The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay-Tolerant Networks (DTNs) are wireless mobile networks, where the nodes are sparse and end-to- end connectivity is rare. Since DTN nodes are mostly energy-limited devices, there is an immediate need to have energy-efficient routing protocols, allowing the network to perform better and function longer. Besides, in the real world, people carrying the nodes form a lot of communities because of similar...
Although many efforts have been made to study the reputation evaluation of node performance in Mobile Peer-to-Peer Networks (MP2P), the existing methodology of node reputation evaluation are not applicable to the scenarios in dynamic networks. To improve the performance of MP2P, in this study, we develop a new evaluation of node reputation by combining an analytic hierarchy process with a fuzzy comprehensive...
On the basis of the research on the Ad hoc network routing protocol, this paper emphatically describes the LANMAR routing protocol. According to the realization of wireless Ad Hoc network routing protocol under the environment of OPNET 14.5 and the introduction of network simulation software OPNET and wireless protocol LANMAR-FSR principle, the paper explains in detail the process simulation modeling...
Research towards securing ad hoc networks has focused on numerous algorithms for detecting intrusions in specific kinds of attacks like black hole, sequence number, neighbor and packet forwarding attacks. In this attempt, impact of malicious node in ad hoc environment is discussed and implemented using ns2 in case of packet dropping attack. In this paper, MNI-AODV algorithm is proposed by incorporating...
Efficient link management is important for mesh networking. The links opened between neighbor STAs should be stable and ensure high probability of packet delivery. Various approaches of link management are usually compared by simulation. The core contribution of this paper is original link management efficiency criteria and an analytical model of decision-making process of link management in IEEE...
With emerging trend in technology wireless networks allow user to travel from one location to another. Mobile Adhoc network (MANET) is one of the subareas of wireless network that dynamically form infrastructure less temporary network. MANET is a collection of intercommunicating mobile nodes forming a temporary network without any centralized administration. Due to the dynamic property of mobile nodes...
A lot of research is ongoing throughout the world aiming to optimize communications in one of the special types of ad hoc networks well know as sensor networks. The utility and application domain of sensor networks ranges from commercial, public safety applications and military sector to be the most important ones. Some important challenges to various routing algorithms employed in such networks are...
The traffic characteristics in recent years have changed considerably having more video and audio traffic with critical real-time constraints. This situation is compounded by the increased number of mobile nodes communicating over Internet. Due to such high data traffic, the access routers are often overloaded with packets with different priority. The access routers have to act quickly enough to avoid...
In Delay and Disruption Tolerant Networking (DTN), Epidemic, PRoPHET and Spray and Wait protocols work by distributing one or more message copies (Bundles). They can naturally adapt to the mobile situation where the destination node moves from an old connection endpoint to a new connection endpoint because any Bundle copy may luckily be able to reach the new connection endpoint where the mobile node...
In dynamic wireless networks, effective modeling on link behavior would lead the network protocol design towards a predictive and reasonable way. Emerging mobile ad hoc network (MANET), however, is of self-organizing and infrastructureless paradigm, where topology dynamics are highly related to many complicated parameters, such as node density, mobility model, and transmission range etc, which make...
The handoff-based deterministic routing protocol (HDRP) gives better performance than the already existing delay and disruption tolerant networking (DTN) protocols in terms of delivery ratio and end-to-end latency by making use of the location information of the MH and applying the back propagation of the route update information technique efficiently. The protocol shows superior performance even...
Mobile ad hoc network is a hotspot in the wireless networks researching domain, and the routing protocol, which is as the core technology on network layers, is particularly important. By analyzing the working mechanism and key techniques of the Ad Hoc routing models, this paper puts forward a routing protocol based on network radius analysis. First, this paper sets up a LEACH model to analyze the...
A new dynamic routing protocol (CSTR) for mobile networks is proposed in this paper. The rules for mapping between cell number and corresponding co-ordinates are discussed. The routing protocol has been formulated with the help of a tree structure generated inter-alia. All possible routing paths could also be enumerated in a simple manner. This method is simpler than other techniques reported so far...
In modern society, wireless devices are commonly carried by humans. The wireless communication is therefore affected by pedestrian mobility in urban outdoor and indoor spaces which is the scenario we consider in this work. Many of the mobility models currently used for evaluating wireless communication systems have poor resemblance to reality. Although advances have recently been made, there is still...
DTN is able to adapt any mobility environment where any mobile routers and terminals are combined owing to the DTN's flexible hop-by-hop routing schemes. The existing DTN protocols like Epidemic, Prophet and Spray-and-Wait protocols rely on the message distribution mechanism where each DTN node produces one or more message copies. They can naturally adapt to the mobile situation where the destination...
In Mobile Ad Hoc Networks (MANETs), routing is a challenging task due to node mobility, traffic and network size. It is very important to analyze the scalability characteristics of the routing protocols with respect to these parameters. Zone Routing Protocol (ZRP) is considered to be one of the most scalable routing protocols due to its multi-scoping and hybridization features. We propose a general,...
Quality-based routing protocols are proposed to restrict message flooding within only high quality nodes in delay tolerant networks (DTNs). However, different quality threshold mechanisms have diverse impact on the network and we investigate this issue in the paper. Through theoretical analysis we show that heterogeneous threshold mechanism suffers a severe nodal cost imbalance problem. Furthermore,...
MANET is currently a hotspot in the wireless networks researching domain, and the routing protocol, which is as the core technology on network layers, is particularly important. Controlling node energy and increasing network lifetime are two keys to realize the transmission of efficient service for MANET. On the basis of analyzing classical MANET routing protocol, and combining with the idea of min...
Routing protocols for sparse mobile ad hoc networks are becoming important due to applications such as vehicular networks and emergency services. Simulation based performance evaluation of a given protocol is computationally demanding, requiring a significant amount of time and resources. For this reason, analytical approaches to performance evaluation are desirable; however, such approaches are challenging...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.