Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "protocols" wg kryterium: Temat


Tytuł:
SocialRouting : The social-based routing algorithm for Delay Tolerant Networks
Autorzy:
Schoeneich, R. O.
Surgiewicz, R.
Powiązania:
https://bibliotekanauki.pl/articles/963900.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
routing protocols
MANET
DTN
Opis:
Delay and Disruptive Tolerant Networks (DTN) are relatively a new networking concept that could provide a robust communication in wide range of implementations from the space to battlefield or other military usage. However in such dynamic networks, which could be considered as a set of intermittently connected nodes, message forwarding strategy is a key issue. Existing routing solutions concentrate mainly on two major routing families flooding and knowledge based algorithms. This paper presents SocialRouting - the social-based routing algorithm designed for DTN. The use of the social properties of wireless mobile nodes is the novel way of message routing that is based on message ferrying between separated parts of the network. Proposed idea has been extensively tested using simulation tools. The simulations were made based on especially designed for measurements in DTN scenarios and compared with popular solutions.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 2; 167-172
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
RBCP-WSN : The Reliable Biderectional Control Protocol for Wireless Sensor Networks
Autorzy:
Golański, M.
Schoeneich, R. O.
Zgid, D.
Franciszkiewicz, M.
Kucharski, M.
Powiązania:
https://bibliotekanauki.pl/articles/226928.pdf
Data publikacji:
2017
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
routing protocols
MANET
WSN
Opis:
This paper presents the Reliable Bidirectional Control Protocol (RBCP) protocol, which is a transport protocol for Wireless Sensor Networks (WSN), focused on managing sensors' behaviour. It aims to be a utility for reliable control data transferring from source to destination unit in the network. Considering the related studies on transport protocols, which are mostly dedicated to a single-direction reliable data transport, RBCP is the answer for the lack of control mechanisms in WSNs based on bidirectional communication. The first part of this paper is focused on general presentation of the proposed solution. In the next part, evaluation of the idea and final functionality are discussed. It will finally show the results of undergone testing stage.
Źródło:
International Journal of Electronics and Telecommunications; 2017, 63, 2; 201-207
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Stress Testing MQTT Server for Private IOT Networks
Autorzy:
Hijazi, Ghofran
Hadi Habaebi, Mohamed
Al-Haddad, Ahmed
Zyoud, Alhareth Mohammed
Powiązania:
https://bibliotekanauki.pl/articles/1844629.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
IoT
Protocols
MQTT
computer networks
Opis:
The rapid development of the Internet of Things (IoT) and the wide area of application rise the IoT concept to be the future of the internet. Indeed, IoT environment has a special nature with a lot of constraints in term of resource consumption. Moreover, the data exchanged between things and the internet is big data. In order to achieve efficiency in IoT communication, many technologies and new protocols based on these technologies have been developed. This paper aims to study the performance of Message Queuing Telemetry Transport (MQTT) by implementing this protocol on test-bed network infrastructure and analyzing the performance properties such as delay, jitter, packet loss and throughput for real time and non-real time scenarios. Finally, future research issues in MQTT protocol are suggested.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 229-234
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Energy Saving Chaotic Sequence Based Encryption, Authentication and Hashing for M2M Communication of IoT Devices
Autorzy:
Kościug, Bartosz
Bilski, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/27311876.pdf
Data publikacji:
2023
Wydawca:
Polska Akademia Nauk. Czasopisma i Monografie PAN
Tematy:
Power optimization
Security protocols
machine to machine communications
Application layer protocols
IoT
Opis:
In this paper, the secure low-power Internet of Things (IoT) transmission methods for encryption and digital signature are presented. The main goal was to develop energyefficient method to provide IoT devices with data confidentiality, integrity, and authenticity. The cryptograph energy efficient and security algorithms modifications for IoT domain were made. The novelty in our solution is the usage of encryption method popular in the image processing in the domain of the Internet of Things. Proposed modification improves immunity for the brute-force and plain-text attacks. Furthermore, we propose the modifications for hash calculation method to transform it into digital signature calculation method that is very sensitive to input parameters. The results indicate low energy consumption of both methods, however it varies significantly depending on the architecture of the devices.
Źródło:
International Journal of Electronics and Telecommunications; 2023, 69, 2; 253--259
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A Survey of Energy Efficient Security Architectures and Protocols for Wireless Sensor Networks
Autorzy:
Daniluk, K.
Niewiadomska-Szynkiewicz, E.
Powiązania:
https://bibliotekanauki.pl/articles/309341.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
energy aware security architectures
routing protocols
security protocols
wireless sensor networks
WSN
Opis:
Data security and energy aware communication are key aspects in design of modern ad hoc networks. In this paper we investigate issues associated with the development of secure IEEE 802.15.4 based wireless sensor networks (WSNs) - a special type of ad hoc networks. We focus on energy aware security architectures and protocols for use in WSNs. To give the motivation behind energy efficient secure networks, first, the security requirements of wireless sensor networks are presented and the relationships between network security and network lifetime limited by often insufficient resources of network nodes are explained. Second, a short literature survey of energy aware security solutions for use in WSNs is presented.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 64-72
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Mechanizmy QOS w kontekście integrowania sieci IPV4 i IPV6
Autorzy:
Malinowski, T.
Powiązania:
https://bibliotekanauki.pl/articles/91345.pdf
Data publikacji:
2010
Wydawca:
Warszawska Wyższa Szkoła Informatyki
Tematy:
system QoS
sieci IPv6
sieci IPv4
protocols IPv6
protocols IPv4
Opis:
Artykuł przedstawia metody klasyfikowania pakietów w kontekście integrowania sieci z protokołem IPv6 i IPv4. IPv6 wprowadza pewne dodatkowe udogodnienia, jak pole flow label w nagłówku pakietu IP, ale realizacja systemu QoS w sieci IPv6 oparta jest na zasadach stosowanych w sieciach IPv4. Szczególnie istotnym staje się wybór miejsca klasyfikowania pakietów i mechanizmu integracji sieci IPv4 z siecią IPv6. Rozważania zawarte w artykule dotyczą realizacji QoS przy zastosowaniu podwójnego stosu, tunelowania i translacji protokołów.
The article presents methods of classifying packets in the context of integrating the net with IPv6 and IPv4 protocols. IPv6 introduces some additional features (like flow label field in the packet header) and the current support for QoS mechanisms in IPv6 implementations approaches the corresponding QoS support in IPv4. The choice of the place of classifying packets and the mechanism of integrating the IPv4 and IPv6 networks are particularly important. QoS implementations with the use of dual-stack, tunneling and translation protocols are discussed.
Źródło:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki; 2010, 4, 4; 19-40
1896-396X
2082-8349
Pojawia się w:
Zeszyty Naukowe Warszawskiej Wyższej Szkoły Informatyki
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Load balancing of communication channels with the use of routing protocols
Autorzy:
Grabowski, F.
Bolanowski, M.
Paszkiewicz, A.
Powiązania:
https://bibliotekanauki.pl/articles/106285.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
routing protocols
load balancing
ECMP
Opis:
In the article the authors propose a method for load-balancing of network resources for the case which uses a routing protocols. In the first part of the article the authors present currently used algorithms for load balancing and possibilities of their modification. Through the introduction of additional hardware components for each node: the agent and the probe; it is possible to monitor and control the current system performance. The whole analyzed network is treated as a complex system. This allows to eliminate overloading of route nodes (through ongoing analysis of the optimal operating point for a given node). Load balancing can be achieved using a modified mechanism of ECMP. The proposed approach allows for dynamic adjustment of load to network resources and thus effectively to balance network traffic.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2014, 14, 3; 77-85
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
SXCCP+: Simple XML Concurrency Control Protocol for XML Database Systems
Autorzy:
Jankiewicz, K.
Powiązania:
https://bibliotekanauki.pl/articles/970819.pdf
Data publikacji:
2009
Wydawca:
Polska Akademia Nauk. Instytut Badań Systemowych PAN
Tematy:
concurrency control
XML
databases
protocols
Opis:
Increasing significance and popularity of XML is the main reason why many commercial object-relational database management systems (ORDBMSs) developed XML storage and processing functionality. Additionally, there are new types of specialized database systems known as 'native' XML database systems. As we know, concurrency control is one of the most important mechanisms in DBMSs. Unfortunately, concurrency control mechanisms, which have been used so far in commercially available native XML DBMSs, offer very low degree of concurrency. The development of universal and effective concurrency control protocol for accessing XML data, with high degree of concurrency, is a necessary condition of the native XML database growth. The aim of this paper is to propose a new concurrency control protocol in XML document access. This protocol is based on primitive operations, which can be treated as a unification platform for any of the XML access methods.
Źródło:
Control and Cybernetics; 2009, 38, 1; 215-237
0324-8569
Pojawia się w:
Control and Cybernetics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Performance of a router based on NetFPGA-1Gb/s cards
Autorzy:
Paszkiewicz, A.
Więch, P.
Gomółka, Z.
Powiązania:
https://bibliotekanauki.pl/articles/114339.pdf
Data publikacji:
2015
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
NetFPGA
computer networks
routing protocols
performance
Opis:
Providing a flexible platform that also allows prototyping new network solutions opens new possibilities for designers, researchers and administrators. This solution are NetFPGA systems. Their additional advantage is the possibility of testing new networking protocols in a real heterogeneous environment. Until now, it has been mainly possible by using software tools such as, e.g. Opnet Modeler. Despite the very good mapping network environment in this type of solutions, it is necessary to carry out tests in the real network for their correct evaluation. The paper focuses on the analysis of the solution performance based on NetFPGA-1G cards as an alternative to the network nodes based on ASICs. Therefore a series of tests was carried out. They demonstrated the applicability of the platform in different layers of the network, e.g. access, aggregation, or core. Thus, the paper goal is to show the possibilities of using NetFPGA solutions in a network environment mainly of enterprise class.
Źródło:
Measurement Automation Monitoring; 2015, 61, 9; 446-449
2450-2855
Pojawia się w:
Measurement Automation Monitoring
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Assessment of RIP-V1 and OSPF-V2 protocol with consideration of convergence criteria and sending protocols traffic
Autorzy:
Jelodar, H
Nikravesh, P
Powiązania:
https://bibliotekanauki.pl/articles/102613.pdf
Data publikacji:
2014
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
dynamic routing protocols
OSPF protocol
RIP protocol
Opis:
Routing Protocols are underlying principles in networks like internet, transport and mobile. Routing Protocols include a series of rules and algorithms that consider routing metric and select the best way for sending healthy data packets from origin to destination. Dynamic routing protocol compatible to topology has a changeable state. RIP and OSPF are dynamic routing protocol that we consider criteria like convergence and sending protocols traffic assessment RIP first version and OSPF second version. By the test we have done on OPNET stimulation we understood that the OSPF protocol was more efficient than RIP protocol.
Źródło:
Advances in Science and Technology. Research Journal; 2014, 8, 21; 1-4
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A study on routing problems and different routing protocols in wireless sensor networks
Autorzy:
Venkatesakumar, V.
Ragasudha, R.
Powiązania:
https://bibliotekanauki.pl/articles/1182939.pdf
Data publikacji:
2016
Wydawca:
Przedsiębiorstwo Wydawnictw Naukowych Darwin / Scientific Publishing House DARWIN
Tematy:
wireless sensor networks
routing protocols
routing problems
Opis:
Extensive utilization of WSN is the reason of advancement of numerous routing protocols. The Late advances in WSN now witness the expanded enthusiasm for the potential use in applications like Environmental, Military, Space Exploration, Health (Scanning), Vehicular Movement, disaster management, Mechanical anxiety levels of appended objects, battle field observation and so forth. Sensors are required to be remotely conveyed in unattended situations. Propels in WSN innovation has given the accessibility of little and minimal effort sensor hubs with a capacity of sensing different sorts of physical and natural environment conditions, wireless communication and data processing. Assortment of sensing capacities results in bounty of application areas. However, the attributes of WSN require more powerful strategies for data forwarding. The sensor hubs in WSN have a constrained transmission range, and their handling and capacity abilities and as well as their energy assets are also restricted. Routing protocols for WSN are in charge of keeping up the routes in the network system and need to guarantee dependable multi-hop communication under these conditions. Routing as one key innovations of wireless sensor systems has now turned into a hot examination on the grounds that the uses of WSN are all over the place, it is unthinkable that there is a routing protocol suitable for all applications. In this paper, we give an overview of routing issues routing protocols for Wireless Sensor Network.
Źródło:
World Scientific News; 2016, 49, 2; 236-248
2392-2192
Pojawia się w:
World Scientific News
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
BSBI - a Simple Protocol for Remote Verification of Identity
Autorzy:
Kozakiewicz, A.
Pałka, P.
Powiązania:
https://bibliotekanauki.pl/articles/309333.pdf
Data publikacji:
2012
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
access control
authentication
biometric verification
network protocols
Opis:
The paper presents the design and the rationale behind a simple verification protocol for autonomous verification modules, and the architecture enabling use of such modules. The architecture assumes strict separation of all personal metadata and the actual verification data. The paper also describes a prototype implementation of the protocol and its extension enabling the state of the module to be monitored from the main system. The proposed design solves the problem of using advanced verification methods, especially biometric ones, in systems where direct implementation is not possible due to hardware incompatibilities, insufficient resources or other limitations.
Źródło:
Journal of Telecommunications and Information Technology; 2012, 3; 50-57
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Transmission Protocol Simulation Framework For The Resource-Constrained Wireless Sensor Network
Autorzy:
Wójcikowski, M.
Powiązania:
https://bibliotekanauki.pl/articles/221437.pdf
Data publikacji:
2015
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
sensor network
computer simulations
sensor network protocols
Opis:
In this paper a prototype framework for simulation of wireless sensor network and its protocols are presented. The framework simulates operation of a sensor network with data transmission, which enables simultaneous development of the sensor network software, its hardware and the protocols for wireless data transmission. An advantage of using the framework is converging simulation with the real software. Instead of creating a model of the sensor network node, the same software is used in real sensor network nodes and in the simulation framework. Operation of the framework is illustrated with examples of simulations of selected transactions in the sensor network.
Źródło:
Metrology and Measurement Systems; 2015, 22, 2; 221-228
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Hyper-heuristics for power-aware routing protocols
Autorzy:
Pilski, M.
Seredynski, F.
Powiązania:
https://bibliotekanauki.pl/articles/92944.pdf
Data publikacji:
2008
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
protocols
ad hoc networks
genetic algorithm
hyper-heuristics
Opis:
The idea underlying hyper-heuristics is to discover some combination of straightforward heuristics that performs very well across a whole range of problems. In this paper we describe genetic algorithm-based (GA) approach that learns such a heuristic combination for solving energy-efficient routing problem in mobile ad hoc networks (MANETs).
Źródło:
Studia Informatica : systems and information technology; 2008, 2(11); 37-47
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Protocols for Wireless Sensor Networks: A Survey
Autorzy:
Kochhar, A.
Kaur, P.
Singh, P.
Sharma, S.
Powiązania:
https://bibliotekanauki.pl/articles/958098.pdf
Data publikacji:
2018
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
cross-layer
Medium Access Control
protocols
Wireless Sensor Networks
Opis:
This paper presents a survey on the MAC and network layer of Wireless Sensor Networks. Performance requirements of the MAC layer are explored. MAC layer protocols for battery-powered networks and energy harvesting-based networks are discussed and compared. A detailed discussion on design constraints and classification of routing protocols is presented. Several routing protocols are compared in terms of such parameters as: energy consumption, scalability, network lifetime and mobility. Problems that require future research are presented. The cross-layer approach for WSNs is also surveyed.
Źródło:
Journal of Telecommunications and Information Technology; 2018, 1; 77-87
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies