The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communications within power converters is becoming increasingly important particularly with the evolution of multilevel converters having distributed control structures. In the not so distant past, communications were used primarily for reference point setting and monitoring. Currently however communication is taking on an integral role in the control of the power converters particularly those with...
The Low Voltage Power Line Communication (LVPLC) MAC protocols are an important influence factor to the network throughput. To solve the problem that the relatively low throughput due to the asymmetric PLC channel influence, we propose an improved adaptive p persistent CSMA protocol to optimize throughput for the finite loads in LVPLC accurate artificial cobweb network. This protocol reduces collision...
The recent networking paradigm shifts towards the virtualization and softwarization of network functions, controls, and applications that are promising; they optimize costs and processes while bringing new value to the infrastructures. However, the centralized reliability management in softwarization architecture poses both scalability and latency challenges. In this paper, we design and build a novel...
Distributed control scheme is preferred to the multiple-modules-based system because of the simple structure, low maintenance, and high scalability. This paper proposes a hybrid communication topology and a route-switching communication protocol to implement the distributed control applied in the cascaded H-bridge (CHB) multilevel static synchronous compensator (STATCOM). The hybrid topology consists...
We address the design space exploration of wireless body area networks for wearable and implantable technologies, a task that is increasingly challenging as the number and variety of devices per person grow. Our method efficiently decomposes the problem into smaller subproblems by coordinating specialized analysis and optimization techniques. We leverage mixed integer linear programming to generate...
Several data center applications such as Hadoop and OpenStack VM provisioning utilize group communication (one-to-many or many-to-many transfers). Since these applications require reliable and stable delivery, they rely on TCP for all group communications. Even though multicast lends itself naturally to these group communication patterns, it has remained largely under-deployed in the Internet owing...
In building automation systems, the diversity of existing field level networks is a major challenge for fully integrated solutions. Typical approaches achieve integration by shifting the needed complexity to the automation or management layer. In contrast, this paper focuses on leaving the complexity at the field level to provide a homogeneous view to upper layers without compromising reliability...
This paper introduces a concept for bringing dependability into the area of building automation. The proposed approach is able to extend existing building automation networks with dependability features. For this purpose, the communication stack of a particular system is extended by adding an intermediate layer. This so-called dependability layer is transparent to allow seamless integration. Thereby,...
In this work we introduce some of the key ideas of vehicular cloud computing applied to 5G cellular networks. We present some of the challenges and solutions that are being devised for these networks, with a special focus on the lower layers of 5G cellular systems. The main challenges in vehicular cloud computing examined in this paper are mobility, latency, network topology, network security, and...
The decentralized design of Peer-to-Peer (P2P) protocols inherently provides for fault tolerance to non-malicious faults. However, the base P2P scalability and decentralization requirements often result in design choices that negatively impact their robustness to varied security threats. A prominent vulnerability are Eclipse attacks that aim at information hiding and consequently perturb a P2P overlay's...
We consider the following problem: two nodes want to reliably communicate in a dynamic multihop network where some nodes have been compromised, and may have a totally arbitrary and unpredictable behavior. These nodes are called Byzantine. We consider the two cases where cryptography is available and not available. We prove the necessary and sufficient condition (that is, the weakest possible condition)...
The Intel® Omni-Path Architecture (Intel® OPA) is designed to enable a broad class of computations requiring scalable, tightly coupled CPU, memory, and storage resources. Integration between devices in the Intel® OPA family and Intel® CPUs enable improvements in system level packaging and network efficiency. When coupled with the new user-focused open standard APIs developed by the OpenFabrics Alliance...
Recent advances in cooperative driving hold the potential to significantly improve safety, comfort and efficiency on our roads. Platooning of heavy vehicles, where automated or semi-automated driving allows minimal inter-vehicle gaps, has shown considerable reductions in fuel consumption. Although using the same wireless communication technology, a platoon differs from a VANET (Vehicular Ad-hoc NETwork)...
Wireless Sensor Networks (WSNs) have become increasingly popular in recent years for controlling systems where human intervention is undesirable or impossible. There is no fixed or planned infrastructure for WSNs. Therefore, Virtual Backbone (VB) is currently used to support topology control, efficient routing and broadcast communication in WSNs. A Connected Dominating Set (CDS) is a promising candidate...
Energy consumption in wireless sensor network is of paramount importance, which is demonstrated by large number of algorithms, techniques and protocols that have been developed to save energy and to extend lifetime. In WSN for mission critical application two performance metrics are: reliability and energy efficiency. In literature CDS based technique is used to achieve reliability. CDs allow communication...
Wireless Sensor Network (WSN) is an ad-hoc network consisting of sensor nodes having limited computational power fitted with a radio transceiver. Main constraint of a sensor node is the limitation of its energy resource in the form of a short battery life. Battery power conservation is very important in a sensor device since battery life is usually one of the critical componets in extending the life...
The Low Extra Delay Background Transport (LEDBAT) protocol is a recently standardized protocol that aims to offer a scavenger service (i.e. the goal is to exploit the remaining and unused capacity of a link). LEDBAT is a delay-based protocol mainly defined by two parameters: a target queuing delay and a gain. The RFC 6817 provides guidelines to configure both parameters that strongly impact on the...
IEEE 802.15.4 represents a widely used MAC-layer standard for Wireless Sensor Networks. In multihop topologies, the protocol exploits a cluster-tree and organizes the transmissions by alternating sleeping and active periods in a superframe delimited by beacons. In this paper, we propose a new Contention Broadcast Only Period to limit beacon collisions and to reduce bandwidth wastage due to variable...
Wireless sensor networks (WSNs) consist of tiny sensor nodes with sensing, computation and wireless communication capabilities. As sensor nodes are resource constrained, the usage of energy and memory must be done wisely to increase the lifetime of nodes. It is also necessary to deliver data reliably to make any application more useful to the end user. In this paper we propose a protocol using cluster...
In vehicular ad hoc networks, many applications require a less delay and high packet delivery ratio. Many broadcast protocols have been widely discussed recently in this context. However, in some of them The selection procedure of the forwarding nodes is lengthy, and selects a large number of forwarding nodes and also the Large packet size, because of which traffic increases which leads to congestion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.