The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work we propose the exploitation of network diversity for vehicular communications, in which cellular networks are integrated with ad hoc communications as a potential solution for meeting the varied communication requirements of vehicular applications. Although there are a plethora of reported studies on either 802.11p Digital Short Range Communications (DSRC) or cellular networks, joint...
Rateless erasure code (REC) is an erasure code, where the encoder generates a potentially infinite number of encoded symbols and the original message can be reconstructed from a sufficient number of correctly received packets. Many REC-based transmission protocols have been proposed for improving network throughput in lossy channel. However, state-of-the-art RECs (such as LT code and Raptor code)...
The fragmentation and aggregation (F&A) algorithm improves the throughput while ensuring the reliability in the MAC layer. To determining the optimal fragment size is a key issue of effectively operating the F&A algorithm. In this paper, the proposed method selects the optimal fragmented frame size and uses aggregation scheme based on various channel conditions. As a result the throughput...
The paper deals with the aspects of implementation and validation of the SpaceWire-R protocol as carried out in the ESA-funded project SpaceR. We give a brief overview of the SpaceWire-R protocol for providing reliable data transfer services over SpaceWire networks and describe the SpW-R protocol software implementation elaborated in the SpaceR project. The testing platform developed for validation...
In vehicle-to-infrastructure (V2I) communications, continuity and reliability are the most severe issues. Owing to the high-speed mobility of vehicles and frequent hand-off, the connection between vehicle and access point (AP) could not be kept stable. According to the number of APs and the adaptive data rate transmission, we investigate the performance of the proposed method which provides reliable...
In this paper, secure communication for RF-powered cognitive networks has been investigated in which the secondary source (SS) transmits confidential information to the destination (SD) using the harvested energy form primary transmitter (PT) in the presence of a passive eavesdropper (SE). Note that the transmission power at the SS is subject to two important constraint: 1) the maximum transmission...
To meet different communication requirements, a smart grid communication framework based on a hybrid network has been widely used. Virtual networks are established for various types of services respectively, and are embedded into heterogeneous substrate networks. Based on the framework, wireless network virtual mapping algorithm based on particle swarm optimization is proposed. In this scheme, the...
it is known that the more reliable LDPC code is the longer code, and it is also known that LDPC decoders with flooded architecture which allow parallel processing can achieve high throughputs. But, just architectures become very complex and require more hardware resources when the code length is large and random, so achieving a high error correction rate on short code lengths is considered a challenge...
Maintaining both reliable and secret communication involves different objectives: ensuring sufficient throughput for reliable communication and ensuring the secrecy of the associated communication. The optimal solution for one of these objectives might not be optimal or even suitable for another objective and thus a question arises as to what is the appropriate criteria for fairly balancing these...
As the flash memory continues its capacity scaling and correspondingly decreases its reliability, a technology upgrade regarding the error-correction engine in state-of-art solid-state drives (SSDs) is intensely expected. Due to their limit-approaching decoding ability, low-density parity-check (LDPC) codes are seen as one of the most promising substitute for the traditional BCH codes, though implementation...
Many applications of sensor networks collect massive data in a coordinated approach, such as monitoring volcanoes, oceans and forests. We propose, therefore, two protocols at the network stack to enable multiple frequency communication. MultiFCTP extends the state-of-the-art CTP to route packets using multiples frequencies. FlushMF is a transport protocol that extends Flush by supporting multiple...
Online graph analytics and large-scale interactive applications such as social media networks require low-latency data access to billions of small data objects. As a consequence, more and more distributed in-memory systems are proposed allowing to keep all data always in memory. However, these systems also need fault-tolerance mechanisms to mask node failures and power outages. We propose a novel...
High-speed serial data communication is now very popular for connecting various resources in high-performance computing systems. In such high-speed serial links, a line coding is important to control the run length (RL) and the running disparity (RD), because a large run length causes insufficient transitions on data-links that make it difficult to perform reliable clock and data recovery (CDR), and...
Security is one of the critical issue in any network, in order to have better performance and efficiency, better security parameters must be imposed on it. In this research security model of the network has been explained, further it is analyzed that various attacks are possible in the network that gives threat to security and one of such attack is DDoS attack, framework of DDoS attack is discussed...
In an unreliable cluster-based, broadcast-oriented vehicular network setting, we investigate the transmission reliability and throughput performance of random network coding (RNC) as a function of the packet generate rate. Our proposed model consists of a source vehicle broadcasting packets to a set of receivers (i.e. one-to-many) over independent broadcast erasure channels. The source vehicle performs...
We define in this paper a new 4D-Markov chain model for both evaluating analytically and improving efficiently IEEE 802.15.6 CSMA/CA mechanism. Considering non-ideal channel, we propound an enhanced version of IEEE 802.15.6 retransmission process. We investigate the performances of this WBANs (Wireless Body Area Networks) standard in terms of reliability, throughput and energy consumption in a non...
The exponential increase in capacity and data rate demands, along with the diversification of use cases and verticals that are planning to use cellular radio access networks (RANs) to provide connectivity, has prompted the development of the fifth generation (5G) of radio access technology. Traffic steering, which aims at optimum mapping of the data flows to the appropriate RAN access points (APs),...
In this paper we study the design of LDPC decoding scheme for very high throughput optical communications for a full self-seeded optical architecture dedicated to cloud radio access network (C-RAN). The objective of this paper is to demonstrate the potentiality of Bit Flipping (BF) algorithms. It is shown that the Gradient Descent Bit Flipping (GDBF) algorithm with a little improvement is suitable...
In this paper, high reliable broadcasting protocol in WLAN using retransmission is proposed. Broadcast in conventional WLAN has advantage of high efficient use of wireless resource, but has disadvantage of low reliability and data rate. Broadcasting frame includes the sequence indicating which nodes send ACK frame first. If some nodes fail to receive the frame, the node which success to receive the...
This paper proposes KAR (Key-for-Any-Route), a new intra-domain resilient routing system in which edge-nodes set a route ID to select any existing route as an alternative to safely forward packets to their destination. In KAR routing system, a route is defined as the remainder of the division between a route ID and a set of switch IDs along the path(s) between a pair of nodes. KAR-enabled switches...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.