您好,欢迎访问上海市农业科学院 机构知识库!

Implementation of Edge Computing Network Architecture based on Routing Protocol

文献类型: 会议论文

第一作者: Rahul Patel

作者: Rahul Patel 1 ; Lalji Prasad 1 ;

作者机构: 1.Computer Science & Engineering SAGE University, Indore, India

关键词: Wireless sensor networks;Target tracking;Telecommunication traffic;Network architecture;Routing;Routing protocols;Real-time systems

会议名称: International Conference on Inventive Computation Technologies

主办单位:

页码: 1711-1720

摘要: Protocol for tracking and routing targets on the edge of a network when it comes to the nodes that build up the edge network, traditional wireless sensor networks are not the same as the edge network. Most of the time, the nodes themselves have enough power, and their computing and storage abilities are much better than those of regular Internet of Things nodes. Edge nodes also move around a lot, and when the configuration of a network changes often, it uses more energy. As a result of this study, a proposal for an edge network routing protocol is made, which is based on the scenario of tracking a target. The protocol's main goal is to make it easier for edge nodes to talk to each other, and it optimizes network traffic by making sure that a high-speed network is always available. Edge computing completely connects cloud computing centers and edge-end devices, but not much research has been done on how edge-end node devices work together to structure an edge network and what protocols are used to let nodes in an edge network talk to each other. Fog computing is another name for edge computing. In this paper, present a target-tracking-based edge network routing and forwarding protocol as a way to solve the problem of edge nodes communicating with each other in a coordinated way in the current edge computing network design. This protocol is flexible enough to handle both the dynamic repositioning of nodes and the elastic growth of node scale. Individual node failures won't affect the network as a whole, and the network will make sure that real-time operations work well while reducing the amount of communication overhead. The results of the experiments show that the protocol can efficiently reduce the number of communications on the edge network, improve the network's overall efficiency, and set the optimal sampling period to make sure that network delays are kept to a minimum. All of these benefits come from the fact that the protocol can make the network work better as a whole.

分类号: tp3-53

  • 相关文献

[1]Performance Analysis of Efficiently trusted AODV serving Security in MANET under Blackhole Attack Using Genetic Algorithm. Iram Nausheen,Akhilesh Upadhyay. 2023

[2]ETSAODV: An Efficient and Trusted Secure AODV with Performance Analysis for MANETS suffering Blackhole Attack. Iram Nausheen,Akhilesh Upadhyay. 2023

[3]A Review of Smart Traffic Operation System for Traffic Control Using Internet of effects & Reinforcement Learning. Bharat Pahadiya,Rekha Ranawat. 2023

[4]Machine Learning-Based Fraud Detection System for Insurance Claims in IoT Environment. Bediga Sharan,Mohammad Hassan,V Divya Vani,Vijilius Helena Raj,GinniNijhawan,Priyanka Prabhakar Pawar. 2024

[5]Student’s Feedback by emotion and speech recognition through Deep Learning. Ati Jain,Hare Ram Sah. 2021

[6]Design of an IOT Intra-Venious System for Patient Monitoring. Tanios Tawk,Antonio El Sarrouh,Roy Abi Zeid Daou. 2023

作者其他论文 更多>>