The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion Detection Systems(IDSs) are widely used to detect both known attacks and unknown attacks performed by internal and external attackers in wireless networks. However, challenging issues for developing IDSs in Wireless Mesh Networks (WMNs) are 1) supporting interoperability and 2) handling volatile parameters. In addition, security standards for WMN are still in draft stage, and to protect...
An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the shortest delivery time or delay is obtained when the load is equalized throughout the network. Simulation results demonstrate that Local Voting achieves better performance in terms of...
We consider the problem of scheduling in wireless networks with the aim of maintaining up-to-date and synchronized (also called, aligned) information at the receiver across multiple flows. This is in contrast to the more conventional approach of scheduling for optimizing long-term performance metrics such as throughput, fairness, or average delay. Maintaining the age of information at a low and roughly...
In cellular networks, under ARQ and SINR model of transmission, the effective downlink rate of packet transmission is the reciprocal of the expected delay (number of retransmissions needed till success). We define the cellular network capacity as the ratio of the basestation (BS) density and the expected delay. Exact characterization of this natural and practical but non-trivial (because of SINR temporal...
The nature of the different types of end-to-end mobile devices in wireless networks where congestion is one of the biggest challenge is been addressed. This paper proposes a congestion aware routing strategy based on an evaluation of the weight value as a link index. The evaluation link cost considers the evaluation of the buffer delay, data rate, the MAC overhead and link quality. This approach uses...
The Epidemic protocol is an effective way to achieve information diffusion in opportunistic networks. Its performance depends on two key factors: the device mobility pattern,, the message transmission time. The mobility pattern determines the contact time, duration. If contact durations are shorter than the required transmission times, some messages will not get delivered,, the whole diffusion scheme...
The increase in number of users in Wireless Mesh Networks (WMNs) setups consequently represents an upsurge in numbers of services. Services such as internet, e-commerce, audio streaming, Voice over Internet Protocol (VoIP), Video on Demand (VoD), file and printer sharing among others will be clogged and ran over WMNs. This further leads to poor Quality of Service (QoS). Quick and timely discovery...
Recent studies suggest nodes in practical networks are more likely to communicate with nearby nodes than far away nodes, which is referred to as proximity preference. In this paper, we model proximity preference by assuming the probability of communication follows a power law distribution with respect to distance and analyze its influence on the throughput of a hybrid network. Moreover, L-maximum-hop...
TCP — Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios...
Wireless mesh networks (WMNs) can be considered as a key technology for next-generation wireless networking. However, field trials and experiments prove that the performance of WMNs still below expectations. Therefore, several challenging research issues need to be determined. The routing protocol is one of the important factors to be improved to be robust, scalable, secured and efficient. This paper...
Super dense wireless cloud network (WCN) provides for a low latency and reliable multi-user communications by leveraging on advanced transmission techniques of densely deployed relays acting as a macro-relay node (so-called WCN). Cloud Access (CA) nodes are gateways to the WCN and their queued packets are flooded through a dense self-contained WCN with massively interacting relay nodes. In this paper,...
Through real-world measurements we evaluate the impact of multihop-aware cooperative relaying on end-to-end route performance in wireless multi-hop networks. In an experiment with 50 devices in an industrial environment cooperative relaying increases the end-to-end transmission reliability for multi-hop links to nearly 100% while reducing the average packet delay. We suggest how to include relay selection...
A transmitter powered by a renewable energy source becomes self sustainable. In this paper, we consider the broadcast channel with a transmitter and N receivers. The transmitter is powered by a renewable energy source and has finite battery capacity. Transmitter requires power Pi to transmit a packet to ith user. In this setting, our objective is to minimize the expected backlog at the transmitter...
An emergency node-combined wireless network that uses balloons, electric vehicles, and unmanned aerial vehicles (UAVs) was proposed. We discuss the construction and specific issues of this network. The communication area is evaluated by changing the node elevation. In this network, the elevations of balloon and UAV nodes vary, and the communication area changes with elevation. In addition, the network...
We study the throughput and delay characteristics of wireless networks based on a content-centric network architecture, where users are mainly interested in retrieving content stored in the network, rather than in maintaining source-destination communication. Nodes are assumed to be uniformly distributed in the network area. Each node has a limited-capacity content store, which it uses to cache contents...
In this paper, we present the performance analysis of the reliable cooperative media access control (Reliable Cooperative-MAC) protocol, in order to enhance system throughput in bad wireless channel environments, using Adaptive Contention Window. The performance of this protocol is evaluated with mat lab simulation as well as mathematical analysis. Here Adaptive Contention Window Algorithm is used...
The limited network resources can be utilized effectively through the network coding method in Intermittent Connectivity Wireless Networks, but the number of coding nodes should be dynamically adjusted according to network status. To effectively improve the network resources utilization, a dynamical coding method is proposed. According to the estimated results of current network status, the number...
An infinite number of nodes travel on ℝ2, along straight lines, with a common speed υn. Any transmission across a distance d incurs a cost c(d). We devise and study, both by analysis (using stochastic geometry tools) and simulation, forwarding rules that transport packets towards a given direction using combinations of wireless transmissions and physical transfers on node buffers. The forwarding rules...
The multi-interface multi-channel (MIMC) technique is used for the appropriate utilization of WMNs as backbone network. Switching delays and distribution of routes plays an important factor in multi-channel networks. The shortest route in a multi-channel network might include multiple channel-switching's which would cause further delay in transmission than a longer route which requires much lesser...
Much attention has been paid to reduce the redundancy of broadcasting in MANETs. Since broadcasting produces many redundant packets, it will create a broadcast storm problem. Recently, many researchers are using network coding to reduce the number of transmissions in wireless networks. In this paper, we apply network coding technology into neighbor based topology control protocols to further reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.