The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To achieve a reliable and robust system for environmental monitoring, there is an available technology that can be used to resolve this problem and moreover provide for better living. Wireless sensor networks (WSN) have been successfully applied in many environmental monitoring. An ad-hoc wireless sensor network consists of a number of small and self-power sensing devices (nodes) connected using effective...
ZooKeeper is a widely used distributed coordination and synchronization service for distributed applications. It relies on the built-in atomic broadcast protocol Zab to provide high availability and guarantees such as totally ordered updates for the overlying applications. ZooKeeper’s flexibility, however, is limited with regard to the underlying Zab protocol.In this work, we propose to switch ZooKeeper’s...
Distributed micro-batch streaming systems, such as Spark Streaming, employ backpressure mechanisms to maintain a stable, high throughput stream of results that is robust to runtime dynamics. Checkpointing in stream processing systems is a process that creates periodic snapshots of the data flow for fault tolerance. These checkpoints can be expensive to produce and add significant delay to the data...
Data-buffering techniques currently used in time-division-multiple-access (TDMA) networks are described, including a short-delay technique called sub-framing. The sub-framing technique produces minimum user-to-user streamed-data throughput delays but results in data-transfer interruptions when TDMA time-slot resources have reassigned positions in the time frame. A simple modification to the sub-framing...
In this paper, we investigate the effect of scale-free structure of a network topology on performance of CCN (Content-Centric Networking). Specifically, we generate multiple scale-free and non-scale-free network topologies by two synthetic network generation models (i.e., scale-free tree and generalized BA model). We compare the average delivery delay and throughput of CCN with scale-free and non-scale-free...
In this paper, we propose a modeling approach for a Content-Centric Networking (CCN) network by considering the dynamics of its transport layer protocol. Transport layer protocols for CCN have mainly been investigated through simulation experiments because CCN itself is a complicated network architecture compared with IP, and the complex interaction between CCN caching and the behavior of a transport...
Traditionally, network core devices are simple and the complexity is in the end-hosts. With the rise of Software- Defined Networking, this changes and complex functions are moved into the network core. This paper presents Transparent Transmission Segmentation (TTS), which is able to improve performance by executing parts of network functions at the core. An implementation for segmenting TCP connections...
This paper develops a control scheme for the multi-gated perimeter traffic flow control problem of urban road networks. The proposed scheme determines optimally distributed input flows (or feasible entrance link green times) for a number of gates located at the periphery of a protected network area. A macroscopic model is employed to describe the traffic dynamics of the protected network. To describe...
This paper deals with the traffic signal control problem. More specifically it investigates the impact at a network level of simple dynamic local traffic control policies. A dynamic route swapping rule is adopted to model the behavioral response of the travellers to signal changes, while a dynamic signal control swapping rule based on an equi-pressure policy is used to implicitly consider the flow...
Many scientific applications rely on evaluation of elementary functions. Nowadays, high-level programming languages provide their own elementary function libraries in software by using lookup table and/or polynomial approximation. However, one downside is slow since lookup tables could keep cache thrashing and polynomial approximations require a number of iterations to converge. Thus, elementary functions...
Compressive random access scheme is considered one of promising candidates for future Machine Type Communications. It enables one-shot detection, which means that the preamble, channel estimation, and data detection could be carried out at once to keep signaling overhead low. For one-shot detection, improving the performance in terms of the number of successfully received preambles is necessary. To...
The downlink scheduling is always a key problem in the wireless communication. In time of LTE and 5G, the real time multimedia is demanding more resources and flexibility. To meet this ever growing challenge for the QoE of users, a novel layered scheduler is designed in this paper, which treats the constraint of delay and the object for maximal throughput separately. Taking the fluctuations in both...
Coordinated multi-point transmission can provide high spectral efficiency for cellular systems. However, along with the increment in the amount of data, backhaul gradually becomes the bottleneck in terms of system performance and cost. In this paper, the backhaul delay is mainly focused in coordinated cellular networks and a hybrid channel prediction (HCP) algorithm is proposed. This algorithm combines...
We consider a collision channel model without feedback based on a time-slotted communication channel shared by K users. In this model, packets transmitted in the same time slot collide with each other and are unrecoverable. Each user accesses the channel according to an internal periodical pattern called protocol sequence. Due to the lack of feedback, users cannot synchronize their protocol sequences,...
Throughput starvation, which occurred under well-known exposed/hidden terminal problem in CSMA/CA based channel access mechanisms, will be a critical problem for future wireless LAN systems. This paper describes new schemes that identify starved access points (APs) and user equipments (UEs). One scheme identifies starved APs by observing the delay of beacon signals periodically transmitted by APs...
Recent advances in Unmanned Aerial Vehicles (UAVs) have enabled countless new applications in the domain of aerial sensing. In scenarios such as intrusion detection, target tracking and facility monitoring it is important to reach a given area of interest (AOI), and create an online data streaming connection to a monitoring ground station (GS) for immediate delivery of content to the operator. In...
In this paper, the channel-aware optimal location algorithm for the data concentrator unit placement in smart grid systems is proposed. The M/M/1/K queuing model is adopted for analyzing the averaged throughput and delay. The optimization algorithm based on a minimum hop count approach with the acceptable averaged throughput and delay constraints, and the optimal DCU localization methodology are proposed...
Using relayers in wireless networks enables higher throughput, increased reliability or reduced delay. However, when building networks using commercially available hardware, concurrent transmissions by multiple relayers are generally not possible. Instead one specific relayer needs to be assigned for each transmission instant. If the decision regarding which relayer to assign, i.e., which relayer...
Today's data centers networks are commonly featured with the richness paths. This aim to improve the network performance with multipath connections and increases reliable system connection for the cables get cut, the failures of switches or routers. However, the common problem of multipath connection is suffered from the difference path conditions in term of speed and delay. In this paper based on...
Inter-domain link congestion can be caused by either under-provision or peer disputes. TSLP and M-Lab are two representative network-tomographic methods to detect congestion on inter-domain links. In this work, we propose a performancecost framework to evaluate and compare the two methods via a simulator built atop NS-3. Via detailed simulations, we obtained some insights on the two approaches and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.