Статті в журналах з теми "Application layer protocol"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Application layer protocol.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Application layer protocol".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

G. Hamid, Harth, and Zainab T. Alisa. "A survey on IoT application layer protocols." Indonesian Journal of Electrical Engineering and Computer Science 21, no. 3 (March 10, 2021): 1663. http://dx.doi.org/10.11591/ijeecs.v21.i3.pp1663-1672.

Повний текст джерела
Анотація:
<span>The constant evolution in internet technology has made. The internet of things (IoT) to be the center of research fields in computer engineering. This review paper discusses the choice of an application layer protocol in an IoT system integration so first, the paper briefly defines the potential protocols. After that, it opens up a comparison between these protocols according to how they manage their overhead and messages which affects traffic management and thus starts the discussion. The main contribution of this work is the simplification of comparison between session layer protocols in the benefit of IoT applications exclusively. IoT system Standards and platforms are being improved constantly. IoT enables application devices to connect and coordinate their tacks, such applications like healthcare, smart home, and industrial automation. Several protocols have been discussed to provide effective communication for resource-limited devices. However, their traffic management is still a field for researches, to find the optimal protocol choice for different situations. The review collects the results of other works that experimentally compared application layer protocols in the IoT environment and presents the graphical and tabular compression. Finally, the conclusion summarize the choice in different applications.</span>
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kumar, Rajesh. "COMPUTER NETWORK -- APPLICATION LAYER PROTOCOL." International Journal of Advanced Research 4, no. 6 (June 30, 2016): 51–63. http://dx.doi.org/10.21474/ijar01/760.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hosseini, Mojtaba, and Nicolas D. Georganas. "End System Multicast Protocol for Collaborative Virtual Environments." Presence: Teleoperators and Virtual Environments 13, no. 3 (June 2004): 263–78. http://dx.doi.org/10.1162/1054746041422325.

Повний текст джерела
Анотація:
IP Multicasting has been a crucial requirement of many scalable networked virtual environments by providing an efficient network mechanism through which a sender can transmit its information to a large number of receivers without having to send multiple copies of the same data over a physical link. The widespread deployment of IP Multicast has been slow due to some yet unresolved issues, prompting recent efforts in the development of multicasting protocols at the application layer instead of at the network layer. Most of these protocols address the case of a single source streaming media to a large number of receivers in applications such as video-on-demand or live broadcast. Collaborative and distributed virtual environments exhibit different characteristics that in turn necessitate a different set of requirements for application layer multicast protocols. This paper presents an introduction to application layer multicasting as it relates to distributed and collaborative virtual environments and the development of our own end system multicast protocol for multi-sender virtual teleconference applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Xie, Bai Lin, and Sheng Yi Jiang. "Detecting Application-Layer Attacks Based on User's Application-Layer Behaviors." Applied Mechanics and Materials 411-414 (September 2013): 607–12. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.607.

Повний текст джерела
Анотація:
This paper presents an application-layer attack detection method based on user’s application-layer behaviors. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-Markov model is used to describe the application-layer behaviors of a normal user who is using the application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Sangheon Pack, Kunwoo Park, Taekyoung Kwon, and Yanghee Choi. "SAMP: scalable application-layer mobility protocol." IEEE Communications Magazine 44, no. 6 (June 2006): 86–92. http://dx.doi.org/10.1109/mcom.2006.1668425.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

KITAGAWA, Takahisa, Miyuki HANAOKA, and Kenji KONO. "A State-Aware Protocol Fuzzer Based on Application-Layer Protocols." IEICE Transactions on Information and Systems E94-D, no. 5 (2011): 1008–17. http://dx.doi.org/10.1587/transinf.e94.d.1008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Cai, Jun, Jian-Zhen Luo, and Fangyuan Lei. "Analyzing Network Protocols of Application Layer Using Hidden Semi-Markov Model." Mathematical Problems in Engineering 2016 (2016): 1–14. http://dx.doi.org/10.1155/2016/9161723.

Повний текст джерела
Анотація:
With the rapid development of Internet, especially the mobile Internet, the new applications or network attacks emerge in a high rate in recent years. More and more traffic becomes unknown due to the lack of protocol specifications about the newly emerging applications. Automatic protocol reverse engineering is a promising solution for understanding this unknown traffic and recovering its protocol specification. One challenge of protocol reverse engineering is to determine the length of protocol keywords and message fields. Existing algorithms are designed to select the longest substrings as protocol keywords, which is an empirical way to decide the length of protocol keywords. In this paper, we propose a novel approach to determine the optimal length of protocol keywords and recover message formats of Internet protocols by maximizing the likelihood probability of message segmentation and keyword selection. A hidden semi-Markov model is presented to model the protocol message format. An affinity propagation mechanism based clustering technique is introduced to determine the message type. The proposed method is applied to identify network traffic and compare the results with existing algorithm.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

XIE, Bai-Lin, and Shun-Zheng YU. "Application Layer Real-time Proactive Defense System Based on Application Layer Protocol Analysis." Chinese Journal of Computers 34, no. 3 (May 19, 2011): 452–63. http://dx.doi.org/10.3724/sp.j.1016.2011.00452.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Повний текст джерела
Анотація:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Suherman, S., Naemah Mubarakah, and Marwan Al-Akaidi. "Minimizing Energy Consumption on Mobile Phone by Rearranging Transport Protocol Load." International Journal of Engineering & Technology 7, no. 3.2 (June 20, 2018): 713. http://dx.doi.org/10.14419/ijet.v7i3.2.15350.

Повний текст джерела
Анотація:
There are two transport layer protocols that have been used in the internet protocol (IP) networks: Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Both protocols have been utilized for video streaming applications. This paper examines energy consumed by a mobile device when TCP or UDP employed by the application within it for streaming a video file. A transport protocol load management is proposed to reduce the mobile device energy consumptions. The experiments were conducted in the 802.11 environment. The results show that the proposed method is able to minimize mobile device energy consumptions up to 10.7% and 3.34% for both TCP and UDP protocols.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Kanellopoulos, Dimitris N., and Ali H. Wheeb. "Simulated Performance of TFRC, DCCP, SCTP, and UDP Protocols Over Wired Networks." International Journal of Interdisciplinary Telecommunications and Networking 12, no. 4 (October 2020): 88–103. http://dx.doi.org/10.4018/ijitn.2020100107.

Повний текст джерела
Анотація:
Multimedia applications impose different QoS requirements (e.g., bounded end-to-end delay and jitter) and need an enhanced transport layer protocol that should handle packet loss, minimize errors, manage network congestion, and transmit efficiently. Across an IP network, the transport layer protocol provides data transmission and affects the QoS provided to the application on hand. The most common transport layer protocols used by Internet applications are TCP and UDP. There are also advanced transport layer protocols such as DCCP and TFRC. The authors evaluated the performance of UDP, DCCP, SCTP, and TFRC over wired networks for three traffic flows: data transmission, video streaming, and voice over IP. The evaluation criteria were throughput, end-to-end delay, and packet loss ratio. They compared their performance to learn in which traffic flow/service each of these protocols functions better than the others. The throughput of SCTP and TFRC is better than UDP. DCCP is superior to SCTP and TFRC in terms of end-to-end delay. SCTP is suitable for Internet applications that require high bandwidth.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Ji, Qiang, Shifeng Zhang, and Haoguang Zhao. "Research on Spacecraft Integrated Electronic System Architecture Based on Information Fusion." MATEC Web of Conferences 228 (2018): 01018. http://dx.doi.org/10.1051/matecconf/201822801018.

Повний текст джерела
Анотація:
This paper has designed the integrated electronic system and protocol architecture based on the standard of Consultative Committee for Space Data Systems (CCSDS) and European Communication Satellite System (ECSS). The application layer, application support layer, transport layer and sub network layer in the architecture can be described in detail, and the functions can be realized through the combination of various business and protocols. The architecture can provide technical support for the intellectualization and networking of spacecraft, standardize the spacecraft interface and protocol, it can promote the generalization of spacecraft equipment and software, and provide more flexible and powerful functions for the spacecraft.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Wheeb, Ali Hussein. "Performance Evaluation of UDP, DCCP, SCTP and TFRC for Different Traffic Flow in Wired Networks." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (December 1, 2017): 3552. http://dx.doi.org/10.11591/ijece.v7i6.pp3552-3557.

Повний текст джерела
Анотація:
<p>The demand for internet applications has increased rapidly. Providing quality of service (QoS) requirements for varied internet application is a challenging task. One important factor that is significantly affected on the QoS service is the transport layer. The transport layer provides end-to-end data transmission across a network. Currently, the most common transport protocols used by internet application are TCP (Transmission Control Protocol) and UDP (User Datagram Protocol). Also, there are recent transport protocols such as DCCP (data congestion control protocol), SCTP (stream congestion transmission protocol), and TFRC (TCP-friendly rate control), which are in the standardization process of Internet Engineering Task Force (IETF). In this paper, we evaluate the performance of UDP, DCCP, SCTP and TFRC protocols for different traffic flows: data transmission, video traffic, and VOIP in wired networks. The performance criteria used for this evaluation include throughput, end to end delay, and packet loss rate. Well-known network simulator NS-2 used to implement the UDP, DCCP, SCTP, and TFRC protocols performance comparison. Based on the simulation results, the performance throughput of SCTP and TFRC is better than UDP. Moreover, DCCP performance is superior SCTP and TFRC in term of end-to-end delay.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Fong, K., and J. Reinstedler. "Development of an OSI application layer protocol interface." ACM SIGCOMM Computer Communication Review 19, no. 3 (July 1989): 21–57. http://dx.doi.org/10.1145/74674.74676.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Oliveira, Luiz, Joel Rodrigues, Sergei Kozlov, Ricardo Rabêlo, and Victor Albuquerque. "MAC Layer Protocols for Internet of Things: A Survey." Future Internet 11, no. 1 (January 14, 2019): 16. http://dx.doi.org/10.3390/fi11010016.

Повний текст джерела
Анотація:
Due to the wide variety of uses and the diversity of features required to meet an application, Internet of Things (IoT) technologies are moving forward at a strong pace to meet this demand while at the same time trying to meet the time-to-market of these applications. The characteristics required by applications, such as coverage area, scalability, transmission data rate, and applicability, refer to the Physical and Medium Access Control (MAC) layer designs of protocols. This paper presents a deep study of medium access control (MAC) layer protocols that are used in IoT with a detailed description of such protocols grouped (by short and long distance coverage). For short range coverage protocols, the following are considered: Radio Frequency Identification (RFID), Near Field Communication (NFC), Bluetooth IEEE 802.15.1, Bluetooth Low Energy, IEEE 802.15.4, Wireless Highway Addressable Remote Transducer Protocol (Wireless-HART), Z-Wave, Weightless, and IEEE 802.11 a/b/g/n/ah. For the long range group, Narrow Band IoT (NB-IoT), Long Term Evolution (LTE) CAT-0, LTE CAT-M, LTE CAT-N, Long Range Protocol (LoRa), and SigFox protocols are studied. A comparative study is performed for each group of protocols in order to provide insights and a reference study for IoT applications, considering their characteristics, limitations, and behavior. Open research issues on the topic are also identified.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Mrabet, Hichem, Sana Belguith, Adeeb Alhomoud, and Abderrazak Jemai. "A Survey of IoT Security Based on a Layered Architecture of Sensing and Data Analysis." Sensors 20, no. 13 (June 28, 2020): 3625. http://dx.doi.org/10.3390/s20133625.

Повний текст джерела
Анотація:
The Internet of Things (IoT) is leading today’s digital transformation. Relying on a combination of technologies, protocols, and devices such as wireless sensors and newly developed wearable and implanted sensors, IoT is changing every aspect of daily life, especially recent applications in digital healthcare. IoT incorporates various kinds of hardware, communication protocols, and services. This IoT diversity can be viewed as a double-edged sword that provides comfort to users but can lead also to a large number of security threats and attacks. In this survey paper, a new compacted and optimized architecture for IoT is proposed based on five layers. Likewise, we propose a new classification of security threats and attacks based on new IoT architecture. The IoT architecture involves a physical perception layer, a network and protocol layer, a transport layer, an application layer, and a data and cloud services layer. First, the physical sensing layer incorporates the basic hardware used by IoT. Second, we highlight the various network and protocol technologies employed by IoT, and review the security threats and solutions. Transport protocols are exhibited and the security threats against them are discussed while providing common solutions. Then, the application layer involves application protocols and lightweight encryption algorithms for IoT. Finally, in the data and cloud services layer, the main important security features of IoT cloud platforms are addressed, involving confidentiality, integrity, authorization, authentication, and encryption protocols. The paper is concluded by presenting the open research issues and future directions towards securing IoT, including the lack of standardized lightweight encryption algorithms, the use of machine-learning algorithms to enhance security and the related challenges, the use of Blockchain to address security challenges in IoT, and the implications of IoT deployment in 5G and beyond.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Tripathi, Nikhil, and Neminath Hubballi. "Application Layer Denial-of-Service Attacks and Defense Mechanisms." ACM Computing Surveys 54, no. 4 (May 2021): 1–33. http://dx.doi.org/10.1145/3448291.

Повний текст джерела
Анотація:
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities of the protocol implementation or its design. Unlike volumetric DoS attacks, these are stealthy in nature and target a specific application running on the victim. There are several attacks discovered against popular application layer protocols in recent years. In this article, we provide a structured and comprehensive survey of the existing application layer DoS attacks and defense mechanisms. We classify existing attacks and defense mechanisms into different categories, describe their working, and compare them based on relevant parameters. We conclude the article with directions for future research.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Begum, Seema, Yao Nianmin, Syed Bilal Hussain Shah, Asrin Abdollahi, Inam Ullah Khan, and Liqaa Nawaf. "Source Routing for Distributed Big Data-Based Cognitive Internet of Things (CIoT)." Wireless Communications and Mobile Computing 2021 (July 29, 2021): 1–10. http://dx.doi.org/10.1155/2021/5129396.

Повний текст джерела
Анотація:
Dynamic opportunistic channel access with software-defined radio at a network layer in distributed cognitive IoT introduces a concurrent channel selection along with end-to-end route selection for application data transmission. State-of-the-art cognitive IoT big data-based routing protocols are not explored in terms of how the spectrum management is being coordinated with the network layer for concurrent channel route selection during end-to-end channel route discovery for data transmission of IoT and big data applications. In this paper, a reactive big data-based “cognitive dynamic source routing protocol” is proposed for cognitive-based IoT networks to concurrently select the channel route at the network layer from source to destination. Experimental results show that the proposed protocol cognitive DSR with concurrent channel route selection criteria is outperformed. This will happen when it is compared with the existing distributed cognitive DSR with independent channel route application data transmission.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Nebbione, Giuseppe, and Maria Carla Calzarossa. "Security of IoT Application Layer Protocols: Challenges and Findings." Future Internet 12, no. 3 (March 17, 2020): 55. http://dx.doi.org/10.3390/fi12030055.

Повний текст джерела
Анотація:
IoT technologies are becoming pervasive in public and private sectors and represent presently an integral part of our daily life. The advantages offered by these technologies are frequently coupled with serious security issues that are often not properly overseen or even ignored. The IoT threat landscape is extremely wide and complex and involves a wide variety of hardware and software technologies. In this framework, the security of application layer protocols is of paramount importance since these protocols are at the basis of the communications among applications and services running on different IoT devices and on cloud/edge infrastructures. This paper offers a comprehensive survey of application layer protocol security by presenting the main challenges and findings. More specifically, the paper focuses on the most popular protocols devised in IoT environments for messaging/data sharing and for service discovery. The main threats of these protocols as well as the Common Vulnerabilities and Exposures (CVE) for their products and services are analyzed and discussed in detail. Good practices and measures that can be adopted to mitigate threats and attacks are also investigated. Our findings indicate that ensuring security at the application layer is very challenging. IoT devices are exposed to numerous security risks due to lack of appropriate security services in the protocols as well as to vulnerabilities or incorrect configuration of the products and services being deployed. Moreover, the constrained capabilities of these devices affect the types of security services that can be implemented.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Huang, Chia Hui, Kai Wei Ke, and Ho Ting Wu. "Performance of Multisource Application Layer Multicast Routing: A Cost-Based Approach." Advanced Materials Research 341-342 (September 2011): 617–22. http://dx.doi.org/10.4028/www.scientific.net/amr.341-342.617.

Повний текст джерела
Анотація:
In this work, a simulative study on the cost of multisource ALM routing protocols is presented. The authors discuss a multiplicative pricing model for multisource ALM based on the single-source cost model. By simulating various ALM protocols, the study discovered that a multiplicative characteristic is held between the cost of single-source and multisource ALM routing. The multiplicative pricing model makes the minimum cost of multisource ALM more clear for protocol designer and gives a intuitive way to examine the cost of a designed multisource ALM without incurring too many computation complexity.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Xie, Bai Lin, and Qian Sheng Zhang. "Detecting Application-Layer Attacks Based on Hidden Semi-Markov Models." Applied Mechanics and Materials 631-632 (September 2014): 923–27. http://dx.doi.org/10.4028/www.scientific.net/amm.631-632.923.

Повний текст джерела
Анотація:
This paper presents an application-layer attack detection method based on hidden semi-markov models. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-markov model is used to describe the application-layer behaviors of a normal user who is using some application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Larmo, Anna, Antti Ratilainen, and Juha Saarinen. "Impact of CoAP and MQTT on NB-IoT System Performance." Sensors 19, no. 1 (December 20, 2018): 7. http://dx.doi.org/10.3390/s19010007.

Повний текст джерела
Анотація:
The IoT protocols used for data transfer in the application layer, namely the Constraint Application Protocol (CoAP) and Message Queue Telemetry Transport (MQTT) have dependencies to the transport layer. The choice of transport, Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), on the other hand, has an impact on the Internet of Things (IoT) application level performance, especially over a wireless medium. Furthermore, we touch upon the impact of different security solutions. The motivation of this work is to look at the impact of the protocol stack on performance over a narrowband IoT (NB-IoT) link. The use case studied is infrequent small reports sent from the sensor device to a central cloud storage over a last mile radio access link. We find that while CoAP/UDP based transport performs consistently better both in terms of latency, coverage, and system capacity, MQTT/TCP also works when the system is less loaded.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Luo, Jian-Zhen, Chun Shan, Jun Cai, and Yan Liu. "IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering." Symmetry 10, no. 11 (November 1, 2018): 561. http://dx.doi.org/10.3390/sym10110561.

Повний текст джерела
Анотація:
Fuzzing is regarded as the most promising method for protocol vulnerabilities discovering in network security of Internet of Things (IoT). However, one fatal drawback of existing fuzzing methods is that a huge number of test files are required to maintain a high test coverage. In this paper, a novel method based on protocol reverse engineering is proposed to reduce the amount of test files for fuzzing. The proposed method uses techniques in the field of protocol reverse engineering to identify message formats of IoT application-layer protocol and create test files by generating messages with error fields according to message formats. The protocol message treated as a sequence of bytes is assumed to obey a statistic process with change-points indicating the boundaries of message fields. Then, a multi-change-point detection procedure is introduced to identify change-points of byte sequences according to their statistic properties and divide them into segments according to their change-points. The message segments are further processed via a position-based occurrence probability test analysis to identify keyword fields, data fields and uncertain fields. Finally, a message generation procedure with mutation operation on message fields is applied to construct test files for fuzzing test. The results show that the proposed method can effectively find out the message fields and significantly reduce the amount of test files for fuzzing test.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Cheng, Yong, Lei Wen, Ling Yang, Wei Wang, Yong Zhou, and Feng Wang. "A Video Streaming Application Layer Multicast Protocol for WLAN." Advanced Materials Research 267 (June 2011): 668–73. http://dx.doi.org/10.4028/www.scientific.net/amr.267.668.

Повний текст джерела
Анотація:
The problem solved in this paper is to design a video streaming protocol which is accomplished by the application layer multicast in the WLAN. This protocol, WVALM, divides the whole video streaming into small blocks, and achieves the requirement of streaming multicast by multicasting those small blocks. The receiver and the sender use streaming window and retransmit window respectively to coordinate their relationship. Through experiment test, WVALM achieves the original object and could work well in the wireless environment.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Azrour, Mourade, Mohammed Ouanan, and Yousef Farhaoui. "Survey of Detection SIP Malformed Messages." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 2 (August 1, 2017): 457. http://dx.doi.org/10.11591/ijeecs.v7.i2.pp457-465.

Повний текст джерела
Анотація:
Session Initiation Protocol (SIP) is an application layer protocol designed to control and establish multimedia sessions over internet. SIP gaining more and more popularity as it is used by numerous applications such as telephony over IP(ToIP). SIP is a text based protocol built on the base of the HTTP and SMTP protocols. SIP suffers from certain security threats which need to be resolved in order to make it a more efficient signaling protocol. In this work, we review the proposed works aimed to detect SIP malformed messages that can cause security problem. Then, we classify the type of malformed SIP message and compare between the mechanisms used to reinforce the detection of malformed SIP message attack.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2949. http://dx.doi.org/10.11591/ijece.v6i6.12560.

Повний текст джерела
Анотація:
<p>One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion. With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network. We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Reddy, N. Ramanjaneya, Chenna Reddy Pakanati, and M. Padmavathamma. "Performance Enhancement of TCP Friendly Rate Control Protocol over Wired networks." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 6 (December 1, 2016): 2949. http://dx.doi.org/10.11591/ijece.v6i6.pp2949-2954.

Повний текст джерела
Анотація:
<p>One of the main aims of transport layer protocol is achieving best throughput without any congestion or reduced congestion. With rapid growing application needs and with increasing number of networks in Internet, there is a primary need to design new protocols to transport layer. To transmit multimedia applications, one of the suitable congestion control mechanisms in transport layer is TCP Friendly Rate Control Protocol (TFRC). It controls congestion based on its equation. However, every packet requires an acknowledgement in TFRC. It creates congestion in the network when the transmitted data is very large, which results in reduced throughput. This paper aims to increase the throughput when the transmitted data is large with minimal congestion by reducing the number of acknowledgements in the network. We modified some fixed parameters in the TFRC equation. The results show the increased throughput with minimal congestion.</p>
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Ariyadi, Tamsir. "Mitigasi Keamanan Dynamic Host Control Protocl (DHCP) Untuk Mengurangi Serangan Pada Local Area Network (LAN)." INOVTEK Polbeng - Seri Informatika 3, no. 2 (November 27, 2018): 147. http://dx.doi.org/10.35314/isi.v3i2.455.

Повний текст джерела
Анотація:
Keamanan jaringan telah menjadi perhatian lebih karena pesatnya pertumbuhan dan perluasan Internet. Sementara ada beberapa cara untuk memberikan keamanan pada layer application, transport, atau network layers, data link layer (Layer 2) keamanan belum bisa diterapkan secara maksimal. protokol data link layer yang digunakan dalam Local Area Network (LAN) tidak dirancang dengan keamanan yang secara signature. Dynamic Host Control Protocol (DHCP) adalah salah satu jaringan yang paling banyak digunakan untuk konfigurasi host yang bekerja dalam data menghubungkan lapisan. DHCP rentan terhadap sejumlah serangan, seperti serangan DHCP rogue Server, serangan DHCP Starvation, dan serangan DHCP Snooping. Pembahasan prototype terhadap keamanan jaringan yang disebut Mitigasi Keamanan Dynamic Host Control Protocol (DHCP) Untuk Mengurangi Serangan pada Local Area Network (LAN).
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Luo, Jian-Zhen, Shun-Zheng Yu, and Jun Cai. "Capturing Uncertainty Information and Categorical Characteristics for Network Payload Grouping in Protocol Reverse Engineering." Mathematical Problems in Engineering 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/962974.

Повний текст джерела
Анотація:
As a promising tool to recover the specifications of unknown protocols, protocol reverse engineering has drawn more and more attention in research over the last decade. It is a critical task of protocol reverse engineering to extract the protocol keywords from network trace. Since the messages of different types have different sets of protocol keywords, it is an effective method to improve the accuracy of protocol keyword extraction by clustering the network payload of unknown traffic into clusters and analyzing each clusters to extract the protocol keywords. Although the classic algorithms such asK-means and EM can be used for network payload clustering, the quality of resultant traffic clusters was far from satisfactory when these algorithms are applied to cluster application layer traffic with categorical attributes. In this paper, we propose a novel method to improve the accuracy of protocol reverse engineering by applying a rough set-based technique for clustering the application layer traffic. This technique analyze multidimension uncertain information in multiple categorical attributes based on rough sets theory to cluster network payload, and apply the Minimum Description Length criteria to determine the optimal number of clusters. The experiments show that our method outperforms the existing algorithms and improves the results of protocol keyword extraction.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Buzeto, Fabricio Nogueira, Carlos Botelho de Paula Filho, Carla Denise Castanho, and Ricardo Pezzuol Jacobi. "DSOA." International Journal of Handheld Computing Research 2, no. 2 (April 2011): 47–64. http://dx.doi.org/10.4018/jhcr.2011040104.

Повний текст джерела
Анотація:
Ubiquitous environments are composed by a wide variety of devices, each one with different characteristics like communication protocol, programming and hardware platforms. These devices range from powerful equipment, like PCs, to limited ones, like cell phones, sensors, and actuators. The services provided by a ubiquitous environment rely on the interaction among devices. In order to support the development of applications in this context, the heterogeneity of communication protocols must be abstracted and the functionalities dynamically provided by devices should be easily available to application developers. This paper proposes a Device Service Oriented Architecture (DSOA) as an abstraction layer to help organize devices and its resources in a ubiquitous environment, while hiding details about communication protocols from developers. Based on DSOA, a lightweight middleware (uOS) and a high level protocol (uP) were developed. A use case is presented to illustrate the application of these concepts.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

AlRegib, G., and Y. Altunbasak. "3TP: an application-Layer protocol for streaming 3-D models." IEEE Transactions on Multimedia 7, no. 6 (December 2005): 1149–56. http://dx.doi.org/10.1109/tmm.2005.858404.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Cui, Jinxue, and Bin Han. "Research on MVB conformance test system." MATEC Web of Conferences 355 (2022): 02040. http://dx.doi.org/10.1051/matecconf/202235502040.

Повний текст джерела
Анотація:
The design and implementation of the MVB conformance test system is of great significance in both professional theory and practical application. Conformance test for MVB, mainly to determine whether the MVB equipment IUT is consistent with the MVB protocol standard requirements in the TCN standard. The conformance test of MVB equipment IUT covers most of the contents of the RTP real-time protocol such as the physical layer, link layer, network layer, transport layer and application layer. This subject will analyse and study the consistency test of the MVB physical layer.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Yang, Huayuan, and Xin Zhang. "Interactive Multimodal Television Media Adaptive Visual Communication Based on Clustering Algorithm." Complexity 2020 (December 30, 2020): 1–9. http://dx.doi.org/10.1155/2020/6618245.

Повний текст джерела
Анотація:
This article starts with the environmental changes in human cognition, analyzes the virtual as the main feature of visual perception under digital technology, and explores the transition from passive to active human cognitive activities. With the diversified understanding of visual information, human contradiction of memory also began to become prominent. Aiming at the problem that the existing multimodal TV media recognition methods have low recognition rate of unknown application layer protocols, an adaptive clustering method for identifying unknown application layer protocols is proposed. This method clusters application layer protocols based on similarity of the load characteristics of network stream application layer protocol data. The method divides the similarity calculation in the clustering algorithm to improve the clustering efficiency of the algorithm. Experimental results show that the proposed method can efficiently and accurately recognize unknown visual communication. This article proposes that, in the interactive multimodal visual information transmission, human visual perception experience has changed, the diversity of visual information content expression makes the aesthetic subject more personalized and stylized.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Rasooli, Abdul Qadeer, Khan Mohammad Habibi, and Sahnosh Rahguzar. "INTEGRATION OF APPLICATION LAYER SERVICES WITH CENTRAL AUTHENTICATION SERVER IN EXAMPLE OF HTTP AND FTP RESTRICTION." ZONAsi: Jurnal Sistem Informasi 4, no. 1 (April 9, 2022): 1–17. http://dx.doi.org/10.31849/zn.v4i1.8668.

Повний текст джерела
Анотація:
Nowadays it is very important to have an authenticated and secure network. hackers are always one step further and try to steal credentials or doing malicious actions. Many organizations implement strong authentication systems for taking drastic security measures to prevent threats and vulnerabilities. This paper describes integration of application layer services with central authentication server called Lightweight Directory Access Protocol(LDAP), it covers detailed mechanism to control and restrict any software application or network services which may implement and require central authentication protocols including web (eg: HTTP protocol) and file transfer protocol (eg: FTP protocol). This will enable authenticated web and ftp webpage for reliability and security. The authentication services also provide Ubuntu client domain join and network authentication to enable integrity and authentication across the network. This paper is conducted through deep library research and practical implementation of the services.The goal of this paper is to introduce a unified secure centralized authentication system to authenticate and grant the authorized users to have access to the restricted Kerberized services in a period of time which is granted. It provides more trust, secure environment, but less traffic and others` interference
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Bernard, Muwonge Ssajjabbi, Tingrui Pei, and Kimbugwe Nasser. "QoS Strategies for Wireless Multimedia Sensor Networks in the Context of IoT at the MAC Layer, Application Layer, and Cross-Layer Algorithms." Journal of Computer Networks and Communications 2019 (December 29, 2019): 1–33. http://dx.doi.org/10.1155/2019/9651915.

Повний текст джерела
Анотація:
Wireless multimedia sensor networks (WMSNs) have got capacity to collect both scalar sensor data and multidimensional sensor data. It is the basis for the Internet of things (IoT). Quality of service (QoS) pointers like energy efficiency, reliability, bit error rate, and latency can be helpful in data collection estimation over a network. In this paper, we review a number of QoS strategies for WMSNs and wireless sensor networks (WSNs) in the IoT context from the perspective of the MAC and application layers as well as the cross-layer paradigm. Considering the MAC layer, since it is responsible for regulating the admittance to the shared medium and transmission reliability and efficiency through error correction in wireless transmissions, and for performance of framing, addressing, and flow control, the MAC protocol design greatly affects energy efficiency. We thus review a number of protocols here including contention-free and contention-based protocols as well as the hybrid of these. This paper also surveys a number of state-of-the-art machine-to-machine, publish/subscribe, and request/response protocols at the application layer. Cross-layer QoS strategies are very vital when it comes to system optimization. Many cross-layer strategies have been reviewed. For these QoS strategies, the challenges and opportunities are reviewed at each of the layers considered. Lastly, the future research directions for QoS strategies are discussed for research and application before concluding this paper.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Watfa, Mohamed K., Samir Selman, and Hovig Denkilkian. "A Battery-Aware High-Throughput MAC Layer Protocol in Sensor Networks." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 259809. http://dx.doi.org/10.1155/2010/259809.

Повний текст джерела
Анотація:
Energy savings have always been the primary concern in wireless sensor network protocols, however there are applications where latency and throughput are prioritized over energy efficiency and are so significant that the application would not be able to satisfy its requirements without them. The communication unit and the antenna operation consume most of the battery-powered energy of the node. Thus, the access to the medium must be controlled in a very strict manner in order to avoid collisions which result in lost transmissions and have a dramatic impact on the lifetime of the network. Although existing duty cycle MAC protocols are power efficient, they introduce significant end-to-end delivery latency and provide poor throughput. In this paper, we propose SN-MAC, a CDMA-based power controlled medium access protocol that uses both transmitter-based and receiver-based CDMA inside a formed cluster, and uses a TDMA schedule to make the cluster heads communicate with the base station. Our algorithm targets latency and throughput needs in addition to its ability to increase the overall network lifetime. We provide a head-to-head comparison with other protocols through extensive simulations focusing on the performance in terms of latency, throughput, and energy consumption.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Rath, Mamata, Binod Kumar Pattanayak, and Bibudhedu Pati. "Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications." Defence Science Journal 66, no. 2 (March 23, 2016): 146. http://dx.doi.org/10.14429/dsj.66.9705.

Повний текст джерела
Анотація:
<p>In military applications mobile adhoc network plays very important role because it is specifically designed network for on demand requirement and in situations where set up of physical network is not possible. This special type of network which takes control in infrastructure less communication handles serious challenges tactfully such as highly robust and dynamic military work stations, devices and smaller sub-networks in the battle field. Therefore there is a high demand of designing efficient routing protocols ensuring security and reliability for successful transmission of highly sensitive and confidential military information in defence networks. With this objective, a power efficient network layer routing protocol in the network for military application is designed and simulated using a new cross layer approach of design to increase reliability and network lifetime up to a greater extent.</p><p> </p>
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Khan, Shoaib, Svetoslav Duhovnikov, Eckehard Steinbach, and Wolfgang Kellerer. "MOS-Based Multiuser Multiapplication Cross-Layer Optimization for Mobile Multimedia Communication." Advances in Multimedia 2007 (2007): 1–11. http://dx.doi.org/10.1155/2007/94918.

Повний текст джерела
Анотація:
We propose a cross-layer optimization strategy that jointly optimizes the application layer, the data-link layer, and the physical layer of a wireless protocol stack using an application-oriented objective function. The cross-layer optimization framework provides efficient allocation of wireless network resources across multiple types of applications run by different users to maximize network resource usage and user perceived quality of service. We define a novel optimization scheme based on the mean opinion score (MOS) as the unifying metric over different application classes. Our experiments, applied to scenarios where users simultaneously run three types of applications, namely voice communication, streaming video and file download, confirm that MOS-based optimization leads to significant improvement in terms of user perceived quality when compared to conventional throughput-based optimization.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Kumar, Vinay, and Sudarshan Tiwari. "Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey." Journal of Computer Networks and Communications 2012 (2012): 1–10. http://dx.doi.org/10.1155/2012/316839.

Повний текст джерела
Анотація:
6LoWPANs (IPv6-based Low-Power Personal Area Networks) are formulated by devices that are compatible with the IEEE 802.15.4 standard. To moderate the effects of network mobility, the Internet Protocol (IP) does not calculate routes; it is left to a routing protocol, which maintains routing tables in the routers. 6LowPAN uses an adaptation layer between the network (IPv6) and data link layer (IEEE802.15.4 MAC) to fragment and reassemble IPv6 packets. The routing in 6LoWPAN is primarily divided on the basis of routing decision taken on adaptation or network layer. The objective of this paper is to present a state-of-the-art survey of existing routing protocols: LOAD, M-LOAD, DYMO-Low, Hi-Low, Extended Hi-Low, and S-AODV. These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. We have also presented the taxonomy of routing requirement; parameter for evaluating routing algorithm, and it was found that the routing protocol has its own advantages depending upon the application where it is used.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Montazerolghaem, Ahmadreza, Seyed-Amin Hosseini-Seno, Mohammad Hossein Yaghmaee, and Rahmat Budiarto. "High Load Control Mechanism for SIP Servers." Computer Engineering and Applications Journal 5, no. 2 (June 23, 2016): 47–56. http://dx.doi.org/10.18495/comengapp.v5i2.167.

Повний текст джерела
Анотація:
To start voice, image, instant messaging, and generally multimedia communication, session communication must begin between two participants. SIP (session initiation protocol) that is an application layer control induces management and terminates this kind of sessions. As far as the independence of SIP from transport layer protocols is concerned, SIP messages can be transferred on a variety of transport layer protocols including TCP or UDP. Mechanism of Retransmission that is embedded in SIP could compensate for the missing packet loss, in case of need. This mechanism is applied when SIP messages are transmitted on an unreliable transmission layer protocol like UDP. Also, while facing SIP proxy with overload, it could cause excessive filling of proxy queue, postpone increase of other contacts, and add to the amount of the proxy overload. In the present work, while using UDP as transport layer protocol, invite retransmission timer (T1) was appropriately regulated and SIP functionality was improved. Therefore, by proposing an adaptive timer of invite message retransmission, attempts were made to improve the time of session initiation and consequently improve the performance. Performance of the proposed SIP was implemented and evaluated by SIPP software in a real network environment and its accuracy and performance were demonstrated.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Xu, Wei Feng, Shu Fen Liu, and Lu Han. "Research of Low Altitude Communication Protocol Conversion Process Based on Pattern Match." Advanced Materials Research 791-793 (September 2013): 2023–26. http://dx.doi.org/10.4028/www.scientific.net/amr.791-793.2023.

Повний текст джерела
Анотація:
For complex application layer protocol of low altitude communication system which may be implemented with several wireless communication technologies which include BeiDou Navigation Satellite System, 3G, Digital radio, GPS, ADS-B, etc., we design a low altitude communication protocol conversion process based on pattern match to enhance the capacity of low-altitude flight service stations processing multi-source information from low-altitude aircrafts or other stations. In the process, the application layer protocol of information is identified with the algorithm based on BM pattern matching and CAM multi-pattern matching fusion firstly, secondly, the common intermediate protocol information is produced, and target protocol information is generated finally.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Birur Viswanath, Shruti, Thippeswamy Muddenahalli Nagendrappa, and Krishna Rao Venkatesh. "JSMCRP: Cross-Layer Architecture based Joint-Synchronous MAC and Routing Protocol for Wireless Sensor Network." ECTI Transactions on Electrical Engineering, Electronics, and Communications 19, no. 1 (March 22, 2021): 94–113. http://dx.doi.org/10.37936/ecti-eec.2021191.240719.

Повний текст джерела
Анотація:
The exponential rise in wireless technologies and allied applications has revitalized academia-industries to develop more efficient and economic routing solution to meet Quality-of-Service (QoS) provision. Amongst the major wireless communication systems, Wireless Sensor Network (WSN) is the most sought technology for defense surveillance, healthcare monitoring, industrial monitoring and control, civic and strategic infrastructure surveillance etc. Additionally, the up surge in Internet of Things (IoT) and Machine to Machine (M2M) communication systems too have broadened the horizon for WSNs based communication. However, the parallel increase in communication environment, complex network conditions etc confine efficacy of the classical WSN protocols. Dynamic network and node conditions often force classical protocols to undergo pre-mature link outage, delayed transmission, energy exhaustion and eventual QoS violation. To address such issues enhancing Median Access Control (MAC) and allied routing decision can have vital significance. However major existing efforts either focus on MAC enhancement or routing optimization, even under static WSN topology. Considering it as motive in this paper a highly robust “Cross-layer architecture based Joint-Synchronous MAC and Routing Protocol for WSN communication (JSMCRP)” has been developed. Being cross layer model JSMCRP protocol employs Application Layer, Network Layer, MAC Layer and PHY Layer to perform Network Adaptive MAC scheduling and Dynamic Routing Decision. JSMCRP employs Data Traffic Assessment, Prioritization and Scheduling (DTAPS), Proactive Network Monitoring and Knowledge (PNMK), Dynamic Congestion Index Estimation (DCIE), Adaptive Link Quality, Packet Injection Rate and Cumulative Rank Sensitive Routing Decision (CRSRD) to perform routing decision. Additionally, exploiting dynamic network/node conditions it performs Cognitive MAC scheduling to ensure QoS centric communication over IEEE 802.15.4 protocol stack. JSMCRP exhibited higher PDR, lower PLR and low delay under varying network conditions, suitable for real-time communication over constrained mobile WSN conditions.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Li, Dan. "The Research of HART Sensor System Based on ARM." Applied Mechanics and Materials 602-605 (August 2014): 2855–58. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.2855.

Повний текст джерела
Анотація:
This paper discusses the design method of economical and practical HART protocol communication system, and describes the research scheme in detail, according to the hierarchy of the system protocols: the physical layer, data link layer and application layer. This scheme includes the design of ARM embedded controller module, modulation and demodulation module and USB interface module and other components. According to the effect of the final product used in the field bus network, it is proved that the operation is stable, accurate, simple and easy.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Tong, Yu. "Simulation of Wireless Sensor Networks Based on Directed Diffusion Algorithm." International Journal of Online Engineering (iJOE) 13, no. 10 (November 7, 2017): 73. http://dx.doi.org/10.3991/ijoe.v13i10.7747.

Повний текст джерела
Анотація:
<p style="margin: 1em 0px;"><span lang="EN-US"><span style="font-family: 宋体; font-size: medium;">In order to reduce the energy consumption and data congestion caused by flooding at the initial stage of the network, the cluster head and the boundary node are used as the key nodes to reduce the data flow in the network, so that the network has better delay performance. Various clustering algorithms in wireless sensor networks and the improved method of clustering protocols are introduced. On the basis of directed diffusion algorithm, a directed diffusion protocol based on CONID clustering is studied. Through the OMNeT++ basic platform, the wireless sensor network simulation platform is built on the basis of the MiXiM module. The platform uses a hierarchical structure, and its network layer implements a directed diffusion protocol based on CONID clustering. The application layer implements the two step WLS localization algorithm. The MAC layer uses the FIexiTP protocol. The physical layer uses the simplest flat path fading model. Because the sensor has both perception and data transmission characteristics, the dual channel communication model is adopted. The platform is suitable for wireless sensor network detection, localization and tracking algorithm simulation. Through the hierarchical function of the platform, it can analyze the practicability and effectiveness of the algorithm in more detail, and has certain value. It can also be used in the simulation of cross layer protocols, and can combine several parameters to perform joint analysis of system performance. Simulation results show that the CONID based directional diffusion protocol has better delay performance than the conventional directed diffusion protocol. Finally, the performance of the two step WLS location protocol is analyzed from several perspectives, which provides an example for the platform.</span></span></p>
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Ruso, T., and C. Chellappan. "POSET: A high-performance application layer multicast protocol design and implementation." China Communications 11, no. 12 (December 2014): 83–93. http://dx.doi.org/10.1109/cc.2014.7019843.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Ghotbou, Arvin, and Mohammad Khansari. "VE-CoAP: A constrained application layer protocol for IoT video transmission." Journal of Network and Computer Applications 173 (January 2021): 102855. http://dx.doi.org/10.1016/j.jnca.2020.102855.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Vitturi, Stefano, Iacopo Carreras, Daniele Miorandi, Luca Schenato, and Alessandro Sona. "Experimental Evaluation of an Industrial Application Layer Protocol Over Wireless Systems." IEEE Transactions on Industrial Informatics 3, no. 4 (November 2007): 275–88. http://dx.doi.org/10.1109/tii.2007.911892.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Gomathi, K. "Utilization of Network Layer Protocols for Systematic Routing." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 30, 2021): 5200–5205. http://dx.doi.org/10.22214/ijraset.2021.36146.

Повний текст джерела
Анотація:
A clean framework for designing protocols for wireless networks includes localized routing and broadcasting. The clean framework is based definitely on the ratio of the cost of making certain picks along with cut price in distance count. Routing protocol is one in each of the most important networks found in this application of wireless networks. The normally used routing techniques withinside the network layers are described as follows. In [1]Distributed routing approach each node checks whether or not or now no longer the cost of routing via a given neighbor is smaller than that of currently used nodes. In the ‘adhoc’ networks, it has bandwidth quandary of the wireless channel. In dynamic ad hoc networks, a localized approach based definitely on ‘on-demand direction discovery’ with the useful resource of the use of flooding excursion spot is used. But it’s a ways inefficient to use flooding as routing scheme in wireless networks as it has power and bandwidth quandary. Localized protocols describes the amount of information required (i.e.) it gives the not unusual place variety of messages transmitted in step with node in a protocol. In a strictly localized protocol it’s a ways each local or global in nature. Thus the aim of the challenge describes the concept as a modern framework of some gift protocols. The Proposed framework of the localized routing scheme is based definitely on the cost measure, which is based upon on the assumptions for the minimal routing direction to be determined on and the improvement measure is based upon on the advances towards the excursion spot. Network simulator is used to implement this scenario.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Akasiadis, Charilaos, Vassilis Pitsilis, and Constantine D. Spyropoulos. "A Multi-Protocol IoT Platform Based on Open-Source Frameworks." Sensors 19, no. 19 (September 28, 2019): 4217. http://dx.doi.org/10.3390/s19194217.

Повний текст джерела
Анотація:
Internet of Things (IoT) technologies have evolved rapidly during the last decade, and many architecture types have been proposed for distributed and interconnected systems. However, most systems are implemented following fragmented approaches for specific application domains, introducing difficulties in providing unified solutions. However, the unification of solutions is an important feature from an IoT perspective. In this paper, we present an IoT platform that supports multiple application layer communication protocols (Representational State Transfer (REST)/HyperText Transfer Protocol (HTTP), Message Queuing Telemetry Transport (MQTT), Advanced Message Queuing Protocol (AMQP), Constrained Application Protocol (CoAP), and Websockets) and that is composed of open-source frameworks (RabbitMQ, Ponte, OM2M, and RDF4J). We have explored a back-end system that interoperates with the various frameworks and offers a single approach for user-access control on IoT data streams and micro-services. The proposed platform is evaluated using its containerized version, being easily deployable on the vast majority of modern computing infrastructures. Its design promotes service reusability and follows a marketplace architecture, so that the creation of interoperable IoT ecosystems with active contributors is enabled. All the platform’s features are analyzed, and we discuss the results of experiments, with the multiple communication protocols being tested when used interchangeably for transferring data. Developing unified solutions using such a platform is of interest to users and developers as they can test and evaluate local instances or even complex applications composed of their own IoT resources before releasing a production version to the marketplace.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Kumar Saini, Rakesh, Ritika Ritika, and Sandip Vijay. "Data Flow in Wireless Sensor Network Protocol Stack by using Bellman-Ford Routing Algorithm." Bulletin of Electrical Engineering and Informatics 6, no. 1 (March 1, 2017): 81–87. http://dx.doi.org/10.11591/eei.v6i1.577.

Повний текст джерела
Анотація:
Wireless sensor network consists various sensor nodes that are used to monitor any target area like forest fire detection by our army person and monitoring any industrial activity by industry manager. Wireless sensor networks have been deployed in several cities to monitor the concentration of dangerous gases for citizens. In wireless sensor network when sensor nodes communicate from each other then routing protocol are used for communication between protocol layers. Wireless sensor network protocol stack consist five layers such as Application layer, Transport layer, Network layer, MAC Layer, Physical layer. In this paper we study and analysis Bellman-Ford routing algorithm and check the flow of data between these protocol layers. For simulation purpose we are using Qualnet 5.0.2 simulator tool.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії