The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work we aim at providing an initial analysis of the IEEE802.11s amendment that introduced support for mesh networking to Wireless LAN specifications. Indeed, there has been an increasing interest in the adoption of IEEE 802.11-based wireless systems also in the field of Distributed Measurement Systems (DMSs). Nonetheless, in such a scenario it is necessary to investigate the obtainable performance,...
In this paper, we present an environment for the simulation of DRDoS attacks and protection mechanisms against them. The main difficulties of simulating attacks of this type are listed, the ways of their solution in the form of a system approach are shown.
In a cognitive radio network (CRN), a premise for two nodes to communicate is having a rendezvous which means that they switch to the same channel simultaneously. Most existing channel hopping solutions for the rendezvous problem is for a homogeneous CRN where nodes have the same type of cognitive radio and thus can sense the same spectrum. In reality, nodes have different types of cognitive radios...
With the rapid development of WLAN, a surge in the number of network users and high-speed data exchange highlight the importance of efficient initial access of MAC layer. The majority of initial access of MAC layer is based on ALOHA or CSMA/CA. With the increase of network traffic, the number of collisions is growing rapidly, resulting in speedy decreasing access success rate and normalized throughput...
The future smart power grid will consist of an unlimited number of smart devices that communicate with control units to maintain the grid's sustainability, efficiency, and balancing. In order to build and verify such controllers over a large grid, a scalable simulation environment is needed. This paper presents an open source smart grid simulator (SGSim). The simulator is based on open source SystemC...
Inter-Integrated Circuit (I2C) plays an important role as an interface in communication between devices. EEPROMS, ADC, DAC and RTC require an interface for communication and I2C is used as an interface between them. The RTL behavior of the I2C Master Controller is verified using System Verilog and its verification is carried out in Mentor Graphics tool. The functionality of the design is verified...
Today's scenario of semiconductor technology is a tremendous innovation, System on chip (SOC) design is of a great number of Intellectual property (IP) Cores which requires an efficient protocol for all types of operations. Large scale SOC gets more demanding due to the unavoidable importance for IP reuse, complexity and abridging the design time while encouraging IP core reusability for SOC designs...
IoT (Internet of Things) has attracted a lot of attention recently. IoT devices need to report their data or status to base stations at various frequencies. The IoT communications observed by a base station normally exhibit the following characteristics: (1) massively connected, (2) lightly loaded per packet, and (3) periodical or at least mostly predictable. The current design principals of communication...
Wireless Sensor Networks (WSN) consists of independent sensors distributed across different locations, which are used to continuously record the environmental or physical conditions. The recorded data will be passed through the network from a sensor to a main location. Sensors life time is based on the battery power. Lower the battery power leads to decrease in lifetime for a sensor. It is important...
In this paper, we advocate implementing carrier sense multiple access with collision detection (CSMA/CD) in the broadband power line communication (BB-PLC) standard, G.hn, and show the gain in data rate obtained over carrier sense multiple access with collision avoidance (CSMA/CA). The use of CSMA/CD is made feasible due to the recent implementation of in-band full duplex operation in BB-PLC. We provide...
There are several groups of routing algorithms in dynamically changing networks developing every year. We introduce an additional parameter “Battery Life decrease” in the existing Q-Routing protocol. The Battery Life is reduced in direct proportion to the number of packets transmitted to the node. The efficiency of the Optimized Battery Life Q-Routing protocol is estimated by total loss of network...
The technological rebellion has made current generations to depend more on the digital world in their day to day life. The effectiveness of the digital world has changed the learner's perceptive towards the education system. The impulsivegrowth of technology has increased the popularity of Information and Communication Technology which has created a research scope in Computer network domain thus Computer...
The number of reported cybersecurity incidents on SCADA (Supervisory Control and Data Acquisition) systems increased significantly in the past few years. One contributing factor is the fact that security testing of live SCADA systems is not practical as such systems are expected to be operational 24/7. Also and most importantly, conducting live security testing on these types of systems is generally...
The IEEE 802.15.4 standard for the Low Rate Wireless Personal Area Networks (LR-WPANs)is popular and widely used for many areas of applications. The standard uses slotted CSMA/CA protocol in it's contention access period (CAP) in the beacon enabled mode. The protocol adopted a Binary Exponential Backoff (BEB)algorithm. In this paper, we investigate the saturation throughput of this standard using...
This paper studies global channel state information (CSI) in time-slotted wireless ring networks with time-varying reciprocal channels. Lower bounds on maximum and average staleness of global CSI are derived, and efficient protocols that achieve the bounds are developed. Two extreme scenarios are considered with either (i) one node transmitting at a time or (ii) the maximum number of nodes transmitting...
InfiniBand is the de facto networking technology for commodity HPC clusters and has been widely deployed. However, most production large-scale InfiniBand clusters use simple routing schemes such as the destination-mod-k routing to route traffic, which may result in degraded communication performance. In this work, we investigate using the OpenFlow-style Software-Defined Networking (SDN) technology...
A wireless sensor network (WSN) is a collection of sensor nodes which can monitor the physical activities and attributes of a whole spectrum of objects and environments. The purpose of collecting this data and processing it in a meaningful manner requires that it adds significant value to the end user. WSN are deployed ever more frequently and applications vary from providing an early alert system...
In energy-harvesting wireless sensor networks (WSNs), not only energy savings but also efficient energy utilization is required. This study suggests a scheme that indicates when to send data decided by predicting the remaining energy of a node, and aggregates sensed data to increase the amount of data arrived at the sink node. With this method, if the estimated remaining energy of a node is expected...
The VANET (Vehicular Ad hoc Network) is a collection of mobile nodes forming a temporary network on variable topology, operating without base station and without centralized administration. The characteristics of VANET network that distinguishes it from other ad hoc networks, such as high mobility and communication with the infrastructure to support security or comfort applications, have prompted...
Atomic multicast is a group communication primitive that allows disseminating messages to multiple distributed processes with strong ordering properties. As such, atomic multicast is a widely-employed tool to build large-scale systems, in particular when data is geo-distributed and/or replicated across multiple locations. However, all the most efficient atomic multicast algorithms suffer from a convoy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.