4,446 research outputs found

    Architecture for Mobile Heterogeneous Multi Domain Networks

    Get PDF
    Multi domain networks can be used in several scenarios including military, enterprize networks, emergency networks and many other cases. In such networks, each domain might be under its own administration. Therefore, the cooperation among domains is conditioned by individual domain policies regarding sharing information, such as network topology, connectivity, mobility, security, various service availability and so on. We propose a new architecture for Heterogeneous Multi Domain (HMD) networks, in which one the operations are subject to specific domain policies. We propose a hierarchical architecture, with an infrastructure of gateways at highest-control level that enables policy based interconnection, mobility and other services among domains. Gateways are responsible for translation among different communication protocols, including routing, signalling, and security. Besides the architecture, we discuss in more details the mobility and adaptive capacity of services in HMD. We discuss the HMD scalability and other advantages compared to existing architectural and mobility solutions. Furthermore, we analyze the dynamic availability at the control level of the hierarchy

    Performance Analysis of Traffic and Mobility Models on Mobile and Vehicular Ad Hoc Wireless Networks

    Get PDF
    Advances in wireless communication technology and the proliferation of mobile devices enable the capa- bilities of communicating with each other even in areas with no pre-existing communication infrastructure. Traffic and mobility models play an important role in evaluating the performance of these communication networks. Despite criticism and assumption from various researches on Transmission Control Protocols (TCP), weaknesses on Mobile Ad Hoc Network (MANET), and Vehicular Ad Hoc Network (VANET). A simulation was carried out to evaluate the performance of Constant Bit Rate, Variable Bit Rate and Transmission Control Protocol on MANET and VANET using DSR routing protocol. CBR, VBR, and TCP have different manufacturer operation mechanisms and these differences lead to significant performance of CBR and VBR over TCP with better throughput and less average maximal end-to-end delay. DSR was able to respond to link failure at low mobility which led to TCP’s performance in packets delivery

    Secure and Reconfigurable Network Design for Critical Information Dissemination in the Internet of Battlefield Things (IoBT)

    Full text link
    The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc. The IoT technology is also envisioned to play an important role in improving the effectiveness of military operations in battlefields. The interconnection of combat equipment and other battlefield resources for coordinated automated decisions is referred to as the Internet of battlefield things (IoBT). IoBT networks are significantly different from traditional IoT networks due to the battlefield specific challenges such as the absence of communication infrastructure, and the susceptibility of devices to cyber and physical attacks. The combat efficiency and coordinated decision-making in war scenarios depends highly on real-time data collection, which in turn relies on the connectivity of the network and the information dissemination in the presence of adversaries. This work aims to build the theoretical foundations of designing secure and reconfigurable IoBT networks. Leveraging the theories of stochastic geometry and mathematical epidemiology, we develop an integrated framework to study the communication of mission-critical data among different types of network devices and consequently design the network in a cost effective manner.Comment: 8 pages, 9 figure

    A Survey on Anonymous On-Demand Routing Protocols for MANETs

    Get PDF
    At present Mobile ad hoc networks (MANET) is used in many real time applications and hence such networks are vulnerable to different kinds of security threats. MANET networks suffered more from security attacks due to use of free wireless communication frequency spectrum and dynamic topology. Therefore it becomes very tough to provide security to MANET under different adversarial environments like battlefields. For MANET, anonymous communications are vital under the adversarial environments, in which the identification of nodes as well as routes is replaced by pseudonyms or random numbers for the purpose of protection. There are many protocols presented for anonymous communication security for MANET, which hide node identities and routes from exterior observers in order to provide anonymity protection. This paper presents review of various anonymous on demand routing protocols

    All That Sprawl, Y’all: An Analysis of Development on Steinwehr Avenue and York Street in Gettysburg, Pennsylvania, from 1971 to 2014

    Full text link
    The advent of the automobile transformed the American landscape in the 20th century. In conjunction with the increasing importance of the automobile, numerous post-WW II government programs such as the Interstate Highway System encouraged suburban sprawl. Towns and cities adjacent to tourist attractions, known as gateway communities, face unique problems caused by sprawl. Gettysburg, Pennsylvania, is an example of a gateway community as it includes the Gettysburg National Military Park. Two study sites, portions of Steinwehr Avenue and York Street, were studied to analyze the effects of sprawl in Gettysburg. The sites were analyzed using ArcGIS, data compiled from historic phonebooks, and discussions with local business owners. Development along York Street exemplifies an auto-centric culture with many regional and national chain establishments set back from the road. Steinwehr Avenue represents a walkable community comprising on-street parking, sidewalks, and local “mom-and-pop” establishments. Trends associated with categories of businesses varied between the two sites and revealed different development patterns. We predict that that York Street will continue to sprawl while Steinwehr Avenue development will be limited due to its close proximity to the battlefield

    ICT in education Excellence Group. Final report

    Get PDF
    corecore