Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
It will cause the loss of information in the distributed satellite networks, if the network node is failure. For this problem, a method for distributed satellite networks based on standby nodes is presented in this paper. Firstly, it can establish a main path and confirm main nodes according to max-throughput principle in this method. Secondly, it can establish standby nodes set for the main path...
Mobile ad-hoc networks are commonly known as MANETs. This type of network consists of nodes which are independent, mobile and also able to exchange messages between themselves. These nodes rely on limited battery; a common challenge in MANETs. As soon as battery power of node is used up, that node becomes a dead node. This node is not able to send or receive data. When all network nodes have used...
Modelling is a general method used throughout the development of systems. Numerous modelling languages were proposed for analyzing and building systems. Petri Nets language is considered as one of the formal modelling and analysis techniques. These techniques allow users to do both the performance evaluation and model checking. Coloured Petri Nets (CPN) is one of the modelling languages especially...
With the rapid urbanization in China, the protection of water environment is more and more important. Urban sewage pipe network service is a new technology to store and manipulate spatial data, integrated with attribute data of sewage pipe network. This paper described a digital management platform of the urban sewerage pipe network service system based on Geographical information system (GIS) and...
One of the main challenges in MANET is link breaks between the routes due to exhausted energy of nodes which have limited battery power. Every time a node transmits, receives or listens to a communication medium, it consumes energy. This paper focuses on creating an energy efficient method and a new technique was introduced to avoid link breaks before occurrence using preemptive local repair. The...
The IETF ROLL WG is currently in the final steps of the specification of RPL, a new routing protocol for low power and lossy networks (e.g. wireless sensor networks). RPL may use layer two- and layer three-based mechanisms for neighbor reachability maintenance. Since layer two mechanisms may not always be available, RPL relies by default on the 6LoWPAN Neighbor Discovery, a version of the IPv6 Neighbor...
A new route repair scheme based on link breaks is proposed to improve route repair efficiency for realistic ad hoc networks. Its design idea is as follows. Change of downstream node status is regarded as the basis of choosing route repair schemes by the repairing node. Causes of link breaks would be analyzed according to the change of node status. And different nodes are selected as the destinations...
Critical services in a telecommunication network should survive and be continuously provided even when undesirable events like sabotage, natural disasters, or network failures happen. The network survivability is quantified as defined by the ANSI T1A1.2 committee which is the transient performance from the instant an undesirable event occurs until steady state with an acceptable performance level...
In large-scale Ad Hoc networks, the frequent interrupting of networks can produce prodigious transmission delay, and also can reduce the packet delivery rate, in view of such disadvantages, this paper introduces the mechanism of link failure prediction into the AODV routing protocol in the process of data transmission, and simulates the improved AODV routing protocol through NS-2, the test results...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
Networks on chips (NoCs) provide a mechanism for handling complex communications in the next generation of integrated circuits. At the same time, lower yield in nano-technology, makes self repair communication channels a necessity in design of digital systems. This paper proposes a reliable NoC architecture based on specific application mapped onto an NoC. This architecture is capable of recovering...
Distributed hash tables (DHTs) often maintain additional routing information regarding each node's surrounding neighbors within a network overlay. Sequential neighbors play a critical role in network recovery, providing alternative routes thus allowing more flexible and robust routing around a overlay. This paper details our analysis of a existing DHT routing protocol under continuously dynamic network...
Our society is heavily dependent on a wide variety of communication services. These services must be available even when undesirable events like sabotage, natural disasters, or network failures happen. The network survivability as defined by the ANSI T1A1.2 committee is the transient performance from the instant an undesirable event occurs until steady state with an acceptable performance level is...
Several models of user churn, resilience, and link lifetime have recently appeared in the literature [12], [13], [34], [35]; however, these results do not directly apply to classical distributed hash tables (DHTs) in which neighbor replacement occurs not only when current users die, but also when new user arrive into the system, and where replacement choices are often restricted to the successor of...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.