The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nodes in mobile networks are usually unevenly distributed over space. Several dense clusters of nodes are interconnected by a few nodes in sparsely occupied areas. Removing vital nodes along such bridges would partition the network and severely reduce the overall connectivity. Consequently, detecting and protecting those few vital nodes is crucial for keeping the network operational. In order to achieve...
In Internet networks, monitoring is necessary to guarantee the performance of the services. In this paper, we review the state-of-the-art monitoring architectures proposed for multi-domain networks. We note that these architectures do not support measurement configuration that enables the providers to perform flexible multi-domain measurements. Therefore, we present our proposal for the configuration...
Network planning is an essential part of any wireless network deployment. The prices of commercial network planning tools are expensive, making them inaccessible to many researchers and organizations with small networks. However, in house development of network planning tools are not as hard as it was used to be. The freely available web maps and rapid development capability of MATLAB Graphical User...
We evaluate the outage probability and the spectral efficiency of cooperative multi-hop networks, where L relay nodes are placed at each hop and an MDS (Maximum Distance Separable) code of coding rate 1/L is employed at the link-layer. A codeword of the MDS code is partitioned into L blocks. When each relay node receives two or more codeword blocks of the MDS code, it aggregates the blocks, corrects...
One-way delay (OWD) is an important measurand for network management. It can indicate routing problems, network congestion, and is useful for tracking down application problems to network effects. While active measurements deliver high accuracy, measuring OWD actively on all paths of large networks results in high effort. Thus, passive measurements are attractive. Our approach for measuring OWD is...
As defined in the 3rd Generation Partnership Project specifications, a Universal Mobile Telecommunications System (UMTS) user device has to carry out two authentication steps to access multimedia services in IP Multimedia Subsystem (IMS). The first authentication step is used to gain UMTS General Packet Radio Service (GPRS) network admission. The second authentication step is the IMS authentication...
Industrial Wireless communications is emerging technology after the Fieldbus in industrial field. For industrial control application with wireless industrial technologies, the WIA-PA standard defines the protocol suite, system management, gateway, and security for low-data-rate wireless connectivity with fixed, portable, and moving devices supporting the limited power consumption requirements. In...
Many trust management systems implicitly assume that the required credentials can be obtained without difficulty. In consequence, it is necessary to have a convenient way to discover desired credentials in the network for successful deployment of trust management systems. Obviously, in distributed environments, this assumption may not be easy to achieve due to failure of different components. In this...
This paper presents a new MAC (Medium Access Control) spoofing detection algorithm in IEEE 802.11 networks. The proposed algorithm utilizes PLCP (Physical Layer Convergence Protocol) header of IEEE 802.11 frames to differentiate an attacker station from a genuine station. PLCP header of IEEE 802.11 frames maybe change for each frame. It depends on transmission rate adaptation algorithm which is designed...
SECMPEG selectively encrypts data to protect MPEG video streams. However, this scheme is inefficient because it encrypts the whole I-frames whose size is relatively larger than B/P-frames. In this paper, we propose a more efficient selective encryption approach which exploits the error propagation property in MPEG2 standard. Our experimental results show that the proposed approach can reduce the execution...
Wireless Sensor Networks (WSN), consisting of a large number of sensor nodes connected through wireless medium has emerged as a ground-breaking technology that offers the unprecedented ability to monitor the physical world accurately. Because of resource-constrained nature of sensor nodes, a number of issues have emerged out of which energy-efficiency is an important matter of concern. In this work,...
It becomes so important to observe a wild life for obtaining not only knowledge of its biological behaviors but also interactions with human beings in terms of geoenvironmental investigation and assessment. A sensor network is considered to be a suitable and powerful tool to monitor and observe a wild life in fields. In order to monitor/observe seabirds, a sensor network is deployed in Awashima island,...
Limited bandwidth remains a pressing issue for wireless sensor networks (WSNs) due to the half-duplex property of the sensor radio and the broadcast nature of wireless medium. Designing multi-channel MAC protocol attracts the interest of many researchers as a cost effective solution to meet the higher bandwidth demand for the limited bandwidth in WSN. In this paper, we present a scheduled-based multi-channel...
Analytical studies of Medium Access Control (MAC) layer protocols can be used to improve the performance of multi-hop Wireless Sensor Networks (WSNs) in the presence of hidden stations. The selected MAC layer protocol should conform to the distributed nature of the WSNs. The IEEE 802.11 MAC layer with Distributed Coordination Function (DCF) is well suited to WSNs. Analytical studies of IEEE 802.11...
In most real-life scenarios for Ambient Intelligence, the need arises for scalable simulations that provide reliable sensory data to be used in the preliminary design and test phases. This works present an approach to modeling data generated by a hybrid simulator for wireless sensor networks, where virtual nodes coexist with real ones. We apply our method to real data available from a public repository...
Applications of wireless multimedia sensor networks (WMSNs) require high data rates to enable delivery of quality video at any channel conditions. In order to improve the performance of video transmission over ultra-wideband (UWB) WMSNs, we first propose an optimum group-of picture bit-stream partitioning algorithm for unequal error protection (UEP) of video signals. To further enhance the proposed...
A low-cost collaboration architecture for web content distribution, that aims to improve all stakeholder's interests, is presented. A peer-to-peer (P2P) contribution among the end users layer is suggested, in order to increase download rates and reduce server traffic and resource usage. In addition, the Internet Service Providers (ISPs) concerns are also considered, with an ISP-aware connection strategy...
Existing network operator-friendly P2P traffic control techniques like P4P argue that network operators can reduce inter-domain traffic while peer-to-peer (P2P) applications can improve their performance through the traffic localization. However, the existing work has not addressed how the traffic localization affects an intra-domain traffic control in detail. In fact, not considering the impact on...
In general, IPTV is defined as a multimedia delivery service and it is extended from the VoD service by unicast to live TV service by multicast. In the live TV environment, the QoE of IPTV service includes convenient user interfaces, quality of audio/video, and response time. The channel zapping time is one of the most important factors in QoE, and there have been many researches to improve it. Especially,...
P2P video streaming is a cost effective and scalable alternative for client-server based video delivery over the Internet. In P2P video streaming schemes, the Internet peers contribute their bandwidth for data dissemination in a multicast group. Since the performance of a P2P streaming system is dependent on contribution of the group members, free riders is one of the main challenges of such systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.