The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we determine packet scheduling policies for efficient power management in Energy Harvesting Sensors (EHS) which have to transmit packets of high and low priorities over a fading channel. We assume that incoming packets are stored in a buffer and the quality of service for a particular type of message is determined by the expected waiting time of packets of that type of message. The...
This paper presents a mechanism of integrating the concept of reliability with trust management policy in the distributed scheduling algorithms. This algorithm focuses on the distributed computing systems involving collaborative computing. Trust management is achieved with the concept of bidirectional reputation points that are assigned to resource providers and resource consumers. Moreover, concept...
Quality of service requirements and the increasing amount of data transmission demand for efficient protection mechanisms. Existing mechanisms like 1+1 and 1+N path protection offer instantaneous recovery but they suffer from high capacity needs and nodal degree requirements, respectively. The high nodal degree requirement makes an implementation of the 1+N mechanism in transport networks difficult...
Ad Hoc networks are characterized as fast time-varying. Thus, fast distributed algorithm to implement self-management is indispensable, especially for QoS support. In this paper, we propose rate control with QoS support in Ad Hoc networks based on primal-dual interior-point method. We apply Gaussian belief propagation algorithm to compute the Newton step. For implementing distributed computation in...
In highly mobile ad hoc networks the neighbourhood status evolves rapidly. Routing tables which are populated with an “out of date” view of the neighbourhood produce an overhead in the routing process which can affect the QoS of the communication and the stability of the network interconnectivity. To maintain correct network state information, periodic “Hello” messages are often employed. In many...
In this paper, an Urgency-based MAC (U-MAC) protocol, in which sensor nodes reporting urgent health information are given higher priority by cutting-off the number of packet retransmission of sensor nodes with non urgent health information, is proposed. The main consideration of this work is providing Quality of Service (QoS) support in medical wireless sensor networks through differentiating nodal...
Cooperation has played a key role for good service performance in P2P network. However, without a proper incentive mechanism such cooperation cannot be maintained because nodes avoid spending their resources to share files. In this paper, we employ evolutionary game theory to analyze the dynamic evolutionary process of the mechanism. The game models are constructed based on the stag hunt game (SHG)...
End-to-end QoS can be achieved through resource reservations along the communication path between end points. Per flow or per aggregate signaling can be used to set up reservation states in routers or domains on the path. In a mobile environment this reservation process can be very cumbersome, given that (i) the time to set up the resources in the new path is not neglectable and (ii) the resources...
ATM, an ultimate solution of broadband-integrated service digital network (B-ISDN) to provide integrated multimedia services including voice, video, and data, has entered into the limelight with increased demand for such services. Hence, ATM is to be capable of supporting a variety of service classes and providing appropriate QoS according to classes. This may force us to sacrifice low priority traffic...
Due to lack of effective trust management mechanism, there are a lot of deceptive behaviors in P2P networks, which seriously decrease the quality of network services. In order to improve the quality of services (or transactions), this paper proposes a novel trust and reputation model based on similarity evaluation in P2P environments. According to the different context of services, the model gives...
For voice/video applications that are based on Peer-to-Peer (P2P) models, ensuring the end-to-end Quality of Service (QoS) is crucial, especially if users are paying fees. In this paper we propose an End-to-end Performance Inference Technique (EPIT) that uses a prediction-based approach to map the ingress traffic levels of the P2P network to the end-to-end QoS in the network. Furthermore, by coupling...
Peer-to-peer applications require high cooperation among users. User cooperation consists of two aspects, upload and download operations. However, not all users are willing to cooperate, and free-riders with little upload bandwidth are widely seen in the applications. Hereby, we put forward the relation between data block probability and the node distance in static situations. Then we discuss the...
We study the problem of predicting the residual link lifetime (RLL) in MANETs, where the nodes are able to measure the relative distances between them (e.g., by using the UWB technology). We propose a mobile-projected trajectory (MPT) algorithm, whose input is periodically sampled, noisy range measurements between the two nodes of a link. It estimates a projected trajectory, which is then used to...
In this paper, we provide a saturation throughput analysis of the IEEE 802.11 protocol at the data link layer by including the impact of both transmission channel and capture effects in Rayleigh fading environment. Impacts of both non-ideal channel and capture effects, specially in an environment of high interference, become important in terms of the actual observed throughput. As far as the 4-way...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.