The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Mesh Networks (WMNs) are currently attracting a lot of attention due to their ability to provide cost-efficient broadband wireless connectivity. In this paper, we evaluate the performance of a WMN by simulations considering packet delivery ratio (PDR), throughput and delay. For simulations, we used ns-3 simulator and Hybrid Wireless Mesh Protocol (HWMP). We evaluate the performance of the...
Delay Tolerant Networks (DTNs) are occasionally-connected networks. They have high latency, long queuing time, limited resources and intermittent connectivity, which are different from traditional networks. Message Ferry (MF) scheme provides efficient data delivery for DTNs. In the MF scheme, nodes move proactively to send and receive messages. In this paper, we propose a ferry routing scheme for...
The field of Wireless Sensor Networks (WSN) is undergoing a major revolution, opening the prospect of significant impact in many application areas (safety, health, environment, food safety, manufacturing, telecommunications. Routing isfundamental such a network because there is no infrastructure that manages the information exchanged between network nodes. Two major classes of routing algorithms are...
Recently, there has been much excitement in the research on how to overcome the problem of stale routes in DSDV. Although a number of schemes have been proposed, they improve the packet delivery ratio at the expense of the routing overhead and end-to-end delay. In this paper, we propose a new improvement on DSDV. The improved DSDV(Imp-DSDV) protocol can improve the packet delivery ratio without any...
Wireless Mesh Networks (WMNs) are considered as a sub directory of MANET which are consisted of Mesh Routers and Mesh Clients. The innovative ideas to conquer the problems in case of routing in a WMN platform are key points that can potentially increase the throughput of the network in different scenarios. The protocols introduced by IEEE 802.11s draft are divided into Proactive, Reactive or Hybrid...
The rapid growth of wireless networks makes cognitive coexistence an important technology to use the spectrum efficiently. In this paper, a novel sensing based delay optimal method is considered to meet the requirement of the delay-sensitive traffics as well as to minimize the collision between the primary user and the secondary user. After establishing the Markov Decision Process (MDP) model, we...
Multiple Access with Salvation Army Protocol (MASA) achieves the higher aggregate throughput than IEEE802.11DCF via packet salvaging at the MAC layer. The implementation of MASA is based on DCF specification. But the back off timer of SACK in MASA is different from that of DATA in DCF. The MASA selects (0, NAV) as the back off range of SACK, whereas DCF thinks the channel is busy in this duration...
In this paper, we discuss how link stability and number of mobile nodes impact on end-to-end delay in mobile ad hoc network (MANET). We find that their relationship shows differently when there is a path between any arbitrary source-destination node pair in the network or not. Meanwhile, two models are proposed respectively based on the Cox proportional hazards model to reveal the relationship. It...
Wireless technology based on the IEEE 802.11 standard is used to support multiple types of communication services (data, voice, and image) with different QoS requirements. Node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or...
This paper analyses the two common routing protocols, AODV and DSR in Ad-Hoc network. On the OPNET network simulation platform, a systematically simulation and research has been carried out on the performance of two routing protocols, and how the network environments impact on the performance of routing protocol. The packet delivery ratio and average delay of these two indicators have been selected...
A new cross layer path selection scheme with quality of service (QoS) support along urban areas is proposed. First, we introduce a cross-layer approach where the routing decision takes explicit consideration of the application layer objective function. Second, the queueing based mobility model, spatial traffic distribution and probability of connectivity for sparse and dense Vehicular Ad-Hoc Networks...
In this paper, a new MAC protocol, called Reliable Busy Tone Multiple Access with Neighboring Information Table (RBTMA-NIT), is proposed for safety applications in Vehicular ad hoc networks (VANETs). Derived from the conventional busy tone multiple access (BTMA), RBTMA-NIT introduces three mechanisms to reduce the transmission delay of emergency messages: 1) the original emergency message and its...
Survivability represents an important property of an information system which must withstand devastating malicious attacks and system failures, as well as continuously provide essential services to users. In this paper, we qualitatively analyze a system's states under different levels of attacks with varying system recovery abilities. Then, we use Colored Petri Net tools to simulate and measure the...
Today wireless networks are becoming popular because of their “3 Any's”- Any person, Any where, Any time. Mobile ad-hoc networks (MANETs) is an emerging research area with practical application. Dynamic and reliable protocols are required in MANETs, as they have no infrastructure (base stations) and their Network topology changes frequently. There are different protocols for handling the routing problem...
In Mobile Social Networks (MSN) users can participate in communication based on their mutual interests. Typical implementations of Social Networks involve client/server architecture where a user needs to subscribe to a server for content sharing with other clients. Popular Online Social Network providers have recently extended the web based service into the mobile domain. However due to mobility and...
A number of Intelligent Flooding Schemes have been recently proposed to optimize message dissemination in Vehicular Ad Hoc Networks. Some of them exploit a distributed timer-based contention mechanism in order to allow the most suitable nodes to forward the packet and to suppress other potential forwarders. Unfortunately, due to some problems related to the suppression mechanism, most of these schemes...
In Mobile Ad hoc Network (MANETs), flooding is the simplest broadcasting mechanism where each node retransmits every uniquely received packet exactly once. Despite its simplicity it could potentially leads to high redundant retransmissions causing high channel contention and thus excessive packet collisions in the network. This phenomenon referred to as broadcast storm problem has been shown to greatly...
In this paper we present a novel technology named probability dynamic relay handover (PDRH) for the benefit of providing a mechanism to recover from selective attacks on some important terminals of JTIDS. The key points of PDRH are the probability model to simulate selective attacks using the theory of scale-free network and addressing for a new relay node. In simulation based on OPNET Modeler 10...
Minimum-hop strategy of normal routing protocols for ad hoc wireless networks doesn't consider the load of the network, which may lead to network congestion and degrade performance of the network thereafter. In order to solve this problem, this paper proposes a simple and effective modified version of AODV-Load-Aware AODV (LA-AODV), in which, each node decides whether or not to accept routing requests...
There are many multipath extensions to AODV (Ad Hoc on-demand Distance Vector) routing protocol in MANETs. These extensions can be categorized into two types based on the concept of utilizing multiple paths in intermediate nodes. The first type utilizes Multiple paths in Intermediate nodes in AODV protocol(MIAODV), and the other utilizes multiple paths only at source and destination nodes (in this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.