The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proxy Mobile IPv6 (PMIPv6) has been developed by the IETF as a network-based mobility management protocol to support the mobility of IP devices. Although several proposals have been made for localized routing optimization, they don't take into account handover management and localized routing simultaneously. In fact, the localized routing state is only restored after the handover, leading to packet...
Hybrid network of wired and wireless technology has become hot topic research as a result of increasing demands in applying wireless network for industrial application. Hybrid network introduces different delay characteristic, depending on what technology that compose the hybrid network. In this paper, we present a framework for building a hybrid network composed of CAN protocol and ISA100.11a industrial...
This paper proposes three algorithms based on the contention tree algorithm to improve the system performance by utilizing the different additional of feedback information. These three algorithms are derived from adding of skipped slots and/or adaptive frame size strategies. Average access delay is analyzed to evaluate the system performance which is measured in term of the number of used slots in...
Data aggregation is a fundamental problem in wireless sensor networks that has attracted great attention in recent years. To design a data aggregation scheme, delay and energy efficiencies are two crucial issues that require much consideration. In this paper, we propose a distributed, energy-efficient algorithm for collecting data from all sensor nodes with minimum latency called Delay-minimized Energy-efficient...
The effectiveness of synthetic coordinate systems against DoS and spam stems from the fact that, while changing or hiding a logical address is easier, changing the location of the spammer inside the network should be harder. But synthetic coordinate systems are limited by the fact that malicious nodes can easily lie about their position or introduce additional delays which have an immediate impact...
This paper provides a simulation based procedure for evaluating video streaming over Bluetooth v2.1 + Enhanced Data Rate (EDR) and Bluetooth v3 + High Speed (HS) specification. For more realistic simulation of audio video transmission over Bluetooth network two mechanisms have been proposed. These mechanisms can be applied over upcoming Bluetooth specification and in more advanced Bluetooth streaming...
The function of multi-rate support (14 rate ranks from 1Mbps to 54Mbps) in PHYs is prescribed in IEEE 802.11 protocol. To analyze the serious affects to the throughput of whole networks caused by the low- rate access nodes, a precise algorithm is proposed based on the improved Markov model in DCF protocol. The throughput of WLAN is conducted with low-rate access nodes, and the simulation results with...
With the successful deployment of IEEE 802.11a/b/g wireless local area networks (WLANs) and the pent-up market demand for high speed wireless access, the IEEE 802.11n protocol has emerged as a promising standard with major enhancements. In order to scale to the high physical layer transmission rate of up to 600 Mbps, the current medium access control (MAC) protocol requires significant improvements...
Nowadays implementation of TCP and UDP protocols offer high speed and reliability on data links. Especially TCP implementations offer high speed rates, employing sliding window and data acknowledgement in TCP protocol. On the contrary, UDP offers different options and has other advantages and disadvantages. But in certain environment, especially with high delay and high bit error rate, these protocols...
In the past, we have proposed an intersection graph (IG)-based vehicular ad hoc network (VANET) architecture for efficient unicast communication in the city urban. Thus, the source vehicle can leverage the proposed IG and IG bypass routing protocols to greedily forward unicast packets to the destination vehicle via each intermediate intersection in the calculated least cost IG path. However, when...
A calibrated delay line is a key component in many modern digital systems. Traditionally, these lines are designed as real-time pipelines with static granularity, fine enough to handle a worst-case input rate. However, due to their rigid structure, they have sub-optimal energy for low- and varying-rate input streams. We introduce a complete methodology for designing reconfigurable delay lines which...
With the explosion in traffic consumption, the limitations of centralized mobility protocols became a concern. As a result, the concept of distributed mobility management (DMM) emerged. Basically, DMM brings the mobility anchors closer to the users, avoiding issues as single point of failure and non-optimal routing. On the other hand, IP multicast, being designed for efficiency, is a key method for...
The exponential traffic growth and the increasing complexity of WDM networks demand a more sophisticated control protocol that will provide a more efficient use of optical network capacity. Many researchers propose to extend GMPLS protocol suite to activate WDM networks, such as by enhancing OSPF-TE, RSVP-TE, etc., the decentralization of control functions is also an inevitable trend of developing...
With the popularity of cloud computing, high volume data needs to be processed in real-time. Therefore, many distributed stream processing systems have risen to deal with this requirement. One kind of distributed stream processing applications contains several PEs which are connected together to implement the application logic. As data is in the form of streams and it needs to be processed in real-time,...
We propose MCCT (Multi-Channel Cluster Tree), a cluster-tree construction protocol for nodes in IEEE 802.15.4 beacon-enabled mode. By multiplexing transmissions across orthogonal channels, we reduce collisions between control and data frames, which leads to better packet delivery rate and fairness. We propose a method for constructing a cluster-tree suitable for minimizing beacon collisions. The protocol...
We exploit helper-to-helper (h-2-h) cooperation using the broadcast nature of wireless sensor networks. The potential helpers overhear the packet from the transmission of previous hop and the helper transmits the packet in the current hop on behalf of the assigned node (sender). We call it friendship relaying cooperative medium access control (FRC-MAC) protocol. This mechanism eliminates the sender...
With the increasing economic development, the number of cars in the city has been increasing continuously. Though some RFID parking lot management systems have been set up, most rely on manual management and efficiency is very low. The major cause is that a well information communication system is not built between the parking lot manager and the parking spaces. In order to solve the problem, a scheme...
EPA (Ethernet for Plant Automation) resolves the nondeterministic problem of Ethernet through sub-segment topology and deterministic scheduling mechanism. In this paper, the EPA scheduling mechanism is implemented by simulation tool. And the influence of EPA scheduling mechanism on network performance is shown in the simulation result. According to the study, the real-time performance of EPA periodic...
In this paper, we propose an improvement to the EPC Class1 Gen2 standard for RFID networks by adding randomness to the transmission process. To this end, we introduce a new parameter in the packets exchanged between the reader and the tags. We analyze the behavior of our proposal by regarding the identification delay, the number of used slots, and the average number of identification cycles. With...
Recently, it has been noted that the inefficiencies in peer-to-peer (P2P) overlay networks result in a large quantity of traffic among internet service providers (ISPs) or autonomous systems (ASes). To optimize cross-ISP/AS traffic, the existing approaches introduce network-aware strategies in which peers select geographically close peers as neighbors using topological information. However, each P2P...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.