The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aerial Adhoc Networks are the new class of wireless adhoc networks, where node motion is not restricted in 2D plane as in (VANETs) but rather a 3D plane as these wireless nodes may be mounted on board Unmanned Aerial Vehicles (UAV). Current research literature argues that since flights occur at high altitudes, Line of Sight (LoS) propagation models suffice for such wireless transmissions between nodes...
Constant video surveillance of remote locations in rural areas, dense urbanized dwellings and strategic military sites is of paramount interest to law enforcing agencies. Aerial monitoring is now made possible by using dozens of camera mounted UAVs (Unmanned Aerial Vehicles) streaming video from different vantage points to a single command and control center. In this paper, we present an architecture...
Supervisory Control and Data Acquisition (SCADA) systems are traditionally proprietary and well protected. Due to increasing use of commercial/open source technology and communication protocols, there are growing concerns about the associated security threats. SCADA networks are usually employed in critical infrastructure, therefore, not much technical data of the actual systems is accessible to the...
Cluster based routing protocols have significant impact on the energy dissipation and life time of wireless sensor networks (WSN). In this paper Basic Low Energy adaptive clustering hierarchy (LEACH) protocol has been modified with our proposed LEACH-MAE(LEACH-Mobile Average Energy based) protocol to overcome its shortcomings to support mobility along with the new average energy based Cluster Head...
Wireless Ad hoc Networks have gained huge popularity due to the fact that the initial setup cost of decentralized networks with respect to centralized networks is negligible. Both Routing Layer and Transport Layer protocols have been proposed for Wireless Ad Hoc Networks to optimize the hop by hop path discovery and end to end data delivery. This paper discusses the performance analysis of wireless...
When networks are designed, there are several factors which are taken into account for network performance. The buffer size of the routers at bottle neck (core) links in the network plays a vital role in improving the overall performance of the network. An increase in the buffer size may resolve this problem, however, in some networks, where different types of agents are competing for the network...
In data communication when there are too many packets contending for the limited shared resources, such as the queue buffer in the router at bottleneck link, it may result in congestion. During congestion, large amount of packets experience delay or even be dropped due to the queue overflow. Severe congestion problems result in degradation of the throughput and large packet loss rate. In this paper,...
Identification of applications running on a high speed network is a critical task for the protection of the local network from intrusive and malicious traffic. Network Intrusion Detection Systems (NIDS) are used for the detection of intrusive and malicious traffic in computer networks. Signature based IDS have been the most accurate among the available NIDS. But this accuracy is achieved at a cost...
Wide Area Network monitoring has become increasingly important to deliver QoS demanded by customers of Skype, Facebook, Twitter etc or to detect/prevent attacks on networks carrying out sensitive tasks e.g. SCADA networks controlling the electrical grid. Unfortunately the task of monitoring paths becomes increasingly prohibitive as the size of the network increases. Fortunately, recent research has...
Overlay networks can be used to find working paths when direct underlay paths are anomalously slow, e.g. because of a network fault. Overlay paths should not use links that are involved in a fault, so choosing which overlay path to use often requires path monitoring, which introduces an overhead. By using a routing matrix ‘M’ to define which links are used in each path, and sorting the matrix according...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.