ТОП просматриваемых книг сайта:
Handbook of Intelligent Computing and Optimization for Sustainable Development. Группа авторов
Читать онлайн.Название Handbook of Intelligent Computing and Optimization for Sustainable Development
Год выпуска 0
isbn 9781119792628
Автор произведения Группа авторов
Издательство John Wiley & Sons Limited
6.3.3 Classification of Routing Protocol
6.3.3.1 Location Base Protocol
Pro-active protocols contain the routing table which contains information of all the nodes present in the network. To send the data one looks up to the table for transmission and sends the data.
We are defining a protocol in which we can access one’s location without network availability. To do so, we are taking a Geocast location routing base protocol. Geocast protocol is used for specific region/location. Geocast protocol uses the GPRS to detect the location of sender and receiver for data transformation. Geocast routing protocol uses the features of both unicast and multicast location protocol. By using this feature, we can send the information to a single and multiple destinations. It can propagate the information to the nearest target and within the target.
Figure 6.13 Protocol operation.
6.3.3.2 Route Discovery
In reactive approach, if we want to transfer the data, then find the route. Discovery of the route is immediately found and then transmission of data happens. After discovery, table is updated and data packets delivered accordingly.
While in pro-active, table is already prepared and contains all the information of node. To find the route, discovery in the case of missing link causes delay to produce.
For CrANs, we will use the hybrid base protocol for the transmission of data. It is the combination of pro-active and reactive base route discovery. We can send data to a channel/person by asking for permission by the receiver and can directly send it to the receiver without permission. By using these features, we can make a network more efficient.
6.3.3.3 Protocol Operation
Pro-active and reactive classes combine to form a hybrid operation. These protocols have table and change the table on demand for routing protocol. We use negotiate base protocol for transmission of data from sender to receiver shown in Figure 6.13.
6.3.4 Challenge
To design a protocol, we will face a lot of challenges which includes latency, reliability, energy consumption, power saving, and dynamic network and safety.
6.3.4.1 Latency
Another important feature is to describe network performance. Duration of time transfer data from one node to other is known as latency. Delays decrease the latency factor. To decrease the latency retransmission of data packet, change in topology. The more delay less latency. CrANs has high latency factor.
6.3.4.2 Reliability
It is most important parameter to check the designing of routing protocol. It is the successful transmission of data from source to sink node. CrANs are highly reliable as they have more mobile nodes and frequently change of topology. CrANs are highly dynamic network due to the infrastructure-less feature.
6.3.4.3 Security
CrANs can be used for security purpose in any developing country. But it can be a high risk for anyone. Simple protocols are easy to hijack by connecting a powerful receiver. Somebody can block a network or send false information to the people.
6.3.4.4 Power Consumption
It depends on a lot of factors like size of network, clusters, overheads, traffic load, and again transmission of data packet. It is important issue in the network. Complex network are not easy to operate.
6.3.4.5 Energy
Energy consumption is important factor to define a network life time. If the transmission increases collision, delay time and packet loss increases. We can decrease the energy consumption by various techniques of delay and increasing throughput.
6.3.5 Applications
In the developing countries like Pakistan, we need such type of network in which we have minimum communication gap. We can use this network in different aspects of daily life. It can be used for safety, supervision, data acquisition, control application, monitoring, and research and security purpose.
6.3.5.1 Monitoring
In CrANs, we can monitor the traffic in the developing countries. By doing this, we can use this network to check the traffic flow of a city. For medical emergencies, we can use CrANs network to check traffic jam, and for such situation, use another road.
6.3.5.2 Control and Automation
For developing countries, we can control the traffic and crowd by using CrANs. In the case of accident and VIP protocol, it can easily control the traffic. It can be used to guide the ambulance, police cars, or any other emergency vehicles. In an otherwise catastrophic condition, the security force can have the overall control of the situation using this network.
6.3.5.3 Safety
We can use it in army where information needing to be transferred is sensitive; in the presence of jammers, we can use CrANs to provide the network to send and receive important messages. It can transfer nodes in the absence of a network implying the information cannot be tracked or hacked. In Pakistan, on 9th and 10th Moharam, there is traffic jam in every city of Pakistan. There are security threats due to the recent terrorist attacks. In these days, signals are jammed and due to the absence of all networks nobody can contact to each other. For the transfer of important information, we can use non dedicated agents of CrANs to connect the next person through the VANETs and FANETs.
6.3.5.4 Nuclear Power Plants
As we all know that Pakistan is 7th atomic power of the world and we need a proper security network to protect the assets.
In power plants, there are n signals available in the surroundings. Here, we can make use of the CrANs network to communicate. This will also not affect the security in anyway as CrANs cannot be hacked.
6.3.5.5 Deserts
In deserts, we can use CrANs for data delivery in the absence of other networks. By merging the CrANs network with WANETs, we can transfer the information from one place to other place. Figure shows the Sindh Engro coal mining co. site. Here, only one network can work which CrANs. By using the agents of CrANs with WANETs, we can set up a communication model.
6.3.5.6 Recovery Structure
Basically, the recovery structure includes a network which can be used when all other