Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Wireless sensor Network (WSNs) is pervasive and gets a considerable measure of enthusiasm from scientists towards the best applications. Wormhole node are false courses that are shorter than the first course in the system it makes issue in directing component, which depend on the actualities about separation between node. The aggressor node catches the parcels from the true blue nodes. In our proposed...
A wireless sensor network (WSN) has its application in various fields such as temperature monitoring, pressure monitoring, health monitoring, defence system etc. In wireless sensor networks, congestion occurs because of the inadequate resources like low processing power of the sensor node. The performance of the WSN is degraded by the congestion as it leads to the wastage of energy, reduction in throughput...
Wireless networks are very popular due to its peak nowadays, because the users need wireless connectivity regardless of their geographic position. There's an increasing threat of attacks on the Wireless sensor Network (WSN). Node replication attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It's an analogy to...
Wireless communication is used to establish connection between nodes that communicate with each other. MANET (Mobile ad hoc Network) is having Open nature that makes it vulnerable for various security threats. These vulnerabilities allow the attacker to compromise the network and degrade the performance of the network. Gray-hole attack is one of the dangerous attacks. A gray-hole attack is extremely...
A mobile ad hoc network MANET is a collection of mobile nodes in which the nodes can communicate without the need of any access point or infrastructure. The wireless nodes can dynamically form a network to exchange information among them without making use of any existing network infrastructure. The mobile hosts are free to move dynamically and act as routers. Security is a highly challenging issue...
MANET's have gotten the excitement of examiners in years back. It is a wireless network with the goal that nodes move subjectively in the system. Zone routing protocol is a kind of crossbreed routing protocol. Various aggressors are attacking Manet because of its inclination. One attack is Jellyfish reorder attack that reorders the data parcels amid sending the source to destination node. This paper...
VANET is a part of MANET which is specific on communication between vehicle to vehicle or between vehicles to its surrounding environment infrastructure. One of the most widely used routing protocol at VANET implementation are AODV (Ad-hoc On-Demand Distance Vector) and DSDV (Destination Sequence Distance Vector Routing), which are topology based routing protocol. VANET dynamic network architecture...
A Routing Protocol is a rule that determines how routers can communicate with each other. The development of modern computer networks such as the Internet makes routing protocols increasingly required to find the best and efficient route. This study examined the performance of routing protocols RIPng, OSPFv3, and EIGRP in an IPv6 network by using GNS3 based on parameters of throughput, jitter and...
Mobile Ad-hoc Network (MANet) is a set of wireless mobile nodes forming flexible networks, thus they do not need infrastructure and central access points. With increase in the use of Mobile Adhoc Networks security became an essential requirement due to its dynamic topology, limited processing capacity, bandwidth limitations, high bit error rate etc. To provide secured communication among mobile nodes,...
Router buffers are the main reason for the Network-on-Chip's (NoC) scalable bandwidth, but consumes significant area and power. The SCEPTER bufferless NoC sets up single-cycle virtual express paths dynamically, allowing packets to traverse non-minimal paths without latency penalty. Using prioritization, bypassing, and throttling mechanisms, we maximize opportunities to use these paths while pushing...
Wireless Sensor Communication Networks have more concern on its routing techniques. Since the WSCNs nodes are battery powered, routing algorithms should assure the concept of energy saving without affecting the other performance metric like Throughput, Delay and Packet delivery ratio etc. The modified AOMDV called as Enhanced Energy Efficient Multipath Routing Protocol ( EEEMRP )is a proposed algorithm...
Previously, the distributed coding aware routing (DCAR) mechanism was proposed as a network coding aware routing protocol. However, DCAR is inefficient in handling realtime multimedia flows because it prefers nodes with longer queues in determining routes so that network coding opportunities can be increased. We propose a distributed coding-aware routing protocol that can maximize throughput and minimize...
Most existing mobile ad hoc network (MANET) routing protocols use the minimum number of hops as a routing metric. These paths tend to contain long range links that may degrade both throughput and reliability. Higher throughput can be achieved by using short but effective links. The main problem with existing protocols is that they use only receiver signal strength indicator (RSSI) value to assess...
With the rising popularity of WirelessCommunication, Mobile Ad hoc Network (MANET) hasobtained its own place to be analyzed. The potentialapplications of MANET are growing tremendously due to itsrapid changing technology. Wireless network can beestablished in two modes. One is "Ad hoc mode" where thenodes are self-organized and another is "Infrastructuredmode" where the nodes are...
This paper presents a method of calculating the minimal required transmission period for control messages and power margin for MANET with constrained resources, namely for communication and control systems on-planet robotic systems. For a system with ten robotic devices, with velocities of 10 cm/s, the sufficient power margin for worst case scenario will be equal to dP = 1 dB, which gives a transmission...
This paper presents the design and implementation of an automatic lecturer availability tracking system incorporating various software and hardware technologies. The system is aimed at reducing the amount of time that students, visitors and faculty members spend looking for specific employees without being hindered by the ethical issues surrounding RFID based staff tracking. It focuses on the availability...
Mobile Sensor Networks (MSN) is a collection of mobilizer attached sensor nodes which can move randomly or task specifically. Routing is a basic step for data exchange in MSN. The routing protocols designed for ad hoc networks are suitable to MSN because they support mobility but due to resource constraint nature of MSN these protocols are not used directly. Hence we need new protocols. Zone based...
Unlike the early days of IPv6 deployment, the interest of enterprise organizations, research community and academia in IPv6 is increasing day-by-day. Presence of IPv6 in providers network is very limited and community is adopting alternate methods to experience the IPv6 communication. Tunneling protocols are used over Hybrid IPv4-IPv6 networks to provide end-to-end IPv6 connectivity. These protocols...
Heterogeneous Wireless Mesh Networks (HetMesh) is a promising high throughput technology for multi-hop data forwarding by mobile clients and backbone routers in a dynamic environment. HetMesh supports Wifi-Direct facility and other separate access technologies in its mobile clients, which makes the selection of a suitable next hop forwarder for data transmission challenging. This paper proposes a...
In wireless ad-hoc networks, multi-hop networks which relay packets over several relay nodes are employed. It enables us to telecommunicate and construct quick and easy networking without cabling. However, the throughput deteriorates with an increase of the relay nodes, because delay occurs at each relay node. To relieve this problem, a multi-hop network with node-skipping was proposed. In the practical...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.