At present, most of the traditional micro-grid communication systems are based on Ethernet or bus to complete, but the micro-grid system has many devices and the need for great flexibility, at any time there are point...
详细信息
ISBN:
(纸本)9781538643013
At present, most of the traditional micro-grid communication systems are based on Ethernet or bus to complete, but the micro-grid system has many devices and the need for great flexibility, at any time there are points out of the characteristics. Considering the safety and reliability of power network communication, it is generally a point-to-multipoint technology, which has a flexible communication structure. Therefore, this paper puts forward the advantages of wireless and carrier fusion communication, which can realize the advantages of plug and play. Secure access problem of distributed power supply.
Although wireless sensor networks (WSNs) are becoming ubiquitous, the large amount of power consumed by wireless communications in transmitting sensing data from sensors to base stations or between sensor nodes themse...
详细信息
ISBN:
(纸本)9781479932474;9780769550237
Although wireless sensor networks (WSNs) are becoming ubiquitous, the large amount of power consumed by wireless communications in transmitting sensing data from sensors to base stations or between sensor nodes themselves has become a critical problem. Since most sensor nodes are powered by batteries, we need to be more energy efficient to improve our ability to maintain them. As it is well-known that long communication distances between sensor nodes and base stations make WSNs consume more power as well as large amounts of sensing data, we propose a new energy-efficient wireless communication protocol called threshold controlled hierarchical routing (TCHR) to reduce the cost of wireless communication by reducing the communication distance in WSNs which the topology is considered closer to reality. We simulated our proposed protocol, and the simulation results demonstrated that the life of a WSN could be extended approximately 6 times longer than that with the direct data transmission protocol.
A common method of prolonging the lifetime of wireless sensor networks is to use low power duty cycling protocol. Existing protocols consist of two categories: sender-initiated, and receiver-initiated. In this paper, ...
详细信息
ISBN:
(纸本)9781479932474;9780769550237
A common method of prolonging the lifetime of wireless sensor networks is to use low power duty cycling protocol. Existing protocols consist of two categories: sender-initiated, and receiver-initiated. In this paper, we present SA-MAC, a Self-stabilizing Adaptive MAC protocol for wireless sensor networks. SA-MAC dynamically adjusts the transmission time-slot, waking up time-slot, and packet detection patten according to current network working condition, such as packet length and wake-up patterns of neighboring nodes. In the long run, every sensor node will find its own transmission phase so that the network will enter a stable stage when the network load and qualities are static. We conduct extensive experiments to evaluate the energy consumption, packet reception rate of SA-MAC in real sensor networking systems. Our results indicate that SA-MAC outperforms other existing protocols.
Wireless sensor Networks (WSNs) is considered to be one of the promising technologies for ubiquitous computing environment. Enabling secure communication in among the nodes in a sensor network is a risky task. It is f...
详细信息
ISBN:
(纸本)9780769549583;9781467356039
Wireless sensor Networks (WSNs) is considered to be one of the promising technologies for ubiquitous computing environment. Enabling secure communication in among the nodes in a sensor network is a risky task. It is found that WSNs are prone to clone attacks that lead to many devastating effects. In clone attack, an attacker initially captures a node in the network and reprograms the node. In the later stage the adversary replicates the reprogrammed node and spread throughout the network for taking control over the network. There are few distributed solutions available for this problem. But the issues related to energy and memory demanding in any WSN protocol makes these solutions ineffective. In order to overcome these drawbacks, a lightweight, fast, efficient and mobile agent based security solution against cloning attack or replication attack is been proposed for WSNs.
Detection latency, which is defined as the time from the target arrival to the time of the first detection, is an important metric for the performance of sensor networks carrying out target detection, especially when ...
详细信息
This paper introduces Beat sensors which are suitable for smart environment monitoring as low power and small size IoT sensors. As a typical representative, the Ethanol Beat sensor is realized to monitor the ethanol c...
详细信息
ISBN:
(纸本)9781538679630
This paper introduces Beat sensors which are suitable for smart environment monitoring as low power and small size IoT sensors. As a typical representative, the Ethanol Beat sensor is realized to monitor the ethanol concentration from 0 to 200 ppm at almost 20 ppm resolution. Beat sensor has large potential to address issues of smart environment monitoring such as air pollutions management. Moreover, the long distance (LoRa) communication protocol is applied to build a smart and energy efficient monitoring system.
Clock synchronization is one of the most basic building blocks for many applications in a distributed system. Synchronized clocks are interestingly important because they can be used to improve performance of a distri...
详细信息
ISBN:
(纸本)9781467345286
Clock synchronization is one of the most basic building blocks for many applications in a distributed system. Synchronized clocks are interestingly important because they can be used to improve performance of a distributed system. The purpose of clock synchronization is to provide the constituent parts of a distributed system with a common notion of time. There are several algorithms for maintaining clock synchrony in a distributed multiprocessor system where each processor has its own clock. In this paper we consider the problem of clock synchronization with bounded clock drift. We propose a clock synchronization algorithm which does a two level synchronization to synchronize the local clocks of the nodes and also it exhibits fault tolerant behavior. Our algorithm is a combination of external clock synchronization and internal clock synchronization.
Collaborative document authoring between geographically distributed users is increasingly common in our professional and personal lives. Corresponding systems aim to allow for the involvement of locally unavailable sp...
详细信息
ISBN:
(纸本)9781538625651
Collaborative document authoring between geographically distributed users is increasingly common in our professional and personal lives. Corresponding systems aim to allow for the involvement of locally unavailable specialists while connecting familiar single-user functionality with an accessible, distributed multi-user environment. However, considering the highly dynamic processing loads on modern machines, accounting for network inadequacies, and providing a user-adjustable, mainly interruption-free work environment still presents some challenges. To address these challenges, we integrated our fine-granular data model, concurrency-based command application, and data-type specific consistency management into a distributed authoring environment. The collaboration environment provides individual sites sufficient independence to allow the local users to adapt their work experience based on personal preference and other, machine-related factors. This paper discusses our approach for a responsive, yet unobtrusive and adaptable distributed compound document authoring environment with the focus on concurrent and mainly autonomous command application and consistency management.
It continues to be a hot topic how to increase the throughput of communication protocols in distributed system, which reflects in the emergence of new standards and the numerous research projects in this area. This ar...
详细信息
In this paper we discuss about our new clustering algorithm (ALEC) by modeling the CH and non CH nodes during set-up and steady-state phases of the algorithm. We investigate the effects of event sensing reliability an...
详细信息
ISBN:
(纸本)9781479932474;9780769550237
In this paper we discuss about our new clustering algorithm (ALEC) by modeling the CH and non CH nodes during set-up and steady-state phases of the algorithm. We investigate the effects of event sensing reliability and number of clusters on the network lifetime. We also analyze the power consumption and delay overheads of the clustering algorithm. According to the results, energy consumption overhead and delay overhead of ALEC algorithm in worst cases are very low (overhead of power consumption is about 0.06% and overhead of delay is about 0.001%.). The results also show that longer network lifetime can be achieved by both lower values of number of clusters and sensing reliability.
暂无评论