The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper provides a cross-layer strategy which will combine nodes optimal coverage radius and routing complexity in wireless Ad Hoc networks that using Hop-count routing protocol. Assuming that channel state information(CSI) for all of links is available and constant. Every node is working in half-duplex model and using different channel to guarantee that there is no interference to others. We first...
Network monitoring is an important way to ensure the security of hosts from being attacked by malicious attackers. One challenging problem for network operators is how to distribute the limited monitoring resources (e.g., intrusion detectors) among the network to detect attacks in a cost-effective manner, especially when the attacking strategies can be changing dynamically and unpredictable. To this...
Opportunistic routing protocol is proposed for broadcast and lossy characteristics existing in wireless multi-hop networks. Compared with traditional routing protocols, opportunistic routing protocol can bring higher data transmission abilities. Traditional opportunistic routing protocols have some problems, such as too large forwarding candidates set, too high protocol calculation expense and possible...
A programmable control system for wavelength locking WDM channels on microring arrays is used to demonstrate arbitrary demultiplexing and selection of fast switchable wavelengths. Successful data measurements verify the functionality within an interconnection network implementation.
There is a need for robust and effective trust management. Different security problems result in different requirements to the design of trust management, and the existing attacks in trust management for security are yet to be solved. In this paper, we first propose a framework to classify desired properties of trust management for each type of security problems. We then investigate typical representative...
This paper presents the design, implementation and evaluation of SprintNet, a novel network architecture for data centers. SprintNet achieves high performance in network capacity, fault tolerance, and network latency. SprintNet is also a scalable, yet low-diameter network architecture where the maximum shortest distance between any pair of servers can be limited by no more than four and is independent...
Behavior management and performance evaluation are two significant issues in the design and operation of automated manufacturing systems (AMS). The former constrains their dynamics so as to avoid improper behavior and eliminate downtime, while the latter aims to evaluate cycle time. Although abundant research has been conducted on each issue independently, researchers rarely address both in a correlative...
An urban vehicular network is a typical type of Delay Tolerant Network (DTN). Based on the routing analysis in a DTN, we first put forward a Minimum Delay and Hop Algorithm (MDHA), which requires both historical and future information on all the vehicles in the network. Since MDHA is not practical, we then design a Traffic Aware Routing Algorithm (TARA), which uses the historical and the real-time...
Cognitive Radio networks which consist of primary and secondary networks are widely considered efficient systems to solve the serious problem of spectrum scarcity. The data transmission of secondary network is subject to the spectrum opportunity provided by primary network. In this paper, we investigate expected density of progress of secondary network with three routing strategies which are farthest...
We propose a novel discrete spectrum-scan routing scheme in flexible optical networks. Based on spectrum discretization, this scheme achieves optimal routing in a gridless network scenario while reducing the routing complexity from exponential to polynomial.
Routing is an essential operation in wireless sensor networks. Most existing routing protocols are designed for homogeneous sensor networks. Recent studies show that a homogeneous sensor network has a poor fundamental performance limit. To achieve better performance, we adopt a Heterogeneous Sensor Network (HSN) model. In this paper, we present an efficient NEar-optiMal rOuting (NEMO) protocol for...
With the rapid progress of the whole computer technology, the wireless sensor networks gestated by the MEMS, wireless communication and low-consumption embedded technology construct the blueprint of the pervasive computing gradually for the people. This paper syncretizes the core thought of the context-aware technology and the WSN routing protocol with bringing forward the protocol CATRP adapting...
Routing problems based on cooperative transmission for multi-hop wireless Ad hoc network have been studied in this paper. Inspired by Multipoint Relay computation, a cooperative routing algorithm is proposed in Ad hoc network, which select cooperative neighbors for cooperative transmission by checking whether the links between the node and its neighbors are symmetric or not. The performances of the...
This paper analyzes the problems in the wireless network caused by using minimum hop count as its routing metric, and discusses ETX metric which invented by De Couto to solve these problems and the shortage of it in mobile environment, then modifies it by relatively counting as to make it suitable for such environment. This paper uses the new ETX as a metric for the OLSR routing protocol, and proves...
Shrinking CMOS feature sizes and the integration of novel nanotechnologies onto silicon platforms are both likely to increase fabrication defects. As a result, on-chip networks become more and more irregular due to defects and it becomes more challenging to map computation and data onto the networks. One way to overcome this challenge is to configure the irregular network into a more conventional...
Production split and merge are widely used in many manufacturing systems to increase production capacity and variety, improve product quality, and carry out scheduling and control activities. In this paper, we present analytical methods to analyze such systems with exponential machine reliability models, operating under circulate, strictly circulate, priority and percentage split/merge policies.
A scheme based on a modified multi-constrained k-shortest path algorithm and a cost function with high efficiency for backup path selecting is proposed to provide path protection under multi-constraints. Simulation results demonstrate its significant superiority in restoration path-finding capability for QoS routing.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.