The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper evaluates the performance of the routing protocols HWMP, Babel and B.A.T.M.A.N. advanced for disaster networks. The evaluation is performed using a virtual environment so that the obtained results are similar to the expectations of a real world testbed. According to the specific requirements in disaster situations, three different scenario categories are implemented. The focus of the scenarios...
A MANET or Mobile Ad-Hoc Network is decentralized in nature and it is basically a collection of heterogeneous mobile nodes which are autonomous and can communicate among themselves over the wireless link. In this infrastructure-less network, all the nodes dynamically route the packets by themselves with help of some protocols for sending or receiving the packet information. The ZRP or Zone Routing...
Vehicular ad hoc network (VANET) is a particular class of mobile ad hoc network (MANET) that utilizes moving cars as nodes to establish wireless communications and exchange information between them without the need of infrastructure. VANET is a promising technology used to provide safety, efficiency, and comfort to the road users. Routing protocol has become one of the most challenging tasks for VANET...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Low-Rate Wireless Sensor Networks (LR-WSNs) has become an active area of research in recent decades. ZigBee is a wireless standard based on IEEE 802.15.4 for LR-WSNs. Since in Zigbee networks energy is one of the most vital issues, the routing protocols must be energy efficient. By default, ZigBee uses an Ad hoc On-Demand Distance Vector (AODV) routing protocol. In AODV, broadcasting is the backbone...
Energy consumption problem is considered an extremely important problem that faces the Wireless Sensor Networks (WSNs). For this reason, a lot of efficient energy protocols have been developed in order to reduce the energy consumption, as well as to prolong the lifetime of the sensor networks. The DMHT-LEACH protocol is one of these protocols. It proposes a dynamic technique for facilitating the data...
Network-on-Chip provides scalable communication in Systems-on-Chip with many Intellectual Property cores. Studies have shown that unutilized router buffers lead to significant network performance degradation. This work presents Roundabout, a new asynchronous router architecture with inherent and effective buffer utilization. Inspired by real-life multi-lane roundabouts, it consists of lanes shared...
The growing of the internet use is proportional with the growing of IP address needs, but the increasing of the IP use is not equal with the number of available IPv4. Then, IPv6 was developed as a solution to overcome the limited amount of IPv4 address. Readiness of various aspects ranging from infrastructure to a service provider is required to implement IPv6. In order to improve the quality of IPv6...
Nowadays in wireless network the energy consumption and sensor node energy renewable is major challenge. Which make sensor network weak and more critical. The problem of node reachability is considered and Amended Ant colony optimization technique is proposed for optimization. The proposed technique is used for the search of estimated solutions to distinct and endless optimization problems and for...
Vehicular Ad-Hoc NETworks (VANETs) have received considerable attention in recent years, due to its unique characteristics, which are different from Mobile Ad-Hoc NETworks (MANETs), such as rapid topology change, frequent link failure, and high vehicle mobility. The main drawback of VANETs network is the network instability, which yields to reduce the network efficiency. This paper proposes a novel...
In this paper, we investigate malicious detection and avoidance of black hole attack for smart meter network. In terms of routing protocol, the reactive routing protocol Ad hoc On-Demand Distance Vector (AODV) is commonly adopted for smart meter network and is considered in our paper. However, the default AODV is vulnerable to black hole attacks. To detect and avoid black hole attacks, we propose...
The Vehicular Ad Hoc Networks (VANETs), as an important part of intelligent transportation systems (ITS), has been becoming a promising research area. Due to the high mobility of vehicles and intermittent connected topology resulting in the dramatically changing network topology, it is difficult to design a protocol including congestion control mechanism, which is helpful for a well network performance...
In order to verify the application effect of MANET Routing Protocol in vehicular ad hoc network, the table driven routing priors DSDV, OLSR and on-demand routing reactive AODV are used to verify the results. In this paper, the simulation platform is built by NS3 and SUMO, and the performance of MANET is verified by comparing the network performance parameters, such as throughput, packet delivery rate...
The principle of attacking methods against the MAC layer of underwater acoustic network is first introduced briefly. Underwater acoustic channel characteristics are modeled corresponding Propagation Delay, Received Power and Background Noise by using OPNET pipeline stage. MAC Layer and Network Layer modules of network node are implemented. The results of a single node attack and two nodes distributed...
In this paper, we propose a modeling approach for a Content-Centric Networking (CCN) network by considering the dynamics of its transport layer protocol. Transport layer protocols for CCN have mainly been investigated through simulation experiments because CCN itself is a complicated network architecture compared with IP, and the complex interaction between CCN caching and the behavior of a transport...
Wireless Mesh Networks (WMNs) are gaining popularity due to the features provided, especially the low cost and self-configuration ability. In WMNs, the data traffic is transmitted through intermediate nodes and a number of packets are dropped during the transmission due to various reasons. One significant reason is the limitation of network resources such as bandwidth and buffer size. Because of these...
In this paper, the basic methods of routing organization in software-configurable network are considered. The efficiency of the implementation of routing SDN networks are evaluated using a specially designed setting — delays in the routing domain. Evaluates the effectiveness of routing under various principles of organization SDN-Controller and the various protocols for implementing an interface between...
This paper proposes a perspective method of Digital Power Line Carrier channels throughput increase in transmission of Supervisory Control and Data Acquisition packet traffic from electrical substations. The proposed method based on capturing of data packets and their compression with application of Predictor algorithm. The paper presents results of experimental evaluation of SCADA data compression...
High throughput data transfers across the Internet has become a challenge with deployment of data centers and cloud platforms. In this paper, we propose to utilize the cores of a router to build multiple abstractions of the underlying topology to parallelize end-to-end (e2e) streams for bulk data transfers. By abstracting a different graph for each core, we steer each core to calculate a different...
A lot of researches exploit the flexibility of Software-Defined Networking (SDN) to conduct traffic engineering in order to improve network performance and enhance robustness to failures. As the upgrade of a traditional network to a full SDN deployment is an incremental process, the coexistence of SDN switches and legacy switches forms a hybrid SDN. Due to the different forwarding characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.