Netw. Protoc. Algorithms最新文献

筛选
英文 中文
Grid Coverage Algorithm & Analyzing for wireless sensor networks 无线传感器网络的网格覆盖算法与分析
Netw. Protoc. Algorithms Pub Date : 2014-12-27 DOI: 10.5296/npa.v6i4.6449
Ammar Hawbani, Xingfu Wang, Naji Husaini, Saleem Karmoshi
{"title":"Grid Coverage Algorithm & Analyzing for wireless sensor networks","authors":"Ammar Hawbani, Xingfu Wang, Naji Husaini, Saleem Karmoshi","doi":"10.5296/npa.v6i4.6449","DOIUrl":"https://doi.org/10.5296/npa.v6i4.6449","url":null,"abstract":"The problem of having sufficient coverage is an essential issue in wireless sensor networks (WSN). A high coverage rate delivers a higher quality of service. The aim of coverage strategy is to ensure that there will be a minimum number of nodes (at least one node) with little redundant data to cover every point inside the interest area. This paper addresses the problems of coverage of WSN by proposing two grid-based algorithms: Grid Square Coverage version (1) and Grid Square Coverage version (2). Moreover, we have analyzed the performance of both algorithms and provided a compression between them. The results present that the Grid Square Coverage (1) algorithms has 78% coverage efficiency while the Grid Square Coverage (2) has 73%.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Multi-Agent based Framework for Secure and Reliable Communication among Open Clouds 基于多代理的开放云间安全可靠通信框架
Netw. Protoc. Algorithms Pub Date : 2014-12-27 DOI: 10.5296/npa.v6i4.6028
A. Mehmood, Houbing Song, J. Mauri
{"title":"Multi-Agent based Framework for Secure and Reliable Communication among Open Clouds","authors":"A. Mehmood, Houbing Song, J. Mauri","doi":"10.5296/npa.v6i4.6028","DOIUrl":"https://doi.org/10.5296/npa.v6i4.6028","url":null,"abstract":"Cloud Computing (CC) is an emerging field of Information Technology. CC environment completely relies on the perception of utility, service-oriented, cluster and grid computing. The idea of virtualization discriminates CC from other fields . CC environment provides better, reliable, and scalable services. Since clouds are working independently smooth, but standalone, cloud operation is complex. Therefore the need of interoperability and portability with other clouds come into play which increases the scope of the cloud environment. Then, the security threats are increased in the cloud environments. In order to address the problem, a Secure Multi-Agent based framework for Communication among Open Clouds is proposed in this paper. In the framework, each cloud has a secure Mobile Agent which is responsible of the secure communication among clouds. Thus, authentication of Mobile Agents is performed by the Directory Agent. Directory agents are included in order to avoid the joining malicious or attacker mobile agents into the cloud. The theoretical and practical results show that Multi-agent based framework is more reliable and secure than other cloud environments.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"7 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133995783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
On the Impact of Virtual Private Network Technologies on the Operational Costs of Cellular Machine-to-Machine Communications Platforms for Smart Grids 虚拟专网技术对智能电网蜂窝机对机通信平台运行成本的影响
Netw. Protoc. Algorithms Pub Date : 2014-08-14 DOI: 10.5296/npa.v6i3.5374
G. López, E. achhab, J. I. Moreno
{"title":"On the Impact of Virtual Private Network Technologies on the Operational Costs of Cellular Machine-to-Machine Communications Platforms for Smart Grids","authors":"G. López, E. achhab, J. I. Moreno","doi":"10.5296/npa.v6i3.5374","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5374","url":null,"abstract":"Due to the fact that the information managed in the so-called Smart Grids is extremely sensitive, security is a key requirement for their wide deployment and adoption. However, the use of secure mechanisms entails not only technical costs but also economic costs. This paper discusses several protocols commonly used to establish VPN (Virtual Private Networks) and assesses the impact of using them on the operational costs of a cellular M2M (Machine-to-Machine) communications platform aiming to reduce power consumption and integrate distributed micro-generation at district level.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130308028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Pervasive sensors network for wellness based-on Raspberry Pi 基于树莓派的健康无处不在的传感器网络
Netw. Protoc. Algorithms Pub Date : 2014-08-14 DOI: 10.5296/npa.v6i3.5424
T. Arcas, R. Vilches, Jesus Alcober i Segura, Marc Bajet
{"title":"Pervasive sensors network for wellness based-on Raspberry Pi","authors":"T. Arcas, R. Vilches, Jesus Alcober i Segura, Marc Bajet","doi":"10.5296/npa.v6i3.5424","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5424","url":null,"abstract":"Pervasive sensors networks coexist with users offering them services transparently, without the need for users to interact directly. This work defines an architecture that allows the creation of products and services to provide home automation functionalities for a large segment of population. A platform, on a low cost device and high-capacity computing, as basis of a transparent and indistinguishable sensors network has been designed. This includes simple configuration methods and it is capable of accommodating multiple services, from automation of blinds, lighting controls or security, to mechanisms for monitoring a patient health. A medication reminder service and warning, completely transparent to the user, has been the first developed application. This service plays, at the configured time, a reminder through the speakers. The user will close the event, simply performing the action (take the pill), thanks to the information transmitted by a device installed in the medicines drawer. Otherwise, if he forgets, the system will remind it to the user from time to time.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123220257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Routing Protocols and Quality of Services for Security Based Applications Using Wireless Video Sensor Networks 无线视频传感器网络安全应用的路由协议和服务质量
Netw. Protoc. Algorithms Pub Date : 2014-08-14 DOI: 10.5296/npa.v6i3.5802
M. Atto, C. Guy
{"title":"Routing Protocols and Quality of Services for Security Based Applications Using Wireless Video Sensor Networks","authors":"M. Atto, C. Guy","doi":"10.5296/npa.v6i3.5802","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5802","url":null,"abstract":"Wireless video sensor networks have been a hot topic in recent years; the monitoring capability is the central feature of the services offered by a wireless video sensor network can be classified into three major categories: monitoring, alerting, and information on-demand. These features have been applied to a large number of applications related to the environment (agriculture, water, forest and fire detection), military, buildings, health (elderly people and home monitoring), disaster relief, area and industrial monitoring. Security applications oriented toward critical infrastructures and disaster relief are very important applications that many countries have identified as critical in the near future. This paper aims to design a cross layer based protocol to provide the required quality of services for security related applications using wireless video sensor networks. Energy saving, delay and reliability for the delivered data are crucial in the proposed application. Simulation results show that the proposed cross layer based protocol offers a good performance in term of providing the required quality of services for the proposed application.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125832423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
TCP Performance Enhancement over Wireless Mesh Networks by means of the Combination of Multi-RAT Devices and the MPTCP Protocol 在无线Mesh网络中通过多鼠设备和MPTCP协议的结合提高TCP性能
Netw. Protoc. Algorithms Pub Date : 2014-08-14 DOI: 10.5296/npa.v6i3.5387
David Gómez, Pablo Garrido, Carlos Rabadán, Ramón Agüero, L. Muñoz
{"title":"TCP Performance Enhancement over Wireless Mesh Networks by means of the Combination of Multi-RAT Devices and the MPTCP Protocol","authors":"David Gómez, Pablo Garrido, Carlos Rabadán, Ramón Agüero, L. Muñoz","doi":"10.5296/npa.v6i3.5387","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5387","url":null,"abstract":"The last trends at communications realms, in particular, wireless technologies, where it is more and more usual that devices carry more than one interface (i.e. multi-RAT, Radio Access Technology), to get access to the Internet, question the classic single-path paradigm, imposed by the mainstream transport protocol, TCP. In this work we assess the behavior of Multipath TCP (MPTCP), which allows the transparent breakdown of a single TCP session into multiple simultaneous subflows. This straightforward feature might lead to remarkable performance enhancements, yielding as well a stronger resilience against failures within any of the routes. Moreover, we evaluate three different routing algorithms (link, node and zone disjoint) that aim to discover the optimal route configuration of disjoint paths over a Wireless Mesh Network (WMN), exploiting the possibilities arisen by this brand new protocol. We use the obtained results to evaluate, by means of simulation, the behavior of the MPTCP protocol, showing that the aggregated performance is significatively higher than that of achieved by the traditional single-path and single-flow TCP.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122281449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An approach to a cross layer-based QoE improvement for MANET routing protocols 面向MANET路由协议的跨层QoE改进方法
Netw. Protoc. Algorithms Pub Date : 2014-08-14 DOI: 10.5296/npa.v6i3.5827
R. Sanchez-Iborra, M. Cano
{"title":"An approach to a cross layer-based QoE improvement for MANET routing protocols","authors":"R. Sanchez-Iborra, M. Cano","doi":"10.5296/npa.v6i3.5827","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5827","url":null,"abstract":"Currently, multimedia communications are monopolizing Internet traffic. These services present highly demanding real-time requirements that need great bandwidths in order to provide acceptable quality levels. Meanwhile, the variety of network architectures employed by final users to access these contents is wider and wider. One of the most attractive access networks due to its ease-of-deployment and decentralized architecture is the Mobile Ad-hoc NETworks (MANETs). The inherent dynamic nature of these networks entails the use of appropriate routing protocols in order to obtain good performance in the services supported by the system. In this work, we focus on evaluating the performance of the novel routing protocol Better Approach To Mobile Ad-hoc Networking (BATMAN) and the widely extended IETF experimental drafts Optimized Link State Routing (OLSR) and Ad hoc On-Demand Distance Vector (AODV) protocols supporting video traffic. The results obtained from a chain-topology network have been improved in terms of Quality of Experience (QoE) by means of different modifications at different OSI layers. We have found out that each protocol presents low performance in different scenarios that can be enhanced by means of the proposed techniques. As we show in this work, taking a proper action in the right OSI layer permits an improvement on the multimedia traffic support in MANETs.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126043001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Framed ALOHA Protocol with FIFO-Blocking and LIFO-Push out Discipline 框架ALOHA协议与fifo阻塞和lifo推出规则
Netw. Protoc. Algorithms Pub Date : 2014-08-14 DOI: 10.5296/npa.v6i3.5557
V. Giner, V. Sempere-Payá, David Todolí Ferrandis
{"title":"Framed ALOHA Protocol with FIFO-Blocking and LIFO-Push out Discipline","authors":"V. Giner, V. Sempere-Payá, David Todolí Ferrandis","doi":"10.5296/npa.v6i3.5557","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5557","url":null,"abstract":"This paper considers the framed ALOHA protocol for a finite number of terminals. Terminals are single-buffered, i.e. each one can store only one packet. We derive the throughput and the delay under two types of queue disciplines, first-in-first-out (FIFO) and last-in-first-out LIFO. It is assumed that terminals are independent each other and generate packets of constant size according to a Bernoulli process. The one slot duration equals to the one packet transmission. The analysis is carried out by means of Markovian tools. Some discussion on the applicability of that protocol is addressed.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"13 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Experimental Study of SCTP in NS2 NS2中SCTP的实验研究
Netw. Protoc. Algorithms Pub Date : 2014-08-14 DOI: 10.5296/npa.v6i3.5535
Md. Ibrahim Chowdhury, Imran Hossain Jony
{"title":"An Experimental Study of SCTP in NS2","authors":"Md. Ibrahim Chowdhury, Imran Hossain Jony","doi":"10.5296/npa.v6i3.5535","DOIUrl":"https://doi.org/10.5296/npa.v6i3.5535","url":null,"abstract":"SCTP (Stream Control Transport Protocol) is a reliable transport layer protocol which provides acknowledged, error-free and non-duplicated transfer of message. It combines the advantages of TCP and UDP. In additional to that, SCTP has many attractive characteristics such as multi-homing, multi-streaming and partial data reliability. This paper thoroughly discusses about the advantages of SCTP. We have experimented the SCTP endpoints data transmission by using NS2 (Network Simulator 2) tool including multi-homed SCTP nodes data transmission. The result shows that an SCTP node in NS2 cannot be truly multi-homed. Hence, NS2 still lacks of full implementation of SCTP features.","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125503051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Special Issue on JITEL 2013 Best Papers JITEL 2013年度最佳论文特刊
Netw. Protoc. Algorithms Pub Date : 2014-06-30 DOI: 10.5296/npa.v6i2.5962
J. López-Soler
{"title":"Special Issue on JITEL 2013 Best Papers","authors":"J. López-Soler","doi":"10.5296/npa.v6i2.5962","DOIUrl":"https://doi.org/10.5296/npa.v6i2.5962","url":null,"abstract":"This editorial introduces the twelve best papers selected for this special issue from the XI Jornadas de Ingenieria TELematica (JITEL 2013) –XI Conference on Telematics Engineering-, held from 28 to 30 October 2013, in Granada (Spain).","PeriodicalId":190994,"journal":{"name":"Netw. Protoc. Algorithms","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134580748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信