The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we investigate the problem concerning about how to construct an interference-free multicast tree in the multi-channel multi-radio multi-rate wireless mesh networks with the goal of maximizing the number of clients served by the tree. This problem is referred as the profit-based multi-rate multicast tree (PMMT) problem. With the joint consideration of multicast routing, channel assignment...
In this paper, we consider the secure connection problem in multihop wireless networks with full-duplex (FD) jamming relaying, where the colluding eavesdroppers are randomly distributed following a homogeneous Poisson point process (PPP). By applying FD, each legitimate node (including relay and destination) jams the eavesdroppers when it receives the desired signal from transmitter. We adopt the...
The performance of wireless multi-hop mesh networks is negatively affected by interference between neighboring links which use the same channel. Even if no interflow interference exists, intra-flow interference still degrades network performance to a high degree. To overcome this problem this paper presents a routing protocol for wireless multi-hop networks with multiple radio interfaces, which minimizes...
Networks-on-Chip (NoCs) for contemporary multiprocessors systems must integrate complex multimedia applications which require not only high performance but also timing guarantees. However, in existing NoCs, designed for real-time systems, timing constraints are frequently implemented at the cost of decreased hardware utilization, i.e strict spatial or temporal isolation between transmissions. In this...
Wireless sensor networks (WSNs) are widely used nowadays in various domains. In general, the applications in which the WSN is deployed need that this network presents a minimal degree of reliability, effectiveness and robustness. However, the specificity of the nodes deployed in this type of networks makes them prone to failures. In this paper, we discuss the recovery from simultaneous failures for...
In optical networks, failures can imply in great loss of data due to high transmission rates, leading to the need of employment of protection mechanisms. This paper introduces a novel algorithm to provide Failure-independent path protecting p-cycle with minimum interference for path protection in elastic optical networks using space division multiplexing. The proposed protection algorithm reduces...
Energy consumption reducing in wireless communications has attracted increasing attention recently. Power control is a key technology for cognitive networks, which can affect energy saving of cognitive network and interfere with primary networks. In this paper, we jointly consider power control in physical layer, scheduling in link layer and routing in network layer to present a cross-layer optimization...
With the rapid development of multi-media services, the multi-media traffic flows make the load in wireless mesh network (WMN) increase sharply, which incurs network congestion. In the context of having multiple multicast sessions, the load-balance and interference-aware (LBIA) routing algorithm is proposed by considering the intra-flow interference, inter-flow interference and load balance. This...
Neighborhood Area Networks (NANs) are an important part of the smart grid, which is the last one mile communication in a Smart Grid Communication Network (SGCN), and a routing algorithm is one of the key technologies to improve the performance of NANs. Designing routing metrics is critical for routing algorithm of NANs. The goal of the metric is to choose a high-throughput path between a source and...
Wireless Mesh Networks (WMNs) is an emerging wireless technology which attracts more and more the attention not only of service providers and enterprises, but also researchers and academicians. In this paper, we are interested by the specification and the analysis of the Channel Assignment process to improve WMNs capacities during the routing process. We give an algorithmic solution showing how to...
Many applications of sensor networks collect massive data in a coordinated approach, such as monitoring volcanoes, oceans and forests. We propose, therefore, two protocols at the network stack to enable multiple frequency communication. MultiFCTP extends the state-of-the-art CTP to route packets using multiples frequencies. FlushMF is a transport protocol that extends Flush by supporting multiple...
Two-tiered direct network topologies such as Dragonflies have been proposed for future post-petascale and exascale machines, since they provide a high-radix, low-diameter, fast interconnection network. Such topologies call for redesigningMPI collective communication algorithms in order to attain the best performance. Yet as increasingly more applications share a machine, it is not clear how these...
Wireless Mesh Networks provide a reliable, robust and resilient platform for broadband access. Main benefits of using Wireless Mesh Networks are their low cost, robustness, self healing, and self configuring properties. In Wireless Mesh Networks, routing metric determines the path from source to destination. Wireless link conditions can be affected by a number of factors including interference, congestion,...
We consider a centralised wireless sensor network, where nodes have to send data to a final sink, managing both routing and radio resources assignment. We propose two novel algorithms to jointly assign time slots to links and to define paths connecting nodes to the sink. In contrast with previous works, the proposed algorithms account for a realistic capture effect, where the signal-to-interference-ratio...
Flit-level preemptions via virtual channels have been proposed as one viable method to implement priority-preemptive arbitration policies in NoC routers, and integrate NoCs in the hard real-time domain. In recent years, researchers have explored several aspects of priority-preemptive NoCs, such as different arbitration techniques, different priority assignment methods (where applicable) and different...
The multi-yard-crane routing optimization aims at minimizing the total container handling time by multiple yard cranes which work simultaneously to pick all the designated containers. Being different to the past studies, the problem is formulated as a mixed integer programming that considers inter-crane interference. The number of containers that each yard crane picks at each yard-bay, and the sequence...
In this paper, we summarize and propose the DTN physical model for deep-space communication. According to deep-space characteristics, we design a new self-adaptive routing protocol for deep-space DTN. The new routing protocol can work well in long-delay and intermittent network environment. We have many contrast simulation experiments on our DTN simulator.
Cognitive Radio Network (CRN) exploits the spectrum hole in licensed bands by allowing co located cognitive users to communicate among themselves when licensed users are idle. In such opportunistic communication, the cognitive users need to vacate the channel as and when the licensed user becomes active. Most of the time such sudden termination of ongoing sessions of cognitive devices leads to unacceptable...
In a multi-hop wireless network, a node can act as a candidate file provider to other nodes, if it has downloaded the file from the Internet. When another node requires the same file, all nodes which have already obtained the file can act as candidate file providers (sources) and transmit file together to the request node (destination). We form this as the multi-source transmission. As the multi-source...
In this paper, we propose a reliable and interference-aware routing protocol for underwater wireless sensor networks (UWSNs). Proposed protocol follows end-to-end path from source node to sink and selects next forwarder node of a data packet on the basis, having already established a path to sink. In this way, the problem of encounters void hole in depth based routing protocol is eliminated. Furthermore,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.