The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Routing delivery is one of the key techniques in mobile ad hoc network, which involves many aspects such as topology update, routing exchange and so on. In this paper, we firstly apply routing tree to describe the complete topology of ad hoc network, and then store the information of routing tree into every node's routing table. Sparse routing tree, as a pruned tree, is used to exchange topology information,...
In this paper, we present a novel application of matrix game theory for optimization of link scheduling in wireless ad-hoc networks. Optimum scheduling is achieved by soft coloring of network graphs. Conventional coloring schemes are based on assignment of one color to each region or equivalently each link is member of just one partial topology. These algorithms based on coloring are not optimal when...
In this paper, we study asymmetric power assignments that induce a low-energy k-strongly connected communication graph with spanner properties. We address two spanner models: energy and distance. The former serves as an indicator for the energy consumed in a message propagation between two nodes, while the latter reflects the geographic properties of routing in the induced communication graph. We...
Wireless links are often asymmetric due to heterogeneity in the transmission power of devices, non-uniform environmental noise, and other signal propagation phenomenon. Because of the variable and unpredictable capacity of wireless links, packet loses may happen frequently. Several routing protocols have been proposed for Mobile Adhoc networks, yet there is no one for all schemes that works well in...
In order to operate as efficiently as possible, appropriate on-demand routing protocols have to be incorporated in the ad hoc networks. Most common routing protocols, simply assume that all network links are bidirectional, and thus may need additional protocol actions to remove unidirectional links from route computations. The proposed algorithm makes use of selective unidirectional links so that...
In this paper, we propose and study how to provide multipath cross-layer service discovery (MCSD) for mobile ad hoc networks (MANETs). Cross-layer service discovery integrates service discovery into route discovery by taking advantage of network-layer topology information and routing message exchange. Multipath service discovery differs from multipath routing in that multipath service discovery can...
Wireless ad hoc networks using omni-directional antennas do not scale well due to interference between nearby nodes. Maintaining the QoS of the communications in this type of network is a difficult task. Using multiple narrow beam directional antennas alleviates this problem at the expense of connectivity. Multi-beam smart antennas allow the network topology to be adjusted dynamically by adjusting...
With the spread of mobile nodes, studies on MANET (Mobile Ad-hoc Network) that can build networks solely with mobile nodes are drawing much attention. However, most of the ad-hoc routing protocols have not considered the traffic conditions in the network. Thus, we propose an ad-hoc routing protocol that takes account of traffic conditions, by way of extending OLSR (Optimized Link State Routing).
A particularly severe attack on routing protocols in mobile ad hoc networks (MANETs) is the collusion attack, in which a pair of colluding attackers prevent routes to a specific node (targeted node) from being established. This attack has devastating impact on Optimized Link State Routing (OLSR) protocol which is one of the standard routing protocols for MANETs. When there is a collusion attack in...
Wireless ad hoc networks consist of nodes which can communicate with each other in a peer-to-peer fashion over single hop or multi hops without any fixed infrastructure such as access point or base station. In flat topology there is no topology management concept and all the nodes participate in routing. In this paper the task of topology management for ad hoc networks is implemented using routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.