The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
HF and VHF radios retain considerable operational benefits for disaster communications. In particular, they can be the only available communications channel into a disaster zone, and are capable of communications over tens to thousands of kilometers. However, their bandwidth is extremely limited, as low as 1 bit/second, which has previously limited their utility as a backbone for public telecommunications...
The Internet is ubiquitous and nodes participating in it are becoming increasingly diverse and heterogeneous. Especially is this true in decentralized, overlay-based networks, which traditionally build upon the infrastructure of the Internet. An ability to search for nodes with specific capabilities becomes of growing interest, for example, to support the node capacity discovery in large scale, distributed...
Distributed Denial of Service (DDoS) attacks cause significant damage to computer systems by taking a system offline. Hypertext Transfer Protocol (HTTP), is the most commonly used protocol for web services. The HTTP protocol has recently received a major update to HTTP/2. This new protocol provides increased functionality, however this poses a threat from DDoS due to the larger attack surface. HTTP/2...
This paper investigates the use of ultra-wideband (UWB) radio for communication in industrial wireless sensor networks (WSNs). OpenWSN is an open-source IPv6 mesh network protocol stack based on IEEE 802.15.4 time slotted channel hopping (TSCH). We adapted OpenWSN to operate an UWB physical layer based on the DecaWave DW1000 UWB transceiver. Experiments were conducted in an industrial steam heating...
Over the past few years, Mobile Ad hoc net-works(MANETs) have gained importance in mission critical environments. Software defined radios(SDRs) have provided MANETs a platform for using Narrowband networking wave-form(NBNW) for concurrent voice and data transmissions. Traditional TDMA MAC protocols are not appropriate for such applications. In this paper we have proposed a distributed TDMA slot assignment...
Current networks are multi-service packet-switched environments, very often based on Internet Protocol, where the provision of good quality services is a great challenge. The most popular service, offered by almost every network, is voice transmission. As a real-time service, it places high demands on bandwidth and delay. The paper describes selected network dimensioning problems for the voice over...
This paper proposes a new algorithm called Path Associativity Centralized Explicit Congestion Control (PACEC). PACEC works on a Software Defined Networking (SDN) framework. In PACEC, a congestion control decision is based on global information network conditions. PACEC uses global information network to identify network resources along the path from the source to the destination and provides this...
The Internet of Things (IoT) vision requires increasingly more sensor nodes interconnected and a network solution that may accommodate these requirements accordingly. In wireless sensor networks, there are energy-limited devices; therefore techniques to save energy have become a significant research trend. Other issues such as latency, range coverage, and bandwidth are important aspects in IoT. It...
The advent of non-volatile memory (NVM) technologies has added an interesting nuance to the node level memory hierarchy. With modern 100 Gb/s networks, the NVM tier of storage can often be slower than the high performance network in the system; thus, a new challenge arises in the datacenter. Whereas prior efforts have studied the impacts of multiple sources targeting one node (i.e., incast) and have...
Network management requires both awareness of the status of the network and the ability to manage key systems to maintain full network efficiency. OrderNet is an application layer protocol which rides within existing message sets to manage heterogeneous networks. This paper summarizes the analysis of alternatives performed that selected OrderNet as a promising technology for the monitoring, management,...
Military has real requirements for IP service across its shared and inter-connected RF networks mainly the HF networks. There is real demand to run the TCP/IP protocol over the low bandwidth and noisy HF radio channels for both tactical and strategic army systems and improve our ionospheric space weather support capability. The aim of this paper is to design and implement TCP/IP over HF military transmission...
Virtual Desktop Infrastructure refers to a process of running user's desktop in a virtual machine that lives on a server in the datacenter. A protocol is important in the communication process of virtual desktop infrastructure. For small deployment scenario, we have two options: using built-in RDP protocol that comes from Windows desktop; or adding more investment for PCoIP protocol in VMware environment...
Requirement for high bandwidth traffic has been increasing very rapidly. Efficient and effective provisioning of resources is very important now-a-days. Due to the increase in number of users, providing sufficient bandwidth has become a difficult task for the service providers and network operators. Researchers have developed many techniques to resolve this issue but they have not reached to full...
Time sensitive networking becomes increasingly important in handling control and management information. Utilization of the existing infrastructure is considered to be an important issue due to the increasing demand. Since control/management data packets can use the existing infrastructure, this work study the basic requirements behind the Time Sensitive Network and ingress policies in it. Further...
Mobile devices have become quite popular, and they are responsible for a significant part of Internet traffic. In these devices, multimedia services, such as video streaming over HTTP, are commonly adopted, and TCP protocol is the standard to assure reliable data transmission. To deal with applications that require higher bandwidth, several modifications were made on TCP, and they are called extensions...
Obliviousness is crypto primitives which intent to hide access pattern. Although ORAM is strongest crypto model, it incurs significant overhead. Elaine Shi et. al. propose Obliviousness Data Structrue (ODS) that makes a great theriotical improvement comparing to general ORAM algorithm, in case of the data blocks exhibit some degree of access predictability. Take AVL tree as an example, when all data...
Named Data Networking (NDN) has been drawing increasing attention in both academia and industry. Data forwarding is one of the key issues in relation to efficient content retrieval in named data DTN. In this paper, we propose an activeness-based data forwarding protocol, named as ADF, to support efficient content retrieval in named data delay tolerant networks. Using the real movement trajectory data...
Data dissemination among vehicles is an important problem in a Vehicular Ad Hoc Network (VANET). However, all existing works on data dissemination consider transferring small-sized data, where the entire data can be transferred from a roadside unit (RSU) to a vehicle when the vehicle is passing by it. In this paper, we address the problem of large data transfers among vehicles in a VANET using RSUs...
FlexRay protocol has been developed as the de-facto industry standard for next generation in-vehicle communication with high bandwidth, time-triggered architecture and dual-channel redundancy. However, it does not define a mechanism to handle the transient errors, which is frequent on the common-used twisted wire cable. Thereby, FlexRay is hindered for the application in safety-critical communications...
This paper explains how Fusion networking technology can be used as a communication mechanism between utility substations for transporting time critical traffic in wide area power system protection applications to attain deterministic low delay, zero packet loss and ultra-low packet delay variation. The requirements for inter substation communications are presented with focus on the IEC 61850 protocols...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.