The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent results show that slotless, purely-interval based neighbor discovery protocols, in which time is assumed to be continuous, achieve significantly lower worst-case discovery latencies than time-slotted protocols. In slotted protocols, the discovery of device A by B and vice-versa occurs within the same slot, and hence the latencies for one-way and two-way discovery are identical.However, in purely...
The process of two wireless devices meeting over-the-air for the first time is referred to as neighbor discovery. In mobile ad-hoc networks, battery powered devices duty-cycle their radios during neighbor discovery. As a result, they transmit and receive for very short durations of time and sleep at other times.Energy-efficient protocols, which guarantee short, bounded latencies while achieving low...
In mobile wireless networks, the emerging proximity-based applications have led to needs for highly effective and energy-efficient neighbor discovery protocols. However, existing works cannot realize the optimal worst-case latency in symmetric case, and their performances with asymmetric duty cycles can still be improved. In this work, we investigate asynchronous neighbor discovery through a code-based...
Neighbor discovery is crucial for both wireless sensor networks and mobile computing applications. The crux of the problem is to achieve energy efficiency, which has been demonstrated to be difficult by prior work. In this paper we propose Hello, a generic flexible protocol for neighbor discovery. With an unrestricted parameter, it serves as a generic framework that incorporates existing deterministic...
Mobile Ad Hoc Network (MANET) is an evolving concept. There are many emerging researches focused on MANET aspects such as routing and caching. Among them, the lack of efforts done on MANET web caching is acknowledged. “iCache” is a web data caching protocol implemented to be deployed on MANETs that use Better Approach To Mobile Ad Hoc Networking (B.A.T.M.A.N.) routing protocol. The iCache protocol...
This paper proposes the time stamp based algorithm to ensure the data consistency of read write mobile clients. The execution of broadcast transaction and update transaction were overlapped on server then the mobile transaction may receive inconsistent data. The proposed algorithm TSCD(Time Stamping method for Consistent data Dissemination to Read Write mobile clients) resolves data inconsistency...
In mobile ad-hoc wireless networks (MANETs), a node is expected to forward packets from the source to the destination (on the behalf of the source), over multiple hops, for the benefit of other nodes. The residual battery level of a node in an ad-hoc network is a very critical and crucial resource as the life of the node is determined it. In this paper, our intention is to conserve the battery power...
The communication mechanism between Mobile Agents has been extensively studied by academia and industry. This paper first analyzes the current mainstream of ACL-KQML's structure, and then a detailed description of the communication between Mobile Agent Systems, as well as the Mobile Agent architecture in KQML environment. Finally the communication process between Mobile Agents has been simulated on...
Hybrid service discovery is introduced as an efficient service discovery protocol in mobile ad-hoc grid witch has a good compromise between response time and network traffic overhead. In this paper we modify the basic idea of this protocol called Zone. We use multi-level zone in our proposal and called the protocol as multi-level hybrid service discovery protocol. Our algorithm tries to provide the...
The following topics are dealt with: mobility; quality of service; measure based and classification mechanism; clusters, grids, and distributed systems; processors and input/output systems; data security; multimedia communications; protocols; wireless networks; computer applications; real time systems; and voice over IP.
Software tool of NS-2 is used to modern network simulation. It introduced in software's Mobile IP, it has carried on the analog simulation using the NS simulation software to the wireless network's course of communications. And it calling NS's Nam animation window to carry on the simulation demonstration, and carrying on analysis of related data record documents.
Password authentication over unreliable networks is the most popular method in the Internet and mobile communication environments. Lately, Peyravian and Jeffries proposed the password-based remote user authentication protocol, password change, and session key establishment over insecure networks without requiring and any additional private-key or public-key infrastructure. However, Peyravian-Jeffries's...
Peer-to-peer content-distribution networks are nowadays highly popular among users that have stationary computers with high-bandwidth Internet connections. Mobile devices (e.g. cell phones) that are connected to the Internet via cellular-radio networks, however, could not yet be launched into this field to a satisfactory extent. Although most mobile devices have the necessary hardware resources for...
During the past decade, there were drastic advances in the technology of the mobile computing environment. Such technical improvements give birth to a demand for running sophisticated applications over multiple mobile devices. Since more than one process executes concurrently in this computing environment and they have to send application data to each other, any failure on a process or a network connection...
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirements. Also the rapid development of new service landscapes calls for standardized, yet highly flexible security protocols. It has been demonstrated that the increasing number of application contexts of these highly flexible...
Mobile ad hoc networks (MANET) are modeled as agents that form communities without infrastructure, for a random period of time and with usually cooperative behavior. The nodes of MANET often carry information to disseminate. The dynamics of information delivery, mostly referred as average consensus, is a common problem in these networks. The gossip protocols are designed to implement this task. The...
In mobile wireless networks such as ad-hoc networks, sensor networks and mesh networks, wireless multihop transmission is adopted for data message transmission. For achieving higher throughput and shorter transmission delay, TDMA is one of more effective methods which avoid collisions and contentions than CSMA/CA and RTS/CTS. This paper proposes a reactive TDMA time slot assignment method in which...
In order to simulate the procedure of communicating between computer serial port and mobile phone, this paper describe the way how mobile phone sending short message and the way how procedure controlling computer serial port and mobile phone to communicate. It mainly introduces the PDU coding and AT instruction of short message. The procedure depending on a serial port controller called SerialPort...
In a mobile ad-hoc network, network topology changes dynamically due to mobility of computers, battery consumption and failure of mobile computers. Until now, many ad- hoc routing protocol tolerating such changes of network topology have been proposed. Here, all data messages are forwarded by all mobile computers included in a message transmission route detected by an ad-hoc routing protocol. No intermediate...
Ad-hoc networks have become a novel area of research and development in mobile computing. In this part, routing protocol is important to improve efficiency of ad-hoc networks. Ad-hoc routing protocols have been studied and developed, such as DSDV, AODV, DSR, and LAR. In this paper, we propose a new routing protocol that is named by advance-LAR based on radio-range of destination node. This protocol...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.