8,959 research outputs found

    A Hybrid Model to Extend Vehicular Intercommunication V2V through D2D Architecture

    Full text link
    In the recent years, many solutions for Vehicle to Vehicle (V2V) communication were proposed to overcome failure problems (also known as dead ends). This paper proposes a novel framework for V2V failure recovery using Device-to-Device (D2D) communications. Based on the unified Intelligent Transportation Systems (ITS) architecture, LTE-based D2D mechanisms can improve V2V dead ends failure recovery delays. This new paradigm of hybrid V2V-D2D communications overcomes the limitations of traditional V2V routing techniques. According to NS2 simulation results, the proposed hybrid model decreases the end to end delay (E2E) of messages delivery. A complete comparison of different D2D use cases (best & worst scenarios) is presented to show the enhancements brought by our solution compared to traditional V2V techniques.Comment: 6 page

    An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applications

    Full text link
    Mobile Ad Hoc Network (MANET) is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and some time act as routers at the same time, and we discuss in this paper the distinct characteristics of traditional wired networks, including network configuration may change at any time, there is no direction or limit the movement and so on, and thus needed a new optional path Agreement (Routing Protocol) to identify nodes for these actions communicate with each other path, An ideal choice way the agreement should not only be able to find the right path, and the Ad Hoc Network must be able to adapt to changing network of this type at any time. and we talk in details in this paper all the information of Mobile Ad Hoc Network which include the History of ad hoc, wireless ad hoc, wireless mobile approaches and types of mobile ad Hoc networks, and then we present more than 13 types of the routing Ad Hoc Networks protocols have been proposed. In this paper, the more representative of routing protocols, analysis of individual characteristics and advantages and disadvantages to collate and compare, and present the all applications or the Possible Service of Ad Hoc Networks.Comment: 24 Pages, JGraph-Hoc Journa

    Enabling Disaster Resilient 4G Mobile Communication Networks

    Full text link
    The 4G Long Term Evolution (LTE) is the cellular technology expected to outperform the previous generations and to some extent revolutionize the experience of the users by taking advantage of the most advanced radio access techniques (i.e. OFDMA, SC-FDMA, MIMO). However, the strong dependencies between user equipments (UEs), base stations (eNBs) and the Evolved Packet Core (EPC) limit the flexibility, manageability and resiliency in such networks. In case the communication links between UEs-eNB or eNB-EPC are disrupted, UEs are in fact unable to communicate. In this article, we reshape the 4G mobile network to move towards more virtual and distributed architectures for improving disaster resilience, drastically reducing the dependency between UEs, eNBs and EPC. The contribution of this work is twofold. We firstly present the Flexible Management Entity (FME), a distributed entity which leverages on virtualized EPC functionalities in 4G cellular systems. Second, we introduce a simple and novel device-todevice (D2D) communication scheme allowing the UEs in physical proximity to communicate directly without resorting to the coordination with an eNB.Comment: Submitted to IEEE Communications Magazin

    Promoting Resiliency in Emergency Communication Networks: A Network Interdiction Modeling Approach

    Get PDF
    Emergency communication networks provide the basis for preparing for, and responding to, manmade and natural disasters. With the increasing importance of information security, emergency network operators such as non-governmental organizations (NGOs), local and national governmental agencies, and traditional network operators must deal with the possibility of sabotage and hacking of such networks. A network interdiction modeling approach is proposed that can be utilized for planning purposes in order to identify and protect critical parts of the network infrastructure. These critical nodes or links represent opportunities where investment or hardening of such infrastructure may reduce or prevent reductions in network traffic flows created by nefarious actors prior, during, or after an emergency or disaster

    A Study of Disaster Management System with View of Manet Application

    Get PDF
    In the modern era, Disaster Management has become an important field of study. With the advent of telecommunication system and their possible integration with the existing disaster management system, it is possible to minimize the after effects of disaster. In this paper we present a study of available and possible disaster management system based on wireless mobile telecommunication. In order to use such a system in the actual world security requirements such as availability, accountability, integrity and confidentiality must be ensured by the disaster management system
    • 

    corecore