The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Position based routing protocols are kinds of routing protocols, which use nodes location information, instead of links information to routing. In position based routing protocols, it supposed that the packet source node has position information of itself and it's neighbors and the packet destination node. Greedy is a very important position based routing protocol. In one of it's kinds, named MFR...
This paper investigates different caching strategies proposed in the recent past and tries to highlight the merits of proposed methods. The major issues on which emphasis is given in this paper is co-operative caching which allows the sharing and coordination of cached data among multiple nodes, can further explore the potential of the caching techniques. Due to mobility and resource constraints of...
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over wireless links. In the absence of a fixed infrastructure, nodes have to cooperate in order to provide the necessary network functionality. One of the principal routing protocols used in Ad hoc networks is AODV (Ad hoc on demand Distance Vector) protocol. The security of the...
In this paper an upgraded protocol referred to as Rate Adaptive Sustainable Physical Activity in Neighborhoods (RA-SPAN) protocol is proposed. In this protocol the power saving algorithm of SPAN is integrated with dynamic switching of data rates. Power consumption of nodes is reduced by cross-layer signaling between MAC and Network layers as in the SPAN protocol and dynamically electing the coordinators...
In this paper we consider a network in which one of the nodes wants to send a packet to all the other nodes in the network by broadcasting the packet. At each instant one of the nodes acts as a source and transmits a packet which has to be received by all the other nodes in the network. We propose a new distribution for LT codes to perform network coding in a distributed manner. Using LT codes which...
Existing on demand routing protocols for MANET's use shortest path as the routing metric, which leads to overuse of an existing path thereby creating hot spots leading to congestion and packet loss. Hence it is important for a routing protocol to adapt to increasing load conditions by timely estimating the load and avoid such congested nodes during route formation. Estimating the load is difficult...
Most monitoring or tracking applications require the localization information in wireless sensor network. The DV-Hop provides a basic scheme to retrieve the localization without GPS information. DV-Hop scheme only uses the localizations of the reference nodes and the hop-count, so the fundamental estimation may cause the larger error than range-based schemes. The proposed scheme uses the neighbor...
Jiter is referred as the variability of latency in packets over a period of time. In mobile network, topology changes rapidly which causes a reconfiguration of network. Therefore the latency of transmission also varies. It gives rise to a QOS problem as predicting exact latency is difficult. Hence time bound or real time packets can not be guaranteed highest QOS in MANET. It this paper we propose...
Packet scheduling has been a very popular paradigm to ensure maximum throughput and bounded delay access for packet flows. This work proposes packet scheduling approach to QOS provisioning in multihop wireless networks. Our scheduling mechanism achieves fair and maximum allocation of the shared wireless channel bandwidth for MANET's that consist of General nodes and Backbone nodes. Backbone nodes...
This paper mainly explores interference of multi-hop ad-hoc networks for two cases of antennas in two dimensional areas. We make a comparison of omni-directional antenna which radiates power in one plane with directional antenna using beamforming or sectoring technique, and calculate interference and carrier to interference ratio (C/I) for both cases. Subsequently, we show that using directional antennas...
CDMA is most widely used standard for multiuser system in wireless ad hoc network. CDMA standards presents set of protocols for power control, BER control and multiuser detection system in ad hoc network. Therefore behevior of MANET depends upon the modeling of CDMA based MAC layer, which also attributes to the performance of the network. In this paper we present a means of improving the performance...
Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network...
Ad hoc wireless networking is a new approach for wireless communication with its potential applications in very unpredictable and dynamic environments. These networks have no infrastructures for achieving end-to-end routing of packets in the network. The nodes communicate between each other without the intervention of centralized administration, thus each node acts both as a router and as a host....
Wireless testing depends on the wireless test environments where test environment refers to the setup or environment into which the device being tested and the test equipment are placed. Four primary types of test environments are Faraday Cages, RF Chambers, Cabled and Open air. Most wireless testing is conducted in indoor environment which is veritable RF jungles, especially when we consider the...
Ad hoc wireless networks consist of a number of nodes roaming freely, interconnecting wirelessly without relying on a predefined infrastructure. These nodes have the property of mobility which enables them to join and leave the network as required. This makes ad hoc wireless networks suitable for hostile environments, where security is a major concern. Achieving security in ad hoc networks is challenging...
In Ad hoc networks, links between nodes may be asymmetric for many reasons. In general, a graph with asymmetric link costs provides a more realistic network modeling perspective. In an earlier work, we proposed a broadcast routing scheme based on Edmonds algorithm for ad hoc networks with asymmetric link costs. The method involved setting up link state, finding minimum in-edge, detecting cycles, re-weighting...
In mobile ad hoc networks, the unstable transport layer and inhibited amount of traffic being carried out by the network is owing to the high packet loss rates and frequent topological changes. It is essential that least available bandwidth and end-to-end latency along with congestion around a link are integrated in a QoS-based routing metric for MANETs. In this paper we develop a QoS-based, robust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.