The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider 2D wireless multi-hop networks with mobile nodes randomly distributed on a torus, and a small number of base stations (infrastructure nodes) deterministically placed in the same area. Mobile nodes move following a random walk mobility model. A piece of information is broadcast from the base stations at the same time in a multi-hop manner using a Susceptible-Infectious-Recovered...
In this paper, we consider a nano-biosensor network composed of nano-to-micro scale biological machines distributed over a two-dimensional bounded area. The goal of the nano-biosensor network is to detect a target signal that propagates via Brownian motion in the monitoring area. Three simple nanomachine placement strategies are investigated: random, proportional, and regular placement. In the random...
Mobile sensors are a viable choice for providing monitoring service on a set of Points of Interest (PoIs) in a large sensing field. In some applications, each PoI should be covered periodically (sweep coverage), and the collected data should be delivered to the sink node timely (timely transmission), namely both the sensing and transmission delay constraints for each PoI should be satisfied, which...
With widespread deployment of often overlapping mobile and wireless coverage today, modern-day smartphones may have the capability to transmit data using multiple parallel paths to improve overall communication throughput. However, multipath data transfers have serious compatibility issues with reliable transport layer protocols which dictate the data to be received at the receiver in strict sequenced...
Mobile models aim to mimic human motion. Real traces aim at the same target. However, the latters are specific. They relate to a country or a region or smaller geographical places. Also, they cover at most few months of duration. In cons, Mobility models approach is more general in space and time for taking advantage of Social Theory. Mobile models are used in mobile networks routing protocols for...
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture...
The current growth of mobile devices enabled with GPS receptors, cameras, accelerometers, and Internet access offers new opportunities for new mobile ubiquitous multimedia applications. Such applications help local communities to share resources using geo-location, interactive mapping, augmented reality, and several data representations. This paper presents CityEvents, a mobile solution that provides...
Groups of people with mobile phones using short range connections like WiFi and Bluetooth to propagate messages can be modeled as, with regard to regular absence of end-to-end connection, Delay Tolerant Networks (DTNs). The study of message transmission speed in such kind of networks has attracted increasing attention in recent years. In this paper, we present a realistic framework to model the message...
In order to maintain sufficient mobile communication network capacity for value added services, 3GPP has recently introduced an architecture called ”SIPTO”(Selected IP Traffic Offload) to offload selected mobile IP traffic from the core network. This brings new challenge to on line traffic classification scheme needed to figure out the traffic which should be offloaded in real time. Although traffic...
Wireless sensor networks have been used for a variety of purposes such as habitat monitoring, malicious target detection, and climate observation. Conventionally, stationary sensors are used to carry out sensing tasks in a region of interest. However, if the region is much larger than the sensing range of a single sensor, stationary sensor networks could incur many problems such as the complicated...
The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns....
This paper address the challenge of design a feasible social-based mechanism to manage wireless mobile connectivity. In a previous work, we proposed a methodology to share connectivity experiences among mobile users inside on-line social networks [11]. The aim was explore peoples social circles to enhance their wireless connectivity experiences e.g., QoS metrics such as: throughput, latency and signal...
We design new cellular automaton based algorithms to improve coverage in a network with mobile sensors. The algorithms can be useful in applications where sensors are initially deployed in one place and need to disperse to the environment autonomously, or in situations where in certain areas sensors may be destroyed (e.g. due to a natural disaster), and the sensors need to use their mobility in order...
Cooperative communication when other mobile nodes could act as potential relays, poses significant challenge in designing relay selection algorithms due to the information asymmetry between the source and the potential relays. The potential relays in this case are better informed about their channel conditions than the source. Therefore, the source must provide them with incentive to reveal their...
Measuring and predicting users quality of experience (QoE) in dynamic network conditions is a challenging task. This paper presents results related to a decision-theoretic methodology incorporating Bayesian networks (BNs) and utility theory for quality of experience (QoE) measurement and prediction in mobile computing scenarios. In particular, we show how both generative and discriminative BNs can...
In a WLAN-cellular integrated network scenario, the most important point of consideration is the vertical handoff strategy applied for WLAN admission control. The admission control has previously been based on the parameters like congestion level in WLAN network. We propose a novel approach for handoff to WLAN by using connectivity graph data from online social networking services. Stronger social...
In this paper, we study the communication overhead of gossip-based information dissemination algorithms. Among basic variants of gossip algorithm push is most efficient in the early rounds while, in contrast, pull becomes more efficient in the later rounds. Therefore, a cost-efficient gossip algorithm needs to combine the advantages of push and pull algorithms. One possible approach is to begin with...
We present a new distributed protocol for setting up and maintaining a backbone for multi-hop mobile networks with multiple radio interfaces. Our solution, termed MM-Backs, is effective in producing backbones with limited size, while being robust and reliable in the face of node mobility. We also describe how MM-Backs can be used to transparently support ad hoc routing, without the need to modify...
With the introduction of LTE networks operators need to plan a new, IP-based mobile backhaul. In this paper, we provide recommendation on dimensioning LTE backhaul networks links using three methods: delay-, dimensioning formula- and overbooking factor-based. Results are obtained from OPNET simulations with traffic model based on traffic forecast for 2015. A delay-based approach gives recommended...
An ad hoc network is a decentralized network that consists of mobile nodes with wireless communication devices without the aid of access points. A Vehicular Ad-hoc NETwork (VANET) is one of the representative applications of the ad hoc network. Epidemic routing has been proposed as a routing protocol based on Store-Carry-Forward mechanism for VANET environment. However, in epidemic routing, network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.