• Nenhum resultado encontrado

[PDF] Top 20 AN EFFICIENT QOS MECHANISM FOR MULTICAST ROUTING WITH ODMRP IN WIRELESS ADHOC NETWORKS

Has 10000 "AN EFFICIENT QOS MECHANISM FOR MULTICAST ROUTING WITH ODMRP IN WIRELESS ADHOC NETWORKS" found on our website. Below are the top 20 most common "AN EFFICIENT QOS MECHANISM FOR MULTICAST ROUTING WITH ODMRP IN WIRELESS ADHOC NETWORKS".

AN EFFICIENT QOS MECHANISM FOR MULTICAST ROUTING WITH ODMRP IN WIRELESS ADHOC NETWORKS

AN EFFICIENT QOS MECHANISM FOR MULTICAST ROUTING WITH ODMRP IN WIRELESS ADHOC NETWORKS

... The wireless usage has increased rapidly and there is a huge shift in users' ...Hoc networks can provide better features if there is a proper QoS multicasting strategy ...Demand ... See full document

7

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

... lot in WSN; it is IEEE ...topic in WSN, which ensures the flexibility of access and meanwhile balances some requirements in QoS bandwidth and ...equipment with low-complexity, low-cost, ... See full document

8

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks

... Secure Routing Protocol for Sensor Networks consists of a hierarchical network with CHs and cluster member ...sensor networks under different types of ...and an algorithm for generating ... See full document

11

A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

A Novel Energy Efficient Mechanism for Secured Routing of Wireless Sensor Network

... Large-scale wireless sensor networks are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless ...As wireless sensor ... See full document

7

Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

Energy Efficient Routing in Mobile Adhoc Networks based on AODV Protocol

... covering an area of 800 * 800 m 2 and a test bed of 20 nodes randomly and uniformly distributed in the entire ...of wireless mobile nodes is fixed to ...m/s with a pause time of 5 seconds and ... See full document

6

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

Secret Key Establishment for Symmetric Encryption over Adhoc Networks

... mobile adhoc networks [3], the nodes can move while communicating, there are no fixed base stations and all the nodes in the network act as routers as well as hosts to facilitate the unconstrained ... See full document

5

Topology Discovering and Power saving Mechanism for Routing in a Tree of Ad-hoc Wireless Networks

Topology Discovering and Power saving Mechanism for Routing in a Tree of Ad-hoc Wireless Networks

... done in a manner that the summation of the transmission powers at all nodes in the path is ...minimized. In [14] , is demonstrated that minimum energy multicast tree problem is NP complete by ... See full document

12

The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

The Convergence Scheme on Network Utility Maximization in Wireless Multicast Networks

... based wireless mesh networks (WMNs) have been mainly investigated for extending wireless transmission throughput ...transmission in the networks, contending is also increased in ... See full document

7

QoS Enabled Hierarchical Robust Multicast Routing Protocol (QHRMR) in Wireless Networks

QoS Enabled Hierarchical Robust Multicast Routing Protocol (QHRMR) in Wireless Networks

... complications in calculations has made these trees of little realistic ...well with improving system ...deal with the scalability problem associated with smooth routing ...and ... See full document

10

HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

HLAODV - A Cross Layer Routing Protocol for Pervasive Heterogeneous Wireless Sensor Networks Based On Location

... stack in an attempt to optimize the use of their scarce resources. In particular, the routing problem, has received a great deal of interest from the research community with a great ... See full document

10

J. Microw. Optoelectron. Electromagn. Appl.  vol.9 número2

J. Microw. Optoelectron. Electromagn. Appl. vol.9 número2

... However, in normal deflection routings, when the traffic load is relatively low, deflection routing can greatly reduce the burst blocking probability, but the effect of deflection decreases when the traffic ... See full document

10

Analysis of loss networks with routing

Analysis of loss networks with routing

... these networks is analyzed by considering heavy traffic ...loss networks. A study of the time evolution of loss networks under this scaling has been achieved by Hunt and Kurtz ...considered in ... See full document

17

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

Intrusion Tolerant Routing Protocols for Wireless Sensor Networks

... Some routing protocols depend on HELLO messages so that nodes may discover their ...and with that make a large number of nodes think that their are their ...the routing mechanism so that the ... See full document

114

A bounded heuristic for collection-based routing in wireless sensor networks

A bounded heuristic for collection-based routing in wireless sensor networks

... The set of consumer nodes, which are interested in specific measurements done by others, is denoted by M, M ⊂ N . A consumer can be any inner network node, also per- forming any task that requires measurement, or ... See full document

7

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

MOBILE ELEMENTS SCHEDULING FOR PERIODIC SENSOR APPLICATIONS

... node. In this approach the data of each node is gathered by a mobile element via single-hop ...communication. In this situation, the path planning problem share fundamental characteristics with the ... See full document

16

Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

Certificateless Efficient Group Key Management Scheme in Mobile Adhoc Networks

... users in the group are divided into two types: group leader and ordinary ...node in the group. Each node in the group is equipped with unique and unforgeable identity ...node with the ... See full document

9

A Fault Tolerant Congestion Aware Routing Protocol for Mobile Adhoc Networks

A Fault Tolerant Congestion Aware Routing Protocol for Mobile Adhoc Networks

... hoc routing protocols will significantly degrade when there are faulty nodes in the ...tolerant routing protocol addresses this problem by exploring the network redundancy through multipath ... See full document

8

An Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks

An Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks

... obtained an amazing effect on determining the increment of pheromones by minimizing the model Energy ∗ ...founding an enormous model, we optimize it by using the RL ...However, in wireless ... See full document

5

Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

Anonymity Preserving Routing In Location Privacy Schemes In Wireless Sensor Networks

... traces in the network to hide the traffic generated by real objects and determine how many number of candidate traces is application ...inaccurately in one location all the ...around in the field ... See full document

6

Lightweight Context Aware Routing in Wireless Sensor Networks for Real Environments

Lightweight Context Aware Routing in Wireless Sensor Networks for Real Environments

... for routing information in a ...starts with formation of new cluster heads for each ...CHs in a particular region reduces energy consumption ...nodes in a cluster may either be deployed ... See full document

14

Show all 10000 documents...