Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
An accurate model of network topology is the fundamental to design a new network protocol. Recent efforts have been made to produce many topologies for the Internet, but few can give attention the power-law distribution characteristic in each tier of the Internet. We propose Leetar, a new Internet topology generator, which can generate topologies that contains many tiers and each tier match the power-law...
The current progress of network technique and the complication of network structure make administrators must spend more time and mind to maintain the system and the network under normal operation. With continuously increasing dependence on the network, it seems to be a knotty matter to know how to effectively manage all equipments on the network and to make sure they whether run it rightly or not...
In a network, bridging nodes are those nodes that from a topological perspective, are strategically located between highly connected regions of nodes. Thus, they have high values of the Bridging Centrality (BC) metric. We recently introduced the Localized Bridging Centrality (LBC) metric, which can identify such nodes via distributed computation, yet has an accuracy equal to that of the centralized...
Based on the territorial continuity of IP addresses, this paper proposes an enhanced Boot-Trapping algorithm. It constructs a Patricia Tree which reflects the topology of the physical network, and collects information of the online Ultra Peers. By providing an UltraPeer physical network nearby for a LeafPeer, it can improve the proximity between the overlay network and the physical network, the aggregation...
Content sharing, dissemination and collaboration in open environments require the ability to send and combine data packets across network even in the absence of an end-to-end connected path [1]. User mobility plays a fundamental role in selection of intermediate relays for multi-hop communication [2]. Current schemes do not take into account the effect of power law distribution of inter-contact times,...
In IP over WDM networks, a single failure in the WDM layer breaks down multiple IP links and may leave the virtual topology disconnected. This will make the restoration by the IP layer impossible, which must be avoided by suitable virtual topology design. In this paper, we focus on single-node failure and develop a Remove-Node Algorithm to map IP links on lightpaths in such a way that the IP topology...
Anomaly detection is an essential functionality of Wireless Sensor Networks (WSNs) due to their complex behaviors and the wireless dynamics. In dynamic WSNs, many characteristics such as network topology, locations of sensor nodes, change frequently over time. We observe that indirect correlations among multiple attributes of a sensor node can be utilized to capture and model the historical behaviors...
Topology control is a well-known strategy to save energy and extend the lifetime of wireless sensor networks. It consists of topology construction and topology maintenance algorithms. While topology construction builds a reduced topology, topology maintenance changes the reduced topology when the current one is no longer optimal. The selection of an appropriate topology maintenance technique is rarely...
The microcellular system and distributed antenna system (DAS) are two promising systems to provide high data rate for future wireless communications, especially for the cell edge of the macrocell, because both systems can reduce the radio transmission distance. The cell edge spectrum efficiency is theoretically compared between the two systems in a network topology with seven macrocells, each of which...
The adhoc network comprises of nodes with a wireless radio interface is multihop network environment in which messages are transmitted from one to another node via intermediate nodes within the range. To find an effective and an efficient routing protocol, which is used to transmit information from source to destination across whole network topology, is a major issue in networking research. The broadcasting...
With the popularization of Internet and formation of wireless technologies provide significant impact on Internet and Communication Technologies. These technologies have support of one of famous technique known as Adhoc Network. Adhoc Networks are assortment of mobile nodes connected by wireless links and also receiving attention in the scientific community. In adhoc networks, routes may be disconnected...
Clustering is a method for hierarchical management of a network. Especially, clustering is often used in MANETs. Johnen et al. proposed a self-stabilizing clustering algorithm which treats a MANET as a vertex-weighted graph. The algorithm has autonomous adaptability against topology changes and weight changes, while it does not consider the stability of clusters. In this paper, we present a weight...
Energy efficient topology in Ad-hoc networks can be achieved mainly in two different ways. In the first method, network maintains a small number of nodes to form a connected backbone and the remaining nodes sleep to conserve energy. This method is effective for low traffic networks. Energy efficiency in the second method is achieved by power control technique. This technique is effective in high traffic...
Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. A malicious node can easily inject false routes into the network. A traditional method to detect such malicious nodes is to establish a base profile of...
The wireless backbone of the WMN poses several constraints on the amount of traffic that can be transferred through the network. In this paper we present an investigation of the WMNs topology effect on the capacity of these networks. Three different topology types were considered: square, triangle, and hexagon. These topology configurations can be used as a starting point in the initial design of...
Wireless Body Sensor Networks (WBSNs) have recently gained a lot of research interests due to emerging new applications in health-care, sports and entertainment. As the design of effective network architectures is a key issue to achieve energy-efficient and low-latency communications between the on-body sensors, the 1-hop star and the 2-hop extended star architectures have recently been promoted by...
Plant automation and control are mission-critical applications and require timely and reliable data delivery, which is difficult to provide using a wireless technology. This is especially more difficult in industrial environments with harsh radio conditions. In this paper we present a dynamic and distributed topology control algorithm for Wireless Sensor Networks for use in performance critical environments...
The peer sampling service is a core building block for gossip protocols in peer-to-peer networks. Ideally, a peer sampling service continuously provides each peer with a sample of peers picked uniformly at random in the network. While empirical studies have shown that uniformity was achieved, analysis proposed so far assume strong restrictions on the topology of the overlay network it continuously...
Link failures in wide area networks are common. To recover from such failures, a number of methods such as SONET rings, protection cycles, and source rerouting have been investigated. Two important considerations in such approaches are the recovery time and the needed spare capacity to complete the recovery. Usually, these techniques attempt to achieve a recovery time less than 50 ms. In this paper...
A Mobile Ad hoc NETwork (MANET) is an infrastructure-less, spontaneous, and arbitrary multi-hop wireless network, consisting of group of mobile nodes. The topology of the network can change randomly due to unpredictable mobility of nodes. In order to allow truly spontaneous and infrastructure-less networking, a protocol for dynamic allocation of unique addresses is needed, because pre-configuration...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.