The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The virtualization and softwareization of network functions, controls, and applications are promising as they optimize costs and processes while bringing new value to the network infrastructures. However, the centralized reliability management over the complex softwareized network poses both scalability and latency challenges on the failure recovery process. In this paper, we propose a Network Architecture-aware...
Prolonged lifetime, improved coverage, and load balancing are important requirements in wireless sensor network applications. In this paper, we propose a new clustering protocol-adaptive clustering algorithm based on energy restriction (ACAER), which periodically selects cluster nodes according to their coverage rate and residual energy. ACAER has no assumptions about the distribution or density of...
A centralized impairment-aware lightpath restoration scheme is experimentally demonstrated. Through the implementation of the QoT estimator module on FPGA technology, restoration times of 1.36 s are achieved for the high priority traffic class.
The node capture attack on wireless sensor networks (WSNs) can be broken into three stages: node capture, node redeployment, and insider attacks. Existing detection techniques of the attack are mostly implemented in the second stage. Recent discovery proved the feasibility of quick and effective detection in the first stage. We propose a hello message based first stage detection scheme, which is faster,...
Underwater Wireless Sensor Networks (UWSNs) provide a solution for monitoring those unstable environments which is considered frightening for human presence. These networks are mostly formed by acoustic sensor nodes and surface sinks called buoys that are connected to any onshore control centre. The reliable delivery of sensed data to the surface sink is a challenging task as compared to forwarding...
Neighbour discovery and maintenance of neighbourhood tables have importance in wireless sensor networks. Almost every upper layer application such as routing or self-organizing relies on neighbourhood tables. Imprecise tables may lead to failures that may be costly in terms of resources which are very limited in such networks. Neighbourhood tables are achieved thanks to the Hello protocol. Several...
While special protection systems (SPSs) often shed load, recent sophisticated remedial action schemes (RASs) reduce or terminate generation output during an emergency condition. Under certain load conditions, generation newly added to previously balanced transmission grids creates system conditions that violate accepted reliability criteria. At Southern California Edison (SCE), RAS systems are implemented...
With the rapid development of computer communication and web technology, especially the widely application of wireless sensor and embedded technology, Wireless Sensor Networks (WSNs) have been paid great attention in industry field and our daily life. WSNs based on ARM7TDMI-S CPU and ZigBee device has merit of rapid and simple in networking, node movable in application, abundant information in acquisition,...
This paper deals with an integrated MAC and Routing protocol, able to manage faults occurring in Wireless Sensor Network (WSN). To this end, the protocol design has been inspired by the cross-layer principle to minimize both the signaling overhead and power consumption. After an accurate functional characterization, the performance is presented for the most relevant figures (recovering efficiency...
Wireless sensors are new revolutionary technology. The sensor devices are typically deployed in large numbers to form a communication network. Due to their severe energy constraints and redundancy in sensed data, hierarchal architectures are usually suggested for these networks. In this work, we propose further energy savings by optimizing the local transmission power between the node and its cluster...
Reducing power consumption to extend network lifetime with limited energy resource is one of the most important challenges in industrial wireless networks. WIA-PA network requires limited energy resource, adapts dynamic surroundings and keeps the reliability of the network. Aiming at low power consumption and cost, this paper introduces the wireless networks for industrial automation on framework,...
Energy limitation is one of the most important characters in Wireless Sensor Networks (WSNs). Using energy efficiently is significant to prolong sensor network lifetime. The more repeated overlay is, the more energy is wasted. If we divide the nodes into some independent subsets and alternatively awake these subsets, the node energy is consumed slowly. However, the requirement of QoS is opposite to...
UDT is an application level, end-to-end, unicast, reliable, connection-oriented streaming data transfer protocol. The UDT protocol is completely at user space above UDP. For it bases on the implementation of UDP, so its real-time characteristic performs very well. In the user space, by designing a new congestion control algorithm, also a new mechanism dealing with the packet loss, UDT has enhanced...
It is urgently necessary to accomplish the maintenance and testing for EPON system. Based on the analysis of related parts in IEEE802.3-2005, the paper introduces the realization of remote on-line testing. It can greatly reduce operational expenditures while increasing network availability and reliability.
Embedded wireless networks have largely focused on open loop sensing and monitoring. To address actuation in closed loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications...
Real-time patient monitoring is critical to early detection of clinical patient deterioration in general hospital wards. A key challenge in such applications is to reliably deliver sensor data from mobile patients. We present an empirical analysis on the reliability of data collection from wireless pulse oximeters attached to users. We observe that most packet loss occur from mobile users to their...
MAC protocol is the major consumer of sensor energy because it controls the activity of wireless radio of sensor nodes directly. The energy efficiency of MAC protocol makes a strong impact on the network performance. TDMA-based MAC protocol is inherently collision free, and can rule out idle listening since nodes know when to transmit. But traditional TDMA protocol is not suitable for event driven...
Data fusion techniques can combine data and related information to achieve more accurate and reliable data. However, data fusion is not considered in ZigBee protocol, which also limits the range of application of ZigBee protocol. This paper discusses data fusion algorithms in ZigBee application layer and radio frequency communication times are remarkably reduced with the help of data fusion algorithms...
In a multi-hop mobile ad hoc network (MANET), mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of any clear lines of defense. Most of the currently existing intrusion...
The future airborne network (AN) has to operate with lossy and intermittent data links, and other harsh technical challenges. However, current network protocols cannot perform well in AN, because they were originally developed for terrestrial-based Internet. Although some protocols were modified to adapt to space links, there is little research so far on reliable transmission mechanisms in AN environment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.