The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many IP address lookup approaches employ Bloom filters to obtain a high-speed search performance. Especially, the search performance of trie-based algorithms can be significantly improved by adding Bloom filters, because Bloom filters can determine whether a node exists in a trie without accessing the trie. The false positive rate of a Bloom filter must be reduced to enhance the lookup performance...
Internet protocol version 6 defined in 1995 is a successor of the IPv4 protocol. It is being slowly deployed in Internet and so it becomes basis of all Internet communications. Since this process takes a long time IPv6 and IPv4 networks coexist in Internet and some transition mechanisms are needed to ensure their interconnectivity. Several mechanisms came to life based on tunneling or translation...
In Named Data Networking (NDN), routers have caches to store frequently requested contents, and hence cache management scheme becomes a key factor for efficient content delivery. In this paper, we propose the sharing of cache summaries using a Bloom filter among neighboring routers for efficient content delivery and high cache utilization at NDN. When an Interest packet is received, a router can forward...
Designing educational resources allow students to modify their learning process. In particular, on-line and downloadable educational resources have been successfully used in engineering education the last years [1]. Usually, these resources are free and accessible from web. In addition, they are designed and developed by lecturers and used by their students. But, they are rarely developed by students...
A mobile ad-hoc network is analysed as cooperative engagement of mobile wireless nodes without the required intervention of any centralised access point. These networks form an instant network without fixed topology, each node acting as a host and router simultaneously. In this paper the execution evaluation of routing protocol DSDV and AOMDV in the context of sensor networks with an assumption that...
In VANET, nodes move at high speed and change connecting network frequently. As a consequence, IP duplication may occur and packets would not be sent to the correct destination. This paper aims at reducing the size of location information in duplicate address detection (DAD) scheme. We propose a grid-based duplicate address detection (GDAD) scheme and separate network into several grids, where the...
IPv6-based wireless sensor networks (IPv6-WSNs) are playing an important role in the extension of the smart grid to residential premises. Unlike traditional WSNs, IPv6-WSNs are based on IP protocol and do not need an application-layer translator. They can greatly save developing time and improve the efficiency for end-to-end communications. As configuring node with unique address is a prerequisite...
This paper examines different traffic splitting strategies for multipath IP networks. The question is whether today's widely deployed algorithms perform well in all situations. We have implemented in a simulator and analyzed different well-known algorithms. Throughout our study several kinds of traffic traces have been used: real ones captured at backbones as well as at access networks, and specially...
In recent years, social interest in viewing consumer-generated media (CGM) contents has been rapidly growing, so their network traffic has been increasing considerably. To cope with this new increase in network traffic, we propose a tag caching router (TCR) architecture that supports folksonomies-based search and content caching for CGM content. Folksonomies are key words or metadata attached to the...
Recently, data-centric networking is getting increased attention. A representative example of data-centric networking is Content-Centric Networking (CCN), which routes packets within a network based on their content identifiers. In CCN, each CCN router on a network reuses data by caching relayed contents. Specifically, the CCN router caches a copy of the content in its buffer memory. However, in CCN,...
With the rapid development of mobile ad hoc network, security and trust are important to the network, especially for military ad hoc network. Trust routing scheme is the main issue in military ad hoc network. Trust routing is related to many factors such as routing hop number, node information integrity degree and node behavior. To use multi-source information, multi-agent collaboration method is...
In this paper, the simulation and analysis are given to the network simulation tool OPNET network model of the LEACH protocol. The simulation results show that the improved routing algorithm I-LEACH (Improved-LEACH) is better than the original LEACH algorithm that extends the network life cycle, reducing the overall system energy consumption and enhancing the network scalability.
This paper proposes a simple path diversity algorithm (SPDA) for Interdomain routing. The SPDA uses source routing to find an alternate path from a source to a destination, and allows flexible division of traffic over the best and alternate path. The SPDA comprises three steps. First, the BGP protocol is extended to allow the BGP routing table to save the multiple paths for any destination. Second,...
Dynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should...
This paper proposes a simple and effective algorithm to improve the quality of service on the Internet by providing alternate path between source and destination nodes when the delay or packet loss rate on the primary path becomes unacceptable. We combine Source Routing with an Intermediate Node forwarding mechanism to yield a multipath routing mechanism called SIR (Source Intermediate Routing). It...
Until now, in the traditional IP network, the data packets take systematically the shortest path between two nodes through a core network. However, this system presents a major inconvenience: all the traffic follows the shortest path to go from the source to the destination. So the clutter state in a part of the network will be problematic. Today the new technology MPLS-TE permits to share the data...
With the development of mobile technologies several mobile multicast methods were proposed, but most of them are based on the host-based mobility support specifications such as Mobile IPv6 (MIPv6) which require the mobile hosts to support the mobility function. Recently, the Proxy Mobile IPv6 (PMIPv6) was proposed to provide the mobility support for mobile node without mobility function, and the previous...
The paper introduces wireless sensor network's route protocol, then the difference between traditional wireless network and wireless sensor network is analyzed, and the MSAODV route protocol based on AODV route protocol are raised and implemented, the simulation soft tool NS-2 is used, and end-to-end delay and the normalized routing load are chosen to evaluate the performance of the MSAODV. The modified...
Network mobility is based on mobile IPv6, and there isnpsilat appropriate simulation tool in this area. NS2 is a popular software for network simulation, and a patch named ldquoMobiwanrdquo has been published for NS2 so that mobile IPv6 can be simulated. Based on NS2 and Mobiwan, an extension scheme for network mobility simulation is proposed. Some problems of the scheme are analyzed, and some key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.