The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud services are charming for vehicular ad hoc network (VANET) users. Advances of wireless networks make access to the Internet from VANETs possible. However, the features of VANETs hinder the delivery of cloud services to VANETs. It is important to find proper Internet gateways to connect the VANET users to the cloud. A cloud-assisted gateway discovery scheme is proposed in this paper. The simulation...
In this paper, we address the radio resource utilization efficiency in single channel wireless mesh networks (WMNs) while considering the mobility of users and when multiple simultaneous connections on the same channel exist in the network. To achieve this, we use clustering. We first identify through analytical models and simulations the cases where clustering is helpful. Building on these results,...
To support seamless communications for roaming users over heterogeneous wireless networks, mobile ad-hoc networks (MANETs) are receiving a special interest in the research community due to its infrastructure-less nature. MANETs can help to achieve a seamless service for users roaming over areas with no coverage from other wireless networks. As a result, MANETs are a key access network component of...
Supporting video streaming over wireless mesh networks (WMNs) is a challenging task because of the limited network resource, severe signal interference and contention among neighbor traffic. Path and server diversities are proven feasible to provide solution for video streaming over lossy networks. In this paper, we propose MG-MDC, a multi-gateway technique with multiple description coding (MDC) scheme...
Routing protocol for Ad Hoc Wireless Networks are categorised on the basis of routing information update mechanism, use of temporal information for routing, topolgy information organization and miscellaneous classification based on ulitization of specific resources. The CGSR lies under table driven or proactive protocol based on routing information update mechanism. CGSR is a hierarchical routing...
Wireless Mesh Networks aim to provide high-bandwidth broadband connections to a large community and thus, should be able to accommodate a large number of users accessing the Internet. Due to high estimated traffic volume in Wireless Mesh Networks, scalability and fault tolerance become important requirements in algorithm design. We propose a Failure Recovery Mechanism (FRM) for the channel assignment...
In this paper we investigate the search path when building a wireless mesh network under extended ad-hoc network, and we propose a search method that can reduce power consumption. The route search part and the node part - which can be a mobile PC or a mobile phone, etc. -are combined in the proposed method. Moreover, we aim at improving the efficiency of the communication between nodes under the extended...
Wireless sensor and actuator networks bring many benefits to industrial automation systems. However, unreliable wireless and multihop communications among sensors and actuators cause challenges in designing such systems. Wireless HART is the first standard for wireless real-time industrial applications. However, current Wireless HART standard does not provide services for efficient usage of actuators,...
The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of communications and operations often requires that these heterogeneous MANETs to be interoperable. Nonetheless, the existing interconnection protocols designed for the Internet (namely inter-domain routing protocol such as...
In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of...
The main contribution of this work is to propose a distributed and collaborative cache solution in which the decisions to cache objects are performed in a collaborative way. In our solution, objects are classified in private and shared objects. Private objects are managed as in an individual cache system whereas the management of shared objects are performed collectively and are stored in a shared...
Mobile Ad-Hoc Networks (MANETS) will play a significant role in future tactical military networks. Tactical networks are required to support military operations in areas without access to a fixed network infrastructure. They are also characterized by frequent changes in network topology due to node mobility and intermittent line-of-sight (LOS) connectivity. The self-forming and self-healing nature...
Mobile ad hoc networks are becoming an important concept of modern communication technologies and services. It provides some advantages to this communication world such as self-organizing and decentralization. In this paper, we are going to design a cluster-based multi source multicast routing protocol with new cluster head election, path construction and maintenance techniques. The main objective...
Mobile tactical MANETs are interconnected via a quasi-static backbone network (QSN) that is relatively stationary and has substantial radio bandwidth capability. Because of high mobility and terrain sensitivity, the bandwidth available to mobile nodes within the MANET may vary significantly over time. During the periods where the bandwidth available is reduced, MANET nodes may be unable to handle...
Mobile tactical MANETs are subject to periods of intermittent connectivity and transient events of significant packet loss. Because of such disruptions, protocols and technologies have been proposed that are disruption and delay tolerant. One class of such systems works by storing messages/packets in the network. If connectivity to neighbors is lost, missing messages may be delivered when connectivity...
Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless protocols tend to perform poorly. In this paper, we propose Content Centric Networking (CCN) for emergency wireless ad hoc environments. CCN is a novel communication architecture capable to access and retrieve content by name. This...
Inter-domain routing for MANETs (Mobile Ad Hoc Networks) draws increasing attention because of military and vehicular applications. Most of the proposed inter-domain routing protocols are using clustering to manage the connection between intra-domain nodes and inter-domain nodes. The distributed clustering algorithm elects within each domain gateways that connect to different domains. Also many inter-domain...
In many traditional hierarchical routing protocols proposed for mobile ad hoc networks, each cluster designates a single cluster-head (CH) node to relay inter-cluster traffic. These cluster-head nodes become traffic “hot-spots” and restricting cluster to access through cluster-head nodes can lead to sub-optimal route. To solve these problems, we proposed a novel cluster-based distributed gateways...
Connected dominating set (CDS) algorithm based on a virtual backbone technology has an important role for wireless ad hoc network, route optimization, energy conservation and allocation of resources. In this paper, on the base of several classic distributed CDS approximation algorithm and connected dominating set, a new distributed CDS algorithm based on weight is presented, the correctness and efficiency...
With the fast evolution of the computing devices, its reduced size and cost, there is an immersion of people in the digital world. With the use of more technology, abundant and cheap, environments that can take advantage of the ubiquitous computing emerge, allowing its users to interact and have access to information easily, quickly and naturally. However, classic ubiquitous environments were defined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.