The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The NoC Architecture plays crucial role while designing communication systems for System on Chip (SoC). The NoC architecture is improved over conventional bus, shared bus design and cross bar interconnection architecture for on chip networks. In order to improve the Quality of Service, Congestion, Throughput and latency in NoC, Hexagonal node based architecture is proposed in our previous paper[14]...
In this paper, an efficient routing protocol for patient monitoring system in rural areas was proposed using wireless sensor network (WSN) so that the patients can be treated within less time. In this system, a village with GSM network is considered and the people in that village are continuously monitored using AMON sensor, an advanced medical monitoring and alert system. All the AMON's work in ADHOC...
The rapid development in communication approach has brought out new mode of communication. Among the recent developments, adhoc network has emerged as new mode of data communication. The objective of link reliability is a major concern in such network. In this paper, a new approach to route discovery based on network power and operational characteristic is proposed. The approach suggested, results...
In recent past, researchers have shown a lot of interest in Under Water Sensor Networks (UWSNs) because of its application in wide range of domains. UWSN, actually a sub body of Wireless Sensor Networks (WSN), facilitate with radio communication with high-precision of information to a sink node from any of the source node. The Role of any-casting is of significant importance in the context of routing...
In this paper, we propose a disaster-aware smart routing scheme for highly-available information storage systems. Our proposed scheme is based on the concept of Symbiotic Computing to recognize disaster status in Real Space, and provides appropriate routes form Digital Space dynamically. This realizes effective data transmission considering disaster situation and its time variation. We have designed...
The widespread deployment of wireless sensor networks (WSNs) in diverse types of applications motivated the development of strong security measures to protect these networks. The main challenge against deploying strong security algorithms is that WSNs suffer from major constraints in terms of power and computing resources. WSNs impose a primary condition on the design stage that requires any protocol...
Middleboxes are adopted to enhance network functions, e.g., providing security and guaranteeing performance. Some applications require flows to sequence through several middleboxes, and such stateful policy routing is challenging for network administrators. The goal of the management is to distribute well middlebox resources and avoid overloads, thus protecting networks from malfunctioning. Furthermore,...
A distributed and collaborative nature of wireless sensor network cause many challenges to provide security in network. Most of the outsider's attacks are prevented by encryption and authentication technology, but to control insider attacks are difficult. A malicious sensor node causes lot of packet losses, energy wastage and increase in time to reach final destination. In this paper, Enhanced Beta...
The wireless sensor network (WSN) consist of wireless sensor nodes, which are deployed randomly in a surge of unforeseen applications. Topology Control (TC) is the most essential approach used for minimizing energy consumption that extends the in WSN time. Also increases the throughput of the topology and minimize the radio interference. The aim of the proposed context aware topology control is to...
Wireless Sensor Communication Networks have more concern on its routing techniques. Since the WSCNs nodes are battery powered, routing algorithms should assure the concept of energy saving without affecting the other performance metric like Throughput, Delay and Packet delivery ratio etc. The modified AOMDV called as Enhanced Energy Efficient Multipath Routing Protocol ( EEEMRP )is a proposed algorithm...
Problem of Congestion in Wireless Sensor Network (WSN) is an area which draws attention of various researchers in recent years. The challenge lies in developing a model for routing which can find the optimized route on the basis of distance between source and destination and the residual energy of the node. Various models have been proposed and developed from time to time and their merits and demerits...
Underwater sensor networks are gaining prominence in various applications of underwater monitoring and resource explorations. The minimum energy routing algorithms [2] are implemented in underwater oil resource explorations. The topologies already in use are wired where all sensor nodes behave as coordinator, except the PAN coordinator. This may increase the depletion of battery energy, and cost of...
In an ad hoc network, communication distance is limited by the need to minimize the power consumption of the communication nodes. To deal with this, we usually employ multi-hop relaying functions that use the number of hops as a routing metric. But in an environment where traffic density is high, the same relaying node may be used by multiple sending nodes due to their spatial distribution. Data packets...
Software-Defined Networking enables the centralized orchestration of data traffic within a network. However, proposed solutions require a high degree of architectural penetration. The present study targets the orchestration of network elements that do not wish to yield much of their internal operations to an external controller. Backpressure routing principles are used for deriving flow routing rules...
The cloud computing provides better management and utilization of underlying infrastructures with resource virtualization. However, most of existing load balance models are unable to meet the special requirements of business such as the imbalance of peak period, the impact of nonlinear cross between varieties of business. Thus the reliability, scalability and self-organization of service becomes a...
Nowadays Cooperative Network is drastically growing and applied in various applications such as Military, Hospital, and Police etc. In this paper Military application is taken as an example, analyzed the functionality of the cooperative network. Human wearable sensor devices are used to monitor the human motion within a Military Region. In this paper it is aimed to monitor and detect intruders [contradictory...
This paper presents new Software Defined Networking (SDN) control framework for Quality of Service (QoS) provisioning. The proposed SDN controller automatically and flexibly programs network devices to provide required QoS level for multimedia applications. Centralized control monitors state of the network resources and performs smart traffic management according to collected information. Beside QoS...
Network-on-chip (NoC) has recently emerged as a primary paradigm for interconnecting ever increasing number of on-chip cores in future chip-multiprocessors (CMPs). As the advent of big data era, high volume of traffic injection, combined with the ever-changing patterns will exert severe pressure on some hotspots, leading to serious traffic congestion. These hot nodes will exhaust up the communication...
A new asynchronous arbitration node is introduced for use as a building block in an asynchronous interconnection network. The target network topology is a variant Mesh-of-Trees (MoT), combining a binary fan-out (i.e. routing) network and a binary fan-in (i.e. arbitration) network, which is becoming widely used for multi-core shared-memory interfaces. The two key features are: (i) each fan-in node...
Data availability is a major challenge faced by today's Data Centers where a large number of high performance servers are organized into racks interconnected by a switching network. Data replication is an effective approach for data protection as redundancy ensures at least one copy of data is available in the event of failures. To achieve low latency and high throughput for data replication operations,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.