Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
We study a simple one-dimensional, discrete-time network model that consists of two nodes moving on a discrete circle, changing their direction of movement randomly, and a single packet travelling in the clockwise direction, using combinations of transmissions between the two nodes (when they are co-located) and physical transports on their buffers. In this setting, we provide exact, explicit expressions...
A Mobile Adhoc Network (MANET) is featured by multi hop wireless connectivity with topology change due to highly mobile stations with autonomous configuration ability. Therefore, it is very challenging to develop vibrant and resourceful routing Protocol for MANET which also performs excellent routig with security feasibility. This paper presents a detailed study and analysis of various routing issues...
In Wireless Sensor Network (WSN) applications such as environment monitoring, building monitoring, etc., sensor nodes collect data and send it to the base stations or sinks for analysis. As the networks grow in scale, it necessitates using multiple sinks in the network. In here, throughput capacity and the average delay of WSN with multiple sinks, which are two main quantity of interest, has been...
Opportunistic Networks (Oppnets) are the recent evolution of Mobile Ad hoc Networks (MANETs), where an end to end path from the source to the destination does not exist, or exists for a very small amount of time. That is, the connections between the nodes are often intermittent, and the power of the nodes may go up or down. This paper aims at improving the forwarding strategy in the Epidemic routing...
Network virtualization has become one of the most prominent solutions that can efficiently deal with the dramatic increase of data demand in mobile networks. In order to allow multiple virtual networks to coexist in the same substrate network, the need for development of efficient virtual network embedding algorithms and techniques is imperative. The main purpose of this paper is to provide an optimization...
A mobile adhoc network is an independent system of mobile stations associated by wireless link to form a system. This system can be modeled in the form of an uninformed graph. Adhoc networks are peer to peer, multihope networks were data packets are transmitted to a source to destination through intermediate nodes (which serve as router). The infrastructure is not the main issue to setup MANET and...
Given a wireless network topology, a maximum number of users with specified Quality of service “QoS” requirements, including delay constraints, are allowed to transmit and receive data. Therefore, the best solution is to establish a partition of radio resources that provides a minimum quality for each user in the network. If all users can not be served in the same time, it is important to classify...
A Mobile Ad-hoc networks (MANETs) is composed of Mobile Nodes without any fixed infrastructure. Multicast routing in mobile Ad-hoc networks (MANETs) have many defiance due to implicit characteristics of the network such as node mobility, reliability, finite network resources etc. So, in this paper we have introduced a new scheme to improve the performance and efficiency of multicast routing protocols...
This paper deals with the movement pattern of mobile sinks in Wireless Sensor Network for efficient collection of information by the mobile sinks. We propose a path determination algorithm for the sinks to move in the network and cover the whole network area as much as possible. Multiple mobile sinks will move in their defined path based on the path determination algorithm to collect data from static...
Delay and capacity (throughput) are two important parameters to route data packets in Mobile Ad Hoc Networks (MANETs). In this paper, a new connectionless routing algorithm has been proposed to overcome the performance limit. The proposed algorithm is an extension of dynamic virtual route (DVR) algorithm. Mobility degree of nodes' neighborhood is used to calculate two mobility metrics. Mobility metrics...
In this paper, the performance of spectrum adaptation in cognitive radio networks (CRNs) with elastic traffic is analytically evaluated. Contrary to most of the previously published related works on spectrum adaptation in CRNs, in this paper both call buffering and unencumbered service time with non-exponential probability distribution are considered. To reduce the negative impact of the interruption...
Opportunistic networks are delay tolerant networks with sparse nodes. Nodes in an opportunistic network make use of a store-carry-and-forward method to communicate among themselves. Performance of routing protocols that have been developed for opportunistic networks vary based on the movement pattern of the nodes. This paper introduces an individual path based mobility pattern and analyzes the performance...
This paper examines the lightweight cryptography primitives and proposes a novel integration mechanism of primitives to provide complete cryptography services for resource constraint Mobile Ad-Hoc Networks (MANETs). In this work, Tseng's protocol is modified to integrate primitives [30]. In order to evaluate the performance of secure MANETs, software; throughput, jitter & end to end delay; and...
In Emergency MANETs (eMANETs), the broadcasting nature of the wireless medium, the lack of pre-established trust relationship among nodes, and the frequent topology changes, cause some serious security challenges, making the network vulnerable to malicious attacks such as wormhole attacks. This paper investigates a recently proposed Advanced Encryption Standard (AES)-based routing algorithm (so-called...
Due to increased adoption of digital consumer services, Mobile Ad-hoc Networks (MANETs) are gaining importance in real-life business applications. MANETs are wireless networks consisting of a set of mobile nodes and enables multi-hop peer-to-peer routing without any requirement of predefined infrastructure for its deployment. There are several works in literature for improving the Quality of Service...
The wide deployment of smart phones has begun to make them pragmatic deployment environments for real-world at-scale MANETs (i.e., to provide peer-to-peer based non-cellular services). Such services, of course, will be subject to cyber-attacks, one of the simplest of which is radio frequency (RF) jamming. The success of these MANETs will require both: i) robust and accurate methods of detecting when...
Tactical Wireless Networks (TWN) are a cornerstone of military communications in deployed environments. In TWNs bandwidth and network resources are extremely limited; efficient security mechanisms must be considered as networks become exposed to multinational access, influence and composition as well as increasingly complex security protocols. The communication burden of the WSN Authorization Specification...
Vehicular Delay Tolerant Networks (VDTN) are used to distribute a large amount of mobile data by high-capacity device-to-device communication. Given a number of available vehicles in VDTN, the current vehicular data sharing models always utilize all of them to achieve the best effect, failing to balance the performance gained and cost of employing them. Taking the cost into account, we study the problem...
In the past decade, multipath routing has been proposed to provide reliability for mobile ad hoc networks (MANETs). As wireless mesh networks become more and more popular, performance evaluation of different routing algorithms is required in static scenarios. Performance comparison between unipath routing and multipath routing is conducted in this paper. From the simulation results we find that multiple...
Beaconing is an important technique for the broadcast of surveillance information, e.g., between aircraft, as well as for the exchange of neighborhood information in mobile ad-hoc networks. For aeronautical communication and surveillance, the scarcity of available spectrum is an important issue. Therefore, this paper compares the spectral efficiency of two advanced beaconing schemes to plain Aloha...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.