Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Bluetooth Low Energy (BLE), also known as Blue-tooth Smart, is part of the Bluetooth 4.0 Core specifications, introduced in June 2010 by the Bluetooth Special Interest Group (SIG). BLE is designed as a radio standard that minimizes power consumption and it is particularly suited for low cost, low bandwidth, low power, and low complexity applications. These aspects of the standard represent the reasons...
The NoC Architecture plays crucial role while designing communication systems for System on Chip (SoC). The NoC architecture is improved over conventional bus, shared bus design and cross bar interconnection architecture for on chip networks. In order to improve the Quality of Service, Congestion, Throughput and latency in NoC, Hexagonal node based architecture is proposed in our previous paper[14]...
In recent past, researchers have shown a lot of interest in Under Water Sensor Networks (UWSNs) because of its application in wide range of domains. UWSN, actually a sub body of Wireless Sensor Networks (WSN), facilitate with radio communication with high-precision of information to a sink node from any of the source node. The Role of any-casting is of significant importance in the context of routing...
In nigh application, it is indispensable to discover or supervise the behavior of the surrounding situation at a fine resolution over large spatial-temporal scales therefore WSN (Wireless Sensor Network) is well-advised. Because of smaller size and low power requirement of sensor device use of WSN for watching the surrounding action is increased time to time. Numeral of sensor inside WSN is proportionate...
Nowadays, monitoring per-flow metrics, such as throughput and delay, in OpenFlow networks represents an important input to implement traffic engineering approaches. Per-flow monitoring mechanisms require to uniquely identify the complete network path followed by all the packets of the corresponding flow. For example, in order to measure path delay, monitoring mechanisms regularly inject probe packets...
The wireless sensor network (WSN) consist of wireless sensor nodes, which are deployed randomly in a surge of unforeseen applications. Topology Control (TC) is the most essential approach used for minimizing energy consumption that extends the in WSN time. Also increases the throughput of the topology and minimize the radio interference. The aim of the proposed context aware topology control is to...
A Mobile Ad-hoc Network (MANET) has special characteristics such as dynamic topology, the absence of an administrative point and no fixed infrastructure. These features make it vulnerable to many attacks, such as the Denial of Service (DoS) attack. This type of attack deprives users of access to their legitimate services leading to degradation of the network. This paper posits the Monitor, Detect,...
Underwater sensor networks are gaining prominence in various applications of underwater monitoring and resource explorations. The minimum energy routing algorithms [2] are implemented in underwater oil resource explorations. The topologies already in use are wired where all sensor nodes behave as coordinator, except the PAN coordinator. This may increase the depletion of battery energy, and cost of...
Multi-hop wireless sensor networks (WSN) have many applications in nowadays' environment monitoring. However, it is very challenging to predict the throughput for an arbitrary multi-hop wireless sensor network with different source data rates. In this paper, we propose an iterative decomposition method for this purpose. We first identify a limited number of basic network configuration of chain topology...
A new asynchronous arbitration node is introduced for use as a building block in an asynchronous interconnection network. The target network topology is a variant Mesh-of-Trees (MoT), combining a binary fan-out (i.e. routing) network and a binary fan-in (i.e. arbitration) network, which is becoming widely used for multi-core shared-memory interfaces. The two key features are: (i) each fan-in node...
Cloud computing has enabled a wide array of applications to be exposed as elastic cloud services. While the number of such services has rapidly increased, there is a lack of techniques for supporting cross-layered multi-level monitoring and analysis of elastic service behavior. In this paper we introduce novel concepts, namely elasticity space and elasticity pathway, for understanding elasticity of...
Despite the development of virtualization technologies in computing resources, how best to build virtual networks is still an open issue. Virtual network is an important technology that can hide physical network topologies and policies and provide a dedicated virtual computing environment for each user. However, it is difficult to figure out the actual mapping between a physical network and a virtual...
The needs of the research communities in research institutes and Higher Education (HE) establishments are demanding evermore powerful computing resources for supporting complex scientific and industrial simulation and modeling, manipulating and storage of large quantities of data [6, 9]. In this paper we present our experience at the University of Huddersfield (UoH), UK in developing the HPC systems...
We propose a method for dynamic load balancing in wireless LANs (WLANs), which adapts association topology dynamically based on traffic conditions, while keeping the handoff overhead negligible using virtualized wireless network interfaces (WNICs). In large-scale WLANs, there are many locations that each station (STA) can discover multiple access points (APs). In these locations, the conventional...
Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and defense sectors. WSNs are susceptible to various attacks, in which misdirection a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In misdirection attack, the intruder misdirects the incoming packets to a node other than the intended node. Due...
The inherent spatio-temporal unevenness of traffic flows in Networks-on-Chips (NoCs) can cause unforeseen, and in cases, severe forms of congestion, known as hotspots. Hotspots reduce the NoC's effective throughput, where in the worst case scenario, the entire network can be brought to an unrecoverable halt as a hotspot(s) spreads across the topology. To alleviate this problematic phenomenon several...
NoC (Network-on-Chip) has been proposed as a new solution to deal with the global communication problem of complex SoC(System-on-Chip). An evaluation tool is essential for optimizing the NoC design, through which the functionality and performance of the NoC are verified. This paper presents a coverage-driven and hierarchical NoC verification platform based on System Verilog language. It is applicable...
Mobile Ad-hoc Networks (MANETs) involve the establishment of wireless connections between mobile nodes, and can dynamically extend the coverage area of wireless local area networks (LAN). For MANETs that use a single channel, the communication performance decreases due to interferences between nodes when frames are being relayed. In this paper, we propose a priority control scheme based on neighbor...
Recently, many studies in wireless ad hoc networks assume the use of smart antennas which can electronically control their beam pattern. Communications using smart antennas can be expected to improve spatial utilization efficiency and to extend communication distance. However, there are some unique problems caused by the use of the smart antennas. In this paper, we focus on the directional hidden...
The Session Initiation Protocol (SIP) has gained momentum and is being widely used both in the Internet and Next Generation Telecommunications network as the core signaling protocol. SIP operation relies on SIP servers which are responsible for forwarding of SIP messages. It has been shown that the performance of SIP servers is largely degraded during overload conditions due to the built in message...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.