The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless communication technologies such as microwave radios are used to provide high-speed mobile backhaul connectivity for radio access networks in cases in which wire-based alternatives, e.g. cable or fiber, are not readily available and cannot be deployed in an economic or timely manner. Current mobile backhauls are predominantly deployed in tree or ring topologies, which simplify traffic management...
The rapid growth of emerging techniques for mobile resource sharing, content sharing, mobile social networks, and complex cyber-physical systems poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on Peer-to-Peer (P2P) systems. However, due to the difficulties caused by system mobility, wireless...
In this paper we provide an architecture for Tactical Information Middleware for bandwidth constrained information management. We propose the ideas of rank-based data dissemination, and the use of a tactical information management query language. These ideas will deal with dynamic changes in bandwidth and explore opportunistic data dissemination. Thus, will lead to a cross layer design of a system...
The survivability evaluation of MANET includes many metrics. Among them, path reliability is the fundamental one. However, most existing work on it has focused either on connectivity or the link duration time solely. Due to the special features of MANET, the radio coverage and node energy also have high effluence on the reliability of the path. Usually, tradeoffs should be considered among these features...
In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise their presence. In this way, they can receive messages addressed to them or participate in routing operations. Yet, these beacons leak information about the nodes and thus hamper their privacy. A classic remedy consists of each node making use of (certified) pseudonyms and changing its pseudonym in specific...
In this paper, we introduce a network holes bypassing routeless routing protocol. Our protocol is an extension to our previous routeless protocol SCWRR. It uses nodes' mobility as an advantage to bypass trapped packets over networks holes. It does not require any prior knowledge of neighbors' locations. It only requires the locations sources and destinations which can be known reactively. The simulation...
Support of P2P communities in mobile environments is a challenging task. To this purpose numerous algorithms have been recently proposed to speed up resource search throughout the network. Among these, structured DHT approaches seem very promising since they allow for a successful resource search by keeping complexity low. One of these techniques denoted as Georoy, was recently proposed with the aim...
With regard to the fundamental problem of the MANET routing protocols, this paper according to the campus mobile node behavior, expands the Campus Wireless Mobile Model, puts forward a Campus Wireless Low-Speed Mobile Model who based on AOC autonomous system. This paper does simulation experiment through NS-2 simulation platform, showing that in this model both DSR and AODV routing protocols are relatively...
The quality of Internet access for mobile users may suffer from highly variable communication characteristics (packet loss, delay, throughput) and from temporary disconnections. The former occur as a result of changing radio properties, handovers, or variable system load, the latter whenever wireless coverage is insufficient. While quite some research has tackled improving radio coverage to keep users...
Video-on-demand service in wireless networks is one important step to achieving the goal of providing video services anywhere anytime. Typically, carrier mobile networks are used to deliver videos wirelessly. Since every video stream comes from the base station, regardless of what bandwidth sharing techniques are being utilized, the media stream system is still limited by the network capacity of the...
In wireless mobile peer-to-peer (P2P) networks, multiple sources can provide multimedia file sharing at the same time. The selection of multiple sources is one of the key issues in the design of a multi-source transmission system in wireless mobile P2P networks. In this paper, we propose a distributed multi-source sender selection scheme to maximize the receiving data rate and minimize the energy...
In wireless communication, Mobile Ad Hoc NETwork (MANET) is a set of mobile nodes that are dynamically and randomly located in such a manner that the wireless link among nodes are often changing due to MANET dynamic features. In this MANET environment, if a device wants to connect to Internet, it must establish a communication with an Internet Gateway. The network performance between mobile nodes...
The rapid development of mobile communication techniques enables mobile video-on-demand and video sharing applications, which allow the sharing of video data among mobile handset users and vehicles whenever and wherever. These applications have been penetrating into our daily life with dramatic speed. Traditional video sharing systems built on infrastructure wireless networks suffer from the problems...
Speckled Computing is an emerging technology in which data will be sensed and processed in small (around 5*5 sq, millimeter) semiconductor grains called Specks. A dense and non-static wireless network of thousands of these specks is called a specknet. This specknet will collaborate among themselves to extract information from the data. Speckled computing works in a wireless communication of typical...
To explore the benefit of advertising instant and location-aware commercials that can not be effectively promoted by traditional medium like TV program and Internet, we propose in this paper a solution for disseminating instant advertisements to users within the area of interest through a mobile peer-to-peer network. This is a new application scenario, and we devise an opportunistic gossiping model...
In our papers for MILCOM 2006 and 2007, we have presented an integrated architecture for seamless soft handoff in mobile ad hoc networks and demonstrated the good performance via showing that our handoff scheme can provide equivalent results as the benchmark with no handoff. In this position paper, we aim to investigate the general handoff problem in face of multiple heterogeneous wireless interfaces...
To support mobile/wireless networking environment, we consider a mobile router which is connected via dual interfaces with WiBro (i.e., Mobile WiMAX) and high-speed downlink packet access (HSDPA) in a moving vehicle. The mobile router can support multihoming features using the extended version of mobile IP (MIP) protocol for multiple interfaces. In our multihoming environment, we propose the dynamic...
With the development of wireless communication technique, intelligent agent technique is becoming a new researching direction in mobile communication fields. At the same time, mobile peer-to-peer technique gains more and more attention, because it could level the difference between mobile clients and servers. As intelligent agent technique was proved to be an effective means to administer mobile peer-to-peer...
The current Internet was originally designed for statically located hosts and inadequate to support mobility. Most of the existing attempts at solving the mobility problems are host- based schemes (e.g., mobile IP), which need end users to participate in the mobility management. For that the behaviors of end users are out of control of network operators, it is difficult for network operators to manage...
In this paper, scalable collaborative human-robot systems for information gathering applications are approached as a decentralized Bayesian sensor network problem. Human-computer augmented nodes and autonomous mobile sensor platforms are collaborating on a peer-to-peer basis by sharing information via wireless communication network. For each node, a computer (onboard the platform or carried by the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.