Search results for "Packet forwarding"

showing 7 items of 7 documents

A Restricted-Weakly Connected Dominating Set for Role Assignment in a Multichannel MAC for Wireless Mesh Network

2009

International audience; We propose an efficient way of constructing the wireless mesh structure associated with Molecular MAC, a multichannel access method designed for efficient packet forwarding. We base our role assignment on a restricted Weakly Connected Dominating Set structure. After presenting a formal definition of the role assignment problem, we prove its NP-completeness. Then, we propose a centralized 2-approximation algorithm that maximizes the sum of radio link capacities in the molecular structure. Finally, we extend this protocol so that it can operate in a distributed way still providing the same guarantee. This distributed protocol is self-stabilizing thus robust to topology…

Computer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networking0102 computer and information sciences02 engineering and technologyNetwork topology01 natural sciencesConnected dominating setlaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunicationsOrder One Network Protocol010201 computation theory & mathematicsbusinessAssignment problemComputer network
researchProduct

A MANET Autoconfiguration System based on Bluetooth Technology

2006

The availability of both Wi-Fi and Bluetooth technologies on currently available devices offers the possibility to combine both in order to make the most out of their capabilities. In this paper we propose using Bluetooth technology to solve the configuration problem of the terminals conforming an IEEE 802.11-based ad-hoc network. The main objective of mobile ad- hoc networks (MANETs) is to extend the connectivity range of nodes through packet forwarding, thereby avoiding the use of a fixed infrastructure. However, since configuration of nodes is a complex issue, we provide a fast and reliable solution to auto-configure MANET terminals. Our solution is adequate for the quick setup and deplo…

Mobile radioSIMPLE (military communications protocol)Computer sciencebusiness.industryWireless ad hoc networkDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwardingMobile ad hoc networklaw.inventionBluetoothIEEE 802.11Software deploymentlawbusinessComputer network2006 3rd International Symposium on Wireless Communication Systems
researchProduct

An API for Advanced Traffic Control in Diffserv Routers

2003

Distributed per-flow admission control is a promising solution for Differentiated Services networks. Its deployment in DiffSery domains requires the ability to suitably configure, in each network router, low-level packet forwarding mechanisms, such as packet dropping algorithms driven by traffic measurements. In this paper we first show that performance effectiveness is achieved by means of non traditional configuration of the forwarding mechanisms. Hence, we propose a modular Application Program Interface that allows to flexibly and adaptively configure the forwarding/dropping behavior associated to a router’s output queue, well beyond the traditional RED/RIO active queue management scheme…

RouterEngineeringDifferentiated servicesbusiness.industryNetwork packetPacket forwardingRandom early detectionAdmission controlActive queue managementbusinessQueueComputer network
researchProduct

Assignment of Roles and Channels for a Multichannel MAC in Wireless Mesh Networks

2009

International audience; A multichannel MAC improves throughput in wireless mesh networks by multiplexing transmissions over orthogonal channels. In this paper, we propose an efficient way for constructing the wireless mesh structure associated with Molecular MAC, a multichannel MAC layer designed for efficient packet forwarding. Molecular MAC outperforms other classical approaches, but requires a specific structure for efficient operation. First, we propose a centralized protocol that provides an upper bound for constructing such a molecular structure through a MILP (Mixed Integer Linear Programming) formulation that maximizes network capacity. Then, we present two distributed self-stabiliz…

Routing protocolComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]Mesh networkingThroughput0102 computer and information sciences02 engineering and technology01 natural sciencesMultiplexinglaw.invention[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]law0202 electrical engineering electronic engineering information engineeringComputer Science::Networking and Internet ArchitectureComputer Science::Information TheorySpanning treeWireless mesh network[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryRadio Link ProtocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwarding020206 networking & telecommunications010201 computation theory & mathematicsbusinessCommunication channelComputer network
researchProduct

An intrusion detection system for selective forwarding attack in IPv6-based mobile WSNs

2017

Selective forwarding attack is considered among the most dangerous attack in wireless sensor networks, particularly in mobile environment. The attackers compromise legitimate nodes and selectively drop some packets. In addition to that, the movement of some nodes increases link failures, collisions and packet loss. So, it will be more difficult to detect malicious nodes from legitimates ones. This paper focuses on detecting selective forwarding attackers in IPv6-based mobile wireless sensor networks when the standardized IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) is used. Contrarily to previous works which propose solutions to detect selective forwarding attack in static w…

Routing protocolComputer scienceNetwork packetbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS010401 analytical chemistryPacket forwarding020206 networking & telecommunications02 engineering and technologyIntrusion detection system01 natural sciences0104 chemical sciencesIPv6Key distribution in wireless sensor networksPacket lossPacket drop attack0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkComputer network2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Improving IEEE 802.11 Performance in Chain Topologies through Distributed Polling and Network Coding

2009

Wireless multi-hop networks often rely on the use of IEEE 802.11 technology. Despite of the robustness of the IEEE 802.11 Distributed Coordination Function (DCF) for working in various network scenarios, it has been proven that critical inefficiencies can arise in the case of multi-hop packet forwarding. In this paper, we propose a MAC scheme, based on the virtualization of the Point Coordination Function, optimized for working on chain topologies with bidirectional traffic flows. Our scheme is based on a token-like access mechanism coupled with network coding. The basic idea is the use of multiple Point Coordinators (PCs) along the node chain, which are elected by passing special token fra…

business.industryBidirectional trafficComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPacket forwardingThroughputnetwork codingDistributed coordination functionNetwork topologyWLANToken passingPoint coordination functionIEEE 802.11Linear network codingWireless lanTelecommunications linkComputer Science::Networking and Internet ArchitectureWirelessPollingbusinessComputer network
researchProduct

On the Benefits of Random Linear Coding for Unicast Applications in Disruption Tolerant Networks

2006

In this paper, we investigate the benefits of using a form of network coding known as Random Linear Coding (RLC) for unicast communications in a mobile Disruption Tolerant Network (DTN) under epidemic routing. Under RLC, DTN nodes store and then forward random linear combinations of packets as they encounter other DTN nodes. We first consider the case where there is a single block of packets propagating in the network and then consider the case where blocks of K packets arrive according to a Poisson arrival process. Our performance metric of interest is the delay until the last packet in a block is delivered. We show that for the single block case, when bandwidth is constrained, applying RL…

business.industryComputer scienceWireless networkNetwork packetNode (networking)Linear network codingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (computing)Packet forwardingUnicastbusinessComputer networkBlock (data storage)2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks
researchProduct