The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses the aspects concerning the communication between the components of cyber-physical systems (CPSs). The characteristics and the requirements concerning the transfer of information within CPSs and the related open issues are presented. In this context, a CPS solution for environmental monitoring (temperature and relative humidity), based on the IEEE 802.11 b/g standards, was developed...
Driven by a broker-based OpenFlow control plane, we report the first field trial of software-defined heterogeneous wireline-wireless-optical multi-domain networks connecting UC Davis Campus, USTC, California OpenFlow Testbed Network (COTN) and Energy Sciences Network (ESNet).
Recently, there has been a tremendous growth in mobile network traffic. Network providers are looking for techniques that selectively offload the mobile data traffic onto WiFi (IEEE 802.11) networks to balance the load and improve network performance. Several architectures based on Proxy Mobile IPv6 (PMIPv6) have been proposed to support seamless data offloading. The demerits of PMIPv6 include lack...
Today's smartphones feature sophisticated computational capabilities as well as a plethora of sensors, enabling new kinds of applications. One popular example are pervasive mobile multiplayer games, where interactions with other users or physical objects in the real world are part of the gameplay. This induces a notion of locality, as a user's actions affect other nearby users. However, this locality...
In recent years the number of automobiles have been increased on the roads. Due to high density of vehicles, the potential threats and road accidents are increasing. Alongside new application domains are evolving such as infotainment. VANETs is an emerging technology where the information is exchanged among the vehicles on the road to provide updates about different road situations and dangerous conditions,...
The broad availability of WLAN-capable off-the-shelf hardware lets WLAN mesh networks appear as promising technology for future distributed wireless applications. Featuring automatic device discovery, interconnection and routing, they provide a higher scalability, flexibility, and robustness compared to common centralized WLAN infrastructures. Besides these advantages, characteristics such as variable...
Reliable and secured communication between two or more devices require wired connection. A wireless communication such as — Bluetooth, WI-Fi, ZigBee etc. provides flexible and inexpensive solution for remote applications. A large number of low cost hardware platforms such as Raspberry Pi, Arduino, mbed boards etc. are available that do not provide any inbuilt wireless module but are equipped with...
Collisions due to interference at MAC layer limit the throughput of Ad Hoc networks using IEEE 802.11 protocol at medium and high load conditions. The proposed MAC layer MAC-CPI-A (Collision Prevention due to Interference) protocol prevents collisions due to interference completely. In the proposed protocol every node refrains from beginning its transmission if any node within its ‘maximum interference...
The goal of this research project is to create a portable system that makes use of easy-to-find and affordable Android devices for field operations where current positions of the operators are essential. A system that can be deployed virtually anywhere consists of location-aware Android application, Android mobile device(s), and a microcontroller module. By utilizing the Global Positioning System...
Machine to machine (M2M) communications are expected to form one of the fundamental building blocks of the future Internet of Things (IoT). In view of the scarcity of spectrum and the service requirements of traditional users, providing network access to the extremely large number of devices in IoT and M2M scenarios is one of the fundamental problems for network designers and operators. As a possible...
This paper presents two different alternatives for interconnecting Local Area Networks (LANs) in the data link layer. The solutions use a Windows NT workstation as a bridge between separate networks. Interconnection is provided by either implementing an intermediate driver or a protocol driver into the Windows NT networking stack. Both alternatives screen traffic according to the address fields of...
Challenged networking applications such as rural internet, battlefield communication, post-disaster communication etc. cannot rely on mere DTN for its unpredictable delay and unreliable delivery probability. To meet application specific QoS constraints, in addition to DTN-enabled mobile nodes (smart phones/tablets), an ad hoc backbone infrastructure is essential. Such backbone components include the...
WiFi is currently the most widely used communication standard over wireless LAN . Facing the trend that broad band and networking quality are emphasized, the IETF SIGTRAN working group and IEEE 802.11standards working groups proposed a new-generation communication protocol, stream control transmission protocol (SCTP) and wireless LAN communication standard, IEEE 802.11ac/VHT for transport layer and...
Machine to machine communication (M2M) or machine type communication (MTC) facilitates communication without any human intervention. These applications will support an enormous number of stations (STAs). To mitigate degradation of the throughput and delay performance in wireless local area networks (WLAN) that employ carrier sense multiple access collision avoidance (CSMA/CA) protocol with request...
More than 50 billion devices are estimated to be connected to the Internet by 2020. Incompatibility of devices and protocols (usually proprietary devices and protocols) are one of the major hurdles to be overcome to realise the Internet of Things (IoT) vision. IoT devices are typically constrained devices and this creates dependencies between the hardware, software and protocols used in the device...
One of the goals of 5G is to simplify the 4G core network and enable interworking across multiple Radio Access Technologies (RATs) without the addition of specialized network elements, protocols and interfaces that perform often redundant functions for each access technology. Achieving this reduces operator costs, and can improve the subscriber experience when devices can access multiple RATs. In...
Ad Hoc Network is a decentralized type of network where wireless devices are allowed to discover each other and communicate in peer to peer fashion without involving central access points. In most ad hoc networks, nodes compete for access to shared wireless medium, often resulting in collision (interference). IEEE 802.11, a well-known standard, uses medium access control (MAC) protocol to support...
The paper aims to design video wireless sensor nodes based on IEEE 802.11 communication protocols, using SPI interfaces on the connection of the WIFI communication module and the host controller for data exchange because of the fact that there exist limitations in terms of the display of live video images due to Zigbee transmission rate limit. In addition, the video wireless WIFI sensor node also...
This paper proposes an improved mesh path selection protocol for QoS support in wireless mesh network, while avoiding the inherent problems of proactive and reactive path selection elements. The proposed ‘Advanced Selective Greedy’ (SelG+) path selection protocol operates in two phases. In the first phase it constructs a set of potential forwarders for every mesh stations. In the second phase during...
Metropolitan scale WiFi deployments face several challenges including controllability and management, which prohibit the provision of Seamless Access, Quality of Service (QoS) and Security to mobile users. Thus, they remain largely an untapped networking resource. In this work, a SDN-based network architecture is proposed; it is comprised of a distributed network-wide controller and a novel datapath...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.