The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interconnection networks have been emerged as an efficient communication infrastructure to fulfill the heavy communication requirements of several applications. Torus is the most efficient interconnection network for current and future supercomputer systems. The packet delay and throughput are the major performance metrics for evaluating the network topologies in designing a network. This paper, evaluates...
Duty cycling has been widely used in Wireless Sensor Networks (WSNs). While its general impact on the network performance is intuitive and clear, this understanding is far from sufficient for WSN planning, design and optimization, among others. In this paper, a quantitative study on the relationship between duty cycle and end-to-end network performance, in terms of delay and throughput, is presented,...
Virtualization is a technology and a trend most studies and industries are putting their interest on. The capability of virtualization to carry out, perform, and deliver the task which a physical computer/server does is just one of the many benefits it has. A term open source is also buzzing the internet world; platforms OpenNode, Proxmox, and OpenVPN are examples of such. This paper evaluated the...
With the wireless technologies being widely used, it is for sure that all types of wireless networking will become more and more popular now and in the near future. Therefore, measurement-based performance evaluation of different wireless network standards and traffics is becoming very important. In this research paper, the wireless local area network performance differences between IEEE 802.11n and...
Wireless sensor network is a large collection of sensor nodes deployed in a particular area. These sensor nodes sense the area under consideration, and send signals to notify the sink node about changes in the area. Congestion may occur in the network, as signals from various nodes may be sent simultaneously. Each sensor node in the network consists of a buffer which may be used to get better performance...
This paper presents Markov Chain modeling of the randomly deployed IEEE 802.15.4 based Wireless Personal Area Networks (WPAN) in which, the wireless sensor nodes communicate to the coordinator in a single hop. In Most of the previous works, the un-slotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) channel access mechanism and the sensor nodes without buffer are considered for...
Mobile ad hoc network (MANET), a flexible peer-to-peer networking technology without pre-existing infrastructure, holds great promises for many critical applications like emergency networks, metropolitan mesh networks, and sensor networks. In this paper, we introduce our recent progress in capacity studies for MANETs with a deterministic Medium Access Control (MAC) protocol, in particular, the capacity...
Competitive environment has led popularity of VoIP over WiMAX due to its large transmission bandwidth coverage, and Quality of Service (QoS) support. For voice calls applications such as MSN Messenger, Google Talk, and Skype, VoIP is an emerging technology for WiMAX networks. In this kind of network, performance analysis of node mobility depends on network connectivity. This paper has considered horizontal...
We investigate the performance of delay constrained data transmission over wireless networks without end-to-end feedback. Forward error-correction coding (FEC) is performed at the bit level to combat channel distortions and random linear network coding (RLNC) is performed at the packet level to recover from packet erasures. We focus on the scenario where RLNC re-encoding is performed at intermediate...
A volcano monitoring system plays a key role for launching emergency early warning, and the use of alternative technologies have proven their effectiveness in this setting, which is the case of wireless sensor networks. For surveillance systems, the real-time requirement is mandatory due to the need for immediate access to the signals derived from a natural disaster where the goal is safeguarding...
The IEEE 802.11p is an emerging wireless protocol dedicated for Wireless Access in the Vehicular Environment (WAVE). It employs the Enhanced Distributed Channel Access (EDCA) mechanism to access the channel. Its objective is to provide differentiated services to vehicular networks which are delay-sensitive and requires high communication throughput. In this paper, we carry out comprehensive performance...
Cloud computing is becoming commonly used for enterprise systems. Users utilize WAN, the Internet, or a wireless network to access the cloud service. These networks often have large RTT and packet loss ratios (PLR), so if users communicate via TCP widely used for accessing cloud services, the throughput decreases and the access quality of the cloud service deteriorates. Therefore, much TCP acceleration...
In this paper, we investigate the topology boundary conditions in wireless mesh networks (WMNs) with focus on the maximum network diameter of such networks under different performance requirements. Specifically, we derive an end-to-end maximum node number upper bound, i.e., an upper bound on the network diameter as a function of end-to-end delay requirement, and an end-to-end maximum node number upper...
The design of wireless embedded systems needs their efficient and realistic simulation to verify that requirements are met. The reproduction of communication behavior is crucial to assess the performance of hardware and software components, e.g., dependability and energy consumption. This work presents and discusses different levels of abstraction for the simulation of the communication behavior....
3G networks penetration is increasing in China, particularly on mobile devices, but little is known about the performance in the country. In this paper, the WCDMA and CDMA's uplink broadband performance was measured in Nanjing. Content of the measuring include throughput, packet loss, delay and receiving interval. Through testing, we can identify the relationship between uplink packet loss, delay...
In this paper we present evaluation of ZigBee network and coexistence of ZigBee and WiFi network. We provide a simulation in OPNET Modeler using two scenario. In the first scenario we evaluate ZigBee network topology then in the second scenario we analyze coexistence between ZigBee and WiFi network. The result shows that tree topology on ZigBee gives highest throughput while mesh topology has the...
The Low Voltage Low Power (LVLP) 8T, 11T, 13T and ZA SRAM cell is designed using the dynamic logic SRAM cell. The SRAM cells are implemented using pass transistor logic technique, which is mainly focused on read and write operation. The circuits are designed by using DSCH2 circuit editor and their layouts are generated by MICROWIND3 layout editor. The Layout Versus Simulation (LVS) design has been...
Ad hoc networks are characterized by a lack of infrastructure, and by a random and quickly changing network topology; thus the need for a robust dynamic routing protocol that can accommodate such an environment. The paper brings out a comparison among various routing protocols in different scenarios with TCP variants, for their better understanding and implementation. A comprehensive performance evaluation...
Wireless Sensor Networks (WSNs) are of great interest to researchers due to their various applications in areas such as environmental monitoring, process monitoring and tracking surveillance systems. Sensors are deployed in hostile in random fashion giving self-organized topology. Medium Access Control (MAC) plays a vital role in the power saving mechanism of WSNs. MAC schemes for WSNs are different...
IEEE 802.11n WLAN was mainly developed to support a high data transmission rate toward 600Mbps based on the aggregation scheme that accumulates several sub-frames to transmit them into a larger frame. This concept reduces overheads and increases efficiency and throughput. Nevertheless, it cannot provide QoS satisfaction for delay sensitive application since it badly affects the delay. To outperform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.