The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper evaluates the performance of IPv4 and IPv6 networks in the absence of link layer protection. Behavior of both the networks has been discussed and simulated in case of ideal scenario, low noise, medium noise, high noise and very high noise environment. Transmission behavior at each router is observed and computed to understand the comparative performance of IPv4 and IPv6 datagram's. Our...
In this paper we introduce a reliable multicast concept for Device-to-Device (D2D) communication integrated into cellular network. In addition to the introduction of the basic concept, initial simulation results are presented as well. Clustering closely located devices which have local communication needs is a feasible and efficient way of solving the increasing data traffic requirements in the future...
Recently, opportunistic routing has gained much popularity for the ability to exploit the broadcast nature of the wireless medium with several practical protocols been proposed over wireless mesh networks (WMNs). These protocols usually add many mechanisms to introduce a dramatic increase in the overall network throughput, such as reliability promise and rate control. However, the evaluation of these...
In this paper, we address the reliable alarm message dissemination in Vehicular Ad hoc NETworks (VANETs) environment. We study various techniques to disseminate emergency data, after a car crash, within a group of vehicles. We consider a trajectory-based data dissemination technique to perform broadcast flooding task optimization, and compare it with a pure flooding scheme. For the evaluation, we...
TCP is the main and most widely used transport protocol for reliable communication. Because of its widespread need, researchers have been studying and proposing new TCP variants trying to improve its behavior towards congestion to make it use the most available bandwidth while preserving a logical level of fairness towards other protocols. This paper aims at evaluating and comparing the performance...
Wireless mesh networks (WMNs) have gained considerable attention in the recent years due to fast deployment, easy maintenance and low upfront investment compared with traditional wireless networks. Since WMNs are typically used as wireless backbones, they have the nature that the wireless communication is not stable. Hence, it is significant to protect them against link or node failures. Distribution...
Multicasting can be an useful service in wireless mesh networks (WMNs), which have gained significant acceptance in recent years due to their potentials of providing a low-cost wireless backhaul service to mobile clients. Many applications in WMNs require efficient and reliable multicast communication, i.e., with high delivery ratio but with less overhead, among a group of recipients. However, in...
This paper presents a performance evaluation of wireless sensor networks (WSN) based on impulse radio ultra wideband (IR-UWB) over a new simulation platform developed for this purpose. The simulation platform is built on an existing network simulator: global mobile information system simulator (GloMoSim). It mainly focuses on the accurately modeling of IR-UWB physical (PHY) and medium access control...
Although recent high-end interconnection network devices and switches provide a high performance to cost ratio, most of the small to medium sized PC clusters are still built on the commodity network, Ethernet. To enhance performance on commonly used Gigabit Ethernet networks, link aggregation or binding technology is used. Currently, Linux kernels are equipped with software named Linux Channel Bonding...
The task of finding and sustaining routes in mobile ad-hoc networks (MANETS) is an important factor in determining the efficiency of any MANET protocol. MANET characteristically comprises of wireless mobile hosts whose communication with each other is devoid of any fixed infrastructure. Absence of fixed infrastructures and host mobility thus constitute frequent unpredictable topological views. Positional...
The significant goal of routing protocol designs for wireless sensor networks is to improve the utilization rate of nodes and to prolong the lifetime of the network. But to a specific application, some other network performances, such as robustness, reliability, end-to-end delay, should be concerned and the conventional single path schemes may not be optimal to improve all these performances efficiently...
This paper presents a clustering routing protocol for Wireless Sensor Networks. The protocol emphasizes short transmissions, as they are energy efficient. With the goal of balancing the load on the nodes the protocol alternates the proactively stored multiple paths toward the Sink. Moreover, the paths are employed whenever a faulty path is discovered on the route from a source node to the Sink in...
IEEE 802.15.4 is a current major technology for low- rate low-power wireless personal area networks (WPANs). To study the reliability of its medium access control (MAC) function, in this paper we evaluate its packet dropping rate performance with focus on the reason to drop a packet. Considering the compatibility with the original protocol, when the access failure happens the packet isn't dropped...
Proactive routing protocols are mainly used in mobile networks since they are capable to distribute recent information very quickly. However, even reactive and hybrid protocols can be modified to achieve high end-to-end reliability in mobile networks while not increasing the end-to-end delay in a significant way. In this paper the performance of ad-hoc on-demand distance vector (AODV), optimized link...
Real-time data collection in a distributed embedded system requires dealing with failures such as data corruptions by malicious devices and arbitrary message delays in the network. Replication of data collection devices is employed to deal with such failures, with voting among the replica devices to move a correct data to the end-user. Here, the data being voted upon can be large-sized and/or take...
Procedures that provide a virtual link service aggregating bandwidths of multiple physical links are called a multilink protocol. The multilink protocol enables to utilize bandwidths of multiple links flexibly and to improve reliability of communications. This paper focuses on the resequencing function needed to preserve packet sequence integrity. The resequencing is generally performed by both each...
The Internet Engineering Task Force (IETF) reliable server pooling (RSerPool) group provides a protocol framework that supports server redundancy and session failover providing fault tolerance. The RSerPool protocol framework allows a pool of redundant information sources to be viewed as a single transport end point and is thereby able to provide persistent connections for end users. A performance...
Severe energy constraints of battery-powered sensor nodes necessitate energy-efficient communication protocols in order to fulfill application objectives of wireless sensor networks (WSN). However, the vast majority of the existing solutions are based on classical layered protocols approach. It is much more resource-efficient to have a unified scheme which melts common protocol layer functionalities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.