The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper a theoretical and experimental analysis of the time-domain properties of the Power Line Communication (PLC) channel on-board a cruise ship is presented. It is shown that a typical feature of the topology of this kind of naval power networks strongly reduces the time variation of the transfer function for broadband PLC. In particular the topology uses a star configuration, and each electrical...
This paper presents statistical information about the company's field data. First of all, a monitoring tool is presented which offers the opportunity to collect reports. These reports are periodically sent by each PLC device and collected in a central database. They show the network topology and provide information concerning the channel characteristic such as the signal to noise ratio (SNR), the...
Wireless sensor networks (WSNs) detect and monitor the outside physical state by the sensor nodes organizing automatically. Clustering is a standard approach for achieving efficient and scalable performance in WSNs. In the applications of analysis topology discovering, geography routing, tracking and so forth, we need to resolve how to search for the boundary nodes and form the network boundary. Different...
Peer-to-peer (P2P) network topology measurement is the foundation for research of p2p network sharing behavior pattern and network resources dynamic distribution. To BitTorrent (BT) network, we present an active measurement method of network topology. Firstly, using seed crawler get entire BT network's seeds, then through analyzing every seed to get tracker servers' information, after that, BT crawler...
With new optical transport systems able to provide sub-wavelength granularity, the dynamic characteristics of the network are expected to strongly increase. Furthermore, such properties are highly related to the underlying physical network topology, which in turn require from the control plane important features such as scalability, dynamism and automatism. In this paper we analyze the properties...
Wireless sensor networks (WSNs) are frameworks for modern pervasive computing infrastructures, and are often subject to operational difficulties, such as the inability to effectively mitigate signal noise or sensor failure. Natural systems, such as gene regulatory networks (GRNs), participate in similar information transport and are often subject to similar operational disruptions (noise, damage,...
How to measure and maintain connectivity is an important issue in ad hoc networks. A special case of such network is Wireless Sensor Networks (WSN), which are often deployed in harsh environments and also susceptible to a number of problems that may negatively affect the connectivity among the nodes. An additional factor that increases the cost of connectivity maintenance in ad hoc networks is when...
The paper presents the comparative study and analysis of buffering in Goback2 network. The performance at the destination node by applying different buffering capacities at the routers is demonstrated. The results using NS2 simulator are produced. It can be concluded that the selection of appropriate type of buffering helps in controlling the congestion and the packet drops at the link node.
A mobile ad hoc network consists of only mobile nodes without the access points and the center server. In the mobile ad hoc network environment, a set of nodes in the network and the network topology are frequently changing due to the node appearance, the node disappearance, and the node movement so that it is not easy for users in the network to obtain the services provided in the network. Therefore,...
Many sensor network protocols utilize the existence of disjoint paths (e.g., perfectly secure message transmission or multi-path key establishment), but do not address how a node actually determines these paths in the presence of an adversary. In this paper we investigate what assumptions are necessary to gather information about the local network topology when adversarial nodes are present and capable...
An efficient logical topology helps wireless sensor networks (WSNs) minimizing different constraints. For large-scale WSNs, chain oriented logical topologies are shown to be more energy conservative than other logical topologies. Chain construction is the main challenge to create a chain oriented logical topology. In this paper, we propose a chain construction scheme, which creates several chains...
In this paper, we study the performance of the Greedy Perimeter Stateless Routing (GPSR) [1] and the Greedy Routing for Maximum Lifetime (GRMax)[2] which is our proposal, in wireless sensor networks in random topology and grid topology wireless sensor network. We decide to compare the performance of GPSR and GRMax in different topology of networks using the same simulation environment. Evaluation...
In this paper, we study the problem of data acquisition in wireless sensor networks (WSNs). A recently revitalized technique called compressive sensing (CS) has presented a new method to capture sparse signals at a rate below Nyquist. There are drawbacks to directly applying the existing CS algorithm to WSNs, which are mainly due to the fact that CS requires a large number of inter-communications...
In today's cellular networks, it becomes harder to provide the resources for the increasing and fluctuating traffic demand exactly in the place and at the time where and when they are needed. Moreover, a cellular network which can cover indoor areas and hot-spots is a complicated and expensive task. Therefore, a new hierarchical topology is put forward to solve the problem, and the topology have application...
Vehicular Ad-hoc Network (VANET) can be envisaged as the network of moving vehicles communicating in asynchronous and autonomous fashion. Efficient and scalable information dissemination is a major challenge due to the movement of vehicles which causes unpredictable changes in network topology. Publish/Subscribe communication paradigm provides decoupling in time, space and synchronization between...
In performance studies of vehicular ad hoc networks, intelligent simulation tools like NS-2 plays an important role. Since Tcl scripts are widely used, we have implemented a new tool which is MyTool for generating Tcl scripts file. In this work, we introduce the specific characteristics of MyTool and discuss its features compared with NSG2 (NS-2 Scenarios Generator 2). In later section, we illustrate...
In this paper, we present a novel satellite network simulation platform (SNSP) based on OMNeT++ and MiXiM for researchers to develop better protocols for satellite networks. In this platform, multi-formatted satellite orbit data are permitted as input, and inter-satellite links (ISL) are created according to satellites position and specified connection rules. Correspondingly, the satellite network...
Topology inference of end to end measurement overcomes the drawbacks of traditional algorithm that needs cooperation of internal node in network, And does not incur any additional burden on the network. Scholars show interests in Research Area in recent years. This paper analyzes recent new arithmetic Based on end to end date for wireless sensor networks, sums up the characteristics and the appropriate...
In this paper we consider the problem of transmitting a collection of packets from a source node to a destination node across a relay network. We analyze a simple random network coding scheme where each node transmits a random linear combination of packets each time it has a transmission opportunity. Our goal is to determine the expected time required to transmit all packets from the source to the...
Conventional layered protocols are not capable to handle the vagaries of Wireless Mesh Networks (WMN) such as rapidly changing wireless channel quality, battery power and network topology. Most WMN cross-layer proposals to overcome these problems utilize only a limited set of parameters from the concerned layers rendering them incapable of network and system wide optimizations as they do not consider...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.