13 Hits in 4.8 sec

Cross layer Interaction Models for SCTP and OLSR [article]

Mahmadou Issoufou Tiado, André-Luc Beylot
2014 arXiv   pre-print
In this paper, we are applying the RCL method on the stack that uses the Stream Control Transport Protocol (SCTP) at the transport layer and the Optimized Link State Routing (OLSR) at the network layer  ...  Section IV is used for the application of the RCL method and the different interaction arrays it generates.  ...  The three cross layer conceptual models help to get a complete view of the interaction between layer and bring to the definition of the use of each interaction by the SCTP protocol.  ... 
arXiv:1410.0337v1 fatcat:uhgxha3zt5bu3g2m6bfmq7trvq

A Framework for In-Network Management in Heterogeneous Future Communication Networks [chapter]

Christopher Foley, Sasitharan Balasubramaniam, Eamonn Power, Miguel Ponce de Leon, Dmitri Botvich, Dominique Dudkowski, Giorgio Nunzi, Chiara Mingardi
2008 Lecture Notes in Computer Science  
In this paper, we focus on our framework for in-network management, which allows management logic to be embedded and executed within network nodes.  ...  The fact that the size and complexity of such networks will experience tremendous growth will eventually render existing traditional network management paradigms unfeasible.  ...  For example, the inherent model can be used to support protocol-specific congestion control mechanisms and to integrate them into the management plane of INM, as depicted in Fig. 1 (left) .  ... 
doi:10.1007/978-3-540-87355-6_2 fatcat:au2wiv7nubhddigowc5wybplgq

Low-Coupling Cluster-Based Multipath Routing for Wireless Mesh Networks

Cristina Fonseca, Jose Mocito, Luis Rodrigues
2011 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN)  
We provide an evaluation using the NS-2 network simulator and show that our solution offers an interesting tradeoff between the signaling cost, the time required to set up and maintain paths, and the properties  ...  In this context we propose a novel clustering algorithm and complementary protocols to discover and maintain routes in an efficient manner, aiming at minimizing interferences between transmissions of neighboring  ...  Moreover, it uses SCTP (Ong & Yoakum 2002) instead of TCP because the latter is designed for single-path routing and cannot adapt to the network layer multipath structure and SCTP can independently control  ... 
doi:10.1109/icccn.2011.6005772 dblp:conf/icccn/FonsecaMR11 fatcat:dcrqdzop2nco5poj6fkgpv7une

VirtualMesh: an emulation framework for wireless mesh networks in OMNeT++

Thomas Staub, Reto Gantenbein, Torsten Braun
2009 Proceedings of the Second International ICST Conference on Simulation Tools and Techniques  
VirtualMesh captures the real network traffic through a virtual wireless interface at the mesh clients and redirects it to a wireless model based on the OMNeT++ network simulator.  ...  Especially for WMNs including wireless communication and mobile clients, the testing in a real test-bed is time-consuming and expensive.  ...  Also OMNeT++ has been previously used for network emulation scenarios. The authors of [62] evaluate OMNeT++ in a real-time SCTP transport layer emulation.  ... 
doi:10.4108/icst.simutools2009.5563 dblp:conf/simutools/StaubGB09 fatcat:jyukcxfwbrej3e25scohawd5vu

Mobile ad hoc networking: imperatives and challenges

Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu
2003 Ad hoc networks  
Ad hoc networking concept is not a new one, having been around in various forms for over 20 years.  ...  Mobile ad hoc networks (MANETs) represent complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize into arbitrary and temporary, "ad-hoc" network topologies  ...  Acknowledgements The work of Marco Conti was partially funded by the Information Society Technologies programme of the European Commission, Future and Emerging Technologies under the IST-2001-38113 MobileMAN  ... 
doi:10.1016/s1570-8705(03)00013-1 fatcat:dytlauexr5by3aj5hwg2jx7mi4

Exploiting the Power of Multiplicity: A Holistic Survey of Network-Layer Multipath

Junaid Qadir, Anwaar Ali, Kok-Lim Alvin Yau, Arjuna Sathiaseelan, Jon Crowcroft
2015 IEEE Communications Surveys and Tutorials  
We also highlight open issues and identify directions for future work.  ...  The main contribution of this paper is a systematic articulation of the main design issues in network-layer multipath routing along with a broad-ranging survey of the vast literature on network-layer multipathing  ...  The authors would also like to thank Gareth Tyson and the anonymous reviewers for their useful feedback.  ... 
doi:10.1109/comst.2015.2453941 fatcat:pvatolih4ngwrooewos2rgeaoe

An energy-conscious transport protocol for multi-hop wireless networks

N. Riga, I. Matta, A. Medina, C. Partridge, J. Redi
2007 Proceedings of the 2007 ACM CoNEXT conference on - CoNEXT '07  
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  the data needed, and completing and reviewing the collection of information.  ...  Besides the fact that iJTP must process all JTP packets that pass through a node, the above described softstate operations require the crafting of cross-layer interactions with the MAC layer.  ... 
doi:10.1145/1364654.1364683 dblp:conf/conext/RigaMMPR07 fatcat:oitjbcbq4zhtdhjeyo4phvykiq

Table of contents

2010 ICCAS 2010  
Performance Comparison of AODV and OLSR for MANET 1974 Paitoon Rakluea and Jintana Nakasuwan SA02-6 Planar UWB Antenna with Single Band-Notched Characteristic 1978 Paitoon Rakluea and Jintana  ...  Register in a Multi-layer Roll-to-Roll Printed Electronics 2494 HyunKyoo Kang, Kee-Hyun Shin and Chang-Woo Lee SE07-3 Analysis of Ink Transfer Process for R2R Printing Applications with Non-Newtonian  ... 
doi:10.1109/iccas.2010.5669694 fatcat:43uj6owxh5c63gr2mn5shli5ja

Secure and efficient routing in highly dynamic WLAN mesh networks

Mohamad Sbeiti, Technische Universität Dortmund, Technische Universität Dortmund
For instance, WMNs are intended to interconnect self-organized, cooperative, and small Unmanned Aerial Vehicles (UAVs) in a wide range of applications, such as emergency response, environmental monitoring  ...  This new proposal defeats more attacks than the IEEE 802.11s/i security mechanisms and the well-known, secure routing protocol Authenticated Routing for Ad-hoc Networks (ARAN), without making restrictive  ...  Example models of INETMANET include propagation models, wireless link layer protocols, and WLAN mesh routing protocols such as OLSR, BATMAN, AODV, and HWMP.  ... 
doi:10.17877/de290r-16307 fatcat:6kdbpzmtl5f5je4ae5ffgb57qa

MESH 2013 Committee MESH Advisory Chairs MESH 2013 Special area Chairs

Andreas Kassler, Karlstad University, Sweden, Vladimir Sulc, Microrisc -Jicin, Czech Republic, Stefan Bouckaert, Eugen Borcoci, Michael Bahr, Vladimir Sulc, Microrisc -Jicin, Czech Republic (+24 others)
MESH 2013 The Sixth International Conference on Advances in Mesh Networks   unpublished
We hope that MESH 2013 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in mesh networks.  ...  We are grateful to the members of the MESH 2013 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  ACKNOWLEDGMENT We would like to thank our sponsors, the Telkom Centre of Excellence at Rhodes University, funded by Telkom SA, Business Connexion, Verso Technologies, THRIP, Stortech, Tellabs and the National  ... 

Application Protocols [chapter]

treatments in networking, middleware and software technologies for communications and distributed systems.  ...  The books will provide timely and reliable information about the state-of-the-art to researchers, advanced students and development engineers in the Telecommunications and the Computing sectors.  ...  Geoff was key in encouraging and helping develop the concept for the book, provided comments on the manuscript and contributed Section 7.1 (ISA100 Industrial Acknowledgment frames that are meant to be  ... 
doi:10.1002/9780470686218.ch5 fatcat:y5jn5yxdwnbdrajgtibthghmb4

Report from Dagstuhl Seminar Towards an Affordable Internet Access for Everyone: The Quest for Enabling Universal Service Commitment

Jon Crowcroft, Adam Wolisz, Arjuna Sathiaseelan, Jon Crowcroft@cl, Uk, T Berlin
This report document the program and outcomes of the Dagstuhl  ...  Business models can foster broadband deployment at various layers of a generic three-layer telecommunication value chain. 4.  ...  Maccari and R. Lo Cigno. Betweenness estimation in OLSR-based multi-hop net- works for distributed filtering.  ... 

Dagstuhl Reports, Volume 4, Issue 11, November 2014, Complete Issue [article]

Operating System for embedded devices or the OLSR mesh routing protocol among many others.  ...  In its simplest instantiations, a model constitutes of three layers: a parameter layer, incorporating prior beliefs about parameters; a dynamical layer, incorporating a stochastic model of the system behaviour  ...  However, the recent shift in systems biology towards spatial multilevel models requires new modeling formalisms and simulation software for which existing exchange formats are not suitable.  ... 
doi:10.4230/dagrep.4.11 fatcat:zzps76cx7rfldla5z5dikvsqbe