5,943 research outputs found
Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols
In this paper, we present a detailed framework consisting of modeling of
routing overhead generated by three widely used proactive routing protocols;
Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and
Optimized Link State Routing (OLSR). The questions like, how these protocols
differ from each other on the basis of implementing different routing
strategies, how neighbor estimation errors affect broadcast of route requests,
how reduction of broadcast overhead achieves bandwidth, how to cope with the
problem of mobility and density, etc, are attempted to respond. In all of the
above mentioned situations, routing overhead and delay generated by the chosen
protocols can exactly be calculated from our modeled equations. Finally, we
analyze the performance of selected routing protocols using our proposed
framework in NS-2 by considering different performance parameters; Route
REQuest (RREQ) packet generation, End-to-End Delay (E2ED) and Normalized
Routing Load (NRL) with respect to varying rates of mobility and density of
nodes in the underlying wireless network
On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks
In Wireless Multi-hop Networks (WMhNs), routing protocols with energy
efficient and delay reduction techniques are needed to fulfill users demands.
In this paper, we present Linear Programming models (LP_models) to assess and
enhance reactive routing protocols. To practically examine constraints of
respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It
is deduced from analytical simulations of LP_models in MATLAB that quick route
repair reduces routing latency and optimizations of retransmission attempts
results efficient energy utilization. To provide quick repair, we enhance AODV
and DSR. To practically examine the efficiency of enhanced protocols in
different scenarios of WMhNs, we conduct simulations using NS- 2. From
simulation results, enhanced DSR and AODV achieve efficient output by
optimizing routing latencies and routing load in terms of retransmission
attempts
ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs
This paper deals with the routing protocols for distributed wireless sensor
networks. The conventional protocols for WSNs like Low Energy adaptive
Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold
Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient
Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away
Cluster Head (ACH) which effectively increases the efficiency of conventional
clustering based protocols in terms of stability period and number of packets
sent to base station (BS). We have implemented ACH scheme on LEACH, SEP, TEEN
and DEEC. Simulation results show that LEACHACH, SEP-ACH, TEEN-ACH and DEEC-ACH
performs better than LEACH, SEP, TEEN and DEEC respectively in terms of
stability period and number of packets sent to BS. The stability period of the
existing protocols prolongs by implementing ACH on them.Comment: 2nd IEEE Saudi International Electronics, Communications and
Photonics Conference (SIECPC 13), 2013, Riyadh, Saudi Arabi
TSEP: Threshold-sensitive Stable Election Protocol for WSNs
Wireless Sensor Networks (WSNs) are expected to find wide applicability and
increasing deployment in near future. In this paper, we propose a new protocol,
Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol
using three levels of heterogeneity. Reactive networks, as opposed to proactive
networks, respond immediately to changes in relevant parameters of interest. We
evaluate performance of our protocol for a simple temperature sensing
application and compare results of protocol with some other protocols LEACH,
DEEC, SEP, ESEP and TEEN. And from simulation results it is observed that
protocol outperforms concerning life time of sensing nodes used.Comment: 10th IEEE International Conference on Frontiers of Information
Technology (FIT 12), 201
Male Rape Myths: Understanding and Explaining Social Attitudes Surrounding Male Rape
This paper provides a critical review of the literature surrounding male rape, aimed at exploring how male rape myths shape society’s responses and attitudes to male victims of rape and integrates the literature from a theory driven perspective. In doing so, this theoretical paper reveals information relating to the barriers to recognition of male rape. These barriers are male rape myths that prevent male rape victims from coming forward and seeking the support that they merit. There has been a lack of research on male rape myths, although some research has documented such myths to be present in practice. These myths could be harmful because they may influence societies’ opinions of male rape victims, so this could affect the treatment and responses toward such victims. To understand and explain such myths so some attempt can be made at eradicating them, this paper will explore common male rape myths that seem to be prevalent in Western society. This paper will examine male rape myths in the areas of media, incarcerated settings, and the wider community, focusing on England and Wales, UK. This is important to do to recognise which myths are harmful and are facilitating the under-reporting of male rape. This paper will help raise awareness of male rape myths and not only attempt to tackle them, but also encourage male rape victims to come forward to report and seek the help that they merit. It will also address the gaps in the literature and areas ripe for research, so further empirical research can be conducted on male rape, highlighting ideas for future research and providing guidance in areas most needed in research on male rape
- …
