Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Ad-hoc networks are collection of self-organized, autonomous nodes (routers) and capable to communicate directly with neighbors' node through broadcast packet in within transmission range. Ad hoc network has a primary concern to provide protected communication between mobile nodes. In transmission channel, nodes can be a malicious node and compromise or breaches service, which makes security extremely...
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
During last two decades, Mobile Ad hoc Networks (MANETs) has been in widespread use. However, in some critical applications such as in battlefield or area sensing, due to the node mobility, limited power and sparse deployment density, MANETs may suffer network partitioning. Without a stable end to end path, these challenged scenarios could cause most existing ad hoc networks protocols to fail. In...
Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. In this paper,...
In wireless ad hoc networks, the constructed topology is preferred to be planar since a planar topology enables guaranteed delivery of packets without a routing table. Previous planar structures are statically constructed for the whole network. However, environmental or network dynamics such as channel status, interference, or residual energy will prevent such structures from providing the best service...
In this paper, the problems facing designers of peer-to-peer instant messaging protocols, specifically those intended to run over mobile ad-hoc networks, are discussed. In particular, the challenges of identity management and presence dissemination are addressed, with an efficient and user-friendly protocol described that solves them. As a side effect, a form of social network mining is offered that...
Routing in mobile ad hoc networks (MANETs) is central to their proper functioning. Network dynamics make the routing a real challenging task. Although a host of studies has been reported in the literature evaluating the performance of proposed routing algorithms, a deeper insight reveals some residual malfunctioning: wall effects, looping and inconsistency. In this paper, we first unleash the cover...
Due to the rapidly changing topology of vehicular ad hoc network (VANET), it requires the routing protocol can be able to find out comparatively more stable routes. But the routing protocols in existence are not taking the distinguishing features of vehicles and roadway into consideration, and this brought about challenges to these routing protocols' applicability in VANET. In this paper, we take...
Mobile ad hoc networks are a wireless network in which each node is vested with the responsibility to act as a router. The individual nodes are constrained by the resources such as battery power. To achieve maximum throughput with the available resources the nodes might behave selfishly. This could lead to severe performance degradation in network throughput, packet delivery ratio, packet loss increment,...
In recent years, investigations on ad hoc networks have received considerable interest due to its capability to deploy quickly without any infrastructure. And with the development of mobile terminal, mobile CSCW gradually becomes the developing direction of CSCW. The ad hoc networks' characteristics and the traditional CSCW's sharing mechanism are introduced at first. And then put forward the theory...
Clustering is used commonly in ad hoc networks for hierarchical routing. Size-bounded clustering has been proposed to restrict the maximum size of a cluster so that the routing load, and hence the energy drain, on the clusterhead is bounded. However, all the existing size-bounded clustering algorithms take the size bound as the number of nodes in the cluster. This approach may still result in high...
Wireless sensor networks experience a number of problems not found in wired networks, such as limited power resources, location identification and message routing in a wireless medium. Analysis of small world networks have shown that it is possible to transmit information from one node to another node some random distance away within a small number of hops (i.e. small world networks have a small diameter)...
In this paper, we propose a framework to apply the indexing techniques of formal language processing in multi-metric route classification and cost evaluation for WSNs. Specifically, we present an easy to compute, dynamic routing lexicon and a corresponding lexicographical algorithm for path selection in case of availability of multiple paths. The cost evaluation of paths and path selection in case...
Geometric greedy routing uses (virtual) geographic point locations as addresses for the purposes of routing, while routing decisions are made by each node individually based only on local information. It requires that the network topology is greedily embedded in a metric space through assigning virtual coordinates to the nodes in the network. Recent research pointed out that such scheme is significantly...
Tolerant network (DTN) is a kind of network with high latency and frequent disconnection. To guarantee the success of delivering a message to the destination and to make time cost as low as possible, routers in this kind of network (DTN) need to multicopy the message and store it longer than routers in other kinds of network. This paper focuses on the relation and reciprocity between routing and buffer...
Network quality of VANET (Vehicular Ad-hoc Network) is usually bad due to speed variation, high mobility, driver behavior, traffic density, swarm effect, environment complexity, et al. Speed variation dynamically changes the car-to-car distances frequently and results in broken connections. Besides, VANET's network topology usually deployed along with the roadside, the nearby car is very probably...
In virtue of its widespread application scenarios, especially in battlefield communication, disaster rescue, satellite and deep-space transmission, Delay-disruption Tolerant Network (hereinafter referred to as DTN) has become one of the most attractive focuses in research for future Internet. Due to the intermittent connectivity, mobility of nodes, signal interference, jamming in DTN, there exist...
Recent advances in networked systems and wireless communications have set the stage for applications with wide-ranging benefits. Perhaps the most natural problem in such systems is the ??efficient?? propagation of locally stored data. In order to address this problem, the notion of greedy embedding was defined by Papadimitriou and Ratajczak, where the authors conjectured that every 3-connected planar...
Recent advances in systems of networked sensors have set the stage for smart environments which will have wide-ranging applications from intelligent wildlife monitoring to social applications such as health and elderly care service provisioning. Perhaps the most natural problem in sensor systems is the ??efficient?? propagation of a sensed local event. In order to address this problem, the notion...
Ad hoc wireless networking is a new approach for wireless communication with its potential applications in very unpredictable and dynamic environments. These networks have no infrastructures for achieving end-to-end routing of packets in the network. The nodes communicate between each other without the intervention of centralized administration, thus each node acts both as a router and as a host....
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.