The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile ad-hoc network is networks that are collection of mobile device that can communicate and share information between each other, without any predefine infrastructure or centralized system. Another challenge in MANET is energy constraints because each of the mobile nodes is operated by limited energy battery. This paper presents a new on-demand power saving routing algorithm for mobile ad-hoc...
A mobile adhoc network is an independent system of mobile stations associated by wireless link to form a system. This system can be modeled in the form of an uninformed graph. Adhoc networks are peer to peer, multihope networks were data packets are transmitted to a source to destination through intermediate nodes (which serve as router). The infrastructure is not the main issue to setup MANET and...
In mobile ad hoc networks (MANETs), nodes usually have limited radio power and transmit in a very limited area. Communication beyond a node's radio range requires multiple hops between nodes, which in turn, requires nodes in MANETs to cooperate with each other in forwarding packets from a source to a destination. Problems in cooperation arise in self-organizing MANETs where selfish nodes exist. Selfish...
Mobile Ad hoc Networks (MANETs) are used for node to node communications for a fixed purpose under mobile conditions. Different applications have found MANETs useful for communication tasks. The challenges while such a communication is performed are plenty. Although a number of protocols have facilitated the communication between mobile nodes, there is an unavoidable interruption in the network due...
This paper analyses two techniques that mitigate the routing misbehavior in wireless ad hoc network, watchdog & pathrater. By reconstructing the watchdog, we eliminate the collision problem which tends to be the weakness of this mechanism and make this algorithm have an better performance in mitigating routing misbehavior in wireless ad hoc network.
The main deficiency of standard TCP and all existing variations in ad hoc mobile network arises in its inability to classify packet losses. Conventional TCP diagnoses all losses due to congestion since non-congestion losses are rare and ignorable in wired network. However, these losses are generated frequently in MANET due to signal attenuation, interference and node's mobility. In order to prevent...
Publish/Subscribe system is an asynchronous and multi-point communication system, which decouples communication space from communication time and control flow completely. It adapts well to highly dynamic network environments and data-centric networks. This paper presents an Opportunistic Networks based Message Publish/Subscribe Scheme (ONMPSS), which can calculate the number of subscription requests...
Social networking is increasingly becoming a popular means of communication for online users. The trend is also true for offline scenarios where people use their mobile phones to network with nearby buddies. In this paper, we propose a distributed tuple space for social networking on ad hoc networks. We describe the tuple space model and its operations, and give evidence of its advantages for ad hoc...
The characteristics of mobile ad hoc networks cause a number of challenges to security design such as lack of infrastructure, shared wireless medium, stringent resource constraints and highly dynamic topology. Key management is a central aspect for security in mobile ad hoc networks. While central servers generate and distribute the keys in traditional wired networks, distributive key management systems...
This paper presents the state of the art in biologically inspired ant based routing in wireless mobile ad hoc networks (MANET). The motivation for using ant-like mobile agents for providing routing information to mobile hosts in MANETs stems from the fact that ant-like mobile agents do not require high bandwidth overhead compared to MANET proactive routing protocols for disseminating the topology...
Mobile Ad hoc NETworks (MANET) and Peer-To-Peer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related research activities have been mainly developed by different research communities, nullifying therefore the idea of an unitary approach able to assure effectiveness integrated solutions. In this paper, we propose a DHT-based routing...
In this paper, we propose a new routing protocol for ad hoc wireless networks, which is based on DSR (Dynamic Source Routing) on-demand routing protocol. Congestion is main reason for packet loss in mobile ad hoc networks. If the workload is distributed among the nodes in the system based on the delay of the paths, the average execution time can be minimized and the lifetime of the nodes can be maximized...
Mobile ad hoc network (MANET) is self-organizing, infrastructureless, multi-hop network. The wireless and distributed nature of MANETs and the very bad security environment in battlefield bring a great challenge to securing tactical mobile ad hoc networks. Most schemes proposed recently focus on specific security areas, such as establishing trust infrastructure, securing routing protocols, or intrusion...
First we introduce the characteristics of the opportunistic networks, and analyze the shortcomings of the main acquisition strategy in this kind of network, such as low success rate and low efficiency. With this in mind, we propose a hybrid strategy called "Pull-Push" Based Algorithm (PPBA). In this algorithm, not only the source node actively disseminates some copies of service information,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.