The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Simulator(NS-2) is an open source discrete event simulator, widely used by the networking research community. NS-2 provides flexibility for the researcher to extend the simulator functionality for any new area of research in networks. The primary objective of the paper is to investigate the development and simulation of the interface assignment in multi-interface multi-channel wireless adhoc...
Most important thing in wireless network which has attracted many research communities is opportunistic data forwarding. Opportunistic data forwarding is used mainly for the stationary wireless network. Mobile ad hoc network is becoming a very popular and wider wireless network. Ad hoc network uses different network topologies which usually changes with time. Therefore there is a challenge to design...
Sensors are the device capable of detecting, monitoring and computing the physical property. A sensor network consist of such autonomous sensors deployed in a particular geographical area. These sensors are battery powered, and thus the sensor network have the limited lifetime. The sensor network can be used is various fields such weather forecasting, monitoring geographical areas, medical science...
In Wireless Ad-hoc Networks, nodes co-operate among themselves to forward data packets from a source node to a destination node. Nodes may participate in route discovery or route maintenance process but refuse to forward packets due to presence of faulty hardware or software or to save their resources, such as, battery power and bandwidth. Detection and isolation of misbehavior nodes are important...
TCP- Transmission Control Protocol is a connection oriented and reliable transport layer protocol. TCP was initially used for process-to-process communication in wired networks. When TCP is used with wireless networks, especially with the wireless mobile adhoc networks, a significant amount of performance degradation can be noticed. The main reasons are route failures, channel losses and channel contention...
Cluster-based Mobile Wireless Sensor Networks (CMWSN) has become promising research domain for researchers in the field of ICT. CMWSN has found its way directly into the real world applications only because of the availability of low-cost Sensor nodes. In the last decade, most of the researchers assumed WSN as a collection of homogeneous and stationary sensor nodes. Mobility and heterogeneity of the...
In a Peer-to-Peer(P2P) network, efficient cooperation among peers (nodes) is an important issue since a peer may not believe another peer for various service discovery applications. Chord protocol faces stale routing entries (finger table entries) due to the presence of malicious peers in the network. We propose a trust-based routing algorithm for efficient service discovery for Chord network. The...
Wireless sensor networks are mainly constrained by energy resources as sensors are battery powered which is limited and limited memory and functionality to support communications. Hence increasing the network lifetime and achieving energy efficiency is the important challenging issue to consider while designing routing protocol for wireless sensor networks. Here we propose a WSN routing protocol based...
In Wireless Sensor Networks (WSNs), multi-objective optimization comprises more than one objective function to be improved simultaneously where there is a compromise between two or more contradictory objectives. The optimization method must be energy competent in terms of utilization and communication. This paper proposes a novel multi-objective optimization method known as Green (Energy Efficient)-Multi-Objective...
In present mobile ad hoc network is an innovative and incredibly popular technology but influenced by foremost security issue because of its dynamic nature or decentralized network The black hole is one of the attack from several attack in the MANETs which advertise itself having the shortest or “freshest” route to transmit the packet to the destination and replies the route request incorrectly to...
A Wireless Adhoc Network is a group of wireless mobile nodes is an autonomous system of mobile nodes connected by wireless links. Each node operates not only as an end system, but also as a router to forward packets. In this paper mainly focused on MAC layer because this layer is most important for data communication to control the packet loss and error, we analyze MAC layer 802.16 and 802.11 networks...
With emerging trend in technology wireless networks allow user to travel from one location to another. Mobile Adhoc network (MANET) is one of the subareas of wireless network that dynamically form infrastructure less temporary network. MANET is a collection of intercommunicating mobile nodes forming a temporary network without any centralized administration. Due to the dynamic property of mobile nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.