The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay Tolerant Networks (DTNs) are intermittently connected mobile networks, in which a fully connected path from source to destination does not exist. Therefore in these networks, message delivery relies on opportunistic routing where nodes use store-carry-and-forward paradigm to route the messages. However, effective forwarding based on a limited knowledge of contact behavior of nodes is challenging...
Next generation of wireless broadband network such as WiMAX MMR networks and LTE Advanced support high quality multimedia services with high data transmission rate. Most of the current broadband operates at high frequency and thus has limited transmission range. Multi-hop relaying technology is seen as an efficient solution that could enhance coverage and improves system capacity. However, overall...
The overall performance of hybrid ad hoc networks, which is the integration of ad hoc networks and fixed IP networks like the Internet is affected heavily by the discovery and selection of Internet gateways. Each of existing proposals is suited only for a limited range of network conditions and its performance can vary dramatically as the network conditions change. The obvious unidirectional links...
Assurance networks are designed to realize trustable Internet-Of-Things including terminal devices/infrastructure service applications for new generation networks. This paper proposes a unified design model for assurance networks and demonstrates the model, methodology and its application to mobile ad hoc networks. In the unified design model, in order to realize the assurance networks, an overall...
This paper is a survey of new and improved recent position based routing methods in Mobile Ad-hoc Networks. The referenced materials agree on the main challenge in creating energy efficient mobile ad-hoc networks. The quest is to realize a simple, yet efficient means of routing and managing the Mobile Ad-hoc Network communications with existing technology. Although many protocols have been proposed,...
Wireless Sensor Networks (WSNs) comprise of groups of tiny sensor nodes that are deployed for collaborative missions such as environmental monitoring, target tracking and surveillance. Due to the miniature size of the nodes, they are typically deployed in large numbers and communicate via multiple hops through a wireless shared communication channel. The successful implementation of such networks...
As mobile devices have become more powerful and ubiquitous in our daily life, sharing content objects among mobile platforms has become increasingly popular. Without the help of server infrastructures, clients usually form a mobile peer-to-peer (P2P) system as an ad-hoc network, and discover content objects by flooding query to neighboring peers. Such a flooding-based query method consumes communication...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. A malicious node can easily inject false routes into the network. A traditional method to detect such malicious nodes is to establish a base profile of...
Cognitive radio ad hoc networks (CRAHNs) are the ad hoc networks equipped with the intrinsic capabilities of the cognitive radio. As CRAHNs devices are mainly powered by battery, efficient consumption of energy is a key issue in CRAHNs. This paper focuses on energy-efficient routing in CRAHNs. It first compares CRAHNs with mobile ad hoc networks (MANETs), surveys the existing energy-efficient routing...
Specific properties of MANETs results in basic differences between wired networks and wireless networks in security solutions. In recent years, trust models have established themselves as a main approach for security and performance improvement of sections of MANETs. Recent researches have used trust models for problems like routing, admission control and information sharing in MANETs. In spite of...
Mobile users want to be connected to a network at any time for mobile computing applications, such as thin-client communications and network games, even while they are moving toward their destinations. They could take an alternate route (called a “longcut” route) if the route is geographically longer than a shortcut route to their destinations but gives more wireless network resources, such as bandwidth...
Tactical networks consisting of mobile wireless nodes with various platforms have been developed with Mobile Ad-hoc Network (MANET). The provision of Quality of Service (QoS) is still ongoing problem to be solved in MANET due to its lack of resources and harsh propagation environments. In these environments, link failure can be occurred because of frequent mobility of wireless nodes. During the route...
In this paper, we propose L3 handover scheme using SIP messages to minimize handover latency and packet loss in a MN with single interface. Packet loss and handover latency arise from L2/L3 association delay and IP configuration delay when the MN transfers internet connectivity from the serving access router to the target access router using legacy terminal mobility mechanisms. Therefore, seamless...
This paper proposes the two extensive data delivery schemes of Query-based PMIPv6 (Q-PMIPv6) and Signalling Query-based PMIPv6 (SQ-PMIPv6) in wireless networks. In the proposed Q-PMIPv6 scheme, when a correspond node (CN) sends the data packet to mobile node (MN), the Mobile Access Gateway (MAG), which CN is attached to, will send the binding query messages to Local Mobility Anchor (LMA) to get the...
This paper proposes a method for the IP layer link aggregation using flow information to use all available mobile interfaces for backbone network access simultaneously in a vehicle mobile router. For this purpose, we present the design of the IP layer link aggregation functionality and the design of the aggregator which is the essential part of the IP layer link aggregation functionality. In the proposed...
Consumer electronics such as cellular phones and portable computers with short-range communication capabilities have enabled the large-scale information dissemination through user mobility and contact, without the assistance of communication infrastructures. In this new paradigm, one challenge is to determine when and how to forward a message to the destination, possibly through a series of third-party...
This paper presents a cross-platform solution of smartphone-based mobile sink for wireless sensor networks, named uSink. With a cross-platform SD card, named uSD card, any smartphone with SD interface can be empowered with the capability to communicate with wireless sensor nodes. Furthermore, a middleware on mobile phone, named uSinkWare, is also designed to provide a typical mobile sink's functionalities,...
Using proxy servers to cache and shape network traffic can significantly improve the energy efficiency of the participating mobile clients. In this paper, we analyze the implications of hosting a BitTorrent proxy on a broadband router, which pushes the content to a mobile phone over wireless radio (WLAN or 3G). The amount of memory in a router is limited and therefore our interest is on how to use...
Clustering allows efficient data routing and multi-hop communication among the nodes. In this paper, we propose Overlapping Clusters Algorithm (OCA) for mobile ad hoc networks. The goal of OCA is to achieve network reliability and load balancing. The algorithm consists of two discrete phases. The start-up phase takes battery and bandwidth capacity, transmission range, density, mobility, and buffer...
Adhoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure or centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. There is a frequent link failure in adhoc Networks, which causes packet to be lost or packets doubt to reach destination. In this scenario...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.