The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study the performance of two cross-layer optimized dynamic routing techniques for radio interference mitigation across multiple coexisting wireless body area networks (BANs), based on real-life measurements. At the network layer, the best route is selected according to channel state information from the physical layer, associated with low duty cycle TDMA at the MAC layer. The routing...
Friendly jamming is a physical layer security technique that utilizes extra available nodes to jam any eavesdroppers. This paper considers the use of additional available nodes as friendly jammers in order to improve the security performance of a route through a wireless area network. One of the unresolved technical challenges is the combining of security metrics with typical service quality metrics...
In ad hoc networks, terminals form a network with decentralized and self-organizing manners. Although this can surely extend its potentials, it also suffers from unstable and unreliable communication environments. As concerns this, a broadcast-based routing protocol called opportunistic routing (OR) has been proposed. ORs do not establish any specific route from a source terminal to a destination...
In this paper we consider a random wideband wireless-adhoc-networks (WANETs). We assume that the nodes are distributed according to a Poisson-Point-Process and consider routing schemes that select the next relay based on the geographical locations of its neighbor nodes. We consider the case that each node is equipped with a single antenna and the signal is transmitted using orthogonal-frequency-division-multiplexing...
Results and lessons learned from the implementation of a novel ultra low-latency geo-routing scheme are presented in this paper. The geo-routing scheme is intended for team-based mobile systems whereby a cluster of unmanned autonomous vehicles are deployed to accomplish a critical mission under human supervision. The contention-free nature of the developed scheme lends itself to jointly achieve lower...
Wireless Mesh Networks (WMN) are considered as robust architecture to provide reliable connectivity to fixed and mobile users. The redundant infrastructure provided by WMN can be efficiently utilized using multipath routing. However, the performance gain of multipath routing mainly depends on efficient path selection protocols. The omni-directional wireless medium, unstable link quality and mutual...
The use of wireless sensor networks (WSNs) can be advantageous in applications that serve in hostile environments such as security surveillance and military battlefield. The operation of a WSN typically involves collection of sensor measurements at an in-situ Base-Station (BS) that further processes the data and either takes action or reports findings to a remote command center. Thus the BS plays...
In this paper, we propose a spectrum map aided routing protocol for a distributed cognitive radio network. We assume the presence of dedicated sensors that capture the spatio-temporal spectrum usage statistics to create the radio environment map. We exploit the map to find not only the best hops along a route but also the best available channel in terms of the expected performance. Through the use...
The any cast routing protocol is useful in ad hoc and sensor networks as well as in the Internet. This study proposes an any cast routing protocol for ad hoc and sensor networks. The proposed method is lightweight and works with local information, which is obtainable at each node through advertisement packets transmitted from neighbor nodes. These characteristics are well suited to ad hoc and sensor...
Services to provide live streaming video from mobile sources are becoming widespread, including Ustream. It is expected that this type of services will be deployed particularly in local community networks using wireless mesh networks, in addition to the current services provided in the Internet. For providing live video streaming services in wireless mesh networks from mobile sources, adaptive multicast...
Community wireless mesh networks are decentralized and cooperative structures with participation rules that define their freedom, openness and neutrality. The operation of these networks require routing algorithms that may impose additional unnecessary technical restrictions in the determination of routes that can restrict the freedom of community users. We propose a receiver-driven discretionary...
This paper introduces a transmit beamforming strategy taking into account the positions of primary, secondary victim and intended secondary receivers, to achieve underlay secondary access in multihop cognitive radio networking. The transmit beamforming strategy defines a novel path optimization scheme that deviates from a preselected path given by the routing module, based on local information and...
In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the commercial and military communities with applications ranging from industrial control on a factory floor to reconnaissance of a hostile border. In both applications, the sensors act as data sources and forward information to a central sink or base station (BS). The unique role of the BS makes it a natural target...
Any casting is important in wireless sensor and ad hoc networks as well as in other information networks. This paper presents a highly reliable any cast protocol for sensor and ad hoc networks, employing a metric that reflects the connectivity of a route. To evaluate the connectivity, each receiver node distributes measurement packets by flooding. The connectivity between receiver nodes and adjacent...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
A common feature of emerging future Internet architectures is the ability for applications to select the path, or paths, their packets take between the source and destination. Unlike the current Internet architecture where routing protocols find a single (best) path between a source and destination, future Internet routing protocols will need to present applications with a choice of paths. Even if...
In this article, we propose a model to compare strategies to deploy a multiple brokers overlay to support a publish/subscribe middleware in wireless sensor networks. We provide expressions for the expected memory size required for buffering packets and the energy consumption at each node and evaluate how many brokers are necessary in a scenario and to compare brokers placement strategies. We demonstrate...
We propose a position-aware routing protocol for pre-handoff on OLSR (POS-OLSR) in Vehicular Ad-hoc Networks to minimize data loss when routing handoff. We develop a function mapping node's position to link metric and calculated the best route by minimize the path metric. To fitting with position-aware and pre-handoff method, we improved OLSR protocol with a novel MPR selected algorithm and protocol...
Due to the high cost of wireless network test beds, most of initial research work in this field depends on different network simulation tools to verify their effectiveness. Among those simulators, Ns-2 is one of the most widely used one. In this paper, we described different radio propagation models implemented in Ns-2 simulator in detail and applied two-ray ground propagation and rice an fading model...
We propose a routing metric for enabling high-throughput reliable multicast in multi-rate wireless mesh networks. This new multicast routing metric, called expected multicast transmission time (EMTT), captures the combined effects of 1) MAC-layer retransmission-based reliability, 2) transmission rate diversity, 3) wireless broadcast advantage, and 4) link quality awareness. The EMTT of one-hop transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.