The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to verify the application effect of MANET Routing Protocol in vehicular ad hoc network, the table driven routing priors DSDV, OLSR and on-demand routing reactive AODV are used to verify the results. In this paper, the simulation platform is built by NS3 and SUMO, and the performance of MANET is verified by comparing the network performance parameters, such as throughput, packet delivery rate...
Reverse Path Forwarding based multicasting used in Distance Vector Multicast Routing Protocol (DVMRP) has the major drawback of generating large number of duplicate and prune packets. Use of the concept of pseudo diameter reduces the number of duplicate packets. The reason is that pseudo diameter helps in the reduction of the scope of travel of a packet. In this work a new approach of multicasting...
An improved GPSR protocol based on stratification of traffic density is designed to get lower possibility to encounter local optimum in VANET. In the sparse region, every node maintains a list that recorded its multi-hop neighbor nodes, but in the dense region, every node just maintains its one-hop-neighbor nodes. Every node will change their strategy according to the change of the periphery traffic...
Multicasting can be done in two different ways: source based tree approach and shared tree approach. Shared tree approach is preferred over source-based tree approach because in the later construction of minimum cost tree per source is needed unlike a single shared tree in the former approach. However, in shared tree approach a single core needs to handle the entire traffic load resulting in degraded...
Routing protocols for Delay and Disruption Tolerant Networks (DTNs) are prone to suffer from malicious behavior of nodes. Particularly, in the acknowledgment counterfeiting attack, malicious nodes forge acknowledgments in order to negatively impact network performance by removing from buffer messages that were not yet delivered to the destination. This paper proposes a new buffer management mechanism...
In this paper, we propose a modeling approach for a Content-Centric Networking (CCN) network by considering the dynamics of its transport layer protocol. Transport layer protocols for CCN have mainly been investigated through simulation experiments because CCN itself is a complicated network architecture compared with IP, and the complex interaction between CCN caching and the behavior of a transport...
Many broadcast protocols have been proposed in Vehicular ad-hoc Network (VANET) for safety applications and traffic efficiency. GeoBroadcast, which the sender sends information to the geographical area, has been standardized by the ETSI Technical Committee ITS. The routing protocol is a key technology satisfying communication requests of high reliability, low delay and universality for GeoBroadcast...
Wireless Mesh Networks (WMNs) are gaining popularity due to the features provided, especially the low cost and self-configuration ability. In WMNs, the data traffic is transmitted through intermediate nodes and a number of packets are dropped during the transmission due to various reasons. One significant reason is the limitation of network resources such as bandwidth and buffer size. Because of these...
Wireless mesh networks, utilizing the IEEE 802.11s standard, can provide an efficient communication architecture and large coverage as well as reliable data transmission for the Smart Grid applications in low voltage data collection networks. In this paper, we propose a traffic differentiated hybrid wireless mesh protocol for supporting the Smart Grid neighbourhood area networks. The proposed scheme...
Vehicular Delay Tolerant Networks (VDTNs) routing protocols is a hot research topic in the global context of Intelligent Transport Systems (ITS). To cope with the intermittent connectivity of vehicular communications, numerous protocols based on Store Carry and Forward (SCF) paradigm were designed, ranging from an adaptation of generic Delay Tolerant Networks (DTNs) to those specifically dedicated...
In this paper, the basic methods of routing organization in software-configurable network are considered. The efficiency of the implementation of routing SDN networks are evaluated using a specially designed setting — delays in the routing domain. Evaluates the effectiveness of routing under various principles of organization SDN-Controller and the various protocols for implementing an interface between...
This paper proposes a perspective method of Digital Power Line Carrier channels throughput increase in transmission of Supervisory Control and Data Acquisition packet traffic from electrical substations. The proposed method based on capturing of data packets and their compression with application of Predictor algorithm. The paper presents results of experimental evaluation of SCADA data compression...
Delay Tolerant Networks (DTN) are characterized by a lack of end-to-end connectivity. As such, messages (called bundles) can be stored in buffers for a long time. Network congestion can result in poor delivery rates, as bundles are dropped before having a chance of reaching their destination. Some routing protocols, such as the Probabilistic Routing Protocol using History of Encounters and Transitivity...
In this paper, we seek to address anonymous communications in delay tolerant networks (DTNs). While many different approaches for the internet and ad hoc networks, to the best of our knowledge, only variants of onion-based routing have been tailored for DTNs. Since each type of anonymous routing protocol has its advantages and drawbacks, there is no single anonymous routing protocol for DTNs that...
This paper proposes a position-based routing scheme called Speed Up-Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks (SU-GPSR). The speed up mode works together with greedy mode to provide a solution for data transmission in WSN. Unlike other variants of greedy perimeter stateless routing protocols, SU-GPSR not only embraces both still nodes and mobile nodes in one unified...
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the many routing schemes developed by the research community in real-world scenarios. In this demonstration, we showcase the Secure Opportunistic Schemes...
Aeronautical ad hoc network (AANET) can be applied as in-flight communication systems to allow aircraft to communicate with the ground, in complement to other existing communication systems to support Internet of Things. However, the unique features of civil AANETs present a great challenge to provide efficient and reliable data delivery in such environments. In this paper, we propose a multiple quality...
Flooding broadcast is the main way of vehicular node forwarding packets in Vehicular ad-hoc network (VANET). However this way may cause network congestion especially when multiple broadcast nodes send packets to the same receiving node at the same time. In this paper, a Congestion-Aware GPCR Routing Protocol (CA-GPCR) has been proposed to improve the performance of GPCR routing protocol in urban scenarios...
Delay tolerant networks (DTNs) are widely adopted to many network applications, such as disaster recovery and battlefield communications. Such critical network scenarios call for an outright prevention mechanism against contact-based attacks, e.g., blackmailing a legitimate user to compromise sensitive information at a contact. To the best of our knowledge, there is no work on secure routing protocol...
A new routing protocol that adjusts of the necessities of heterogeneous traffic is presented in this paper. The proposed scheme make improvement in TeGAR algorithm. The point of the scheme will be on accomplish low latency, and to fulfill various quality of service (QoS) in different network conditions. To do that, the proposed algorithm exploits multiple nodes' attributes like distance to the Sink,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.