MWAHCA: a multimedia wireless ad hoc cluster architecture.

ScientificWorldJournal

Universidad Politécnica de Valencia, Camino Vera, s/n 46022 Valencia, Spain.

Published: December 2014

Wireless Ad hoc networks provide a flexible and adaptable infrastructure to transport data over a great variety of environments. Recently, real-time audio and video data transmission has been increased due to the appearance of many multimedia applications. One of the major challenges is to ensure the quality of multimedia streams when they have passed through a wireless ad hoc network. It requires adapting the network architecture to the multimedia QoS requirements. In this paper we propose a new architecture to organize and manage cluster-based ad hoc networks in order to provide multimedia streams. Proposed architecture adapts the network wireless topology in order to improve the quality of audio and video transmissions. In order to achieve this goal, the architecture uses some information such as each node's capacity and the QoS parameters (bandwidth, delay, jitter, and packet loss). The architecture splits the network into clusters which are specialized in specific multimedia traffic. The real system performance study provided at the end of the paper will demonstrate the feasibility of the proposal.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3967393PMC
http://dx.doi.org/10.1155/2014/913046DOI Listing

Publication Analysis

Top Keywords

wireless hoc
12
hoc networks
8
audio video
8
multimedia streams
8
architecture
6
multimedia
5
mwahca multimedia
4
wireless
4
multimedia wireless
4
hoc
4

Similar Publications

There remains a scarcity of studies to evaluate the treatment effect of electroconvulsive therapy (ECT). Functional near-infrared spectroscopy (fNIRS) offers a cost-effective method to measure cerebral hemodynamics. This study used fNIRS to evaluate the effect of ECT in patients suffering from schizophrenia or bipolar disorder (manic phase).

View Article and Find Full Text PDF

Mobile Ad Hoc Networks (MANETs) are increasingly replacing conventional communication systems due to their decentralized and dynamic nature. However, their wireless architecture makes them highly vulnerable to flooding attacks, which can disrupt communication, deplete energy resources, and degrade network performance. This study presents a novel hybrid deep learning approach integrating Convolutional Neural Networks (CNN) with Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU) architectures to effectively detect and mitigate flooding attacks in MANETs.

View Article and Find Full Text PDF

Millimeter-wave and terahertz integrated circuits and chips are expected to serve as the backbone for future wireless networks and high resolution sensing. However, design of these integrated circuits and chips can be quite complex, requiring years of human expertise, careful tailoring of hand crafted circuit topologies and co-design with parameterized and pre-selected templates of electromagnetic structures. These structures (radiative and non-radiative, single-port and multi-ports) are subsequently optimized through ad-hoc methods and parameter sweeps.

View Article and Find Full Text PDF

After natural disasters such as earthquakes, floods, or wars occur, cellular communication networks often sustain significant damage or become impaired. In these critical situations, first responders must coordinate with other rescue teams to communicate essential information to central command and survivors. To address this challenge, we have developed a reliable and rapidly deployable wireless ad hoc system for post-disaster management using Data Distribution Service (DDS) middleware, specifically RTI-DDS, named R-RDSP.

View Article and Find Full Text PDF

EDSSR: a secure and power-aware opportunistic routing scheme for WSNs.

Sci Rep

November 2024

Department of Computer Science, Applied College, Princess Nourah Bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia.

Motivated by the pivotal role of routing in Wireless Sensor Networks (WSNs) and the prevalent security vulnerabilities arising from existing protocols, this research tackles the inherent challenges of securing WSNs. Many current WSN routing protocols prioritize computational efficiency but lack robust security measures, making them susceptible to exploitation by malicious actors. The prevalence of reactive protocols, chosen for their lower bandwidth consumption, exacerbates security concerns, as proactive alternatives require more resources for maintaining network routes.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!