The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the impact of the hop-count and node density on the network performance of mobile ad-hoc networks (MANETs). The analysis as well as simulation results indicate that the throughput decreases significantly when the packets traverse over a long chain of hops. Especially when the link is beyond 4 hops, the throughput can only get less than 60% of the single hop throughput. In another...
With the rapid growth of wireless technologies and increasing number of mobile digital devices, mobility has been an important element on the Internet. NEMO Basic Support, designed by the Internet Engineering Task Force (IETF) to provide network mobility, is not efficient to offer low latency handoff in the case of nested mobile networks because it produces a long transfer delay and excessively large...
A number of routing schemes have been proposed for intermittently connected mobile networks. In these schemes, a node carries a message and forwards the message to another node that it meets. To increase the delivery success rate, typically, multiple copies of the message are created and forwarded to multiple neighbor nodes. The neighbor nodes are selected based on such criteria as the probability...
Opportunistic mobile networks consist of personal mobile devices which are intermittently connected with each other. Data access can be provided to these devices via cooperative caching without support from the cellular network infrastructure, but only limited research has been done on maintaining the freshness of cached data which may be refreshed periodically and is subject to expiration. In this...
Wireless Sensor Networks have been used in many mobile applications such as wildlife tracking and participatory urban sensing. Because of the combination of high mobility and low-duty-cycle operations, it is a challenging issue to reduce discovery delay among mobile nodes, so that mobile nodes can establish connection quickly once they are within each other's vicinity. Existing discovery designs are...
Mobile Access Gateway (MAG) is a component of Proxy Mobile IPv6 (PMIPv6) which provides network-layer transparent mobility to mobile nodes (MN). MAG serves a local geographical area and mobile nodes in its vicinity may attach to it to get the mobility services from its controlling PMIPV6 domain. Since MAG is the point of attachment of mobile nodes, negotiated and guaranteed quality of service (QoS)...
In MANETs (Mobile Ad-hoc NETworks), communicating nodes are powered by batteries which could not be re-charged in many practical usage scenarios. Hence, maximizing network lifetime is a critical optimization objective in routing protocols design for MANETs. To meet this objective, energy-consumption should be balanced among all mobile nodes. In this paper, we formulate the energy-aware route discovery...
In this paper we investigate the network lifetime maximization problem in a delay-tolerant wireless sensor network with a mobile sink by exploiting a nontrivial tradeoff between the network lifetime and the data delivery delay. We formulate the problem as a joint optimization problem that consists of finding a trajectory for the mobile sink and designing an energy-efficient routing protocol to route...
Routing in ad-hoc networks is nontrivial due to highly dynamic environment. An Ad Hoc Protocol can also mean an improvised and often impromptu protocol established for a particular specific purpose for these reasons several routing protocols targeted at mobile ad-hoc networks are being proposed. DSDV, AODV, TORA, LAR, and DSR are the most prominent among them. This paper investigates and undertakes...
Cellular networks are currently facing significant challenges as mobile Internet access adoption continues to grow over the subscriber base. The challenge that network operators are facing is that Internet data traffic consumes considerably more resources than voice calls, necessitating in that respect significant capacity enhancements. Further, this rise in system utilization has caused a considerable...
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture...
An important characteristic in trust management frameworks is how nodes obtain information about the trustworthiness of other nodes. Some trust management models are based on local information, while others use both information of neighbors and remote nodes. Despite the wide of information used, the existing trust monitoring approaches are mainly based either on passive monitoring mechanisms or on...
One of the challenging roadblocks stunting the development and commercialization of mobile ad hoc networks (MANETs), is the lack of a thorough understanding of the fundamental performance limits in MANETs. Distinguished from available works which mainly focused on deriving order sense scaling laws of the delay performance in MANETs and usually assumed a localized transmission range, this paper examines...
Heterogeneous long term evolution (LTE) networks evolve as a possible solution to accommodate the exponential growth of mobile data. However, the heterogeneity introduces several design challenges such as increasing interference and mobility overhead. In this paper, we propose Extended Synchronization Signals (ESS) to eliminate the unavoidable physical cell identity (PCI) confusion problem in dense...
Beaconless position-based forwarding protocols have recently evolved as a promising solution for packet forwarding in wireless sensor networks. Quite a few variants of this class of forwarding protocols have been proposed over the years. One common observation is that they have all been evaluated from the perspective of a single node. Although useful, but a solid understanding of the end-to-end performance...
Mobile sensors are a viable choice for providing monitoring service on a set of Points of Interest (PoIs) in a large sensing field. In some applications, each PoI should be covered periodically (sweep coverage), and the collected data should be delivered to the sink node timely (timely transmission), namely both the sensing and transmission delay constraints for each PoI should be satisfied, which...
Measuring and predicting users quality of experience (QoE) in dynamic network conditions is a challenging task. This paper presents results related to a decision-theoretic methodology incorporating Bayesian networks (BNs) and utility theory for quality of experience (QoE) measurement and prediction in mobile computing scenarios. In particular, we show how both generative and discriminative BNs can...
Groups of people with mobile phones using short range connections like WiFi and Bluetooth to propagate messages can be modeled as, with regard to regular absence of end-to-end connection, Delay Tolerant Networks (DTNs). The study of message transmission speed in such kind of networks has attracted increasing attention in recent years. In this paper, we present a realistic framework to model the message...
With the introduction of LTE networks operators need to plan a new, IP-based mobile backhaul. In this paper, we provide recommendation on dimensioning LTE backhaul networks links using three methods: delay-, dimensioning formula- and overbooking factor-based. Results are obtained from OPNET simulations with traffic model based on traffic forecast for 2015. A delay-based approach gives recommended...
We present a simulation-based study of the impacts of different types of attacks in mobile ad hoc networks (MANETs). We consider three common types of attacks: blackhole attack, jellyfish attack and neighbor attack. Specifically, we study how the number of attackers and their positions affect the performance metrics of a connection such as packet delivery ratio, throughput, end-to-end delay, and delay...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.