The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most Active Queue Management (AQM) schemes try to stabilize the instantaneous queue length through mapping the congestion measurement into packet drop probability. In this paper we proposed a new AQM scheme called Exact Dropping Probability (EDP) without visible congestion measurement and mapping. It's developed through statistical analysis for a dumbbell topology network. The simulation results demonstrate...
Bus Net is a kind of wireless network which is consist of buses and bus stations. It has the following features: 1) no end-to-end connection between source and destination, 2) intermittent connectivity, 3) high end-to-end delays. However, unlike the other DTNs, the node's mobility in Bus Net is semi-deterministic, which means the node's line is determined but the arriving time is undetermined. With...
This paper considers a cluster-based wireless sensor network (WSN) where each sensor node takes turn to be cluster head. The main function of the cluster head is to oversee the communication within and between clusters while the remaining sensor nodes are involved in sensing of the surrounding environment. We address the sensor utilization problem where non-cluster head nodes in a cluster make decision...
A key challenge of routing in delay-tolerant networks (DTNs) is finding routes that have high delivery rates and low end-to-end delays. When future connectivity information is not available, opportunistic routing is preferred in DTNs, in which messages are forwarded to nodes with higher delivery probabilities. We observe that real objects have repetitive motions, whereas no prior research work has...
In this paper, we consider a relay system with a number of potential relay nodes. We propose several relay assignment protocols to select a relay node to help transmit source data so that the average outage probability of the system is reduced. These protocols include: Optimal-Position relay assignment, Nearest-Optimal-Position relay assignment, and Left (Right)-Nearest-Optimal-Position relay assignment,...
Opportunistic routing has gained much attention in recent years as a means of leveraging the broadcast nature of wireless medium. Most of the previous studies focused only on improving throughput, assuming that Best Effort traffic which is delay insensitive is delivered through opportunistic routing. However, when the delay sensitive traffic is involved, it is necessary to consider both the opportunistic...
Pass-over in wireless sensor network routing occurs when a query agent passes over an event agent without discovering each other. Even if the two agents eventually meet, the number of hop count may add up as a result of that. In this paper we examine the pass-over problem extensively through numerical analysis and simulations. Numerical analyses (and simulation results) reveal that probability of...
Mobile ad hoc networks (MANETs) have been gaining tremendous attention owing to the advances in wireless technologies accompanied by many applications and implementations. However, there are still a number of issues in MANETs which require further investigations and efficient solutions. Out of these issues, broadcasting in MANETs has been a major problem for both industry and the research community...
The Disruption Tolerant Networks (DTNs) are vulnerable to insider attacks, in which the legitimate nodes are compromised and the adversary modifies the delivery metrics of the node to launch harmful attacks in the networks. The traditional detection approaches of secure routing protocols can not address such kind of insider attacks in DTNs. In this paper, we propose a mutual correlation detection...
Message flooding has been extensively used in wireless mobile ad hoc networks for activities such as route and resource discovery. This can potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet collisions in the network. Such a phenomenon has been shown to greatly increase the network communication overhead and end-to-end delay. In this paper, we...
In Mobile Ad hoc Network (MANETs), flooding is the simplest broadcasting mechanism where each node retransmits every uniquely received packet exactly once. Despite its simplicity it could potentially leads to high redundant retransmissions causing high channel contention and thus excessive packet collisions in the network. This phenomenon referred to as broadcast storm problem has been shown to greatly...
A key challenge of message forwarding in delay tolerant networks (DTNs) is to increase delivery rate and decrease delay and cost. When information for future connectivity is not available, opportunistic routing is preferred in DTNs in which messages are forwarded opportunistic (non-deterministically) to nodes with higher delivery probabilities. Many real objects have non-deterministic but cyclic motions;...
In this paper, we propose an anycast mechanism which can adaptively choose the best next-hop to forward packets during the announcement traffic indication map (ATIM) window of multi-channel medium access control (MMAC) protocol. In order to improve the performance of networks by reducing transmission retries and packet drop probabilities, we also propose a multipath extension of AODV routing protocol...
Blind flooding is extensively use in ad hoc routing protocols for on-demand route discovery, where a mobile node blindly rebroadcasts received route request (RREQ) packets until a route to a particular destination is established. This can potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet collisions in the network. Such a phenomenon induces what...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.