8,959 research outputs found
A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture
In the recent years, many solutions for Vehicle to Vehicle (V2V)
communication were proposed to overcome failure problems (also known as dead
ends). This paper proposes a novel framework for V2V failure recovery using
Device-to-Device (D2D) communications. Based on the unified Intelligent
Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve
V2V dead ends failure recovery delays. This new paradigm of hybrid V2V-D2D
communications overcomes the limitations of traditional V2V routing techniques.
According to NS2 simulation results, the proposed hybrid model decreases the
end to end delay (E2E) of messages delivery. A complete comparison of different
D2D use cases (best & worst scenarios) is presented to show the enhancements
brought by our solution compared to traditional V2V techniques.Comment: 6 page
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications
Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes
or terminals with wireless communications and networking capability that
communicate with each other without the aid of any centralized administrator
also the wireless nodes that can dynamically form a network to exchange
information without using any existing fixed network infrastructure. And it's
an autonomous system in which mobile hosts connected by wireless links are free
to be dynamically and some time act as routers at the same time, and we discuss
in this paper the distinct characteristics of traditional wired networks,
including network configuration may change at any time, there is no direction
or limit the movement and so on, and thus needed a new optional path Agreement
(Routing Protocol) to identify nodes for these actions communicate with each
other path, An ideal choice way the agreement should not only be able to find
the right path, and the Ad Hoc Network must be able to adapt to changing
network of this type at any time. and we talk in details in this paper all the
information of Mobile Ad Hoc Network which include the History of ad hoc,
wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc
networks, and then we present more than 13 types of the routing Ad Hoc Networks
protocols have been proposed. In this paper, the more representative of routing
protocols, analysis of individual characteristics and advantages and
disadvantages to collate and compare, and present the all applications or the
Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa
Enabling Disaster Resilient 4G Mobile Communication Networks
The 4G Long Term Evolution (LTE) is the cellular technology expected to
outperform the previous generations and to some extent revolutionize the
experience of the users by taking advantage of the most advanced radio access
techniques (i.e. OFDMA, SC-FDMA, MIMO). However, the strong dependencies
between user equipments (UEs), base stations (eNBs) and the Evolved Packet Core
(EPC) limit the flexibility, manageability and resiliency in such networks. In
case the communication links between UEs-eNB or eNB-EPC are disrupted, UEs are
in fact unable to communicate. In this article, we reshape the 4G mobile
network to move towards more virtual and distributed architectures for
improving disaster resilience, drastically reducing the dependency between UEs,
eNBs and EPC. The contribution of this work is twofold. We firstly present the
Flexible Management Entity (FME), a distributed entity which leverages on
virtualized EPC functionalities in 4G cellular systems. Second, we introduce a
simple and novel device-todevice (D2D) communication scheme allowing the UEs in
physical proximity to communicate directly without resorting to the
coordination with an eNB.Comment: Submitted to IEEE Communications Magazin
Promoting Resiliency in Emergency Communication Networks: A Network Interdiction Modeling Approach
Emergency communication networks provide the basis for preparing for, and responding to, manmade and natural disasters. With the increasing importance of information security, emergency network operators such as non-governmental organizations (NGOs), local and national governmental agencies, and traditional network operators must deal with the possibility of sabotage and hacking of such networks. A network interdiction modeling approach is proposed that can be utilized for planning purposes in order to identify and protect critical parts of the network infrastructure. These critical nodes or links represent opportunities where investment or hardening of such infrastructure may reduce or prevent reductions in network traffic flows created by nefarious actors prior, during, or after an emergency or disaster
A Study of Disaster Management System with View of Manet Application
In the modern era, Disaster Management has become an important field of study. With the advent of telecommunication system and their possible integration with the existing disaster management system, it is possible to minimize the after effects of disaster. In this paper we present a study of available and possible disaster management system based on wireless mobile telecommunication. In order to use such a system in the actual world security requirements such as availability, accountability, integrity and confidentiality must be ensured by the disaster management system
- âŠ