The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: mobile ad hoc network; wireless sensor network; P2P network; QoS; network reliability; network management; communication theory; signal processing; optical/switching; multimedia/multicast; network performance; network security.
Using mobile ad hoc networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal model for the cattle monitoring system. Then we formulate the requirements for the MANET routing protocol for such systems. We identify a suitable MANET routing protocol that satisfies these requirements and adapt it to our...
Anonymous communication methods, try to prevent traffic analysis attacks by hiding nodes' identities from outside observers. As a result, adversaries can not find any correlation between observed traffic patterns and nodes' real information. In this paper, we have introduced PseudoAODV protocol in which origin identifiers of nodes are replaced by randomly generated pseudonyms in ad hoc on demand distance...
We present an extension to the multiprotocol label switching (MPLS) traffic engineering in fourth generation (4G) composite networks. In a 4G composite network users should be able to select among various radio access technologies that can individually or collectively satisfy the users' capacity and quality of service requirements. The extension provides the ability to diverge traffic flows away from...
Energy consumption plays a crucial role in wireless sensor networks as these networks are designed to be placed in hostile and non-accessible areas. While battery-driven sensors will run out of battery sooner or later, the use of renewable energy sources such as solar power extends the lifetime of a sensor network. We propose a solar-aware, scheduled clustered routing protocol A-sLEACH which is an...
Wireless sensor networks have been widely used in many important fields. Medium Access Control (MAC) protocols have a significant effect on the function and performance of sensor networks. At present, most MAC protocols use the same transmission power when sensor nodes send packets. However, the deployment of the sensor nodes is asymmetrical in wireless sensor networks, which will bring more energy...
In this paper, an asynchronous multiple-input multiple-output multitone code division multiple access (MIMO MT-CDMA) scheme for the uplink of the mobile communication in a frequency selective fading channel is analyzed. Maximum ratio combining (MRC) and linear zero-forcing (ZF) V-BLAST detectors are applied at the receiver. The average bit error rate (BER) expression for uniform multipath power profile...
Addressing plays an important role in traditional networks but incurs much overhead for resource-constrained wireless sensor networks (WSNs).Therefore, address-free sensor network has been proposed by researchers. However, current data delivery schemes are mainly proposed for address-based sensor networks and can't be directly applied to the new architecture. In this paper, we propose an efficient...
Hosts in mobile ad hoc networks (MANET) are capable of self-configuration and they can migrate at will, which makes the network topology highly dynamic. Thus, routes may break easily since the data session fails when one node moves out of the sensing range of its partner. Besides that, if overused, nodes tend to drain their power completely due to the limited battery life. That will result in a short...
The accuracy of localization is a significant criterion to evaluate the practical utility of localization algorithm in wireless sensor networks. In mostly localization algorithms, one of the main methods to improve localization accuracy is to increase the number of anchor nodes. But the number of anchor nodes is always limited because of the hardware restrict, such as cost, energy consumption and...
In this paper, a variant of the conventional multicasting called geocasting, or location-based multicasting, is presented. The proposed scheme combines anycasting, restricted broadcasting, and local broadcasting to deliver packets to a group of nodes presented in a specific geographic region called geocast region. Also, the proposed scheme utilizes a pheromone-aided multipath algorithm (PPRA) to perform...
The convergence of future fixed and wireless networking more and more requires solutions for transporting realtime application data to IP enabled mobile devices and mobile networks. Even if the general Mobile IPv6 protocol performs sufficient in macro environments with non-realtime requirements, seamless mobility demands some more enhanced protocol procedures in between the mobile client and the involved...
Many media access control (MAC) protocols for wireless sensor networks (WSNs) such as sensor MAC (S-MAC) and carrier sense multiple access with minimum preamble sampling (CSMA-MPS) exploit listen/sleep cycles to conserve energy. The cycles of nodes influence the network performances such as energy efficiency, packet latency and throughput in WSNs. In this paper, an adaptive schedule medium access...
According to the actual landform of underground coal mine and the demand of security monitoring, in this paper a coal mine wireless and integrated security monitoring system which combine wireless sensor network and wire monitoring network is proposed. This paper emphasizes a wireless sensor network for coal mine monitoring. In the light of the actual circumstances of coal mine, we propose two-leveled...
The MAC-hs protocol of HSDPA ensures retransmissions of erroneous blocks and in-sequence data delivery to the upper layer. The first function is fulfilled through the HARQ mechanism. The second function is achieved by handling sliding transmitting/receiving window and by numbering of blocks. In this paper, the MAC-hs performance for different MAC-hs window sizes and channel conditions are studied...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.