The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RPL (IPv6 Routing Protocol for Low Power and Lossy Networks) is proposed by the ROLL working group at IETF. This protocol used in the Internet of Things is optimal for Low power and Lossy Networks (LLNs). However, the RPL network has some limits when the network is dense. In this paper we evaluate the performance of RPL in three different scenarios. We first, evaluate the characteristics of RPL with...
Simulation is the most widely used tool for evaluating network protocols in multihop wireless networks, yet this has so far been limited due to a lack of models for creating a wide range of scenarios of mobile nodes moving about. For example, for evaluating multihop routing protocols, the frequently used Random Waypoint model can only effectively be used in scenarios with relatively high node density,...
An Unmanned Aerial Ad hoc Network (UAANET) is a special type of Mobile Ad hoc Network (MANET). For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. One major component of such simulation studies is the movement pattern of the UAVs. In this paper, we first show that mobility models affect the performance of UAANET/MANET routing protocols. To study...
With the current progress in communication technology, Wireless Sensor Network (WSN)s are extensively setup for plethora of applications such as defense, intelligent transportation systems, healthcare and many more. The limitation of sensor node is in terms of resources namely storage, power, processing potential and communication range. For the sensor network to be operational an efficient routing...
In typical settings for Wireless Sensor Networks (WSNs), a potentially large set of nodes operates under strict requirements concerning energy consumption and packet delivery success. If non-reliable or even malicious nodes participate, standard protocols can suffer in performance which may result in a limited functionality of the whole network. This paper addresses this issue by establishing end-to-end...
Vehicular ad-hoc network (VANET) is an important technology for future development of intelligent transportation systems. VANETs are being used as a tool for improving road safety by warning the drivers about accidents occurred ahead of them or for providing internet access to the passengers via gateways along the road. Although VANET is an application of MANETs but routing of data packets is more...
In association with recent advancement in wireless communications as well as penetration of wireless devices with sensing, computation and wireless communication capabilities, the wireless sensor networks have become an important research area due to their potential for providing cheap and flexible solutions to data monitoring and device actuation. And, many studies have analyzed routing effectiveness...
The IETF standardized the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) to meet routing requirements of the emerging applications. RPL is a distributed routing protocol and shows good scalability and fast network setup. However, RPL does not support sleep operation well. To provide efficient energy management and enhance RPL for sleep operation support, this paper presents battery energy...
In Mobile ad-hoc networks (MANET), QoS protocols includes the intermediate nodes which have sufficient resources along the route, from source to destination. Nodes may turn non cooperative when they are running with shortage of resources, which weakens the effectiveness of the protocol. The proposed model (Uncertain Rule-based Fuzzy Logic QoS Trust Model in MANETs -FQTM) selects the nodes which are...
Community networks are an emergent model with mottos like "a free net for everyone is possible" or "don't buy the network, be the network". Their social impact is measurable, as the community is provided with the right and opportunity of communication. The combination of wired and wireless links in these networks, and the unreliable nature of the wireless medium, poses several...
Modeling the performance of Wireless Mesh Networks (WMN) is a task that has received a lot of attention and has produced a large body of related literature. Most of the times, such literature is based on analytic assumptions or computer simulations, and results not always match reality. In this paper we use data collected over a one-month period in a 50-nodes wireless community network in Barcelona...
In Opportunistic Networks, information forwarding takes place when nodes are in communication range. Absence of knowledge on network topology prior information forwarding poses a compelling challenge in Opportunistic Networks. In these networks, disconnected mobile peers use mobility to opportunistically and dynamically connect to each other in order to disseminate heterogeneous information towards...
Concurrently executing diverse independent applications on a many-core processor with hundreds of cores requests allocating application tasks to minimize communication contention and communication cost. In this paper, we propose a novel application allocation algorithm to assign applications onto a many-core processor with considering communications between tasks and contentions on network channels...
Ad hoc communications are attracting more and more attention in today's research and technology, because of low cost implementation, and simple initialization procedures. They are being projected to be used in several fields such as collaborative computing and disaster recovery environments. However, route instabilities and scalability are issues that still need to be addressed. In this paper we implement...
Most of the multipath on demand routing protocols are mobile Adhoc Networks suffer due to frequent changes in the network topology confined network resources such as battery capacity of nodes, security of data packets and scalability of the network. This paper has been proposed a stability and Energy Aware Reverse Adhoc On demand Distance Vector (SEAR-AODV) Routing protocol. This method is a modification...
The Routing Protocol for Low-Power and Lossy Networks (RPL) is the standardized routing protocol for constrained environments such as 6LoWPAN networks, and is considered as the routing protocol of the Internet of Things (IoT). However, this protocol is subject to several internal and external attacks. In fact, RPL is facing many issues. Among these issues, trust management is a real challenge when...
Mobile ad hoc networks are open networks which are infrastructure less, decentralized and formed spontaneously resulting in a lot of security vulnerabilities. Reliable data delivery from a source node to a destination node requires a path involving nodes which collaborate to forward the data packets which requires the nodes to assess the forwarding behavior of each other. The paper presents an uncertainty...
Vehicular Ad-hoc NETworks (VANETs) have unique characteristics, such as the high mobility of nodes, which cause frequent losses of connectivity, turning technology and network selection into a complex problem. Moreover, due to the instability of networks and its fast change, this network selection requires information of the networks in advance, so that it can predict the quality of the networks to...
In this paper, we propose a distributed content retrieval scheme for Disruption Tolerant Networks (DTNs). Our scheme consists of two key components: a content discovery (lookup) service and a routing protocol for message delivery. Both components rely on three key social metrics: centrality, social level, and social tie. Centrality guides the placement of the content lookup service. Social level guides...
Experiments with wireless sensor networks have shown that asymmetric and unidirectional links occur often. Protocols that detect these links on the link layer have been proposed, however, unidirectional links represent a challenge as well as a chance across all layers. Still, most routing protocols prefer to use only bidirectional links. In this paper we present Unidirectional Link Counter, a routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.