Search results for " networking"

showing 10 items of 1264 documents

Notice of Violation of IEEE Publication Principles: Reinforcement learning for P2P searching

2005

For a peer-to-peer (P2P) system holding a massive amount of data, an efficient and scalable search for resource sharing is a key determinant to its practical usage. Unstructured P2P networks avoid the limitations of centralized systems and the drawbacks of a highly structured approach, because they impose few constraints on topology and data placement, and they support highly versatile search mechanisms. However their search algorithms are usually based on simple flooding schemes, showing severe inefficiencies. In this paper, to address this major limitation, we propose and evaluate the adoption of a local adaptive routing protocol. The routing algorithm adopts a simple reinforcement learni…

Routing protocolSmall-world networkComputer scienceSearch algorithmbusiness.industryDistributed computingScalabilityReinforcement learningbusinessNetwork topologyComputer networkShared resourceFlooding (computer networking)Seventh International Workshop on Computer Architecture for Machine Perception (CAMP'05)
researchProduct

IMRR and IMPR Routing Protocols For Inter and Intra Wireless Mesh Communications

2015

Given the evolution of wireless technologies, Wireless Mesh Networks (WMN) have appeared as an emerging low-cost solution to ensure last-mile connectivity to the Internet network. However, providing real-time and streaming applications, such as VoIP (Voice over IP) and VoD (Video on Demand), with a satisfying QoS level is considered as an important challenge within these networks. In this paper, we propose a QoS based routing protocol, called Hybrid QoS Mesh Routing (HQMR), jointly with a clustering algorithm to improve the scalability of mesh networks. HQMR is composed of two routing sub- protocols: a reactive QoS based routing protocol for intra-mesh infrastructure communications and a pr…

Routing protocolStatic routingZone Routing ProtocolDynamic Source Routing[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryComputer scienceHQMRDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnhanced Interior Gateway Routing ProtocolNetwork simulationWireless Routing ProtocolQoS020206 networking & telecommunications02 engineering and technologyWMNRouting protocolLink-state routing protocol0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingHazy Sighted Link State Routing ProtocolbusinessComputer network
researchProduct

An optimized path-selection using airtime metric in OLSR networks: Implementation and testing

2008

Wireless mesh networks used for broadband access may be equipped with multiple Internet gateways. Using airtime metric as the main criterion for path selection is an effective method for achieving load-balancing in such a multi-homed mesh network. In this paper, we describe how the radio-aware path selection using airtime as a metric can be implemented in order to achieve this functionality, based on a modified version of an open source OLSR implementation. The paper presents both the principle of this method, its implementation and the empirical results which focus on testing the airtime metric functionality based on a deployed small-scale test network.

Routing protocolWireless mesh networkComputer sciencebusiness.industryDistributed computingMesh networkingLoad balancing (computing)Optimized Link State Routing ProtocolBroadbandComputer Science::Networking and Internet ArchitectureThe InternetbusinessInternetworkingComputer network2008 IEEE International Symposium on Wireless Communication Systems
researchProduct

Performance Analysis in Spatially Correlated IEEE 802.11 Networks

2012

Wireless mesh networks are difficult to be characterized, especially under multi-hop traffic streams. The problem is that the local view of the channel and the correlation between the buffers of consecutive nodes in a stream path make complicated the identification of the contention level perceived by each station along the time. Such a figure is used in the models based on the so called decoupling assumption for evaluating the final scheduling of simultaneous channel access grants. In this paper we propose a simplified mesh network model focused on capturing the correlation due to the network topology and traffic routes rather than the access protocol state at each node. To this purpose, w…

Routing protocolWireless mesh networkbusiness.industryWireless networkComputer scienceSettore ING-INF/03 - TelecomunicazioniDistributed computingMesh networkingThroughputNetwork topologyScheduling (computing)IEEE 802.11Wireless lanComputer Science::Networking and Internet ArchitecturebusinessSpatial Correlated Wireless Network Performance EvaluationNetwork modelComputer network
researchProduct

An adaptive timer for RPL to handle mobility in wireless sensor networks

2016

This paper focuses on the performance of wireless sensor networks characterized by a hybrid topology composed of mobile and static sensor nodes. The Routing Protocol for Low power and lossy networks (RPL), which is standardized as an IPv6 routing protocol for low power and lossy networks, uses the trickle timer algorithm to handle changes in the network topology. However, this algorithm is not well adapted to dynamic environments. This paper enhances the trickle timer in order to fit with mobility requirements. Most of previous works have improved this algorithm without considering the random movement of nodes. In this work, the proposed timer algorithm takes into consideration the random t…

Routing protocolbusiness.industryComputer scienceNode (networking)ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computing020206 networking & telecommunications02 engineering and technologyNetwork topologyIPv6Key distribution in wireless sensor networks0202 electrical engineering electronic engineering information engineeringMobile wireless sensor network020201 artificial intelligence & image processingTimerbusinessWireless sensor networkComputer network2016 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct

Broadband Internet Access via Multi-Hop Wireless Mesh Networks: Design, Protocol and Experiments

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-009-9907-9 While bandwidth for Internet access in urban areas is steadily increasing in recent years, many rural areas are still suffering from the effect of the digital divide. This paper presents a broadband Internet access paradigm developed in the context of the ADHOCSYS project, which was financed by the European Commission under the 6th Framework Program Information and Society Technologies, within the strategic objective of Broadband for All. Aiming at providing reliable Internet access in rural and mountainous regi…

Routing protocolbusiness.product_categoryBroadband networksComputer scienceMesh networkingHop (networking)law.inventionlawVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552BroadbandInternet accessWi-FiElectrical and Electronic EngineeringVDP::Mathematics and natural science: 400::Information and communication science: 420::Communication and distributed systems: 423Network architectureWireless mesh networkbusiness.industryWireless networkQuality of serviceWireless WANOrder One Network ProtocolComputer Science ApplicationsInternet Connection SharingDigital subscriber lineNetwork access pointHazy Sighted Link State Routing ProtocolRural areabusinessTelecommunicationsMunicipal wireless networkComputer network
researchProduct

A Software Defined approach to the Internet of Things: From Wireless Sensor Networks to Network Operating Systems

Di recente il mondo delle reti di telecomunicazioni è stato caratterizzato dall’emergere del paradigma di Networking Software Defined (SDN). Grazie a questo approccio è possibile fornire un’interfaccia standard per lo sviluppo di software in grado di gestire i dispositivi di networking e i flussi di traffico che li attraversano, disaccoppiando il management della rete dal forwarding dei dati. Questa soluzione, di cui il protocollo di comunicazione OpenFlow è tra i maggiori esponenti, ha riscosso un notevole successo nelle reti cablate permettendo di superare il vendor lock-in e permettendo la gestione di dispositivi eterogenei tramite un unico punto di accesso logicamente centralizzato. …

SDNIoTSoftware Defined NetworkingIoT; SDN; Software Defined Networking
researchProduct

SDN controllers security issues

2017

Software-Defined Networking (SDN) is essentially varying the way we design and manage networks, which makes a communication network programmable. In SDN, a logically centralized controller has straight control over the packet-handling functions of the network switches, using a standard, open API (Application Programming Interface) such as OpenFlow. OpenFlow is a broadly used protocol for software-defined networks (SDNs) that presents a new model in which the control plane is inattentive from the forwarding plane for the network devices. In SDN approach centralized entities called "controllers" perform like network operating systems run dissimilar applications that accomplish and control the…

SDNSDN controllersohjelmistotOpenFlow-protokollasoftware defined networkingDoS attacksOpenFlow Controllerohjaimetcomputer networkssuojaustietoturvatietoverkot
researchProduct

Reliable Coverage with Circumferential WMSNs

2021

This work tackles the closed peripheral coverage issue. Such circumferential surveillance is essential in numerous realistic applications where the goal is to ensure rapid detection of any unauthorized entry/exit of the monitored area. To respond to these requirements, peripheral WMSNs can be rapidly deployed around areas of interest (e.g., temporary military camps, natural or nuclear disasters, etc.). While it seems simple, this solution raises two major challenging issues. First, checking whether the deployed peripheral WMSN forms a closed shape around the monitored region. That is, any object trying to leave or access this area must be instantaneously detected by at least one multimedia …

SIMPLE (military communications protocol)Computer scienceDistributed algorithmbusiness.industryReliability (computer networking)Sensor nodebusinessRapid detectionComputer networkScheduling (computing)ICC 2021 - IEEE International Conference on Communications
researchProduct

Positioning Error Prediction and Training Data Evaluation in RF Fingerprinting Method

2019

Radio Frequency (RF) fingerprinting-based localization has become a research interest due to its minimum hardware requirement and satisfiable positioning accuracy. However, despite the significant attention this topic has gained, most of the research focused on the calculation of position estimates. In this paper, we propose a simple and novel method that can be used as an indicator of fingerprinting positioning error. The method is based on cluster radius evaluation of multiple fingerprinting data during the test phase, which can be used by a Location Based Service (LBS) provider to predict the user position estimation accuracy. This method can be used effectively in real-time to predict t…

SIMPLE (military communications protocol)Computer sciencecomputer.internet_protocolmedia_common.quotation_subjectQuality of service020206 networking & telecommunications02 engineering and technologyFingerprint recognitioncomputer.software_genrePosition (vector)Location-based service0202 electrical engineering electronic engineering information engineeringRADIUS020201 artificial intelligence & image processingQuality (business)Radio frequencyData miningcomputermedia_common2019 International Conference on Indoor Positioning and Indoor Navigation (IPIN)
researchProduct