The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Multimedia Sensor Networks (WMSN) are new and emerging networks of wirelessly connected devices, which consist of cameras, microphones, infra-red sensors, scalar sensors and others. These networks are fast gaining popularity due to their potential to be incorporated in various applications, such as, traffic monitoring, border surveillance, smart homes, environment and habitat monitoring,...
Mobile Ad Hoc Network (MANET) is a mutually communication based on a dispersed administration. It has a dynamic topology and there is not any central point for network management. The dynamic topology character of MANET has caused it vulnerable and defenseless to different security attacks. In this paper we study the effects of Wormhole attack on MANET using both Proactive routing protocol (OLSR)...
The delay sensitive industrial control applications like Industrial process control, Environmental control, Gas leakage monitoring, etc. in this a reliable communication between sensor and base station are highly essential. Wireless Sensor Networks (WSN) becomes an immensely popular technology in such application as it offers low latency and high energy-efficiency in message transmission. Life span...
The field of Wireless Sensor Networks (WSN) is undergoing a major revolution, opening the prospect of significant impact in many application areas (safety, health, environment, food safety, manufacturing, telecommunications. Routing isfundamental such a network because there is no infrastructure that manages the information exchanged between network nodes. Two major classes of routing algorithms are...
Delay tolerant networks (DTNs), which are wireless networks prone to long delays and frequent disruptions are increasingly becoming common. We are exploring the challenges involved in designing effective event notification framework on DTNs. This paper presents the design and evaluation of a delay-tolerant event notification framework called DATEM based on the philosophy that failures and delays are...
In this paper, the connectionless multicast routing MCOM (Multipoint relay Connectionless Multicast) is introduced for mobile Ad hoc networks. MCOM adapts over a wide ranges of density of group members. It appears as unicast with few receivers and as flooding protocol, similar to Simplified Multicast Forwarding (SMF), with many receivers. MCOM utilizes the forwarding structure Multipoint relay (MPR)...
The multicast communication is one of the fundamental types of the modern network connections. Even though the concept is not new, and exists as a part of the TCP/IP protocol stack, the reality of the backbone networks has been rejecting the technology, mostly due to the economical reasons. On the other hand the development of the basic point to point connections increased the overall Internet capabilities...
Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, and tactical systems. However, lower sensing ranges result in dense networks, which bring the necessity to achieve an effcient medium access protocl subject to power constraints. Various MAC protocols with different objectives...
With the rapid growth of wireless technologies and increasing number of mobile digital devices, mobility has been an important element on the Internet. NEMO Basic Support, designed by the Internet Engineering Task Force (IETF) to provide network mobility, is not efficient to offer low latency handoff in the case of nested mobile networks because it produces a long transfer delay and excessively large...
In Wireless Sensor Network (WSN) researches, WSN routing algorithm is one of the hot issues. This article focuses on GPSR (Greedy Perimeter Stateless Routing) and uses the NS2 (Network Simulator-2) to simulate both GPSR and the improved algorithm GPSRI (GPSR-Improved). Consequently, we have compared GPSRI with GPSR in terms of important parameters, such as data transmit delay and data relay hops....
Multipath routing has been proved effective in mobile ad-hoc networks (MANETs) for coping with link failures resulting from node mobility. In wireless mesh networks (WMNs) where routers are generally static, the traffic carried by the backup paths may adversely impact other flows and the multicast group itself, because these paths increase the number of transmissions and thus the level of interference...
With the vigorous development of IOT (Internet of Things), sensor units carried by human beings will form the largest DTMSN in the world. However, most of the existing DTMSN routing protocols haven't taken the characteristics of human mobility into account, and may not work well in human-oriented data gathering. In this paper, we analyze the characteristics of human mobility, and propose a novel delay-...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
This paper focuses on the modification and improvement of Ad hoc On-demand Multipath Distance Vector (AOMDV) in Mobile Ad hoc NETwork (MANET). An improved algorithm is proposed, aiming to maximize the benefit of multipath algorithm to achieve better performance metrics in both packet loss ratio and average delay. The main contributions of the paper are: (1) Factors that could cause packet loss and...
In hierarchical networks, nodes are separated to play different roles such as CHs and cluster members. Each CH collects data from the cluster members within its cluster, aggregates the data and then transmits the data to the sink. Each algorithm that is used for packet routing in quality of service (QoS) based applications should be able to establish a tradeoffs between end to end delay parameter...
Wireless sensor networks (WSNs) can be used for a variety of applications. For many applications, a high reliability and low delay are required. Due to lossy feature of wireless channel, providing a reliable communication is very challenging. The most frequently used approach for providing the reliability is to use the acknowledgement based retransmission mechanism which increases the end-to-end delay...
Network topology inference uses network measurement methods to find out the elements of internet in the target field and their connection relationship. In traditional network topology inference, traceroute-like methods which bases on the feedback information of routers are used, but anonymous routers seriously affect the performance. So tomography relying on end-to-end measurements has become a hot...
In this paper, the suitability of the existing MANET routing protocols for VANETs has been evaluated. Even though a VANET is a subset of MANET, it has unique characteristics and message delivery requirements. VANETs are characterized by a very dynamic topology with partial infrastructure support, patterned mobility, mobile nodes with sufficient resources, intermittent connectivity and varied channel...
A recent trend in routing research is to avoid inefficiencies in network level routing by allowing hosts to either choose routes themselves (e.g., source routing) or use overlay routing networks. Such end-to-end route selection schemes are selfish by nature, in that they allow end users to greedily select routes to optimize their own performance without considering the system-wide criteria. Recent...
Covering both theoretical and practical interest in different networks layers, multicast routing remains an important topic. In network layer, there are several multicast routing protocols using different multicast routing trees in the literature. However PIM-SM and CBT protocols remains the most used multicast routing protocols; they propose using a shared tree (ST). This kind of tree provides efficient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.