Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A Mobile Ad-hoc Network is a flexible wireless network. The nodes also function as routers which determine and propagate the routing tables amongst their neighbours to ensure a destination can be reached in the network. Without the restraint of physical links, mobility is common, these connections are not necessarily constant, with nodes free to either leave or join the network. This paper presents...
The Routing Protocol for Low power and lossy network (RPL) is recommended by Internet Engineering Task force (IETF) for IPv6 based Low Power Personal Area Network (6LoWPAN). RPL is a proactive routing protocol for Internet of Things (IoT) that has applications in smart homes, smart cities and smart world. RPL creates a Directed Acyclic Graph (DAG) of the network topology. Rank in a primitive construct...
Studying ad hoc routing protocols goes through three fundamental steps, namely: simulation, performance analysis and finally results interpretation. Undoubtedly, NS2 is widely used in ad hoc networks simulation. However, the analysis of generated simulation trace-files often requires the use of different software tools and programing languages. This makes the post simulation phase difficult and inefficient...
An Unmanned Aerial Ad hoc Network (UAANET) is a special type of Mobile Ad hoc Network (MANET). For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. One major component of such simulation studies is the movement pattern of the UAVs. In this paper, we first show that mobility models affect the performance of UAANET/MANET routing protocols. To study...
Topological changes in IP networks may significantly influence the performance of networking algorithms, which therefore should be carefully evaluated using a large topology pool with diverse characteristics. In this paper, we present an automated topology generation and analysis tool to perform an elaborate topological dependency analysis of a Multi Topology Routing based IP Fast Re-Route technology,...
Change management is a critical task to control the side effects of a modification during the business process evolution. The evolution of business processes is an essential activity for the companies to better fulfill the requirements of their customers and different stakeholders. In this respect, the enterprises should adopt an effective mechanism in order to achieve the flexible business process...
High speed interconnects operating at multi-Gbps or even higher have been widely used in computer systems. The link simulation methodology is getting more and more complicated and it is often a challenging task to evaluate the full link signal integrity performance. Meanwhile, understanding the impact of each link component to the full link performance is complicated and time-consuming, but critical...
Compared to wired networks, Delay/Disruption Tolerant Networks (DTN) are challenging to monitor due to their lack of infrastructure and the absence of end-to-end paths. This work studies the feasibility, limits and convergence of monitoring such DTNs. More specifically, we focus on the efficient monitoring of intercontact time distribution (ICT) between DTN participants. Our contribution is two-fold...
This paper describes the need for a unified simulation framework which defines the simulation tools and configuration settings for researchers to perform comparative simulations and test the performance of security tools for the AODV MANET routing protocol. The key objectives of the proposed framework are to provide an unbiased, repeatable simulation environment which collects all important performance...
As Wireless Mesh network (WMN) is self-organizing, self-adaptive, low-cost and multi-hop, it has gradually become one of the next generation wireless networks for communication. The routing security is an important aspect of WMN. Once the routing protocol is under attack, other security measures of WMN become meaningless. Hence, detecting and resolving the attack for routing protocol is significant...
Industry routers are very complex and time consuming, and are becoming more so with the explosion in design rules and design for manufacturability requirements that multiply with each technology node. Global routing is just the first phase of a router and serves the dual purpose of (i) seeding the following phases of a router and (ii) evaluating whether the current design point is routable. Lately,...
Content-centric networking focuses on data delivery rather than end-to-end reachability by decoupling resources from the hosts they reside on. We consider content-centric networking as a fundamental driver for mobile ad hoc network (MANET) protocol design. We systematically evaluate the suitability and effectiveness of existing approaches toward designing a content-centric MANET. We leverage the extensive...
In this paper we address the issue of the optimal candidate-set selection in the opportunistic routing paradigm. More specifically, although several algorithms for selecting the optimal candidate set have been proposed, to the best of our knowledge none of them has never considered the problem of selecting the optimal constrained candidate set, namely the optimal candidate set with a fixed maximum...
Wireless sensor networks (WSNs) have been increasingly deployed for both civil and military applications under harsh, unpredictable or open environments. Such environments create opportunities for the intruders to launch a variety of attacks on multiple protocol layers in WSNs. This paper proposes a behavior monitoring and analysis framework for large scale WSNs. Within this framework, we address...
Search in peer-to-peer networks is a challenging problem due to the absence of any centralized control & the limited information available at each node. When information is available about the overall structure of the network, use of this information can significantly improve the efficiency of decentralized search algorithms. Many peer-to-peer networks have been shown to exhibit power-law degree...
Internet is known as the net of networks. It is a huge decentralized network composed by smaller inter-connected networks named autonomous systems (AS). The autonomous systems's interconnection is done by the Border Gateway Protocol (BGP). Several tools have been proposed to monitor BGP problems. Even though there is no long term indicator to rank Internet routes's health based on long term BGP problems...
The opportunistic routing paradigm is a new avenue for designing routing protocols in multi-hop wireless networks. Unlike traditional wireless routing protocols which use a single predetermining path, opportunistic routing explicitly takes advantage of the broadcast nature of wireless communications by using a set of relay nodes to opportunistically perform packet forwarding. Network security is also...
Our society is heavily dependent on a wide variety of communication services. These services must be available even when undesirable events like sabotage, natural disasters, or network failures happen. The network survivability as defined by the ANSI T1A1.2 committee is the transient performance from the instant an undesirable event occurs until steady state with an acceptable performance level is...
Opportunistic networks (ONs) are a newly emerging type of delay tolerant network ( DTN) systems that opportunistically exploit unplanned contacts among nodes to share information. As with all DTN environments ONs experience frequent and large delays, and an end-to-end path from the source to destination may only exist for a brief and unpredictable period of time. Such network conditions present unique...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.