The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MANET is a self managed and eminently dynamic wireless connection of nodes. Group communication in MANET expanding its usability in real scenario day by day. Some group-oriented scenarios in wireless ad-hoc networks are e-education, ecommerce, vehicular networks, searching and rescue operations, audio/video conferences, battlefields and disaster management etc. Demand of group communication is a quick...
In Free Space Optical Mobile Ad Hoc Networks, there are only limited literature works on routing methodologies and these routing techniques lack the consideration of QoS metrics. In order to overcome these issues, in this paper, we propose QoS based directionality routing in FSO MANETs. When the source wants to transmit the data packet to destination, directional routing technique is utilized for...
Delay-, disruption-, and disconnection-tolerant networks (DTNs) implement the store-carry-forward (SCF) paradigm for message delivery, which can be used for data transmission when an end-to-end connection may never be reached. A number of SCF routing schemes have been developed to increase performance in various scenarios. In this paper, using the ONE Simulator, we investigate four SCF-based DTN routing...
Content-centric networking (CCN) adopts a receiver-driven, hop-by-hop transport approach that facilitates in-network caching, which in turn leads to multiple sources and multiple paths for transferring content. In such a case, keeping a single round trip time (RTT) estimator for a multi-path flow is insufficient as each path may experience different round trip times. To solve this problem, it has...
Transition techniques play a vital role during the evolvement process of the Internet from IPv4 to IPv6. However, packet length change during the forwarding process may result in fragmentation and reassembly of a large number of packets, which greatly impacts the forwarding performance. In addition, different Maximum Transmission Unit (MTU) mechanisms of IPv4 and IPv6 have also brought lots of troubles...
A key feature of Open Shortest Path First protocol mainly managing huge networks and providing the speedy destination result using a Dijkstra's Algorithm. A utilization of network recourses and exceed utilization of network resources are the not focusing in literature in OSPF based single path routing. Single path routing causes traffic congestion and less optimum bandwidth utilization where as techniques...
Mobile Ad Hoc Networks (MANETs) also called mesh networks, consist of a large number of mobile nodes that communicate with each other in the absence of any fixed infrastructure or centralized administration. The principle characteristics of MANET are the dynamic topology and the limited battery power of mobile nodes. The discharge of the battery causes many problems such as the loss of the packets...
This paper evaluates the performance of free space optical communication using tracking transceivers. The call request is blocked if free bandwidth is not available in a node along the route. The paper proposes a different topology formation based on the traffic pattern to minimize the blocking performance for limited number of tracking transceivers.
Bandwidth is one of the characteristics that is used to measure network performance. In this paper, we present a Unicast Bandwidth Efficiency Routing Algorithm (UBERA) for mobile devices that are streaming video contents from a video server. The algorithm can adapt to different number of mobile devices with different level of mobility and different location. Routing decisions are based on the availability...
Wireless ad-hoc networks are collections of wireless nodes having no predefined infrastructure. Most of the existing routing protocols for wireless ad-hoc networks use the shortest path or minimum distance path to the destination. However, the shortest path routing does not provide a good balance of the traffic load among all nodes. When many users utilize the shortest paths, some nodes become highly...
Software Defined Networking (SDN) has opened new ways to design, deploy, and operate networks with new abstractions and programmability at network control and data planes. In this paper, we approach SDN to embed virtual data center networks employing the Network-as-a-Service model. The proposed architecture is built upon abstractions to create a virtual topology using BGP configurations that allow...
In this paper, we present an available-bandwidth-based proactive routing protocol for IEEE 802.15.4-based single-sink and multi-sink ad-hoc networks. The available-bandwidth-based proactive routing protocol maintains the best forwarding path in terms of the end-to-end available bandwidth towards each sink node present in a network. Moreover, a node can maintain more than one data forwarding path towards...
Wireless Sensor Networks (WSNs) provide a cost efficient solution for data gathering in future smart environments like smart grids and Advanced Metering Infrastructure (AMI). Using the traditional minimum cost routing, leads to congestions along shortest paths and decreases the network lifetime. Multipath routing and load balancing is a logical way to extend the network lifetime. In this paper we...
As proactive routing protocols respond to changes in network topology by broadcasting routing updates throughout the network, determining appropriate update interval plays an important role in reducing the routing overhead, especially the misrouting overhead. In this paper, a numerical method is pro-posed to determine the optimal topology update interval depending on network mobility and data traffic...
Hybrid Wireless Mesh Networks provide improved connectivity and reliability over traditional wireless networks. However due to rapidly changing traffic patterns, such networks are more likely to experience congestion which leads to data loss. Inability to differentiate between congested links and select best possible paths dynamically can be very expensive in a rapidly changing network topology. This...
Internet is the major source of information today and its usage is increasing at an alarming rate. A wide variety of data travels over the Internet to cater the needs of end users. This has eventually led to heavy congestion in the network which in turn, worsens the user perceived latency. Internet routers are the main agents that detect congestion prior to end hosts. Traditional router incorporates...
In a low time to live based wireless network, the node drops all its energy before actually transferring the data given to it. This serves as a drawback where the data is not transferred completely resulting in bandwidth wastage and improper message delivery. To address this problem we formulate new routing techniques by which the data from one part is scheduled to reach the destination based on the...
Underwater wireless sensor network (UWSN) is an important emerging research area in wide range of application, unlike the terrestrial network it uses the acoustic signal which has a unique characteristics like limited bandwidth, high and variable propagation delay, transmit energy, minimum network lifetime and so on. This paper proposes an efficient clustering algorithm having 3D-GRID network architecture...
Disruption Tolerant Networks (DTN's) are networks which do not have steady connection between the node and the network. They use contact between the nodes and their mobility for communication between them. Due to the limitation in network resources and buffer space DTN's are prone to flood attacks. Here the attackers flood many packets into the network or replicates of the same packets into the network...
Mobile ad hoc network is one of most important research topics as they are infrastructure-less and mobile. Open medium, wide distribution and de-centralization of nodes makes MANETs vulnerable and malicious. It is crucial to develop efficient intrusion detection system to protect MANETs. A new intrusion detection system named bandwidth shared acknowledgment (BSA) in which all transmission packet data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.