The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design of a duty-cycling MAC, called PRI-MAC (Pipelined-forwarding, Routing-integrated, and effectively-Identifying MAC), for large-scale wireless sensor networks. PRI-MAC divides the whole network into grades around the sink node. The higher grade a node is in, logically the further away it is from the sink which is in the lowest grade. Staggered sleep-wakeup schedules are...
Whilst Machine Type Communication (MTC) represents an important business opportunity for mobile operators, mobile operators fear the congestion that could come with the deployment of billions/trillions of MTC devices. In this paper, we present a new mechanism that anticipates system overload due to MTC signaling messages in 3GPP networks. This mechanism proactively avoids system congestion by compacting...
For applications that require large numbers of wireless sensors spread in a field, backscatter radio can be utilized to minimize the monetary and energy cost of each sensor. Commercial backscatter systems such as those in radio frequency identification (RFID), utilize modulation designed for the bandwidth limited regime, and require medium access control (MAC) protocols for multiple access. High tag/sensor...
The any cast routing protocol is useful in ad hoc and sensor networks as well as in the Internet. This study proposes an any cast routing protocol for ad hoc and sensor networks. The proposed method is lightweight and works with local information, which is obtainable at each node through advertisement packets transmitted from neighbor nodes. These characteristics are well suited to ad hoc and sensor...
The limitation in battery power is now becoming a critical problem for the efficiency and performance of Wireless Ad Hoc Networks. A transmit power control protocol is proposed which considers limited power to transmit the packets to receiver node unaffected by the wastage of energy due to collisions and retransmissions of lost packets because of hidden nodes and interfering nodes existing within...
TCP attacks are the major problem faced by Mobile Ad hoc Networks (MANETs) due to its limited network and host resources. Although the session hijacking is not in the forefront of everyone mind, it still remains a commonly used attack in MANET. Session hijack attacks are defined as taking over an active TCP/IP communication session without their permission or knowledge. When implemented successfully,...
We investigate the impact of channel estimation when employing point-to-point multiple-input single-output beamforming in stochastic ad hoc networks. We first derive a new outage probability expression with a linear minimum-mean-square-error estimator, and then characterize the feasible range of the pilot-training length and outage level pair to achieve a positive transmission capacity. Finally, for...
In recent years, several TCP congestion control algorithms have been proposed to increase the ability of TCP in high-speed and long distance networks. One of TCP implementations, which in MANET, opened new challenges for those algorithms to demonstrate the stability, scalability, and efficiency of the mechanism. This paper compared two TCP congestion control algorithms, namely Cubic TCP and Yeah TCP...
Providing reliable multicast (RM) service in Ad Hoc networks is very challenging due to the significant packet losses. To improve the reliability, data packets can be cached at designated nodes for future possible retransmission in loss recovery. How to cache packets to optimize the performance of loss recovery is an important issue in RM protocol and this problem has not been well investigated. In...
Cloud datacenters are increasingly adopting virtual machines (VMs) to provide elastic cloud services, with TCP being prevalently used for congestion control. In virtualized datacenters, the delays from the hypervisor scheduler can heavily contaminate RTTs sensed by VM senders, preventing TCP from correctly learning the physical network condition. In this dissertation, my direction is to paravirtualize...
Wireless teleoperation of field robots for maintenance, inspection and rescue missions is often performed in environments with low wireless connectivity, caused by signal losses from the environment and distance from the wireless transmitters. Various studies from the literature have addressed these problems with time-delay robust control systems and multi-hop wireless relay networks. However, such...
In this paper, we consider wireless random access networks (RANs) with both single packet reception (SPR) and multi-packet reception (MPR) techniques in fading channels, and compare their performance in terms of sum rate and energy efficiency. We adopt a simple power consumption model including transmission power and idle power. With MPR techniques, the transmission rate selection at each user is...
In this paper, we propose a gradual time synchronization scheme for wireless mesh networks (WMNs) based on orthogonal frequency division multiple access (OFDMA). For distributed time synchronization in WMNs, each node controls its transmission time and fast Fourier transform (FFT) starting time within the possible range according to the requests of neighbor nodes. The possible range is determined...
Multi-channel MAC protocols have attracted much attention because they possess the ability to boost the capacity of wireless ad hoc networks. In previous works, a lot of multichannel protocols, such as DCCB[1-2], HB[4], and SB[5-7], have been proposed to cope with the rendezvous problem and efficiently utilize the bandwidth resources. However, these protocols might cause the channel traffic unbalance...
Topology control for ad-hoc networks is crucial due to the absence of a fixed infrastructure that can guarantee satisfactory connectivity among communication nodes. In this paper, we study the impacts of adjustment of transmission power as a means to control the network topology (connectivity) to the signal-to-interference-plus-noise (SINR) ratio and the number of hops between two nodes, where the...
Wireless systems have a wide range of applications recently. To explore complex features of such systems, formalisms are proposed to specify and reason about them. This paper presents a case study of routing protocol in wireless networks. We formalize the route discovery process of AODV routing protocol using Object-Z. Network topology and local variables of nodes are defined by relations and functions...
The cooperation among mobile hosts in wireless ad-hoc networks is usually in the form of nodes acting as intermediate relays that forward data from a source to an otherwise distant destination using point-to-point or point-to-multipoint links. A technique that has gained considerable recent attention is cooperative diversity, where nodes are organized for transmitting the same signal to a given, often...
Mobile Ad-hoc Networks (MANETs) are increasingly deployed in infrastructureless scenarios. Routing protocol is a crucial solution for MANETs to establish network connections. This paper presents a formal description of the AODV routing protocol and analyzes its properties using relyguarantee method. In our approach the network is specified as a shared variable concurrent program, where communication...
IEEE 802.11 MAC protocol is the de facto standard for wireless local area networks (LANs) and it employs two access methods, basic access and optional four way handshaking technique, known as request-to-send/clear-to-send (RTS/CTS) mechanism. RTS/CTS scheme is employed to improve network performance as it shortens packet collision duration and thereby addresses the hidden station problem. Order dependent...
In a wireless network, when the adversary is being part of the network, they are well known about the protocol being used and other network secrets. A transceiver is enough to get the key and decrypt the message. Hence, simple cryptographic mechanism is not enough to protect the message. Moreover, jamming can be easily performed by modifying the packet header. Hence we have to go for advanced mechanism...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.