The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Route discovery and maintenance in Mobile Ad-hoc Network (MANET) is a problem of long standing interest. In ad-hoc networks the Ad-hoc on demand Distance Vector (AODV) protocol assumes that discovered route is optimal and transmits data on it for the entire data session, whereas due to dynamic topology nodes change position dynamically, the optimum route may change. Thus, node mobility may give rise...
This paper focuses on studying the performance of TPGF geographic routing algorithm with multi routing metric called McTPGF in random duty-cycled wireless multimedia sensor networks (WMSNs). The multi-metric contains the geographic distance and the time, which is called sleeping-delay in this paper, the forwarding node waits to forward packet to the neighbor node after it wakes up. We recognize the...
Data communication over intermittently connected mobile ad hoc networks (ICMANs) can be carried out by opportunistically employment of mobility nature of nodes and the storage space of all nodes. However, due to intermittent connectivity, security schemes introduced for the conventional mobile ad hoc networks (MANETs) cannot be directly deployed over ICMANs for node authentication. Therefore, this...
The performance of traditional TCP congestion control protocol degrades when congestion and contention increase in ad hoc networks that use the IEEE 802.11 DCF. Many of the problems result from medium contention at the media access control (MAC) layer. In this paper, we present a new contention-based congestion control (CBCC) method according to a novel congestion information from MAC layer. This...
With the advantages of asynchronous and loosely coupled communication model, the Publish/Subscribe system has been widely spread in large-scale distributed mobile networks. According to the MANET's characteristics of dynamic topology and bandwidth-constraint, we propose an application scheme of Publish/Subscribe system over clustering MANET. We improve the cluster header by adding the Information...
The spacial distribution of nodes in the Opportunistic networks is uneven in the real scenarios. There are some landmarks with high node density distributed in the network area. Based on the uneven distribution character of nodes in the Opportunistic Networks, a landmark aware content searching scheme (LACS) is proposed. The scheme proposed here is composed of two sub-schemes, latent spray scheme...
Applications involved with multimedia streaming are blooming with the development of Internet and wireless networks. In this paper, we address the problem of how to jointly leverage power control and rate allocation to achieve high-performance video streaming with strict delay and energy over wireless ad-hoc networks. We focus on media-aware rate allocation and power control with goal of minimizing...
With the ongoing progress of telecommunication has increased the want of mobility, wireless or mobile networks and this desire has already swapped the wired networks. The upcoming networks has totally different infrastructure and has different protocols and devices. These networks are infrastructure less and no dedicated protocols or devices are required to deploy such networks. The theme of this...
The demand for adequate security to electronic data system grows high over the decades. As the security issue also impact on the performance analysis of the wireless network, data encryption is necessary for sending and receiving information secretly over the network. Since 1970s, data encryption standard (DES) has received a substantial amount of attention from academic cryptanalysts. However, in...
Opportunistic Network is a special kind of mobile Ad Hoc network in which communication nodes are sparsely distributed in the network area and the communicating opportunities between the nodes are created by the moving and encounter of the nodes. Achieving reliable data transmission in Opportunistic Networks is a great challenging task because there is no contemporaneous path between source and destination...
Medium Access Control (MAC) protocols with transmission power control, rate control and modulation control have been proposed to improve the performance of ad hoc networks and provisioning of differentiated service in wireless networks. However, its effectiveness is reduced in the presence of strong noise over the wireless channels. It is further aggravated in wireless mesh networks (WMN) due to the...
IEEE 802.11s defines a new mesh data frame format and an extensibility framework for routing. The default routing protocol Hybrid Wireless Mesh Protocol (HWMP) is described. HWMP is based on Ad hoc On-demand Distance Vector Routing (AODV) and has a configurable extension for proactive routing. It uses MAC address with layer 2 routing and uses Radio-Aware as routing metric. We implemented HWMP on OPNET...
In a mobile cellular network, both new originating calls and handoff calls can be dropped at any time in the midst of a conversation when a user enters in a dead spot. Because of this, there is always some discrepancy between traffic originated by the mobile station (MS) and that of received by the base station (BS). A probability model is used in this paper to evaluate this discrepancy considering...
This paper analyzes the mobile model and communication mode of the hierarchical wireless networks, and proposes a new hybrid routing protocol(HRP) for the heterogeneous wireless networks. The routing protocol divides the network coverage area into many units, and selects the nodes which have high energy, long transmission radius and strong reliability as the bone nodes. This paper also presents the...
Delay tolerant networking (DTN) is a new store-and-forward architecture and protocol suite for the networks which is intermittent connectivity. Depending on the nodes ability of store and forward, the messages are delivered to their destination with the proper choice of routing protocol by nodes' mobility. In order to successful delivery, many routing protocols use multiply copies methods. Although...
Several geographic routing protocols using location information have already been proposed for ad hoc networks in order to improve performance of ad hoc routing protocols. Here we can mention the case of greedy perimeter stateless routing (GPSR) protocol. GPSR makes greedy forwarding decisions using merely information about a router's immediate neighbors in the network topology. In case a packet reaches...
Impact of nodes dynamically, randomly, frequently entering and leaving network on unreliable routing connection has been clearly described by a generalized routing reliability model according to measuring parameters of relative performance by studying on two-hop unit model presented in this paper. A new rate expression of node entering/leaving spindle region beta has been established by analyzing...
Vehicular ad-hoc networks (VANETs) are promising for more and more intelligent transportation applications, where information is disseminated over a group of vehicles. VANETs are characterized for its unstable framework, in which the isolated vehicles communicate with others only when the unexpected meetings occur. As a result, some available data dissemination schemes do not work well in VANETs....
There are many parameters that affect the performance of vehicular ad hoc networks (VANETs) applications and protocols. To test the new applications and protocols on a real setup is very difficult and very costly. Most researchers use simulation tools to study and analyze VANETs. The simulators usually use simple radio propagation models that did not take into account all the obstacles in the environment...
Impact of nodes dynamically, randomly, frequently entering and leaving network on unreliable routing connection has been clearly described by a generalized routing reliability evaluating model according to measuring parameters of relative performance by studying on two-hop unit model presented in this paper. A new rate expression of node entering and leaving spindle region has been established by...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.