The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The virtualization and softwareization of network functions, controls, and applications are promising as they optimize costs and processes while bringing new value to the network infrastructures. However, the centralized reliability management over the complex softwareized network poses both scalability and latency challenges on the failure recovery process. In this paper, we propose a Network Architecture-aware...
Wireless image sensor networks acquire and transmit image data through self-organized method. Considering processing ability, energy consumption and cost, this paper implements a practical image sensor node with low-power sleeping mechanism in order to achieve image data's gathering, processing and transmission. To ensure transmission reliability of image data in wireless channel, this paper improves...
This paper presents a network protocol which has short-term reliability. This protocol is designed for image/video transmission and especially for hardware implementation. Short-term reliability means that corrupted or lost packets are retransmitted during limited time. This protocol is simpler than TCP protocol to implement in hardware and has some reliability which UDP does not have. A video transmission...
Radio Frequency Identification (RFID) system has shown remarkable progress, especially in identifying, locating, or tracking objects. Some of the existing challenges include improving position estimation beyond RFID coverage. Following a brief introduction, an analysis of the new requirements of the indoor location system-based RFID and a system prototype is presented. To this end, this research proposed...
Smart grid (SG) is the next generation electrical power grid which will provide reliable, efficient and secure energy generation and distribution. To achieve these goals, data such as smart meter (SM) information will be sent to the control center for analysis and decision-making. However, the existing data backhaul network has limited coverage and data rates, is inflexible, and has low reliability...
The paper proposes a section-partition-based method for packet partitioning and restructuring, aiming at meeting the rigorous requirement of transmitting a great abundance of data reliably and real-timely in some specific situation in that the traditional UDP protocol has high efficiency but poor reliability. The time limit can be reset by adaptive congestion control algorithm of MIRD ( Multiplicative...
This paper evaluates the performance of IPv4 and IPv6 networks in the absence of link layer protection. Behavior of both the networks has been discussed and simulated in case of ideal scenario, low noise, medium noise, high noise and very high noise environment. Transmission behavior at each router is observed and computed to understand the comparative performance of IPv4 and IPv6 datagram's. Our...
Lifetime is the most important concern in wireless sensor networks due to limited battery power of sensor nodes. In this paper, we focus on designing an energy-efficient and energy-aware routing algorithm, LLR, to increase the operational lifetime of multi-hop wireless sensor networks in the presence of unreliable communication links. Our proposed protocol utilizes a parameter, Broadcasting Delay,...
Providing confidentiality, integrity, and availability is indispensable for secure systems. In particular, almost every commerce application requires that integrity be provided in a secure manner, such that the integrity of data is retained even if the owner of the data is malicious. However, providing secure integrity in mobile environments, where participating nodes and their communication channels...
Point-to-point connectivity through FPGA high-speed serial I/O is an important component for many space-based applications. The susceptibility of high-speed transceivers to soft errors is still under investigation and is a matter of concern in reliable point-to-point communications. This work develops a technique to provide full-bandwidth, lossless data transmission across high-speed transceivers...
This paper considers energy-efficient target tracking using cluster-based wireless sensor networks. Target tracking is vulnerable to temporary loss of the target due to reasons such as node failure, prediction error or sudden change in target trajectory. For a credible and reliable target tracking solution that can be used in mission critical situations, foolproof recovery mechanisms are needed. This...
Multiple Channel Design (MCD) has been adopted widely in wireless networks to increase throughput and reliability with relatively less energy consumption. Due to physical restrictions of sensor nodes, applying multiple radio channels in sensor networks poses significant challenges, particularly on energy consumption. To address such challenges, we propose an energy-aware MCD scheme called SmartChannel...
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient and reliable broadcast in wireless sensor networks...
Prolonged lifetime, improved coverage, and load balancing are important requirements in wireless sensor network applications. In this paper, we propose a new clustering protocol-adaptive clustering algorithm based on energy restriction (ACAER), which periodically selects cluster nodes according to their coverage rate and residual energy. ACAER has no assumptions about the distribution or density of...
Wireless Sensor Networks (WSNs) consist of a large number of wireless sensor nodes networked together. It is a complex set of applications, link technologies, communication protocols, traffic flows and routing algorithms. Simulation is a predominant technique used to study and analyse the performance and potency of a senor network design. Since there are a huge variety of simulation tools available...
Recently, detection schemes of specific phenomena, called continuous objects, such as wild fire and bio-chemical material have been actively studied. A continuous object might cover a wide area and it could dynamically change its own shape according to physical environments, e.g. wind and geographical features. For continuous object detection, the schemes have focused on detection of the current boundary...
Localization and exchanged position information plays a big role in Vehicular Ad-Hoc Networks (VANET). Several network services and applications, such as safety messages, require location information. The data are exchanged between vehicles within their radio communication range. In real life implementation, direct communication can be interfered and blocked by obstacles on the road preventing two...
A typical broadcasting protocol for wireless network usually involves fixed transmission power that covers, for example an area within 250 meters (m). However, it is often unnecessary to broadcast using fixed power because a node that needs to be covered may just be 100m away. By reducing the transmission power enough to cover this node, energy expenditure would be reduced, thus, prolonging the lifetime...
Admission control plays an important role in providing Quality of Service (QoS) guarantees for wireless mesh networks (WMNs). Multipath routing can improve network performance in reliability and load balancing. However, when the multipath routing are adopted in 802.11-based WMNs, the transmission with bandwidth assurance is facing rigorous challenges. In this paper, a novel joint design of multipath...
This paper evaluates the performance of an opportunistic scheduling scheme for a multiuser two-way relay network, wherein an analog network coding (ANC)-based relay assists the communication between multiple pairs of users. To ensure fairness for each user pair, we consider a scheduler based on maximizing the normalized minimum of the instantaneous signal-to-noise ratios (SNRs) at each user of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.