control packets
Recently Published Documents


TOTAL DOCUMENTS

72
(FIVE YEARS 24)

H-INDEX

7
(FIVE YEARS 1)

Author(s):  
Mohammed Ali Tawfeeq

The emergence of smart cities and the need to use intelligent transportation systems has led to an increased reliance on vehicle ad hoc networks (VANET). The topology of VANET is highly dynamic, which results in a short effective routing time. This paper presents  a two-stage algorithm to select a route that can sustain communication between vehicles for as long as possible while taking into account the variables that affect the VANET topology. The first stage uses Skellam distribution model to assess the connectivity probability of paths in ‎a 2d road network based on traffic-flow and the number of vehicles ‎joining and leaving the ‎network,  accordingly, the path with the highest connectivity is chosen. In the second stage, the control packets sent only to vehicles on the selected path to detect routes between source and destination, thus reducing the overhead of control packets and increasing network stability. ‎ the algorithm adopts the principle of global evaluation to ‎estimate the lifetime ‎of the ‎detected ‎routes within the chosen path. ‎the route with the ‎best estimated ‎lifetime ‎is ‎chosen to be ‎the active route. ‎in the event of route failure, the validity of the next route in lifetime is confirmed to be adopted as the alternate route. The proposed algorithm was compared with both on-‎demand distance ‎vector routing protocol (AODV) protocol and the modified location-aided routing ‎‎(LAR) ‎protocol. The proposed algorithm showed greater network stability, higher performance in terms of longer lifetime route detection, less energy consumption and higher throughput.


2021 ◽  
Author(s):  
B. Srivani ◽  
S. Renu Deepti ◽  
Qualid Unnisa

Software defined networking (SDN) permits community feature program ability intended to facilitate about design along with renovation, as well as permit community directors toward adapt congestion guidelines. Nevertheless, denial of provider (DoS) assailants causes productivity issues upon centralized consolidate aircraft about SDN. Even through shipping layer safety (TLS) be able to assist comfy manage plane, that far analytically extensive and composite design. Within the document, we plan light-weight validate compound, known as Hidden Authentication (HiAuth), toward guard the SDN through battering specifications about redirecting devices to control packets thru effective bitwise functioning. HiAuth be that initially toward incorporate records battering methods for Open Flow toward offer safety in opposition to DoS attacks. HiAuth utilizes IP identification field about IPv4 as well as proceedings recognition area about OpenFlow within two attestation methods. The investigational outcomes display that HiAuth able to efficiently alleviate trespasser DoS assaults as well as supply excessive unnoticeable toward assailants.


Author(s):  
Roaa Wadullah Tareq ◽  
Turkan Ahmed Khaleel

Internet of things IoT systems have become one of the most promising technologies in all fields. Data transmission is one of the important aspects, and the tendency to messaging protocols is an important aspect of IoT systems. One of these most important protocols is MQTT. This protocol depends on the Publish/Subscribe model, and it is a lightweight protocol. Reliability, simplicity, quality of service levels, and being Resource-constrained make MQTT common in the IoT industry. This paper designed an IoT device that consists of the sensor MLX 90614 non-contact IR Temperature connected to a development board (Node MCU ESP8266). A person's temperature is one of the important vital signs. This system measures human temperature values and transmits the measured values to the Mosquitto broker by using the MQTT protocol in real-time. The technology used is Wi-Fi. The person or the doctor can read the patient’s temperature remotely through a program (Flutter Android Client) representing the subscriber. Also, MQTT protocol control packets of the system were analyzed using Wireshark. The three levels of QoS were used in subscriber clients to compare the throughput. The results indicate that QoS2 is more reliable and offers more throughput but more delay. The results also show that the average round trip time (RTT) of the MQTT protocol is five milliseconds which means optimal performance for IoT applications.


Author(s):  
С.С. ВЛАДИМИРОВ ◽  
А.Е. КУЧЕРЯВЫЙ

Представлены результаты тестирования протокола сетевого кодирования (СК) NCDP для сети с ромбовидной топологией. Рассмотрена структура ромбовидной сети и проведено сравнение простой последовательной передачи с передачей методом СК. Определена структура заголовка протокола NCDP для пакетовданных и управляющих пакетов. Предложен вариант виртуального лабораторного стенда для исследования работы протокола и выполнено сравнение протокола NCDP с простой последовательной передачей данных по среднему времени доставки группы пакетов. The results of testing the network coding protocol NCDP for a diamond topology network are presented. The structure of the diamond topology network is considered and a comparison of simple serial transmission with transmission by network coding method is made. The NCDP header structure for data packets and control packets is defined. A virtual laboratory testbed for studying the operation of the protocol is proposed and a comparison of the NCDP protocol with simple sequential data transmission by the average delivery time of a group of packets is performed.


Sensors ◽  
2021 ◽  
Vol 21 (12) ◽  
pp. 4121
Author(s):  
Hassan Ishtiaq Minhas ◽  
Rizwan Ahmad ◽  
Waqas Ahmed ◽  
Maham Waheed ◽  
Muhammad Mahtab Alam ◽  
...  

In Public Safety Networks (PSNs), the conservation of on-scene device energy is critical to ensure long term connectivity to first responders. Due to the limited transmit power, this connectivity can be ensured by enabling continuous cooperation among on-scene devices through multipath routing. In this paper, we present a Reinforcement Learning (RL) and Unmanned Aerial Vehicle- (UAV) aided multipath routing scheme for PSNs. The aim is to increase network lifetime by improving the Energy Efficiency (EE) of the PSN. First, network configurations are generated by using different clustering schemes. The RL is then applied to configure the routing topology that considers both the immediate energy cost and the total distance cost of the transmission path. The performance of these schemes are analyzed in terms of throughput, energy consumption, number of dead nodes, delay, packet delivery ratio, number of cluster head changes, number of control packets, and EE. The results showed an improvement of approximately 42% in EE of the clustering scheme when compared with non-clustering schemes. Furthermore, the impact of UAV trajectory and the number of UAVs are jointly analyzed by considering various trajectory scenarios around the disaster area. The EE can be further improved by 27% using Two UAVs on Opposite Axis of the building and moving in the Opposite directions (TUOAO) when compared to a single UAV scheme. The result showed that although the number of control packets in both the single and two UAV scenarios are comparable, the total number of CH changes are significantly different.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3295
Author(s):  
Woonghee Lee

In the last ten years, supported by the advances in technologies for unmanned aerial vehicles (UAVs), UAVs have developed rapidly and are utilized for a wide range of applications. To operate UAVs safely, by exchanging control packets continuously, operators should be able to monitor UAVs in real-time and deal with any problems immediately. However, due to any networking problems or unstable wireless communications, control packets can be lost or transmissions can be delayed, which causes the unstable drone control. To overcome this limitation, in this paper, we propose MuTran for enabling reliable UAV control. MuTran considers the packet type and duplicates only control packets, not data packets. After that, MuTran transmits the original and duplicate packets through multiple protocols and paths to improve the reliability of control packet transmissions. We designed MuTran and conducted a lot of theoretical analyses to demonstrate the validity of MuTran and analyze it from various aspects. We implemented MuTran on real devices and evaluated MuTran using the devices. We conducted experiments to verify the limitations of the existing systems and demonstrate that control packets can be transmitted more stably by using MuTran. Through the analysis and experimental results, we confirmed that MuTran reduces the control packet transfer delay, which improves the reliability and stability of controlling UAVs.


Sensors ◽  
2021 ◽  
Vol 21 (8) ◽  
pp. 2791
Author(s):  
Woonghee Lee ◽  
Joon Yeop Lee ◽  
Hyeontae Joo ◽  
Hwangnam Kim

Recently, unmanned aerial vehicles (UAVs) have been applied to various applications. In order to perform repetitive and accurate tasks with a UAV, it is more efficient for the operator to perform the tasks through an integrated management program rather than controlling the UAVs one by one through a controller. In this environment, control packets must be reliably delivered to the UAV to perform missions stably. However, wireless communication is at risk of packet loss or packet delay. Typical network communications can respond to situations in which packets are lost by retransmitting lost packets. However, in the case of UAV control, delay due to retransmission is fatal, so control packet loss and delay should not occur. As UAVs move quickly, there is a high risk of accidents if control packets are lost or delayed. In order to stably control a UAV by transmitting control messages, we propose a control packet transmission scheme, ConClone. ConClone replicates control packets and then transmits them over multiple network connections to increase the probability of successful control packet transmission. We implemented ConClone using real equipment, and we verified its performance through experiments and theoretical analysis.


Author(s):  
Dr. D. Manohari, Et. al.

In wireless networks it is observed that as nodes move unpredictably sudden link disconnections occur during transmission. This leads to frequent path changes and multiple path discoveries which subsequently increase transmission of control packets in network. The nodes in the network simply rebroadcast the received route request (RREQ) packet if they do not have the route to the required destination. In addition to this, frequent hello messages for neighbour set construction and maintenance also increase control message count in the network causing a flooding issue. In order to mitigate these problems, the proposed Fault Tolerant Topology Control Neuro Fuzzy method (FTTCNF), incorporates measures to improve the network stability and to reduce the control packets in the network. These measure 1.reduce control message transmissions among neighbours by  finding a stable path 2. neighbour node distance is computed based on the reception of a signal strength Indication (RSSI), 3. path stability  is  decided by the link expiry time (LET) which can be used to predict the neighbour mobility deviations. These factors, ( above mentioned distance, path stability factor  PSF, and LET) are subjected to the fuzzification process to identify the fuzzy rule values and are given as input to the neuron formation stage. Final neuron value is computed for all available paths and the maximum value path is chosen for data transmission. Energy level monitoring is also applied at each node to check the node’s current energy and should it go below the energy threshold level the node by itself, joining the routing process is avoided. Simulation results have proved that the proposed method significantly reduces the routing overhead and improves the stability of path during data transmission.


2021 ◽  
pp. 575-594
Author(s):  
Debasish Datta

In order to address poor bandwidth-utilization in circuit-switched WRONs, various techniques for optical packet-switching (OPS) have been explored, but needing complex technologies, such as real-time header extraction/insertion, packet alignment, etc. An intermediate solution between the WRONs and OPS networks – the optical burst-switched (OBS) network – has been explored, where several packets are clubbed together at ingress nodes to form optical bursts, which are transmitted with the headers sent as control packets ahead of each bursts. With this prior resource-reservation scheme at en-route nodes before burst arrivals, OBS networks overcome the challenges of OPS networks, while improving bandwidth utilization as compared to WRONs. We first present the node architectures, followed by header-processing schemes and switch designs for OPS networks. Next we present the basic concepts of OBS networking and describe the necessary network protocols, including burst assembly scheme, just enough time (JET) signaling, resource-reservation and routing schemes. (145 words)


Sign in / Sign up

Export Citation Format

Share Document