نتایج جستجو برای: network routing

تعداد نتایج: 698545  

H. Bakhshi, M. Bajelan

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

Today, one of the new technologies in the modern era is Vehicular Ad-hoc Network which has takenenormous attention in the recent years. Because of rapid topology changing and frequent disconnectionmakes it difficult to design an efficient routing protocol for routing data between vehicles, called V2V orvehicle to vehicle communication and vehicle to roadside infrastructure, called V2I. Designin...

Journal: :journal of advances in computer research 2012
sajjad jahanbakhsh gudakahriz shahram jamali mina vajed khiavi

mobile ad hoc networks (manets) are composed of mobile stations communicating through wireless links, without any fixed backbone support. in these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. tora is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it doesn’...

Javad Taheri, Mohammad Kazem Akbari,

Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...

Multicast routing is one of the most important services in Multi Radio Multi Channel (MRMC) Wireless Mesh Networks (WMN). Multicast routing performance in WMNs could be improved by choosing the best routes and the routes that have minimum interference to reach multicast receivers. In this paper we want to address the multicast routing problem for a given channel assignment in WMNs. The channels...

Journal: :IEEE Transactions on Information Theory 2006

Journal: :journal of sciences, islamic republic of iran 2010
p panahi

ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. h...

HK Arunkumar S Sivakumar

Internet Traffic has grown exponentially over last few years due to provision of multiple class services through Internet backbone. With the explosive use of Internet, contemporary Internet routers are susceptible to overloads and their services deteriorate drastically and often cause denial of services. In this paper, an analysis is made how forecasting technique, routing algorithm and Genetic...

Journal: :journal of computer and robotics 0
maryam fathi ahmadsaraei faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran abolfazl toroghi haghighat faculty of computer and information technology engineering, qazvin branch, islamic azad university, qazvin, iran

in recent years mobile networks have expanded dramatically, compared with other wireless networks. routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. in this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید