The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
The vehicle-to-vehicle (V2V) data transmissions in Vehicular Ad-hoc Networks (VANETs) have been applied in many areas including the Internet of Vehicles, mobile data offloading, and mobile crowdsensing. The V2V-based data delivery that is opposite to the direction of a vehicle is called a backward delivery against the traffic flow, and it is blocked by an existing problem: a traffic hole. Under the...
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to...
Delay Tolerant Network (DTN) is primarily and specifically a class of MANET that is challenged. The working principle of DTN illustrates the mechanism to store information and carry it till some capable node is found and then a message is forwarded. This kind of implementation has found application areas like sparse and constrained networks. This paper explains the design specification issues of DTN...
In this paper, we address the problem of routing disruption attacks in Cognitive Radio Networks (CRNs). In routing disruption attacks, the malicious node intentionally drop data packets to consume more network resources or degrade routing performance. We propose a trust management model to mitigate such attacks in CRNs. Through monitoring forwarding behaviors of secondary users (SUs), trusts of SUs...
Delay-tolerant Network (DTN) is a computer network architecture that operates effectively over an extreme distance and communicates with heterogeneous networks that may affect the continuous network connectivity. DTN is particularly useful for the areas in which there are no direct connection (either physical or wireless) between source and destination over a long distance, as it can overcome the...
This paper presents a multicast Delay Tolerant Network (DTN) routing protocol that uses an economic gain based routing utility for device-to-device (D2D) commercial coupon dissemination. Majority of the existing DTN routing approaches are not practically applicable to commercial content dissemination since they attempt to individually optimize performance indices such as message delay, forwarding...
The mobile devices are becoming the important part in our everyday life. These are now one of the basic needs of our daily life. These devices are used to share the data of interest with one another. Data may be in the form of picture or video clip, news etc. But sometimes, data cannot reach to the user who is interested, because of delaying of messages. Sometimes nodes do not want to loose their...
In distributed OpenFlow controller networks, the network flow is managed by set of associated rules that are maintained by switches in their local Ternary Content Addressable Memory (TCAM) and rules are made by concerned controllers, which are local to domains. However, TACM is expensive and consumes high power. The switch inside the forwarding plane has limited TCAM space and is infeasible to maintain...
Natural load-bearing structures, such as trees, have had to strive for survival in harsh environmental conditions. Over time, these structures have evolved, and are able now to optimize their shapes. Behind this optimization is a simple yet powerful rule called the axiom of uniform stress, which has successfully been applied to topology optimization in various engineering fields. Similar to physical...
A mobile adhoc network is an independent system of mobile stations associated by wireless link to form a system. This system can be modeled in the form of an uninformed graph. Adhoc networks are peer to peer, multihope networks were data packets are transmitted to a source to destination through intermediate nodes (which serve as router). The infrastructure is not the main issue to setup MANET and...
This paper is concerned with a crucial problem of MANET which is congestion control (CongClt). CongClt can be described as a mechanism used to control congestion (Cong) and keep the traffic below the capacity of the network. Many approaches have been proposed to overcome CongClt in Ethernet as well as in MANET. Controlling the Cong in MANET is quite difficult due to its fundamental characteristics...
In the research of content-centric networking (CCN), there have been investigated several fragmentation methods of CCN messages in order to implement CCN as an L3 protocol. The latest version of the CCN protocol (CCN 1.0) adopts the end-to-end fragmentation method that fragments CCN messages only at the content publisher. This allows intermediate routers to simply forward fragmentation packets, and...
We propose a sticky transfer framework to enhance successful message transfers in a Delay- and Disruption-Tolerant Network (DTN). We propose a sticky transfer protocol within the framework that enables mobiles nodes to “stick” to each other for a longer period of time in order to complete the transmissions of the messages needed to be sent. A mobile node A makes the decision of whether to stick to...
A proven distributed systems technology, Link-State routing, nominally used as an IGP (Interior Gateway Protocol) in large public and enterprise networks, is fundamentally a distributed database technology. In the SIS-IS system, this capability is used to implement a distributed process registry for high availability distributed systems (e.g. elastic cloud applications). The characteristics and performance...
Flow-Aware Multi-Topology Adaptive Routing (FAMTAR) is a new mechanism which provides the ability to use multiple paths between two points in a network. When the primary path becomes congested, a new path is found and used. However, when all possible paths are congested, new flows are still accepted on one of the congested paths which degrades the observed quality of service. Therefore, in this paper,...
The majority of the routing protocols designed to date for mobile ad hoc networks (MANET) rely on flooding of route requests for the establishment of routes on demand. A novel approach called CBORCA (Cut-Based On-demand Routing with Coordinate Awareness) is introduced. CBORCA improves the efficiency with which route requests are disseminated by partitioning the designated route forwarders in distinct...
It has been observed that opportunistic networks exhibit a highly unbalanced traffic load distribution, mainly because of the heterogeneity in mobility and the greedy routing decisions, leading to packet drops due to storage constraints. The existing strategies rely either on fairness techniques or on diverting traffic to alternative routes in order to control congestion. The result is a dilemma between...
Mobility model is an essential factor in evaluating routing protocols designed for Delay Tolerant Networks. The use of inappropriate mobility models for evaluating a routing protocol in DTN can significantly affect its performance and the applicability in real world. In literature, many of existing mobility models designed for their own routing protocols are somewhat inappropriate since they are not...
In delay tolerant networks (DTN), flooding mechanism in epidemic routing protocol may waste network resources. Based on introducing and analyzing routing protocols in DTN, this paper proposes an improved protocol of epidemic routing (EPI-HT). EPI-HT forwards messages accurately to the next-hop according to historical information between nodes and node localization principle. Simulation results indicate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.