The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the work that is done embedded in the EEnergy project “E-DeMa” to simulate powerline communication systems (PLC) for access and inhouse applications in a smart grid scenario. The simulation is implemented in a C++ builder using OMNeT++ and its sub module INET. OMNeT is an event based network simulation tool, and INET is a collection of common network units and technologies, so...
The medium access control being the main source of energy wastage in wireless sensor networks, energy-efficiency is always kept in mind while designing the communication stack. Especially, versatile preamble-sampling MAC protocols emerged to offer a suitable solution over multiple deployment characteristics. For instance, some works have targeted burst transmissions while others have focused on long-term...
The performance of traditional TCP congestion control protocol degrades when congestion and contention increase in ad hoc networks that use the IEEE 802.11 DCF. Many of the problems result from medium contention at the media access control (MAC) layer. In this paper, we present a new contention-based congestion control (CBCC) method according to a novel congestion information from MAC layer. This...
Despite their limited resources, especially energy, wireless sensor networks (WSNs) are being accepted in many application areas. This makes them a challenging yet an appealing research area. Evidently, a lot of research work revolves around energy efficiency in order to prolong WSNs lifetime. A prominent amount of work suggests keeping radios of sensor nodes in low power sleep mode for most of the...
In this paper, a collision-free on-demand multiple access (CF-ODMA) protocol for mobile ad hoc networks is proposed. In the CF-ODMA protocol, every node obtains collision-free polling service by channel reservation. In addition, a collision resolution algorithm is presented to guarantee that in the present of reservation collisions the access nodes can successfully access channel in sequence, and...
Interoperable DEVS modeling and simulation is desirable to enhance model composability and reusability with DEVS models and non-DEVS models in different languages and platforms. The barrier to such interoperability is that DEVS simulators implement the DEVS modeling formalism in diverse programming environments. Although the DEVS formalism specifies the same abstract simulator algorithm, different...
Underwater sensor networks are typically distributed in nature and the nodes communicate using acoustic waves over a wireless medium. Such networks are characterized by long and variable propagation delays, intermittent connectivity, limited bandwidth and low bit rates. Due to the wireless mode of communication between the sensor nodes, a medium access control (MAC) protocol is required to coordinate...
Wireless sensor networks operate in constrained environments. In addition to the limitations in terms of energy, memory and computation, the use of mobile sensors has recently been contemplated. However, only a few medium access control protocols consider the dynamic of such scenarios. In this paper, we present potential problems that could arise with nowadays protocols operating in mobile environments...
DCF (distributed coordination function) of IEEE802.11 MAC protocols uses binary exponential increasing mechanism, called BEB (binary exponential backoff) algorithm. Due to the lack of a mechanism evaluating the channel condition, it can not tune the value of contention windows adaptively, according to the actual network traffic. By introducing the network allocation vector count in routing protocol...
NETCONF protocol based on XML can well solve some problems in the SNMP. When managing the variety network equipment of complex network, the versatility and scalability of the management system of the simple NETCONF have become a major problem. This paper applies Web Services to NETCONF network management, using SOAP,WSDL,UDDI and other technology, we make some improvements to NETCONF network management...
OverSim is a new open-source overlay network simulation framework based on the discrete event simulation system OMNeT++. OverSim includes several structured and unstructured P2P (peer-to-peer) protocols. It also includes an underlay model derived from the INET framework of OMNeT++, which includes simulation models of all network layers from the MAC layer onwards. For this and other reasons, this framework...
In this paper, we present a provably secure routing protocol for wireless sensor networks, called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is introduced to guarantee the correctness and integrity of the messages. And we prove that under the formal security framework proposed by Acs et al, by using a mathematically rigorous proof technique, S-SPIN is secure if the...
In this paper, we embody KS-MAC protocol based on Korea national standard (KS X 4600-1) Class A protocol with NS-2 simulator and verify its performance. Also, we develop optimized high speed MAC in medium-voltage and propose efficient topology. Compared with experiment results and simulated results are quite analogous. With help of this simulation, when construct network with multi-node, we easily...
This paper addresses the flow allocation problem in multi-hop wireless networks. We define and formulate a new interference model, referred to as the Node-based Interference Model, to better capture the behavior of medium access control protocols and the physical layer interference issues. Based on this model, we formulate the problem as a cross-layer network utility maximization problem that considers...
The IEEE 802.15.4 protocol has the ability to support time-sensitive wireless sensor network (WSN) applications due to the guaranteed time slot (GTS) medium access control mechanism. Recently, several analytical and simulation models of the IEEE 802.15.4 protocol have been proposed. Nevertheless, currently available simulation models for this protocol are both inaccurate and incomplete, and in particular...
With recent improvements in physical layer (PHY) techniques, the achievable capacity for wireless LANs (WLANs) has grown significantly. However, the overhead of IEEE 802.11 MAC layer has limited the actual throughput of a WLAN. A-MPDU aggregation suggested in IEEE 802.11n draft is a key enhancement reducing the protocol timing overheads that enables aggregation of several MAC-level protocol data units...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.