The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay Tolerant Networks (DTNs) differ from the traditional Mobile Ad Hoc networks (MANETs) in that DTNs are not always interconnected. The issue of routing data in a DTN is considered here. Many routing protocols exist for DTNs. Some are based on comparing nodes to each other, whereas others focus on the internal properties of the messages they hold. There are wide ranges of protocols, and they perform...
With the emerging demands for the large-scale services, Device-to-Device (D2D) communication has been viewed as a promising technology to improve the network capacity and user experience. In particular, the peer discovery is the first step to establish a D2D communication. Considering that quality of experience (QoE) is an important metric in video services, We propose a QoE-driven peer discovery...
This paper presents an analytical model for analyzing the performance of the TDMA-based distributed reservation protocol for wireless multi-hop ad hoc networks. A novel three-way handshake process is presented which considers the hold-off and competition process before the transmission of scheduling messages. An explicit expression of expectation of the average delay of the three-way handshake process...
Under the opportunistic network environments, normal network protocols can hardly transfer data successfully and efficiently. In order to overcome this problem, many new routing algorithms have been raised pertinently. Thereinto, the Epidemic routing algorithm is a typical approach, which maintains least delay with a highest delivery ratio. However, it is a defective method for routing data as it...
This paper addresses security and performance issues of MANET. A novel cluster oriented concept is proposed to enhance security and efficiency of the network. Proposed strategy insures the optimum performance of MANET in presence of black hole attack. The simulation of the proposed methodology is carried out using NS2 network simulator and the simulation results reflects the performance of scheme...
Geographic routing in Vehicular Sensor Networks (VSNs) has been considered as an efficient and scalable approach since it exploits location information instead of topology information to route data packets. Geographic routing requires sources to be aware of the location information of destinations. Many solutions have been proposed to provide the location information of destinations in ad hoc and...
Device and service discovery is an essential part of automation networks in order to ensure the interoperability of devices and Plug&Play functionalities. Embedded Web services such as Devices Profile for Web Services are an upcoming technology for building and factory automation. For ad hoc discovery, the WS-Discovery standard is used. This approach avoids single points of failures. However,...
By utilizing the multi-channel technology and small world properties, the average path length of a wireless network can be reduced drastically, leading to a significant improvement of network performance. By upgrading a fraction of nodes into the high-level nodes with multi interfaces and higher transmission powers, small world effect can be introduced owing to the short-cuts created by the high-level...
By utilizing the multi-channel technology and small world properties, the average path length of a wireless network can be reduced drastically, leading to a significant improvement of network performance. It has been proven that, by upgrading a fraction of nodes into the high-level nodes with multi interfaces and higher transmission powers, small world effect can be introduced owing to the shortcuts...
In this paper, we investigate the performance of OLSR and AODV protocols in a VANET crossroad scenario. The mobility patterns of vehicles are generated by means of CAVENET (Cellular Automaton based Vehicular Network) and as communication protocol simulator, is used NS3(Network Simulator 3). For the simulations, we used IEEE802.11p standard, TwoRayGroundPropagationLossModel and sent multiple CBR flows...
Wireless Mesh Networks (WMNs) are currently attracting a lot of attention due to their ability to provide cost-efficient broadband wireless connectivity. In our previous work, we evaluated WMN-GA system that is based on Genetic Algorithms (GAs) to find an optimal location assignment for mesh routers. In this paper, we evaluate the performance of two different network topologies by simulations considering...
Message flooding has been extensively used in wireless mobile ad hoc networks for activities such as route and resource discovery. This can potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet collisions in the network. Such a phenomenon has been shown to greatly increase the network communication overhead and end-to-end delay. In this paper, we...
The aim of this paper is to present a novel multipath routing approach in MANETs as new extensions to AODV, a well-known traditional reactive routing protocol. The approach is called Threshold efficient Routes in multipath AODV (TRAODV) which is a link-disjoint multipath extension that tries to optimise routing delay overhead in the route discovery process of traditional AODV. The optimisation in...
Wearable computers need networking by using wireless ad hoc network in order to utilize them more effectively, routing protocol becomes an important research field for its significance in wireless ad hoc network. In Ad Hoc network, there are mainly two kinds of routing protocols: proactive routing protocol and on-demand routing protocol, to evaluate the performance of two kinds of protocols, we choose...
Many applications of ad-hoc networks include intermittent connectivity. Anyone wishing to implement routing into her delay-tolerant network can select from a wide variation of options, but the choice is hard, as there is no strong comparative evidence to the relative performance of the algorithms. Every paper uses a different setting, mostly far from realistic. In our desire to improve the basis for...
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a hybrid-structure routing protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.