Control of coding in DTN’s for progressive packet arrivals dynamically”
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: In Delay Tolerant Networks (DTNs) the core challenge is to cope with lack of persistent connectivity and yet be able to deliver messages from source to destination. In particular, routing schemes that leverage relays’ memory and mobility area customary solution in order to improve message delivery delay. When large files need to be transferred from source to destination, not all packets may be available at the source prior to the first transmission. This motivates us to study general packet arrivals at the source, derive performance analysis of replication based routing policies and study their optimization under two-hop routing. In particular, we determine the conditions for optimality in terms of probability of successful delivery and mean delay and we devise optimal policies, so-called piecewise-threshold policies. We account for linear block-codes and rateless random linear coding to efficiently generate red undancy, as well as for an energy constraint in the optimization. We numerically assess the higher efficiency of piecewise-threshold policies compared with other policies by developing heuristic optimization of the thresholds for all flavors of coding considered.
Authors and Affiliations
Uma Upadhya, , Dr. Shubhangi , Rekha B Venkatapur
Stegnography in video files using Multivariate Regression and Flexible Macroblock Ordering
Abstract: Data hiding is the ability of embedding data into a digital cover with a minimum amount of perceivable degradation, i.e., the embedded data is invisible or inaudible to a human observer. Data hiding consists of...
Survey on Various Security Issues and prevention method in Vehicular Ad hoc Networks
Vehicular adhoc networks are a subset of mobile adhoc networks. This forms wireless network between vehicles for better communications and to break away from the hindrance caused by attackers. Various security ar...
Removal of Gaussian noise on the image edges using the Prewitt operator and threshold function technical
Image edge detection algorithm is applied on images to remove Gaussian noise that is present in the image during capturing or transmission using a method which combines Prewitt operator and threshold function te...
A Novel Interface to a Web Crawler using VB.NET Technology
The number of web pages is increasing into millions and trillions around the world. To make searching much easier for users, web search engines came into existence. Web Search engines are used to find speci...
Virtual Community in Interactive Teaching: Five Cases
Modern teaching methods demand innovative and effective use of technology at utmost level. Incorporating a virtual community outside classroom teaching has become inevitable in digital age education. This r...