The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents simulation results for a mobile ad-hoc network running Dynamic Source Routing reactive protocol under the conditions of limited availability and heightened response times of network nodes. Authors conclude that dynamic source routing stops being efficient in large networks and propose a hybrid routing protocol that includes the proactive phase and uses availability criterion...
In the recent years, mobile wireless technology has invaded the computer domain with the increased evolution of mobile devices in computing power, storage capacity, and other richer functionalities. Those devices are no longer restricted to phone calls and messages, but also for the access to internet (via WiFi, 3G, 4G …) and exchanging data via Bluetooth. On the other side, we have the great success...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to a number of protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life is still limited, in part due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel ad hoc protocol named...
Dynamicity and infrastructure-less nature of MANETs expose the routing in such networks to a variety of attacks, and moreover, make the conventional fixed policy routing algorithms inefficient. To deal with the routing challenges and varying behavior of malicious nodes in such networks, employing reinforcement learning algorithms and proper trust models seem promising. In this paper, we introduce...
Research in Internet of Things (IoT's) have surpassed the notions of connectivity and smartness, and entered into an era of sociable objects. A model based on socially-influenced interactions for “social objects” is presented to demonstrate its application and strength. Adopting an agent-based modeling method and simulation, a comparative study of competitive vs. cooperative behavior of peers in shared...
Device-to-device (D2D)-based mobile social networking (MSN) has been touted as a low-power, low-cost alternative to conventional MSN over cellular and WiFi networks. Nevertheless, the open nature of communication channels and the users' social activity that tend to decline over time expose D2D-based MSN to network contractions, which is a consequence of initial dropouts, combined with the jointly...
Computation offloading has received much attention to improve the performance or energy efficiency of mobile systems that have usually limited and constrained resource capacities. Yet, applying the computation offloading technique in opportunistic networks that are highly dynamic and often become volatile still remains a challenge due to the following reasons: (1) technical difficulties in constructing...
This paper puts forward a new trust model CTM (Credit Transfer Model) in the mobile P2P (Peer to Peer) network. Applying a hybrid P2P network topology structure, the CTM selects large servers in the cable network as super nodes which maintain the identity information, resource information, transaction records and trust information of ordinary nodes. The CTM simplifies the calculation of the node's...
Most of mobile nodes and wireless devices are equipped with 4G/LTE cellular connections and WiFi short range connections. Along with the growth of the Internet of Things (IoT) and M2M communication, in case that these nodes/devices use cellular connections simultaneously to access to the mobile core network, there is the possibility that many of them cannot establish the cellular connections due to...
When two nodes in an opportunistic network meet, a utility function is generally employed to select the data that have to be exchanged between them, in order to maximize the chance of message delivery and to minimize congestion. The utility function computes weighted sums of various parameters, such as node centrality, similarity, trust, etc. Most of the existing solutions pre-compute the weights...
In the last decades, natural disasters and terrorist attacks have been constantly challenging the emergency response systems all over the world. In order to coordinate field operations emergency response teams should use reliable network communication system. Some radios used to communicate in these scenarios use low frequency in order to be easily adaptable to different scenarios. These have limited...
Internet of Things (IoT) interconnects billions of smart sensors, devices, actuators, as well as people, over a distributed environment to work together towards a better and smarter physical world. However, technologies are still under development to allow us to most effectively make use of the ubiquitous "smart things" to accomplish the desired goals in various human activities. Service...
Many group activities can be represented as a complex network where entities (vertices) are connected in pairs by lines (edges). Uncovering a useful global structure of complex networks is important for understanding system behaviors and in providing global guidance for application designs. We briefly review existing network models, discuss several tools used in the traditional graph theory, distributed...
Broadcast is a fundamental operation in Mobile Ad-Hoc Networks (MANETs). A large variety of broadcast algorithms have been proposed. They differ in the way message forwarding between nodes is controlled, and in the level of information about the topology that this control requires. Deployment scenarios for MANETs vary widely, in particular in terms of nodes density and mobility. The choice of an algorithm...
Geographic routing protocols establish scalable and robust routes for multi-hop trsdansmission in wireless mobile ad-hoc networks, where accurate location information of the mobile nodes is needed. Aiming to alleviate the influence of location errors, existing works focus on modifying routing protocols through modeling the error sources and mobility prediction. In this paper, we propose a cooperative...
In this paper, we study the energy-efficient resource allocation in software-defined mobile networks with mobile edge computing and caching. With the introduction of caching and computing functions in mobile networks, content sources need to be selected according to the distribution of contents in caches, the capability of computational resources and the status of networks. Moreover, the network needs...
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless devices co-existing in the same radio spectrum. They demand harmonized, frequently even coordinated...
Internet mobile users concern more and more about their privacy nowadays as both researches and real world incidents show leaking of communication and location privacy can lead to serious consequence, and many researches have been done to anonymize individual user from aggregated location data. However just the communication itself between mobile user and their peers or website could leak considerable...
The tendency of any mobile technology is to automate as many of its processes. LTE (Long Term Evolution) introduces the concept of SON (Self-Organizing Network) that targets the automation of a large number of LTE processes. On the other hand, Peer to Peer (P2P) technology, even if it is used mainly in Internet and file sharing applications can bring significant improvements to LTE. This article discusses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.