The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the link selection policy for secure communications over a buffer-aided two-hop communication link. It is assumed that a source wishes to send information to a destination with the aid of a trusted half-duplex relay node compromised by a passive eavesdropper, and that there is no direct link between the source and the destination. The buffer-aided relay forwards the information...
Current networks are changing very fast. Network administrators need more flexible and powerful tools to be able to support new protocols or services very fast. The P4 language provides new level of abstraction for flexible packet processing. Therefore, we have designed new architecture for memory efficient mapping of P4 match/action tables to FPGA. The architecture is based on DCFL algorithm and...
Recent research interest in cellular communication systems focuses on the design of the radio access networks (RAN) considering Transmission Control Protocol (TCP) behavior. However, less attention has been paid to the specific transmission method of TCP ACK. The authors have been studying methods including TCP ACK filtering that can well work with the link layer protocols in LTE-Advanced Pro (LTE-A...
Memory price will continue dropping in the next few years according to Gartner. Such trend renders it affordable for in-memory key-value stores (IMKVs) to maintain redundant memory-resident copies of each key-value pair to provision enhanced reliability and high availability services. Though contemporary IMKVs have reached unprecedented performance, delivering single-digit microsecond-scale latency...
In this paper the applicability of a fault tolerance synchronization algorithm is presented through data packet headers. Packet headers provide indicts for networking equipment on what must be done and in the case of real-time persistent routed sessions, these are a concise guideline on how to tune each parameter. Real-time sessions are transmitted with connection oriented protocols and need a constant...
Queuing Theory was ultimately applied to improve the radio resource sharing in cooperative cognitive radio networks. It indeed gives a better model of storing and transmitting packets of both Primary User (PU) and Secondary User (SU). It especially helps emulate the cooperative radio resource sharing between these two users. With such cooperation protocols, the PU allows the SU to share his spectrum;...
Wireless communications play a significant role in the spread of the Internet Of Things (loT). While all machines try to connect to the IoT and exchange data, wireless communications offer freedom of movement and demand of minimum infrastructure. The main obstacles that wireless communications face are the limited source of power and the short range of coverage. This paper highlights all the available...
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
The data transfer in the Grid at CERN (the European Organization for Nuclear Research) has seen constant improvement, be it through optimizing the existing tools, GridFTP and GFAL2 or by adding new tools such as XRootd. Unfortunately, all these have reached the maximum limit in terms of throughput. They are limited not by the network infrastructure, but by the fact that they use a single source for...
Scientific HPC applications along with the emerging class of Big Data and Machine Learning workloads are rapidly driving the fabric scale both on premises and in the cloud. Achieving high aggregate fabric throughput is paramount to the overall performance of the application. However, achieving high fabric throughput at scale can be challenging - that is, the application communication pattern will...
The advent of non-volatile memory (NVM) technologies has added an interesting nuance to the node level memory hierarchy. With modern 100 Gb/s networks, the NVM tier of storage can often be slower than the high performance network in the system; thus, a new challenge arises in the datacenter. Whereas prior efforts have studied the impacts of multiple sources targeting one node (i.e., incast) and have...
Road intersections represent a leading cause of traffic congestion and accidents. In fact, more than 44% of all reported crashes in the U.S. occur within intersection areas, which, in turn, lead to 8,500 fatalities and approximately 1 million injuries every year. The expected advent of self-driving vehicles raises the question of how automated and connected vehicles can be used to improve throughput...
The 1588 Precision Timing Protocol (1588-PTP) states that a timestamp event is generated at the time of transmission and reception of any event message and that the timestamp event occurs when the message's timestamp point crosses the boundary between the node and the network (event generation points). The protocol defines the message timestamp point for an event message as the beginning of the first...
In March 2016, a new protocol called licensed-assisted access (LAA) has been embodied in Release 13 (Rel-13) for Long-Term Evolution (LTE) to operate on unlicensed spectrum and interwork with Wi-Fi. The relevant standards clarify the channel access procedures and contention window (CW) adjustment procedures for LAA. In a long period of time, the coexistence performance of LAA with other technologies,...
The Low Voltage Power Line Communication (LVPLC) MAC protocols are an important influence factor to the network throughput. To solve the problem that the relatively low throughput due to the asymmetric PLC channel influence, we propose an improved adaptive p persistent CSMA protocol to optimize throughput for the finite loads in LVPLC accurate artificial cobweb network. This protocol reduces collision...
In this paper, we focus on the problem of collision in tags identification in RFID systems. We propose tree algorithm with single error bit tracking that utilizes Manchester coding to know the position of collision bit among the ID of the tags. The reader broadcasts the Query bit that is updated in every collision. The update is done according to the position of the collision bit that allows to reduce...
In this work, we use a new technique called tagged user approach (TUA) to analyze the performance of S-Aloha MAC protocol for CR users widely used in wireless communication. This new technique assumes that the channel is symmetric so that statistical equilibrium exists for all users. By adding two more realistic assumptions, we analyze the stability of the random chosen user and after extrapolate...
Dedicated wide-area network connections are increasingly employed in high-performance computing and big data scenarios. One might expect the performance and dynamics of data transfers over such connections to be easy to analyze due to the lack of competing traffic. However, non-linear transport dynamics and end-system complexities (e.g., multi-core hosts and distributed filesystems) can in fact make...
We propose an optimal Physical Layer Convergence Procedure Protocol Data Unit (PPDU) duration algorithm that divides a long data stream into two portions among consecutive groups based on the average PPDU duration of the Very High Throughput (VHT) group. The proposed solution considers all Wireless Local Area Network (WLAN) parameters and satisfies requirements of the VHT Multi-User Multiple Input...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.