The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, certificatesless signature was considered to be a critically acclaimed way of key distribution. It was proved to have certain advantages and has been applied to different areas. Based on certificateless signature, this research proposes a security routing pattern in WSN network where a node-role is only used to authorize other nodes. In this pattern, the anchor nodes act as the third...
In recent days, the Mobile Adhoc Network (MANET) plays a vital role in networking research environment for sharing information from one to others. MANET is a mobile, which is formed by radio waves without any desirable base stations. The main issue of Destination Sequenced Distance Vector Routing Protocol (DSDV) is routing overhead continuously, because it maintains the up-to-date information during...
Networks-on-chip (NoCs) are increasingly being adopted as the interconnect model for systems-on-chip and chip-multiprocessors. As the only communication medium in these designs, the NoC's functional correctness is critical. In practice, design-time verification of NoCs is always partial, due to their large scale and the challenges that hinder verification efforts. As a result, functional design bugs...
Wireless mesh networks(WMNs) have excellent communication capabilities and quality of easy deployment which increases popularity of WMNs. WMNs have an essential routing protocol which facilitates healing of link between Mesh Routers and the Mobile Nodes. Multiple interfaces of Mesh Routers is used for healing the path between the Mesh Routers and the Mobile Node in Mesh Network. Reactive protocols...
Mobile ad-hoc networks are commonly known as MANETs. This type of network consists of nodes which are independent, mobile and also able to exchange messages between themselves. These nodes rely on limited battery; a common challenge in MANETs. As soon as battery power of node is used up, that node becomes a dead node. This node is not able to send or receive data. When all network nodes have used...
Nowadays there is a proliferation of smart devices used for media consumption. Usually, media contents are streamed from a Content Distribution Network (CDN), through a cellular network, which can get overloaded when there is a large number of active users per cell. At the same time the devices, i.e. smartphones, typically possess a set of wireless interfaces such as WiFi and Bluetooth that can be...
Routes in a wireless network can be repaired reactively after node failures by broadcasting the message across the neighborhood of the failed node. This broadcast problem is easily solvable, if the neighborhood of every node in the network induces a connected subgraph of the communication graph. Graphs with this property are called locally connected. This paper considers the edge augmentation problem...
While routing protocols for low-power wireless networks, such as CTP or RPL, handle link failures relatively well, node failures have received considerably less research attention. This paper thus studies crash-failures of destination nodes in distance-vector routing, that is, failures of so-called DODAG root nodes. First, it demonstrates empirically that handling root node crashes in existing state-of-the-art...
MANET, a self-organizing network of various devices responsible for seamless communication. Routing protocols involved in the communication adopts new strategies to assure energy, security, traffic minimization, overhead. Dynamic nature of the MANET requires the modification in routing protocols for performance improvement. This paper presents the detailed survey of strategies involved in the implementation...
Today's generation has perceived wireless networking prospective applications in tremendously erratic and vibrant surroundings. Businesses as well as individuals pick wireless medium as their choice as it facilitates flexibility of location. It's obvious due to its convenience in terms of mobility, portability or even ease of installation at any preferred location. Mobile network has an intrinsic...
Vehicular ad hoc networks (VANETs) technology is growing very fast which provides the communication between moving vehicles on the road and the road side units without using any infrastructure. VANET is a subclass of MANET but with a different property of having vehicles as nodes. These networks are key component for ITS and self-organized in nature. Due to highly dynamic topology and frequent disconnection...
In this paper we propose an extension to well known multipath reactive routing protocol Ad hoc On Demand Multipath Distance Vector (AOMDV). The resulting protocol is called as Hybrid on Demand Multipath Distance Vector (HOMDV). The proposed scheme improves AOMDV by using hello packets to learn neighbors up to two hops in addition to maintaining local connectivity. In this scheme a route requests is...
In Mobile Ad Hoc Networks (MANETs), node mobility results in frequent topology changes. This makes it difficult for routing protocols to cope with the change timely. As nodes move arbitrarily and unpredictably, maintaining routing in such environment is a serious challenge. This paper presents a mechanism that targets the node mobility in a near future scenario and takes action to maintain the active...
The IPFRR technology provides fast network recovery after a link or router failure within an ISP network. During the link or the router failure within network, there is unpredictable period of time when part of communication is lost until the process of network convergence will complete. During this process specific networks may become unavailable and problems with critical applications and services,...
The routing efficiency of structured overlay networks depends on the consistency of pointers between nodes. This consistency can, however, break temporarily when some overlay nodes fail, since it takes time to repair the broken pointers in a distributed manner. Conventional solutions utilize "backpointers" to quickly know the failure among the pointing nodes, which allows them to fix the...
The absence of centralized network management in MANET places the responsibility of route establishment and route maintenance on the nodes in the network. This is the basis of designing widely used routing protocols (example AODV). However, a node with malicious intentions can launch an attack on the network and disrupt its operations. Hence there is an utmost necessity of a mechanism to identify...
Cooperative caching with a data access tree (DAT) in opportunistic networks, where the connectivity among nodes are intermittently disconnected and the transmission opportunities are very limited, significantly improves routing performance, since a node can download data from the source node of the data as well as any caching nodes. With a DAT, cached data is updated in two different ways, intentionally...
Video-on-demand (VoD) service has been explosively growing since its first appearance. For maintaining an acceptable buffering delay, the bandwidth costs have become a huge burden for the service providers. Complementing the conventional client-server architecture with a peer-to-peer system(P2P) can significantly reduce the central server's bandwidth demands. However, the previous works focus on establishing...
The network topology in Mobile Ad hoc Networks (MANETs) dynamically changes due to mobility of nodes and power constrained, hence routing is a challenging issue in these networks. QoS aware routing is needed to provide optimal routes as a function of parameters like bandwidth, delay, packet loss etc. Our approach is focused on QoS enabled route discovery procedure which involves estimation of node...
In a wireless sensor network the delivery of the data packet from source to destination may be failed for various reasons and major due to failure-prone environment of networks. This may happen due to the topology changes, node failure due to battery, exhaust or breakdown of the communication module in the wireless node and results in the link failure. This paper addressed the major problem of link...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.