|Total results: 469||
|Handbook of Research on Progressive Trends in Wireless Communications and Networking
Wireless communications and networks are developing at an accelerated rate. This rapid development has provided individuals with new opportunities for ubiquitous communication accessibility as well as enabled real-time multimedia technologies and their supporting applications.
Handbook of Research on...
Evolution of Wireless and Mobile Communications
M. A. Matin.
There has been a tremendous growth of mobile communications markets all over the world, as they provide ubiquitous communication access to citizens. Wireless technologies are the core of mobile communications. They fundamentally revolutionize data networking, telecommunication, and make integrated...
Sustainable Growth for Cellular Wireless Networks
Siyi Wang, Weisi Guo.
It has been widely recognised that the exchange of information is one of the underpinning factors for economic growth in developing and developed nations. One of the fastest growing areas of information transfer is the mobile data sector. In 2012, global mobile data traffic grew by 70%. There is an...
IP-Based Virtual Private Network Implementations in Future Cellular Networks
Madhusanka Liyanage, Mika Ylianttila, Andrei Gurtov.
Virtual Private Network (VPN) services are widely used in the present corporate world to securely interconnect geographically distributed private network segments through unsecure public networks. Among various VPN techniques, Internet Protocol (IP)-based VPN services are dominating due to the...
Self-Organization Activities in LTE-Advanced Networks
Ali Diab, Andreas Mitschele-Thiel.
A major challenge in the context of LTE networks is a cost-effective network operation, which can be done by carefully controlling the network Operational Expenses (OPEX). Therefore, to minimize OPEX costs while optimizing network performance, Self-Organizing Network (SON) principles were proposed....
Mobility Prediction in Long Term Evolution (LTE) Femtocell Network
Nurul ‘Ain Amirrudin, Sharifah H. S. Ariffin, N. N. N. Abd. Malik, N. Effiyana Ghazali.
The Long Term Evolution (LTE) femtocell has promised to improve indoor coverage and enhance data rate capacity. Due to the special characteristic of the femtocell, it introduces several challenges in terms of mobility and interference management. This chapter focuses on mobility prediction in a...
Software in Amateur “Packet Radio” Communications and Networking
In modern (amateur radio) wireless communications, we use computers. Depending on particular situations, such as employers’ and personal preferences, users can adopt more or less proprietary operating systems and related end-user programs. In emerging and developing societies, the usage of proprietary...
The Access of Things: Spatial Access Control for the Internet of Things
Peter J. Hawrylak, Steven Reed, Matthew Butler, John Hale.
Access to resources, both physical and cyber, must be controlled to maintain security. The increasingly connected nature of our world makes access control a paramount issue. The expansion of the Internet of Things into everyday life has created numerous opportunities to share information and resources...
A Study of Research Trends and Issues in Wireless Ad Hoc Networks
Noman Islam, Zubair A. Shaikh.
Ad hoc networks enable network creation on the fly without support of any predefined infrastructure. The spontaneous erection of networks in anytime and anywhere fashion enables development of various novel applications based on ad hoc networks. However, ad hoc networks present several new challenges....
Algorithms to Determine Stable Connected Dominating Sets for Mobile Ad Hoc Networks
This chapter presents three algorithms to determine stable connected dominating sets (CDS) for wireless mobile ad hoc networks (MANETs) whose topology changes dynamically with time. The three stability-based CDS algorithms are (1) Minimum Velocity (MinV)-based algorithm, which prefers to include a slow...
A Novel Secure Routing Protocol in MANET
Ditipriya Sinha, Uma Bhattacharya, Rituparna Chaki.
This chapter gives an overview of research works on secure routing protocol and also describes a Novel Secure Routing Protocol RSRP proposed by the authors. The routes, which are free from any malicious node and which belong to the set of disjoint routes between a source destination pair, are...
Clustering in Wireless Sensor Network: A Study on Three Well-Known Clustering Protocols
Basma M. Mohammad El-Basioni, Sherine M. Abd El-Kader, Hussein S. Eissa, Mohammed M. Zahra.
The purpose of this chapter is the study of the clustering process in Wireless Sensor Networks (WSN), starting with clarifying why there are different clustering protocols for WSN by stating and briefly describing some of the variate features in their design; these features can represent questions the...
Performance Improvement of Clustered WSN by Using Multi-Tier Clustering
Yogesh Kumar Meena, Aditya Trivedi.
In the last few decades, the Wireless Sensor Network (WSN) paradigm has received huge interest from the industry and academia. Wireless sensor networking is used in various fields like weather monitoring, wildfire detection/monitoring, battlefield surveillance, security systems, military applications...
Transport Protocol Performance for Multi-Hop Transmission in Wireless Sensor Network (WSN)
Farizah Yunus, Sharifah H. S. Ariffin, S. K. Syed-Yusof, Nor-Syahidatul N. Ismail, Norsheila Fisal.
The need for reliable data delivery at the transport layer for video transmission over IEEE 802.15.4 Wireless Sensor Networks (WSNs) has attracted great attention from the research community due to the applicability of multimedia transmission for many applications. The IEEE 802.15.4 standard is...
Hybrid MAC Layer Design for MPEG-4 Video Transmission in WSN
Nor-Syahidatul N. Ismail, Sharifah H. S. Ariffin, N. M. Abdul Latiff, Farizah Yunus, Norshiela Fisal.
Wireless Sensor Networks (WSNs) have been attracting increasing interest lately from the research community and industry. The main reason for such interest is the fact that WSNs are considered a promising means of low power and low cost communication that can be easily deployed. Nowadays, the advanced...
A Survey of MAC Layer Protocols to Avoid Deafness in Wireless Networks Using Directional Antenna
Rinki Sharma, Govind Kadambi, Yuri A. Vershinin, K. N. Mukundan.
Directional antennas have gained immense popularity among researchers working in the area of wireless networks. These antennas help in enhancing the performance of wireless networks through increased spatial reuse, extended communication range, energy efficiency, reduced latency, and communication...
Metamaterial-Based Wearable Microstrip Patch Antennas
J. G. Joshi, Shyam S. Pattnaik.
This chapter presents metamaterial-based wearable, that is, textile-based, antennas for Wi-Fi, WLAN, ISM, BAN and public safety band applications, which have been designed, fabricated, and tested. Textile substrates like polyester and polypropylene are used to design and fabricate these antennas. The...
An 802.11p Compliant System Prototype Supporting Road Safety and Traffic Management Applications
Helen C. Leligou, Periklis Chatzimisios, Lambros Sarakis, Theofanis Orphanoudakis, Panagiotis Karkazis, Theodore Zahariadis.
During the last decades Intelligent Transportation Systems (ITS) have been attracting the interest of an increasing number of researchers, engineers and entrepreneurs, as well as citizens and civil authorities, since they can contribute towards improving road transport safety and efficiency and...
Secure Node Localization in Mobile Sensor Networks
Rachit Mittal, Manik Lal Das.
Secure node localization in wireless sensor networks (WSN) has become an important research topic. Although, Global Positioning System (GPS) based node localization has got significant attention from researchers, GPS-free node localization trend is evolving in recent times. GPS-free node localization...
Survey and Evaluation of Advanced Mobility Management Schemes in the Host Identity Layer
László Bokor, Zoltán Faigl, Sándor Imre.
This paper is committed to give an overview of the Host Identity Protocol (HIP), to introduce the basic ideas and the main paradigms behind it, and to make an exhaustive survey of mobility management schemes in the Host Identity Layer. The authors' goal is to show how HIP emerges from the list of...