The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless Sensor Networks (WSNs) consist of small nodes with sensing, computation, and wireless communication capabilities. Wireless Sensor Network (WSN) is a promising data mining solution for precision agriculture. Instrumented with wireless sensors, it will become available to monitor the plants for real time, such as air temperature, soil water content, and nutrition stress. This real time information...
Mobile ad hoc networks are becoming an important concept of modern communication technologies and services. It provides some advantages to this communication world such as self-organizing and decentralization. In this paper, we are going to design a cluster-based multi source multicast routing protocol with new cluster head election, path construction and maintenance techniques. The main objective...
Opportunistic routing has gained much attention in recent years as a means of leveraging the broadcast nature of wireless medium. Most of the previous studies focused only on improving throughput, assuming that Best Effort traffic which is delay insensitive is delivered through opportunistic routing. However, when the delay sensitive traffic is involved, it is necessary to consider both the opportunistic...
The mobile ad hoc network(MANET) brings great challenges in security due to its high dynamics, link vulnerability, and complete decentralization. As an important routing protocol used in ad-hoc network, Multicast Ad-hoc On Demand Distance Vector (MAODV) protocol is not sufficient for security requirements and vulnerable to attacks induced by the hostile environment. In this paper we discuss the impact...
The low power wireless communication technology has enabled the development of next generation low cost wireless sensor network. One important performance index of routing mechanism in sensor networks is sensor life span. How we utilize limited energy in wireless sensor network, directly affects the lifetime and cost of the network. As sensors are energy constrained by batteries and located for away...
Wireless ad hoc networks are a collection of mobile nodes spreading over a defined geographical area, enabling realtime collaborative applications such as push-to-talk and VoIP. Unfortunately, wireless ad hoc networks suffer from limited bandwidth and QoS constraints. A proposed eXplicit MultiCAST (XCAST) based routing protocol (P-XCAST) is presented in this paper to support team-based communications...
Wireless ad hoc networks are a type of wireless network that can be easily created without the need of network infrastructure or central administration. Unfortunately, wireless ad hoc networks suffer from some limitations related to the bandwidth leakage. So a proper data flow mechanism should be used to save the bandwidth consumption. So we proposed an XCAST based routing protocol (P-XCAST) to be...
Multicasting has not been widely adopted until now, due to lack of access control over the group members. The authentication, authorization and accounting (AAA) protocols are being used successfully, in unicast communication scenarios, to control access to network resources. AAA protocols can be used for multicast applications in a similar way. However, without an effective sender access control,...
This paper describes the IMcast (implicit multicast) routing protocol, developed to address several problems that are responsible for the slow deployment of IP multicast. We focus on transparent integration with legacy routers and in improving the efficiency of the routing tree. IMcast packets carry unicast addresses in the destination field of IPv4 header and multicast addresses on a separate header...
Application layer multicast (ALM) is an effective supplement to IP multicast, but it has the potential trouble of trust on end systems. For instance, multicast receivers may cheat in order to obtain a better position in the multicast tree. Receiver cheating may transform the multicast tree, and lead to its instability. We establish the cheating model of ALM receivers and analyze the stability of ALM...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.