The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A critical aspect of applications with WSNs is increase the sensor nodes lifetime. Power constrained WSNs are useable such as they can communicate sensed data to a processing node. Communication and sensing consume energy therefore energy saving and improving lifetime of WSNs can be achieved by scheduling of sensor nodes. In scheduling allow sensor nodes can interchange its state into idle, sleep...
In the BitTorrent peer-to-peer file sharing protocol, it is observed that when a group of peers known to each other (due to geographical proximity or otherwise) are aiming for the same file, it is downloaded by a single peer and then shared within the group or it is downloaded individually. This is an inefficient approach as the fidelity rests on one peer or all peers (promoting redundancy), thus...
The transmission of Voice over Internet protocol requires signal processing for reliable & efficient performance over the computer and the communication platform. Speech quality, as perceived by the users of VoIP telephony, is critically important to the update of the service. Signal quality is degraded by network layer problems including delay, jitter and packet loss. The work presented in this...
In the design of wireless networking protocols and systems, simulation has become the primary form of initial validation and performance evaluation. Hence, ensuring the realism of simulators and simulation methods is fundamental for simulated results to be interpretable. In this paper, we provide a simulation framework for infrastructure wireless network traffic that allows researchers to use publicly...
We investigate an architecture for multi-Gigabit outdoor mesh networks operating in the unlicensed 60 GHz "millimeter (mm) wave" band. In this band, the use of narrow beams is essential for attaining the required link ranges in order to overcome the higher path loss at mm wave carrier frequencies. However, highly directional links make standard MAC methods for interference management, such...
The proliferation of wireless-enabled portable computing devices has spurred a growing need for efficient and powerful networking protocols. The key challenge in the development of robust wireless networking protocols is an ability to conduct effective and efficient evaluation of the protocol in order to ensure its successful working in real-world settings. We proposed MiNT-2, a fresh re-design of...
The extensive recent research in protocols development for wireless networks must be complemented with simple yet efficient prototyping and evaluation mechanism. MiNT-2 is a miniaturized multihop wireless network testbed that addresses this challenge by combining the benefits of existing protocol evaluations strategies: simulations and custom built large scale wireless network testbeds. A key component...
A significant challenge in the development of robust wireless networking protocols is often the need to prototype and test these protocols in a small-scale setting before they can be widely deployed. Two contrasting prototyping and testing methods are currently used, requiring a choice between convenience and accuracy. The first involves simulating a wireless network solely in software. Although convenient,...
Routers are normally manually configured with IPv6 prefixes in the traditional network. However, due to some of the MANET inherent characteristics such as multi-hop, ad hoc and mobility, manual configuration of prefixes is not desirable and practical. Rather than relying on a dedicated server, a distributed way of allocation is more suitable in the MANET environment. In this paper, we propose a distributed...
In order to communicate among themselves and with the devices on the Internet, a Mobile Ad-hoc NETwork (MANET) node needs to configure its interface(s) with IP address(es). MANET is a multi-hop network often consisting of mobile devices such as mobile phones, PDAs, laptops with wireless interface(s). Due to some of the MANET inherent characteristics such as mobility, multi-hop and ad hoc, manual configuration...
Ethernet has grown since its inception by Metcalfe in 1976. Its growth as a wide-area networking technology has led to a need for operations, administration and maintenance (OAM) requirements. The expansion of this technology into the domain of service providers, where networks are substantially larger and more complex and the user-base is wider, makes the idea of robust and reliable connectivity,...
The Kiwi system is targeted at making reconfigurable computing technology accessible to software engineers that are willing to express their computations as parallel programs. Our kiwic compiler takes .NET assembly language with suitable custom attributes as input and produces Verilog output which is mapped to FPGAs. In this brief paper, we describe attributes used to mark up I/O nets, embed assertions,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.