The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A MANET or Mobile Ad-Hoc Network is decentralized in nature and it is basically a collection of heterogeneous mobile nodes which are autonomous and can communicate among themselves over the wireless link. In this infrastructure-less network, all the nodes dynamically route the packets by themselves with help of some protocols for sending or receiving the packet information. The ZRP or Zone Routing...
When configuring a delay tolerant network (DTN), there are many aspects that need to be taken into consideration for an effective and efficient network. One aspect is a buffer management strategy. Buffer strategies are used to determine which packets need to be forwarded or dropped. This paper will focus on the variety of buffer management strategies available, providing a comprehensive survey and...
Delay Tolerant Networks (DTNs) differ from the traditional Mobile Ad Hoc networks (MANETs) in that DTNs are not always interconnected. The issue of routing data in a DTN is considered here. Many routing protocols exist for DTNs. Some are based on comparing nodes to each other, whereas others focus on the internal properties of the messages they hold. There are wide ranges of protocols, and they perform...
Vehicular ad hoc network (VANET) is a particular class of mobile ad hoc network (MANET) that utilizes moving cars as nodes to establish wireless communications and exchange information between them without the need of infrastructure. VANET is a promising technology used to provide safety, efficiency, and comfort to the road users. Routing protocol has become one of the most challenging tasks for VANET...
Collecting data in time is crucial for the wireless sensor network (WSN), especially for some WSNs who suffer from inconstant link connections. Our observations in the intertidal wireless sensor network (IT-WSN) reveal that end-to-end delay is severe and a big challenge to be solved. Existing routing protocols perform well in WSNs with good link quality but show deficiency when node states change...
Industrial IoT networks are typically used for monitoring systems and supporting control loops, as well as for movement detection systems, process control and factory automation. To this end, data generated by monitoring IoT devices are collected, elaborated and sent to controllers and actuators. The routing of data from IoT sensors to actuators is an integral part of any large-scale industrial network...
In mobile Cognitive Radio Networks (CRNs), the frequent link breakage and wireless interference urged the need for novel stable routing solutions. In this paper, we propose STAR, a stable routing protocol that aims at selecting interference-free and durable paths. We investigate the particular Hidden interfering Primary User (HIPU) problem caused by the un-detectable presence of the primary user in...
Delay Tolerant Network (DTN) is a type of network that permanent connections between nodes are not always available. Routing in DTN uses store-carry-and-forward scheme, where nodes store and carry data until a suitable message carrier appears. Positive social characteristics such as centrality and friendship can be used to make a better routing decision in DTN. However, negative social characteristics...
Available smartphone« and smart objects can use short range connections like Wi-Fi and Bluetooth as a communication technique to exchange information with nearby devices. Those techniques are used in cases of absent end-to-end connection such as in Delay Tolerant or Opportunistic Networks. The study of message transmission processes and contact information in such networks has gained more attention...
Quality of Service (QoS) in data networks refers to control mechanisms for reservation of network resources and traffic prioritization for specific network applications and types of data flows. Every network application can have their own demands for specific QoS parameters, such as bandwidth, delay, jitter or packet loss. Rapid grow of Internet has initiated the development of the Internet protocol...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
Wireless sensor networks (WSNs) are used in many mission-critical applications, such as target tracking on a battlefield, emergency alarms, and disaster detection. In such applications, QoS provisioning in the timeliness domain is indispensable. Moreover, because of the diversity of sensory data, QoS provisioning should support not only one but multiple levels of end-to-end delay constraints. As a...
Wearable devices, such as wristbands, smart-watches, eyewear, and wearable bio-monitors have become the focus of much attention in past year. One in ten U.S. consumers over the age of 18 now owns a modern activity tracker. These ubiquitous devices are a natural platform for formation of ad hoc networks. With almost 40% of users are above the age of 45, these older adopters are focused on improving...
Security and privacy issues are considered to be two of the most significant concerns to organizations and individuals using mobile applications. In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different anonymous routing protocols have been proposed for ad hoc networks, to the best of our knowledge, only variants of onion-based routing have...
In disaster situations, networks are fragmented due to the disruptions of communication infrastructure and stable connectivity between nodes is not guaranteed. Therefore, opportunistic forwarding based on delay tolerant networks (DTN) should be used for message delivery in such disaster situations. Also, information centric network (ICN) approach can be used for communication of urgent messages to...
In-network caching is an inherent feature of Named Data Networking (NDN), and the basic data unit of naming and caching in NDN is called “chunk”. However, a chunk needs to be further fragmented into fragments when its size is larger than the link layer's Maximum Transmission Unit (MTU). Furthermore, fragments also need to be reassembled into the original chunk at intermediate routers so that subsequent...
Underwater Acoustic Sensor Network (UASNs) are deployed in sea for exploration of underwater hidden natural resources. There are certain research issues regarding routing and MAC protocol in the deployment of UASNs. The main challenges may be inefficient network life time, low throughput, high propagation delay and unbalance energy consumption. In order to improve the results of the basic parameters...
Cognitive radio is a dynamic technology that has a potential of addressing the spectrum scarcity challenge. However, routing in cognitive radio network is a challenge. The availability of the spectrum is probabilistic and it varies from one zone to other. The existing protocols do not guarantee the quality of service requirements for real-time data. Some of the challenges affecting the design of quality...
In Ad-hoc networks, routing is complex as nodes are mobile due to which paths are destroyed and generated again and again. The difficulty in MANET is to find a feasible path between communicating nodes as routing is non-deterministic polynomial hard which is due to mobile nature of nodes. Many past works focused on finding a feasible path from a source to destination by considering only a single parameter...
Network Simulator(NS-2) is an open source discrete event simulator, widely used by the networking research community. NS-2 provides flexibility for the researcher to extend the simulator functionality for any new area of research in networks. The primary objective of the paper is to investigate the development and simulation of the interface assignment in multi-interface multi-channel wireless adhoc...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.