The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: Ethernet simulation; signal processing theory; wireless communication; communication switching; routing; distributed communication; quality of service; peer-to-peer network; telecommunication security; VoIP; mobile networking; protocols; multimedia communication; multicast communication; network management; and reliability.
The accepted papers covered a wide range of networking-related topics spanning from protocols, architectures, P2P, network performance, QoS/reliability, signal processing, communications theory, security, multimedia/multicast, network management and control, and wireless networks. We believe that the ICN 2009 contributions offered a large panel of solutions to key problems in all areas of global knowledge...
This paper shows the influence of network aspects and MPI implementation on the performance of an Ethernet based computer cluster. Following factors are considered: message size, number of nodes, node heterogeneity, network speed, switching technology and MPI implementation. The basic index of performance is throughput measured with Intel MPI Benchmark. This paper shows that there is a specific message...
The ns-2 simulator is one of the most popular and widely used discrete event network simulators. Its usage of the general purpose Tcl scripting language accompanied with a wide range of networking technologies allows users to easily create complex and differentiated simulation scenarios. The main limitation of ns-2 is its lack of support for multiprocessing, especially considering that the multi-core...
In recent years, the indoor positioning systems using the existing wireless local area network and location fingerprinting schemes are the most popular systems. The accuracy of the system is the most important indicator. In this paper we present some experimental results to explore different environment parameters that impact localization error.
In this paper, the implementation details of an embedded Linux for limited resource devices are provided. Due to lack of an actual hardware to test the implemented embedded Linux, a simulator for development work had to be built. Thus, the implementation details of the simulator as well as an analysis of simulation results are described. Moreover, some new ideas that will be used in our future research...
Recent works on modeling the Internet topology have highlighted how the complexity of relationships between Autonomous Systems (ASes) can not be oversimplified without sacrificing accuracy in capturing route selection. Such a shortcoming can mislead the understanding, hence the prediction, of the BGP (Border Gateway Protocol) behavior. In particular, models that assume an AS to be an atomic entity...
The self-similar nature of bursty Internet traffic has been investigated for the last decade. A first generation of papers, approximately from 1994 to 2004, argued that the traditionally used Poisson models oversimplified the characteristics of network traffic and were not appropriate for modeling bursty, local-area, and wide-area network traffic. Since 2004, a second generation of papers has challenged...
The proof of capacity theorem assumed that the symbols are of infinite time duration. Since the infinite time symbols are not meaningful and is not used in the existing technology, in this paper we decided to prove it over finite time interval. The result shows that the new capacity of a band limited channel explicitly depends on the sample rate. This new approach helps us to show that all shift keying...
An effective approach in the design of two-dimensional notch FIR filters for image preprocessing useful in image communication is presented. The completely analytical design method is based on Zolotarev polynomials. Closed form formulas for the filter design are presented. One example demonstrates the design procedure. An application of the 2-D notch FIR filter for image preprocessing is presented.
The application of mathematical analysis to the study of wireless ad hoc networks has met with limited success due to the complexity of mobility, traffic models and the dynamic topology. A scenario based UMTS TDD opportunistic cellular system with an ad hoc behavior that operates over UMTS FDD licensed cellular network is considered. In this paper, we describe how ad hoc opportunistic radio can be...
In the last decade, since the advent of advanced wireless technology, wireless mobile ad hoc networks have grown in both size and complexity, and their applications are also expanding at a great rate due to their many advantages, principally mobility and the fact that they do not require a fixed supporting structure. Security, routing protocols, and connectivity are major issues with mobile ad hoc...
Impulse radio ultra wide band (IR-UWB) is a promising technology to address wireless sensor network (WSN) constraints. However, existing network simulation tools do not provide a complete WSN simulation architecture, with the IR-UWB specificities at the physical (PHY) and the medium access control(MAC) layers. In this paper, we propose a WSN simulation architecture based on the IR-UWB technique. At...
This paper describes the importance of choosing channels in the wireless local networks (WLAN) performance. The massive use of channel 6, the default channel in most 802.11 networks, usually impacts at least, 100% in the throughput of the network. In some cases, considering the number of 802.11 networks around and the time, the impact can be as high as 1200%. The protocols implemented in the 802.11b/g/n...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.