The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
6LoWPAN enables IoT and WSN devices to connect to the Internet. The traffic caused by this increase of machines connecting to the Internet can overwhelm networks, leading to congestion. SDN, with its architecture that decouples the control plane from the forwarding plane, provides novel ways of dealing with network congestion as it allows easier manipulation of the network and its traffic flow. Taking...
Pervasive networks formed spontaneously by wireless mobile devices capable of ad hoc communication make it possible to get services from these devices, and to compose them dynamically so as to provide people with new and more sophisticated application services. Discovering, invoking and composing services in such networks are challenging tasks, due to the numerous and unpredictable connectivity disruptions...
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
Groups of strongly consistent devices can efficiently order events under ideal (data center) conditions, but become less effective in dynamic and heterogeneous environments. Weakly consistent devices efficiently tolerate both faults and dynamic conditions but are slow to converge on a single ordering of system events. We propose "federated consistency", which combines the strengths of both...
Ideally, users in cognitive radio networks (CRNs) are capable of sensing and exploiting any potential transmission opportunities in the available spectrum band ranging from 30 KHz to 300 GHz. With the multiple-diverse-band spectrum, the network can provide more radio resources and capacity to a large number of CR users. However, the multiband scenario (e.g., TV band + 2/3G band + 4/5G band) also introduces...
This paper presents a multicast Delay Tolerant Network (DTN) routing protocol that uses an economic gain based routing utility for device-to-device (D2D) commercial coupon dissemination. Majority of the existing DTN routing approaches are not practically applicable to commercial content dissemination since they attempt to individually optimize performance indices such as message delay, forwarding...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
The TCP/IP model is a widely used protocol at present time due to unparalleled popularity of the Internet. Although it is efficient and reliable it does not include the user into its architecture and thus leaves the user without any control over the underlying layers. While the default layering mechanism is set up in such a way that it would give efficient service to most of its clients, it does not...
This paper presents the case for Data Plane Timestamping (DPT). We argue that in the unique environment of Software-Defined Networks (SDN), attaching a timestamp to the header of all packets is a powerful feature that can be leveraged by various diverse SDN applications. We analyze three key use cases that demonstrate the advantages of using DPT, and show that SDN applications can benefit even from...
Very popular system in VANET applications is collision prevention system that helps to prevent from chain collisions. The system obtain the vehicle information and traffic information during any emergency situation happens. It broadcast the warning messages to other vehicles for automatic break control to prevent collisions. The system sends the emergency message to vehicles in the network, before...
Recent development in wireless local area networks have made them potential enough to be used in various applications such as Voice Over Internet Protocol (VoIP), Voice Over Wireless Local Area Network (VoWLAN) and many more. Power saving protocols are used in order to conserve energy. This is addressed at medium access control layer so that wireless radio can be turned on (wake state) and off (sleep...
Wireless sensor networks (WSN) provide attractive solutions for data exchange in a variety of applications from military surveillance to medical and environmental monitoring. The commonality in all such applications is that the data collected in some nodes of the network is needed at some other nodes, for instance in a data collector node. The nodes are typically limited in terms of power, memory,...
The capacity limits of the Random Access Channel (RACH) of Long Term Evolution (LTE) for highly dense Machine-to-Machine communications are studied in this paper. We consider the case study when a high number of devices attempt to transmit information to the same base station in a very short period of time. Simulations have been performed considering several parameter configurations related to the...
This paper makes a systematic attempt to understand the effect of message size on the speed and efficiency of message broadcast. It considers a realistic situation where a single message may be too large to be sent in over a single connection and hence might require to be transmitted in segments. In specific, we look into the push and pull message transfer techniques and investigate in details their...
Machine to machine communication (M2M) or machine type communication (MTC) facilitates communication without any human intervention. These applications will support an enormous number of stations (STAs). To mitigate degradation of the throughput and delay performance in wireless local area networks (WLAN) that employ carrier sense multiple access collision avoidance (CSMA/CA) protocol with request...
This paper considers a network in which a primary user (PU) may cooperate with a cognitive radio (CR) user for transmission of its data packets. The PU is assumed to be a buffered terminal operating in a time-slotted fashion. We develop an energy-efficient protocol that involves cooperation and coordination between primary and secondary users. To satisfy certain quality-of-service requirements, users...
Modern Data Centers (DCs) host hundreds of thousands of servers running diverse applications and services. The variety of these applications mandates distinct requirements such as latency and throughput. The state-of-the-art TCP protocol fails to meet these requirements, rendering the design of efficient DC transport protocols an urgent need. Since UDP is the most popular protocol besides TCP, it...
We present a live migration solution based on Proxy Mobile IPv6 (PMIPv6), a light-weight mobility protocol standardized by IETF. PMIPv6 handles node mobility without requiring any support from the moving nodes. In addition, PMIPv6 works with IPv4, IPv6 and dual-stack nodes. Our results from a real testbed show that network connectivity is successfully maintained with little signaling overhead and...
In this paper we present a distributed self organizing trust based clustering framework for securing ad hoc networks. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. In our proposal the evidence of trustworthiness is captured...
A highly available and secure communication infrastructure is one of the major prerequisites for modern power systems. In this paper we evaluate the use of a software-defined networking infrastructure in the domain of energy communication networks. The advantages and potential risks of using software-defined networking at the current stage of development in productive networks are investigated. Test...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.