• No results found

[PDF] Top 20 Fog Route:Distribution of Data using Delay Tolerant Network

Has 10000 "Fog Route:Distribution of Data using Delay Tolerant Network" found on our website. Below are the top 20 most common "Fog Route:Distribution of Data using Delay Tolerant Network".

Fog Route:Distribution of Data using Delay Tolerant Network

Fog Route:Distribution of Data using Delay Tolerant Network

... the Fog tier, Fog servers provide services to the end users and synchronize data with the ...distributed Fog servers. Data dissemination between a mobile user and a Fog server is ... See full document

5

Fog Route: Distribution of Data using Delay Tolerant Network

Fog Route: Distribution of Data using Delay Tolerant Network

... Abstract: Fog computing is an extension of cloud ...computing, fog computing also provides data, compute, storage and application services to ...is fog provides proximity to its end users ... See full document

8

An Efficient Trust Management Technique for Delay Tolerant Network

An Efficient Trust Management Technique for Delay Tolerant Network

... secure data forwarding scheme is presented by Mohamed Elsalih Mahmoud [6], they named it ...in data forwarding to avoid the attackers that are not participating in routing ... See full document

5

DELAY – Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications

DELAY – Disruption Tolerant Network (DTN), its Network Characteristics and Core Applications

... that data can be sent only when there is an identifiable path all the way to the destination, DTN continues to advance data even when there’s no complete, identifiable path to the ...The network uses ... See full document

7

Probabilistic Misbehaviour Detection and Optimization in Delay Tolerant Network

Probabilistic Misbehaviour Detection and Optimization in Delay Tolerant Network

... of data, only if it is in dealings with other ...propagation delay. The basic idea behind DTN network is that endpoints aren't always unceasingly ...aid data transfer, DTN usages a ... See full document

7

A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network

... In delay tolerant network Communication is possible even if end-to-end connectivity is never ...and using store-carry-forward fashion. this is a new types of network are different from ... See full document

5

An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay   Tolerant Network

An Efficient Intrusion Detection Scheme for Mitigating Nodes Using Data Aggregation in Delay Tolerant Network

... single network. The basic idea behind DTN network is that endpoints aren't always continuously ...facilitate data transfer, DTN uses a store-andforward approach across routers that are more ... See full document

16

Social Network Analysis for Routing in Disconnected Delay Tolerant MANETs

Social Network Analysis for Routing in Disconnected Delay Tolerant MANETs

... the network graph is rarely (if ever) ...a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes may move ...ulations ... See full document

9

Multi-path Data Distribution Mechanism Based on RPL for Energy Consumption and Time Delay

Multi-path Data Distribution Mechanism Based on RPL for Energy Consumption and Time Delay

... a network, energy is a very scarce resource; so many studies are focused on minimizing global energy ...the network, but existing research tends to focus more on energy consumption and ignore the end-to-end ... See full document

19

A Framework and Mathematical Modeling for the Vehicular Delay Tolerant Network Routing

A Framework and Mathematical Modeling for the Vehicular Delay Tolerant Network Routing

... buffer data [20] until a forwarding opportunity ...maximize data delivery probability while minimizing end-to-end delay ...end-to-end route may not exist for a certain time, or the ... See full document

15

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

A Survey on Detection of Malicious Nodes in Delay Tolerant Network

... hoc network it does not depend on a pre-existing infrastructure, such as routers in wired networks or access points in managed wireless ...hoc network is a peer to peer network of wireless nodes ... See full document

6

Parasitic routing : using social network analysis for routing in disconnecting delay tolerant MANETs

Parasitic routing : using social network analysis for routing in disconnecting delay tolerant MANETs

... In Epidem ic solutions node m obility is considered an asset rather than a disadvantage and no assum ption in regards to control over node m ovem ents or know ledge o f future m ovem ents are made. The network may ... See full document

186

Title: A Study on MAC Level Architecture Exploration for Delay Tolerant Network

Title: A Study on MAC Level Architecture Exploration for Delay Tolerant Network

... MAC protocol must be design to provide the effective utilization of available bandwidth. Different MAC forms are defined to provide the ratio adaptive bandwidth estimation based on actual communication analysis. This ... See full document

5

Message Size and TTL Based Congestion Control in Delay Tolerant Networks

Message Size and TTL Based Congestion Control in Delay Tolerant Networks

... Average Forwarding Number for Epidemic Routing (AFNER). This congestion control is a reactive technique. It chips away at the supposition that the sending bundles are non-divided. Message bundles are organized in rising ... See full document

10

A novel queue management policy for delay tolerant networks

A novel queue management policy for delay tolerant networks

... dynamic network suffers from frequent disconnections, thereby making node-to-node communications extremely ...delivery, delay and overhead, show that the proposed policy achieves up to 80 % improvement when ... See full document

23

Vehicular Delay Tolerant Network Routing Schemes: A Review

Vehicular Delay Tolerant Network Routing Schemes: A Review

... the data along the line to the destination vehicle. For relaying the data packets between RSUs and vehicles typical researchers usually use the store and carry forward ...its data to the incoming ... See full document

7

Rapid Emergncy Message Dissemination Routing In Delay Tolerant Network

Rapid Emergncy Message Dissemination Routing In Delay Tolerant Network

... In the delay tolerant network, vehicle counting is very low hence, connectivity problem will occur frequently. The REMD solve the connectivity problem with the use of message copies and message TTL ... See full document

5

Efficient Scheduling Policy for Delay Tolerant Network Using Store Carry Forward Protocols

Efficient Scheduling Policy for Delay Tolerant Network Using Store Carry Forward Protocols

... for Delay Tolerant Networks has been proposed which maximizes packet delivery rate and minimize ...delay. Delay Tolerant Networks are those which uses “store-carry-and-forward” ... See full document

8

A Routing Scheme for Delay Tolerant Network Using Geographic Based Spray and Focus Method

A Routing Scheme for Delay Tolerant Network Using Geographic Based Spray and Focus Method

... The schemes in this branch limit the replication redundancy by an initialized defined copy ticket value L, where L implies that only (L − 1) copies of a message can be replicated in the network. Here, the binary ... See full document

9

Misbehavior Node In Vdtn(Vehicular Delay Tolerant Network)

Misbehavior Node In Vdtn(Vehicular Delay Tolerant Network)

... Opportunistic Network Environment (ONE) simulator[17], which is designed for evaluating and simulating DTN routing protocols and ...of network and the three cooperation models: fully cooperative, partly ... See full document

7

Show all 10000 documents...