The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we develop and study a model to identify cost optimized Multi-Path Entity (MPE) locations in the context of hybrid fixed and mobile access for a large German telecom operator. We consider the operator's network architecture as well as the related cost components including network elements and nodes. The objective is to support future network planning with a techno-economic sensitivity...
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
How to measure and maintain connectivity is an important issue in ad hoc networks. A special case of such network is Wireless Sensor Networks (WSN), which are often deployed in harsh environments and also susceptible to a number of problems that may negatively affect the connectivity among the nodes. An additional factor that increases the cost of connectivity maintenance in ad hoc networks is when...
A mobile ad hoc network consists of only mobile nodes without the access points and the center server. In the mobile ad hoc network environment, a set of nodes in the network and the network topology are frequently changing due to the node appearance, the node disappearance, and the node movement so that it is not easy for users in the network to obtain the services provided in the network. Therefore,...
Multi-hop wireless broadcast is a critical component in ad-hoc wireless networks. Vehicular Ad-hoc Networks (VANET) in particular utilize broadcast as a primary communication mechanism in many applications. Such networks exhibit situations of very high node densities so it is important that the broadcast protocols used to support applications on these networks scale well to high densities. This work...
MANETs are unplanned, self-organizing networks composed of mobile nodes that utilize mesh networking principles for inter-connectivity. They do not have a fixed infra-structure which makes them easy to build over an area. Mobile Ad hoc networks (MANETs) have several advantages compared to traditional wireless networks. These include ease of deployment, speed of deployment and decreased dependency...
In today's cellular networks, it becomes harder to provide the resources for the increasing and fluctuating traffic demand exactly in the place and at the time where and when they are needed. Moreover, a cellular network which can cover indoor areas and hot-spots is a complicated and expensive task. Therefore, a new hierarchical topology is put forward to solve the problem, and the topology have application...
Content sharing, dissemination and collaboration in open environments require the ability to send and combine data packets across network even in the absence of an end-to-end connected path [1]. User mobility plays a fundamental role in selection of intermediate relays for multi-hop communication [2]. Current schemes do not take into account the effect of power law distribution of inter-contact times,...
With the popularization of Internet and formation of wireless technologies provide significant impact on Internet and Communication Technologies. These technologies have support of one of famous technique known as Adhoc Network. Adhoc Networks are assortment of mobile nodes connected by wireless links and also receiving attention in the scientific community. In adhoc networks, routes may be disconnected...
Clustering is a method for hierarchical management of a network. Especially, clustering is often used in MANETs. Johnen et al. proposed a self-stabilizing clustering algorithm which treats a MANET as a vertex-weighted graph. The algorithm has autonomous adaptability against topology changes and weight changes, while it does not consider the stability of clusters. In this paper, we present a weight...
The web caching business has significantly changed over the recent years. The percentage of content that is suitable for caching has constantly decreased, e.g. due to unfavorable content formats like Flash or varying URLs due to usage of CDNs. While this of course has a negative impact on the effectiveness of caching, also other parts of the equation have changed: Transmission cost has dropped significantly,...
Mobile Ad hoc network consists of a collection of mobile nodes capable of forming instantaneous network with dynamic topology. Each node simultaneously acts as both router and host. Nodes can leave or join the network freely. Destination Sequence Distance Vector (DSDV) is a modification of the conventional Bellman-Ford routing algorithm for ad hoc networks. Dynamic topology of ad hoc networks makes...
Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks. Energy efficiency in the second method is achieved by power control technique. This technique is effective in high traffic...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. A malicious node can easily inject false routes into the network. A traditional method to detect such malicious nodes is to establish a base profile of...
This paper considers problems of logical traffic configuring and alignment. Channel reservation policy differentiation is proposed, according to calculated workload for current net structure.
In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Due to MANETs don't need the infrastructure, it can deploy fast and conveniently in any environment. Because of its easy deployment features, in addition to used in personal area networks, home area networks and so on. Specially, MANETs suit for military operations...
The dynamical network topology is the source of most challenges in VANETs (Vehicle Ad hoc Networks). In urban area, however, it is feasible to meet the challenge by taking advantage of the heavy traffic. This paper proposes a location aware virtual infrastructure (LAVI) based on recognition memory. Combining the memory of past cooperation with the location information, the mobile nodes can construct...
This paper presents a cross-platform solution of smartphone-based mobile sink for wireless sensor networks, named uSink. With a cross-platform SD card, named uSD card, any smartphone with SD interface can be empowered with the capability to communicate with wireless sensor nodes. Furthermore, a middleware on mobile phone, named uSinkWare, is also designed to provide a typical mobile sink's functionalities,...
Ad hoc networks are useful for providing communication support where no fixed infrastructure exists or the deployment of a fixed infrastructure is not economically profitable, and movement of communicating parties are allowed. Due to the dynamic topology, developing better routing protocol became a challenging task. The Dynamic Source Routing (DSR) protocol is a simple and efficient routing protocol...
Clustering allows efficient data routing and multi-hop communication among the nodes. In this paper, we propose Overlapping Clusters Algorithm (OCA) for mobile ad hoc networks. The goal of OCA is to achieve network reliability and load balancing. The algorithm consists of two discrete phases. The start-up phase takes battery and bandwidth capacity, transmission range, density, mobility, and buffer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.