The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It does not seem easy to generate reliable routes in Vehicular Ad-hoc Networks (VANETs) because of frequent link failures caused by vehicle's mobility. In this regard, we analyze the characteristics of topology-based routing protocols in order to assess the feasibility of each protocol for vehicular environments. We plan to design an efficient routing protocol for VANETs in order to generate reliable...
We describe the design, implementation and testing of the Component-Based Reusable Adaptive Mitigation (COBRAM) system, which is designed to mitigate attacks against control plane protocols at the MAC and routing layers of mobile wireless networks. The main parts of the COBRAM system are: (1) a set of extensible mitigation techniques that modify or extend a node's protocol components to resist attacks;...
This paper evaluates the Depth First Forwarding (DFF) protocol — a reliable data forwarding mechanism for use in low power, lossy networks. Routing protocols used for lossy networks typically take time to converge if the topology changes, during which data failure may occur. DFF was proposed to help reduce this; it reacts to data delivery failures at a node by trying to successfully deliver the packet...
Low-Power and Lossy networks (LLNs) cover a wide scope of applications, including, but not limit to, industrial control, healthcare and building automation, which has proliferated into both industrial and academic areas in recent years. Routing plays a significant role to the overall architecture of LLNs. The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is standardized by IETF to provide...
Current intra-domain routing protocols computes only shortest paths for any pair of nodes which cannot provide good fast reroute when network failures occur. Multipath routing can be fundamentally more efficient than the currently used single path routing protocols. It can significantly reduce congestion in network by shifting traffic to unused network resources. This improves network utilization...
Wireless sensor networks have a wide range of applications including target detection and tracking, environment monitoring, industrial process monitoring, hospital monitoring, and public utility service. A sensor network consists of a large number of sensor nodes and a few sink nodes to collect data from sensor nodes. Sensor nodes and sink nodes form a large scale wireless mesh network in which packets...
The devices composing Wireless Sensor Networks (WSN) are very limited in terms of memory, processing power and battery. We need efficient routing algorithms to ensure a long lifetime of the WSN. However, many solutions focus on minimizing the average energy consumption of all the nodes. Since the lifetime is rather given by the death of the first node or by the disconnection of the network, these...
Multi-path routing is a promising technique to increase the Internet's reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for same destination, which may not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient multi-path service(MPS),...
Wireless sensor networks consist of a large number of sensor nodes that have low power and limited transmission range and can be used in various scenario. The nodes can be deployed in the long and narrow region, such as road, bridge, tunnel and pipeline, to get some interesting information. The linear topology of these network application is different other application and have special feature, such...
Delay Tolerant Networking (DTN) has been proposed as a global overlay architecture to provide network connectivity in challenged environments such as deep-space communications field. Bundle Protocol along with its convergence layer protocols transform end-to-end reliability into questionable hop-by-hop reliable communication and imposes a two-tier routing policy that allows flexible routes only within...
Mobile Ad Hoc Network is a Network composed of mobile nodes that topology is constantly changing. If in the routing in these networks, the nodes that are selected as route nodes are not stable and have a high mobility, data transmission route is broken quickly. Therefore, the method can be considered in the routing that from the nodes are between source and destination, nodes that are more stable,...
The traditional wireless sensor networks based on minimum hop routing (MHR) protocol have the disadvantage of short stable period of minimum hop gradient field (MHGF), this would lead to the data sinking unreliable easily. In this paper, in order to improve the reliability of data sinking, a minimum hop routing wireless sensor network based on link reliability guaranteed (MHR-LR) is proposed. In the...
As more and more mission critical services emerge on the Internet, there is a growing demand for the Internet to provide stringent service availability and reliability. More and more domains adopt multi-homed connection to expect increasing reliability. But the de facto inter-domain protocol - BGP spends a long period to converge to another stable state when one of the links of multi-homed domain...
Maintaining connectivity is a key responsibility of any routing system, but successfully carrying it out can be challenging, especially for inter-domain paths. Many measurements indicate the links failures are fairly common in the Internet. During the period of failures, some destination would be unreachable and the corresponding services unavailable. Shrinking the convergence time window to improve...
Due to frequent link failures in multi-hop wireless networks, redundancy can be an important feature. For example, when planning the structure of a backhaul mesh network for public access, it is common to introduce redundant nodes in the mesh network. These are called redundant, because they do not increase the network capacity under normal operation, due to the shortest-path metric of the routing...
When planning the structure of a backhaul mesh network for public access, it is common to introduce redundant nodes in the mesh network. These are called redundant, because they do not increase the network capacity under normal operation, due to the shortest-path metric of the routing protocol. Instead, their sole purpose is to increase the network reliability by providing failover links when a link...
Wireless sensor network is applied widely in monitoring system of coal mine. An application environment of WSN in coal mine is analyzed to satisfy the data acquirement of mine monitoring. The result of analysis shows that routing protocols applied in coal mine should have four characteristics: data-centric routing mechanism, supporting query of geographic position information, low delay and high reliability...
Due to the special and complicated environment in coal mine, the reliability and energy-efficiency are both the primary issues to be considered during the design of the wireless sensor networks (WSNs) for coal mine. In this paper, we put forward a reliable geographical adaptive fidelity (RGAF) routing protocol, which is based on cluster-unit topology (CUT) for the WSNs in coal mine. RGAF utilizes...
Unlike terrestrial sensor networks, underwater sensor networks (UWSNs) have different characteristics such as a long propagation delay, a narrow bandwidth and high packet loss. Hence, existing path setup-based routing protocols proposed for terrestrial sensor networks are not applicable in the underwater environment. For example, they take much time when establishing a path between source and destination...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.