The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Optimized Link State Routing (OLSR) protocol, early designed for Mobile Ad hoc Networks (MANET), has been customized and evaluated for various Vehicular Ad hoc Network (VANET) scenarios. Most of the related work focus on changing OLSR parameters in order to adapt it to the high dynamicity of VANET due to high velocity of its nodes. However, they keep using OLSR with its native clustering scheme,...
In underwater sensor networks (UWSNs), information transmission is extremely challenging because of the underwater channel. Underwater acoustic channel suffers from long propagation delay and low bandwidth is inclined to packet losses. Hence, the design of an energy efficient communication system is challenging under the water. In this paper, we present an energy efficient clustered multi-hop routing...
The problems associated with multipath routing in Border Gateway Protocol (BGP) for Autonomous Systems (ASes) can be solved with some model or control systems from the Software Defined Networking (SDN). The SdN controller could be used to solve the inconsistencies in the scalability and latency of the Routing Information Base (RIB) of ASes. Also, a set of modules for Inter-AS routing and Brokering...
Building secure networks is one of the most important tasks of information security. The paper describes the main technologies of dynamic networks and technologies for secure communication in them. Also this paper reviews and compares the system developed by the authors for the secure exchange of data in dynamic networks using encryption with data technology.
Topology control is a crucial process for an efficient operation of a Wireless Sensor Network (WSN). The usage of WSNs in the Internet of Things (IoT) emerges new research challenges and novel applications. Recent WSNs proposals enhanced with Software Defined Networking (SDN) practices introduce new innovative network control strategies and protocols based on central control logic. This paper introduces...
One of the major concern of Wireless Sensor Networks (WSNs) is to minimize the energy consumption of the sensor nodes. In multi-hop clustering, sensor nodes closer to the Base Station (BS) deplete their energy faster as compared to far away nodes. Transmission of own data as well as other nodes data by the nearer nodes is the prime cause for this uneven energy consumption. Hence, the nodes closer...
E-health is one of the domains which will need more and more IoT solutions in the future, as it requires short delays for life-dependency situations and safe local storage spaces for privacy matters. The emergency context demands efficient communication and computing capacities, and the cloud vision as well as traditional TCP/IP way of communication cannot really suit these requirements. New approaches...
This work studies centrality metrics as forwarding load predictors, for both unicast and multicast traffic, within dynamic ad hoc network topologies. We present results from a series of emulation experiments based around an emergency response mobile network scenario. From collected temporal topological and traffic data, we calculate a rank correlation measure between predictive centrality metrics...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
With the fast development of cloud computing and online business of Internet, the importance of data center is gradually increasing. Conventional Ethernet protocols can hardly meet the scalability and performance requirements of data centers (DCs). The traditional method solves the congestion problem by reducing the network throughput. In this paper, based on software-defined networks (SDNs) technology,...
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
BTLive is a novel, unique, mesh/push-based peer-to-peer (P2P) live video streaming mechanism. Previous studies show that it achieves significantly lower streaming delays than other approaches but suffers from a high overhead, where peers receive up to 33% duplicate video chunks. Other P2P streaming mechanisms, most of which are either mesh/pull or tree/push-based, do not experience duplicates at such...
This paper describes a new implementation of the Elastic Multicast (EM) protocol including new design enhancements for improved dynamic operation. The paper also presents additional performance data collected from emulation-based mobile network experiments. EM is a low complexity extension to Simplified Multicast Forwarding (SMF) that adds group-specific dynamic pruning of the SMF-based multicast...
This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result...
OpenFlow/Software-Defined Networking (SDN) is a new networking paradigm that virtualizes network infrastructure by decoupling the control and data plane logic of traditional network devices. The controller of SDN has the overall look about network topology and hence provides flexibility to network operators to implement its own routing approaches. However, it could not control the way client works...
The enterprise and tactical domains have distinct properties and requirements, and have thus evolved independently in incompatible ways. Today the network infrastructure has emerged to, in theory, enable interconnectivity between these domains at a global scale. Unfortunately, even in the presence of these communication capabilities and despite the benefits that each operational domain can gain from...
Traditional vehicular routing protocols cannot accurately foresee future location of each vehicle for efficient packet forwarding. Recently, the data mining approach has been applied to analyze huge vehicle trajectory data. In this paper, we propose a novel trajectory-based routing (NTR) protocol to improve the packet replication efficiency of vehicles in the Vehicular Delay Tolerant Network (VDTN)...
Big Data concerns processing of large volumes of digital data with high velocity and variety. Big Data technologies allow the analysis of data in real time, which is critical for various eScience applications. In order to meet the growing demand of Big Data applications, the infrastructures must be flexible enough to adapt to the characteristics of the applications. Most of the solutions presented...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
In opportunistic networks, forwarding based protocols lead to a large amount of data flow to the highly connected nodes and unfairness of the nodes' traffic load, finally, it makes the highly connected nodes suffer congestion and results in the messages were discarded. To solve this problem, a congestion control algorithm based on Social Awareness is proposed in this paper. When choosing the next...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.