Journal articles on the topic 'Routing (Computer network management)'

To see the other types of publications on this topic, follow the link: Routing (Computer network management).

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Routing (Computer network management).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Sarkar, Md Mosharrof Hossain, Md Ariful Islam, Md Abid Hasan Roni Bokshi, Sadiha Afrin, and Mehjabin Ashrafy Tinky. "Strategic Network Management for Modern Campuses: A Comprehensive Framework." Feb-Mar 2024, no. 42 (March 4, 2024): 43–53. http://dx.doi.org/10.55529/jecnam.42.43.53.

Full text
Abstract:
Campus handling of networks has become critical in the continuously changing world of higher education. This paper offers a thorough method for managing and safeguarding networks in a campus setting with multiple departments. Our approach focuses on four departments: the administrative, civil, computer science and engineering (CSE), and electrical and electronics engineering (EEE) departments. It combines multiple networking technologies to improve security and maximize speed. Network division using virtual LANs (VLANs), efficient IP address allocation using Variable Length Subnet Masks (VLSM), simplified network configuration using Dynamic Host Configuration Protocol (DHCP), dynamic routing using Routing Information Protocol version 2 (RIPv2), granular access control using Access Control Lists (ACLs), enhanced security using Network Address Translation (NAT), secure remote access using Secure Shell version 2 (SSHv2), and improved network resilience through Link Aggregation are the main components of our system.
APA, Harvard, Vancouver, ISO, and other styles
2

Yuan, Bingxia. "A Secure Routing Protocol for Wireless Sensor Energy Network Based on Trust Management." Wireless Communications and Mobile Computing 2022 (May 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/5955543.

Full text
Abstract:
In order to enhance the ability of wireless sensor networks to resist various security threats and reduce the limitations caused by the characteristics of wireless sensor networks and sensor nodes, this paper proposes a secure routing protocol for wireless sensor networks based on trust management. Combined with the relevant parameters of wireless sensor network, the simulation experiment is carried out with MATLAB. Aiming at the trust management part of the wireless sensor network security protocol proposed in this paper, the malicious attack environment such as sensor node attributes is simulated to verify the resistance of this model to relevant malicious attacks. For the trust management-based wireless sensor network security routing protocol proposed in this paper, the model included in the protocol is compared to the existing security routing model, combining the characteristics of average simulation transmission, network life, and average routing update time. Experiments show that the model has better routing performance and has improved by an average of about 20%. We offer a new solution to solve the problem of wireless routing security.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Hezhe, Guangsheng Feng, Huiqiang Wang, Hongwu Lv, and Renjie Zhou. "RABP: Delay/disruption tolerant network routing and buffer management algorithm based on weight." International Journal of Distributed Sensor Networks 14, no. 3 (March 2018): 155014771875787. http://dx.doi.org/10.1177/1550147718757874.

Full text
Abstract:
Delay/disruption tolerant network is a novel network architecture, which is mainly used to provide interoperability for many challenging networks such as wireless sensor network, ad hoc networks, and satellite networks. Delay/disruption tolerant network has extremely limited network resources, and there is typically no complete path between the source and destination. To increase the message delivery reliability, several multiple copy routing algorithms have been used. However, only a few can be applied efficiently when there is a resource constraint. In this article, a delay/disruption tolerant network routing and buffer management algorithm based on weight (RABP) is proposed. This algorithm estimates the message delay and hop count to the destination node in order to construct a weight function of the delay and hop count. A node with the least weight value will be selected as the relay node, and the algorithm implements buffer management based on the weight of the message carried by the node, for efficiently utilizing the limited network resources. Simulation results show that the RABP algorithm outperforms the Epidemic, Prophet, and Spray and wait routing algorithms in terms of the message delivery ratio, average delay, network overhead, and average hop count.
APA, Harvard, Vancouver, ISO, and other styles
4

Nourildean, Shayma Wail, Yousra Abd Mohammed, and Hussein Ali Attallah. "Virtual Local Area Network Performance Improvement Using Ad Hoc Routing Protocols in a Wireless Network." Computers 12, no. 2 (January 28, 2023): 28. http://dx.doi.org/10.3390/computers12020028.

Full text
Abstract:
Wireless Communication has become one of the most popular types of communication networks because of the many services it provides; however, it has experienced several challenges in improving network performance. VLAN (Virtual Local Area Network) is a different approach which enables a network administrator to create a logical network from a physical network. By dividing a large network into smaller networks, VLAN technology improves network efficiency, management, and security. This study includes VLAN for wireless networks with mobile nodes integration. The network protection was improved by separating the connections and grouping them in a way that prevents any party from being able to contact unauthorized stations in another party using VLAN. VLAN demonstrated restricted access to private server data by managing traffic, improving security, and reducing levels of congestion. This paper investigates the virtual local area network in a wireless network with three ad hoc routing protocols in a number of different scenarios, using the Riverbed Modeler simulation, which was used as a simulation program in this study. It was found from the investigation process that adopting VLAN technology could reduce delay and data of the network and considerably lower throughput, which is a major drawback of VLAN. Ad hoc routing algorithms, including AODV (Ad Hoc On-Demand Distance Vector), DSR (Dynamic Source Routing), and OLSR (Optimized Link State Routing) routing protocols, were used to improve the delay and throughput of the network. Routing methods with VLAN were tested across the WLAN to obtain the best throughput gain performance. The findings also revealed that these ad hoc routing protocols improved the Wireless Sensor Network performance as an additional investigation for the improvement of any network’s delay and throughput.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhou, Hui, Zhong Tian, Shebnam M. Sefat, and Samih M. Mostafa. "An Optimal SDN-Based Wavelength Allocation and Routing Method for 5G Network." Mobile Information Systems 2022 (August 18, 2022): 1–12. http://dx.doi.org/10.1155/2022/9448147.

Full text
Abstract:
Optical networks are changing as new advanced technologies emerge. With each passing year, their sizes and capabilities expand. The standard architecture for network control and management cannot handle all of these complexities. The proliferation of cloud services and the massive volume of traffic provided by content delivery networks are driving the present fast increase in Internet traffic. This obviously exacerbates congestion concerns in communication networks, with a focus on the core and backbone components in particular. Software-defined networking (SDN) is evolving into a consolidated network management system that comprises a variety of strategies aiming at network management that are based primarily on one basic principle: decoupling control plane decisions from data plane activities. An essential resource allocation strategy in an all-optical network is routing and wavelength assignment. A novel SDN-based approach is proposed to address the problem of old methods mixed with new architecture in optical networks. The network resources were optimized for optimal scheduling using a binary hybrid topology particle swarm optimization method. In terms of recovery time, blockage rate, and resource consumption, simulation results demonstrate that the suggested technique outperforms previous classical methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Fathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (June 30, 2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Full text
Abstract:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching
APA, Harvard, Vancouver, ISO, and other styles
7

Kumar, A. Vinodh, and S. Kaja Mohideen. "Security Aware Routing Protocol for Hybrid Wireless Network (SARP-HWNs) via Trust Enhanced Mechanism." International Journal of Business Data Communications and Networking 15, no. 1 (January 2019): 34–57. http://dx.doi.org/10.4018/ijbdcn.2019010103.

Full text
Abstract:
A hybrid wireless network handles both ad hoc networks and infrastructure networks, these networks are affected by malicious attacks which affect the routing by packet drops, modifications and selective forwarding. These attacks lead to the link failure in a network. Link failures are the main reason for packet loss and network unreliability in these kinds of networks. Due to link failures, the life time of the network and the performance of routing path is affected. The previous security mechanisms for protecting wireless networks are not sufficient for hybrid networks. In this article, the authors propose a trust-based security model to enhance security factors in hybrid networks. The proposed routing protocols implemented in hybrid network platforms consist of different networks such as a fixed node for WLANs (wireless televisions, personal computers, printers, cellular, etc.) with zero mobility, a sensor node for WSNs with zero mobility, mobile nodes with movements considered MANETs, and nodes with high movements (vehicles) considered as VANETs. This article proposes routing protocols to avoid link failure in the current routing path and provide quick recovery, improve the throughput, reduce end to end delay, maximize the life time of routing path without affecting energy consumption and QoS/QoE while compared with other existing techniques.
APA, Harvard, Vancouver, ISO, and other styles
8

Punia, Divya, and Rajender Kumar. "A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management." Transport and Telecommunication Journal 23, no. 1 (February 1, 2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Full text
Abstract:
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields Kalman filter as a prediction module in PGRP routing protocol in order to anticipate the neighbor location and to select the propitious neighbor for advancing packets in both urban and highway framework which leads to efficient connectivity in the network and improves road safety. K-PGRP is then compared with PGRP, GPSR (Greedy Perimeter Stateless Routing) and GPCR (Greedy Perimeter Coordinator Routing) routing protocols in terms of throughput and packet delivery ratio metrics and outperformed all the simulation cases. The simulations were performed on MATLAB R2018a along with traffic simulator SUMO.
APA, Harvard, Vancouver, ISO, and other styles
9

Das, Ayan Kumar, Rituparna Chaki, and Kashi Nath Dey. "Secure energy efficient routing protocol for wireless sensor network." Foundations of Computing and Decision Sciences 41, no. 1 (March 1, 2016): 3–27. http://dx.doi.org/10.1515/fcds-2016-0001.

Full text
Abstract:
AbstractThe ease of deployment of economic sensor networks has always been a boon to disaster management applications. However, their vulnerability to a number of security threats makes communication a challenging task. This paper proposes a new routing technique to prevent from both external threats and internal threats like hello flooding, eavesdropping and wormhole attack. In this approach one way hash chain is used to reduce the energy drainage. Level based event driven clustering also helps to save energy. The simulation results show that the proposed scheme extends network lifetime even when the cluster based wireless sensor network is under attack.
APA, Harvard, Vancouver, ISO, and other styles
10

Walunjkar, Gajanan Madhavrao, Anne Koteswara Rao, and V. Srinivasa Rao. "Disaster Relief Management Using Reinforcement Learning-Based Routing." International Journal of Business Data Communications and Networking 17, no. 1 (January 2021): 24–37. http://dx.doi.org/10.4018/ijbdcn.2021010102.

Full text
Abstract:
Effective disaster management is required for the peoples who are trapped in the disaster scenario but unfortunately when disaster situation occurs the infrastructure support is no longer available to the rescue team. Ad hoc networks which are infrastructure-less networks can easily deploy in such situation. In disaster area mobility model, disaster area is divided into different zones such as incident zone, casualty treatment zones, transport areas, hospital zones, etc. Also, in order to tackle high mobility of nodes and frequent failure of links in a network, there is a need of adaptive routing protocol. Reinforcement learning is used to design such adaptive routing protocol which shows good improvement in packet delivery ratio, delay and average energy consumed.
APA, Harvard, Vancouver, ISO, and other styles
11

Nalapko, Oleksii, Oleg Sova, Andrii Shyshatskyi, Nadiia Protas, Serhii Kravchenko, Andriy Solomakha, Yevhenii Neroznak, Oleksandr Gaman, Dmytro Merkotan, and Hennadii Miahkykh. "Analysis of methods for increasing the efficiency of dynamic routing protocols in telecommunication networks with the possibility of self-organization." Technology audit and production reserves 5, no. 2(61) (September 23, 2021): 44–48. http://dx.doi.org/10.15587/2706-5448.2021.239096.

Full text
Abstract:
The object of research is the military radio communication system. Effective operation of routing protocols is possible only if there is reliable information about the network topology for network nodes, given that the mobility of individual nodes is insignificant in special purpose wireless networks. Because nodes in the network demonstrate the mobility property of the node groups. This paper solves the problem of the analysis (decomposition) of methods of protocols efficiency increase of dynamic routing in telecommunication networks with a possibility to self-organization. In the course of the research, the authors used the main provisions of the queuing theory, the theory of automation, the theory of complex technical systems and general scientific methods of cognition, namely analysis and synthesis. This research analyzes various methods to increase the efficiency of dynamic routing protocols. Energy efficiency methods focus on three main components in energy management: battery management, transmission energy management and system energy management methods. Reliable multicast has become indispensable for the successful deployment of special purpose wireless networks, such as in tactical military operations and emergency operations. The results of the research will be useful in: – development of new routing algorithms; – substantiation of recommendations for improving the efficiency of the route selection process in networks with the possibility of self-organization; – analysis of the electronic situation during hostilities (operations); – while creating promising technologies to increase the efficiency of mobile radio networks. Areas of further research will focus on the development of a methodology for the operational management of interference protection of intelligent military radio communication systems.
APA, Harvard, Vancouver, ISO, and other styles
12

Huang, Hongzhi. "Analysis of the Application of Artificial Intelligence in Computer Network Technology." Studies in Social Science Research 5, no. 3 (June 26, 2024): p13. http://dx.doi.org/10.22158/sssr.v5n3p13.

Full text
Abstract:
The application of artificial intelligence (AI) technology in computer network technology is becoming increasingly extensive and in-depth. This paper analyzes the application of artificial intelligence in network security, network management, Internet of Things, edge computing and network services in detail. In network management, AI technology realizes network traffic optimization, automatic configuration and fault prediction, and improves the efficiency of network management. In the field of Internet of Things, AI technology helps manage and analyze a large amount of device data, supporting the development of smart homes and smart cities. In edge computing, AI technology enhances the data processing capabilities of edge nodes and reduces latency. In network services, artificial intelligence technology optimizes routing, voice recognition and personalized recommendation services. However, the application of artificial intelligence in network technology also faces challenges such as data privacy, computing resources and laws and regulations. This paper aims to provide a comprehensive reference for industry insiders to promote the application and development of artificial intelligence technology in computer networks.
APA, Harvard, Vancouver, ISO, and other styles
13

Avetisyan, Tatiana V., Yakov E. Lvovich, Igor Ya Lvovich, and Roman A. Blinov. "ANALYSIS OF ROUTING PROTOCOLS EFFECTIVENESS IN COMPUTER NETWORKS." International Journal of Advanced Studies 13, no. 3 (September 29, 2023): 95–114. http://dx.doi.org/10.12731/2227-930x-2023-13-3-95-114.

Full text
Abstract:
The main task of networks is to transport information from the sending computer to the receiving computer. In most cases, you need to make several transfers to do this. The problem of choosing a path is solved by routing algorithms. The routing algorithm must have well-defined properties: reliability, correctness, stability, simplicity and optimality. The latter property is not as transparent as it may seem at first glance, it all depends on which or which parameters are optimized. This task is sometimes not at all easy even for relatively simple local networks. Optimization parameters may include minimum delivery delay, maximum throughput, minimum price, maximum reliability, or minimum error probability. In this paper, reactive, proactive and hybrid routing protocols are considered. When making their choice, we relied on the method of hierarchy analysis. Based on the results obtained during the simulation of a network with video conference traffic, a matrix was constructed for each of the criteria studied. The protocols were compared in terms of the possibility of information loss. The results of the research can be useful in the course of building modern computer networks.
APA, Harvard, Vancouver, ISO, and other styles
14

Haseeb, Khalid, Naveed Islam, Yasir Javed, and Usman Tariq. "A Lightweight Secure and Energy-Efficient Fog-Based Routing Protocol for Constraint Sensors Network." Energies 14, no. 1 (December 26, 2020): 89. http://dx.doi.org/10.3390/en14010089.

Full text
Abstract:
The Wireless Sensor Network (WSN) has seen rapid growth in the development of real-time applications due to its ease of management and cost-effective attributes. However, the balance between optimization of network lifetime and load distribution between sensor nodes is a critical matter for the development of energy-efficient routing solutions. Recently, many solutions have been proposed for constraint-based networks using the cloud paradigm. However, they achieve network scalability with the additional cost of routing overheads and network latency. Moreover, the sensors’ data is transmitted towards application users over the uncertain medium, which leads to compromised data security and its integrity. Therefore, this work proposes a light-weight secure and energy-efficient fog-based routing (SEFR) protocol to minimize data latency and increase energy management. It exploits the Quality of Service (QoS) factors and facilitates time-sensitive applications with network edges. Moreover, the proposed protocol protects real-time data based on two levels of cryptographic security primitives. In the first level, a lightweight data confidentiality scheme is proposed between the cluster heads and fog nodes, and in the second level, a high-performance asymmetric encryption scheme is proposed among fog and cloud layers. The analysis of simulation-based experiments has proven the significant outcomes of the proposed protocol compared to existing solutions in terms of routing, security, and network management.
APA, Harvard, Vancouver, ISO, and other styles
15

Felemban, Emad, Adil A. Sheikh, and Atif Naseer. "Improving Response Time for Crowd Management in Hajj." Computers 10, no. 4 (April 6, 2021): 46. http://dx.doi.org/10.3390/computers10040046.

Full text
Abstract:
Flying Adhoc Network (FANET) is a particular type of Mobile Adhoc Network (MANET) that consists of flying drones or unmanned aerial vehicles (UAVs). MANETs are especially useful in rural and remote areas, where the lack of public networks necessitates data delivery through mobile nodes. Additionally, FANETs provide better coverage where there is a lack of roads. Generally, the goal of FANETs is to provide multimedia data to applications such as search and rescue operations, forest fire detection, surveillance and patrol, environmental monitoring, and traffic and urban monitoring. The above applications’ performance and efficiency depend on the quality and timely delivery of these essential data from an area of interest to control centers. This paper presents a Priority-based Routing Framework for Flying Adhoc Networks (PRoFFAN) for the expedited delivery of essential multimedia data to control centers. PRoFFAN reduces the FANET application’s response time by prioritizing the sending and forwarding of critical image data from the UAV to the control center. Our motivation application is crowd management; we believe that having important image features as early as possible will save lives and enhance the crowd’s safety and flow. We integrated PRoFFAN over the RPL routing layer of Contiki-NG’s IPv6 network stack. We used simulations in Cooja to demonstrate the benefit of PRoFFAN over conventional ZigBee.
APA, Harvard, Vancouver, ISO, and other styles
16

Vatambeti, Ramesh, Nrusingha Charan Pradhan, E. Sandhya, Surendra Reddy Vinta, V. Anbarasu, and K. Venkateswara Rao. "Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network." International Journal of Computer Network and Information Security 15, no. 3 (June 8, 2013): 78–89. http://dx.doi.org/10.5815/ijcnis.2023.03.06.

Full text
Abstract:
Because of the mobility of its nodes, MANET plays a significant role in mobile communication. As a result, network infrastructure is frequently changed, resulting in data loss and communication overheads. Despite this, the large packet size causes network congestion or traffic. The difficult task is efficient routing through a dynamic network. For node generation and energy management, the proposed approach in this paper employs GAODM (Geography-based Ad-hoc On Demand disjoint multipath) and E-AODM (Energy Ad-hoc On Demand Vector routing). The proposed GAODM routing protocol reduces congestion using Spider Monkey (SM) Optimization. The E- AODM protocol assesses the energy management solution based on parameters such as delay, energy consumption, routing overhead, and node energy. By choosing the best path through the network, the proposed protocol's effectiveness is increased. The proposed protocol reduces routing overload, delay, and congestion. The simulated results show that increasing the number of packets transmitted in the network using the proposed GAODM and E-AODM routing protocols over the existing protocols on NS 2 reduces node energy and, as a result, overload and delay.
APA, Harvard, Vancouver, ISO, and other styles
17

Rathee, Geetanjali, and Hemraj Saini. "Secure Buffer-Based Routing Protocol for WMN." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 28–44. http://dx.doi.org/10.4018/ijbdcn.2017010103.

Full text
Abstract:
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a routed path may reduce the performance of the entire network. A number of secure routing protocols have been proposed by different researchers but enhancement of a single network parameter (i.e. security) may affect another performance metrics significantly i.e. throughput, end to end delay, packet delivery ratio etc. In order to ensure secure routing with improved network metrics, a Secure Buffer based Routing Protocol i.e. SBRP is proposed which ensures better network performance with increased level of security. SBRP protocol uses buffers at alternate positions to fasten re-routing mechanism during node/link failure and ensures the security using AES encryption. Further the protocol is analyzed against mAODV protocol in both static and dynamic environment in terms of security, packet delivery ratio, end to end delay and network throughput.
APA, Harvard, Vancouver, ISO, and other styles
18

Sova, Oleg, Andrii Shyshatskyi, Oleksii Nalapko, Oleksandr Trotsko, Nadiia Protas, Halyna Marchenko, Artem Kuvenov, Viktor Chumak, Yaroslav Onbinskyi, and Illia Poliak. "Development of a simulation model for a special purpose mobile radio network capable of self-organization." Technology audit and production reserves 5, no. 2(61) (September 23, 2021): 49–54. http://dx.doi.org/10.15587/2706-5448.2021.239472.

Full text
Abstract:
The object of research is the military radio communication system. Effective operation of routing protocols is possible only if there is reliable information about the network topology for each of the network nodes. Construction of special purpose radio networks with the possibility of self-organization is possible only in the presence of adequate and reliable models of their work in different applications and the impact nature. It necessitates the development of new and adequate algorithms (methods, techniques) for modeling routing algorithms in special purpose radio networks with the possibility of self-organization. This work solves the problem of developing a simulation model of a mobile radio network for special purposes with the possibility of self-organization. In the course of the research, the authors used the main provisions of the queuing theory, the theory of automation, the theory of complex technical systems and general scientific methods of cognition, namely analysis and synthesis. This simulation model was developed to assess the effectiveness and adequacy of the developed scientific and methodological apparatus for routing management in special purpose radio networks with the possibility of self-organization. The research results will be useful in: ‒ development of new routing algorithms; ‒ substantiation of recommendations for improving the efficiency of the route selection process in networks with the possibility of self-organization; ‒ analysis of the electronic situation during hostilities (operations); ‒ while creating promising technologies to increase the efficiency of mobile radio networks; ‒ assessment of adequacy, reliability, sensitivity of routing algorithms; ‒ development of new and improvement of existing simulation routing models. Areas of further research will focus on the development of a methodology for the operational management of interference protection of intelligent military radio communication systems.
APA, Harvard, Vancouver, ISO, and other styles
19

T.M, Amirthalakshmi, Sivakami Raja, Murali Subramanian, Christalin Nelson, Sujatha Rajkumar, Ramesh Makala, and Walelign Dinku. "Quality of Service Management for Fast Data Transmission in Industrial Mobile Communications Using PSO-Based Computer Vision Technique." Wireless Communications and Mobile Computing 2023 (June 9, 2023): 1–9. http://dx.doi.org/10.1155/2023/7883120.

Full text
Abstract:
Mobile ad hoc networks (MANETs) have rapidly expanded in recent years, mostly as a result of the mobile devices’ obvious low cost, heterogeneity, and flexibility. When communication networks are down or inaccessible, sensors can quickly create a reliable network that can be used as a rescue data system. Industrial mobile communication has developed into a significant study area for both industry and academia in recent years. The need for data interchange between various smart devices with various latency flows is enormous. Nevertheless, there has not been as much research done in this area. The suggested work suggests a fuzzy-based improved PSO optimized in MANET to alleviate the drawbacks of the conventional routing approach. The suggested study offers a numerical modelling that can be used to carry out adaptive transmission optimization with a variety of programmable module structures and guarantee cost-effective route establishment with greater throughput, goodput, and lowest delay requirements. To find the best route, the proposed approach combines energy-optimized route construction with data-driven cluster head (CH) selection based on swarm intelligence. Particle swarm optimization- (PSO-) based clustering achieves improved delay, goodput, throughput, and path difference degree as compared to other conventional approaches, according to the extensive simulation results. The energy efficiency of a network that is decentralized is more important. The MANET device’s energy efficiency helps to extend battery life and improve network performance. This research demonstrates how the fuzzy-based improved PSO optimized in MANET helps to raise the network’s energy efficiency. As a result, network energy conservation improves network performance and battery life. Additionally, this method enhances the quality of service methodology. End-to-end delay, energy consumption, packet delivery ratio, and normalized routing overhead are measured and compared between the simulation and conventional routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
20

Groves, G., J. le Roux, and J. H. van Vuuren. "Network service scheduling and routing." International Transactions in Operational Research 11, no. 6 (November 2004): 613–43. http://dx.doi.org/10.1111/j.1475-3995.2004.00481.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

D, Bhavya, D. S. Vinod, S. P. Shiva Prakash, and Kirill Krinkin. "Enhancing routing efficiency in social internet of things: R-OPTICS and vEBT based congestion free model." International Journal of Electrical and Computer Engineering (IJECE) 14, no. 3 (June 1, 2024): 3475. http://dx.doi.org/10.11591/ijece.v14i3.pp3475-3484.

Full text
Abstract:
The emergence of the social internet of things (SIoT) network has brought forth distinctive challenges, including node mobility and varying densities, leading to congestion and hampered network efficiency. To overcome these issues, a congestion-free routing model for SIoT is proposed. This model combines the relationship-ordering points to identify the clustering structure (R-OPTICS) algorithm for intelligent node clustering based on relationships and ordering,along with a van emde boas tree (vEBT) for efficient path selection. R-OPTICS enables effective network management by clustering nodes appropriately. The model’s performance is evaluated using metrics such as Rand-Index (1.5765),Davies-Bouldin (-0.4305), and Silhouette Coefficient (1.71685) to assess average goodness values. vEBT identifies optimal paths between clusters, facilitating smart routing decisions. The primary objective of the model is to enhance network efficiency and alleviate congestion by intelligently routing data between clusters. Through extensive simulations, the proposed model outperforms existing routing methods, resulting in improved efficiency and congestion reduction. This congestion-free routing model presents a promising solution to address the unique challenges of SIoT networks, ensuring optimal performance and effective resource management.
APA, Harvard, Vancouver, ISO, and other styles
22

Du, Jiang, and Yu Li. "A Solution for Anonymous Routers Discovery Based on Source-Routing Traceroute." Advanced Materials Research 765-767 (September 2013): 1050–54. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1050.

Full text
Abstract:
Discovery of computer networks topology is always an important basement for network management. As IPv6 becomes the official standard, topology discovery methods should be changed as well. In IPv6 network, Anonymous Routers (AR) is one problem that we must deal with. AR is one kind of router we dont know its interface information, which makes it very difficult to find out their interconnections through common ways. This paper introduces a solution to deal with it, using source-routing traceroute command and nodes degree to merge ARs or find out their relation, and finally get the topology graph.
APA, Harvard, Vancouver, ISO, and other styles
23

Manhar, Advin, and Deepak Dembla. "Routing Optimizing Decisions in MANET: The Enhanced Hybrid Routing Protocol (EHRP) with Adaptive Routing based on Network Situation." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (October 7, 2023): 136–43. http://dx.doi.org/10.17762/ijritcc.v11i10s.7606.

Full text
Abstract:
Mobile ad hoc networks (MANETs) are wireless networks that operate without a fixed infrastructure or base station. In MANETs, each node acts as a data source and a router, establishing connections with its neighboring nodes to facilitate communication. This research has introduced the Enhanced Hybrid Routing Protocol (EHRP), which combines the OLSR, AOMDV, and AODV routing protocols while considering the network situation for improved performance. The EHRP protocol begins by broadcasting a RREP (Route Reply) packet to discover a route. The selection of routing options is based on the current network situation. To determine the distance between the source and destination nodes, the proposed EHRP initiates a RREQ (Route Request) packet. In situations where network mobility exceeds the capabilities of the AODV protocol, the EHRP protocol can utilize the OLSR routing protocol for route selection and data transmission, provided that at least 70% of the network nodes remain stable. Additionally, the EHRP protocol effectively handles network load and congestion control through the utilization of the AOMDV routing protocol. Compared to the hybrid routing protocol, the enhanced hybrid routing protocol (EHRP) demonstrates superior performance. Its incorporation of the OLSR, AOMDV, and AODV protocols, along with its adaptive routing adaptation based on network conditions, allows for efficient network management and improved overall network performance. The analysis of packet delivery ratio for EHRP and ZRP reveals that EHRP achieves a packet delivery ratio of 98.01%, while ZRP achieves a packet delivery ratio of 89.99%. These results indicate that the enhanced hybrid routing protocol (EHRP) outperforms the hybrid routing protocol (ZRP) in terms of packet delivery ratio. EHRP demonstrates a higher level of success in delivering packets to their intended destinations compared to ZRP. The analysis of normal routing load for EHRP and ZRP reveals that EHRP exhibits a normal routing load of 0.13%, while ZRP exhibits a higher normal routing load of 0.50%. Based on these results, it can be concluded that the performance of the Enhanced Hybrid Routing Protocol (EHRP) is significantly better than that of the Hybrid Routing Protocol (ZRP) when considering the normal routing load. EHRP demonstrates a lower level of routing overhead and more efficient resource utilization compared to ZRP in scenarios with normal routing load. When comparing the average end-to-end delay between the Enhanced Hybrid Routing Protocol (EHRP) and ZRP, the analysis reveals that EHRP achieves an average delay of 0.06, while ZRP exhibits a higher average delay of 0.23. These findings indicate that the Enhanced Hybrid Routing Protocol (EHRP) performs better than ZRP in terms of average end-to-end delay. EHRP exhibits lower delay, resulting in faster and more efficient transmission of data packets from source to destination compared to ZRP. After considering the overall parameter matrix, which includes factors such as normal routing load, data send and receive throughput, packet delivery ratio, and average end-to-end delay, it becomes evident that the performance of the Enhanced Hybrid Routing Protocol (EHRP) surpasses that of the current hybrid routing protocol (ZRP). Across these metrics, EHRP consistently outperforms ZRP, demonstrating superior performance and efficiency. The Enhanced Hybrid Routing Protocol (EHRP) exhibits better results in terms of normal routing load, higher throughput for data transmission and reception, improved packet delivery ratio, and lower average end-to-end delay. Overall, EHRP offers enhanced performance and effectiveness compared to the existing hybrid routing protocol (ZRP).
APA, Harvard, Vancouver, ISO, and other styles
24

Wehbi, Rania, Ayman Kayssi, Ali Chehab, and Zaher Dawy. "Network Setup for Secure Routing in Inter-Vehicle Communication Networks." International Journal of Business Data Communications and Networking 2, no. 4 (October 2006): 1–17. http://dx.doi.org/10.4018/jbdcn.2006100101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

G., Muneeswari, Ahilan A., Rajeshwari R, Kannan K., and John Clement Singh C. "Trust And Energy-Aware Routing Protocol for Wireless Sensor Networks Based on Secure Routing." International journal of electrical and computer engineering systems 14, no. 9 (November 14, 2023): 1015–22. http://dx.doi.org/10.32985/ijeces.14.9.6.

Full text
Abstract:
Wireless Sensor Network (WSN) is a network area that includes a large number of nodes and the ability of wireless transmission. WSNs are frequently employed for vital applications in which security and dependability are of utmost concern. The main objective of the proposed method is to design a WSN to maximize network longevity while minimizing power usage. In a WSN, trust management is employed to encourage node collaboration, which is crucial for achieving dependable transmission. In this research, a novel Trust and Energy Aware Routing Protocol (TEARP) in wireless sensors networks is proposed, which use blockchain technology to maintain the identity of the Sensor Nodes (SNs) and Aggregator Nodes (ANs). The proposed TEARP technique provides a thorough trust value for nodes based on their direct trust values and the filtering mechanisms generate the indirect trust values. Further, an enhanced threshold technique is employed to identify the most appropriate clustering heads based on dynamic changes in the extensive trust values and residual energy of the networks. Lastly, cluster heads should be routed in a secure manner using a Sand Cat Swarm Optimization Algorithm (SCSOA). The proposed method has been evaluated using specific parameters such as Network Lifetime, Residual Energy, Throughpu,t Packet Delivery Ratio, and Detection Accuracy respectively. The proposed TEARP method improves the network lifetime by 39.64%, 33.05%, and 27.16%, compared with Energy-efficient and Secure Routing (ESR), Multi-Objective nature-inspired algorithm based on Shuffled frog-leaping algorithm and Firefly Algorithm (MOSFA) , and Optimal Support Vector Machine (OSVM).
APA, Harvard, Vancouver, ISO, and other styles
26

Duarte, Elias P., Lisandro Z. Granville, Luci Pirmez, José Neuman de Souza, Rossana C. Andrade, Liane Tarouco, Reinaldo B. Correia, and Alexandre Lages. "GigaManP2P: an overlay network for distributed QoS management and resilient routing." International Journal of Network Management 22, no. 1 (May 24, 2011): 50–64. http://dx.doi.org/10.1002/nem.785.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Ahamed, V. M. Niaz, and Sivaraman K. "Survey and Review on Various Topology and Geographical based Routing Protocol Parameters to Ensure the QOS Parameters of VANET." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10s (October 7, 2023): 162–67. http://dx.doi.org/10.17762/ijritcc.v11i10s.7609.

Full text
Abstract:
Vehicular Ad Hoc Network (VANET) is a type of wireless network that allows communication between vehicles and infrastructure. One of the critical considerations in VANET is Quality of Service (QoS) parameters, which determine the network's performance. The effective management of QoS parameters is essential for VANET's reliable and efficient operation. In this research paper, we aim to explore topology-based and geographical-based routing protocol parameters to ensure QoS parameters in VANET. The former uses the network topology to make routing decisions, while the latter uses the location information of vehicles. We will first provide an overview of VANET and QoS parameters. Then, we will delve into the key parameters of topology-based and geographical-based routing protocols and how they affect QoS. We will also survey and review the existing routing protocols and parameter values used in these protocols. The findings of this research paper will provide insights into the effective management of QoS parameters in VANET and contribute to the development of more efficient routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
28

Perepelkin, D. A., M. A. Ivanchikova, and V. T. Nguyen. "Neural Network Multipath Routing in Software Defined Networks Based on Genetic Algorithm." Informacionnye Tehnologii 29, no. 12 (December 20, 2023): 622–29. http://dx.doi.org/10.17587/it.29.622-629.

Full text
Abstract:
Currently, a wide demand for the implementation and use of various cloud solutions is a modern trend and the driving force behind the development of network technologies. The growth of cloud application services delivered through data centers with varying network traffic needs demonstrates the limitations of traditional routing and load balancing methods. The combination of the advantages of software defined networks (SDN) technology and artificial intelligence (AI) methods ensures efficient management and operation of computer network resources. The paper proposes an approach to neural network multipath routing in SDN based on a genetic algorithm. The architecture and model of an artificial neural network has been developed to solve the problem of multipath routing in the SDN, which is able to predict the shortest paths based on the metrics of communication links. To optimize the hyperparameters of the neural network model, it is proposed to use a modified genetic algorithm. A visual software system SDNLoadBalancer has been developed and an experimental SDN topology has been designed, which makes it possible to study in detail the processes of neural network multipath routing in SDN based on the proposed approach. The obtained results show that the proposed neural network model has the ability to predict routes with high accuracy in real time, which makes it possible to implement various load balancing schemes in order to increase performance of SDN.
APA, Harvard, Vancouver, ISO, and other styles
29

Moh, Melody, Rashmi Kukanur, Xuquan Lin, and Subhankar Dhar. "Energy-Efficient Self-Organizing Routing for Wireless Mobile Networks." International Journal of Business Data Communications and Networking 5, no. 4 (October 2009): 52–69. http://dx.doi.org/10.4018/jbdcn.2009091704.

Full text
Abstract:
The instant deployment without relying on an existing infrastructure makes mobile ad hoc networks (MANET) a striking choice for many dynamic situations. An efficient MANET protocol may be applied to other important emerging wireless technologies, such as wireless mesh and sensor networks. This article proposes a hierarchical routing scheme that is scalable, energy efficient, and self-organizing. The new algorithm that is discussed in this article is the Dynamic Leader Set Generation (DLSG). This algorithm dynamically selects leader nodes based on traffic demand, locality, and residual energy level, and de-selects them based on residual energy. Therefore, energy consumption and traffic load are balanced throughout the network, and the network reorganizes itself around the dynamically selected leader nodes. Time, space, and message complexities are formally analyzed and implementation issues are also addressed. Incorporating the IEEE 802.11 medium access control mechanism and including the power saving mode, performance evaluation is carried out by simulating DLSG and four existing hierarchical routing algorithms. It shows that DLSG successfully extends network lifetime by 20 to 50% while achieving a comparable level of network performance.
APA, Harvard, Vancouver, ISO, and other styles
30

Khan, Muhammad Umair, Mehdi Hosseinzadeh, and Amir Mosavi. "An Intersection-Based Routing Scheme Using Q-Learning in Vehicular Ad Hoc Networks for Traffic Management in the Intelligent Transportation System." Mathematics 10, no. 20 (October 11, 2022): 3731. http://dx.doi.org/10.3390/math10203731.

Full text
Abstract:
Vehicular ad hoc networks (VANETs) create an advanced framework to support the intelligent transportation system and increase road safety by managing traffic flow and avoiding accidents. These networks have specific characteristics, including the high mobility of vehicles, dynamic topology, and frequent link failures. For this reason, providing an efficient and stable routing approach for VANET is a challenging issue. Reinforcement learning (RL) can solve the various challenges and issues of vehicular ad hoc networks, including routing. Most of the existing reinforcement learning-based routing methods are incompatible with the dynamic network environment and cannot prevent congestion in the network. Network congestion can be controlled by managing traffic flow. For this purpose, roadside units (RSUs) must monitor the road status to be informed about traffic conditions. In this paper, an intersection-based routing method using Q-learning (IRQ) is presented for VANETs. IRQ uses both global and local views in the routing process. For this reason, a dissemination mechanism of traffic information is introduced to create these global and local views. According to the global view, a Q-learning-based routing technique is designed for discovering the best routes between intersections. The central server continuously evaluates the created paths between intersections to penalize road segments with high congestion and improve the packet delivery rate. Finally, IRQ uses a greedy strategy based on a local view to find the best next-hop node in each road segment. NS2 software is used for analyzing the performance of the proposed routing approach. Then, IRQ is compared with three methods, including IV2XQ, QGrid, and GPSR. The simulation results demonstrate that IRQ has an acceptable performance in terms of packet delivery rate and delay. However, its communication overhead is higher than IV2XQ.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Changda, Xiaowei Li, and Elisa Bertino. "Network Temperature: A Novel Statistical Index for Networks Measurement and Management." ACM Transactions on Internet Technology 22, no. 3 (August 31, 2022): 1–20. http://dx.doi.org/10.1145/3511093.

Full text
Abstract:
Being able to monitor each packet path is critical for effective measurement and management of networks. However, such detailed monitoring can be very expensive especially for large-scale networks. To address such problem, inspired by thermodynamics, which uses the statistical characteristics of a large number of molecules’ motion but not each molecule’s trajectory for analysis, we propose the new concept of network temperature together with the notions of network-specific heat and network temperature gradient . Our approach does not only provide a statistical view of the current network state consisting of all the active packet paths at each time instant, but can be used to represent transitions among network states. Our network temperature-based methods have a broad applicability, such as to DDoS detection, dynamic node importance ranking, network stability and robustness evaluation, reliable packets routing, provenance compression assessment, and so on. Numerical and/or the experimental results show that our methods are effective.
APA, Harvard, Vancouver, ISO, and other styles
32

Alsukayti, Ibrahim S. "Dynamic-RPL: Enhancing RPL-Based IoT Networks with Effective Support of Dynamic Topology Management." Electronics 12, no. 18 (September 10, 2023): 3834. http://dx.doi.org/10.3390/electronics12183834.

Full text
Abstract:
The inherent characteristics and limitations of Internet of Things networks make it hard to avoid facing adverse network conditions. Addressing high performance in extreme situations still remains a challenge even for a standardized routing protocol like the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). No effective support is provided by the design of RPL to guarantee high network performance in the presence of such challenging conditions. To address such a compelling need, an innovative approach referred to as Dynamic-RPL is proposed in this research paper. With only limited in-protocol modifications to RPL, Dynamic-RPL provides effective support of dynamic topology management in a distributed manner. Seamless optimization of network topology is realized with dynamic topological adjustments to sustain high network performance and stability. It incorporates modified RPL topology establishment, customized RPL objective function and parent selection, a new dynamic topology management algorithm, and additional inter-routing support. The evaluation results demonstrated the ability of Dynamic-RPL to maintain high overall network performance irrespective of the adversity of ongoing network conditions. Considering varying-scale experimental setups, high QoS performance and low energy consumption were achieved without much increase in network overhead. Dynamic-RPL succeeded in adapting responsively with little time required to have the network performance successfully restored and network topology completely converged.
APA, Harvard, Vancouver, ISO, and other styles
33

Kumar, S., and N. Nagarajan. "Integrated Network Topological Control and Key Management for Securing Wireless Sensor Networks." International Journal of Ambient Computing and Intelligence 5, no. 4 (October 2013): 12–24. http://dx.doi.org/10.4018/ijaci.2013100102.

Full text
Abstract:
Wireless Sensor Networks (WSN) have appeared as one of the important fields at present due to their low-cost, self-organizing behavior, sensing ability in inconsiderate environments, and their huge application extent. One of the most challenging topics in relay network is security. The existing Network Topology Acquisition (NTA) processes for non transparent mode relay networks are not effective in providing the security features. At the same time, it is critical to provide privacy and validation in order to prevent information from relay networks. In the proposed system, key management is provided for privacy and simultaneously, validation for security measure is offered with relay nodes. Incorporated Network Topological control and Key management (INTK) scheme on the relay network provide the effective routing and security solution. INTK Scheme encompasses the incorporation of security and routing, active security, robust re-keying, low complexity and the multiple intensity of encrypt features in relay networks. Security scheme is designed with consideration of the multi cluster based topology control through a multiple intensity keying. The proposed security scheme has low communication energy due to its multi cluster-key executive. INTK Scheme acquires results on 4.5% improved security level with lesser execution time and communication energy consumption. A variety of numerical parameters are computed using ns2 simulator on existing NTA processes for non transparent mode relay networks and proposed INTK Scheme. INTK is highly realistic because it is intended to incorporate routing layer and security protocol without sacrificing energy.
APA, Harvard, Vancouver, ISO, and other styles
34

Nikaein, Navid, and Christian Bonnet. "Topology Management for Improving Routing and Network Performances in Mobile Ad Hoc Networks." Mobile Networks and Applications 9, no. 6 (December 2004): 583–94. http://dx.doi.org/10.1023/b:mone.0000042497.03569.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

D., Sathish Kumar, Thenmozhi R., Chinnasamy A., and Kalpanadevi S. "A Survey: Position based Non DTN and DTN Routing Protocol in VANET." Webology 19, no. 1 (January 20, 2022): 1607–19. http://dx.doi.org/10.14704/web/v19i1/web19108.

Full text
Abstract:
An Intelligent Transportation System (ITS) is an advanced technology which aims to provide modern services such as smart parking, Emergency vehicle alert notification systems, automatic traffic management, direction of safe driving, accident prevention system and many. Vehicular ad-hoc networks (VANETs) play a significant role to implement an ITS system. In Vehicular Ad-hoc network, every vehicle and Road Side Units (RSU) take part in a communication to achieve the ITS services. Since nodes of VANET are different kind of vehicles with various speed, the formation of network will be more dynamic and scalability of network varies continuously. Due to dynamic characteristics of VANET, high density of traffic and more obstacles, routing is one the biggest challenge in urban area than rural area. In this paper we present an outline of VANET, taxonomy of routing, followed by a brief discussion of position based Non DTN and DTN routing protocol. Finally, we conclude the paper with comparison result of various position-based routing protocol.
APA, Harvard, Vancouver, ISO, and other styles
36

Muthukkumar, M. S., and S. Diwakaran. "Efficient Load Balancing in WSN Using Quasi – oppositional Based Jaya Optimization with Cluster Head Selection." International Journal of Computer Network and Information Security 15, no. 2 (April 8, 2023): 85–96. http://dx.doi.org/10.5815/ijcnis.2023.02.07.

Full text
Abstract:
Researchers have been paying close attention to the wireless sensor (WSN) networks area because of its variety of applications, including industrial management, human detection, and health care management. In Wireless Sensor (WSN) Network, consumption of efficient energy is a challenging problem. Many clustering techniques were used for balancing the load of WSN network. In clustering, the cluster head (CH) is selected as a relay node with greater power which is compared with the nodes of non-CH. In the existing system, it uses LBC-COFL algorithm to reduce the energy consumption problem. To overcome this problem, the proposed system uses Quasi oppositional based Jaya load balancing strategy with cluster head (QOJ-LCH) selection protocol to boost the lifespan of network and energy consumption. The QOJ-LCH method improves the relay nodes life and shares the load on relay nodes equitably across the network to enhance the lifespan. It also reduces the load-balancing problems in Wireless Sensor networks. It uses two routing methods single-hop and multiple-hop. The proposed QOJ-LCH with cluster head selection method enhances the network’s lifespan, total amount of power utilization and the active sensor devices present in the Single-hop routing,it worked with 1600 rounds in network and 300 sensor nodes, for Multiple-hop routing, it worked with 1800 rounds in network and 350 sensor nodes. It achieves better performance, scalability and reliability.
APA, Harvard, Vancouver, ISO, and other styles
37

Atthariq, Muhammad Daffa, Rizky Fauzi Ari Hidayat, Medina Kaulan Sadida, Lailis Syafa'ah, and Fauzi Dwi Setiawan Sumadi. "Multipath Routing Implementation in SD-IoT Network Using OpenFlow-based Routing Metrics." JOIV : International Journal on Informatics Visualization 7, no. 2 (May 13, 2023): 511. http://dx.doi.org/10.30630/joiv.7.2.1691.

Full text
Abstract:
The implementation growth of the Internet of Things (IoT) may increase the complexity of the data transmission process between smart devices. The route generation process between available nodes on the network will burden the intermediary node. One of the possible solutions for resolving the problem is the integration of Software Defined Networks and IoT (SD-IoT) to provide network automation and management. The separation of networking control and data forwarding functions may provide a multipath delivery path between each node in the IoT environment. In addition, the controller can directly extract the resource usage of the intermediary devices, which can be utilized as the routing metric variable in order to maintain the resource utilization on the intermediary devices. Instead of using traditional routing, this paper aims to develop multipath routing based on Deep First Search (DFS) and Dijkstra algorithms for acquiring an efficient path using OpenFlow-based routing metrics. The traffic monitoring module delivered the metrics extraction process, which obtained the variables using Port and Aggregate Flow Statistic features. The metrics calculation aimed to provide the multipath, which was constructed based on switches resource usage. Each selected path was chosen based on the smallest cost and probability provided by the group table feature in OpenFlow. The results showed that the Dijkstra algorithm could create the multipath more swiftly than DFS with a time difference of 0.6 s. The Quality of Service (QoS) results also indicated that the proposed routing metric variables could maintain the transmission process efficiently.
APA, Harvard, Vancouver, ISO, and other styles
38

He, Mengmeng, Mingchuan Zhang, Xin Wang, Junlong Zhu, Ruxi Peng, and Qingtao Wu. "A Rerouting Framework Against Routing Interruption for Secure Network Management." IEEE Access 7 (2019): 143620–30. http://dx.doi.org/10.1109/access.2019.2945777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Taufik, Ashabul, Purnamawati Purnamawati, and Abdul Muis Mappalotteng. "Analysis of Job Competency Needs of Computer and Information Engineering Program by Referring to KKNI in Vocational Schools." ARRUS Journal of Social Sciences and Humanities 3, no. 6 (December 30, 2023): 856–69. http://dx.doi.org/10.35877/soshum2124.

Full text
Abstract:
This study aims to determine (1) the need for work competency in Computer and Network Engineering Skills Package based on the KKNI. (2) The relevance level of Computer and Network Engineering Expertise Package based on KKNI. This type of research uses a mixed method approach to the Concurrent Embedded Design model, using data collection techniques of observation, interviews, essays, triangulation and questionnaires. The results of the study indicate that the work competency requirements of the TKJ SMKN Makassar City expertise package refer to KKNI: 1) Preparing the optical fiber supporting tools and materials; 2) Installing fiber optic cable networks; 3) Carry out fiber optic network cable tester; 4) Configuring the management switch on the network; 5) Designing network topology; 6) Configuring routing on network devices in an autonomous system; 7) Change the device according to your needs; 8) Routing using a Cisco router. The relevance level of the competency package of TKJ SMKN Makassar City referring to KKNI shows an average score of 116.32 in the Very Relevant category. The percentage frequency with a value of 52% states the Relevant category and the frequency of a percentage with a value of 48% in the Very Relevant category. Based on these results, the Computer and Network Engineering expertise package of the Makassar City Vocational School reforms the equipment and practice materials of the computer network and meets the competency needs of the TKJ expertise package to achieve work competency based on the KKNI
APA, Harvard, Vancouver, ISO, and other styles
40

Reddy, Kummathi Chenna, Geetha D. Devanagavi, and Thippeswamy M. N. "CL-mWSNs: Cross Layer Model-Based QoS Centric Routing Protocol for Mission-Critical Cooperative Communication in Mobile WSNs." Journal of Telecommunications and Information Technology 2 (June 28, 2019): 53–63. http://dx.doi.org/10.26636/jtit.2019.129318.

Full text
Abstract:
The paper presents a robust QoS centric routing protocol for mission-critical communication over mobile Wireless Sensor Networks (CL-mWSN) that exploits dynamic network states from the different layers of the IEEE 802.15.4 protocol stack to make the routing decision. The CL-mWSN protocol exploits three key layers: application layer, network layer and MAC layer. It exhibits proactive network and node table management, service differentiation, fair resource scheduling and congestion detection, avoidance at the network layer, as well as dynamic link quality estimation and packet injection rate estimation at the MAC layer to assess its candidature as the best forwarding node for QoS-centric mission-critical communication. Simulation reveals that the proposed routing model exhibits higher throughput, minimum loss and deadline miss ratio that augments QoS provision in mobile WSNs.
APA, Harvard, Vancouver, ISO, and other styles
41

Rayan, Alanazi, Ahmed I. Taloba, Nadir O. Hamed, Heba Y. Zahran, and Emad E. Mahmoud. "An Efficient Energy Management Routing and Scalable Topology in Wireless Sensor Network Using Virtual Backbone." Wireless Communications and Mobile Computing 2022 (April 20, 2022): 1–10. http://dx.doi.org/10.1155/2022/9327318.

Full text
Abstract:
The wireless sensor network (WSN) approach is one of the fastest growing approaches in the world of communications and engineering. The primary objective of a WSN is to discover the important information about the environment, depending on the nature of the applications under which it is implemented, and to communicate this information to a single base station (BS) so that appropriate measures can be taken. These sensor nodes communicate via a variety of protocols. The difficulty with the traditional system is that while collecting the observed data, each node transmits its felt information directly to a base station, which quickly exhausts its power. This study suggests a Backbone Energy-Efficient Sleeping (BEES) management strategy with two appealing features: (i) the capacity of backbone is scalable by basic parameters, and (ii) the backbone nodes were distributed equally, implying that the backbone on its own is energy efficient during routine activities. Reliable connections are expected to obtain QoS and routing protocols of such backbone nodes in wireless multihop systems. As a result, present localized routing in virtualized backbone schedule cannot ensure energy-efficient paths. An energy-efficient routing scheme for Virtual Back Bone Nodes (VBS) increases life of node and switches off its radio while in sleep state to spend less power. BEES’ performance is evaluated by comparing it to two different topology management techniques. The results show that BEES performs better algorithms. It ensures optimal routing with minimal node power consumption but also implements the essential communication range for backbone networks.
APA, Harvard, Vancouver, ISO, and other styles
42

Maublanc, J., D. Peyrton, and A. Quilliot. "Multiple Routing Strategies in a Labelled Network." RAIRO - Operations Research 35, no. 1 (January 2001): 85–106. http://dx.doi.org/10.1051/ro:2001104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Yuliastuti, Gusti Eka, Citra Nurina Prabiantissa, and Agung Mustika Rizki. "Implementasi Simulated Annealing untuk Penentuan Rute pada Jaringan." MATICS 13, no. 2 (October 1, 2021): 42–46. http://dx.doi.org/10.18860/mat.v13i2.12969.

Full text
Abstract:
Abstract—Recently computer networks are increasingly complex. It needs to be a supporting device for network management such as a router. Router is a device that plays an important role in the routing process. In a router stored information in the form of routing paths, where the information includes data and which routers will be passed. In certain cases, a router can have more than one gateway. This is because the router needs to send data packets to several networks that have different segments. Such cases can be handled by using the appropriate routing path selection rules. The routing problem can be regarded as a traveling salesman problem (TSP), where a mechanism is needed to determine the shortest route to be traversed. The author implements the Simulated Annealing Algorithm because it can produce an optimal solution with light computing, so that the routing process can be more effective and efficient. Index Terms—Computer Network, Routing, Simulated Annealing, Travelling Salesman Problem Abstrak–-Jaringan komputer saat ini semakin kompleks. Perlu adanya suatu perangkat pendukung untuk manajemen jaringan seperti router. Router merupakan perangkat yang berperan penting dalam proses routing. Pada sebuah router tersimpan informasi berupa jalur routing, dimana informasi tersebut mencakup data dan router mana saja yang akan dilewati. Pada kasus tertentu, router dapat memiliki lebih dari satu gateway. Hal ini disebabkan karena router perlu mengirimkan paket data ke beberapa jaringan yang memiliki segmen berbeda. Kasus tersebut dapat ditangani dengan menggunakan aturan pemilihan jalur routing yang tepat. Permasalahan routing dapat dikatakan sebagai suatu permasalahan travelling salesman problem (TSP), dimana diperlukan suatu mekanisme dalam menentukan rute terpendek untuk dilalui. Penulis mengimplementasikan Algoritma Simulated Annealing karena dapat menghasilkan solusi yang optimal dengan komputasi ringan, sehingga proses routing dapat lebih efektif dan efisien. Kata Kunci—Jaringan Komputer, Penentuan Rute, Travelling Salesman Problem, Algoritma Simulated Annealing
APA, Harvard, Vancouver, ISO, and other styles
44

Singh, Surjit, Vivek Mehla, and Srete Nikolovski. "LSSDNF: A Lightweight Secure Software Defined Network Framework for Future Internet in 5G–6G." Future Internet 14, no. 12 (December 8, 2022): 369. http://dx.doi.org/10.3390/fi14120369.

Full text
Abstract:
As information technology advances quickly, so does the 5G–6G network management system, which is moving toward greater integration, decentralization, diversity, and intelligence. As flexibility is a crucial criterion for 5G–6G network architecture, we use the Software Defined Network (SDN) paradigm to make the programmability more flexible. Due to their ability to replace the current TCP/IP architecture with one that separates the control plane and data plane, software-defined networks have gained much popularity. However, they are susceptible to routing attacks. Therefore, this work proposes Lightweight Security Framework that combines blockchain technology with Software-Defined Networking (LSSDNF) to address this problem. The proposed framework adds the routing data that the controller withheld to the multichain blockchain. Here, a mininet network simulator is used to model the proposed framework. The data transfer rate or network throughput, bandwidth variation, and jitter have all been used to assess the performance of single-controller-SDN networks and multi-controller-SDN networks. The results demonstrate that the proposed framework performs better than the conventional single-controller-SDN architecture in terms of throughput, bandwidth fluctuation, and jitter.
APA, Harvard, Vancouver, ISO, and other styles
45

Scherson, Isaac D., Daniel S. Valencia, and Enrique Cauich. "Service address routing: a network-embedded resource management layer for cluster computing." Parallel Computing 33, no. 7-8 (August 2007): 561–71. http://dx.doi.org/10.1016/j.parco.2007.04.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

KOYAMA, AKIO, LEONARD BAROLLI, GENCI CAPI, BERNADY O. APDUHAN, JUNPEI ARAI, and ARJAN DURRESI. "AN EFFICIENT MULTI-PURPOSE OPTIMIZATION METHOD FOR QOS ROUTING USING GENETIC ALGORITHM." Journal of Interconnection Networks 05, no. 04 (December 2004): 409–28. http://dx.doi.org/10.1142/s0219265904001246.

Full text
Abstract:
In order to support multimedia communication, it is necessary to develop routing algorithms that make decisions based on multiple Quality of Service (QoS) parameters. This is because new services such as video on demand and remote meeting systems have multiple QoS requirements. However, the problem of QoS routing is difficult because finding a feasible route with two independent path constraints is NP-complete problem. Also, QoS routing algorithms for broadband networks must be adaptive, flexible, and intelligent for efficient network management. In this paper, we propose a multi-purpose optimization method for QoS routing based on Genetic Algorithm (GA). The simulation results show that the proposed method has a good performance and therefore is a promising method for QoS routing.
APA, Harvard, Vancouver, ISO, and other styles
47

Riahla, Mohamed Amine, Sihem Goumiri, Karim Tamine, and M'hamed Hamadouche. "A New Cooperation Model for Dynamic Networks." International Journal of Business Data Communications and Networking 17, no. 2 (July 2021): 1–15. http://dx.doi.org/10.4018/ijbdcn.286704.

Full text
Abstract:
Technologies evolution revealed new types of dynamic networks with decentralized architectures and autonomous services. Research on this impressive area has provided great objectives and benefits. However, providing some services related to security and routing protocols are a major problem in this domain. All nodes in the networks need to cooperate and relay packets for other nodes, but some misbehavior nodes due to selfish reasons may significantly reduce the network performances. Because they use the network resources only for their own purpose and not share them between neighbors. In this paper, a novel technique of enforcement cooperation is proposed. It aims to control the role of each node in the network and evaluate their participation during the routing function. The model includes important features that force nodes cooperating and discard the selfish ones. Simulation results showed that the proposed model is very efficient to detect and remove misbehavior nodes and enhance cooperation between nodes while routing data.
APA, Harvard, Vancouver, ISO, and other styles
48

Qian, Fengchen, Yalin Ye, Ning Shan, and Bing Su. "A Novel Architecture of Telecommunication Networks for Next Generation Internet." MATEC Web of Conferences 173 (2018): 03036. http://dx.doi.org/10.1051/matecconf/201817303036.

Full text
Abstract:
In this paper, we present a novel DC-centric architecture of telecommunication networks for next generation Internet. Data flow become the major traffic in existing telecommunication networks. Traditional computer networks and telecom networks meet many challenges in high-quality service, innovation, evolution, and management. Based on analysis existing telecom networks’ challenges, a DC-centric telecom network architecture with splitting the data plane from the control plane is proposed. The DC-centric telecom network is a widely-distributed data center network (DCN), which is composed of thousands of public or private DCs. Each DC not only plays the role of storage and computing, but also is a network node of data aggregation, switching, and routing. We also design an optical switching, which is evaluated by experiment.
APA, Harvard, Vancouver, ISO, and other styles
49

Dziekoński, Andrzej Marek, and Radoslaw Olgierd Schoeneich. "DTN Routing Algorithm for Networks with Nodes Social Behavior." International Journal of Computers Communications & Control 11, no. 4 (July 3, 2016): 457. http://dx.doi.org/10.15837/ijccc.2016.4.1454.

Full text
Abstract:
<p>This article presents routing algorithm in Delay and Disruptive Tolerant Networks (DTN). The main idea of this work is routing method that is based on information about nodes social behavior and their social relations in sparse structure of network. The algorithm takes advantage of friendship relationships between nodes and uses historic information to create groups of friends for each node, which is used in buffer management and forwarding phase of routing. Beside the routing method, mechanisms of collecting and exchanging of maintenance information between nodes is described. The algorithm was tested using The ONE simulation tool especially designed for DTN scenario and compared with miscellaneous popular solutions.</p>
APA, Harvard, Vancouver, ISO, and other styles
50

Mutiara, Dwi Ayu, Khairunnisak Nur Isnaini, and Didit Suhartono. "NETWORK PROGRAMMABILITY FOR NETWORK ISSUE USING PARAMIKO LIBRARY." Jurnal Teknik Informatika (Jutif) 4, no. 4 (August 18, 2023): 751–58. http://dx.doi.org/10.52436/1.jutif.2023.4.4.691.

Full text
Abstract:
In a company, information technology is needed, especially computer networks, to facilitate data communication. The management of a computer network, of course, requires good administration. The criteria for whether or not a network is good can be seen from the performance, reliability, and security indicators so that it will not cause network issues. Events such as server downs, data loss, lost connections, and undetected computers cause the organization's business performance to be disrupted. This study's purpose is to detect network issues with network programmability technology automatically. Paramiko library supports network automation systems and implements OSPF routing protocol in finding the shortest path to send network packets. This study uses the PPDIOO flow, namely prepare, plan, design, implement, operate, and optimize, because it is considered by the flow of making network detection tools. The results showed that the design and implementation of a small-scale network were successfully built by utilizing network programmability technology and the paramiko library, which helps detect network conditions at any time. This design has a dashboard, provisioning, assurance, and policy features that allow administrators to manage and monitor information on each network device. The network design is fitted with REST-API technology and security through a secure shell (ssh) from the Network Controller that can detect the device's connection conditions and the device's health and update the DNS configuration used. Network Issues that have been seen are devices being down, and the connection being lost. Future research can improve features for network troubleshooting when the connection is lost.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography