Mobility
Mobile technologies, from wireless carriers, machine-to-machine connections and new devices, constantly affect corporate productivity. Use the latest vendor white papers to keep yourself ahead of the game.
-
Clustering Based Energy Efficient Routing For Heterogeneous Wireless Sensor Networks
A Wireless Sensor Network is a kind of network and which mainly consists of sensor nodes and with basic property of sensing to other nodes in the Network. In this paper, the authors are proposing a new routing mechanism named as cluster based energy efficient routing for WSN and also...
Provided By IJCTT-International Journal of Computer Trends and Technology
-
A Review Report for Next Generation of Cmos Technology as Spintronics: Fundamentals, Applications and Future
As the scaling continues to reduce the physical feature size and to increase the functional throughput, two most outstanding limitations and major challenges among others, are power dissipation and variability as identified by ITRS. This paper presents the expose, in those collective phenomena, spintronics using appropriate order parameters of magnetic...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Analysis and Measurement of Wi-Fi Signals in Indoor Environment
The measurement and analysis of radio waves propagation play significant part in the plan and function of WLAN applications. This paper provides an overall coverage of the Wi-Fi in the indoor environment. In this paper radio waves propagation for indoor environments will be considered using the Wireless LAN 802.11b/g at...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
A Study on Efficiency of Resource Allocation (guaranteeing QoS) in GSM/GPRS Networks
General Packet Radio Service (GPRS), initiated in 1994, is an ETSI standard for packet data transmission using the core GSM (Global System for Mobile Communications) radio access network. GPRS shares the GSM frequency bands with telephone and circuit-switched data traffic, and makes use of many properties of the physical layer...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Papr Performance of OFDM System by Using Clipping and Filtering Method
Multicarrier schemes are supported to high data rate. Orthogonal Frequency Division Multiplexing (OFDM) and Filtered Multi-Tone (FMT) are two techniques of multicarrier schemes. OFDM is an attractive air-interface for next-generation wireless network without complex equalizer. OFDM is designed such a way that it sends data over hundreds of parallel carrier...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
A Study of Metamaterial Based Electrically Small Antenna to Enhance Gain
This is a review paper in which electrically small metamaterial-based antennas are discussed from the industrial point of view using mobile phones as the application example and dual band microstrip antenna with metamaterial structure for dual band operation. The most interesting feature of the design is the ability of enhancing...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
An Explication of Secret Sharing Schemes With General Access Structure
The basic idea in secret sharing is to divide the secret key into pieces, also called as 'Shares' and distribute the pieces to different persons so that certain subsets of the persons can get together to recover the key. In the outline of threshold schemes, the authors wanted k out...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Improving Traffic Performance on IMS Network
The IP Multimedia Subsystem (IMS) enables the convergence of voice, data, and multimedia services such as Voice over IP (VoIP), Video over IP, push-to-talk, presence or instant messaging services and so. IMS is well integrated with existing voice and data networks, while adopting many of their key characteristics. SIP (Session...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Locker Security System Using RFID and GSM Technology
The main goal of this paper is to design a locker security system using RFID and GSM technology which can be organized in bank, secured offices and homes. In this system only authenticated person can recover money from locker. The authors can implement a locker security system based on RFID...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Performance Enhancement of OFDM Signals Using Selected Mapping Technique and Overview of Different Papr Reduction Schemes
Orthogonal frequency division multiplexing has drawn explosive attention as a new type of high data rate transmission scheme for wireless communication system. OFDM allow the transmission of high data rates over broadband channel due to the spectral bandwidth efficiency, robustness to the multipath delay etc. However OFDM signal are very...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Evaluating the Performance of TCP-Reno, TCP-Newreno and TCP-Vegas on an OBS Network
In TCP over OBS networks, packets from various IP sources assemble into a data burst at the ingress node and are transmitted to egress node cutting through the core network all-optically. The control packet always precedes the data burst by an offset time. This time gap between the control packet...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
Computational Puzzles for Repudiation of Misbehaving Users in Anonym Zing Network
Anonymizing network provides web services to the users and also hide the client's IP address from the server. All data is wrapped with several layer of encryption. The success of this network, hackers can easily deface popular web site. If the users misbehave, blocking particular IP addresses is difficult. Nymble...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
A Review: Mobile Ad-Hoc Network Protocols and Security Issues
The instant growth of communication takes the attention of researchers in this area. A network has categorized with connecting media. Wireless network is most popular now days due to its infrastructure independence. As the Mobile Ad-hoc network is a classification of wireless network. MANET works with radio waves without need...
Provided By International Journal of Advances in Engineering & Technology (IJAET)
-
An Innovative Approach to File Security Using Bluetooth
In this paper, the authors present a system based on nontraditional idea that applies symmetric key encryption algorithm to keep user data secure against unauthorized reading and undetected mutilation. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic...
Provided By International Journal of Scientific Engineering and Technology
-
LDPC Architecture for Improved BER in Wireless Networks
To achieve high throughput in wireless networks a partial parallel LDPC decoder is proposed in this paper. For fully-parallel decoders, it suffers from large hardware complexity caused by a large set of processing units and complex interconnections. In wireless networks coding complexity and routing congestion can be reduced by designing...
Provided By Sathish Valluri
-
Node-Disjoint On-demand Multipath Routing with Route Utilization in Ad-Hoc Networks
Mobile Ad-hoc NETwork (MANET) is a dynamic wireless network without any pre-existing infrastructure and each node therefore operate in a self-organized and decentralized manner, acting as a router. Multipath routing in MANET is a challenging problem. In this paper, an attempt has been made to compare the accomplishment of conspicuous...
Provided By Thapar Institute
-
Analytical Modelling of Localized P2P Streaming Systems under NAT Consideration
NAT has been design to work with Internet client-server structure. The emerged of Peer-To-Peer (P2P) networks and applications revealed the incompatibility between P2P applications and NAT. Many methods has been developed and implemented to solve connectivity between peers behind NAT devices. Nevertheless, various NATing types can't communicate with one another....
Provided By Huazhong University of Science & Technology
-
Organized, Hybridized Network Monitoring
In the world of network monitoring, agents that install locally on servers and other computers and Simple Network Management Protocol (SNMP) are typically used to gather information. Now, there’s a third technology, unique to Windows, called Windows Management Instrumentation (WMI) that gathers more detailed information.
In this white paper,...Provided By Dell Software
-
Network Monitoring: You Need It BEFORE You Need It
Network monitoring is a bit like going to the dentist: it isn't much fun to think about, and it's pretty easy to ignore, until a problem arises. Once that problem does arise, however, you're in a world of pain.
In this white paper, you’ll discover why you shouldn't wait...Provided By Dell Software
-
An Evaluation of Different Routing Schemes in DTN
Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc NETworks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn't exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when...
Provided By Creative Commons
-
Review Paper on Detection and Prevention Techniques of Gray-Hole Attack in Manet
MANET is a kind of wireless ad hoc network. It is a self-configuring network of mobile routers connected by wireless links with no access point. Every mobile device in a network is autonomous. The mobile devices are free to move haphazardly and organize themselves arbitrarily. In other words, ad hoc...
Provided By Creative Commons
-
Monitoring Local Area Network Using Remote Method Invocation
The aim of this paper, is to secure the network or a LAN by implementing such a software which is enable to carry out operations which are capable to monitor whole of the network, sitting on one chair by viewing remote desktop, passing messages to remote system and is also...
Provided By Creative Commons
-
A Novel Approach of Energy Optimization in WSN
The wireless link can be unreliable in realistic Wireless Sensor Networks (WSNs). Energy efficient and reliable data forwarding is important because each node has limited resources. Therefore, the authors must suggest an optimal solution that considers using the information of the node's characteristic A wireless sensor network is composed of...
Provided By Creative Commons
-
Effective Identification of the Intruders and Modifiers in Wireless Sensor Networks
Packet dropping and modification are common attacks that can be launched by an adversary to disrupt communication in wireless multi-hop sensor networks. Many schemes have been proposed to mitigate or tolerate such attacks, but very few can effectively and efficiently identify the intruders. To address this problem, the authors propose...
Provided By Creative Commons
-
Optimal Node Selection Using Broadcasting Algorithm in Mobile Adhoc Network
In optimal node selection using broadcasting algorithm in mobile ad hoc network it finds the nearest optimal node for forwarding messages and the consequent optimal node for receiving and transferring messages and continues up to its destination node. Using 1-hop neighbour information, the sender-based broadcasting algorithm searches local optimal minimum...
Provided By Creative Commons
-
Introduction to the Wimax and Its Related Issues and Its Comparison With Wi-Fi
One of the developing technologies in the recent times which are not yet fully implemented and which requires a lot of research work is WIMAX which was proposed for a goal of bringing the usage of broadband till the 'Last mile'. A lot of concerns and issues regarding this technology...
Provided By Creative Commons
-
Energy Efficiency Analysis Between AODV, LEACH and LEACH-E Using Castalia
Wireless sensor network-a special case of ad hoc network, have emerged as a new technological vision in the field of wireless. There are various existing protocols and techniques from traditional ad hoc networks, that are relevant for wireless sensor networks, but there are also some basic differences which lead to...
Provided By Creative Commons
-
Survey of Multicast Routing Protocol in Mobile Ad Hoc Network
The authors propose a multicast routing protocol in mobile ad-hoc network. Basically there are two types o f multicast routing protocol exist in mobile ad hoc network. A tree based multicast routing protocol has a poor connectivity because there is only a single path is there between sources to destination....
Provided By Creative Commons
-
Survey on Energy Efficiency in DSR/AODV Protocols in Wireless Network
The demand for high data-rate multimedia wireless communications has been growing rapidly. As standards are addressing higher capacity wireless links to meet increasing demands, device power consumption is also increasing. Although silicon technology is progressing exponentially, doubling about every two years, processor power consumption is also increasing by 150% every...
Provided By Creative Commons
-
Parasitic Microstrip Patch Antenna With Enhanced Bandwidth
This paper presents the design and simulation of parasitic Microstrip patch antenna with enhanced bandwidth. The Microstrip patch antenna becomes very popular day by day because of its ease of analysis low cost, light weight, easy to feed and their attractive characteristics. The bandwidth obtained by the proposed antenna structure...
Provided By Creative Commons
-
Wireless Grid Computing
Wireless grids extend the capability of grid computing to wireless devices. The number of users using laptops, PDAs, cell phones, and other wireless devices is increasing leading to more networked wireless devices, and creating a vast collective potential of unexploited resources. Grid computing has attracted worldwide attention in a variety...
Provided By Creative Commons
-
The Implementation of Automatic Fire Rescuing and Information System in a Train Using Zigbee and Sensors Networks
The demand for railway service, have consistently increasing in the last two decades. As a result, more strict safety requirements for railway signaling, control and infrastructure are needed. Same as railway service, in recent years, wireless technology have also advanced rapidly. Especially in this paper the authors are implementing a...
Provided By Creative Commons
-
Zone Divisional Network with Double Cluster Head for Effective Communication in WSN
Wireless sensor networks have brought a revolution in almost every field of sensing. The flexibility in their use makes them favorite for many applications. The limited batteries constraints have been a concerning issue. A lot of research has been directed for the maximum and effectively utilization of energy of sensors....
Provided By Creative Commons
-
A Perspective of Security in Wireless Networks
Technology makes this world as a small globalised village; in fact the people like to consider both the aspect under this network system which makes their world to a global village. In this paper, the authors have taken one of the most amazing network concepts which makes network simpler. By...
Provided By Creative Commons
-
Improving the Energy Efficiency in Multicast Routing for Mobile Adhoc Networks
In this paper, presents a Modified Multicasting through Time Reservation using Adaptive Control for Energy efficiency (MMC-TRACE), an energy-efficient multicasting architecture for mobile ad hoc networks. MMC-TRACE is a cross-layer design, where the medium access control layer functionality and the network layer functionality are performed by a single integrated layer....
Provided By Creative Commons
-
DREAM-OLSR PROTOCOL (Distance Routing Effective Algorithm for Mobility - Optimized Link State Routing)
This paper lays down a proposal of protocol named DREAM-OLSR. The protocol has been developed so as to affect current OLSR (RFC 3626) protocol. The protocol establishes an optimized solution hence the name has been manipulated from open link state routing to DREAM optimized link state routing. DREAM specifies distance...
Provided By Creative Commons
-
Communication Model Development Using Test Data for a Given Protocol
There have been many developments in the field of facilitated model based verification and validation techniques. Most of them have been based upon observing the external behaviour of the system. The authors' approach follows the same and is valid with the source code of the system under observance is not...
Provided By Creative Commons
-
Evaluating Accuracy of Inference and Benefits of Compression Over RFID
Radio-Frequency IDentification (RFID) is the use of a wireless non-contact system that uses radio-frequency electromagnetic fields to transfer data from a tag attached to an object, for the purposes of automatic identification and tracking. RFID offers a number of advantages over previous ID systems. For example, unlike barcodes, RFID tags...
Provided By Creative Commons
-
Emerging Network Technologies That Are Likely to Become Widely Available in the Future
Emerging Networks technologies play an important role in the day-to-day administration of information technology in communications of different types of private and public networks. The emerging network technologies resolve the shortcoming of existing network architecture to enhance the facilitation of communication to the end user. These leads to adoption and...
Provided By Creative Commons
-
Efficient Energy Harvesting Techniques for Medium Access Control Protocol in Wireless Sensor Networks
MAC protocol is the widely used protocol for the transmission of information from the sensor nodes to the remote monitoring location in the wireless sensor networks. The efficiency of MAC protocol designed for battery powered sensors in the wireless sensor networks is limited by the network lifetime so the alternative...
Provided By Creative Commons
-
Georgia Institute of Technology Increases Efficiencies and Improves Business Intelligence With Campus Recreation Software
Located in Atlanta, Georgia Tech is consistently ranked among the top ten public universities in U.S. News & World Report and stands as one of the oldest and most respected technological research universities in the U.S. When Georgia Tech decided to build the new CRC, staff members knew they needed...
Provided By Active Network
-
IR-HARQ vs. Joint Channel-Network Coding for Cooperative Wireless Communication
Wireless communication systems demand the use of many coding techniques for data retransmission between sending and receiving end points to achieve the required system capacity over variant channel conditions. Different developed techniques are introduced such as channel coding, network coding and joint coding to achieve this target. As an improvement...
Provided By Cairo University
-
Social Interactions And Labor Market Outcomes In Cities
The authors develop a model where information about jobs is essentially obtained through friends and relatives, i.e. strong and weak ties. Workers commute to a business center to work and to interact with other people. They find that housing prices increase with the level of social interactions in the city...
Provided By Research Institute of Industrial Economics
-
Internet Protocol-Based Push to Talk
This paper discusses a way of offering voice instant messaging based on Internet Protocol using Session Initiation Protocol. The purpose of this investigation is to enhance the modern social communication amongst the people of South Africa who are already accustomed to text-based instant messaging. The proposed application aims to implement...
Provided By University of the Western Cape
-
Investigating the Intelligibility of Synthetic Sign Language Visualization Methods on Mobile Phones
More than 300,000 South African deaf people, whose first and only language is South African Sign Language (SASL), face difficulty in communicating with hearing people on a daily basis, despite the pressing need to do so. The SASL project at the University of the Western Cape is in the process...
Provided By University of the Western Cape
-
Maximizing Channel Performance
The days when selling through third-party channels were simple are long gone. As more and more providers come to realize the many advantages of selling through these channels, the landscape of channel partner selling has become dramatically more complex. To get the most out of this market, suppliers need to...
Provided By Miller Heiman
-
Radio Communication Model for Mobile Positioning Devices
Location systems are becoming increasingly sought today to ensure the location of distant objects, to facilitate the management of personnel and their products, increase the productivity, etc. These systems are known as AVL (for vehicle location) and generally the RTLS (for Real-Time Location of Several objects). These systems can be...
Provided By University of Sherbrooke
-
Virtual Mobility Domains - A Mobility Architecture for the Future Internet
This paper presents a novel mobility architecture called Virtual Mobility Domains that is designed to work with the Floating Cloud Tiered Internetworking model. Virtual Mobility Domains supports both inter Autonomous System (macro) and intra Autonomous System (micro) mobility by leveraging a tiered addressing, a network cloud concept, and a unique...
Provided By Rochester Group
-
Trade Liberalisation And Import Price Behaviour: The Case Of Textiles And Wearing Apparels
Previous studies on the relationship between exchange rates and traded goods prices typically find evidence of incomplete pass-through, usually explained by pricing-to-market behaviour. Although economic theory predicts that incomplete pass-through may also be linked to presence of non-tariff barriers to trade, variables reflecting such a link is rarely included in...
Provided By Statistics Norway
-
Output-Based Allocation And Investment In Clean Technologies
Allocation of emission allowances may affect firms' incentives to invest in clean technologies. In this paper, the authors show that so-called output-based allocation tends to stimulate such investments as long as individual firms do not assume the regulator to tighten the allocation rule as a consequence of their investments. The...
Provided By Statistics Norway
-
Performance Analysis of Nature Inspired Heuristics for Survivable Virtual Topology Mapping
The high capacity of fibers used in optical networks, can be divided into many channels, using the WDM technology. Any damage to a fiber causes all the channels routed through this link to be broken, which may result in a serious amount of data loss. As a solution to this...
Provided By Marmara University
-
Exploring The Duration Of EU Imports
The objective of this paper is twofold. First, against the background of an existing empirical literature on the duration of trade which has found that international trade is often of strikingly short duration, the authors aim to establish whether or not EU imports from the rest of the world also...
Provided By Research Institute of Industrial Economics
-
A Novel User-Centric Handoff Cost Framework Applied to the Virtual Mobility Domains and IPv6-Based Mobility Protocols
The mobile user population connected to the Internet continues to grow in number and hence provisioning seamless Internet service to such user is a topic of major interest. With new mobility architectures being investigated, it is important to have consistent comparative platforms and metrics. In this paper, the authors introduce...
Provided By Rochester Group
-
Avoiding WIMAX Interference on Ultra Wide Band MB-OFDM System by Cognitive Radio
This paper considers the ECMA-368 standard based on MultiBand Orthogonal Frequency Division Multiplexing (MB-OFDM) as an Ultra WideBand (UWB) system in the presence of interference from an IEEE 802.16 WiMAX systems operating at 3.5 GHz. Simulations are conducted following the standards and adopting the IEEE 802.15.3a channel model CM1. This...
Provided By Cairo University
-
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent characteristics of open medium, very dynamic topology, lack of infrastructure and lack of centralized management authority, MANET present serious vulnerabilities to security attacks. This paper...
Provided By Institut National des Telecommunications
-
Improving Distributed Firewalls Performance Through Vertical Load Balancing
This paper presents an extension to an existing hash based packet classification technique in order to improve its performance in a distributed network access control environment. The paper shows that such architecture can be modified so that flow states can be kept in a distributed fashion thus reducing the space...
Provided By Institut National des Telecommunications
-
Lightweight and Distributed Algorithms for Efficient Data-Centric Storage in Sensor Networks
In this paper the authors propose two algorithms for efficient data-centric storage in wireless sensor networks without the support of any location information system. These algorithms are intended to be applied in environments with large number of sensors where the scalability of the network has great issue. During the first...
Provided By Institut National des Telecommunications
-
Deployment of Software Components: Application to Wireless System
The wide variety of wireless devices brings to design mobile applications as a collection of interchangeable software components adapted to the deployment environment of the software. To ensure the proper functioning of the software assembly and make a real enforcement in case of failures, the introduction of concepts, models and...
Provided By Institut National des Telecommunications
-
Uplink Versus Downlink Wirless Mobile Positioning in UMTS Cellular Radio Systems
A performance comparison between radio Location Positioning (LP) in Wide band Code Division Multiple Access (WCDMA), more precisely in UMTS FDD cellular phones, using the UpLink (UL) and Downlink (DL) scenarios, is carried out. The radio location algorithm using the Time Difference Of Arrival (TDOA) is applied, where the TDOA...
Provided By Institut National des Telecommunications
-
Nothing Stays The Same: Leadership Techniques To Empower People During Change Initiatives
Every organisation is affected by change, especially during times of economic volatility. However, project managers tasked with leading change initiatives are all too aware of the alarming failure rates that can occur. The critical missing piece is largely the failure to take into account how change affects an organisation's people....
Provided By Project Smart
-
SMART Goals Reduce Ambiguity And Increase Commitment
One of the core competencies for leaders is the ability to deal with ambiguity, that condition where things are not what they seem. And the higher in an organisation a leader goes, the more ambiguous things become. Leaders know ambiguity is the enemy of commitment. They know it can't be...
Provided By Project Smart
-
Interviewed Or Interrogated: You're In Control
Questions are the key tool of conversational influence. The person who asked the last question has the most influence on the conversation's direction. Interviewers are tasked with asking the majority of questions during the interview and hence have the greatest influence on the direction and content of the interview. You...
Provided By Net-Temps
-
Earned Value Management Study: Is Your Organisation Ready For EVM?
This paper encourages project managers to participate in an academic survey to help determine if an organisation is ready to apply earned value management to its projects. Earned value management is a project management technique with well over 100 years of history. The initial inception of earned value management was...
Provided By Project Smart
-
Real World Project Management: Communications
It's not that you don't mean to understand your date or your project team member, it's just that you're not listening. You've got a bazillion things racing through your head, you're focused on seven different projects, and the baseball steroid hearings were so frightening that you can't decide how your...
Provided By Project Smart
-
Effective Sensor Relocation Technique in Mobile Sensor Networks
In a wireless senor network, one of the main design challenges is to achieve long network lifetime by turning off some redundant sensor nodes while maintaining sufficient coverage for sensing and connectivity. In this paper, two improved algorithms are proposed, the first one is to find if a sensor is...
Provided By University of Sharjah
-
Storing Data on RFID Tags: A Standards-Based Approach
The potential of Radio Frequency Identification (RFID) for increasing supply chain efficiency has been repeatedly stressed by practitioners and researchers alike. The cross-company usage of RFID applications can only work if the collaborating companies agree on the syntax and semantic used. EPCglobal, an international industry consortium, has specified a stack...
Provided By Humboldt-Universitat zu Berlin
-
Peeling Away Layers of an RFID Security System
The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. The employed algorithms rely on obscurity and consequently did not withstand scrutiny. This paper details how the algorithms were found from opening silicon chips as well as interacting with tags and readers. The security of the...
Provided By Humboldt-Universitat zu Berlin
-
Efficient Signal Quality Improvement Approach for Wideband VoIP System in Pervasive Environment
Voice over Internet Protocol (VoIP) is a the best alternative to the traditional voice communication system, since VoIP system converges the data, voice and video data and reduces the cost of call transmission by passing packets through the available bandwidth through internet protocol. Since the environmental noise may affect the...
Provided By Guru Nanak Dev University
-
MANET Link Performance Parameters Using Ant Colony Optimization Approach
End-to-end delay of routing packets from the source to destination in a Mobile ad-hoc network is a major challenge for a large number of network scientists. This paper presents a new routing approach for Mobile Ad hoc NETworks (MANETs) which takes into consideration the Ant Colony Optimization (ACO) technique in...
Provided By Guru Nanak Dev University
-
Physical Characteristics Based MANET Routing Protocols for Campus Network
Mobile Ad-hoc NETworks (MANETs) consist of mobile devices that rely on wireless media for bilateral communication. These can be set up anywhere and at any time because these require neither infrastructure nor central administration. This paper concentrates on the comparative performance evaluation of three reactive routing protocols Ad Hoc On-demand...
Provided By Guru Nanak Dev University
-
A Survey on Reactive Routing Protocols of the Mobile Ad Hoc Networks
Mobile Ad hoc NETworks (MANET) are wireless networks without an infrastructure, which are usually set up on a temporary basis to serve a particular purpose within a specific period of time. An efficient routing protocol for MANET has become a necessary and important issue to be considered before deploying any...
Provided By Guru Nanak Dev University
-
Simulative Investigation of QoS Parameters for VoIP Over WiMAX Networks
WiMAX is a wireless broadband access technology which provides high data rates, long coverage and IP based connectivity to the stationary as well as mobile users. Voice over Internet Protocol (VoIP) through WiMAX is found to be very promising. In this paper, simulative investigations have been done to identify the...
Provided By Guru Nanak Dev University
-
Performance Analysis and Comparison of MANET Routing Protocols
Advances in wireless technology and portable computing along with demands for greater user mobility have provided a major movement towards development of ad-hoc networks. The main Method for evaluating the performance of MANET's is simulation. An extensive simulation is performed using NS-2 simulator and end to end delay, packet delivery...
Provided By Guru Nanak Dev University
-
Uncertainty-Dependent Data Collection in Vehicular Sensor Networks
Vehicular Sensor Networks (VSNs) are built on top of Vehicular Ad-hoc NETworks (VANETs) by equipping vehicles with sensing devices. These new technologies create a huge opportunity to extend the sensing capabilities of the existing road traffic control systems and improve their performance. Efficient utilisation of wireless communication channel is one...
Provided By Silesian University of Technology
-
Fast Recovery From Link Failures in Ethernet Networks
Fast-recovery from link failures is a well-studied topic in IP networks. Employing fast-recovery in Ethernet networks is complicated as the forwarding is based on destination MAC addresses, which do not have the hierarchical nature similar to those exhibited in Layer 3 in the form of IP-prefixes. Moreover, switches employ backward...
Provided By University of Applied Sciences Rapperswil
-
Countering Selfish Misbehavior in Multi-Channel MAC Protocols
The authors address the problem of MAC-layer misbehavior in distributed multi-channel MAC protocols. They show that selfish users can manipulate the protocol parameters to gain an unfair share of the available bandwidth, while remaining undetected. They identify optimal misbehavior strategies that can lead to the isolation of a subset of...
Provided By University of Applied Sciences Rapperswil
-
Exploiting Self-Interference Suppression for Improved Spectrum Awareness/Efficiency in Cognitive Radio Systems
Inspired by recent developments in full-duplex communications, the authors propose and study new modes of operation for Cognitive Radios with the goal of achieving improved Primary User (PU) detection and/or Secondary User (SU) throughput. Specifically, they consider an opportunistic PU/SU setting in which the SU is equipped with partial/complete Self-Interference...
Provided By University of Applied Sciences Rapperswil
-
Power-Efficient Spatial Multiplexing for Multiantenna MANETs
The authors consider the problem of minimizing network's transmit power for given transmission rate demands of all links in a Multi-Input Multi-Output (MIMO) ad hoc network. The problem is non-convex, hence, challenging to be solved, even in a centralized manner. To derive a distributed solution, they reformulate the problem as...
Provided By University of Applied Sciences Rapperswil
-
Interference Mitigation Using Spectrum Sensing and Dynamic Frequency Hopping
Wireless communications are prone to both unintentional and intentional RF interference. Such interference has significant impact on the reliability of packet transmissions. In this paper, the authors consider interference mitigation in Frequency Hopping (FH) systems. They employ Cognitive Radios (CRs) for proactive interference sensing in such systems. Through this proactive...
Provided By University of Applied Sciences Rapperswil
-
Out-of-Band Sensing Scheme for Dynamic Frequency Hopping in Satellite Communications
This paper makes preliminary steps at exploring a novel application of Cognitive Radios (CRs) for reliable satellite communications. The authors propose the use of dynamically adjusted Frequency Hopping (FH) sequences for satellite transmissions. Such sequences are more robust against smart eavesdropping and targeted interference than fixed FH sequences. In their...
Provided By University of Applied Sciences Rapperswil