Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Reputation systems are an emerging area of research in ad-hoc networks. They have been introduced as a security solution for nodes' misbehaving problem. A reputation system should cope with any kind of misbehavior. It enables honest nodes to make fair decisions about their neighbors. This may encourage nodes to behave well and cooperate in order to avoid being penalized or isolated. In this paper,...
In this paper, it is analyzed the performance of routing protocols based on the evaluation of different parameters used in MANETs (Mobile Ad-Hoc Networks). The results show that DSR provides better throughput as compared to AODV in lower mobility Scenario. At the same time, it also gives less number of drop packets and low End-to-End delay as compared to AODV in lower mobility. Therefore it concludes...
Mobile ad hoc networks or MANETs are infrastructureless wireless networks where each node can freely move and directly connect to the other nodes located within its transmission range to form the topology in any arbitrary pattern. Hence, to ensure network connectivity, each node tends to use the maximum transmission power to extend its transmission range. However, this maximized transmission range...
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect,...
Greedy users deviate from the IEEE 802.11 Distributed Coordination Function (DCF) standards to unfairly increase their shares of the bandwidth on the expense of other standard-abiding users. The greedy behavior is implemented by modifying the firmware of the network interface card to manipulate the back-off timer. This paper presents a methodology using non cooperative game theory to formulate a countermeasure...
Next generation tactical networks has to provide high data rate and low delay, along with multiple applications with strict QoS requirements. In this work we address the problems of clustering and frequency allocation in TDMA-based frequency-hopping tactical networks. We propose Mixed Integer Linear Programming based optimal clustering solution along with a distributively implementable load-balanced...
The Ribosome Flow Model~(RFM) describes the unidirectional movement of interacting particles along a one-dimensional chain of sites. As a site becomes fuller, the effective entry rate into this site decreases. The~RFM has been used to model and analyze mRNA translation, a biological process in which ribosomes (the particles) move along the mRNA molecule (the chain), and decode the genetic information...
Most of studies on network capacity focus on the networks in a two-dimensional space. However, with the development of technology, capacity analysis of three-dimensional networks becomes more predictable. Throughput capacity of three-dimensional regular networks are investigated in this paper. The per-node throughput capacity of the networks with omnidirectional antennas are obtained. As directional...
To this day, Cloud computing continues its explosive growth. Nevertheless, with the exceptional evolution of demands, data centers are suffering from congestion problems. To deal with these resource limitations, first, we put forward a novel Hybrid Data Center Network (HDCN) Architecture enabling high throughput wireless (IEEE 802.11 ad) and wired (IEEE 802.3) transmissions. Secondly, we propose a...
In this paper, we propose a new MAC protocol for multi-beam directional antenna. In the protocol, each beam-sector has its own control channel, thus the communications among different beam-sectors are independent. It uses the Directional Network Allocation Vector (DNAV) to record the establishment processes. After sensing all the sectors of multi-beam antenna, it uses the global assignment strategy...
Capacity is an important aspect to evaluate network performance. However, most of studies on network capacity are focused on two-dimensional networks. In this paper, we present a three-dimensional hybrid network model and analyze the throughput capacity of our network model. We calculate the asymptotic expressions of three-dimensional hybrid networks. For a three-dimensional hybrid networks which...
An Ad Hoc network is a set of portable nodes, that could establish communication anytime and anywhere between themselves; however, a set of routing protocols is needed to set the routes between nodes in order to deliver a message from the source to the destination node. Many routing protocols have been proposed in order to achieve optimum routing performance in a mobile Ad Hoc network scenario, but...
With the development of Medium Access Control (MAC) technologies, various Slot Assignment (SA) schemes have been proposed to enhance the overall performance of Time Division Multiple Address (TDMA) techniques, especially to achieve better slot utilization, higher system throughput, collision-free transmission and Quality of Service (QoS) provision in mobile, multi-hop wireless networks. Different...
Vehicular Swarm Network (VSN) technology enables real time inter-vehicular communications for broadcasting all kinds of data collection, including emergency video with high data rate. A challenge in VSN broadcasting is to achieve a high throughput rate while at the same time assure the delivery of video packet flows to all the vehicles traveling over a highway segment from the accident vehicle. This...
Wireless mesh networks (WMNs) can be considered as a key technology for next-generation wireless networking. However, field trials and experiments prove that the performance of WMNs still below expectations. Therefore, several challenging research issues need to be determined. The routing protocol is one of the important factors to be improved to be robust, scalable, secured and efficient. This paper...
Wireless data transfer between mobile users has become more popular nowadays. In Mobile Ad-hoc Network, mobile nodes communicate with each other through the wireless medium, within the transmission range. If we use the data access applications in the wired network, the physical cabling in the wired network is restricting the connection topology and the bandwidth. But there is no such a restriction...
This paper studies on Resource Scheduling (RS) of Wireless Converged Broadcasting and Cellular Networks (CBCN) with popular services being preferentially delivered. In the proposed model of CBCN, the popular services are preferentially delivered by Wireless Broadcasting and Buffering Network (WBBN), and the other less popular services are delivered by Cellular Network (CN) with point-to-point (p2p)...
In an ad hoc network, communication distance is limited by the need to minimize the power consumption of the communication nodes. To deal with this, we usually employ multi-hop relaying functions that use the number of hops as a routing metric. But in an environment where traffic density is high, the same relaying node may be used by multiple sending nodes due to their spatial distribution. Data packets...
Ad-hoc network usually employs IEEE 802.11 based wireless LAN with a single channel as wireless links. A multi-hop communication and a single channel interference would cause a transmission performance degradation. The multichannel technique is effective to improve the transmission performance. This paper proposes the cross-layer design associated with the new multi-channel MAC protocol and the routing...
Catastrophic disasters cause failure of conventional communication systems where they can be collapsed completely or partially. In such situations disaster relief operations are deployed immediately in order to save human lives. Communication and exchange of Information are extremely vital for disaster response in order to gather information and make important decisions. Hence raises the requirement...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.