Zeitschriftenartikel zum Thema „Computer network protocols“

Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Computer network protocols.

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Zeitschriftenartikel für die Forschung zum Thema "Computer network protocols" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Zeitschriftenartikel für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael und Nawzad K. AL-Salihi. „Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET“. UKH Journal of Science and Engineering 3, Nr. 1 (22.05.2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Der volle Inhalt der Quelle
Annotation:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus und Markus Happe. „Self-Awareness in Computer Networks“. International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Der volle Inhalt der Quelle
Annotation:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Neeru Kumari und Dr. Tilak Raj. „OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol“. International Research Journal on Advanced Engineering and Management (IRJAEM) 2, Nr. 06 (22.06.2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Der volle Inhalt der Quelle
Annotation:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms through which they compute the best path selection criteria. OSPF because of its flexible design is often used with other routing protocol over the large network. This research focuses on the working of OSPF metric value variation and convergence for best path selection using network simulation tool like Cisco Packet Tracer tool for getting similar outcome just like a real networking device like router working in a real production environment. This research would use multiple combinations of OSPF metric calculation for routes learned from other routing protocols like Routing Information Protocol (RIP). Being able to correctly identify metric values obtain by testing with OSPF and other routing protocols and analysis them for best path selection.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Alfaresa, Yuansa, Bongga Arifwidodo und Fauza Khair. „Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library“. Jurnal Online Informatika 8, Nr. 2 (28.12.2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Der volle Inhalt der Quelle
Annotation:
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This study focuses on analyzing the performance of network automation using the Paramiko and Telnetlib libraries. The routing protocol used by OSPF for IGP and BGP for EGP. The scenario in this study involves configuring IP addresses and configuring OSPF and BGP routing. Based on the test results, the Telnetlib library is better than the Paramiko library in terms of script delivery time, convergence time, and delay by 19.237% when applied to the IGP and EGP routing protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Mardedi, Lalu Zazuli Azhar, und Khairan Marzuki. „Network Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF“. MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, Nr. 2 (29.05.2019): 202–10. http://dx.doi.org/10.30812/matrik.v18i2.372.

Der volle Inhalt der Quelle
Annotation:
Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is to compare the performance of the EIGRP routing protocol and OSPF routing protocol that is on the network using the hybird topology. Overcoming problems with high-scale network access, we will analyze and compare performance between EIGRP routing protocol and OSPF routing protocol. In obtaining the value and to verify the results of the implementation, the simulation software uses a Packet Tracer simulator.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin und Aleksandr V. Dubinin. „Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols“. Vestnik MEI, Nr. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Der volle Inhalt der Quelle
Annotation:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The article presents several models for organizing bridges: a centralized network bridge on the side of a router and client computer, a distributed bridging system, and a dedicated bridge. Based on the accomplished analysis, it is recommended to use a centralized model for a network that has to comply with more stringent reliability requirements. If there is a need to have simultaneous access to several automation devices and high data exchange rates, a distributed model should be used. A dedicated bridge is used only in special cases, for example, when a high compactness is required in implementing a monitoring system.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Romaniuc, Alexandru-Gabriel, Vlad-Cosmin Vasile und Elena-Monica Borda. „Study of Methods and Techniques for Manipulating the Time Synchronization Component of NTP Servers in Computer Networks“. International conference KNOWLEDGE-BASED ORGANIZATION 29, Nr. 3 (01.06.2023): 71–77. http://dx.doi.org/10.2478/kbo-2023-0078.

Der volle Inhalt der Quelle
Annotation:
Abstract In computer networks as well as in many other domains, time synchronization is carried out by some dedicated devices called time servers that uses network protocols, such as NTP (Network Time Protocol), PTP (Precision Time Protocol) or SNTP (Simple Network Time Protocol). Many domains and applications, such as, computer networks, security protocols, telecommunications, network services, and many others, depend on accurate time synchronization. According to the CVE (Common Vulnerabilities and Exposures) databases, between 2001-2022, more than 150 time synchronization protocols vulnerabilities have been reported. One of the most dangerous threats is the manipulation of the time synchronization information. Thus, the existence of such a vulnerability can generate serious security problems. Considering these aspects, in this article we aim to use some methods and techniques for the manipulation of the time component and use them to test some synchronization systems. This will require real-life scenarios of the use of time synchronization systems in which some methods and techniques are applied to exploit their vulnerabilities. Following these scenarios, we will be able to assess the risk to which these systems are exposed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Muhammad Shahzaib Saeed. „Survey of Network Protocols“. Lahore Garrison University Research Journal of Computer Science and Information Technology 3, Nr. 2 (28.06.2019): 15–19. http://dx.doi.org/10.54692/lgurjcsit.2019.030273.

Der volle Inhalt der Quelle
Annotation:
IPv4 is the network protocols of the present Internet, which is characterized by the Internet Engineering Task Force (IETF). Network protocols characterize guidelines, polices and traditions for communication between system devices. Every advanced protocol for computer organization utilizer a packet switching system to send and get the message. The protocols are intended to conquer the activities of any enemy that can lose the sent message, discretionarily change the fields of the sent message, and replay old messages. In the web, the colossal measure of information and the immense number of various protocols makes it perfect as a high-bandwidth speed vehicle for undercover communication. This article is an overview of the current methods for making the covert channels. Weadditionally gave a diagram of wide kinds of network protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Deepak Malik und Dr. Bijendra Singh. „Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation“. International Research Journal on Advanced Engineering Hub (IRJAEH) 2, Nr. 06 (25.06.2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.

Der volle Inhalt der Quelle
Annotation:
Open Shortest Path First (OSPF) is a multi-vendor routing standard. Any routing protocol's goal is to discover the optimum path between source and destination addresses inside a computer network. Other routing protocols include Routing Information Protocol (RIP), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and IS-IS. which are also used in computer networking. Each routing protocol has different set of rules through which they calculate the best path selection. OSPF is often used with the combination of these routing protocol because of its flexible design. This research focuses on the implementation of OSPF network cost (metric) value for best path calculation using network simulation tool like GNS3 for getting correct outcome just like a real networking device working in a live production environment. This research would use the different combinations of OSPF cost calculation using metric-types for external routes learned from different routing protocols like RIP. Being able to accurately identify cost (metric) values obtain by testing for OSPF when used with other routing protocols, just like a real-world environment.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Majid, Nuur Wachid Abdul, und Syifaul Fuada. „RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?“ Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, Nr. 1 (30.04.2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Der volle Inhalt der Quelle
Annotation:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

KOVACIK, Cyril Filip, und Gabriel BUGAR. „ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK“. Acta Electrotechnica et Informatica 1335-8243, Nr. 1338-3957 (09.06.2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Der volle Inhalt der Quelle
Annotation:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Ryndych, Yevhen, Andrii Borovyk und Oleksii Borovyk. „RESEARCH OF TUNNELING TECHNOLOGIES IN MODERN COMPUTER NETWORKS“. Technical Sciences and Technologies, Nr. 4(26) (2021): 67–74. http://dx.doi.org/10.25140/2411-5363-2021-4(26)-67-74.

Der volle Inhalt der Quelle
Annotation:
Modern corporate networks are a combination of internal and external communication channels. The issue of confiden-tiality in such networks is relevant. To reduce the risks associated with implementing new solutions in continuous cycle systems, it is necessary to analyze and evaluate their impact.For now, there is a large number of network protocols that can be used to create tunnels. Modern network equipment is a rather complex software and hardware system that supports many standards and protocols. Well-known network equipment manufacturer MikroTik has upgraded the RouterOS operating system to version 7, where the main change is the use of an updated Linux kernel version 5.6.3, which allows routers to use several different waysto establish secure connections. In modern research, the main attention is paid to encryption algorithms and tunneling protocols without taking into account the peculiarities of implementation. The aim of the article is to develop semi-natural modeling of networks that can be used in the educational process and production systems. The result of the simulation is quantitative indicators of the performance of network equipment and com-munication channels. The use of semi-natural modeling is necessary when itis not possible to describe the operation of some elements of the system mathematically. Real network equipment and long-distance communication channels of providers were used to model the corporate network. To make the results objective in the test scheme, MikroTik hAP ac2 equipment with a hardware encryption chip and RouterOS v.7.1 were installed on both ends. A 100 Mbps channel was used as the ISP at both ends. The standard Bandwith test tool built into RouterOS is used as a data generator. The study allowed to determine the features of the modern version of the operating system RouterOS. A feature of this version is the built-in implementation of the tunnel using the WireGuard protocol, which showed high performance. The model was also used to obtain quantitative indica-tors of the performance of tunnels with different protocols under the condition of encrypting the transmitted data. As can beseen from the results of the experiments, the impact of protocols and their implementations on the useful bandwidth is significant and can reduce it several times.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Jain, Neha, Ashish Payal und Aarti Jain. „Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks“. International Journal of Pervasive Computing and Communications 17, Nr. 4 (10.09.2021): 361–76. http://dx.doi.org/10.1108/ijpcc-02-2021-0036.

Der volle Inhalt der Quelle
Annotation:
Purpose The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are the most popular routing protocols, and it has always been a challenge to select between these routing protocols, especially for hybrid networks. The efficiency of routing protocol mainly depends on resulting throughput and delay. Also, it has been observed that data packet size also plays an essential role in determining the efficiency of routing protocol. Design/methodology/approach To analyse the effect of different packet sizes using two routing protocols, routing information protocol (RIP) and open shortest path first (OSPF) on the hybrid network, require detailed planning. Designing the network for simulate and then finally analysing the results requires proper study. Each stage needs to be understood well for work accomplishment. Thus, the network’s simulation and evaluation require implementing the proposed work step by step, saving time and cost. Here, the proposed work methodology is defined in six steps or stages. Findings The simulation results show that both routing protocols – RIP and OSPF are equally good in terms of network throughput for all different packet sizes. However, OSPF performs better in terms of network delay than RIP routing protocol in different packet size scenarios. Research limitations/implications In this paper, a fixed network of 125 objects and only RIP and OSPF routing protocol have been used for analysis. Therefore, in the future, a comparison of different network sizes can be considered by increasing or decreasing the number of objects in the proposed network. Furthermore, the other routing protocols can be used for performance evaluation on the same proposed network. Originality/value The analysis can be conducted by simulation of the network, enabling us to develop a network environment without restricting the selection of parameters as it minimizes cost, network deployment overhead, human resources, etc. The results are analysed, calculated and compared for each packet size on different routing protocol networks individually and the conclusion is made.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Kryukov, Ya V., D. A. Pokamestov, E. V. Rogozhnikov, S. A. Novichkov und D. V. Lakontsev. „Analysis of Computational Complexity and Processing Time Evaluation of the Protocol Stack in 5G New Radio“. Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, Nr. 3 (25.09.2020): 31–37. http://dx.doi.org/10.21293/1818-0442-2020-23-3-31-37.

Der volle Inhalt der Quelle
Annotation:
Currently, an active deployment of radio access networks for mobile communication systems 5G New Radio is being observed. The architecture of networks is developing rapidly, where significant part of the functions is performed in a virtual cloud space of a personal computer. The computing power of a personal computer must be sufficient to execute network protocols in real time. To reduce the cost of deploying 5G NR networks, the configuration of each remote computer must be optimally matched to the scale of a particular network. Therefore, an urgent direction of research is the assessment of the execution time of the 5G NR protocol stack on various configurations of computers and the development of a mathematical model for data analysis, approximation of dependencies and making recommendations. In this paper, the authors provide an overview of the main 5G NR network architectures, as well as a description of the methods and tools that can be used to estimate the computational complexity of the 5G NR protocol stack. The final section provides an analysis of the computational complexity of the protocol stack, obtained during the experiments by colleagues in partner institutions.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Khan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman und Lakshmi Subramanian. „The case for model-driven interpretability of delay-based congestion control protocols“. ACM SIGCOMM Computer Communication Review 51, Nr. 1 (31.01.2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.

Der volle Inhalt der Quelle
Annotation:
Analyzing and interpreting the exact behavior of new delay-based congestion control protocols with complex non-linear control loops is exceptionally difficult in highly variable networks such as cellular networks. This paper proposes a Model-Driven Interpretability (MDI) congestion control framework, which derives a model version of a delay-based protocol by simplifying a congestion control protocol's response into a guided random walk over a two-dimensional Markov model. We demonstrate the case for the MDI framework by using MDI to analyze and interpret the behavior of two delay-based protocols over cellular channels: Verus and Copa. Our results show a successful approximation of throughput and delay characteristics of the protocols' model versions across variable network conditions. The learned model of a protocol provides key insights into an algorithm's convergence properties.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

T, Padmapriya, und Manikanthan S.V. „Investigation of Video Streaming over MANETS Routing Protocols“. International Journal of Interactive Mobile Technologies (iJIM) 16, Nr. 12 (21.06.2022): 103–13. http://dx.doi.org/10.3991/ijim.v16i12.30805.

Der volle Inhalt der Quelle
Annotation:
For industrial and academic researchers from all around the world, the Mobile Ad-hoc Network (MANET) is a specific focus. A MANET was created as a result of the fast growth of wireless gadgets. Mobile Ad hoc network is a self-organizing network with no framework. MANET’s device has the ability to travel in any direction in order to transmit and receive data with other devices or network nodes. An administrator node which is capable of controlling other nodes is absent in MANET. All nodes in MANET act as its own router and host and arrange its own network. The most important element of MANET is Routing protocol. For routing in MANET, various routing protocol is responsible. Providing a video streaming service using mobile ad-hoc networks is a hard task. The network topology is immensely unstable and its instability causes data to be lost. The performance of MANET routing protocols for video applications has been examined in this paper. There are many routing protocols, however the Optimized Link State Routing (OLSR) protocol and Ad-hoc On-Demand Distance Vector (AODV) routing protocols are explored here. In this work, a comparison of these two effective routing protocols for supporting video streaming applications is offered.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Ismaeel, Tarik Zeyad, und Dhurgham Razaq Mohsen. „Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network“. Journal of Engineering 22, Nr. 7 (01.07.2016): 142–63. http://dx.doi.org/10.31026/j.eng.2016.07.09.

Der volle Inhalt der Quelle
Annotation:
Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one protocol to another depending on the applications used in the network. The network design is done using the program (Op-Net V14.5 modular) with core i7 computer for multiple nodes deployed randomly in several area (100 * 100, 200 * 200, 400 * 400, 800 * 800, 1000 * 1000)m2 accomplished by changing the number of nodes in the network (10, 20, 40 and 80). There are three programs designed using (MATLAB 2012A programming language). The first one evaluates the (QoS) using the organizational structure of the mysterious system (HFS), which relied on the standard applications that should be provided by the protocols to make the applications accepted by the nodes requirements. After the evaluation the QoS for all cases, we design Neural Network to assist in estimation of the best protocol for any network through QoS for all protocols (AODV, DSR, OLSR and TORA). Neural network has four entrances (area, number of nodes, real time application ratio and non-real time application ratio). The results show that the QoS estimated is (0.5401) of (OLSR) which has been improved to (0.6421) by reducing to mobility speed and making some nodes fixed and using more than one protocol in the network to provide the best QoS .
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Alazzawi, L., und A. Elkateeb. „Performance Evaluation of the WSN Routing Protocols Scalability“. Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–9. http://dx.doi.org/10.1155/2008/481046.

Der volle Inhalt der Quelle
Annotation:
Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs). A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Lin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang und Fei Guo. „Comparison and Analysis of MAC Protocol in Multimedia Communications“. Applied Mechanics and Materials 519-520 (Februar 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.

Der volle Inhalt der Quelle
Annotation:
MAC protocol analysis and comparison to the multimedia communication theory as the framework, firstly discusses the requirement of communication network in computer networks and multimedia applications. MAC protocols oriented to wireless sensor networks are compared and analyzed. Summary of CSMA/CA, CSMA/CD, S-MAC and basic principles and applicable occasions, main parameters is made. Properties of the three MAC protocols is compared. The results of this study provides reference for MAC protocol oriented to multimedia communications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Wahid, Ishtiaq, Sadaf Tanvir, Abdul Hameed und Masood Ahmad. „Software-Defined Networks and Named Data Networks in Vehicular Ad Hoc Network Routing: Comparative Study and Future Directions“. Security and Communication Networks 2022 (18.06.2022): 1–14. http://dx.doi.org/10.1155/2022/1270180.

Der volle Inhalt der Quelle
Annotation:
Routing protocols are an essential component of vehicular ad hoc networks. Software-defined networks and name data networks are new aspects of routing that are coming to the fore as Vehicular Ad Hoc Network technology evolves. Data Network-based VANET routing protocols and Software Defined Network-based VANET routing protocols have been developed in recent research. These newly developed protocols must be part of VANET routing protocol surveys. The taxonomy of traditional routing protocols must take these innovations into account. To the best of our knowledge, no such taxonomy exists at the moment. We present a new taxonomy of routing protocols based on the additional routing aspects of Software-Defined Networks and Named Data Networks. All traditional routing protocols are kept in a single category. This research work aims to update the existing taxonomy of routing protocols with the newly adopted aspects of research in routing. Advanced routing schemes are selected for the survey from each category to evaluate new research results in VANET routing. This article also describes future directions for VANET/ITS routing research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

Ayyagari, A., und A. Ray. „A Fiber-Optic Network Protocol for Computer Integrated Manufacturing“. Journal of Engineering for Industry 114, Nr. 3 (01.08.1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Der volle Inhalt der Quelle
Annotation:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Consul, Juliana I., und Japheth R. Bunakiye. „Survey of the Influence of Routing Protocols to Network Performance Enhancement“. Advances in Multidisciplinary and scientific Research Journal Publication 10, Nr. 4 (30.12.2023): 13–28. http://dx.doi.org/10.22624/aims/maths/v11n4p2.

Der volle Inhalt der Quelle
Annotation:
Routing protocols play a crucial role in the operation of computer networks by determining the optimal paths for data transmission. The selection of an appropriate routing protocol can significantly impact network performance, including factors such as latency, throughput, reliability, and scalability. This survey aims to provide a comprehensive analysis of the influence of various routing protocols on network performance enhancement. The survey begins by presenting an overview of common routing protocols with their key characteristics. Subsequently, it explores the impact of these protocols on network performance metrics, focusing on their ability to adapt to changing network conditions, mitigate congestion, and ensure efficient resource utilization. Through a systematic review of literature, empirical studies, and real-world implementations, this survey aims to provide network administrators, researchers, and practitioners with valuable insights into selecting and optimizing routing protocols for specific network environments. Additionally, it identifies areas for further research and development to continue advancing the field of routing protocols and network performance enhancement. Keywords: Optimizing Routing Protocols, Performance Metrics, Reliability and Scalability, Resource Utilization, Wireless Local Area Networks, Accurate Routing Tables Juliana I. Consul & Bunakiye R. Japheth (2023): Survey of the Influence of Routing Protocols to Network Performance Enhancement. Journal of Advances in Mathematical & Computational Science. Vol. 11, No. 4. Pp 13-28 Available online at www.isteams.net/mathematics-computationaljournal. dx.doi.org/10.22624/AIMS/MATHS/V11N4P2
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko und V. V. Soloviev. „Features of Address Resolution Protocol Operation in Computer Networks“. Programmnaya Ingeneria 13, Nr. 5 (16.05.2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Der volle Inhalt der Quelle
Annotation:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Ayu tiara sunja, Sunja, und Meilyana Winda Perdana. „Development of local area network (LAN) at SMK 1 belitang madang raya“. International Journal Cister 1, Nr. 02 (01.08.2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Der volle Inhalt der Quelle
Annotation:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Labinsky, Alexander. „FEATURES OF CRYPTOGRAPHIC PROTOCOLS“. NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, Nr. 1 (17.04.2024): 53–59. http://dx.doi.org/10.61260/2307-7476-2024-1-53-59.

Der volle Inhalt der Quelle
Annotation:
The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing. The cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants. The article provides classification of cryptographic protocols on various features and considers security properties of protocols, characterizing their resistance to various attacks. The SSL data encryption protocol, which uses asymmetric cryptography for key authentication, symmetric encryption to preserve confidentiality and authentication codes to verify message integrity, is discussed in detail. The SSL protocol has been widely used in recent years for instant messaging and IP voice transmission in applications such as e-mail, Internet fax and others. The article deals with encryption and hashing of data (MD5, SHA-1, DES encryption algorithms). Computer models of data encryption (DES algorithm), text data checksum calculation (CRC32 algorithm) and password character matching were developed according to the algorithms considered. The computer models were implemented as computer programs, with the first two models as console programs and the third model as a program with graphical interface.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Anvari, Hamidreza, und Paul Lu. „Machine-Learned Recognition of Network Traffic for Optimization through Protocol Selection“. Computers 10, Nr. 6 (11.06.2021): 76. http://dx.doi.org/10.3390/computers10060076.

Der volle Inhalt der Quelle
Annotation:
We introduce optimization through protocol selection (OPS) as a technique to improve bulk-data transfer on shared wide-area networks (WANs). Instead of just fine-tuning the parameters of a network protocol, our empirical results show that the selection of the protocol itself can result in up to four times higher throughput in some key cases. However, OPS for the foreground traffic (e.g., TCP CUBIC, TCP BBR, UDT) depends on knowledge about the network protocols used by the background traffic (i.e., other users). Therefore, we build and empirically evaluate several machine-learned (ML) classifiers, trained on local round-trip time (RTT) time-series data gathered using active probing, to recognize the mix of network protocols in the background with an accuracy of up to 0.96.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Garg, Puneet, Ashutosh Dixit, Preeti Sethi und Plácido Rogerio Pinheiro. „Impact of Node Density on the QoS Parameters of Routing Protocols in Opportunistic Networks for Smart Spaces“. Mobile Information Systems 2020 (01.08.2020): 1–18. http://dx.doi.org/10.1155/2020/8868842.

Der volle Inhalt der Quelle
Annotation:
The need and importance of Smart Spaces have been potentially realized by the researchers due to its applicability in the current lifestyle. Opportunistic network, a successor of mobile ad hoc networks and a budding technology of network, is a best-suited technology for implementing Smart Spaces due to its wide range of applications in real-life scenarios ranging from building smart cities to interplanetary communication. There are numerous routing protocols which are available in opportunistic network, each having their pros and cons; however, no research till the time of listing has been done which can quantitatively demonstrate the maximum performance of these protocols and standardize the comparison of opportunistic routing protocols which has been a major cause of ambiguous performance evaluation studies. The work here presents a categorical view of the opportunistic routing protocol family and thereby compares and contrasts the various simulators suited for their simulation. Thereafter, the most popular protocols (selecting at least one protocol from each category) are compared based on node density on as many as 8 standard performance metrics using ONE simulator to observe their scalability, realism, and comparability. The work concludes by presenting the merits and demerits of each of the protocols discussed as well as specifying the best routing protocol among all the available protocols for Smart Spaces with maximum output. It is believed that the results achieved by the implemented methodology will help future researchers to choose appropriate routing protocol to delve into their research under different scenarios.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Kaur, Arshdeep, Sandeep Kumar Arora und Mahedi Masud. „Comparative Analysis of Clustering using AODV DSDV and CBRP“. International Journal of Engineering & Technology 7, Nr. 3.8 (07.07.2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.

Der volle Inhalt der Quelle
Annotation:
In a network whether wireless or wired, a set of protocols which are used to distribute the information through various routes between the nodes are said to be the routing protocols which serves as a majorly vital part of the computer networks. They specify the particular and specific path of information exchange by the sending and receiving of packets. Vehicular ad- hoc networks are quite emerging technologies of today’s era presenting the provision of seamless and uninterrupted communication in the network of mobile nodes in dynamic environment. Routing itself proves to be quite a considerable and crucial challenge where the routing protocol named AODV performs its best by proving itself considerably more efficient. The stated paper focuses on the Performance comparison of the conventional protocols AODV and DSDV where AODV outperforms DSDV and offers better QoS but such conventional protocol proves to be inauspicious in VANET. This paper gives verification of better QoS of cluster based routing protocol CBR over the conventional routing protocols. The Simulation and comparison results have been carried out in Network Simulator NS-2 to briefly elaborate the impact of AODV DSDV and CBR routing protocols on the bases of Throughput, Normalized Routing Load, Control overheads, delay, Jitter and Packet drop ratio as performance metrics.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Gee, K. „Communications network protocols“. Computer Communications 8, Nr. 5 (Oktober 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Patel, Ahmed. „Communication network protocols“. Computer Communications 9, Nr. 6 (Dezember 1986): 317. http://dx.doi.org/10.1016/0140-3664(86)90055-1.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Han, Hui, Hong De Zhang und Yang Wang. „A Routing Protocol for Emergency Communication Based on Load Balancing“. Applied Mechanics and Materials 719-720 (Januar 2015): 744–49. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.744.

Der volle Inhalt der Quelle
Annotation:
Ad-hoc communications is a mobile communication networks and computer networks combine with no infrastructure support, and network survivability and flexibility is strong, especially suitable for emergency communication. As the existing mobile ad hoc network routing protocols lack of network load balancing capabilities, this paper proposed a routing protocol based on load balancing LBBR (Load Balancing Based Routing). Simulation results shows that, LBBR can improve the success rate of packet transmission, reducing the average end to end delay, thus effectively improving network performance.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Almakhi, Riyan, Ade Surya Budiman und Rachmawati Darma Astuti. „Implementasi Protokol Keamanan Dan Segmentasi Jaringan Dalam Project Pembangunan WLAN Untuk PT Pan Pacific Insurance“. Jurnal Sistem dan Teknologi Informasi (JustIN) 11, Nr. 1 (31.01.2023): 140. http://dx.doi.org/10.26418/justin.v11i1.53745.

Der volle Inhalt der Quelle
Annotation:
Security of data and network devices is essential in the development of a computer network, either in the creation of new computer networks or in the development of existing computer networks. PT. Pan Pacific Insurance as a company that holds large amounts of data along with its supporting computer network's infrastructure, focuses on security aspects in addition to performance aspects in its computer network. To get the flexibility of its computer network, the company developed a wireless local area network (WLAN) in line with the relocation of its head office. The Existing company's network needs to be improved with a WLAN network, so it does not only improve employee performance and provides the best security for company data. For those purposes, the authors applied the use of Cisco Wireless LAN Controller (WLC), Cisco Access Point and applied the WPA+WPA2 PSK security protocol for the SSID used by employees. Using this protocol when employees want to connect to the network wireless, they will be forced to type the password that has been set. In addition to implementing the security protocol, the author also applies the Web Policy Authentication security protocol for the SSID used by guests. So that guests who want to connect to a wireless network will be directed to a web browser to be asked to enter a username and password first. A series of security protocols, also added with network segmentation on each SSID to use a different network address. Thus, the essence of network security and performance is expected to increase. From the results of the tests carried out, obtained security guarantees on the PT. Pan Pacific Insurance successfully directs every user connected to the network as part of the security protocol implemented. Furthermore, with network segmentation, user traffic is more controlled because guests get their network segmentation, so they don't interfere with network traffic for users or company staff in company operations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Zhang, Zhaowei, Hongzheng Zhang, Jinjing Zhao und Yanfei Yin. „A Survey on the Development of Network Protocol Fuzzing Techniques“. Electronics 12, Nr. 13 (01.07.2023): 2904. http://dx.doi.org/10.3390/electronics12132904.

Der volle Inhalt der Quelle
Annotation:
Network protocols, as the communication rules among computer network devices, are the foundation for the normal operation of networks. However, security issues arising from design flaws and implementation vulnerabilities in network protocols pose significant risks to network operations and security. Network protocol fuzzing is an effective technique for discovering and mitigating security flaws in network protocols. It offers unparalleled advantages compared to other security analysis techniques thanks to the minimal requirement for prior knowledge of the target and low deployment complexity. Nevertheless, the randomness in test case generation, uncontrollable test coverage, and unstable testing efficiency introduce challenges in ensuring the controllability of the testing process and results. In order to comprehensively survey the development of network protocol fuzzing techniques and analyze their advantages and existing issues, in this paper, we categorized and summarized the protocol fuzzing and its related techniques based on the generation methods of test cases and testing conditions. Specifically, we overviewed the development trajectory and patterns of these techniques over the past two decades according to chronological order. Based on this analysis, we further predict the future directions of fuzzing techniques.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Vatambeti, Ramesh, Nrusingha Charan Pradhan, E. Sandhya, Surendra Reddy Vinta, V. Anbarasu und K. Venkateswara Rao. „Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network“. International Journal of Computer Network and Information Security 15, Nr. 3 (08.06.2013): 78–89. http://dx.doi.org/10.5815/ijcnis.2023.03.06.

Der volle Inhalt der Quelle
Annotation:
Because of the mobility of its nodes, MANET plays a significant role in mobile communication. As a result, network infrastructure is frequently changed, resulting in data loss and communication overheads. Despite this, the large packet size causes network congestion or traffic. The difficult task is efficient routing through a dynamic network. For node generation and energy management, the proposed approach in this paper employs GAODM (Geography-based Ad-hoc On Demand disjoint multipath) and E-AODM (Energy Ad-hoc On Demand Vector routing). The proposed GAODM routing protocol reduces congestion using Spider Monkey (SM) Optimization. The E- AODM protocol assesses the energy management solution based on parameters such as delay, energy consumption, routing overhead, and node energy. By choosing the best path through the network, the proposed protocol's effectiveness is increased. The proposed protocol reduces routing overload, delay, and congestion. The simulated results show that increasing the number of packets transmitted in the network using the proposed GAODM and E-AODM routing protocols over the existing protocols on NS 2 reduces node energy and, as a result, overload and delay.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Tikhonov, Eugene, Donat Schneps-Schneppe und Dmitry Namiot. „Delay Tolerant Network Protocols in a Railway Network“. International Journal of Embedded and Real-Time Communication Systems 12, Nr. 4 (Oktober 2021): 1–17. http://dx.doi.org/10.4018/ijertcs.2021100101.

Der volle Inhalt der Quelle
Annotation:
The paper is devoted to the analysis of the effectiveness of the DTN (delay tolerant network) system in a communication network on a railway line. Trains act as moving objects that are sending and receiving messages to/from an external network. Trains may also transmit telemetry collected during movement. The article presents data on the effectiveness of the DTN network with various protocols in terms of reducing the delay in the message and telemetry delivery and in increasing the total number of delivered messages in the railway scenario. An analysis of railway lines with various loads and different coverage of mobile networks was made. These models are based on real railway maps and train schedules. The effectiveness of DTN during migration to networks of a higher data rate (5G) and networks with satellite connection of trains is discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Fathurrahmad, Fathurrahmad, und Salman Yusuf. „Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)“. Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, Nr. 1 (30.06.2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Der volle Inhalt der Quelle
Annotation:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

S, Arockiaraj, Krishnamoorthi Makkithaya und Harishchandra Hebbar N. „Quality of Service-Based Cross-Layer Protocol for Wireless Sensor Networks“. International Journal of Interactive Mobile Technologies (iJIM) 16, Nr. 20 (31.10.2022): 34–58. http://dx.doi.org/10.3991/ijim.v16i20.31111.

Der volle Inhalt der Quelle
Annotation:
Sensor nodes in wireless sensor networks (WSN) are used for perceiving, monitoring, and controlling a wide range of applications. Owing to the small size of sensor nodes and limited power sources, energy saving is critical for ensuring network longevity. Protocols in different layers consume energy for their function. It is possible to significantly reduce energy usage by including energy-efficiency measures in the protocol design. Most protocols in the literature focus on the energy efficiency in individual layers. Recent studies have shown that cross-layer designs are more energy efficient than individual layer designs. Therefore, this study presents a cross-layer protocol design that combines network and data link layers to minimize energy consumption. This article proposes a novel "Quality of Service Based Cross-layer (QSCL) Protocol" by combining the IEEE 802.15.4-based MAC protocol and the LEACH-based routing protocol. The dynamic duty cycle of the IEEE 802.15.4 protocol was modified based on the amount of data present in the node, which minimized the energy consumption of the data-transfer mechanism. The cluster head (CH) selection of the LEACH-based protocol was modified to consider the average residual energy (RE) of the nodes and their distance from the sink. This helps preserve the energy in the CH, thereby extending the network lifetime. Simulation studies demonstrated that the proposed QSCL outperformed the existing protocols by prolonging the network lifetime.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Paul, Surjit, Sanjay Kumar und Rajiv Ranjan Suman. „A Quantum Secure Entity Authentication Protocol Design for Network Security“. International Journal of Information Security and Privacy 13, Nr. 4 (Oktober 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Der volle Inhalt der Quelle
Annotation:
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based cryptographic techniques, the proposed protocol uses the one-time pad (OTP) to secure itself from attacks, i.e., eavesdropping, reply attack, password guessing attack, man-in-the-middle attack, brute-force attack, quantum computer attack, etc. Security of the proposed protocol was analyzed, and it shows that the proposed protocol may prevent itself from different types of attacks. Further, analysis for quantum Secure was carried out. From the analysis, it is found that if the OTP key is truly random and cannot be reused, then a computer with infinite capacity or quantum computer cannot break the encrypted challenge and response. The proposed protocol may be used for entity authentication for the client, server, process, and user.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Punia, Divya, und Rajender Kumar. „A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management“. Transport and Telecommunication Journal 23, Nr. 1 (01.02.2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Der volle Inhalt der Quelle
Annotation:
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields Kalman filter as a prediction module in PGRP routing protocol in order to anticipate the neighbor location and to select the propitious neighbor for advancing packets in both urban and highway framework which leads to efficient connectivity in the network and improves road safety. K-PGRP is then compared with PGRP, GPSR (Greedy Perimeter Stateless Routing) and GPCR (Greedy Perimeter Coordinator Routing) routing protocols in terms of throughput and packet delivery ratio metrics and outperformed all the simulation cases. The simulations were performed on MATLAB R2018a along with traffic simulator SUMO.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Pulujkar, Mosami, Sunil Kumar, Vivek Deshpande und Dattatray Waghole. „Evaluation of various MAC Protocols for Node Density in Wireless Sensor Networks based on QoS“. International Journal on Recent and Innovation Trends in Computing and Communication 10, Nr. 1s (10.12.2022): 213–16. http://dx.doi.org/10.17762/ijritcc.v10i1s.5825.

Der volle Inhalt der Quelle
Annotation:
A wireless sensor network is a collection of sensor nodes that communicate with one another to gather data and send it to a base station. The quality of service provided by sensor networks determines their efficiency and lifetime. Energy, channel capacity, packet transmission, packet drop, and latency are all factors in QoS. In WSNs, routing protocols are designed to discover the shortest route to a network's destination, whereas MAC protocols are designed to transmit data through a communication channel. To increase the network's life span, the best routing and MAC protocols are required for communication. In this research, we examined the performance of different MAC protocols for a variety of QoS measures as node density increased. Future researchers will benefit from this research in establishing the best hybrid protocols for wireless sensor networks. The results demonstrate that CSMA is the best communication protocol among the others.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Liu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue und Yuxiang Hu. „MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane“. Electronics 11, Nr. 15 (30.07.2022): 2389. http://dx.doi.org/10.3390/electronics11152389.

Der volle Inhalt der Quelle
Annotation:
With the development of network technology, various network protocols different from TCP/IP have emerged. The heterogeneous integrated network has been proposed to realize the interconnection between heterogeneous networks running different protocols. However, current protocol conversion mechanisms often can only handle a few pre-defined protocols and do not support the flexible expansion of new protocols, which cannot meet the needs of the efficient convergence of different heterogeneous networks. Addirionally, due to the lack of security mechanisms, data in the core network is confronted with the risk of stealing and tampering. Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks. First, based on the programmable data plane, the parser is reconfigured to realize multi-protocol parsing. Furthermore, the encryption mechanism implemented in the P4 extern is proposed and unified to the data plane together with the protocol conversion mechanism. Finally, the MultiSec prototype is implemented on a programmable software switch and accelerated by a dedicated encryption card. Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

ZHANG, YING, und MARKUS FROMHERZ. „A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS“. Journal of Interconnection Networks 07, Nr. 04 (Dezember 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Der volle Inhalt der Quelle
Annotation:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol adapts to the specific routing requirements of the task and the dynamic changes of the network. We analyze this framework in simulation using some real-world applications in sensor networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Falih Nawwaf, Moch. Hari Purwidiantoro und Lilik Sugiarto. „Perancangan Jaringan MAN Dengan Dyamic Routing EIGRP Dan Algoritma DUAL Menggunakan Cisco Packet Tracer“. JURNAL PENELITIAN SISTEM INFORMASI (JPSI) 1, Nr. 3 (01.08.2023): 87–95. http://dx.doi.org/10.54066/jpsi.v1i3.674.

Der volle Inhalt der Quelle
Annotation:
Metropolitan Area Network (MAN) is a computer network that covers a geographical area larger than LAN (Local Area Network) but smaller than WAN (Wide Area Network). In the design of MAN networks is very important because it ensures the availability, reliability, and efficiency of routes to transmit data throughout the network. Therefore, the use of dynamic routing protocols such as the Enhanced Interior Gateway Routing Protocol (EIFRP) with the Diffusing Update Algorithm (DUAL) algorithm and simulated on Cisco packet tracer is the main concern in this study.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Shende, Dipali K., Sonavane S.S und Yogesh Angal. „A Comprehensive Survey of the Routing Schemes for IoT applications“. Scalable Computing: Practice and Experience 21, Nr. 2 (27.06.2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Der volle Inhalt der Quelle
Annotation:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore, there is a need for devising an effective routing scheme to provide superior performance over the other existing schemes in terms of energy consumption. Thus, this review article provides a detailed review of 52 research papers presenting the suggested routing protocols based on the contentbased, clustering-based, fuzzy-based, Routing Protocol for Low power and Lossy Networks, tree-based and so on. Also, a detailed analysis and discussion are made by concerning the parameters, simulation tool, and year of publication, network size, evaluation metrics, and utilized protocols. Finally, the research gaps and issues of various conventional routing protocols are presented for extending the researchers towards a better contribution of routing protocol for the secure IoT routing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Jaffri, Zain ul Abidin, Muhammad Asif, Wali Ullah Khan, Zeeshan Ahmad, Zain ul Abiden Akhtar, Kalim Ullah und Md Sadek Ali. „TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks“. International Journal of Distributed Sensor Networks 18, Nr. 6 (Juni 2022): 155013292211072. http://dx.doi.org/10.1177/15501329221107246.

Der volle Inhalt der Quelle
Annotation:
The design and implementation of energy-efficient routing protocols for next-generation wireless sensor networks is always a challenge due to limited power resource capabilities. Hierarchical (clustering) routing protocols appeared to be a remarkable solution for extending the lifetime of wireless sensor networks, particularly in application-aware (threshold-sensitive) and heterogeneity-aware cluster-based routing protocols. In this article, we propose a protocol, namely, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol. It is a heterogeneity-aware and threshold-based protocol that provides a better solution to existing problems in next-generation wireless sensor networks. During execution, the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol splits the entire network area into several zones to manage network traffic efficiently. In the first step, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is designed for a homogeneous network where the initial energy of all the nodes is the same. Thereafter, we bring in heterogeneity in the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol execution environment to optimize its energy consumption. By investigating the performance of the various numbers of divisions, it is proved that the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol with 9 zonal divisions has higher stability and throughput. The performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is compared with those of Stable Election Protocol, Low-Energy Adaptive Clustering Hierarchy, Modified Low-Energy Adaptive Clustering Hierarchy, and Gateway-Based Energy-Efficient Routing Protocol through computer simulations. Simulation results verify the improved performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol in terms of network stability, lifetime, and throughput.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Ignatenko, O. P., und O. A. Molchanov. „Evolutionary games in TCP networks with speed restriction policies“. PROBLEMS IN PROGRAMMING, Nr. 4 (Dezember 2016): 033–47. http://dx.doi.org/10.15407/pp2016.04.033.

Der volle Inhalt der Quelle
Annotation:
Competitive development of various versions of network protocols is an essential part of computer networks. The most-used protocol today is Transmission Control Protocol (TCP). There is a large number of implementations of the TCP protocol, which differ by mechanism of congestion control. TCP develops by improving its existent implementations, vanishing some of them and via creation of a new ones. The possibility of using new versions of the protocol allows the user to increase the data rate by selecting the appropriate implementation of TCP. It is difficult to predict consequences of computer network users’ interaction in situations when many users try to achieve higher data rate by applying different TCP implementation. The actual task is to develop a theoretical and program tools to model such competitive dynamic interactions. This is the goal of my scientific-research work. Game theory, which is the theory of mathematical models of optimal decision making in situations of conflicts of interest, is the best suited to solve a particular problem because it allows you to find a solution in terms of non-cooperative interaction, which usually happens between the networks TCP-connections. This paper examines the possibility of coexistence of different implementations of protocols that users can change to improve their own capacity. It also examines games between protocols in cases when users’ packets management policies are applied.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Khasambiev, I. V., und E. A. Guseva. „Network architectures and protocols of M2M communications“. Journal of Physics: Conference Series 2176, Nr. 1 (01.06.2022): 012019. http://dx.doi.org/10.1088/1742-6596/2176/1/012019.

Der volle Inhalt der Quelle
Annotation:
Abstract The issues of building the architecture of M2M networks and managing M2M services using the capabilities of the IMS platform are considered Introduction. M2M (Machine to Machine) is a complex of technologies that provide automatic interaction between devices (things) without human intervention. The Internet of Things is not a single technology, but a whole system of technological solutions. It is a global network infrastructure, which consists of computer networks of physical objects, the traditional IP Internet, and various devices connecting these networks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

Tahir, Sabeen, Ghadah Abdullah Aldabbagh, Sheikh Tahir Bakhsh und Abass Md Said. „Hybrid Congestion Sharing and Route Repairing Protocol for Bluetooth Networks“. WSEAS TRANSACTIONS ON COMPUTERS 20 (27.04.2021): 49–55. http://dx.doi.org/10.37394/23205.2021.20.6.

Der volle Inhalt der Quelle
Annotation:
Bluetooth is a widespread wireless technology standard for limited wireless networks that permits Bluetooth devices to create a one-hop (piconet) or multi-hop (scatternet) network. During data transmission, a large number of links passing through a single master or bridge device may create congestion problems in a Bluetooth network. Therefore, routing in a multi-hop dynamic Bluetooth network, where a number of routing masters and routing bridges exist, sometimes create technical problems in a scatternet. Mobility and failure of routing devices disconnects the routing links and link reconstruction process consumes more resources that eventually decrease the performance. In this paper, Hybrid Congestion Sharing and Route Repairing protocol for Bluetooth networks” (HCSRR) is proposed. The objective of this paper is to provide an efficient technique for scatternet congestion avoidance and route maintenance. The proposed protocol is implemented and compared with most relevant protocols. From simulation results, it is observed that the HCSRR outperforms the existing protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Deshmukh, Sneha R., und Vijay T. Raisinghani. „A Survey on Congestion Control Protocols for CoAP“. International Journal of Communication Networks and Information Security (IJCNIS) 14, Nr. 2 (31.08.2022): 111–23. http://dx.doi.org/10.17762/ijcnis.v14i2.5484.

Der volle Inhalt der Quelle
Annotation:
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Ali, Maisam, Kashif Naseer Qureshi, Thomas Newe, Kashif Aman, Ashraf Osman Ibrahim, Maha Almujaly und Wamda Nagmeldin. „Decision-Based Routing for Unmanned Aerial Vehicles and Internet of Things Networks“. Applied Sciences 13, Nr. 4 (07.02.2023): 2131. http://dx.doi.org/10.3390/app13042131.

Der volle Inhalt der Quelle
Annotation:
New technologies and communication standards have changed traditional network processes. Internet of Things (IoT) is one of the emerging technologies where devices are connected to facilitate the users. When the networks are more congested due to a large number of users then the existing routing protocol and communication channels suffer from congestion, disconnection, overhead, and packet drop issues. Unmanned Aerial Vehicles (UAVs) are adopted to support the ground networks for more feasible data communication. These networks provide coverage facilities to IoT networks and provide smooth data dissemination services. Through the use of relay and cooperative communication technologies, UAVs could enlarge the communication space for IoT networks. Traditional network routing protocols have been adopted for data communication in these networks. However, the adopted protocols are not able to handle mobility and uncertain network conditions. This paper proposes a Decision-based Routing for Unmanned Aerial Vehicles and Internet of Things (DR-UAVIoT) network. The proposed protocol is useful for UAV-to-IoT and UAV-to-UAV data communication. The performance of the proposed solution is evaluated with the existing protocols in terms of data delivery, delay, and network overhead. The experimental results indicate the better performance of the proposed protocol in terms of less delay, less overhead, and better data delivery ratio as compared with existing routing protocols.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie