Hybrid Protocol

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 26334 Experts worldwide ranked by ideXlab platform

Lillykutty Jacob - One of the best experts on this subject based on the ideXlab platform.

  • multicast zone routing Protocol in mobile ad hoc wireless networks
    Local Computer Networks, 2003
    Co-Authors: Xiaofeng Zhang, Lillykutty Jacob
    Abstract:

    In the past years, a variety of unicast and multicast routing Protocols for mobile ad hoc wireless networks (MANETs) have been developed. Zone routing Protocol (ZRP) is one of these unicast routing Protocols, which is a Hybrid Protocol that proactively maintains routing information for a local neighborhood (routing zone), while reactively acquiring routes to destinations beyond the routing zone. In this paper, we adapt ZRP for multicast routing purpose, and call it multicast zone routing Protocol (MZRP). MZRP is a shared tree multicast routing Protocol, which proactively maintains the multicast tree membership for node's local routing zone at each node while establishes multicast tree on-demand. It is scalable to large number of multicast senders and groups. The use of IP tunnel mechanism during data packets transmission improves the overall performance. The evaluation and comparison with ODMRP are performed on the ns-2 simulator.

Xiangyu Zhang - One of the best experts on this subject based on the ideXlab platform.

  • automatic Protocol format reverse engineering through context aware monitored execution
    Network and Distributed System Security Symposium, 2008
    Co-Authors: Zhiqiang Lin, Xuxian Jiang, Xiangyu Zhang
    Abstract:

    Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have recently been proposed to allow for automatic Protocol reverse engineering. Unfortunately, they are either limited in extracting Protocol fields due to lack of program semantics in network traces or primitive in only revealing the flat structure of Protocol format. In this paper, we present a system called AutoFormat that aims at not only extracting Protocol fields with high accuracy, but also revealing the inherently “non-flat”, hierarchical structures of Protocol messages. AutoFormat is based on the key insight that different Protocol fields in the same message are typically handled in different execution contexts (e.g., the runtime call stack). As such, by monitoring the program execution, we can collect the execution context information for every message byte (annotated with its offset in the entire message) and cluster them to derive the Protocol format. We have evaluated our system with more than 30 Protocol messages from seven Protocols, including two text-based Protocols (HTTP and SIP), three binary-based Protocols (DHCP, RIP, and OSPF), one Hybrid Protocol (CIFS/SMB), as well as one unknown Protocol used by a real-world malware. Our results show that AutoFormat can not only identify individual message fields automatically and with high accuracy (an average 93.4% match ratio compared with Wireshark), but also unveil the structure of the Protocol format by revealing possible relations (e.g., sequential, parallel, and hierarchical) among the message fields. ∗Part of this research has been supported by the National Science Foundation under grants CNS-0716376 and CNS-0716444. The bulk of this work was performed when the first author was visiting George Mason University in Summer 2007.

  • Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
    2008
    Co-Authors: Zhiqiang Lin, Xuxian Jiang, Xiangyu Zhang
    Abstract:

    Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have recently been proposed to allow for automatic Protocol reverse engineering. Unfortunately, they are either limited in extracting Protocol fields due to lack of program semantics in network traces or primitive in only revealing the flat structure of Protocol format. In this paper, we present a system called AutoFormat that aims at not only extracting Protocol fields with high accuracy, but also revealing the inherently “non-flat”, hierarchical structures of Protocol messages. AutoFormat is based on the key insight that different Protocol fields in the same message are typically handled in different execution contexts (e.g., the runtime call stack). As such, by monitoring the program execution, we can collect the execution context information for every message byte (annotated with its offset in the entire message) and cluster them to derive the Protocol format. We have evaluated our system with more than 30 Protocol messages from seven Protocols, including two text-based Protocols (HTTP and SIP), three binary-based Protocols (DHCP, RIP, and OSPF), one Hybrid Protocol (CIFS/SMB), as well as one unknown Protocol used by a real-world malware. Our results show that AutoFormat can not only identify individual message fields automatically and with high accuracy (an average 93.4 % match ratio compared with Wireshark), but also unveil the structure of the Protocol format by revealing possible relations (e.g., sequential, parallel, and hierarchical) among the message fields

Khaled M Elleithy - One of the best experts on this subject based on the ideXlab platform.

  • low duty cycle energy efficient and mobility based boarder node mac Hybrid Protocol for wireless sensor networks
    Signal Processing Systems, 2015
    Co-Authors: Abdul Razaque, Khaled M Elleithy
    Abstract:

    The need for an efficient medium access control (MAC) Protocol is extremely important with the emergence of wireless sensor networks (WSNs). The MAC Protocol has increasingly been significant in advancing the performance of WSNs. In this paper, a low duty cycle, energy-efficient and mobility-based Boarder Node Medium Access Control (BN-MAC) Hybrid Protocol is introduced for WSNs that controls overhearing, idle listening and congestion issues by preserving energy over WSNs. BN-MAC leverages the features of contention and schedule-based MAC Protocols. The contention encompasses the novel semi-synchronous approach that helps obtain faster access to the medium. The schedule-based part helps reduce the collision and overhearing problems. The idle listening control (ILC) model is embedded within the BN-MAC that administers the nodes to go to sleep after performing their tasks to saves additional energy. The least distance smart neighboring search (LDSNS) model is used to determine the shortest and most efficient path in a one-hop neighborhood. Evaluation of the BN-MAC is conducted using network simulator-2 (ns2), then its quality of service (QoS) parameters are compared with other known Hybrid MAC Protocols including X-MAC, Zebra medium access control (Z-MAC), mobility-aware SMAC (MS-MAC), advertisement-based MAC (A-MAC), Adaptive Duty Cycle SMAC (ADC-SMAC) and Mobile Sensor (MobiSense) MAC Protocols.

  • energy efficient boarder node medium access control Protocol for wireless sensor networks
    Sensors, 2014
    Co-Authors: Abdul Razaque, Khaled M Elleithy
    Abstract:

    This paper introduces the design, implementation, and performance analysis of the scalable and mobility-aware Hybrid Protocol named boarder node medium access control (BN-MAC) for wireless sensor networks (WSNs), which leverages the characteristics of scheduled and contention-based MAC Protocols. Like contention-based MAC Protocols, BN-MAC achieves high channel utilization, network adaptability under heavy traffic and mobility, and low latency and overhead. Like schedule-based MAC Protocols, BN-MAC reduces idle listening time, emissions, and collision handling at low cost at one-hop neighbor nodes and achieves high channel utilization under heavy network loads. BN-MAC is particularly designed for region-wise WSNs. Each region is controlled by a boarder node (BN), which is of paramount importance. The BN coordinates with the remaining nodes within and beyond the region. Unlike other Hybrid MAC Protocols, BN-MAC incorporates three promising models that further reduce the energy consumption, idle listening time, overhearing, and congestion to improve the throughput and reduce the latency. One of the models used with BN-MAC is automatic active and sleep (AAS), which reduces the ideal listening time. When nodes finish their monitoring process, AAS lets them automatically go into the sleep state to avoid the idle listening state. Another model used in BN-MAC is the intelligent decision-making (IDM) model, which helps the nodes sense the nature of the environment. Based on the nature of the environment, the nodes decide whether to use the active or passive mode. This decision power of the nodes further reduces energy consumption because the nodes turn off the radio of the transceiver in the passive mode. The third model is the least-distance smart neighboring search (LDSNS), which determines the shortest efficient path to the one-hop neighbor and also provides cross-layering support to handle the mobility of the nodes. The BN-MAC also incorporates a semi-synchronous feature with a low duty cycle, which is advantageous for reducing the latency and energy consumption for several WSN application areas to improve the throughput. BN-MAC uses a unique window slot size to enhance the contention resolution issue for improved throughput. BN-MAC also prefers to communicate within a one-hop destination using Anycast, which maintains load balancing to maintain network reliability. BN-MAC is introduced with the goal of supporting four major application areas: monitoring and behavioral areas, controlling natural disasters, human-centric applications, and tracking mobility and static home automation devices from remote places. These application areas require a congestion-free mobility-supported MAC Protocol to guarantee reliable data delivery. BN-MAC was evaluated using network simulator-2 (ns2) and compared with other Hybrid MAC Protocols, such as Zebra medium access control (Z-MAC), advertisement-based MAC (A-MAC), Speck-MAC, adaptive duty cycle SMAC (ADC-SMAC), and low-power real-time medium access control (LPR-MAC). The simulation results indicate that BN-MAC is a robust and energy-efficient Protocol that outperforms other Hybrid MAC Protocols in the context of quality of service (QoS) parameters, such as energy consumption, latency, throughput, channel access time, successful delivery rate, coverage efficiency, and average duty cycle.

Haiyu Song - One of the best experts on this subject based on the ideXlab platform.

  • group consensus in multi agent systems with Hybrid Protocol
    Journal of The Franklin Institute-engineering and Applied Mathematics, 2013
    Co-Authors: Wenan Zhang, Haiyu Song
    Abstract:

    Abstract This paper investigates a group consensus problem with discontinuous information transmissions among different groups of dynamic agents. In the group consensus problem, the agents reach more than one consistent state asymptotically. We consider that the communication topology of these agents, represented by a network, is undirected. Then a novel group consensus Protocol, called Hybrid Protocol, is proposed to solve the couple-group average-consensus problem. The convergence analysis is presented and the algebraic criterions are established. Furthermore, the multi-group consensus is discussed as an extension of the couple-group consensus. By similar techniques, some analysis results are presented. The analysis tools developed in this paper are based on algebraic graph theory, matrix theory, and control theory. Finally, the simulations are provided to demonstrate the effectiveness of the proposed theoretical results.

P Sujatha - One of the best experts on this subject based on the ideXlab platform.

  • lifetime maximization of wireless sensor network using fuzzy based unequal clustering and aco based routing Hybrid Protocol
    Applied Intelligence, 2018
    Co-Authors: Sariga Arjunan, P Sujatha
    Abstract:

    Wireless Sensor Networks (WSN) became a key technology for a ubiquitous living and remains an active research due to the wide range of applications. The design of energy efficient WSN is still a greater research challenge. Clustering techniques have been widely used to reduce the energy consumption and prolong the network lifetime. This paper introduces an algorithm named Fuzzy logic based Unequal clustering, and Ant Colony Optimization (ACO) based Routing, Hybrid Protocol for WSN to eliminate hot spot problem and extend the network lifetime. This Protocol comprises of Cluster Head (CH) selection, inter-cluster routing and cluster maintenance. Fuzzy logic selects CHs efficiently and divides the network into unequal clusters based on residual energy, distance to Base Station (BS), distance to its neighbors, node degree and node centrality. It uses ACO based routing technique for efficient and reliable inter-cluster routing from CHs to BS. Moreover, this Protocol transmits data in a Hybrid manner, i.e. both proactive and reactive manner. A threshold concept is employed to transmit/intimate sudden changes in the environment in addition to periodic data transmission. For proper load balancing, a new routing strategy is also employed where threshold based data transmission takes place in shortest path and the periodic data transmission takes place in unused paths. Cross-layer cluster maintenance phase is also used for uniform load distribution. The proposed method is intensively experimented and compared with existing Protocols namely LEACH, TEEN, DEEC and EAUCF. The simulation results show that the proposed method attains maximum lifetime, eliminates hot spot problem and balances the energy consumption among all nodes efficiently.