14 Hits in 6.3 sec

MCoRe: an adaptive scheme for rerouting multicast connections in mobile ATM networks

Kwan-Wu Chin, Mohan Kumar
2002 Computer Communications  
In this paper we propose multicast connection rerouting (MCoRe), a novel scheme for ef®cient multicasting in mobile asynchronous transfer mode (ATM) networks.  ...  With MCoRe, source migration is transparent to the multicast group members and does not entail reconstruction of existing multicast tree.  ...  CBT [14] ) can be employed in ATM networks where multicast group members only need to setup a connection to the core for sending/receiving data.  ... 
doi:10.1016/s0140-3664(01)00336-x fatcat:aaksqgiwlbfphesex3jyeutjri

Cross-Layer Collaborative In-Network Processing in Multihop Wireless Sensor Networks

Yuan Tian, Eylem Ekici
2007 IEEE Transactions on Mobile Computing  
, but also synchronize their communication activities to exchange partially processed data for parallel processing.  ...  Emerging Wireless Sensor Network (WSN) applications demand considerable computation capacity for in-network processing.  ...  ACKNOWLEDGMENTS The authors would like to thank Yang Yu for providing the simulator of EbTA [14] .  ... 
doi:10.1109/tmc.2007.39 fatcat:3mchdl4rn5ajxgrgmzuqnogkne

An initial analysis of packet function-aware extension to Dijkstra algorithm for wireless networks

Mustafa Arisoylu
2016 EURASIP Journal on Wireless Communications and Networking  
In particular, we propose a generic algorithm for packet function-aware path setup for multi-hop networks.  ...  We did initial analysis based on simulation of the algorithm for various random multi-hop wireless networks (e.g., 802.11), utilizing realistic link delay models.  ...  In these simulations, we compute the PFA_SPF algorithm and find possibly multiple shortest-path trees from the source node to all other nodes in the network where each tree is optimized for an optimum  ... 
doi:10.1186/s13638-016-0544-1 fatcat:5oy46pbhmzdy7nkmyzdk7dgfuq

A Novel Wake-Up Receiver with Addressing Capability for Wireless Sensor Nodes

Chiara Petrioli, Dora Spenza, Pasquale Tommasino, Alessandro Trifiletti
2014 2014 IEEE International Conference on Distributed Computing in Sensor Systems  
Emerging low-power radio triggering techniques for wireless motes are a promising approach to prolong the lifetime of Wireless Sensor Networks (WSNs).  ...  By allowing nodes to activate their main transceiver only when data need to be transmitted or received, wake-up-enabled solutions virtually eliminate the need for idle listening, thus drastically reducing  ...  Spenza also gratefully acknowledges support from a Google Europe Doctoral Fellowship.  ... 
doi:10.1109/dcoss.2014.9 dblp:conf/dcoss/PetrioliSTT14 fatcat:dcj2ibkq3fd4xijxexnxrvpetu

Recent Security Trends in Internet of Things: a Comprehensive Survey

Yasmine Harbi, Zibouda Aliouat, Allaoua Refoufi, Saad Harous
2021 IEEE Access  
-Data reliability is highly required for critical IoT applications such as healthcare systems.  ...  A summary of the proposed security schemes for IoT is Encryption key, DoS, MTM provided in Table 8 . A.  ... 
doi:10.1109/access.2021.3103725 fatcat:elfjfrhtnjfvhjp5jqtkj7r7gy

Communication Requirements for a Hybrid VSC Based HVDC/AC Transmission Networks State Estimation

Motaz Ayiad, Emily Maggioli, Helder Leite, Hugo Martins
2021 Energies  
It is concluded that the time requirements can be fulfilled for a hybrid HVDC/AC network.  ...  In addition, a case study of a complete cycle for a unified Weighted Least Squares (WLS) state estimation is tested on a hybrid HVDC/AC transmission network, based on Voltage Source Converter (VSC).  ...  Data Availability Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/en14041087 fatcat:kfz4gftfhvcexoxrp7fdn7owq4

Energy efficient wireless unicast routing alternatives for machine-to-machine networks

Neyre Tekbiyik, Elif Uysal-Biyikoglu
2011 Journal of Network and Computer Applications  
Constructing energy-efficient routes for sending data through such networks is important not only for the longevity of the nodes which typically depend on battery energy, but also for achieving an environmentally  ...  Energy-efficient networks M2M M2M applications M2M communication a b s t r a c t Machine-to-machine (M2M) communications is a new and rapidly developing technology for largescale networking of devices  ...  Consider, for instance, an M2M security system which is supposed to send an alarm to a control center when an intrusion, a fire, etc., is detected.  ... 
doi:10.1016/j.jnca.2011.02.005 fatcat:tubfylpwwnbgbltvn7homotn2i

Security and Privacy Protection in Visual Sensor Networks

Thomas Winkler, Bernhard Rinner
2014 ACM Computing Surveys  
A central contribution of this survey is our classification of VSN security aspects into data-centric, node-centric, network-centric, and user-centric security.  ...  In a holistic approach, security and privacy protection must not stop at the data level.  ...  ACKNOWLEDGMENTS This work was performed as part of the project TrustEYE: Trustworthy Sensing and Cooperation in Visual Sensor Networks. 2 The work was supported by funding from the European Regional Development  ... 
doi:10.1145/2545883 fatcat:hkqdjt3ykvhtrp3vc3ce5mzd5m

Investigation of mechanisms for routing in mobile ad-hoc network

H Bakht
MA ODDP Multicasting Scenario one Nodes join a multicast tree to transfer some data to a node which is a part of a multicast tree for which the node is not a member.  ...  If a node wishes to join a multicast tree for which it is not a member, it can invoke a multicast joining request by broadcasting a Joining query (MJR) to the multicast group.  ...  These ACK messages in MAODDP serve two purposes i. e. establishment of route and simultaneous data delivery.  ... 
doi:10.24377/ljmu.t.00005840 fatcat:65mvebpm7jedfnyskirzukicte


Manish Mahendra, Kumar Kochhal, Manish Kochhal Dissertation
2010 unpublished
(Mirkovic et al., 2001 ) organize a large-scale sensor network by maintaining a dynamic multicast tree-based forwarding hierarchy that allows multiple sinks to obtain data from a (sensor) source.  ...  An array of sensors on The basestation acts as a gateway between the remote data processing center and the sensor network.  ... 


Massimo Villari, Yong Lee, Wolf Zimmermann
2011 The Second International Conference on Cloud Computing, GRIDs, and Virtualization   unpublished
The copyright release is a transfer of publication rights, which allows IARIA and its partners to drive the dissemination of the published material.  ...  This allows IARIA to give articles increased visibility via distribution, inclusion in libraries, and arrangements for submission to indexes.  ...  And a record-andreplay scheme for this DCSM is designed.  ... 

Secure Data Transmission in Wireless Sensor Networks [article]

Corinna Schmitt
., todays' deployed wireless sensor networks use UDP for data transmission towards a sink and TCP is used for administrative functions (e.g. node configuration) [21].  ...  research questions in the field of e cient data transmission: (E1) Is the IP Flow Information Export (IPFIX) protocol a viable solution for transmission of sensor data in wireless sensor networks?  ...  Acknowledgements In order to develop a doctoral thesis, support of many people is required. Prof.  ... 
doi:10.2313/net-2013-07-2 fatcat:ybzrln3ggngupkoga7j56jazzm

Fifth Research and Development Framework Programme 1998-2002: Applications Relating to Health. Final Report [article]

European Commission, University Of Calgary, University Of Calgary
Report on the research and development of information technologies for applications related to health from 1998-2002.  ...  on whether o r not an urgent referral is required for a suspected cancer patient; a web-based graphical toolkit for creating a 'family tree'.  ...  for a structured data entry.  ... 
doi:10.11575/prism/10567 fatcat:5mh6fwxyhncdje6ze4peentek4

Implementation of Physical Layer of a Network via Practical Analysis

Parul Khara
The fascination for networking started as a kid when I wondered how my computer was connected to a world wide web. Data being sent and received from one computer to other fascinated me.  ...  Its establishment took a long time and it is in continuous improvement till date.  ...  Use a drop wire guard or reroute the drop if trees are in the way. Trimming trees on private property should be limited. The owner is responsible for removing any limbs and large branches.  ... 
doi:10.7939/r3-n4bz-1769 fatcat:gshkst4vfvbshbzrzt5z2h7tzq