The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The promise of SDN/NFV to offer enhanced functionalities to the service provider networks is now tangible as both technologies have started being steadily investigated and experimentally demonstrated. However, a number of research challenges have not been fully addressed yet. More specifically, a limited interest has been devoted on how to assure reliability and QoS performance while data traverse...
The warning system is required to preserve viability and ability from diversified air threats. The unidirectional satellite multicast system, the new system has attracted attention as an alternative. The system is similar to a unidirectional satellite link. To improve link reliability, the unidirectional satellite link uses a flow control. But it is unsuitable for the unidirectional satellite multicast...
Reliable communication is crucial for successful deployment of a wireless sensor network. Many environmental factors can affect the performance of radio links, and the deployment of a network without real-time information about link qualities can be a demanding task. This paper describes the CiNetView application that is intended to support the deployment and monitoring of wireless sensor network...
Wireless sensor network (WSN) and wireless mesh network (WMN) suffer frequent disruptions and limited capacity for delivering sensor data in mine tunnels. A Braided Cooperative Reliable Transport (BCRT) algorithm which maintains one-hop reliability to insure end-to-end reliability is proposed. BCRT is not sensitive to route breaks, since it optimizes the data rate on every forwarding node and lost...
With today's widespread deployment of wireless technologies, it is often the case that a single communication device can select from a variety of access networks. At the same time, there is an ongoing trend towards integration of multiple network interfaces into end-hosts, such as cell phones with HSDPA, Bluetooth and WLAN. By using multiple Internet connections concurrently, network applications...
UDT is an application level, end-to-end, unicast, reliable, connection-oriented streaming data transfer protocol. The UDT protocol is completely at user space above UDP. For it bases on the implementation of UDP, so its real-time characteristic performs very well. In the user space, by designing a new congestion control algorithm, also a new mechanism dealing with the packet loss, UDT has enhanced...
The multiple backhaul mobile access router (MAR) can provide high capacity and high performance Internet access for emerging mobile wireless applications. In this paper we improve the MAR with the capability to stripe traffic from clients over multiple available network devices. The MAR allows different backhauls to be used simultaneously and accommodates diverse policies. We present experimental...
This paper presents a kind of survivability evaluation technique for tactical data link network (TDLN). In our work, a distributed evaluation system via high level architecture (HLA) is provided to evaluate the TDLN online, and a novel quantitative evaluation method based on the principle of maximum deviation and subjective estimation is proposed to overcome the weakness of subjectivity from the method...
The future airborne network (AN) has to operate with lossy and intermittent data links, and other harsh technical challenges. However, current network protocols cannot perform well in AN, because they were originally developed for terrestrial-based Internet. Although some protocols were modified to adapt to space links, there is little research so far on reliable transmission mechanisms in AN environment...
A Mobile Ad hoc Network (MANET) is a transitory, dynamic, decentralised, self-organised and infrastructure-less network. This unique nature introduced new challenges in the security research field such that it became imperative to design new security mechanisms that suit these characteristics. The proposed work contributes to the problem of securing data forwarding in the network layer; this is accomplished...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.