The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
60-GHz millimetre-wave (mm-wave) communication is gradually becoming a promising candidate for the next generation wireless system to meet the demands of mobile applications. To compensate for high path loss, directional links are established in mm-wave communication system, which adds opportunity for spatial reuse. As one of its most promising protocols for commercial production, IEEE 802.11ad standard...
With the prevalence of Wi-Fi activity within a wireless network, there are growing interests in mobile surveillance and device tracking for better network services. With a good location estimation algorithm integrated into a wireless network, system administrators can closely monitor the network traffic as well as the behavior of the mobile users. By modifying the embedded software in off-the-shelf...
The conventional Mobile Ad-hoc Network (MANET) is composed of mobile nodes without any infrastructure. But, emergent traffic such as disaster positioning by using wireless infrastructure is indeed required. Therefore, network deployment for ad-hoc would associate WiMax with WiFi which is called 802.16e MANET Environment in this paper. Based on the 802.16e MANET environment, we propose a novel Hierarchical...
The Battery-Sensing Intrusion Protection System (B-SIPS) [1] initially took a non-conventional approach to intrusion detection by recognizing attacks based on anomalous Instantaneous Current (IC) drain. An extension of B-SIPS, the Multi-Vector Portable Intrusion Detection System (MVP-IDS) validates the idea of recognizing attacks based on anomalous IC drain by correlating the detected anomalies with...
IEEE 802.15.4 is the emerging next generation wireless standard designed for low-rate wireless personal area networks (LR-WPAN), which suit wireless sensor networks applications. It attempts to provide a low cost, low power and short range wireless networking. The QoS is more challenging in heterogeneous wireless sensors networks, where a diverse mixture of sensors for monitoring temperature, pressure,...
Access point sharing communities are an attractive solution for low-cost global mobile Internet access. However, existing communities all require a central authority in form of a certificate authority or an authentication server. In this paper, we show how such a community network can be created without a central entity. We introduce a mechanism called remote station approval; a host can use it to...
In this paper we address the Quality of Service (QoS) issues for applications such as voice and video that generate bursty traffic in mobile ad hoc networks while asynchronous power saving protocols are applied to wireless hosts. To provide QoS, we propose our new quorum-based power saving protocol called "consecutive quorum-based power saving (CQPS)". Within this torus-based protocol each...
This paper presents a deep simulation analysis of contention-based and collision-free MAC protocols in MANET environment. In particular, IEEE 802.11 and Evolutionary TDMA (E-TDMA) have been considered from an energetic point of view. Contention based MAC protocols such as IEEE 802.11 are often applied in the context of wireless ad hoc networks for their easy deployment and reduced control structure...
In this paper, we propose dynamic spectrum sharing methods for femto base stations (BSs) operated within a macro BS's spectrum area. As the spectrum sharing methods, we provide traffic pattern based resource hopping schemes of the femto BSs. Traffic pattern information which reflects channel activities for each subband used by the macro BS is utilized by the femto BSs to select proper resources. We...
TCP, the facto standard used in today's Internet, has been found to perform poorly in Mobile Ad Hoc Networks (MANETs). This is exacerbated by contention with increasing UDP-based high priority multimedia traffic and the class differentiation introduced in current QoS protocols, which results into TCP starvation and increased spurious timeouts. In this paper, we propose a cross-layer TCP enhancement...
In this paper, the performance of traffic based adaptive (TBA) and size based adaptive (SBA) backoff algorithms for IEEE 802.11 DCF has been evaluated. TBA backoff algorithm utilizes contention status in the channel for adjusting the backoff algorithm but SBA backoff algorithm assigns different priority levels based on packet size to traffic loads which is involved with best effort and real time traffic...
This paper discusses mobile device security and extends the original battery-sensing intrusion protection system (B-SIPS) (Buennemeyer, 2008) design by introducing the multi-vector portable intrusion detection system (MVP-IDS). MVP-IDS validates reported anomalous battery depletion from B-SIPS clients with real-time Wi-Fi and Bluetooth traffic using attack signature detection modules. To correlate...
As advanced integrated network architecture, ldquocognitive radio technologies,rdquo which aim to improve the spectrum efficiency, have been studied. In the cognitive radio networks, each node recognizes radio conditions, and according to them, optimizes their wireless communication routes with the integration of the heterogeneous wireless systems not only by switching over them but also aggregating...
The UDP transport protocol has been fore selected for the most of multimedia traffic transport on mobile wireless networks. Nevertheless, it exhibits some problems related to bandwidth sharing between several traffic sources, as well as TCP friendliness with established TCP connections on the network. In this paper, we propose a combined mechanism, the PRDR: proportional and derivative algorithm for...
Currently, the vertical handover between different technologies presents a real challenge to overcome; the service interruptions during handover pose a real problem to users. In this paper we focus on this problem, and we propose the MSCTP protocol characterized by its multi-homing technique, as vertical handover mechanism between the IEEE 802.16e and the IEEE 802.11e networks, in order to reduce...
The multiple backhaul mobile access router (MAR) can provide high capacity and high performance Internet access for emerging mobile wireless applications. In this paper we improve the MAR with the capability to stripe traffic from clients over multiple available network devices. The MAR allows different backhauls to be used simultaneously and accommodates diverse policies. We present experimental...
Future active-safety applications in vehicular networks rely heavily on the support for real-time inter-vehicle communication. The medium access control (MAC) mechanism proposed for the upcoming IEEE 802.11p standard intended for intelligent transport systems (ITS) applications does not offer deterministic real-time support, i.e., the channel access delay is not upper bounded. We therefore propose...
The integration of the widely spread 3rd Generation (3G) Universal Mobile Telecommunication System (UMTS) with the Wireless Local Area Networks (WLANs) has recently attracted considerable attention. However, addressing seamless and transparent handoff during mobility between these networks is still the biggest challenge to overcome. This paper evaluates the components of the handoff delay for the...
This paper proposes a low power adaptive (LPA) MAC protocol for ad-hoc Wireless LANs (WLANs), which is capable of operating efficiently under bursty traffic conditions. The protocol utilizes a Learning Automaton at each node of the WLAN. Each Automaton utilizes network feedback to select the mobile station that will be granted permission to transmit. We implement a low-power option to reduce the energy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.