The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A reverse direction transmission and block acknowledgement are the main features to improve the performance of MAC layer based on next generation wireless LANs. When the data send it in reverse direction from side A to B, side B does not need to send separate ACK, it may wait for a period of time is less than the sender's time of period to avoid the retransmission at sender and send a piggyback frame...
This paper introduced a method for producing massive and immediate result in multi-join query (DAP Join, for short). Mostly previous research are based on single join operator while DAP join is based on multiple join operators. DAP join distinguishes itself from all previous techniques by concluding benefits of Hash Merge join, Rate Based Progressive Join and State Spilling and its own new approach...
All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the entire network performance. Dropping attack either Packet Dropping or Datagram Dropping is DoS in nature. Both these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack which affects the entire functionality of transport layer. In this paper we have discussed a novel kind...
MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial of service (DoS) attack, the most common of all, if occurs becomes difficult to detect and defend. One of such attacks is JellyFish attack which is further categorized as JF Reorder Attack, JF Periodic Dropping Attack...
Wireless sensor networks plays a vital role in emerging technologies, but the major problem regarding the sensor nodes is the limited energy provided. In order to utilize the energy efficiently a MAC protocol with duty cycle mechanism is being adopted to reduce idle listening problem by periodically putting the sensors to sleep and waking up. It is important to understand which type of duty cycled...
Mobile ad hoc network is coordinated without fixed infrastructure. In the conservative AODV routing protocol, source node always forwards RREQ (Route Request) packet to neighbour for finding path to the destination node. The intermediary (neighbour) node having less lifetime or energy, as well forwards RREQ and lifetime expires after some certain time, i.e. node goes down; it cannot forward RREP (Route...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.