The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent days, optical fibers have been developed as a transmission medium to carry traffic in order to provide various services in telecommunications platform. Failure of this fibre caused loss of data which can interrupt communication services. Thus, this paper will focus about protection scheme in order to guarantee the survivability of the networks. Besides, the scheme should provide better quality...
In this paper Dynamic Sleep Scheduling (DSS) for Minimizing Delay in Wireless Sensor Network is proposed. To reduce delay, DSS identifies nodes for different sleep/wake according to their traffic load at two levels: a) Nodes with different sleep/wake schedule requirement according to their different traffic load based on their topological importance in the network. b) Nodes with different sleep/wake...
The rationale of this work is that the incumbent primary user (PU) of a cognitive radio (CR) system relays its traffic through the secondary user (SU) network for an enhanced throughput. In return, it rewards the SUs with an incentive time during which they can use the complete licensed bandwidth to transmit their own data, without the need for spectrum sensing. With the objective of maximizing the...
ZRP (Zone Routing Protocol) is a hybrid routing protocol that combines proactive and reactive techniques. It distinguishes between two areas: proactive (or intra-zone) corresponding to the N-neighborhood in which it applies a proactive technique and reactive (or inter-zone) corresponding to the rest of the network (excluding the N-neighborhood), in which the reactive approach is applied. This hybrid...
The growing popularity of wireless sensor networks (WSNs) lead to the shifting of research focus from WSNs to wireless multimedia sensor networks (WMSNs). Most existing routing protocols for WSNs do not satisfy the need of continuous and higher data rate routing requirements of WMSNs. In this paper a new routing protocol (LEAR) for WMSNs has been proposed which establish routing paths based on node...
This paper proposes a simple path diversity algorithm (SPDA) for Interdomain routing. The SPDA uses source routing to find an alternate path from a source to a destination, and allows flexible division of traffic over the best and alternate path. The SPDA comprises three steps. First, the BGP protocol is extended to allow the BGP routing table to save the multiple paths for any destination. Second,...
Wireless Mesh Network (WMN) is an emerging technology that has played an important role in the wireless communication scenario. Wireless Mesh Networks are becoming popular as a way of providing Internet access in a cost-effective, easy, and fast manner. However, due to their intrinsic characteristics such as open medium, WMNs are vulnerable to various types of attacks, which aim at disrupting their...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
A single commodity network with multiple sources and sinks is modeled by a graph, where a vertex represents a node and a link between two connected nodes is modeled by a weighted edge. The weight of an edge represents the capacity of the link. We provide a distributed method to assign a flow to each link such that the traffic flows generated by the sources reach the sinks while a specific convex cost...
In mesh networks, the proposed distributed algorithm sets up (in advance or dynamically) maximal-length (virtual-) circuits to bypass IP routers, reducing their size and power requirements, increasing efficiency, and improving network performance. By finding and setting up the optimal configuration of bypass circuits in an IP network, the algorithm: (i) minimizes the total number of expensive, high-speed...
One of the challenges in routing for dense Wireless Sensor Networks (WSN) is balancing the traffic over different paths. Load-balancing methods inspired by physical phenomena such as electrostatics and optics have been studied in recent years, and the proposed methods are promising in energy-critical routing applications. Such methods model information flow in continuous domain in order to benefit...
A Framework for Integrated Routing, Scheduling and Traffic Management (FIRST) in Ad Hoc Networks is introduced. Unicast and multicast routes are established in coordination with the scheduling of transmissions and bandwidth reservations in a way that bandwidth and delay guarantees can be enforced on a per-hop and end-to-end basis. Results from detailed simulation experiments show that, compared to...
We address the optimal sink scheduling problem in wireless sensor networks (WSNs). The problem is inherently difficult since sink scheduling and data routing are tightly coupled. Previous approaches either have questionable performance due to no joint considerations, or are based on relaxed constraints. Our aim is to fill in this blank in the research. First, by discretizing continuous time, we develop...
We propose an efficient scheme for generating fake network traffic to disguise the real event notification in the presence of a global eavesdropper, which is especially relevant for the quality of service in delay-intolerant applications monitoring rare and spatially sparse events, and deployed as large wireless sensor networks with single data collector. The efficiency of the scheme that provides...
We study the load balancing aspect of routing algorithms in wireless ad hoc networks. We define a statistical measure called local coefficient of variance (lcv) to study the smoothness of the load distribution in the network. The importance of keeping lcv as low as possible in designing load balanced routing algorithms is demonstrated. We analyze how number of nodes, transmission range, network area...
Routing protocols for mesh and ad-hoc networks are designed under the assumption that the underlying channel is unreliable and nodes may be mobile. Therefore, route failure detection and recovery are important components of the design. However, under high traffic scenarios, an aggressive route failure detection technique may create a chain of routing messages which interfere with the data communication...
Vehicular ad-hoc networks will soon support a wide variety of inter-vehicle and vehicle-to-roadside applications. In many cases these networks will also co-exist with battery operated networks such as those deployed for sensor and mesh networked applications. In these latter types of networks, mesh node energy efficiency is often of paramount importance. This paper proposes improvements in mesh network...
Wireless Sensor Network(WSN) is being emerged as a prevailing technology in future due to its wide range of applications in military and civilian domains. These networks are easily prone to security attacks, since once deployed these networks are unattended and unprotected. Some of the inherent features like limited battery and low memory makes sensor networks infeasible to use conventional security...
Multi-rate multi-channel multi-radio wireless mesh networks (WMNs) have emerged as the next generation wireless mesh communications due to the availability of cheap, off-the-shelf IEEE 802.11 hardware. However, in a multi-rate IEEE 802.11 network, transmission over low rate links consumes disproportionally more time and resources as compared to that of high rate links. This performance anomaly occurs...
Ad-hoc network is a self organizing network that consists of mobile nodes. Each node acts as a router that forwards the data to other nodes in the network. Ad hoc routing protocols are affected by mobility of the nodes and network scalability. In this paper, the performance of Dynamic Source Routing (DSR) is studied through simulation, using NS2, and QualNet. The effects of mobility and network scalability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.