The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nanotechnology becomes reality paving the way for many new applications. In nanonetwork system, each nanosized device is equipped with limited capabilities and is dedicated to a basic task but the combination of the numerous devices actions results in high-level functions. In this context, large number of devices concentrated in a limited area must exchange data using wireless links. Spread in Time...
Location-based Services (LBS) are a kind of important applications which identify the resources close to users, i.e. return the nearest gas stations, restaurants, banks etc, as well as identification of the optimal route to reach destination according to user position. However, privacy threat is the inherent problem in LBS as the location data is very effective for service provisioning. Thus, we focus...
Internet has become a global means of communication, turned our reality upside down. It has transformed communications, to the level that it is now our chosen standard of communication. Although there are many ways to protect information from undesired access, Quantum cryptography can be used to unconditionally secure data communications by applying the laws of quantum physics which overcomes the...
This paper investigates heavy industry power distribution systems and identifies a need for time synchronization within the network. Various methods of time synchronization are presented with pros and cons to each method. The goal of this paper is to educate the reader of various forms of time synchronization and how they can be applied in their industrial application.
Low-power embedded platforms are widely used in various data collection scenarios to capture physical world phenomena in micro-scale. Given that many applications require long operation times, it is important for nodes to employ various schemes to maximize their lifetime. Within the sensor network research community, schemes such as low-power listening (LPL) and low-power probing (LPP) have been actively...
TCP Incast is one of the typical datacenter problems that may affect network efficiency in a many to one transmission session, in which the completion time of the whole session depends on the last finishing flow. In this paper a session-aware mechanism is proposed that intelligently chooses only the leading flows to slow down at the presence of congestion, so the lagging ones will have a higher chance...
The packet rejection at destination under asynchronous transmission in high-speed optical fiber networks is examined in this study. Especially, we propose an asynchronous transmission protocol and a station network interface suitable for local area networks of passive star topology aiming to reduce the rejection probability at destination due to the receiver collisions. We assume that each station...
Extending input/output (I/O) bus networks over wireless Ethernet is expected to provide an effective way of achieving communication between multiple hosts and I/O devices. However, because connections on wireless Ethernet are lossy and unreliable, retransmission of I/O packets increases transmission latency that exceeds the limits of the I/O bus protocol. In this paper, we propose an Ethernet transport...
Strict Priority Queuing (SPQ) is a widely used queuing method for applying preferential service on edge networks. SPQ, in presence of persistent high priority traffic, is known to behave in a very hostile manner toward low priority flows, causing them to experience poor TCP performance. This often leads to substantial packet losses, which consequently results in aggressive reduction in the congestion...
This paper focuses on the simple radio frequency transceiver model of the sensor node. We have combined the effect of realistic analytical model with the HEED and H-HEED protocol for wireless sensor network. Under this impact, the performances of the HEED and H-HEED protocol have been evaluated.
The work presents in this paper proposes to solve the existing issue of initial qubit (primary key) lost due to an attack by eavesdropper, causing the quantum bit error rate (QBER) to be high which may leaked enough information to the eavesdropper during secret key sharing in network communication. We intend to greatly reduce the QBER to a reasonable percentage that will make the key sharing communication...
Distance bounding protocols are secure protocols to determine an upper bound to the distance between two devices. These protocols have shown to be useful for many tasks, from proximity verification to secure positioning. Unfortunately, real distance bounding protocols hardly fulfill the claimed property. Attacks at the PHY layer may cause significant reductions on the estimated upper bound. These...
Examination system is the pivotal point around which the whole system of education is based. Examination system comprises of number of laborious and error prone tasks, needing immense resources and time. Numerous electronic examination systems have been designed with the intent of improving the efficiency of current examination system. However, the existing e-examination systems are usually designed...
In cognitive radio ad-hoc networks, two users rendezvous on a common available channel to realize communications. Most existing rendezvous papers focus on success-guaranteed channel-hopping sequence design. However, the theoretical rendezvous successful rate may suffer from the available channel status changing, collisions on channels, congestion at users, and target users unavailability in practical...
With the rise and extensive usage of Bit coin, a peer-to-peer electronic cash system beginning at 2008, the number of transactions is growing. In order to analyze the activity in this currency system, we present a parallel analysis approach for meeting the need of building the transaction graph of this financial system. In order to test the performance and the realistic possibility of our approach,...
SCTP (Stream Control Transmission Protocol) has multi-homing features, but SCTP implementations do not actively use this feature. If the active path is disabled or packets are lost SCTP uses alternative paths; this multi-homing feature can be used to transfer data concurrently. In this study, data has been sent from these multi-homing paths and load balancing has been implemented on these paths, with...
This paper presents a series of labs in where the performance of practical WLAN technology is evaluated by using PCATTCP software. The experiments can be summarized as follows: Measurement of the throughput as a function of the number of users and network configuration, offered load (sharing efficiency/ fairness). Comparison between the throughput of TCP protocol, and the throughput of UDP Protocol...
Low-Voltage Differential Signaling (LVDS) evolves over the last decade to meet specific requirements such as Bus LVDS and Multipoint LVDS. This paper first presents a method to implement the multi-channel LVDS in the parallel RapidIO protocol using CPLD device and VHDL language, followed by a detailed discussion of the data line transmission error generated during the process of high-speed data transportation...
In this paper we describe a complete Radio Frequency Identification (RFID) system, reader and tag, using the approach of software defined radio (SDR). We use the open source GNU Radio development toolkit to implement this SDR. The advantage of this approach is the possibility of to implement and test RFID applications using a flexible software platform. RFID readers in SDR have already been developed...
We first introduced the multicore specific optimization modules of two common MPI implementations â" MPICH2 and Open MPI, and then tested their performance on one multicore computer. By enabling and disabling these modules, we provided their performance, including bandwidth and latency, under different circumstances. Finally, we analyzed the two MPI implementations and discussed the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.