Browsing by Subject "Computer network protocols"
Now showing items 1-20 of 415
-
A comprehensive study and performance evaluation of commercial VPN gateways and software-defined perimeter in the 5G network
(Universitat Politècnica de Catalunya, 2021-09-09)
Bachelor thesis
Restricted access - confidentiality agreement
Covenantee: Aalto-yliopisto. Sähkötekniikan korkeakoulu -
A control plane for WireGuard
(Institute of Electrical and Electronics Engineers (IEEE), 2021)
Conference report
Open AccessWireGuard is a VPN protocol that has gained significant interest recently. Its main advantages are: (i) simple configuration (via pre-shared SSH-like public keys), (ii) mobility support, (iii) reduced codebase to ease ... -
A Decentralized, Secure and Censorship Resistant Governance Protocol on Ethereum
(Universitat Politècnica de Catalunya, 2022-07-06)
Bachelor thesis
Open AccessDecentralized governance system on Ethereum implemented with a unique identification system of using the ERC721 standard. -
A fault-tolerant algorithm for distributed resource allocation
(2017-11-01)
Article
Open AccessResource allocation is a usual problem that must be faced during a distributed system design. Despite the large number of algorithms proposed in literature to solve this problem, most papers lack of detailed descriptions ... -
A flexible protocol communications approach for a supervisory system
(Institute for Communication Technology Management (CTM), 1989)
Conference report
Open AccessThis paper deals with the communication protocol intended to control up to 1016 devices of a new supervisory system. It has been conceived in two complementary phases. The first one (Cycle-A) is intended to inform the ... -
A GA-based simulation system for WMNs: performance analysis for different WMN architectures considering transmission rate and OLRS protocol
(Institute of Electrical and Electronics Engineers (IEEE), 2016)
Conference report
Open AccessIn this paper, we evaluate the performance of two WMN architectures considering throughput, delay, jitter and fairness index metrics. For simulations, we used ns-3. We compare the performance for two architectures considering ... -
A game theoretic trust model for on-line distributed evolution of cooperation in MANETs
(2011-01-13)
Article
Restricted access - publisher's policyCooperation among nodes is fundamental for the operation of mobile ad hoc networks(MANETs). In such networks, there could be selfish nodes that use resources from other nodes to send their packets but that do not offer ... -
A genetic algorithm-based system for Wireless Mesh Networks: analysis of system data considering different routing protocols and architectures
(Springer, 2016-07-01)
Article
Open AccessWireless mesh networks (WMNs) are attracting a lot of attention from wireless network researchers. Node placement problems have been investigated for a long time in the optimization field due to numerous applications in ... -
A machine learning based Distributed Congestion Control Protocol for multi-hop wireless networks
(2023-07-01)
Article
Open AccessThe application areas of multi-hop wireless networks are expected to experience sustained growth in the next years. This growth will be further supported by the current possibility of providing low-cost communication ... -
A multi-agent adaptive protocol for femto-satellite applications
(Universitat Politècnica de Catalunya, 2011-07-15)
Bachelor thesis
Open AccessFemto-satellites are a very promising category of satellites that weigh less than 100 grams. Also, a Pico-Rover it is a self-contained robot that weighs less than 1 kilogram and its motion works by rolling the external ... -
A new MAC approach in wireless body sensor networks for health care
(INTECH, 2011-02)
Part of book or chapter of book
Open Access -
A Proposal of modification in Thorup Zwick Routing algorithm for future Internet
(Universitat Politècnica de Catalunya, 2012-07-23)
Master thesis
Open Access[ANGLÈS] The Thorup and Zwick routing scheme (usually referred as TZ scheme) is a very well-known compact routing scheme which aims at reducing the scalability problem of routing in Internet. In this work, we propose a ... -
A proxy design to leverage the interconnection of CoAP wireless sensor networks with web applications
(2015-01-09)
Article
Open AccessIn this paper, we present the design of a Constrained Application Protocol (CoAP) proxy able to interconnect Web applications based on Hypertext Transfer Protocol (HTTP) and WebSocket with CoAP based Wireless Sensor Networks. ... -
A quantitative evaluation of reordering in OBS networks and its impact on TCP performance
(IEEE, 2008)
Conference report
Open AccessThis paper presents a layered framework to measure the reordering introduced by contention resolution strategies in OBS networks. In particular, characterization is based on the reordering metrics proposed by the IETF IPPM ... -
A reliable system for JXTA-Overlay P2P platform considering number of authentic files, security and QoS parameters
(2015)
Conference report
Open AccessThe reliability of peers is very important for safe communication in Peer-to-Peer (P2P) systems. The reliability of a peer can be evaluated based on the reputation and interactions with other peers to provide different ... -
A security framework for JXTA-overlay
(Institute of Electrical and Electronics Engineers (IEEE), 2009)
Conference report
Open AccessAt present time, the maturity of P2P research field has pushed through new problems such us those related with security. For that reason, security starts to become one of the key issues when evaluating a P2P system and it ... -
A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration
(2019-01-01)
Article
Open AccessThe fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined ... -
A taxonomy and survey of SCTP research
(2012-08)
Article
Restricted access - publisher's policyThe Stream Control Transmission Protocol (SCTP) is a relatively recent general-purpose transport layer protocol for IP networks that has been introduced as a complement to the well-established TCP and UDP transport protocols. ... -
A threshold-selective multiuser downlink MAC scheme for 802.11n wireless networks
(2010)
Conference report
Open Access -
A tool for rapid MAC protocols prototyping and designing for wireless sensor networks
(Universitat Politècnica de Catalunya, 2012-09-25)
Master thesis
Open AccessWireless Sensor Networks (WSNs)consists of several resource constrained sensor nodes distributed over an specific geographical area. WSNs are typically energy constraint due to the fact the sensor nodes are battery ...