Journal articles on the topic 'Application layer protocol'

To see the other types of publications on this topic, follow the link: Application layer protocol.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Application layer protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Full text
Abstract:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Rajesh. "COMPUTER NETWORK -- APPLICATION LAYER PROTOCOL." International Journal of Advanced Research 4, no. 6 (June 30, 2016): 51–63. http://dx.doi.org/10.21474/ijar01/760.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hosseini, Mojtaba, and Nicolas D. Georganas. "End System Multicast Protocol for Collaborative Virtual Environments." Presence: Teleoperators and Virtual Environments 13, no. 3 (June 2004): 263–78. http://dx.doi.org/10.1162/1054746041422325.

Full text
Abstract:
IP Multicasting has been a crucial requirement of many scalable networked virtual environments by providing an efficient network mechanism through which a sender can transmit its information to a large number of receivers without having to send multiple copies of the same data over a physical link. The widespread deployment of IP Multicast has been slow due to some yet unresolved issues, prompting recent efforts in the development of multicasting protocols at the application layer instead of at the network layer. Most of these protocols address the case of a single source streaming media to a large number of receivers in applications such as video-on-demand or live broadcast. Collaborative and distributed virtual environments exhibit different characteristics that in turn necessitate a different set of requirements for application layer multicast protocols. This paper presents an introduction to application layer multicasting as it relates to distributed and collaborative virtual environments and the development of our own end system multicast protocol for multi-sender virtual teleconference applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Xie, Bai Lin, and Sheng Yi Jiang. "Detecting Application-Layer Attacks Based on User's Application-Layer Behaviors." Applied Mechanics and Materials 411-414 (September 2013): 607–12. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.607.

Full text
Abstract:
This paper presents an application-layer attack detection method based on user’s application-layer behaviors. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the application-layer behaviors of a normal user who is using the application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
APA, Harvard, Vancouver, ISO, and other styles
5

Sangheon Pack, Kunwoo Park, Taekyoung Kwon, and Yanghee Choi. "SAMP: scalable application-layer mobility protocol." IEEE Communications Magazine 44, no. 6 (June 2006): 86–92. http://dx.doi.org/10.1109/mcom.2006.1668425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

KITAGAWA, Takahisa, Miyuki HANAOKA, and Kenji KONO. "A State-Aware Protocol Fuzzer Based on Application-Layer Protocols." IEICE Transactions on Information and Systems E94-D, no. 5 (2011): 1008–17. http://dx.doi.org/10.1587/transinf.e94.d.1008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.

Full text
Abstract:
With the rapid development of Internet, especially the mobile Internet, the new applications or network attacks emerge in a high rate in recent years. More and more traffic becomes unknown due to the lack of protocol specifications about the newly emerging applications. Automatic protocol reverse engineering is a promising solution for understanding this unknown traffic and recovering its protocol specification. One challenge of protocol reverse engineering is to determine the length of protocol keywords and message fields. Existing algorithms are designed to select the longest substrings as protocol keywords, which is an empirical way to decide the length of protocol keywords. In this paper, we propose a novel approach to determine the optimal length of protocol keywords and recover message formats of Internet protocols by maximizing the likelihood probability of message segmentation and keyword selection. A hidden semi-Markov model is presented to model the protocol message format. An affinity propagation mechanism based clustering technique is introduced to determine the message type. The proposed method is applied to identify network traffic and compare the results with existing algorithm.
APA, Harvard, Vancouver, ISO, and other styles
8

XIE, Bai-Lin, and Shun-Zheng YU. "Application Layer Real-time Proactive Defense System Based on Application Layer Protocol Analysis." Chinese Journal of Computers 34, no. 3 (May 19, 2011): 452–63. http://dx.doi.org/10.3724/sp.j.1016.2011.00452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Full text
Abstract:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
APA, Harvard, Vancouver, ISO, and other styles
10

Suherman, S., Naemah Mubarakah, and Marwan Al-Akaidi. "Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load." International Journal of Engineering & Technology 7, no. 3.2 (June 20, 2018): 713. http://dx.doi.org/10.14419/ijet.v7i3.2.15350.

Full text
Abstract:
There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile device energy consumptions up to 10.7% and 3.34% for both TCP and UDP protocols.
APA, Harvard, Vancouver, ISO, and other styles
11

Kanellopoulos, Dimitris N., and Ali H. Wheeb. "Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks." International Journal of Interdisciplinary Telecommunications and Networking 12, no. 4 (October 2020): 88–103. http://dx.doi.org/10.4018/ijitn.2020100107.

Full text
Abstract:
Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were throughput, end-to-end delay, and packet loss ratio. They compared their performance to learn in which traffic flow/service each of these protocols functions better than the others. The throughput of SCTP and TFRC is better than UDP. DCCP is superior to SCTP and TFRC in terms of end-to-end delay. SCTP is suitable for Internet applications that require high bandwidth.
APA, Harvard, Vancouver, ISO, and other styles
12

Ji, Qiang, Shifeng Zhang, and Haoguang Zhao. "Research on Spacecraft Integrated Electronic System Architecture Based on Information Fusion." MATEC Web of Conferences 228 (2018): 01018. http://dx.doi.org/10.1051/matecconf/201822801018.

Full text
Abstract:
This paper has designed the integrated electronic system and protocol architecture based on the standard of Consultative Committee for Space Data Systems (CCSDS) and European Communication Satellite System (ECSS). The application layer, application support layer, transport layer and sub network layer in the architecture can be described in detail, and the functions can be realized through the combination of various business and protocols. The architecture can provide technical support for the intellectualization and networking of spacecraft, standardize the spacecraft interface and protocol, it can promote the generalization of spacecraft equipment and software, and provide more flexible and powerful functions for the spacecraft.
APA, Harvard, Vancouver, ISO, and other styles
13

Wheeb, Ali Hussein. "Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow in Wired Networks." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3552. http://dx.doi.org/10.11591/ijece.v7i6.pp3552-3557.

Full text
Abstract:
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.</p>
APA, Harvard, Vancouver, ISO, and other styles
14

Fong, K., and J. Reinstedler. "Development of an OSI application layer protocol interface." ACM SIGCOMM Computer Communication Review 19, no. 3 (July 1989): 21–57. http://dx.doi.org/10.1145/74674.74676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Oliveira, Luiz, Joel Rodrigues, Sergei Kozlov, Ricardo Rabêlo, and Victor Albuquerque. "MAC Layer Protocols for Internet of Things: A Survey." Future Internet 11, no. 1 (January 14, 2019): 16. http://dx.doi.org/10.3390/fi11010016.

Full text
Abstract:
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified.
APA, Harvard, Vancouver, ISO, and other styles
16

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (June 28, 2020): 3625. http://dx.doi.org/10.3390/s20133625.

Full text
Abstract:
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
APA, Harvard, Vancouver, ISO, and other styles
17

Tripathi, Nikhil, and Neminath Hubballi. "Application Layer Denial-of-Service Attacks and Defense Mechanisms." ACM Computing Surveys 54, no. 4 (May 2021): 1–33. http://dx.doi.org/10.1145/3448291.

Full text
Abstract:
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities of the protocol implementation or its design. Unlike volumetric DoS attacks, these are stealthy in nature and target a specific application running on the victim. There are several attacks discovered against popular application layer protocols in recent years. In this article, we provide a structured and comprehensive survey of the existing application layer DoS attacks and defense mechanisms. We classify existing attacks and defense mechanisms into different categories, describe their working, and compare them based on relevant parameters. We conclude the article with directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
18

Begum, Seema, Yao Nianmin, Syed Bilal Hussain Shah, Asrin Abdollahi, Inam Ullah Khan, and Liqaa Nawaf. "Source Routing for Distributed Big Data-Based Cognitive Internet of Things (CIoT)." Wireless Communications and Mobile Computing 2021 (July 29, 2021): 1–10. http://dx.doi.org/10.1155/2021/5129396.

Full text
Abstract:
Dynamic opportunistic channel access with software-defined radio at a network layer in distributed cognitive IoT introduces a concurrent channel selection along with end-to-end route selection for application data transmission. State-of-the-art cognitive IoT big data-based routing protocols are not explored in terms of how the spectrum management is being coordinated with the network layer for concurrent channel route selection during end-to-end channel route discovery for data transmission of IoT and big data applications. In this paper, a reactive big data-based “cognitive dynamic source routing protocol” is proposed for cognitive-based IoT networks to concurrently select the channel route at the network layer from source to destination. Experimental results show that the proposed protocol cognitive DSR with concurrent channel route selection criteria is outperformed. This will happen when it is compared with the existing distributed cognitive DSR with independent channel route application data transmission.
APA, Harvard, Vancouver, ISO, and other styles
19

Nebbione, Giuseppe, and Maria Carla Calzarossa. "Security of IoT Application Layer Protocols: Challenges and Findings." Future Internet 12, no. 3 (March 17, 2020): 55. http://dx.doi.org/10.3390/fi12030055.

Full text
Abstract:
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly overseen or even ignored. The IoT threat landscape is extremely wide and complex and involves a wide variety of hardware and software technologies. In this framework, the security of application layer protocols is of paramount importance since these protocols are at the basis of the communications among applications and services running on different IoT devices and on cloud/edge infrastructures. This paper offers a comprehensive survey of application layer protocol security by presenting the main challenges and findings. More specifically, the paper focuses on the most popular protocols devised in IoT environments for messaging/data sharing and for service discovery. The main threats of these protocols as well as the Common Vulnerabilities and Exposures (CVE) for their products and services are analyzed and discussed in detail. Good practices and measures that can be adopted to mitigate threats and attacks are also investigated. Our findings indicate that ensuring security at the application layer is very challenging. IoT devices are exposed to numerous security risks due to lack of appropriate security services in the protocols as well as to vulnerabilities or incorrect configuration of the products and services being deployed. Moreover, the constrained capabilities of these devices affect the types of security services that can be implemented.
APA, Harvard, Vancouver, ISO, and other styles
20

Huang, Chia Hui, Kai Wei Ke, and Ho Ting Wu. "Performance of Multisource Application Layer Multicast Routing: A Cost-Based Approach." Advanced Materials Research 341-342 (September 2011): 617–22. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.617.

Full text
Abstract:
In this work, a simulative study on the cost of multisource ALM routing protocols is presented. The authors discuss a multiplicative pricing model for multisource ALM based on the single-source cost model. By simulating various ALM protocols, the study discovered that a multiplicative characteristic is held between the cost of single-source and multisource ALM routing. The multiplicative pricing model makes the minimum cost of multisource ALM more clear for protocol designer and gives a intuitive way to examine the cost of a designed multisource ALM without incurring too many computation complexity.
APA, Harvard, Vancouver, ISO, and other styles
21

Xie, Bai Lin, and Qian Sheng Zhang. "Detecting Application-Layer Attacks Based on Hidden Semi-Markov Models." Applied Mechanics and Materials 631-632 (September 2014): 923–27. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.923.

Full text
Abstract:
This paper presents an application-layer attack detection method based on hidden semi-markov models. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-markov model is used to describe the application-layer behaviors of a normal user who is using some application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
APA, Harvard, Vancouver, ISO, and other styles
22

Larmo, Anna, Antti Ratilainen, and Juha Saarinen. "Impact of CoAP and MQTT on NB-IoT System Performance." Sensors 19, no. 1 (December 20, 2018): 7. http://dx.doi.org/10.3390/s19010007.

Full text
Abstract:
The IoT protocols used for data transfer in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. Furthermore, we touch upon the impact of different security solutions. The motivation of this work is to look at the impact of the protocol stack on performance over a narrowband IoT (NB-IoT) link. The use case studied is infrequent small reports sent from the sensor device to a central cloud storage over a last mile radio access link. We find that while CoAP/UDP based transport performs consistently better both in terms of latency, coverage, and system capacity, MQTT/TCP also works when the system is less loaded.
APA, Harvard, Vancouver, ISO, and other styles
23

Luo, Jian-Zhen, Chun Shan, Jun Cai, and Yan Liu. "IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering." Symmetry 10, no. 11 (November 1, 2018): 561. http://dx.doi.org/10.3390/sym10110561.

Full text
Abstract:
Fuzzing is regarded as the most promising method for protocol vulnerabilities discovering in network security of Internet of Things (IoT). However, one fatal drawback of existing fuzzing methods is that a huge number of test files are required to maintain a high test coverage. In this paper, a novel method based on protocol reverse engineering is proposed to reduce the amount of test files for fuzzing. The proposed method uses techniques in the field of protocol reverse engineering to identify message formats of IoT application-layer protocol and create test files by generating messages with error fields according to message formats. The protocol message treated as a sequence of bytes is assumed to obey a statistic process with change-points indicating the boundaries of message fields. Then, a multi-change-point detection procedure is introduced to identify change-points of byte sequences according to their statistic properties and divide them into segments according to their change-points. The message segments are further processed via a position-based occurrence probability test analysis to identify keyword fields, data fields and uncertain fields. Finally, a message generation procedure with mutation operation on message fields is applied to construct test files for fuzzing test. The results show that the proposed method can effectively find out the message fields and significantly reduce the amount of test files for fuzzing test.
APA, Harvard, Vancouver, ISO, and other styles
24

Cheng, Yong, Lei Wen, Ling Yang, Wei Wang, Yong Zhou, and Feng Wang. "A Video Streaming Application Layer Multicast Protocol for WLAN." Advanced Materials Research 267 (June 2011): 668–73. http://dx.doi.org/10.4028/www.scientific.net/amr.267.668.

Full text
Abstract:
The problem solved in this paper is to design a video streaming protocol which is accomplished by the application layer multicast in the WLAN. This protocol, WVALM, divides the whole video streaming into small blocks, and achieves the requirement of streaming multicast by multicasting those small blocks. The receiver and the sender use streaming window and retransmit window respectively to coordinate their relationship. Through experiment test, WVALM achieves the original object and could work well in the wireless environment.
APA, Harvard, Vancouver, ISO, and other styles
25

Azrour, Mourade, Mohammed Ouanan, and Yousef Farhaoui. "Survey of Detection SIP Malformed Messages." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 2 (August 1, 2017): 457. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp457-465.

Full text
Abstract:
Session Initiation Protocol (SIP) is an application layer protocol designed to control and establish multimedia sessions over internet. SIP gaining more and more popularity as it is used by numerous applications such as telephony over IP(ToIP). SIP is a text based protocol built on the base of the HTTP and SMTP protocols. SIP suffers from certain security threats which need to be resolved in order to make it a more efficient signaling protocol. In this work, we review the proposed works aimed to detect SIP malformed messages that can cause security problem. Then, we classify the type of malformed SIP message and compare between the mechanisms used to reinforce the detection of malformed SIP message attack.
APA, Harvard, Vancouver, ISO, and other styles
26

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2949. http://dx.doi.org/10.11591/ijece.v6i6.12560.

Full text
Abstract:
<p>One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion. With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network. We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion.</p>
APA, Harvard, Vancouver, ISO, and other styles
27

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2949. http://dx.doi.org/10.11591/ijece.v6i6.pp2949-2954.

Full text
Abstract:
<p>One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion. With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network. We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion.</p>
APA, Harvard, Vancouver, ISO, and other styles
28

Ariyadi, Tamsir. "Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)." INOVTEK Polbeng - Seri Informatika 3, no. 2 (November 27, 2018): 147. http://dx.doi.org/10.35314/isi.v3i2.455.

Full text
Abstract:
Keamanan jaringan telah menjadi perhatian lebih karena pesatnya pertumbuhan dan perluasan Internet. Sementara ada beberapa cara untuk memberikan keamanan pada layer application, transport, atau network layers, data link layer (Layer 2) keamanan belum bisa diterapkan secara maksimal. protokol data link layer yang digunakan dalam Local Area Network (LAN) tidak dirancang dengan keamanan yang secara signature. Dynamic Host Control Protocol (DHCP) adalah salah satu jaringan yang paling banyak digunakan untuk konfigurasi host yang bekerja dalam data menghubungkan lapisan. DHCP rentan terhadap sejumlah serangan, seperti serangan DHCP rogue Server, serangan DHCP Starvation, dan serangan DHCP Snooping. Pembahasan prototype terhadap keamanan jaringan yang disebut Mitigasi Keamanan Dynamic Host Control Protocol (DHCP) Untuk Mengurangi Serangan pada Local Area Network (LAN).
APA, Harvard, Vancouver, ISO, and other styles
29

Luo, Jian-Zhen, Shun-Zheng Yu, and Jun Cai. "Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/962974.

Full text
Abstract:
As a promising tool to recover the specifications of unknown protocols, protocol reverse engineering has drawn more and more attention in research over the last decade. It is a critical task of protocol reverse engineering to extract the protocol keywords from network trace. Since the messages of different types have different sets of protocol keywords, it is an effective method to improve the accuracy of protocol keyword extraction by clustering the network payload of unknown traffic into clusters and analyzing each clusters to extract the protocol keywords. Although the classic algorithms such asK-means and EM can be used for network payload clustering, the quality of resultant traffic clusters was far from satisfactory when these algorithms are applied to cluster application layer traffic with categorical attributes. In this paper, we propose a novel method to improve the accuracy of protocol reverse engineering by applying a rough set-based technique for clustering the application layer traffic. This technique analyze multidimension uncertain information in multiple categorical attributes based on rough sets theory to cluster network payload, and apply the Minimum Description Length criteria to determine the optimal number of clusters. The experiments show that our method outperforms the existing algorithms and improves the results of protocol keyword extraction.
APA, Harvard, Vancouver, ISO, and other styles
30

Buzeto, Fabricio Nogueira, Carlos Botelho de Paula Filho, Carla Denise Castanho, and Ricardo Pezzuol Jacobi. "DSOA." International Journal of Handheld Computing Research 2, no. 2 (April 2011): 47–64. http://dx.doi.org/10.4018/jhcr.2011040104.

Full text
Abstract:
Ubiquitous environments are composed by a wide variety of devices, each one with different characteristics like communication protocol, programming and hardware platforms. These devices range from powerful equipment, like PCs, to limited ones, like cell phones, sensors, and actuators. The services provided by a ubiquitous environment rely on the interaction among devices. In order to support the development of applications in this context, the heterogeneity of communication protocols must be abstracted and the functionalities dynamically provided by devices should be easily available to application developers. This paper proposes a Device Service Oriented Architecture (DSOA) as an abstraction layer to help organize devices and its resources in a ubiquitous environment, while hiding details about communication protocols from developers. Based on DSOA, a lightweight middleware (uOS) and a high level protocol (uP) were developed. A use case is presented to illustrate the application of these concepts.
APA, Harvard, Vancouver, ISO, and other styles
31

AlRegib, G., and Y. Altunbasak. "3TP: an application-Layer protocol for streaming 3-D models." IEEE Transactions on Multimedia 7, no. 6 (December 2005): 1149–56. http://dx.doi.org/10.1109/tmm.2005.858404.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Cui, Jinxue, and Bin Han. "Research on MVB conformance test system." MATEC Web of Conferences 355 (2022): 02040. http://dx.doi.org/10.1051/matecconf/202235502040.

Full text
Abstract:
The design and implementation of the MVB conformance test system is of great significance in both professional theory and practical application. Conformance test for MVB, mainly to determine whether the MVB equipment IUT is consistent with the MVB protocol standard requirements in the TCN standard. The conformance test of MVB equipment IUT covers most of the contents of the RTP real-time protocol such as the physical layer, link layer, network layer, transport layer and application layer. This subject will analyse and study the consistency test of the MVB physical layer.
APA, Harvard, Vancouver, ISO, and other styles
33

Yang, Huayuan, and Xin Zhang. "Interactive Multimodal Television Media Adaptive Visual Communication Based on Clustering Algorithm." Complexity 2020 (December 30, 2020): 1–9. http://dx.doi.org/10.1155/2020/6618245.

Full text
Abstract:
This article starts with the environmental changes in human cognition, analyzes the virtual as the main feature of visual perception under digital technology, and explores the transition from passive to active human cognitive activities. With the diversified understanding of visual information, human contradiction of memory also began to become prominent. Aiming at the problem that the existing multimodal TV media recognition methods have low recognition rate of unknown application layer protocols, an adaptive clustering method for identifying unknown application layer protocols is proposed. This method clusters application layer protocols based on similarity of the load characteristics of network stream application layer protocol data. The method divides the similarity calculation in the clustering algorithm to improve the clustering efficiency of the algorithm. Experimental results show that the proposed method can efficiently and accurately recognize unknown visual communication. This article proposes that, in the interactive multimodal visual information transmission, human visual perception experience has changed, the diversity of visual information content expression makes the aesthetic subject more personalized and stylized.
APA, Harvard, Vancouver, ISO, and other styles
34

Rasooli, Abdul Qadeer, Khan Mohammad Habibi, and Sahnosh Rahguzar. "INTEGRATION OF APPLICATION LAYER SERVICES WITH CENTRAL AUTHENTICATION SERVER IN EXAMPLE OF HTTP AND FTP RESTRICTION." ZONAsi: Jurnal Sistem Informasi 4, no. 1 (April 9, 2022): 1–17. http://dx.doi.org/10.31849/zn.v4i1.8668.

Full text
Abstract:
Nowadays it is very important to have an authenticated and secure network. hackers are always one step further and try to steal credentials or doing malicious actions. Many organizations implement strong authentication systems for taking drastic security measures to prevent threats and vulnerabilities. This paper describes integration of application layer services with central authentication server called Lightweight Directory Access Protocol(LDAP), it covers detailed mechanism to control and restrict any software application or network services which may implement and require central authentication protocols including web (eg: HTTP protocol) and file transfer protocol (eg: FTP protocol). This will enable authenticated web and ftp webpage for reliability and security. The authentication services also provide Ubuntu client domain join and network authentication to enable integrity and authentication across the network. This paper is conducted through deep library research and practical implementation of the services.The goal of this paper is to introduce a unified secure centralized authentication system to authenticate and grant the authorized users to have access to the restricted Kerberized services in a period of time which is granted. It provides more trust, secure environment, but less traffic and others` interference
APA, Harvard, Vancouver, ISO, and other styles
35

Bernard, Muwonge Ssajjabbi, Tingrui Pei, and Kimbugwe Nasser. "QoS Strategies for Wireless Multimedia Sensor Networks in the Context of IoT at the MAC Layer, Application Layer, and Cross-Layer Algorithms." Journal of Computer Networks and Communications 2019 (December 29, 2019): 1–33. http://dx.doi.org/10.1155/2019/9651915.

Full text
Abstract:
Wireless multimedia sensor networks (WMSNs) have got capacity to collect both scalar sensor data and multidimensional sensor data. It is the basis for the Internet of things (IoT). Quality of service (QoS) pointers like energy efficiency, reliability, bit error rate, and latency can be helpful in data collection estimation over a network. In this paper, we review a number of QoS strategies for WMSNs and wireless sensor networks (WSNs) in the IoT context from the perspective of the MAC and application layers as well as the cross-layer paradigm. Considering the MAC layer, since it is responsible for regulating the admittance to the shared medium and transmission reliability and efficiency through error correction in wireless transmissions, and for performance of framing, addressing, and flow control, the MAC protocol design greatly affects energy efficiency. We thus review a number of protocols here including contention-free and contention-based protocols as well as the hybrid of these. This paper also surveys a number of state-of-the-art machine-to-machine, publish/subscribe, and request/response protocols at the application layer. Cross-layer QoS strategies are very vital when it comes to system optimization. Many cross-layer strategies have been reviewed. For these QoS strategies, the challenges and opportunities are reviewed at each of the layers considered. Lastly, the future research directions for QoS strategies are discussed for research and application before concluding this paper.
APA, Harvard, Vancouver, ISO, and other styles
36

Watfa, Mohamed K., Samir Selman, and Hovig Denkilkian. "A Battery-Aware High-Throughput MAC Layer Protocol in Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 259809. http://dx.doi.org/10.1155/2010/259809.

Full text
Abstract:
Energy savings have always been the primary concern in wireless sensor network protocols, however there are applications where latency and throughput are prioritized over energy efficiency and are so significant that the application would not be able to satisfy its requirements without them. The communication unit and the antenna operation consume most of the battery-powered energy of the node. Thus, the access to the medium must be controlled in a very strict manner in order to avoid collisions which result in lost transmissions and have a dramatic impact on the lifetime of the network. Although existing duty cycle MAC protocols are power efficient, they introduce significant end-to-end delivery latency and provide poor throughput. In this paper, we propose SN-MAC, a CDMA-based power controlled medium access protocol that uses both transmitter-based and receiver-based CDMA inside a formed cluster, and uses a TDMA schedule to make the cluster heads communicate with the base station. Our algorithm targets latency and throughput needs in addition to its ability to increase the overall network lifetime. We provide a head-to-head comparison with other protocols through extensive simulations focusing on the performance in terms of latency, throughput, and energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
37

Rath, Mamata, Binod Kumar Pattanayak, and Bibudhedu Pati. "Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications." Defence Science Journal 66, no. 2 (March 23, 2016): 146. http://dx.doi.org/10.14429/dsj.66.9705.

Full text
Abstract:
<p>In military applications mobile adhoc network plays very important role because it is specifically designed network for on demand requirement and in situations where set up of physical network is not possible. This special type of network which takes control in infrastructure less communication handles serious challenges tactfully such as highly robust and dynamic military work stations, devices and smaller sub-networks in the battle field. Therefore there is a high demand of designing efficient routing protocols ensuring security and reliability for successful transmission of highly sensitive and confidential military information in defence networks. With this objective, a power efficient network layer routing protocol in the network for military application is designed and simulated using a new cross layer approach of design to increase reliability and network lifetime up to a greater extent.</p><p> </p>
APA, Harvard, Vancouver, ISO, and other styles
38

Khan, Shoaib, Svetoslav Duhovnikov, Eckehard Steinbach, and Wolfgang Kellerer. "MOS-Based Multiuser Multiapplication Cross-Layer Optimization for Mobile Multimedia Communication." Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/94918.

Full text
Abstract:
We propose a cross-layer optimization strategy that jointly optimizes the application layer, the data-link layer, and the physical layer of a wireless protocol stack using an application-oriented objective function. The cross-layer optimization framework provides efficient allocation of wireless network resources across multiple types of applications run by different users to maximize network resource usage and user perceived quality of service. We define a novel optimization scheme based on the mean opinion score (MOS) as the unifying metric over different application classes. Our experiments, applied to scenarios where users simultaneously run three types of applications, namely voice communication, streaming video and file download, confirm that MOS-based optimization leads to significant improvement in terms of user perceived quality when compared to conventional throughput-based optimization.
APA, Harvard, Vancouver, ISO, and other styles
39

Kumar, Vinay, and Sudarshan Tiwari. "Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey." Journal of Computer Networks and Communications 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/316839.

Full text
Abstract:
6LoWPANs (IPv6-based Low-Power Personal Area Networks) are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP) does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6) and data link layer (IEEE802.15.4 MAC) to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.
APA, Harvard, Vancouver, ISO, and other styles
40

Montazerolghaem, Ahmadreza, Seyed-Amin Hosseini-Seno, Mohammad Hossein Yaghmaee, and Rahmat Budiarto. "High Load Control Mechanism for SIP Servers." Computer Engineering and Applications Journal 5, no. 2 (June 23, 2016): 47–56. http://dx.doi.org/10.18495/comengapp.v5i2.167.

Full text
Abstract:
To start voice, image, instant messaging, and generally multimedia communication, session communication must begin between two participants. SIP (session initiation protocol) that is an application layer control induces management and terminates this kind of sessions. As far as the independence of SIP from transport layer protocols is concerned, SIP messages can be transferred on a variety of transport layer protocols including TCP or UDP. Mechanism of Retransmission that is embedded in SIP could compensate for the missing packet loss, in case of need. This mechanism is applied when SIP messages are transmitted on an unreliable transmission layer protocol like UDP. Also, while facing SIP proxy with overload, it could cause excessive filling of proxy queue, postpone increase of other contacts, and add to the amount of the proxy overload. In the present work, while using UDP as transport layer protocol, invite retransmission timer (T1) was appropriately regulated and SIP functionality was improved. Therefore, by proposing an adaptive timer of invite message retransmission, attempts were made to improve the time of session initiation and consequently improve the performance. Performance of the proposed SIP was implemented and evaluated by SIPP software in a real network environment and its accuracy and performance were demonstrated.
APA, Harvard, Vancouver, ISO, and other styles
41

Xu, Wei Feng, Shu Fen Liu, and Lu Han. "Research of Low Altitude Communication Protocol Conversion Process Based on Pattern Match." Advanced Materials Research 791-793 (September 2013): 2023–26. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2023.

Full text
Abstract:
For complex application layer protocol of low altitude communication system which may be implemented with several wireless communication technologies which include BeiDou Navigation Satellite System, 3G, Digital radio, GPS, ADS-B, etc., we design a low altitude communication protocol conversion process based on pattern match to enhance the capacity of low-altitude flight service stations processing multi-source information from low-altitude aircrafts or other stations. In the process, the application layer protocol of information is identified with the algorithm based on BM pattern matching and CAM multi-pattern matching fusion firstly, secondly, the common intermediate protocol information is produced, and target protocol information is generated finally.
APA, Harvard, Vancouver, ISO, and other styles
42

Birur Viswanath, Shruti, Thippeswamy Muddenahalli Nagendrappa, and Krishna Rao Venkatesh. "JSMCRP: Cross-Layer Architecture based Joint-Synchronous MAC and Routing Protocol for Wireless Sensor Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 19, no. 1 (March 22, 2021): 94–113. http://dx.doi.org/10.37936/ecti-eec.2021191.240719.

Full text
Abstract:
The exponential rise in wireless technologies and allied applications has revitalized academia-industries to develop more efficient and economic routing solution to meet Quality-of-Service (QoS) provision. Amongst the major wireless communication systems, Wireless Sensor Network (WSN) is the most sought technology for defense surveillance, healthcare monitoring, industrial monitoring and control, civic and strategic infrastructure surveillance etc. Additionally, the up surge in Internet of Things (IoT) and Machine to Machine (M2M) communication systems too have broadened the horizon for WSNs based communication. However, the parallel increase in communication environment, complex network conditions etc confine efficacy of the classical WSN protocols. Dynamic network and node conditions often force classical protocols to undergo pre-mature link outage, delayed transmission, energy exhaustion and eventual QoS violation. To address such issues enhancing Median Access Control (MAC) and allied routing decision can have vital significance. However major existing efforts either focus on MAC enhancement or routing optimization, even under static WSN topology. Considering it as motive in this paper a highly robust “Cross-layer architecture based Joint-Synchronous MAC and Routing Protocol for WSN communication (JSMCRP)” has been developed. Being cross layer model JSMCRP protocol employs Application Layer, Network Layer, MAC Layer and PHY Layer to perform Network Adaptive MAC scheduling and Dynamic Routing Decision. JSMCRP employs Data Traffic Assessment, Prioritization and Scheduling (DTAPS), Proactive Network Monitoring and Knowledge (PNMK), Dynamic Congestion Index Estimation (DCIE), Adaptive Link Quality, Packet Injection Rate and Cumulative Rank Sensitive Routing Decision (CRSRD) to perform routing decision. Additionally, exploiting dynamic network/node conditions it performs Cognitive MAC scheduling to ensure QoS centric communication over IEEE 802.15.4 protocol stack. JSMCRP exhibited higher PDR, lower PLR and low delay under varying network conditions, suitable for real-time communication over constrained mobile WSN conditions.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Dan. "The Research of HART Sensor System Based on ARM." Applied Mechanics and Materials 602-605 (August 2014): 2855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2855.

Full text
Abstract:
This paper discusses the design method of economical and practical HART protocol communication system, and describes the research scheme in detail, according to the hierarchy of the system protocols: the physical layer, data link layer and application layer. This scheme includes the design of ARM embedded controller module, modulation and demodulation module and USB interface module and other components. According to the effect of the final product used in the field bus network, it is proved that the operation is stable, accurate, simple and easy.
APA, Harvard, Vancouver, ISO, and other styles
44

Tong, Yu. "Simulation of Wireless Sensor Networks Based on Directed Diffusion Algorithm." International Journal of Online Engineering (iJOE) 13, no. 10 (November 7, 2017): 73. http://dx.doi.org/10.3991/ijoe.v13i10.7747.

Full text
Abstract:
<p style="margin: 1em 0px;"><span lang="EN-US"><span style="font-family: 宋体; font-size: medium;">In order to reduce the energy consumption and data congestion caused by flooding at the initial stage of the network, the cluster head and the boundary node are used as the key nodes to reduce the data flow in the network, so that the network has better delay performance. Various clustering algorithms in wireless sensor networks and the improved method of clustering protocols are introduced. On the basis of directed diffusion algorithm, a directed diffusion protocol based on CONID clustering is studied. Through the OMNeT++ basic platform, the wireless sensor network simulation platform is built on the basis of the MiXiM module. The platform uses a hierarchical structure, and its network layer implements a directed diffusion protocol based on CONID clustering. The application layer implements the two step WLS localization algorithm. The MAC layer uses the FIexiTP protocol. The physical layer uses the simplest flat path fading model. Because the sensor has both perception and data transmission characteristics, the dual channel communication model is adopted. The platform is suitable for wireless sensor network detection, localization and tracking algorithm simulation. Through the hierarchical function of the platform, it can analyze the practicability and effectiveness of the algorithm in more detail, and has certain value. It can also be used in the simulation of cross layer protocols, and can combine several parameters to perform joint analysis of system performance. Simulation results show that the CONID based directional diffusion protocol has better delay performance than the conventional directed diffusion protocol. Finally, the performance of the two step WLS location protocol is analyzed from several perspectives, which provides an example for the platform.</span></span></p>
APA, Harvard, Vancouver, ISO, and other styles
45

Ruso, T., and C. Chellappan. "POSET: A high-performance application layer multicast protocol design and implementation." China Communications 11, no. 12 (December 2014): 83–93. http://dx.doi.org/10.1109/cc.2014.7019843.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ghotbou, Arvin, and Mohammad Khansari. "VE-CoAP: A constrained application layer protocol for IoT video transmission." Journal of Network and Computer Applications 173 (January 2021): 102855. http://dx.doi.org/10.1016/j.jnca.2020.102855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Vitturi, Stefano, Iacopo Carreras, Daniele Miorandi, Luca Schenato, and Alessandro Sona. "Experimental Evaluation of an Industrial Application Layer Protocol Over Wireless Systems." IEEE Transactions on Industrial Informatics 3, no. 4 (November 2007): 275–88. http://dx.doi.org/10.1109/tii.2007.911892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gomathi, K. "Utilization of Network Layer Protocols for Systematic Routing." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5200–5205. http://dx.doi.org/10.22214/ijraset.2021.36146.

Full text
Abstract:
A clean framework for designing protocols for wireless networks includes localized routing and broadcasting. The clean framework is based definitely on the ratio of the cost of making certain picks along with cut price in distance count. Routing protocol is one in each of the most important networks found in this application of wireless networks. The normally used routing techniques withinside the network layers are described as follows. In [1]Distributed routing approach each node checks whether or not or now no longer the cost of routing via a given neighbor is smaller than that of currently used nodes. In the ‘adhoc’ networks, it has bandwidth quandary of the wireless channel. In dynamic ad hoc networks, a localized approach based definitely on ‘on-demand direction discovery’ with the useful resource of the use of flooding excursion spot is used. But it’s a ways inefficient to use flooding as routing scheme in wireless networks as it has power and bandwidth quandary. Localized protocols describes the amount of information required (i.e.) it gives the not unusual place variety of messages transmitted in step with node in a protocol. In a strictly localized protocol it’s a ways each local or global in nature. Thus the aim of the challenge describes the concept as a modern framework of some gift protocols. The Proposed framework of the localized routing scheme is based definitely on the cost measure, which is based upon on the assumptions for the minimal routing direction to be determined on and the improvement measure is based upon on the advances towards the excursion spot. Network simulator is used to implement this scenario.
APA, Harvard, Vancouver, ISO, and other styles
49

Akasiadis, Charilaos, Vassilis Pitsilis, and Constantine D. Spyropoulos. "A Multi-Protocol IoT Platform Based on Open-Source Frameworks." Sensors 19, no. 19 (September 28, 2019): 4217. http://dx.doi.org/10.3390/s19194217.

Full text
Abstract:
Internet of Things (IoT) technologies have evolved rapidly during the last decade, and many architecture types have been proposed for distributed and interconnected systems. However, most systems are implemented following fragmented approaches for specific application domains, introducing difficulties in providing unified solutions. However, the unification of solutions is an important feature from an IoT perspective. In this paper, we present an IoT platform that supports multiple application layer communication protocols (Representational State Transfer (REST)/HyperText Transfer Protocol (HTTP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), Constrained Application Protocol (CoAP), and Websockets) and that is composed of open-source frameworks (RabbitMQ, Ponte, OM2M, and RDF4J). We have explored a back-end system that interoperates with the various frameworks and offers a single approach for user-access control on IoT data streams and micro-services. The proposed platform is evaluated using its containerized version, being easily deployable on the vast majority of modern computing infrastructures. Its design promotes service reusability and follows a marketplace architecture, so that the creation of interoperable IoT ecosystems with active contributors is enabled. All the platform’s features are analyzed, and we discuss the results of experiments, with the multiple communication protocols being tested when used interchangeably for transferring data. Developing unified solutions using such a platform is of interest to users and developers as they can test and evaluate local instances or even complex applications composed of their own IoT resources before releasing a production version to the marketplace.
APA, Harvard, Vancouver, ISO, and other styles
50

Kumar Saini, Rakesh, Ritika Ritika, and Sandip Vijay. "Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm." Bulletin of Electrical Engineering and Informatics 6, no. 1 (March 1, 2017): 81–87. http://dx.doi.org/10.11591/eei.v6i1.577.

Full text
Abstract:
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography