The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network coding is a new method by which a multicast network can achieve the network capacity determined by the max-flow and min-cut theorem. This paper shows the mutual exchange of independent information between two nodes in a wireless network which can be efficiently combined with network coding and broadcast property offered by wireless medium. It introduces COPE, an opportunistic approach to network...
The performance of AODV protocol of MANET at the rate of 4G is studied. A network frame is introduced, the network model is set up, and simulations are run in NS2. After analysis the results show that AODV is suitable for the network of low moving speed at the rate of 4G, but not suitable for the network with too high speed. The work has some value in the integration of MANETs and 4G mobile communication...
An effective solution is proposed to enhance capability of the emergency communication by wireless mesh network technology. The characteristic of wireless mesh network technology is analyzed. Based on practical circumstance, a new mesh network structure and topology have been devised, which are applied to meet an emergency. It has improved the router protocol, analyzed its feasibility, and proposed...
Mobile ad hoc network (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense. Security is as important in ad hoc...
In the article the author analyses three main categories of routing protocols used in HF communication networks and studies in detail the application of the table driven routing protocol in the HF Ad Hoc Network. A small-scale HF Hoc Network is designed for the test in the end and results show that table driven routing protocol is appropriate in it.
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. It is the most challenging work in wireless networks and the routing layer attracts more eye than others. AODV is one of a typical kind of routing protocols among these. This paper labors the local repair mechanism of AODV. And two kinds of improved mechanism are presented. More important, an optimized...
In this paper, a new routing algorithm applicable for wireless mesh network (WMN) backbone, called hybrid multi-path routing (HMR), is presented. Based on DSR (dynamic source routing), HMR applies multi-path routing to improve the performance and routing fault tolerance of WMN backbone. A hybrid approach which combines the source routing and routing table improves the performance of WMN backbone without...
Mobile Ad hoc Network is an emerging research area with practical applications. Due to its fundamental nature, however, a malicious attack may disrupt the route discovery process and significantly affect the Quality of Service delivered by the network In this paper, we introduce a new secure routing protocol, Secure On-demand Source Routing (SOSR), which follows a number of basic techniques of ad...
A contention-based geographic routing (CGR) protocol for mobile ad hoc networks is proposed, which operates in two schemes: greedy-forwarding scheme and void-handling scheme. The greedy-forwarding scheme consists of basic mode and optional mode. In the basic mode, when receiving a data packet from upstream node, intermediate nodes within its forwarding area contend to relay it by waiting for a dynamic...
Give a new arithmetic of variable round mechanism to reduce the cluster-heads' death in a round. We analyze the classical hierarchical clustering protocol LEACH, and discuss the existed routing protocols based on LEACH and present their problems. Finally we introduce a new a variable round mechanism. A simulation comparison is made between the traditional constant round and the variable round mechanism...
In mobile ad hoc networks, a great deal of routing overhead and delays are incurred by the route discovery and recovery, which seriously impacts on the continuous real-time video transmission quality. Therefore, we propose a new Fast Route Repair (FRR) algorithm that can perform a rapid route recovery with restrained routing overhead for on-demand routing protocol. In FRR, the Minimum Hop Count Table...
As we know, fast mobile IPv6 (FMIPV6), hierarchical mobile IPv6 (HMIPV6) and fast-hierarchical mobile IPv6 (F-HMIPv6) are enhancements to the standard mobile IPv6 (SMIPV6) protocol for reducing handover latency and data loss, and for localized mobility management. But, some problems still remain, bandwidth within a MAP region is not satisfying yet and lots of IP addresses in HMIPV6 and F-HMIPv6 scheme...
The mechanism of inter-domain routing protocol (IDRP), its structure of protocol data unit, transmitting and dealing with the process of routing updating information and flow control mechanism are specifically analyzed. Based on these introductions, IDRP protocol is simulated and modeled for the specific scenes under OPNET Modeler environment. Under different minimum broadcasting cycle, cycle of path...
In order to solve the disadvantage of traditional "special line" networking, and ameliorate limitation of traditional IP network, frame relay and the ATM network. A VPN networking project which based on MPLS is put forward. Then analyze the customer data transmitting process of MPLS VPN in detail. Some simulation scenes are introduced by OPNET, get the results that MPLS VPN has lower delay...
Wireless sensor network (WSN) consists of tiny nodes with sensing, actuating, computation, wireless communications capabilities. Because of node's limited energy, many routing, topology control, media access control (MAC) protocol have been specially designed. This paper discussed power management of topology control, media access control protocol and routing protocol in wireless sensor network. Based...
Geographic routing has been considered as an efficient, simple, and scalable routing protocol for wireless sensor networks since it exploits pure local location information instead of global topology information to route data packets. Geographic routing requires the sources nodes to be aware of the location of sinks. Most existing geographic routing protocols merely assume that source nodes are aware...
In recent years, wireless sensor networks (WSNs) have been an interesting and important research area. Many routing protocols for WSNs have been designed for various objectives. In this paper, a novel energy-aware routing protocol in WSNs is proposed for achieving high energy-efficiency which prolongs the network lifetime and is one of the most important requirements for applications of WSNs. Additionally,...
Secure route selection is always a challenge for distributed networks. The paper takes trust value as one of routing metrics for distributed networks to defense some attacks. The paper provides an algorithm to compute trust value and then gives a routing algorithm based on trust value. Trust value's computation takes remembering factor and credibility as main parameters. The final route is secure...
Wireless sensor networks consist of large number of sensor nodes which have a constraint energy capacity, so energy-efficient mechanism is important. Specially, sending packets from the source node to the destination node is the more majority part than merely sensing some events. Thus, energy-saving routing protocol in wireless sensor networks is necessary for increasing the network lifetime. Less...
The significant goal of routing protocol designs for wireless sensor networks is to improve the utilization rate of nodes and to prolong the lifetime of the network. But to a specific application, some other network performances, such as robustness, reliability, end-to-end delay, should be concerned and the conventional single path schemes may not be optimal to improve all these performances efficiently...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.