The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent studies have preliminarily investigated and proven the feasibility and effectiveness of applying Content Centric Networking (CCN) principles to Mobile Ad-hoc Networks (MANETs) for content-oriented wireless communications in infrastructure-less mobile environments. However, existing designs may not achieve the full potential of CCN-MANETs. In this paper, we develop a content-centric communication...
Predicting the capacity of wireless mesh networks is difficult, due to the complex interaction of various layers such as the radio environment, media access protocols, network protocols and, traffic load and types. When modelling and simulation takes into account the interaction of all these factors, it can facilitate insights into anticipated network behaviour. These insights can be used to more...
Remotely controllable wireless mobile robots are being used in many applications now days. Such systems can be restricted by the range of wireless signal. Mobile Ad-hoc Networks offer a number of advantages e.g. multi hop communication i.e. longer range; can be deployed without any infrastructure etc. This paper presents the implementation details of a wireless mobile robot system over Mobile Ad-hoc...
Android is a complete and innovative Open Source platform for mobile devices. FB-aodv is an extension of the existing AODV protocol. This work propose creation of a Mobile Ad-hoc Network with Android smart phones. We used FB-aodv to manage the networks and some bash script to share informations within the networks. MANET was tested by simple applications to view local neighbors, to send sms and voice...
Mobile ad hoc network is an autonomous system of mobile nodes characterized by wireless links. A wireless Ad-hoc network consists of wireless nodes communicating without the need for a centralized administration, in which all nodes potentially contribute to the routing process. In this paper we design a fuzzy-based priority scheduler to determine the priority of the packets. We analyze packet scheduling...
Vehicular ad hoc networks (VANETs) have become a promising application of mobile ad-hoc networks (MANETs). Since an inaccurate traffic warning message will impact drivers' decisions, and misguide drivers' behavior, one of the main challenges in VANETs is to forward messages in such a way that the information content can be trusted by receiving nodes. In this paper, we proposed a reputation management...
In this paper is presented a new model for intelligent traffic systems, which is able to integrate a typical surveillance scenario and topology independent immediate data delivery. Surveillance part is based on image analysis, namely general foreground/background modeling scheme. Data delivery system ensures data transmission over mobile Ad-hoc network, by providing communication framework for this...
Swarm systems, which typically comprise a large number of lightweight mobile components, must be capable of self-healing. In this paper, we propose a self-organizing, self-healing framework called “superimposed” clustering for such systems. The framework makes a significant departure from traditional clustering algorithms that apply a single policy to form clusters through iterations. Specifically,...
We introduce a simple approach to broadcast real time voice traffic with clustering and Time Division Multiple Access (TDMA). Time is divided in sequence of super-frame. Cluster head selects a frame from super-frame which supposed to be the unique frame than its neighbor clusters. So while one cluster is on transmission schedule basically there won't be any other neighbor cluster on transmission....
Group key management scheme for mobile ad-hoc network is a research hotspot. A group key management architecture for a heterogeneous MANET model with UAV-aid and its detailed re-key methods are offered in this paper. At last, the performance analysis result of the architecture is also offered. The overload values of key storage and re-key computing show our scheme suits for heterogeneous mobile ad-hoc...
This paper proposes a heartbeat radio access protocol for a mobile ad-hoc network based on a random access protocol using a high-throughput and stable single-channel Q-ary free-access collision resolution algorithm. We provide an analytical derivation of the performance of this free-access collision resolution algorithm in the presence of feedback channel errors that may be present in the mobile radio...
In this paper, the problems facing designers of peer-to-peer instant messaging protocols, specifically those intended to run over mobile ad-hoc networks, are discussed. In particular, the challenges of identity management and presence dissemination are addressed, with an efficient and user-friendly protocol described that solves them. As a side effect, a form of social network mining is offered that...
Mobile ad-hoc network is a network that can dynamically setup on the fly by mobile nodes. Due to its unique characteristics, it is becoming an attractive choice for commercial and also military application and among the used is to support information sharing among mobile nodes. However due to its borderless infrastructure, this network is highly susceptible to adversaries nodes, that illegally able...
Topology control algorithms in mobile ad-hoc networks aim to reduce the power consumption while keeping the topology connected. These algorithms can preserve network resources and increase network capacity. However, few efforts have focused on the issue of topology control in presence of node mobility. One of the notable mobility aware topology control protocols is the ldquomobility aware distributed...
Mobility model is the foundation of the simulation study of various protocols in the mobile ad-hoc network (MANET). The entity mobility model is a family of mobility models widely used in the study. A comparative study on entity mobility models is presented in this paper. Firstly, both the advantages and disadvantages of four typical entity mobility models are summarized; these models include the...
This paper describes a cooperative MANET protocol dedicated to intelligent transportation systems and its new experiment results in mobile scenarios. The protocol is named CIVIC (Communication Inter Veacutehicule Intelligente et Coopeacuterative). It is an auto-configuration inter-vehicle communication protocol, which supports ad-hoc and infrastructure networks, contains reactive and proactive routing...
The present work focuses on emulation and validation of protocol stacks for MANETs (mobile ad-hoc networks) that must support multimedia applications in a tactical environment. We considered a network consisting of some tens of mobile nodes, with randomly variable speeds in the order of some tens of km/h. Nodes are deployed on a scenario of a few km2 and have a radio range of some hundreds of meters...
In highly mobile large-scale vehicular ad-hoc networks, routing protocols must be fast and efficient in terms of low routing discovery delay and communication overhead to support the applications such as car talk. Such requirement becomes more difficult to achieve when inducing security enhancement to tackle the authentication of routing messages. In this paper, we propose a lightweight (fast) secure...
Distributed cooperative storage systems are designed to share the storage resources of network nodes for the common good of everyone, especially in dynamic ad hoc networks (MANETs) where the risk of data loss is high. In ad hoc networks, as mobile nodes operate on low-power battery and use limited storage capacity, data holders might behave selfishly by discarding some data they promised to store...
A P2P file sharing system implementation on mobile ad-hoc networks is quite tricky to implement as compared to that on a wired network. With the use of swarm intelligence, the P2P file sharing methodology not only has an optimized search process involving a more selective node tracing but also provides a far more time efficient and robust sharing mechanism. A P2P file sharing system implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.