The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User demand for content has become more evident and content service (text messages, video on demand) has become the main network service. Thus, the Content-Centric Networking (CCN) has become the research focus of next-generation Internet architecture. However, the requirements of supporting content provider mobility are not considered. To solve this problem, we propose proactive caching of vital...
In the paper it has been proposed to use a fuzzy-controller in telecommunication networks for improving the routing process. An architecture of the fuzzy-controller was developed. Linguistic variables, terms and membership functions for input and output values have been defined. Rules base has been developed. The operation of the fuzzy-controller has been simulated.
In intermittently connected ad hoc networks, a reliable path between communication endpoints may not exist because mobile nodes randomly move during their operation. Furthermore, routing protocols have to work efficiently under constraints of limited bandwidth and energy. These challenge researchers to develop a suitable protocol for the networks. In this paper, we present a new routing protocol,...
In this paper, we first present a heterogeneous theoretical framework for DTNs where the contact between nodes is based on independent differently distributed assumption. Moreover, the message forwarding process follows a Gamma Distribution. Then, we propose a new spray routing scheme based on this framework. Moreover, we compare our routing protocol with traditional spray routing (TSR) protocols...
In VANET, nodes move at high speed and change connecting network frequently. As a consequence, IP duplication may occur and packets would not be sent to the correct destination. This paper aims at reducing the size of location information in duplicate address detection (DAD) scheme. We propose a grid-based duplicate address detection (GDAD) scheme and separate network into several grids, where the...
Opportunistic networks are the manifestation of wireless ad-hoc networks where there is no continuous end-to-end path. The forwarding of messages takes place via any nodes that are encountered, and therefore the measurement of message passing efficiency between nodes becomes challenging if a number of different protocols are to be compared and evaluated. Prior work has identified an evaluation framework...
Network-on-Chip (NoC) links consume a significant fraction of the total NoC power. We present Selective Packet Interleaving (SPI), a flit transmission scheme that reduces power consumption in NoC links. SPI decreases the number of bit transitions in the links by exploiting the multiplicity of virtual channels in a NoC router. SPI multiplexes flits to the router's output link so as to minimize the...
Through sensing and utilizing available network resources, cognitive network can obviously increase network performance. In this paper, a distributed on-demand routing protocol with traffic awareness (TACR) is proposed for cognitive wireless network. This routing protocol establishes the path based on the cognition and reasoning of traffic loads in a network and it also meet quality of service (QoS)...
In delay tolerant networks (DTN), flooding mechanism in epidemic routing protocol may waste network resources. Based on introducing and analyzing routing protocols in DTN, this paper proposes an improved protocol of epidemic routing (EPI-HT). EPI-HT forwards messages accurately to the next-hop according to historical information between nodes and node localization principle. Simulation results indicate...
In this paper, we propose an efficient multiple hashes method (called KAD-N) to balance peer loads in the KAD (Kademlia) network. Note that N is the maximum hash times, determining by a cost-effectiveness factor. This method hashes the keyword of an object r times to produce a key for publishing objects, where r is a random number and 1 ?? r ?? N. Simulation results show that the distribution of indexes...
Wireless sensor networks (WSNs) have been studied deeply during the last years, but real deployments with thousands of motes are really critical in cost, time and reliability due to several problems: commissioning, debugging, etc. In this context, simulation is becoming mandatory to reduce the potential failures of the WSN before deployment, which is very costly. In this paper, a simulation approach...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
A principal factor in sensor network design is energy efficiency. In this work, we propose to extend the lifetime of sensor networks using appropriate choice of sensor node distribution. The key idea of our scheme is to deploy more nodes in areas of extensive energy usage. Using this scheme of sensor node distribution, we use probabilistic angular routing to route data packets from the sensor nodes...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
Sink mobility has become an increasingly important requirement of various sensor network applications. Handling such mobile sink conditions brings new challenges to large-scale sensor networking. This investigation proposed a hybrid-structure routing protocol (HSRP) that combines the benefits of grid-based and cluster-based structures. Grid-based structure is designed to solve the cluster head selection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.