Handbook of Intelligent Computing and Optimization for Sustainable Development. Группа авторов. Читать онлайн. Newlib. NEWLIB.NET

Автор: Группа авторов
Издательство: John Wiley & Sons Limited
Серия:
Жанр произведения: Техническая литература
Год издания: 0
isbn: 9781119792628
Скачать книгу
nodes at the same time. If the information is lost by the one node other node can perform the task without the delay in transmission. With the multiple-hop system, we can make the small path by using available nodes in the network. The transmission will be fast and reliable as presented in Figure 6.12.

      6.3.3 Classification of Routing Protocol

       6.3.3.1 Location Base Protocol

      Pro-active protocols contain the routing table which contains information of all the nodes present in the network. To send the data one looks up to the table for transmission and sends the data.

      We are defining a protocol in which we can access one’s location without network availability. To do so, we are taking a Geocast location routing base protocol. Geocast protocol is used for specific region/location. Geocast protocol uses the GPRS to detect the location of sender and receiver for data transformation. Geocast routing protocol uses the features of both unicast and multicast location protocol. By using this feature, we can send the information to a single and multiple destinations. It can propagate the information to the nearest target and within the target.

Schematic illustration of the protocol operation.

      In reactive approach, if we want to transfer the data, then find the route. Discovery of the route is immediately found and then transmission of data happens. After discovery, table is updated and data packets delivered accordingly.

      While in pro-active, table is already prepared and contains all the information of node. To find the route, discovery in the case of missing link causes delay to produce.

      For CrANs, we will use the hybrid base protocol for the transmission of data. It is the combination of pro-active and reactive base route discovery. We can send data to a channel/person by asking for permission by the receiver and can directly send it to the receiver without permission. By using these features, we can make a network more efficient.

       6.3.3.3 Protocol Operation

      6.3.4 Challenge

      To design a protocol, we will face a lot of challenges which includes latency, reliability, energy consumption, power saving, and dynamic network and safety.

       6.3.4.1 Latency

       6.3.4.2 Reliability

      It is most important parameter to check the designing of routing protocol. It is the successful transmission of data from source to sink node. CrANs are highly reliable as they have more mobile nodes and frequently change of topology. CrANs are highly dynamic network due to the infrastructure-less feature.

       6.3.4.3 Security

      CrANs can be used for security purpose in any developing country. But it can be a high risk for anyone. Simple protocols are easy to hijack by connecting a powerful receiver. Somebody can block a network or send false information to the people.

       6.3.4.4 Power Consumption

      It depends on a lot of factors like size of network, clusters, overheads, traffic load, and again transmission of data packet. It is important issue in the network. Complex network are not easy to operate.

       6.3.4.5 Energy

      Energy consumption is important factor to define a network life time. If the transmission increases collision, delay time and packet loss increases. We can decrease the energy consumption by various techniques of delay and increasing throughput.

      6.3.5 Applications

      In the developing countries like Pakistan, we need such type of network in which we have minimum communication gap. We can use this network in different aspects of daily life. It can be used for safety, supervision, data acquisition, control application, monitoring, and research and security purpose.

       6.3.5.1 Monitoring

      In CrANs, we can monitor the traffic in the developing countries. By doing this, we can use this network to check the traffic flow of a city. For medical emergencies, we can use CrANs network to check traffic jam, and for such situation, use another road.

       6.3.5.2 Control and Automation

      For developing countries, we can control the traffic and crowd by using CrANs. In the case of accident and VIP protocol, it can easily control the traffic. It can be used to guide the ambulance, police cars, or any other emergency vehicles. In an otherwise catastrophic condition, the security force can have the overall control of the situation using this network.

      We can use it in army where information needing to be transferred is sensitive; in the presence of jammers, we can use CrANs to provide the network to send and receive important messages. It can transfer nodes in the absence of a network implying the information cannot be tracked or hacked. In Pakistan, on 9th and 10th Moharam, there is traffic jam in every city of Pakistan. There are security threats due to the recent terrorist attacks. In these days, signals are jammed and due to the absence of all networks nobody can contact to each other. For the transfer of important information, we can use non dedicated agents of CrANs to connect the next person through the VANETs and FANETs.

       6.3.5.4 Nuclear Power Plants

      As we all know that Pakistan is 7th atomic power of the world and we need a proper security network to protect the assets.

      In power plants, there are n signals available in the surroundings. Here, we can make use of the CrANs network to communicate. This will also not affect the security in anyway as CrANs cannot be hacked.

       6.3.5.5 Deserts

      In deserts, we can use CrANs for data delivery in the absence of other networks. By merging the CrANs network with WANETs, we can transfer the information from one place to other place. Figure shows the Sindh Engro coal mining co. site. Here, only one network can work which CrANs. By using the agents of CrANs with WANETs, we can set up a communication model.

       6.3.5.6 Recovery Structure

      Basically, the recovery structure includes a network which can be used when all other