The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The availability requirements placed on core communication networks have been rapidly increasing. As the value of the traffic served by these core networks has increased so has the impact of failure. Demand-wise shared protection (DSP) was developed to provide failure survivability in the network that was more efficient than concurrently routing two paths of traffic (1+1 APS), yet was more straightforward...
During the research of supplementary system for visual impairment people, it has been discovered that it is better to use ZigBee wireless technology considering the reliability, portability and flexibility. Through the independent regionally-covered Zigbee networks and the Zigbee terminal with voice prompts, clients will be able to get to the destination correctly and independently according to the...
In vehicular ad hoc networks (VANETs), a source node must rely on other nodes to forward its packets on multi-hop routes to the destination. Trust propagation is the principle by which new trust relationships can be derived from pre-existing trust relationship. Modeling for trust propagation is a fundamental block in an ad hoc environment. The main contribution of this work is a novel scheme to enhancing...
Vehicular ad hoc networks (VANETs) allow communications over sequences of vehicles with radio devices. On such a network, there are many possible applications such as traffic jam warning, collision warning, parking lot reservations, camera picture feed etc. There have been quite a few results in the area seeking for a fast and reliable communication protocol due to their potential. VANETs, however,...
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years. While a number of schemes have been proposed to facilitate data dissemination in opportunistic networks, there is an implicit assumption that each participating peer behaves collaboratively. Consequently, these schemes may be vulnerable if there are uncooperative or malicious peers...
Since wireless sensor networks operate at remote locations under harsh conditions with no infrastructure the constraints imposed on the energy dissipation have vital impact on the overall system lifetime. There are studies on the effective utilization of the sensors' energies to increase the network lifetime. In this study we investigated strategies to increase network lifetime by considering both...
We address the maximum lifetime routing problem in wireless sensor networks, and present an online multipath routing algorithm. The proposed algorithm strives to maximize the network lifetime metric by distributing the source-to-sink traffic for a given routing request along a set of paths. Fuzzy membership function is used for designing the edge weight function. Simulation results obtained under...
BGP-4 is the routing protocol which holds the Internet together. Additionally and in the absence of a better solution, it is being used for traffic engineering purposes. In the absence of standardised procedures, each autonomous system in the Internet implements traffic engineering based on non-collaborative goals and using trial and error techniques. This paper analyses trial and error traffic engineering...
In reactive routing algorithms on Ad-Hoc networks, one of the most important challenges is to minimize the number of route discovery processes, due to their high cost in bandwidth. This is achieved through a careful selection of the expiration time, i.e. the time each node keeps active the current route. Most implementations use system-wide random or arbitrary values for this parameter, even though...
This paper presents an efficient and scalable framework called Reliable and Energy Efficient Framework (REEF) for reliable data collection in Wireless Sensor Networks. REEF employs a distributed scheme which enables it to scale to large networks. It partitions the network in to clusters where the node with highest residual energy in a neighborhood become the cluster head. REEF forms a virtual backbone...
Light trails, a fairly recent optical networking architecture for LAN and MAN, and possibly WAN applications, can support both optical unicast and multicast. In this paper we consider routing both types of traffic in a survivable light trail network with multiple wavelengths. The algorithm supports multi-hop routing where traffic may use up to two light trails to reach its destination. An ILP is developed...
This paper proposes a novel framework to solve the survivable routing problem with shared path protection in a distributed control environment. The work mainly concerns how to dynamically determine a protection cycle (i.e., two link-disjoint paths between a source-destination node pair) and allocate spare capacity for a connection establishment request so as to minimize total bandwidth consumption...
This paper proposes the design of a scalable and reliable QoS architecture for mobile ad-hoc networks, which consists of i) a multi-path routing protocol, ii) a call admission control (CAC) scheme and iii) a congestion control mechanism. The multi-path routing protocol utilizes erasure code techniques for producing replicated fragments for each packet, to enhance reliability. Important fragments can...
This presentation aims to localize an inter-domain failure due to inter-domain link failure or intra-domain link within optical domain (OD) that cause inter-domain effect. Delay analysis of the inter-domain localization protocol without power monitoring for three different cases is presented. Limited-perimeter vector matching protocol is also discussed.
The paper presents a collection of slides which discuss multipath routing, multipath protection resilience scheme, shared risk link groups, improved MPP (IMPP) linear program, simulation networks, path properties and protection.
Under span restoration or ldquolink protection,rdquo situations arise where the end-to-end route of a restored path contains a ldquoloopback,rdquo wherein a path doubles back on itself over part of its route following a restoration action. Investigators often independently observe this and presume that loopback detection and avoidance would thus lead to a more capacity-efficient form of span restoration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.