Distributed middleware technology is emerging as a flexible promising solution for network resource management and QoS (Quality of Service) control in a distributed environment. The concept of dynamic bandwidth reservation (DBR) algorithm additionally allocates the terminated bandwidth for an ongoing call is one of the promising methods to reduce the new call blocking and handoff call dropping probabilities. Dynamic resource management (DRM) framework concentrates on design and developing a framework for allocating shared resources to support multiple QoS and to provide probabilistic assurances of service in wireless networks. Existing methods and architecture do not guarantee on resource allocation and management in mobile, wireless and ad hoc networks. When a mobile node (MN) moves from its home network (HN) to foreign network (FN), the minimal required resources and services can be provided locally in the current network where it is connected presently. Dynamic resource management (DRM) framework provides an application level simulator for wireless network with new QoS management concept. DRM framework comprises of a set of programmable distributed objects and distributed middleware. DRM framework is constructed using distributed objects and distributed middleware. Distributed object carry applications across networks and allow them to connect to local server with FN in the same way as they had moved from the HN. The framework must dynamically accommodate multimedia calls with different bandwidth requirements in response to network traffic and it supports mobility management. The utility of DRM framework describes how the required resources are reserved based on the user priority option in an adaptive manner. The proposed DBR algorithm guarantees the required bandwidth during call setup and handoff without any flow rejection.
Secure routing is the process of selecting safe and unthreatened paths in a network along which to send network traffic. There is a strong need for routing security in wireless networks, because there is a dramatic increase in routing attacks in recent years and directly affects the performance of the network. In this paper we present a Transactions Based Secure Routing (TBSR) protocol for data transmission. Here Cognitive Agents (CAs) with Behaviors-Beliefs (BB) model are placed on routers to generate beliefs over the routers functionalities w.r.t. genuinity and various transactions are classified based on the Transaction Subtlety Levels (TSL). These two factors are used in determining secure paths for data transmission of varied security levels and there by enhancing the network performance. The results are presented to demonstrate the routing delay, latency, Quality of Service(QoS), and throughput.intention of flooding request to the router affecting the availability. Packet mistreating attacks: In this type of attack, the router is injected with malicious codes, which simply mistreats the packets. This type of attack is very difficult to find and debug. Routing table poisoning: Routing table poisoning means the unwanted or malicious change in routing tables. This is carried out by editing the routing information update packets that are advertised by routers. This attack can cause severe damage in the network by entering wrong routing table entries in the routing table.Hit-and-run attacks: This attack is also called test attack where the attacker injects malicious packets into the router and sees if the network is on line and functioning or not. If yes, an attacker sends further more malicious packets to harm the router. This type of attack is hard to identify and can cause severe damage to the routers work. Persistent attacks: Unlike hit-and-run attack, in this attack, an attacker repeatedly injects malicious packets into the router causing the router to exploit vulnerabilities. This type of attack is a bit easier to detect compared with other router attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.