The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Backpressure-based adaptive routing algorithms have been studied extensively in the literature. Although backpressure-based adaptive routing algorithms have been shown to be network-wide throughput optimal, they typically have poor delay performance under light or moderate loads because packets may be sent over unnecessarily long routes. Further, backpressure-based algorithms have required every node...
In this paper, we investigate the use of variable speed limits for resilient operation of transportation networks, which are modeled as dynamical flow networks under local routing decisions. In such systems, some external inflow is injected to the so-called origin nodes of the network. The total inflow arriving at each node is routed to its operational outgoing links based on their current particle...
The emerging Internet of Things (IoT) involves integrating and forwarding data generated by heterogeneous sensing devices (IoT devices). The data is sent using various wireless technologies to application servers present in the IoT cloud via intermediate gateways. Using traditional routing techniques to connect millions of IoT devices to the Internet result in congestion and overloading of gateways...
It is becoming more and more obvious that the challenges regarding tactical radio communication cannot be met by a single static radio waveform. Instead, waveforms with different properties regarding range, robustness, and throughput need to be orchestrated. In order to benefit from the advantages of each radio technology integrated into the transparent tactical radio network, traffic engineering,...
Analysis of Network Intermediate Connectivity is one of the important and challenging issues in Vehicular Adhoc Network (VANET). Gradually, intermediate connectivity among the nodes becomes a popular interesting research paradigm in high mobility domain. It depends upon the movement pattern of the vehicles and the routing of packet transmission depends upon the connectivity of the nodes. Among the...
In this paper we consider the selection and deployment of MANET protocol to efficiently route the traffic and communicate in Tactical Battle Area (TBA). Tactical Wireless Communication Network (TWCN) provides connectivity between Wide Area System (WAS) of TWCN nodes, forming a backbone transmission network. TWCN is for TBA that consists of Network Centric Systems. These entities impose routing challenges...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is considered as one of the most important protocols that are frequently used in the Wireless Sensor Network (WSN). Many protocols were developed to modify and improve the LEACH protocol. The multi-hop technique (MHT-LEACH) is one of these protocols, which appeared to improve the performance of the LEACH protocol. In this paper, an improved...
Background/Objective: Interior gateway protocols are used for communication between devices in an organizational network. The setup which includes routers, switches and hosts is simulated in GNS3 software to represent a complex real time enterprise level network. Each protocol is implemented in the designed topology. Methods/Statistical analysis: Interior gateway protocols-RIP (Routing Information...
The NoC Architecture plays crucial role while designing communication systems for System on Chip (SoC). The NoC architecture is improved over conventional bus, shared bus design and cross bar interconnection architecture for on chip networks. In order to improve the Quality of Service, Congestion, Throughput and latency in NoC, Hexagonal node based architecture is proposed in our previous paper[14]...
In this paper, we aim to determine the multi-hop route between a Device-to-Device (D2D) source-destination pair that maximizes the end-to-end throughput, under stochastic interference constraints imposed by the cellular network and a target SINR constraint at the destination. We determine the maximum allowed D2D transmit powers from the interference constraints and propose a throughput-optimal routing...
Named Data Networking is a new data centric kind of communication network. This paper shows the study about NDN network and applies this architecture over Vehicular ad-hoc networks so that performance of network improves and communication becomes faster. At the end of simulation results are discussed in the form of packet delivery ratio, throughput, good put, routing overhead and various network parameters...
A Mobile Adhoc Network (MANET) is featured by multi hop wireless connectivity with topology change due to highly mobile stations with autonomous configuration ability. Therefore, it is very challenging to develop vibrant and resourceful routing Protocol for MANET which also performs excellent routig with security feasibility. This paper presents a detailed study and analysis of various routing issues...
In wireless sensor networks (WSNs) energy balancing and energy efficiency are the key requirements to prolong the network lifetime. In this paper, we investigate the problem of energy hole, where sensor nodes located near the sink or in some other parts of the network die very early due to unbalanced load distribution. Moreover, there is a dire need to utilize the energy resource efficiently. For...
Several approaches are introduced to increase the throughput and reliability of Multistage Interconnection Networks (MINs), mostly by changing the network architecture. When multiple sources in such a network try to send data, collision of packets and blocking problems are inevitable. Time division multiple access (TDMA) protocol are used to address these issues. However, TDMA protocol based on fixed...
We first propose a framework which utilizes vehicular delay tolerant network (DTN) to form a vehicular cloud in order to provide information exchange without communication infrastructure. The framework does not rely on cellular network and therefore provides an approach which is suitable for post-disaster communication where cellular network is unavailable or severely congested. The paper also proposes...
In this paper, a routing protocol, Maximum Coverage in Square field region (MCS) for Underwater Wireless Sensor Networks (UWSNs) is introduced. The overall area of the network is divided into ten sub regions and two mobile sinks (MSs) are deployed. The data is transmitted to the MS directly and mobility pattern of MS is adjusted in such a way that it covers the whole area of the network. When MS and...
The Data Vortex switch architecture provides promising routing performance with scalability but requires complicated connections as its size increases. The modular design is proposed that allows a larger network to be formed from smaller Data Vortex units for flexible implementations. Routing performance is shown to be similar or improved.
Wi-Fi Mesh Community has turn out to be an important area community to offer internet to challenge the thrown domains and wireless link in metropolitan environments. In this paper, hassle of figuring out the most to be had bandwidth direction is targeted, which is an essential problem in helping pleasant-of-carrier in WMCs. Due to the concept of interference, bandwidth, which is a familiar challenging...
A Wireless Sensor Network (WSN) is a wireless network consisting of small sensor nodes. Sensors are used to monitor physical or environmental conditions. WSNs are particularly used in military and civilian applications. As WSNs are generally deployed in an unattended area, they are prone to various types of attacks. One of the harmful attacks is Sybil attack in which a node illegitimately claims multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.