scholarly journals Design Considerations of Self-Adaptive Wireless M2M Network Communication Architecture

2013 ◽  
Vol 9 (12) ◽  
pp. 979546 ◽  
Author(s):  
Xiao-jun Chen ◽  
Jia Ke ◽  
Yong-zhao Zhan ◽  
Man-rong Wang ◽  
Ge Deng
Author(s):  
G Chu ◽  
X Yang ◽  
L Luo ◽  
W Feng ◽  
W Jiao ◽  
...  

The converged transmission-assisted network communication architecture used in this study could meet the requirements of telesurgery, and effectively guarantee the security and immediacy of communication. With the security, flexibility, and universality of the network converged transmission, the clinical practical application of telesurgery and telemedicine would step up to a higher level.


Author(s):  
Liang Guang ◽  
Ethiopia Nigussie ◽  
Juha Plosila ◽  
Jouni Isoaho ◽  
Hannu Tenhunen

The self-adaptive Network-on-Chip (NoC) is a promising communication architecture for massively parallel embedded systems. With constant technology scaling and the consequent stronger influence of process variations, the necessity of run-time monitoring and adaptive reconfiguration becomes widely acknowledged. This article presents a survey of existing techniques and methods, in particular for energy efficiency and dependability. The article firstly examines the motivation of self-adaptive computing in parallel embedded systems. A self-adaptive system model is abstracted, which is composed of goals, monitoring interface, and self-adaptation. Based on the model, the authors extensively survey previous works addressing adaptive NoCs with different monitoring techniques and reconfiguration methods, for power/energy optimization and dependability enhancement. Several design examples are elaborated which serve proper guiding purposes. The authors also identify important issues which are often overlooked or deserve more attention. The article provides review and insight for future design on this topic.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
T. Kamaleshwar ◽  
R. Lakshminarayanan ◽  
Yuvaraja Teekaraman ◽  
Ramya Kuppusamy ◽  
Arun Radhakrishnan

Internet network communication protocol version 6 low-power wireless personal area networks (6LoWPAN) is supposed to assist the gadgets with low-power wireless sensor network (WSN) and it furnishes the top model layer of the data transmission system. The 6LoWPAN is prone to the diversified attacks such as wormhole and black hole attacks, which might be very difficult to become aware of and defend. In a wormhole attack, the attacker listens to the facts over the networks, and in a black hole attack, the intruder reprograms the nodes to dam the data transmission. As an end result, any data datagram that enters the attacked region will end result in transmission failure with low flow network rate and excessive one-way delay. To come across and heal the attack, a self-adaptive framework is brought into the networks and the procedure of data transmission is enriched. In this work, the affected region is measured and rectified with the aid of using the proposed self-adaptive framework for Ad Hoc On-Demand Distance Vector (AODV) routing protocol network communication protocol. The overall performance of the network healing technique is investigated with the aid of using simulation and its miles diagnosed that the proposed framework suggests promising overall performance with the aid of using accomplishing excessive flow network rate and minimum delay.


Author(s):  
Hamza Zemrane ◽  
Youssef Baddi ◽  
Abderrahim Hasbi

The world knows a constant development of technology applied in different sectors of activities: health, factories, homes, transportation, and others, one of the big axes that take a lot of attention today is the drone’s field. To communicate information a fleet of drones can use different communication architectures: centralized communication architecture, satellite communication architecture, cellular network communication architecture and a specific AdHoc communication architecture called the UAANET drones architecture. In our work we focused specifically on the routing of information inside the UAANET where we analyze and compare the performances of the reactive protocol AODV and the proactive protocol OLSR, when the UAANET use an applications based on the HTTP protocol, the FTP protocol, the database queries, voice application, and video conferencing application.


Sign in / Sign up

Export Citation Format

Share Document