The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed traffic information systems apply inter-vehicular ad hoc communication to disseminate road traffic information. The high amount of traffic information carried and flooded along the road network leads to superfluous forwarding, which is usually reduced by using rate- or spatial- adaptivity in the dissemination mechanisms. However, in certain cases due to the lack of context-aware information,...
Reduction of overhead is essential in increasing the scalability and power efficiency of peer-to-peer (P2P) file sharing systems for mobile ad hoc networks (MANET). Previously researchers mainly focused on reducing overhead of query process, and paid little attention to file transfer process. This paper presents a cluster-based P2P file sharing protocol for MANET, focusing on file transfer process...
Linear-time configurations and RAID have garnered great interest from both analysts and theorists in the last several years. Given the current status of pseudorandom models, cyberneticists obviously desire the study of DHCP, which embodies the extensive principles of machine learning. Based on the game-theoretic methodology and lossless algorithm, it is concluded that the discovered scheme can be...
As part of the resource allocation mechanisms, each router must implement some queuing discipline that governs how packets are buffered while waiting to be transmitted. Various queuing disciplines can be used to control which packets get transmitted (bandwidth allocation) and which packets get dropped (buffer space). The queuing discipline also affects the latency experienced by a packet, by determining...
Simulation is essential to evaluate the performance of large scale vehicular networks. It is logistically challenging (and prohibitively expensive) to run tests with more than a few dozens experimental vehicles. Given the critical role of simulation in the evaluation of VANET protocols in large scale scenarios, it is important to guarantee realism of the models. This paper focuses on the accuracy...
A key challenge of message forwarding in delay tolerant networks (DTNs) is to increase delivery rate and decrease delay and cost. When information for future connectivity is not available, opportunistic routing is preferred in DTNs in which messages are forwarded opportunistic (non-deterministically) to nodes with higher delivery probabilities. Many real objects have non-deterministic but cyclic motions;...
FCV (Fuel Cell Vehicle) is a new direction for the development of the clean energy vehicle. Nowadays network plays an important role in vehicles, and FCV is also no exception. Compared to the traditional vehicles, there are much more electronic components assembled in FCV. As a result, the electromagnetic environment in FCV is worse then the traditional ones. So the design of the network is crucial.
The Stream Control Transmission Protocol (SCTP) is a new transport layer protocol. Multihoming is one of the most important features in SCTP, which can be used by the data sender to send data to a receiver through different paths. Although SCTP provides support for multihoming, the basic reason for such a provision was to improve reliability of associations. Currently, simultaneous transfer of new...
Traditional transaction processing aims in delivering the ACID properties (Atomicity, Consistency, Isolation, Durability), that in our days are often relaxed, due to the need for transaction models that suit modern computing environments and workflow management applications. Typical examples are the requirements of long-running transactions in mobile computing or in the web, as well as the requirements...
The IEEE 802.17 is a standardized ring topology network architecture, called the resilient packet ring (RPR), to be used mainly in metropolitan and wide area networks. This paper focuses on the RPR MAC client implementation of the IEEE 802.17 RPR MAC in the aggressive mode of operation and introduces a new active queue management scheme for ring networks that achieves higher overall utilization of...
We propose a novel scheme, called cooperative semantic caching scheme (CSCS) for multi-level super-peer networks that support hierarchical P2P architecture. Peers share information according the semantic proximity between peers and between shared files to self-organise into clustered groups. In this paper we tackle the problem of exploiting the semantic locality of peer requests to improve the performance...
In recent years, many clustering algorithms have been proposed. Among them, LEACH is the most famous one. However, in LEACH, within each 1/p rounds, once a node has been selected as a cluster-head (CH), its threshold will be set to 0, and thus it will lose the chance to participate cluster-head selection, even if it still has enough energy. In this paper, we present a novel cluster-head selection...
In this paper, the WirelessHART communication scheme is investigated. The protocol is at first described, in order to underline the key aspects of its design; then, a simulation tool is presented: it enables analysis that accounts for both protocol and physical layers issues. In particular, interference effects on protocol choices can be easily analyzed. The experimental results, obtained from simulations,...
Traffic congestion avoidance is a critical issue associated with data routing in Wireless Sensor Networks (WSNs). Previous researches employ either traffic or resource control strategies as solutions. In this paper, we propose an energy-efficient grid-based traffic congestion avoidance scheme in WSNs, termed as TALONet. With our mechanism, the approaches applied to avoid congestion have three folds:...
In this paper, we focus on single-selection opportunistic relaying with the decode-and-forward protocol over Rayleigh fading channels. The end-to-end average signal-to-noise ratios (SNR) and ergodic capacities of both proactive and reactive opportunistic relaying are analyzed as a closed form in a high source-to-relay SNR regime where all link qualities satisfy the required SNR. The derived results...
Compared to WCDMA, the LTE radio access has a significantly shorter Transmission Time Interval (TTI) in order to reduce end-to-end delays. However, if a User Equipment (UE) at the cell edge is limited by its available transmission power, it may not be able to transmit an entire VoIP packet during one TTI, since the instantaneous source data rate is too high. Thus TTI bundling has been recently introduced...
In order to encourage peers to contribute resources for P2P networks, the paper proposed an incentive mechanism to suppress whitewashing which is not overcome by reputation systems. Game-theoretic analysis reveals that the conventional Tit-for-Tat is not an evolutionary stable strategy in P2P systems including some whitewashers. It also indicates that an improved Tit-for-Tat integrating an appropriate...
Article shows, that separation of traffic and use of appropriate queue management method can be a solution to problem of coexistence of elastic and inelastic traffic. The paper familiarizes with problem of coexistence of different types of traffic, presents two queue management methods and shows simulation results of protocols performance when elastic and inelastic traffic is enqueued into separate...
LSP requests may be bundled to improve the network optimization process at the expense of an increased connection setup delay. A detailed study is conducted to evaluate the pros and cons of the bundling approach.
The Query Tree Protocol (QT) in Law et al. (2000) is an efficient RFID tag singulation algorithm that is guaranteed to read all the tags in the broadcast range of a reader. However, QT ignores the capture effect. That is, after the reader broadcasts a bit string query prefix, it is assumed that it can distinguish one of three responses, namely {no response, one response, collision}. If the capture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.