. friends, classmates, colleagues), because he received
help from them in the past or will probably get help in the future. This kind of selfish behavior is called
individual selfishness. A selfish user may show a different degree of selfishness (or cooperation) to other
nodes based on social tie strength. This behavior is called social selfishness. An example of data delivery
in DTNs with unselfish, individually selfish and socially selfish nodes is shown in Figure 11.3.
Register Sign in
Data Delivery
VADD is analyzed in three packet modes: Intersection, Straightway
and Destination based on the location of packet carrier.
From: Vehicular Communications, 2014
Related terms:
Energy Engineering
Unmanned Aerial Vehicles
Internet of Things
Wireless Sensor Network
Sensor Node
Multichannel
View all Topics
Download as PDF
Set alert
About this page
Connected Computing Environment
Sriram Chellappan, Neelanjana Dutta, in Advances in Computers,
2013
7.2 Protocols Design in Uncontrolled Sensor Mobility
Applications within the scope of uncontrolled sensor mobility are still in
their incipient stages of development. Currently, the major focus has
been the design of effective data delivery protocols under uncontrolled
sensor mobility. In the following, we discuss data delivery protocols in
the realm of uncontrolled sensor mobility. While the protocols are also
contingent on issues like mission scale, bandwidth, energy
consumption, etc., we focus on those protocol features that are
contingent on mobility patterns in the mission.
7.2.1 Publish-Subscribe Data Delivery Protocol for Patient Monitoring
Data delivery in the patient monitoring scenario [44] is based on a
publish/subscribe framework where sensors publish data to a specific
channel and end-users (i.e., medical caregivers) subscribe to
channels of interest. Due to transmission energy constraints multi-hop
communications among the nodes may be the only choice. However,
it may also happen that both patients and caregivers are mobile. This
twin mobility scenario means proactively maintaining routing paths will
not be feasible, while discovering paths reactively may incur too much
delay.
In [44], the data delivery protocol is based on the Adaptive Demand
Driven Multicast Routing (ADMR) protocol [45] that takes a middle
ground. Nodes are assigned as forwarders through a route discovery
process that periodically occurs. Every node maintains a node table
indexed by the publisher node ID. Each node table entry contains the
shortest path cost from the publisher to the current node. While
several metrics can be used for path costs, in [44], the radio’s Link
Quality Indicator is used as well as the previous hop in the best path
from the publisher, that is updated periodically. When a subscriber
wishes to receive data from a specific channel, it sends
a unicast route reply message along the reverse path from itself to the
publishing device, using the previous hop information in the node
table. Upon receiving the route reply, each intermediate
node configures itself as a forwarder for the requested channel and
subsequently rebroadcast received messages for that channel.
Simulations have shown that the ADMR protocol can effectively
handle mobility of both the patients and care givers. The performance
though depends on the periodicity of route maintenance, which again
depends on how rapidly mobility compromises existing data delivery
structure.
7.2.2 History-Based Protocol for Habitat Monitoring
In the habitat monitoring application in [3], the data delivery protocol is
designed to specifically take advantage of the mission’s mobility
patterns for more efficient data delivery and energy conservation.
Here, sensors placed in the collars of zebras collect information on
animal movements including position, speed, temperature, etc. Data is
logged by the sensors and should be periodically reported back to a
sink (researchers traveling in vehicles in the habitat). Clearly, the
energy limitations make broadcast type protocols unsuitable. To
enable scalability, and take advantage of knowledge of
movement patterns of zebras, the authors propose history-based
protocols, where each sensor periodically updates its hierarchy level
depending on its proximity to the sink. The closer the sensor is to the
sink, higher is the hierarchy level. Since zebras are slow movers, it is
likely that the sensor (and zebra) currently close to the sink, will also
be close to it in the near future. The data delivery protocol here is
simple where sensors forward packets greedily to sensors with higher
hierarchies, thus taking effective advantage of mobility patterns of the
mission.
7.2.3 Data Delivery in Ocean Monitoring Application
In ocean monitoring, thousands of sensors are deployed. The large
deployment scale, coupled with large scale movements precludes the
chances of scalable run-time data delivery protocols. In this mission,
sensors only sense, aggregate, and store data. After the mission
lifetime, the sensors will automatically float to the surface and data is
then recovered individually from them.
View chapter Purchase book
Applications to Improve the Assistance of First Aiders in Outdoor
Scenarios
Enrique Gonzalez, ... David Munoz-Rodriguez, in Intelligent Data
Sensing and Processing for Health and Well-Being Applications, 2018
10.6.2 Emergent Connective Technologies for WBSNs
Emergent connective technologies are introducing innovative ways of
networking and cognitive data delivery [33]. The potential of
connective-based architectures for enabling the specialized delivery of
health-related information is introduced with technologies like cloud
services, vehicular ad hoc networks (VANET), Internet of things (IoT),
multiple BANS networking, and centralized and distributed services.
•
Cloud Services. A named data networking (NDN) technology is
implemented to deliver rich media content from the cloud, such
as healthcare video adaptive streaming [34]. Also, the cloud
services support a range of capabilities of storing, processing,
and networking. Cloud data offers the possibility to scale up the
system with the number of monitored patients, increasing the
size of data and interconnected components, as in Ref. [20].
•
VANETs. This type of technology offers more stable
communication in the presence of high mobility, as in vehicles.
The mobile network could be employed inside the ambulance to
support mobile connectivity between the hospital and the
ambulance in the case of critical cases [35].
•
IoT. This novel paradigm is the pervasive ability to interconnect a
variety of things that cooperate with each other. This concept
enables intelligence capabilities for real-time monitoring
uninterruptedly, allowing emergencies to be detected
immediately. The physical devices and patients become virtual
interconnected entities and can be monitored from web
services [22].
•
Multiple BANS networking. The network is formed by clusters
consisting of mobile devices to distribute the data traffic until it
reaches a nearby access point (AP). Only the emergency data is
transmitted directly through a cellular network with a reserved
channel [31].
•
Centralized and distributed services. In this architecture the
connectivity is adaptable. In centralized mode, the WBSN only
connects with the healthcare station. In distributed mode, the
WBSN connects with the healthcare station and sends the data
to a medical display coordinator, which visualizes the
information [36].
View chapter Purchase book
Using social network analysis (SNA) to design socially aware network
solutions in delay-tolerant networks (DTNs)
B. Jedari, ... Y. Najaflou, in Advances in Delay-Tolerant Networks
(DTNs), 2015
11.4.4 User selfishness and incentive schemes
Almost all the routing protocols considered in this chapter assume that
users are willing to help each other in data delivery. However, network
and device resources such as energy, cache and bandwidth in real
applications are limited, and a user might not be interested in relaying
messages for the other nodes. In other words, some nodes may have
selfish behaviors in relaying data, which could significantly degrade
the performance of a DTN routing algorithm. According to (Li et al.,
2012), two kinds of selfish behavior can be defined for a non-
cooperative node. In some cases, a selfish user wants to help other
nodes with whom he has social relationships (e.g. friends, classmates,
colleagues), because he received help from them in the past or will
probably get help in the future. This kind of selfish behavior is called
individual selfishness. A selfish user may show a different degree of
selfishness (or cooperation) to other nodes based on social tie
strength. This behavior is called social selfishness. An example of
data delivery in DTNs with unselfish, individually selfish and socially
selfish nodes is shown in Figure 11.3.
In the past few years, several incentive schemes have been proposed
to stimulate selfish users to more cooperation, in spite of the fact that
this issue is extraordinarily challenging in DTNs due to intermittent
connections between mobile carriers. The existing incentive strategies
can be categorized into three classes: tit-for-tat (TFT), credit-based
and reputation-based schemes. In the following, some pioneering
incentive schemes in each category are highlighted.
In TFT mechanisms, two encounter nodes exchange the same
number of packets with each other in a “give one to get one” manner.
Consequently, message selection is a very important issue in this
method, which can significantly affect the performance of a data
delivery protocol in terms of data delivery and delay. MobiTrade
(Krifa et al., 2011) is a prominent scheme in this class which uses an
optimal buffer allocation policy to split the buffer of a node to each
channel. In reality, the amount of data for exchange between two
encounter nodes is not equal. This issue can lead to some problems,
such as fairness issues or deadlocks when some interesting content
cannot be disseminated between the relay nodes. To resolve this
problem, a trading mechanism was utilized in MobiTrade that allows a
node to buy, store and carry content for other nodes so that it can later
trade it for content it is personally interested in. Similarly, barter trade
(Buttyan et al., 2010) discouraged selfish behavior based on the
principles of barter. In this method, messages are classified into two
types, namely, primary messages and secondary messages, which
can be traded between the users. First, encounter nodes send the
description of the messages that they want to exchange. Then, a
message selection process is applied in such a way that the nodes
agree to download from each other one by one. The message
selection process is considered as a two-person game to increase the
message delivery ratio in this method.
Credit-based incentive approaches utilize the concept of virtual credit
to resolve the unfairness problem of TFT strategies. Practical
incentive (Pi) (Lu et al., 2012) was one of the first proposals in this
class, aiming to improve the performance of data forwarding in DTNs
in the presence of individually selfish nodes. In this method, some
incentives are attached to each message, which is not only attractive
for relaying nodes, but also fair to all network nodes. To achieve
fairness in Pi, the intermediate relay nodes get credit from the source
node if the messages are delivered to destination nodes successfully.
Otherwise, the intermediate nodes will get reputation from a trusted
authority which aims to guarantee fairness. SMART (Zhu et al., 2009)
is a secure multilayer credit-based scheme which is based on the
notion of a layered coin to encourage selfish users to cooperate in
data delivery. The first layer of the coin, called the base layer, is
generated by the source to indicate the payment rate (credit value)
and other rewarding policies. Furthermore, each intermediate node
adds a new layer, named an endorsed layer, which implies that the
forwarding node agrees to provide forwarding service under the
predefined forwarding policies. In summary, in credit-based strategies,
source and destination nodes are required to have access to a trusted
third party to manage their payment policies.
Reputation-based schemes have also been considered in the
literature to stimulate selfish users to cooperate in DTNs. In MobiID
(Wei et al., 2011), a node is allowed to manage its reputation evidence
and show this to demonstrate its reputation whenever necessary.
Furthermore, the concepts of self-check and community-check are
defined to speed up reputation dissemination between nodes and
allow them to form consensus views towards targets in the same
community based on a social metric. IRONMAN (Bigwood and
Henderson, 2011) utilized self-reported social network information to
establish a trust mechanism in order to detect and punish selfish
nodes. In addition, a reputation method is used to allow nodes that
have been deemed selfish to improve their trust score. Short
descriptions and important features of the discussed incentive
schemes are outlined in Table 11.3.
Table 11.3. Comparison of incentive schemes in delay-tolerant networks (DTNs)
Algorithm Characteristic Properties
Note: √ if the model satisfies the property, × if not, and – for ambiguous cases.
View chapter Purchase book
NB-IoT
Olof Liberg, ... Joachim Sachs, in Cellular Internet of Things, 2018
7.3.1.4 Paging and eDRX
The monitoring of paging during the idle mode has implications on
device battery lifetime and the latency of DL data delivery to the
device. A key to determining the impact is how often a device monitors
paging. NB-IoT does just as LTE uses search spaces for defining
paging transmission opportunities. The search space concept,
including the Type-1 Common Search Space (CSS) implementation
used for paging indication, is covered in detail in Section 7.3.2.1.
For now, it is sufficient to note that a device monitors a set of
subframes defined by the Type-1 CSS to detect an NPDCCH
containing a DCI of format N2 that schedules a subsequent NPDSCH
containing a paging message addressed to the device. The P-RNTI is
the identifier used to address a device for the purpose of paging and
is, as described in Section 7.2.4.5, used to mask the NPDCCH CRC.
The starting subframe for the Type-1 CSS candidates is determined
from the location of NB-IoT paging opportunity (PO) subframe, which
is determined based on configured DRX cycle [17]. If the starting
subframe is not a valid NB-IoT DL subframe, then the first valid NB-
IoT DL subframe after the PO is the starting subframe of the NPDCCH
repetitions. The Type-1 CSS candidates are based on only NPDCCH
AL 2 described in Section 7.2.4.5. A search space contains NPDCCH
candidates defined for repetition levels R up to a configured maximum
NPDCCH repetition level Rmax. Rmax is typically configured to secure that
all devices in a cell can be reached by the paging mechanism, and the
relation between the possible repetition levels R for a certain Rmax is
given by Table 7.18.
Table 7.18. NPDCCH Type-1 common search space candidates
R max R
1 1
2 1, 2
4 1, 2, 4
R max R
8 1, 2, 4, 8
16 1, 2, 4, 8, 16
32 1, 2, 4, 8, 16, 32
64 1, 2, 4, 8, 16, 32, 64
Figure 19.26 . Low density parity check code for large OFS files.
About ScienceDirect
Remote access
Shopping cart
Advertise
Contact and support
Terms and conditions
Privacy policy
We use cookies to help provide and enhance our service and tailor
content and ads. By continuing you agree to the use of cookies.
Copyright © 2021 Elsevier B.V. or its licensors or
contributors. ScienceDirect ® is a registered trademark of Elsevier
B.V.