The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Named Data Networking (NDN) and Content-Centric Networking (CCNx) architectures are the leading approaches for content-centric networking, and both require using Interests (requests that elicit content) and maintaining per-Interest forwarding state in Pending Interest Tables (PIT) to store per- Interest forwarding state. To date, PITs have been assumed to be necessary to enable native support...
This paper proposes a destination and moving direction information based probabilistic routing protocol, called Advanced DIP (ADIP), for vehicular ad hoc networks (VANETs). The ADIP protocol uses different strategies for routing and data forwarding in different network scenarios. For a high-density scenario, it only considers the position of a neighbor in selecting the next hop for forwarding a data...
Maximizing the lifetime is an important issue in the design of applications and protocols for wireless sensor networks (WSNs). Clustering sensor nodes is an effective topology control approach helping achieve this goal. In this paper, we present an energy efficiency protocol to prolong the network lifetime based on an improved particle swarm optimization (PSO) algorithm. The protocol takes both energy...
Due to their lack of assessment mechanisms of link quality in VANET environments, routing protocols do not deal efficiently with highly volatile links. One way to fill this gap would be to anticipate links breakages with new route computation. Currently available link quality indicators are not sufficiently responsive to consider forecasting. In this paper we present a novel predictive link quality...
Traffic engineering (TE) has long been used by network providers to reduce network congestion and improve resource utilization. Due to its significance, several traffic engineering algorithms have been proposed in literature. However, most of these algorithms optimize maximum link utilization (MLU) in network, and/or assume that network has the capability to route demands on arbitrary paths. Optimizing...
In VANET (Vehicular Ad Hoc NETwork), the act of transferring important information is a main concern in every routing protocol conception. Hence, selecting next packet relay is crucial decision for the network performances. The highly dynamic topology of VANET which is result of the frequent changes in vehicles' positions, their speeds and the unpredictable drivers' directions at intersections mostly...
In this work, we study the problem of allocating two types of memory, which have different access speeds, to a set of routers in a single content-centric network. Total network delay is adopted as the performance metric. We first formulate the allocation problem and show that it is NP-hard. Then we prove that this problem is monotone submodular with a matroid constraint. Hence, we are able to derive...
Delay-Tolerant Networks (DTNs) are wireless mobile networks, where the nodes are sparse and end-to- end connectivity is rare. Since DTN nodes are mostly energy-limited devices, there is an immediate need to have energy-efficient routing protocols, allowing the network to perform better and function longer. Besides, in the real world, people carrying the nodes form a lot of communities because of similar...
Data transportation and routing in Internet of Things (IoT) is a challenging issue where massive data collection and gathering are predictable. The Routing Protocol for Low- power and Lossy Networks (RPL) is one of the best candidates to ensure routing in 6LoWPAN networks. However, RPL is vulnerable to a number of attacks related to exchanged control messages. In this paper, we propose a new secure...
Named Data Networking (NDN) ambitions the rank of Future Internet Architecture in uniquely addressing content items by their name. In NDN, routers forward Interests for content after finding Longest-Prefix Matches (LPM) of content names in their Forwarding Information Base (FIB). However, the scalability of this structure is challenged by the huge global Internet namespace. In this paper, we propose...
Owing to the rapid development of underwater applications, the research on underwater wireless sensor networks (UWSNs) is becoming more and more significant. Low bandwidth, high latency, limited energy and node float mobility are basic challenges for underwater sensor networks. Most of the theories for terrestrial sensor networks can not be applied to underwater sensor networks. In this paper, we...
Link capacity dimensioning is the periodic task where ISPs have to make provisions for sudden traffic bursts and network failures to assure uninterrupted operations. This provision comes in the form of link working capacities with noticeable amounts of headroom, i.e., spare capacities that are used in case of congestions or network failures. Distributed routing protocols like OSPF provide convergence...
The opportunistic forwarding paradigm is an emerging technology that takes advantage of the broadcast nature of wireless communications to compensate the channel unreliability. In this paper, we propose an analytical model based on Markov Chain to evaluate the performance of opportunistic forwarding. In our model, the network state is described by the combination of the packet advancement progress...
In-network content caching is an inherent capability of Content Centric Networking (CCN) architecture. Undoubtedly, efficient caching strategies can help CCN networks to achieve high performance content dissemination. In general, there are two types of caching strategies: collaborative and non-collaborative caching strategies. Compared with non-collaborative caching strategies, collaborative caching...
The way in which addressing and forwarding are implemented in the Internet constitutes one of its biggest privacy and security challenges. The fact that source addresses in Internet datagrams cannot be trusted makes the IP Internet inherently vulnerable to DoS and DDoS attacks. The Internet forwarding plane is open to attacks to the privacy of datagram sources, because source addresses in Internet...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.