The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a scenario where service reliability is achieved through multiple providers, it is crucial to detect faulty equipment. Such a scenario is the IP Multimedia Core Network Subsystem (IMS). where service is provided by multiple instances of the Application Server (AS). These servers may reside on remote locations, and network link between the Call Session Control Function (CSCF) and AS may become broken...
To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, we are targeting a duty-cycle adjustment to optimize the network performance, e.g., delay minimization, with full harvested energy utilization. In this paper, we introduce a set of duty-cycle...
Sustainable computer networking approaches adapt network node power states dynamically in response to traffic demand. This scenario imposes new challenges to the way the network resilience is evaluated based on reliability and availability metrics. The traditional assessments of reliability and availability based on Markov models or the Cut-Set and Tie-Set techniques are based on static values and...
The IEEE 802.11v defines the Directed Multicast Service (DMS) in order to enhance the reliability of the multicast transport. This service converts multicast traffic into several unicast streams. Therefore DMS can be used to serve a limited number of receivers. In this paper, we show that using DMS, losses caused by queue rejections may exceed the packet loss rate of the legacy multicast. To resolve...
We investigate the impact of the node-selfishness on the network connectivity and the path delay of information dissemination in large scale Ad-hoc networks based on the percolation theory. A network framework with links obeying stationary process is conceived by combining the effects of both node-selfishness and link qualities. The existence of the node cooperation probability boundary is proved...
In the past decade, multipath routing has been proposed to provide reliability for mobile ad hoc networks (MANETs). As wireless mesh networks become more and more popular, performance evaluation of different routing algorithms is required in static scenarios. Performance comparison between unipath routing and multipath routing is conducted in this paper. From the simulation results we find that multiple...
In this paper, we propose a cooperative media access control (CMAC) protocol to improve the packet reception ratio and to reduce the average delay for multi-hop transmission. The proposed protocol shows better packet delivery ratio and less delay than the IEEE 802.11p MAC protocol for multi-hop transmission.
Recently, a number of transport and application layer protocols for haptic and Interactive applications have been proposed. This paper presents a survey of the above protocols. It outlines the haptic data transmission characteristics. It also depicts the qualitative features that transport and application layer protocols should contain in order to carry haptic data. Based on these criteria, evaluation...
Tactical mobile ad hoc networks have a hierarchical organization with soldiers reporting to their group leader and from them to the command center. In such a network, it is important to prioritize the traffic associated with the leaders without starving other essential communication in the network. To support such a feature, we propose a hybrid routing protocol, named as “Rank-aware Tree-based Geographical...
We propose a connectivity-based routing protocol (named CRP) for underwater wireless sensor networks (UWSNs). CRP considers the reliability issue due to high error rate in UWSNs. Hence, during forwarding, a node with the highest connectivity to the sink is selected as a next forwarding node. Using the NS-2 simulator, CRP is compared against a localization-free routing protocol in UWSNs (i.e. H2-DAB)...
In this paper, we propose a modification of the observe extension of CoAP to include Quality of Service (QoS) support for timeliness. The proposed QoS support is based on delivery priority. Nodes are able to express the priority order with which they wish to be notified. Furthermore, they are also able to specify which notification they want to receive. We classify the notifications in two categories:...
Inter-vehicle communication is considered as a major problem to vehicular environment. Here, an analytical framework is developed to investigate the reliability of end-to-end information relay process along a platoon of vehicles. The reliability of inter-vehicle communication is measured by the probability of success for information to travel to a known destination and by the required number of hops...
This paper presents an easy to design Physically Unclonable Function (PUF). The proposed PUF implementation is a loop composed of identical and controllable delay chains which are serially assembled in a loop to create a single ring oscillator. The frequency discrepancies resulting from the oscillator driven by complementary combinations of the delay chains allows to characterize one device. The...
In the view of the large scale and increasing kinds of service of space information networks, a service- oriented topology control algorithm is proposed. According to demands of existing service, the topology of network is divided into several logical sub-topologies, on which construct the corresponding topology. Taking the communication pattern as an example, the augmentation-based approach is adopted...
Data dissemination in vehicular ad hoc networks (VANETs) has recently received considerable attention. Due to the unique characteristics of VANET, the implementation of reliable data dissemination among vehicles has encountered many challenges. In this paper, a reliable and efficient data dissemination scheme is presented. Relative locations between neighbor vehicles are predicted to improve delivery...
Genetic algorithm (GA) has been widely used in a variety of communication network design problems. The encoding method is the essential issue for GA. In this paper we investigate the topology optimization of the tree-like overlay multicast systems with degree constraints. A new encoding method based on the degree-weighted array is proposed. It requires no repair strategies for the encoding, crossover...
Nowadays implementation of TCP and UDP protocols offer high speed and reliability on data links. Especially TCP implementations offer high speed rates, employing sliding window and data acknowledgement in TCP protocol. On the contrary, UDP offers different options and has other advantages and disadvantages. But in certain environment, especially with high delay and high bit error rate, these protocols...
With deeply scaled CMOS technology, Bias Temperature Instability (BTI) has become one of the most critical degradation mechanisms impacting the device reliability. In this paper, we present the BTI evaluation of a single inverter gate covering both the PMOS and NMOS degradations in a workload dependent, atomistic trap-based, stochastic BTI model. The gate propagation delay depends on the gate intrinsic...
We present a solution to evaluate the performance of transport protocols as a function of link layer reliability schemes (i.e. ARQ, FEC and Hybrid ARQ) applied to satellite physical layer traces. As modelling such traces is complex and may require approximations, the use of real traces will minimise the potential for erroneous performance evaluations resulting from imperfect models. Our Trace Manager...
Network coding techniques have absorbed much attention for providing reliable broadcasting services in wireless networks. However, the intrinsic tradeoff among throughput, decoding delay, and feedback overhead has obstructed the application of the previously proposed schemes in practice. In this paper, we firstly propose a rate-controlled network coding scheme (RANC), which can effectively reduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.