The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay of voice end user (DOVE) is a promising technique in enhancement of carried traffic of both voice and data of a network. Several literatures are available for DOVE in voice data integrated services. In this paper the same concept is applied in micro-macro cellular system where DOVE is applied at the end of user of micro cell and macro cell separately for comparison of different traffic parameters...
In this paper, we compare and analyze the performances of two mesh routing protocols (BATMAN-ADV and FLAME) and a WDS implementation of the IEEE 802.11, all of which run on Layer 2 of the OSI reference model. Sometimes the mesh network may simply form a linear topology to provide a service coverage to a line-shaped area. A linear topology can be built without any routing protocol involved, using WDS...
In mobile ad hoc network (MANET), congestion is one of the most important restrictions that deteriorate the performance of the whole network. Multipath routing can balance the load better than the single path routing in ad hoc networks, thereby reducing the congestion by dividing the traffic in several paths. This paper presents a new approach Multipath Load Balancing and Rate Based Congestion Control...
One of the most desirable features of next generation wireless networks is the ability to move seamlessly over different access networks regardless of the underlying infrastructure. Handovers between dissimilar networks may be facilitated by the use of an efficient vertical handover algorithm. This paper explores ongoing research on the development of vertical handover decision methods and their effectiveness...
In this paper, we suggest and investigate CDMA based contention resolution with base station assisted backoff (C-BAB) for orthogonal frequency division multiple access (OFDMA) based WiMAX networks. Previous research on contention resolution considered CDMA with mobile assisted TBEB(C-MAB) suffers low contention efficiency and high access delay due to the type of accessing mechanism in WiMAX network...
In this paper we investigate the network lifetime maximization problem in a delay-tolerant wireless sensor network with a mobile sink by exploiting a nontrivial tradeoff between the network lifetime and the data delivery delay. We formulate the problem as a joint optimization problem that consists of finding a trajectory for the mobile sink and designing an energy-efficient routing protocol to route...
Mobile broadband and Voice over IP communication improved considerably in the last years, but both technologies have been developed independently from each other. VoIP has special Quality of Service needs, among them mostly delay, jitter and packet loss could be critical in HSDPA networks. In this survey an HSDPA delay and packet loss analysis has been executed, based on VoIP traffic, using the live...
Routing in ad-hoc networks is nontrivial due to highly dynamic environment. An Ad Hoc Protocol can also mean an improvised and often impromptu protocol established for a particular specific purpose for these reasons several routing protocols targeted at mobile ad-hoc networks are being proposed. DSDV, AODV, TORA, LAR, and DSR are the most prominent among them. This paper investigates and undertakes...
The growing number of mobile devices equipped with a wireless interface and the end-user trend to shift toward wireless technology is opening new possibilities for networking. In particular, opportunistic communication embodies a feasible solution for environments with scarce or costly infrastructure-based connectivity. In this context we provide a delay-tolerant solution that provides service opportunistic...
Of late, an easy access to the Web 2.0 applications through the hand-held mobile devices has provided the consumers with the opportunity to express opinions on their invoked services conveniently. These opinions, also known as the Internet word of mouth, often impact a potential consumer's service selection notably in service rich urban terrains. Access to these opinions involves tariffs since they...
Cellular networks are currently facing significant challenges as mobile Internet access adoption continues to grow over the subscriber base. The challenge that network operators are facing is that Internet data traffic consumes considerably more resources than voice calls, necessitating in that respect significant capacity enhancements. Further, this rise in system utilization has caused a considerable...
Very often, network users expect to access services relevant to their locations, whilst preserve their privacy without disclose their exact locations. The well-known privacy preserving method is the spatial cloaking technique where exact user locations are blurred into a cloaked region to meet the privacy requirement, e.g. k-anonymity. Most of current solutions are designed with a centralized architecture...
Minimizing energy consumption is becoming more and more crucial in today's mobile terminals communications. Reducing its use pass necessarily by exploiting low power design techniques and by adopting novel energy-aware applications and protocols. The focus in this paper mainly concerns the Voice over IP over Wireless Local Area Network (VoWLAN) application, which is beyond doubt the most popular application...
With the proliferation of multiple wireless technologies and smartphones with enhanced radio capabilities, it has become imperative to deliver services that can work seamlessly across heterogeneous networks. As smartphones advance in their capabilities, there is an increasing adoption of services with realtime delivery constraints (e.g. video telephony, streaming). In a heterogeneous network environment,...
This paper analyses the performance of a new routing protocol for vehicular delay-tolerant networks, called GeoSpray. This geographic routing protocol performs a store-carry-and-forward, combining replication and forwarding/ routing decisions based on location information, with explicit delivery acknowledgments to improve network resources utilization. The performance of the proposed routing protocol...
In our earlier work, we described an optimization problem and corresponding scheduling algorithm aimed at obtaining maximum throughput guarantees in wireless networks. To further improve the short-term performance, we also proposed two adaptive versions of the optimal algorithm. Results from the simulations showed that the adaptive algorithms perform significantly better than other well-known scheduling...
Previously, a multi-homed NEMO architecture has been proposed to improve the reliability and aggregate the bandwidth of MR by simultaneously using multiple wireless links. In this work, we propose a novel protocol called ETOM (Enhancements for TCP On a Multi-homed mobile router) to improve the performance of sending a single TCP connection over multiple wireless links on a MR. ETOM consists of three...
Mobile sensors are a viable choice for providing monitoring service on a set of Points of Interest (PoIs) in a large sensing field. In some applications, each PoI should be covered periodically (sweep coverage), and the collected data should be delivered to the sink node timely (timely transmission), namely both the sensing and transmission delay constraints for each PoI should be satisfied, which...
In this paper we study multi-copy routing schemes in opportunistic networks. Compared to single-copy protocols, the multi-copy schemes expedite the mean delivery delay while consuming more resources and exposing lower packet delivery ratio in resource-constrained system. To enhance the system capacity, most recent works explore the impact of social structure on network performance. Their results indicate...
The concept of Delay Tolerant Networks (DTNs) are proposed to facilitate communication in challenged mobile wireless networks using the Store-Carry-Forward (SCF) routing behavior. In this paper, our motivation is to take advantage of geographic routing since it routes message without the knowledge about network topology by using realtime location information, overcoming the challenge of large network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.