78,842 Hits in 5.2 sec

An Effective Communication Prototype for Time-Critical IIoT Manufacturing Factories Using Zero-Loss Redundancy Protocols, Time-Sensitive Networking, and Edge-Computing in an Industry 4.0 Environment

Kahiomba Sonia Kiangala, Zenghui Wang
2021 Processes  
We use time-sensitive networking (TSN) and edge computing to increase the determinism of IIoT networks, and we reduce latency with zero-loss redundancy protocols that ensure the sustainability of IIoT  ...  Although several measures in the likes of predictive maintenance are being put in place to prevent errors and guarantee high network availability, unforeseen failures of physical components are almost  ...  reducing the risks of communication delays and downtimes. • TSN and edge computing concepts benefits to diminish communication latency risks when dealing with critical data transmission.  ... 
doi:10.3390/pr9112084 fatcat:d5juk4isqjcmbl633bqhtm3nja

An Improved Network Congestion Control System

Michael C. Emmanuel, University
2018 International Journal of Engineering Research and  
Typically, congestion happens when packets arrive in a burst or when sources are sending more data than the network can accommodate.  ...  The system uses exchange of feedback messages among edge routers to control unresponsive traffic tending to enter the network, thereby, forestalling congestion in the network.It used leaky bucket algorithm  ...  when data traffic exceeds available network resources.  ... 
doi:10.17577/ijertv7is060178 fatcat:6m5sybb2evb6bdeyikncnd3jhy

A Location-Centric Network Approach to Analyzing Epidemic Dynamics

Shiran Zhong, Ling Bian
2016 Annals of the American Association of Geographers  
We propose a location-centric, transmission network approach, in which nodes denote locations and edges denote possible disease transmissions between locations.  ...  Critical locations, identified using network analysis, are responsible for the upsurge in transmission flows during the peaks of the epidemic.  ...  Identify critical locations Two network centrality indices, degree centrality and bridging centrality, are used to identify critical nodes in the transmission networks.  ... 
doi:10.1080/00045608.2015.1113113 pmid:27493998 pmcid:PMC4968948 fatcat:jjmkvfnsgjfrncdks2ystzyxza

Distributed Adaptive Power Control in IEEE 802.11 Wireless Networks

Wang Ho, Soung Liew
2006 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Sysetems  
This paper shows that in a network with power control, reducing the instances of hidden nodes can not only prevent unfair bandwidth distributions, but also achieve higher overall network capacity compared  ...  Avoiding hidden nodes (by extending the carrier-sensing range), however, may cause the network to have lower overall network capacity.  ...  However, the existence of a tc-edge from i to j will prevent j from transmitting when i is already transmitting; while the existence of an rc-edge will prevent the success of the transmission by link j  ... 
doi:10.1109/mobhoc.2006.278554 dblp:conf/mass/HoL06 fatcat:o6254slwujdp7d7xfgvqcgashq

Engaging Edge Networks in Preventing and Mitigating Undesirable Network Traffic

Lan Wang, Qishi Wu, Dung Dinh Luong
2007 2007 3rd IEEE Workshop on Secure Network Protocols  
In the proposed PATRICIA architecture, edge networks cooperate to prevent misbehaving sources from flooding traffic in both control and data channels.  ...  We address the security vulnerabilities in existing protocols for network traffic authentication, by engaging edge networks in defending against undesirable traffic.  ...  Third, due to the popularity of the early adopters' services, the deployment domain could expand to a large number of other edge networks, because the end users in those networks need to access the critical  ... 
doi:10.1109/npsec.2007.4371617 fatcat:madadjjfdrabjm3fvb6qrci2vm

Repair strategies for minimising the risk of cascading failures in electricity networks

Christian Balderer, Michael Guarisco, Marco Laumanns, Rico Zenklusen
2009 International Journal of Critical Infrastructures  
In the first problem, we are given a network and a number k and try to find the set of k failed edges that maximizes the maximum flow when being repaired.  ...  They are typically caused by a sequence of cascading failures and may be evidence of a critically loaded transmission system [1] .  ... 
doi:10.1504/ijcis.2009.022849 fatcat:cz32wpuxjvccvly54f6xakzwwy

A Power System Network Splitting Strategy Based on Contingency Analysis

Nur Saharuddin, Izham Zainal Abidin, Hazlie Mokhlis, Abdul Abdullah, Kanendra Naidu
2018 Energies  
Network splitting is the best option for certain critical outages when the tendency of severe cascading failures is very high.  ...  This paper proposes a network splitting strategy following critical line outages based on N-1 contingency analysis.  ...  S ij,critical ≥ 1.3 × S ij,max (4) where S ij = critical loading on the edge between transmission line l i and transmission line l j .  ... 
doi:10.3390/en11020434 fatcat:avueme3ffvfv3lrc7bwyufatju

Incorporation of Spatial Interactions in Location Networks to Identify Critical Geo-Referenced Routes for Assessing Disease Control Measures on a Large-Scale Campus

Tzai-Hung Wen, Wei Chin
2015 International Journal of Environmental Research and Public Health  
identifying the critical links and nodes for blocking respiratory disease transmission.  ...  Class suspension is the most direct strategy to prevent the spread of disease through elementary or secondary schools by blocking the contact network.  ...  Identifying critical links could assist in slowing the transmission among communities to reach joint-region prevention.  ... 
doi:10.3390/ijerph120404170 pmid:25874686 pmcid:PMC4410240 fatcat:5lxnyd2ykjf3hptmc25m4h4ocq

Design of Context-aware Resource Management for Healthcare IoT

Siwoo Byun, Anyang University, Kyoungkido, South Korea
2020 International Journal of Smart Device and Appliance  
This paper introduces recent IoT network and edge computing technology and describes healthcare IoT network and related edge technologies.  ...  Edge computing is emerging as a technology that complements cloud computing in an IoT environment where huge amounts of data are generated in real time.  ...  However, they have higher priority and shortterm transmission cycle when sudden changes in critical sensor values occur, even though they are ordinary patients.  ... 
doi:10.21742/ijsda.2020.8.1.03 fatcat:dyn6ooigzfebfaim6ij5z2odwu

Network Border Patrol: Prevent Profusion Crash and Prating Decency in the Network

B. Pawan Kumar Kurmi, Rahul Jain, K. Dheeraj Reddy, GSGN Anjaneyulu
2018 International Journal of Engineering & Technology  
trusts on the conversion and evaluation in the middle of routers at the rims of a network.  ...  This depends on priority to identify and restrict not responding traffic flux before they enter the network.  ...  Reasonable designation of data transmission is guaranteed.  ... 
doi:10.14419/ijet.v7i4.10.26786 fatcat:rexwne4ygjh7di74ihxvx52cla

Impact of Power Control on Performance of IEEE 802.11 Wireless Networks

Ivan Wang-Hei Ho, Soung Chang Liew
2007 IEEE Transactions on Mobile Computing  
This paper shows that in a network with power control, avoiding hidden nodes can achieve higher overall network capacity compared with the minimum-transmit-power approach.  ...  In addition, our power control algorithms can operate at desirable network-capacity-fairness tradeoff points, and can boost the capacity of ordinary non-power-controlled 802.11 networks by two times while  ...  However, the existence of a tc-edge from i to j will prevent j from transmitting when i is already transmitting; while the existence of an rc-edge will prevent the success of the transmission by link j  ... 
doi:10.1109/tmc.2007.1045 fatcat:gi4ej6zfuvedhowvy7ihxhqx4y

Ultra-reliable and low-latency communications: applications, opportunities and challenges

Daquan Feng, Lifeng Lai, Jingjing Luo, Yi Zhong, Canjian Zheng, Kai Ying
2021 Science China Information Sciences  
However, the two stringent requirements of URLLC: extremely low latency and ultra-strict reliability have posed great challenges in system designing.  ...  In the upcoming 5G and beyond systems, ultra-reliable and low latency communication (URLLC) has been considered as the key enabler to support diverse mission-critical services, such as industrial automation  ...  Meeting diverse delay requirements is one of the most critical goals for the design of 5G wireless networks. In order to explore the impact of scheduling policy on delay under different services, Ref.  ... 
doi:10.1007/s11432-020-2852-1 fatcat:xlpvhebcw5awrn3laloo537fda

Six Key Enablers for Machine Type Communication in 6G [article]

Nurul Huda Mahmood, Hirley Alves, Onel Alcaraz López, Mohammad Shehab, Diana P. Moya Osorio, Matti Latva-aho
2019 arXiv   pre-print
Driven by impetus to provide vertical-specific wireless network solutions, machine type communication encompassing both its mission critical and massive connectivity aspects is foreseen to be an important  ...  Moreover, current MTC networks (massive and critical) are static with fixed slicing.  ...  to design effective strategies to prevent from distributed denial of service (DDoS) attacks jointly with advanced ML and data mining strategies [12].  ... 
arXiv:1903.05406v1 fatcat:wsrguijsfjbe7p5lf6a3ibr5lm

Performance analysis of an OBS edge router

A. Zalesky, E.W.M. Wong, M. Zukerman, Hai Le Vu, R.S. Tucker
2004 IEEE Photonics Technology Letters  
We consider optical burst switching with acknowledgment in an edge router served by a limited number of wavelength channels.  ...  The analysis of [1] and [2] assumes a sufficient number of wavelength channels are available to prevent burst blocking at edge routers. 2) To prevent the loss of packets at the edge router due to a  ...  In this letter, we present new analysis to assist in the design and performance evaluation of OBS/A networks.  ... 
doi:10.1109/lpt.2003.821233 fatcat:c7bg2yxw6zdrja3wy3nwfsk5xa

Determination of Critical Transmission Range in Ad-Hoc Networks [chapter]

Miguel Sánchez, Pietro Manzoni, Zygmunt J. Haas
1999 Multiaccess, Mobility and Teletraffic in Wireless Communications: Volume 4  
This paper presents an algorithm to calculate the minimum transmission range of the transceivers that is required to achieve, with some probability, full network connectivity.  ...  Ad-hoc networks are wireless mobile networks that do not rely on preexisting infrastructure.  ...  When the transmission range is not large enough, that is, when the transmission range is under the critical transmission range, the network gets partitioned.  ... 
doi:10.1007/978-1-4757-5920-4_30 fatcat:eaqrpp3cwreqbiiawdr62rlpgq
« Previous Showing results 1 — 15 out of 78,842 results