The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Unlike most IEEE 802.11-based ad hoc networks, in which only a single channel is used, wireless mesh networks allow the simultaneous use of multiple channels to increase the aggregated capacity. Many efforts have been taken to better exploit multiple non-overlapped channels. Although the IEEE 802.11 b/g standards, which govern the unlicensed 2.4 GHz industrial, scientific and medical (ISM) band, provide...
In wireless MIMO ad-hoc networks, channel reciprocity is assumed to optimize transmit and receive beamformers in conventional beamforming algorithms. But, when channels between nodes are not reciprocal, it is a huge burden to the feedback channel to inform a transmitting node of the channel state information. In this paper, we propose a distributed beamforming scheme with limited feedback for non-reciprocal...
Medium access in ad-hoc wireless networks must be performed in a distributed fashion due to lack of coordination between nodes. Specifically, when nodes are capable of receiving more than one transmission simultaneously, the design of distributed medium-access mechanisms that efficiently exploit the receiver's capability becomes more challenging. Adaptive probabilistic medium access for ad-hoc wireless...
In this paper, we propose an adaptive forwarding scheme for achieving efficient message delivery in the mobile sensor delay-tolerant network (DTN). By adaptively adjusting the probability of replicating a message based on the information about the number of existing message copies in the network, the proposed scheme can achieve nice balance between the delivery delay and the average message copy....
In this paper, we propose a novel medium access control (MAC) protocol called flow-driven MAC (FD-MAC) for mobile ad hoc networks (MANETs). FD-MAC is a slotted MAC protocol that combines random access and reservation-based access, and introduces the concept of "data flow" and a flow-driven mechanism for resource reservation. For short-duration data flows, it employs a random access protocol,...
Due to the dynamic topology and non infrastructure, network participants cooperate with their neighbors to route packets. The lack of centralized services allows mobile ad hoc networks to be easily and swiftly deployed, but make it difficult to check others' identities on the other hand. Cryptographic tools have been introduced to secure group communications, such as private and public key infrastructure...
It is possible for vehicles moving on a highway to communicate with each other, if they are equipped with wireless interfaces. These vehicles, equipped with wireless connectivity, are referred to as nodes in a Vehicular Ad Hoc Network (VANET). The more the number of nodes involved in a network at a time, the more is the power consumed by them, thereby adding to the average power consumption of the...
In this paper, we propose a new channel access protocol for transmission over cooperative ad-hoc networks. The proposed protocol, which aims at minimizing the number of blocked nodes and consequently improving the system throughput, employs directional antennas at both source and relay stations. The network performance under the proposed settings is modelled using continues Markov chains. Steady state...
In mobile ad hoc networks (MANETs), hierarchical key management structure has some distinct features and becomes popular in many applications. In a MANET where security requirement is high, node states should be considered when constructing a private key generator (PKG). In this paper, we propose a distributed hierarchical key management scheme in which nodes can get their keys updated from optimally...
The performance of prevalent MAC protocols in MANETs relies on the level of contention in networks. While contention-based MAC protocols such as CSMA suffer from inefficiency under high contention, slot-based MAC protocols such as TDMA perform in the opposite way. In this paper, we propose a hybrid protocol to which we refer as Load-Adaptive MAC (LA-MAC) protocol for MANETs. By adaptively switching...
We study the scaling laws for wireless ad hoc network in which the distribution of nodes in the network is homogeneous but the traffic is heterogeneous. More specifically, we consider the case in which a node is the sink to k sources sending different information, while the rest of the nodes are part of unicast communications with a uniform assignment of source-destination pairs. We prove that the...
Clustering has been used as a fundamental tool to improve scalability in large wireless ad hoc networks. Techniques based on clustering, such as routing, self-organization, context management, service discovery, etc., ensure QoS in wireless ad hoc networks when the number of devices increases. The crucial issue of clustering is the overhead generated during the cluster formation and maintenance phases...
Network coding is a promising technology that can effectively improve the efficiency and capacity of multihop wireless networks by exploiting the broadcast nature of the wireless medium. However, current packet routing schemes do not take advantage of the network coding, and the benefits of network coding have not been fully utilized. To improve the performance gain of network coding, in this paper,...
Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput and spectral efficiency. However, there has been no practical means for provisioning quality of service (QoS) in multichannel wireless networks. While previous proposals providing signaling and adaptation mechanisms for QoS, they support...
The connectivity properties of a mobile linear network with high speed mobile nodes, dynamic node population, and a strict delay constraint are investigated. A new mobility model is developed to represent the steady state node distributions in terms of random node location and random node population. The model accurately captures the statistical properties of random node arrival, time-varying node...
We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level policy constraints on how "content" should be routed. For example, content can be directed through an intermediary DTN node for the purposes of preprocessing, authentication, etc., or content from a malicious MANET...
Routing of data packets in vehicular ad hoc networks (VANETs) is challenging due to dynamic changes in the network topologies. As nodes in VANETs can obtain accurate position information from onboard Global Positioning System receivers, position-based routing is considered to be a very promising routing strategy for VANETs. This paper presents a novel position-based directional vehicular routing (PDVR)...
Mobile ad hoc social networks are self-configuring social networks that connect users using mobile devices, such as laptops, PDAs, and cellular phones. These social networks facilitate users to form virtual communities of similar interests or commonalities. This paper proposes a concrete, generalized, and novel framework to develop a fully functional mobile ad hoc social network. The proposed framework...
Multi-hop ad-hoc networks are promising candidates for next generation wireless communications. When using HARQ for multi-hop transmissions, each relay node has to decode received messages and request retransmission to its previous node when it detects errors. Thus, every relay node is required to spend extra power and time because of retransmissions and decodes for collaboration of transmission by...
This paper presents a cooperative relay strategy with a game-theoretic perspective. In multi-hop networks, each node needs to send traffic via relay nodes, which behave independently while staying aware of energy constraints. To encourage a relay to forward the packets, the proposed scheme formulates a Stackelberg game where two nodes sequentially bid their willingness weights to cooperate for their...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.