Статті в журналах з теми "Computer network protocols"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Computer network protocols.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Computer network protocols".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted to determine TCP protocol features; those features are taken into consideration as one of the most important network parameters. In all digital networks, the data transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself as packets. These packets transfer and propagate within the network between computers, and network nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a great influence on the network speed. The network simulator OPNET provides an easy way of campus design, predicting, and estimating the performance of networks in a university campus environment. In this research, wiredconnections reach all computer network users at fixed points to maintain higher Mbps and ensure reliable communications between all the campus network nodes, as well as to increase the overall network performance taking into account the future expansions for the university campus network design.
2

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
3

Mardedi, Lalu Zazuli Azhar, and Khairan Marzuki. "Network Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 2 (May 29, 2019): 202–10. http://dx.doi.org/10.30812/matrik.v18i2.372.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is to compare the performance of the EIGRP routing protocol and OSPF routing protocol that is on the network using the hybird topology. Overcoming problems with high-scale network access, we will analyze and compare performance between EIGRP routing protocol and OSPF routing protocol. In obtaining the value and to verify the results of the implementation, the simulation software uses a Packet Tracer simulator.
4

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The article presents several models for organizing bridges: a centralized network bridge on the side of a router and client computer, a distributed bridging system, and a dedicated bridge. Based on the accomplished analysis, it is recommended to use a centralized model for a network that has to comply with more stringent reliability requirements. If there is a need to have simultaneous access to several automation devices and high data exchange rates, a distributed model should be used. A dedicated bridge is used only in special cases, for example, when a high compactness is required in implementing a monitoring system.
5

Romaniuc, Alexandru-Gabriel, Vlad-Cosmin Vasile, and Elena-Monica Borda. "Study of Methods and Techniques for Manipulating the Time Synchronization Component of NTP Servers in Computer Networks." International conference KNOWLEDGE-BASED ORGANIZATION 29, no. 3 (June 1, 2023): 71–77. http://dx.doi.org/10.2478/kbo-2023-0078.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract In computer networks as well as in many other domains, time synchronization is carried out by some dedicated devices called time servers that uses network protocols, such as NTP (Network Time Protocol), PTP (Precision Time Protocol) or SNTP (Simple Network Time Protocol). Many domains and applications, such as, computer networks, security protocols, telecommunications, network services, and many others, depend on accurate time synchronization. According to the CVE (Common Vulnerabilities and Exposures) databases, between 2001-2022, more than 150 time synchronization protocols vulnerabilities have been reported. One of the most dangerous threats is the manipulation of the time synchronization information. Thus, the existence of such a vulnerability can generate serious security problems. Considering these aspects, in this article we aim to use some methods and techniques for the manipulation of the time component and use them to test some synchronization systems. This will require real-life scenarios of the use of time synchronization systems in which some methods and techniques are applied to exploit their vulnerabilities. Following these scenarios, we will be able to assess the risk to which these systems are exposed.
6

Muhammad Shahzaib Saeed. "Survey of Network Protocols." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 2 (June 28, 2019): 15–19. http://dx.doi.org/10.54692/lgurjcsit.2019.030273.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
IPv4 is the network protocols of the present Internet, which is characterized by the Internet Engineering Task Force (IETF). Network protocols characterize guidelines, polices and traditions for communication between system devices. Every advanced protocol for computer organization utilizer a packet switching system to send and get the message. The protocols are intended to conquer the activities of any enemy that can lose the sent message, discretionarily change the fields of the sent message, and replay old messages. In the web, the colossal measure of information and the immense number of various protocols makes it perfect as a high-bandwidth speed vehicle for undercover communication. This article is an overview of the current methods for making the covert channels. Weadditionally gave a diagram of wide kinds of network protocol.
7

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.
8

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
9

Ryndych, Yevhen, Andrii Borovyk, and Oleksii Borovyk. "RESEARCH OF TUNNELING TECHNOLOGIES IN MODERN COMPUTER NETWORKS." Technical Sciences and Technologies, no. 4(26) (2021): 67–74. http://dx.doi.org/10.25140/2411-5363-2021-4(26)-67-74.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Modern corporate networks are a combination of internal and external communication channels. The issue of confiden-tiality in such networks is relevant. To reduce the risks associated with implementing new solutions in continuous cycle systems, it is necessary to analyze and evaluate their impact.For now, there is a large number of network protocols that can be used to create tunnels. Modern network equipment is a rather complex software and hardware system that supports many standards and protocols. Well-known network equipment manufacturer MikroTik has upgraded the RouterOS operating system to version 7, where the main change is the use of an updated Linux kernel version 5.6.3, which allows routers to use several different waysto establish secure connections. In modern research, the main attention is paid to encryption algorithms and tunneling protocols without taking into account the peculiarities of implementation. The aim of the article is to develop semi-natural modeling of networks that can be used in the educational process and production systems. The result of the simulation is quantitative indicators of the performance of network equipment and com-munication channels. The use of semi-natural modeling is necessary when itis not possible to describe the operation of some elements of the system mathematically. Real network equipment and long-distance communication channels of providers were used to model the corporate network. To make the results objective in the test scheme, MikroTik hAP ac2 equipment with a hardware encryption chip and RouterOS v.7.1 were installed on both ends. A 100 Mbps channel was used as the ISP at both ends. The standard Bandwith test tool built into RouterOS is used as a data generator. The study allowed to determine the features of the modern version of the operating system RouterOS. A feature of this version is the built-in implementation of the tunnel using the WireGuard protocol, which showed high performance. The model was also used to obtain quantitative indica-tors of the performance of tunnels with different protocols under the condition of encrypting the transmitted data. As can beseen from the results of the experiments, the impact of protocols and their implementations on the useful bandwidth is significant and can reduce it several times.
10

Jain, Neha, Ashish Payal, and Aarti Jain. "Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks." International Journal of Pervasive Computing and Communications 17, no. 4 (September 10, 2021): 361–76. http://dx.doi.org/10.1108/ijpcc-02-2021-0036.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Purpose The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing Information Protocol) and OSPF (Open Shortest Path First) are the most popular routing protocols, and it has always been a challenge to select between these routing protocols, especially for hybrid networks. The efficiency of routing protocol mainly depends on resulting throughput and delay. Also, it has been observed that data packet size also plays an essential role in determining the efficiency of routing protocol. Design/methodology/approach To analyse the effect of different packet sizes using two routing protocols, routing information protocol (RIP) and open shortest path first (OSPF) on the hybrid network, require detailed planning. Designing the network for simulate and then finally analysing the results requires proper study. Each stage needs to be understood well for work accomplishment. Thus, the network’s simulation and evaluation require implementing the proposed work step by step, saving time and cost. Here, the proposed work methodology is defined in six steps or stages. Findings The simulation results show that both routing protocols – RIP and OSPF are equally good in terms of network throughput for all different packet sizes. However, OSPF performs better in terms of network delay than RIP routing protocol in different packet size scenarios. Research limitations/implications In this paper, a fixed network of 125 objects and only RIP and OSPF routing protocol have been used for analysis. Therefore, in the future, a comparison of different network sizes can be considered by increasing or decreasing the number of objects in the proposed network. Furthermore, the other routing protocols can be used for performance evaluation on the same proposed network. Originality/value The analysis can be conducted by simulation of the network, enabling us to develop a network environment without restricting the selection of parameters as it minimizes cost, network deployment overhead, human resources, etc. The results are analysed, calculated and compared for each packet size on different routing protocol networks individually and the conclusion is made.
11

T, Padmapriya, and Manikanthan S.V. "Investigation of Video Streaming over MANETS Routing Protocols." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 12 (June 21, 2022): 103–13. http://dx.doi.org/10.3991/ijim.v16i12.30805.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
For industrial and academic researchers from all around the world, the Mobile Ad-hoc Network (MANET) is a specific focus. A MANET was created as a result of the fast growth of wireless gadgets. Mobile Ad hoc network is a self-organizing network with no framework. MANET’s device has the ability to travel in any direction in order to transmit and receive data with other devices or network nodes. An administrator node which is capable of controlling other nodes is absent in MANET. All nodes in MANET act as its own router and host and arrange its own network. The most important element of MANET is Routing protocol. For routing in MANET, various routing protocol is responsible. Providing a video streaming service using mobile ad-hoc networks is a hard task. The network topology is immensely unstable and its instability causes data to be lost. The performance of MANET routing protocols for video applications has been examined in this paper. There are many routing protocols, however the Optimized Link State Routing (OLSR) protocol and Ad-hoc On-Demand Distance Vector (AODV) routing protocols are explored here. In this work, a comparison of these two effective routing protocols for supporting video streaming applications is offered.
12

Khan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman, and Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Analyzing and interpreting the exact behavior of new delay-based congestion control protocols with complex non-linear control loops is exceptionally difficult in highly variable networks such as cellular networks. This paper proposes a Model-Driven Interpretability (MDI) congestion control framework, which derives a model version of a delay-based protocol by simplifying a congestion control protocol's response into a guided random walk over a two-dimensional Markov model. We demonstrate the case for the MDI framework by using MDI to analyze and interpret the behavior of two delay-based protocols over cellular channels: Verus and Copa. Our results show a successful approximation of throughput and delay characteristics of the protocols' model versions across variable network conditions. The learned model of a protocol provides key insights into an algorithm's convergence properties.
13

Kryukov, Ya V., D. A. Pokamestov, E. V. Rogozhnikov, S. A. Novichkov, and D. V. Lakontsev. "Analysis of Computational Complexity and Processing Time Evaluation of the Protocol Stack in 5G New Radio." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 3 (September 25, 2020): 31–37. http://dx.doi.org/10.21293/1818-0442-2020-23-3-31-37.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Currently, an active deployment of radio access networks for mobile communication systems 5G New Radio is being observed. The architecture of networks is developing rapidly, where significant part of the functions is performed in a virtual cloud space of a personal computer. The computing power of a personal computer must be sufficient to execute network protocols in real time. To reduce the cost of deploying 5G NR networks, the configuration of each remote computer must be optimally matched to the scale of a particular network. Therefore, an urgent direction of research is the assessment of the execution time of the 5G NR protocol stack on various configurations of computers and the development of a mathematical model for data analysis, approximation of dependencies and making recommendations. In this paper, the authors provide an overview of the main 5G NR network architectures, as well as a description of the methods and tools that can be used to estimate the computational complexity of the 5G NR protocol stack. The final section provides an analysis of the computational complexity of the protocol stack, obtained during the experiments by colleagues in partner institutions.
14

Alazzawi, L., and A. Elkateeb. "Performance Evaluation of the WSN Routing Protocols Scalability." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–9. http://dx.doi.org/10.1155/2008/481046.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs). A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.
15

Ismaeel, Tarik Zeyad, and Dhurgham Razaq Mohsen. "Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network." Journal of Engineering 22, no. 7 (July 1, 2016): 142–63. http://dx.doi.org/10.31026/j.eng.2016.07.09.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol depends on QoS using two types of applications (+ve and –ve QoS in the FIS evaluation). QoS of the protocol varies from one protocol to another depending on the applications used in the network. The network design is done using the program (Op-Net V14.5 modular) with core i7 computer for multiple nodes deployed randomly in several area (100 * 100, 200 * 200, 400 * 400, 800 * 800, 1000 * 1000)m2 accomplished by changing the number of nodes in the network (10, 20, 40 and 80). There are three programs designed using (MATLAB 2012A programming language). The first one evaluates the (QoS) using the organizational structure of the mysterious system (HFS), which relied on the standard applications that should be provided by the protocols to make the applications accepted by the nodes requirements. After the evaluation the QoS for all cases, we design Neural Network to assist in estimation of the best protocol for any network through QoS for all protocols (AODV, DSR, OLSR and TORA). Neural network has four entrances (area, number of nodes, real time application ratio and non-real time application ratio). The results show that the QoS estimated is (0.5401) of (OLSR) which has been improved to (0.6421) by reducing to mobility speed and making some nodes fixed and using more than one protocol in the network to provide the best QoS .
16

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
17

Wahid, Ishtiaq, Sadaf Tanvir, Abdul Hameed, and Masood Ahmad. "Software-Defined Networks and Named Data Networks in Vehicular Ad Hoc Network Routing: Comparative Study and Future Directions." Security and Communication Networks 2022 (June 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1270180.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Routing protocols are an essential component of vehicular ad hoc networks. Software-defined networks and name data networks are new aspects of routing that are coming to the fore as Vehicular Ad Hoc Network technology evolves. Data Network-based VANET routing protocols and Software Defined Network-based VANET routing protocols have been developed in recent research. These newly developed protocols must be part of VANET routing protocol surveys. The taxonomy of traditional routing protocols must take these innovations into account. To the best of our knowledge, no such taxonomy exists at the moment. We present a new taxonomy of routing protocols based on the additional routing aspects of Software-Defined Networks and Named Data Networks. All traditional routing protocols are kept in a single category. This research work aims to update the existing taxonomy of routing protocols with the newly adopted aspects of research in routing. Advanced routing schemes are selected for the survey from each category to evaluate new research results in VANET routing. This article also describes future directions for VANET/ITS routing research.
18

Lin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
MAC protocol analysis and comparison to the multimedia communication theory as the framework, firstly discusses the requirement of communication network in computer networks and multimedia applications. MAC protocols oriented to wireless sensor networks are compared and analyzed. Summary of CSMA/CA, CSMA/CD, S-MAC and basic principles and applicable occasions, main parameters is made. Properties of the three MAC protocols is compared. The results of this study provides reference for MAC protocol oriented to multimedia communications.
19

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
20

Anvari, Hamidreza, and Paul Lu. "Machine-Learned Recognition of Network Traffic for Optimization through Protocol Selection." Computers 10, no. 6 (June 11, 2021): 76. http://dx.doi.org/10.3390/computers10060076.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We introduce optimization through protocol selection (OPS) as a technique to improve bulk-data transfer on shared wide-area networks (WANs). Instead of just fine-tuning the parameters of a network protocol, our empirical results show that the selection of the protocol itself can result in up to four times higher throughput in some key cases. However, OPS for the foreground traffic (e.g., TCP CUBIC, TCP BBR, UDT) depends on knowledge about the network protocols used by the background traffic (i.e., other users). Therefore, we build and empirically evaluate several machine-learned (ML) classifiers, trained on local round-trip time (RTT) time-series data gathered using active probing, to recognize the mix of network protocols in the background with an accuracy of up to 0.96.
21

Gee, K. "Communications network protocols." Computer Communications 8, no. 5 (October 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Patel, Ahmed. "Communication network protocols." Computer Communications 9, no. 6 (December 1986): 317. http://dx.doi.org/10.1016/0140-3664(86)90055-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Garg, Puneet, Ashutosh Dixit, Preeti Sethi, and Plácido Rogerio Pinheiro. "Impact of Node Density on the QoS Parameters of Routing Protocols in Opportunistic Networks for Smart Spaces." Mobile Information Systems 2020 (August 1, 2020): 1–18. http://dx.doi.org/10.1155/2020/8868842.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The need and importance of Smart Spaces have been potentially realized by the researchers due to its applicability in the current lifestyle. Opportunistic network, a successor of mobile ad hoc networks and a budding technology of network, is a best-suited technology for implementing Smart Spaces due to its wide range of applications in real-life scenarios ranging from building smart cities to interplanetary communication. There are numerous routing protocols which are available in opportunistic network, each having their pros and cons; however, no research till the time of listing has been done which can quantitatively demonstrate the maximum performance of these protocols and standardize the comparison of opportunistic routing protocols which has been a major cause of ambiguous performance evaluation studies. The work here presents a categorical view of the opportunistic routing protocol family and thereby compares and contrasts the various simulators suited for their simulation. Thereafter, the most popular protocols (selecting at least one protocol from each category) are compared based on node density on as many as 8 standard performance metrics using ONE simulator to observe their scalability, realism, and comparability. The work concludes by presenting the merits and demerits of each of the protocols discussed as well as specifying the best routing protocol among all the available protocols for Smart Spaces with maximum output. It is believed that the results achieved by the implemented methodology will help future researchers to choose appropriate routing protocol to delve into their research under different scenarios.
24

Tikhonov, Eugene, Donat Schneps-Schneppe, and Dmitry Namiot. "Delay Tolerant Network Protocols in a Railway Network." International Journal of Embedded and Real-Time Communication Systems 12, no. 4 (October 2021): 1–17. http://dx.doi.org/10.4018/ijertcs.2021100101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The paper is devoted to the analysis of the effectiveness of the DTN (delay tolerant network) system in a communication network on a railway line. Trains act as moving objects that are sending and receiving messages to/from an external network. Trains may also transmit telemetry collected during movement. The article presents data on the effectiveness of the DTN network with various protocols in terms of reducing the delay in the message and telemetry delivery and in increasing the total number of delivered messages in the railway scenario. An analysis of railway lines with various loads and different coverage of mobile networks was made. These models are based on real railway maps and train schedules. The effectiveness of DTN during migration to networks of a higher data rate (5G) and networks with satellite connection of trains is discussed.
25

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each computer can access data from other computers. computers that are connected in a LAN can run hardware such as other computer printers, send data to other computer owners or play games together. The number of computers connected to the LAN is relatively small, such as home computers, internet cafes, schools and several other computers that are in one building. In this study, the researcher used a quantitative method approach to analyze the use of information and communication technology in the construction of a LAN network in the SMK Negeri 1 BMR school.
26

Vatambeti, Ramesh, Nrusingha Charan Pradhan, E. Sandhya, Surendra Reddy Vinta, V. Anbarasu, and K. Venkateswara Rao. "Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network." International Journal of Computer Network and Information Security 15, no. 3 (June 8, 2013): 78–89. http://dx.doi.org/10.5815/ijcnis.2023.03.06.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Because of the mobility of its nodes, MANET plays a significant role in mobile communication. As a result, network infrastructure is frequently changed, resulting in data loss and communication overheads. Despite this, the large packet size causes network congestion or traffic. The difficult task is efficient routing through a dynamic network. For node generation and energy management, the proposed approach in this paper employs GAODM (Geography-based Ad-hoc On Demand disjoint multipath) and E-AODM (Energy Ad-hoc On Demand Vector routing). The proposed GAODM routing protocol reduces congestion using Spider Monkey (SM) Optimization. The E- AODM protocol assesses the energy management solution based on parameters such as delay, energy consumption, routing overhead, and node energy. By choosing the best path through the network, the proposed protocol's effectiveness is increased. The proposed protocol reduces routing overload, delay, and congestion. The simulated results show that increasing the number of packets transmitted in the network using the proposed GAODM and E-AODM routing protocols over the existing protocols on NS 2 reduces node energy and, as a result, overload and delay.
27

Kaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In a network whether wireless or wired, a set of protocols which are used to distribute the information through various routes between the nodes are said to be the routing protocols which serves as a majorly vital part of the computer networks. They specify the particular and specific path of information exchange by the sending and receiving of packets. Vehicular ad- hoc networks are quite emerging technologies of today’s era presenting the provision of seamless and uninterrupted communication in the network of mobile nodes in dynamic environment. Routing itself proves to be quite a considerable and crucial challenge where the routing protocol named AODV performs its best by proving itself considerably more efficient. The stated paper focuses on the Performance comparison of the conventional protocols AODV and DSDV where AODV outperforms DSDV and offers better QoS but such conventional protocol proves to be inauspicious in VANET. This paper gives verification of better QoS of cluster based routing protocol CBR over the conventional routing protocols. The Simulation and comparison results have been carried out in Network Simulator NS-2 to briefly elaborate the impact of AODV DSDV and CBR routing protocols on the bases of Throughput, Normalized Routing Load, Control overheads, delay, Jitter and Packet drop ratio as performance metrics.
28

Han, Hui, Hong De Zhang, and Yang Wang. "A Routing Protocol for Emergency Communication Based on Load Balancing." Applied Mechanics and Materials 719-720 (January 2015): 744–49. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.744.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ad-hoc communications is a mobile communication networks and computer networks combine with no infrastructure support, and network survivability and flexibility is strong, especially suitable for emergency communication. As the existing mobile ad hoc network routing protocols lack of network load balancing capabilities, this paper proposed a routing protocol based on load balancing LBBR (Load Balancing Based Routing). Simulation results shows that, LBBR can improve the success rate of packet transmission, reducing the average end to end delay, thus effectively improving network performance.
29

Zhang, Zhaowei, Hongzheng Zhang, Jinjing Zhao, and Yanfei Yin. "A Survey on the Development of Network Protocol Fuzzing Techniques." Electronics 12, no. 13 (July 1, 2023): 2904. http://dx.doi.org/10.3390/electronics12132904.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Network protocols, as the communication rules among computer network devices, are the foundation for the normal operation of networks. However, security issues arising from design flaws and implementation vulnerabilities in network protocols pose significant risks to network operations and security. Network protocol fuzzing is an effective technique for discovering and mitigating security flaws in network protocols. It offers unparalleled advantages compared to other security analysis techniques thanks to the minimal requirement for prior knowledge of the target and low deployment complexity. Nevertheless, the randomness in test case generation, uncontrollable test coverage, and unstable testing efficiency introduce challenges in ensuring the controllability of the testing process and results. In order to comprehensively survey the development of network protocol fuzzing techniques and analyze their advantages and existing issues, in this paper, we categorized and summarized the protocol fuzzing and its related techniques based on the generation methods of test cases and testing conditions. Specifically, we overviewed the development trajectory and patterns of these techniques over the past two decades according to chronological order. Based on this analysis, we further predict the future directions of fuzzing techniques.
30

S, Arockiaraj, Krishnamoorthi Makkithaya, and Harishchandra Hebbar N. "Quality of Service-Based Cross-Layer Protocol for Wireless Sensor Networks." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 20 (October 31, 2022): 34–58. http://dx.doi.org/10.3991/ijim.v16i20.31111.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Sensor nodes in wireless sensor networks (WSN) are used for perceiving, monitoring, and controlling a wide range of applications. Owing to the small size of sensor nodes and limited power sources, energy saving is critical for ensuring network longevity. Protocols in different layers consume energy for their function. It is possible to significantly reduce energy usage by including energy-efficiency measures in the protocol design. Most protocols in the literature focus on the energy efficiency in individual layers. Recent studies have shown that cross-layer designs are more energy efficient than individual layer designs. Therefore, this study presents a cross-layer protocol design that combines network and data link layers to minimize energy consumption. This article proposes a novel "Quality of Service Based Cross-layer (QSCL) Protocol" by combining the IEEE 802.15.4-based MAC protocol and the LEACH-based routing protocol. The dynamic duty cycle of the IEEE 802.15.4 protocol was modified based on the amount of data present in the node, which minimized the energy consumption of the data-transfer mechanism. The cluster head (CH) selection of the LEACH-based protocol was modified to consider the average residual energy (RE) of the nodes and their distance from the sink. This helps preserve the energy in the CH, thereby extending the network lifetime. Simulation studies demonstrated that the proposed QSCL outperformed the existing protocols by prolonging the network lifetime.
31

Almakhi, Riyan, Ade Surya Budiman, and Rachmawati Darma Astuti. "Implementasi Protokol Keamanan Dan Segmentasi Jaringan Dalam Project Pembangunan WLAN Untuk PT Pan Pacific Insurance." Jurnal Sistem dan Teknologi Informasi (JustIN) 11, no. 1 (January 31, 2023): 140. http://dx.doi.org/10.26418/justin.v11i1.53745.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Security of data and network devices is essential in the development of a computer network, either in the creation of new computer networks or in the development of existing computer networks. PT. Pan Pacific Insurance as a company that holds large amounts of data along with its supporting computer network's infrastructure, focuses on security aspects in addition to performance aspects in its computer network. To get the flexibility of its computer network, the company developed a wireless local area network (WLAN) in line with the relocation of its head office. The Existing company's network needs to be improved with a WLAN network, so it does not only improve employee performance and provides the best security for company data. For those purposes, the authors applied the use of Cisco Wireless LAN Controller (WLC), Cisco Access Point and applied the WPA+WPA2 PSK security protocol for the SSID used by employees. Using this protocol when employees want to connect to the network wireless, they will be forced to type the password that has been set. In addition to implementing the security protocol, the author also applies the Web Policy Authentication security protocol for the SSID used by guests. So that guests who want to connect to a wireless network will be directed to a web browser to be asked to enter a username and password first. A series of security protocols, also added with network segmentation on each SSID to use a different network address. Thus, the essence of network security and performance is expected to increase. From the results of the tests carried out, obtained security guarantees on the PT. Pan Pacific Insurance successfully directs every user connected to the network as part of the security protocol implemented. Furthermore, with network segmentation, user traffic is more controlled because guests get their network segmentation, so they don't interfere with network traffic for users or company staff in company operations.
32

Paul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based cryptographic techniques, the proposed protocol uses the one-time pad (OTP) to secure itself from attacks, i.e., eavesdropping, reply attack, password guessing attack, man-in-the-middle attack, brute-force attack, quantum computer attack, etc. Security of the proposed protocol was analyzed, and it shows that the proposed protocol may prevent itself from different types of attacks. Further, analysis for quantum Secure was carried out. From the analysis, it is found that if the OTP key is truly random and cannot be reused, then a computer with infinite capacity or quantum computer cannot break the encrypted challenge and response. The proposed protocol may be used for entity authentication for the client, server, process, and user.
33

Punia, Divya, and Rajender Kumar. "A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management." Transport and Telecommunication Journal 23, no. 1 (February 1, 2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields Kalman filter as a prediction module in PGRP routing protocol in order to anticipate the neighbor location and to select the propitious neighbor for advancing packets in both urban and highway framework which leads to efficient connectivity in the network and improves road safety. K-PGRP is then compared with PGRP, GPSR (Greedy Perimeter Stateless Routing) and GPCR (Greedy Perimeter Coordinator Routing) routing protocols in terms of throughput and packet delivery ratio metrics and outperformed all the simulation cases. The simulations were performed on MATLAB R2018a along with traffic simulator SUMO.
34

Fathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (June 30, 2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching
35

Pulujkar, Mosami, Sunil Kumar, Vivek Deshpande, and Dattatray Waghole. "Evaluation of various MAC Protocols for Node Density in Wireless Sensor Networks based on QoS." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 213–16. http://dx.doi.org/10.17762/ijritcc.v10i1s.5825.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
A wireless sensor network is a collection of sensor nodes that communicate with one another to gather data and send it to a base station. The quality of service provided by sensor networks determines their efficiency and lifetime. Energy, channel capacity, packet transmission, packet drop, and latency are all factors in QoS. In WSNs, routing protocols are designed to discover the shortest route to a network's destination, whereas MAC protocols are designed to transmit data through a communication channel. To increase the network's life span, the best routing and MAC protocols are required for communication. In this research, we examined the performance of different MAC protocols for a variety of QoS measures as node density increased. Future researchers will benefit from this research in establishing the best hybrid protocols for wireless sensor networks. The results demonstrate that CSMA is the best communication protocol among the others.
36

Liu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue, and Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane." Electronics 11, no. 15 (July 30, 2022): 2389. http://dx.doi.org/10.3390/electronics11152389.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
With the development of network technology, various network protocols different from TCP/IP have emerged. The heterogeneous integrated network has been proposed to realize the interconnection between heterogeneous networks running different protocols. However, current protocol conversion mechanisms often can only handle a few pre-defined protocols and do not support the flexible expansion of new protocols, which cannot meet the needs of the efficient convergence of different heterogeneous networks. Addirionally, due to the lack of security mechanisms, data in the core network is confronted with the risk of stealing and tampering. Our aim is to provide a protocol-extensible protocol conversion and secure transmission integration mechanism, MultiSec, for heterogeneous converged networks. First, based on the programmable data plane, the parser is reconfigured to realize multi-protocol parsing. Furthermore, the encryption mechanism implemented in the P4 extern is proposed and unified to the data plane together with the protocol conversion mechanism. Finally, the MultiSec prototype is implemented on a programmable software switch and accelerated by a dedicated encryption card. Experiments show that MultiSec successfully realizes multi-protocol conversion and data encryption, and the system performance is significantly improved with the help of an encryption card.
37

ZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (December 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol adapts to the specific routing requirements of the task and the dynamic changes of the network. We analyze this framework in simulation using some real-world applications in sensor networks.
38

Shende, Dipali K., Sonavane S.S, and Yogesh Angal. "A Comprehensive Survey of the Routing Schemes for IoT applications." Scalable Computing: Practice and Experience 21, no. 2 (June 27, 2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore, there is a need for devising an effective routing scheme to provide superior performance over the other existing schemes in terms of energy consumption. Thus, this review article provides a detailed review of 52 research papers presenting the suggested routing protocols based on the contentbased, clustering-based, fuzzy-based, Routing Protocol for Low power and Lossy Networks, tree-based and so on. Also, a detailed analysis and discussion are made by concerning the parameters, simulation tool, and year of publication, network size, evaluation metrics, and utilized protocols. Finally, the research gaps and issues of various conventional routing protocols are presented for extending the researchers towards a better contribution of routing protocol for the secure IoT routing.
39

Falih Nawwaf, Moch. Hari Purwidiantoro, and Lilik Sugiarto. "Perancangan Jaringan MAN Dengan Dyamic Routing EIGRP Dan Algoritma DUAL Menggunakan Cisco Packet Tracer." JURNAL PENELITIAN SISTEM INFORMASI (JPSI) 1, no. 3 (August 1, 2023): 87–95. http://dx.doi.org/10.54066/jpsi.v1i3.674.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Metropolitan Area Network (MAN) is a computer network that covers a geographical area larger than LAN (Local Area Network) but smaller than WAN (Wide Area Network). In the design of MAN networks is very important because it ensures the availability, reliability, and efficiency of routes to transmit data throughout the network. Therefore, the use of dynamic routing protocols such as the Enhanced Interior Gateway Routing Protocol (EIFRP) with the Diffusing Update Algorithm (DUAL) algorithm and simulated on Cisco packet tracer is the main concern in this study.
40

Khasambiev, I. V., and E. A. Guseva. "Network architectures and protocols of M2M communications." Journal of Physics: Conference Series 2176, no. 1 (June 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2176/1/012019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract The issues of building the architecture of M2M networks and managing M2M services using the capabilities of the IMS platform are considered Introduction. M2M (Machine to Machine) is a complex of technologies that provide automatic interaction between devices (things) without human intervention. The Internet of Things is not a single technology, but a whole system of technological solutions. It is a global network infrastructure, which consists of computer networks of physical objects, the traditional IP Internet, and various devices connecting these networks.
41

Jaffri, Zain ul Abidin, Muhammad Asif, Wali Ullah Khan, Zeeshan Ahmad, Zain ul Abiden Akhtar, Kalim Ullah, and Md Sadek Ali. "TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks." International Journal of Distributed Sensor Networks 18, no. 6 (June 2022): 155013292211072. http://dx.doi.org/10.1177/15501329221107246.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The design and implementation of energy-efficient routing protocols for next-generation wireless sensor networks is always a challenge due to limited power resource capabilities. Hierarchical (clustering) routing protocols appeared to be a remarkable solution for extending the lifetime of wireless sensor networks, particularly in application-aware (threshold-sensitive) and heterogeneity-aware cluster-based routing protocols. In this article, we propose a protocol, namely, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol. It is a heterogeneity-aware and threshold-based protocol that provides a better solution to existing problems in next-generation wireless sensor networks. During execution, the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol splits the entire network area into several zones to manage network traffic efficiently. In the first step, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is designed for a homogeneous network where the initial energy of all the nodes is the same. Thereafter, we bring in heterogeneity in the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol execution environment to optimize its energy consumption. By investigating the performance of the various numbers of divisions, it is proved that the Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol with 9 zonal divisions has higher stability and throughput. The performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol is compared with those of Stable Election Protocol, Low-Energy Adaptive Clustering Hierarchy, Modified Low-Energy Adaptive Clustering Hierarchy, and Gateway-Based Energy-Efficient Routing Protocol through computer simulations. Simulation results verify the improved performance of the proposed Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol in terms of network stability, lifetime, and throughput.
42

Deshmukh, Sneha R., and Vijay T. Raisinghani. "A Survey on Congestion Control Protocols for CoAP." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 2 (August 31, 2022): 111–23. http://dx.doi.org/10.17762/ijcnis.v14i2.5484.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.
43

Tahir, Sabeen, Ghadah Abdullah Aldabbagh, Sheikh Tahir Bakhsh, and Abass Md Said. "Hybrid Congestion Sharing and Route Repairing Protocol for Bluetooth Networks." WSEAS TRANSACTIONS ON COMPUTERS 20 (April 27, 2021): 49–55. http://dx.doi.org/10.37394/23205.2021.20.6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Bluetooth is a widespread wireless technology standard for limited wireless networks that permits Bluetooth devices to create a one-hop (piconet) or multi-hop (scatternet) network. During data transmission, a large number of links passing through a single master or bridge device may create congestion problems in a Bluetooth network. Therefore, routing in a multi-hop dynamic Bluetooth network, where a number of routing masters and routing bridges exist, sometimes create technical problems in a scatternet. Mobility and failure of routing devices disconnects the routing links and link reconstruction process consumes more resources that eventually decrease the performance. In this paper, Hybrid Congestion Sharing and Route Repairing protocol for Bluetooth networks” (HCSRR) is proposed. The objective of this paper is to provide an efficient technique for scatternet congestion avoidance and route maintenance. The proposed protocol is implemented and compared with most relevant protocols. From simulation results, it is observed that the HCSRR outperforms the existing protocols.
44

Ignatenko, O. P., and O. A. Molchanov. "Evolutionary games in TCP networks with speed restriction policies." PROBLEMS IN PROGRAMMING, no. 4 (December 2016): 033–47. http://dx.doi.org/10.15407/pp2016.04.033.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Competitive development of various versions of network protocols is an essential part of computer networks. The most-used protocol today is Transmission Control Protocol (TCP). There is a large number of implementations of the TCP protocol, which differ by mechanism of congestion control. TCP develops by improving its existent implementations, vanishing some of them and via creation of a new ones. The possibility of using new versions of the protocol allows the user to increase the data rate by selecting the appropriate implementation of TCP. It is difficult to predict consequences of computer network users’ interaction in situations when many users try to achieve higher data rate by applying different TCP implementation. The actual task is to develop a theoretical and program tools to model such competitive dynamic interactions. This is the goal of my scientific-research work. Game theory, which is the theory of mathematical models of optimal decision making in situations of conflicts of interest, is the best suited to solve a particular problem because it allows you to find a solution in terms of non-cooperative interaction, which usually happens between the networks TCP-connections. This paper examines the possibility of coexistence of different implementations of protocols that users can change to improve their own capacity. It also examines games between protocols in cases when users’ packets management policies are applied.
45

Ali, Maisam, Kashif Naseer Qureshi, Thomas Newe, Kashif Aman, Ashraf Osman Ibrahim, Maha Almujaly, and Wamda Nagmeldin. "Decision-Based Routing for Unmanned Aerial Vehicles and Internet of Things Networks." Applied Sciences 13, no. 4 (February 7, 2023): 2131. http://dx.doi.org/10.3390/app13042131.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
New technologies and communication standards have changed traditional network processes. Internet of Things (IoT) is one of the emerging technologies where devices are connected to facilitate the users. When the networks are more congested due to a large number of users then the existing routing protocol and communication channels suffer from congestion, disconnection, overhead, and packet drop issues. Unmanned Aerial Vehicles (UAVs) are adopted to support the ground networks for more feasible data communication. These networks provide coverage facilities to IoT networks and provide smooth data dissemination services. Through the use of relay and cooperative communication technologies, UAVs could enlarge the communication space for IoT networks. Traditional network routing protocols have been adopted for data communication in these networks. However, the adopted protocols are not able to handle mobility and uncertain network conditions. This paper proposes a Decision-based Routing for Unmanned Aerial Vehicles and Internet of Things (DR-UAVIoT) network. The proposed protocol is useful for UAV-to-IoT and UAV-to-UAV data communication. The performance of the proposed solution is evaluated with the existing protocols in terms of data delivery, delay, and network overhead. The experimental results indicate the better performance of the proposed protocol in terms of less delay, less overhead, and better data delivery ratio as compared with existing routing protocols.
46

Narula, Mr Rajneesh, and Mr Kaushal Gandhi. "Performance Analysis and Evaluation of Hybrid Network using different Integrated Routing Protocols." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 10 (December 5, 2013): 3090–100. http://dx.doi.org/10.24297/ijct.v11i10.2978.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The increasing demand of computer communication networks are growing rapidly day by day. With the growing need to distribute applications across multiple networks and the availability of high capacity, high-performance intermediate switching nodes, and networks, an efficient routing mechanism has become the core requirement. This research primarily focuses on the design and performance of Hybrid Network incorporating different intra-domain routing algorithms. The performance evaluation of different routing algorithms for the transmission of video- and voice-data streams over Hybrid network is demonstrated in this work.. This allows multiple Ethernet point-to-point links to be bundled into one logical full-duplex channel for Fast Ethernet (10BaseT, 100BaseT, or 1000BaseX). These applications require some QoS support such as guaranteed bandwidth, less delay, less jittering effect and low error rate. The QoS relies on a number of factors along with a suite of robust routing protocols that help to accomplish the task of moving datagram from source to destination with high bandwidth and low delay rate. An effective intra-domain network routing protocol may make distributed applications more efficient across multiple networks with the availability of high capacity and high-performance. A variety of intra-domain routing protocols such as Routing Information Protocol (RIP) and Open Shortest First Protocol (OSPF), Interior Gateway Protocol (IGRP) and Enhanced Interior Gateway Protocol (EIGRP) are available and widely used in designing such high capacity and high performance networks with optimum QoS. We evaluate the performance of these intra-domain routing protocols with IS-IS to recommend the optimum routing protocol to use to provide optimum QoS by means of OPNET Simulator TM. In this thesis work, the following objectives are considered and demonstrated.
47

Balan, Rajesh Krishna, Aditya Akella, and Srini Seshan. "Multi-modal network protocols." ACM SIGCOMM Computer Communication Review 32, no. 1 (January 2002): 60. http://dx.doi.org/10.1145/510726.510734.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Razumov, P. V., L. V. Cherckesova, O. A. Safaryan, and I. Strubchik. "Smurf as Spoof Type Attacking Activity on Network and Neutralization." Journal of Physics: Conference Series 2131, no. 2 (December 1, 2021): 022078. http://dx.doi.org/10.1088/1742-6596/2131/2/022078.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Reliable and timely detection of cyberattacks is becoming indispensable for securing networks and systems. Internet Control Message Protocol (ICMP) flood attacks continue to be one of the most serious threats in both IPv4 and IPv6 networks. There are various types of cybersecurity attacks based on ICMP protocols. Many ICMP protocols are very similar, so security managers might think they might have the same impact on the victim’s computer systems or servers.
49

Jeong, Wootae, and Shimon Y. Nof. "Timeout-Based Information Forwarding Protocol for Wireless Sensor Networks." International Journal of Distributed Sensor Networks 3, no. 4 (October 1, 2007): 331–46. http://dx.doi.org/10.1080/15501320601062148.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Recent wireless microsensor network protocols provide more flexible leverage to the applications with dynamically changing topology, but they should be designed to overcome energy constraints, the bandwidth limit, and system latency. Thus, microsensor network protocols should be effective both in energy and in latency. In addition, they should be evaluated through designated tools at each level of networking characteristics. This paper proposes a new Timeout-based Information Forwarding (TIF) protocol for wireless sensor networks. It uses a relatively simple logic to forward the data packet with multi-hop fashion to reduce the overall network energy consumption. The TIF protocol has been implemented into a network evaluation tool, called TIE/MEMS, and provides a design strategy for distributed wireless sensor network systems needed for various emerging applications. The simulated results show that the TIF protocol has low energy consumption and provides design guidelines between energy consumption and latency according to the number of hops by adjusting weight values in the timeout function.
50

Abbas, Noor Alhuda F., Jaber H. Majeed, Waleed Khalid Al-Azzawi, and Adnan Hussein Ali. "Investigation of energy efficient protocols based on stable clustering for enhancing lifetime in heterogeneous WSNs." Bulletin of Electrical Engineering and Informatics 10, no. 5 (October 1, 2021): 2643–51. http://dx.doi.org/10.11591/eei.v10i5.3049.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
There are certain challenges faced with wireless sensor networks (WSNs) performances, consumption can be seen amongst all these challenges as a serious area of research. Data from sensor nodes are transmitted by most WSN energy either among many nodes or to the base station (BS), and due this connection, several routing protocols were developed for supporting in data transmission in the WSNs. Extending network lifetime in an operational environment is the major objective of the wireless sensor network. Charging or exchanging sensor node batteries is almost impossible. Energy balancing and energy efficiency are significant research scopes as per designing of routing protocols aimed at self-organized WSNs. A heterogeneous WSN is one where every node has different amount of energy linked to it before it is deployed in a network. Therefore, different energy efficient routing protocols have been proposed which enables lesser consumption of energy, longer stability period which leads to the network lifetime increasing. In this study, the average energy of a WSN is computed after every logical round of operation for our protocol-HPEEA and compare it with two well-known heterogeneous protocols namely-SEP and CCS. At the end of the considered number of logical operations, MATLAB with simulation results confirm that HPEEA protocol have a reduction in the energy consumption compared to other protocols.

До бібліографії