The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problems associated with multipath routing in Border Gateway Protocol (BGP) for Autonomous Systems (ASes) can be solved with some model or control systems from the Software Defined Networking (SDN). The SdN controller could be used to solve the inconsistencies in the scalability and latency of the Routing Information Base (RIB) of ASes. Also, a set of modules for Inter-AS routing and Brokering...
Modern cities are blanketed with Wi-Fi Hotspots. Such network access points can be utilised by Internet of Thing devices to enable wireless sensor network data mining deployments to report to the cloud. Vehicles are such devices that can provide valuable data sensing platforms for both internal operational properties such as speed, fuel and engine heat as well as external environmental features including...
Hierarchical network architectures are widely deployed to reduce routing overheads and increase scalability. In our work, we are interested in deploying a P2P overlay in ultimately large-scale Mobile Ad-Hoc Networks (MANETs). We therefore study the performance of such an approach, creating a number of hierarchical network configurations and deploy Chord over them. The clusters are MANETs, running...
The enterprise and tactical domains have distinct properties and requirements, and have thus evolved independently in incompatible ways. Today the network infrastructure has emerged to, in theory, enable interconnectivity between these domains at a global scale. Unfortunately, even in the presence of these communication capabilities and despite the benefits that each operational domain can gain from...
In recent years, dramatic growth of mobile data traffic has left the operators no choice but to consider Wi-Fi networks as an economic complementary solution. To achieve this, WLANs require to adopt some of the key features of carrier-grade operators, such as centralized resource management. As an emerging paradigm, Software Defined Networking (SDN) can be used to provide salient centralized network...
With the development of wireless transmission technology, the coexistence of a variety of network protocols is inevitable in industrial control networks for a certain period of time. Due to the lack of a necessary coordination mechanism between different network protocols, this may impact the transmission performance of the backhaul network connecting several subnetworks with different protocols when...
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate users, making them susceptible to various malicious attacks such as spoofing or denial of service (DoS) attacks. Existing security technologies (terminal security SW, firewall, IDS / IPS, VPN) are being studied individually, but it is difficult to apply security protocols and solutions currently used to new services...
In disaster situations, networks are fragmented due to the disruptions of communication infrastructure and stable connectivity between nodes is not guaranteed. Therefore, opportunistic forwarding based on delay tolerant networks (DTN) should be used for message delivery in such disaster situations. Also, information centric network (ICN) approach can be used for communication of urgent messages to...
The field of wireless sensor networks is progressing at a very rapid pace with one of its major application in the area of agriculture. Several research problems have been addressed and solutions have been proposed. Most of these works are based on single crop scenario. Research done in the multiple-cropping scenario, where two or more crops are sown in a single field in the same year, are very few...
A network emulator is a software in its environment mimicking the functions and habits of the original network. Problems often encountered in doing research on computer networks is a problem of design and trial scenarios that require software and hardware enough to implement such a network scenario similar to a real scenario. Using virtual machine technology is expected to solve the problem. Netkit...
With the continuous progress of rural construction, the problem of rural drinking water pollution is increasingly prominent. In view of water pollution, a design of rural drinking water monitoring system based on wireless sensor networks is proposed that nodes take STM32 as the core chip and WLK01L39 as well as its peripheral circuits are used as wireless communication modules and Beidou S1216 is...
In order to solve the existing traditional rural drinking water monitoring in a lot of manpower, material resources, real-time, this paper introduces a WSN based on the rural drinking water source monitoring system design, the system consists of five parts: water quality monitoring, soil monitoring node node, node, routing node and gateway server. Water quality monitoring node, soil monitoring nodes...
Wireless Sensor Networks (WSN) have gained worldwide attention in recent years, particularly with which has facilitated the development of smart sensors. WSN consists of small nodes with sensing, computation and wireless communication capabilities. In WSN, clustering is used as an effective technique to achieve scalability, self-organization, power saving, channel access, routing etc. Lifetime of...
In this paper, we present a novel smart home system integrating energy efficiency features. The paper firstly introduces the attempt tried by the power system and researchers for home energy-saving. Secondly the paper compares the performance of three kinds of network, and raised timing sleep, routing node rotation mechanism and data compression for ZigBee to conserve energy. Thirdly introduces three...
Mobile devices have changed from being terminal equipment for making voice calls, video calls, playing games and sending messages to including differing functionalities such as acting as a server and client for sharing information. Information sharing directly between modern mobile phones can be done using Bluetooth or WiFi functionalities. Such a network does not need a fixed infrastructure, thereby...
The efficiency of inter-domain routing in large-scale mobile network environments is a critical issue, as traditional prefixed addresses may fail due to the dynamic topologies of mobile networks, where devices would be required to maintain massive routing tables. To address this issue, in this paper we leverage the principles of probabilistic data structures in the inter-domain routing scheme, and...
IoT network requires global reachability, mobility support, richer communication patterns and resource efficiency. To address these needs, MF-IoT has been proposed as an extension of MobilityFirst which allows applications even in the low-end IoT devices to use the aforementioned network capabilities.This demo uses surveillance camera as an example to show the feasibility and efficiency of MF-IoT...
The publish/subscribe paradigm can be used to build IoT service communication infrastructure owing to its loose coupling and scalability. Its features of decoupling among event producers and event consumers make IoT services collaborations more real-time and flexible, and allow indirect, anonymous and multicast IoT service interactions. However, in this environment, the IoT service cannot directly...
This paper proposes a Cluster-based On-demand DElay tolerant routing (CODE) algorithm for VANETs. The CODE algorithm considers a higyway scenario and performs route discovery for data dissemination based on a cluster-based routing structure. To build the routing structure, CODE first configures vehicles moving on the highway into clusters and uses the relative speeds of vehicles in cluster-head election...
Resiliency, the capability to detect and react after a node failure in the network, is a key element for any network protocol. First, the detection of the failure must be quick to prevent dropping the packets and degrading the throughput too badly. Then, the repair, the computation of another path, has to allow the traffic to reach the destination without too much delay and without increasing the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.