The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This contribution focuses on securing end-to-end unicast communications in heterogeneous wireless sensor networks comprising satellite links, while maintaining effective network performance. The proposed protocol extends the LOCKSAT key management procedure, and is able to guarantee a frequent key renewal while overcoming limitations of each subnetwork (e.g., sensor and satellite). The effectiveness...
The quality-of-service (QoS) metrics in a wireless sensor network (WSN) of multiple sensor types depend on the performance of the network protocol layers, motivating a comprehensive cross-layer design approach to optimize QoS. Advances in energy-harvesting techniques enable increases in WSN lifetime by prolonging operation of the wireless nodes. While the primary objective of energy harvesting is...
We consider the problem of synchronizing prioritized data on two distinct hosts in disruption-tolerant networks (DTNs). To this effect, we propose and analyze a new interactive protocol for priority-oriented synchronization, called P-CPI, that is especially efficient in terms of bandwidth usage. This middleware protocol has features that are particularly useful for DTN routing in constrained or tactical...
The Internet Protocol Multimedia Subsystem (IMS) has been recognized as a common signaling architecture for providing next generation multimedia services. In order to enhance perceived service quality regardless of access network and device, IMS supports Quality of Service (QoS) negotiation and signaling. The IMS procedures used for that purpose are based on Session Initiation Protocol (SIP). Therefore,...
The Internet has now become such an important infrastructure that is capable of sending information within a very short time and easy to access. It is considered as public networks that provide affordable WAN services to most customers. Applications such as video conferencing, file transfer protocol and VoIP are the example of typical network applications supported by the Internet Protocol. Various...
Due to the US Government's cancellation of the Transformational Satellite Communications (TSAT) program, Internet Protocol (IP) networking using Military Satellite Communications (MILSATCOM) is not currently planned. In order to support military IP based communications over MILSATCOM systems; affordable, effective and efficient solutions must be developed. An alternate near-term MILSATCOM networking...
In this paper, we propose relay transmission protocol based on SoQ(Satisfaction of QoS) for QoS enhancement and analyze the performance of the proposed method in Wireless USB Networks. In the proposed protocol, Wireless USB host executes the Satisfaction of QoS (SoQ) time slot allocation algorithm. And, in order to give devices with scarce resource another chance to improve QoS, the proposed relay...
This paper proposes message scheduling on dedicated time slot of ISA100.11a to satisfy real time property. In this paper, a superframe is designed to accommodate periodic real time (PRT) message, aperiodic real time (alarm) message, and non real time (NRT) message. To do so, a superframe is divided into dedicated time slot (DTS) which is used to send PRT message and shared time slot (STS) which is...
Due to the lack of end-to-end connectivity between mobile nodes, delay tolerant networks (DTNs) exploit the opportunistic forwarding mechanism. This mechanism requires nodes to forward messages in a cooperative way. Nevertheless, nodes may exhibit selfish behavior, in particular when they are constrained with respect to the battery energy, computational power, and/or storage space. In this paper,...
It is typical for enterprises to rely on services from cloud providers in order to build a scalable platform with abundant available resources to satisfy user demand, and for cloud providers to deploy a number of datacenters inter-connected with high-capacity links, across different geographical regions. In this paper, we propose that video conferencing, even with its stringent delay constraints,...
To ensure sustainable operations of wireless sensor networks, environmental energy harvesting has been well recognized as one promising solution for long-term applications. Unlike in battery-powered sensor networks, we are targeting a duty-cycle adjustment to optimize the network performance, e.g., delay minimization, with full harvested energy utilization. In this paper, we introduce a set of duty-cycle...
To properly operate closed industrial control networks, it is required that communication with nearly constant delay bounds be supported. In [9] the authors introduced FlexTDMA in order to provide this support, and with minimal delay-jitter in an asynchronous network, under unicast communication. In this paper we consider how periodic on-off traffic and frame loss are managed in the presence of network...
Network protocols can be designed to enable a reduction in energy use of data servers. We architect a new HTTP timed redirection response for a GET request to be redirected to another server with a given delay. This redirection response can be used in a hybrid web server to coalesce GET requests and allow a server to periodically sleep. In such a hybrid web server, a small low-power ARM-based Assistant...
Resolution from identifiers to locators serves as a key component of mapping-based mobility solutions. In this paper we address the weakness of current resolution methods in supporting diverse mobility scenarios and propose a Global Resolution Service offered by Resolution Service Providers. We present a preliminary design and simulation, and results show that our approach is able to provide better...
The establishment of common control channel (CCC) is an immense challenge in cognitive radio networks (CRNs). Since the channel number is large and the channel access is opportunistic, the process (a.k.a. rendezvous) that any pair-wise nodes (i.e. rendezvous pair) find a common channel to establish a control channel for communication is hard to achieve, especially in a distributed CRN. Researchers...
Inter contact time (ICT) between two mobile nodes is essential to forwarding algorithms and the end-to-end delay in Delay Tolerant Networks (DTNs). However, studies regarding the distribution of ICT lack general applicability and the exponential parameter concerns with too many motion characteristics. Consequently, it is difficult to design the protocol and analyze the performance for DTNs. In this...
BitTorrent is the most widely used Peer-to-Peer (P2P) protocol and it comprises the largest share of traffic in Europe. To make BitTorrent more Internet Service Provider (ISP) friendly, BitTorrent Inc. invented the Micro Transport Protocol (uTP). It is based on UDP with a novel congestion control called Low Extra Delay Background Transport (LEDBAT). This protocol assumes that the receiver always gives...
When disasters occur, a common characteristic is the partial or complete failure of the telecommunications infrastructure so the usual means of communication are often not available. However, accurate and timely information of the disaster area is important. In this paper, a data collection method from an area of interest (AoI) within the disaster zone is proposed that uses the mobile phones of the...
Body Sensor Networks (BSNs) enable continuous and remote health monitoring in medical applications. Inter-user interference is the major cause that deteriorates the reliable data transmission in BSNs when multiple BSNs are transmitting simultaneously in close proximity to one another. This paper presents an inter-user interference mitigation (IIM) method, which enables BSNs to adaptively reschedule...
Avionics Full Duplex Ethernet (AFDX) is a well-established backbone network with wide usage in all current aircrafts, with its first usage onboard the Airbus A380. It was initially defined by Airbus and internationally standardized by ARINC (664 Part 7). The key features are 802.3 Ethernet compatibility, static routing based on a virtual link concept, reserved bandwidth with granted bandwidth allocation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.