The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay boundary is an important topic for evaluating the service performance of network. In this paper, we focus on the delay boundary of the end-to-end in wireless sensor networks (WSN). We propose stochastic arrive curve model and stochastic service curve model based on stochastic network calculus (SNC), which can be applied to analyze the service performance of WSN. Then we derive the end-to-end...
Long registration delay and signaling cost restrict the practical deployment of MIP. Proxy Mobile IPv6 has been proposed to overcome limitation of Mobile IP, which can avoid tunneling overhead and support of hosts in the mobility management. In this paper, we propose an extension protocol based on Proxy Mobile IPv6 to reduce the overhead of Local Mobile Anchor and decrease handoff delay. When the...
At present, the number of Internet subscribers accessing Internet through mobility terminal equipment and other new types is gradually increasing, which shows it's important to develop mobility management protocols in order to provide mobility support for the subscribers. Several protocols were proposed to support IP mobility in the IETF, such as MIPv6, HMIPv6, FMIPv6 and F-HMIPv6. Some performance...
In the emerging peer-to-peer (P2P) live streaming, users cooperate with each other to support efficient delivery of video over networks. Pollution attack is an effective attack against P2P live streaming, where attackers upload useless data to their peers, which may cause distrust among users. To resist pollution attacks and stimulate user cooperation in P2P live streaming, this paper proposes a joint...
To support mobile nodes moving across different networks as a whole, the IETF NEMOv6 (RFC 3963) has been proposed. Compared with Mobile IPv6 protocol, the NEMOv6 provides a method to enable a network moving entirely. Mobile Router (MR) is introduced to the NEMOv6, which performs mobility management function for the entire mobile network. All nodes belonged to the mobile network, fixed or mobile, are...
In multihop wireless sensor networks, global clock error will accumulate as the hops grow. Sensors far away from the root are likely to suffer larger synchronization errors, which may deteriorate the accuracy of sensing data or even result in the failure of TDMA MAC protocols. A novel algorithm based on vector Kalman filter using multiple parents (KFMP) is proposed to address this problem. It's pointed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.