Principle of IP Addressing and Practical Issues in Implementation
VerifiedAdded on 2023/01/07
|13
|3232
|70
AI Summary
This article explains the principle of IP addressing based on IPv4 and discusses the practical issues that arise during implementation. It covers the uniqueness of IP addresses, how they are assigned, and the challenges faced in implementing IP addressing.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Data communication and Network
Routing
1
Routing
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Contents
1) Identifying the important strategies used in data communication with example of CRC and
hamming error discovery/ correction...........................................................................................3
2) By using OSI physical layer, determine that how data consists of a stream of bits which
encoded into signals.....................................................................................................................5
3) Detailed explanation of TCP/IP model and analyse the function of one protocol within each
layer.............................................................................................................................................8
5) Explain the principle of IP addressing, based on IPv4 and also discuss about the practical
issue when implementing IP addressing....................................................................................11
2
1) Identifying the important strategies used in data communication with example of CRC and
hamming error discovery/ correction...........................................................................................3
2) By using OSI physical layer, determine that how data consists of a stream of bits which
encoded into signals.....................................................................................................................5
3) Detailed explanation of TCP/IP model and analyse the function of one protocol within each
layer.............................................................................................................................................8
5) Explain the principle of IP addressing, based on IPv4 and also discuss about the practical
issue when implementing IP addressing....................................................................................11
2
1) Identifying the important strategies used in data communication with example of CRC and
hamming error discovery/ correction.
During data transmission, it has been occurred the various external noise sources interfere
with signals and transmitted in any other medium. As a result, it has generated the error at the
time of transmission. It is the most commonly issue happen so that it would require to improve
the error to implement an effective strategies. Therefore, it can resolve the hamming error
discovery. There are different type of errors encountered at the time of transmission because of
physical defect in the communication medium.
Error coding
Error coding is based on the method of detecting as well as correcting the errors, it must
ensure that there are no errors in the information or data (Abdelkader and et.al., 2016 ).
Generally, it can be used for error-free communication in both primary as well as secondary
memory devices such as DVD, ROM, hard disk and other various digital data communication
system.
Need for error coding
The data transmission errors occur in the data communication because of various reason
such as diffractions, scattering cellular wireless communication, multipath fading and other type
of low-signals to noise ration. This type of error coding strategy will use the different
mathematical formulation to easily encode data bits at source into longer bit words. The code is
applicable when easily decoded at destination and afterwards, it can easily retrieve information
or data.
3
hamming error discovery/ correction.
During data transmission, it has been occurred the various external noise sources interfere
with signals and transmitted in any other medium. As a result, it has generated the error at the
time of transmission. It is the most commonly issue happen so that it would require to improve
the error to implement an effective strategies. Therefore, it can resolve the hamming error
discovery. There are different type of errors encountered at the time of transmission because of
physical defect in the communication medium.
Error coding
Error coding is based on the method of detecting as well as correcting the errors, it must
ensure that there are no errors in the information or data (Abdelkader and et.al., 2016 ).
Generally, it can be used for error-free communication in both primary as well as secondary
memory devices such as DVD, ROM, hard disk and other various digital data communication
system.
Need for error coding
The data transmission errors occur in the data communication because of various reason
such as diffractions, scattering cellular wireless communication, multipath fading and other type
of low-signals to noise ration. This type of error coding strategy will use the different
mathematical formulation to easily encode data bits at source into longer bit words. The code is
applicable when easily decoded at destination and afterwards, it can easily retrieve information
or data.
3
Figure 1
In above diagram, it has identified that there are two different way to deal with errors. One way
to consider the redundant information along with transmitted data. It enable for receiver to
deduce the data that has been transmitted. Another way to only provide enough redundancy that
allows for receiver to identify any error during transmission. These method is also known as
hamming error discovery/ correction.
For Example- when it consider an appropriate frame that having n data bits and s redundancy
bits. In order to calculate the total number of bits in the one frame a (n+s). Moreover. The total
number of bits, which may name as “codeword”, also known as hamming distance. It has
supposed to d-distance (Gao, Liu and Yang, 2020 ). In this way, it help for generating a specific
property to control or detect the errors on the basis of hamming distance.
A distance d+1 code has required to identify d errors because it is not completely change
the valid code word into another code. In this way, it can easily detect the errors at
receiver side.
A distance 2d+1 code has required when it can correct the errors because it is closer than
another valid code word. Therefore, it can identify the specific errors.
Cyclic Redundancy check (CRC)
It is one of most powerful mechanism that mainly used for implementing the error
detection procedure. Generally, this cycle will be using the checksum and then divide into binary
numbers (Kim, Na and Cho, 2020 ). Cyclic redundancy check is handling the data unit which
appended at the end through redundant sequence bits, called as cycling check bits. The data units
is divisible by another second digital. In order to predetermined the binary number. On the other
4
In above diagram, it has identified that there are two different way to deal with errors. One way
to consider the redundant information along with transmitted data. It enable for receiver to
deduce the data that has been transmitted. Another way to only provide enough redundancy that
allows for receiver to identify any error during transmission. These method is also known as
hamming error discovery/ correction.
For Example- when it consider an appropriate frame that having n data bits and s redundancy
bits. In order to calculate the total number of bits in the one frame a (n+s). Moreover. The total
number of bits, which may name as “codeword”, also known as hamming distance. It has
supposed to d-distance (Gao, Liu and Yang, 2020 ). In this way, it help for generating a specific
property to control or detect the errors on the basis of hamming distance.
A distance d+1 code has required to identify d errors because it is not completely change
the valid code word into another code. In this way, it can easily detect the errors at
receiver side.
A distance 2d+1 code has required when it can correct the errors because it is closer than
another valid code word. Therefore, it can identify the specific errors.
Cyclic Redundancy check (CRC)
It is one of most powerful mechanism that mainly used for implementing the error
detection procedure. Generally, this cycle will be using the checksum and then divide into binary
numbers (Kim, Na and Cho, 2020 ). Cyclic redundancy check is handling the data unit which
appended at the end through redundant sequence bits, called as cycling check bits. The data units
is divisible by another second digital. In order to predetermined the binary number. On the other
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
hand, at receiver end, it will be divided the data units by predetermined binary digit. If it has
generated the “zero” remainder that assumed to error-free.
For Example- Let supposed to “k” as bit message which may be transmitted. Other
transmitter will be generating r-bit sequence which is known as frame check sequence.
Afterwards, r-bits also appended to k bit message, so that it can be generated k+r bits data.
Figure 2
In above diagram, it has been determined the scheme for cyclic redundancy checking and mainly
used for data communication, compression as well as storage. It is to be consider as powerful
technique for identifying errors during transmission (Pasupuleti and Balaswamy, 2020).
Afterwards, it will support for testing as integrated circuit and also detection of particular logical
faults.
As per discussion, it has concluded that CRC code often used for error detection over
single frame or vector. It can be expressed as polynomial in x as well as vector length L.
afterwards, CRC coding will be generalization of other parity check bit and also used for
detecting single bit error.
2) By using OSI physical layer, determine that how data consists of a stream of bits which
encoded into signals.
OSI model stands for open system interconnection model, which is mainly based on the
conceptual model to perform the functionality of telecommunication or computing system. It is
5
generated the “zero” remainder that assumed to error-free.
For Example- Let supposed to “k” as bit message which may be transmitted. Other
transmitter will be generating r-bit sequence which is known as frame check sequence.
Afterwards, r-bits also appended to k bit message, so that it can be generated k+r bits data.
Figure 2
In above diagram, it has been determined the scheme for cyclic redundancy checking and mainly
used for data communication, compression as well as storage. It is to be consider as powerful
technique for identifying errors during transmission (Pasupuleti and Balaswamy, 2020).
Afterwards, it will support for testing as integrated circuit and also detection of particular logical
faults.
As per discussion, it has concluded that CRC code often used for error detection over
single frame or vector. It can be expressed as polynomial in x as well as vector length L.
afterwards, CRC coding will be generalization of other parity check bit and also used for
detecting single bit error.
2) By using OSI physical layer, determine that how data consists of a stream of bits which
encoded into signals.
OSI model stands for open system interconnection model, which is mainly based on the
conceptual model to perform the functionality of telecommunication or computing system. It is
5
underlying the internal structure and technology which always support for managing diverse
communication process.
Physical layer is the one of lowest layer in OSI model which provide the electrical,
mechanical and other functional aid available to disable or enable. Generally, this layer will help
for maintaining and transmitting bits through physical connection. It may consider the electrical
signals and other electromagnetic waves (Qureshi, Bashir and Abdullah, 2020). This method is
also known as technical transmission process. Moreover, it should be considered the different
hardware devices, network components that are directly associated with physical layer. For
Example- Antenna, repeater, transceiver and network cable. These are essential components that
always support for exchanging information from sender to receiver side.
The physical layer should contain the digital bits which may transferred to accomplish on
the wireless transmission path. Therefore, it can easily sharing the data from one medium to
another. It also carried out the layer through static or dynamic multiplexing.
The Physical Layer: Communication Signals
The OSI physical layer means which providing the data transmission process across the
network system. Thus, it contain the bits that make up with other data link layer frame.
Afterwards, it accept the overall complete frame from different data link layer and also encoded
in the series of signals (Rasheed, Hu and Balasubramanian, 2020). Usually, the encoded bits that
mainly comprises with frame either received or not through intermediate devices.
Physical signalling and encoding
All type of communication occurred from the network system which mainly contain
binary digit number. They can be transported individually across multiple physical media.
Although the bits that make up with the frame and also represented in the form of physical layer.
Therefore, it has been occurred the stream of bits sent one at time to another device (Rasheed,
Hu and Balasubramanian, 2020). Moreover, the physical layer is representing the bits in frame as
signals. Each and every signals were placed in the media which occupied the specific amount of
data or information. It is referred as bit time.
Furthermore, signals are being processed by receiving through hardware device and then
return to its original representative bits. In physical layer, at receiver side the signals are usually
6
communication process.
Physical layer is the one of lowest layer in OSI model which provide the electrical,
mechanical and other functional aid available to disable or enable. Generally, this layer will help
for maintaining and transmitting bits through physical connection. It may consider the electrical
signals and other electromagnetic waves (Qureshi, Bashir and Abdullah, 2020). This method is
also known as technical transmission process. Moreover, it should be considered the different
hardware devices, network components that are directly associated with physical layer. For
Example- Antenna, repeater, transceiver and network cable. These are essential components that
always support for exchanging information from sender to receiver side.
The physical layer should contain the digital bits which may transferred to accomplish on
the wireless transmission path. Therefore, it can easily sharing the data from one medium to
another. It also carried out the layer through static or dynamic multiplexing.
The Physical Layer: Communication Signals
The OSI physical layer means which providing the data transmission process across the
network system. Thus, it contain the bits that make up with other data link layer frame.
Afterwards, it accept the overall complete frame from different data link layer and also encoded
in the series of signals (Rasheed, Hu and Balasubramanian, 2020). Usually, the encoded bits that
mainly comprises with frame either received or not through intermediate devices.
Physical signalling and encoding
All type of communication occurred from the network system which mainly contain
binary digit number. They can be transported individually across multiple physical media.
Although the bits that make up with the frame and also represented in the form of physical layer.
Therefore, it has been occurred the stream of bits sent one at time to another device (Rasheed,
Hu and Balasubramanian, 2020). Moreover, the physical layer is representing the bits in frame as
signals. Each and every signals were placed in the media which occupied the specific amount of
data or information. It is referred as bit time.
Furthermore, signals are being processed by receiving through hardware device and then
return to its original representative bits. In physical layer, at receiver side the signals are usually
6
converted back into stream or bits. It can be identified the start of frame and end of its bit pattern
to identify the complete single frame. If the signals are representing in the form of “0” and “1”.
Afterwards, it can easily synchronized by use of clock.
Figure 3
In above figure-3, it has been representing the nature of signals in the form of bits on particular
media. Sometimes, it depend on the signaling technique when they can use on attribute of signal
to represent signal “0”. Another way, it can use another type of attribute of signal to represent as
single “1”. For Example- Non-return to zero may be represented through voltage level on
particular medial during bit time. “1” also represented other voltage on medial during specific bit
time.
Encoding: Grouping bits
Signaling process or method that can be represented bit on the physical media. Generally,
it can be used the encoding for represented as symbolic grouping of bits and represented to the
media. By using encoding process, it will improve the overall data transmission speed and
efficiency at higher level (Robinson and et.al., 2019 ). In additional, as increases the demand for
data speed, which may seek way to show more data across the different media. The group of
coding which mainly consider as a method for making this data or information representation.
7
to identify the complete single frame. If the signals are representing in the form of “0” and “1”.
Afterwards, it can easily synchronized by use of clock.
Figure 3
In above figure-3, it has been representing the nature of signals in the form of bits on particular
media. Sometimes, it depend on the signaling technique when they can use on attribute of signal
to represent signal “0”. Another way, it can use another type of attribute of signal to represent as
single “1”. For Example- Non-return to zero may be represented through voltage level on
particular medial during bit time. “1” also represented other voltage on medial during specific bit
time.
Encoding: Grouping bits
Signaling process or method that can be represented bit on the physical media. Generally,
it can be used the encoding for represented as symbolic grouping of bits and represented to the
media. By using encoding process, it will improve the overall data transmission speed and
efficiency at higher level (Robinson and et.al., 2019 ). In additional, as increases the demand for
data speed, which may seek way to show more data across the different media. The group of
coding which mainly consider as a method for making this data or information representation.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Figure 4
The physical layer of network device require to easily detect the large amount of data signals and
also ignoring the random non data signals. These processes are mainly performed in the physical
medium which being stream of signals transmitted and then recognize the starting and end of
particular frame (Rasheed, Hu and Balasubramanian, 2020).
3) Detailed explanation of TCP/IP model and analyse the function of one protocol within each
layer.
TCP/IP model is based on the version of OSI model. It is mainly contain the four different
layers. This type of model is commonly used as protocol which takes a layered approach.
Figure 5
8
The physical layer of network device require to easily detect the large amount of data signals and
also ignoring the random non data signals. These processes are mainly performed in the physical
medium which being stream of signals transmitted and then recognize the starting and end of
particular frame (Rasheed, Hu and Balasubramanian, 2020).
3) Detailed explanation of TCP/IP model and analyse the function of one protocol within each
layer.
TCP/IP model is based on the version of OSI model. It is mainly contain the four different
layers. This type of model is commonly used as protocol which takes a layered approach.
Figure 5
8
Application layer: it is one of most commonly used layer in TCP/IP model. Its primary
functionality is to perform various functions. It may include interaction between different
application, encoding and decoding and control the coordination between systems. In this layer,
it may include different types of protocols such as HTTP, SMTP, talent, DHCP and DNS. These
are mainly supports for data transmission from one place to another. HTTP is the most
commonly used protocol which transfer webpages from HTTP server to client side. When it can
use the web browser such as FireFox, internet explorer. On the other hand, HTTP is useful for
sending request from remote server. in order to maintain and control the coordination between
server and client.
Transport layer: it is basically responsible for reliability, correction of information and
maintain flow of data which being sent over network system. Generally, transport layer can use
the user data and header to transmit signals from destination. It has been established the end to
end data transmission and also set up a logical between different hosts.
Transport layer is mainly used two protocols such as transmission control and user
datagram. TCP is generally connection oriented, reliable that can use the windowing to manage
or control the flow of information (Zhang, Zhao and Wu, 2019). In order to provide the better
delivery service into multiple segments. Apart from that UDP is simply use for transferring data
without any whistles. These are considered as an important protocol to perform the function of
data transmission.
Internet layer: Once UDP and TCP have been segmented the data but require to the added
specifci header. Therefore, they can easily send the segment down to other network layer. The
9
functionality is to perform various functions. It may include interaction between different
application, encoding and decoding and control the coordination between systems. In this layer,
it may include different types of protocols such as HTTP, SMTP, talent, DHCP and DNS. These
are mainly supports for data transmission from one place to another. HTTP is the most
commonly used protocol which transfer webpages from HTTP server to client side. When it can
use the web browser such as FireFox, internet explorer. On the other hand, HTTP is useful for
sending request from remote server. in order to maintain and control the coordination between
server and client.
Transport layer: it is basically responsible for reliability, correction of information and
maintain flow of data which being sent over network system. Generally, transport layer can use
the user data and header to transmit signals from destination. It has been established the end to
end data transmission and also set up a logical between different hosts.
Transport layer is mainly used two protocols such as transmission control and user
datagram. TCP is generally connection oriented, reliable that can use the windowing to manage
or control the flow of information (Zhang, Zhao and Wu, 2019). In order to provide the better
delivery service into multiple segments. Apart from that UDP is simply use for transferring data
without any whistles. These are considered as an important protocol to perform the function of
data transmission.
Internet layer: Once UDP and TCP have been segmented the data but require to the added
specifci header. Therefore, they can easily send the segment down to other network layer. The
9
specific destination host may reside in different network as far from host which divided through
routers. In this way, Internet layer will be perform the function to ensure that segment is moved
across the network system. Internet layer is commonly used IP (internet protocol) that provide
the better service in term of data transmission (Zhang, Zhao and Wu, 2019). This protocol is
performing the different task with the help of routers. If in case it has identified the problem or
issue when immediately send error message across internet layer. The layer is dominated by IP
with supporting its unique purpose. Each and every host in the newtork that mainly consists of
logical address called as IP address.
Figure 6
As received IP from UDP as well as TCP, add a header with appropriate source and destination
addresse among another information or data. When network device such as router receive the
data in the form of packet. During data transmission, it contain the destination address in the
header and forward towards the network system.
Network Access layer: it is the lowest layer in TCP/IP model which provide the better way to
deliver data from one device to the network system. network access layer of TCP/Ip model
10
routers. In this way, Internet layer will be perform the function to ensure that segment is moved
across the network system. Internet layer is commonly used IP (internet protocol) that provide
the better service in term of data transmission (Zhang, Zhao and Wu, 2019). This protocol is
performing the different task with the help of routers. If in case it has identified the problem or
issue when immediately send error message across internet layer. The layer is dominated by IP
with supporting its unique purpose. Each and every host in the newtork that mainly consists of
logical address called as IP address.
Figure 6
As received IP from UDP as well as TCP, add a header with appropriate source and destination
addresse among another information or data. When network device such as router receive the
data in the form of packet. During data transmission, it contain the destination address in the
header and forward towards the network system.
Network Access layer: it is the lowest layer in TCP/IP model which provide the better way to
deliver data from one device to the network system. network access layer of TCP/Ip model
10
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
corresponds with physical as well as data link layer. It can be defined all essential hardware and
protocol to establish the connection with physical network system. furthermore, The particular
destination is another host within network system and further forwarding signals (Qureshi,
Bashir and Abdullah, 2020). Internet layer is basically viewed the entire network system but
network access layer is defined the boundary of physical layer. This layer is mainly consists of
large number of protocols such as ethernet, point to point protocol.
Ethernet is the most common protocol that is mainly used to establish connection within
network. Network access layer use physical address in order to determine the hosts and deliver
data packet. This layer is also known as Frame, which mainly contain IP packet by using
protocol header. Afterwards, when router receives a particular frame and then strip of header and
trailer.
5) a. Explain the principle of IP addressing, based on IPv4 and also discuss about the practical
issue when implementing IP addressing.
An IP address is based on the conceptual term which mainly used for identifying the
uniqueness in particular device. It is made up 32 bits and also divisible into different network
portion. This 32 bit has broken into four different octets. Each one has converted to decimal
number and separated by Dot.
IPv4 is mainly consists of unique number that can be assigned by either IR, ISP and also
completing the registration process. The particular network number must be unique within
organization (Qureshi, Bashir and Abdullah, 2020). The unique IPv-4 address is directly
interfaces with every system on the network. Generally, it contain 32-bit number which uniquely
identified the interface on system. For Example: it can use private IP address of
192.168.22.0/24.The registered IPv number which mainly define IP class network.
192.168.22 is a network part which consists of IPv4 network unique addressed and also
received from ISP.
0 is a type of host which may assign to interface within system
11
protocol to establish the connection with physical network system. furthermore, The particular
destination is another host within network system and further forwarding signals (Qureshi,
Bashir and Abdullah, 2020). Internet layer is basically viewed the entire network system but
network access layer is defined the boundary of physical layer. This layer is mainly consists of
large number of protocols such as ethernet, point to point protocol.
Ethernet is the most common protocol that is mainly used to establish connection within
network. Network access layer use physical address in order to determine the hosts and deliver
data packet. This layer is also known as Frame, which mainly contain IP packet by using
protocol header. Afterwards, when router receives a particular frame and then strip of header and
trailer.
5) a. Explain the principle of IP addressing, based on IPv4 and also discuss about the practical
issue when implementing IP addressing.
An IP address is based on the conceptual term which mainly used for identifying the
uniqueness in particular device. It is made up 32 bits and also divisible into different network
portion. This 32 bit has broken into four different octets. Each one has converted to decimal
number and separated by Dot.
IPv4 is mainly consists of unique number that can be assigned by either IR, ISP and also
completing the registration process. The particular network number must be unique within
organization (Qureshi, Bashir and Abdullah, 2020). The unique IPv-4 address is directly
interfaces with every system on the network. Generally, it contain 32-bit number which uniquely
identified the interface on system. For Example: it can use private IP address of
192.168.22.0/24.The registered IPv number which mainly define IP class network.
192.168.22 is a network part which consists of IPv4 network unique addressed and also
received from ISP.
0 is a type of host which may assign to interface within system
11
/24 is defined as network prefix which is mainly identified that how many bits comprise
with particular network digit number. It also providing the subnet mask for Internet
protocol address.
Determine the issue when implementing IP addressing
Private IP addressing is consider as legitimately used within organization. When user can
use to inside network, access the information or data. Typically, it is mainly connected with
different network devices such as router, firewall and other network proxy, these are providing
the better service when translating the network addressed in the form of port number.
The principle of IP addressing is that when it allows every hardware device connect with
internet to be given logical address. In order to exchange data from one place to another.
When implementing IP address and identify the unpredictable or confusing interactions
that could occur due to traffic. In case, the possibly other applications that were launched from
network IPv-4 inside address (Qureshi, Bashir and Abdullah, 2020). Afterwards, it has been
passed over the same address in the public IP. While such type of situation would be likely to
happen and difficult to identify the source or destination address. At that time, denial of service
attack can make use of IP addresses in attempt to develop obstacles. In context of security, it
should be require to concern about the public IP address and maintain the privacy.
As working as pre-sale engineer in IT organization which consists of different
departments. In this way, it will be assigned the specific IP addressing for establish connection
between different department.
12
with particular network digit number. It also providing the subnet mask for Internet
protocol address.
Determine the issue when implementing IP addressing
Private IP addressing is consider as legitimately used within organization. When user can
use to inside network, access the information or data. Typically, it is mainly connected with
different network devices such as router, firewall and other network proxy, these are providing
the better service when translating the network addressed in the form of port number.
The principle of IP addressing is that when it allows every hardware device connect with
internet to be given logical address. In order to exchange data from one place to another.
When implementing IP address and identify the unpredictable or confusing interactions
that could occur due to traffic. In case, the possibly other applications that were launched from
network IPv-4 inside address (Qureshi, Bashir and Abdullah, 2020). Afterwards, it has been
passed over the same address in the public IP. While such type of situation would be likely to
happen and difficult to identify the source or destination address. At that time, denial of service
attack can make use of IP addresses in attempt to develop obstacles. In context of security, it
should be require to concern about the public IP address and maintain the privacy.
As working as pre-sale engineer in IT organization which consists of different
departments. In this way, it will be assigned the specific IP addressing for establish connection
between different department.
12
REFERENCES
Book and Journals
Abdelkader, T. and et.al., 2016. A performance comparison of delay-tolerant network routing
protocols. IEEE Network. 30(2). pp.46-53.
Gao, H., Liu, C. and Yang, X., 2020. V2VR: Reliable Hybrid-Network-Oriented V2V Data
Transmission and Routing Considering RSUs and Connectivity Probability. IEEE
Transactions on Intelligent Transportation Systems.
Kim, N., Na, W. and Cho, S., 2020. Dual-Channel-Based Mobile Ad Hoc Network Routing
Technique for Indoor Disaster Environment. IEEE Access.
Pasupuleti, V.R. and Balaswamy, C., 2020. Optimised routing and compressive sensing based
data communication in wireless sensor network. IET Communications. 14(6). pp.982-
993.
Qureshi, K.N., Bashir, F. and Abdullah, A.H., 2020. Distance and signal quality aware next hop
selection routing protocol for vehicular ad hoc networks. Neural Computing and
Applications. 32(7). pp.2351-2364.
Rasheed, I., Hu, F. and Balasubramanian, B., 2020. Intelligent vehicle network routing with
adaptive 3d beam alignment for mmwave 5g-based v2x communications. IEEE
Transactions on Intelligent Transportation Systems.
Robinson, Y.H. and et.al., 2019. Link-disjoint multipath routing for network traffic overload
handling in mobile ad-hoc networks. IEEE Access. 7. pp.143312-143323.
Zhang, D.G., Zhao, P.Z. and Wu, H., 2019. A new method of mobile ad hoc network routing
based on greed forwarding improvement strategy. IEEE Access. 7. pp.158514-158524.
13
Book and Journals
Abdelkader, T. and et.al., 2016. A performance comparison of delay-tolerant network routing
protocols. IEEE Network. 30(2). pp.46-53.
Gao, H., Liu, C. and Yang, X., 2020. V2VR: Reliable Hybrid-Network-Oriented V2V Data
Transmission and Routing Considering RSUs and Connectivity Probability. IEEE
Transactions on Intelligent Transportation Systems.
Kim, N., Na, W. and Cho, S., 2020. Dual-Channel-Based Mobile Ad Hoc Network Routing
Technique for Indoor Disaster Environment. IEEE Access.
Pasupuleti, V.R. and Balaswamy, C., 2020. Optimised routing and compressive sensing based
data communication in wireless sensor network. IET Communications. 14(6). pp.982-
993.
Qureshi, K.N., Bashir, F. and Abdullah, A.H., 2020. Distance and signal quality aware next hop
selection routing protocol for vehicular ad hoc networks. Neural Computing and
Applications. 32(7). pp.2351-2364.
Rasheed, I., Hu, F. and Balasubramanian, B., 2020. Intelligent vehicle network routing with
adaptive 3d beam alignment for mmwave 5g-based v2x communications. IEEE
Transactions on Intelligent Transportation Systems.
Robinson, Y.H. and et.al., 2019. Link-disjoint multipath routing for network traffic overload
handling in mobile ad-hoc networks. IEEE Access. 7. pp.143312-143323.
Zhang, D.G., Zhao, P.Z. and Wu, H., 2019. A new method of mobile ad hoc network routing
based on greed forwarding improvement strategy. IEEE Access. 7. pp.158514-158524.
13
1 out of 13
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.