Articoli di riviste sul tema "Network control protocol"

Segui questo link per vedere altri tipi di pubblicazioni sul tema: Network control protocol.

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Network control protocol".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

MVPanduranga Rao SBasavaraj, AshakiranGN. "Congestion Control Mechanism using Network Border Protocol". International Journal of Science and Research (IJSR) 1, n. 2 (5 febbraio 2012): 35–39. http://dx.doi.org/10.21275/ijsr12120301.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael e Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET". UKH Journal of Science and Engineering 3, n. 1 (22 maggio 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
3

Liang, Xiurong, e You Qian. "Energy Balance Routing Protocol for Wireless Sensor Networks Based on Fuzzy Control Strategy". Wireless Communications and Mobile Computing 2022 (27 maggio 2022): 1–12. http://dx.doi.org/10.1155/2022/4597992.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The existing routing protocols for wireless sensor networks were not reasonable in design, which limited their application. Most of the existing studies did not take into account the energy consumption of the network and the balanced use of the energy of sensor nodes, which led to the unsatisfactory application effect of wireless sensor networks in some fields. Therefore, from the perspective of energy balance in wireless sensor networks, this paper proposed a construction method of an energy balance routing protocol in wireless sensor networks based on a fuzzy control strategy. Firstly, based on the analysis of the basic composition of wireless sensor networks and the structure of sensor nodes, this paper expounded the basic process of wireless data transmission and summarized the classification and characteristics of routing protocols in wireless sensor networks from different angles. Secondly, according to the node data transmission characteristics of wireless sensor networks, the energy balance use model of sensor nodes was established, and the design method of the energy balance routing protocol based on fuzzy control strategy was proposed, and the data transmission link was optimized. Finally, through experimental comparative analysis, the results showed that the energy balanced routing protocol proposed in this paper can effectively realize the energy balanced use of the network data transmission process. Compared with other common routing protocols, the wireless sensor network routing protocol proposed in this paper can not only improve the data transmission efficiency and reduce the data redundancy but also save energy consumption and prolong the network running time. The design method of routing protocol proposed in this paper will be conducive to the optimization and application of routing protocol in wireless sensor networks and provide a theoretical basis for the related research of wireless sensor networks.
4

Khan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman e Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols". ACM SIGCOMM Computer Communication Review 51, n. 1 (31 gennaio 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Analyzing and interpreting the exact behavior of new delay-based congestion control protocols with complex non-linear control loops is exceptionally difficult in highly variable networks such as cellular networks. This paper proposes a Model-Driven Interpretability (MDI) congestion control framework, which derives a model version of a delay-based protocol by simplifying a congestion control protocol's response into a guided random walk over a two-dimensional Markov model. We demonstrate the case for the MDI framework by using MDI to analyze and interpret the behavior of two delay-based protocols over cellular channels: Verus and Copa. Our results show a successful approximation of throughput and delay characteristics of the protocols' model versions across variable network conditions. The learned model of a protocol provides key insights into an algorithm's convergence properties.
5

Singh, Prabhdeep, Anuj Kumar Gupta e Ravinder Singh. "Improved priority-based data aggregation congestion control protocol". Modern Physics Letters B 34, n. 02 (20 dicembre 2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
With advancement in multimedia applications, Wireless sensor networks (WSNs) are becoming popular due to their inherent characteristics and wide range of applications. However, WSNs contain very small sensor nodes, these nodes are battery constrained. Also, the batteries of these sensor nodes are not either replaceable or rechargeable. Therefore, many energy efficient protocols have been implemented so far to improve the network lifetime. However, the data aggregation at sink may suffer from data flooding issue, which reduces the network lifetime of WSNs. For handling this issue, in this paper, an effective data aggregation approach is designed. We have designed a priority-based data aggregation control protocol, which considers token bucket, Lempel–Ziv–Welch (LZW) compression and a hybrid of ant colony optimization and particle swarm optimization-based soft computing approach. Extensive experiments reveal that the presented protocol provides better network lifetime in contrast to the existing energy efficient protocols.
6

Ahuja, Sanjay P., e W. Russell Shore. "Wireless Transport Layer Congestion Control Evaluation". International Journal of Wireless Networks and Broadband Technologies 1, n. 3 (luglio 2011): 71–81. http://dx.doi.org/10.4018/ijwnbt.2011070105.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The performance of transport layer protocols can be affected differently due to wireless congestion, as opposed to network congestion. Using an active network evaluation strategy in a real world test-bed experiment, the Transport Control Protocol (TCP), Datagram Congestion Control Protocol (DCCP), and Stream Control Transport Protocol (SCTP) were evaluated to determine their effectiveness in terms of throughput, fairness, and smoothness. Though TCP’s fairness was shown to suffer in wireless congestion, the results showed that it still outperforms the alternative protocols in both wireless congestion, and network congestion. In terms of smoothness, the TCP-like congestion control algorithm of DCCP did outperform TCP in wireless congestion, but at the expense of throughput and ensuing fairness. SCTP’s congestion control algorithm was also found to provide better smoothness in wireless congestion. In fact, it provided smoother throughput performance than in the network congestion.
7

Thuneibat, Saed, e Buthayna Al Sharaa. "Dynamic source routing protocol with transmission control and user datagram protocols". Indonesian Journal of Electrical Engineering and Computer Science 30, n. 1 (1 aprile 2023): 137. http://dx.doi.org/10.11591/ijeecs.v30.i1.pp137-143.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Dynamic source routing protocol (DSR) is a common routing protocol in wireless network without infrastructure, called ad-hoc network, DSR used just above internet protocol (IP) at the network layer. The upper transport layer provides reliability by transmission control protocol (TCP) and user datagram protocol (UDP). The choice between DSR/TCP and DSR/UDP is an actual issue for network designers and engineers. The question arises: which one provides better quality of service (QoS) parameters, less delay and jitter, greater throughput, and data rates. This paper focuses on the study and analysis of DSR and comparison of DSR/TCP and DSR/UDP by simulation in network simulator (NS2) environment. Another comparison of DSR and ad hoc on-demand distance vector (AODV) is provided. Design and simulation of the protocols in ad hoc network accurately describe the behavior in real system and QoS parameters are obtained.
8

Deshmukh, Sneha R., e Vijay T. Raisinghani. "A Survey on Congestion Control Protocols for CoAP". International Journal of Communication Networks and Information Security (IJCNIS) 14, n. 2 (31 agosto 2022): 111–23. http://dx.doi.org/10.17762/ijcnis.v14i2.5484.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.
9

Kanchanadevi, P., V. Jothi Prakash e T. Yawanikha. "Improve QOS using Congestion Control Protocol in Multihop Wireless Sensor Network". Journal of Advanced Research in Dynamical and Control Systems 11, n. 12-SPECIAL ISSUE (31 dicembre 2019): 994–99. http://dx.doi.org/10.5373/jardcs/v11sp12/20193305.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Zhao, Yifan, Shengjie Zhou, Hongwei Ding, Shaowen Yao, Zhijun Yang e Qianlin Liu. "CSMA/CA MAC Protocol with Function of Monitoring based on Binary Tree Conflict Resolution for Cognitive Radio Networks". International Journal of Software Science and Computational Intelligence 8, n. 2 (aprile 2016): 35–51. http://dx.doi.org/10.4018/ijssci.2016040103.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The CSMA/CA protocol is the most widely-compete agreement used by a network. Therefore, MAC layer of cognitive radio networks mostly use the CSMA/CA protocol to provide the competitive channel resources. Due to the unique characteristics and related needs of the cognitive radio networks, design their network protocol is a critical task. For its characteristics, design and implement a comprehensive CSMA/CA protocol, including arrival rate control, priority services, monitoring, conflict resolution and increased throughput; elaborated protocol model, system throughput and other parameters, demonstrates the correctness of the CSMA/CA protocol; comparison with other protocols, highlighting the advantages of the agreement.
11

Yang, Jianmin, Gang Qiao, Qing Hu, Jiarong Zhang e Guangbin Du. "A Dual Channel Medium Access Control (MAC) Protocol for Underwater Acoustic Sensor Networks Based on Directional Antenna". Symmetry 12, n. 6 (27 maggio 2020): 878. http://dx.doi.org/10.3390/sym12060878.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Medium access control (MAC) protocol is an important link for achieving networks function in any wireless networks; an efficient and reliable MAC protocol is crucial for an effective underwater acoustic sensor networks (UASNs). Significant differences between UASNs and terrestrial sensor networks (TSNs) render the traditional MAC protocols applied on land inapplicable underwater. Existing MAC protocols for UASNs use the omnidirectional antenna, which wastes energy, restricts the network’s coverage range, and brings about unnecessary interferences in neighbor nodes. This paper proposes a dual channel MAC protocol for UASNs based on directional antenna (DADC-MAC), which increases the network coverage range, efficiently utilizes space, and reduces node interference compared to the omnidirectional antenna. The DADC-MAC protocol divides the channel into a data transmission channel and busy prompt message channel; the node uses the former to transmit the control frame and DATA package while the sending node and receiving node use the latter channel to inform the neighbor nodes of on-going communications to prevent DATA package collision. A neighbor discovery mechanism and directional network allocation vector are applied to resolve hidden terminal and deafness problems. Simulation results show that the DADC-MAC protocol could improve network throughput and reduce end-to-end delay, is efficient, performs well, and is well suited to both symmetrical and asymmetrical UASNs topology.
12

Tu, Zhe, Huachun Zhou, Kun Li, Haoxiang Song e Yuzheng Yang. "A Blockchain-Enabled Trusted Protocol Based on Whole-Process User Behavior in 6G Network". Security and Communication Networks 2022 (11 ottobre 2022): 1–12. http://dx.doi.org/10.1155/2022/8188977.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The access of massive users and devices in the 6G networks increases the risk of network attacks. Designing a trusted protocol to control user behavior can effectively improve the security capability of the network. However, most of the existing trusted protocols focus on unilateral user behavior and lack effective control over the whole process of user behavior. In this paper, we design a blockchain-enabled trusted protocol based on the whole-process user behavior. At first, we describe the Whole-Process User Behavior (WPUB) after the user accesses the network, and model the whole-process trusted control process. The proposed model establishes a trusted chain between user identity, access action, and communication traffic, and realizes the control of WPUB. Then, based on the proposed model, we design a whole-process trusted protocol with smart agents and smart contracts in combination with blockchain. Finally, we evaluate the designed protocol in the HyperLedger Fabric-based prototype system. Evaluations show that the proposed protocol can control the WPUB and reduce the risk of the network being attacked.
13

Kang, Min Wook, e Yun Won Chung. "An Efficient Routing Protocol with Overload Control for Group Mobility in Delay-Tolerant Networking". Electronics 10, n. 4 (23 febbraio 2021): 521. http://dx.doi.org/10.3390/electronics10040521.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In delay-tolerant networking (DTN), messages are delivered to destination nodes by using opportunistic contacts between contact nodes, even if stable routing paths from source nodes to destination nodes do not exist. In some DTN network environments, such as military networks, nodes movement follows a group movement model, and an efficient DTN routing protocol is required to use the characteristics of group mobility. In this paper, we consider a network environment, where both intra- and intergroup routing are carried out by using DTN protocols. Then, we propose an efficient routing protocol with overload control for group mobility, where delivery predictability for group mobility is defined and proactive overload control is applied. Performance evaluation results show that the proposed protocol had better delivery ratios and overhead ratios than compared protocols, although the delivery latency was increased.
14

Liu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue e Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane". Electronics 11, n. 15 (30 luglio 2022): 2389. http://dx.doi.org/10.3390/electronics11152389.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
With the development of network technology, various network protocols different from TCP/IP have emerged. The heterogeneous integrated network has been proposed to realize the interconnection between heterogeneous networks running different protocols. However, current protocol conversion mechanisms often can only handle a few pre-defined protocols and do not support the flexible expansion of new protocols, which cannot meet the needs of the efficient convergence of different heterogeneous networks. Addirionally, due to the lack of security mechanisms, data in the core network is confronted with the risk of stealing and tampering. Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks. First, based on the programmable data plane, the parser is reconfigured to realize multi-protocol parsing. Furthermore, the encryption mechanism implemented in the P4 extern is proposed and unified to the data plane together with the protocol conversion mechanism. Finally, the MultiSec prototype is implemented on a programmable software switch and accelerated by a dedicated encryption card. Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card.
15

Nguyen, Phi Le, Thanh Hung Nguyen e Kien Nguyen. "A Path-Length Efficient, Low-Overhead, Load-Balanced Routing Protocol for Maximum Network Lifetime in Wireless Sensor Networks with Holes". Sensors 20, n. 9 (28 aprile 2020): 2506. http://dx.doi.org/10.3390/s20092506.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In wireless sensor networks (WSNs) with holes, designing efficient routing protocols, which prolong the network lifetime, is one of the most critical issues. To this end, this paper proposes a new geographic routing protocol for WSNs named the load Balanced and constant Stretch protocol for bypassing Multiple Holes (i.e., BSMH). In contrast to the existing works in the literature, the design of BSMH simultaneously takes into account the three factors that impacted the network lifetime, including routing path length, control packet overhead, and load balance among the nodes. Moreover, BSMH aims at minimizing the routing path length and the control overhead, while maximizing the load balance. We theoretically prove the efficiency of BSMH and extensively evaluate BSMH against the state-of-the-art protocols. The evaluation results show that the proposed protocol outperforms the others in various investigated metrics, not only network lifetime, but also routing path stretch, load balance, and control overhead. Specifically, BSMH prolongs the network lifetime by 30 % compared to the existing protocols while guaranteeing that the routing path stretch is under 1.3 .
16

Qiu, Ying, e Ding Zhong Tan. "Greenhouse Control System Based on WSN". Key Engineering Materials 486 (luglio 2011): 254–57. http://dx.doi.org/10.4028/www.scientific.net/kem.486.254.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
According to the demands of the Greenhouse Control System, the WSN(Wireless sensor networks) and WSN node hardware are designed, the network topology, data communication protocol, Encrypt Algorithm, time synchronization algorithm and Routing protocol are researched and realized. The network topology can be changed in accordance with environment needs. The routing path of WSN is multi-hop, and the routing protocol can choose the routing path adaptively. The WSN is deployed and running steadily.
17

Wang, Ke, Zhichuan Guo, Mangu Song e Meng Sha. "100 Gbps Dynamic Extensible Protocol Parser Based on an FPGA". Electronics 11, n. 9 (7 maggio 2022): 1501. http://dx.doi.org/10.3390/electronics11091501.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In order to facilitate the transition between networks and the integration of heterogeneous networks, the underlying link design of the current mainstream Information-Centric Networking (ICN) still considers the characteristics of the general network and extends the customized ICN protocol on this basis. This requires that the network transmission equipment can not only distinguish general network packets but also support the identification of ICN-specific protocols. However, traditional network protocol parsers are designed for specific network application scenarios, and it is difficult to flexibly expand new protocol parsing rules for different ICN network architectures. For this reason, we propose a general dynamic extensible protocol parser deployed on FPGA, which supports the real-time update of network protocol parsing rules by configuring extended protocol descriptors. At the same time, the multi-queue protocol management mechanism is adopted to realize the grouping management and rapid parsing of the extended protocol. The results demonstrate that the method can effectively support the protocol parsing of 100 Gbps high-speed network data packets and can dynamically update the protocol parsing rules under ultra-low latency. Compared with the current commercial programmable network equipment, this solution improves the protocol update efficiency by several orders of magnitude and better supports the online updating of network equipment.
18

Alsufyani, Azhar Abbad, e Khaled H. Almotairi. "An Adaptive Common Control Channel MAC with Transmission Opportunity in IEEE 802.11ac". Journal of ICT Research and Applications 14, n. 3 (23 febbraio 2021): 240–56. http://dx.doi.org/10.5614/itbj.ict.res.appl.2021.14.3.3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Spectral utilization is a major challenge in wireless ad hoc networks due in part to using limited network resources. For ad hoc networks, the bandwidth is shared among stations that can transmit data at any point in time. It  is important to maximize the throughput to enhance the network service. In this paper, we propose an adaptive multi-channel access with transmission opportunity protocol for multi-channel ad hoc networks, called AMCA-TXOP. For the purpose of coordination, the proposed protocol uses an adaptive common control channel over which the stations negotiate their channel selection based on the entire available bandwidth and then switch to the negotiated channel. AMCA-TXOP requires a single radio interface so that each station can listen to the control channel, which can overhear all agreements made by the other stations. This allows parallel transmission to multiple stations over various channels, prioritizing data traffic to achieve the quality-of-service requirements. The proposed approach can work with the 802.11ac protocol, which has expanded the bandwidth to 160 MHz by channel bonding. Simulations were conducted to demonstrate the throughput gains that can be achieved using the AMCA-TXOP protocol. Moreover, we compared our protocol with  the IEEE 802.11ac standard protocols.
19

Majeed, Uzma, Aqdas Naveed Malik, Nasim Abbas e Waseem Abbass. "An Energy-Efficient Distributed Congestion Control Protocol for Wireless Multimedia Sensor Networks". Electronics 11, n. 20 (11 ottobre 2022): 3265. http://dx.doi.org/10.3390/electronics11203265.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Wireless multimedia sensor networks (WMSNs) generate a huge amount of multimedia data. Congestion is one of the most challenging open issues in WMSNs. Congestion causes low throughput, high packet loss and low energy efficiency. Congestion happens when the data carried by the network surpasses the available capacity. This article presents an energy-efficient distributed congestion control protocol (DCCP) to mitigate congestion and improve end-to-end delay. Compared to the other protocols, the DCCP protocol proposed in this article can alleviate congestion by intelligently selecting the best path. First, congestion is detected by using two congestion indicators. Second, each node aggregates the received data and builds a traffic congestion map. The traffic congestion map is used to calculate the best path. Therefore, the traffic is balanced on different routes, which reduces the end-to-end delay. Finally, a rate controller is designed to prevent congestion in the network by sending a congestion notification message to a source node. After receiving a congestion notification message, the source node immediately adjusts its transmission rate. Experimental results based on raspberry pi sensor nodes show that the proposed DCCP protocol significantly improves network performance and is superior to existing modern congestion control protocols.
20

Qomarudin, Muhammad Faisal, e Agit Amrullah. "SISTEM MONITORING JARINGAN REALTIME BERBASIS INTERNET CONTROL MESSAGE PROTOCOL". JINTECH: Journal Of Information Technology 3, n. 2 (12 agosto 2022): 67–80. http://dx.doi.org/10.22373/jintech.v3i2.1935.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Network monitoring in the company is more extensive and complex, each device must be connected to the network so that there are no obstacles when there is receiving and sending data from various devices. Problems on computer networks cannot be predicted when they occur and continuous monitoring is needed to ensure the network is connected properly and it is difficult to troubleshoot network damage. Therefore, a network monitoring system is needed to check the network so that administrators can find out network conditions. By using the Internet Control Message Protocol to check the network continuously so that it can find out the condition of the device, taking into account the latency and data obtained by Packet Internet Gopher. Network checks and notifications use a backdoor working system or through a background process, control the process is also a network check log to find out which devices are often disconnected and to make network troubleshooting easier. In this paper, will be building a network monitoring system that displays network status and monitors the network continuously with telegram notifications, network logs to facilitate troubleshooting, Internet Protocol management and backdoor system settings by the name of SIMONIT.
21

Deng, Min, Huifang Chen e Lei Xie. "DCO-MAC: A Hybrid MAC Protocol for Data Collection in Underwater Acoustic Sensor Networks". Sensors 18, n. 7 (16 luglio 2018): 2300. http://dx.doi.org/10.3390/s18072300.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In underwater acoustic sensor networks (UASNs), medium access control (MAC) is an important issue because of its potentially significant effect on the network performance. However, designing a suitable MAC protocol for the UASN is challenging because of the specific characteristics of the underwater acoustic channel and network, such as limited available bandwidth, long propagation delay, high bit-error-rate, and sparse network topology. In addition, as the traffic load is non-uniformly distributed in a UASN for data collection, it is essential to consider the application feature for the MAC protocol. In this paper, we propose a MAC protocol in a data-collection-oriented UASN, abbreviated as the DCO-MAC protocol. In the proposed protocol, the network is partitioned into two kinds of sub-networks according to the traffic load. A contention-based MAC protocol is used in the sub-network with a light traffic load, while a reservation-based MAC protocol is used in the sub-network with a heavy traffic load. Meanwhile, the DCO-MAC protocol supports the access of mobile nodes. The theoretical analysis and simulation results demonstrate that, in a UASN for data collection, the proposed MAC protocol outperforms the other existing MAC protocols, in terms of the network throughput, end-to-end packet delay, energy overhead, and fairness.
22

Alam, Md Nasre, e Young-Chon Kim. "Efficient MAC Protocol for Hybrid Wireless Network with Heterogeneous Sensor Nodes". Journal of Sensors 2016 (2016): 1–16. http://dx.doi.org/10.1155/2016/7951965.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Although several Directional Medium Access Control (DMAC) protocols have been designed for use with homogeneous networks, it can take a substantial amount of time to change sensor nodes that are equipped with an omnidirectional antenna for sensor nodes with a directional antenna. Thus, we require a novel MAC protocol for use with an intermediate wireless network that consists of heterogeneous sensor nodes equipped with either an omnidirectional antenna or a directional antenna. The MAC protocols that have been designed for use in homogeneous networks are not suitable for use in a hybrid network due to deaf, hidden, and exposed nodes. Therefore, we propose a MAC protocol that exploits the characteristics of a directional antenna and can also work efficiently with omnidirectional nodes in a hybrid network. In order to address the deaf, hidden, and exposed node problems, we define RTS/CTS for the neighbor (RTSN/CTSN) and Neighbor Information (NIP) packets. The performance of the proposed MAC protocol is evaluated through a numerical analysis using a Markov model. In addition, the analytical results of the MAC protocol are verified through an OPNET simulation.
23

Paul, Sumit, Md Javed Hossain e Abul Kalam Azad. "An Energy Efficient and Cooperative Congestion Control Protocol in MANET". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, n. 9 (30 ottobre 2012): 3004–14. http://dx.doi.org/10.24297/ijct.v11i9.3413.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
MANET is collection of mobile devices form a self-creating, self-organizing and self-administering wireless networks. Due to mobility of nodes it is not possible to establish fixed paths for message delivery through the network. Hence, congestion is happening and it is the key problem for MANET. Many routing protocols have been proposed to overcome the congestion in MANET. One of the popular routing protocol is AODV, but it depends on individual receivers to detect congestion and adjust their receiving rates. Another common routing protocol is EERCCP, which is better than AODV but sometimes it fails when link failure happens to relay node or if relay node moves from its current group to another group then there is no other mechanism to select an alternative relay nodes i.e. lack of cooperativeness. Consequently, we proposed a routing protocol named as EECCCP, which utilizes user cooperation to reduce congestion. The proposed energy efficient and cooperative congestion control routing protocol (EECCCP), performs well better than both the AODV and EERCCP. The proposed scheme encorporates the benefits of energy efficiency and cooperativeness which in turn reduces the congestion effectively. It also overcomes the disadvantages of existing multicast congestion control protocol. Moreover, the proposed scheme does not impose any significant changes on the queuing, scheduling or forwarding policies of existing network protocols. The simulation results have shown that our proposed protocol EECCCP has the about 95% better delivery ratio and throughput with about 85 % less delay and energy consumption when compared with the existing protocol AODV. It also has the about 65% better delivery ratio and throughput with about 60 % less delay and energy consumption when compared with the existing protocol EERCCP.
24

Kadhim, Dheyaa Jasim, e Ali Abdulwahhab Mohammed. "Proposed emerged and enhanced routing protocols for wireless networks". Indonesian Journal of Electrical Engineering and Computer Science 24, n. 2 (1 novembre 2021): 871. http://dx.doi.org/10.11591/ijeecs.v24.i2.pp871-879.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The problem motivation of this work deals with how to control the network overhead and reduce the network latency that may cause many unwanted loops resulting from using standard routing. This work proposes three different wireless routing protocols which they are originally using some advantages for famous wireless ad-hoc routing protocols such as dynamic source routing (DSR), optimized link state routing (OLSR), destination sequenced distance vector (DSDV) and zone routing protocol (ZRP). The first proposed routing protocol is presented an enhanced destination sequenced distance vector (E-DSDV) routing protocol, while the second proposed routing protocol is designed based on using the advantages of DSDV and ZRP and we named it as DS-ZRP routing protocol. The third proposed routing protocol is designed based on using the advantaged of multipoint relays in OSLR protocol with the advantages of route cashing in DSR protocol, and we named it as OLS-DSR routing protocol. Then, some experimental tests are doing by demonstration case studies and the experimental results proved that our proposed routing protocols outperformed than current wireless routing protocols in terms of important network performance metrics such as periodical broadcast, network control overhead, bandwidth overhead, energy consumed and latency.
25

Iyobhebhe, Matthew, A. S. Yaro, Habeeb Bello, E. E. Agbon, M. D. Al-Mustapha, M. T. Kabir e Siyaka O. Salihu. "A Review on Dynamic Network Using Flexible Active-Mode Period Scheme for Telemedicine". Indonesian Journal of Computing, Engineering and Design (IJoCED) 5, n. 2 (3 ottobre 2023): 57. http://dx.doi.org/10.35806/ijoced.v5i2.315.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Challenges associated with transmitter node during the process of intelligent transceiver nodes attempting to be active state after receiving a message outside its time slot schedule which might result in energy depletion through receiver node are the most notable origin of excessive energy consumption in the system. Various methods have been carried out to minimize the overhead cost. In this article, we presented the Dynamic Network using Adaptive Wake-Up Interval Media Access Control (MAC) protocol for Wireless Body Area Networks (WBANs) for telemedicine which could lead to the minimization of the energy consumption in the network and maximization of network lifetime. A Receiver Controlled mechanism balances the number of wake-up periods between Receiver node and Transmitter nodes and estimation of traffic load. This article depicts no earlier examination of dynamic network using Flexible Active-Mode period scheme-based media access control protocol for WBAN. Therefore, this review work could lead to the improvement of dynamic network Flexible Active-Mode –media access control protocols and invigorate a clearer way of finding AWI-Media Access Control protocol problems.
26

Bollapragada Subrahmanya, Vikas, e Harlan B. Russell. "RMTS: A Novel Approach to Transmission Scheduling in Ad Hoc Networks by Salvaging Unused Slot Transmission Assignments". Wireless Communications and Mobile Computing 2018 (12 dicembre 2018): 1–13. http://dx.doi.org/10.1155/2018/2484897.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In mobile ad hoc networks (MANETs) there is no centralized supervision over the network operations. In such networks, it is imperative to have protocols that are implemented locally in a distributed manner. To achieve high network performance utilizing only the wireless channels a distributed transmission-scheduling medium-access control (MAC) protocol is desirable. This type of protocol can guarantee a certain level of quality of service (QOS) and works well in congested networks. However, the transmission schedules are often decided in advance and if a node does not have a packet to transmit in its assigned slot then the slot is unused. We propose a protocol called recovering minislots transmission scheduling (RMTS) that salvages these unused transmission slots that would have otherwise been wasted. We show that the proposed protocol produces significant improvements in network performance over traditional transmission-scheduling approaches.
27

Alahmadi, Hanan, e Fatma Boabdullah. "A Review of Multi-Channel Medium Access Control Protocols for Wireless Sensor Networks". European Journal of Engineering and Technology Research 6, n. 6 (18 settembre 2021): 39–53. http://dx.doi.org/10.24018/ejeng.2021.6.6.2222.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Wireless Sensor Networks (WSNs) are witnessing a momentum spread especially with the growth of the Internet of Things (IoT) paradigm. Indeed, WSNs are considered as the main enabling infrastructure for IoT networks. Nowadays, the emerging WSNs applications require not only long network lifespan but also considerably high data rate. Consequently, conceiving Multichannel MAC protocols that save the scarceenergy budget of sensor nodes while providing high network throughput is crucial for the emerging WSNs applications. In this paper, a thorough review of recent multichannel MAC protocols is provided along with a classification framework to deeply understand the design aspects for each protocol.
28

Alahmadi, Hanan, e Fatma Boabdullah. "A Review of Multi-Channel Medium Access Control Protocols for Wireless Sensor Networks". European Journal of Engineering and Technology Research 6, n. 6 (18 settembre 2021): 39–53. http://dx.doi.org/10.24018/ejers.2021.6.6.2222.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Wireless Sensor Networks (WSNs) are witnessing a momentum spread especially with the growth of the Internet of Things (IoT) paradigm. Indeed, WSNs are considered as the main enabling infrastructure for IoT networks. Nowadays, the emerging WSNs applications require not only long network lifespan but also considerably high data rate. Consequently, conceiving Multichannel MAC protocols that save the scarceenergy budget of sensor nodes while providing high network throughput is crucial for the emerging WSNs applications. In this paper, a thorough review of recent multichannel MAC protocols is provided along with a classification framework to deeply understand the design aspects for each protocol.
29

Zheng, Linfeng, Juncheng Hu e Yingjun Jiao. "A Cross-Layer Media Access Control Protocol for WBANs". Sustainability 15, n. 14 (21 luglio 2023): 11381. http://dx.doi.org/10.3390/su151411381.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Wireless body area network (WBAN) is an emerging comprehensive technology that can deeply integrate with e-health and smart sports. As a wearable network, improving the quality of network service and user experience is crucial. Due to the miniaturized design of sensors, their available energy from batteries is limited, making the extension of their lifetime a key research challenge. Existing studies have proposed methods to improve energy efficiency, but there are still limitations in addressing dynamic adaptive aspects of differential energy distribution and channel conditions. In order to further extend the lifetime of sensor nodes and networks while ensuring quality of service, and to provide a reliable transmission mechanism for heterogeneous application data, this paper presents a cross-layer optimized MAC protocol mechanism. The protocol takes into account the transmission requirements of different types of data and redesigns the superframe. To improve the lifetime of nodes, we propose an energy-adaptive adjustment mechanism considering the channel conditions. At the same time, a cooperative transmission mechanism is proposed to further enhance network lifetime. In experiments conducted on two typical networks, compared to IEEE 802.15.6, the power adjustment scheme improves the network lifetime by 2.8 to 3.7 times, and the cooperative mechanism between nodes further increases the network lifetime by 17% to 44%. Our proposed scheme effectively extends the network lifetime while ensuring quality of service, avoiding frequent battery resets for users, and effectively improving the user experience quality.
30

Yousif, Samar T. "SIMULATION AND COMPARISON OF AD HOC NETWORKS ROUTING PROTOCOLS BASED ON OPNET". Iraqi Journal of Information and Communication Technology 5, n. 1 (29 aprile 2022): 42–49. http://dx.doi.org/10.31987/ijict.5.1.190.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Ad-hoc routing algorithm has always been a core problem in research of ad-hoc networks. In order to be able to deal with various routing protocol problems on an ad-hoc network like poor validity and large control overhead, this paper classify and compare ad-hoc network routing protocols through OPNET simulation tool and focus on testing two routing protocols' performance namely, table-driven and on-demand routing protocol. The Destination Sequenced Distance Vector routing protocol is the most used table-driven routing protocols, While AODV and DSR routing protocols are the two most used on-demand routing protocols. The performance of these three protocols is simulated with a variety of packet delivery functions, average end-to-end delays, and routing loads. These protocols are also analyzed and compared. The simulation results show that for a high mobility environment, the on-demand routing protocol is the best option.
31

Song, Yu, Zhigui Liu e Xiaoli He. "Hybrid PSO and Evolutionary Game Theory Protocol for Clustering and Routing in Wireless Sensor Network". Journal of Sensors 2020 (30 ottobre 2020): 1–20. http://dx.doi.org/10.1155/2020/8817815.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Compared with traditional networks, WSNs have more limited resources such as energy, communication, computing, and storage. The problem of how to achieve energy saving, extend network life cycle, and improve network performance under these limited resources has always been an issue of great interest in WSN research. However, existing protocols do not consider that sensor nodes within the BS threshold may not be clustered. These nodes can directly transmit data to the BS. This simplifies the cluster routing process of the entire WSN and saves more energy. This paper introduces an efficient, and energy-efficient, clustering and equalization routing protocol called the PSOLB-EGT protocol. This protocol introduces a new approach by combining improved particle swarm optimization (PSO) and evolutionary game theory (EGT) algorithms to address the problem of maximizing the network lifetime. The operation of the wireless sensor network is divided into an initialization phase and a data transmission phase. In the initialization phase of the wireless sensor network, the improved PSO algorithm is used to establish clusters and select CHs in areas other than the BS threshold. Entering the data transmission phase, we analyze this problem from the perspective of game theory. We use improved noncooperative evolutionary game theory to build models to solve the problem of the energy waste caused by routing congestion. The proposed PSOLB-EGT protocol is intensively experimented with a number of topologies in various network scenarios, and the results are compared with the well-known cluster-based routing protocols that include the swarm intelligence-based protocols. The obtained results prove that the proposed protocol has increased 9%, 8%, and 5% compared with the ABC-SD protocol in terms of network life, network coverage, and amount of data transmitted, respectively.
32

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati e M. Padmavathamma. "Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks". International Journal of Electrical and Computer Engineering (IJECE) 6, n. 6 (1 dicembre 2016): 2949. http://dx.doi.org/10.11591/ijece.v6i6.12560.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
<p>One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion. With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network. We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion.</p>
33

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati e M. Padmavathamma. "Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks". International Journal of Electrical and Computer Engineering (IJECE) 6, n. 6 (1 dicembre 2016): 2949. http://dx.doi.org/10.11591/ijece.v6i6.pp2949-2954.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
<p>One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion. With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network. We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion.</p>
34

Desai, Rahul M., B. P. Patil e Davinder Pal Sharma. "Routing Protocols for Mobile Ad Hoc Network - A Survey and Analysis". Indonesian Journal of Electrical Engineering and Computer Science 7, n. 3 (1 settembre 2017): 795. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp795-801.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
<p class="Default">Ad hoc networks are mobile wireless networks where each node is acting as a router. The existing routing protocols such as Destination sequences distance vector, Optimized list state routing protocols, Ad hoc on demand routing protocol, Ad hoc on demand multipath routing protocol, Dynamic source routing are optimized versions of distance vector or link state routing protocols. In this paper, existing protocols such as DSDV, AODV, AOMDV, OLSR and DSR are analyzed on 50 nodes Mobile Ad Hoc network with random mobility. Packet delivery ratio, delay, control overhead and throughput parameters are used for performance analysis.</p>
35

Mazinani, Sayyed Majid, e Sara Moshtaghi. "A NEW SPECTRUM AND ENERGY AWARE ROUTING PROTOCOL IN COGNITIVE RADIO SENSOR NETWORK". IIUM Engineering Journal 19, n. 2 (1 dicembre 2018): 118–33. http://dx.doi.org/10.31436/iiumej.v19i2.927.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
ABSTRACT: Cognitive radio sensor network (CRSN) is a new generation of communication systems that wants to solve the overcrowded spectrum utilization of the unlicensed bands. It has combined sensor networks and cognitive radio technology, so it has the challenges of energy restriction of sensors and also dynamic spectrum access of the cognitive radio network. On the other hand, considering both of these challenges in the routing protocol plays a basic role in network performance and we can’t apply the routing protocols that have been proposed for wireless sensor networks and cognitive radio networks, separately, in the CRSN. Therefore, this article has tried to provide a new spectrum and energy-aware routing protocol in which the source is able to choose the most stable route in the aspect of node residual energy or spectrum access probability. Not only can considering the nodal residual energy and spectrum access in the route discovery process avoid repetitive link failure, but it also can increase the network lifetime. This protocol has been compared with ESAC, SCR, ERP, and SER. The result of this comparison has shown that our protocol reduces end-to-end delay, control overhead, throughput, and lifetime in comparison to other protocols, especially in small-scale networks. ABSTRAK: Rangkaian sensor radio kognitif (CRSN) adalah generasi baru sistem telekomunikasi bagi menyelesaikan masalah kesesakan pada pemakaian band spektrum tidak berlesen. Ianya adalah kombinasi rangkaian sensor dan teknologi radio kognitif. Oleh itu, ia mempunyai cabaran sekatan tenaga pada sensor dan kemasukan spektrum secara dinamik pada rangkaian radio kognitif. Pada masa sama, dengan mengambil kira kedua-dua cabaran pada protokol rangkaian ini telah memainkan peranan asas pada prestasi rangkaian dan kami tidak boleh mengguna pakai protokol rangkaian yang telah diguna pakai pada rangkaian sensor tanpa wayar dan rangkaian radio kognitif secara asing dalam CRSN. Oleh itu, artikel ini cuba menyediakan spektrum baru dan pengawasan tenaga pada protokol rangkaian, di mana sumber boleh memilih laluan rangkaian yang stabil dengan mengambil kira pada aspek baki tenaga nod atau kebarangkalian akses spektrum. Selain itu, ianya dapat mengelakkan kegagalan laluan berulang juga menambahkan jangka hayat rangkaian. Protokol ini telah dibandingkan dengan ESAC, SCR, ERP dan SER. Perbandingan keputusan menunjukkan protokol ini mengurangkan kelewatan hujung-ke-hujung, mengawal kesesakan, mambaiki jumlah penghantaran dan menambah tempoh hayat berbanding protokol lain, khususnya pada rangkaian skala kecil.
36

Beg, Abdurrahman, Saud Mohammad Mostafa, AbdulAziz AbdulGhaffar, Tarek R. Sheltami e Ashraf Mahmoud. "An Adaptive and Spectrally Efficient Multi-Channel Medium Access Control Protocol for Dynamic ad Hoc Networks". Sensors 22, n. 22 (10 novembre 2022): 8666. http://dx.doi.org/10.3390/s22228666.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Medium access control (MAC) protocols in ad hoc networks have evolved from single-channel independent transmission mechanisms to multi-channel concurrent mechanisms to efficiently manage the demands placed on modern networks. The primary aim of this study is to compare the performance of popular multi-channel MAC (MMAC) protocols under saturated network traffic conditions and propose improvements to the protocols under these conditions. A novel, dynamically adaptive MMAC protocol was devised to take advantage of the performance capabilities of the evaluated protocols in changing wireless ad hoc network conditions. A simulation of the familiar MAC protocols was developed based on a validated simulation of the IEEE 802.11 standard. Further, the behaviors and performances of these protocols are compared against the proposed MMAC protocols with a varying number of ad hoc stations and concurrent wireless channels in terms of throughput, Jain’s fairness index, and channel access delay. The results show that the proposed MMAC protocol, labeled E-SA-MMAC, outperforms the existing protocols in throughput by up to 11.9% under a constrained number of channels and in channel access delays by up to 18.3%. It can be asserted from these observations that the proposed approach provides performance benefits against its peers under saturated traffic conditions and other factors, such as the number of available wireless channels, and is suitable for dynamic ad hoc network deployments.
37

Prabhu. M, Mr Dinesh, e Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach". International Journal of Engineering and Computer Science 10, n. 12 (15 dicembre 2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work. Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques
38

Hu, Yao, Ting Peng e Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks". Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
39

Lee, Woonghee, Joon Lee, Jiyeon Lee, Kangho Kim, Seungho Yoo, Seongjoon Park e Hwangnam Kim. "Ground Control System Based Routing for Reliable and Efficient Multi-Drone Control System". Applied Sciences 8, n. 11 (23 ottobre 2018): 2027. http://dx.doi.org/10.3390/app8112027.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Various unmanned aerial vehicles (UAVs), also called drones, have developed based on advances in hardware and software technologies. Thus, service providers in diverse areas have tried to utilize drones to create more effective solutions. In many cases, employing multiple drones is more effective to perform the given mission than using a single drone. To utilize multiple drones, the drones should be strongly connected, but it is not trivial to construct reliable and efficient networks for drones due to their high mobility. Therefore, we propose a ground control system (GCS) routing protocol (GCS-routing) to overcome this limitation and provide reliable and efficient multi-drone control system, where GCS-routing maximizes GCS utilization. GCS is the essential component of flying ad-hoc network (FANET) and can obtain information about drones. Using this information, GCS-routing can provide more effective routing, predict any topology changes, and react immediately. GCS-routing does not issue any periodic HELLO message for neighbor discovery or link cost estimation, which significantly enhances network performance. We implemented GCS-routing on real drones, and applied GCS-routing to actual drone fleets, as well as simulations to evaluate GCS-routing performance. The results clearly identify the advantages of the proposed routing protocol for drone networks compared with current routing protocols.
40

Elzain e Wu. "Software Defined Wireless Mesh Network Flat Distribution Control Plane". Future Internet 11, n. 8 (25 luglio 2019): 166. http://dx.doi.org/10.3390/fi11080166.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Wireless Mesh Networks (WMNs), have a potential offering relatively stable Internet broadband access. The rapid development and growth of WMNs attract ISPs to support users’ coverage anywhere anytime. To achieve this goal network architecture must be addressed carefully. Software Defined Networking (SDN) proposes new network architecture for wired and wireless networks. Software Defined Wireless Networking (SDWN) has a great potential to increase efficiency, ease the complexity of control and management, and accelerate technology innovation rate of wireless networking. An SDN controller is the core component of an SDN network. It needs to have updated reports of the network status change, as in network topology and quality of service (QoS) in order to effectively configure and manage the network it controls. In this paper, we propose Flat Distributed Software Defined Wireless Mesh Network architecture where the controller aggregates entire topology discovery and monitors QoS properties of extended WMN nodes using Link Layer Discovery Protocol (LLDP) protocol, which is not possible in multi-hop ordinary architectures. The proposed architecture has been implemented on top of POX controller and Advanced Message Queuing Protocol (AMQP) protocol. The experiments were conducted in a Mininet-wifi emulator, the results present the architecture control plane consistency and two application cases: topology discovery and QoS monitoring. The current results push us to study QoS-routing for video streaming over WMN.
41

Syamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris e Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks". Indonesian Journal of Electrical Engineering and Computer Science 22, n. 2 (1 maggio 2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.</p>
42

Kim, Young-Chon, e Ho-Sook Lee. "A Collision-Free Reservation Protocol for WDM Optical Star Networks". Journal of Circuits, Systems and Computers 07, n. 05 (ottobre 1997): 459–69. http://dx.doi.org/10.1142/s0218126697000346.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
WDM single-hop networks allow a pair of nodes to exchange data packets directly and require an efficient protocol that coordinates the process of data transmission. However, the network performance with such protocols can be deteriorated by collisions that occur on control channel, data channel, destination node and source node. We present a Collision-Free Reservation Protocol (CFRP) for WDM single-hop networks with a passive optical star coupler. To eliminate all causes of collision, the CFRP properly distributes the transmission schedule both in time (position of data channel on the time axis) and space (wavelength of data channel to be used). Compared with the previous reservation-based protocols, the proposed CFRP enhances the overall network performance. This improvement in terms of network throughput and delay is verified by simulation.
43

Golański, Marcin, Radosław O. Schoeneich, Dawid Zgid, Marek Franciszkiewicz e Michał Kucharski. "RBCP-WSN: The Reliable Biderectional Control Protocol for Wireless Sensor Networks". International Journal of Electronics and Telecommunications 63, n. 2 (27 giugno 2017): 201–7. http://dx.doi.org/10.1515/eletel-2017-0027.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Abstract This paper presents the Reliable Bidirectional Control Protocol (RBCP) protocol, which is a transport protocol for Wireless Sensor Networks (WSN), focused on managing sensors’ behaviour. It aims to be a utility for reliable control data transferring from source to destination unit in the network. Considering the related studies on transport protocols, which are mostly dedicated to a single-direction reliable data transport, RBCP is the answer for the lack of control mechanisms in WSNs based on bidirectional communication. The first part of this paper is focused on general presentation of the proposed solution. In the next part, evaluation of the idea and final functionality are discussed. It will finally show the results of undergone testing stage.
44

Díaz-Cacho Medina, Miguel, Emma Delgado Romero e Antonio Barreiro Blas. "Control/Network Codesign Basics for IP-Based Shared Networks". Mathematical Problems in Engineering 2011 (2011): 1–23. http://dx.doi.org/10.1155/2011/239512.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Network and control relationship is an essential aspect in the design of networked control systems (NCSs). The design parameters are mainly centered in the transmission rate and in the packet structure, and some studies have been made to determine how transmission rate affects the network delay and consequently the stability of the control. In Internet, these analysis are mathematically complex due to the large number of different potential scenarios. Using empirical methods, this work deduces that the transmission scheduling problem of an NCS can be solved by designing an appropriate transport protocol, taken into account high and periodic sampling rates. The transport protocol features are determined by simulation, using a new test platform based on the NS2 network simulation suite, to develop control/network codesign solutions. Conclusions of this paper are that the transport features are packet-loss-based flow control, best effort, and fairness, supplemented by a packet priority scheme.
45

Jabbar, Mohanad Sameer, e Samer Saeed Issa. "Developed cluster-based load-balanced protocol for wireless sensor networks based on energy-efficient clustering". Bulletin of Electrical Engineering and Informatics 12, n. 1 (1 febbraio 2023): 196–206. http://dx.doi.org/10.11591/eei.v12i1.4226.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
One of the most pressing issues in wireless sensor networks (WSNs) is energy efficiency. Sensor nodes (SNs) are used by WSNs to gather and send data. The techniques of cluster-based hierarchical routing significantly considered for lowering WSN’s energy consumption. Because SNs are battery-powered, face significant energy constraints, and face problems in an energy-efficient protocol designing. Clustering algorithms drastically reduce each SNs energy consumption. A low-energy adaptive clustering hierarchy (LEACH) considered promising for application-specifically protocol architecture for WSNs. To extend the network's lifetime, the SNs must save energy as much as feasible. The proposed developed cluster-based load-balanced protocol (DCLP) considers for the number of ideal cluster heads (CHs) and prevents nodes nearer base stations (BSs) from joining the cluster realization for accomplishing sufficient performances regarding the reduction of sensor consumed energy. The analysis and comparison in MATLAB to LEACH, a well-known cluster-based protocol, and its modified variant distributed energy efficient clustering (DEEC). The simulation results demonstrate that network performance, energy usage, and network longevity have all improved significantly. It also demonstrates that employing cluster-based routing protocols may successfully reduce sensor network energy consumption while increasing the quantity of network data transfer, hence achieving the goal of extending network lifetime.
46

Li, Suipeng, e Dan Shen. "Wireless Music Playing Buzzer Sensor-Assisted Music Tone Adaptive Control". Journal of Sensors 2022 (2 febbraio 2022): 1–11. http://dx.doi.org/10.1155/2022/9002533.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Aiming at the problem of adaptive change of auxiliary music tones, this paper proposes a MAC protocol with a common music tone listening/sleeping type based on a wireless music buzzer sensor. First of all, the new MAC protocol adopts network-wide synchronization, and all sensor nodes in the entire network use the same scheduling table, so that the entire network nodes enter the music tone listening period and the sleep period at the same time. Secondly, the node adaptively adjusts the duty cycle of the node according to the number of data packets in the sending queue, increases the node’s music tone listening time, reduces the end-to-end delay of data packets, and improves the throughput of the network. Then, the experiment adopts a new backoff strategy to adjust the contention window according to the backoff times and collision times of data packets sent by nodes in the last five working cycles, increase the backoff time of sending data packets under high network load, and reduce the appearance of data packets. We build four simulation experiments on the NS2 simulation platform: unassisted music tone adaptive network, single auxiliary music tone adaptive network, auxiliary music tone adaptive convergence network, and random deployment network, which will be based on the auxiliary music tone adaptive MAC protocol, and IEEE802.11 protocol and SMAC protocol are run in four simulation experiments, respectively, and the performance of the three protocols is analyzed according to the tracking files in the simulation experiment. The analysis results show that the simulation wireless sounding buzzer sensor network is adaptive to different auxiliary music tones and different topologies.
47

Onyema, Edeh Michael, M. Anand Kumar, Sundaravadivazhagn Balasubaramanian, Salil Bharany, Ateeq Ur Rehman, Elsayed Tag Eldin e Muhammad Shafiq. "A Security Policy Protocol for Detection and Prevention of Internet Control Message Protocol Attacks in Software Defined Networks". Sustainability 14, n. 19 (22 settembre 2022): 11950. http://dx.doi.org/10.3390/su141911950.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Owing to the latest advancements in networking devices and functionalities, there is a need to build future intelligent networks that provide intellectualization, activation, and customization. Software-defined networks (SDN) are one of the latest and most trusted technologies that provide a method of network management that provides network virtualization. Although traditional networks still have a strong presence in the industry, software-defined networks have begun to replace them at faster rates. When network technologies emerge at a steady rate, SDN will be implemented at higher rates in the upcoming years in all fields. Although SDN technology removes the complexity of tying control and data plane together over traditional networks, certain aspects such as security, controllability, and economy of network resources are vulnerable. Among these aspects, security is one of the main concerns that are to be viewed seriously as far as the applications of SDN are concerned. This paper presents the most recent security issues SDN environment followed by preventive mechanisms. This study focuses on Internet control message protocol (ICMP) attacks in SDN networks. This study proposes a security policy protocol (SPP) to detect attacks that target devices such as switches and the SDN controller in the SDN networks. The mechanism is based on ICMP attacks, which are the main source of flooding attacks in the SDN networks. The proposed model focuses on two aspects: security policy process verification and client authentication verification. Experimental results shows that the proposed model can effectively defend against flooding attacks in SDN network environments.
48

Leonardi, Luca, Lucia Lo Bello, Gaetano Patti, Alessio Pirri e Mattia Pirri. "Combined Use of LoRaWAN Medium Access Control Protocols for IoT Applications". Applied Sciences 13, n. 4 (11 febbraio 2023): 2341. http://dx.doi.org/10.3390/app13042341.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The low power wide area networks (LPWANs) based on the LoRaWAN standard are suitable for Internet of Things (IoT) applications that involve a large number of low-power devices distributed over large areas. The LoRaWAN standard imposes some limitations on end-device configuration, such as the medium access strategies to be adopted, which depend on the region in which the network operates. In particular, in Europe, according to the ETSI regulations, a LoRaWAN end-device can use either a pure ALOHA medium access control (MAC) protocol or a polite medium access technique based on Listen Before Talk (LBT) Adaptive Frequency Agility (AFA). The aim of this work is to investigate the combined use of the two MAC protocols in the same LoRaWAN network. In particular, the work presents a simulative assessment of a LoRaWAN network that combines the use of Pure ALOHA and LBT AFA in realistic scenarios, under different workloads, when they work in compliance with the ETSI regulations. The work provides quantitative information that can help the network designer choose which protocol is more suitable for achieving the desired performance.
49

Wei, Xiaohui, Hao Guo, Xingwang Wang, Xiaonan Wang, Chu Wang, Mohsen Guizani e Xiaojiang Du. "A Co-Design-Based Reliable Low-Latency and Energy-Efficient Transmission Protocol for UWSNs". Sensors 20, n. 21 (8 novembre 2020): 6370. http://dx.doi.org/10.3390/s20216370.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
Recently, underwater wireless sensor networks (UWSNs) have been considered as a powerful technique for many applications. However, acoustic communications in UWSNs bring in huge QoS issues for time-critical applications. Additionally, excessive control packets and multiple copies during the data transmission process exacerbate this challenge. Faced with these problems, we propose a reliable low-latency and energy-efficient transmission protocol for dense 3D underwater wireless sensor networks to improve the QoS of UWSNs. The proposed protocol exploits fewer control packets and reduces data-packet copies effectively through the co-design of routing and media access control (MAC) protocols. The co-design method is divided into two steps. First, the number of handshakes in the MAC process will be greatly reduced via our forwarding-set routing strategy under the guarantee of reliability. Second, with the help of information from the MAC process, network-update messages can be used to replace control packages through mobility prediction when choosing a route. Simulation results show that the proposed protocol has a considerably higher reliability, and lower latency and energy consumption in comparison with existing transmission protocols for a dense underwater wireless sensor network.
50

Priyanka, D., e Krishna Y. K. Sundara. "Analysis of transmission control protocol in next generation networks". i-manager’s Journal on Wireless Communication Networks 11, n. 2 (2023): 23. http://dx.doi.org/10.26634/jwcn.11.2.19295.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Abstract (sommario):
The Next Generation Network (NGN) is a telecommunications system that converges all services and information into packets for transfer, accommodating technical advancements high-speed and diversified services through its multilayer architecture. The NGN enables users to consistently and efficiently obtain services, and 5G cellular communication is a viable technology to meet the demand for high data rates in the future, particularly with its mmwave capacity. However, one of the major problems that the new generation faces is non-line-of-sight status, which results from higher frequencies' extreme vulnerability to interference from obstructions and misalignment. This special property makes it more difficult for the widely used Transmission Control Protocol (TCP) to achieve good throughput and low latency across an equitable network. TCP must modify the congestion window size in accordance with the state of the network, but it is unable to effectively adapt to its congestion window, resulting in degradation of the protocol's throughput. This research presents an in-depth analysis of trustworthy communications in 5G networks, examining how TCP affects 5G mmWave networks, the mechanisms and parameters of TCP that portrays the behavior of 5G networks, and a study of the existing problems, and ideas to be fixed. It also suggests a viable study of different methods to enhance reliable communications in 5G networks.

Vai alla bibliografia