The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless links are often asymmetric due to heterogeneity in the transmission power of devices, non-uniform environmental noise, and other signal propagation phenomenon. Because of the variable and unpredictable capacity of wireless links, packet loses may happen frequently. Several routing protocols have been proposed for Mobile Adhoc networks, yet there is no one for all schemes that works well in...
In order to operate as efficiently as possible, appropriate on-demand routing protocols have to be incorporated in the ad hoc networks. Most common routing protocols, simply assume that all network links are bidirectional, and thus may need additional protocol actions to remove unidirectional links from route computations. The proposed algorithm makes use of selective unidirectional links so that...
In this paper, we propose and study how to provide multipath cross-layer service discovery (MCSD) for mobile ad hoc networks (MANETs). Cross-layer service discovery integrates service discovery into route discovery by taking advantage of network-layer topology information and routing message exchange. Multipath service discovery differs from multipath routing in that multipath service discovery can...
A particularly severe attack on routing protocols in mobile ad hoc networks (MANETs) is the collusion attack, in which a pair of colluding attackers prevent routes to a specific node (targeted node) from being established. This attack has devastating impact on Optimized Link State Routing (OLSR) protocol which is one of the standard routing protocols for MANETs. When there is a collusion attack in...
Wireless ad hoc networks consist of nodes which can communicate with each other in a peer-to-peer fashion over single hop or multi hops without any fixed infrastructure such as access point or base station. In flat topology there is no topology management concept and all the nodes participate in routing. In this paper the task of topology management for ad hoc networks is implemented using routing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.