The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Peer-to-peer file sharing applications are increasingly popular and they enable users to share various files with high scalability. However, in intermittently connected mobile network environment, existing file sharing systems are hindered by the lack of node stable connectivity and constant network topology change. We propose a social network based file sharing system in mobile P2P networks. It takes...
As part of a project to develop a user-centered network measurement platform that limits impediments to participation, this work focuses on using the execution of a signed Java applet for home network measurement. We have developed a Java applet tool to understand the capabilities of such a tool for measuring characteristics of a user's network environment from the browser. This paper reports on the...
This paper proposes a real-time allocation scheme for photonic networks that use wavelength division multiplexing (WDM) and optical time division multiplexing (OTDM) technologies in the backbone and ring regional networks, respectively. A frame that is used for transferring data and control information in a ring regional network takes only one round to complete data allocation processing, instead...
Due to the high cost of construction and maintenance of infrastructure, engineers and researchers have focused their investigations on wireless mesh/relay networks with lower cost and high scalability. For current wireless mesh/relay networks, the end-to-end QoS guarantee is an important functionality because the demand for real-time multimedia communications has recently been increasing. Therefore,...
The energy efficiency is a very important feature for WSN (Wireless Sensor Network) routing protocol because of the energy limitation of nodes. In traditional LEACH protocol, a dynamic cluster head election algorithm (DCEA) is used in the phase of cluster head election phase. The number of cluster heads (CHs) elected in every round is not always optimal due to the irrational self-selected probability...
Performance analysis and functionality testing are major parts of developing distributed software systems. Since the number of communicating software instances heavily influences the behavior of distributed applications and communication protocols, evaluation scenarios have to consider a large number of nodes. Network emulation provides an infrastructure for running these experiments using real prototype...
We propose target tracking with monitor and backup sensors in wireless sensor networks (TTMB) to increase the energy efficiency of the network and decrease the target capturing time while considering the effect of a target's variable velocity and direction. The approach is based on a face routing and prediction method. We use a state transition strategy, a dynamic energy consumption model, and a moving...
We propose a novel tag selection algorithm to improve the efficiency of tag arbitration in RFID systems. Based on the probability that a given tag is located in the sensing range of the reader, our algorithm involves two steps. First, tags with higher probabilities are selected and directly arbitrated by their IDs, in order to eliminate the collisions caused by multiple tag replies and reduce the...
Computation offloading can extend the battery lifetime of a portable device by migrating computation to grid- powered servers. The server may charge the portable device for the computation performed, thus providing offloading as a service. The portable device has to trust that the server has indeed performed the computation as claimed. We propose a protocol to establish trust for computation offloading...
In this paper, we report our experience in working with network address translators (NATs). Traditionally, there were only 4 types of NATs. For each type, the (im)possibility of traversal is well-known. Recently, the NAT community has provided a deeper dissection of NAT behaviors resulting into at least 27 types and documented the (im)possibility of traversal for some types. There are, however, two...
This paper presents a new family of Interference routing metrics, ILR (interference level routing), ILRk (interference level routing to the power of k) and ILRth (interference level routing with a threshold value) for wireless ad hoc networks. Unlike conventional routing metrics, such as shortest path, these proposed routing metrics have been replaced with weight metrics that take into account the...
Wireless sensor networks are widely used for detection and surveillance applications. In this paper, we develop a novel sensor deployment algorithm by formulating the deployment problem as an optimal control theory problem. Specifically, the problem at hand is modeled as a linear quadratic regulator. In contrast to prior efforts, that mainly rely on heuristics, our formulation offers a complete theoretical...
When multiple flows using different versions of Transmission Control Protocol (TCP) exist together on a network, they seriously affect each other. One method to overcome this problem is to control such flows individually by identifying the TCP versions of each flow. Thus, for this process, it is necessary to identify online which TCP version is used in each flow. In this paper, we first focus on a...
The use of network-based streaming applications such as YouTube and BBC iPlayer is rapidly increasing. These applications consume data at very high rates and so quality- of-service (QoS) support is necessary to ensure that they do not stall. Since the access pattern of streaming applications is highly sequential, prefetching can be employed to improve overall performance. For network access, clustering...
We discuss a modular simulation framework to investigate the energy efficiency of different routing protocols used in resource constrained wireless sensor networks. Our simulation framework provides a flexible tool to build diverse protocols by combining existing building blocks at different layers and to analyse how several factors such as routing strategies, MAC protocols, link and node failures,...
Recently, sensor network systems are gradually moving into heterogeneous designs, incorporating a mixture of variety kinds of sensor nodes. Many routing protocols have been proposed for sensor networks but most of them did not consider the non-uniform energy drainage caused by many-to-one traffic. In this paper we propose a clustering method for wireless sensor networks with heterogeneous node types...
Protected working lightpath envelope (PWLE) is a promising path-oriented protection strategy developed by us to provision survivable services for dynamic traffic. Partitioning the network capacity into a working layer and a protection layer by means of lightpath-protecting p-cycles, PWLE possesses the advantages of high capacity efficiency, avoidance of wavelength conversion, good blocking performance...
We analyze two commercial peer-to-peer (P2P) video streaming systems via active measurements: a tree-based overlay multicast and a mesh-based overlay. Our controlled IP test-bed allows us to reproduce near-identical network conditions for both the systems and to test them under varying network conditions and peer behavior. We report on the bandwidth efficiency of these P2P video streaming systems...
In this paper we consider the construction of a large-scale, highly available and secure overlay network to enable mission-critical communication between emergency personnel at a disaster area and their coordinating agencies across the Internet. This network is designed to be secure against network-based failures and external attacks including denial of service (DoS) attacks. We design several protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.