The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper introduces a clustering algorithm for applications running in backbone-assisted mobile ad hoc networks. The algorithm assigns weights both to the network nodes and to the communication links in order to elect local leaders, so called clusterheads.
Our previous work proposes a macro model that controls the flows across naturally occurring bottlenecks in multi-hop wireless networks. The macro model resembles a conventional wired network, and allows us to apply extant research on flow control directly to ad hoc networks. In this paper, we further justify the feasibility of applying our macro model of ad hoc networks to access control and the validity...
For emerging resource-constrained sensor networks, energy efficiency and computation simplicity could be as important as precision. Existing terrestrial synchronization protocols have already achieved high precision in radio networks, but none of them perform well in high latency networks like underwater acoustic sensor networks: they either assume instantaneous packet transmission between nodes,...
The support of ad-hoc networks as extension of infrastructure operator networks is increasing its strength in next generation networks, due to the increasing requirement for ubiquitous access of the users. This paper describes the ad-hoc network integration mobility architecture being developed inside the IST project Daidalos II. The main purpose of this architecture is to seamlessly support the movement...
The aggregate capacity of wireless mesh networks can be improved significantly by equipping each node with multiple interfaces and by using multiple channels in order to reduce the effect of interference. Since the number of available channels is limited, it is desired to allocate and reallocate channels on-demand. In this paper, a Cluster Channel Assignment (CCA) approach is proposed, to maximize...
Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To achieve this goal many systems sacrifice security and privacy such, that services can be discovered and...
Understanding the topology of large scale IPv6 networks is essential to the procurement of good architectural design decisions, particularly with respect to address allocation and distribution schemes. The former distributed topology discovery applications deploy multiple probing hosts throughout the network. This approach relies on the ability to deploy probing hosts throughout the network, which...
Lately there has been a growing interest in the use of peer-to-peer technologies for deploying large-scale live media streaming systems over the Internet. In this paper we give a brief survey on the peer-to-peer streaming field and have also a closer look on selected applications. In practice, we analyse the selected peer-to-peer streaming systems (Octoshape, SopCast, TVAnts and TVU networks) and...
Nowadays, most firewalls which are deployed in networks are not compatible with mobile IPv6. And to modify the configuration of firewall by using NSIS signaling is one of signaling solutions. In this paper, the purpose is to resolve the problems which are in mobile IPv6 network environment during the traversal process by using NSIS signaling. We introduce a new method that can reduce the complexity...
The border gateway protocol (BGP) routing system is one of the key components of today's Internet infrastructure. However, the fundamentals of the BGP routing system have remained unchanged since its standardization. The only fault tolerant mechanism currently available is multihoming, which is about increasing the number of peering autonomous systems (ASes). The reliability of the BGP infrastructure...
The development of efficient call admission control schemes for next generation wireless cellular networks remains a challenging and yet unresolved problem, due to the rapidly growing number of multimedia applications and to user mobility. In recent work we have modeled the behavior of H.263 videoconference traces with the use of a discrete autoregressive (DAR(1)) model. Based on this model, we then...
In this paper, we propose a novel route guidance algorithm that provides better wireless network availability. Using a GPS device, geographical information is considered to select a short geographical path while ensuring the maximum covered distance and the minimum handovers number. An efficient algorithm is derived to tackle the problem in polynomial time. Our solution is optimal and well suited...
Due to the explosive growth of the WWW and the increasing amount of data available via the Internet, how to retrieve desired information from the Internet with high efficiency and good effectiveness is of great importance. In this paper, we propose an information retrieval model for use in large dynamic networks such as the Internet. Firstly, we divide the network into a number of groups. An exceptional...
With the increasing deployment of P2P networks, supervising the malicious behaviours of participants, which degrade the quality and performance of the overall delivered service, is a real challenge. In this paper, we propose a fully distributed and adaptive revocation mechanism based on the reputation of the peers. The originality of our approach is that the revocation is integrated in the core of...
The diversity of the applications supported by wireless ad hoc and sensor networks explain the success of these networks. However, their energy constrained nature requires the use of energy efficient strategies to maximize network lifetime. We can classify these strategies in four categories: 1. energy efficient routing, 2. scheduling the nodes sleeping state, 3. topology control by tuning node transmission...
In order to evaluate the behavior and performance of protocols for wireless networks, simulations are a good compromise between cost and complexity, on the one hand, and accuracy of the results, on the other hand. Since there are many simulators for wireless networks, it is often difficult to decide which simulator to choose. To help shed light on this issue, we present a case study in which four...
Current research on wireless sensor networks is based on the assumption that these networks are deployed in a terrestrial environment. Relevant protocols and design specifications are developed under this condition. This makes the deployment of currently existing wireless sensor networks in marine environments extremely challenging. We present major challenges and applications of underwater wireless...
Securing group communications in resource constrained, infrastructure-less mobile ad hoc networks (MANETs) has become one of the most challenging research directions in the areas of wireless networking and security. MANETs are emerging as the desired environment for an increasing number of commercial and military applications, addressing also an increasing number of users. Security on the other hand,...
The most important desidered characteristic for today's networks is quality of service (QoS). Currently DiffServ-based MPLS networks are able to the development of efficient methods for QoS provisioning. This article analysis, through computer simulation, the performance of WFQ schedulers in a DiffServ node loaded by long range dependence (LRD) traffic. The adopted process for the traffic generation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.