81 Hits in 6.3 sec

An experimental study of wireless connectivity and routing in ad hoc sensor networks for real-time soccer player monitoring

Vijay Sivaraman, Ashay Dhamdhere, Hao Chen, Alex Kurusingal, Sarthak Grover
2013 Ad hoc networks  
We believe our study is the first to characterise the wireless environment for mobile sensor networks in field sports, and paves the way towards realisation of real-time athlete monitoring systems. $ This  ...  Live physiological monitoring of soccer players during sporting events can help maximize athlete performance while preventing injury, and enable new applications for referee-assist and enhanced television  ...  Our model does not make any assumptions specific to the operating environment, and as such can be applied to model dynamic topologies arising in any mobile ad-hoc or delay tolerant network studies.  ... 
doi:10.1016/j.adhoc.2012.09.005 fatcat:4xmrdeld5raljeg5gu2u5rdnie

Multi-hop MAC: IEEE 802.11s Wireless Mesh Networks [chapter]

Ricardo C. Carrano, Débora C. Muchaluat Saade, Miguel Elias M. Campista, Igor M. Moraes, Célio Vinicius N. de Albuquerque, Luiz Claudio S. Magalhães, Marcelo G. Rubinstein, Luís Henrique M. K. Costa, Otto Carlos M. B. Duarte
2009 Encyclopedia on Ad Hoc and Ubiquitous Computing  
Traditional solutions for WMNs use network-level routing protocols to allow multihop forwarding among wireless mesh nodes.  ...  This chapter presents IEEE 802.11s, an emerging standard for wireless mesh networks (WMNs). IEEE 802.11s proposes multihop forwarding at the MAC level, which is a new approach for building WMNs.  ...  Acknowledgments The authors would like to thank Javier Cardona from Cozybit and Michalis Bletsas from OLPC for their valuable comments regarding IEEE 802.11s implementation.  ... 
doi:10.1142/9789812833495_0019 fatcat:fvl4lukabzeffmgh3ymjd4xhaa


Ram Ramanathan
2005 Proceedings of the 11th annual international conference on Mobile computing and networking - MobiCom '05  
Despite decades of research and development, mobile ad hoc networks (MANETs) continue to lag behind wireline networks in terms of latency, capacity and robustness.  ...  Proc Proc Proc Proc Proc Proc Queueing Wait for access Backoff Retransmission Physical MAC/ Link Network Forwarding Queuing Packet Packet Figure 1: Today's ad hoc networking imposes a lot of delay at each  ...  Redi for their valuable feedback. We also thank the Mobicom TPC for their suggestions, which helped greatly to improve the paper.  ... 
doi:10.1145/1080829.1080843 dblp:conf/mobicom/Ramanathan05 fatcat:lrwt5ijecvhadb5ptmqav72jeu

Synchronous Transmissions in Low-Power Wireless

Marco Zimmerling, Luca Mottola, Silvia Santini
2020 ACM Computing Surveys  
We refer to this concept as link-based transmissions, which are used by the vast majority of low-power wireless protocols, for example, as it allows to adopt well-known approaches from wired networking  ...  The semantics we associate to this term defines the scope of our work: In low-power wireless networks, a communication protocol is regarded as providing applications with functionality for data collection  ...  ACKNOWLEDGMENTS We thank Carlo Alberto Boano, Carsten Herrmann, Fabian Mager, Johannes Richter, and Romain Jacob for their constructive feedback on earlier drafts of this article.  ... 
doi:10.1145/3410159 fatcat:f6vcebbpkrgy3atqr4yazitjg4

Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services [article]

Marco Zimmerling, Luca Mottola, Silvia Santini
2020 arXiv   pre-print
We survey the growing number of protocols that exploit synchronous transmissions for higher robustness and efficiency as well as unprecedented functionality and versatility compared to conventional designs  ...  Low-power wireless communication is a central building block of Cyber-physical Systems and the Internet of Things.  ...  ACKNOWLEDGMENTS We thank Carlo Alberto Boano, Carsten Herrmann, Fabian Mager, Johannes Richter, and Romain Jacob for their constructive feedback on earlier drafts of this paper.  ... 
arXiv:2001.08557v2 fatcat:q5anxtjmafbqjo4gljwvmk4fhe

An Integrated Multi-layer Approach for Seamless Soft Handoff in Mobile Ad Hoc Networks

Hui Zeng, Jason H. Li, Subir Das, Anthony McAuley, John Lee, Thomas Stuhrmann, Mario Gerla
2011 Journal of Communications  
The handoff problem in ad hoc networks needs to be treated through an integrated multi-layer approach, due to its major differences with respect to the counterpart in infrastructure-based networks.  ...  Index Terms-seamless handoff; MANET; cross layer design; wireless heterogenity; cellular network I.  ...  and ad hoc WiFi networks.  ... 
doi:10.4304/jcm.6.1.16-28 fatcat:lixncvxv4nervnoud2rjmfvcim

A Brief Survey on 5G Wireless Mobile Network

Marwan A., Ali Mohammed, Mohd. Yamani
2017 International Journal of Advanced Computer Science and Applications  
The new upcoming technology of the fifth generation wireless mobile network is advertised as lightning speed internet, everywhere, for everything, for everyone in the nearest future.  ...  In this brief survey, we highlight some of the most recent developments towards the 5G mobile network.  ...  In [52] the authors proposed for the new 5G network an ad-hoc D2D network using a group key agreed between the devices which allow them to control routing processes.  ... 
doi:10.14569/ijacsa.2017.081107 fatcat:gmx6vykmorbrrbvi6niaga5njy

A survey of security issues in mobile ad hoc and sensor networks

D. Djenouri, L. Khelladi, A.N. Badache
2005 IEEE Communications Surveys and Tutorials  
Earlier studies on mobile ad hoc networks (MANETs) aimed at proposing protocols for some fundamental problems, such as routing, and tried to cope with the challenges imposed by the new environment.  ...  Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability of wireless links, the limited physical protection of nodes, the dynamically changing topology, the absence  ...  Many thanks are due to our colleagues at CERIST, Souad Benmeziane and Derhab Abdelouahid, for their reviews.  ... 
doi:10.1109/comst.2005.1593277 fatcat:rs4nd35to5g63fzvplgg75ftu4

Vehicular ad hoc networking based on the incorporation of geographical information in the IPv6 header

Wim Vandenberghe, Erwin Van de Velde, Chris Blondia, Ingrid Moerman, Piet Demeester
2012 EURASIP Journal on Wireless Communications and Networking  
Several approaches can be identified in the domain of vehicular ad hoc networks (VANET).  ...  Internet Protocol version 6 (IPv6) networking and non-IP geographical networking can each fulfill a subset of the application requirements.  ...  To enable such forms of interaction, vehicles equipped with local wireless communication interfaces are interconnected in vehicular ad hoc networks (VANET).  ... 
doi:10.1186/1687-1499-2012-316 fatcat:tsng4vwhjbbjxp5uxml5er4pky

A routing protocol using a reliable and high-throughput path metric for multi-hop multi-rate ad hoc networks

Hieu Cao Trong, Sungwon Lee, Choong Seon Hong
2011 Annales des télécommunications  
In this paper, a high-throughput routing protocol for multi-rate ad hoc networks using lower layer information is proposed.  ...  Keywords Multi-rate ad hoc networks · High throughput · Reliability · Routing metric · Cross layer Introduction Ad hoc networks currently have become an ideal topology for establishing instant communication  ...  multi-rate ad hoc networks.  ... 
doi:10.1007/s12243-011-0272-9 fatcat:oxppqy4qijdejllkbm2kxr22rq

Large Scale Environmental Monitoring through Integration of Sensor and Mesh Networks

Raja Jurdak, Abdelhamid Nafaa, Alessio Barbirato
2008 Sensors  
To address this issue, we propose a new communication architecture that integrates sensor networks with medium range wireless mesh networks, and provides users with an advanced web portal for managing  ...  Monitoring outdoor environments through networks of wireless sensors has received interest for collecting physical and chemical samples at high spatial and temporal scales.  ...  The sensors can be deployed in ad hoc fashion in the area of interest, with no requirement for a communication infrastructure.  ... 
doi:10.3390/s8117493 pmid:27873941 pmcid:PMC3787457 fatcat:iyw2ow6crbbdxoah2shm74foya

A Survey of Intrusion Detection Schemes in Wireless Sensor Networks

2012 American Journal of Applied Sciences  
Wireless Sensor Networks (WSNs) are currently used in many application areas including military applications, health related applications, control and tracking applications and environment and habitat  ...  The harsh and unattended deployment of these networks along with their resource restrictions makes their security issue very important.  ...  According to Akyildiz et al. (2002) , there are some features that make WSNs different from other Mobile Ad-hoc NETworks (MANET).  ... 
doi:10.3844/ajassp.2012.1636.1652 fatcat:7ogyqygzfva6bh6xj2ik7zo6pm

Distributed and control theoretic approach to intrusion detection

Rahul Khanna, Huaping Liu
2007 Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07  
Ad hoc wireless networks are more vulnerable to malicious attacks than traditional wired networks due to the silent nature of these attacks and the inability of the conventional intrusion detection systems  ...  This drives the defensive response based on hysteresis to reduce the frequency of false positives, thereby avoiding inappropriate ad hoc responses.  ...  In a mobile ad hoc network (MANET) with self-regulating properties [1] it deals with challenges related to resource-constrained, fully-mobile, self configuring, multi-hop wireless networks with varying  ... 
doi:10.1145/1280940.1280965 dblp:conf/iwcmc/KhannaL07 fatcat:yovnkxu645bcrmynslfknknbi4

A survey and comparison of peer-to-peer overlay network schemes

Eng Keong Lua, J. Crowcroft, M. Pias, R. Sharma, S. Lim
2005 IEEE Communications Surveys and Tutorials  
There has been much interest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution, and application-level multicast  ...  Different DHT-based systems will have different organization schemes for the data objects and its key space and routing strategies.  ...  ACKNOWLEDGMENT The authors would like to thank the reviewers for their valuable comments.  ... 
doi:10.1109/comst.2005.1610546 fatcat:wbzstyu4yzddfbw4zmu5r3yzxm

A survey of strategies for communication networks to protect against large-scale natural disasters

Teresa Gomes, Janos Tapolcai, Christian Esposito, David Hutchison, Fernando Kuipers, Jacek Rak, Amaro de Sousa, Athanasios Iossifides, Rui Travanca, Joao Andre, Luisa Jorge, Lucia Martins (+6 others)
2016 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM)  
Moreover, the network architecture should be designed so that network connectivity is maintained among nodes outside of the impacted area, while ensuring that services for costumers not in the affected  ...  As a first step towards achieving disaster resilience, the RE-CODIS project was formed, and its Working Group 1 members conducted a comprehensive literature survey on "strategies for communication networks  ...  A mechanism for auto-reconfiguration on link failures is also proposed.  ... 
doi:10.1109/rndm.2016.7608263 dblp:conf/rndm/GomesTEHKRSITAJ16 fatcat:mb3e4lyeizbk7a6yyec57sxqpe
« Previous Showing results 1 — 15 out of 81 results