The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design and performance evaluation of an integrated hybrid MAC and topology control scheme (abbreviated IMTC) for machine-to-machine (M2M) area networks that require comparatively the high data rate communications. In order to maximize the network performance, IMTC is designed with a cross-layer concept of MAC and network layers, which provides the multi-channel TDMA scheduling...
The security problem is independent from online game itself, but it is the basic guarantee to the survival and the development of online games. This article discusses the server architecture security, user input security, data transmission security, login verified security, game logic security and transaction security on MMORPG in detail, and provides a feasible solution to the design and realization...
Research in the area of Wireless Sensor Networks (WSNs) has been immense during the last years. Since highly resource-constrained, WSNs pose specific challenges to the design and implementation of protocols and algorithms. In order to test, compare, and verify the intended functionality of new approaches, performance evaluations must be conducted in a sound and credible manner. Instead of simulative...
On real-time video streaming, the distribution with multi-tree Application Level Multicast (ALM) is effective in terms of delay and jitter. In constructing multi-tree networks, a joining node selects counterpart nodes based on their performance or bandwidth capacity and they are connected each other. However, tree-based ALM has the overhead of reconstructing the tree topology when any node leaves...
Our paper proposes a new quality of service concept for smart home services. We assume that every flat in a house has its own smart computer to perform local services and acts as an interface for the different sensors and actors inside the flat. These smart computers are interconnected using a plain switched Ethernet infrastructure. A central server offers shared services for each user and a gateway...
In this paper, we investigated the problem of finding an efficient topology for delay-constrained data in WSNs. As we know topology control is one of the important mechanisms designed for decreasing energy consumption in WSNs. Since topology control may increase the end-to-end delay, one of the criteria's should be considered in topology control algorithms is delay constraint. Most existing works...
In the paper, we discuss a scalable, multi-purpose sensor network implementation called EfiIoT. It combines two network topologies to enhance scalability and introduce new uses, such as locally available data to subscribers. The system is designed to be put together from a variety of sensors. It supports almost any kind of user interface and supports many user bases with partially or wholly different...
FlexRay is a new high bandwidth communication protocol for automotive systems, providing time-triggered transmission of periodic frames in a static segment and priority-based scheduling in a dynamic segment. The analysis techniques are required to compute bounds for the FlexRay frame response times, before the standard is used for safety and time-critical applications. In this paper, we introduce...
The paper is focused on the Floyd-Warshall all-paths routing algorithm, presenting its first implementation in OMNeT++ simulator. The experiments are trying to demonstrate that Floyd-Warshall's use for a routing protocol is more efficient from infrastructure provider's perspective. The performances are compared to the results obtained when employing distance-vector protocols (such as RIP) or link-state...
Practical experience reveals the characteristic properties of Wireless Body Area Networks (WBANs), signifying the need for a well-designed communication protocol. High mobility, stringent resource constraints, and low and time-variant quality of wireless links are some of the challenging issues in WBANs. Typical applications further have varying Quality-of-Service requirements and demand reliable...
This paper targets at building efficient perimeter defense for virtual private cloud (VPC) in public cloud that provides infrastructure as a service (IaaS). Because topology information can help both cloud and cloud user to better manage VPC infrastructure, we propose topology oriented VPC deployment to 1) reduce the security threats caused by transparency/virtualization, 2) to facilitate perimeter...
In the past decade, underwater acoustic sensor networks (UW-ASNs) have been studied broadly in various aquatic applications, enabling humans to observe and explore the vast underwater domain. Although acoustic underwater communications are able to support long-range and low-bandwidth applications, the capabilities of UW-ASN are greatly limited by the long delay and low data rate of acoustic communications...
WSNs provide a new sensing tool which is basic in the development of improved ways for managing intelligent cities. However, the deployment phase is a complex and slow process that requires pre-planning tasks and qualified personnel. This discourages the use of WSNs, which once installed, could provide high versatility and range of applications at low cost. Our study proposes a quick deployment sensor...
Internet traffic for video content delivery has grown rapidly because consumer-generated media has been shared throughout the world and the number of contents has increased tremendously. In response to this, ISPs have faced to the issue that how to deliver the massive contents with low cost and without losing network quality. The issue is significant for the ISPs providing Internet access service...
This paper quantifies the impact of topological characteristics on the performance of single radio multichannel IEEE 802.11 mesh networks. Topological characteristics are the number of nodes per subnetwork, the hop count, the neighbor node density, the hidden nodes, the number of nodes in the neighborhood of the gateway, and the hidden nodes in the neighborhood of the gateway. Network performance...
Industrial wireless sensor network design requires efficient channel usages and timeslot assignment. In this paper, we describe an integrated channel-timeslot allocation algorithm based on a routing-tree coloring scheme. According to a strict routing-tree definition and corresponding resource allocation principles, the algorithm performs in two phases. In the first phase, a traditional mesh sensor...
Wireless mesh network management is more complex than wired network management mainly because of network resource constraints and link quality variability. Therefore, monitoring solutions for wired networks do not achieve satisfactory performance in mesh networks. There are several techniques and tools proposed in the literature for wireless mesh network management. Each of those techniques and tools...
SIP signaling protocol relies on centralized SIP servers deployed on the infrastructure of the network to route SIP messages in order to enable user endpoints to discover each other. However, the lack of the infrastructure in ad hoc networks requires that the network nodes support the tasks of participants discovery and SIP messages routing. In this paper, we propose AdSIP protocol which is a completely...
In a Wireless Sensor Network (WSN) the sensed data must be gathered and transmitted to a base station where it is further processed by end users. Since that kind of network consists of low-power nodes with limited battery power, power efficient methods must be applied for node communication and data gathering in order to achieve long network lifetimes. In such networks where in a round of communication...
Multiple autonomous agent systems require wireless communication networks to communicate with each other and collaboratively accomplish a given task. It is critical for multi-agent networks to incorporate the ability to sustain faults since every node in multi-hop network is responsible for forwarding packets to other nodes, the failure of a critical node may result in a network partition. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.