Filters








354 Hits in 4.7 sec

CARD: A Contact-based Architecture for Resource Discovery in Wireless Ad Hoc Networks

Ahmed Helmy, Saurabh Garg, Nitin Nahata, Priyatham Pamu
2005 Journal on spesial topics in mobile networks and applications  
In this paper we propose a novel architecture, CARD, for resource discovery in large-scale wireless ad hoc networks.  ...  Contacts help in creating a small world in the network and provide an efficient way to query for distant resources.  ...  Conclusions In this paper we presented the CARD architecture for resource discovery and small transfers in large-scale ad hoc networks.  ... 
doi:10.1023/b:mone.0000048549.15371.53 fatcat:37pg4i6an5bhppzhlkaanwkbx4

Contact-based architecture for resource discovery (CARD) in large scale MANets

A. Helmy, S. Garg, P. Pamu, N. Nahata
Proceedings International Parallel and Distributed Processing Symposium  
In this paper we propose a novel architecture, CARD, for resource discovery in large scale MANets that may scale up to thousands of nodes.  ...  Contacts help in creating a small world in the network and provide an efficient way to query for distant resources.  ...  Conclusions In this paper we presented the CARD architecture for resource discovery in large-scale ad hoc networks.  ... 
doi:10.1109/ipdps.2003.1213401 dblp:conf/ipps/HelmyGPN03 fatcat:ogie4aodhnfararw5r66u6x2c4

Approaches in Key Management Schemes in Mobile Ad-Hoc Networks: A Review

Nisha Sharma, Dr.Sugandha Singh
2016 IOSR Journal of Computer Engineering  
MANET (Mobile Ad hoc Network) is a convenient infrastructure-less contact web that is often susceptible to assorted assaults.  ...  Countless critical management schemes for MANETs are given to fix assorted protection problems.  ...  In [6] , authors delineate Instituted on the characteristic of MANET; this paper projected an Id-based and hierarchical cluster key association scheme on large-scale MANET.  ... 
doi:10.9790/0661-1804021014 fatcat:rjb25nuj5fee5a5fuzhdxew3ca

The Future Internet convergence of IMS and ubiquitous smart environments: An IMS-based solution for energy efficiency

Paolo Bellavista, Giuseppe Cardone, Antonio Corradi, Luca Foschini
2012 Journal of Network and Computer Applications  
The push from academia and industry for this kind of services shows that time is mature for a more general support framework for Pervasive Sensing solutions able to enhance frail architectures, promote  ...  The wide availability of new devices and the large amount of data they can access enable a wide range of novel services in different areas, spanning from simple data collection systems to socially-aware  ...  with Cloud architectures that provide large-scale data processing and storing capabilities [51] .  ... 
doi:10.1016/j.jnca.2011.05.003 fatcat:3iprgfdvmjfxxey67qtflilnri

Topics in ad hoc and sensor networks

S. Giordano, C. Rosenberg
2006 IEEE Communications Magazine  
Indeed, it is not realistic that in the short-term, MANET be deployed on a large scale for general applications in a completely uncontrolled environment.  ...  To summarize, the users' evaluation indicates the following major problems in pure generalpurpose MANET: for attracting MANET utilization by end users, studying large-scale pure MANET for supporting general-purpose  ... 
doi:10.1109/mcom.2006.1632655 fatcat:bshvl25b6vfhpausiltwnzv7fi

Peer-to-Peer Overlay in Mobile Ad-hoc Networks [chapter]

Marcel C. Castro, Andreas J. Kassler, Carla-Fabiana Chiasserini, Claudio Casetti, Ibrahim Korpeoglu
2009 Handbook of Peer-to-Peer Networking  
Wireless multi-hop networks such as mobile ad-hoc (MANET) or wireless mesh networks (WMN) have attracted big research efforts during the last years as they have huge potential in several areas such as  ...  The causes and problems for low performance of traditional approaches are discussed.  ...  Acknowledgements This work was supported by the European Commission in the framework of the FP7 Network of Excellence in Wireless COMmunications NEWCOM++ (contract n. 216715)  ... 
doi:10.1007/978-0-387-09751-0_37 fatcat:wssgde5n6balhaggrv3vqfrrzq

Mobility Management for All-IP Mobile Networks [chapter]

Quan Le-Trung, Paal Engelstad, Tor Skeie, Frank Eliassen, Amirhosein Taherkordi
2011 Emerging Wireless Networks  
It must be large enough to cover the large-scale MANETs and reduce the probability of address conflicts.  ...  The management of universal mobility, including both large-scale macro-mobility and local scale micro-mobility, is the focus of [9] .  ...  to ensure that the source MANET IP address and source MANET UDP port number are translated consistently by the same NAT-based IGW.  ... 
doi:10.1201/b11420-4 fatcat:47vvjt37xbfjdhs2egr4xhrvoy

Use of Ad Hoc Networks for Wireless Internet Access

Jouni Maenpaa
2007 2007 6th Conference on Telecommunication Techno-Economics  
In addition to a number of technical concerns, many business model related issues were discussed.  ...  Also a number of barriers regarding the use of ad hoc networks for wireless Internet access were identified.  ...  Figure 1 -Integrating MANETs and the Internet The architecture for integrating MANETs and the global Internet is summarized in Figure 1 .  ... 
doi:10.1109/ctte.2007.4389892 dblp:conf/ctte/Maenpaa07 fatcat:fyjejpaaxnhylfk66tzn67ljx4

From MANET to people-centric networking: Milestones and open research challenges

Marco Conti, Chiara Boldrini, Salil S. Kanhere, Enzo Mingozzi, Elena Pagani, Pedro M. Ruiz, Mohamed Younis
2015 Computer Communications  
with limited research opportunities, and the hot and emerging research areas for which further research is required.  ...  We start by briefly discussing the MANET paradigm, and why the research on MANET protocols is now a cold research topic. Then we analyze the active research areas.  ...  As we have learned from the Internet, large-scale deployment requires a very flexible architecture.  ... 
doi:10.1016/j.comcom.2015.09.007 fatcat:lulxgenaj5aijii5wwi3dncoby

A Review of Addressing Protocols in Mobile Ad-hoc Networks

N. Ramakrishnaiah, P. Chenna
2015 International Journal of Computer Applications  
A Mobile Ad hoc Network (MANET) is a self organizing, multi-hop wireless network without infrastructure. Most of the research in the area of MANETs focuses on routing protocols.  ...  Address resources are uniformly dispersed for each node in the network. RAA suits for small and normal scale MANETs. Hsu et al. [24] suggested an addressing scheme, called prime DHCP (PDHCP).  ...  It is suitable for large scale networks but lot of overhead is incurred in synchronizing the duplicate detection servers.  ... 
doi:10.5120/ijca2015907546 fatcat:urwqognsxvdexbsss3bgfz7eda

The quest for a killer app for opportunistic and delay tolerant networks

Anders Lindgren, Pan Hui
2009 Proceedings of the 4th ACM workshop on Challenged networks - CHANTS '09  
Much work have been done regarding network architectures and algorithms for routing and forwarding in such networks.  ...  In the past, we have seen other research areas become over-hyped and later die out as there was no killer app for them that made them useful in real scenarios.  ...  This work has been carried out in part within the IST 7th Frame-work Programme Integrated Project 4WARD, funded in part by the Commission of the European Union.  ... 
doi:10.1145/1614222.1614233 dblp:conf/mobicom/LindgrenH09 fatcat:gphi4mgghnfphnermaapgnnsfu

Security middleware approaches and issues for ubiquitous applications

Jameela Al-Jaroodi, Imad Jawhar, Alyaziyah Al-Dhaheri, Fatmah Al-Abdouli, Nader Mohamed
2010 Computers and Mathematics with Applications  
Middleware is an essential layer in the architecture of these new systems, and recently, more emphasis has been put on security middleware as an enabling component for ubiquitous applications.  ...  This is due to the high levels of personal and private data sharing in these systems.  ...  We would also like to thank the anonymous reviewers for their valuable comments and suggestions that helped us produce a more concise article.  ... 
doi:10.1016/j.camwa.2010.01.009 fatcat:ds73w7jfo5ejvpdpwlgtmq2lba

Survey of Wireless MANET Application in Battlefield Operations

Dr C, Dr. A.
2011 International Journal of Advanced Computer Science and Applications  
In this paper, we present a framework for performance analysis of wireless MANET in combat/battle field environment.  ...  Research efforts also focus on issues such as Quality of Service (QoS), energy efficiency, and security, which already exist in the wired networks and are worsened in MANET.  ...  Hybrid routing protocols try to maximize the benefit of proactive routing and reactive routing by utilizing proactive routing in small networks (in order to reduce delay), and reactive routing in large-scale  ... 
doi:10.14569/ijacsa.2011.020108 fatcat:pyu4geatcnalhbifylkpkndz44

An Adaptive Approach to Service Discovery in Ad Hoc Networks [chapter]

Carlos Henrique Pereira Augusto, José Ferreira de Rezende
2006 IFIP International Federation for Information Processing  
This paper proposes a scalable service discovery architecture based on directory nodes organized in an overlay network.  ...  Service discovery allows the interaction between network nodes to cooperate in activities or to share resources in client-server, multi-layer, as well as in peer-to-peer architectures.  ...  Independent of Routing Protocol In The Card proposal [13] uses small world concepts to establish long-range contacts in the ad hoc network.  ... 
doi:10.1007/978-0-387-34736-3_4 fatcat:dilblqcwgrgcxesw2jv6m3iowu

End-to-end support for statistical quality of service in heterogeneous mobile ad hoc networks

Jamal N. Al-Karaki, Ahmed E. Kamal
2005 Computer Communications  
Since QoS routing is the first step toward achieving end-to-end QoS guarantees in heterogeneous MANETs, we propose a QoS routing protocol for heterogeneous MANETs.  ...  The heterogeneity of MANETs makes end-to-end support for Quality of Service (QoS) guarantees more difficult than in other types of networks, not to mention the limited bandwidth and frequent topology changes  ...  Previous schemes for hierarchical routing in MANETs have focused on two main strategies: the zone based routing [14, 8] and the dominating set routing [11, 18, 19] .  ... 
doi:10.1016/j.comcom.2004.07.038 fatcat:u23u7zuuhrci7awc6r2mv7rozq
« Previous Showing results 1 — 15 out of 354 results