The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WiMax/802.16 mesh network is an emerging infrastructure that offers a cost-effective deployment for high-speed wireless broadband access to the back haul network. In order to provide the best cost-effective deployment solution, nodes must be powered by batteries which do not require electrical cables and voltage transformers deployment (city power lines voltage is not suited to WiMax/802.16 nodes...
Wireless mesh network (WMN) technology extends the service coverage by supporting multi-hop communication and enhances the network capacity by utilizing multi-radio and multichannel. The number of multiple channels is essential for the implementation and the efficiency of channel assignment. While the number of channels is not sufficient, channel assignment needs to consider the channel sharing at...
WLAN mesh networks are often installed to provide wireless coverage for temporary events. In these types of networks, the WLAN mesh nodes can sometimes be operated using an energy sustainable source such as solar power. Resource provisioning consists of pre-assigning each node with a solar panel and battery combination that is sufficient to prevent node outage for the duration of the deployment. This...
In recent times, the importance of information security in civilian space communication systems has increased significantly among space agencies. Those systems often require a high degree of flexibility, interoperability and scalability. Therefore the usage of traditional, physical layer based security solutions is not a desirable option for the agencies. In this paper, we investigate the application...
Guaranteed services in the computer network often require a single reserved path, which easily suffers from single link failures. This paper introduces a backup path computation algorithm, TP, which is intended to compute unreserved backup paths to overcome a single link failure in the network. Simulations are performed to compare TP to other known unreserved backup path computation algorithms. In...
An important factor that affects the cost of WDM networks is the number of wavelengths to be added/dropped by reconfigurable optical add drop multiplexers (ROADMs). Limiting the range of wavelengths that can be accessed at a node reduces costs. In this paper, we study wavelength assignment (WA) in WDM bi-directional ring networks with limited reconfigurability and take up the problem of supporting...
This paper describes methods for increasing the security of data being stored in a distributed hash table (DHT) which leverages the inherent properties of the DHT to provide a secure storage substrate. The methods presented are based upon a framework referred to as "scatter, conceal, and recover" (SCAR). The standard method of securing data in a DHT is to encrypt the data using symmetrical...
We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance between them exceeds the limited range of QKD. Carol is a intermediate node that could share QKD links with Alice and Bob. Carol is assumed to be quasi-trusted: she correctly follows the given three-party protocol. However, she...
The maximum-likelihood (ML)-detected vertical bell-labs layered space-time (V-BLAST) architecture over a Nakagami-m fading channel is considered. This fading model encompasses many fading scenarios as special cases (e.g., Rayleigh). The ML detection of BLAST systems waives the requirement of not having smaller number of receive antennas than transmit antennas: a primary limitation using other sub-optimal...
The paper presents results from a link capacity measurement study conducted over an IEEE 802.11b/g network with highly stressed radio propagation conditions in a football stadium. Existing capacity studies for IEEE 802.11 networks have considered either stationary or statistical multipath fading channel conditions. In an environment with a high density of people and movement such as in a football...
This work presents a traffic engineering framework to promote network stability and to optimize network planning to comply with QoS and cost network restrictions. The framework relies on a traffic characterization method that uses a hybrid traffic model based on three traffic parameters - mean data rate, H (Hurst parameter), variance coefficient - and evaluates the link load to define the method to...
We investigate the p-percent coverage problem in this paper and propose two algorithms to prolong network lifetime based on the fact that for some applications full coverage is not necessary and different subareas of the monitored area may have different coverage requirements. The first algorithm, CPCA, is a centralized algorithm which selects the least number of nodes to monitor p-percent of the...
We present a new perspective on the design and analysis of routing protocols for mobile ad-hoc networks (MANETs). Routing metrics, such as distances or link states, result in an ordering of nodes in the network with respect to the origin of the metric. The manner in which the nodes of a network are ordered can give some insight into the performance of the routing protocol. We show how the use of multiple...
This paper presents a dynamic framed slotted Aloha (DFSA) protocol that is energy efficient, and more importantly, is the first protocol capable of monitoring tags. Our protocol uses three separate frames: 1) reservation, 2) body, and 3) monitor. The reservation and body frame are used to identify tags, whereas the monitor frame is used to keep track of identified tags. We have performed extensive...
Recent studies on inter-domain DWDM networks have focused on topology abstraction for state summarization, i.e. transforming a physical topology to a virtual mesh, tree, or star network. Although these schemes give very good inter- domain blocking reduction, associated inter-domain routing overheads are significant, particularly as the number of domains and border OXC nodes increase. To address these...
Nowadays, the real practice of network coding in wireline networks is focused on the P2P overlay networks. Although it can help to utilize network resources more efficiently, P2P network coding does not exhibit benefits in terms of the maximum throughput. Our work aims to implement network coding at the IP layer, which is an idea not fundamentally new, but with little real practice because of the...
Emerging heterogeneous multicore systems are suitable platforms for efficient deployment of application- specific service components. Easily virtualizable and reprogrammable platforms, these 'appliances' for future information services make it possible to run familiar software stacks created with common development tools, in addition to offering acceleration capabilities for performance critical software...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.