• No results found

network layer protocol

DTLS based Security and Two-Way Authentication for the Internet of Things

DTLS based Security and Two-Way Authentication for the Internet of Things

... end-to-end protocol provides security even if the underlying network infrastructure is only partially under the user’s ...provider’s network that is under the user’s control, similar to how users of ...

27

Enhanced Simulation Model of ZigBee Wireless Sensor Network

Enhanced Simulation Model of ZigBee Wireless Sensor Network

... sensor network (WSN) and the hierarchical modeling mechanism of OPENT, an enhanced ZigBee simulation model was studied to improve the MAC layer process model of IEEE ...802.15.4 protocol provided by ...

6

PPP (Point-to-Point Protocol)

PPP (Point-to-Point Protocol)

...  This is followed by link quality determination. LCP allows elective link quality strength of mind phase following the link connection and arrangement arbitration phase. In this section, the link is experienced to ...

5

A Brief Review on Internet of Things

A Brief Review on Internet of Things

... wide familiar technology. We have entered a new age of technology that became well known in recent time, the name of the technology is IoT that refers to “Internet of Things”. IoT is too known as the Internet of ...

5

Networking   Self Teaching Guide   James Edwards pdf

Networking Self Teaching Guide James Edwards pdf

... basic Network layer services provided by any ...TCP/IP network is able to route data from node to node based on the address of the source and destination nodes, but is not concerned about the order ...

867

Design and implementation of the System Based on the H 323 Protocol of the Beijing 12316 IP call

Design and implementation of the System Based on the H 323 Protocol of the Beijing 12316 IP call

... the network, then decoded the data received from the network and restore to the original analog voice signals, in this process, the G series protocol in the framework of ...H.323 protocol is ...

6

A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network

A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network

... This paper [2] provides description of LEACH and how LEACH can be compromised by Black hole and Gray Hole attacker. In Black Hole attack the attacker node tries to collect most of the data of the network then ...

6

ISDN SIGNALLING MODULE SINGLE E1/T1

ISDN SIGNALLING MODULE SINGLE E1/T1

... All protocol entities are managed as isolated objects communicating through a datagram message passing scheme. The message passing is based on FIFO queue communications. The entities of the system are housed in ...

5

Extenuate the DOS Attacks in OLSR Protocol using Novel Trust Management Method

Extenuate the DOS Attacks in OLSR Protocol using Novel Trust Management Method

... this network, an application contains very sensitive and secret communication since the MANET is in dynamic nature to provide a secure data transmission is ...ting protocol (OLS R) known as the node ...

6

PHY-MAC Cross-Layer Cooperative Protocol Supporting Physical-Layer Network Coding

PHY-MAC Cross-Layer Cooperative Protocol Supporting Physical-Layer Network Coding

... proposed protocol still achieves the best throughput performance, followed by the previous cooperative MAC protocol [15], and finally, the traditional protocol ...certain network radius, the ...

15

The Design and Implementation of a Vibration Fault Detection Cyber Physical System

The Design and Implementation of a Vibration Fault Detection Cyber Physical System

... control layer (MCL), the network layer and the device ...the network layer, the CANopen network of field device can communicate with the Ethernet of VFDCPS for system's ...

12

Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol

Provide Practical Security Mechanism to Wireless Sensor Networks Using Modified Motesec Protocol

... security protocol called MoteSec-Aware works on a network layer ...MoteSec-Aware protocol for the TelosB prototype sensor node platform which running TinyOS ...efficient network ...

5

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection

Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection

... We used PIA-Bro to implement a reliable bot- detector that has already identified a significant num- ber of bot-clients at MWN and UCB. The detector op- erates on top of the IRC analyzer and can thus perform ...

16

Djenouri Djamel & Nadjib Badache

Djenouri Djamel & Nadjib Badache

... the network, the number of MOCAs, and the threshold value for secret reconstruction(number of MOCAs required to issue ...the network (M) can change dynamically over time, it is not a tunable ...the ...

28

Packet over SONET C H A P T E R

Packet over SONET C H A P T E R

... Load balancing refers to the capability to have traffic traverse two separate paths simulta- neously to maximize the resources at the site. Load balancing is possible in a PoS APS 1+1 environment where four circuits are ...

25

Handoff  Mechanism in Real Time Applications Using  Two Different Algorithms

Handoff Mechanism in Real Time Applications Using Two Different Algorithms

... The SIP is used for control of real-time multimedia sessions. It can also be used to support a variety of Internet mobility. This Letter will focus on the SIP based IP handover for terminal mobility. In the existing SIP ...

5

A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network

A Layer 2 Protocol to Protect the IP Communication in a Wired Ethernet Network

... Security Protocol can effectively protect the network communication between two hosts and avoid network attacks based on packet injection, data tampering or information disclosed not only by IP ...

104

IP Access Networks with QoS Support Susana Sargento a, Rui Valadas b, Jorge Gonçalves c, Henrique Sousa d

IP Access Networks with QoS Support Susana Sargento a, Rui Valadas b, Jorge Gonçalves c, Henrique Sousa d

... access network operator are kept to a minimum, will be achieved ...on layer 2 or layer 3 multiplexers that allows a number of simplifications in the network elements and protocols ...

11

A Novel Approach on Energy Efficient AODV Algorithm for MANETs

A Novel Approach on Energy Efficient AODV Algorithm for MANETs

... Priyanka Jain et al [10] Enhanced Version of AODV presented EERP protocol to reduce the transmission power of a node which is part of an active route if next hop node is closer. The distance can be calculated ...

7

Looking closer at the Privacy Aspect in IP-Telephony

Looking closer at the Privacy Aspect in IP-Telephony

... Concerning privacy on the Application level, whether in software or in hardware, vendors now start seeking IP- phone partners to include digital certificates in their devices so that users can verify that the phone is ...

13

Show all 10000 documents...

Related subjects