The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Egress selection in an Internet Service Provider (ISP) is the process of selecting an egress router to route interdomain traffic across the ISP such that a traffic engineering objective is achieved. In traditional ISP networks, traffic through the ISP is carried through the network and exits via an egress that is closest to the source in an attempt to minimize network resources for transit traffic...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
Most home sensor devices nowadays is based on low data rate and on-demand routing protocol such as Ad hoc On-demand Distance Vector (AODV). This routing protocol has less overhead and good efficiency in term of delivery ratio and bandwidth. AODV has two phases the route discover phase which discover route to the destination devices based on the shortest and the freshest hop, and the data delivery...
Nowadays in wireless network the energy consumption and sensor node energy renewable is major challenge. Which make sensor network weak and more critical. The problem of node reachability is considered and Amended Ant colony optimization technique is proposed for optimization. The proposed technique is used for the search of estimated solutions to distinct and endless optimization problems and for...
In this paper, we study how to perform traffic engineering at an extremely-small time scale with segment routing, addressing a critical need for modern wide area networks. Prior work has shown that segment routing enables to better engineer traffic, thanks to its ability to program detours in forwarding paths, at scale. Two main approaches have been explored for traffic engineering with segment routing,...
Nowadays, there is a fast-paced shift from legacy telecommunication systems to novel Software Defined Network (SDN) architectures that can support on-the-fly network reconfiguration, therefore, empowering advanced traffic engineering mechanisms. Despite this momentum, migration to SDN cannot be realized at once especially in high-end cost networks of Internet Service Providers (ISPs). It is expected...
The Fast ReRoute flow-based model has been improved, where the node and link protection schemes in the linear form were formulated with the implementation of single path and multipath routing strategies. The use of linear-quadratic optimality criterion was substantiated, and the system hierarchy relations of weight coefficients in the objective function were determined with the aim to ensure maximum...
Mobile ad hoc networks (MANETs) play a significant role for communication whenever infrastructure is not available. In MANET, the group communication-based applications use the multicast routing protocol, where there is a single sender node and a group of receiver nodes. The benefits of multicast routing protocols are the capability to reduce the communication costs and saving the network resources...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
In mobile ad hoc networks (MANETs), when information about the location of the destination node is known, efficient communication can be achieved by using location-based routing protocols. Even in location-based routing protocols, with omnidirectional antennas there is some redundant route discovery by blind flooding of route request packets outside the area between the source and destination. These...
In this paper we demonstrate how limiting the number of copies each message that a node can send out as seen in Spray And Wait can be combined with probabilistic protocols such as Prophet, ProphetV2, and one that we created called Sparse. By limiting the number of copies that each node can send out we allow the routing protocols to scale much better than before when the number of nodes and messages...
Wireless Sensor Networks (WSNs) is the most developing areas in many factors like environment & wildlife monitoring, security & military surveillance, healthcare and many more. Also, routing protocols play a very important part in terms of efficiency in WSNs. Due to limitations of unreliable low power links and resources between the sensor nodes; design of an efficient routing protocol is...
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to...
Delay Tolerant Network (DTN) is primarily and specifically a class of MANET that is challenged. The working principle of DTN illustrates the mechanism to store information and carry it till some capable node is found and then a message is forwarded. This kind of implementation has found application areas like sparse and constrained networks. This paper explains the design specification issues of DTN...
In this paper, we address the problem of routing disruption attacks in Cognitive Radio Networks (CRNs). In routing disruption attacks, the malicious node intentionally drop data packets to consume more network resources or degrade routing performance. We propose a trust management model to mitigate such attacks in CRNs. Through monitoring forwarding behaviors of secondary users (SUs), trusts of SUs...
Delay-tolerant Network (DTN) is a computer network architecture that operates effectively over an extreme distance and communicates with heterogeneous networks that may affect the continuous network connectivity. DTN is particularly useful for the areas in which there are no direct connection (either physical or wireless) between source and destination over a long distance, as it can overcome the...
Mobile ad-hoc network is networks that are collection of mobile device that can communicate and share information between each other, without any predefine infrastructure or centralized system. Another challenge in MANET is energy constraints because each of the mobile nodes is operated by limited energy battery. This paper presents a new on-demand power saving routing algorithm for mobile ad-hoc...
This paper presents a multicast Delay Tolerant Network (DTN) routing protocol that uses an economic gain based routing utility for device-to-device (D2D) commercial coupon dissemination. Majority of the existing DTN routing approaches are not practically applicable to commercial content dissemination since they attempt to individually optimize performance indices such as message delay, forwarding...
Opportunistic Networks have been designed for transmitting data in difficult environments, characterized by high mobility, sporadic connectivity, and constrained resources. To sustain these networks, the literature describes methods such as Epidemic and Spray&Wait, which do not learn from the network behaviour, and Gossiping-based algorithms that collect historical network data to improve efficiency...
Routing protocols for Mobile Ad hoc Networks (MANETs) have been extensively studied. However, the presence of malicious nodes makes it difficult to establish a valid route. Some of the well-known source routing protocols presented in the literature which claim to establish secure routes are prone to hidden channel attacks. In this paper, we address this issue and present a novel protocol based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.