To see the other types of publications on this topic, follow the link: Computer network protocols.

Journal articles on the topic 'Computer network protocols'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer network protocols.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Hasan, Ammar, Tarik A. Rashid, Birzo Ismael, and Nawzad K. AL-Salihi. "Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET." UKH Journal of Science and Engineering 3, no. 1 (May 22, 2019): 18–28. http://dx.doi.org/10.25079/ukhjse.v3n1y2019.pp18-28.

Full text
Abstract:
Computer networks need protocols to govern all transmission and presentation processes. The transmission control protocol (TCP) is one of the most important protocols that have the compatibility to work with all types of computer networks, overcoming all architectural and operating system differences. Nowadays, networks depend on the TCP protocol to control data flow between all types of connected computers, whether it is client or server, over any type of media whether it is wired or wireless networks, for all network topologies. A simulation of a university campus network has been conducted
APA, Harvard, Vancouver, ISO, and other styles
2

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirement
APA, Harvard, Vancouver, ISO, and other styles
3

Neeru Kumari and Dr. Tilak Raj. "OSPF Metric Convergence and Variation Analysis During Redistribution with Routing Information Protocol." International Research Journal on Advanced Engineering and Management (IRJAEM) 2, no. 06 (June 22, 2024): 1985–91. http://dx.doi.org/10.47392/irjaem.2024.0293.

Full text
Abstract:
Open Shortest Path First networking protocol falls under the category of Interior gateway routing protocols and is multi-vendor supported. The task of OSPF like any other routing protocol is to calculate the best path between source IP address and destination IP address within the organisation computer network. There are various other routing protocols like Routing Information Protocol, Border Gateway Protocol, Intermediate System - Intermediate System (IS-IS), Enhanced Interior Gateway Routing Protocol, etc. which are used in computer network. Routing protocols have different algorithms throu
APA, Harvard, Vancouver, ISO, and other styles
4

Alfaresa, Yuansa, Bongga Arifwidodo, and Fauza Khair. "Automate IGP and EGP Routing Protocol Configuration using a Network Automation Library." Jurnal Online Informatika 8, no. 2 (December 28, 2023): 222–31. http://dx.doi.org/10.15575/join.v8i2.1157.

Full text
Abstract:
Data communication is sending data from client to client through a computer network. The increasing use of data communication makes computer networks more complex. Complex computer networks make it difficult for network administrators to configure them, especially routing protocol configuration. Network administrators are in charge of configuring routing protocols and managing networks. In addition, the more devices on the network, the greater the chance of human error from the administrator. Therefore, network automation is one solution that helps network administrators overcome this. This st
APA, Harvard, Vancouver, ISO, and other styles
5

Mardedi, Lalu Zazuli Azhar, and Khairan Marzuki. "Network Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 2 (May 29, 2019): 202–10. http://dx.doi.org/10.30812/matrik.v18i2.372.

Full text
Abstract:
Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is
APA, Harvard, Vancouver, ISO, and other styles
6

Borisov, Ruslan K., Sergey S. Zhulikov, Maksim N. Smirnov, Yuliya S. Turchaninova, Sergey I. Khrenov, Roman P. Besedin, and Aleksandr V. Dubinin. "Power Equipment Interaction with Network Devices Supporting Internet Application-level Protocols." Vestnik MEI, no. 6 (2021): 59–65. http://dx.doi.org/10.24160/1993-6982-2021-6-59-65.

Full text
Abstract:
The implementation of interaction between high-voltage power equipment with computer network devices in monitoring systems involves the use of proprietary Internet protocols that do not meet the criteria of free software and are not always compatible with the Internet protocols of personal computers. To solve this problem, it is proposed to use an intermediate link between the industrial and computer networks. This link is a network bridge built using the PPP protocol, which unites automatic devices equipped with UART interfaces with a computer network of the 802.11n (Wi-Fi) standard. The arti
APA, Harvard, Vancouver, ISO, and other styles
7

Romaniuc, Alexandru-Gabriel, Vlad-Cosmin Vasile, and Elena-Monica Borda. "Study of Methods and Techniques for Manipulating the Time Synchronization Component of NTP Servers in Computer Networks." International conference KNOWLEDGE-BASED ORGANIZATION 29, no. 3 (June 1, 2023): 71–77. http://dx.doi.org/10.2478/kbo-2023-0078.

Full text
Abstract:
Abstract In computer networks as well as in many other domains, time synchronization is carried out by some dedicated devices called time servers that uses network protocols, such as NTP (Network Time Protocol), PTP (Precision Time Protocol) or SNTP (Simple Network Time Protocol). Many domains and applications, such as, computer networks, security protocols, telecommunications, network services, and many others, depend on accurate time synchronization. According to the CVE (Common Vulnerabilities and Exposures) databases, between 2001-2022, more than 150 time synchronization protocols vulnerab
APA, Harvard, Vancouver, ISO, and other styles
8

Muhammad Shahzaib Saeed. "Survey of Network Protocols." Lahore Garrison University Research Journal of Computer Science and Information Technology 3, no. 2 (June 28, 2019): 15–19. http://dx.doi.org/10.54692/lgurjcsit.2019.030273.

Full text
Abstract:
IPv4 is the network protocols of the present Internet, which is characterized by the Internet Engineering Task Force (IETF). Network protocols characterize guidelines, polices and traditions for communication between system devices. Every advanced protocol for computer organization utilizer a packet switching system to send and get the message. The protocols are intended to conquer the activities of any enemy that can lose the sent message, discretionarily change the fields of the sent message, and replay old messages. In the web, the colossal measure of information and the immense number of v
APA, Harvard, Vancouver, ISO, and other styles
9

Deepak Malik and Dr. Bijendra Singh. "Optimizing OSPF Cost Value for Best Path Selection Using Metric-Type Variation." International Research Journal on Advanced Engineering Hub (IRJAEH) 2, no. 06 (June 25, 2024): 1845–54. http://dx.doi.org/10.47392/irjaeh.2024.0254.

Full text
Abstract:
Open Shortest Path First (OSPF) is a multi-vendor routing standard. Any routing protocol's goal is to discover the optimum path between source and destination addresses inside a computer network. Other routing protocols include Routing Information Protocol (RIP), Border Gateway Protocol (BGP), Enhanced Interior Gateway Routing Protocol (EIGRP), and IS-IS. which are also used in computer networking. Each routing protocol has different set of rules through which they calculate the best path selection. OSPF is often used with the combination of these routing protocol because of its flexible desig
APA, Harvard, Vancouver, ISO, and other styles
10

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connec
APA, Harvard, Vancouver, ISO, and other styles
11

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part
APA, Harvard, Vancouver, ISO, and other styles
12

Ryndych, Yevhen, Andrii Borovyk, and Oleksii Borovyk. "RESEARCH OF TUNNELING TECHNOLOGIES IN MODERN COMPUTER NETWORKS." Technical Sciences and Technologies, no. 4(26) (2021): 67–74. http://dx.doi.org/10.25140/2411-5363-2021-4(26)-67-74.

Full text
Abstract:
Modern corporate networks are a combination of internal and external communication channels. The issue of confiden-tiality in such networks is relevant. To reduce the risks associated with implementing new solutions in continuous cycle systems, it is necessary to analyze and evaluate their impact.For now, there is a large number of network protocols that can be used to create tunnels. Modern network equipment is a rather complex software and hardware system that supports many standards and protocols. Well-known network equipment manufacturer MikroTik has upgraded the RouterOS operating system
APA, Harvard, Vancouver, ISO, and other styles
13

Jain, Neha, Ashish Payal, and Aarti Jain. "Effect of data packet size on the performance of RIP and OSPF routing protocols in hybrid networks." International Journal of Pervasive Computing and Communications 17, no. 4 (September 10, 2021): 361–76. http://dx.doi.org/10.1108/ijpcc-02-2021-0036.

Full text
Abstract:
Purpose The purpose of this study is to calculate the effect of different packet sizes 256, 512, 1,024 and 2,048 bytes on a large-scale hybrid network and analysis and identifies which routing protocol is best for application throughput, application delay and network link parameters for different packet sizes. As the routing protocol is used to select the optimal path to transfer data packets from source to destination. It is always important to consider the performance of the routing protocol before the final network configuration. From the literature, it has been observed that RIP (Routing I
APA, Harvard, Vancouver, ISO, and other styles
14

Kryukov, Ya V., D. A. Pokamestov, E. V. Rogozhnikov, S. A. Novichkov, and D. V. Lakontsev. "Analysis of Computational Complexity and Processing Time Evaluation of the Protocol Stack in 5G New Radio." Proceedings of Tomsk State University of Control Systems and Radioelectronics 23, no. 3 (September 25, 2020): 31–37. http://dx.doi.org/10.21293/1818-0442-2020-23-3-31-37.

Full text
Abstract:
Currently, an active deployment of radio access networks for mobile communication systems 5G New Radio is being observed. The architecture of networks is developing rapidly, where significant part of the functions is performed in a virtual cloud space of a personal computer. The computing power of a personal computer must be sufficient to execute network protocols in real time. To reduce the cost of deploying 5G NR networks, the configuration of each remote computer must be optimally matched to the scale of a particular network. Therefore, an urgent direction of research is the assessment of t
APA, Harvard, Vancouver, ISO, and other styles
15

Khan, Muhammad, Yasir Zaki, Shiva Iyer, Talal Ahamd, Thomas Poetsch, Jay Chen, Anirudh Sivaraman, and Lakshmi Subramanian. "The case for model-driven interpretability of delay-based congestion control protocols." ACM SIGCOMM Computer Communication Review 51, no. 1 (January 31, 2021): 18–25. http://dx.doi.org/10.1145/3457175.3457179.

Full text
Abstract:
Analyzing and interpreting the exact behavior of new delay-based congestion control protocols with complex non-linear control loops is exceptionally difficult in highly variable networks such as cellular networks. This paper proposes a Model-Driven Interpretability (MDI) congestion control framework, which derives a model version of a delay-based protocol by simplifying a congestion control protocol's response into a guided random walk over a two-dimensional Markov model. We demonstrate the case for the MDI framework by using MDI to analyze and interpret the behavior of two delay-based protoco
APA, Harvard, Vancouver, ISO, and other styles
16

T, Padmapriya, and Manikanthan S.V. "Investigation of Video Streaming over MANETS Routing Protocols." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 12 (June 21, 2022): 103–13. http://dx.doi.org/10.3991/ijim.v16i12.30805.

Full text
Abstract:
For industrial and academic researchers from all around the world, the Mobile Ad-hoc Network (MANET) is a specific focus. A MANET was created as a result of the fast growth of wireless gadgets. Mobile Ad hoc network is a self-organizing network with no framework. MANET’s device has the ability to travel in any direction in order to transmit and receive data with other devices or network nodes. An administrator node which is capable of controlling other nodes is absent in MANET. All nodes in MANET act as its own router and host and arrange its own network. The most important element of MANET is
APA, Harvard, Vancouver, ISO, and other styles
17

Ismaeel, Tarik Zeyad, and Dhurgham Razaq Mohsen. "Estimation and Improvement of Routing Protocol Mobile Ad-Hoc Network Using Fuzzy Neural Network." Journal of Engineering 22, no. 7 (July 1, 2016): 142–63. http://dx.doi.org/10.31026/j.eng.2016.07.09.

Full text
Abstract:
Ad-Hoc Networks are a generation of networks that are truly wireless, and can be easily constructed without any operator. There are protocols for management of these networks, in which the effectiveness and the important elements in these networks are the Quality of Service (QoS). In this work the evaluation of QoS performance of MANETs is done by comparing the results of using AODV, DSR, OLSR and TORA routing protocols using the Op-Net Modeler, then conduct an extensive set of performance experiments for these protocols with a wide variety of settings. The results show that the best protocol
APA, Harvard, Vancouver, ISO, and other styles
18

Alazzawi, L., and A. Elkateeb. "Performance Evaluation of the WSN Routing Protocols Scalability." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–9. http://dx.doi.org/10.1155/2008/481046.

Full text
Abstract:
Scalability is an important factor in designing an efficient routing protocol for wireless sensor networks (WSNs). A good routing protocol has to be scalable and adaptive to the changes in the network topology. Thus scalable protocol should perform well as the network grows larger or as the workload increases. In this paper, routing protocols for wireless sensor networks are simulated and their performances are evaluated to determine their capability for supporting network scalability.
APA, Harvard, Vancouver, ISO, and other styles
19

Lin, Wen Qi, Yi Liu, Li Meng Song, Yuan Jiao Zhang, and Fei Guo. "Comparison and Analysis of MAC Protocol in Multimedia Communications." Applied Mechanics and Materials 519-520 (February 2014): 496–99. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.496.

Full text
Abstract:
MAC protocol analysis and comparison to the multimedia communication theory as the framework, firstly discusses the requirement of communication network in computer networks and multimedia applications. MAC protocols oriented to wireless sensor networks are compared and analyzed. Summary of CSMA/CA, CSMA/CD, S-MAC and basic principles and applicable occasions, main parameters is made. Properties of the three MAC protocols is compared. The results of this study provides reference for MAC protocol oriented to multimedia communications.
APA, Harvard, Vancouver, ISO, and other styles
20

Wahid, Ishtiaq, Sadaf Tanvir, Abdul Hameed, and Masood Ahmad. "Software-Defined Networks and Named Data Networks in Vehicular Ad Hoc Network Routing: Comparative Study and Future Directions." Security and Communication Networks 2022 (June 18, 2022): 1–14. http://dx.doi.org/10.1155/2022/1270180.

Full text
Abstract:
Routing protocols are an essential component of vehicular ad hoc networks. Software-defined networks and name data networks are new aspects of routing that are coming to the fore as Vehicular Ad Hoc Network technology evolves. Data Network-based VANET routing protocols and Software Defined Network-based VANET routing protocols have been developed in recent research. These newly developed protocols must be part of VANET routing protocol surveys. The taxonomy of traditional routing protocols must take these innovations into account. To the best of our knowledge, no such taxonomy exists at the mo
APA, Harvard, Vancouver, ISO, and other styles
21

Ayyagari, A., and A. Ray. "A Fiber-Optic Network Protocol for Computer Integrated Manufacturing." Journal of Engineering for Industry 114, no. 3 (August 1, 1992): 345–51. http://dx.doi.org/10.1115/1.2899802.

Full text
Abstract:
This paper presents the architecture and performance analysis of a fiber-optic-based network protocol for computer integrated manufacturing (CIM). Its adaptation as the common medium access control (MAC) layer protocol in the fiber-optic-based version of the Manufacturing Automation Protocol (MAP) and Technical and Office Protocols (TOP) will make their specifications identical up to the presentation layer; only the application layer which is user specific could be different.
APA, Harvard, Vancouver, ISO, and other styles
22

Consul, Juliana I., and Japheth R. Bunakiye. "Survey of the Influence of Routing Protocols to Network Performance Enhancement." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (December 30, 2023): 13–28. http://dx.doi.org/10.22624/aims/maths/v11n4p2.

Full text
Abstract:
Routing protocols play a crucial role in the operation of computer networks by determining the optimal paths for data transmission. The selection of an appropriate routing protocol can significantly impact network performance, including factors such as latency, throughput, reliability, and scalability. This survey aims to provide a comprehensive analysis of the influence of various routing protocols on network performance enhancement. The survey begins by presenting an overview of common routing protocols with their key characteristics. Subsequently, it explores the impact of these protocols o
APA, Harvard, Vancouver, ISO, and other styles
23

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (May 16, 2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Full text
Abstract:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication proces
APA, Harvard, Vancouver, ISO, and other styles
24

Ayu tiara sunja, Sunja, and Meilyana Winda Perdana. "Development of local area network (LAN) at SMK 1 belitang madang raya." International Journal Cister 1, no. 02 (August 1, 2022): 63–66. http://dx.doi.org/10.56481/cister.v1i02.150.

Full text
Abstract:
The Internet is a global network of world computers, large and very broad where every computer is connected to each other from country to country around the world and contains various kinds of information [1]. The internet itself comes from the word interconnection networking which means the connection of many computer networks of various types and types, using communication types such as telephone, satellite, and others. In managing computer network integration using TCP or IP protocols. Local Area Network (LAN) consists of several computers connected in a network. In this network, each compu
APA, Harvard, Vancouver, ISO, and other styles
25

Labinsky, Alexander. "FEATURES OF CRYPTOGRAPHIC PROTOCOLS." NATURAL AND MAN-MADE RISKS (PHYSICO-MATHEMATICAL AND APPLIED ASPECTS) 2024, no. 1 (April 17, 2024): 53–59. http://dx.doi.org/10.61260/2307-7476-2024-1-53-59.

Full text
Abstract:
The article considers the features of cryptographic protocols used to protect data transmitted over a computer network. Due to the increase in the number of network attacks, the urgency of the problem of network security is constantly increasing.
 The cryptographic protocol contains a description of the structures used and a set of rules governing the use of cryptographic transformations and algorithms in information communication processes between two or more participants.
 The article provides classification of cryptographic protocols on various features and considers security prop
APA, Harvard, Vancouver, ISO, and other styles
26

Anvari, Hamidreza, and Paul Lu. "Machine-Learned Recognition of Network Traffic for Optimization through Protocol Selection." Computers 10, no. 6 (June 11, 2021): 76. http://dx.doi.org/10.3390/computers10060076.

Full text
Abstract:
We introduce optimization through protocol selection (OPS) as a technique to improve bulk-data transfer on shared wide-area networks (WANs). Instead of just fine-tuning the parameters of a network protocol, our empirical results show that the selection of the protocol itself can result in up to four times higher throughput in some key cases. However, OPS for the foreground traffic (e.g., TCP CUBIC, TCP BBR, UDT) depends on knowledge about the network protocols used by the background traffic (i.e., other users). Therefore, we build and empirically evaluate several machine-learned (ML) classifie
APA, Harvard, Vancouver, ISO, and other styles
27

Garg, Puneet, Ashutosh Dixit, Preeti Sethi, and Plácido Rogerio Pinheiro. "Impact of Node Density on the QoS Parameters of Routing Protocols in Opportunistic Networks for Smart Spaces." Mobile Information Systems 2020 (August 1, 2020): 1–18. http://dx.doi.org/10.1155/2020/8868842.

Full text
Abstract:
The need and importance of Smart Spaces have been potentially realized by the researchers due to its applicability in the current lifestyle. Opportunistic network, a successor of mobile ad hoc networks and a budding technology of network, is a best-suited technology for implementing Smart Spaces due to its wide range of applications in real-life scenarios ranging from building smart cities to interplanetary communication. There are numerous routing protocols which are available in opportunistic network, each having their pros and cons; however, no research till the time of listing has been don
APA, Harvard, Vancouver, ISO, and other styles
28

Kaur, Arshdeep, Sandeep Kumar Arora, and Mahedi Masud. "Comparative Analysis of Clustering using AODV DSDV and CBRP." International Journal of Engineering & Technology 7, no. 3.8 (July 7, 2018): 131. http://dx.doi.org/10.14419/ijet.v7i3.8.16847.

Full text
Abstract:
In a network whether wireless or wired, a set of protocols which are used to distribute the information through various routes between the nodes are said to be the routing protocols which serves as a majorly vital part of the computer networks. They specify the particular and specific path of information exchange by the sending and receiving of packets. Vehicular ad- hoc networks are quite emerging technologies of today’s era presenting the provision of seamless and uninterrupted communication in the network of mobile nodes in dynamic environment. Routing itself proves to be quite a considerab
APA, Harvard, Vancouver, ISO, and other styles
29

Gee, K. "Communications network protocols." Computer Communications 8, no. 5 (October 1985): 259. http://dx.doi.org/10.1016/0140-3664(85)90117-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Patel, Ahmed. "Communication network protocols." Computer Communications 9, no. 6 (December 1986): 317. http://dx.doi.org/10.1016/0140-3664(86)90055-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Han, Hui, Hong De Zhang, and Yang Wang. "A Routing Protocol for Emergency Communication Based on Load Balancing." Applied Mechanics and Materials 719-720 (January 2015): 744–49. http://dx.doi.org/10.4028/www.scientific.net/amm.719-720.744.

Full text
Abstract:
Ad-hoc communications is a mobile communication networks and computer networks combine with no infrastructure support, and network survivability and flexibility is strong, especially suitable for emergency communication. As the existing mobile ad hoc network routing protocols lack of network load balancing capabilities, this paper proposed a routing protocol based on load balancing LBBR (Load Balancing Based Routing). Simulation results shows that, LBBR can improve the success rate of packet transmission, reducing the average end to end delay, thus effectively improving network performance.
APA, Harvard, Vancouver, ISO, and other styles
32

Almakhi, Riyan, Ade Surya Budiman, and Rachmawati Darma Astuti. "Implementasi Protokol Keamanan Dan Segmentasi Jaringan Dalam Project Pembangunan WLAN Untuk PT Pan Pacific Insurance." Jurnal Sistem dan Teknologi Informasi (JustIN) 11, no. 1 (January 31, 2023): 140. http://dx.doi.org/10.26418/justin.v11i1.53745.

Full text
Abstract:
Security of data and network devices is essential in the development of a computer network, either in the creation of new computer networks or in the development of existing computer networks. PT. Pan Pacific Insurance as a company that holds large amounts of data along with its supporting computer network's infrastructure, focuses on security aspects in addition to performance aspects in its computer network. To get the flexibility of its computer network, the company developed a wireless local area network (WLAN) in line with the relocation of its head office. The Existing company's network
APA, Harvard, Vancouver, ISO, and other styles
33

Zhang, Zhaowei, Hongzheng Zhang, Jinjing Zhao, and Yanfei Yin. "A Survey on the Development of Network Protocol Fuzzing Techniques." Electronics 12, no. 13 (July 1, 2023): 2904. http://dx.doi.org/10.3390/electronics12132904.

Full text
Abstract:
Network protocols, as the communication rules among computer network devices, are the foundation for the normal operation of networks. However, security issues arising from design flaws and implementation vulnerabilities in network protocols pose significant risks to network operations and security. Network protocol fuzzing is an effective technique for discovering and mitigating security flaws in network protocols. It offers unparalleled advantages compared to other security analysis techniques thanks to the minimal requirement for prior knowledge of the target and low deployment complexity.
APA, Harvard, Vancouver, ISO, and other styles
34

Vatambeti, Ramesh, Nrusingha Charan Pradhan, E. Sandhya, Surendra Reddy Vinta, V. Anbarasu, and K. Venkateswara Rao. "Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network." International Journal of Computer Network and Information Security 15, no. 3 (June 8, 2013): 78–89. http://dx.doi.org/10.5815/ijcnis.2023.03.06.

Full text
Abstract:
Because of the mobility of its nodes, MANET plays a significant role in mobile communication. As a result, network infrastructure is frequently changed, resulting in data loss and communication overheads. Despite this, the large packet size causes network congestion or traffic. The difficult task is efficient routing through a dynamic network. For node generation and energy management, the proposed approach in this paper employs GAODM (Geography-based Ad-hoc On Demand disjoint multipath) and E-AODM (Energy Ad-hoc On Demand Vector routing). The proposed GAODM routing protocol reduces congestion
APA, Harvard, Vancouver, ISO, and other styles
35

Tikhonov, Eugene, Donat Schneps-Schneppe, and Dmitry Namiot. "Delay Tolerant Network Protocols in a Railway Network." International Journal of Embedded and Real-Time Communication Systems 12, no. 4 (October 2021): 1–17. http://dx.doi.org/10.4018/ijertcs.2021100101.

Full text
Abstract:
The paper is devoted to the analysis of the effectiveness of the DTN (delay tolerant network) system in a communication network on a railway line. Trains act as moving objects that are sending and receiving messages to/from an external network. Trains may also transmit telemetry collected during movement. The article presents data on the effectiveness of the DTN network with various protocols in terms of reducing the delay in the message and telemetry delivery and in increasing the total number of delivered messages in the railway scenario. An analysis of railway lines with various loads and d
APA, Harvard, Vancouver, ISO, and other styles
36

Fathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (June 30, 2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Full text
Abstract:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implem
APA, Harvard, Vancouver, ISO, and other styles
37

S, Arockiaraj, Krishnamoorthi Makkithaya, and Harishchandra Hebbar N. "Quality of Service-Based Cross-Layer Protocol for Wireless Sensor Networks." International Journal of Interactive Mobile Technologies (iJIM) 16, no. 20 (October 31, 2022): 34–58. http://dx.doi.org/10.3991/ijim.v16i20.31111.

Full text
Abstract:
Sensor nodes in wireless sensor networks (WSN) are used for perceiving, monitoring, and controlling a wide range of applications. Owing to the small size of sensor nodes and limited power sources, energy saving is critical for ensuring network longevity. Protocols in different layers consume energy for their function. It is possible to significantly reduce energy usage by including energy-efficiency measures in the protocol design. Most protocols in the literature focus on the energy efficiency in individual layers. Recent studies have shown that cross-layer designs are more energy efficient t
APA, Harvard, Vancouver, ISO, and other styles
38

Paul, Surjit, Sanjay Kumar, and Rajiv Ranjan Suman. "A Quantum Secure Entity Authentication Protocol Design for Network Security." International Journal of Information Security and Privacy 13, no. 4 (October 2019): 1–11. http://dx.doi.org/10.4018/ijisp.2019100101.

Full text
Abstract:
Authentication is one of the significant issues for all kinds of network communications. Most of the authentication protocols designed and implemented so far for entity authentication are based on classical cryptographic techniques to prevent themselves from different types of attacks. These protocols use either password or challenge for authentication. In this article, the design of the proposed quantum secure entity authentication protocol is shown. The proposed protocol is based on the challenge response method. Due to quantum computer capability to break mathematical complexity-based crypt
APA, Harvard, Vancouver, ISO, and other styles
39

Punia, Divya, and Rajender Kumar. "A Kalman Filter Based Hybrid Routing Protocol for Efficient Vehicle Connectivity and Traffic Management." Transport and Telecommunication Journal 23, no. 1 (February 1, 2022): 25–32. http://dx.doi.org/10.2478/ttj-2022-0003.

Full text
Abstract:
Abstract The geographic routing protocols in Vehicular Ad Hoc Networks (VANETs) are contemplated as most efficacious protocols. Though, such types of protocols communicate a huge quantity of data that influence the network connectivity negatively. Also, out of bound issue is the second major disadvantage of geographic routing protocols. To provide a solution to these impediments, a novel K-PGRP (Kalman filter-Predictive Geographic Routing Protocol) routing protocol is proposed in this paper. K-PGRP is an improvement to PGRP (Predictive Geographic Routing Protocol) routing protocol and wields K
APA, Harvard, Vancouver, ISO, and other styles
40

Pulujkar, Mosami, Sunil Kumar, Vivek Deshpande, and Dattatray Waghole. "Evaluation of various MAC Protocols for Node Density in Wireless Sensor Networks based on QoS." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 213–16. http://dx.doi.org/10.17762/ijritcc.v10i1s.5825.

Full text
Abstract:
A wireless sensor network is a collection of sensor nodes that communicate with one another to gather data and send it to a base station. The quality of service provided by sensor networks determines their efficiency and lifetime. Energy, channel capacity, packet transmission, packet drop, and latency are all factors in QoS. In WSNs, routing protocols are designed to discover the shortest route to a network's destination, whereas MAC protocols are designed to transmit data through a communication channel. To increase the network's life span, the best routing and MAC protocols are required for
APA, Harvard, Vancouver, ISO, and other styles
41

Liu, Zeying, Pengshuai Cui, Yongji Dong, Lei Xue, and Yuxiang Hu. "MultiSec: A Multi-Protocol Security Forwarding Mechanism Based on Programmable Data Plane." Electronics 11, no. 15 (July 30, 2022): 2389. http://dx.doi.org/10.3390/electronics11152389.

Full text
Abstract:
With the development of network technology, various network protocols different from TCP/IP have emerged. The heterogeneous integrated network has been proposed to realize the interconnection between heterogeneous networks running different protocols. However, current protocol conversion mechanisms often can only handle a few pre-defined protocols and do not support the flexible expansion of new protocols, which cannot meet the needs of the efficient convergence of different heterogeneous networks. Addirionally, due to the lack of security mechanisms, data in the core network is confronted wit
APA, Harvard, Vancouver, ISO, and other styles
42

ZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (December 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Full text
Abstract:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol
APA, Harvard, Vancouver, ISO, and other styles
43

Falih Nawwaf, Moch. Hari Purwidiantoro, and Lilik Sugiarto. "Perancangan Jaringan MAN Dengan Dyamic Routing EIGRP Dan Algoritma DUAL Menggunakan Cisco Packet Tracer." JURNAL PENELITIAN SISTEM INFORMASI (JPSI) 1, no. 3 (August 1, 2023): 87–95. http://dx.doi.org/10.54066/jpsi.v1i3.674.

Full text
Abstract:
Metropolitan Area Network (MAN) is a computer network that covers a geographical area larger than LAN (Local Area Network) but smaller than WAN (Wide Area Network). In the design of MAN networks is very important because it ensures the availability, reliability, and efficiency of routes to transmit data throughout the network. Therefore, the use of dynamic routing protocols such as the Enhanced Interior Gateway Routing Protocol (EIFRP) with the Diffusing Update Algorithm (DUAL) algorithm and simulated on Cisco packet tracer is the main concern in this study.
APA, Harvard, Vancouver, ISO, and other styles
44

Shende, Dipali K., Sonavane S.S, and Yogesh Angal. "A Comprehensive Survey of the Routing Schemes for IoT applications." Scalable Computing: Practice and Experience 21, no. 2 (June 27, 2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Full text
Abstract:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore,
APA, Harvard, Vancouver, ISO, and other styles
45

Jaffri, Zain ul Abidin, Muhammad Asif, Wali Ullah Khan, Zeeshan Ahmad, Zain ul Abiden Akhtar, Kalim Ullah, and Md Sadek Ali. "TEZEM: A new energy-efficient routing protocol for next-generation wireless sensor networks." International Journal of Distributed Sensor Networks 18, no. 6 (June 2022): 155013292211072. http://dx.doi.org/10.1177/15501329221107246.

Full text
Abstract:
The design and implementation of energy-efficient routing protocols for next-generation wireless sensor networks is always a challenge due to limited power resource capabilities. Hierarchical (clustering) routing protocols appeared to be a remarkable solution for extending the lifetime of wireless sensor networks, particularly in application-aware (threshold-sensitive) and heterogeneity-aware cluster-based routing protocols. In this article, we propose a protocol, namely, Threshold-based Energy-aware Zonal Efficiency Measuring hierarchical routing protocol. It is a heterogeneity-aware and thre
APA, Harvard, Vancouver, ISO, and other styles
46

Ignatenko, O. P., and O. A. Molchanov. "Evolutionary games in TCP networks with speed restriction policies." PROBLEMS IN PROGRAMMING, no. 4 (December 2016): 033–47. http://dx.doi.org/10.15407/pp2016.04.033.

Full text
Abstract:
Competitive development of various versions of network protocols is an essential part of computer networks. The most-used protocol today is Transmission Control Protocol (TCP). There is a large number of implementations of the TCP protocol, which differ by mechanism of congestion control. TCP develops by improving its existent implementations, vanishing some of them and via creation of a new ones. The possibility of using new versions of the protocol allows the user to increase the data rate by selecting the appropriate implementation of TCP. It is difficult to predict consequences of computer
APA, Harvard, Vancouver, ISO, and other styles
47

Khasambiev, I. V., and E. A. Guseva. "Network architectures and protocols of M2M communications." Journal of Physics: Conference Series 2176, no. 1 (June 1, 2022): 012019. http://dx.doi.org/10.1088/1742-6596/2176/1/012019.

Full text
Abstract:
Abstract The issues of building the architecture of M2M networks and managing M2M services using the capabilities of the IMS platform are considered Introduction. M2M (Machine to Machine) is a complex of technologies that provide automatic interaction between devices (things) without human intervention. The Internet of Things is not a single technology, but a whole system of technological solutions. It is a global network infrastructure, which consists of computer networks of physical objects, the traditional IP Internet, and various devices connecting these networks.
APA, Harvard, Vancouver, ISO, and other styles
48

Tahir, Sabeen, Ghadah Abdullah Aldabbagh, Sheikh Tahir Bakhsh, and Abass Md Said. "Hybrid Congestion Sharing and Route Repairing Protocol for Bluetooth Networks." WSEAS TRANSACTIONS ON COMPUTERS 20 (April 27, 2021): 49–55. http://dx.doi.org/10.37394/23205.2021.20.6.

Full text
Abstract:
Bluetooth is a widespread wireless technology standard for limited wireless networks that permits Bluetooth devices to create a one-hop (piconet) or multi-hop (scatternet) network. During data transmission, a large number of links passing through a single master or bridge device may create congestion problems in a Bluetooth network. Therefore, routing in a multi-hop dynamic Bluetooth network, where a number of routing masters and routing bridges exist, sometimes create technical problems in a scatternet. Mobility and failure of routing devices disconnects the routing links and link reconstruct
APA, Harvard, Vancouver, ISO, and other styles
49

Deshmukh, Sneha R., and Vijay T. Raisinghani. "A Survey on Congestion Control Protocols for CoAP." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 2 (August 31, 2022): 111–23. http://dx.doi.org/10.17762/ijcnis.v14i2.5484.

Full text
Abstract:
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the e
APA, Harvard, Vancouver, ISO, and other styles
50

Ali, Maisam, Kashif Naseer Qureshi, Thomas Newe, Kashif Aman, Ashraf Osman Ibrahim, Maha Almujaly, and Wamda Nagmeldin. "Decision-Based Routing for Unmanned Aerial Vehicles and Internet of Things Networks." Applied Sciences 13, no. 4 (February 7, 2023): 2131. http://dx.doi.org/10.3390/app13042131.

Full text
Abstract:
New technologies and communication standards have changed traditional network processes. Internet of Things (IoT) is one of the emerging technologies where devices are connected to facilitate the users. When the networks are more congested due to a large number of users then the existing routing protocol and communication channels suffer from congestion, disconnection, overhead, and packet drop issues. Unmanned Aerial Vehicles (UAVs) are adopted to support the ground networks for more feasible data communication. These networks provide coverage facilities to IoT networks and provide smooth dat
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!