The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 60GHz radio technology is highly promising since it can offer multi-Gbps data rate for short range wireless communication. Recently, the idea of using wireless Ad-Hoc networks in the 60 GHz unlicensed band has begun to draw a lot of attention. This paper investigates the throughput capacity of the millimeter wave wireless Ad-Hoc networks with directional antennas when the multi-hop relay schemes...
We present the Dynamic Inhibition Areas Reaction-Diffusion (DIA-RD) algorithm, a distributed medium access control protocol that globally maximizes the spatial reusability (number of simultaneous transmissions per unit area) of wireless sensor networks. This algorithm is able, in consequence, to minimize the number of time slots needed to schedule the set of demanded links, making it very efficient...
Explicit multicasting protocols such as Differential Destination Multicast (DDM) in MANETs have been retaining advantages of traditional approach while eliminating their shortcomings especially for small-group applications. However, they still have some drawbacks especially in the group size limitation. In this work we discussed a new unified unicast and multicast routing scheme called Arithmetic...
In this paper, PNCR, a routing framework based on Physical Network Coding is proposed. PNCR enables shared utilization of the channel during the broadcast and multiple access phases of transmissions. These additional transmission opportunities can be observed as performance gains in terms of less packet delays and better network throughput. In this paper, we discuss the details of our proposed framework...
DoS (Denial-of-Service) attack is used to make the requested users waiting for the machine or network resources. The attack mainly efforts to temporarily suspend services of a server connected to the Internet. Low Rate DoS attacks are new types of DoS attacks, which cannot be detected easily since the attacks are sent with the low volume. The different methods to handle the high rate DoS attack. But...
In a distributed control wireless ad-hoc network, network performance is significantly effected by multi-user interference. In such networks, transmit power control can enhance the energy usage as well as the QoS performance. Although, the effects of hidden/exposed terminals on the system throughput in wireless ad-hoc networks have been studied extensively, the IEEE 802.11 with variable transmit power...
It has been shown that paragliders could considerably benefit from ad-hoc communication, be it for safety or the prolonging of flight times through the exchange of thermal information. The simulation of these so called Flying Ad-Hoc Networks (FANETs) can help evaluate the feasibility and performance of these and other applications inexpensively and at large scale. Their specific communication characteristics,...
In the immediate aftermath of a natural disaster, network infrastructure is likely to have suffered severe damages that challenge normal communications. In addition to that, traffic substantially increases as a result of people attempting to get in touch with friends, relatives or the rescue teams. To address such requirements of a challenged network, we propose a communication framework based on...
In this paper we propose an optimized broadcasting mechanism which uses very limited signaling overhead. The main objective is to select the most appropriate relay nodes according to a given cost function. Basically, after receiving a broadcast packet each potential relay node computes a binary code according to a given cost function. Then, each node starts a sequence of transmit/listen intervals...
Distributed Coordination Function (DCF) is a well-known MAC protocol for single channel wireless ad-hoc networks. However, hidden terminal and false blocking problems may happen if DCF is directly applied to multi-channel environments. As a result, the paper proposes a Multi-group Multipipeline Multi-channel MAC protocol (3M MAC) for wireless multi-channel ad-hoc networks to avoid multi-channel hidden...
Localization is extensively used in Wireless Sensor Networks (WSNs) to identify the current location of the sensor nodes. A WSN consist of thousands of nodes that make the installation of GPS on each sensor node expensive and moreover GPS will not provide exact localization results in an indoor environment. Manually configuring location reference on each sensor node is also not possible in the case...
Network security consists of provisions and policies adopted by network administrator to prevent unauthorized access of network accessible resources. Jamming can be viewed as a form of Denial-of-Service attack, whose goal is to prevent users from receiving timely and adequate information. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high...
The hardware and low-level software in many mobile devices are capable of mobile-to-mobile communication, including ad-hoc 802.11, Bluetooth, and cognitive radios. We have started to leverage this capability to provide interpersonal communication both over infrastructure networks (the Internet), and over ad-hoc and delay-tolerant networks composed of the mobile devices themselves. This network is...
This paper presents a cooperation-based retransmission mechanism for IEEE 802.11 networks called Forwarding By Retransmission (FBR). This mechanism aims at reducing the mean number of retransmissions in an infrastructure network, or it can be used to forward frames in a small ad hoc network. FBR enables any node that received a frame to participate in the retransmission process, as long as it has...
Congestion is one of the most important issues impeding the development and deployment of IP multicast and multicast application in Mobile ad-hoc network (MANETs). In this paper, we propose a situation aware multicast congestion detection scheme with support vector machines in MANETs. We focus on using support vector machines to detect incipient multicast congestion by using structural situation information...
Opportunistic scheduling and routing can in principle greatly increase the throughput of decentralized wireless networks, but to be practical such algorithms must do so with small amounts of timely side information. In this paper, we propose a low-overhead distributed opportunistic scheduling (DOS) scheme, termed distributed interferer-channel aware scheduling (DICAS), and precisely determine its...
Anonymity is an important topic in ad hoc networks. Previous unicast anonymous routing protocols in ad hoc networks usually assume that shared secret exists between the sender and the receiver and hide either the sender and the receiver or the intermediate nodes from the ad hoc network. Researches on anonymous multicast routing are nearly extinct. This paper proposes a multicast anonymous routing...
Uncertainties in the wireless communication medium do not allow for guarantees in network performance for cognitive radio applications envisaged for mobile ad hoc emergency networking. The novel concept of mission policies, which specify the Quality of Service (QoS) requirements of the incumbent network as well as the cognitive radio networks, is introduced. The use of mission policies, which vary...
In this paper, we determine accurate expressions for the probability of success of handshake-type network mechanisms in a wireless ad hoc network modelled by a Poisson point process. Handshake-type mechanisms form the basis for the implementation of Quality of Service into wireless ad hoc networks (e.g, to guarantee packet delivery). However, to our knowledge, their analysis using a stochastic model...
Throughput scaling laws for two coexisting ad hoc networks with m primary users (PUs) and n secondary users (SUs) randomly distributed in an unit area has been widely studied. Early work showed that the secondary network performs as well as stand-alone networks, namely, the per-node throughput of the secondary networks is equation. In this paper, we show that by exploiting directional spectrum opportunities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.