The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The ossification of Internet infrastructure and protocols have hindered the advancement of itself. GENI, AKARI and several other similar initiatives are pushing forward to overcome this hindrance. They facilitate researchers with networking platforms dedicated for innovative networking experiments. In these virtualized platforms, researchers can define their own forwarding schemes which can be radically...
Energy costs for data centers are a significant part of the overall expenses for their operation. With a reduction of these and associated costs, huge savings can be achieved. This paper describes a way to reduce the energy costs for data centers. The general idea behind our solution is very simple. Instead of routing the information required for any service interaction to and from the data center...
In this paper, we discuss the issues of QoS multicast routing in multi-hop Cognitive Radio (CR) networks. The problem of our concern is: given a CR network and a QoS multicast request, how to set up a multicast connection so that the total bandwidth consumption of the multicast is minimized while the QoS requirements are met. We propose a distributed protocol which uses shortest path tree as the multicast...
As the wireless network scales up in size and complexity, the need to study the scalability and behaviors of these networks and their protocols becomes essential. Opportunistic routing utilizes broadcast nature of wireless network, and significantly increases the unicast throughput. However, all of the current opportunistic routing protocols have to rely on the whole topology information. This indeed...
In urban vehicular network, existing routing protocols using beacon message scheme and P2P (peer to peer) density discovery scheme can hardly make a good performance as well as keep a high feasibility. This paper proposes an IGOR (improved geography and overlay routing) in urban vehicular environment. In IGOR, RSUs (road side units) are introduced to support the road density discovery. A passive neighbor...
A Vehicular Ad Hoc Network (VANET) not only experiences highly mobile and frequently disconnected, but may also have to deal with rapid changes of network topologies, especially when accidents and road traffic jams happen. In this paper, we propose a novel approach to address this issue. Due to the intermittent connectivity in VANET, we adopt the idea of carry and forward, where a moving vehicle carries...
Wireless sensor networks with hundreds to thousands of sensor nodes can collect information from an un attendant environment and transmit the collected information to a specific user depending on user end application. These sensor nodes have some constraints due to limited energy, storage capacity and computing power. Data sre routed from one node to another using different routing protocols. There...
In the Group agreement, the cluster heads' distribution is irregular and the data path is not the best, so it is necessary to design a better routing protocol. Based on the method of “distance becoming zero”, a grid clustering routing protocol is designed, and the simulation comparison is completed between Group agreement and the improved grid clustering routing protocol.
Internet is known as the net of networks. It is a huge decentralized network composed by smaller inter-connected networks named autonomous systems (AS). The autonomous systems's interconnection is done by the Border Gateway Protocol (BGP). Several tools have been proposed to monitor BGP problems. Even though there is no long term indicator to rank Internet routes's health based on long term BGP problems...
Jamming attack by adversaries is the critical threat in Network Centric Warfare that uses tactical wireless networks. Thus research on developing new networking protocols that are resilient to such attacks are of high importance. Geocasting is a prominent routing mechanism in tactical networks to send critical messages such as alarm about chemical attack, guerrilla detection etc, to the nodes within...
As wireless communication gains popularity, significant research has been devoted to supporting realtime transmission with stringent Quality of Service (QoS) requirements for wireless applications. At the same time, a wireless hybrid network that integrates a mobile wireless ad hoc network (MANET) and a wireless infrastructure network has been proven to be a better alternative for the next generation...
In mobile ad-hoc networks (MANET), broadcasting is used intensively for path discovery. Minimizing redundant rebroadcasts and time latency during re-broadcast can considerably improve network performance and node connectivity. In this paper we propose a Zone-based Routing Protocol with Parallel Collision Guidance Broadcasting (ZCG) for MANET. The network is divided into contiguous zones lead by the...
As the increasing of mobile Ad Hoc network applications, and the demand of group-oriented computer and communication, multicast routing technology has become the focus of the study. As the increasing of ...the scalability of the multicsat routing protocol becomes an important issue. In this paper, based on MAODV, an improvement protocol with policy-based clustering multicast routing is put forward...
Protocols in Cognitive Radio Networks (CRNs) tune the radio and network parameters to utilize the unused frequency spectrum, and thus improve the application performance. Generalized Network Utility Maximization (GNUM) approach has been used to derive optimal algorithms in CRN from a theoretical formulation of the problem. However, there are several practical challenges for realizing these algorithms...
Security in mobile ad hoc networks (MANET) Quality of Services routing has received increased attention in recent years. This paper proposes mechanism to obtain secure MANET QoS routing with regard to QoS considerations. Our goal is to present a new mechanism over on-demand multi-path routing protocol (AOMDV) that tackles the twin issues of reliability (protection against failures of multiple paths)...
In this paper, we propose a new routing scheme that optimizes the anypath routing protocol with Byzantine attack resident. In anypath routing scheme, each node uses a set of next-hops and selected wormhole list privileges to decide the next-hops. Currently, anypath is still an open issue in wireless mesh networks. In this paper, we bring the Byzantine attack to the anypath routing protocol which could...
There are several situations in which it would be advantageous to allow route preferences to be dependent on which neighbor is to receive the route. This idea could be realised in many possible ways and could interact differently with other elements of route choice, such as filtering: not all of these will have the property that a unique routing solution can always be found. We develop an algebraic...
Intermittent connectivity is common in certain wireless access networks. Existing network protocols are not resilient to disruption of communication links and communication often fails when faced with sporadic connectivity. Thus in recent years there is a growing interest in Intermittently Connected Mobile Networks (also know as Mobile Opportunistic Networks) and many routing protocols have been proposed...
This paper presents a new data transmission protocol in Delay Tolerant Mobile Wireless Sensor Networks, which divides the data transmission process into two phases: data reception phase and data forwarding phase, mainly fulfilling through analyzing the state of mobile nodes and using Hand up mechanism. Simulation result shows that, through the implementation of two phases, we can obtain a higher message...
Structured peer-to-peer overlays offer a basis for a broad range of applications, such as distributed storage, application layer multicast, and mobility support. This paper introduces R/Kademlia, a low bandwidth and low latency variant of the popular overlay protocol Kademlia. R/Kademlia utilizes recursive overlay routing instead of iterative lookups of keys, thus a higher routing performance can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.