The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present analytical study of routing overhead of reactive routing protocols for Wireless Multihop Networks (WMhNs). To accomplish the framework of generalized routing overhead, we choose Ad-Hoc on Demand Distance Vector (AODV), Dynamic Source Routing (DSR) and Dynamic MANET on Demand (DYMO). Considering basic themes of these protocols, we enhance the generalized network models by...
This paper presents the results of the performance evaluation concerning 3G/3GPP IP Multimedia Subsystem (IMS) applications deployed in a wireless multi-hop network controlled by the Delay-Aware Network Utility Maximization System (DANUMS). The main purpose of the DANUM system is simultaneous service of files and multimedia streams, i.e., types of traffic of different delay requirements. DANUMS combines...
Lifetime is the most important concern in wireless sensor networks due to limited battery power of sensor nodes. In this paper, we focus on designing an energy-efficient and energy-aware routing algorithm, LLR, to increase the operational lifetime of multi-hop wireless sensor networks in the presence of unreliable communication links. Our proposed protocol utilizes a parameter, Broadcasting Delay,...
This paper proposes a simple path diversity algorithm (SPDA) for Interdomain routing. The SPDA uses source routing to find an alternate path from a source to a destination, and allows flexible division of traffic over the best and alternate path. The SPDA comprises three steps. First, the BGP protocol is extended to allow the BGP routing table to save the multiple paths for any destination. Second,...
This paper proposes a solution for throughput and stringent delay problems of VoIP in Ad-Hoc mode of IEEE 802.11 WLAN standards. This paper analyses the behaviour different codecs and schemes of WLAN running on VoIP traffic and draws a conclusion on the performance of network based on the criteria of different QOS parameters. Later the suitability of different routing protocols like AODV, DSR, OLSR...
The wormhole attack is hard to detect and can be easily implemented. An attacker may receive packets from one location in the network and tunnel them to the other end point in a different location and re-inject them into the network. Attackers can tunnel the packets by one of the following methods: encapsulating the packets, using out-of-bound links or using high power. If there are two or more malicious...
Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks. Energy efficiency in the second method is achieved by power control technique. This technique is effective in high traffic...
The comparison of different applications and protocols in vehicular ad hoc networks (VANETs) is a very difficult task. This is mainly due to the nature of VANET, for which it is virtually impossible to replicate the same exact environment in two separate experiments. This paper introduces a flexible experiment structure that will allow different protocols to be compared in the same mobility pattern...
In Shared Path Protection, backup resources can be shared by multiple backup lightpaths as long as their respective working lightpaths are not affected by the same (single) failure event. This property is known as backup sharing among existing backup paths. The goal of this work is to experimentally evaluate the impact of the traffic dynamics when the control information on resource sharing is either...
A new localized quality of service (QoS) routing protocol for wireless sensor networks (WSN) is proposed in this paper. The proposed protocol targets WSN's applications having different types of data traffic. It is based on differentiating QoS requirements according to the data type, which enables to provide several and customized QoS metrics for each traffic category. With each packet, the protocol...
We propose an immediate re-routing (IRR) extension to RSVP-TE signaling and implement it on our IDBR test-bed. By allowing wavelength conversion during the re-routing process, the proposed scheme can significantly reduce signaling induced blocking.
Delivering desired QoS to the applications is one of the most important challenges in next generation networks. Designing efficient queue management in midway nodes leads to improvement in NGN efficiency. This paper presents fair Efficient active Queue Management (EQM) mechanism for congestion avoidance and control in next generation networks. Proposed AQM mechanism uses instantaneous queue length...
There has been much research focusing on the routing problem in delay tolerant networks (DTNs). Much of the work has mainly focused on coding schemes for message distribution, while other work has been done on the probabilistic forwarding. Coding schemes achieve higher delivery rate via redundancy before forwarding, while probabilistic forwarding efficiently limits the abuse of the store and forward...
Most multicast routing protocols construct reverse shortest path trees (SPTs) to deliver shared data. However, the use of the reverse SPT presents a challenge in the inter-domain routing environment, as the path from the source to a receiver could be asymmetric to the one used to go from the receiver to the source. A possible approach is to utilize the round-trip joining message but it incurs the...
Using multiple paths to transmit data simultaneously in wireless sensor networks is regarded to reduce end-to-end delay and achieve higher throughput. However, the interference between these multiple paths causes a significant reduction in the overall performance. Previous methods tried to solve this problem either with the aid of special hardware or under unrealistic assumption, such as the interference...
Compared to traditional wireless network routing protocols, geographic routing provides superior scalability and thus is widely used in vehicular ad hoc networks (VANETs). However, it requires every vehicle to broadcast its location information to its neighboring nodes, and this process will compromise user's location privacy. Existing solutions to this problem can be categorized into two groups:...
We propose a distributed routing scheme for cog- nitive radio ad hoc networks which, besides the awareness of the dynamic behavior of the primary users, also considers that some primary users may be hidden to secondary nodes, thus creating asymmetry in the spectrum opportunity availability. We identify this "Hidden Primary User" problem and we introduce in our distributed protocol a mechanism...
In this paper, we discuss the issues of QoS multicast routing in multi-hop Cognitive Radio (CR) networks. The problem of our concern is: given a CR network and a QoS multicast request, how to set up a multicast connection so that the total bandwidth consumption of the multicast is minimized while the QoS requirements are met. We propose a distributed protocol which uses shortest path tree as the multicast...
When a content provider (CP) provides peer-to-peer live streaming service, routing decisions based on the knowledge of underlay traffic could lead to much better performance (such as user delay). On the other hand, if the Internet Service Providers (ISPs) provide underlay traffic information to the CP, their overall network cost due to routing inefficiencies could be reduced. There is hence incentive...
In mobile ad hoc networks (MANETs), service composition faces severe challenges such as the lack of central server, node mobility and wireless network failure, which are usually not considered in web service composition on Internet. This paper designs and implements an on-demand service composition protocol for MANETs with consideration of quality of service (QoS). Based on the well-known Dynamic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.