Learn More
— Routing policies used in the Internet tend to be restrictive limiting communication between source-destination pairs to one route, when often better alternates exist. To avoid route flapping, recovery mechanisms may be dampened, making adaptation slow. Unstructured overlays have been widely used to mitigate the issues of path and performance failures in(More)
Supervisory Control and Data Acquisition (SCADA) systems are traditionally proprietary and well protected. Due to increasing use of commercial/open source technology and communication protocols, there are growing concerns about the associated security threats. SCADA networks are usually employed in critical infrastructure, therefore, not much technical data(More)
restrictive, limiting communication between source-destination pairs to one path, when often better alternatives exist. To avoid route flapping, recovery mechanisms may be dampened, making adaptation slow. Unstructured overlays have been widely proposed to mitigate the issues of path and performance failures in the Internet by routing through an(More)
—Cluster based routing protocols have significant impact on the energy dissipation and life time of wireless sensor networks (WSN). In this paper Basic Low Energy adaptive clustering hierarchy (LEACH) protocol has been modified with our proposed LEACH-MAE(LEACH-Mobile Average Energy based) protocol to overcome its shortcomings to support mobility along with(More)
Overlay networks can be used to find working paths when direct underlay paths are anomalously slow, e.g. because of a network fault. Overlay paths should not use links that are involved in a fault, so choosing which overlay path to use often requires path monitoring, which introduces an overhead. By using a routing matrix 'M' to define which links are used(More)
Overlay networks can be used to find working paths when direct underlay paths are anomalously slow, e.g. because of a network fault. Overlay paths should not use links that are involved in a fault, so choosing which overlay path to use often requires path monitoring, which introduces an overhead. By using a routing matrix 'M' to define which links are used(More)
The Internet provides physical path diversity between a large number of hosts, making it possible for networks to use alternative paths when one path fails to deliver the required Quality of Service. However, for various reasons, many established protocols (e.g. de facto Internet inter-domain routing protocol, Border-Gateway Protocol-BGP) do not fully(More)
—Wireless Ad hoc Networks have gained huge popularity due to the fact that the initial setup cost of decentralized networks with respect to centralized networks is negligible. Both Routing Layer and Transport Layer protocols have been proposed for Wireless Ad Hoc Networks to optimize the hop by hop path discovery and end to end data delivery. This paper(More)