Handbook of Intelligent Computing and Optimization for Sustainable Development. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Handbook of Intelligent Computing and Optimization for Sustainable Development - Группа авторов страница 66

СКАЧАТЬ Max to draw the CrANs structure, which is shown in the Figure 6.10.

Schematic illustration of the structure of CrANs Schematic illustration of the proposed structure of CrANS.

       Why we need it?

      We live in a third world country, and here due to many reason we lose the network. In that case, we need a network which can work in that condition.

       How it will work?

      For communication, we will combine the CrANS with the MANETs, WANETs, FANETs, and Wi-Fi to transfer the data from one area to other. We will use the presence networks to make a crowd for the transfer of data

      6.3.2 Routing

      To define the routing protocol for a network, we have to study the routing classification. We have to choose the best route discovery, protocol operation and network organization. In network organization, we chose location-based protocol. In route discovery, we use hybrid base protocol. In the protocol operation, we selected the negotiate-based protocol.

       6.3.2.1 Single Hop

Schematic illustration of the single hop. Schematic illustration of the multihop.

      6.3.3 Classification of Routing Protocol

       6.3.3.1 Location Base Protocol

      Pro-active protocols contain the routing table which contains information of all the nodes present in the network. To send the data one looks up to the table for transmission and sends the data.

      We are defining a protocol in which we can access one’s location without network availability. To do so, we are taking a Geocast location routing base protocol. Geocast protocol is used for specific region/location. Geocast protocol uses the GPRS to detect the location of sender and receiver for data transformation. Geocast routing protocol uses the features of both unicast and multicast location protocol. By using this feature, we can send the information to a single and multiple destinations. It can propagate the information to the nearest target and within the target.

Schematic illustration of the protocol operation.

      In reactive approach, if we want to transfer the data, then find the route. Discovery of the route is immediately found and then transmission of data happens. After discovery, table is updated and data packets delivered accordingly.

      While in pro-active, table is already prepared and contains all the information of node. To find the route, discovery in the case of missing link causes delay to produce.

      For CrANs, we will use the hybrid base protocol for the transmission of data. It is the combination of pro-active and reactive base route discovery. We can send data to a channel/person by asking for permission by the receiver and can directly send it to the receiver without permission. By using these features, we can make a network more efficient.

       6.3.3.3 Protocol Operation

      6.3.4 Challenge

      To design a protocol, we will face a lot of challenges which includes latency, reliability, energy consumption, power saving, and dynamic network and safety.

       6.3.4.1 Latency

       6.3.4.2 Reliability

      It is most important parameter to check the designing of routing protocol. It is the successful transmission of data from source to sink node. CrANs are highly reliable as they have more mobile nodes and frequently change of topology. CrANs are highly dynamic network due to the infrastructure-less feature.

       6.3.4.3 Security

      CrANs can be used for security purpose in any developing country. But it can be a high risk for anyone. Simple protocols are easy to hijack by connecting a powerful receiver. Somebody can block a network or send false information to the people.

       6.3.4.4 Power Consumption СКАЧАТЬ