The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A MANET or Mobile Ad-Hoc Network is decentralized in nature and it is basically a collection of heterogeneous mobile nodes which are autonomous and can communicate among themselves over the wireless link. In this infrastructure-less network, all the nodes dynamically route the packets by themselves with help of some protocols for sending or receiving the packet information. The ZRP or Zone Routing...
Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination. Although many routing algorithms for DTNs have been proposed, prior works generally focus on utilizing the delivery probability of network nodes and the social network structure for data forwarding. In this work, we investigate the use of the inter-contact...
Delay Tolerant Networks (DTNs) differ from the traditional Mobile Ad Hoc networks (MANETs) in that DTNs are not always interconnected. The issue of routing data in a DTN is considered here. Many routing protocols exist for DTNs. Some are based on comparing nodes to each other, whereas others focus on the internal properties of the messages they hold. There are wide ranges of protocols, and they perform...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have...
Self-organizing Mobile Ad-hoc Networks (MANETs) based on Delay Tolerant Networking (DTN), are powerful tools for maintaining or reestablishing telecommunications following disasters and other infrastructure disrupting events. However, such networks typically have very limited bandwidth compared with infrastructure-based networks, with the practical effect that they cannot satisfy every demand placed...
Cognitive radio is a dynamic technology that has a potential of addressing the spectrum scarcity challenge. However, routing in cognitive radio network is a challenge. The availability of the spectrum is probabilistic and it varies from one zone to other. The existing protocols do not guarantee the quality of service requirements for real-time data. Some of the challenges affecting the design of quality...
Network Simulator(NS-2) is an open source discrete event simulator, widely used by the networking research community. NS-2 provides flexibility for the researcher to extend the simulator functionality for any new area of research in networks. The primary objective of the paper is to investigate the development and simulation of the interface assignment in multi-interface multi-channel wireless adhoc...
Intrusion Detection Systems(IDSs) are widely used to detect both known attacks and unknown attacks performed by internal and external attackers in wireless networks. However, challenging issues for developing IDSs in Wireless Mesh Networks (WMNs) are 1) supporting interoperability and 2) handling volatile parameters. In addition, security standards for WMN are still in draft stage, and to protect...
In wireless sensor networks, each wireless sensor node records events occurred in its observation area with their observation time. Each wireless sensor node possesses its own local clock whose drift and offset are generally different from the others. In addition, it is difficult for the wireless sensor nodes to adjust drifts and offsets of their local clocks since transmission delay of messages between...
In this paper the performance analysis of a routing algorithm for MANETs called Service Zone Gateway Prediction (SZGP) is presented. This is a non-cooperative and hybrid type of routing with a hierarchical multilayered structure, incorporating pre-computed multipath hop-by-hop distributed connectivity. The goal is balance of the load among the nodes and reliable and energy efficient communication...
We consider a collision channel model without feedback based on a time-slotted communication channel shared by K users. In this model, packets transmitted in the same time slot collide with each other and are unrecoverable. Each user accesses the channel according to an internal periodical pattern called protocol sequence. Due to the lack of feedback, users cannot synchronize their protocol sequences,...
Device-to-device (D2D) communications and open-access small cells can be leveraged to off-load delay-insensitive and cost-sensitive data from burdened cellular networks. The resulted system is called hybrid wireless networks, whose capacity and delay performance have been studied extensively under a popular information-theoretic framework called scaling law analysis. Most studies, however, do not...
The increasing quantity of the smartphones and their embedded sensors result in the increasing number of applications developed to serve users need. These applications require a solution to exchange their desired data. Although there are currently many types of wireless communication, these networks rely on infrastructure and cannot be scaled to support for incoming enormous requirement in internet...
In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that...
An efficient and fair node scheduling is a big challenge in multihop wireless networks. In this work, we propose a distributed node scheduling algorithm, called Local Voting. The idea comes from the finding that the shortest delivery time or delay is obtained when the load is equalized throughout the network. Simulation results demonstrate that Local Voting achieves better performance in terms of...
Platooning has been identified as a promising vehicular traffic management strategy to improve road capacity, energy efficiency, and on-road safety in intelligent transportation systems (ITS). Inter-vehicle communications within a platoon and among multiple platoons can assist platoon control by maintaining a constant inter-vehicle distance, which in turn enhances road safety. An efficient method...
We formulate and study a broadcast problem arising in multi-channel duty cycling wireless body area networks (WBANs), where the sink needs to broadcast the control message to all sensor nodes. The objective is to design robust multichannel wake-up schedule with minimum worst-case broadcast delay while guaranteeing the full broadcast diversity regardless of clock drifts and asymmetric duty cycles....
Many vehicular ad hoc applications rely on vehicular broadcasting-based multi-hop routing to disseminate messages. In this work, we study the question of vehicular broadcasting-based routing. In particular, by modelling the vehicular message dissemination with a limited-time epidemic dynamics, we propose an online self-adaptive beaconing method to dynamically learn the optimal beaconing policy for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.