The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It will cause the loss of information in the distributed satellite networks, if the network node is failure. For this problem, a method for distributed satellite networks based on standby nodes is presented in this paper. Firstly, it can establish a main path and confirm main nodes according to max-throughput principle in this method. Secondly, it can establish standby nodes set for the main path...
With the aim to solve the frequent network reconfiguration problem caused by link failure in the broadband powerline communication (BPLC) system, this paper inroduces the two-way power frequency automatic communication system (TWACS) into current BPLC system. And in this BPLC and TWACS integrated communication system, a TWACS signaling based routing searching algorithm is proposed, to meet the requirements...
Vulnerability assessment and optimization for wide area monitoring, protection and control system (WAMPAC) can enhance the robustness and sustainability of network. However, current assessment methods are incomplete and optimization methods ignore dynamic process. A comprehensive vulnerability assessment and optimization method is proposed. Firstly, for assessment, a comprehensive vulnerability indicator...
Reliable data transmissions are challenging in industrial wireless sensor networks as channel conditions change over time. Rapid changes in channel conditions require accurate estimation of the routing path performance and timely update of the routing information. However, this is not well fulfilled in existing routing approaches. Addressing this problem, this paper presents combined global and local...
Several data center applications such as Hadoop and OpenStack VM provisioning utilize group communication (one-to-many or many-to-many transfers). Since these applications require reliable and stable delivery, they rely on TCP for all group communications. Even though multicast lends itself naturally to these group communication patterns, it has remained largely under-deployed in the Internet owing...
TSV failures due to manufacturing defects and thermal-induced latent defects result in yield and reliability issues in 3D-ICs. Recent work has shown different temperature mitigation techniques and fault tolerant architectures for 3D-ICs. It is known that TSVs are effective in reducing temperature by providing thermal conductivity. This is the first work that jointly considers temperature mitigation...
Virtual Coordinate (VC) based algorithms do not use physical coordinates for addressing, and thus possess many advantages for large scale sensor networks. They rely on the validity of VCs of nodes. VCs are affected by events such as node failures which are unpredictable and inevitable in WSNs. This degrades the performance of the algorithms and may even reduce overall life of the network. A distributed...
A wireless sensor network is a group of devices that uses radio to monitoring and sensing physical or environmental conditions at different location. Commonly monitored parameters are pressure, temperature, humidity, wind direction and speed, sound intensity, power-line voltage, and chemical concentrations. However, Energy efficiency is an essential design issue is a challenging task. In this simulation...
To solve the problem of congestion which often occurs in the process of the large data transmission in large-scale wireless senator networks, a multipath routing protocol based on congestion control mechanism implemented by cross-layer design concept is proposed. Realizing the multipath routing protocol on the basis of AODV protocol, congestion control mechanism with active congestion avoidance, real-time...
The contribution of this article is two local recovery methods that may reduce overhead and make a more immediate reconnection of disconnected nodes compared to the soft state global recovery method applied in WSNs running RPL [1]. In addition, we perform an analysis of the implication to better judge the context where local recovery methods should be used. One of our suggested methods is based on...
The Temporally-Ordered Routing Algorithm (TORA) is a distributed routing protocol that is based on a family of link reversal algorithms. TORA is able to provide multiple loop-free routes to any destination using the route creation, maintenance and erasure functions. TORA performs well in networks with a small number of traffic connections but poorly in networks with a large number of traffic connections...
The Temporally-Ordered Routing Algorithm (TORA) is a highly adaptive distributed routing algorithm used in Mobile Ad hoc Networks (MANET) that provides multiple loop-free routes to a destination. TORA is very dependent on the services provided by the Internet MANET Encapsulation Protocol (IMEP) to carry out its three main functions: route creation, route maintenance, and route erasure. In this paper,...
The paper is presented an approach of preventive maintenance that improves and enhances downside production efficiencies based on the non-stop maintenance. The approach focuses on reconfiguration and rerouting; besides, to prepare alternative configurations according to different reliability for each machine. In addition reliable probability of machines, there exist critical factors such as...
The VNLayer approach [1] simplifies software development for MANET by providing the developers an abstraction of a network divided into fixed geographical regions, each containing a virtual server for network services. In this paper, we present our study on reactive MANET routing over the VNLayer. During this research, we identified in our initial VNLayer implementation three major limitations that...
This paper proposes a distributed computing architecture using the P2P paradigm. Our proposal gathers the peers into markets according to their computational resources. Each market is arranged in an N-tree and the trees are linked by a Bruijn graph. The tree topology allows efficient searching of available resources in a specific market, while Bruijn provides good scalability as search complexity...
Virtual worlds are typically persistent. They need a reliable storage to store the state of the world. In a decentralized peer-to-peer-based virtual world, this must also be realized in a decentralized fashion. However, peers are not only unreliable. They might also be malicious trying to tamper with the stored data. Therefore we present our approach to realize a peer-to peer-based reliable and secure...
In this paper an efficient protocol, called Immediate Group ACKTree (IGA), is proposed to support reliable multicast service for mobile ad hoc networks. For most reliable multicast protocols, a recovery scheme is used to ensure end-to-end delivery of unreliable multicast packets for all group members. IGA use a directly-related based recovery mechanism that localizes ACKs and retransmissions to avoid...
We propose CRES as a substrate structure to enable content-based routing in large-scale sensor networks without location information. With CRES, traffic is routed based on its content rather than the destination's physical address. CRES is therefore applicable to data-centric sensor networks where sensor data and user queries need to be mapped to their corresponding nodes in a distributed manner such...
Ad hoc network is one sort of multi-hop, self-organization and dynamically changing network. The Ad hoc On-Demand Distance Vector (AODV) protocol is an on-demand protocol specialized for mobile ad hoc network. Future network should have cognitive characters and the collection of elements that make up the network observes network conditions and then, using prior knowledge gained from previous interactions...
Redundancy is the key notion to bring robustness in the highly dynamic environment of the ad hoc network. Traditionally, the reactive MANET routing protocol brings repair process after a route failure, on the contrary, the multipath routing protocol proposes redundancy on a prefailure scheme so that repair of a route is done by on-the fly replacement. Another way to improve the communication resiliency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.