The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new data transmission protocol in Delay Tolerant Mobile Wireless Sensor Networks, which divides the data transmission process into two phases: data reception phase and data forwarding phase, mainly fulfilling through analyzing the state of mobile nodes and using Hand up mechanism. Simulation result shows that, through the implementation of two phases, we can obtain a higher message...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
P2P SIP (peer to peer session initiation protocol) systems have emerged as a new trend in multimedia realm due to their abilities to overcome the shortcomings of conventional SIP systems. Most of P2P SIP systems were implemented using Chord, a Distributed Hash Table (DHT) based routing algorithm which can provide scalability and reliability. Previous studies on P2P SIP systems did not address node...
In wireless sensor networks, with respect to a desired time deadline real-time data dissemination schemes achieve that by a spatiotemporal communication approach forwarding data from a source to a destination with a delivery speed. The delivery speed is typically obtained from both the static distance from the source to the destination and the interval of the time deadline. However, in case of real-time...
Mobile sink brings new challenges to densely deployed and large wireless sensor networks (WSNs). When the sink moves, frequent location updates from the sink can generate excessive power consumption of sensors. In this paper, we propose IAR, an Intelligent Agent-based Routing protocol that provides efficient data delivery to mobile sink. Proposed algorithm reduces signal overhead and improve degraded...
The network in case of Mobile Adhoc networks is generally poorly defined or not defined at all. In Such a network the data can be relayed/routed by intermediate nodes whose position keeps on changing. Mobile adhoc networks have some challenges like Limited wireless transmission range, broadcast nature of the wireless medium, hidden terminal and exposed terminal problems, packet losses due to transmission...
Virtualization is an effective mean of supporting the new internet architecture research,The ForCES idea of control element and forwarding element separation provide a basis for router virtualization. This paper focus on the research of virtual service application implement base on the ForCES framework, we built a virtual service application architecture based on the ForCES framework in PC, this system...
A primary goal of intelligent transportation systems is to improve road safety. The ability of vehicles to communicate is a promising way to alleviate traffic accidents by reducing the response time associated with human reaction to nearby drivers. Vehicle mobility patterns caused by varying traffic dynamics and travel behavior lead to considerable complexity in the efficiency and reliability of vehicular...
Data dissemination and discovery is critical for ad-hoc wireless sensor networks. Most existing research depends on location information that is not always obtained easily, efficiently and accurately. We propose the concept of Contour-cast, a location-free data dissemination and discovery approach for large-scale wireless sensor networks. One important property of Contour-cast is that it does not...
Service discovery systems over MANETs are demanded to find available services at an appropriate cost, even if nodes in MANETs frequently move, randomly join or leave, and services may be revoked by their owners. SCN4M-DL is an adaptive directory-less service discovery system for MANETs, and it meets the above challenges by deeply coupling with underlying geographic routing algorithm and setting configurable...
The Internet-based virtual computing environment (iVCE) provides on-demand aggregation and autonomic collaboration mechanisms to facilitate the utilization of autonomous and dynamic Internet resources. Load balancing and fault tolerance are important issues when scheduling those transient resources. In this paper, we propose a mobility mechanism for the migration of various roles of agents in the...
Standard microcontrollers waste a significant amount of CPU cycles in order to handle I/O and peripheral resources. To handle communication between on-chip peripherals without interference from CPU, DMA or interrupt resources, the Atmel?? AVR?? XMEGA?? 1 microcontroller introduces a peripheral resource known as the Event System. The Event System currently implemented on the AVR XMEGA offers limited...
A Mobile Ad Hoc Network (MANET) is a wireless network which provides communication among wireless mobile hosts without the need of any pre-established infrastructure or centralized control. In such environments, organizing mobile nodes into manageable groups called clusters can reduce the routing overhead and provide better coordination among the nodes. When the nodes mobility is high, re-clustering...
Mobile ad hoc network (MANET) is self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs and the very bad security environment in battlefield bring a great challenge to securing tactical mobile ad hoc networks. Most schemes proposed recently focus on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion...
VoIP (Voice over Internet Protocol) is a technology that enables the routing of voice conversations over any IP-based network such as the public Internet. Separate and distinct client, gateway and call control functions that ability to support Peer-to-Peer, PC-to-telephone, telephone-to-PC and telephone-to-telephone scenarios. During transmission, the traffic loading and other factors in the IP (Internet...
IEEE 802.11 proposed a number of standards and each one had a specific goal. They can be configured in infrastructure mode or ad hoc mode. In the study of infrastructure mode, the focus was on 802.11 b/g co-existence along with other single mode operations to analyze the throughput and traffic drop through simulation. In the study of ad hoc mode, the focus was to analyze the behavior of ad hoc networks...
Autonomous Systems such as Internet Service Provider (ISP), Enterprise Networks and Academic Networks provide Internet services like internet transit, domain name registration and hosting, dial-up access, leasedline access and co-location. Simulation provides an insight into the behavior of these AS. The internal details like designing, configuring and maintaining networks through protocols that include...
Nowadays, the requirement of Internet is increasing in more and more heterogeneous scenarios; especially in mobile platforms, such as Planes, trains and buses. NEMOWG (network mobility workging group) a new working group in IETF (Internet Engineering Task Force) is formed to provide mechanisms to manage the mobility of a network as a whole, enabling that network to change its point of attachment to...
Sensor network is receiving considerable attention as one of the key technologies to keep track of the parameters in the industrial field. Wireless sensor networks (WSN) integrate sensor technology, embedded technology, distributed information processing and network communication. The nodes of WSN serve the functions of perceiving and routing. Power consumption is the key factor affecting the longevity...
AODV is a prominent routing protocol for MANET that uses hop count as a path selection metric. However, AODV has no means to convey traffic load on current route. In this paper we propose a weight-based load balanced routing (WLBR) protocol for MANETs. The routing strategy projected in this paper focuses on distributing the traffic on the routes consisting of nodes with comparatively longer life and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.