The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
With new optical transport systems able to provide sub-wavelength granularity, the dynamic characteristics of the network are expected to strongly increase. Furthermore, such properties are highly related to the underlying physical network topology, which in turn require from the control plane important features such as scalability, dynamism and automatism. In this paper we analyze the properties...
A mobile ad hoc network consists of only mobile nodes without the access points and the center server. In the mobile ad hoc network environment, a set of nodes in the network and the network topology are frequently changing due to the node appearance, the node disappearance, and the node movement so that it is not easy for users in the network to obtain the services provided in the network. Therefore,...
Multi-hop wireless broadcast is a critical component in ad-hoc wireless networks. Vehicular Ad-hoc Networks (VANET) in particular utilize broadcast as a primary communication mechanism in many applications. Such networks exhibit situations of very high node densities so it is important that the broadcast protocols used to support applications on these networks scale well to high densities. This work...
This research work explains different aspects of PeerSim simulator used to create nodes and simulate peer to peer overlay network topology generation protocols. PeerSimhas been tested over various protocols specifically designed to work with a heterogeneous environment and its efficiency and scalability is evaluated considering different properties of the nodes and network. These protocols are used...
Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network topology when adversarial nodes are present and capable...
An efficient logical topology helps wireless sensor networks (WSNs) minimizing different constraints. For large-scale WSNs, chain oriented logical topologies are shown to be more energy conservative than other logical topologies. Chain construction is the main challenge to create a chain oriented logical topology. In this paper, we propose a chain construction scheme, which creates several chains...
Recently many Wireless Sensor Network (WSN)-based agriculture monitoring systems have been implemented mostly for developed countries. WSN in these monitoring systems uses tree topology and multi-hop dynamic flooding routing protocol that are not energy efficient and has a single point of failure. Though some protocols use zone-based routing they consider that a large number of sensors are deployed...
In this paper, we present a novel satellite network simulation platform (SNSP) based on OMNeT++ and MiXiM for researchers to develop better protocols for satellite networks. In this platform, multi-formatted satellite orbit data are permitted as input, and inter-satellite links (ISL) are created according to satellites position and specified connection rules. Correspondingly, the satellite network...
Conventional layered protocols are not capable to handle the vagaries of Wireless Mesh Networks (WMN) such as rapidly changing wireless channel quality, battery power and network topology. Most WMN cross-layer proposals to overcome these problems utilize only a limited set of parameters from the concerned layers rendering them incapable of network and system wide optimizations as they do not consider...
An accurate model of network topology is the fundamental to design a new network protocol. Recent efforts have been made to produce many topologies for the Internet, but few can give attention the power-law distribution characteristic in each tier of the Internet. We propose Leetar, a new Internet topology generator, which can generate topologies that contains many tiers and each tier match the power-law...
The current progress of network technique and the complication of network structure make administrators must spend more time and mind to maintain the system and the network under normal operation. With continuously increasing dependence on the network, it seems to be a knotty matter to know how to effectively manage all equipments on the network and to make sure they whether run it rightly or not...
Peer to peer networks are fast becoming the most popular file sharing media, guaranteeing complete user anonymity to the clients. However, modern P2P networks suffer from Sybil attacks, which forge multiple identities to influence the global decisions in the network. This paper suggests a novel solution to minimize Sybils influence using unique combination of Psychometric Tests, Color Tests &...
We propose two strategies to reduce energy consumption for secure data aggregation in wireless sensor networks. While the purpose of data aggregation is to reduce energy consumption, secure data aggregation introduces an overhead making the total energy consumption comparable to naive secure non-aggregation. Another aspect is that the secure data aggregation has higher node congestion than non-aggregation...
Topology control is a well-known strategy to save energy and extend the lifetime of wireless sensor networks. It consists of topology construction and topology maintenance algorithms. While topology construction builds a reduced topology, topology maintenance changes the reduced topology when the current one is no longer optimal. The selection of an appropriate topology maintenance technique is rarely...
Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks. Energy efficiency in the second method is achieved by power control technique. This technique is effective in high traffic...
Wireless Body Sensor Networks (WBSNs) have recently gained a lot of research interests due to emerging new applications in health-care, sports and entertainment. As the design of effective network architectures is a key issue to achieve energy-efficient and low-latency communications between the on-body sensors, the 1-hop star and the 2-hop extended star architectures have recently been promoted by...
The peer sampling service is a core building block for gossip protocols in peer-to-peer networks. Ideally, a peer sampling service continuously provides each peer with a sample of peers picked uniformly at random in the network. While empirical studies have shown that uniformity was achieved, analysis proposed so far assume strong restrictions on the topology of the overlay network it continuously...
A Mobile Ad hoc NETwork (MANET) is an infrastructure-less, spontaneous, and arbitrary multi-hop wireless network, consisting of group of mobile nodes. The topology of the network can change randomly due to unpredictable mobility of nodes. In order to allow truly spontaneous and infrastructure-less networking, a protocol for dynamic allocation of unique addresses is needed, because pre-configuration...
The following topics are dealt with: security; pervasive & ubiquitous computing; IPTV, video and mobility; network topology; wireless & 4G; WiMax; resilience & network planning; wireless protocols; network architectures and systems; virtualisation & scaling; self-adaptive network systems; distributed control algorithms; adaptive network control and; networked healthcare...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.