The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a testbed for visualizing the behavior of sensor network applications constructed using TinyOS 2.0. The testbed enables network designers to capture node-level runtime behaviors and to link the captured behaviors to form a network-level snapshot. A multi-resolution approach based on static selectors and dynamic filters helps to achieve manageable visualizations by including only those network...
One of the major differences among current P2P solutions for multimedia streaming is the way they organize the exchange of multimedia data among their peers. We compare the performance of two of these organizations, namely, an unrestricted mesh using a tit-for-tat incentive policy and a directed mesh that allows peers to dynamically replace poorly performing parents. We first observe that both organizations...
Secure Shell (SSH) tunnels are commonly used to provide two types of privacy protection to clear-text application protocols. First and foremost, they aim at protecting the privacy of the data being exchanged between two peers, such as passwords, details of monetary transactions and so on. Second, they are supposed to protect the privacy of the behavior of end-users, by preventing an unauthorized observer...
Most wireless sensor network (WSN) architectures involve clusters of sensor nodes reporting their sensed data to base stations or sink nodes, and end applications access sensor data from the sink nodes through service-oriented paradigms. One of the key challenges involved in the design of WSN applications through such architectures is the need to conserve the energy of batteries used to power sensor...
Parallel firewalls offer a scalable low latency design for inspecting packets at high speeds. Typically consisting of an array of m firewalls, these systems filter arriving packets according to a security policy. Given the firewall array, the rules can be distributed in two fashions. Data parallel copies the entire policy to each firewall and distributes packets. In contrast, function parallel distributes...
A majority of network architectures aim at solving specific shortcomings of the original Internet architecture. While providing solutions for the particular problems, they often lack in flexibility and do not provide general concepts for future networking requirements. In contrast, we introduce a network architecture that aims to be versatile enough to serve as a foundation for the future Internet...
Multimedia streaming is resource demanding. It may starve other applications such as file transfer sharing the network, for example, in a smart home. To address the problem, we apply fuzzy logic control to bound the bandwidth consumption of multimedia streams. We also differentiate the video quality for streams with different levels of importance. We have implemented our transmission rate control...
Previous work has shown that CSMA-based protocols such as the IEEE 802.11 can yield flow starvation in multi-hop wireless networks. While prior protocol designs alleviated such starvation by utilizing MIMO, they require global synchronization to temporally align transmissions and require per-packet distribution of the complete channel state information. In this paper, we experimentally show that MIMO...
The paper describes a target tracking system running on a heterogeneous sensor network (HSN) and presents results gathered from a realistic deployment. The system fuses audio direction of arrival data from mote class devices and object detection measurements from embedded PCs equipped with cameras. The acoustic sensor nodes perform beamforming and measure the energy as a function of the angle. The...
Under the B3G vision, cellular operators construct a complementary environment - public WLAN to make up for the limited data access service to become cellular/PWLAN operators. In addition, confederating various PWLAN operators including PWLAN operators, Cellular/PWLAN operators and PWLAN roaming brokers under the PWLAN roaming agreements can intensify the PWLAN service coverage. To build a better...
Internet service providers have to provision network resources to optimize bandwidth utilization. Dynamic routing protocols take traffic variations into account to control the load distribution. Multipath routing protocols attempt to take advantage of the path diversity to bring network robustness and reliability. Indeed, with a specific traffic engineering policy, they enable load balancing across...
VoIP is rapidly growing and widely used real-time voice service. On the path through the packet-switched networks, the regularity of VoIP stream is impaired by routing, queuing, scheduling and serialization effects, consequently resulting in loss and delay jitter of packets. Achieving high quality real-time voice requires smoothing the delay jitter at the receiver which is generally done by means...
The wireless multihop to an access point model appears to be a promising component of future network architectures, including multihop cellular networks and wireless access networks at the edges of mesh networks. Sophisticated software radios and core network protocols are being developed to support the integration of heterogeneous access networks. A challenge is managing diverse resources at access...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.