The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delivering data from source vehicles to infrastructures, or convergecast, is a fundamental operation in vehicular networks. However, the network capacity of vehicular network is always limited because of scarce inter-vehicle contacts. Thus, throughput maximization of convergecast in vehicular networks is of great importance. The unique characteristics of vehicular networks, however, present great...
In delay-tolerant networks where connectivity between nodes is intermittent, replication-based delivery mechanisms are often employed to deliver messages in a store-carry-forward manner instead of end-to-end delivery techniques that are mainly used in traditional computer networks and mobile ad-hoc networks. However, multicasting with replication-based methodologies can induce considerable message...
In this paper the reliability of a real-time service for multicast transmission over lossy Mobile Ad-hoc NETwork (MANET) is addressed. The proposed system combines application layer channel coding based on Luby Transform (LT) code with multicast delivery in a wireless network exploiting PUMA (Protocol for Unified Multicasting through Announcements). The main goal is to achieve a real-time service...
Multicast communication in Mobile Ad-hoc Networks (MANETs) is emerging for wireless group communication which includes applications such as multipoint data dissemination and multiparty conferencing which made the analytical design and development of the MANETs in a very efficient manner. For MANETs there are several multicast routing protocols are proposed, but they perform well under specific scenarios...
The effort dedicated to the ultimate goal of designing an architectural framework for tactical mobile ad hoc networks (MANETs) has long been hindered by the excessive control overhead of routing protocols to maintain a full view of the network topology. This paper explores the viability of adopting network coding as a means of improving reliable data delivery while lowering control overhead in large...
Routing in delay tolerant networks (DTNs) in which most of the nodes are mobile and intermittently connected is a challenging problem because of unpredictable node movements and lack of knowledge of future node connections. To ensure reliability against failures and increase the success rate of delivery, erasure coding technique is used to route messages in DTNs. In this paper, we study how the cost...
We study replication mechanisms that include Reed-Solomon type codes as well as network coding in order to improve the probability of successful delivery within a given time limit. We propose an analytical approach to compute these and study the effect of coding on the performance of the network while optimizing parameters that govern routing.
With the popularity of mobile communication, the importance of backbone network of the mobile networks, i.e. mobile backhaul networks, has increased significantly. With the decreasing size of mobile network system cells, it is considered next-generation mobile backhaul networks will be mesh-based. To reduce the operating expenses, i.e. OPEX, of the network, mobile network carriers are beginning to...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Three applications in wireless networks where model-free stochastic learning is applicable, are discussed. The learning based optimization problems are formulated and simulation results are presented. Some open issues are also discussed.
This paper explores the attributes, layering models and objective functions in cross layer designs for mobile ad hoc wireless networks by taking all the statistical characteristics and constraints from the physical (PHY) layer, media access control (MAC) layer and network (NET) layer into consideration. This paper reviews the entire network optimization across all the PHY/MAC/NET layers. At the PHY...
Internet Relay Chat (IRC) is a critical application in military networks for maintaining situational awareness and conducting battle management at all echelons. But these networks are often subject to frequent disconnections, limited bandwidth, and long delays, especially when using satellite services and field radios. Such conditions are inhospitable to TCP, and thus the standard IRC protocol, which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.