The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the rapid growth of network traffic and new demands from mobile users, the current mobile social networks face challenges in dealing with a huge amount of content requests, high operating costs, and mobility control. How to design mobile social networks efficiently for the upcoming 5G era has become an important issue. In this article we propose and outline a framework of content centric mobile...
Spurred by the increasing demand for mobile broadband services and the growing number of devices supporting multiple radio access technologies (e.g., cellular, WiMAX, Wi-Fi, Bluetooth), much research is being done to improve the user experience while addressing issues related to network efficiency, congestion, interference, and cost to operators, service providers, manufacturers, and consumers alike...
This paper concerns an efficient network joining method for mobile nodes in USNs (ubiquitous sensor networks) based on the IEEE 802.15.4 standard. The MSBS (mobile sensor beacon setup) method is proposed for performance enhancements of the mobile nodes using the depth, traffic, and RSSI (received signal strength indication) information. The MSBS method can transfer trusted data and prevent traffic...
The conventional Mobile Ad-hoc Network (MANET) is composed of mobile nodes without any infrastructure. But, emergent traffic such as disaster positioning by using wireless infrastructure is indeed required. Therefore, network deployment for ad-hoc would associate WiMax with WiFi which is called 802.16e MANET Environment in this paper. Based on the 802.16e MANET environment, we propose a novel Hierarchical...
The IEEE 802.11 has been shown to be quite inefficient in multihop networks. Besides the problems of hidden terminal and exposed terminal, there is also unreachability problem, which may result in link/routing failures and unfairness among multiple traffic flows. In this paper, a novel medium access control (MAC) protocol, called eMAC, is proposed. Under the proposed scheme, stations maintain double...
The mobile wireless metropolitan area network (WMAN) architecture imposes a demanding power management requirement on mobile stations (MSs) in order to prolong the lifetime of MS. The base station (BS) will functionally serve as a buffer for non-real-time traffic distribution to the multiple MSs associated with it, and thus naturally provide MSs with the power saving capability. However, the power...
Todaypsilas access network is migrating towards broadband IP, fixed/mobile convergence and service convergence. Thus, the next generation access network (NGAN) requires a converged optical/wireless access network infrastructure, other than the existing architecture that connect to the cellular, broadband wireless, and optical access networks separately, which complicate the network and increase the...
In this paper, we address the issue of transmission power control (TPC) in wireless ad hoc networks. Power control plays an important role in energy saving and network performance enhancement. However, the existing TPC schemes either face the problem of hidden and exposed terminal or have additional hardware requirements. We propose a novel distributed power control protocol, called Receiver Initiated...
The handover procedure in secure communication wireless networks is an extremely time-consuming phase, and it represents a critical issue in relation to the time constraints required by certain real-time traffic applications. In particular, in the case of the IEEE 802.1X model, most of the time required for a handover is used for packet exchanges that are required for authentication protocols, such...
According to the carrier sensing mechanism adopted by distributed coordination function (DCF) in IEEE 802.11 standard, a node defers its communication if it senses the medium busy. However, this deferment might block more concurrent communications than necessary. In addition, in DCF, the time duration of deferment is not delivered to all potential interferers, particularly those in the distance. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.