To see the other types of publications on this topic, follow the link: Internet Protocol (Computer network protocol).

Journal articles on the topic 'Internet Protocol (Computer network protocol)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Internet Protocol (Computer network protocol).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Keller, Ariane, Daniel Borkmann, Stephan Neuhaus, and Markus Happe. "Self-Awareness in Computer Networks." International Journal of Reconfigurable Computing 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/692076.

Full text
Abstract:
The Internet architecture works well for a wide variety of communication scenarios. However, its flexibility is limited because it was initially designed to provide communication links between a few static nodes in a homogeneous network and did not attempt to solve the challenges of today’s dynamic network environments. Although the Internet has evolved to a global system of interconnected computer networks, which links together billions of heterogeneous compute nodes, its static architecture remained more or less the same. Nowadays the diversity in networked devices, communication requirements, and network conditions vary heavily, which makes it difficult for a static set of protocols to provide the required functionality. Therefore, we propose a self-aware network architecture in which protocol stacks can be built dynamically. Those protocol stacks can be optimized continuously during communication according to the current requirements. For this network architecture we propose an FPGA-based execution environment called EmbedNet that allows for a dynamic mapping of network protocols to either hardware or software. We show that our architecture can reduce the communication overhead significantly by adapting the protocol stack and that the dynamic hardware/software mapping of protocols considerably reduces the CPU load introduced by packet processing.
APA, Harvard, Vancouver, ISO, and other styles
2

Mardedi, Lalu Zazuli Azhar, and Khairan Marzuki. "Network Rancang Bangun Jaringan Komputer LAN Berdasarkan Perbandingan Kinerja Routing Protokol EIGRP dan Routing Protokol OSPF." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 18, no. 2 (May 29, 2019): 202–10. http://dx.doi.org/10.30812/matrik.v18i2.372.

Full text
Abstract:
Nowadays computer networks are growing rapidly and internet usage is increasing everyday. The need to design an internet network cannot be separated from the routing protocol which functions to integrate all computers with the highest flexibility. Routing is one part that provides effective performance in the network. In comparing the performance of EIGRP and OSPF routing protocols, the implementation of EIGRP and OSPF must be implemented when building a network, so administrators easily know the difference in the performance values of the two routing protocols. The discussion in this study is to compare the performance of the EIGRP routing protocol and OSPF routing protocol that is on the network using the hybird topology. Overcoming problems with high-scale network access, we will analyze and compare performance between EIGRP routing protocol and OSPF routing protocol. In obtaining the value and to verify the results of the implementation, the simulation software uses a Packet Tracer simulator.
APA, Harvard, Vancouver, ISO, and other styles
3

Mutombo, Vially Kazadi, Seungyeon Lee, Jusuk Lee, and Jiman Hong. "EER-RL: Energy-Efficient Routing Based on Reinforcement Learning." Mobile Information Systems 2021 (April 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/5589145.

Full text
Abstract:
Wireless sensor devices are the backbone of the Internet of things (IoT), enabling real-world objects and human beings to be connected to the Internet and interact with each other to improve citizens’ living conditions. However, IoT devices are memory and power-constrained and do not allow high computational applications, whereas the routing task is what makes an object to be part of an IoT network despite of being a high power-consuming task. Therefore, energy efficiency is a crucial factor to consider when designing a routing protocol for IoT wireless networks. In this paper, we propose EER-RL, an energy-efficient routing protocol based on reinforcement learning. Reinforcement learning (RL) allows devices to adapt to network changes, such as mobility and energy level, and improve routing decisions. The performance of the proposed protocol is compared with other existing energy-efficient routing protocols, and the results show that the proposed protocol performs better in terms of energy efficiency and network lifetime and scalability.
APA, Harvard, Vancouver, ISO, and other styles
4

Majid, Nuur Wachid Abdul, and Syifaul Fuada. "RIP VS. OSPF ROUTING PROTOCOLS: WHICH ONE IS THE BEST FOR A REAL-TIME COMPUTER NETWORK?" Simetris: Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 11, no. 1 (April 30, 2020): 249–56. http://dx.doi.org/10.24176/simet.v11i1.3796.

Full text
Abstract:
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we discuss the comparison of two popular routing protocols, i.e., Routing Information Protocol (RIP) and Open Shortest Path First (OSPF) using two network simulators, i.e., Graphical Network Simulator-3 (GNS3) and Enterprise Network Simulation Platform (ENSP). Both of OSPF and RIP routing protocols can be used in the same topology and have differences in the connection time required to connect communication between routers. Thru GNS3 and ENSP, we obtained the comparison result at ideal condition; we found that the OSPF routing protocol (83 ms) has a faster time or efficient in connection than RIP (177 ms). Besides, we found that compared to GNS3 network simulators (329 ms), the ENSP has a relatively more rapid average time (94 ms). This work suggests that a Huawei router with ENSP is faster than a Cisco router which is used by GNS3. Hopefully, this information can be refereed by internet network administrators to build real-time computer networks.
APA, Harvard, Vancouver, ISO, and other styles
5

Anderson, Daniel K., and W. Michael Reed. "The Effects of Internet Instruction, Prior Computer Experience, and Learning Style on Teachers' Internet Attitudes and Knowledge." Journal of Educational Computing Research 19, no. 3 (October 1998): 227–46. http://dx.doi.org/10.2190/8wx1-5q3j-p3bw-jd61.

Full text
Abstract:
What is now called the Internet started out as a small number of federally funded Department of Defense (Advanced Research Project Agency, or ARPA) supercomputers networked together to share information. In order to guarantee data transmission between these nodes, this network (ARPANET) shared a common set of protocols that was designed to allow for high speed and reliable transfer. This protocol suite is TCP/IP (Transmission Control Protocol/Internet Protocol). Most microcomputers now have a TCP/IP implementation available (e.g., MacTCP) and can, therefore, join the millions of computers that have access to the plethora of resources on the Internet. The Internet is not a static set of nodes, not a limited number of library holdings, not a one-directional paradigm of data transmission. Rather, it is a vibrant and absorbing setting that can foster new learning environments, or enrage educators with its diverse commands, lack of direction, and tenuous consistency.
APA, Harvard, Vancouver, ISO, and other styles
6

Sija, Baraka D., Young-Hoon Goo, Kyu-Seok Shim, Huru Hasanova, and Myung-Sup Kim. "A Survey of Automatic Protocol Reverse Engineering Approaches, Methods, and Tools on the Inputs and Outputs View." Security and Communication Networks 2018 (2018): 1–17. http://dx.doi.org/10.1155/2018/8370341.

Full text
Abstract:
A network protocol defines rules that control communications between two or more machines on the Internet, whereas Automatic Protocol Reverse Engineering (APRE) defines the way of extracting the structure of a network protocol without accessing its specifications. Enough knowledge on undocumented protocols is essential for security purposes, network policy implementation, and management of network resources. This paper reviews and analyzes a total of 39 approaches, methods, and tools towards Protocol Reverse Engineering (PRE) and classifies them into four divisions, approaches that reverse engineer protocol finite state machines, protocol formats, and both protocol finite state machines and protocol formats to approaches that focus directly on neither reverse engineering protocol formats nor protocol finite state machines. The efficiency of all approaches’ outputs based on their selected inputs is analyzed in general along with appropriate reverse engineering inputs format. Additionally, we present discussion and extended classification in terms of automated to manual approaches, known and novel categories of reverse engineered protocols, and a literature of reverse engineered protocols in relation to the seven layers’ OSI (Open Systems Interconnection) model.
APA, Harvard, Vancouver, ISO, and other styles
7

KOVACIK, Cyril Filip, and Gabriel BUGAR. "ANALYSIS OF OPERATIONAL PROPERTIES OF VOIP NETWORK." Acta Electrotechnica et Informatica 1335-8243, no. 1338-3957 (June 9, 2021): 30–34. http://dx.doi.org/10.15546/aeei-2021-0005.

Full text
Abstract:
Voice transmission over the Internet network is now taken for granted. Many end-user applications address this issue. However, this paper focuses on the specific use of the SCCP protocol created by Cisco, its implementation in a computer network and end devices, determination of the operational properties of this implementation, and their comparison in different conditions. VoIP traffic is compared at different bandwidths and implemented by different configurations of IP protocols. By investigated implementations of IP protocols are meant IPv4, IPv6, and IPv4 protocol with applied NAT. As part of the application of various IP protocols is also compared VoIP communication with a video stream on a local basis. The conclusion of the paper is devoted to the graphical evaluation of these observations and to draw conclusions based on them.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai, and Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT." Security and Communication Networks 2021 (August 2, 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.

Full text
Abstract:
Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.
APA, Harvard, Vancouver, ISO, and other styles
9

Khalid, Madiha, Umar Mujahid, and Muhammad Najam-ul-Islam. "Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks." International Journal of Distributed Sensor Networks 14, no. 8 (August 2018): 155014771879512. http://dx.doi.org/10.1177/1550147718795120.

Full text
Abstract:
Internet of Things is one of the most important components of modern technological systems. It allows the real time synchronization and connectivity of devices with each other and with the rest of the world. The radio frequency identification system is used as node identification mechanism in the Internet of Thing networks. Since Internet of Things involve wireless channel for communication that is open for all types of malicious adversaries, therefore many security protocols have been proposed to ensure encryption over wireless channel. To reduce the overall cost of radio frequency identification enabled Internet of Thing network security, the researchers use simple bitwise logical operations such as XOR, AND, OR, and Rot and have proposed many ultralightweight mutual authentication protocols. However, almost all the previously proposed protocols were later found to be vulnerable against several attack models. Recently, a new ultralightweight mutual authentication protocol has been proposed which involves only XOR and Rotation functions in its design and claimed to be robust against all possible attack models. In this article, we have performed cryptanalysis of this recently proposed ultralightweight mutual authentication protocol and found many pitfalls and vulnerabilities in the protocol design. We have exploited weak structure of the protocol messages and proposed three attacks against the said protocol: one desynchronization and two full disclosure attacks.
APA, Harvard, Vancouver, ISO, and other styles
10

Omer Farooq, Muhammad. "RIoT: A Routing Protocol for the Internet of Things†." Computer Journal 63, no. 6 (March 17, 2020): 958–73. http://dx.doi.org/10.1093/comjnl/bxaa012.

Full text
Abstract:
Abstract The routing protocol for low-power and lossy networks (RPL) is a standard routing framework for Internet of Things (IoT). It supports multipoint-to-point (MP-to-P), point-to-point (P-to-P) and point-to-multipoint (P-to-MP) communications. It is known that RPL’s control overhead can result in the protocol’s poor performance in P-to-P and P-to-MP communications especially in its non-storing mode of operation. Here, we present a routing protocol for the Internet of Things (RIoT) that supports MP-to-P, P-to-P and P-to-MP communications. The protocol can construct P-to-P and P-to-MP routes with relatively lower control overhead. Another salient feature of RIoT is that it supports multiple gateways in the same network with an aim to reduce memory requirement for storing a forwarding table. Furthermore, RIoT is also capable of handling mobility-based IoT use cases. To facilitate communication among nodes connected to different gateways in the same network, here we also present an inter-gateway communication mechanism. We implemented RIoT in the Contiki operating system, and it is extensively evaluated using emulation and real testbed-based experiments. We analyzed the impact of the number of gateways, radio duty cycling (RDC) and mobility on the routing protocols’ performance. Our results demonstrate that either with or without RDC RIoT demonstrates statistically significantly better packet delivery ratio, per-packet end-to-end delay and control overhead compared to the RPL-based protocol. RIoT’s multi-gateway communication architecture substantially reduces the memory requirement to store a forwarding table. Our results also demonstrate that multiple gateways in a network reduce the network partitioning problem in mobile scenarios. Hence, RIoT also demonstrates better performance in mobile scenarios compared to the RPL-based protocol.
APA, Harvard, Vancouver, ISO, and other styles
11

Shende, Dipali K., Sonavane S.S, and Yogesh Angal. "A Comprehensive Survey of the Routing Schemes for IoT applications." Scalable Computing: Practice and Experience 21, no. 2 (June 27, 2020): 203–16. http://dx.doi.org/10.12694/scpe.v21i2.1667.

Full text
Abstract:
Internet of Things (IoT) is with a perception of ‘anything’, ‘anywhere’ and provides the interconnection among devices with a remarkable scale and speed. The prevalent intention of IoT is the datatransmission through the internet without the mediation of humans. An efficient routing protocol must be included in the IoT network for the accomplishment of its objectives and securing data transmission. Accordingly, the survey presents various routing protocols for secure data communication in IoT for providing a clear vision as the major issue in the IoT networks is energy consumption. Therefore, there is a need for devising an effective routing scheme to provide superior performance over the other existing schemes in terms of energy consumption. Thus, this review article provides a detailed review of 52 research papers presenting the suggested routing protocols based on the contentbased, clustering-based, fuzzy-based, Routing Protocol for Low power and Lossy Networks, tree-based and so on. Also, a detailed analysis and discussion are made by concerning the parameters, simulation tool, and year of publication, network size, evaluation metrics, and utilized protocols. Finally, the research gaps and issues of various conventional routing protocols are presented for extending the researchers towards a better contribution of routing protocol for the secure IoT routing.
APA, Harvard, Vancouver, ISO, and other styles
12

Wang, X. K., R. H. Deng, and F. Bao. "Multicast Internet protocol." Computer Communications 23, no. 11 (June 2000): 1047–54. http://dx.doi.org/10.1016/s0140-3664(00)00167-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhai, Liang, Qiuhua Zheng, Xu Zhang, Haizhong Hu, Weihao Yin, Yingpei Zeng, and Ting Wu. "Identification of Private ICS Protocols Based on Raw Traffic." Symmetry 13, no. 9 (September 19, 2021): 1743. http://dx.doi.org/10.3390/sym13091743.

Full text
Abstract:
With the development of the Industrial Internet in recent years, security issues have been a hot topic of the industrial control system (ICS) network management. Identifying the protocol traffic in the communication process of the ICS is an important prerequisite to avoid security problems, especially in ICSs that use many private protocols. The private protocols cannot be analyzed due to the unknown internal structure of the protocols, which makes the ICS protocol identification work more difficult. However, the Internet-oriented protocol identification method is not applicable to the scenario of the private ICS protocols network environment. With this problem in mind, this paper proposes a method of ICS protocol identification based on the raw traffic payload. The method firstly performs data preprocessing such as data selection, interception, cleaning conversion, and labeling on the raw traffic of the protocol based on the characteristics of the industrial control protocol. Then it uses an AM-1DCNN + LSTM deep learning model to extract temporal and spatial features of the ICS raw traffic, and performs protocol identification. This method can effectively extract ICS protocol features in scenarios where protocol parsing is impossible compared with existing methods. We constructed a dataset for ICS protocol identification based on open-source data and tested the proposed method for experiments, and the identification accuracy rate reached 93%.
APA, Harvard, Vancouver, ISO, and other styles
14

Ford, Bryan. "Unmanaged Internet Protocol." ACM SIGCOMM Computer Communication Review 34, no. 1 (January 2004): 93–98. http://dx.doi.org/10.1145/972374.972391.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Akmaluddin, Ahmad, Arini Arini, and Siti Ummi Masruroh. "Evalusi Kinerja Hot Standby Router Protocol (HSRP) dan Gateway Load Balancing Protocol (GLBP) untuk Layanan Video Streaming." Cyber Security dan Forensik Digital 2, no. 1 (May 1, 2019): 43–51. http://dx.doi.org/10.14421/csecurity.2019.2.1.1445.

Full text
Abstract:
Realtime (streaming) data communication has become a major requirement for companies and government institutions. Communication that occurs is not only limited to one particular local area but covers other areas so as to form a broad network (WAN). In building network infrastructure, one of the most important things is how networks can deal with failure (failure) on a computer network consists of failure of devices (devices) that affect Quality of Services (QoS). In every internet network design process, a redundant line is always added to complete the main line. So that if the main line is disrupted, data traffic can be transferred to the backup path, this process is called network redundancy. So that if one gateway dies, another gateway will immediately replace the dead gateway. There are two protocols included in the FHRP, namely Hot Standby Routing Protocol (HSRP), and Gateway Load Balancing Protocol (GLBP), these two protocols that can overcome this problem. So from that this study will discuss which protocol between the two protocols has the best performance in overcoming the problem. Methods of data collection with literature studies and literature studies, simulations carried out with 8 stages (problem formulation, conceptual models, input & output data, modeling, simulation, verification & validation, experimentation, and output analysis). The results of this study provide the best QoS value for the delay value is the HSRP ROUTER protocol, and for the value of packet loss is HSRP, and for throughput value is HSRP and the routing protocol that is appropriate for the network for video streaming services is HSRP
APA, Harvard, Vancouver, ISO, and other styles
16

Zhuang, Dian Zheng, and Yu Hua Zhu. "Research on Network NC Manufacturing Based on Internet." Applied Mechanics and Materials 441 (December 2013): 947–50. http://dx.doi.org/10.4028/www.scientific.net/amm.441.947.

Full text
Abstract:
The paper introduced the method and technology of how to implement a Integrated Manufacturing, each CNC machining equipment is equipped with a special communication unit, each communication unit are directly connected with the DNC main control computers on the Internet, effect of special communication unit is mainly data buffer and protocol conversion, the TCP/IP protocol is used between communication unit and DNC main control Internet computer, and used serial communication protocol communication between communication unit and NC equipment. Using this technology, all kinds of CNC machining equipment and DNC system can be easily with the CAD/CAM/CAE system, digital profile measurement system, fault diagnosis and error compensation of intelligent system integration, providing good technical conditions for further information of various advanced manufacturing environment integration.
APA, Harvard, Vancouver, ISO, and other styles
17

Mai, Dinh Loc, and Myung Kyun Kim. "Multi-Hop LoRa Network Protocol with Minimized Latency." Energies 13, no. 6 (March 15, 2020): 1368. http://dx.doi.org/10.3390/en13061368.

Full text
Abstract:
LoRa (Long Range) is a long-range communications capacity with chirp spread spectrum modulation. It has been developed for Internet of Things (IoT) applications for long-distance and low power consumption. Some authors proposed LoRa protocols such as LoRaWAN, LoRaBlink, DQ-LoRa and the multi-hop LoRa network with linear topology; however, these protocols have disadvantages. In this paper, we propose a minimized latency multi-hop LoRa network protocol that is collision-free with low latency to improve on the disadvantages. First, in the proposed protocol, tree topology is constructed by exchanging packets between LoRa nodes and the sink node. During this period, a timeslot and channel are assigned to each tree link, over which LoRa nodes communicate with their parent node and which is collision-free with its neighbor nodes. After the tree construction period, LoRa nodes start data transmission using the timeslot and channel that they have already been assigned to in the tree construction period. We developed the proposed protocol in a LoRa node prototype using the MultiTech mDot module, and we conducted experiments at Ulsan University. The results show that the proposed protocol provides high reliability, parallel transmissions, a minimized number of timeslots assigned for all the links in the network, a minimized packet size, and low latency.
APA, Harvard, Vancouver, ISO, and other styles
18

Ilyas, Muhammad, Zahid Ullah, Fakhri Alam Khan, Muhammad Hasanain Chaudary, Muhammad Sheraz Arshed Malik, Zafar Zaheer, and Hamood Ur Rehman Durrani. "Trust-based energy-efficient routing protocol for Internet of things–based sensor networks." International Journal of Distributed Sensor Networks 16, no. 10 (October 2020): 155014772096435. http://dx.doi.org/10.1177/1550147720964358.

Full text
Abstract:
Internet of things grew swiftly and many services, software, sensors-embedded electronic devices and related protocols were developed and still in progress with full swing. Internet of things enabling physically existing things to see, hear, think and perform a notable task by allowing them to talk to each other and share useful information while making decision and caring-on/out their important tasks. Internet of things is greatly promoted by wireless sensor network as it becomes a perpetual layer for it. Wireless sensor network works as a base-stone for most of the Internet of things applications. There are severe general and specific threats and technical challenges to Internet of things–based sensor networks which must overcome to ensure adaptation and diffusion of it. Most of the limitations of wireless sensor networks are due to its resource constraint objects nature. The specified open research challenges in Internet of things–based sensor network are power consumption, network lifespan, network throughput, routing and network security. To overcome aforementioned problems, this work aimed to prolong network lifetime, improve throughput, decrease packet latency/packet loss and further improvise in encountering malicious nodes. To further tune the network lifetime in terms of energy, wireless harvesting energy is suggested in proposed three-layer cluster-based wireless sensor network routing protocol. The proposed mechanism is a three-tier clustering technique with implanted security mechanism to encounter malicious activities of sensor nodes and to slant them into blacklist. It is a centred-based clustering protocol, where selection of cluster head and grid head is carried out by sink node based on the value of its cost function. Moreover, hardware-based link quality estimators are used to check link effectiveness and to further improve routing efficiency. At the end, excessive experiments have been carried out to check efficacy of the proposed protocol. It outperforms most of its counterpart protocols such as fuzzy logic–based unequal clustering and ant colony optimization–based routing hybrid, Artificial Bee Colony-SD, enhanced three-layer hybrid clustering mechanism and energy aware multi-hop routing in terms of network lifetime, network throughput, average energy consumption and packet latency.
APA, Harvard, Vancouver, ISO, and other styles
19

Upadhyay, Paramesh C., and Sudarshan Tiwari. "Network Layer Mobility Management Schemes for IP-Based Mobile Networks." International Journal of Mobile Computing and Multimedia Communications 2, no. 3 (July 2010): 47–60. http://dx.doi.org/10.4018/jmcmc.2010070104.

Full text
Abstract:
Mobility is a natural phenomenon in cellular networks. The worldwide popularity of mobile communications and Internet has necessitated the merger of the two fast growing technologies to get their fullest advantages. The Internet protocol (IP) was designed for static hosts only. Therefore, in order to add mobility in Internet, the Internet protocol needs to be redefined. This paper is intended to present an overview of various mobility management schemes, available in literature, for IP-based mobile networks.
APA, Harvard, Vancouver, ISO, and other styles
20

Hussein, Mahmoud, Ahmed I. Galal, Emad Abd-Elrahman, and Mohamed Zorkany. "Internet of Things (IoT) Platform for Multi-Topic Messaging." Energies 13, no. 13 (June 30, 2020): 3346. http://dx.doi.org/10.3390/en13133346.

Full text
Abstract:
IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.
APA, Harvard, Vancouver, ISO, and other styles
21

Shue, Craig A., and Minaxi Gupta. "An Internet without the Internet protocol." Computer Networks 54, no. 18 (December 2010): 3232–45. http://dx.doi.org/10.1016/j.comnet.2010.06.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Ahmed, Lubaid, and Abdolreza Abhari. "A multi-agent-based simulator for a transmission control protocol/internet protocol network." SIMULATION 90, no. 5 (April 9, 2014): 511–21. http://dx.doi.org/10.1177/0037549714528268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Yao, Wenbing, Sheng-Uei Guan, Zhiqiang Jiang, and Ilias Kiourktsidis. "Self-Evolvable Protocol Design Using Genetic Algorithms." International Journal of Applied Evolutionary Computation 1, no. 1 (January 2010): 36–56. http://dx.doi.org/10.4018/jaec.2010010103.

Full text
Abstract:
Self-modifying protocols (SMP) are protocols that can be modified at run time by the computers using them. Such protocols can be modified at run time so that they can adapt to the changing communicating environment and user requirements on the fly. Evolvable protocols are SMP designed using Genetic Algorithms (GA). The purpose of this paper is to apply Genetic Algorithms (GA) to design an evolvable protocol in order to equip communication peers with more autonomy and intelligence. The next-generation Internet will benefit from the concept of evolvable protocols. In this paper, we design a Self Evolvable Transaction Protocol (SETP) with a GA executor embedded. We then use the Network Simulator (NS2) to evaluate this evolvable protocol module to demonstrate the feasibility of our new design approach.
APA, Harvard, Vancouver, ISO, and other styles
24

Raharjo, Mugi, Frengki Pernando, and Ahmad Fauzi. "Perancangan Performansi Quality Of Service Dengan Metode Virtual Routing Redudancy Protocol (VRRP)." Jurnal Teknik Komputer 5, no. 1 (February 11, 2019): 87–92. http://dx.doi.org/10.31294/jtk.v5i1.4555.

Full text
Abstract:
The need for a network is the intenet is indeed already is common at this time. Do a computerized system in each routine office as well as the occurrence of problems in computer networks in a company can make the effectiveness and flexibility in an agency or company became very disturbed. In PT. PELITA Cengkareng, Tangerang Paper needs a stable internet network is the key to a company's main activity is to do every day. For it is need for a change in the system of internet network. To support all activities in the company who need access to a computer network or the internet. A stable traffic as well as the existence of a performance bond that was always adequate internet desperately needed in an era as it is today. For that VRRP (Virtual Routing Protocol Redudancy) is the solution to increase network performance can be done by the existence of this method. The existing network of companies will have a backup connectivity to backup when there are problems at the major networks
APA, Harvard, Vancouver, ISO, and other styles
25

Andersen, David G., Hari Balakrishnan, Nick Feamster, Teemu Koponen, Daekyeong Moon, and Scott Shenker. "Accountable internet protocol (aip)." ACM SIGCOMM Computer Communication Review 38, no. 4 (October 2008): 339–50. http://dx.doi.org/10.1145/1402946.1402997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Warman, Indra, and Alex Franozal. "QoS Analysis on OSPFv3 And RIPng Using GRE Tunneling on IPv6 Integrated Ipv4 Network." MATEC Web of Conferences 215 (2018): 01005. http://dx.doi.org/10.1051/matecconf/201821501005.

Full text
Abstract:
Every year, the availability of public IPv4 addresses is running low. However, the IETF (Internet Engineering Task Force) has set a new addressing standard called IPv6 (Internet Protocol version 6). IPv6 implementations can not be immediately performed on all end-to-end lines, a transition phase is required, one of which is the GRE tunneling method. IPv6 has some differences with IPv4, then in line with the presence of IPv6 will required the protocol that compatible with IPv6, among which is the routing protocol. Some dynamic routing protocols are created to support and can run on IPv6 such as RIPng and OSPFv3. Aim of this study is examines OSPFv3 routing protocols and RIPng routing protocols in terms of Quality of Service (QoS). The test is done by using seven routers with three scenarios in each routing protocol, ie scenario with best path active condition, when the network changes in other words best path down, and the scenario with best path condition has changed and the network has returned to normal. Testing is done by testing QoS parameters (delay, packet loss, and throughput) when the client computer downloads files with the .iso extension from the server. Downloaded files have different sizes, from 100 Mega Byte to 1 Giga Byte. From the results obtained that OSPFv3 provides better QoS (delay, packet loss, and throughput) than RIPng on integrated IPv6 network using GRE tunnel and can be a reference when going to transition from IPv4 to IPv6 using GRE Tunnel.
APA, Harvard, Vancouver, ISO, and other styles
27

Wei, Li, and Da Zhi Deng. "A Novel Stable Algorithm of Getting User’s Account Based on Telnet Protocol." Applied Mechanics and Materials 299 (February 2013): 130–34. http://dx.doi.org/10.4028/www.scientific.net/amm.299.130.

Full text
Abstract:
In recent years,china input in the construction of the network management is constantly increasing;information technology has improved continuously,but,making a variety of network security incidents occur frequently,due to the vulnerability of the computer network system inherent,a direct impact on national security and social and political stability. Because of the popularity of computers and large-scale development of the Internet, network security has been increasing as the theme. Reasonable safeguards against violations of resources; regular Internet user behavior and so on has been the public's expectations of future Internet. This paper described a stable method of getting telnet user’s account in development of network management based on telnet protocol.
APA, Harvard, Vancouver, ISO, and other styles
28

Yang, Q., and J. M. Pitts. "Scalable voice over Internet protocol service-level agreement guarantees in converged transmission control protocol/Internet protocol networks." IET Communications 4, no. 8 (2010): 1026. http://dx.doi.org/10.1049/iet-com.2009.0491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Lafta, Wisam Mahmood, Ahmed A. Alkadhmawee, and Mohammed A. Altaha. "Best strategy to control data on internet-of-robotic-things in heterogeneous networks." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 2 (April 1, 2021): 1830. http://dx.doi.org/10.11591/ijece.v11i2.pp1830-1838.

Full text
Abstract:
The control and transmission of huge data constitute an immense challenge in various types of networks (wired and wireless). Congestion caused by the high traffic and low throughput of huge data continues to be major problems in a heterogeneous platforms such as internet of things (IoT) technology and internet-of-robotic-things (IoRT). The heterogeneous network requires new models and mechanisms to deal with the increased challenges posed by IoT and IoRT. Accordingly, eliminating the issues that emerge has compelled finding improved solutions as a new strategy. This study proposed a new strategy called routing information and distance vector (RIDV) to create the best improvement of a heterogeneous network. The RIDV strategy activates the routing information protocol (RIPv2) on a router in wire network parallel with the ad-hoc on-demand distance vector (AODV) protocol on the wireless network. The RIDV strategy is used to solve the problems of the diversity of heterogeneous networks as the basis of the infrastructure IoRT technology. Hence, this strategy can reduce or avoid congestion through the use of enhanced and effective best routing protocols. Simulation results using OPNET show that the proposed method improved the quality of service (QoS) compared with other related strategies and AODV and RIPv1 protocols in terms of data drop, traffic drop, queue delay, and throughput.
APA, Harvard, Vancouver, ISO, and other styles
30

Fathurrahmad, Fathurrahmad, and Salman Yusuf. "Implementasi Jaringan VPN dengan Routing Protocol terhadap Jaringan Multiprotocol Label Switching (MPLS)." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 3, no. 1 (June 30, 2019): 29. http://dx.doi.org/10.35870/jtik.v3i1.83.

Full text
Abstract:
The convergence of the internet and telecommunications is growing, with applications in it increasingly dependent on the availability of large bandwidth, with its QoS settings requiring networks and elements in them that provide full support for data security and increased network performance. The need for data transmission technology that not only facilitates routing and discovery of the best paths but can also provide security in data communication. This study discusses the implementation of VPN networks with routing protocols on the Multiprotocol Label Switching (MPLS) network. After implementation, MPLS network performance will be tested and compared to performance without MPLS using the model planned by the researcher. The specific purpose of this study is to show how routing protocols play an important role in strengthening data communication traffic management that supports MPLS capabilities of VPN networks and is applied to the AMIK Indonesia network architecture. This research will use the literature study method which is intended to obtain and study data contained in computers connected to networks in the AMIK Indonesia computer network laboratory. The conclusion obtained from this study is that MPLS VPN provides bandwidth efficiency in the backbone, MPLS VPN network applications have functioned functionally according to the initial plan of the study and the authors have also managed to configure different networks and obtain stable bandwidth.Keywords:Implementation; VPN; Multi Protocol Label Switching
APA, Harvard, Vancouver, ISO, and other styles
31

Tightiz, Lilia, and Hyosik Yang. "A Comprehensive Review on IoT Protocols’ Features in Smart Grid Communication." Energies 13, no. 11 (June 1, 2020): 2762. http://dx.doi.org/10.3390/en13112762.

Full text
Abstract:
Since the smart grid deals with a large mass of data and critical missions, it requires ubiquitous, reliable, and real-time communication. The Internet of Things (IoT) technology, which has the potential of connecting all objects over the globe through the Internet, excels in providing robust information transmission infrastructure in the smart grid. There are a multitude of possible protocols, standards, and configurations for communication in the smart grid. A commonly applied communication standard IEC 61850 recommends the use of Manufacturing Message Specification (MMS) protocol for communication in Local Area Network (LAN) and eXtensible Messaging and Presence Protocol (XMPP) in Wide Area Network (WAN). However, a plethora of research on this topic compares the behavior of other IoT protocols and standard recommendations in the smart grid. On the other hand, the sky-rocketing penetration of Renewable Energy Sources (RES), especially in the form of micro grid, transformed the central control structure of the smart grid into a distributed style called Multi-Agent Systems (MAS). This new approach defined new communication requirements and more particular IoT protocol characteristic requirements. However, a limited number of the existing studies have considered IoT protocol characteristic requirements of the smart grid and its new control structures. In this paper, we initially investigate the communication requirements of the smart grid and introduce all IoT protocols and their specifications. We analyze IoT protocol characteristics and performances in the smart grid through literature review based on the smart grid communication requirements. In this approach, we highlight weak points of these practices making them fail to acquire the holistic guidelines in utilizing proper IoT protocol that can meet the smart grid environment interaction requirements. Using the existing facilities, the public Internet, we follow the arrangement of cost-effective high penetration communication requirements for new structures of the smart grid, i.e., the MAS and multi-micro grid. In this case, we consider IoT protocol Quality of Services (QoS) requirements, especially in the case of security and reliability, to satisfy stakeholders, namely utilities and prosumers. Addressing effective elements in applying IoT in the smart grid’s future trends is another contribution to this paper.
APA, Harvard, Vancouver, ISO, and other styles
32

Begum, Seema, Yao Nianmin, Syed Bilal Hussain Shah, Asrin Abdollahi, Inam Ullah Khan, and Liqaa Nawaf. "Source Routing for Distributed Big Data-Based Cognitive Internet of Things (CIoT)." Wireless Communications and Mobile Computing 2021 (July 29, 2021): 1–10. http://dx.doi.org/10.1155/2021/5129396.

Full text
Abstract:
Dynamic opportunistic channel access with software-defined radio at a network layer in distributed cognitive IoT introduces a concurrent channel selection along with end-to-end route selection for application data transmission. State-of-the-art cognitive IoT big data-based routing protocols are not explored in terms of how the spectrum management is being coordinated with the network layer for concurrent channel route selection during end-to-end channel route discovery for data transmission of IoT and big data applications. In this paper, a reactive big data-based “cognitive dynamic source routing protocol” is proposed for cognitive-based IoT networks to concurrently select the channel route at the network layer from source to destination. Experimental results show that the proposed protocol cognitive DSR with concurrent channel route selection criteria is outperformed. This will happen when it is compared with the existing distributed cognitive DSR with independent channel route application data transmission.
APA, Harvard, Vancouver, ISO, and other styles
33

Holmberg, Kaj, and Di Yuan. "Optimization of Internet Protocol network design and routing." Networks 43, no. 1 (2003): 39–53. http://dx.doi.org/10.1002/net.10102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Shi, Jiantao, Xiangzhan Yu, and Zechao Liu. "Nowhere to Hide: A Novel Private Protocol Identification Algorithm." Security and Communication Networks 2021 (March 3, 2021): 1–10. http://dx.doi.org/10.1155/2021/6672911.

Full text
Abstract:
In recent years, with the rapid development of mobile Internet and 5G technology, great changes have been brought to our lives, and human beings have stepped into the era of big data. These new features and techniques in 5G support many different types of mobile applications for users, which makes network security extremely challenging. Among them, more and more applications involve users’ private data, such as location information, financial information, and biological information. In order to prevent users’ privacy disclosure, most applications choose to use private protocols. However, such private protocols also provide a means for malware and malicious applications to steal users’ privacy and confidential data. From a more secure point of view, we need to provide a way for users to know how many private protocols are running on their mobile phones and distinguish which are authorized applications and which are not. Therefore, the analysis and identification of private protocols have become a hot topic in current research. How to extract the characteristics of network protocol effectively and identify the private protocol accurately becomes the most important part of this research. In this paper, we combine genetic algorithm and association rule algorithm and then propose a set of feature extraction algorithm and protocol recognition algorithm for unknown protocols. The experimental analysis based on the actual data shows that these methods can effectively solve the problems of feature extraction and recognition for unknown protocols and can greatly improve the accuracy of private protocol recognition.
APA, Harvard, Vancouver, ISO, and other styles
35

Prathivi, Rastri, and Vensy Vydia. "ANALISA PENDETEKSIAN WORM dan TROJAN PADA JARINGAN INTERNET UNIVERSITAS SEMARANG MENGGUNAKAN METODE KALSIFIKASI PADA DATA MINING C45 dan BAYESIAN NETWORK." Jurnal Transformatika 14, no. 2 (January 30, 2017): 77. http://dx.doi.org/10.26623/transformatika.v14i2.440.

Full text
Abstract:
<p>Worm attacks become a dangerous threat and cause damage in the Internet network. If the Internet network worms and trojan attacks the very disruption of traffic data as well as create bandwidth capacity has increased and wasted making the Internet connection is slow. Detecting worms and trojan on the Internet network, especially new variants of worms and trojans and worms and trojans hidden is still a challenging problem. Worm and trojan attacks generally occur in computer networks or the Internet which has a low level of security and vulnerable to infection. The detection and analysis of the worm and trojan attacks in the Internet network can be done by looking at the anomalies in Internet traffic and internet protocol addresses are accessed.<br />This research used experimental research applying C4.5 and Bayesian Network methods to accurately classify anomalies in network traffic internet. Analysis of classification is applied to an internet address, internet protocol and internet bandwidth that allegedly attacked and trojan worm attacks.<br />The results of this research is a result of analysis and classification of internet addresses, internet protocol and internet bandwidth to get the attack worms and trojans.</p>
APA, Harvard, Vancouver, ISO, and other styles
36

Yann Cedric Lawson, Teyi, and Senthilnathan T. "Effectiveness of the NIZKP Protocol for Authentication in IoT Environment." International Journal of Engineering & Technology 7, no. 2.6 (March 11, 2018): 231. http://dx.doi.org/10.14419/ijet.v7i2.6.10775.

Full text
Abstract:
Elliptic Curves when compared to other encryptions scheme such as RSA etc., provides an equivalent security, smaller key sizes, less power consumption, faster calculations, less bandwidth used and is more suitable for Internet of Things devices. In addition of encrypting the data, the devices in the network should also be able to authenticate themselves, which can be achieved with the implementation of “Non-Interactive Zero Knowledge protocol” (NIZKP). This protocol involves two parties: The prover and the Verifier. Prover party should prove to the Verifier that they have the knowledge of something, without revealing what is it. In this paper, a study of Schnorr protocol or ∑- protocol over Elliptic Curves is done and the protocol is implemented in Python using the Python Cryptography Toolkit PyCrypto which is a collection of cryptographic modules implementing various algorithms and protocols. Finally, the results were compared with Elliptic Curve Diffie-Hellmann(ECDH) and present a performance evaluation of the protocols on the Raspberry Pi 3B model, a credit-card sized computer used for the development of IoT devices hence the perfect platforms to test the protocol.
APA, Harvard, Vancouver, ISO, and other styles
37

Pencheva, Evelina, and Ivaylo Atanasov. "Open Access to Control on Quality of Service in Convergent Networks." International Journal of Information Technology and Web Engineering 5, no. 2 (April 2010): 53–74. http://dx.doi.org/10.4018/jitwe.2010040104.

Full text
Abstract:
This paper investigates the capabilities for open access to quality of service management in convergent networks. Based on the analysis of requirements for policy and charging control in Internet Protocol Multimedia Subsystem (IMS), functions for quality of service (QoS) management and charging that are available for third party applications are identified. The functionality of Open Service Access (OSA) and Parlay X interfaces is evaluated for support of dynamic QoS control, while an approach to development of OSA compliant application programming interfaces for QoS management in IMS networks is presented. The interface’s methods are mapped onto the messages of network control protocols such as Diameter and Session Initiation Protocol (SIP). Finally, aspects of interface implementation are discussed including behavior equivalence of state machines.
APA, Harvard, Vancouver, ISO, and other styles
38

Frankel, Sheila, and David Green. "Internet Protocol Version 6." IEEE Security & Privacy Magazine 6, no. 3 (May 2008): 83–86. http://dx.doi.org/10.1109/msp.2008.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Khalid, Madiha, Umar Mujahid, and Najam-ul-Islam Muhammad. "Ultralightweight RFID Authentication Protocols for Low-Cost Passive RFID Tags." Security and Communication Networks 2019 (July 21, 2019): 1–25. http://dx.doi.org/10.1155/2019/3295616.

Full text
Abstract:
The field of pervasive computing especially the Internet of Things (IoT) network is evolving due to high network speed and increased capacity offered by the 5G communication system. The IoT network identifies each device before giving it access to the network. The RFID system is one of the most prominent enabling technologies for the node identification. Since the communication between the node and the network takes place over an insecure wireless channel, an authentication mechanism is required to avoid the malicious devices from entering the network. This paper presents a brief survey on the authentication protocols along with the prominent cryptanalysis models for the EPC C1G2 RFID systems. A comparative analysis is provided to highlight the common weaknesses of the existing authentication algorithms and to emphasize on the lack of security standardization for the resource constraint IoT network perception layer. This paper is concluded by proposing an ultralightweight protocol that provides Extremely Good Privacy (EGP). The proposed EGP protocol avoids all the pitfalls highlighted by the cryptanalysis of the existing authentication protocols. The incorporation of the novel ultralightweight primitives, Per-XOR (Px) and Inverse Per-XOR (Px-1), makes the protocol messages more robust and irreversible for all types of adversaries. A comprehensive security analysis illustrates that the proposed protocol proves to be highly resistive against all possible attack scenarios and ensures the security optimally.
APA, Harvard, Vancouver, ISO, and other styles
40

S.Sankar and P.Srinivasan. "Fuzzy Sets Based Cluster Routing Protocol For Internet of Things." International Journal of Fuzzy System Applications 8, no. 3 (July 2019): 70–93. http://dx.doi.org/10.4018/ijfsa.2019070103.

Full text
Abstract:
Increasing the lifetime of low power and lossy networks (LLN) is a major challenge, as the nodes have low power, low memory, and low processing capacity. Clustering is a technique used to minimize the energy consumption of sensor nodes. This article proposes a fuzzy sets-based cluster routing protocol (FC-RPL) to extend the network lifetime in LLN. It has three processes: cluster formation, cluster head selection, and cluster head parent selection. It forms the clusters based on the Euclidean distance. It applies the fuzzy set over the metrics residual energy, number of neighbors and centrality, to select the cluster head in each cluster. The cluster head node chooses the best parent node in the DODAG for data transfer. The simulation is performed using COOJA simulator. The simulation result shows that FC-RPL extends the network lifetime by 15-25% and increases the packet delivery ratio by 2-6%.
APA, Harvard, Vancouver, ISO, and other styles
41

Agarwal, Madan Mohan, Mahesh Chandra Govil, Madhavi Sinha, and Saurabh Gupta. "Fuzzy based Data Fusion for Energy Efficient Internet of Things." International Journal of Grid and High Performance Computing 11, no. 3 (July 2019): 46–58. http://dx.doi.org/10.4018/ijghpc.2019070103.

Full text
Abstract:
Internet of Things will serve communities across the different domains of life. The resource of embedded devices and objects working under IoT implementation are constrained in wireless networks. Thus, building a scheme to make full use of energy is key issue for such networks. To achieve energy efficiency, an effective Fuzzy-based network data Fusion Light Weight Protocol (FLWP) is proposed in this article. The innovations of FLWP are as follows: 1) the simulated network's data fusion through fuzzy controller and optimize the energy efficiency of smart tech layer of internet of things (Energy IoT); 2) The optimized reactive route is dynamically adjusted based on fuzzy based prediction accurately from the number of routes provided by base protocol. If the selection accuracy is high, the performance enhances the network quality; 3) FLWP takes full advantage of energy to further enhance target tracking performance by properly selecting reactive routes in the network. Authors evaluated the efficiency of FLWP with simulation-based experiments. FLWP scheme improves the energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
42

Hou, Gaopan, Jianfeng Ma, Jiayi Li, and Chen Liang. "Audit Outsourced Data in Internet of Things." Security and Communication Networks 2021 (May 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/6662135.

Full text
Abstract:
With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because uploading data to the cloud loses physical control of the data, an audit is required. Traditional audit protocols are not completely suitable for lightweight devices in the IoT. This paper proposes a new type of audit protocol suitable for lightweight devices with weak computing power. This protocol transfers part of the computation of data tags to a cloud storage provider (CSP) with strong computing power, thereby reducing the introduction of computing entities. Our scheme supports the dynamic operation of data and guarantees the effectiveness of challenge response by blockchain. Compared with existing schemes, our scheme is more secure and effective.
APA, Harvard, Vancouver, ISO, and other styles
43

Mohd Fuzi, Mohd Faris, Khairunnisa Abdullah, Iman Hazwam Abd Halim, and Rafiza Ruslan. "Network Automation using Ansible for EIGRP Network." Journal of Computing Research and Innovation 6, no. 4 (September 20, 2021): 59–69. http://dx.doi.org/10.24191/jcrinn.v6i4.237.

Full text
Abstract:
Network automation has evolved into a solution that emphasizes efficiency in all areas. Furthermore, communication and computer networks rely on a platform that provides the necessary technological infrastructure for packet transfer through the Internet using routing protocols. The Enhanced Interior Gateway Routing Protocol (EIGRP) is a hybrid routing protocol that combines the properties of both distance-vector and link-state routing methods. The traditional technique to configure EIGRP is inefficient and requires repeated processes compared to the network automation concept. Network automation helps to assist network administrators in automating and verifying the EIGRP configuration using scripting. This paper implemented network automation using Ansible to configure EIGRP routing and advanced configuration in the GNS3 environment. This study is focused on automated scripting to configure IP Addresses to the interfaces, EIGRP routing protocol, a default static route and advanced EIGRP configurations. Ansible ran the scripting on Network Automation Docker and pushed the configurations to the routers. The network automation docker communicated with other routers via SSH. In the testing phase, the running configuration between the traditional approach and automation scripting in the Ansible playbook was compared to verify EIGRP configurations' accuracy. The findings show that Ansible has successfully deployed the configuration to the routers with no errors. Ansible can help network administrators minimized human mistakes, reduce time-consuming and enable device visibility across the network environment. Implementing EIGRP authentication and hardening process can enhance the network security level for future study.
APA, Harvard, Vancouver, ISO, and other styles
44

Natesan, Sathishkumar, and Rajakumar Krishnan. "Energy Efficient Composite Metric Based Routing Protocol for Internet of Things." JUCS - Journal of Universal Computer Science 26, no. 11 (November 28, 2020): 1366–81. http://dx.doi.org/10.3897/jucs.2020.072.

Full text
Abstract:
The Routing Protocol for Low Power and Lossy Networks (RPL) is operated by gadgets comprised of many devices of embedded type with limited energy, memory as well as resources that do their process. The improvements in the life of the network and energy conservation are the key challenging features in Low Power and Lossy Networks (LLN). Obviously, the LLN has a key strategic part in routing. The Internet of Things (IoT) device is expected to make the apt choice. In LLN, the poor routing choice leads to traffic congestion, reduction in power as well as packet loss ratio. The task in the proposal analyzes Delay (D), Load (L) and Battery Discharge Index (BDI) pivoted Energy Efficient Composite Metric Routing (EECMR) protocol for LLN. The performance of the work in the proposal is evaluated by the COOJA simulator. It outperforms with respect to Network Lifetime (NL), Delay as well as Packet Delivery Ratio (PDR) contrasted to the routing metrics like Traffic Load (TL), Link Quality (LQ), Residual Energy (RE), RE-Battery Discharge Index (RE-BDI) and Hop Count (HC).
APA, Harvard, Vancouver, ISO, and other styles
45

Sankar, S., and P. Srinivasan. "Multi-Layer Cluster Based Energy Aware Routing Protocol for Internet of Things." Cybernetics and Information Technologies 18, no. 3 (September 1, 2018): 75–92. http://dx.doi.org/10.2478/cait-2018-0040.

Full text
Abstract:
Abstract We propose a multi-layer cluster based energy aware routing protocol for Low Power and Lossy Networks, which divides the network area into equal length rings. The intra-ring clustering process divides a ring into equal sized clusters and inter-cluster routing applies the fuzzy logic to select the best route for data transfer. It increases the network lifetime and packet delivery ratio by 18-22% and 5-8%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
46

Hilmani, Adil, Abderrahim Maizate, and Larbi Hassouni. "Hierarchical Protocol Based on Recursive Clusters for Smart Parking Applications Using Internet of Things (IOT)." Wireless Communications and Mobile Computing 2020 (July 13, 2020): 1–21. http://dx.doi.org/10.1155/2020/9179530.

Full text
Abstract:
With the increasing number of vehicles, the management of parking spaces in cities is becoming increasingly important in improving the quality of life and combating air pollution. Indeed, finding a parking space at peak times and in congested areas of the population becomes a huge challenge for drivers. To remedy this problem, most modern cities have smart parking. The equipment of these smart parking is mainly based on the implementation of wireless sensor networks (WSN) to monitor, track, and collect real-time information on the occupancy status of each parking space. This information is then made available to drivers who are looking for an available parking space. However, sensor nodes have limitations in terms of energy and communication that affect the performance and quality of the wireless sensor network. Therefore, the design of a self-organization protocol for WSN that minimizes power consumption and maximizes the longevity of the WSN network must be taken into account when implementing and developing a sustainable and viable intelligent parking system. In this paper, we propose a protocol for self-organization of wireless sensor networks (WSN) for the management of parking spaces in outdoor and urban car parks. This protocol is based on building clusters using ZigBee transmission technology for multihop communication. Each sensor node will be installed in the ground of each parking space to monitor its availability by sending the empty or busy state of that space to the gateway using cluster head nodes (CHs). This approach has a robust and efficient self-organizing algorithm that minimizes energy dissipation and increases the lifetime of sensor nodes and the WSN network. The simulation results show that parking management systems in outdoor and urban car parks using the self-organization protocol presented are efficient and sustainable in terms of energy consumption, reliability of data transmission, and the longevity of the WSN network compared to other existing parking systems that use different self-organizing protocols for wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
47

Hu, Yao, Ting Peng, and Lianming Zhang. "Software-Defined Congestion Control Algorithm for IP Networks." Scientific Programming 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/3579540.

Full text
Abstract:
The rapid evolution of computer networks, increase in the number of Internet users, and popularity of multimedia applications have exacerbated the congestion control problem. Congestion control is a key factor in ensuring network stability and robustness. When the underlying network and flow information are unknown, the transmission control protocol (TCP) must increase or reduce the size of the congestion window to adjust to the changes of traffic in the Internet Protocol (IP) network. However, it is possible that a software-defined approach can relieve the network congestion problem more efficiently. This approach has the characteristic of centralized control and can obtain a global topology for unified network management. In this paper, we propose a software-defined congestion control (SDCC) algorithm for an IP network. We consider the difference between TCP and the user datagram protocol (UDP) and propose a new method to judge node congestion. We initially apply the congestion control mechanism in the congested nodes and then optimize the link utilization to control network congestion.
APA, Harvard, Vancouver, ISO, and other styles
48

Kumar Dwivedi, Anshu, Awadhesh Kumar Sharma, and Pawan Singh Mehra. "Energy Efficient Sensor Node Deployment Scheme for Two Stage Routing Protocol of Wireless Sensor Networks assisted IoT." ECTI Transactions on Electrical Engineering, Electronics, and Communications 18, no. 2 (August 31, 2020): 158–69. http://dx.doi.org/10.37936/ecti-eec.2020182.240541.

Full text
Abstract:
Now a day wireless sensor networks (WSNs) is an essential unit of the internet of things (IoT). IoT theater a vital role in real-time applications which is more useful in real life. Due to its small price and potential use, WSNs have shown importance in different applications over the past year. Health concerns, environmental observation, human protection, military operations, surveillance systems, etc. WSNs have a small device called a sensor node (SN) that has a limited battery. IoT based WSNs consume more energy in sensor node communication. Therefore a Novel energy-efficient sensor node deployment scheme for two-stage routing protocol (EE- DSTRP) has been proposed to reduce the energy consumption of sensor nodes and extend the lifetime of the network. Sensor node deployment is a novel approach based on the golden ratio. All traditional protocols divide network zones for communication. No existing protocols tell about the sensor node deployment ratio in each zone. The deployment method is an important factor in reducing the energy usage of a network. To validate its efficiency, in this article, simulation results prove that the proposed IoT based EE-DSTRP protocol is superior to other existing protocols.
APA, Harvard, Vancouver, ISO, and other styles
49

Nguan, C. Y., R. Morady, C. Wang, D. Harrison, D. Browning, R. Rayman, and P. P. W. Luke. "Robotic pyeloplasty using internet protocol and satellite network-based telesurgery." International Journal of Medical Robotics and Computer Assisted Surgery 4, no. 1 (2008): 10–14. http://dx.doi.org/10.1002/rcs.173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Chiti, Francesco, Romano Fantacci, Roberto Picchi, and Laura Pierucci. "Towards the Quantum Internet: Satellite Control Plane Architectures and Protocol Design." Future Internet 13, no. 8 (July 30, 2021): 196. http://dx.doi.org/10.3390/fi13080196.

Full text
Abstract:
The creation of the future quantum Internet requires the development of new systems, architectures, and communications protocols. As a matter of fact, the optical fiber technology is affected by extremely high losses; thus, the deployment of a quantum satellite network (QSN) composed of quantum satellite repeaters (QSRs) in low Earth orbit would make it possible to overcome these attenuation problems. For these reasons, we consider the design of an ad hoc quantum satellite backbone based on the Software-Defined Networking (SDN) paradigm with a modular two-tier Control Plane (CP). The first tier of the CP is embedded into a Master Control Station (MCS) on the ground, which coordinates the entire constellation and performs the management of the CP integrated into the constellation itself. This second tier is responsible for entanglement generation and management on the selected path. In addition to defining the SDN architecture in all its components, we present a possible protocol to generate entanglement on the end-to-end (E2E) path. Furthermore, we evaluate the performance of the developed protocol in terms of the latency required to establish entanglement between two ground stations connected via the quantum satellite backbone.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography