The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the area of applied optimisation, heuristics are a popular means to address computational problems of high complexity. Modelling the problem and mapping all variations of its solution into a so-called solution space are integral parts of this process. Representing solutions as graphs is common and, for a special type of graph, Prüfer Code (PC) offers a computationally efficient mapping (algorithms...
The so-called Ring Road approach has been identified as interesting application area of DTN protocols. It leverages low-cost low-earth orbit satellites in order to inter-connect isolated networks with the Internet. Network coding may be used to introduce redundancy to address e.g. lossy links. In this paper, a simulator setup for network coding in Ring Road networks is presented and discussed. The...
In order to rapidly response to users request in high-speed mobile environment, achieve efficient content distribution in content center network, this paper proposed a novel multipath routing transmission mechanism based on network coding (MRNC). By using network coding technology, users Interest packet is divided into multiple child interest packet, and the content is divide and random linear codes...
Vehicular Ad-hoc Networks (VANETs) has witnessed significant attention from academia and industries, due to the growing number of applications and devices focusing on safety and efficiency in transportation. Video Streaming in Vehicular Communication (VSVC) presents interactive real-time view of an emergency incidence on roads. On-board unit of vehicles are utilized for streaming real time video of...
Most sensor networks employ dynamic routing protocols so that the routing topology can be dynamically optimized with environmental changes. The routing behaviors can be quite complex with increasing network scale and environmental dynamics. Knowledge on the routing path of each packet is certainly a great help in understanding the complex routing behaviors, allowing effective performance diagnosis...
Boolean network tomography is a powerful tool to infer the state (working/failed) of individual nodes from path-level measurements obtained by egde-nodes. We consider the problem of optimizing the capability of identifying network failures through the design of monitoring schemes. Finding an optimal solution is NP-hard and a large body of work has been devoted to heuristic approaches providing lower...
One of the prominent problems of the Delay Tolerant Networks (DTNs) is the high delay occurring in the message delivery. As there is absence of complete path from source to destination in the network, these networks are often susceptible to high delays. In DTNs, one of the primary objective is to establish end-to-end communication path between the nodes in the heterogeneous environment e Factors such...
Delay Tolerant Network (DTN) is widely applied to the situation that difficult to deploy infrastructure. It has the characteristics of nodes distributed sparsely, connect unstably, large delay and high bit error rate. These characteristics of DTN, lead to the data efficient transmission encountered a certain challenge. Network coding is proposed to improve network throughput, balance network load...
Several atypical hierarchical routing protocols have been proposed among which grid-based routing protocols are an efficient way of disseminating data towards a mobile sink. The network is partitioned into a virtual equal-sized grids. The proposed protocol, Mode-Switched Grid-based Routing (MSGR) for Wireless Sensor Networks selects one node per grid as the Grid Head. The routing path to the sink...
There are two main stages in the proposed system: Firstly includes detection and determining the number of evil paths depending on encoding an input messages by the source node by using the system of linear equations and sent these coded messages to the sink mode along the disjointed-multi-paths of the network. The sink node will construct number of equations from the received coded messages. It can...
In this paper we study the application of Diversity Coding to enable near-instantaneous recovery from link failures in 5G Centralized Radio Access Network (C-RAN) networks. We focus on networks where remote radio heads in a C-RAN are connected to the baseband unit with wireless fronthaul links. In order to avoid retransmissions and rerouting delays due to link failures, we investigate use Diversity...
The design of embedded systems is becoming continuously more complex such that efficient system-level design methods are becoming crucial. Recently, combined Answer Set Programming (ASP) and Quantifier Free Integer Difference Logic (QF-IDL) solving has been shown to be a promising approach in system synthesis. However, this approach still has several restrictions limiting its applicability. In the...
Segment Routing (SR) architecture is a promising technology. It is being standardized in collaboration between vendors and service providers. Through its simplistic control plane and the reuse of existing data planes namely MPLS and IPv6, SR helps operators to reduce the Operation Expense (OpEx) and the Capital Expense (CapEx). In the instantiation of SR over the MPLS data plane (SR-MPLS), a SR path...
Internet has witnessed its paramount function transition from host-to-host communication to content dissemination. Named Data Networking (NDN) and Content-Centric Networking (CCN) emerge as a clean slate network architecture to embrace this shift. Pending Interest Table (PIT) in NDN/CCN keeps track of the Interest packets that are received but yet un-responded, which brings NDN/CCN significant features,...
In this paper, an energy efficient coding scheme for the multiple access relay channel at a fixed desired sum rate is analyzed. We first introduce a coding scheme, then, derive an optimal set of power allocation, which minimizes the network energy consumption while maintaining a desired sum rate. The results show that this scheme significantly outperforms direct and two-hop transmission. Moreover,...
On — chip communication suffer from bit error especially at highly dense implemented system on chip. Reducing the rate of bit error in On-chip communication is carried out by error detection and correction codes. But it has its own limitation. So reconfigurable multiple code based system is suitable for heterogeneous system design. But selecting correct code for the correct subsystem or for current...
A wireless ad-hoc network can be made to perform better via a range of approaches. One such approach is network coding, which involves broadcasting of encoded packets and therefore can substantially enhance network capacity whilst preserving the quality of service. The use of routing algorithms that are aware of network coding can help to strengthen the benefits of this approach. In order to gain...
In this paper, we consider the algorithmic task of content replication and request routing in a distributed caching system consisting of a central server and a large number of caches, each with limited storage and service capabilities. We study a time-slotted system where in each time-slot, a large batch of requests has to be matched to a large number of caches, where each request can be served by...
Delay (or disruption) tolerant networks (DTNs) have widely studied as promising technology for providing communications in environments where all nodes are not connected with each other. Assuming the existence of adversary nodes, in this study we evaluate effectiveness of erasure-code-based DTN routing in terms of secure transmission. We combine secret-sharing-based multi-path routing with several...
We address the single-source-destination routing problem in a mesh network with a broadcast channel, time-division multiplexing (TDM) and no spatial reuse, which is a special type of the PLC channel. First, the outer bound on the achievable data rate is evaluated. We show that the routing protocols (RPs) with static routing do not allow approaching this data rate limit. Then, we study RP with opportunistic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.