The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, 360-degree video has become an important component of virtual reality (VR) technology. Unfortunately, this state-of-the-art content type requires a huge bandwidth from a server to a client. In order to solve the bandwidth problem in streaming VR videos over HTTP/2, a dynamic adaptation method is crucial. In this paper, we propose a novel adaptive streaming method based on tiled streaming...
This paper proposes a method of TCP multi-pathization for IoT network by SDN. The method distributes packets according to the congestion between paths and IP packet length. Since it is performed over SDN, no changes of existing protocols and devices are required. The authors implement the method by actual IoT devices and evaluate QoS by experiment. The results of the experiment show that the TCP throughput...
Present research work propose the design of a low energy and high throughput, hierarchical clustering based routing protocol for smart home sensor network application. Proposed protocol perform dynamic cluster head selection based on multiple node characteristics like node residual energy, node distance from sink and node average distance from neighbour nodes. Cluster head distribution is even and...
Software defined Networks (SDN) is a paradigm that promises to facilitate the management of all types of networks, including the Wireless Mesh Networks (WMN). This integration enables an environment with enough resources and coverage to meet the demands of users, and thanks to a centralized network, resources can be managed in a better way. There are multiple simulators/emulators available, integrating...
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert...
To be able to efficiently utilize high data rates of 100 Gbit/s and beyond, protocols must be carefully selected for specific communication parameters. At the same time, communication parameters, such as data rate/latency requirements and the channel quality, are not static. This contradiction can be solved by switching to the best suited protocol when communicationparameters change. However, replacing...
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
Opportunistic communications through wireless ad-hoc mesh networks have been thoroughly studied in the context of military infrastructureless deployments, sensor networks and even human-centered pervasive networking. However, due to the lack of a model that accurately computes the probability distribution of the delay, we usually content ourselves with the mean values. Such an approach can limit both...
State-machine replication (SMR) is a fundamental technique to implement fault-tolerant services. Recently, various works have aimed at enhancing the scalability of SMR by exploiting partial replication techniques. By sharding the state machine across disjoint partitions, and replicating each partition over independent groups of processes, a Partially Replicated State Machine (PRSM) can process operations...
The ability to provide a high Quality of Service is a crucial aspect in the acceptance and widespread dispersion of the Industrial Internet of Things and it has a key role to enhance the end user experience. The emerging fog cloud computing architectural concept aims to diminish the experienced latency while simultaneously providing a seemingly unlimited quantity of computational power by moving computations...
Network performance is one of the most important entities in today’s long-distance networks. TCP congestion control mechanisms play an important role in these networks. Most of the current TCP congestion control mechanisms which are also known as TCP variants, detect congestion and slow down the packets transmission to avoid further congestion in the network. In this paper, three classes...
The network infrastructures have been rapidly upgraded in many high-performance networks (HPNs). However, such infrastructure investment has not led to corresponding performance improvement in big data transfer, especially at the application layer, largely due to the complexity of optimizing transport control on end hosts. We design and implement ProbData, a PRofiling Optimization Based DAta Transfer...
This paper considers a fast fading wireless powered wiretap channel, where an energy constrained information source, powered by a dedicated power beacon, sends a secret message to a legitimate user using the artificial noise (AN) scheme in the presence of a passive eavesdropper. Based on a two-phase time division protocol, the ergodic secrecy throughput is derived. Furthermore, the optimal time-switching...
In this paper, we propose a feedback-aided irregular repetition slotted ALOHA (F-IRSA) protocol which depends on the distance between the received packet and the set of packets already recovered at the receiver. We employ feedback messages to terminate the user retransmission process, and use successive interference cancellation (SIC) for packet recovery. We evaluate the number of transmissions per...
Simultaneous wireless information and power transfer (SWIPT) is an effective way for energy-constrained unmanned aerial vehicle (UAV) to prolong the network lifetime. In this paper, an amplify and forward (AF) relaying network is considered, where an energy-constrained UAV harvests energy and information simultaneously from base station and then transmits the information to the destination node. Based...
We investigate adaptive transmission for tactical packet radio networks in which a source uses fountain coding to multicast a file to a number of destinations over time-varying links. We examine two strategies from the literature for packet-by-packet adaptation of the modulation and channel code. The maximum data-recovery rate philosophy attempts to maximize the throughput for each transmitted packet...
OpenFlow/Software-Defined Networking (SDN) is a new networking paradigm that virtualizes network infrastructure by decoupling the control and data plane logic of traditional network devices. The controller of SDN has the overall look about network topology and hence provides flexibility to network operators to implement its own routing approaches. However, it could not control the way client works...
Recently backscatter networks have received booming interest because, they offer a battery-free communication paradigm using propagation radio waves as opposed to active radios in traditional sensor networks while providing comparable sensing functionalities, ranging from light and temperature sensors to recent microphones and cameras. While sensing data on backscatter nodes has been seen on a clear...
The Keyed-Hash Message Authentication Codes(HMAC) is a useful mechanism for message authentication. In this paper, a high-performance HMAC/SHA-3 processor which can generate HMAC message digest and hash message digest is presented. Not only the standard length (224,256,384,512) of the message digest can be generated, but also a length of 64-bit message digest. Due to the application of new generation...
In a Wireless Sensor Network (WSN), there are a large number of nodes whose power supply and computational capability are limited. The nodes in a wireless sensor network can be fixed or move randomly. Thus in these networks, to forward a data packet from one node to another needs to use specific strategies with very different characteristics. Accordingly the data forwarding strategy among nodes plays...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.