5,943 research outputs found

    Modeling Routing Overhead Generated by Wireless Proactive Routing Protocols

    Full text link
    In this paper, we present a detailed framework consisting of modeling of routing overhead generated by three widely used proactive routing protocols; Destination-Sequenced Distance Vector (DSDV), Fish-eye State Routing (FSR) and Optimized Link State Routing (OLSR). The questions like, how these protocols differ from each other on the basis of implementing different routing strategies, how neighbor estimation errors affect broadcast of route requests, how reduction of broadcast overhead achieves bandwidth, how to cope with the problem of mobility and density, etc, are attempted to respond. In all of the above mentioned situations, routing overhead and delay generated by the chosen protocols can exactly be calculated from our modeled equations. Finally, we analyze the performance of selected routing protocols using our proposed framework in NS-2 by considering different performance parameters; Route REQuest (RREQ) packet generation, End-to-End Delay (E2ED) and Normalized Routing Load (NRL) with respect to varying rates of mobility and density of nodes in the underlying wireless network

    On Energy Efficiency and Delay Minimization in Reactive Protocols in Wireless Multi-hop Networks

    Full text link
    In Wireless Multi-hop Networks (WMhNs), routing protocols with energy efficient and delay reduction techniques are needed to fulfill users demands. In this paper, we present Linear Programming models (LP_models) to assess and enhance reactive routing protocols. To practically examine constraints of respective LP_models over reactive protocols, we select AODV, DSR and DYMO. It is deduced from analytical simulations of LP_models in MATLAB that quick route repair reduces routing latency and optimizations of retransmission attempts results efficient energy utilization. To provide quick repair, we enhance AODV and DSR. To practically examine the efficiency of enhanced protocols in different scenarios of WMhNs, we conduct simulations using NS- 2. From simulation results, enhanced DSR and AODV achieve efficient output by optimizing routing latencies and routing load in terms of retransmission attempts

    ACH: Away Cluster Heads Scheme for Energy Efficient Clustering Protocols in WSNs

    Full text link
    This paper deals with the routing protocols for distributed wireless sensor networks. The conventional protocols for WSNs like Low Energy adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP), Threshold Sensitive Energy Efficient Network (TEEN), Distributed Energy Efficient Clustering Protocol (DEEC) may not be optimal. We propose a scheme called Away Cluster Head (ACH) which effectively increases the efficiency of conventional clustering based protocols in terms of stability period and number of packets sent to base station (BS). We have implemented ACH scheme on LEACH, SEP, TEEN and DEEC. Simulation results show that LEACHACH, SEP-ACH, TEEN-ACH and DEEC-ACH performs better than LEACH, SEP, TEEN and DEEC respectively in terms of stability period and number of packets sent to BS. The stability period of the existing protocols prolongs by implementing ACH on them.Comment: 2nd IEEE Saudi International Electronics, Communications and Photonics Conference (SIECPC 13), 2013, Riyadh, Saudi Arabi

    TSEP: Threshold-sensitive Stable Election Protocol for WSNs

    Full text link
    Wireless Sensor Networks (WSNs) are expected to find wide applicability and increasing deployment in near future. In this paper, we propose a new protocol, Threshold Sensitive Stable Election Protocol (TSEP), which is reactive protocol using three levels of heterogeneity. Reactive networks, as opposed to proactive networks, respond immediately to changes in relevant parameters of interest. We evaluate performance of our protocol for a simple temperature sensing application and compare results of protocol with some other protocols LEACH, DEEC, SEP, ESEP and TEEN. And from simulation results it is observed that protocol outperforms concerning life time of sensing nodes used.Comment: 10th IEEE International Conference on Frontiers of Information Technology (FIT 12), 201

    Male Rape Myths: Understanding and Explaining Social Attitudes Surrounding Male Rape

    Get PDF
    This paper provides a critical review of the literature surrounding male rape, aimed at exploring how male rape myths shape society’s responses and attitudes to male victims of rape and integrates the literature from a theory driven perspective. In doing so, this theoretical paper reveals information relating to the barriers to recognition of male rape. These barriers are male rape myths that prevent male rape victims from coming forward and seeking the support that they merit. There has been a lack of research on male rape myths, although some research has documented such myths to be present in practice. These myths could be harmful because they may influence societies’ opinions of male rape victims, so this could affect the treatment and responses toward such victims. To understand and explain such myths so some attempt can be made at eradicating them, this paper will explore common male rape myths that seem to be prevalent in Western society. This paper will examine male rape myths in the areas of media, incarcerated settings, and the wider community, focusing on England and Wales, UK. This is important to do to recognise which myths are harmful and are facilitating the under-reporting of male rape. This paper will help raise awareness of male rape myths and not only attempt to tackle them, but also encourage male rape victims to come forward to report and seek the help that they merit. It will also address the gaps in the literature and areas ripe for research, so further empirical research can be conducted on male rape, highlighting ideas for future research and providing guidance in areas most needed in research on male rape
    corecore