The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our goal is to maintain 1+1 path protection as much as possible after a single failure occurs for ensuring carrier-grade reliability. An obvious approach is preparing a third path that is disjoint with the primary and backup paths, but applicability to actual networks with this approach is extremely restricted. From our evaluation, the recovery ratio for reconstructing 1+1 path protection decreases...
Wireless Sensor Networks (WSNs) are highly distributed networks consisting of a large number of tiny, low-cost, light-weight wireless nodes deployed to monitor an environment or a system. Each node in a WSN consists of three subsystems: the sensor subsystem which senses the environment, the processing subsystem which performs local computations on the sensed data, and the communication subsystem which...
Wireless sensor and actor network (WSAN) is formed by the collaboration of micro-sensor and actor node. Whenever there is any special event i.e., fire, earth quake, flood or enemy attack in the network, sensor nodes have responsibility to sense it and send information towards an actor. The actor node is responsible to take prompt decision and react accordingly. Sensor nodes have limited resources...
One of the main privacy problems in network communication is lack of anonymity. Much work has been done on this problem in recent years. However, it is a challenge to improve anti-attack ability and degree of anonymity. A new anonymous multiplexing communication protocol, based on IPv6, is proposed in this paper. It utilizes the secret sharing technique to establish multiplexing communication, solves...
Among transport layer protocols Nandita et al, in their work has shown that rate control protocol (RCP) is superior in its performance as compared to Transmission Control Protocol (TCP) and explicit control protocol (XCP), and emulates processor sharing in a much better way. A lot of work has been done for the improvement of RCP but the performance improvement for lossy networks is still an open issue...
In a mobile ad hoc network, nodes that are close to one another may need to have exclusive access to a shared resource, which means that only one node can access the resource at the same time. This mutual exclusion algorithm requires nodes to communicate with only their current neighbors, this paper provides a solution to this problem and it is an extension to mobile networks of the dining philosopher's...
In this paper we focus on the concept of IEEE 802.11 DCF error frame model. Based on the analysis of the model in detail, we point out the error of the simulation algorithm of the DCF error frame model in QualNet simulation environment. Furthermore, we modify the simulation algorithm in QualNet strictly according to the specifications of the DCF error frame model. The simulation results show that...
New energy efficient network design algorithm and tool for low power consumption named MIDORI is proposed. Network is used minimum set of nodes and links which can transfer all communication traffic under QoS restriction. QoS restrictions are included hop limit, bandwidth limit reliability and stability. Set-covered problem is applied to this algorithm and all links are modeled as ??1?? for on and...
Wireless mesh networks (WMNs) have gained considerable attention in the recent years due to fast deployment, easy maintenance and low upfront investment compared with traditional wireless networks. Since WMNs are typically used as wireless backbones, they have the nature that the wireless communication is not stable. Hence, it is significant to protect them against link or node failures. Distribution...
Wireless mesh networks (WMNs) have gained considerable attention in the recent years due to fast deployment, easy maintenance and low upfront investment compared with traditional wireless networks. Since WMNs are typically used as wireless backbones, they have the nature that the wireless communication is not stable. Hence, it is significant to protect them against link or node failures. Distribution...
In this paper, we present a novel algorithm of connected dominating set based clustering in sensor networks. Considering the characteristics and location information of nodes in sensor networks, a modified directed transfer model of sensor networks, and a novel clustering algorithm based on area is proposed in this paper. Theoretical analyses and simulation results show that, the above new methods...
In order to prolong the network lifetime, energy-aware protocols should be designed to adapt the characteristic of wireless sensor networks. Clustering is a kind of key routing technique used to reduce energy consumption. In this paper, a new clustering algorithm MNLC (Maximum Network Lifetime Clustering Algorithm) for energy heterogeneous sensor networks is proposed. The algorithm uses distributed,...
Since sensor network lifetime shows a strong dependence on battery lifetime, power consumption is a critical concept in design of sensor network. For the sensor network to operate successfully both requirements of sensing coverage and network connectivity should be met. Other research have joined coverage and connectivity problem at the same time. Sensing coverage is achieved by dividing sensor nodes...
Clustering sensor nodes is an effective technique to prolong the lifetime of wireless sensor networks. In this paper we investigate the impact of heterogeneity of nodes, in terms of their energy and data amount, and propose a novel adaptive, distributed, energy efficient clustering algorithm AEEC for wireless sensor networks, which better suits the heterogeneous sensor networks. Our approach elects...
BGP-4 is the routing protocol which holds the Internet together. Additionally and in the absence of a better solution, it is being used for traffic engineering purposes. In the absence of standardised procedures, each autonomous system in the Internet implements traffic engineering based on non-collaborative goals and using trial and error techniques. This paper analyses trial and error traffic engineering...
Data gathering is a vital operation in wireless sensor network applications, which necessitates energy efficiency techniques in order to increase the lifetime of the network. Similarly, Clustering is an effective technique that is implemented to improve the energy efficiency and network lifetime in wireless sensor networks. This paper proposes an Energy Sorting Protocol (ESP) architecture, which employs...
Data fusion techniques can combine data and related information to achieve more accurate and reliable data. However, data fusion is not considered in ZigBee protocol, which also limits the range of application of ZigBee protocol. This paper discusses data fusion algorithms in ZigBee application layer and radio frequency communication times are remarkably reduced with the help of data fusion algorithms...
To improve the efficiency of reliable broadcast/multicast MAC protocol in wireless multi-hop network, a location aid algorithm to eliminate redundant nodes was brought forward. Using the neighbor geographical location information, according to the principle of equivalent collision region, the algorithm could reduce redundant nodes from receivers, which is unnecessary for acknowledgement. Thus, the...
Data sending model in cluster has great impact on life of wireless sensor networks. In this paper, the data sending models were researched and a novel CIBT (Confidence Interval Banding Taboo-level) of data aggregation in cluster was formally described, designed, implemented and evaluated. The algorithm includes two stages. In first stage, the sampling data is used to set confidence interval to compare...
In recent years, sensor networks have been proposed to improve the detection level of natural disasters (e.g. volcanoes, tornadoes, tsunamis). However, this technology has several issues that need to be improved. We, therefore in this paper, focus on two main issues: coverage and routing. For coverage problem, we introduce a new approach for obtaining a static covered network in 3-D environment. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.