4,446 research outputs found
Architecture for Mobile Heterogeneous Multi Domain Networks
Multi domain networks can be used in several scenarios including military, enterprize networks, emergency networks and many other cases. In such networks, each domain might be under its own administration. Therefore, the cooperation among domains is conditioned by individual domain policies regarding sharing information, such as network topology, connectivity, mobility, security, various service availability and so on. We propose a new architecture for Heterogeneous Multi Domain (HMD) networks, in which one the operations are subject to specific domain policies. We propose a hierarchical architecture, with an infrastructure of gateways at highest-control level that enables policy based interconnection, mobility and other services among domains. Gateways are responsible for translation among different communication protocols, including routing, signalling, and security. Besides the architecture, we discuss in more details the mobility and adaptive capacity of services in HMD. We discuss the HMD scalability and other advantages compared to existing architectural and mobility solutions. Furthermore, we analyze the dynamic availability at the control level of the hierarchy
Performance Analysis of Traffic and Mobility Models on Mobile and Vehicular Ad Hoc Wireless Networks
Advances in wireless communication technology and the proliferation of mobile devices enable the capa-
bilities of communicating with each other even in areas with no pre-existing communication infrastructure.
Traffic and mobility models play an important role in evaluating the performance of these communication
networks. Despite criticism and assumption from various researches on Transmission Control Protocols
(TCP), weaknesses on Mobile Ad Hoc Network (MANET), and Vehicular Ad Hoc Network (VANET).
A simulation was carried out to evaluate the performance of Constant Bit Rate, Variable Bit Rate and
Transmission Control Protocol on MANET and VANET using DSR routing protocol. CBR, VBR, and TCP
have different manufacturer operation mechanisms and these differences lead to significant performance
of CBR and VBR over TCP with better throughput and less average maximal end-to-end delay. DSR
was able to respond to link failure at low mobility which led to TCP’s performance in packets delivery
Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)
The Internet of things (IoT) is revolutionizing the management and control of
automated systems leading to a paradigm shift in areas such as smart homes,
smart cities, health care, transportation, etc. The IoT technology is also
envisioned to play an important role in improving the effectiveness of military
operations in battlefields. The interconnection of combat equipment and other
battlefield resources for coordinated automated decisions is referred to as the
Internet of battlefield things (IoBT). IoBT networks are significantly
different from traditional IoT networks due to the battlefield specific
challenges such as the absence of communication infrastructure, and the
susceptibility of devices to cyber and physical attacks. The combat efficiency
and coordinated decision-making in war scenarios depends highly on real-time
data collection, which in turn relies on the connectivity of the network and
the information dissemination in the presence of adversaries. This work aims to
build the theoretical foundations of designing secure and reconfigurable IoBT
networks. Leveraging the theories of stochastic geometry and mathematical
epidemiology, we develop an integrated framework to study the communication of
mission-critical data among different types of network devices and consequently
design the network in a cost effective manner.Comment: 8 pages, 9 figure
Recommended from our members
A two‐step authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
A Survey on Anonymous On-Demand Routing Protocols for MANETs
At present Mobile ad hoc networks (MANET) is used in many real time applications and hence such networks are vulnerable to different kinds of security threats. MANET networks suffered more from security attacks due to use of free wireless communication frequency spectrum and dynamic topology. Therefore it becomes very tough to provide security to MANET under different adversarial environments like battlefields. For MANET, anonymous communications are vital under the adversarial environments, in which the identification of nodes as well as routes is replaced by pseudonyms or random numbers for the purpose of protection. There are many protocols presented for anonymous communication security for MANET, which hide node identities and routes from exterior observers in order to provide anonymity protection. This paper presents review of various anonymous on demand routing protocols
All That Sprawl, Y’all: An Analysis of Development on Steinwehr Avenue and York Street in Gettysburg, Pennsylvania, from 1971 to 2014
The advent of the automobile transformed the American landscape in the 20th century. In conjunction with the increasing importance of the automobile, numerous post-WW II government programs such as the Interstate Highway System encouraged suburban sprawl. Towns and cities adjacent to tourist attractions, known as gateway communities, face unique problems caused by sprawl. Gettysburg, Pennsylvania, is an example of a gateway community as it includes the Gettysburg National Military Park. Two study sites, portions of Steinwehr Avenue and York Street, were studied to analyze the effects of sprawl in Gettysburg. The sites were analyzed using ArcGIS, data compiled from historic phonebooks, and discussions with local business owners. Development along York Street exemplifies an auto-centric culture with many regional and national chain establishments set back from the road. Steinwehr Avenue represents a walkable community comprising on-street parking, sidewalks, and local “mom-and-pop” establishments. Trends associated with categories of businesses varied between the two sites and revealed different development patterns. We predict that that York Street will continue to sprawl while Steinwehr Avenue development will be limited due to its close proximity to the battlefield
Recommended from our members
A classification of emerging and traditional grid systems
The grid has evolved in numerous distinct phases. It started in the early ’90s as a model of metacomputing in which supercomputers share resources; subsequently, researchers added the ability to share data. This is usually referred to as the first-generation grid. By the late ’90s, researchers had outlined the framework for second-generation grids, characterized by their use of grid middleware systems to “glue” different grid technologies together. Third-generation grids originated in the early millennium when Web technology was combined with second-generation grids. As a result, the invisible grid, in which grid complexity is fully hidden through resource virtualization, started receiving attention. Subsequently, grid researchers identified the requirement for semantically rich knowledge grids, in which middleware technologies are more intelligent and autonomic. Recently, the necessity for grids to support and extend the ambient intelligence vision has emerged. In AmI, humans are surrounded by computing technologies that are unobtrusively embedded in their surroundings.
However, third-generation grids’ current architecture doesn’t meet the requirements of next-generation grids (NGG) and service-oriented knowledge utility (SOKU).4 A few years ago, a group of independent experts, arranged by the European Commission, identified these shortcomings as a way to identify potential European grid research priorities for 2010 and beyond. The experts envision grid systems’ information, knowledge, and processing capabilities as a set of utility services.3 Consequently, new grid systems are emerging to materialize these visions. Here, we review emerging grids and classify them to motivate further research and help establish a solid foundation in this rapidly evolving area
- …