The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the different demand on realtime of periodic and non-periodic data, the improved real time communication protocol CSMA/NT is presented with node transfer based on non-destroyed priority bit-by-bit arbitration. The performance analysis shows that it decreases the probability of data collision effectively, ensures a limited transmission time and makes maximum delay time adjustable, leads...
According to the characteristics of data in coalmine industrial Ethernet ring networks and in order to guarantee the demand of the real-time data in it, a hybrid scheduling method with non-preemptive priority and EDF scheduling method based on the IEEE802.1p protocol is proposed in the switch. We calculate the maximum transmitting delay of the real-time data using network calculus theory. The result...
In this paper, dynamic protocols for multi-agent systems are designed and presented to reach consensus on different scenarios. The architecture of such group of agents are with interconnected scattered topology. In static synchrony communication circumstance, a consensus protocol which is depicted in linear dynamic-system form, is developed to make group of agents finally obtain consensus. The consensus...
In sensor networks communication by broadcast method involves many hazards, especially collision. Several MAC layer protocols have been proposed to resolve the problem of collision namely ARBP, where the best achieved success rate is 90%. We hereby propose a MAC protocol which achieves a greater success rate (Success rate is defined as the percentage of delivered packets at the source reaching the...
TCP now is widely used in Transmission Control Protocol; however, in the wireless network environment, TCP congestion control typically has some defects such as high-error rate, long-latency, low-bandwidth and frequent-movement, etc. In the wireless network, the implementation difficulty of congestion control mechanism is the degree of congestion, which is not only relevant to the length of the queue,...
The sensors in sensor networks have limited energy and thus energy preserving techniques are important but in many cases like war zone the time for complete a task is more important than energy and in large-scale sensor networks, redundant communication between sensor nodes is necessary to propagate data in a large monitoring region. The main objective of this paper is to efficiently disseminate information...
To support network mobility in wireless network, NEMO BSP is proposed by IETF. Mobility support paradigm is going to move from the MN to Network. PMIPv6 is the latest protocol based on local mobility management and network-based mobility. The mobile node can freely move between PMIPv6 network and mobile network. The previous NEMO protocols based on PMIPv6 cannot support this kind of mobility due to...
Enterprises are physically distributed over different locations like continents, countries, plants, divisions, laboratories, departments, work-groups and so on. However, logically an enterprise can function as one unit of work. To support such logical unity among the dispersed objects, a generic framework of distributed computing is necessary. As there is no global clock available to synchronize the...
In this paper, we study pattern preserving path following control of unicycle teams with communication delays. The pattern of the vehicle team is said to be preserved if the distance between it and the desired one remains in some given range. A virtual vehicle formation is introduced such that each virtual vehicle becomes the pursuit target for the corresponding real vehicle. First, an input-driven...
Peer-to-peer overlay is vulnerable to distributed denial of service (DDoS) because of its characteristics such as openness, dynamics. Existing solutions are designed for a network-layer but overlay. A novel distributed method based on peer level model to inhibit DDoS attack is presented. Level model which can identify malicious nodes collects four factors which involve a twofold content including...
We propose a new method that accelerates existing Byzantine Fault Tolerance (BFT) protocols for asynchronous distributed systems by parallelizing the involved consensuses. BFT realizes a reliable system against Byzantine failures and is usually solved by repeatedly executing consensus for a set of requests. Our method consistently parallelizes the consensus by introducing a new extra consensus on...
The popularity of video websites shows an enormous need for video sharing from individuals. We believe that P2P dissemination services, which leverage users' upload bandwidths, will become pervasive to enable high-quality video multicasting. Though several P2P systems were proposed, we argue that a next-generation one should minimize its peer lag so that concurrent subscribers can enjoy the same home-run...
Abstract- In this paper, we propose a power saving mechanism based on a simple moving average of the traffic rate in 802.3ad link aggregation. Two key components comprise the proposed mechanism: (1) a negotiation protocol for both nodes connected to an 802.3ad aggregated link and (2) an algorithm to estimate an appropriate number of active links to comprise the aggregated link in accordance with the...
Considering that ordinary ZigBee based systems operate at a rate of 250 kbps, which imposes various limitations on their applications, and that there are 16 independent channels at 2.4 GHz, this paper presents a novel approach of FPGA controlled, ZigBee protocol based multi-frequency high speed wireless Ad Hoc network. The system employed five individual ZigBee modules around a FPGA controller, merging...
To relieve the end user of the configuration burden that arises when new devices are installed in the (home) network, service discovery protocols (SDP) have been devised. These enable automatic discovery of the services these devices offer. Yet, the existing SDPs are not compatible or interoperable. In this paper, we propose a framework that automatically translates between the various SDPs. We also...
Emergency data which mean something happened in sudden need to be dealt with timely, otherwise will bring very serious consequences. To ensure the low-delay routing of emergency data, a novel graded routing strategy, dynamic adaptive cooperative routing (DACR) is proposed in this paper. This scheme extends the LEACH protocol to enable the multi-hop transmissions among clusters by incorporating a cooperative...
An increasing demand for applications in the area of Ultra-Wideband Radio Technology led to the EUWB (Coexisting Short Range Radio by Advanced Ultra-Wideband Radio Technology, FP7-ICT-215669, www.euwb.eu) project, which has been started in April 2008. The goal of this industry-led initiative of major industrial and excellent academic organizations is the improvement, integration, and the applications...
As part of the resource allocation mechanisms, each router must implement some queuing discipline that governs how packets are buffered while waiting to be transmitted. Various queuing disciplines can be used to control which packets get transmitted (bandwidth allocation) and which packets get dropped (buffer space). The queuing discipline also affects the latency experienced by a packet, by determining...
Multi-hop broadcast is a key technique to disseminate important information such as time-sensitive safety warning messages (WMs) in Vehicular Ad hoc Networks (VANETs). Due to the fact that the implementation of broadcast at the link layer uses unreliable transmissions (i.e., lack of positive ACKs), highly reliable, scalable, and fast multi-hop broadcast protocol is particularly difficult to design...
In Wireless Mesh Networks (WMNs), users can enjoy the real-time video streaming service anytime and anywhere through the service. Compared to the client/server model, the P2P (Peer-to-peer) approach is more suitable for video streaming applications because of its efficient usage of network resources. However, the multimedia applications are very sensitive to delay time and the performance of packets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.