The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the past, several proposals to support fast handover in wireless mesh networks have been published. However, most handover extensions are only concerned with moving stations that are unaware of the used routing protocol and assume relatively stationary routing nodes. In this paper we propose an extension to the BATMAN routing protocol to support seamless handover of routing nodes in infrastructure...
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) have been standardized so far, namely (Objective Function zero (OF0), and the Minimum Rank with Hysteresis Objective Function (MRHOF). However, these particular objective functions are used to build a topology where bottleneck...
In a Wireless Sensor Network (WSN) Nodes are distributed to monitor an area of interest such as a military battlefield, and transmit their data to in-situ Base-Station (BS) through multi-hop paths. In addition to collecting and processing the sensor data, the BS performs network management tasks. Due to such an important role, an adversary would try to locate the BS and target it with Denial-of-Service...
In the past few years, the Internet of Things is driving the need for extending the Internet to constrained devices, including sensors and actuators. The IPv6 Routing Protocol for Low power and lossy networks (RPL) is appearing as an emerging IETF standard especially tailored for Low Power Area Networks (6LoWPAN). RPL constructs a Directed Acyclic Graph (DAG) according to an objective function that...
The Locator/Identifier Separation Protocol (LISP) was specified a few years ago by the Internet Engineering Task Force (IETF) to enhance the Internet architecture with novel inbound control capabilities. Such capabilities are particularly needed for multihomed networks that dispose of multiple public IP routing locators for their IP networks, and that are willing to exploit them in a better way than...
In ad hoc networks, terminals form a network with decentralized and self-organizing manners. Although this can surely extend its potentials, it also suffers from unstable and unreliable communication environments. As concerns this, a broadcast-based routing protocol called opportunistic routing (OR) has been proposed. ORs do not establish any specific route from a source terminal to a destination...
RPL is the routing protocol for low-power and lossy networks and has recently been considered as the standard routing protocol for IPv6 based wireless sensor networks using the IEEE 802.15.4 protocol. RPL is oriented towards supporting multi-point to point communications in which multiple points typically communicate with one sink node that considered the root of the RPL tree. RPL aims to minimize...
The design of path allegiance metric (PAM) based routing protocol leverages upon a trust management framework proposed in our earlier works. The PAM routing protocol strives to provide data plane security in mobile ad hoc network and its working is based upon the belief, disbelief and uncertainty components of the trust management framework which assigns a trust metric based upon the packet forwarding...
In the service oriented, customer experience centric and customer changing demand driven market environment, ICT is becoming the leading enabler and partner of the modern enterprise business. More and more companies are transformed into more or pure digital style and virtual organized enterprises that are enabled and supported by a group of business oriented and microservice based applications and...
With the ever-shrinking global geometries on a die and the concomitant rise in the complexity of interconnections in an on-chip network (NoC), the links used therein often suffer from various manufacturing defects such as shorts. These defects not only cause logical or functional errors but also give rise to various other system level failures such as duplication, misrouting, or dropping of a packet,...
This paper presents a distributed on-line test mechanism that detects stuck-at faults (SAFs) in the channels as well as identifies the faulty channel-wires in an on-chip network (NoC). The proposed test mechanism improves yield and reliability of NoCs at the cost of few test clocks and small performance degradation. Additionally, the mechanism is scalable to large-scale NoCs. We study the impact of...
Wireless Sensor Network (WSN) is considered as one of the networks that are usually used in a harsh environment. In most cases, a WSN consists of a large number of sensor nodes, which are deployed in a particular environment for the gathering of information, and for sending it to a base station (BS). Usually, sensor nodes have limited energy resources since it is impossible to recharge and change...
Exascale networks are expected to comprise a significant part of the total monetary cost and 10-20% of the power budget allocated to exascale systems. Yet, our understanding of current and emerging workloads on these networks is limited. Left ignored, this knowledge gap likely will translate into missed opportunities for (1) improved application performance and (2) decreased power and monetary costs...
Software Defined Networking (SDN) provides efficient network control and management by introducing a logically centralized control plane. However, outsourcing of the control plane intelligence to an SDN controller requires reliable switch-to-controller connection.
Wireless Mesh Networks provide a reliable, robust and resilient platform for broadband access. Main benefits of using Wireless Mesh Networks are their low cost, robustness, self healing, and self configuring properties. In Wireless Mesh Networks, routing metric determines the path from source to destination. Wireless link conditions can be affected by a number of factors including interference, congestion,...
In this work, we propose a novel quality link metric; Bandwidth adjusted Inverse ETX (BIETX) for Static Wireless Multi-hop Networks (SWMhNs). The proposed metric considers two path selection parameters into account i.e., packet delivery ratio and link capacity. For computing packet delivery ratios in BIETX, the mechanism of Expected Transmission Count (ETX) is adopted. On the other hand, we take two...
Wireless Sensor Networks (WSNs) become one of the most common technologies that can be deployed in various domains. However, the networks suffer from many problems caused by the limited sensor resources and the harsh environments where these networks are deployed. Many algorithms have been proposed to manage data routing while respecting the specificity of such networks. One of the known proposed...
A mobile ad hoc network (MANET) is a collection of autonomous mobiles nodes forming a temporary network without using any existing infrastructure or centralized administration. MANETs are characterized by a dynamic topology which makes routing a critical task. Conventional routing protocols are mainly based on shortest paths computation which could be not effective facing the mobility of nodes. Therefore,...
This paper is devoted to the numerical investigation of the availability improvement method at cloud service systems. It was also proved that using proposed approach and algorithm promotes us to determine structural-topological changes operatively in dynamics. It allows improving workload balancing in the servicing nodes, avoiding the proximity of workflows and components of complex services to structural...
Recent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.