To see the other types of publications on this topic, follow the link: Wireless data networking.

Journal articles on the topic 'Wireless data networking'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless data networking.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cui, Yong, Hongyi Wang, Xiuzhen Cheng, and Biao Chen. "Wireless data center networking." IEEE Wireless Communications 18, no. 6 (December 2011): 46–53. http://dx.doi.org/10.1109/mwc.2011.6108333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kwark, Y. H. "Wireless Data Networking [Book Review]." IEEE Communications Magazine 34, no. 4 (April 1996): 10. http://dx.doi.org/10.1109/mcom.1996.489706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shah, Nitin J., Anil S. Sawkar, John A. Marinho, Krishan K. Sabnani, Thomas F. La Porta, and Tung Ching Chiang. "Wireless data networking, standards, and applications." Bell Labs Technical Journal 5, no. 1 (August 14, 2002): 130–49. http://dx.doi.org/10.1002/bltj.2211.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yao, Zhen Gang. "A Study on Smart Agricultural Facilities Wireless Networking." Advanced Materials Research 926-930 (May 2014): 2213–16. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2213.

Full text
Abstract:
A wireless networking method for smart agricultural facilities was proposed in this paper. As ZigBee was a short distance, low complexity, low power cost, low data rate and two-way wireless communication technology, the wireless networking method was based on ZigBee. Network topology, hardware and software were designed in the paper.
APA, Harvard, Vancouver, ISO, and other styles
5

Spragins, J. "Wireless multimedia communications: networking video, voice, and data [Book Reviews]." IEEE Network 12, no. 6 (1998): 6. http://dx.doi.org/10.1109/mnet.1998.752637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, Guang You, Si Jian Zhu, Rui Quan, and Zhi Yan Ma. "Research on Wireless Sensor Networks Based on Open Source System." Key Engineering Materials 621 (August 2014): 712–18. http://dx.doi.org/10.4028/www.scientific.net/kem.621.712.

Full text
Abstract:
As the key technologies such as wireless communication, sensor continues to mature, wireless sensor networks has become a domestic and foreign focus of research in the field of wireless networks. The main work of the thesis is to implement ZigBee wireless sensor networking, using open source protocol FreakZ On the base of existing hardware. WSN hardware node consists of 32-bit microprocessor STM32F102CB based on ARM Cortex-M3 kernel and AT86RF212 radio transceiver; the software platform uses a lightweight multi-tasking operating system Contiki and open source protocol stack called FreakZ following ZigBee protocol specification, for networking wireless networks nodes. The paper presents the system architecture of WSN networking and its hardware components, software architecture and data transmission and reception processes of the networks. Using FreakZ protocol stack under the Contiki operating system on the base of the existing hardware platform, the network nodes information and topology displayed on the HyperTerminal indicates the success of WSN networking by using FreakZ protocol.
APA, Harvard, Vancouver, ISO, and other styles
7

din, Muhammad Salah ud, Muhammad Atif Ur Rehman, and Byung-Seo Kim. "CIDF-WSN: A Collaborative Interest and Data Forwarding Strategy for Named Data Wireless Sensor Networks." Sensors 21, no. 15 (July 30, 2021): 5174. http://dx.doi.org/10.3390/s21155174.

Full text
Abstract:
Recent years have witnessed the huge popularity of Information-Centric Networking (ICN) and its realization as Named Data Networking (NDN) in the context of wireless sensor networks (WSNs). The participating nodes in WSNs are usually equipped with a single radio interface. The existing solutions lack in providing the efficient next forwarder selection in NDN-based single radio WSNs. In this work, we propose a collaborative Interest and Data Forwarding (CIDF-WSN) Strategy for Named Data Wireless Sensor Networks. CIDF-WSN develop a Neighbor Information Base (NFIB) which enables the node to select the optimal next-hop relay in Interest packet forwarding. An efficient Interest packet processing mechanism assisted by the Interest Cache Table (ICT) is provided to avoid Interest packets loss and frequent re-transmissions. In addition, CIDF-WSN also provides a robust Data packet transfer mechanism accompanied by the Temp Cache Table (TCT) to avoid Data packet losses and to ensure well-timed content delivery. Simulation results reveal that CIDF-WSN outperforms the recently published works in terms of Interest satisfaction rate, total energy consumption, Data retrieval delays, and communication overhead.
APA, Harvard, Vancouver, ISO, and other styles
8

Mannweiler, C., C. Lottermann, A. Klein, J. Schneider, and H. D. Schotten. "Cyber-physical networking for wireless mesh infrastructures." Advances in Radio Science 10 (September 18, 2012): 113–18. http://dx.doi.org/10.5194/ars-10-113-2012.

Full text
Abstract:
Abstract. This paper presents a novel approach for cyber-physical network control. "Cyber-physical" refers to the inclusion of different parameters and information sources, ranging from physical sensors (e.g. energy, temperature, light) to conventional network information (bandwidth, delay, jitter, etc.) to logical data providers (inference systems, user profiles, spectrum usage databases). For a consistent processing, collected data is represented in a uniform way, analyzed, and provided to dedicated network management functions and network services, both internally and, through an according API, to third party services. Specifically, in this work, we outline the design of sophisticated energy management functionalities for a hybrid wireless mesh network (WLAN for both backhaul traffic and access, GSM for access only), disposing of autonomous energy supply, in this case solar power. Energy consumption is optimized under the presumption of fluctuating power availability and considerable storage constraints, thus influencing, among others, handover and routing decisions. Moreover, advanced situation-aware auto-configuration and self-adaptation mechanisms are introduced for an autonomous operation of the network. The overall objective is to deploy a robust wireless access and backbone infrastructure with minimal operational cost and effective, cyber-physical control mechanisms, especially dedicated for rural or developing regions.
APA, Harvard, Vancouver, ISO, and other styles
9

P, Senthilkumar, and Baskar M. "A study on mobile ad-hock networks (manets)." Journal of Management and Science 1, no. 1 (June 30, 2011): 14–20. http://dx.doi.org/10.26524/jms.2011.3.

Full text
Abstract:
As we know that wireless technology becomes very famous among all the aspects of different technologies of computer networking of present era, the Wireless networks really provide the convenient and easy approach to communications between different areas. Wi-Fi is commonly called as wireless LAN, it is one of those networks in which high frequency radio waves are required for transmission of data from one place to another. Wi-Fi operates on several hundred feet between two places of data transmission. This technology only works on high frequency radio signals. Nowadays this technology is used as office or home network and in many electronic devices. Wireless LAN or Wi-Fi is divided into three main parts on which its whole working depends and all of its applicationsdepend on these parts such as infrastructure mode and ad hoc mode of networking. However, the important type that plays a vital role almost in application is the Ad Hoc mode of networking.This type of networking is also commonly called as peer-to-peer networking or P2P networking. Mobile ad hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links. There is still ongoing research on mobile ad hoc networks and the research may leadto even better protocols and will probably face new challenges. The current goal is to find an optimal balance between scalable routing and media access control, security, and service management.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Ji. "Optimization and Management in Order to Drive Targeted Networking Memory Database." Applied Mechanics and Materials 727-728 (January 2015): 965–68. http://dx.doi.org/10.4028/www.scientific.net/amm.727-728.965.

Full text
Abstract:
In today's vehicle networking system architecture is mainly composed of four parts: sensor networks, wireless communication networks, cloud computing platforms and vehicle terminal. Wireless sensor network is responsible for the front of the real-time collection of traffic information, a wireless communication network to send information to the backend of the cloud computing platform, cloud computing platform to handle a large number of vehicles to collect real-time information from the front, and finally sends the information to the end user. In this thesis, this car networking research background, analyze vehicle networking system architecture consisting of performance indicators for each part of the system recognize cloud platform for large data processing efficiency as well as room for improvement. Then put forward the traditional computing platform I / O disk database with in-memory database to replace the cloud to enhance cloud computing platform for large data processing efficiency.
APA, Harvard, Vancouver, ISO, and other styles
11

Mupparapu, Muralidhar. "Wireless Networking for the Dental Office: Current Wireless Standards and Security Protocols." Journal of Contemporary Dental Practice 5, no. 4 (2004): 155–62. http://dx.doi.org/10.5005/jcdp-5-4-155.

Full text
Abstract:
Abstract Digital radiography has gained immense popularity in dentistry today in spite of the early difficulty for the profession to embrace the technology. The transition from film to digital has been happening at a faster pace in the fields of Orthodontics, Oral Surgery, Endodontics, Periodontics, and other specialties where the radiographic images (periapical, bitewing, panoramic, cephalometric, and skull radiographs) are being acquired digitally, stored within a server locally, and eventually accessed for diagnostic purposes, along with the rest of the patient data via the patient management software (PMS).1 A review of the literature shows the diagnostic performance of digital radiography is at least comparable to or even better than that of conventional radiography.2,3 Similarly, other digital diagnostic tools like caries detectors, cephalometric analysis software, and digital scanners were used for many years for the diagnosis and treatment planning purposes. The introduction of wireless charged–coupled device (CCD) sensors in early 2004 (Schick Technologies®, Long Island City, NY) has moved digital radiography a step further into the wireless era. As with any emerging technology, there are concerns that should be looked into before adapting to the wireless environment. Foremost is the network security involved in the installation and usage of these wireless networks. This article deals with the existing standards and choices in wireless technologies that are available for implementation within a contemporary dental office. The network security protocols that protect the patient data and boost the efficiency of modern day dental clinics are enumerated. Citation Mupparapu M, Arora S . Wireless Networking for the Dental Office: Current Wireless Standards and Security Protocols. J Contemp Dent Pract 2004 November;(5)4:155-162.
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Yan Ju, and Xin Hua Li. "Study on Application of Wireless Sensor Networking in Environmental Monitoring." Applied Mechanics and Materials 157-158 (February 2012): 1297–300. http://dx.doi.org/10.4028/www.scientific.net/amm.157-158.1297.

Full text
Abstract:
A novel wireless sensor networks is designed with integrating sensors, embedded operating systems and wireless networking technology. The temperature, humidity, light strength and pressure around the sensor could be measured accurately. The collected data by sensor networks are analysed and treated in PC computer via USB interface. LEACH communication protocol was introduced to ZigBee networks in this paper. The node programs were exploited based on IAR System platform to accomplish data collection.
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Su Hua, Yong Guang Liu, and Xu Fang. "Home Networking Technology Applied in Smart Home System." Applied Mechanics and Materials 468 (November 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.468.141.

Full text
Abstract:
Smart home system mainly consists of home networking, wireless local area network and external network, and with the advantages of low cost and high reliability, Zigbee wireless technology is the right choice for smart home system and the main part of home networking. The design of smart home system based on Zigbee is proposed, the Zigbeethe design process of the systemintelligent socket and data communication rule are elaborated. The system has been applied in smart community of Shaoxing Electric Power Bureau, which has good performances, high availability and reliability, better market prospects.
APA, Harvard, Vancouver, ISO, and other styles
14

Cao, Xianghui, Lu Liu, Yu Cheng, and Xuemin Shen. "Towards Energy-Efficient Wireless Networking in the Big Data Era: A Survey." IEEE Communications Surveys & Tutorials 20, no. 1 (2018): 303–32. http://dx.doi.org/10.1109/comst.2017.2771534.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Foty, Daniel, and Klaus Runge. "What's Ahread in High-Speed Wireless Data Communications? The Future Will Be Better Tomorrow - And Different Than What We've Been Expecting." African Journal of Information & Communication Technology 1, no. 1 (September 26, 2005): 23. http://dx.doi.org/10.5130/ajict.v1i1.28.

Full text
Abstract:
The present situation in high-speed wireless data communications is examined. While there is growing demand for wireless bandwidth, the most pressing problem affecting this situation today is the attempt to increase bandwidth by using the same technology with tricks - rather than by using innovation. Opportunities for innovation are quite good with higher carrier frequencies, since these enable simplicity and low power consumption and opening the door to truly portable wireless peer-to-peer (WP2P) networking. Numerous challenges exist in technology and design methods; however, meeting these intellectual challenges is the only route to new and exciting wireless data technologies.
APA, Harvard, Vancouver, ISO, and other styles
16

Li, Yang, Johnson I. Agbinya, and H. Anthony Chan. "An Applicable GSM Network Model for Networking in Rural Environments." African Journal of Information & Communication Technology 2, no. 2 (July 12, 2006): 56. http://dx.doi.org/10.5130/ajict.v2i2.14.

Full text
Abstract:
Wide rural areas are often short of basic communication facilities and suffer from harsh geographic and climatic environments. Wireless networks which offer ease of operation and low maintenance cost appears to be a fast and feasible choice for service operators to install their individual networks. We first propose a refined wireless networking method to foster communication construction in rural areas. A one-pipefour-layer wireless simulation model, called Service Model, is highlighted in the paper to implement the network planning method. The Service Model collects raw data from given rural areas and abstracts these data by flowing them through four technical layers to form the predicted technical wireless network. Thereafter, a software simulation environment, BrwsLi, is coded in freeware Scilab to realize the Service Model for the sake of instantiation. This simulation environment is able to set up a specified rural network by constructing topology for the network on the depicted areas, simulate the network traffic, and evaluate network performance and economic efficiency. The Newcastle region in KwaZulu-Natal of South Africa is chosen as the sample of real-world cases to demonstrate how to practically apply Service Model and present how to operate BrwsLi properly.
APA, Harvard, Vancouver, ISO, and other styles
17

Li, Hong Yi, and Chuan Zhong Chen. "The Development of Underground Personnel Data Terminal Based on RSSI Location." Advanced Materials Research 989-994 (July 2014): 2999–3002. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2999.

Full text
Abstract:
Based on the emerging ZigBee wireless RF communication technology, this paper presents the design of a miner information collection terminal. The entire system is designed around the CC2431 SoC hardware circuit, through ZigBee networking, to achieve the location of underground environment and miner vital signs data acquisition, so that it can provide effective help to quickly carry out rescue work.
APA, Harvard, Vancouver, ISO, and other styles
18

Sukuvaara, Timo, Kari Mäenpää, and Riika Ylitalo. "Vehicular-networking- and road-weather-related research in Sodankylä." Geoscientific Instrumentation, Methods and Data Systems 5, no. 2 (October 13, 2016): 513–20. http://dx.doi.org/10.5194/gi-5-513-2016.

Full text
Abstract:
Abstract. Vehicular-networking- and especially safety-related wireless vehicular services have been under intensive research for almost a decade now. Only in recent years has road weather information also been acknowledged to play an important role when aiming to reduce traffic accidents and fatalities via intelligent transport systems (ITSs). Part of the progress can be seen as a result of the Finnish Meteorological Institute's (FMI) long-term research work in Sodankylä within the topic, originally started in 2006. Within multiple research projects, the FMI Arctic Research Centre has been developing wireless vehicular networking and road weather services, in co-operation with the FMI meteorological services team in Helsinki. At the beginning the wireless communication was conducted with traditional Wi-Fi type local area networking, but during the development the system has evolved into a hybrid communication system of a combined vehicular ad hoc networking (VANET) system with special IEEE 802.11p protocol and supporting cellular networking based on a commercial 3G network, not forgetting support for Wi-Fi-based devices also. For piloting purposes and further research, we have established a special combined road weather station (RWS) and roadside unit (RSU), to interact with vehicles as a service hotspot. In the RWS–RSU we have chosen to build support to all major approaches, IEEE 802.11, traditional Wi-Fi and cellular 3G. We employ road weather systems of FMI, along with RWS and vehicle data gathered from vehicles, in the up-to-date localized weather data delivered in real time. IEEE 802.11p vehicular networking is supported with Wi-Fi and 3G communications. This paper briefly introduces the research work related to vehicular networking and road weather services conducted in Sodankylä, as well as the research project involved in this work. The current status of instrumentation, available services and capabilities are presented in order to formulate a clear general view of the research field.
APA, Harvard, Vancouver, ISO, and other styles
19

Song, Liang, and Dimitrios Hatzinakos. "Real-Time Communications in Large-Scale Wireless Networks." International Journal of Digital Multimedia Broadcasting 2008 (2008): 1–16. http://dx.doi.org/10.1155/2008/586067.

Full text
Abstract:
There is an emerging need for realizing real-time quality of service (QoS) over multihop wireless communications in large-scale wireless networks. The applications can include wireless mesh infrastructure for broadband Internet access supporting multimedia services, visual sensor networks for surveillance, and disaster-relief networks. However, a number of challenges still exist as revealed by recent works, where the dataflow QoS performance such as throughput and end-to-end delay can degrade fast with the number of wireless hops. We propose to use large-scale cognitive networking methods to resolve the wireless multihop challenges. By the cognitive-networking concept, data packets travel along opportunistically available paths in the network with opportunistically available spectrum in every hop. Reliable end-to-end communications can be achieved for real-time services, where we show that (1) dataflow throughput can be independent of any number of wireless hops, (2) end-to-end delay and delay variance increase linearly with the number of wireless hops, and (3) delay variance decreases to zero with higher network density. These results are supported by analysis, simulations, and experiments.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Xi, and Feifei Li. "Wireless Sensor Networks Suitable for Large-Scale Heterogeneous Networking." International Journal of Online and Biomedical Engineering (iJOE) 15, no. 01 (January 17, 2019): 58. http://dx.doi.org/10.3991/ijoe.v15i01.9779.

Full text
Abstract:
In order to optimize the network architecture, addressing mechanism, heterogeneous nodes and other functions of wireless sensor networks, this study begins with the issue of networking of large-scale heterogeneous networks. A layered distributed network architecture is proposed, which provides a powerful reference for the future architecture of wireless sensor networks. Based on this architecture, the resource addressing of the corresponding hierarchical network, and the scale and location deployment of heterogeneous nodes such as sink nodes are discussed separately, and corresponding strategies and algorithms are proposed. The research results show that the core idea of the addressing mechanism is data-centric, address-oriented addressing is transformed into service-oriented addressing. Therefore, the proposed LBA addressing algorithm is suitable for other hierarchically structured networks. In addition, although the sink node is taken as an example for research, it is also suitable for the deployment of other heterogeneous nodes such as sink nodes, relay nodes, and base stations. In summary, regardless of the number of nodes or the location of the deployment, energy-saving factors need to be considered. Energy-saving is also an indispensable technology in wireless sensor network technology.
APA, Harvard, Vancouver, ISO, and other styles
21

Fan, Jing, Nan Chen, Chang Song Xiang, and Jin Long Wang. "Study on Networking Technology Based on ZigBee with Water PH Monitoring for Wireless Mesh Sensor Network." Advanced Materials Research 630 (December 2012): 302–7. http://dx.doi.org/10.4028/www.scientific.net/amr.630.302.

Full text
Abstract:
According to the requirement of remote real-time water quality monitoring, this paper design a heterogeneous network topology including wireless sensor network and wireless mesh network. Based on Zigbee protocol a network system that can realize real-time water PH remote monitoring was constructed. In the system, the networking technology and network performance were studied by programming on real equipment. The study results shown that the system can realize real-time water quality PH monitoring data acquire and wireless transmission. Through Zigbee protocol under wireless mesh sensor network the performance of data transmission such as drop rate, delay, error rate are better than before. Those result proved that the manual based water quality monitoring can be replaced by Zigbee based wireless mesh sensor network monitoring system with more detail data acquire.
APA, Harvard, Vancouver, ISO, and other styles
22

Engouang, Tristan Daladier, Liu Yun, and Zhen Jiang Zhang. "Pallier Based Homomorphic Encrypted Data Aggregation in Wireless Sensor Networks." Applied Mechanics and Materials 543-547 (March 2014): 3017–22. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3017.

Full text
Abstract:
Tiny autonomous embedded electronics (sensor nodes) devices able to communicate through wireless channels are ensuring the emission and reception of data through a communication radio between two sensors grouped by hundreds and thousands within Wireless Sensor Networks (WSNs). These amazing new technology with ongoing research worldwide, are merging networking, systems hardware, systems software and programming methodologies thus enabling applications that previously were not practical. Hence numerical simulations on computers can now visualize the physical world phenomena that could be observed through empirical means, as sensors are deployed in a dedicated environment, to fulfill their aim of sensing for any occurrence of the event of interest. The data sensed by these wireless sensors are now very sensitive, thus need to be fully protected by all means, which is why T. D. Engouang et al., argued that securityand reliability and also durability are mandatory when deploying any sensor nodes or hard device. The Pallier based homomorphic encryption data aggregation is proposed with security measures preserving data integrity and privacy.
APA, Harvard, Vancouver, ISO, and other styles
23

Tao, Tao, Zhong Hua Tong, Xiao Zheng, Xuan Gou Wu, and Lin Na Wei. "Depth Analysis of ZigBee Protocol on Wireless Sensor-Actuator Network." Applied Mechanics and Materials 666 (October 2014): 305–11. http://dx.doi.org/10.4028/www.scientific.net/amm.666.305.

Full text
Abstract:
With the development of information technology, research and application of wireless sensor-actuator network is more and more widely. In this paper, the composition of wireless sensor-actuator network is described, the ZigBee protocol which is a wireless networking protocol is analyzed from multiple aspects in the network. Network architecture, protocol stack hierarchy, building network process, data transfer process, task approach based on ZigBee protocol are studied.
APA, Harvard, Vancouver, ISO, and other styles
24

Ullah, Rehmat, Muhammad Khalil Afzal, and Byung-Seo Kim. "A novel parallel processing mechanism for data transmission in wireless content-centric networking." Journal of Intelligent & Fuzzy Systems 35, no. 6 (December 24, 2018): 5815–25. http://dx.doi.org/10.3233/jifs-169824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Hsu, Wei-Hao, and Feng-Li Lian. "WIRELESS NETWORKING MOVEMENT IMPLEMENTATION OF MULTI-ROBOT SEARCH TEAM USING MINIMAL COMMUNICATION DATA." IFAC Proceedings Volumes 39, no. 16 (2006): 668–72. http://dx.doi.org/10.3182/20060912-3-de-2911.00116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Umair, Zuneera, Umair Mujtaba Qureshi, Yingying Cheng, and Xiaohua Jia. "An Efficient Wireless Control Plane for Software Defined Networking in Data Center Networks." IEEE Access 7 (2019): 58158–67. http://dx.doi.org/10.1109/access.2019.2914771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Pourroostaei Ardakani, Saeid. "MINDS: Mobile Agent Itinerary Planning Using Named Data Networking in Wireless Sensor Networks." Journal of Sensor and Actuator Networks 10, no. 2 (April 22, 2021): 28. http://dx.doi.org/10.3390/jsan10020028.

Full text
Abstract:
Mobile agents have the potential to offer benefits, as they are able to either independently or cooperatively move throughout networks and collect/aggregate sensory data samples. They are programmed to autonomously move and visit sensory data stations through optimal paths, which are established according to the application requirements. However, mobile agent routing protocols still suffer heavy computation/communication overheads, lack of route planning accuracy and long-delay mobile agent migrations. For this, mobile agent route planning protocols aim to find the best-fitted paths for completing missions (e.g., data collection) with minimised delay, maximised performance and minimised transmitted traffic. This article proposes a mobile agent route planning protocol for sensory data collection called MINDS. The key goal of this MINDS is to reduce network traffic, maximise data robustness and minimise delay at the same time. This protocol utilises the Hamming distance technique to partition a sensor network into a number of data-centric clusters. In turn, a named data networking approach is used to form the cluster-heads as a data-centric, tree-based communication infrastructure. The mobile agents utilise a modified version of the Depth-First Search algorithm to move through the tree infrastructure according to a hop-count-aware fashion. As the simulation results show, MINDS reduces path length, reduces network traffic and increases data robustness as compared with two conventional benchmarks (ZMA and TBID) in dense and large wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
28

Rehman, Rana Asif, Jong Kim, and Byung-Seo Kim. "NDN-CRAHNs: Named Data Networking for Cognitive Radio Ad Hoc Networks." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/281893.

Full text
Abstract:
Named data networking (NDN) is a newly proposed paradigm for future Internet, in which communication among nodes is based on data names, decoupling from their locations. In dynamic and self-organized cognitive radio ad hoc networks (CRAHNs), it is difficult to maintain end-to-end connectivity between ad hoc nodes especially in the presence of licensed users and intermittent wireless channels. Moreover, IP-based CRAHNs have several issues like scalability, inefficient-mapping, poor resource utilization, and location dependence. By leveraging the advantages of NDN, in this paper, we propose a new cross layer fine-grained architecture called named data networking for cognitive radio ad hoc networks (NDN-CRAHNs). The proposed architecture provides distinct features such as in-networking caching, security, scalability, and multipath routing. The performances of the proposed scheme are evaluated comparing to IP-based scheme in terms of average end-to-end delay and packet delivery ratio. Simulation results show that the proposed scheme is effective in terms of average contents download time and packet delivery ratios comparing to conventional cognitive radio ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
29

Orukpe, P. E., T. O. Erhiaguna, and F. O. Agbontaen. "Computer Security and Privacy in Wireless Local Area Network in Nigeria." International Journal of Engineering Research in Africa 9 (May 2013): 23–33. http://dx.doi.org/10.4028/www.scientific.net/jera.9.23.

Full text
Abstract:
The advent of wireless computing and massive processing power available within portable devices provides organizations with an unprecedented ability to provide flexible computing services on-demand to enable business initiatives and this development has increased the demand for wireless network security, which if unaddressed enables the theft of data, lowers productivity, and causes quantifiable financial losses. Flaws arising from wireless protocol with networking design and implementation errors present challenges to the Wireless Fidelity (Wi-Fi) community of users. In this paper, we attempt to document and classify the flaws in Wi-Fi Protected Setup (WPS), then proving the existence of this flaw with a WPS Pin Cracking Method, and presenting a Reverse Engineering countermeasure to eliminating WPS from an Access Point firmware, including other recommendations to helping the network administrators not repeat the errors that are the root causes of flaws of wireless networking in general from being exploited. By implementing the various techniques discussed in this paper, a better and more secure wireless network will be developed.
APA, Harvard, Vancouver, ISO, and other styles
30

Kusriyanto, Medilla, Firdaus, Andik Yulianto, and Syakban Kurniawan. "Early detection of LPG gas leakage based Wireless Sensor Networking." MATEC Web of Conferences 154 (2018): 01045. http://dx.doi.org/10.1051/matecconf/201815401045.

Full text
Abstract:
LPG gas is the main fuel used in households. These days LPG gas leak triggered an accident that resulted in huge losses, especially if the accident occurred within the dense housing. LPG gas leakage monitoring and early detection of a gas leak and a leak warning is needed to prevent more fatal accident. Wireless sensor networking is a technology that can be used to build a centralized monitoring system by using a microcontroller as the interface and control system. This research developed system device monitoring and early detection of gas leaks by utilizing gas sensors MQ-4 and AVR microcontroller family as control devices. The system is also equipped with XBee PRO S2B nirkable devices as the interface to the wireless networking system that is used to transmit sensor data from the detection point to the monitoring center equipped with a PC and software integrated Visual Basic. Gas leak alert is sent with the message formats through social networking Gtalk.
APA, Harvard, Vancouver, ISO, and other styles
31

Darade, Santosh Ashokrao, and M. Akkalakshmi. "Extensive Literature Survey on Load Balancing in Software-Defined Networking." International Journal of Business Data Communications and Networking 16, no. 2 (July 2020): 1–19. http://dx.doi.org/10.4018/ijbdcn.2020070101.

Full text
Abstract:
The localization of underwater sensors is the most crucial task in underwater wireless sensor networks (UWSNs). The sensors, which are situated under the water, sense data from the environment, and sensed data is transmitted to the monitoring station. Although the monitoring station receives the sensed data, the data is meaningless without knowing the exact position of the sensor. Localization is the major issue in UWSN to be resolved. There are several localization algorithms available for terrestrial wireless sensor networks (WSN), but there are comparatively few localization algorithms available for UWSNs. An improved range-based localization method is introduced in this paper to discover localization issue. To evaluate the location of the target sensors, localization error is further to be reduced. The localization error is reduced by applying the whale optimization algorithm (WOA) in this technique. Simulation results demonstrate that performance metrics of the proposed approach outperform the existing work in terms of localization error and localization coverage.
APA, Harvard, Vancouver, ISO, and other styles
32

Liu, Yang, Xuehui Ma, Yuting Li, Yong Tie, Yinghui Zhang, and Jing Gao. "Water Pipeline Leakage Detection Based on Machine Learning and Wireless Sensor Networks." Sensors 19, no. 23 (November 21, 2019): 5086. http://dx.doi.org/10.3390/s19235086.

Full text
Abstract:
The detection of water pipeline leakage is important to ensure that water supply networks can operate safely and conserve water resources. To address the lack of intelligent and the low efficiency of conventional leakage detection methods, this paper designs a leakage detection method based on machine learning and wireless sensor networks (WSNs). The system employs wireless sensors installed on pipelines to collect data and utilizes the 4G network to perform remote data transmission. A leakage triggered networking method is proposed to reduce the wireless sensor network’s energy consumption and prolong the system life cycle effectively. To enhance the precision and intelligence of leakage detection, we propose a leakage identification method that employs the intrinsic mode function, approximate entropy, and principal component analysis to construct a signal feature set and that uses a support vector machine (SVM) as a classifier to perform leakage detection. Simulation analysis and experimental results indicate that the proposed leakage identification method can effectively identify the water pipeline leakage and has lower energy consumption than the networking methods used in conventional wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
33

Umadevi, K. S., Arpita Ghosh, and Shalu Achamma Sam. "A Classification Algorithm to Reduce Data Redundancy in Wireless Sensor Networks." Advanced Science Letters 24, no. 8 (August 1, 2018): 6020–24. http://dx.doi.org/10.1166/asl.2018.12239.

Full text
Abstract:
Middleware acts in between the application level and the lower level constructs which solve many wireless sensor network challenges. Still, middleware poses a number of issues such as energy constraint of devices, scalability, mobility, heterogeneity, data aggregation, data redundancy, dynamic networking requirements, security and Quality of Service. If data redundancy is reduced, then data aggregation and energy-related issues in middleware can be solved. An efficient middleware must have the ability to aggregate data from devices in such a way that data redundancy is reduced and hence, the amount of data transmitted to the sink is decreased. Classification algorithms can be used in middleware to reduce the duplication of data. Here, we use k-nearest neighbour algorithm for classification in order to prevent data redundancy in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
34

Kuai, Meng, and Xiaoyan Hong. "Location-Based Deferred Broadcast for Ad-Hoc Named Data Networking." Future Internet 11, no. 6 (June 24, 2019): 139. http://dx.doi.org/10.3390/fi11060139.

Full text
Abstract:
The emerging connected and autonomous vehicles (CAVs) challenge ad hoc wireless multi-hop communications by mobility, large-scale, new data acquisition and computing patterns. The Named Data Networking (NDN) is suitable for such vehicle ad hoc networks due to its information centric networking approach. However, flooding interest packets in ad-hoc NDN can lead to broadcast storm issue. Existing solutions will either increase the number of redundant interest packets or need a global knowledge about data producers. In this paper, a Location-Based Deferred Broadcast (LBDB) scheme is introduced to improve the efficiency and performance of interest broadcast in ad-hoc NDN. The scheme takes advantage of location information to set up timers when rebroadcasting an interest. The LBDB is implemented in V-NDN network architecture using ndnSIM simulator. Comparisons with several existing protocols are conducted in simulation. The results show that LBDB improves the overhead, the average number of hops and delay while maintaining an average satisfaction ratio when compared with several other broadcast schemes. The improvement can help offer timely data acquisition for quick responses in emergent CAV application situations.
APA, Harvard, Vancouver, ISO, and other styles
35

Hong, Zhang, Jun Jie Wang, and Ai Sheng Ma. "Application Research of Wireless Communication Technology in Remote Meter Reading System." Applied Mechanics and Materials 513-517 (February 2014): 1494–98. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.1494.

Full text
Abstract:
In view of the problems in the current domestic and international remote wireless meter reading system, propose the remote wireless meter reading terminal system based on ZigBee technology combined with GPRS technology, carry out the hardware circuit design of each module, establish ZigBee wireless meter reading network based on 802.15.4 layer networking protocol, design a more practical remote wireless meter reading protocol and data transmission format. Test results show that it has realized the formation of ZigBee network, collection and remote transmission of meter data, terminal equipment parameters modification and other functions to achieve the terminal design requirements.
APA, Harvard, Vancouver, ISO, and other styles
36

Nuzuluddin, Muhammad. "Pengembangan Sistem Komunikasi Data Dan Jaringan Komputer Dengan Penerapan Wireless Distribution System (WDS) di SMK Negeri 1 Pringgabaya." Infotek : Jurnal Informatika dan Teknologi 4, no. 2 (July 31, 2021): 345–55. http://dx.doi.org/10.29408/jit.v4i2.3543.

Full text
Abstract:
At Present, many schools have used wireless networks that are used to support wired networks. Cable network is used as an amplifier of access point to make internet access for users. The problems of networking using these cables can be a major constraint to inaccessible places that can reduce the flexibility of usage. The solution for this problem is to develop and implement Wireless Distribution System (WDS) on the access point. WDS is a system to develop wireless internet network without having to use cable as backbone for access point but to take advantage of wireless network path from access point. The parameters used in the WDS system are the parameters of jitter, througput, delay and packet loss. WDS performance can be analyzed so that will be known comparison of access point performance results with cable backbone
APA, Harvard, Vancouver, ISO, and other styles
37

Saleh, Zahraa, and Qahhar Qadir. "The Downside of Software-Defined Networking in Wireless Network." UKH Journal of Science and Engineering 4, no. 2 (December 31, 2020): 147–56. http://dx.doi.org/10.25079/ukhjse.v4n2y2020.pp147-156.

Full text
Abstract:
Mobile traffic volumes have grown exponentially because of the increase in services and applications. Traditional networks are complex to manage because the forwarding, control, and management planes are all bundled together and, thus, administrators are supposed to deploy high-level policies, as each vendor has its own configuration methods. Software-Defined Networking (SDN) is considered the future paradigm of communication networks. It decouples control logic from its underlying hardware, thereby promoting logically centralized network control and making the network more programmable and easy to configure. Low-power wireless technologies are moving toward a multitenant and multiapplication Internet of Things (IoT), which requires an architecture with scalable, reliable, and configured solutions. However, employing an SDN-based centralized architecture in the environment of a low-power wireless IoT network introduces significant challenges, such as difficult-to-control traffic, unreliable links, network contention, and high associated overheads that can significantly affect the performance of the network. This paper is a contribution toward a performance evaluation for the use of SDN in wireless networking by evaluating the latency, packet drop ratio (PDR), data extraction rate (DER), and overheads. The results show that SDN adds a high percentage of overheads to the network, which is about 43% of the 57% user packets, and the DER drops when the number of mesh nodes are increased, in addition to the high loss that was observed for packets that traveled over more hops.
APA, Harvard, Vancouver, ISO, and other styles
38

Sirajuddin, Mohammad. "Intelligent channel aware malicious free data forwarding scheme over wireless sensor networks." International Journal of Engineering & Technology 7, no. 1.2 (December 28, 2017): 178. http://dx.doi.org/10.14419/ijet.v7i1.2.9061.

Full text
Abstract:
In the communicative world each and every individual needs to perform global communication with failure-free intelligent model. Wireless Sensor Network, a medium which provides efficient communication modes to clients to satisfy their communication needs. However, this kind of wireless network channels are also facing lots of communication issues by means of several fault strategies, such as: link failures, node failures, bandwidth inefficiency, poor energy level, attacks and many more. So that, a fast growing network scheme is required as well as it provides lots of features to communication strategies and routing protocols, called Intelligent-Channel-Aware-Reputation Scheme [ICARS]. In the proposed system, the main objective is to provide the strong and failure-free wireless communication medium over networking with multiple numbers of nodes. As well as to provide high-level of security while the data is communicating from source to destination. For that powerful cryptographic algorithm is employed, called Modified Rijndael Algorithm (MRA) and to clearly state that the attack-free wireless communication channel with the help of intelligent routing strategies such as Route Request (RREQ) and Route Response (RREP).
APA, Harvard, Vancouver, ISO, and other styles
39

Brown, Dennis G., Simon J. Julier, Yohan Baillot, Mark A. Livingston, and Lawrence J. Rosenblum. "Event-Based Data Distribution for Mobile Augmented Reality and Virtual Environments." Presence: Teleoperators and Virtual Environments 13, no. 2 (April 2004): 211–21. http://dx.doi.org/10.1162/1054746041382357.

Full text
Abstract:
The full power of mobile augmented and virtual reality systems is realized when these systems are connected to one another, to immersive virtual environments, and to remote information servers. Connections are usually made through wireless networks. However, wireless networks cannot guarantee connectivity and their bandwidth can be highly constrained. This paper presents a robust event-based data distribution mechanism for mobile augmented reality and virtual environments. It is based on replicated databases, pluggable networking protocols, and communication channels. The mechanism is demonstrated in the Battlefield Augmented Reality System (BARS) situation awareness system, composed of several mobile augmented reality systems, immersive and desktop-based virtual reality systems, a 2D mapbased multimodal system, handheld PCs, and other sources of information such as external data servers.
APA, Harvard, Vancouver, ISO, and other styles
40

Uhl, Tadeusz, Artur Hanc, Krzysztof Tworkowski, and Łukasz Sekiewicz. "Wireless Sensor Network Based Bridge Monitoring System." Key Engineering Materials 347 (September 2007): 499–504. http://dx.doi.org/10.4028/www.scientific.net/kem.347.499.

Full text
Abstract:
This paper presented idea and implementation of efficient, reliable wireless bridge monitoring system. The system using Wireless Sensor Network to collect the related environment parameters (vibrations, temperature, humidity) and transmitting data to the main server. The system eliminates stand-alone laboratory benchtop equipment sets and cable-based, hard-wired sensor networking. Modern MEMS technology for vibrations measurement and integrated humidity/temperature sensors application for structural monitoring is presented. Data collected by the wireless monitoring system is compared to data from a traditional wired monitoring system. Both – traditional and wireless collected data that can be used to accurately identify modal frequencies and mode shapes of the bridge. Case study of the system on bridge located over Vistula river in Krakow is shown.
APA, Harvard, Vancouver, ISO, and other styles
41

Reddy, Vaka Avinash, K. Venkatesh, and L. N. B. Srinivas. "Software Defined Networking Based Delay Sensitive Traffic Engineering of Critical Data in Internet of Things." Journal of Computational and Theoretical Nanoscience 17, no. 1 (January 1, 2020): 48–53. http://dx.doi.org/10.1166/jctn.2020.8628.

Full text
Abstract:
The exponential growth of the number of devices that are connected to the internet is increasing. At present, there are more than 13 billion devices are connected and it was predicted that this number reaches up to 25 billion by 2020. In an Internet of Things ecosystem, these devices are embedded to perform specific tasks in which they cannot take decisions. When there is an emergency state in any one of the nodes, the other nodes also produce the traffic simultaneously which makes the border router busy and creates a delay in message propagation and causes loss to the productivity. In the proposed architecture, Software Defined Networking offers a solution to this problem by making wireless sensor network more intelligent and also makes network capable of making self-decision during emergency state. In the proposed architecture an Open vSwitch installed on a Raspberry Pi as a Data Plane and Open Network Operating system, Mininet can be used as a Control Plane. The NodeMCU-ESP8266 wireless devices act as end nodes. A routing path with minimum latency during critical traffic can be implemented using Software Defined Networking.
APA, Harvard, Vancouver, ISO, and other styles
42

Mao, Jian, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, and Jianhong Zhang. "Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2948025.

Full text
Abstract:
With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing), new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.
APA, Harvard, Vancouver, ISO, and other styles
43

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (April 1, 2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
44

Manoranjitham, T., K. Sai Vijaya Kumar, and B. Varshith. "Study of Application of Software Defined Network to Real Networks." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 854. http://dx.doi.org/10.14419/ijet.v7i3.12.16550.

Full text
Abstract:
This paper presents the application of Software Defined Network to Real Networks. Software Defined Networking is an intriguing concept in the networking and communication industry which provides various uses, from productive network operations to reduced costs in the networking field. The SDN architecture provides the network administrators to implement new network services and easy management of the network .This operation is done by separating the data plane and control plane that makes decision .The data plane forwards packet and control plane manages traffic. In this paper we are studying the application of SDN to Real Networks such as SDN for Internet of Things, Artificial Intelligence, 5G Networks, Wireless Networks.
APA, Harvard, Vancouver, ISO, and other styles
45

Santos, Ricardo, Konstantin Koslowski, Julian Daube, Hakim Ghazzai, Andreas Kassler, Kei Sakaguchi, and Thomas Haustein. "mmWave Backhaul Testbed Configurability Using Software-Defined Networking." Wireless Communications and Mobile Computing 2019 (April 8, 2019): 1–24. http://dx.doi.org/10.1155/2019/8342167.

Full text
Abstract:
Future mobile data traffic predictions expect a significant increase in user data traffic, requiring new forms of mobile network infrastructures. Fifth generation (5G) communication standards propose the densification of small cell access base stations (BSs) in order to provide multigigabit and low latency connectivity. This densification requires a high capacity backhaul network. Using optical links to connect all the small cells is economically not feasible for large scale radio access networks where multiple BSs are deployed. A wireless backhaul formed by a mesh of millimeter-wave (mmWave) links is an attractive mobile backhaul solution, as flexible wireless (multihop) paths can be formed to interconnect all the access BSs. Moreover, a wireless backhaul allows the dynamic reconfiguration of the backhaul topology to match varying traffic demands or adaptively power on/off small cells for green backhaul operation. However, conducting and precisely controlling reconfiguration experiments over real mmWave multihop networks is a challenging task. In this paper, we develop a Software-Defined Networking (SDN) based approach to enable such a dynamic backhaul reconfiguration and use real-world mmWave equipment to setup a SDN-enabled mmWave testbed to conduct various reconfiguration experiments. In our approach, the SDN control plane is not only responsible for configuring the forwarding plane but also for the link configuration, antenna alignment, and adaptive mesh node power on/off operations. We implement the SDN-based reconfiguration operations in a testbed with four nodes, each equipped with multiple mmWave interfaces that can be mechanically steered to connect to different neighbors. We evaluate the impact of various reconfiguration operations on existing user traffic using a set of extensive testbed measurements. Moreover, we measure the impact of the channel assignment on existing traffic, showing that a setup with an optimal channel assignment between the mesh links can result in a 44% throughput increase, when compared to a suboptimal configuration.
APA, Harvard, Vancouver, ISO, and other styles
46

Et. al., Sakam Nagi Reddy,. "Industrial Safety Applications Using Wireless Access Panels." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1573–77. http://dx.doi.org/10.17762/turcomat.v12i2.1434.

Full text
Abstract:
In large numbers of the industrial sectors, wireless networking technologies are acquiring rapid endorsement on account of their cost-adequacy, improved unwavering quality, and adaptability. A wireless network can be characterized as a network of devices, meant as hubs. Their essential usefulness is to corporately detect, accumulate, measure, and distribute data in the general climate. Wireless methods communication without the utilization of wires other than the recieving wire, the Ethernet, and the ground replacing wires. For a few industrial activities, wireless technology bears the cost of savvy and compelling availability arrangements. Utilizing wireless technology there are numerous advantages, for example, distant offices, cycles and field activity which brings about improving productivity, personal time, quicker and more accurate data assortment.
APA, Harvard, Vancouver, ISO, and other styles
47

Chauvenet, Cedric, Bernard Tourancheau, Denis Genon-Catalot, Pierre-Emmanuel Goudet, and Mathieu Pouillot. "Interoperable IPv6 Sensor Networking over PLC and RF Media." International Journal of Business Data Communications and Networking 6, no. 4 (October 2010): 1–20. http://dx.doi.org/10.4018/jbdcn.2010100101.

Full text
Abstract:
The evolution of technology has made the connection of all types of devices to IP networks possible. In this paper, the authors investigate the possible usage of IPv6 in sensor networks connected through the Power Line Communication (PLC) non-wireless medium and demonstrate possible interoperability. This work is based on the adaptation of the IEEE 802.15.4 standard protocol constrained by the low-power, lossy and low data-rate context of PLC transceiver that uses pulse modulation. The aim is to provide interoperability features with other media using a robust and reliable communication stack. The target application of such results ranges from smart metering and environment monitoring to home control and urban area energy efficiency applications. This paper proposes the first adaptation of the IEEE 802.15.4 standard commons for the PLC medium. Following this standard interface, the authors demonstrate data communication on PLC with low power energy requirement using the pulse PLC physical layer. This paper also presents an initial implementation of the Routing Protocol for Low power and lossy networks (RPL) setup proposed by the IETF working group. In this context, the authors demonstrate interoperability in a testbed between PLC and Wireless Sensor Networks (WSN).
APA, Harvard, Vancouver, ISO, and other styles
48

Li, Yuhong, Xinyue Shi, Anders Lindgren, Zhuo Hu, Peng Zhang, Di Jin, and Yingchao Zhou. "Context-Aware Data Dissemination for ICN-Based Vehicular Ad Hoc Networks." Information 9, no. 11 (October 23, 2018): 263. http://dx.doi.org/10.3390/info9110263.

Full text
Abstract:
Information-centric networking (ICN) technology matches many major requirements of vehicular ad hoc networks (VANETs) in terms of its connectionless networking paradigm accordant with the dynamic environments of VANETs and is increasingly being applied to VANETs. However, wireless transmissions of packets in VANETs using ICN mechanisms can lead to broadcast storms and channel contention, severely affecting the performance of data dissemination. At the same time, frequent changes of topology due to driving at high speeds and environmental obstacles can also lead to link interruptions when too few vehicles are involved in data forwarding. Hence, balancing the number of forwarding vehicular nodes and the number of copies of packets that are forwarded is essential for improving the performance of data dissemination in information-centric networking for vehicular ad-hoc networks. In this paper, we propose a context-aware packet-forwarding mechanism for ICN-based VANETs. The relative geographical position of vehicles, the density and relative distribution of vehicles, and the priority of content are considered during the packet forwarding. Simulation results show that the proposed mechanism can improve the performance of data dissemination in ICN-based VANET in terms of a successful data delivery ratio, packet loss rate, bandwidth usage, data response time, and traversed hops.
APA, Harvard, Vancouver, ISO, and other styles
49

Cheng, Jie, Dian Wu Gao, Jun Fei Wang, and Dong Ge Wen. "Coal Mine Safety Monitoring System Based on ZigBee and GPRS." Applied Mechanics and Materials 422 (September 2013): 215–20. http://dx.doi.org/10.4028/www.scientific.net/amm.422.215.

Full text
Abstract:
A wireless coal mine safety monitoring system based on ZigBee wireless sensor network and GPRS wireless remote transmission was established, which enjoys the characteristics of ZigBee technology, including quick networking, low cost, less power consumption, simple network structure and real-time parameter monitoring. With mature GPRS technology, remote data transmission was achieved and associated director can be informed through short message sent to his cellphone, which contributes to the early identification of serious accidents and real-time treatment, thus increasing the safety of coal mining.
APA, Harvard, Vancouver, ISO, and other styles
50

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography