The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
More focus of research is going on routing in VANET as there would be frequent path breaks due to its nodes high mobility. It is better to consider multipath routing instead of single path routing to have the uninterrupted transmission in the networks like VANET. This paper shows the design of an optimized multipath routing which is based on learning automata and leapfrog method (LA-MPRLF). Particle...
Vehicular communications can be achieved through the infrastructure (Vehicle-to-infrastructure network, V2I), as well as directly through vehicle-to-vehicle communication (V2V) via ad hoc networks. In V2V communications, the routing protocols are designed in order to optimize the dissemination of messages. This paper presents an evaluation of routing protocols such as the Optimized Link State Routing...
Wireless sensor network is an application tools which play a important role in monitoring remote environment and tracking of target. It consisting Sensor node which are smallers cheaper and intelligent, which consume small amounts of battery or power. By using this data is transferred. There is lots of routing technique that provides significant benefits to wireless sensor networks concerning both...
It is becoming more and more obvious that the challenges regarding tactical radio communication cannot be met by a single static radio waveform. Instead, waveforms with different properties regarding range, robustness, and throughput need to be orchestrated. In order to benefit from the advantages of each radio technology integrated into the transparent tactical radio network, traffic engineering,...
Analysis of Network Intermediate Connectivity is one of the important and challenging issues in Vehicular Adhoc Network (VANET). Gradually, intermediate connectivity among the nodes becomes a popular interesting research paradigm in high mobility domain. It depends upon the movement pattern of the vehicles and the routing of packet transmission depends upon the connectivity of the nodes. Among the...
In this paper we consider the selection and deployment of MANET protocol to efficiently route the traffic and communicate in Tactical Battle Area (TBA). Tactical Wireless Communication Network (TWCN) provides connectivity between Wide Area System (WAS) of TWCN nodes, forming a backbone transmission network. TWCN is for TBA that consists of Network Centric Systems. These entities impose routing challenges...
For minimizing road accidents, traffic jams, car parking and other significant scenarios related to cost effectiveness and safety in VANET, the communication between vehicle to vehicle and vehicle to road side unit (RSU) should achieve the service quality, high data receive ratio and low latency. However, the probability of TCP disruption increases by the increasing distance between source and destination...
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging task due to the unique network characteristics such as lack of central authority, rapid node mobility, frequent topology changes, insecure operational environment, and confined availability of resources. Due to low...
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol is considered as one of the most important protocols that are frequently used in the Wireless Sensor Network (WSN). Many protocols were developed to modify and improve the LEACH protocol. The multi-hop technique (MHT-LEACH) is one of these protocols, which appeared to improve the performance of the LEACH protocol. In this paper, an improved...
Wireless networks are expanding day by day, as everyone wants wireless connections. If we talk about Mobile Ad-hoc Network (MANETs), this is one of the vulnerable wireless networks due to lack of central co-coordinator. Any malicious nodes can threat the security of MANETs very efficiently. Black-Hole attack is one of the security threat in which the malicious node attract packets from source node...
Agricultural productivity has long been a key metric for measuring farming efficiency and it has been proven that agricultural productivity can be increased through smart farming. Recently, Unmanned Aerial Vehicle (UAV) has also been incorporated into smart farming in order to provide additional perspectives, i.e., imagery analysis and agricultural surveillance. These UAVs not only perform their specific...
Background/Objective: Interior gateway protocols are used for communication between devices in an organizational network. The setup which includes routers, switches and hosts is simulated in GNS3 software to represent a complex real time enterprise level network. Each protocol is implemented in the designed topology. Methods/Statistical analysis: Interior gateway protocols-RIP (Routing Information...
A Mobile Adhoc Network (MANET) is featured by multi hop wireless connectivity with topology change due to highly mobile stations with autonomous configuration ability. Therefore, it is very challenging to develop vibrant and resourceful routing Protocol for MANET which also performs excellent routig with security feasibility. This paper presents a detailed study and analysis of various routing issues...
In this paper, we evaluate the performance of two WMN architectures considering throughput, delay and fairness index metrics. For simulations, we used ns-3. We compare the performance for two architectures considering different transmission rates and OLSR protocol. The simulation results show that for 100 [kbps] transmission rate, the throughput of Hybrid WMN is higher than I/B WMN. But, for transmission...
Design of energy efficient underwater wireless sensor networks (UWSNs) routing protocol to prolong network lifetime is a challenging task because of limited battery life of sensor nodes. In this paper, we propose mobile energy efficient square routing protocol (MEES) to balance energy consumption of nodes in the network. Two mobile sinks are deployed at the farthest distance from each other. In order...
In our previous work, we implemented WMN-GA system which is based on Genetic Algorithms (GAs) and used it for node placement problem in WMNs. In this paper, we evaluate the performance of two different distributions of mesh clients for two WMN architectures considering PDR, throughput, delay, fairness index and energy metrics. For simulations, we used ns-3, Hybrid Wireless Mesh Protocol (HWMP) and...
In this paper, a routing protocol, Maximum Coverage in Square field region (MCS) for Underwater Wireless Sensor Networks (UWSNs) is introduced. The overall area of the network is divided into ten sub regions and two mobile sinks (MSs) are deployed. The data is transmitted to the MS directly and mobility pattern of MS is adjusted in such a way that it covers the whole area of the network. When MS and...
Wi-Fi Mesh Community has turn out to be an important area community to offer internet to challenge the thrown domains and wireless link in metropolitan environments. In this paper, hassle of figuring out the most to be had bandwidth direction is targeted, which is an essential problem in helping pleasant-of-carrier in WMCs. Due to the concept of interference, bandwidth, which is a familiar challenging...
An adhoc network is collection of wireless mobile hosts, which form a temporary network by using reconfigurable structure that means it doesn't use fixed infrastructure to form a temporary network. It will connect all nodes through wireless technique. Hence it can change the link between one node to another node during run time, when the link failure problem occurs. There is a limited range for each...
The standard routing protocols are used to find an optimal path between two given endpoints. Nowadays, the solution of multipath routing becomes fundamental requirement to improve the overall throughput of networks. On the other hand, due to the dynamic and high volume of traffic, it is also more challenging to control the congestion in an efficient way within the networks. Recently, Software-Defined...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.