The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We are interested in exploring how to virtualize network switches in order to create multiple logical switches from one physical switch. The motivation behind this is to be able to support multiple research-and-education (R&E) projects by offering each of them a logical switch that could coexist with other R&E projects' logical switches, so that each would have the equivalent of their own...
BCMCS (broadcast and multicast services) greatly increase the capacity of CDMA2000 mobile networks for multimedia broadcasting, but only require minor changes to existing radio and core network protocols. To provide high-quality multimedia services over error-prone wireless networks, we need to control delay, because it is one of the most important QoS parameters for multimedia applications. We identified...
In this paper, we present an enhancement to our previously proposed algorithm, SOR, for the minimum energy broadcasting problem in wireless sensor ad hoc networks. We implement the enhanced algorithm, PSOR (Partitioning- based SOR), and compare its solution quality with other algorithms in the literature: BIP, OMEGa, SOR, and EWMA. The enhancement comes from the diversification of solution space by...
Superposition interference cancellation (SIC) has been highlighted due to its high spatial reuse efficiency in wireless networks. It exploits superposition aspect of multiple signals to cancel interferences. We present three basic SIC schemes, which are (1) superposition demodulation scheme, (2) superposition decoding scheme and (3) iterative superposition decoding scheme in this paper. When selecting...
In this paper, we propose an autonomic management framework (ASGrid) to address the requirements of emerging large-scale applications in hybrid grid and sensor network systems. To the best of our knowledge, we are the first who proposed the autonomic sensor grid system concept in a holistic manner targeted at non-trivial large applications. To bridge the gap between the physical world and the digital...
This paper presents a new scheme for robust video transmission over packet erasure wireless channels based on Wyner-Ziv coding of motion regions. The multipath fading and shading of the wireless channels usually lead to loss or erroneous video packets which on occasions result in some spontaneous drop in video quality. Existing approaches with forward error correction (FEC) and error concealment have...
Advances in information and communication technologies, ICT, are bringing new opportunities in the field of middleware systems oriented to ubiquitous environments and wearable devices used for patient telemonitoring. At a time of such challenges, this paper arises from the need to identify robust technical telemonitoring solutions that are both open and interoperable in home or mobile scenarios. These...
The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK - a novel sink mobility model exploiting the connected dominating set (CDS) property of a network graph. TRACK, to the best of our knowledge, is the first contemporary sink mobility model to exploit the CDS property for WSN lifetime...
Effective defenses against DDoS attacks that deplete resources at the network and transport layers have been deployed commercially. Therefore, DDoS attacks increasingly use normal- looking application-layer requests to waste server CPU or disk capacity. CAPTCHAs attempt to distinguish bots from human clients and are often used to avoid such attacks. However, CAPTCHAs themselves consume resources and...
Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set of techniques that can be applied in a backward learning routing algorithm in order to minimize or even eliminate explicit control messages for route discovery, setup, and maintenance, while minimally using implicit data-like...
The parallel interaction medium access (PIMA) protocol is introduced to orchestrate channel access in a wireless ad hoc network when nodes are endowed with a single half- duplex radio, and can either transmit multiple packets to multiple destinations in parallel or receive multiple packets from multiple transmitters in parallel using OFDMA. Analytical and simulation results indicate that PIMA attains...
High bandwidth one-to-many applications emerging in IP over WDM optical networks demand multicast support at WDM layer so that data signals would be efficiently duplicated inside network without O/E/O conversion. Multicast trees in an optical layer can be built with light-trees which use light-splitting technique. Most of recent studies have been focused to efficiently build and configure light-trees...
TCP-based applications account for a majority of data traffic in the Internet; thus understanding and improving the performance of TCP over OBS network is critical. In this paper, we identify the ill-effects of implementing TCP over a hybrid network (IP-access and OBS-core). We purpose a Split- TCP approach for a hybrid IP-OBS network to improve TCP performance. We propose two Split-TCP approaches,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.