The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a method for the IP layer link aggregation using flow information to use all available mobile interfaces for backbone network access simultaneously in a vehicle mobile router. For this purpose, we present the design of the IP layer link aggregation functionality and the design of the aggregator which is the essential part of the IP layer link aggregation functionality. In the proposed...
Cooperation enforcement in Mobile Ad Hoc Networks (MANET) and Wireless Sensor Networks (WSN) typically relies on separate detection and punishment schemes that isolate selfish nodes from routing and receiving network services. However, cooperative nodes then have to carry all the traffic. We propose a system that enforces cooperation smoothly and assures a fair distribution of bandwidth, as well as...
In order to achieve the best performance of a Wireless Sensor Network (WSN), it is a must to provide a challengeable routing algorithm , which consumes less power and allows more data collection. In this paper we have considered a WSN with mobile sinks and it is considered that the router follows the basic location update algorithm with traffic awareness. We show the performances of a router under...
The dynamic nature of mobile ad-hoc networks (MANETs) can easily lead to data being inaccessible due to constant route changes and network partitions. One method often used for increasing reliability and availability of data is replication. However, replication comes with costs, those of transferring and storing data and keeping track of consistency between replicas. For that reason, we have identified...
Multi-path routing has been studied thoroughly in the context of wired networks. It has been shown that using multiple paths to route messages between any source-destination pair of nodes (instead of using a single path) balances the load more evenly throughout the network. This paper introduces a traffic estimator which makes calculations based on previously sent packets and we introduce a new model...
The Cisco® MWR 1941-DC Mobile Wireless Edge Router is a cell-site access platform specifically designed to optimize, aggregate and transport mixed-generation Radio Access Network (RAN) traffic. It is used at a cell site as part of an IP-RAN or Cell Site DCN solution. It generates revenue from new cell-site IP-based services. In this paper, we introduce an IP RAN solution in which the MWR 1941-DC extends...
The rapid development of Internet traffic and the advance in link/interface technologies in the last few years have given rise to a strong research interest in Concurrent MultiPath (CMP) technology. According to the shortcoming of random CMP transmission algorithm, a novel Position-based Concurrent Transmission (PCT) algorithm is proposed. Compared with random CMP algorithm, NS2 simulations prove...
MIPv6 is one of the dominating protocols that enable a mobile node to maintain its connectivity to the Internet when moving from one access router to another. However, it suffers from long handoff latency and routing inefficiency. In this paper, we present a novel distributed mobility management scheme, ADA (Asymmetric Double-agents Architecture), which introduces two mobility agents to serve one...
It is expected that Peer-to-Peer (P2P) services will co-exist with the client-server based services such as IMS. Mobile users may subscribe to the traditional wireless cellular services while participating in P2P overlay networks. In this paper, a method is proposed to reduce the signaling overhead in a mobile P2P system. With the help of the underlying infrastructure, a mobile device in the P2P overlay...
Service discovery systems over MANETs are demanded to find available services at an appropriate cost, even if nodes in MANETs frequently move, randomly join or leave, and services may be revoked by their owners. SCN4M-DL is an adaptive directory-less service discovery system for MANETs, and it meets the above challenges by deeply coupling with underlying geographic routing algorithm and setting configurable...
The communication between wireless ad-hoc networks and infrastructure-based networks is essential to extend Internet beyond its traditional scope, to remote inaccessible areas, making Web services in ad-hoc networks available anytime, anywhere. The mobile nodes in a wireless ad-hoc network must be able to detect available gateways and select one of them if they want to have Internet access. In this...
In order to access the Internet ubiquitously, most of the devices are equipped with multiple radio interfaces. In this way, the multi-homed node can attach to multiple access networks through multiple communication paths simultaneously. Flow based path selection is typically needed for the user to be always best connected. Meanwhile, autonomic feature can be introduced into the path selection system...
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide end-to-end communication relations. However, passive signal detectors and traffic analyzers can still retrieve sensitive information from PHY and MAC layers through statistical traffic analysis. In this paper, we propose a statistical traffic pattern discovery (STPD) system. STPD intends to find out the sources...
On a mobile ad-hoc network environment, where the resources are scarce, the knowledge about the network's link state is essential to optimize the routing procedures. This paper presents a study about different pheromone evaluation models and how they react to possible changes in traffic rate. Observing how the pheromone value on a link changes, it could be possible to identify certain patterns which...
Recently, there are many researches about a trace-back method which specifies the source of transmitted packets in mobile ad-hoc network. In ad-hoc network, since there is no fixed infrastructure, each node has to record the traceback information and reconstruct the trace-path by itself. In conventional researches, since traceback is handled by each node, the variation of network topology by mobility...
Multihomed vehicular mobile networks (NEMOs) require an intelligent route control (IRC) scheme which can enable them to select a routing path that guarantees high quality of communications with correspondent nodes, as well as use the maximum available bandwidth of wireless and radio technologies connecting them to Internet. In this paper, we develop a two-level intelligent route control scheme which...
Quality of service support for MANETs is a challenging task due to dynamic topology and limited resources. The main purpose of QoS routing is to find a feasible path that has sufficient resources to satisfy the constraints. In this paper a novel QoS routing algorithm based on ant colony optimization is proposed. The proposed algorithm uses Ant-like agents to discover and maintain paths, that satisfy...
Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding most efficiency path. To deal with misbehavior in MANET, an incentive mechanism should be integrated into routing decision-making. In this paper firstly we review existing techniques for secure routing, and then propose to...
This paper proposed a density-awareness and delay-sensitive (DADS) data collecting scheme for wireless sensor networks. This scheme exploits static sink and mobile sink simultaneously to collect data from the whole network. In this way, DADS can solve the premature network partition problem, resulting from the heavy traffic load in the static sink's vicinity. On the other hand, the coexistence of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.