The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A large number of recent advancements in the technology of Unmanned Aerial Vehicles (UAVs) have enabled them to be very useful and effective in many applications in today's society. They demonstrate a high degree of stability and agility in the air. In order for UAVs to perform their various tasks and responsibilities effectively, UAV communication becomes an important component. Furthermore, such...
Recent studies suggest nodes in practical networks are more likely to communicate with nearby nodes than far away nodes, which is referred to as proximity preference. In this paper, we model proximity preference by assuming the probability of communication follows a power law distribution with respect to distance and analyze its influence on the throughput of a hybrid network. Moreover, L-maximum-hop...
The capacity of next generation of cellular networks using femtocaches is studied when multihop communications and decentralized cache placement are considered. We show that the storage capability of future network User Terminals (UT) can be effectively used to increase the capacity in random decentralized uncoded caching. We further propose a random decentralized coded caching scheme which achieves...
This paper highlights the benefits of IEEE 802.15.4's unslotted carrier sense multiple access collision avoidance (CSMA-CA) MAC layer acknowledgements (ACKs) in ad-hoc wireless networks. We performed different experimental studies to analyse the impact of enabling and disabling the ACKs on event detection ratio (EDR), available bandwidth estimator, and flow admission control algorithms. Comparison...
In the Wireless sensor networks the advanced version is Ad-hoc networks which is used for broadcast to overall dynamic nature to the host. Providing of broadcasting of various services in Ad-hoc Networks is critical to support for different protocols and applications. By this we define a new issue called Broadcast Storm Issue [BSI] which will be caused by the excessive re transmission of classical...
In MANETs, real-time multimedia applications make Quality of Service (QoS) support, a crucial issue regarding terms of increased throughput, reduced jitter and available bandwidth. The highly dynamic topology of the network, large variation of received signal strength at nodes and frequently varying link characteristics make QoS provisioning, a challenging task. Most of the existing routing protocols...
Video surveillance deployed over a flexible Wireless Ad-hoc NETwork (WANET) is gaining popularity in building and home environments. Energy-efficient multicasting is an important issue in surveillance, since camera sensors are always equipped with limited energy capacities. Many works have considered the problem of maximizing the multicast lifetime by assigning the transmission range of nodes. However,...
The capacity of mobile ad hoc network (MANET) is typically determined by the size of network, routing protocol, mobility and the interactions that occur between the nodes. Moreover, these critical parameters cause the loss rate that has severed impact on the performance of the MANET. This situation even becomes worst when these critical parameters are chosen inappropriately. This paper presents an...
With collision free transmission at its core, Time Division Multiple Access (TDMA) is becoming increasingly popular for Mobile Ad-hoc Networks (MANETs). Each node is assigned a conflict free transmission schedule by slot assignment algorithm to avoid collisions in the transmission. As the slot assignment depends hugely on spatial reusing of slots for better bandwidth utilization, slot conflicts occur...
In this paper we propose a multi-agent based proactive service replication scheme for service oriented computing in mobile ad hoc environment. The proposed scheme ensures service availability and optimum resource usage in the network without compromising the QoS requirement of the service consumers. To achieve this we formalize the service-replication problem into distributed constraint optimization...
Multicasting in Mobile Ad hoc wireless Networks (MANETs) is a big challenge and a significant issue. Due to limited bandwidth and dynamic nature of ad hoc wireless networks, it is required that a multicast routing protocol should be efficient and effective. Existing tree-based and mesh-based multicast routing protocols are not suitable under multiple constraints. Ant Colony Optimization (ACO) is swarm...
MANET is seen as a promising technology that helps facilitate range extension in tactical edge networks (TENs) where both realtime broadcast and unicast are critical communications. These services are usually provided by proactive routing protocols with Multipoint Relay (MPR) technology. The standardized MPR selection method produces redundant MPR nodes which can cause repeated transmissions of broadcast...
Greedy users deviate from the IEEE 802.11 Distributed Coordination Function (DCF) standards to unfairly increase their shares of the bandwidth on the expense of other standard-abiding users. The greedy behavior is implemented by modifying the firmware of the network interface card to manipulate the back-off timer. This paper presents a methodology using non cooperative game theory to formulate a countermeasure...
Named Data Networking (NDN), aka Content Centric Networking (CCN), excels in content distribution especially multimedia distribution, which can consume significant network bandwidth. With the market penetration of mobile devices and advancement of wireless technologies, media streaming over Wi-Fi becomes increasingly popular but it does not scale well in today's IP based networking. A natural question...
Various vehicular applications are available in VANETs either for safety-related or non-safety-related use. Collision warning and car crash alerts are those of the most important messages that own high priority to be rebroadcast than any non-safety messages. Meanwhile among non-safety messages that employs text, images and streaming packets containing voices and videos, the bandwidth must be distributed...
Delay Tolerant Networks (DTNs) are sparse mobile ad-hoc networks in which there is typically no complete path between the source and destination. To increase the reliability of message delivery, multi-copy routing is often used at the expense of high buffer and bandwidth overhead. While much work has been done in the design of forwarding algorithms, little work has focused on studying forwarding under...
In Mobile ad-hoc networks (MANET), QoS protocols includes the intermediate nodes which have sufficient resources along the route, from source to destination. Nodes may turn non cooperative when they are running with shortage of resources, which weakens the effectiveness of the protocol. The proposed model (Uncertain Rule-based Fuzzy Logic QoS Trust Model in MANETs -FQTM) selects the nodes which are...
This paper presents an analytical model for quantifying the reactive routing overhead in Mobile Ad-hoc Networks (MANETs). The overhead is characterized as a function of network mobility and traffic load. Also, a numerical model for determining the optimal cached route Time-To-Live is derived to minimize the overhead depending on network mobility and traffic load. The final result shows the minimum...
This paper studies on Resource Scheduling (RS) of Wireless Converged Broadcasting and Cellular Networks (CBCN) with popular services being preferentially delivered. In the proposed model of CBCN, the popular services are preferentially delivered by Wireless Broadcasting and Buffering Network (WBBN), and the other less popular services are delivered by Cellular Network (CN) with point-to-point (p2p)...
Although cooperation among individuals plays a key factor in the commercial development of wireless networks, trust is an important factor due to the uncertainty and uncontrollability caused by the self-organizing character of different entities. In this paper, we present a trust-based user assignment scheme by considering node sociality, the reason behind is that effective user assignment should...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.