The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today home automation is quite common in developed nations. Remote access of appliances and devices in a home is provided via the internet. The challenge lies in making the system smart and deployable in a scalable manner across an entire city in a developing nation. This paper proposes a framework for making home automation achievable across a smart city in a scalable and data efficient manner. We...
Software defined Networks (SDN) is a paradigm that promises to facilitate the management of all types of networks, including the Wireless Mesh Networks (WMN). This integration enables an environment with enough resources and coverage to meet the demands of users, and thanks to a centralized network, resources can be managed in a better way. There are multiple simulators/emulators available, integrating...
The design of Wireless Network Interface Card device driver, based on PCI bus, is the key part of WMN(Wireles Mesh Network). MIPS and uclinux based development environment, Network Interface Card device driver RT2860 oriented are designed and realized. Combining to network protocol of IEEE 802.11, this paper focuses on the initialization, opening, transmission and receive, interrupt handling of RT2860...
The Internet of Things (IoT) is becoming important in many areas that include health, entertainment, manufacturing, automotive, home and building automation, industrial, etc. Will it be important for education and more specifically for teaching and learning? If so, what engineering subjects would benefit the most and how effective could the IoT be for teaching and learning? Can IoT technologies and...
EtherCAT is one of the real-time Ethernet protocols widely employed in industrial controls. However, its wireless extension is not straightforward due to the unique on-the-fly bus access method based on summation-frame. This paper explores the possibilities of interconnecting EtherCAT with wireless standards such as IEEE 802.11 and 802.15.4. The gateway design is presented and event-driven interconnection...
Wireless networking and mobile communications is increasing around the world and in all sectors of our lives. With increasing use, the density and complexity of the systems increase with more base stations and advanced protocols to enable higher data throughputs. The security of data transported over the wireless networks must also evolve with the advances in technologies enabling the more capable...
In this paper, we analyze different options to use hardware-based current measurement for time synchronization of Bluetooth Low Energy (BLE) devices. The BLE devices have a specific current draw pattern based on the status of their radio. Using appropriate circuit, the changes in the current pattern can be detected. Based on this principle, we propose several different ways to tackle the time synchronization...
Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping and...
The omnipresence of mobile devices and the great need to remain connected has brought to the forefront, the ever-growing need for wireless networks. This unprecedented growth of wireless networks and their use has resulted in an era where, the security of wireless networks has become a necessity. Currently the security methods to protect the Wi-Fi are based on the use of cryptography techniques to...
Smart phones and tablets, phones, calendars are the necessities of a modern man. They are one of the MN (Mobile Node), each with wireless network capabilities. The necessities of a modern human MNs are almost included cellular modules available in LTE/3G and Wi-Fi module for high-speed Internet. Until now, MN mobility management is handled, but by using network-based mobility management in this paper...
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
The rising adaption of Internet of Things (IoT) and Industry 4.0 is expected to boost the demands of spatially distributed embedded wireless networks. For an efficient design flow of reliable wireless communication protocol implementations, it is essential to have a testing environment, which is continuous, simple and automated at various levels in the development life cycle. This paper presents an...
This paper studies an ``age of information" problem in fully-connected wireless networks with time-varying reciprocal channels and packetized transmissions. Specifically, a scenario where each node in the network wishes to maintain a table of global channel state information (CSI) is considered. Each node updates its global CSI table in two ways: (i) direct channel measurements through standard...
The paper proposes to use a solution based on software-defined networks (SDN) to control traffic flows in wireless local area networks (Wi-Fi). The paper examines the testing methods for a software-configurable wireless local area network based on the model network of the St. Petersburg State University of Telecommunications. Classify traffic based on DSCP values in the IP-headers of packets. After...
Information dissemination protocols for ad-hoc wireless networks frequently use a minimal subset of the available communication links, defining a rooted Broadcast Tree. In this work, we focus on the core challenge of disseminating from one layer to the next one of such tree. We call this problem Layer Dissemination. We study Layer Dissemination under a generalized model of interference, called Affectance...
This paper presents a study of wireless network security and statistics in Romania aimed at raising public awareness on known issues and highlighting the prevalence of known vulnerabilities in commercial equipment. The data used for the study consist of wireless network broadcast data acquisitioned by the technique of war-driving. In order to ensure a thorough overview, the data collected includes...
IEEE 802.15.4 is the standard protocol for low-rate, low-power wireless personal area networks, including the physical layer and media access control layer specifications. Particularly, some mechanisms for certain purposes, such as transmission efficiency and power saving, are introduced. It is worthwhile to evaluate how the protocol can fulfill the quality of service requirements. Coloured Petri...
In the non-time-slotted cognitive radio networks (CRNs), the synchronization between PUs and secondary users (SUs) cannot be guaranteed, resulting in two challenging problems: the reactivation-failure of PUs and the frequently unexpected hand-offs among SUs. The reactivation-failure of PUs is the incident that the SUs cannot detect the PUs' reactivation when the SUs are occupying the channels to transmit...
Fractional Link scheduling is one of the most fundamental problems in wireless networks. The prevailing approach for shortest fractional link scheduling is based on a reduction to the maximum-weighted independent set problem, which itself may not admit efficient approximation algorithms. In addition, except for the wireless networks under the protocol interference model, none of the existing scheduling...
Classical control and management plane for computer networks is addressing individual parameters of protocol layers within an individual wireless network device. We argue that this is not sufficient in phase of increasing deployment of highly re-configurable systems, as well as heterogeneous wireless devices co-existing in the same radio spectrum. They demand harmonized, frequently even coordinated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.