Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "Manet" wg kryterium: Temat


Wyświetlanie 1-23 z 23
Tytuł:
Gwarantowanie jakości usług multimedialnych w sieciach o niskiej przepustowości
The QoS provisioning for multimedia services in low bandwidth networks
Autorzy:
Łubkowski, P.
Powiązania:
https://bibliotekanauki.pl/articles/209538.pdf
Data publikacji:
2008
Wydawca:
Wojskowa Akademia Techniczna im. Jarosława Dąbrowskiego
Tematy:
multimedia
QoS
WLAN
MANET
Opis:
Technologia transferu danych głosowych i wideo, a więc danych multimedialnych, jest aktualnie jedną z najszybciej rozwijających się technologii internetowych. Kluczowym problemem związanym z realizacją usług multimedialnych w sieci IP jest równocześnie zapewnienie odpowiedniego poziomu jakości usług Quality of Service (QoS). Problem ten jest szczególnie widoczny w odniesieniu do mobilnych bezprzewodowych sieci IP, które z uwagi na oferowane możliwości znalazły się na przestrzeni ostatnich lat w centrum zainteresowania producentów, dostawców usług, użytkowników oraz projektantów sieci komputerowych. W artykule przedstawiono problematykę zapewnienia jakości QoS realizacji usług multimedialnych w sieciach o niskiej przepustowości ze szczególnym uwzględnieniem sieci standardu 802.11. W zasadniczej części zaprezentowano analizę mechanizmów wspierania jakości opracowanych w ramach rozszerzenia podstawowej wersji standardu 802.11 oraz mechanizmów związanych z modyfikacją parametrów strumienia danych wideo. Na tym tle przedstawiono koncepcję gwarantowania jakości usług wideo w sieci WLAN.
Implementation of the IEEE 802.11 technology for wireless local area networks (WLANs) has created a new opportunity to support real time and multimedia applications. The varying nature of WLAN channel over time can degrade the QoS level of multimedia service, which calls for elaboration of advanced QoS mechanism supporting multimedia services. The research works applied to video transmission over WLAN mostly concentrate on using link adaptation techniques or optimization of video stream by cross-layer signaling. It appears to be not sufficient as far as a provision of QoS for multimedia services is considered. The paper focuses on evaluation of cross-layer QoS architecture that enables the provision of QoS for multimedia services in military WLAN network. A general description of this architecture is presented with special emphasize on new approach to the multimedia rate control as well as implementation of cross-layer signaling. The paper covers the verification of the proposal by simulation method as well as a discussion of some selected results of simulation.
Źródło:
Biuletyn Wojskowej Akademii Technicznej; 2008, 57, 4; 355-367
1234-5865
Pojawia się w:
Biuletyn Wojskowej Akademii Technicznej
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
SocialRouting : The social-based routing algorithm for Delay Tolerant Networks
Autorzy:
Schoeneich, R. O.
Surgiewicz, R.
Powiązania:
https://bibliotekanauki.pl/articles/963900.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
routing protocols
MANET
DTN
Opis:
Delay and Disruptive Tolerant Networks (DTN) are relatively a new networking concept that could provide a robust communication in wide range of implementations from the space to battlefield or other military usage. However in such dynamic networks, which could be considered as a set of intermittently connected nodes, message forwarding strategy is a key issue. Existing routing solutions concentrate mainly on two major routing families flooding and knowledge based algorithms. This paper presents SocialRouting - the social-based routing algorithm designed for DTN. The use of the social properties of wireless mobile nodes is the novel way of message routing that is based on message ferrying between separated parts of the network. Proposed idea has been extensively tested using simulation tools. The simulations were made based on especially designed for measurements in DTN scenarios and compared with popular solutions.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 2; 167-172
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
RBCP-WSN : The Reliable Biderectional Control Protocol for Wireless Sensor Networks
Autorzy:
Golański, M.
Schoeneich, R. O.
Zgid, D.
Franciszkiewicz, M.
Kucharski, M.
Powiązania:
https://bibliotekanauki.pl/articles/226928.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
routing protocols
MANET
WSN
Opis:
This paper presents the Reliable Bidirectional Control Protocol (RBCP) protocol, which is a transport protocol for Wireless Sensor Networks (WSN), focused on managing sensors' behaviour. It aims to be a utility for reliable control data transferring from source to destination unit in the network. Considering the related studies on transport protocols, which are mostly dedicated to a single-direction reliable data transport, RBCP is the answer for the lack of control mechanisms in WSNs based on bidirectional communication. The first part of this paper is focused on general presentation of the proposed solution. In the next part, evaluation of the idea and final functionality are discussed. It will finally show the results of undergone testing stage.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 201-207
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The channel for hidden data transmission in WSN
Autorzy:
Schoeneich, R. O.
Golański, M.
Kucharski, M.
Franciszkiewicz, M.
Zgid, D.
Powiązania:
https://bibliotekanauki.pl/articles/226093.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
aggregation
message hidding
MANET
WSN
Opis:
This paper describes an idea and realisation of hidden data transmision using Tiny Aggregation Covert Channel (TAGCC) in Wireless Sensor Networks. Our solution uses data aggregation mechanism called Tiny Aggregation (TAG). The protocol is based on idea of hidden messages sending without generate additional data packets and encryption. The paper describes details of proposed algorithm and simulation results obtained during testing of the sensor networks with hidden channel TAGCC.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 209-216
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance of IP address auto-configuration protocols in Delay and Disruptive Tolerant Networks
Autorzy:
Schoeneich, R. O.
Sutkowski, P.
Powiązania:
https://bibliotekanauki.pl/articles/227276.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
address assignment
auto configuration
MANET
DTN
Opis:
At this moment there is a lack of research respecting Mobile Ad-hoc Networks (MANET) address assignment methods used in Delay Tolerant Networks (DTN). The goal of this paper is to review the SDAD, WDAD and Buddy methods of IP address assignment known from MANET in difficult environment of Delay and Disruptive Tolerant Networks. Our research allows us for estimating the effectiveness of the chosen solution and, therefore, to choose the most suitable one for specified conditions. As a part of the work we have created a tool which allows to compare these methods in terms of capability of solving address conflicts and network load. Our simulator was created from scratch in Java programming language in such a manner, that implementation of new features and improvements in the future will be as convenient as possible.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 2; 173-178
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Authentication architecture using threshold cryptography in Kerberos for mobile ad hoc networks
Autorzy:
Gharib, H
Belloulata, K
Powiązania:
https://bibliotekanauki.pl/articles/103196.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
authentication
attacks
Kerberos
MANET
threshold cryptography
Opis:
The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 12-18
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Link Quality and Energy Aware Geographical Routing in MANETs using Fuzzy Logics
Autorzy:
Mishra, P.
Gandhi, C.
Singh, B.
Powiązania:
https://bibliotekanauki.pl/articles/308336.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
GPSR
LAR
MANET
RSSI
SINR
SNR
Opis:
In literature, varieties of topology and geographical routing protocols have been proposed for routing in the MANETs. It is widely accepted that the geographical routings are a superior decision than topological routings. Majority of geographical routing protocols assume an ideal network model and choose the route that contains minimum number of hops. However, in reality, nodes have limited battery power and wireless links are additionally unreliable, so they may highly affect the routing procedure. Thus, for reliable data transmission, condition of the network such as link quality and residual energy must be considered. This paper aims to propose a novel multi-metric geographical routing protocol that considers both links-quality and energy metric along with progress metric to choose the next optimal node. The progress is determined by utilizing greedy as well as compass routing rather than pure greedy routing schemes. To combine these metrics, fuzzy logics are used to get the optimal result. Further, the protocol deals with “hole” problem and proposes a technique to overcome it. Simulations show that the proposed scheme performs better in terms of the packet delivery ratio, throughput and residual energy than other existing protocols.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 5-17
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On IPv6 Experimentation in Wireless Mobile Ad Hoc Networks
Autorzy:
Grajzer, M.
Głąbowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/309525.pdf
Data publikacji:
2014
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
IPv6 simulation
IPv6 wireless testbed
MANET experimentation
MANET protocols evaluation
Neighbor Discovery ++ (ND++)
NS-3
Opis:
With the growing interest towards the Internet of Things IPv6-based mobile ad hoc networks (MANETs) become a key enabling technology offering the possibility of automated, unsupervised network configuration and operation. Such a functionality calls for an accurate and reliable testing of the newly proposed solutions, which is challenging due to the dynamic, decentralized and ad hoc nature of MANETs. In this work selected topics are presented on performing IPv6 protocols experimentation in wireless, IPv6-only mobile ad hoc networks – including both simulation – and testbed-based evaluation. Based on the authors experience with the evaluation of the extended IPv6 Neighbor Discovery protocol (ND++) proposed during the course of research, the selection of an opensource simulation environment is presented and a comparison between simulation and emulation experimentation methods is provided. Benefits and drawbacks of both these methodologies for testing IPv6 solutions are depicted. Moreover, the important aspects of topology and mobility considerations are considered. Finally the authors pro.ose a testing approach that would allow for a detailed and accurate evaluation by means of open-source, easily accessible and low-cost methodologies.
Źródło:
Journal of Telecommunications and Information Technology; 2014, 3; 71-81
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Energy Aware MPR Selection Mechanism in OLSR-based Mobile Ad Hoc Networks
Mechanizm selekcji węzłów z ograniczeniami energii w sieciach mobilnych Ad hoc oparty na protokole OLSR
Autorzy:
Wardi, Mr.
Higami, Y.
Kobayashi, S.
Hirata, Kouji
Powiązania:
https://bibliotekanauki.pl/articles/972141.pdf
Data publikacji:
2010
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
MANET
OLSR
wybór węzłów MPR
MPR selection
Opis:
OLSR is a proactive routing protocol for mobile ad hoc networks (MANETs). OLSR uses the concept of MPR selection mechanism to reduce broadcast packets. Because mobile nodes in MANETs are powered by batteries, MPR nodes often run out of energy. This paper introduces a residual energy-based OLSR (REOLSR) protocol. REOLSR selects MPR nodes based on residual energy of their symmetric 1-hop neighbor nodes. The aim is to avoid selecting nodes with lower residual energy as MPR nodes in order that the protocol minimizes the MPR nodes run out of their energy faster. The simulation results show that REOLSR increases network throughput efficiently.
OLSR jest proaktywnym protokołem routingu dla mobilnych sieci ad hoc (MANETs). Wykorzystuje on ideę mechanizmu selekcji węzłów do transmisji wielopunktowej (MPR) w celu zredukowania liczby transmitowanych pakietów. Węzły MPR są bardzo obciążone, a więc ich źródła energii powinny być oszczędzane. Ponieważ węzły mobilne w sieci MANET są zasilane z baterii, zatem węzły MPR często rozładowują swoje źródła zasilania. W artykule zaproponowano modyfikację protokołu OLSR (REOLSR) opartą na analizie energii resztkowej. Protokół REOLSR wybiera węzły MPR w oparciu o kryterium ich energii resztkowej ich symetrycznych sąsiednich węzłów typu 1-hop. Protokół uwzględnia także liczbę węzłów będących w zasięgu i stopień każdego węzła. Celem jest minimalizacja wyboru węzłów zużywających szybciej swoje źródło energii. Protokół ma zminimalizować używanie węzłów o wyładowanych źródłach zasilania. Wyniki symulacji pokazują, że REOLSR zwiększa wydajność osiągów sieci.
Źródło:
Pomiary Automatyka Kontrola; 2010, R. 56, nr 11, 11; 1382-1385
0032-4140
Pojawia się w:
Pomiary Automatyka Kontrola
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An Improved Greedy Forwarding Scheme in MANETs
Autorzy:
Mishra, P.
Gandhi, C.
Singh, B.
Powiązania:
https://bibliotekanauki.pl/articles/308279.pdf
Data publikacji:
2017
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
MANET
distance-based routing
direction-based routing
greedy forwarding
Opis:
Position-based routing protocols are widely accepted efficient solution for routing in MANETs. The main feature of position-based routing protocols is to use greedy forwarding methods to route data. The greedy forwarding methods select a node, either having maximum progress towards destination (distance-based principle) or minimum deviation with line between source and destination (direction-based strategy). The first method minimizes the hopcount in a path and on the other hand, second method minimizes the spatial distance between source and destination. The distance-based routing has a great impact on the selection of reliable node and the direction based routing plays a major role to increase the stability of route towards destination. Therefore, in this paper authors propose a weighted forwarding method, which combines both the selection, schemes to select an optimal next forwarding node in a range. The simulation results show that the proposed scheme performs better than existing position-based routing protocols.
Źródło:
Journal of Telecommunications and Information Technology; 2017, 1; 50-55
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Analyze the Performance of Routing Protocols in Clustered Ad Hoc Networks: A Survey
Autorzy:
Parameswaran, T.
Palanisamy, C.
Bhagya devi, P.
Powiązania:
https://bibliotekanauki.pl/articles/1192154.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
MANET
Clustering
Routing Protocol
Quality of Service
Clustering algorithms
Opis:
A Mobile ad hoc network is a continuously self-forming, infrastructure-less network of mobile devices connected without wire. Routing protocols for Mobile ad hoc network are responsible for maintaining the routes in the network and have to ensure the reliable multi-hop communication. Many existing routing protocol approaches measures the performance of ad hoc networks. In ad hoc network faces some challenges like Qos, network congestion, data collision. Using clustering in MANET to avoid packet transmission delay, network congestion and packet loss, etc. This paper aims to provide a comprehensive study of the routing protocol performance in clustered ad hoc network.
Źródło:
World Scientific News; 2016, 45, 2; 252-263
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
With using fuzzy logic in the MANET
Autorzy:
Jelodar, H
Aramideh, J
Powiązania:
https://bibliotekanauki.pl/articles/102997.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
AODV routing protocol
DSDV routing protocol
fuzzy expert system
MANET
Opis:
Mobile ad hoc networks have consisted of the nodes which are freely displaced. In other words, this network has dynamic topology. Routing protocols find route of forwarding data packets from the source node to the destination node. A routing protocol plays important role in finding the shortest time and the route path. In this paper, considering significance of the subject, attempt has been made to present a model using fuzzy logic approach to evaluate and compare two routing protocols i.e. AODV DSDV using effective factor of the number of nodes based on 2 outputs of delay and throughput rate (totally fuzzy system with four outputs) in order to select one of these two routing protocols properly under different conditions and based on need and goal. To show efficiency and truth of fuzzy system, two protocols have been evaluated completely equally using NS-2 simulator and attempt has been made to prove efficiency of the designed fuzzy system by comparing results of simulation of fuzzy system and NS-2 software.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 22; 19-25
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Load-balanced route discovery for mobile ad hoc networks
Autorzy:
Abolhasan, M.
Lipman, J.
Wysocki, T. A.
Powiązania:
https://bibliotekanauki.pl/articles/309094.pdf
Data publikacji:
2006
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
ad hoc routing
MANET
load balancing
on-demand routing
protocols
Opis:
This paper presents flow-aware routing protocol (FARP), a new routing strategy designed to improve load balancing and scalability in mobile ad hoc networks. FARP is a hop-by-hop routing protocol, which introduces a flow-aware route discovery strategy to reduce the number of control overheads propagating through the network and distributes the flow of data through least congested nodes to balance the network traffic. FARP was implemented in GloMoSim and compared with AODV. To investigate the load distribution capability of FARP new performance metrics were introduced to measure the data packet flow distribution capability of the each routing protocol. The simulation results obtained illustrate that FARP achieves high levels of throughput, reduces the level of control overheads during route discovery and distributes the network load more evenly between nodes when compared to AODV. This paper also describes a number of alternative strategies and improvements for the FARP.
Źródło:
Journal of Telecommunications and Information Technology; 2006, 1; 38-45
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Minimizing Delay Using Dynamic Blocking Expanding Ring Search Technique for Ad Hoc Networks
Autorzy:
Mhatre, Kavita
Khot, Uday
Powiązania:
https://bibliotekanauki.pl/articles/1844446.pdf
Data publikacji:
2020
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
AODV
BERS
ERS
BERS+
DBERS
MANET
latency
energy efficiency
routes discovery
Opis:
Energy and latency are the significant Quality of Service parameters of ad hoc networks. Lower latency and limited energy expenditure of nodes in the ad hoc network contributes to a prolonged lifetime of the network. Reactive protocols determine the route to the destination using a route discovery process which results in increased delay and increased energy expenditure. This paper proposes a new technique of route discovery, Dynamic Blocking Expanded Ring Search (DBERS) which minimizes time delay and energy required for route discovery process. DBERS reduces energy expenditure and time delay occurring in the existing route discovery techniques of reactive protocols. The performance of DBERS is simulated with various network topologies by considering a different number of hop lengths. The analytical results of DBERS are validated through conduction of extensive experiments by simulations that consider topologies with varying hop lengths. The analytical and simulated results of DBERS are evaluated and compared with widely used route discovery techniques such as BERS, BERS+. The comparison of results demonstrates that DBERS provides substantial improvement in time efficiency and also minimizes energy consumption.
Źródło:
International Journal of Electronics and Telecommunications; 2020, 66, 4; 723-728
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A novel approach to enhance the performance of mobile ad hoc network (manet) through a new bandwidth optimization technique
Autorzy:
Rahman, Md. Torikur
Powiązania:
https://bibliotekanauki.pl/articles/117738.pdf
Data publikacji:
2019
Wydawca:
Polskie Towarzystwo Promocji Wiedzy
Tematy:
MANET
leaky bucket
token bucket
delay
bandwidth optimization
komunikacja mobilna
opóźnienie
optymalizacja przepustowości
Opis:
Now is the age of information technology. World is advancing day by day. At present in this progressing world communication from one place to another has become so easy, less costly, and faster. This modern life is almost impossible with the help of these communication technologies. People need to talk, need to share data, need to express their emotion from long distance. So they need to use technologies to communicate with one another. Nowadays the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. Mobile Ad Hoc Network (MANET) is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses. Mobile Ad Hoc Network (MANET) is an emerging area of research to provide various communication services to the end users. But these communication services of Mobile Ad Hoc Network (MANET) use high capacity of bandwidth and a big amount of internet speed. Bandwidth optimization is indispensable in various communications for successful acceptance and deployment of such a technology. Thinking of this, I propose a New Bandwidth Optimization Technique that Enhance the Performance of Mobile Ad Hoc Network (MANET). The new Bandwidth optimization technique which is more efficient in terms of time delay in Mobile Ad Hoc Network (MANET) can redirect a new way towards optimization development in network communication and device junction technology.
Źródło:
Applied Computer Science; 2019, 15, 2; 42-52
1895-3735
Pojawia się w:
Applied Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance Analysis of the Cognitive Radio Network with Opportunistic Spectrum Access
Autorzy:
Chęciński, R.
Kaszuba-Chęcińska, A.
Kryk, M.
Łopatka, J.
Malon, K.
Skokowski, P.
Powiązania:
https://bibliotekanauki.pl/articles/226072.pdf
Data publikacji:
2018
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
MANET
cognitive radio
dynamic spectrum access
USRP
RF switch matix
real time demonstrator
Opis:
Efficient access to the spectral resources becomes a challenge for future military wireless communication systems. It requires spectral situation awareness, knowledge of current regulations, local policies and hardware platform limitations. It can be achieved by cognitive radios, realizing cognitive cycle, consisting typically of continuous observation, orientation, reasoning and decision making. All these elements must be realized in parallel and shouldn't interfere with each other. Even more difficult issue is related with cooperation between different nodes, especially in wireless domain, in harsh propagation conditions. Unpredictable phenomena create hard conditions for all deterministic behavior models, and their reproduction is a key element for efficient operation of the network. Very popular computer simulations are always simplified, and real time implementation gives an opportunity to make the next step in system elaboration. This paper presents a real-time demonstrator of cognitive radio network. It can work both in wired mode, using radio channel emulator and in mobile mode, to verify influence of real conditions on proposed cognitive solutions and assess their effectiveness.
Źródło:
International Journal of Electronics and Telecommunications; 2018, 64, 1; 51-56
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance comparision of different routing protocols with fuzzy inference system in manet
Autorzy:
Goswami, S
Joardar, S
Das, C B
Powiązania:
https://bibliotekanauki.pl/articles/101870.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
MANET
AODV
DSDV
DSR
expert system
control overhead
delay
PDR
NS-2 software
Opis:
An ad hoc wireless network consists of mobile networks which create an underlying architecture for communication without the help of traditional fixed-position routers. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks (MANET), so it requires different protocols. The node moves at different speeds in an independent random form, connected by any number of wireless links, where each node is ready to pass or forward both data and control traffic unrelated to its own use ahead (routing) to other nodes in a flexible interdependence of wireless communication in between. In contrast to infrastructure wireless networks, where the communication between network nodes is take place by a special node known as an access point. It is also, in contrast to wired networks in which the routing task is performed by special and specific devices called routers and switches. In this paper, we consider fuzzy inference system, an attempt has been made to present a model using fuzzy logic approach to evaluate and compare three routing protocols i.e. AODV, DSDV and DSR using effective factor of the number of nodes based on 3 outputs of control overhead, delay and PDR (totally fuzzy system with 4 outputs) in order to select one of these two routing protocols properly under different conditions and based on need and goal. To show efficiency and truth of fuzzy system, three protocols have been evaluated equally using NS-2 simulator and attempt has been made to prove efficiency of the designed fuzzy system by comparing results of simulation of fuzzy system and NS-2 software.
Źródło:
Advances in Science and Technology. Research Journal; 2015, 9, 27; 149-156
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protokoły trasowania w sieciach AD HOC
Routing protocols in ad hoc networks
Autorzy:
Smolarek, A.
Malinowski, T.
Powiązania:
https://bibliotekanauki.pl/articles/91469.pdf
Data publikacji:
2012
Wydawca:
Warszawska Wyższa Szkoła Informatyki
Tematy:
protokoły routingu
sieci ad-hoc
Manet
symulacja
routing protocols
ad hoc networks
simulation
Opis:
W artykule dokonano charakterystyki protokołów trasowania stosowanych w bezprzewodowych sieciach Ad Hoc, a także zilustrowano na drodze symulacji komputerowej zachowanie wybranych protokołów trasowania. Badania porównawcze zrealizowane zostały w środowisku symulacyjnym ns-2.
The article presents the characteristics of routing protocols used in wireless ad hoc networks, and is illustrated through computer simulation of the behavior of some routing protocols. Comparative studies were carried out in an ns-2 simulation environment.
Źródło:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki; 2012, 6, 8; 47-60
1896-396X
2082-8349
Pojawia się w:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
An octopus-inspired intrusion deterrence model in distributed computing system
Autorzy:
Olajubu, E. A.
Akinwale, A.
Ogundoyin, K. I.
Powiązania:
https://bibliotekanauki.pl/articles/305521.pdf
Data publikacji:
2016
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
CIDM
MANET
intrusion detection
mobility
routing load
throughput
1-hop neighbors
wireless
malicious
injection
Opis:
The study formulated and evaluated a model for effective management of ma- licious nodes in mobile Ad-hoc network based on Ad-Hoc on- demand distance vector routing protocol. A collaborative injection model called Collaborative Injection Deterrence Model (CIDM) was formulated using stochastic theory. The definition of the model was presented using graph theory. CIDM was simulated using three different scenarios. The three scenarios were then compared using packets delivery ratio (PDR), routing load, throughput and delay as performance metrics. The simulation result showed that CIDM reduce considerably the rate of packets dropped caused by malicious nodes in MANET network. CIDM did not introduce additional load to the network and, yet produce higher throughput. Lastly, the access delay in CIDM is minimal compared with convectional OADV. The study developed a model to mete out a punitive measure to rogue nodes as a form of intrusion deterrence without degrading the overall performance of the network. The well known CRAWDAD dataset was used in the simulation.
Źródło:
Computer Science; 2016, 17 (4); 483-501
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A static test-bed for the evaluation and optimization of multihop wireless network protocols
Autorzy:
Bongartz, H. H.-J.
Bachran, T.
Powiązania:
https://bibliotekanauki.pl/articles/308216.pdf
Data publikacji:
2008
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
MANET
mobile ad hoc network
multihop wireless network
multicast
wireless test-bed
simulation
explicit multicast
Opis:
We investigate the performance of multicast transmissions in a simple stationary wireless multihop ad hoc network test-bed. We compare several methods for MANET multicast using implementations for the protocols MOLSR, SMOLSR and SMF with an approach that uses explicit multicast and link-layer retries for reliable multicast. Results from the test-bed are compared with simulation results. We find that implementing a combination of explicit multicast with a retry mechanism gives the most promising results in test-bed and simulation compared with other approaches.
Źródło:
Journal of Telecommunications and Information Technology; 2008, 2; 62-69
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Heavy Gas Cloud Boundary Estimation and Tracking using Mobile Sensors
Autorzy:
Krzysztoń, M.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309177.pdf
Data publikacji:
2016
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
deployment strategies
heavy gas cloud boundary tracking
MANET
mobile ad hoc network
mobility models
sensor networks
Opis:
This paper addresses issues concerned with design and managing of monitoring systems comprised of mobile wireless sensing devices (MANETs). The authors focus on self-organizing, cooperative and coherent networks that maintain a continuous communication with a central operator and adopt to changes in an unknown environment to achieve a given goal. The attention is focused on the development of MANET for heavy gas clouds detection and its boundary estimating and tracking. Two strategies for constructing the MANET are described, in which sensors explore the region of interest to detect the gas cloud, create temporary network topology and finally, cover the cloud boundary, and track the moving cloud. The utility and efficiency of the proposed strategies has been justified through simulation experiments.
Źródło:
Journal of Telecommunications and Information Technology; 2016, 3; 38-49
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Detection of wormhole attack using cooperative bait detection scheme
Autorzy:
Rajkumar, M. Newlin
Shiny, M. U.
Rani, R. Amsa
Powiązania:
https://bibliotekanauki.pl/articles/1182916.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
index terms-cooperative bait detection scheme (cbds)
dynamic source routing (dsr)
mobile adhoc network (manet)
wormhole attacks
Opis:
Mobile Ad-Hoc Network is an wireless systems it supports mobile communication in a network. MANETs are affected by several security attacks but it affects the features that are like open medium, dynamical changes in topology, lack of central monitoring and management and it not obtain the clear defence mechanism to MANETs. To prevent or detect malicious nodes launching collaborative wormhole attacks is a challenge. The existing system designs a dynamic source routing (DSR)-based routing mechanism, but it is also referred to as the cooperative bait detection scheme (CBDS) to detect the wormhole attacks effectively. Here we describes the various wormhole attacks and prevention methods for wormhole attack.
Źródło:
World Scientific News; 2016, 49, 2; 78-89
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Improved MCBDS for defending against gray hole and black hole attacks in MANETs
Autorzy:
Haghighi, A.
Mizanian, K.
Mirjalily, G.
Powiązania:
https://bibliotekanauki.pl/articles/102490.pdf
Data publikacji:
2016
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
mobile ad hoc network
cooperative bait detection scheme (CBDS)
modified CBDS (MCBDS)
black hole
gray hole
MANET
Opis:
Mobile Ad-hoc Networks (MANETs) are widely used nowadays. Because of their characteristics as open media, dynamic topology, being infrastructure-less and lack of centralized monitoring, MANET is vulnerable to a wide range of attacks like blackhole and grayhole. Blackhole and grayhole attacks refer to the attacks that breach the security by performing packet forwarding and routing misbehavior and cause denial of service in MANETs. In this paper we improved our previous work on MCBDS, we reduced false-positive rate more than before and on average it dropped to zero. The proposed method employs Network Simulator-2 (NS-2) to validate the effectiveness under different scenarios. Simulation results show that improved MCBDS has same performance as CBDS in terms of throughput and end-to-end delay and as much as the presence of malicious nodes increased, improved MCBDS performs better than CBDS.
Źródło:
Advances in Science and Technology. Research Journal; 2016, 10, 30; 1-8
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
    Wyświetlanie 1-23 z 23

    Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies