By Topic

Networking, 2007. ICN '07. Sixth International Conference on

Date 22-28 April 2007

Filter Results

Displaying Results 1 - 25 of 108
  • Sixth International Conference on Networking - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (2274 KB)
    Freely Available from IEEE
  • Sixth International Conference on Networking - Title page

    Publication Year: 2007, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (2274 KB)
    Freely Available from IEEE
  • Sixth International Conference on Networking - Copyright notice

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (131 KB)
    Freely Available from IEEE
  • Sixth International Conference on Networking - TOC

    Publication Year: 2007, Page(s): v
    Request permission for commercial reuse | PDF file iconPDF (220 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2007, Page(s): vi
    Request permission for commercial reuse | PDF file iconPDF (40 KB) | HTML iconHTML
    Freely Available from IEEE
  • Committee

    Publication Year: 2007, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Energy Efficiency in the Mobile Ad Hoc Networking Approach to Monitoring Farm Animals

    Publication Year: 2007, Page(s): 1
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (655 KB) | HTML iconHTML

    Using mobile ad hoc networks (MANETs) for monitoring bovine animals potentially offers high increase in the profitability of cattle production. In this paper we propose a formal model for the cattle monitoring system. Then we formulate the requirements for the MANET routing protocol for such systems. We identify a suitable MANET routing protocol that satisfies these requirements and adapt it to ou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anonymous Routing in MANET Using Random Identifiers

    Publication Year: 2007, Page(s): 2
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (245 KB) | HTML iconHTML

    Anonymous communication methods, try to prevent traffic analysis attacks by hiding nodes' identities from outside observers. As a result, adversaries can not find any correlation between observed traffic patterns and nodes' real information. In this paper, we have introduced PseudoAODV protocol in which origin identifiers of nodes are replaced by randomly generated pseudonyms in ad hoc on demand d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic Engineering in Fourth Generation Wireless Networks

    Publication Year: 2007, Page(s): 3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    We present an extension to the multiprotocol label switching (MPLS) traffic engineering in fourth generation (4G) composite networks. In a 4G composite network users should be able to select among various radio access technologies that can individually or collectively satisfy the users' capacity and quality of service requirements. The extension provides the ability to diverge traffic flows away f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A-sLEACH: An Advanced Solar Aware Leach Protocol for Energy Efficient Routing in Wireless Sensor Networks

    Publication Year: 2007, Page(s): 4
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB) | HTML iconHTML

    Energy consumption plays a crucial role in wireless sensor networks as these networks are designed to be placed in hostile and non-accessible areas. While battery-driven sensors will run out of battery sooner or later, the use of renewable energy sources such as solar power extends the lifetime of a sensor network. We propose a solar-aware, scheduled clustered routing protocol A-sLEACH which is an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Transmission Power Control MAC Protocol for Wireless Sensor Networks

    Publication Year: 2007, Page(s): 5
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Wireless sensor networks have been widely used in many important fields. Medium Access Control (MAC) protocols have a significant effect on the function and performance of sensor networks. At present, most MAC protocols use the same transmission power when sensor nodes send packets. However, the deployment of the sensor nodes is asymmetrical in wireless sensor networks, which will bring more energ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Performance of V-BLAST Detectors in MIMO MT-CDMA Uplink over Multipath Fading Channel

    Publication Year: 2007, Page(s): 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    In this paper, an asynchronous multiple-input multiple-output multitone code division multiple access (MIMO MT-CDMA) scheme for the uplink of the mobile communication in a frequency selective fading channel is analyzed. Maximum ratio combining (MRC) and linear zero-forcing (ZF) V-BLAST detectors are applied at the receiver. The average bit error rate (BER) expression for uniform multipath power pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EDDS: An Efficient Data Delivery Scheme for Address-Free Wireless Sensor Networks

    Publication Year: 2007, Page(s): 7
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    Addressing plays an important role in traditional networks but incurs much overhead for resource-constrained wireless sensor networks (WSNs).Therefore, address-free sensor network has been proposed by researchers. However, current data delivery schemes are mainly proposed for address-based sensor networks and can't be directly applied to the new architecture. In this paper, we propose an efficient... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Link Reliability-Aware Route Maintenance Mechanism for Mobile Ad Hoc Networks

    Publication Year: 2007, Page(s): 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Hosts in mobile ad hoc networks (MANET) are capable of self-configuration and they can migrate at will, which makes the network topology highly dynamic. Thus, routes may break easily since the data session fails when one node moves out of the sensing range of its partner. Besides that, if overused, nodes tend to drain their power completely due to the limited battery life. That will result in a sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Virtual Anchor Node-Based Localization Algorithm for Wireless Sensor Networks

    Publication Year: 2007, Page(s): 9
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB) | HTML iconHTML

    The accuracy of localization is a significant criterion to evaluate the practical utility of localization algorithm in wireless sensor networks. In mostly localization algorithms, one of the main methods to improve localization accuracy is to increase the number of anchor nodes. But the number of anchor nodes is always limited because of the hardware restrict, such as cost, energy consumption and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • GeoPPRA: An Energy-Efficient Geocasting Protocol in Mobile Ad Hoc Networks

    Publication Year: 2007, Page(s): 10
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (175 KB) | HTML iconHTML

    In this paper, a variant of the conventional multicasting called geocasting, or location-based multicasting, is presented. The proposed scheme combines anycasting, restricted broadcasting, and local broadcasting to deliver packets to a group of nodes presented in a specific geographic region called geocast region. Also, the proposed scheme utilizes a pheromone-aided multipath algorithm (PPRA) to p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulative Considerations for Future 4G Hierarchical Mobility Management in All-IP Networks

    Publication Year: 2007, Page(s): 11
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    The convergence of future fixed and wireless networking more and more requires solutions for transporting realtime application data to IP enabled mobile devices and mobile networks. Even if the general Mobile IPv6 protocol performs sufficient in macro environments with non-realtime requirements, seamless mobility demands some more enhanced protocol procedures in between the mobile client and the i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Adaptive Schedule Medium Access Control for Wireless Sensor Networks

    Publication Year: 2007, Page(s): 12
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (262 KB) | HTML iconHTML

    Many media access control (MAC) protocols for wireless sensor networks (WSNs) such as sensor MAC (S-MAC) and carrier sense multiple access with minimum preamble sampling (CSMA-MPS) exploit listen/sleep cycles to conserve energy. The cycles of nodes influence the network performances such as energy efficiency, packet latency and throughput in WSNs. In this paper, an adaptive schedule medium access ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless Sensor Network Based Coal Mine Wireless and Integrated Security Monitoring Information System

    Publication Year: 2007, Page(s): 13
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (275 KB) | HTML iconHTML

    According to the actual landform of underground coal mine and the demand of security monitoring, in this paper a coal mine wireless and integrated security monitoring system which combine wireless sensor network and wire monitoring network is proposed. This paper emphasizes a wireless sensor network for coal mine monitoring. In the light of the actual circumstances of coal mine, we propose two-lev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Influence of Release Timer on MAC-hs Performance

    Publication Year: 2007, Page(s): 14
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    The MAC-hs protocol of HSDPA ensures retransmissions of erroneous blocks and in-sequence data delivery to the upper layer. The first function is fulfilled through the HARQ mechanism. The second function is achieved by handling sliding transmitting/receiving window and by numbering of blocks. In this paper, the MAC-hs performance for different MAC-hs window sizes and channel conditions are studied.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Effective Multicasting Routing Protocol in Wireless Mobile Adhoc Network

    Publication Year: 2007, Page(s): 15
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB) | HTML iconHTML

    With the advance of wireless communication technology, portable computers with radios are being increasingly deployed in common activities. Applications such as conferences, meetings, lectures, crowed control, search and rescue, disaster recovery, and automated battlefields typically do not have central administration. In adhoc networks, each host must act as a router since routes are mostly multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)

    Publication Year: 2007, Page(s): 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    Lack of infrastructure, central controlling authority and the properties of wireless links make mobile ad hoc networks (MANETs) vulnerable to attacks. Several protocols have been proposed to make the routing protocols handle attacks in MANETs. These protocols detect the misbehaving nodes and re-route the data packets around them, mostly along the shortest such path. However, no single protocol han... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WiMAX Performance Evaluation

    Publication Year: 2007, Page(s): 17
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    In recent time, new advanced wireless systems emerged at the world markets. One of the most promising is undoubtedly IEEE 802.16 standard, also known as WiMAX. For both, service providers and potential customers, is necessary to know its basic capabilities, such as the number of supported subscriber per BS or transferred data rate that may be delivered. This paper is aimed at 802.16-2004 standard ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Approach for the Selection of Super Peers in Ad Hoc Networks

    Publication Year: 2007, Page(s): 18
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (223 KB) | HTML iconHTML

    Peer-to-peer and mobile ad hoc networks have established a strong connection due to the fact that peer-to-peer models present effective solutions for decentralized systems. Pure and hybrid peer-to-peer networks have propagated as design models for such decentralized systems. Super-peer networks, in which some nodes (super peers) are selected and assigned special roles, have been proposed as a comp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Localized Support for Injection Point Election in Hybrid Networks

    Publication Year: 2007, Page(s): 19
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (242 KB) | HTML iconHTML

    Ad-hoc networks, a promising trend in wireless technology, fail to work properly in a global setting. In most cases, self-organization and cost-free local communication cannot compensate the need for being connected, gathering urgent information just-in-time. Equipping mobile devices additionally with GSM or UMTS adapters in order to communicate with arbitrary remote devices or even a fixed networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.