The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network coding is being viewed to have the potential for significant throughput improvement in network environment. However, these expected benefits are very fragile to malicious attacks, including message block content corruption and node compromise attacks. To solve these problems, both pollution detection and pollution correction based schemes have been proposed. These schemes are only effective...
Relay node (RN) plays a key role in cooperative communications and RN selection may substantially affects the performance gain. In this paper we address the issue of RN selection while taking into account Medium Access Control (MAC) overhead, which is incurred by not only handshake signaling but also frame retransmissions due to transmission error. We use a theoretical model to analyze the cooperation...
Most of Internet traffics are generated by peer-to-peer(P2P) file sharing applications. The main idea of P2P file sharing applications is that when a peer contributes a file with higher rate, the rate that the peer is able to download files from other peers will also be high. The mechanism works well in a bandwidth symmetric network. However, when a peer shares a large amount of files to other peers...
Services such as multimedia, VoIP, video-conferencing, social networking and others impose new requirements on providers and constraints on network designers. Fair Queueing algorithms like CSFQ or Stochastic Fair BLUE have been used to improve the quality of the packet transmission. Such mechanisms usually supervise the bandwidth consumption per-flow and become helpless in the presence of P2P traffic...
Routing is a key factor in the design of modern communication networks, especially in wireless ad-hoc networks (WANs). In WANs, both selfish and malicious nodes are the misbehaving nodes and are significant routing and security problems. The proposed mechanism presents a trust model to detect selfish and malicious nodes to avoid these nodes becoming routing nodes. In addition, the proposed paper provides...
In this paper, we study the maximum throughput of IEEE 802.15.4 enabled wireless sensor networks (WSNs). In general, deploying more sensor nodes would increase the throughput, but if excessive sensor nodes were involved to report data, the throughput might decrease due to packet collisions. In this paper, we analyze the CSMA/CA performance of the IEEE 802.15.4 enabled WSNs, and develop an analytical...
Transmission scheduling is a key design problem in wireless multi-hop networks. Many transmission scheduling algorithms have been proposed to maximize the spatial reuse and minimize the time division multiple access (TDMA) frame length. Most of the scheduling algorithms are topology-dependent. They are generally graph-based and depend on the exact network topology information. Thus, they cannot adapt...
IEEE 802.15.4 Wireless Sensor Networks (WSNs) share the 2.4 GHz Industrial, Scientific, and Medical (ISM) license-free band with many other wireless technologies such as IEEE 802.11b/g Wireless Local Area Networks (WLANs). Because of the low-power, however, IEEE 802.15.4 WSNs are potentially vulnerable to the interference introduced by the other wireless technologies such as IEEE 802.11b/g WLANs,...
Nowadays, the increasing need to digitally handle information everywhere everytime helps the spread of some new technologies and services. One of these technologies is Near Field Communication (NFC) which is a short range wireless connectivity technology. NFC technology invades the world by many trails in different countries as it gives out many ways of communication and transaction in a very comfortable,...
The Distributed Coordination Function (DCF) in the IEEE 802.11 protocol is a random access scheme based on the carrier sense multiple access with collision avoidance (CSMA/CA). In recent years, there have been numerous research on the performance analysis and model of DCF under the assumption that the transmission queue is always nonempty (i.e. saturation state). In this paper, we propose a dynamic...
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The military tactical and other security-sensitive operations are still the main applications of ad hoc networks, although there is a trend to adopt ad hoc networks...
Many measurement studies are showing that peer-to-peer (P2P) file sharing applications have evolved to become a major traffic source in the Internet. The ability to quantify their impact on the network is fundamental for network managers, who have to guarantee a satisfactory service level to their customers. We present here a scalable simulation model, which aims at providing useful criteria in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.