The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of this project is to support the healthcare networks by proposing the reliable transmission protocol for the transmission of emergency signals. Patient monitoring systems are gaining their importance as the fast-growing global elderly population increases demands for caretaking and to look after them. These systems use wireless technologies in adhoc environment to transmit vital signs...
Data delivery of packets in broad cast using wireless medium is the main intention of this paper, this will be done through a MANETS and should achieve reliable delivery. This paper addresses the problem of delivering data packets for highly dynamic mobile ad hoc networks in a reliable and timely manner. The process of routing the data packets to the destination is a challenging task. In order to...
Disasters around the globe have caused a tremendous loss of lives, severe damage to the property and the environment as well as an incredible shock to the survivors. Robust communication during the emergency rescue operations are of paramount of importance. In this article, we proposed flexible network architecture for Emergency situation using Wireless Mesh Network (WMN). This paper proposes a Report...
Advancements in today's technologies make it possible to offer competitive home-based healthcare services using software routers based on open source software combined with Commodity-Off-The-Shelf (COTS) hardware. In this paper, we propose resilient communication through multihoming for remote healthcare applications. The solution is based on Bidirectional Forwarding Detection (BFD) for fast failure...
There are high requirements on the timeliness and accuracy of the data when the wireless mesh network is used for the special scene which couldn't rely on public communication system, such as the emergency communication at disaster area, military communication and etc. To improve the reliability and robustness of the network communication, a multi-path routing algorithm of the wireless mesh network...
Wireless mesh networking technology has been extensively used in many practical applications, and the techniques that enhance networks reliability are always research focuses in this field. Wireless routing mechanisms are playing a more and more important role in determining wireless mesh networks reliability. A protection routing mechanism, Protection Ad Hoc On-demand Vector routing (P-AODV), is...
Disjoint multipath routing is an attractive approach for improving the reliability of data delivery in wireless sensor networks. Recently, the issue for maintaining the robustness and efficiency of the disjoint multipath routing against network failures such as network holes are being studied. Several protocols have been proposed to handle the network failures. However, they cause the large performance...
Limited energy supply is one of the main concerns when dealing with wireless sensor networks (WSNs). Therefore, routing protocols should be designed with the goal of being energy efficient. In this paper, we select a routing protocol which is capable of handling both centralized and decentralized routing. Mobility, a priori knowledge of the movement patterns of the nodes is exploited to select the...
Routing attacks have been identified for single path routing in wireless ad hoc networks. The effects of routing attacks on multipath routing have not been addressed so far. In this paper, an approach have been proposed to mitigate the black hole attack using AOMDV (Ad hoc on Demand Multipath Distance Vector) routing protocol. Some improvements have been made in AOMDV protocol. These improvements...
Wireless Networks play a vital role and has become an epicenter of all communication networks. In Ad-hoc networks, we need to enhance the effectiveness of dynamic information exchange in existing routing protocols with additional security measures. Our present research work is focused on developing a system that performs leverage search and propagation embedded with an enhanced security in dynamic...
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and predetermined organization of available links. Security is a major challenge for these networks due to their features of open medium, dynamically changing topologies. The black hole attack is a well known security threat in mobile ad hoc networks. However, it...
Mobile Ad Hoc Network consists of a large number of nodes. When we work with a large network with dense nodes, there are some nodes that have to bear the heavy traffic load, then over the time such nodes become weak and they start losing the packet. This packet loss is bearable up to some threshold value, but as the packet loss exceed this level, it disturb the whole network and now any kind of data...
Ad hoc wireless networks were considered to be the most suitable wireless communication system in order to support various applications in mobility environments. When providing real-time applications in ad hoc wireless networks, there are some requirements: i) the design of routing algorithm with packet delivery reliability while maintaining the established route for an arbitrary length of time (i...
The control applications of Industrial Wireless Sensor and Actuator Networks (IWSANs) are subject to strict requirements in terms of reliability and end-to-end delay. Transmission failures or deadline misses may seriously degrade the quality of control. In this paper, we propose a reliable real-time routing protocol in IWSANs for industrial control purpose. Node weight values and related node lists...
Due to the increased use of sensor nodes in a variety of application fields, wireless sensor networks need to handle heterogeneous traffic with diverse priorities to achieve the required quality of service. In this paper, we address the cross layer quality of service-aware scheduling for wireless sensor network with respect to delay and reliability in an energy efficient way. A node disjoint multipath...
As the demand for mobile ad hoc wireless network applications grows, so does their use for many important services where reliability and stability of the communication paths are of great importance. Therefore, a mobile ad hoc network (MANET) must be able to establish reliable communication channels which are protected by failure recovery protocols. One approach for existing failure recovery protocols...
Recent work has shown that network protocols which rely on precisely-timed concurrent transmissions can achieve reliable, energy-efficient, and conceptually simple network flooding. While these multi-transmitter schemes work well, they require all nodes in the network to forward every data packet, which has inherent inefficiencies for non-flooding traffic patterns (where not all nodes need to receive...
Our developed protocol Energy Aware Mesh Routing EMRP is a robust, cluster-based routing technique used in Wireless Sensor Network (WSN). It can provide a reliable, scalable, energy efficient multipath routing mechanism for data transmission to Base Station (BS). This scheme is also classified as a routing technique supporting virtualization WSN (VSN) as it can share network resources between different...
The RPL routing protocol published in RFC 6550 was designed for efficient and reliable data collection in low-power and lossy networks. Specifically, it constructs a Destination Oriented Directed Acyclic Graph (DODAG) for data forwarding. However, due to the uneven deployment of sensor nodes in large areas, and the heterogeneous traffic patterns in the network, some sensor nodes may have much heavier...
In this paper, we present the optimized routing protocol for multi-interface multi-channel wireless mesh networks (MIMC-WMNs). The MIMC-WMNs using original AODV (Ad hoc On-demand Distance Vector) routing protocol which defined in IEEE 802.11s standard can cause several problems, because of this, the safety, efficiency, reliability of network will be significantly degraded. Therefore, in this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.