The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a survey on the MAC and network layer of Wireless Sensor Networks. Performance requirements of the MAC layer are explored. MAC layer protocols for battery-powered networks and energy harvesting-based networks are discussed and compared. A detailed discussion on design constraints and classification of routing protocols is presented. Several routing protocols are compared in terms...
Advancement in technology is very well reflected and supported by changes in measurement and control instrumentation. To move to high-speed serial from Parallel bus architectures has become prevalent and among these Ethernet is the most preferred switched Serial bus, which is forward-looking and backward-compatible. Great stride have been made in promoting Ethernet use for industrial networks and...
MANET is very hostile environment to design and implement computing algorithms. One of the major concerns in MANET's is to elect a coordinator in order to manage many mobile computing applications. In the contemporary literature, many protocols exist for leader election. However, most of them use message broadcast technique. The present article proposes a technique that avoids the broadcast of messages...
In the present IT age, we are in need of fully automated industrial system. An embedded web based interface used for an industry application is designed in this paper. Here two parameters are being measured. One is sensed voltage of each line in the form of analog and then converts it into Digital signal and the second one is to amplification for the driven current, which is monitored and controlled...
Optimized link state routing (OLSR) protocol is a table-driven proactive routing protocol for wireless mobile ad hoc networks. The key idea behind this protocol is to reduce the control message overheads by marking subset of neighbors as multi-point relays (MPRs). In this paper, we discuss problems of OLSR or other routing protocols that are due to mobility of nodes. We integrate our solutions to...
Node churn can have a severe impact on the performance of P2P applications. In this paper, we consider the design of reliable P2P networks that can provide predictable performance. We exploit the experimental finding that the age of a node can be a reliable predictor of longer residual lifetime to develop mechanisms that organize the network around these more reliable nodes. We propose two protocols,...
Security in wireless ad hoc network (WAN) is very important issue. Due to dynamic topology and mobility of nodes, Wireless Ad hoc Networks are more vulnerable to security attacks than conventional wired and wireless networks. Nodes of Wireless Ad hoc Network communicate directly without any central base station. That means in ad hoc network, infrastructure is not required for establishing communication...
Presence, broadly defined as an event publish-notification infrastructure for converged applications, has emerged as a key mechanism for collecting and disseminating context attributes for next-generation services in both enterprise and provider domains. Current presence-based solutions and products lack in the ability to a) support flexible user-defined queries over dynamic presence data and b) derive...
This paper presents energy aware greedy routing (EAGR) scheme for wireless ad hoc networks. In this scheme, the cost metric of a node depends on the following parameters of a neighboring node: (1) Distance from the destination, (2) fraction of energy consumed, and (3) rate of energy consumption. When a node has the least cost metric, the packet is forwarded to that node. We evaluate the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.