Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The underwater acoustic channel has unique features such as low bandwidth, high propagation delay, high channel error rates, multipath fading and so on and also sensor nodes are constrained of the resources such as limited power, limited memory space and processing speed. In this paper, we are concerned with efficient utilization of these resources by applying data aggregation technique on the sensor...
Wireless Sensor Networks are an emerging technology with wide potential to be used in many applications. One such application is the detection and prevention of disasters in scenarios such as forest fires, floods and earthquakes. In these disaster situations, the events being monitored have the potential to destroy the sensing devices, for example, they can be burnt in a fire, sunk in a flood, melted...
Aim at the energy-limited characteristic of wireless sensor network, extend the life of wireless sensor network when it isn't possible to supply energy, Focused on the LEACH protocol, raise a new WLEACH protocol by three improved aspects. The WLEACH protocol can extend the life of wireless sensor network by more than one time according to the simulation experiment.
Wireless sensor networks (WSNs) have emerged as one of the hottest research areas in recent years. These networks use radio communications as a media for transmission which make them susceptible to different types of attacks. Sinkhole attack is considered as one of the severe attacks that is launched by a compromised node to attract the network traffic away from the intended route. Consequently, sinkhole...
In this paper, we present analytical study of routing overhead of reactive routing protocols for Wireless Multihop Networks (WMhNs). To accomplish the framework of generalized routing overhead, we choose Ad-Hoc on Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET on Demand (DYMO). Considering basic themes of these protocols, we enhance the generalized network models by...
The consistent performance, energy efficiency, and reliability are important factors for real-time monitoring of a patient's data, especially in a hospital environment. In this paper a routing protocol is proposed by considering the Quality of Service requirements of the body area network data packets. A mechanism for handling delay-sensitive packets is provided by this protocol. Extensive simulations...
This paper proposes a simple Wireless Sensor Network (WSN)-based water level and water quality monitoring system for fish ponds. The proposed architecture uses RGB color sensors and provides a low cost and real-time monitoring system to grow healthy fish and avoid anomalies such as overflow or low water level and the death or disease of fishes for unhealthy water (e.g., rise of acid level due to the...
this paper addresses the efficient consumption of wireless sensor nodes¡¦ battery energy for sensor data collection in a large-scale wireless sensor network. In a large scale deployment of sensor nodes, nodes require a significant fraction of battery energy for establishing and maintaining sensory data routing path from each node to a base station or sink node. In order to reduce the energy dissipation...
Mobile Ad Hoc Networks (MANETs) is a collection of mobile nodes connected with wireless links. Security a major challenge for these networks. All the nodes in MANET must co-operate with each other to route the packets. In any network the nodes are trust each other nodes. There are many trust management schemes to provide general framework for trust evidence in manets but these schemes cannot provide...
In this paper, three different environmental monitoring application classes are investigated. The first class requires equal sensor density as in the case of a random incident source. The second class requires the sensors to be concentrated in the outer regions as in the case of a central incident source. The third class requires the sensors to be concentrated more in the center as in a case where...
Delay tolerant networks (DTNs), which are wireless networks prone to long delays and frequent disruptions are increasingly becoming common. We are exploring the challenges involved in designing effective event notification framework on DTNs. This paper presents the design and evaluation of a delay-tolerant event notification framework called DATEM based on the philosophy that failures and delays are...
Wireless Sensor Networks (WSN) may be a very useful technology for monitoring systems in hostile environments. Few works have treated the use of this technology in the particular metallic shipboard environment. This paper reports on the deployment of a WSN on board a ferry-type boat during realistic conditions. The network was tested during sailings and stopovers for several days. The results of our...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
The AS path prep ending approach in BGP is commonly used to perform inter-domain traffic engineering, such as inbound traffic load-balancing for multi-homed ASes. It artificially increases the length of the AS level path in BGP announcements by inserting its local AS number multiple times into outgoing announcements. In this work, we study how the AS path prep ending mechanism can be exploited to...
The use of Wireless Sensor Networks (WSNs) has developed rapidly in the last decade. Deploying tiny sensors with limited battery power in open and unprotected environment and dynamic topology in WSNs raises security issues in this kind of networks. Attacks can occur from any direction and any node in WSNs, so one crucial security challenge is to detect networks' intrusion. There are several algorithms...
The hierarchical routing protocol for wireless sensor networks is recognized as a technique that can reduce energy consumption of the networks and thereby increase their efficiency. Cluster head selection and network power management play important roles to improve the performance of this protocol. In this paper, a routing protocol for a small-scale wireless sensor network has been physically developed...
The post disaster mitigation is the immediate task to be carried out in disaster affected areas in order to reduce the extent of damage and for early rehabilitation and reconstruction. This paper proposes a design framework for an optimal control strategy to efficiently perform surveillance over a wide disaster hit area using a network of flying robots to determine the extent of damage promptly so...
Wireless Sensor Network (WSN) is one of the most demanding research topics prevalent in the modern research domain. WSN consists of densely deployed sensor nodes in the area which is to be sensed or monitored. Each sensor node is a tiny and power constrained device which is assigned the task of monitoring. Sensor networks have a very wide range of application and so they are much in demand. Every...
In a public network, it is unlikely for a node which has limited resources to collaborate without gain. For avoidance of the fact that nodes refuse to cooperate in MANET, several schemes classified as reputation-based and credit-based, are considered suitable for ad-hoc networks, whereas many of these schemes are based on proactive or reactive routing protocols but none of them is based on a hybrid...
MANET nodes use cooperative multi-hope packet forwarding technique hence they also perform the functionality of router. The individual nodes are constrained by resources such as battery life, limited network bandwidth and CPU cycles. To save its resources a node may deny to forward packets to others for saving the resources. This could lead to degradation of network performance. To mitigate this problem,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.