Narrow your search
Listing 1 - 8 of 8
Sort by

Book
Routing protocols.
Author:
ISBN: 9781587133213 1587133210 Year: 2014 Publisher: Indianapolis, Indiana Cisco Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
An extensible NetLogo model for visualizing message routing protocols
Authors: --- ---
Year: 2017 Publisher: Aberdeen Proving Ground, MD : US Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
An extensible NetLogo model for visualizing message routing protocols
Authors: --- ---
Year: 2017 Publisher: Aberdeen Proving Ground, MD : US Army Research Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Routing protocols and concepts : CCNA exploration labs and study guide
Author:
ISBN: 9781587132049 1587132044 Year: 2008 Publisher: Indianapolis, Ind. : Cisco Press,

Routing protocols and concepts
Authors: ---
ISBN: 9781587132063 Year: 2007 Publisher: Indianapolis Cisco Press


Book
A study of black hole attack solutions : on AODV routing protocol in MANET
Authors: --- --- ---
ISBN: 0128053674 0128053798 9780128053799 9780128053676 Year: 2016 Publisher: Waltham, MA : Elsevier,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method


Book
Security, privacy and reliability in computer communications and networks
Authors: --- ---
ISBN: 8793379900 9788793379909 8793379897 9788793379893 8793379897 9788793379893 1000795276 1003339417 9781003339410 9781000792058 1000792056 9781000795271 Year: 2017 Publisher: Denmark : River Publishers,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols.


Book
Bee-Inspired Protocol Engineering : From Nature to Networks
Author:
ISBN: 3540859535 9786611920777 1281920770 3540859543 9783540859536 Year: 2009 Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Honey bee colonies demonstrate robust adaptive efficient agent-based communications and task allocations without centralized controls – desirable features in network design. This book introduces a multipath routing algorithm for packet-switched telecommunication networks based on techniques observed in bee colonies. The algorithm, BeeHive, is dynamic, simple, efficient, robust and flexible, and it represents an important step towards intelligent networks that optimally manage resources. The author guides the reader in a survey of nature-inspired routing protocols and communication techniques observed in insect colonies. He then offers the design of a scalable framework for nature-inspired routing algorithms, and he examines a practical application using real networks of Linux routers. He also utilizes formal techniques to analytically model the performance of nature-inspired routing algorithms. In the last chapters of the book, he introduces an immune-inspired security framework for nature-inspired algorithms, and uses the wisdom of the hive for routing in ad hoc and sensor networks. Finally, the author provides a comprehensive bibliography to serve as a reference for nature-inspired solutions to networking problems. This book bridges the gap between natural computing and computer networking. What sets this book apart from other texts on this subject is its natural engineering approach in which the challenges and objectives of a real-world system are identified before its solution, nature-inspired or otherwise, is discussed. This balanced exposition of the book makes it equally suitable for telecommunication network designers and theorists, and computer science researchers engaged with artificial intelligence, agents, and nature-inspired techniques.

Keywords

Information Technology --- Artificial Intelligence --- Artificial intelligence. --- Computer Communication Networks. --- Computer simulation. --- Telecommunication. --- Computer networks --- Computer network protocols --- Computer algorithms --- Routing protocols (Computer network protocols) --- Mechanical Engineering --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Computer Science --- Mechanical Engineering - General --- Telecommunications --- Computer network protocols. --- Software engineering. --- Computer software engineering --- Protocols, Computer network --- Computer science. --- Computer communication systems. --- Electrical engineering. --- Computer Science. --- Artificial Intelligence (incl. Robotics). --- Communications Engineering, Networks. --- Simulation and Modeling. --- Electric engineering --- Engineering --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Fifth generation computers --- Neural computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Artificial Intelligence. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- BeeHive. --- Linux. --- Slackware Linux --- SUSE Linux --- Computer networks. --- Computer Modelling.

Listing 1 - 8 of 8
Sort by