protocol performance
Recently Published Documents


TOTAL DOCUMENTS

222
(FIVE YEARS 38)

H-INDEX

14
(FIVE YEARS 1)

2022 ◽  
Author(s):  
Ajay Kumar Vyas ◽  
Margam Suthar

Abstract A mobile ad-hoc network (MANET) is a network of mobile nodes short of Infrastructure, linked by wireless links. While mobility is the key feature of MANETs, the frequent movement of nodes may lead to link failure. A mobile multi-hop wireless ad hoc network carries a dynamic structure feature, and each node has mobility; due to this, the network has altered topology change dynamically. Developing the wireless ad hoc network protocol is the major challenge because, compared to the wired routing node, all node is mobile, energy limitation, the node's physical location, and multicast routing. In this article, a comparative investigation of routing protocol performance for large wireless ad hoc networks (100 nodes) under the impact of the random mobile environment with the velocity of 30 m/sec for 1800 seconds with ten different results for each node-set. The comparative analysis includes packet delivery ratio, throughput, packet dropping ratio, routing overhead, and end-to-end delay quality of service (QoS) metrics. It concludes that Ad-hoc On-demand Distance Vector protocol performance is more stable as the number of nodes & traffic increase in the random mobility environment.


Author(s):  
Jaafer Saraireh ◽  
Haya Joudeh

The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways. “Things” have the ability to communicate, generate, transmit and store data over the network connection. During each communication between “Things”, the data transmitted is potentially vulnerable to malicious attacks, loss, distortions and interruption which impair functionality, system efficiency and user satisfaction. Additionally, inappropriate user controls can cause problems in IoT services, such as granting anonymous users access to personal resources and enable legitimate users to access resources in an illegal manner or preventing legitimate users to access resources in an authorized manner. Therefore, communications between things need to be authenticated, authorized, secured and ensured to have high privacy by applying a strong authentication protocol. The aim of this research is to enhance the authentication protocol, starting by reducing the heavy use of storage in “Things”, and eliminating unnecessary messages during authentication steps, taking into consideration the network security analysis. This research represents a security performance analysis and enhancement authentication for the IoT. The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area compared with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.


2021 ◽  
Vol 1964 (4) ◽  
pp. 042042
Author(s):  
Umang Rastogi ◽  
Balachandra Pattanaik ◽  
B Barani Sundaram ◽  
Manish Kumar Mishra ◽  
Dhanabal Thirumoorthy

2021 ◽  
Vol 19 ◽  
pp. 67-74
Author(s):  
Wojciech Łasocha ◽  
Marcin Badurowicz

The aim of the author of this article is analyze the performance of WebSocket and HTTP protocol and their comparison. For this purpose, was used equipment working in a local network consisting of server, two client computers, switch and self-created research web application. Using a test application was measured time of data transfer between clients and server as well server and clients. The tests included transmission 100-character texts in specified number of copies considering speed of hardware (laptops) and software (web browsers). Additionally, was investigated the impact of overhead and TLS encryption to performance. The obtained results have illustrated in the form of charts, discussed and appropriate conclusions drawn.


2021 ◽  
Vol 10 (03) ◽  
pp. 25292-25301
Author(s):  
Luay Abdulwahid Shihab ◽  
Manhalmohammed Basher

Emerging WSN applications include a wide selection of traditional situations with many nodes. The messages are propagated through intermediate nodes, in order to ensure correct contact between the network nodes with the base station, so that a path has many connexions. Generally speaking, the nodes on the sensor network are distinguished by their minimal resources, so protocols must be used that not only guarantee connectivity but also conserve the most energy while maintaining scalability. Different protocols for routing wireless sensor networks have been suggested, however, reactive routing algorithms have been shown to be energy efficient and adaptable to wireless sensor networks. In this paper, under the OMNeT + + simulation platform, the performance of the reactive protocol will be tested, evaluating different scripts. In contrast to the supplementary responsive protocols stated in literature, the AODV protocol has been selected for supremacy in performance. The following parameters have been evaluated: the transmission rate of packets, average delays, overhead routing and energy usage. The findings show that AODV decreases its efficiency with the growth in the number of nodes. As a result, its usability limits the network scalability and the outcomes demonstration that the spatial distribution of nodes affects protocol performance. The standardised delivery shows the best outcomes for our particular works.


2021 ◽  
Vol 72 (1) ◽  
pp. 20-28
Author(s):  
Ala’ Khalifeh ◽  
Ma’moun Mansour ◽  
Sahel Alouneh

Abstract With the ever increasing demand for higher speed internet connectivity that can fulfil the application continuous need for higher bandwidth Google being the pioneer in many web-based services has launched a new UDP-based protocol named quick UDP internet connections (QUIC), which aims at providing faster data delivery without requiring upgrades or modifications to the network infrastructure. The goal of this paper is to provide an overview about QUIC protocol, propose the design and implementation of a test-bed, that is used experimentally to evaluate QUIC protocol under different network conditions and scenarios. In particular, the performance advantage of QUIC in terms of delay and throughput are examined taking into account different network conditions that resemble the real internet environment. Two scenarios are proposed, the first one investigates the protocol performance under a controlled network environment, while the second one tests the protocol in a real uncontrolled network. To achieve that, a test-bed is proposed and implemented that emulates the network impairments encountered in real-network such as packet loss, bit errors, and bandwidth limitation in a controlled manner. After that, QUIC is tested in real operational wired and wireless networks. In both scenarios, QUIC outperforms TCP in terms of delay, which strengthens QUIC position for being a potential alternative to TCP.


Sign in / Sign up

Export Citation Format

Share Document