The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the network function virtualization (NFV)-enabled multicast problem, and proposes a steiner tree-based algorithm to reduce the cost of virtual network function (VNF) deployment and routing. In the algorithm, to minimize the bandwidth consumption, the Steiner tree is constructed by taking all the destination nodes as the terminals. Then a interconnection node of the tree is...
Collecting data in time is crucial for the wireless sensor network (WSN), especially for some WSNs who suffer from inconstant link connections. Our observations in the intertidal wireless sensor network (IT-WSN) reveal that end-to-end delay is severe and a big challenge to be solved. Existing routing protocols perform well in WSNs with good link quality but show deficiency when node states change...
Industrial IoT networks are typically used for monitoring systems and supporting control loops, as well as for movement detection systems, process control and factory automation. To this end, data generated by monitoring IoT devices are collected, elaborated and sent to controllers and actuators. The routing of data from IoT sensors to actuators is an integral part of any large-scale industrial network...
Multilayer Clustered Designing Algorithm is exploited to present MCDA - Hot Spot algorithm; a technique to increase the network throughput by alleviating the impact of hotspot issue on network lifetime. The network nodes in the hot spot region are in a flat layer form in contrast to rest of the network nodes that are grouped into clusters. This design substantially helps in achieving goal above. This...
Although IEEE 802.11p technology is standardized for road safety and efficiency applications, the channel congestion problem is its key weakness necessitating distributed congestion control (DCC) algorithms on different layers of the communication stack. In this paper, we propose DCC-enabled Contention based Forwarding scheme targeting multi-hop dissemination of Decentralised Event Notification Messages...
In this paper we analyze the applicability of onion routing on Predictable Delay-Tolerant Networks. We show that a simple approach for providing anonymity through the application of a simple onion routing can be feasible in some scenarios. To that end we evaluate our proposal on a network based on a city public bus transportation network.
BTLive is a novel, unique, mesh/push-based peer-to-peer (P2P) live video streaming mechanism. Previous studies show that it achieves significantly lower streaming delays than other approaches but suffers from a high overhead, where peers receive up to 33% duplicate video chunks. Other P2P streaming mechanisms, most of which are either mesh/pull or tree/push-based, do not experience duplicates at such...
In mobile Cognitive Radio Networks (CRNs), the frequent link breakage and wireless interference urged the need for novel stable routing solutions. In this paper, we propose STAR, a stable routing protocol that aims at selecting interference-free and durable paths. We investigate the particular Hidden interfering Primary User (HIPU) problem caused by the un-detectable presence of the primary user in...
This paper studies the problem of routing in a multilayer (communication and social) network. Network protocols, such as link state routing and its variants, heavily used in mobile ad hoc networks (MANETs) cannot sustain robustness and efficiency as the topological information becomes easily stale with fast network dynamics. Attempts to collect and exchange excessive network information would result...
Delay Tolerant Network (DTN) is a type of network that permanent connections between nodes are not always available. Routing in DTN uses store-carry-and-forward scheme, where nodes store and carry data until a suitable message carrier appears. Positive social characteristics such as centrality and friendship can be used to make a better routing decision in DTN. However, negative social characteristics...
Available smartphone« and smart objects can use short range connections like Wi-Fi and Bluetooth as a communication technique to exchange information with nearby devices. Those techniques are used in cases of absent end-to-end connection such as in Delay Tolerant or Opportunistic Networks. The study of message transmission processes and contact information in such networks has gained more attention...
A simple network model with torus topology and the virtual cut-through routing have been considered in order to find out and analyze certain relationships that can be used as a starting point for a deeper theoretical analysis and further research. An expression for the saturation point (message generation rate at which network saturates) and approximate expressions for the latency as a function of...
As an emerging technology, software defined networking (SDN) allows flexible control of network devices and supports user applications with guaranteed quality of service (QoS). To achieve flow transmission between two non-adjacent switches in SDN, efficient routing algorithm should be designed. In this paper, we jointly consider route selection and flow allocation problem. To stress the service sensitivity...
Real-time video services are usually delay sensitive and have strict constraints on the transmission reliability, which poses challenges to live video streaming over multi-hop wireless networks, since the unpredictable packet losses and network congestions caused by time-varying wireless channels greatly degrade the received video quality. To address this, in this paper, we propose a reinforcement...
Traditional vehicular routing protocols cannot accurately foresee future location of each vehicle for efficient packet forwarding. Recently, the data mining approach has been applied to analyze huge vehicle trajectory data. In this paper, we propose a novel trajectory-based routing (NTR) protocol to improve the packet replication efficiency of vehicles in the Vehicular Delay Tolerant Network (VDTN)...
Among the schemes proposed for failure recovery in software-defined networks, installing backup paths in advance is considered to be an effective approach to reduce the recovery latency. However, the pre-installation poses undue storage overheads on flow tables. In this paper, we propose a customized and cost-efficient backup scheme, which achieves fast recovery from any single-link failure. We introduce...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
Wireless sensor networks (WSNs) are used in many mission-critical applications, such as target tracking on a battlefield, emergency alarms, and disaster detection. In such applications, QoS provisioning in the timeliness domain is indispensable. Moreover, because of the diversity of sensory data, QoS provisioning should support not only one but multiple levels of end-to-end delay constraints. As a...
Wearable devices, such as wristbands, smart-watches, eyewear, and wearable bio-monitors have become the focus of much attention in past year. One in ten U.S. consumers over the age of 18 now owns a modern activity tracker. These ubiquitous devices are a natural platform for formation of ad hoc networks. With almost 40% of users are above the age of 45, these older adopters are focused on improving...
In opportunistic networks, forwarding based protocols lead to a large amount of data flow to the highly connected nodes and unfairness of the nodes' traffic load, finally, it makes the highly connected nodes suffer congestion and results in the messages were discarded. To solve this problem, a congestion control algorithm based on Social Awareness is proposed in this paper. When choosing the next...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.