The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A Mobile Adhoc Network (MANET) is self-possessed combination of mobile nodes. It has to be self-structured. The MANET has few specific goals. These are mobility extensions into wireless domain and autonomous mobile dominion. In this set of specified nodes that form adhoc network with routing infrastructure too. Multicasting is responsible for transferring information efficiently from a source to any...
Broadcasting is an important operation in wireless networks, as well as in cognitive radio (CR) networks. The operation of most network protocols in ad hoc networks depends on broadcasting control information among nodes. In traditional ad hoc networks, due to uniform channel availability, broadcasting is easily implemented as all nodes can be tuned to a single common channel. However, broadcast in...
We study the problem of managing interference in linear networks, with backhaul constraints that admit centralized allocation of messages to transmitters through the cloud. Our setting is that of a generic channel, where no channel state information is available at the transmitters. Knowing only the network topology, we characterize the optimal decisions for assigning messages to transmitters, given...
This paper addresses the challenge of vehicle selection in a Vehicular Ad-hoc Network (VANET) used to assist vehicles with limited satellite visibility in urban environments. In [1], we proposed a Non-Range cooperative positioning system which uses pseudoranges from only one assisting vehicle at any given time. However, many vehicles are within the communication zone of the target vehicle especially...
Nanonetworks comprise numerous wireless nodes, assembled at micro-to-nano scale. The unique manufacturing challenges and cost considerations of these networks make for minimal complexity solutions at all network layers. From a networking aspect, packet retransmissions should be kept minimal, while ensuring communication between any two nanonodes. In addition, assigning unique addresses to nanonodes...
We consider a data dissemination scenario in a wireless network with selfish nodes. A message available at a source node has to be disseminated through the network in a multi-hop manner. In order to incentivize a node to forward the source's message to others, a forwarding cost is paid to a forwarder by its respective receiver. In the case of multicast transmission, the cost is shared among the receivers...
An ad-hoc mobile network is a rambling collection of mobile nodes that are constantly changed and randomly located in such a manner that the nodes are capable of changing their interconnections between them on a continuity basis. In order to process easy communication with in the network, a routing protocol which is unicast or multicast used to discover routes between nodes. The main aim of such an...
The quality of data and the performance of nodes in a dynamic network, such as vehicular networks (VANETs), is crucial for the applications running on the nodes of these networks. The data in such networks is vulnerable to various types of attacks, amongst which false information dissemination and on-off attacks offer the biggest threats to the applications. As the data depends on the events, it is...
Wireless Sensor Networks (WSNs) have generated a great interest for industrial and have enabled new applications in different domains. In this paper, we present a PHY/MAC/Network analytic model for asymmetric multihop WSNs using the unslotted IEEE802.15.4 protocol and a weighted fair queuing (WFQ) scheduling that models the forwarding capability of sensors. This model can be used for cross-layer optimization...
In wireless communication networks link adaptation techniques are widely used to improve the quality by adapting various parameters of channel. Adaptive modulation and coding (AMC) is one such technique which adopts various modulation techniques based on certain channel conditions like received signal power or signal strength or distance. This paper compares simulation results of adaptive modulation...
A Mobile Ad-hoc networks (MANETs) is composed of Mobile Nodes without any fixed infrastructure. Multicast routing in mobile Ad-hoc networks (MANETs) have many defiance due to implicit characteristics of the network such as node mobility, reliability, finite network resources etc. So, in this paper we have introduced a new scheme to improve the performance and efficiency of multicast routing protocols...
We propose an analytical model for multi-hop ad-hoc network to estimate total energy conservation to transfer the data packet over wireless multihop networks. The proposed model has been improved by means of energy efficiency which monitors the remaining hop energy. This model consider the communication parameter such as reliability, energy consumption, throughput, retransmissions of data packet &...
In wireless networks, demand of communication of multimedia data is increasing day by day. Multicast networks help to improve network performance by transmitting data to multiple receivers at single instance in terms of bandwidth consumption, node energy and network congestion. Due to high mobility in Mobile Ad-hoc networks (MANETs), link failure occurring more frequently. In this paper, we are trying...
Internet of things (IOT) not only push radio nodes to sense and hear wireless medium, it also does provide opportunity to learn and adapt to radio neighborhood. As number of IOT nodes cherish, spectrum scarcity and interference management becomes non-trivial. As 802.11 radios are vital frontrunners to realize IOT technology, 802.11 channel access algorithms at MAC layer in IOT nodes play a vital role...
Unpredictable channel availability in cognitive radio networks (CRNs) account for routing becoming a challenging issue in such network environments. This paper presents a routing scheme for ad hoc CRNs that emphasizes on construction of virtual backbone structure across the network for routing and data transport. The proposed solution features channel adaptive characteristic while performing end-to-end...
Protecting and hiding the transmission of information over wireless channels at the physical layer level is of great importance in several applications. An Ad-Hoc covert network (ACN) is a set of users that exchange information over a wireless channel with a low probability of being detected by an intercept receiver. The ACN achieves a low probability of detection by hiding its transmission within...
In wireless ad hoc networks, misbehavior of nodes in computation of backoff value is one of the problems that affects the performance at MAC layer. To overcome this problem, this paper proposes a solution in which Contention Window subrange is specified by the receiver to the sender through CTS/ ACK packet. The advantage of sending the Contention Window subrange is, it is easier to detect the misbehaving...
TCP — Transmission Control Protocol acts as a logical vehicle for process to process communication. TCP ensures reliability in the form of flow control, error control and congestion control via ACK-Acknowledgement based transmissions. Wireless networks have limited spatial reuse scope which limits amount of data that can be in transmission within a specific geographical area at a time. In such scenarios...
A common jamming strategy against frequency-hopping (FH) radio networks is to adopt follower jamming. A possible counteraction of the radio network to aggravate for the jammer is to utilize a pseudo-random dwell-time in the FH process. The paper provides a method to analyze the performance of a frequency-hopping ad hoc network under follower jamming, and a jamming criterion for FH with a pseudo-random...
MANET technology develops when the mobile device users are faced situation without support of a fixed network infrastructure. This technology allows communication without a fixed infrastructure. The high mobility in MANET network makes it very vulnerable to attack. Attacks in MANET can destructive routing scheme formed by routing protocols. This study designed a MANET network using AOMDV (Ad Hoc on-demand...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.