Jamal-Deen Abdulai

Learn More
Conventional on-demand route discovery for ad hoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet collisions in the network. This phenomenon has been shown to greatly increase the network communication overhead and end to end delay. This(More)
Conventional on-demand route discovery methods in mobile ad hoc networks (MANET) employ blind flooding, where a mobile node blindly rebroadcasts received Route Request (RREQ) packets until a route to a particular destination is established. This can potentially lead to high channel contention, causing redundant retransmissions and thus excessive packet(More)
Broadcasting is a fundamental and frequently usedoperation in mobile ad hoc networks (MANETs) wherea source node diffuses a message to all other nodes inthe networks. Flooding, the process in which eachnode retransmits every uniquely received packetexactly once is the simplest and most commonly usedmechanism for broadcasting in MANETs. Despite(More)
The broadcasting protocol can dramatically affect the performance of Mobile Ad Hoc Networks (MANETs). Proper use of a counter-based scheme can reduce the number of rebroadcasts and hence reduce the chance of contention and collision among neighbouring nodes. While most previous studies have used a fixed counter-based threshold value irrespective of(More)
Water is essential for human survival. Although approximately 71% of the world is covered in water, only 2.5% of this is fresh water; hence, fresh water is a valuable resource that must be carefully monitored and maintained. In developing countries, 80% of people are without access to potable water. Cholera is still reported in more than 50 countries. In(More)
The application of wireless sensor networks is gradually gaining popularity in ubiquitous computing. They are used for military surveillance, home automation and monitoring, underwater surveillance, wearable sensor and many others. With their way of deployment and use, these tiny motes are mostly vulnerable to attacks and their mode of transfer of data(More)
  • 1