The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computation offloading has received much attention to improve the performance or energy efficiency of mobile systems that have usually limited and constrained resource capacities. Yet, applying the computation offloading technique in opportunistic networks that are highly dynamic and often become volatile still remains a challenge due to the following reasons: (1) technical difficulties in constructing...
Geographic routing protocols establish scalable and robust routes for multi-hop trsdansmission in wireless mobile ad-hoc networks, where accurate location information of the mobile nodes is needed. Aiming to alleviate the influence of location errors, existing works focus on modifying routing protocols through modeling the error sources and mobility prediction. In this paper, we propose a cooperative...
Tactical Edge Networks are one of the most challenging communication environments, where node mobility, constrained devices, and the wide use of wireless ad hoc channels for communications cause frequent link disruption and network partitioning. Additionally, applications running in Tactical Edge Networks often follow one-to-many and many-to-many communication models that require the nodes' cooperation...
A key property in tactical network environments is that the wireless network itself is typically the major limiting factor in how much information can be shared between users. In such environments, tactical operations often employ group communication protocols (one-to-many or many-to-many) to send information between users. This often results in situations where every message sent gets delivered to...
In order to respond to drastically increased traffic demands in mobile networks such as cellulars, opportunistic communication has been introduced as a data offloading strategy. Delivering the contents using peer-to-peer data dissemination is more preferable compared to epidemic diffusion schemes. To implement peer-to-peer dissemination, one needs to define the peer selection and content dissemination...
Mobile P2P (MP2P) networks is open and complex, and hence secure communication is a challenging issue for MP2P applications. Peers in the dynamic networks sometimes can obtain each other's trust and risk data, sometime or not. Nowadays, researchers can only study one for the two different scenarios, and thus the existing schemes are not universal and integrity. In this paper, we use the historical...
The paper focuses on the issue of path establishment in Mobile Ad-hoc NETworks (MANETs) suitable for challenging environments where traditional network designs underperform. The goal is to define, specify, design and assess solutions that can provide adequate-quality of service to specific missions that have to be deployed in hostile environments that imply propagation-harsh and otherwise unpredictable...
A peer-to-peer (P2P) network is composed of several peers. All peers may analyze data and then take some activities collaborate. Thus, assuring all healthy peers can reach agreement become very important. In real world, both peers and the transmission between peers may be malfunction, and this will cause the overall system works incorrectly. Furthermore, peers have mobility, and that will increase...
Increasing mobility and collaboration require novel schemes for group communication that actively support closed collaborations in mobile scenarios. Existing protocols do not sufficiently support, for instance, temporary losses of connections with the group. In this paper, we introduce Moversight, a new P2P group communication protocol, which is especially designed for closed groups in mobile scenarios...
The convergence of mobile networks and P2P systems has led to the deployment of a range of schemes for file storage over a network. This paper presents an approach to resilient file management and network storage through the design and implementation of a file dispersal system for a mobile P2P network, based on distributed hash tables (DHT). Inherent issues of security, reliability and efficiency...
IP Multimedia Subsystem is deemed to be the core of NGN (Next Generation Network) technology. IMS is considered as the important way to solve the fixed-mobile convergence and the combination of multimedia services. P2P technology is introduced to solve the complicated structure and high OPEX of IMS, so as to promote the reliability and extensibility. However the introduction of P2P technology brings...
Due to the advances in cellular devices and mobile technologies, now it has become possible to host Web Services (WS) on mobile devices. Web services have a broad range of service clients, whereas mobile phones have a large and expanding number of user bases. Therefore, combining these two trends by exploiting mobile devices as service providers is a promising next step. However, the usability, reliability,...
One of the critical challenges for service oriented computing systems is the capability to guarantee scalable and reliable service provision. This paper presents Reliable GeoGrid, a decentralized service computing architecture based on geographical location aware overlay network for supporting reliable and scalable mobile information delivery services. The reliable GeoGrid approach offers two distinct...
Mobile peer to peer (P2P) computing is becoming a major revolution in computing owing to advances in computing power, network connectivity and storage capacity of mobile devices. Mobile workflow is, however, characterized by the unreliability of mobile peers who can drop out of the network due to sudden loss of connectivity, drained battery and so on, thus making problematic the guaranteed completion...
We employ the publish/subscribe model in a P2P mobile tactical networking environment to offer an effective information dispatch service. Particularly, considering the requirements in mobile tactical networks, we investigate the problem of subscriber mobility management and propose a novel proactive handoff scheme to improve system responsiveness and reliability. Results from performance analysis...
In the double-layered mobile peer-to-peer (P2P) systems, peers are classified into two types, super peers and sub-peers; a super peer manages its sub-peers. The communications are done mostly among super peers to reduce the network traffic in searching files. In mobile networks, reliability that guarantees communications among peers is one of the crucial factors. However, most of the previous P2P...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.