Science topic

Network Protocols - Science topic

Explore the latest questions and answers in Network Protocols, and find Network Protocols experts.
Questions related to Network Protocols
  • asked a question related to Network Protocols
Question
1 answer
会议征稿:2024年计算机与信息安全国际会议 (WCCIS 2024)
Call for papers: Organized by Universiti Malaya, 2024 World Conference of Computer and Information Security(WCCIS 2024) will be held on 20-22 September 2024 in Malaysia.
Conference website(English):https://ais.cn/u/JnMNfa
重要信息
大会官网(投稿网址):https://ais.cn/u/JnMNfa
大会时间:2024年9月20-22日
大会地点:吉隆坡,马来西亚 | 中国郑州 双会场
收录类型:EI Compendex、Scopus
主办单位:马来亚大学、郑州大学公共安全研究院
会议详情
由马来亚大学主办,2024年计算机与信息安全国际会议 (WCCIS 2024) 将于2024年9月20-22日召开。会议将设置中国/马来西亚双会场。中国会场将在郑州举行;马来西亚会场将在吉隆坡召开。会议旨在为从事计算机与信息安全的专家学者、工程技术人员、技术研发人员提供一个共享科研成果和前沿技术,了解学术发展趋势,拓宽研究思路,加强学术研究和探讨,促进学术成果产业化合作的平台。
会议征稿主题(包括但不限于)
网络
访问控制
信息系统安全与管理
社交网络安全、隐私和信任
计算机网络与通信
信号和图像处理
信息安全算法与协议
嵌入式系统安全
通信工程
卫星通信
云与边缘计算安全
区块链安全与隐私
身份访问管理
网络物理系统安全
知识产权保护
智能信息处理技术
数据挖掘
数据可视化
图像处理
语音识别
信息技术在企业的应用
信号处理
智能通信与计算
数学与信息网络
数字媒体信息处理
卫星通信
无线通信
系统模型设计与信息管理
生物识别技术
嵌入式系统和软件
物联网信息安全
社交网络
物联网信息分析处理
......
出版信息
本会议投稿经过2-3位组委会专家严格审核之后,最终所录用的论文将由全球知名的科技出版社380220803174252410.png斯普林格旗下的Springer-LNICST(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), ISSN: 1867-822X 出版,出版后提交至EI Compendex,Scopus检索。
参会报名
1、投稿作者参会:投稿全文经审稿后文章被录用且完成注册,每篇文章由一名作者代表参会,在会议现场进行口头报告或海报展示。
2、报告者参会(无投稿):在会议上进行口头报告展示,口头报告摘要不提交出版。
3、海报参会(无投稿):在会议上进行论文海报展示,A1尺寸,彩色打印(具体要求咨询会议负责老师)。
4、听众参会(无投稿):出席并参加这次会议, 并可全程旁听会议所有展示与报告。
*参会报名方式:https://ais.cn/u/JnMNfa
Relevant answer
Answer
me bridaria mas infiormacion por favor
  • asked a question related to Network Protocols
Question
2 answers
If you can provide references if possible, that will be a great help.
Relevant answer
Answer
David Lide Yeah but what are the protocols used to read those data. For an example FLPs are used to do auto negotiation. Like wise how are the other things are read or managed by the NIC?
  • asked a question related to Network Protocols
Question
22 answers
Recommended research fields:
Applying Machine Learning methods to Network Protocols field in many areas like IoT, Sensor Networks, Network Security aspects, Traffic Predictions...
Also, he is ready to participate in present related research and in a teamwork environment to publish scientific articles.
Relevant answer
Answer
A good way to start is to read recent overview articles and look for open problems that are stated in those papers. When it comes to machine learning, a general advice is to identify an existing protocol that you know is suboptimal, and then using machine learning to tweak the protocol.
  • asked a question related to Network Protocols
Question
5 answers
I want to apply a privacy-preserving algorithm in MQTT for IoT devices. Which tool do you suggest to simulate this algorithm? I want to measure the performance on the IoT battery device? Actually, I found many ways such as Matlab, Netsim, MIMIC MQTT, python, and Contiki cooja, but I'm not sure which simulation software is best suited for this? Could you give me a suggestion about the best environment?
Relevant answer
Answer
Netsim simulator is the best, it's gathering all these features of all other simulators
  • asked a question related to Network Protocols
Question
3 answers
Due to the depletion of the global IPv4 address pool, some new Internet clients will not be able to get IPv4 adresses, but only IPv6 addresses. However the majority of the internet still uses IPv4 addresses. The IPv6 only clients should be able to communicate with the IPv4 only servers. For this problem, the combination of the DNS64 (RFC 6147) and NAT64 (RFC 6146) is a good solution.
We test different free software (also called open source) DNS64 and NAT implementations. As for DNS64, we tested BIND and TOTD.
(For our results, see: Gabor Lencse, Sandor Repas, "Performance Analysis and Comparison of Different DNS64 Implementations for Linux, OpenBSD and FreeBSD," aina, pp.877-884, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), 2013)
Besides these, we know also the PowerDNS and Unbound.
Can someone suggest other free software for DNS64 implementations?
Had anyone tested their performance and/or stability?
Relevant answer
Answer
Dear Colleagues:
Below is the up to date feasibility demonstration that you may like to have a look at.
Abe (2020-08-29 12:13 EDT)
  • asked a question related to Network Protocols
Question
7 answers
I need to know the new the network techniques that provide fast video or image transmission
Relevant answer
Answer
Video transmission over wireless networks is considered the most interesting application in our daily life nowadays. This kind of application needs large bandwidth, efficient routing protocols, and content delivery methods to provide smooth video playback to the receivers. I hope you will benefit from this research paper
  • asked a question related to Network Protocols
Question
14 answers
Greetings everyone!
I am a research student working on mobile ad hoc cloud computing. My research area is resource allocation in heterogeneous network-based mobile ad hoc cloud. I have been searching for an authentic simulator to perform my simulation results of the proposed allocation scheme. Kindly suggest me any simulator that can fulfil the requirements of task scheduling algorithms and networking protocols and environment.
Thanks
Relevant answer
Answer
This research problem can not solve only by NS3 . You should use hybrid approach . For mobility and protocol implementation NS3 is good enough .
This study may help you out a bit .
10.1504/IJWMC.2019.10022912
  • asked a question related to Network Protocols
Question
3 answers
Hello,
I'm currently studying fuzzing for my research. Most research papers I've found propose blackbox fuzzer for network protocols. Can whitebox fuzzers be implemented for network protocols? Is Symbolic execution a good idea for testing network protocols, specifically IoT protocols? Or are greybox fuzzers a better alternative to test IoT protocols?
Thanks in advance!
Relevant answer
Hi C K Gomathy Himadri Nath Saha ! Thank you for responding! Based on my research, a fuzzer may not trigger all possible behaviors of the program. One of the reasons is because it may require specific inputs to transverse certain code paths. Symbolic Execution or Concolic Execution is a method to analyze a program and generate specific inputs, with the purpose of having more code coverage (https://www.fuzzingbook.org/html/SymbolicFuzzer.html). I've asked this question because I am interested in using Symbolic Execution or Concolic Execution for my protocol-based fuzzer, thereby attempting to have more code coverage.
  • asked a question related to Network Protocols
Question
1 answer
In general as well as specific to automotive and avionics domain, for the efficient and secured system use case:
  1. Motion control precision plays a vital role in getting a precise and repeatable system to avoid e.g. collision on the road, and critical scenarios in avionics system in the air.
  2. Speed at nanometer level resolution can help in identifying the objects correctly that guides function enabler through a process to activate the right function.
In a complex embedded system, controlling latency and jittering has become very much relevant to address above use case scenarios 1 and 2.
There is huge ongoing industrial bubbles and adaptation also is going on with Ethernet along with Flexray, CAN and LIN.
But keeping multiple network protocols and increasing number of ECUs in mind, Ethernet as it is doesn't look sufficient to consider in system design to address the above mentioned use cases 1 & 2 in long term.
In connected and autonomous vehicle context, one of the solution is TSN to control near to convincing level of latency, at the same time many researcher bubbling about 5G for connected and smart vehicles as well.
Here the question: is TSN +5G can address the above 2 use cases?
Experts logical PoVs are expected.
Relevant answer
Answer
"2. Speed at nanometer level resolution" : nanometer cannot be a correct unit for speed, but only for length, distance, or position. Speed is measured e.g. in m/s .
Assuming you mean "position" : there are currently no devices that claim to establish position of a vehicle at the nanometer, and no use case where this would be useful in the automotive or avionics domain.
  • asked a question related to Network Protocols
Question
5 answers
Hi everyone,
I invented a new networking protocol. It makes the traffic very fast from source to destination. the idea is that the protocol makes the packets forwarded at routers without searching the routing table. So, I changed the structure of the frame by adding some control feilds.
To simulate the above idea, I have to change the structure of the farme and change the function of the router for forwarding packets.
Which Netwrok simulation toolls is easy and do the job for me?
Omnet++
NS2/3
.... etc.?
Regards.
Abdullah
Relevant answer
Answer
Thanks Mr. Dia, and Mr.Tayal.
  • asked a question related to Network Protocols
Question
8 answers
Suppose Info-Tech is a company having large scale computer network consisting of more than 100 routers in operation. The company has hired you as a network administrator to maintain and troubleshoot its network. In this network, adding and removing hosts is normal and number of hosts is expected to grow in future. In view of this, the network needs fast convergence with the help of suitable dynamic routing protocol.
As a network administrator, in your opinion, which dynamic routing protocol from the following will be most appropriate for this organization’s network? Justify with any two solid reasons.
1. Distance Vector Routing Protocol?
2. Link State Routing Protocol
Relevant answer
Answer
Zahid, I believe this article addresses the tradeoffs really well:
Distance vector protocols are simpler to understand and simpler to configure, but they are limited in the size of networks they will accommodate and the take longer to converge, compared with link state.
  • asked a question related to Network Protocols
Question
8 answers
I studied different articles, yet not understànd that the attacks launched by researcher are imagniary or practical ( using a software tool/ programme to identify it)
Relevant answer
Answer
Most of these are 'simulated' attacks. It is unlikely a researcher can launch a 'real' attack against a network given the kind of security that enterprise class networks come with.
  • asked a question related to Network Protocols
Question
21 answers
For simulating various networking protocols, which network simulator would be best for Flying Ad-Hoc Network?
Relevant answer
Answer
i am working on NS3
  • asked a question related to Network Protocols
Question
3 answers
I perform some basic simulation on ns2 but now I want to execute certain basic protocols in NS-3. like LEACH , AVOD .etc.
Suggest me any simple code or way to do experiment of simple wireless network protocol.
Relevant answer
Answer
You may look at the following example (after downloading ns-3),
examples/wireless/wifi-simple-adhoc.cc
This example is mainly for ad-hoc network simulations.
  • asked a question related to Network Protocols
Question
1 answer
I'm trying to view packet details in wireshark as AFATDS sends messages to VBS3.
  • asked a question related to Network Protocols
Question
3 answers
A new concept about the way to connect to VPNs, without pre-defined VPN tunnel or servers, no topology and data transfer through the cloud?
Relevant answer
Answer
  • asked a question related to Network Protocols
Question
6 answers
Heterogeneity of devices, techniques or protocols makes networks difficult to manage, thus increasing its complexity.
Relevant answer
Answer
The fact to define the complexity of the network from the perspective of the Network Administrator. For me I considered network complexity  as a tool or mechanism to ensure good security system when dealing with device configuration. A complex network architecture and implementation determine how securely you can relied on the  networks infrastructure against internal and external attacks. In most cases security mechanism in a network is not form with a simple rules when one wanted to make them both computationally and un-computationally secured. Hence, sometimes complexity of network can be seen from incapacity of one to understand or provide solution to the challenges faced by his networks and that can be  look from the knowledge based problem and experience  in the field. There so many ways to explore complexity of the network just like what "Rudra" has explained in above.
  • asked a question related to Network Protocols
Question
3 answers
One of the key design principles of RPL protocol is minimizing the routing
control overhead and signaling data as a mechanism to reduce energy consumption and even enhance the reliability of the protocol. To this end, RPL has adopted Trickle algorithm to govern to govern control messages for network creation and maintenance in LLNs
are there any other routing protocols that use timer as trickle?
Relevant answer
Answer
Hi,
There are - kinda. MPL (RFC7774) is a multicast routing protocol intended for the same type of deployment as RPL. We did some work on trickle-for-multicast-routing, see "Performance analysis of Trickle as a flooding mechanism", attached.
The IETF HOMENET wg published DNCP (RFC7787) which uses Trickle (RFC6206), and which itself is used by HNCP (RFC
  • asked a question related to Network Protocols
Question
14 answers
integration of cloud computing for Smart city
Relevant answer
Answer
To the best of my knowledge, Contiki/Cooja is the best for IoT considering most of IoT  protocols. in addition, it can be used as simulator or as emulator for test bed.
all the best
  • asked a question related to Network Protocols
Question
6 answers
i work on deployment of AUVs to achieve coverage in UWSN
i need each AUV  get position information of its neighbor to make decide for next move. I do not need routing protocol, just normally one node
broadcast packet and neigboring nodes receive that packet.
i didn't know how the node can send message that contains its position information to all of its neighbor?
Relevant answer
Answer
Hi , in Aquasim is very simple
  • asked a question related to Network Protocols
Question
8 answers
I am planning to apply some identification method in the IOT using the existing network protocol IPv6. I am looking for a simulator that supports IPv6 programming, a database linking and representing the IOT network.
Thanks  
Relevant answer
Answer
My students are using COOJA, it is good
  • asked a question related to Network Protocols
Question
3 answers
Hi all, 
802.11g provides the different data rate of 1,2,6,9,12,18,24,36,48 and 54 Mbps. Each of the different data rate has a different data modulation scheme in physical layer. 
My question is that, is there any way to figure our the possible size of the transmitted data packets after modulation. For example, if I generate a UDP packet of size 1250 bytes and try to transfer it at these different data rates, what should be the approximately possible packet size after modulation or while transmitting.
If there is any reference is provided then that also would be much helpful.
Thanks in advance.
LG,
Chandra
Relevant answer
Dear Chandra,
If you deliver UDP packet of size N=1250 byets to the physical layer,there will be overhead which is added to the input data. If there is forward error correction, parity bits will be added to the input data according to used FEC encoder. The output rate of the FEC encoder will be Nx the code rate, where the code rate r fec = n/k is the ratio of the length of the output message to the the length of the input message.
During modulation you add the pilot carriers with specific date modulated upon them for channel estimation. These are overhead data with the rate say r pilot. In addition a cyclic prefix must be added to every OFDM symbol with the rate r cyclic prefix to overcome inter symbol interference..
These rates are standardized and are known. So the final size of the packet at the output of the physical layer= N(1 +  r fec + r pilot + r cyclic prefix.)
It is so that every network layer adds overhead to the the protocol data unit such that it can perform its function and for encapsulation.
You can find more information in the LINK:http://research.ijcaonline.org/volume64/number8/pxc3885415.pdf
Best wishes
  • asked a question related to Network Protocols
Question
3 answers
i want to find the maximum limit of DSR routing protocol single node energy
Relevant answer
Answer
It depends on the devices used to form a network where the DSR is running.  In a lab set up, suppose somebody builds a MANET using 14-15 inch laptops, the power consumption may range from 20-100 W for each laptop with an average 60 W. Cellphone chargers when charging a cellphone consume approximately 2-6 W with an average 3 W.
I suggest the following linkshttp://energyusecalculator.com/electricity_laptop.htm
  • asked a question related to Network Protocols
Question
4 answers
This question related to SDN and it is based on the fact the I wanna control the flux of my network using a  Ryu controller, but to do so I have to know what are the nodes in the network. I know something about link layer discovery protocol, but it is not clear. I really appreciate your help.Thanks 
Relevant answer
Answer
If I got your question correctly, you are looking for topology discovery. If that's the case, I think you may have a look of these links. It might give u some ideas
There is a paper called Efficient Topology Discovery in SDN as attached. 
  • asked a question related to Network Protocols
Question
3 answers
I have 2 IEEE 802.11e network scenarios and i need to know the difference between them. One is a network where we assume stations transmit only one traffic type, say 4 stations and one transmits video, another transmits voice, another data, like that and the second scenario is where each station transmits all 3 or 4 traffic types. Question is:
1. How is throughput analysed/affected in 2nd scenario considering each STA has multiple EDCAF.
2. How do i analyse transmission probability on the channel?
Relevant answer
Answer
Or maybe you can use multiple instances of iPerf to mimic different traffic types. Suppose that in Scenario 2 you create an iPerf instance in a station using UDP and certain bandwidth; another instance using TCP at another bandwidth and so on for as many Access Categories/Traffic Types as you want. This way you get the aggregate throughput from each iPerf instance and compare it to those achieved in Scenario 1 using the same tools (but instead of instances you run a single iPerf process in each station, of course).
  • asked a question related to Network Protocols
Question
11 answers
Qualnet is an advance version of well known GloSim simulator used for simulating many wireless network protocols. I googled and searched extensively for a free version but couldn't find one. Can anyone provide me with a link from where I can download it.
Relevant answer
Answer
QualNet is a commercial software. There is no free version. At most, you could ask for a 30-day trial license (http://web.scalable-networks.com/content/evaluation-programs).
  • asked a question related to Network Protocols
Question
4 answers
I am working on Network Processors. I need the IPs of the processing elements or microengines. I am unable to get them. How should I go about.
Relevant answer
Answer
Kari Sir,
I did check with the opencores but I could not. But I will check once again.
Thank you sir. if anyother input please mail me sir.
  • asked a question related to Network Protocols
Question
4 answers
Let us suppose there are 2 nodes A & B. A has 10 packets, how these packets will transmit from A to B using any logic without using any network/packet simulator.
Relevant answer
Answer
Take a look at using zeromq. You could effectively build up a multihop network on one device or across multiple devices using one of the models provided in zeromq. I have used zeromq to build simple multihop IoT networks within which I simulated/tested certain scenarios.
  • asked a question related to Network Protocols
Question
3 answers
Please can any one help me to start this combination.
Relevant answer
Answer
hwmp already includes AODV. This is to manage a wireless network with a wired backhaul.
  • asked a question related to Network Protocols
Question
11 answers
Hello does anyone know how to check a wireless body area network protocol through simulation, any software for that?
Relevant answer
Answer
Well MATLAB can be used for simulations. Other softwares include OMNET++, Castalia,
Castalia will work better. some people have used it.
  • asked a question related to Network Protocols
Question
3 answers
I have used Wireshark to capture packet transfer during a video conference over an Ethernet network, I expected to see some RTP or RTSP protocol. However, none was apparent on my captured data. 
Relevant answer
Answer
Thank you for your response Arjav and Jan Marten. I think, I am working on the application layer. And I don't think that the data stream was encrypted.
I have used Networkminer as well, & it gives me detailed description of my captured data, in terms of images and other data format, but when it comes to video, they are shown as frames only! 
I have went back to Wireshark, used the export object option, looked into my http detail, but still no video is detected. What else should I do?!
  • asked a question related to Network Protocols
Question
3 answers
I want to know if DHCP Snooping can be enabled on all types of switches or some specific hardware configuration is required..
Relevant answer
Answer
This is highly determined by snooping configuration restrictions; where by on certain swithches, you may find that DHCP commands are not available. That is, if such are commands are entered, the switch gives an error message, hence configuration not applied. best way to go over this also is to look at the DHCP snooping configuration guidelines.
For educational purposes, please view this link.
  • asked a question related to Network Protocols
Question
5 answers
How to determine the weight of a link in wireless mesh network and the criteria behind ??
Relevant answer
Answer
@diamel teguig sir thnks for your view on it..
@muhammad naveed-sir How to determine the weight of a link in wireless mesh network and what are the criteria which kept in mind before allotting or assigning  weights to it..
  • asked a question related to Network Protocols
Question
2 answers
In my research I focused the multilateral data exchange to the clinical framework, but I'm sure there are many other areas that can benefit from this collaboration and multilateral agreements. May you propose any other? Could this be applied in your field?
Relevant answer
Answer
Congratulations for your work and the nice approach to the Knapsack problem using agents. I see here an opportunity to improve the negotiation process between the Petitioner and Contributor Agents of my protocol (MOSAIC) using your strategies, and a framework for you (multilateral agreements) to extend your negotiation process involving a set of agents in the process and not only two. In addition to this, have you identified real use cases where this research could be deployed?
  • asked a question related to Network Protocols
Question
7 answers
see above
Relevant answer
Answer
Btw, the exchanged data is NOT encrypted with publick key. Public key crypto is used to create shared symetric keys by the handshake process in the beginning.
  • asked a question related to Network Protocols
Question
2 answers
I need a tutorial to make changes in NS2 source code for supporting multichannel communication.
Relevant answer
Answer
Have a look at the downloads section, probably working ns-2 distributions are available there for multichannel support in wireless networks
  • asked a question related to Network Protocols
Question
3 answers
I need to know the configurations for ipv6
Relevant answer
Answer
Well you may also want to add some routing. For example a default route might look like this
ipv6 route ::/0 2001:db8:01A5:C900::1
  • asked a question related to Network Protocols
Question
3 answers
I have noticed that many good journal/conference papers (including some research books) have some non-smooth curve plotting, such as for packet delivery ratio (PDR), End-to-End (E2E) communication delays and packets reachability (RE).
In many cases, some sudden jerks in achieved values are noticed. The overall curve would show a meaningful result, such as fall of PDR with increase in network density, but it would also have few values in between going out of the fall trend. E.g. PDR for nodes = 400 would be higher for PDR for nodes = 350.
On the other hand, I have also noticed that many papers have reasonably smooth curves for the above mentioned metrics. What are factors that play a role in these non-smooth outputs? I personally could think of the randomness introduced in each simulation runs as being the major factor.
Relevant answer
Answer
When reading a paper you should pay attention to the way the data was collected. Many of these "smooth curves" papers, as you mention, are theoretical ones. I mean, the results are obtained through the mathematical formulation/analysis of the problem. In such cases, the errors/variations play little role on the results, thus having more "harmonious" results. When analyzing real traffic logs, test bed implementation and even well conceived simulation/emulation experiments.... things are normally not very smooth. The amount of variables and different things that can impact the experiment rarely permits a very smooth output. However, you can minimize the discrepancies by:
- Run your experiment a fair amount of times (if in simulation with different seeds) so that it is statistically relevant. On the long run, if you have enough experiments, the spikes on one single experiment will have lower impact on the analysis of the whole experiment.
- Do a good statistical treatment of your data. Some statistical tools like percentile, weighted mean, mode, provide the correlation coefficient and confidence intervals... all these and other statistical methods/tools can, not only improve the quality of the results but help you (and your readers) to understand your results.
- Most of all, do not forget that is your job to analyze your graphs and drawn conclusions from it, not from your reader. YOU have access to all the codes, raw data and you have more time to analyze and understand your results. The reader should not do this job for you. If you are not satisfied with your results.... imagine the reader. Always put yourself on the shoes of the reader and see if you would be satisfied by the quality of the graph, what it is showing and the explanations provided for "strange" behaviors.
  • asked a question related to Network Protocols
Question
7 answers
I want to simulate a network whose clusters will work on different frequencies.
Relevant answer
Answer
As far as I understood, you are not interesting in one specific technology are you? If it is just a theoretical question, and you are proposing a new mac layer. The answer would be yes, and yes you could implement that in ns-2 (even though I would urge you to use some other, more recent simulator). If you do not want to go into the internals of the PHY, what can be quite challenging if you do not know the PHY, or even if kind of nonsense, if you do not care for one specific technology. The eaisest would just add a flag on your packet with the specific frequency the source is using, and in the receiver ignore all the messages that does not match the frequency of the receiver.... simple like that.
OK that is cheating, surely it is, but if you are not interested in the phy, what you are trying to show is (protocol) is uper layer related... lets say topology control, group communication, filtering of data dissemination.... that is more than enough and quite easy to implement in almost ANY network simulator.
  • asked a question related to Network Protocols
Question
5 answers
Can someone explain the advantages of using FBMC (Filter Bank Multicarrier) over OFDMA?
Relevant answer
Answer
  • asked a question related to Network Protocols
Question
10 answers
In distributed computing, are master/slave model any different from master/worker models, or they are the same?
Relevant answer
Answer
Hi,
yes they are similar concepts. However the proper terms are: Master/Slaves and Farmer/Workers. Both refer to a model of parallelism in which the Master (or the Farmer) orchestrate the work to be done by Slaves (or Workers).
Usually the Master (Farmer) performs the initial calculations and then starts a loop in which the computational workload is assigned to the available Slaves (Workers).
Kind Regards,
--Osvaldo
  • asked a question related to Network Protocols
Question
7 answers
We have an ad-hoc network that packets follow with certain protocol by mobile nodes. Here the nodes are vehicles and network is VANET. Any vehicle has a unique id such as a MAC address in computer networks. Any packet has a unique sender which is determined by the sender id or perhaps for protection pseudo id. I want to know is it possible for anyone to be able to change the packet id easily and without additional hardware installed on the vehicle and sent it again?
Relevant answer
Answer
you're right Imegh but time is an important factor in message communication (specially safety messages exchanging in VANET) and full encryption is a time consuming process that where possible, we should avoid it.
  • asked a question related to Network Protocols
Question
4 answers
I work in ns-2.34 so wireless sensor network protocols is not install directly when I install ns2. I need file installation of wireless sensor network. Where i can get it from?
Relevant answer
Answer
So, you can do one thing,first decide on which protocol you want to work and then download its files and refer on which configuration it will work.