The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is typical for enterprises to rely on services from cloud providers in order to build a scalable platform with abundant available resources to satisfy user demand, and for cloud providers to deploy a number of datacenters inter-connected with high-capacity links, across different geographical regions. In this paper, we propose that video conferencing, even with its stringent delay constraints,...
To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, we are targeting a duty-cycle adjustment to optimize the network performance, e.g., delay minimization, with full harvested energy utilization. In this paper, we introduce a set of duty-cycle...
To properly operate closed industrial control networks, it is required that communication with nearly constant delay bounds be supported. In [9] the authors introduced FlexTDMA in order to provide this support, and with minimal delay-jitter in an asynchronous network, under unicast communication. In this paper we consider how periodic on-off traffic and frame loss are managed in the presence of network...
Network protocols can be designed to enable a reduction in energy use of data servers. We architect a new HTTP timed redirection response for a GET request to be redirected to another server with a given delay. This redirection response can be used in a hybrid web server to coalesce GET requests and allow a server to periodically sleep. In such a hybrid web server, a small low-power ARM-based Assistant...
Resolution from identifiers to locators serves as a key component of mapping-based mobility solutions. In this paper we address the weakness of current resolution methods in supporting diverse mobility scenarios and propose a Global Resolution Service offered by Resolution Service Providers. We present a preliminary design and simulation, and results show that our approach is able to provide better...
The establishment of common control channel (CCC) is an immense challenge in cognitive radio networks (CRNs). Since the channel number is large and the channel access is opportunistic, the process (a.k.a. rendezvous) that any pair-wise nodes (i.e. rendezvous pair) find a common channel to establish a control channel for communication is hard to achieve, especially in a distributed CRN. Researchers...
Inter contact time (ICT) between two mobile nodes is essential to forwarding algorithms and the end-to-end delay in Delay Tolerant Networks (DTNs). However, studies regarding the distribution of ICT lack general applicability and the exponential parameter concerns with too many motion characteristics. Consequently, it is difficult to design the protocol and analyze the performance for DTNs. In this...
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is based on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This protocol assumes that the receiver always gives...
When disasters occur, a common characteristic is the partial or complete failure of the telecommunications infrastructure so the usual means of communication are often not available. However, accurate and timely information of the disaster area is important. In this paper, a data collection method from an area of interest (AoI) within the disaster zone is proposed that uses the mobile phones of the...
Body Sensor Networks (BSNs) enable continuous and remote health monitoring in medical applications. Inter-user interference is the major cause that deteriorates the reliable data transmission in BSNs when multiple BSNs are transmitting simultaneously in close proximity to one another. This paper presents an inter-user interference mitigation (IIM) method, which enables BSNs to adaptively reschedule...
Avionics Full Duplex Ethernet (AFDX) is a well-established backbone network with wide usage in all current aircrafts, with its first usage onboard the Airbus A380. It was initially defined by Airbus and internationally standardized by ARINC (664 Part 7). The key features are 802.3 Ethernet compatibility, static routing based on a virtual link concept, reserved bandwidth with granted bandwidth allocation...
Proxy Mobile IPv6 (PMIPv6) has been developed by the IETF as a network-based mobility management protocol to support the mobility of IP devices. Although several proposals have been made for localized routing optimization, they don't take into account handover management and localized routing simultaneously. In fact, the localized routing state is only restored after the handover, leading to packet...
Hybrid network of wired and wireless technology has become hot topic research as a result of increasing demands in applying wireless network for industrial application. Hybrid network introduces different delay characteristic, depending on what technology that compose the hybrid network. In this paper, we present a framework for building a hybrid network composed of CAN protocol and ISA100.11a industrial...
This paper proposes three algorithms based on the contention tree algorithm to improve the system performance by utilizing the different additional of feedback information. These three algorithms are derived from adding of skipped slots and/or adaptive frame size strategies. Average access delay is analyzed to evaluate the system performance which is measured in term of the number of used slots in...
Data aggregation is a fundamental problem in wireless sensor networks that has attracted great attention in recent years. To design a data aggregation scheme, delay and energy efficiencies are two crucial issues that require much consideration. In this paper, we propose a distributed, energy-efficient algorithm for collecting data from all sensor nodes with minimum latency called Delay-minimized Energy-efficient...
The effectiveness of synthetic coordinate systems against DoS and spam stems from the fact that, while changing or hiding a logical address is easier, changing the location of the spammer inside the network should be harder. But synthetic coordinate systems are limited by the fact that malicious nodes can easily lie about their position or introduce additional delays which have an immediate impact...
This paper provides a simulation based procedure for evaluating video streaming over Bluetooth v2.1 + Enhanced Data Rate (EDR) and Bluetooth v3 + High Speed (HS) specification. For more realistic simulation of audio video transmission over Bluetooth network two mechanisms have been proposed. These mechanisms can be applied over upcoming Bluetooth specification and in more advanced Bluetooth streaming...
The function of multi-rate support (14 rate ranks from 1Mbps to 54Mbps) in PHYs is prescribed in IEEE 802.11 protocol. To analyze the serious affects to the throughput of whole networks caused by the low- rate access nodes, a precise algorithm is proposed based on the improved Markov model in DCF protocol. The throughput of WLAN is conducted with low-rate access nodes, and the simulation results with...
With the successful deployment of IEEE 802.11a/b/g wireless local area networks (WLANs) and the pent-up market demand for high speed wireless access, the IEEE 802.11n protocol has emerged as a promising standard with major enhancements. In order to scale to the high physical layer transmission rate of up to 600 Mbps, the current medium access control (MAC) protocol requires significant improvements...
Nowadays implementation of TCP and UDP protocols offer high speed and reliability on data links. Especially TCP implementations offer high speed rates, employing sliding window and data acknowledgement in TCP protocol. On the contrary, UDP offers different options and has other advantages and disadvantages. But in certain environment, especially with high delay and high bit error rate, these protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.