The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Transmission Control protocol has been essentially designed for wired networks, and its performance is not good for wireless networks. The objective of the present work is therefore to study a fuzzy based inference system based on the factors of expected throughput and actual throughput to dynamically adjust the congestion window size to improve the performance of TCP in Mobile Ad hoc Networks (MANETs)...
The design of efficient routing protocols for Ad hoc neworks is a complex issue. These networks need efficient algorithms to determine ad hoc connectivity and routing. MANET aims not only to provide correct and efficient routes between pair of nodes but also to provide energy efficient route to maximize the life time of ad hoc mobile networks. In this paper, a dynamic energy conscious routing algorithm...
A mobile ad hoc network (MANET) is a collection of mobile nodes which are able to communicate with each other without relying on predefined infrastructures or central administration. Due to their flexibilities and easy deployment, MANET can be applied in situation where network infrastructures are not available. MANET employs routing to provide connectivity for mobile nodes that are not within direct...
Ad hoc on Demand Distance Vector Routing Protocol (AODV) is an on-demand routing protocol for mobile ad hoc network with low power consumption as well as low-bandwidth overhead. The routing table in AODV, however, maintains only one route to the specified node. Therefore, the source node needs to re-initiate route discovery process whenever route failure occurs which leads to increase in routing overhead...
In a vehicular ad hoc network, vehicles can communicate with their correspondent nodes through the Internet using various wireless technologies. This kind of wireless networks brings a lot of new applications to metropolitan networks, such as online games, VoIP, etc. However, compared with traditional wireless networks, the high speed of vehicles and the limited transmission range of antennas introduce...
In sparse mobile social networks, the moving activity of nodes always happen in a specific area, which corresponds to some specific community. How to guarantee the higher packet delivery ratio while reducing forwarding delay in such networks, is a challenging issue and has not been widely investigated yet. Recently, additional super-node was introduced to ferry packets between the isolated areas....
MANETs are networks capable of communicating in a set of small, low cost, low power sensing devices. A wireless sensor networks is totally based on the limiting factor i.e. energy consumption. A wireless sensor network consists of large number of sensor nodes distributed or scattered in particular network region. MANETs consist of node that is highly mobile, so in particular the range of the nodes...
The paper explores and compare the effect of different types of wormhole attacks on the performance of On demand routing protocols in Mobile Adhoc networks (MANET's). The evaluation has been done by studying and comparing End to End delay and throughput for all drop, all pass and threshold type of wormhole attacks.
In this paper, we propose a secure data-forwarding scheme, called SATS, for delay-tolerant wireless networks. SATS uses credits (or micropayment) to stimulate the nodes' cooperation in relaying other nodes' messages and to enforce fairness. SATS also makes use of a trust system to assign a trust value for each node. A node's trust value is high when the node actively forwards others' messages. The...
Mobile infostation networks which achieve content distribution by exploiting the opportunistic contact among mobile users (MUs) and access points (APs) have attracted a lot of attention in the last few years. It is found that cooperation either between APs or MUs has a great impact on the network performance. However, in most of the existing works wherever cooperation is involved, cooperation among...
The growth of laptops, personal digital assistant (PDA) and 802.11/Wi-Fi wireless networking have made mobile ad-hoc network (MANET) a popular research topic recently. Due to the flexible deployment nature and the lack of fixed infrastructure, MANETs suffer from varieties of security attacks. In this paper, we propose the misleading routing attack (MIRA), which is different from the well known gray/black...
Deploying the static wireless devices (throw-boxes) at certain locations can help message dissemination among mobile nodes in delay tolerant networks. The mobile nodes traveling between throw-boxes form network links that carry the temporally stored messages at one box to another. However, the aggregated mobility between pairs of boxes reveals a time-dependent nature on its link delay (travel time)...
The thesis also puts forward a fast handoff method based on RSSI and LQI, which makes improvements on preset parameters, subnet selection, decision standards and reparation of switching failure. The new method which confirmed by the simulation not only overcomes the traditional problems in switching technology successfully, but also reduces the scanning and handoff delays, packet loss rate, improves...
Disruption-tolerant networks (DTNs) have gained great attractions recently by addressing intermittent network connectivity suffered due to short radio transmission range, high node mobility, sporadic node densities, etc. Data communication across DTN is achieved over store-carry-forward (SCF) paradigm by exploiting temporary wireless links and connections opportunistically arising from mobility nature...
This paper investigates the {\em access time} of mobile nodes to infrastructure networks in Mobile Hybrid Networks (MHNs), e.g., sensor-actuator networks, where mobile nodes move around the coexisting infrastructure networks. In such networks, mobile nodes may relay data packets in a hop-by-hop fashion, and eventually deliver packets to the wired networks. Our objective is to study the lower bound...
In mobile IPv6, packet transfer is interrupted due to the handoff of a mobile node, which results in burst packet loss. This transient behavior decreases the required quality of services for time-critical streaming media applications. This paper introduces an analytical model of streamed video over mobile IP networks considering the effects of handoff. The proposed model focuses on the effect of the...
In broadband wireless access network, continuous high speed data communication can be provided to mobile subscribers by well designed mobility management, where handover is a key element in maintaining air link to base station even in high velocity. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality...
We study the multicast throughput capacity for hybrid wireless mobile ad hoc networks (MANETs) with a directional antenna and delay constraint. The hybrid wireless network consists of a mobile ad hoc network with nodes and regularly placed base stations connected by high-bandwidth wired links. For the MANET, there are multicast sessions and each multicast session has one source which transmits...
Future mobile tactical networks are being developed to support an increased variety of data services (e.g. Blue Force Tracking, intelligence image or video reporting) in addition to the more traditional voice services. Such networks rely on an IP-based MANET stack, running over a UHF (Ultra-High Frequency) radio interface. Unlike legacy VHF (Very-High Frequency) radios, characterized by low bitrates...
In mobile opportunistic networks, we investigate the effect of infrastructures on content update process. In the network, an information provider continuously generates a time-sensitive content (e.g., news, twits or military commands) whose freshness decreases with time. This information is propagated to users throughout opportunistic contacts. Users prefer to have the more recently generated (i.e...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.