The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
RPL, an IPv6 routing protocol for Low power Lossy Networks (LLNs), is considered to be the de facto routing standard for the Internet of Things (IoT). However, more and more experimental results demonstrate that RPL performs poorly when it comes to throughput and adaptability to network dynamics. This significantly limits the application of RPL in many practical IoT scenarios, such as an LLN with...
This paper evaluates the performance of the routing protocols HWMP, Babel and B.A.T.M.A.N. advanced for disaster networks. The evaluation is performed using a virtual environment so that the obtained results are similar to the expectations of a real world testbed. According to the specific requirements in disaster situations, three different scenario categories are implemented. The focus of the scenarios...
The Vehicular Ad Hoc Networks (VANETs), as an important part of intelligent transportation systems (ITS), has been becoming a promising research area. Due to the high mobility of vehicles and intermittent connected topology resulting in the dramatically changing network topology, it is difficult to design a protocol including congestion control mechanism, which is helpful for a well network performance...
In this paper, we propose a modeling approach for a Content-Centric Networking (CCN) network by considering the dynamics of its transport layer protocol. Transport layer protocols for CCN have mainly been investigated through simulation experiments because CCN itself is a complicated network architecture compared with IP, and the complex interaction between CCN caching and the behavior of a transport...
High throughput data transfers across the Internet has become a challenge with deployment of data centers and cloud platforms. In this paper, we propose to utilize the cores of a router to build multiple abstractions of the underlying topology to parallelize end-to-end (e2e) streams for bulk data transfers. By abstracting a different graph for each core, we steer each core to calculate a different...
Analysis of Network Intermediate Connectivity is one of the important and challenging issues in Vehicular Adhoc Network (VANET). Gradually, intermediate connectivity among the nodes becomes a popular interesting research paradigm in high mobility domain. It depends upon the movement pattern of the vehicles and the routing of packet transmission depends upon the connectivity of the nodes. Among the...
The standard routing protocols are used to find an optimal path between two given endpoints. Nowadays, the solution of multipath routing becomes fundamental requirement to improve the overall throughput of networks. On the other hand, due to the dynamic and high volume of traffic, it is also more challenging to control the congestion in an efficient way within the networks. Recently, Software-Defined...
Mobile Ad-hoc Network is one of the popular technologies among the various wireless technologies. The MANET is an ad-hoc technology and inherits the properties of mobility, wireless connectivity and independence. In one side it demonstrates the advantage over applications on the other side that is complicated to manage. Therefore the routing protocols are an essential component of the entire network...
The Wireless Network after Next (WNaN) radio is a multi-transceiver multi-frequency mobile ad-hoc network system that features four independent frequency agile transceivers and uses a variation of Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA). Utilizing WNaN's multiple transceivers, dynamic frequency assignment algorithm, and varying the hello packet interval can help alleviate the increased...
IPv4 and IPv6 protocol are incompatible due to their different header structure; therefore no direct communication exists between them. For the two protocol to coexist, IETF proposed three possible solutions; Dual Stack, translation and tunnelling. This paper evaluates the performance of tunnelling and dual stack as they are the most deployed techniques. 6to4, ISATAP and 6RD were the three automatic...
This paper proposes KAR (Key-for-Any-Route), a new intra-domain resilient routing system in which edge-nodes set a route ID to select any existing route as an alternative to safely forward packets to their destination. In KAR routing system, a route is defined as the remainder of the division between a route ID and a set of switch IDs along the path(s) between a pair of nodes. KAR-enabled switches...
Mobile ad hoc network is wireless network that employ multi-hop radio relayed and are capable of achieving without the support of any fixed infrastructure. The cut of any central coordinator makes the routing more complex. All nodes of these networks behave as routers and take part in discovery and maintenance of routes to other nodes in the network. This characterstic presents a big challenge to...
Low power and lossy networks (LLNs) consist of devices having limited battery power, less memory, reduced processing capability. RPL (Routing Protocol for low power and Lossy networks), is an approved Internet Engineering Task Force (IETF) standard routing protocol for IPv6-based LLNs. RPL uses a proactive routing approach and the sink or controller node within the network creates a Directed Acyclic...
The characteristics of underwater sensor networks are unique and they are much different from terrestrial networks but the importance of both cannot be neglected. However it is much more difficult to sustain a workable environment underwater due to its harsh characteristics which make tasks such as batteries replacement, nodes repairing and other similar factors difficult. Thus the need to efficiently...
As an essential part of next generation Internet, Wireless Mesh Networks (WMNs) have attracted much research attention due to its potential advantages including low up-front cost, ease of deployment, enhanced capacity and service coverage. However, the inherit features of wireless multi-hop networks have put forward a severe challenge for traffic engineering problem. Conventional traffic engineering...
Increasing numbers of service providers have tended to use tens of geographically dispersed datacenters in recent years. Thus, a major unmet challenge is efficiently transferring data among multiple datacenters in different domains. Traditional single-path transfer mechanism based on BGP has limited reliability and low link utilization; therefore, multi-path inter-domain flow transfer mechanisms have...
Underwater communication has become a popular research area because of many applications such as oceanography data collection, ocean exploration, undersea navigation, and control of autonomous underwater vehicles (AUVs). Since electromagnetic wave communication does not propagate well in underwater, long communication ranges are only possible through the use of acoustic waves. Acoustic communication...
OpenFlow is a new paradigm for running experimental protocols on production networks, and is becoming a standard reference for implementation of the software defined networking. OpenFlow can be deployed on wireless mesh network, a multi-hop relaying wireless network, for efficient network traffic management. Furthermore, various challenges such as load-balancing and control traffic management of wireless...
Virtual topologies simply the process of compiling assays to execute on digital microfluidic biochips (DMFBs). This paper evaluates the performance and cost of a virtual topology inspired by networks-on-chip (NoCs). The throughput of several deadlock-free droplet routing protocols is compared on synthetic traffic patterns that are widely used to evaluate semiconductor NoCs. The cost is the number...
Mobile Ad-hoc Networks (MANET) are mobile nodes that communicate without any predefined infrastructure and are wireless in nature. This allows MANET to be easily setup in difficult geographical terrains. MANET routing protocols are standards using which communication is carried out among the mobile nodes. MANET are very vulnerable to security attacks because of their open nature. In this paper analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.