WorldWideScience

Sample records for area networks deployment

  1. A Polygon Model for Wireless Sensor Network Deployment with Directional Sensing Areas

    Science.gov (United States)

    Wu, Chun-Hsien; Chung, Yeh-Ching

    2009-01-01

    The modeling of the sensing area of a sensor node is essential for the deployment algorithm of wireless sensor networks (WSNs). In this paper, a polygon model is proposed for the sensor node with directional sensing area. In addition, a WSN deployment algorithm is presented with topology control and scoring mechanisms to maintain network connectivity and improve sensing coverage rate. To evaluate the proposed polygon model and WSN deployment algorithm, a simulation is conducted. The simulation results show that the proposed polygon model outperforms the existed disk model and circular sector model in terms of the maximum sensing coverage rate. PMID:22303159

  2. Heterogeneous Deployment Analysis for Cost-Effective Mobile Network Evolution

    DEFF Research Database (Denmark)

    Coletti, Claudio

    2013-01-01

    network coverage and boosting network capacity in traffic hot-spot areas. The thesis deals with the deployment of both outdoor small cells and indoor femto cells. Amongst the outdoor solution, particular emphasis is put on relay base stations as backhaul costs can be reduced by utilizing LTE spectrum...... statistical models of deployment areas, the performance analysis is carried out in the form of operator case studies for large-scale deployment scenarios, including realistic macro network layouts and inhomogeneous spatial traffic distributions. Deployment of small cells is performed by means of proposed...... heuristic deployment algorithms, which combine network coverage and spatial user density information. As a secondary aspect, deployment solutions achieving the same coverage performance are compared in terms of Total Cost of Ownership (TCO), in order to investigate the viability of different deployment...

  3. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  4. EDITORIAL Wireless sensor networks: design for real-life deployment and deployment experiences Wireless sensor networks: design for real-life deployment and deployment experiences

    Science.gov (United States)

    Gaura, Elena; Roedig, Utz; Brusey, James

    2010-12-01

    Wireless sensor networks (WSNs) are among the most promising technologies of the new millennium. The opportunities afforded by being able to program networks of small, lightweight, low-power, computation- and bandwidth-limited nodes have attracted a large community of researchers and developers. However, the unique set of capabilities offered by the technology produces an exciting but complex design space, which is often difficult to negotiate in an application context. Deploying sensing physical environments produces its own set of challenges, and can push systems into failure modes, thus revealing problems that can be difficult to discover or reproduce in simulation or the laboratory. Sustained efforts in the area of wireless networked sensing over the last 15 years have resulted in a large number of theoretical developments, substantial practical achievements, and a wealth of lessons for the future. It is clear that in order to bridge the gap between (on the one hand) visions of very large scale, autonomous, randomly deployed networks and (on the other) the actual performance of fielded systems, we need to view deployment as an essential component in the process of developing sensor networks: a process that includes hardware and software solutions that serve specific applications and end-user needs. Incorporating deployment into the design process reveals a new and different set of requirements and considerations, whose solutions require innovative thinking, multidisciplinary teams and strong involvement from end-user communities. This special feature uncovers and documents some of the hurdles encountered and solutions offered by experimental scientists when deploying and evaluating wireless sensor networks in situ, in a variety of well specified application scenarios. The papers specifically address issues of generic importance for WSN system designers: (i) data quality, (ii) communications availability and quality, (iii) alternative, low-energy sensing

  5. Cross Deployment Networking and Systematic Performance Analysis of Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhengxian Wei

    2017-07-01

    Full Text Available Underwater wireless sensor networks (UWSNs have become a new hot research area. However, due to the work dynamics and harsh ocean environment, how to obtain an UWSN with the best systematic performance while deploying as few sensor nodes as possible and setting up self-adaptive networking is an urgent problem that needs to be solved. Consequently, sensor deployment, networking, and performance calculation of UWSNs are challenging issues, hence the study in this paper centers on this topic and three relevant methods and models are put forward. Firstly, the normal body-centered cubic lattice to cross body-centered cubic lattice (CBCL has been improved, and a deployment process and topology generation method are built. Then most importantly, a cross deployment networking method (CDNM for UWSNs suitable for the underwater environment is proposed. Furthermore, a systematic quar-performance calculation model (SQPCM is proposed from an integrated perspective, in which the systematic performance of a UWSN includes coverage, connectivity, durability and rapid-reactivity. Besides, measurement models are established based on the relationship between systematic performance and influencing parameters. Finally, the influencing parameters are divided into three types, namely, constraint parameters, device performance and networking parameters. Based on these, a networking parameters adjustment method (NPAM for optimized systematic performance of UWSNs has been presented. The simulation results demonstrate that the approach proposed in this paper is feasible and efficient in networking and performance calculation of UWSNs.

  6. On Prolonging Network Lifetime through Load-Similar Node Deployment in Wireless Sensor Networks

    Science.gov (United States)

    Li, Qiao-Qin; Gong, Haigang; Liu, Ming; Yang, Mei; Zheng, Jun

    2011-01-01

    This paper is focused on the study of the energy hole problem in the Progressive Multi-hop Rotational Clustered (PMRC)-structure, a highly scalable wireless sensor network (WSN) architecture. Based on an analysis on the traffic load distribution in PMRC-based WSNs, we propose a novel load-similar node distribution strategy combined with the Minimum Overlapping Layers (MOL) scheme to address the energy hole problem in PMRC-based WSNs. In this strategy, sensor nodes are deployed in the network area according to the load distribution. That is, more nodes shall be deployed in the range where the average load is higher, and then the loads among different areas in the sensor network tend to be balanced. Simulation results demonstrate that the load-similar node distribution strategy prolongs network lifetime and reduces the average packet latency in comparison with existing nonuniform node distribution and uniform node distribution strategies. Note that, besides the PMRC structure, the analysis model and the proposed load-similar node distribution strategy are also applicable to other multi-hop WSN structures. PMID:22163809

  7. A Novel Deployment Scheme Based on Three-Dimensional Coverage Model for Wireless Sensor Networks

    Science.gov (United States)

    Xiao, Fu; Yang, Yang; Wang, Ruchuan; Sun, Lijuan

    2014-01-01

    Coverage pattern and deployment strategy are directly related to the optimum allocation of limited resources for wireless sensor networks, such as energy of nodes, communication bandwidth, and computing power, and quality improvement is largely determined by these for wireless sensor networks. A three-dimensional coverage pattern and deployment scheme are proposed in this paper. Firstly, by analyzing the regular polyhedron models in three-dimensional scene, a coverage pattern based on cuboids is proposed, and then relationship between coverage and sensor nodes' radius is deduced; also the minimum number of sensor nodes to maintain network area's full coverage is calculated. At last, sensor nodes are deployed according to the coverage pattern after the monitor area is subdivided into finite 3D grid. Experimental results show that, compared with traditional random method, sensor nodes number is reduced effectively while coverage rate of monitor area is ensured using our coverage pattern and deterministic deployment scheme. PMID:25045747

  8. Small cell networks deployment, management, and optimization

    CERN Document Server

    Claussen, Holger; Ho, Lester; Razavi, Rouzbeh; Kucera, Stepan

    2018-01-01

    Small Cell Networks: Deployment, Management, and Optimization addresses key problems of the cellular network evolution towards HetNets. It focuses on the latest developments in heterogeneous and small cell networks, as well as their deployment, operation, and maintenance. It also covers the full spectrum of the topic, from academic, research, and business to the practice of HetNets in a coherent manner. Additionally, it provides complete and practical guidelines to vendors and operators interested in deploying small cells. The first comprehensive book written by well-known researchers and engineers from Nokia Bell Labs, Small Cell Networks begins with an introduction to the subject--offering chapters on capacity scaling and key requirements of future networks. It then moves on to sections on coverage and capacity optimization, and interference management. From there, the book covers mobility management, energy efficiency, and small cell deployment, ending with a section devoted to future trends and applicat...

  9. Analyses and optimization of Lee propagation model for LoRa 868 MHz network deployments in urban areas

    Directory of Open Access Journals (Sweden)

    Dobrilović Dalibor

    2017-01-01

    Full Text Available In the recent period, fast ICT expansion and rapid appearance of new technologies raised the importance of fast and accurate planning and deployment of emerging communication technologies, especially wireless ones. In this paper is analyzed possible usage of Lee propagation model for planning, design and management of networks based on LoRa 868MHz technology. LoRa is wireless technology which can be deployed in various Internet of Things and Smart City scenarios in urban areas. The analyses are based on comparison of field measurements with model calculations. Besides the analyses of Lee propagation model usability, the possible optimization of the model is discussed as well. The research results can be used for accurate design, planning and for preparation of high-performance wireless resource management of various Internet of Things and Smart City applications in urban areas based on LoRa or similar wireless technology. The equipment used for measurements is based on open-source hardware.

  10. Problems With Deployment of Multi-Domained, Multi-Homed Mobile Networks

    Science.gov (United States)

    Ivancic, William D.

    2008-01-01

    This document describes numerous problems associated with deployment of multi-homed mobile platforms consisting of multiple networks and traversing large geographical areas. The purpose of this document is to provide insight to real-world deployment issues and provide information to groups that are addressing many issues related to multi-homing, policy-base routing, route optimization and mobile security - particularly those groups within the Internet Engineering Task Force.

  11. A Deployment Scheme Based Upon Virtual Force for Directional Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chiu-Kuo Liang

    2015-11-01

    Full Text Available A directional sensor network is composed of many directional sensor nodes. Unlike conventional omni-directional sensors that always have an omni-angle of sensing range; directional sensors may have a limited angle of sensing range due to technical constraints or cost considerations. Area coverage is still an essential issue in a directional sensor network. In this paper, we study the area coverage problem in directional sensor networks with mobile sensors, which can move to the correct places to get high coverage. We present distributed self-deployment schemes of mobile sensors. After sensors are randomly deployed, each sensor calculates its next new location to move in order to obtain a better coverage than previous one. The locations of sensors are adjusted round by round so that the coverage is gradually improved. Based on the virtual force of the directional sensors, we design a scheme, namely Virtual force scheme. Simulation results show the effectiveness of our scheme in term of the coverage improvement.

  12. Rule-Based vs. Behavior-Based Self-Deployment for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Urdiales, Cristina; Aguilera, Francisco; González-Parada, Eva; Cano-García, Jose; Sandoval, Francisco

    2016-07-07

    In mobile wireless sensor networks (MWSN), nodes are allowed to move autonomously for deployment. This process is meant: (i) to achieve good coverage; and (ii) to distribute the communication load as homogeneously as possible. Rather than optimizing deployment, reactive algorithms are based on a set of rules or behaviors, so nodes can determine when to move. This paper presents an experimental evaluation of both reactive deployment approaches: rule-based and behavior-based ones. Specifically, we compare a backbone dispersion algorithm with a social potential fields algorithm. Most tests are done under simulation for a large number of nodes in environments with and without obstacles. Results are validated using a small robot network in the real world. Our results show that behavior-based deployment tends to provide better coverage and communication balance, especially for a large number of nodes in areas with obstacles.

  13. Evaluation of Deployment Challenges of Wireless Sensor Networks at Signalized Intersections

    Directory of Open Access Journals (Sweden)

    Leyre Azpilicueta

    2016-07-01

    Full Text Available With the growing demand of Intelligent Transportation Systems (ITS for safer and more efficient transportation, research on and development of such vehicular communication systems have increased considerably in the last years. The use of wireless networks in vehicular environments has grown exponentially. However, it is highly important to analyze radio propagation prior to the deployment of a wireless sensor network in such complex scenarios. In this work, the radio wave characterization for ISM 2.4 GHz and 5 GHz Wireless Sensor Networks (WSNs deployed taking advantage of the existence of traffic light infrastructure has been assessed. By means of an in-house developed 3D ray launching algorithm, the impact of topology as well as urban morphology of the environment has been analyzed, emulating the realistic operation in the framework of the scenario. The complexity of the scenario, which is an intersection city area with traffic lights, vehicles, people, buildings, vegetation and urban environment, makes necessary the channel characterization with accurate models before the deployment of wireless networks. A measurement campaign has been conducted emulating the interaction of the system, in the vicinity of pedestrians as well as nearby vehicles. A real time interactive application has been developed and tested in order to visualize and monitor traffic as well as pedestrian user location and behavior. Results show that the use of deterministic tools in WSN deployment can aid in providing optimal layouts in terms of coverage, capacity and energy efficiency of the network.

  14. Wireless Sensor Network Deployment for Monitoring Wildlife Passages

    Science.gov (United States)

    Garcia-Sanchez, Antonio-Javier; Garcia-Sanchez, Felipe; Losilla, Fernando; Kulakowski, Pawel; Garcia-Haro, Joan; Rodríguez, Alejandro; López-Bao, José-Vicente; Palomares, Francisco

    2010-01-01

    Wireless Sensor Networks (WSNs) are being deployed in very diverse application scenarios, including rural and forest environments. In these particular contexts, specimen protection and conservation is a challenge, especially in natural reserves, dangerous locations or hot spots of these reserves (i.e., roads, railways, and other civil infrastructures). This paper proposes and studies a WSN based system for generic target (animal) tracking in the surrounding area of wildlife passages built to establish safe ways for animals to cross transportation infrastructures. In addition, it allows target identification through the use of video sensors connected to strategically deployed nodes. This deployment is designed on the basis of the IEEE 802.15.4 standard, but it increases the lifetime of the nodes through an appropriate scheduling. The system has been evaluated for the particular scenario of wildlife monitoring in passages across roads. For this purpose, different schemes have been simulated in order to find the most appropriate network operational parameters. Moreover, a novel prototype, provided with motion detector sensors, has also been developed and its design feasibility demonstrated. Original software modules providing new functionalities have been implemented and included in this prototype. Finally, main performance evaluation results of the whole system are presented and discussed in depth. PMID:22163601

  15. Wireless Sensor Network Deployment for Monitoring Wildlife Passages

    Directory of Open Access Journals (Sweden)

    José-Vicente López-Bao

    2010-08-01

    Full Text Available Wireless Sensor Networks (WSNs are being deployed in very diverse application scenarios, including rural and forest environments. In these particular contexts, specimen protection and conservation is a challenge, especially in natural reserves, dangerous locations or hot spots of these reserves (i.e., roads, railways, and other civil infrastructures. This paper proposes and studies a WSN based system for generic target (animal tracking in the surrounding area of wildlife passages built to establish safe ways for animals to cross transportation infrastructures. In addition, it allows target identification through the use of video sensors connected to strategically deployed nodes. This deployment is designed on the basis of the IEEE 802.15.4 standard, but it increases the lifetime of the nodes through an appropriate scheduling. The system has been evaluated for the particular scenario of wildlife monitoring in passages across roads. For this purpose, different schemes have been simulated in order to find the most appropriate network operational parameters. Moreover, a novel prototype, provided with motion detector sensors, has also been developed and its design feasibility demonstrated. Original software modules providing new functionalities have been implemented and included in this prototype. Finally, main performance evaluation results of the whole system are presented and discussed in depth.

  16. Weight-Aware Sensor Deployment in Wireless Sensor Networks for Smart Cities

    Directory of Open Access Journals (Sweden)

    Mingshan Xie

    2018-01-01

    Full Text Available During the construction of wireless sensor networks (WSNs for smart cities, a preliminary survey of the relative criticalness within the monitored area can be performed. It is a challenge for deterministic sensor deployment to balance the tradeoff of sensing reliability and cost. In this paper, based on the sensing accuracy of the sensor, we establish a reliability model of the sensing area which is divided into sensing grids, and different weights are allocated to those grids. We employ a practical evaluation criterion using seesaw mapping for determining the weights of sensing grids. We further formulate and solve an optimization problem for maximizing the trust degree of the WSNs. With our proposed method, the efficient deployment of sensors can be realized. Simulation results show that our proposed deployment strategy can achieve higher trust degree with reduced sensor deployment cost and lower number of sensors at a certain miss probability threshold.

  17. Context-Aware Local Optimization of Sensor Network Deployment

    Directory of Open Access Journals (Sweden)

    Meysam Argany

    2015-07-01

    Full Text Available Wireless sensor networks are increasingly used for tracking and monitoring dynamic phenomena in urban and natural areas. Spatial coverage is an important issue in sensor networks in order to fulfill the needs of sensing applications. Optimization methods are widely used to efficiently distribute sensor nodes in the network to achieve a desired level of coverage. Most of the existing algorithms do not consider the characteristics of the real environment in the optimization process. In this paper, we propose the integration of contextual information in optimization algorithms to improve sensor network coverage. First, we investigate the implication of contextual information in sensor networks. Then, a conceptual framework for local context-aware sensor network deployment optimization method is introduced and related algorithms are presented in detail. Finally, several experiments are carried out to evaluate the validity of the proposed method. The results obtained from these experiments show the effectiveness of our approach in different contextual situations.

  18. Deploying temporary networks for upscaling of sparse network stations

    Science.gov (United States)

    Coopersmith, Evan J.; Cosh, Michael H.; Bell, Jesse E.; Kelly, Victoria; Hall, Mark; Palecki, Michael A.; Temimi, Marouane

    2016-10-01

    Soil observations networks at the national scale play an integral role in hydrologic modeling, drought assessment, agricultural decision support, and our ability to understand climate change. Understanding soil moisture variability is necessary to apply these measurements to model calibration, business and consumer applications, or even human health issues. The installation of soil moisture sensors as sparse, national networks is necessitated by limited financial resources. However, this results in the incomplete sampling of the local heterogeneity of soil type, vegetation cover, topography, and the fine spatial distribution of precipitation events. To this end, temporary networks can be installed in the areas surrounding a permanent installation within a sparse network. The temporary networks deployed in this study provide a more representative average at the 3 km and 9 km scales, localized about the permanent gauge. The value of such temporary networks is demonstrated at test sites in Millbrook, New York and Crossville, Tennessee. The capacity of a single U.S. Climate Reference Network (USCRN) sensor set to approximate the average of a temporary network at the 3 km and 9 km scales using a simple linear scaling function is tested. The capacity of a temporary network to provide reliable estimates with diminishing numbers of sensors, the temporal stability of those networks, and ultimately, the relationship of the variability of those networks to soil moisture conditions at the permanent sensor are investigated. In this manner, this work demonstrates the single-season installation of a temporary network as a mechanism to characterize the soil moisture variability at a permanent gauge within a sparse network.

  19. University of Cambridge deploys Procket Networks' PRO/8801

    CERN Multimedia

    2003-01-01

    Procket Networks, a provider of high performance Internet Protocol (IP) technology and products has announced that the University of Cambridge has deployed the PRO/8801(TM) router into its research network to develop industry-leading deep packet inspection applications. The major application for this deployment is to identify and understand new traffic patterns created by large scale scientific computations and downloads such as the GRID (1 page).

  20. Lessons learned on solar powered wireless sensor network deployments in urban, desert environments

    KAUST Repository

    Dehwah, Ahmad H.

    2015-05-01

    The successful deployment of a large scale solar powered wireless sensor network in an urban, desert environment is a very complex task. Specific cities of such environments cause a variety of operational problems, ranging from hardware faults to operational challenges, for instance due to the high variability of solar energy availability. Even a seemingly functional sensor network created in the lab does not guarantee reliable long term operation, which is absolutely necessary given the cost and difficulty of accessing sensor nodes in urban environments. As part of a larger traffic flow wireless sensor network project, we conducted several deployments in the last two years to evaluate the long-term performance of solar-powered urban wireless sensor networks in a desert area. In this article, we share our experiences in all domains of sensor network operations, from the conception of hardware to post-deployment analysis, including operational constraints that directly impact the software that can be run. We illustrate these experiences using numerous experimental results, and present multiple unexpected operational problems as well as some possible solutions to address them. We also show that current technology is far from meeting all operational constraints for these demanding applications, in which sensor networks are to operate for years to become economically appealing.

  1. Next Generation Access Network Deployment in Croatia: Optical Access Networks and Current IoT/5G Status

    Science.gov (United States)

    Breskovic, Damir; Sikirica, Mladen; Begusic, Dinko

    2018-05-01

    This paper gives an overview and background of optical access network deployment in Croatia. Optical access network development in Croatia has been put into a global as well as in the European Union context. All the challenges and the driving factors for optical access networks deployment are considered. Optical access network architectures that have been deployed by most of the investors in Croatian telecommunication market are presented, as well as the architectures that are in early phase of deployment. Finally, an overview on current status of mobile networks of the fifth generation and Internet of Things is given.

  2. Service Creation and Deployment in Converged Networks

    DEFF Research Database (Denmark)

    Soler, José

    for these experiences is the transition of telecommunication (telephony) networks from circuit switched based systems towards packet based ones. The text of this monograph proceeds, unaltered for the most, from the author’s PhD thesis “Framework for Deployment of Advanced Telecommunication Services in Current......This monograph (Early Experiences related to Service Creation & Deployment in Converged Networks) presents different experiences related to architectures and mechanisms for deployment of telephony services, understood as especial features complementing the basic voice service. The context...... and Future Converged Networks”, carried out at the Technical University of Denmark in the period [April 2002-April 2005]. Even though the technologies presented in the text have evolved from that period until now, the presented scenarios and setups are still valid as interesting initial steps in the realm....

  3. MULTI-SENSOR NETWORK FOR LANDSLIDES SIMULATION AND HAZARD MONITORING - DESIGN AND DEPLOYMENT

    Directory of Open Access Journals (Sweden)

    H. Wu

    2012-08-01

    Full Text Available This paper describes a newly developed multi-sensor network system for landslide and hazard monitoring. Landslide hazard is one of the most destructive natural disasters, which has severely affected human safety, properties and infrastructures. We report the results of designing and deploying the multi-sensor network, based on the simulated landslide model, to monitor typical landslide areas and with a goal to predict landslide hazard and mitigate damages. The integration and deployment of the prototype sensor network were carried out in an experiment area at Tongji University in Shanghai. In order to simulate a real landslide, a contractible landslide body is constructed in the experiment area by 7m*1.5m. Then, some different kind of sensors, such as camera, GPS, crackmeter, accelerometer, laser scanning system, inclinometer, etc., are installed near or in the landslide body. After the sensors are powered, continuous sampling data will be generated. With the help of communication method, such as GPRS, and certain transport devices, such as iMesh and 3G router, all the sensor data will be transported to the server and stored in Oracle. These are the current results of an ongoing project of the center. Further research results will be updated and presented in the near future.

  4. Comparative Analysis between WiMAX and Fiber Optics Backhaul Network Deployment in Developing Countries - The Case of Ghana

    DEFF Research Database (Denmark)

    Adjin, Daniel Michael Okwabi; Williams, Idongesit

    to deploy than mobile technologies. But in many developing countries, there is preference for the deployment of fiber optics rather than a broadband wireless solution for the deployment of broadband internet. Argument is made in this paper using the Expectation Confirmation Theory to reveal the level...... of satisfaction of mobile WiMAX compared to what Fiber optics would bring to rural areas in terms of broadband provisioning, Cost of access, Cost of deployment, Network accessibility and availability. The case of investigation is Northern Ghana due to the proliferation of rural areas in that region...

  5. Scalable Spectrum Sharing Mechanism for Local Area Networks Deployment

    DEFF Research Database (Denmark)

    Da Costa, Gustavo Wagner Oliveira; Cattoni, Andrea Fabio; Kovacs, Istvan Zsolt

    2010-01-01

    in high mobility conditions. These goals can be only achieved through the use highly Optimized Local Area (OLA) access networks, operating at low range and low power transmissions. The efficient sharing of radio resources among OLAs will be very difficult to achieve with a traditional network planning......The availability on the market of powerful and lightweight mobile devices has led to a fast diffusion of mobile services for end users and the trend is shifting from voice based services to multimedia contents distribution. The current access networks are, however, able to support relatively low...... data rates and with limited Quality of Service (QoS). In order to extend the access to high data rate services to wireless users, the International Telecommunication Union (ITU) established new requirements for future wireless communication technologies of up to 1Gbps in low mobility and up to 100Mbps...

  6. ZERO: Probabilistic Routing for Deploy and Forget Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jose Carlos Pacho

    2010-09-01

    Full Text Available As Wireless Sensor Networks are being adopted by industry and agriculture for large-scale and unattended deployments, the need for reliable and energy-conservative protocols become critical. Physical and Link layer efforts for energy conservation are not mostly considered by routing protocols that put their efforts on maintaining reliability and throughput. Gradient-based routing protocols route data through most reliable links aiming to ensure 99% packet delivery. However, they suffer from the so-called ”hot spot” problem. Most reliable routes waste their energy fast, thus partitioning the network and reducing the area monitored. To cope with this ”hot spot” problem we propose ZERO a combined approach at Network and Link layers to increase network lifespan while conserving reliability levels by means of probabilistic load balancing techniques.

  7. Strategies for Power Line Communications Smart Metering Network Deployment

    Directory of Open Access Journals (Sweden)

    Alberto Sendin

    2014-04-01

    Full Text Available Smart Grids are becoming a reality all over the world. Nowadays, the research efforts for the introduction and deployment of these grids are mainly focused on the development of the field of Smart Metering. This emerging application requires the use of technologies to access the significant number of points of supply (PoS existing in the grid, covering the Low Voltage (LV segment with the lowest possible costs. Power Line Communications (PLC have been extensively used in electricity grids for a variety of purposes and, of late, have been the focus of renewed interest. PLC are really well suited for quick and inexpensive pervasive deployments. However, no LV grid is the same in any electricity company (utility, and the particularities of each grid evolution, architecture, circumstances and materials, makes it a challenge to deploy Smart Metering networks with PLC technologies, with the Smart Grid as an ultimate goal. This paper covers the evolution of Smart Metering networks, together with the evolution of PLC technologies until both worlds have converged to project PLC-enabled Smart Metering networks towards Smart Grid. This paper develops guidelines over a set of strategic aspects of PLC Smart Metering network deployment based on the knowledge gathered on real field; and introduces the future challenges of these networks in their evolution towards the Smart Grid.

  8. SATWG networked quality function deployment

    Science.gov (United States)

    Brown, Don

    1992-01-01

    The initiative of this work is to develop a cooperative process for continual evolution of an integrated, time phased avionics technology plan that involves customers, technologists, developers, and managers. This will be accomplished by demonstrating a computer network technology to augment the Quality Function Deployment (QFD). All results are presented in viewgraph format.

  9. A Nodes Deployment Algorithm in Wireless Sensor Network Based on Distribution

    Directory of Open Access Journals (Sweden)

    Song Yuli

    2014-07-01

    Full Text Available Wireless sensor network coverage is a basic problem of wireless sensor network. In this paper, we propose a wireless sensor network node deployment algorithm base on distribution in order to form an efficient wireless sensor network. The iteratively greedy algorithm is used in this paper to choose priority nodes into active until the entire network is covered by wireless sensor nodes, the whole network to multiply connected. The simulation results show that the distributed wireless sensor network node deployment algorithm can form a multiply connected wireless sensor network.

  10. On the area spectral efficiency improvement of heterogeneous network by exploiting the integration of macro-femto cellular networks

    KAUST Repository

    Shakir, Muhammad

    2012-06-01

    Heterogeneous networks are an attractive means of expanding mobile network capacity. A heterogeneous network is typically composed of multiple radio access technologies (RATs) where the base stations are transmitting with variable power. In this paper, we consider a Heterogeneous network where we complement the macrocell network with low-power low-cost user deployed nodes, such as femtocell base stations to increase the mean achievable capacity of the system. In this context, we integrate macro-femto cellular networks and derive the area spectral efficiency of the proposed two tier Heterogeneous network. We consider the deployment of femtocell base stations around the edge of the macrocell such that this configuration is referred to as femto-on-edge (FOE) configuration. Moreover, FOE configuration mandates reduction in intercell interference due to the mobile users which are located around the edge of the macrocell since these femtocell base stations are low-power nodes which has significantly lower transmission power than macrocell base stations. We present a mathematical analysis to calculate the instantaneous carrier to interference ratio (CIR) of the desired mobile user in macro and femto cellular networks and determine the total area spectral efficiency of the Heterogeneous network. Details of the simulation processes are included to support the analysis and show the efficacy of the proposed deployment. It has been shown that the proposed setup of the Heterogeneous network offers higher area spectral efficiency which aims to fulfill the expected demand of the future mobile users. © 2012 IEEE.

  11. Surveillance of a 2D Plane Area with 3D Deployed Cameras

    Directory of Open Access Journals (Sweden)

    Yi-Ge Fu

    2014-01-01

    Full Text Available As the use of camera networks has expanded, camera placement to satisfy some quality assurance parameters (such as a good coverage ratio, an acceptable resolution constraints, an acceptable cost as low as possible, etc. has become an important problem. The discrete camera deployment problem is NP-hard and many heuristic methods have been proposed to solve it, most of which make very simple assumptions. In this paper, we propose a probability inspired binary Particle Swarm Optimization (PI-BPSO algorithm to solve a homogeneous camera network placement problem. We model the problem under some more realistic assumptions: (1 deploy the cameras in the 3D space while the surveillance area is restricted to a 2D ground plane; (2 deploy the minimal number of cameras to get a maximum visual coverage under more constraints, such as field of view (FOV of the cameras and the minimum resolution constraints. We can simultaneously optimize the number and the configuration of the cameras through the introduction of a regulation item in the cost function. The simulation results showed the effectiveness of the proposed PI-BPSO algorithm.

  12. Concept of Deployable Network Operations Center (DNOC)

    National Research Council Canada - National Science Library

    Bordetsky, Alex; Thiry, Jeff; Johnson, Shawn

    2005-01-01

    .... The increasing use of expeditionary and special operations forces in ad hoc, dynamic, and tactical environments poses a need for an adaptable, flexible, and responsive deployable network operations center (DNOC...

  13. Method of Geometric Connected Disk Cover Problem for UAV realy network deployment

    Directory of Open Access Journals (Sweden)

    Chuang Liu

    2017-01-01

    Full Text Available Aiming at the problem of the effective connectivity of a large number of mobile combat units in the future aeronautic swarm operation, this paper proposes an idea of using UAV(Unmanned Aerial Vehicle to build, and studies the deployment of the network. User coverage and network connectivity are important for a relay network planning which are studied separately in traditional ways. In order to effectively combine these two factors while the network’s survivability is taken into account. Firstly, the concept of node aggregation degree is proposed. Secondly, a performance evaluation parameter for UAV relay network is proposed based on node aggregation degree, then analyzes the lack of deterministic deployment and presents one a PSO (VFA-PSO deployment algorithm based on virtual force. Finally, compared with the existing algorithms, the validity and stability of the algorithm are verified. The experimental results show that the VFA-PSO algorithm can effectively improve the network coverage and the survivability of the network under the premise of ensuring the network connectivity, and has better deployment effect.

  14. Handoff Between a Wireless Local Area Network (WLAN and a Wide Area Network (UMTS

    Directory of Open Access Journals (Sweden)

    J. Sánchez–García

    2009-04-01

    Full Text Available With the appearance of wireless data networks with variable coverage, band width and handoff strategies, in addition to the growing need of mobile nodes to freely roam among these networks, the support of an interoperable handoff strategy for hybrid wireless data networks is a requirement that needs to be addressed. The current trend in wireless data networks is to offer multimedia access to mobile users by employing the wireless local area network (WLAN standard IEEE802.11 while the user is located indoors; on the other hand, 3rd generation wireless networks (WAN are being deployed to provide coverage while the user is located outdoors. As a result, the mobile node will require a handoff mechanism to allow the user to roam between WLAN and WAN environments; up to this date several strategies have been proposed (Sattari et al., 2004 and HyoJin, 2007 in the literature, however, none of these have been standardized to date. To support this interoperability, the mobile node must be equipped with configurable wireless inetrfaces to support the handoff between the WLAN and the WAN networks. In this work a new algorithm is proposed to allow a mobile node to roam between a wireless local area network (IEEE802.11 and a WAN base station (UMTS, while employing IP mobility support. The algorithm is implemented in simulation, using the Network Simulator 2.

  15. Design, deployment and performance of 4G-LTE networks a practical approach

    CERN Document Server

    ElNashar, Ayman; Sherif, Mahmoud

    2014-01-01

    This book provides an insight into the key practical aspects and best practice of 4G-LTE network design, performance, and deployment Design, Deployment and Performance of 4G-LTE Networks addresses the key practical aspects and best practice of 4G networks design, performance, and deployment. In addition, the book focuses on the end-to-end aspects of the LTE network architecture and different deployment scenarios of commercial LTE networks. It describes the air interface of LTE focusing on the access stratum protocol layers: PDCP, RLC, MAC, and Physical Layer. The air interface described in this book covers the concepts of LTE frame structure, downlink and uplink scheduling, and detailed illustrations of the data flow across the protocol layers. It describes the details of the optimization process including performance measurements and troubleshooting mechanisms in addition to demonstrating common issues and case studies based on actual field results. The book provides detailed performance analysis of key fe...

  16. A Social Potential Fields Approach for Self-Deployment and Self-Healing in Hierarchical Mobile Wireless Sensor Networks.

    Science.gov (United States)

    González-Parada, Eva; Cano-García, Jose; Aguilera, Francisco; Sandoval, Francisco; Urdiales, Cristina

    2017-01-09

    Autonomous mobile nodes in mobile wireless sensor networks (MWSN) allow self-deployment and self-healing. In both cases, the goals are: (i) to achieve adequate coverage; and (ii) to extend network life. In dynamic environments, nodes may use reactive algorithms so that each node locally decides when and where to move. This paper presents a behavior-based deployment and self-healing algorithm based on the social potential fields algorithm. In the proposed algorithm, nodes are attached to low cost robots to autonomously navigate in the coverage area. The proposed algorithm has been tested in environments with and without obstacles. Our study also analyzes the differences between non-hierarchical and hierarchical routing configurations in terms of network life and coverage.

  17. On the Probabilistic Deployment of Smart Grid Networks in TV White Space.

    Science.gov (United States)

    Cacciapuoti, Angela Sara; Caleffi, Marcello; Paura, Luigi

    2016-05-10

    To accommodate the rapidly increasing demand for wireless broadband communications in Smart Grid (SG) networks, research efforts are currently ongoing to enable the SG networks to utilize the TV spectrum according to the Cognitive Radio paradigm. To this aim, in this letter, we develop an analytical framework for the optimal deployment of multiple closely-located SG Neighborhood Area Networks (NANs) concurrently using the same TV spectrum. The objective is to derive the optimal values for both the number of NANs and their coverage. More specifically, regarding the number of NANs, we derive the optimal closed-form expression, i.e., the closed-form expression that assures the deployment of the maximum number of NANs in the considered region satisfying a given collision constraint on the transmissions of the NANs. Regarding the NAN coverage, we derive the optimal closed-form expression, i.e., the closed-form expression of the NAN transmission range that assures the maximum coverage of each NAN in the considered region satisfying the given collision constraint. All the theoretical results are derived by adopting a stochastic approach. Finally, numerical results validate the theoretical analysis.

  18. Enhanced Deployment Strategy for Role-based Hierarchical Application Agents in Wireless Sensor Networks with Established Clusterheads

    Science.gov (United States)

    Gendreau, Audrey

    Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research, a model used to deploy intrusion detection capability on a Local Area Network (LAN), in the literature, was extended to develop a role-based hierarchical agent deployment algorithm for a WSN. The resulting model took into consideration the monitoring capability, risk, deployment distribution cost, and monitoring cost associated with each node. Changing the original LAN methodology approach to model a cluster-based sensor network depended on the ability to duplicate a specific parameter that represented the monitoring capability. Furthermore, other parameters derived from a LAN can elevate costs and risk of deployment, as well as jeopardize the success of an application on a WSN. A key component of the approach presented in this research was to reduce the costs when established clusterheads in the network were found to be capable of hosting additional detection agents. In addition, another cost savings component of the study addressed the reduction of vulnerabilities associated with deployment of agents to high volume nodes. The effectiveness of the presented method was validated by comparing it against a type of a power-based scheme that used each node's remaining energy as the deployment value. While available energy is directly related to the model used in the presented method, the study deliberately sought out nodes that were identified with having superior monitoring capability, cost less to create and sustain, and are at low-risk of an attack. This work investigated improving the efficiency of an intrusion detection system (IDS) by using the proposed model to deploy monitoring agents after a temperature sensing

  19. A Social Potential Fields Approach for Self-Deployment and Self-Healing in Hierarchical Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eva González-Parada

    2017-01-01

    Full Text Available Autonomous mobile nodes in mobile wireless sensor networks (MWSN allow self-deployment and self-healing. In both cases, the goals are: (i to achieve adequate coverage; and (ii to extend network life. In dynamic environments, nodes may use reactive algorithms so that each node locally decides when and where to move. This paper presents a behavior-based deployment and self-healing algorithm based on the social potential fields algorithm. In the proposed algorithm, nodes are attached to low cost robots to autonomously navigate in the coverage area. The proposed algorithm has been tested in environments with and without obstacles. Our study also analyzes the differences between non-hierarchical and hierarchical routing configurations in terms of network life and coverage.

  20. SISMIKO: emergency network deployment and data sharing for the 2016 central Italy seismic sequence

    Directory of Open Access Journals (Sweden)

    Milena Moretti

    2016-12-01

    Full Text Available At 01:36 UTC (03:36 local time on August 24th 2016, an earthquake Mw 6.0 struck an extensive sector of the central Apennines (coordinates: latitude 42.70° N, longitude 13.23° E, 8.0 km depth. The earthquake caused about 300 casualties and severe damage to the historical buildings and economic activity in an area located near the borders of the Umbria, Lazio, Abruzzo and Marche regions. The Istituto Nazionale di Geofisica e Vulcanologia (INGV located in few minutes the hypocenter near Accumoli, a small town in the province of Rieti. In the hours after the quake, dozens of events were recorded by the National Seismic Network (Rete Sismica Nazionale, RSN of the INGV, many of which had a ML > 3.0. The density and coverage of the RSN in the epicentral area meant the epicenter and magnitude of the main event and subsequent shocks that followed it in the early hours of the seismic sequence were well constrained. However, in order to better constrain the localizations of the aftershock hypocenters, especially the depths, a denser seismic monitoring network was needed. Just after the mainshock, SISMIKO, the coordinating body of the emergency seismic network at INGV, was activated in order to install a temporary seismic network integrated with the existing permanent network in the epicentral area. From August the 24th to the 30th, SISMIKO deployed eighteen seismic stations, generally six components (equipped with both velocimeter and accelerometer, with thirteen of the seismic station transmitting in real-time to the INGV seismic monitoring room in Rome. The design and geometry of the temporary network was decided in consolation with other groups who were deploying seismic stations in the region, namely EMERSITO (a group studying site-effects, and the emergency Italian strong motion network (RAN managed by the National Civil Protection Department (DPC. Further 25 BB temporary seismic stations were deployed by colleagues of the British Geological Survey

  1. Self-deployable mobile sensor networks for on-demand surveillance

    Science.gov (United States)

    Miao, Lidan; Qi, Hairong; Wang, Feiyi

    2005-05-01

    This paper studies two interconnected problems in mobile sensor network deployment, the optimal placement of heterogeneous mobile sensor platforms for cost-efficient and reliable coverage purposes, and the self-organizable deployment. We first develop an optimal placement algorithm based on a "mosaicked technology" such that different types of mobile sensors form a mosaicked pattern uniquely determined by the popularity of different types of sensor nodes. The initial state is assumed to be random. In order to converge to the optimal state, we investigate the swarm intelligence (SI)-based sensor movement strategy, through which the randomly deployed sensors can self-organize themselves to reach the optimal placement state. The proposed algorithm is compared with the random movement and the centralized method using performance metrics such as network coverage, convergence time, and energy consumption. Simulation results are presented to demonstrate the effectiveness of the mosaic placement and the SI-based movement.

  2. Extending the lifetime of wireless sensor network with partial SDN deployment

    Directory of Open Access Journals (Sweden)

    S. Tomovic

    2016-06-01

    Full Text Available Energy efficiency is one of the key requirements in Wireless Sensor Networks (WSNs. In order to optimize energy usage at sensor nodes, this paper proposes a new network architecture that relies on concepts of Software Defined Networking (SDN. Since SDN is a relatively new technology, originally envisioned for wired networks, it cannot be expected to get immediately and completely adopted in WSN domain, regardless of potential benefits. For this reason, we consider incremental SDN deployment where SDN nodes coexist with traditional sensor nodes, and propose a new routing algorithm for SDN controller that prolongs the WSN lifetime even when a small percentage of SDN nodes is deployed.

  3. Fast Deploy Radiation Monitoring Array Emergency Solution Based on GPS and Cellular Network

    International Nuclear Information System (INIS)

    Vax, E.; Broide, A.; Manor, A.; Marcus, E.; Seif, R.; Nir, J.; Kadmon, Y.; Sattinger, D.; Levinson, S.; Tal, N.

    2004-01-01

    Radiation monitoring of a possible contaminating source is highly important for safety and risk analysis. Since the monitoring must cover the whole contaminated area, the standard solution is to scatter an array of numerous fixed detectors in advance. The Fast Deploy Radiation Monitoring Array (FDRMA) is a solution that does not require coverage of the entire area. The FDRMA is a compact, world wide applicative, seamless and novel solution, designed for emergency cases. The system consists of GPS and IP cellular network, which make it mobile and therefore suitable for global use. The most significant advantage of the FDRMA system is minimizing the exposure time of the monitoring teams, while maintaining flexibility of the deployment area, as opposed to the Vehicle Monitoring System (VMS) [1] or the standard solution mentioned above. A detailed description of the proposed FDRMA system and its comparison to a fixed detectors' array is presented in this work

  4. Ethernet access network based on free-space optic deployment technology

    Science.gov (United States)

    Gebhart, Michael; Leitgeb, Erich; Birnbacher, Ulla; Schrotter, Peter

    2004-06-01

    The satisfaction of all communication needs from single households and business companies over a single access infrastructure is probably the most challenging topic in communications technology today. But even though the so-called "Last Mile Access Bottleneck" is well known since more than ten years and many distribution technologies have been tried out, the optimal solution has not yet been found and paying commercial access networks offering all service classes are still rare today. Conventional services like telephone, radio and TV, as well as new and emerging services like email, web browsing, online-gaming, video conferences, business data transfer or external data storage can all be transmitted over the well known and cost effective Ethernet networking protocol standard. Key requirements for the deployment technology driven by the different services are high data rates to the single customer, security, moderate deployment costs and good scalability to number and density of users, quick and flexible deployment without legal impediments and high availability, referring to the properties of optical and wireless communication. We demonstrate all elements of an Ethernet Access Network based on Free Space Optic distribution technology. Main physical parts are Central Office, Distribution Network and Customer Equipment. Transmission of different services, as well as configuration, service upgrades and remote control of the network are handled by networking features over one FSO connection. All parts of the network are proven, the latest commercially available technology. The set up is flexible and can be adapted to any more specific need if required.

  5. Deployment-based lifetime optimization model for homogeneous Wireless Sensor Network under retransmission.

    Science.gov (United States)

    Li, Ruiying; Liu, Xiaoxi; Xie, Wei; Huang, Ning

    2014-12-10

    Sensor-deployment-based lifetime optimization is one of the most effective methods used to prolong the lifetime of Wireless Sensor Network (WSN) by reducing the distance-sensitive energy consumption. In this paper, data retransmission, a major consumption factor that is usually neglected in the previous work, is considered. For a homogeneous WSN, monitoring a circular target area with a centered base station, a sensor deployment model based on regular hexagonal grids is analyzed. To maximize the WSN lifetime, optimization models for both uniform and non-uniform deployment schemes are proposed by constraining on coverage, connectivity and success transmission rate. Based on the data transmission analysis in a data gathering cycle, the WSN lifetime in the model can be obtained through quantifying the energy consumption at each sensor location. The results of case studies show that it is meaningful to consider data retransmission in the lifetime optimization. In particular, our investigations indicate that, with the same lifetime requirement, the number of sensors needed in a non-uniform topology is much less than that in a uniform one. Finally, compared with a random scheme, simulation results further verify the advantage of our deployment model.

  6. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-09-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  7. Autonomous Deployment and Restoration of Sensor Network using Mobile Robots

    Directory of Open Access Journals (Sweden)

    Tsuyoshi Suzuki

    2010-06-01

    Full Text Available This paper describes an autonomous deployment and restoration of a Wireless Sensor Network (WSN using mobile robots. The authors have been developing an information-gathering system using mobile robots and WSNs in underground spaces in post-disaster environments. In our system, mobile robots carry wireless sensor nodes (SN and deploy them into the environment while measuring Received Signal Strength Indication (RSSI values to ensure communication, thereby enabling the WSN to be deployed and restored autonomously. If the WSN is disrupted, mobile robots restore the communication route by deploying additional or alternate SNs to suitable positions. Utilizing the proposed method, a mobile robot can deploy a WSN and gather environmental information via the WSN. Experimental results using a verification system equipped with a SN deployment and retrieval mechanism are presented.

  8. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  9. Problems in the Deployment of Learning Networks In Small Organizations

    NARCIS (Netherlands)

    Shankle, Dean E.; Shankle, Jeremy P.

    2006-01-01

    Please, cite this publication as: Shankle, D.E., & Shankle, J.P. (2006). Problems in the Deployment of Learning Networks In Small Organizations. Proceedings of International Workshop in Learning Networks for Lifelong Competence Development, TENCompetence Conference. March 30th-31st, Sofia, Bulgaria:

  10. Level-2 Milestone 6007: Sierra Early Delivery System Deployed to Secret Restricted Network

    Energy Technology Data Exchange (ETDEWEB)

    Bertsch, A. D. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-09-06

    This report documents the delivery and installation of Shark, a CORAL Sierra early delivery system deployed on the LLNL SRD network. Early ASC program users have run codes on the machine in support of application porting for the final Sierra system which will be deployed at LLNL in CY2018. In addition to the SRD resource, Shark, unclassified resources, Rzmanta and Ray, have been deployed on the LLNL Restricted Zone and Collaboration Zone networks in support of application readiness for the Sierra platform.

  11. An efficient genetic algorithm for maximum coverage deployment in wireless sensor networks.

    Science.gov (United States)

    Yoon, Yourim; Kim, Yong-Hyuk

    2013-10-01

    Sensor networks have a lot of applications such as battlefield surveillance, environmental monitoring, and industrial diagnostics. Coverage is one of the most important performance metrics for sensor networks since it reflects how well a sensor field is monitored. In this paper, we introduce the maximum coverage deployment problem in wireless sensor networks and analyze the properties of the problem and its solution space. Random deployment is the simplest way to deploy sensor nodes but may cause unbalanced deployment and therefore, we need a more intelligent way for sensor deployment. We found that the phenotype space of the problem is a quotient space of the genotype space in a mathematical view. Based on this property, we propose an efficient genetic algorithm using a novel normalization method. A Monte Carlo method is adopted to design an efficient evaluation function, and its computation time is decreased without loss of solution quality using a method that starts from a small number of random samples and gradually increases the number for subsequent generations. The proposed genetic algorithms could be further improved by combining with a well-designed local search. The performance of the proposed genetic algorithm is shown by a comparative experimental study. When compared with random deployment and existing methods, our genetic algorithm was not only about twice faster, but also showed significant performance improvement in quality.

  12. DEPLOYMENT OF VOIP ON WIRELINE NETWORK USING OPNET

    African Journals Online (AJOL)

    EKPAH

    study of VoIP traffic and other major devices. These results will ... pre-deployment analysis, planning and lack of ... given network under VoIP and data load traffic. OPNET contains a vast amount of models of .... There are a number of tools.

  13. Deployment of Wireless Sensor Networks in Crop Storages

    DEFF Research Database (Denmark)

    Juul, Jakob Pilegaard; Green, Ole; Jacobsen, Rune Hylsberg

    2015-01-01

    of a wireless sensor network based system that provides continuous, automatic, and up-to-date information on a crop storage, while presenting the data in an easily accessible manner, is also described. The design decisions, challenges, and practical experiences from real-world large scale deployment...

  14. Field and long-term demonstration of a wide area quantum key distribution network.

    Science.gov (United States)

    Wang, Shuang; Chen, Wei; Yin, Zhen-Qiang; Li, Hong-Wei; He, De-Yong; Li, Yu-Hu; Zhou, Zheng; Song, Xiao-Tian; Li, Fang-Yi; Wang, Dong; Chen, Hua; Han, Yun-Guang; Huang, Jing-Zheng; Guo, Jun-Fu; Hao, Peng-Lei; Li, Mo; Zhang, Chun-Mei; Liu, Dong; Liang, Wen-Ye; Miao, Chun-Hua; Wu, Ping; Guo, Guang-Can; Han, Zheng-Fu

    2014-09-08

    A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.

  15. A High-Efficiency Uneven Cluster Deployment Algorithm Based on Network Layered for Event Coverage in UWSNs

    Directory of Open Access Journals (Sweden)

    Shanen Yu

    2016-12-01

    Full Text Available Most existing deployment algorithms for event coverage in underwater wireless sensor networks (UWSNs usually do not consider that network communication has non-uniform characteristics on three-dimensional underwater environments. Such deployment algorithms ignore that the nodes are distributed at different depths and have different probabilities for data acquisition, thereby leading to imbalances in the overall network energy consumption, decreasing the network performance, and resulting in poor and unreliable late network operation. Therefore, in this study, we proposed an uneven cluster deployment algorithm based network layered for event coverage. First, according to the energy consumption requirement of the communication load at different depths of the underwater network, we obtained the expected value of deployment nodes and the distribution density of each layer network after theoretical analysis and deduction. Afterward, the network is divided into multilayers based on uneven clusters, and the heterogeneous communication radius of nodes can improve the network connectivity rate. The recovery strategy is used to balance the energy consumption of nodes in the cluster and can efficiently reconstruct the network topology, which ensures that the network has a high network coverage and connectivity rate in a long period of data acquisition. Simulation results show that the proposed algorithm improves network reliability and prolongs network lifetime by significantly reducing the blind movement of overall network nodes while maintaining a high network coverage and connectivity rate.

  16. Analysis of Wireless Sensor Network Topology and Estimation of Optimal Network Deployment by Deterministic Radio Channel Characterization

    Directory of Open Access Journals (Sweden)

    Erik Aguirre

    2015-02-01

    Full Text Available One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs, mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  17. Analysis of wireless sensor network topology and estimation of optimal network deployment by deterministic radio channel characterization.

    Science.gov (United States)

    Aguirre, Erik; Lopez-Iturri, Peio; Azpilicueta, Leire; Astrain, José Javier; Villadangos, Jesús; Falcone, Francisco

    2015-02-05

    One of the main challenges in the implementation and design of context-aware scenarios is the adequate deployment strategy for Wireless Sensor Networks (WSNs), mainly due to the strong dependence of the radiofrequency physical layer with the surrounding media, which can lead to non-optimal network designs. In this work, radioplanning analysis for WSN deployment is proposed by employing a deterministic 3D ray launching technique in order to provide insight into complex wireless channel behavior in context-aware indoor scenarios. The proposed radioplanning procedure is validated with a testbed implemented with a Mobile Ad Hoc Network WSN following a chain configuration, enabling the analysis and assessment of a rich variety of parameters, such as received signal level, signal quality and estimation of power consumption. The adoption of deterministic radio channel techniques allows the design and further deployment of WSNs in heterogeneous wireless scenarios with optimized behavior in terms of coverage, capacity, quality of service and energy consumption.

  18. Utility communication networks and services specification, deployment and operation

    CERN Document Server

    2017-01-01

    This CIGRE green book begins by addressing the specification and provision of communication services in the context of operational applications for electrical power utilities, before subsequently providing guidelines on the deployment or transformation of networks to deliver these specific communication services. Lastly, it demonstrates how these networks and their services can be monitored, operated, and maintained to ensure that the requisite high level of service quality is consistently achieved.

  19. Decentralized Sensor Fusion for Ubiquitous Networking Robotics in Urban Areas

    Science.gov (United States)

    Sanfeliu, Alberto; Andrade-Cetto, Juan; Barbosa, Marco; Bowden, Richard; Capitán, Jesús; Corominas, Andreu; Gilbert, Andrew; Illingworth, John; Merino, Luis; Mirats, Josep M.; Moreno, Plínio; Ollero, Aníbal; Sequeira, João; Spaan, Matthijs T.J.

    2010-01-01

    In this article we explain the architecture for the environment and sensors that has been built for the European project URUS (Ubiquitous Networking Robotics in Urban Sites), a project whose objective is to develop an adaptable network robot architecture for cooperation between network robots and human beings and/or the environment in urban areas. The project goal is to deploy a team of robots in an urban area to give a set of services to a user community. This paper addresses the sensor architecture devised for URUS and the type of robots and sensors used, including environment sensors and sensors onboard the robots. Furthermore, we also explain how sensor fusion takes place to achieve urban outdoor execution of robotic services. Finally some results of the project related to the sensor network are highlighted. PMID:22294927

  20. Deployment of SIP in MANET: challenges and circumvention

    Directory of Open Access Journals (Sweden)

    Abdelhamid Salma R.

    2017-01-01

    Full Text Available The immense growth in wireless network applications has encouraged the researchers to enhance and propose new approaches that facilitate the deployment of the widely used services, protocols, and applications of the wired networking area in the wireless networks. Among which, the Session Initiation Protocol (SIP is a signaling protocol that allows the establishment of multimedia sessions and calls between different parties. SIP functionality totally depends on a centralized infrastructure, and complexity arises when deploying such a protocol in a special type of wireless networks, namely Mobile Ad-hoc Networks (MANET, due to the absence of a centralized infrastructure, and the dynamic topology of the later. This paper highlights the the challenges arising when deploying SIP in MANETs and presents an overview of different proposed approaches to overcome these challenges.

  1. Wireless body area networks technology, implementation, and applications

    CERN Document Server

    Yuce, Mehmet R

    2011-01-01

    The book provides a comprehensive overview for the latest WBAN systems, technologies, and applications. The chapters of the book have been written by various specialists who are experts in their areas of research and practice. The book starts with the basic techniques involved in designing and building WBAN systems. It explains the deployment issues and then moves into the application areas of WBAN. The remaining chapters focus on the development of hardware, signal processing algorithms, and wireless communication and network design for wearable and implantable body sensors used in WBAN appli

  2. A Power Balance Aware Wireless Charger Deployment Method for Complete Coverage in Wireless Rechargeable Sensor Networks

    Directory of Open Access Journals (Sweden)

    Tu-Liang Lin

    2016-08-01

    Full Text Available Traditional sensor nodes are usually battery powered, and the limited battery power constrains the overall lifespan of the sensors. Recently, wireless power transmission technology has been applied in wireless sensor networks (WSNs to transmit wireless power from the chargers to the sensor nodes and solve the limited battery power problem. The combination of wireless sensors and wireless chargers forms a new type of network called wireless rechargeable sensor networks (WRSNs. In this research, we focus on how to effectively deploy chargers to maximize the lifespan of a network. In WSNs, the sensor nodes near the sink consume more power than nodes far away from the sink because of frequent data forwarding. This important power unbalanced factor has not been considered, however, in previous charger deployment research. In this research, a power balance aware deployment (PBAD method is proposed to address the power unbalance in WRSNs and to design the charger deployment with maximum charging efficiency. The proposed deployment method is effectively aware of the existence of the sink node that would cause unbalanced power consumption in WRSNs. The simulation results show that the proposed PBAD algorithm performs better than other deployment methods, and fewer chargers are deployed as a result.

  3. Realtime Delivery of Alarms and Key Observables in a Deployed Hydrological Sensor Network

    Science.gov (United States)

    Marshall, I. W.; Price, M. C.; Li, H.; Boyd, N.; Boult, S.

    2007-12-01

    It has widely [1-3] been proposed that sensor networks are a good solution for environmental monitoring. However, this application presents a number of major challenges for current technology. In particular environmental science involves the study of coupled non-equilibrium dynamic processes that generate time series with non-stationary means and strongly dependent variables and which operate in the presence of large amounts of noise/interference (thermal, chemical and biological) and multiple quasi-periodic forcing factors (diurnal cycles, tides, etc). This typically means that any analysis must be based on large data samples obtained at multiple scales of space and time. In addition the areas of interest are large, relatively inaccessible and typically extremely hostile to electronic instrumentation. Our analysis of these factors has encouraged us to focus on this list of generic requirements; a) Node lifetime (between visits) should be 1 yr or greater b) Communication range should be ~250m c) Nodes should be portable, unobtrusive, low cost, etc. d) Networks are expected to be sparse since areas of interest are large and budgets are small However, the characteristics of each environment, the dominant processes operating in it and the measurements that are of interest are sufficiently different that the design of an appropriate sensor network solution is normally most determined by site specific constraints. Most importantly the opportunities for exploiting contextual correlation to disambiguate observations and improve the maintenance and robustness of a deployed sensor network are always site specific. We will describe the design and initial deployment of a hydrological sensor network we are developing to assess the hydro-dynamics of surface water drainage into Great Crowden Brook in the Peak District (UK). The complete network will observe soil moisture, temperature and rainfall on a number of transects across the valley, and will also investigate water quality

  4. On the hop count statistics for randomly deployed wireless sensor networks

    NARCIS (Netherlands)

    Dulman, S.O.; Rossi, M.; Havinga, Paul J.M.; Zorzi, M.

    2006-01-01

    In this paper we focus on exploiting the information provided by a generally accepted and largely ignored hypothesis (the random deployment of the nodes of an ad hoc or wireless sensor network) to design improved networking protocols. Specifically, we derive the relationship between the number of

  5. Fleet deployment, network design and hub location of liner shipping companies

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Pisinger, David

    2011-01-01

    A mixed integer linear programming formulation is proposed for the simultaneous design of network and fleet deployment of a deep-sea liner service provider. The underlying network design problem is based on a 4-index (5-index by considering capacity type) formulation of the hub location problem...

  6. Decentralized Sensor Fusion for Ubiquitous Networking Robotics in Urban Areas

    Directory of Open Access Journals (Sweden)

    Aníbal Ollero

    2010-03-01

    Full Text Available In this article we explain the architecture for the environment and sensors that has been built for the European project URUS (Ubiquitous Networking Robotics in Urban Sites, a project whose objective is to develop an adaptable network robot architecture for cooperation between network robots and human beings and/or the environment in urban areas. The project goal is to deploy a team of robots in an urban area to give a set of services to a user community. This paper addresses the sensor architecture devised for URUS and the type of robots and sensors used, including environment sensors and sensors onboard the robots. Furthermore, we also explain how sensor fusion takes place to achieve urban outdoor execution of robotic services. Finally some results of the project related to the sensor network are highlighted.

  7. Deployment of check-in nodes in complex networks

    Science.gov (United States)

    Jiang, Zhong-Yuan; Ma, Jian-Feng

    2017-01-01

    In many real complex networks such as the city road networks and highway networks, vehicles often have to pass through some specially functioned nodes to receive check-in like services such as gas supplement at gas stations. Based on existing network structures, to guarantee every shortest path including at least a check-in node, the location selection of all check-in nodes is very essential and important to make vehicles to easily visit these check-in nodes, and it is still remains an open problem in complex network studies. In this work, we aim to find possible solutions for this problem. We first convert it into a set cover problem which is NP-complete and propose to employ the greedy algorithm to achieve an approximate result. Inspired by heuristic information of network structure, we discuss other four check-in node location deployment methods including high betweenness first (HBF), high degree first (HDF), random and low degree first (LDF). Finally, we compose extensive simulations in classical scale-free networks, random networks and real network models, and the results can well confirm the effectiveness of the greedy algorithm. This work has potential applications into many real networks.

  8. Study on the three-station typical network deployments of workspace Measurement and Positioning System

    Science.gov (United States)

    Xiong, Zhi; Zhu, J. G.; Xue, B.; Ye, Sh. H.; Xiong, Y.

    2013-10-01

    As a novel network coordinate measurement system based on multi-directional positioning, workspace Measurement and Positioning System (wMPS) has outstanding advantages of good parallelism, wide measurement range and high measurement accuracy, which makes it to be the research hotspots and important development direction in the field of large-scale measurement. Since station deployment has a significant impact on the measurement range and accuracy, and also restricts the use-cost, the optimization method of station deployment was researched in this paper. Firstly, positioning error model was established. Then focusing on the small network consisted of three stations, the typical deployments and error distribution characteristics were studied. Finally, through measuring the simulated fuselage using typical deployments at the industrial spot and comparing the results with Laser Tracker, some conclusions are obtained. The comparison results show that under existing prototype conditions, I_3 typical deployment of which three stations are distributed in a straight line has an average error of 0.30 mm and the maximum error is 0.50 mm in the range of 12 m. Meanwhile, C_3 typical deployment of which three stations are uniformly distributed in the half-circumference of an circle has an average error of 0.17 mm and the maximum error is 0.28 mm. Obviously, C_3 typical deployment has a higher control effect on precision than I_3 type. The research work provides effective theoretical support for global measurement network optimization in the future work.

  9. Cloud-Centric and Logically Isolated Virtual Network Environment Based on Software-Defined Wide Area Network

    Directory of Open Access Journals (Sweden)

    Dongkyun Kim

    2017-12-01

    Full Text Available Recent development of distributed cloud environments requires advanced network infrastructure in order to facilitate network automation, virtualization, high performance data transfer, and secured access of end-to-end resources across regional boundaries. In order to meet these innovative cloud networking requirements, software-defined wide area network (SD-WAN is primarily demanded to converge distributed cloud resources (e.g., virtual machines (VMs in a programmable and intelligent manner over distant networks. Therefore, this paper proposes a logically isolated networking scheme designed to integrate distributed cloud resources to dynamic and on-demand virtual networking over SD-WAN. The performance evaluation and experimental results of the proposed scheme indicate that virtual network convergence time is minimized in two different network models such as: (1 an operating OpenFlow-oriented SD-WAN infrastructure (KREONET-S which is deployed on the advanced national research network in Korea, and (2 Mininet-based experimental and emulated networks.

  10. A Depth-Adjustment Deployment Algorithm Based on Two-Dimensional Convex Hull and Spanning Tree for Underwater Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng Jiang

    2016-07-01

    Full Text Available Most of the existing node depth-adjustment deployment algorithms for underwater wireless sensor networks (UWSNs just consider how to optimize network coverage and connectivity rate. However, these literatures don’t discuss full network connectivity, while optimization of network energy efficiency and network reliability are vital topics for UWSN deployment. Therefore, in this study, a depth-adjustment deployment algorithm based on two-dimensional (2D convex hull and spanning tree (NDACS for UWSNs is proposed. First, the proposed algorithm uses the geometric characteristics of a 2D convex hull and empty circle to find the optimal location of a sleep node and activate it, minimizes the network coverage overlaps of the 2D plane, and then increases the coverage rate until the first layer coverage threshold is reached. Second, the sink node acts as a root node of all active nodes on the 2D convex hull and then forms a small spanning tree gradually. Finally, the depth-adjustment strategy based on time marker is used to achieve the three-dimensional overall network deployment. Compared with existing depth-adjustment deployment algorithms, the simulation results show that the NDACS algorithm can maintain full network connectivity with high network coverage rate, as well as improved network average node degree, thus increasing network reliability.

  11. Optimizing Cloud-RAN Deployments in Real-life Scenarios Using Microwave Radio

    DEFF Research Database (Denmark)

    Al-obaidi, Rami; Checko, Aleksandra; Holm, Henrik

    2015-01-01

    Cloud Radio Access Network (C-RAN) is a new architecture designed to be the candidate for enabling future mobile networks. However, it will be deployed only if it is economically viable. In this paper we investigate the technological options of C-RAN deployments. By using analytical methods we...... derive engineering guidelines for minimizing the CAPital EXpenditure (CAPEX) of C-RAN deployment. We show for which population density and span of BBU Pool coverage usage of Microwave Radio (MWR) links is viable. For larger scale deployment we recommend to divide the area into multiple BBU Pools....

  12. Deploying IPv6 in 3GPP networks evolving mobile broadband from 2G to LTE and beyond

    CERN Document Server

    Korhonen, Jouni; Soininen, Jonne

    2013-01-01

    Deploying IPv6 in 3GPP Networks - Evolving Mobile Broadband from 2G to LTE and Beyond  A practical guide enabling mobile operators to deploy IPv6 with confidence The most widely used cellular mobile broadband network technology is based on the 3GPP standards. The history and background of the 3GPP technology is in the Global Mobile Service (GSM) technology and the work done in European Telecommunications Standards Institute (ETSI). This primary voice service network has evolved to be the dominant mobile Internet access technology. Deploying IPv6 in

  13. Electricity network limitations on large-scale deployment of wind energy

    Energy Technology Data Exchange (ETDEWEB)

    Fairbairn, R.J.

    1999-07-01

    This report sought to identify limitation on large scale deployment of wind energy in the UK. A description of the existing electricity supply system in England, Scotland and Wales is given, and operational aspects of the integrated electricity networks, licence conditions, types of wind turbine generators, and the scope for deployment of wind energy in the UK are addressed. A review of technical limitations and technical criteria stipulated by the Distribution and Grid Codes, the effects of system losses, and commercial issues are examined. Potential solutions to technical limitations are proposed, and recommendations are outlined.

  14. Improving Roadside Unit Deployment in Vehicular Networks by Exploiting Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Manuel Fogue

    2018-01-01

    Full Text Available Vehicular networks make use of the Roadside Units (RSUs to enhance the communication capabilities of the vehicles in order to forward control messages and/or to provide Internet access to vehicles, drivers and passengers. Unfortunately, within vehicular networks, the wireless signal propagation is mostly affected by buildings and other obstacles (e.g., urban fixtures, in particular when considering the IEEE 802.11p standard. Therefore, a crowded RSU deployment may be required to ensure vehicular communications within urban environments. Furthermore, some applications, notably those applications related to safety, require a fast and reliable warning data transmission to the emergency services and traffic authorities. However, communication is not always possible in vehicular environments due to the lack of connectivity even employing multiple hops. To overcome the signal propagation problem and delayed warning notification time issues, an effective, smart, cost-effective and all-purpose RSU deployment policy should be put into place. In this paper, we propose the genetic algorithm for roadside unit deployment (GARSUD system, which uses a genetic algorithm that is capable of automatically providing an RSU deployment suitable for any given road map layout. Our simulation results show that GARSUD is able to reduce the warning notification time (the time required to inform emergency authorities in traffic danger situations and to improve vehicular communication capabilities within different density scenarios and complexity layouts.

  15. Discursive Deployments: Mobilizing Support for Municipal and Community Wireless Networks in the U.S.

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio; Rodriguez, Juana Maria

    2008-08-16

    This paper examines Municipal Wireless (MW) deployments in the United States. In particular, the interest is in understanding how discourse has worked to mobilize widespread support for MW networks. We explore how local governments discursively deploy the language of social movements to create a shared understanding of the networking needs of communities. Through the process of"framing" local governments assign meaning to the MW networks in ways intended to mobilize support anddemobilize opposition. The mobilizing potential of a frame varies and is dependent on its centrality and cultural resonance. We examine the framing efforts of MW networks by using a sample of Request for Proposals for community wireless networks, semi-structured interviews and local media sources. Prominent values that are central to a majority of the projects and others that are culturally specific are identified and analyzed for their mobilizing potency.

  16. Applying fuzzy analytic network process in quality function deployment model

    Directory of Open Access Journals (Sweden)

    Mohammad Ali Afsharkazemi

    2012-08-01

    Full Text Available In this paper, we propose an empirical study of QFD implementation when fuzzy numbers are used to handle the uncertainty associated with different components of the proposed model. We implement fuzzy analytical network to find the relative importance of various criteria and using fuzzy numbers we calculate the relative importance of these factors. The proposed model of this paper uses fuzzy matrix and house of quality to study the products development in QFD and also the second phase i.e. part deployment. In most researches, the primary objective is only on CRs to implement the quality function deployment and some other criteria such as production costs, manufacturing costs etc were disregarded. The results of using fuzzy analysis network process based on the QFD model in Daroupat packaging company to develop PVDC show that the most important indexes are being waterproof, resistant pill packages, and production cost. In addition, the PVDC coating is the most important index in terms of company experts’ point of view.

  17. The Analysis of a Link Between a Remote Local Area Network and Its Server Resources

    National Research Council Canada - National Science Library

    Beaver, Theresa

    2005-01-01

    ... paramount. One way to provide this support is to create a Local Area Network (LAN) in which the workstations are positioned at the deployed location while the servers are maintained at a Main Operating Base (MOB...

  18. Low-power secure body area network for vital sensors toward IEEE802.15.6.

    Science.gov (United States)

    Kuroda, Masahiro; Qiu, Shuye; Tochikubo, Osamu

    2009-01-01

    Many healthcare/medical services have started using personal area networks, such as Bluetooth and ZigBee; these networks consist of various types of vital sensors. These works focus on generalized functions for sensor networks that expect enough battery capacity and low-power CPU/RF (Radio Frequency) modules, but less attention to easy-to-use privacy protection. In this paper, we propose a commercially-deployable secure body area network (S-BAN) with reduced computational burden on a real sensor that has limited RAM/ROM sizes and CPU/RF power consumption under a light-weight battery. Our proposed S-BAN provides vital data ordering among sensors that are involved in an S-BAN and also provides low-power networking with zero-administration security by automatic private key generation. We design and implement the power-efficient media access control (MAC) with resource-constraint security in sensors. Then, we evaluate the power efficiency of the S-BAN consisting of small sensors, such as an accessory type ECG and ring-type SpO2. The evaluation of power efficiency of the S-BAN using real sensors convinces us in deploying S-BAN and will also help us in providing feedbacks to the IEEE802.15.6 MAC, which will be the standard for BANs.

  19. A Multiobjective Fuzzy Inference System based Deployment Strategy for a Distributed Mobile Sensor Network

    Directory of Open Access Journals (Sweden)

    Amol P. Bhondekar

    2010-03-01

    Full Text Available Sensor deployment scheme highly governs the effectiveness of distributed wireless sensor network. Issues such as energy conservation and clustering make the deployment problem much more complex. A multiobjective Fuzzy Inference System based strategy for mobile sensor deployment is presented in this paper. This strategy gives a synergistic combination of energy capacity, clustering and peer-to-peer deployment. Performance of our strategy is evaluated in terms of coverage, uniformity, speed and clustering. Our algorithm is compared against a modified distributed self-spreading algorithm to exhibit better performance.

  20. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks.

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-02-10

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches.

  1. Simultaneous Fleet Deployment and Network Design of Liner Shipping

    DEFF Research Database (Denmark)

    Gelareh, Shahin; Pisinger, David

    A mixed integer linear programming formulation is proposed for the simultaneous design of network and fleet deployment of a liner service providers for deep-sea shipping. The underlying network design problem is based on a 4-index (5-index by considering capacity type) formulation of the hub...... location problem which are known for their tightness. The demand is considered to be elastic in the sense that the service provider can accept any fraction of the origin-destination demand. We then propose a primal decomposition method to solve instances of the problem to optimality. Numerical results...... confirm superiority of our approach in comparison with a general-purpose mixed integer programming solver....

  2. The Inter-Cell Interference Dilemma in Dense Outdoor Small Cell Deployment

    DEFF Research Database (Denmark)

    Polignano, Michele; Mogensen, Preben; Fotiadis, Panagiotis

    2014-01-01

    The deployment of low-power small cells is envisaged as the main driver to accommodate the mobile broadband traffic growth in cellular networks. Depending on the spatial distribution of the user traffic, a densification of the small cells may be required in confined areas. However, deploying more...... and more cells in given areas may imply an increase of the inter-cell interference among the small cells. This study aims at investigating if the inter-cell interference among outdoor small cells may represent an impairment to the user experience, and evaluates if and in what conditions the interference...... coordination is worthwhile compared to the universal frequency reuse. Results show that the inter-cell interference depends on the small cell deployment in the urban environment (e.g. streets and squares) and on the network load condition. In case of deployment along urban streets, the inter-cell interference...

  3. Metropolitan area networks: a corner stone in the broadband era

    Science.gov (United States)

    Ghanem, Adel

    1991-02-01

    Deployment of Broadband ISDN is being influenced by both a market pull and a technology push. New broadband service opportunities exist in the business and residential sectors of the market place. It is envisioned that some customers will need connections directly to broadband switches because of the high bandwidth needed for their applications. At the same time Metropolitan Area Network (MAN) systems will serve those customers with bandwidth requirements less than or equal to 150 Mbps. A given MAN will have a geographical domain to serve where it will carry out the switching tasks within this domain. While MANs couldbe designed using differentarchitecturalconcepts the setofservices expected tobeprovidedby MANs could be equivalent to thelist ofservices thatwillbe supported by the targetbroadband network. This paperpositions MANs as a major building block for Broadband networks. It also examines the evolution process ofMANs as a needed step to assure the successful deployment of these new broadband services. 2. BISDN - OVERVIEW Broadband ISDN (BISDN) is being driven into existence by both a market pull as well as a technology push. Opportunities for new valueadded services are the prime market pull for future broadband networks. These services opportunities extend beyond simple voice and low speed data applications and cover both the residential and the business sectors of the market. It is noted for instance that business customers have growing needs for sophisticated telecommunication vehicles to support their

  4. A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events

    Directory of Open Access Journals (Sweden)

    2009-03-01

    Full Text Available In this paper, we address the Wireless Sensor Network (WSN deployment issue. We assume that the observed area is characterized by the geographical irregularity of the sensed events. Formally, we consider that each point in the deployment area is associated a differentiated detection probability threshold, which must be satisfied by our deployment method. Our resulting WSN deployment problem is formulated as a Multi-Objectives Optimization problem, which seeks to reduce the gap between the generated events detection probabilities and the required thresholds while minimizing the number of deployed sensors. To overcome the computational complexity of an exact resolution, we propose an original pseudo-random approach based on the Tabu Search heuristic. Simulations show that our proposal achieves better performances than several other approaches proposed in the literature. In the last part of this paper, we generalize the deployment problem by including the wireless communication network connectivity constraint. Thus, we extend our proposal to ensure that the resulting WSN topology is connected even if a sensor communication range takes small values.

  5. A Tabu Search WSN Deployment Method for Monitoring Geographically Irregular Distributed Events.

    Science.gov (United States)

    Aitsaadi, Nadjib; Achir, Nadjib; Boussetta, Khaled; Pujolle, Guy

    2009-01-01

    In this paper, we address the Wireless Sensor Network (WSN) deployment issue. We assume that the observed area is characterized by the geographical irregularity of the sensed events. Formally, we consider that each point in the deployment area is associated a differentiated detection probability threshold, which must be satisfied by our deployment method. Our resulting WSN deployment problem is formulated as a Multi-Objectives Optimization problem, which seeks to reduce the gap between the generated events detection probabilities and the required thresholds while minimizing the number of deployed sensors. To overcome the computational complexity of an exact resolution, we propose an original pseudo-random approach based on the Tabu Search heuristic. Simulations show that our proposal achieves better performances than several other approaches proposed in the literature. In the last part of this paper, we generalize the deployment problem by including the wireless communication network connectivity constraint. Thus, we extend our proposal to ensure that the resulting WSN topology is connected even if a sensor communication range takes small values.

  6. Efficient Deployment of Key Nodes for Optimal Coverage of Industrial Mobile Wireless Networks

    Science.gov (United States)

    Li, Xiaomin; Li, Di; Dong, Zhijie; Hu, Yage; Liu, Chengliang

    2018-01-01

    In recent years, industrial wireless networks (IWNs) have been transformed by the introduction of mobile nodes, and they now offer increased extensibility, mobility, and flexibility. Nevertheless, mobile nodes pose efficiency and reliability challenges. Efficient node deployment and management of channel interference directly affect network system performance, particularly for key node placement in clustered wireless networks. This study analyzes this system model, considering both industrial properties of wireless networks and their mobility. Then, static and mobile node coverage problems are unified and simplified to target coverage problems. We propose a novel strategy for the deployment of clustered heads in grouped industrial mobile wireless networks (IMWNs) based on the improved maximal clique model and the iterative computation of new candidate cluster head positions. The maximal cliques are obtained via a double-layer Tabu search. Each cluster head updates its new position via an improved virtual force while moving with full coverage to find the minimal inter-cluster interference. Finally, we develop a simulation environment. The simulation results, based on a performance comparison, show the efficacy of the proposed strategies and their superiority over current approaches. PMID:29439439

  7. Deployment of 802.15.4 Sensor Networks for C4ISR Operations

    National Research Council Canada - National Science Library

    Ngo, Damian N

    2006-01-01

    .... The objective of this thesis is to focus on the deployment issues of WSNs. In addition, this thesis assesses the optimal configurations and environment that enables the sensor networks to thrive in a C4ISR environment...

  8. SDN/NFV orchestration for dynamic deployment of virtual SDN controllers as VNF for multi-tenant optical networks

    OpenAIRE

    Muñoz, Raül; Vilalta, Ricard; Casellas, Ramon; Martínez, Ricardo; Szyrkowiec, T.; Autenrieth, A.; López, Víctor; López, D.

    2015-01-01

    We propose to virtualize the SDN control functions and move them to the cloud. We experimentally evaluate the first SDN/NFV orchestration architecture to dynamically deploy independent SDN controller instances for each deployed virtual optical network.

  9. Impacts of optimal energy storage deployment and network reconfiguration on renewable integration level in distribution systems

    International Nuclear Information System (INIS)

    Santos, Sérgio F.; Fitiwi, Desta Z.; Cruz, Marco R.M.; Cabrita, Carlos M.P.; Catalão, João P.S.

    2017-01-01

    Highlights: • A dynamic and multi-objective stochastic mixed integer linear programming model is developed. • A new mechanism to quantify the impacts of network flexibility and ESS deployments on RES integration is presented. • Optimal integration of ESSs dramatically increases the level and the optimal exploitation of renewable DGs. • As high as 90% of RES integration level may be possible in distribution network systems. • Joint DG and ESS installations along with optimal network reconfiguration greatly contribute to voltage stability. - Abstract: Nowadays, there is a wide consensus about integrating more renewable energy sources-RESs to solve a multitude of global concerns such as meeting an increasing demand for electricity, reducing energy security and heavy dependence on fossil fuels for energy production, and reducing the overall carbon footprint of power production. Framed in this context, the coordination of RES integration with energy storage systems (ESSs), along with the network’s switching capability and/or reinforcement, is expected to significantly improve system flexibility, thereby increasing the capability of the system in accommodating large-scale RES power. Hence, this paper presents a novel mechanism to quantify the impacts of network switching and/or reinforcement as well as deployment of ESSs on the level of renewable power integrated in the system. To carry out this analysis, a dynamic and multi-objective stochastic mixed integer linear programming (S-MILP) model is developed, which jointly takes the optimal deployment of RES-based DGs and ESSs into account in coordination with distribution network reinforcement and/or reconfiguration. The IEEE 119-bus test system is used as a case study. Numerical results clearly show the capability of ESS deployment in dramatically increasing the level of renewable DGs integrated in the system. Although case-dependent, the impact of network reconfiguration on RES power integration is not

  10. Lessons learned on solar powered wireless sensor network deployments in urban, desert environments

    KAUST Repository

    Dehwah, Ahmad H.; Mousa, Mustafa; Claudel, Christian G.

    2015-01-01

    The successful deployment of a large scale solar powered wireless sensor network in an urban, desert environment is a very complex task. Specific cities of such environments cause a variety of operational problems, ranging from hardware faults

  11. Deployment Algorithms of Wireless Sensor Networks for Near-surface Underground Oil and Gas Pipeline Monitoring

    Directory of Open Access Journals (Sweden)

    Hua-Ping YU

    2014-07-01

    Full Text Available Oil and gas pipelines are the infrastructure of national economic development. Deployment problem of wireless underground sensor networks (WUSN for oil and gas pipeline systems is a fundamental problem. This paper firstly analyzed the wireless channel characteristics and energy consumption model in near-surface underground soil, and then studied the spatial structure of oil and gas pipelines and introduced the three-layer system structure of WUSN for oil and gas pipelines monitoring. Secondly, the optimal deployment strategy in XY plane and XZ plane which were projected from three-dimensional oil and gas pipeline structure was analyzed. Thirdly, the technical framework of using kinetic energy of the fluid in pipelines to recharge sensor nodes and partition strategy for energy consumption balance based on the wireless communication technology of magnetic induction waveguide were proposed, which can effectively improve the energy performance and connectivity of the network, and provide theoretical guidance and practical basis for the monitoring of long oil and gas pipeline network, the city tap water pipe network and sewage pipe network.

  12. WING/WORLD: An Open Experimental Toolkit for the Design and Deployment of IEEE 802.11-Based Wireless Mesh Networks Testbeds

    Directory of Open Access Journals (Sweden)

    Daniele Miorandi

    2010-01-01

    Full Text Available Wireless Mesh Networks represent an interesting instance of light-infrastructure wireless networks. Due to their flexibility and resiliency to network failures, wireless mesh networks are particularly suitable for incremental and rapid deployments of wireless access networks in both metropolitan and rural areas. This paper illustrates the design and development of an open toolkit aimed at supporting the design of different solutions for wireless mesh networking by enabling real evaluation, validation, and demonstration. The resulting testbed is based on off-the-shelf hardware components and open-source software and is focused on IEEE 802.11 commodity devices. The software toolkit is based on an “open” philosophy and aims at providing the scientific community with a tool for effective and reproducible performance analysis of WMNs. The paper describes the architecture of the toolkit, and its core functionalities, as well as its potential evolutions.

  13. Experimental validation of a distributed algorithm for dynamic spectrum access in local area networks

    DEFF Research Database (Denmark)

    Tonelli, Oscar; Berardinelli, Gilberto; Tavares, Fernando Menezes Leitão

    2013-01-01

    Next generation wireless networks aim at a significant improvement of the spectral efficiency in order to meet the dramatic increase in data service demand. In local area scenarios user-deployed base stations are expected to take place, thus making the centralized planning of frequency resources...... activities with the Autonomous Component Carrier Selection (ACCS) algorithm, a distributed solution for interference management among small neighboring cells. A preliminary evaluation of the algorithm performance is provided considering its live execution on a software defined radio network testbed...

  14. Heterogeneous Deployment to Meet Traffic Demand in a Realistic LTE Urban Scenario

    DEFF Research Database (Denmark)

    Coletti, Claudio; Hu, Liang; Nguyen, Huan Cong

    2012-01-01

    growth of mo-bile broadband traffic. Emphasis is put on how to optimally as-sign the spectrum for the different networks layers in an evolved HetNet including outdoor and indoor small cells. The study is conducted for a “Hot-Zone” scenario, i.e. a high-traffic area within a realistic dense urban...... performance with a minimum user data rate of 1 Mbps is achieved when deploying small cells on dedicated channels rather than co-channel deployment. Fur-thermore, the joint pico and femto deployment turns out to be the right trade-off between increased base station density and en-hanced network capacity....

  15. MPLS for metropolitan area networks

    CERN Document Server

    Tan, Nam-Kee

    2004-01-01

    METROPOLITAN AREA NETWORKS AND MPLSRequirements of Metropolitan Area Network ServicesMetropolitan Area Network OverviewThe Bandwidth DemandThe Metro Service Provider's Business ApproachesThe Emerging Metro Customer Expectations and NeedsSome Prevailing Metro Service OpportunitiesService Aspects and RequirementsRoles of MPLS in Metropolitan Area NetworksMPLS PrimerMPLS ApplicationsTRAFFIC ENGINEERING ASPECTS OF METROPOLITAN AREA NETWORKSTraffic Engineering ConceptsNetwork CongestionHyper Aggregation ProblemEasing CongestionNetwork ControlTactical versus Strategic Traffic EngineeringIP/ATM Overl

  16. The Global Seismographic Network (GSN): Deployment of Next Generation VBB Borehole Sensors and Improving Overall Network Noise Performance

    Science.gov (United States)

    Hafner, K.; Davis, P.; Wilson, D.; Sumy, D.

    2017-12-01

    The Global Seismographic Network (GSN) recently received delivery of the next generation Very Broadband (VBB) borehole sensors purchased through funding from the DOE. Deployment of these sensors will be underway during the end of summer and fall of 2017 and they will eventually replace the aging KS54000 sensors at approximately one-third of the GSN network stations. We will present the latest methods of deploying these sensors in the existing deep boreholes. To achieve lower noise performance at some sites, emplacement in shallow boreholes might result in lower noise performance for the existing site conditions. In some cases shallow borehole installations may be adapted to vault stations (which make up two thirds of the network), as a means of reducing tilt-induced signals on the horizontal components. The GSN is creating a prioritized list of equipment upgrades at selected stations with the ultimate goal of optimizing overall network data availability and noise performance. For an overview of the performance of the current GSN relative to selected set of metrics, we are utilizing data quality metrics and Probability Density Functions (PDFs)) generated by the IRIS Data Management Centers' (DMC) MUSTANG (Modular Utility for Statistical Knowledge Gathering) and LASSO (Latest Assessment of Seismic Station Observations) tools. We will present our metric analysis of GSN performance in 2016, and show the improvements at GSN sites resulting from recent instrumentation and infrastructure upgrades.

  17. Values of Deploying a Compact Polarimetric Radar to Monitor Extreme Precipitation in a Mountainous Area: Mineral County, Colorado

    Science.gov (United States)

    Cheong, B. L.; Kirstetter, P. E.; Yu, T. Y.; Busto, J.; Speeze, T.; Dennis, J.

    2015-12-01

    Precipitation in mountainous regions can trigger flash floods and landslides especially in areas affected by wildfire. Because of the small space-time scales required for observation, they remain poorly observed. A light-weighted X-band polarimetric radar can rapidly respond to the situation and provide continuous rainfall information with high resolution for flood forecast and emergency management. A preliminary assessment of added values to the operational practice in Mineral county, Colorado was performed in Fall 2014 and Summer 2015 with a transportable polarimetric radar deployed at the Lobo Overlook. This region is one of the numerous areas in the Rocky Mountains where the WSR-88D network does not provide sufficient weather coverage due to blockages, and the limitations have impeded forecasters and local emergency managers from making accurate predictions and issuing weather warnings. High resolution observations were collected to document the precipitation characteristics and demonstrate the added values of deploying a small weather radar in such context. The analysis of the detailed vertical structure of precipitation explain the decreased signal sampled by the operational radars. The specific microphysics analyzed though polarimetry suggest that the operational Z-R relationships may not be appropriate to monitor severe weather over this wildfire affected region. Collaboration with the local emergency managers and the National Weather Service shows the critical value of deploying mobile, polarimetric and unmanned radars in complex terrain. Several selected cases are provided in this paper for illustration.

  18. A simulation model for aligning smart home networks and deploying smart objects

    DEFF Research Database (Denmark)

    Lynggaard, Per

    Smart homes use sensor based networks to capture activities and offer learned services to the user. These smart home networks are challenging because they mainly use wireless communication at frequencies that are shared with other services and equipments. One of the major challenges...... is the interferences produced by WiFi access points in smart home networks which are expensive to overcome in terms of battery energy. Currently, different method exists to handle this. However, they use complex mechanisms such as sharing frequencies, sharing time slots, and spatial reuse of frequencies. This paper...... introduces a unique concept which saves battery energy and lowers the interference level by simulating the network alignment and assign the necessary amount of transmit power to each individual network node and finally, deploy the smart objects. The needed transmit powers are calculated by the presented...

  19. Effect of military deployment in operational area on the trend of smoking among troops

    International Nuclear Information System (INIS)

    Parvez, S.; Mubarik, H.

    2015-01-01

    To identify effect of military deployment in operational area on trend of smoking cigarettes among troops. Study Design: Descriptive cross-sectional study. Place and Duration of study: The study was carried out in an Army Brigade deployed in Operation Al-Mizan, Swat, from Jan to March 2014. Material and Methods: Whole troops of an army brigade deployed in operation Al-Mizan, Swat were the part of present study. Total strength of brigade comprised of 1850 troops. Out of these 1850, officers constituted 53 (2.86%) and rest 1797 (97.14%) were Junior Commissioned officers (JCOs), noncommissioned officers (NCOs) and soldiers. All ranks other than officers were collectively termed as soldiers. All the individuals were given structured questionnaire to fill. The information was gathered on variables like age, rank, unit, education, duration of deployment in operational area, habit of smoking, intensity of smoking (number of cigarettes smoked daily) and change in the habit and intensity of smoking after being deployed in the operational area. Information was also gathered from the individuals about the reasons for change in the habit (starting or stopping smoking) and intensity of smoking after deployment in operational area. Forty nine individuals with less than 6 months duration in operational area were excluded. All the other officers and soldiers (1801) having served more than 6 months in the operational area were included in the study. Results: There were total 1801 individuals included in the study. Officers constituted 52 (2.88%) of the total and rest 1749 (97.12%) were soldiers. The mean age of officers was 26.34 ± 4.6 years and mean age of soldiers was 27.92 ± 4.5 years. The overall frequency of smoking in officers and soldiers in the operational area came out to be 29.6%, however the overall frequency of smoking in these individuals before coming to operational area was 26.8%. There were 3 officers and 47 soldiers who started smoking in the operational area

  20. Deploying 5G-technologies in smart city and smart home wireless sensor networks with interferences

    DEFF Research Database (Denmark)

    Lynggaard, Per; Skouby, Knud Erik

    2015-01-01

    communication in an Internet of Things (5G) contexts. In this paper we discuss some of the key challenges that exist in the smart city and smart home networks in the light of possible 5G-solutions. Focus is on deploying cognitive radio technologies (5G) which enables the smart city networks to support......Deploying 5G technologies in a combination of smart homes and smart city opens for a new ecosystem with big potentials. The potentials lie in the creation of an advanced ICT infrastructure with support for connected and entangled services possibilities including technologies for efficient...... interconnected infrastructure elements, to handle big-data from the smart homes, and to be compatible with existing infrastructures. The considered cognitive radio technology is based on pre-coded OFDM which offers the needed flexibility to deal with the key challenges found in the smart home networks. Thus...

  1. Local area networking in a radio quiet environment

    Science.gov (United States)

    Childers, Edwin L.; Hunt, Gareth; Brandt, Joseph J.

    2002-11-01

    The Green Bank facility of the National Radio Astronomy Observatory is spread out over 2,700 acres in the Allegheny Mountains of West Virginia. Good communication has always been needed between the radio telescopes and the control buildings. The National Radio Quiet Zone helps protect the Green Bank site from radio transmissions that interfere with the astronomical signals. Due to stringent Radio Frequency Interference (RFI) requirements, a fiber optic communication system was used for Ethernet transmissions on the site and coaxial cable within the buildings. With the need for higher speed communications, the entire network has been upgraded to use optical fiber with modern Ethernet switches. As with most modern equipment, the implementation of the control of the newly deployed Green Bank Telescope (GBT) depends heavily on TCP/IP. In order to protect the GBT from the commodity Internet, the GBT uses a non-routable network. Communication between the control building Local Area Network (LAN) and the GBT is implemented using a Virtual LAN (VLAN). This configuration will be extended to achieve isolation between trusted local user systems, the GBT, and other Internet users. Legitimate access to the site, for example by remote observers, is likely to be implemented using a virtual private network (VPN).

  2. Deployment strategy for battery energy storage system in distribution network based on voltage violation regulation

    Science.gov (United States)

    Wu, H.; Zhou, L.; Xu, T.; Fang, W. L.; He, W. G.; Liu, H. M.

    2017-11-01

    In order to improve the situation of voltage violation caused by the grid-connection of photovoltaic (PV) system in a distribution network, a bi-level programming model is proposed for battery energy storage system (BESS) deployment. The objective function of inner level programming is to minimize voltage violation, with the power of PV and BESS as the variables. The objective function of outer level programming is to minimize the comprehensive function originated from inner layer programming and all the BESS operating parameters, with the capacity and rated power of BESS as the variables. The differential evolution (DE) algorithm is applied to solve the model. Based on distribution network operation scenarios with photovoltaic generation under multiple alternative output modes, the simulation results of IEEE 33-bus system prove that the deployment strategy of BESS proposed in this paper is well adapted to voltage violation regulation invariable distribution network operation scenarios. It contributes to regulating voltage violation in distribution network, as well as to improve the utilization of PV systems.

  3. Community Based Networks and 5G

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2016-01-01

    The deployment of previous wireless standards has provided more benefits for urban dwellers than rural dwellers. 5G deployment may not be different. This paper identifies that Community Based Networks as carriers that deserve recognition as potential 5G providers may change this. The argument....... The findings indicate that 5G connectivity can be extended to rural areas by these networks, via heterogenous networks. Hence the delivery of 5G data rates delivery via Wireless WAN in rural areas can be achieved by utilizing the causal factors of the identified models for Community Based Networks....

  4. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium.

    Science.gov (United States)

    Somasundaram, M; Sivakumar, R

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security.

  5. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    Science.gov (United States)

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient's life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body function records. Most of the systems on the Wireless Body Area Network are not effective in facing the security deployment issues. To access the patient's information with higher security on WBAN, Game Theory with Stackelberg Security Equilibrium (GTSSE) is proposed in this paper. GTSSE mechanism takes all the players into account. The patients are monitored by placing the power position authority initially. The position authority in GTSSE is the organizer and all the other players react to the organizer decision. Based on our proposed approach, experiment has been conducted on factors such as security ratio based on patient's health information, system flexibility level, energy consumption rate, and information loss rate. Stackelberg Security considerably improves the strength of solution with higher security. PMID:26759829

  6. Impact of PON deployment on metro networks

    Science.gov (United States)

    Poirrier, Julien; Herviou, Fabrice; Barboule, Hélène; Moignard, Maryse

    2009-01-01

    FTTH or FTTC, depending on countries and areas, will be the key technology for operators to differentiate themselves from competitors and win market share. Such a disruptive evolution of the access network should be supported by a significant re-design of the higher network layers. In the present paper, the required features of these new WDM networks are presented. Capacity and cost are the two obvious drivers. But versatility will be crucial to cope with an uncertain context (tedious prediction of traffic, regulation and services) and with very diverse population densities. Finally we also address how PON could benefit from mature WDM technologies to ease the global network design.

  7. Argonne National Lab deploys Force10 networks' massively dense ethernet switch for supercomputing cluster

    CERN Multimedia

    2003-01-01

    "Force10 Networks, Inc. today announced that Argonne National Laboratory (Argonne, IL) has successfully deployed Force10 E-Series switch/routers to connect to the TeraGrid, the world's largest supercomputing grid, sponsored by the National Science Foundation (NSF)" (1/2 page).

  8. Equalized Energy Consumption in Wireless Body Area Networks for a Prolonged Network Lifetime

    Directory of Open Access Journals (Sweden)

    Maryam El Azhari

    2017-01-01

    Full Text Available The phenomenal advances in electronics contributed to a widespread use of distributed sensors in wireless communications. A set of biosensors can be deployed or implanted in the human body to form a Wireless Body Area Network (WBAN, where various WBAN PHY layers are utilized. The WBAN allows the measurement of physiological data, which is forwarded by the gateway to the base station for analysis purposes. The main issue in conceiving a WBAN communication mechanism is to manage the residual energy of sensors. The mobile agent system has been widely applied for surveillance applications in Wireless Sensor Networks (WSNs. It consists in dispatching one or more mobile agents simultaneously to collect data, while following a predetermined optimum itinerary. The continuous use of the optimal itinerary leads to a rapid depletion of sensor nodes batteries, which minimizes the network lifetime. This paper presents a new algorithm to equalize the energy consumption among sensor motes. The algorithm exploits all the available paths towards the destination and classifies them with respect to the end-to-end delay and the overall energy consumption. The proposed algorithm performs better compared to the optimal routing path. It increases the network lifetime to the maximum by postponing routing of data via the most-recently used path, and it also maintains data delivery within the delay interval threshold.

  9. A distributed multiagent system architecture for body area networks applied to healthcare monitoring.

    Science.gov (United States)

    Felisberto, Filipe; Laza, Rosalía; Fdez-Riverola, Florentino; Pereira, António

    2015-01-01

    In the last years the area of health monitoring has grown significantly, attracting the attention of both academia and commercial sectors. At the same time, the availability of new biomedical sensors and suitable network protocols has led to the appearance of a new generation of wireless sensor networks, the so-called wireless body area networks. Nowadays, these networks are routinely used for continuous monitoring of vital parameters, movement, and the surrounding environment of people, but the large volume of data generated in different locations represents a major obstacle for the appropriate design, development, and deployment of more elaborated intelligent systems. In this context, we present an open and distributed architecture based on a multiagent system for recognizing human movements, identifying human postures, and detecting harmful activities. The proposed system evolved from a single node for fall detection to a multisensor hardware solution capable of identifying unhampered falls and analyzing the users' movement. The experiments carried out contemplate two different scenarios and demonstrate the accuracy of our proposal as a real distributed movement monitoring and accident detection system. Moreover, we also characterize its performance, enabling future analyses and comparisons with similar approaches.

  10. Game Theory Based Security in Wireless Body Area Network with Stackelberg Security Equilibrium

    OpenAIRE

    Somasundaram, M.; Sivakumar, R.

    2015-01-01

    Wireless Body Area Network (WBAN) is effectively used in healthcare to increase the value of the patient’s life and also the value of healthcare services. The biosensor based approach in medical care system makes it difficult to respond to the patients with minimal response time. The medical care unit does not deploy the accessing of ubiquitous broadband connections full time and hence the level of security will not be high always. The security issue also arises in monitoring the user body fu...

  11. Modelling multi-rotor UAVs swarm deployment using virtual pheromones

    Science.gov (United States)

    Pujol, Mar; Rizo, Ramón; Rizo, Carlos

    2018-01-01

    In this work, a swarm behaviour for multi-rotor Unmanned Aerial Vehicles (UAVs) deployment will be presented. The main contribution of this behaviour is the use of a virtual device for quantitative sematectonic stigmergy providing more adaptable behaviours in complex environments. It is a fault tolerant highly robust behaviour that does not require prior information of the area to be covered, or to assume the existence of any kind of information signals (GPS, mobile communication networks …), taking into account the specific features of UAVs. This behaviour will be oriented towards emergency tasks. Their main goal will be to cover an area of the environment for later creating an ad-hoc communication network, that can be used to establish communications inside this zone. Although there are several papers on robotic deployment it is more difficult to find applications with UAV systems, mainly because of the existence of various problems that must be overcome including limitations in available sensory and on-board processing capabilities and low flight endurance. In addition, those behaviours designed for UAVs often have significant limitations on their ability to be used in real tasks, because they assume specific features, not easily applicable in a general way. Firstly, in this article the characteristics of the simulation environment will be presented. Secondly, a microscopic model for deployment and creation of ad-hoc networks, that implicitly includes stigmergy features, will be shown. Then, the overall swarm behaviour will be modeled, providing a macroscopic model of this behaviour. This model can accurately predict the number of agents needed to cover an area as well as the time required for the deployment process. An experimental analysis through simulation will be carried out in order to verify our models. In this analysis the influence of both the complexity of the environment and the stigmergy system will be discussed, given the data obtained in the

  12. Optimal Assignment of Cells in C-RAN Deployments with Multiple BBU Pools

    DEFF Research Database (Denmark)

    Holm, Henrik; Checko, Aleksandra; Al-obaidi, Rami

    2015-01-01

    Cloud Radio Access Network (C-RAN) is receiving increasing attention not only within the research community but also from operators and standardization bodies. However, even a good technology will be deployed only if it is economically viable. In our previous work, for larger scale deployment we...... recommend to divide the area into multiple BBU Pools. In this paper we show how to optimally assign cells to different BBU Pools in such a scenario. By using Integer Linear Programming (ILP) method we derive engineering guidelines for minimizing the CAPital EXpenditure (CAPEX) of C-RAN deployment....

  13. An Interference-Aware Traffic-Priority-Based Link Scheduling Algorithm for Interference Mitigation in Multiple Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Thien T. T. Le

    2016-12-01

    Full Text Available Currently, wireless body area networks (WBANs are effectively used for health monitoring services. However, in cases where WBANs are densely deployed, interference among WBANs can cause serious degradation of network performance and reliability. Inter-WBAN interference can be reduced by scheduling the communication links of interfering WBANs. In this paper, we propose an interference-aware traffic-priority-based link scheduling (ITLS algorithm to overcome inter-WBAN interference in densely deployed WBANs. First, we model a network with multiple WBANs as an interference graph where node-level interference and traffic priority are taken into account. Second, we formulate link scheduling for multiple WBANs as an optimization model where the objective is to maximize the throughput of the entire network while ensuring the traffic priority of sensor nodes. Finally, we propose the ITLS algorithm for multiple WBANs on the basis of the optimization model. High spatial reuse is also achieved in the proposed ITLS algorithm. The proposed ITLS achieves high spatial reuse while considering traffic priority, packet length, and the number of interfered sensor nodes. Our simulation results show that the proposed ITLS significantly increases spatial reuse and network throughput with lower delay by mitigating inter-WBAN interference.

  14. Development of a Real-Time Radiological Area Monitoring Network for Emergency Response at Lawrence Livermore National Laboratory

    International Nuclear Information System (INIS)

    Bertoldo, N; Hunter, S; Fertig, R; Laguna, G; MacQueen, D

    2004-01-01

    A real-time radiological sensor network for emergency response was developed and deployed at the Lawrence Livermore National Laboratory (LLNL). The Real-Time Radiological Area Monitoring (RTRAM) network is comprised of 16 Geiger-Mueller (GM) sensors positioned on the LLNL Livermore site perimeter to continuously monitor for a radiological condition resulting from a terrorist threat to site security and the health and safety of LLNL personnel. The RTRAM network sensor locations coincide with wind sector directions to provide thorough coverage of the one square mile site. These loW--power sensors are supported by a central command center (CCC) and transmit measurement data back to the CCC computer through the LLNL telecommunications infrastructure. Alarm conditions are identified by comparing current data to predetermined threshold parameters and are validated by comparison with plausible dispersion modeling scenarios and prevailing meteorological conditions. Emergency response personnel are notified of alarm conditions by automatic radio and computer based notifications. A secure intranet provides emergency response personnel with current condition assessment data that enable them to direct field response efforts remotely. The RTRAM network has proven to be a reliable system since initial deployment in August 2001 and maintains stability during inclement weather conditions

  15. Risk and resilience in military families experiencing deployment: the role of the family attachment network.

    Science.gov (United States)

    Riggs, Shelley A; Riggs, David S

    2011-10-01

    Deployment separation constitutes a significant stressor for U.S. military men and women and their families. Many military personnel return home struggling with physical and/or psychological injuries that challenge their ability to reintegrate and contribute to marital problems, family dysfunction, and emotional or behavioral disturbance in spouses and children. Yet research examining the psychological health and functioning of military families is scarce and rarely driven by developmental theory. The primary purpose of this theoretical paper is to describe a family attachment network model of military families during deployment and reintegration that is grounded in attachment theory and family systems theory. This integrative perspective provides a solid empirical foundation and a comprehensive account of individual and family risk and resilience during military-related separations and reunions. The proposed family attachment network model will inform future research and intervention efforts with service members and their families.

  16. Energy efficient medium access protocol for wireless medical body area sensor networks.

    Science.gov (United States)

    Omeni, O; Wong, A; Burdett, A J; Toumazou, C

    2008-12-01

    This paper presents a novel energy-efficient MAC Protocol designed specifically for wireless body area sensor networks (WBASN) focused towards pervasive healthcare applications. Wireless body area networks consist of wireless sensor nodes attached to the human body to monitor vital signs such as body temperature, activity or heart-rate. The network adopts a master-slave architecture, where the body-worn slave node periodically sends sensor readings to a central master node. Unlike traditional peer-to-peer wireless sensor networks, the nodes in this biomedical WBASN are not deployed in an ad hoc fashion. Joining a network is centrally managed and all communications are single-hop. To reduce energy consumption, all the sensor nodes are in standby or sleep mode until the centrally assigned time slot. Once a node has joined a network, there is no possibility of collision within a cluster as all communication is initiated by the central node and is addressed uniquely to a slave node. To avoid collisions with nearby transmitters, a clear channel assessment algorithm based on standard listen-before-transmit (LBT) is used. To handle time slot overlaps, the novel concept of a wakeup fallback time is introduced. Using single-hop communication and centrally controlled sleep/wakeup times leads to significant energy reductions for this application compared to more ldquoflexiblerdquo network MAC protocols such as 802.11 or Zigbee. As duty cycle is reduced, the overall power consumption approaches the standby power. The protocol is implemented in hardware as part of the Sensiumtrade system-on-chip WBASN ASIC, in a 0.13- mum CMOS process.

  17. Home area networks

    NARCIS (Netherlands)

    Koonen, A.M.J.

    2013-01-01

    This article consists of a collection of slides from the author's conference presentation. Some of the specific areas/topics discussed include: Convergence in home networks, home service scenarios; Home wired network architectures, CapEx and OpEx; Residential Gateway; Optical fiber types;

  18. Markovian agents models for wireless sensor networks deployed in environmental protection

    International Nuclear Information System (INIS)

    Cerotti, Davide; Gribaudo, Marco; Bobbio, Andrea

    2014-01-01

    Wireless sensor networks (WSNs) are gaining popularity as distributed monitoring systems in safety critical applications, when the location to be controlled may be dangerous for a human operator or difficult to access. Fire is one of the major thread in urban as well as in open environments, and WSNs are receiving increasing attention as a mean to build effective and timely fire protection systems. The present paper presents a novel analytical technique for the study of the propagation of a fire in a wide open area and the interaction with a WSN deployed to monitor the outbreak of the fire and to send a warning signal to a base station. For the complex scenario under study, an analytical modeling and analysis technique based on Markovian agents (MAs) is discussed. It is shown that, even if the overall state space of the models is huge, nevertheless an analytical solution is feasible, by exploiting the locality of the interactions among MAs, based on a message passing mechanism combined with a perception function. - Highlights: • We present a revised theory of Markovian agent models, detailing the analysis techniques and its complexity • We a target a complex application of a wireless sensor network (WSN) that monitors forest fire. • The model captures the propagation of fire, heat, and the detection by the WSN. • We compute key performance indices such us the fire propagation front, and message travel time. • We perform an extensive set of experiments to study the effectiveness of the WSN in detecting forest fire

  19. On the area spectral efficiency improvement of heterogeneous network by exploiting the integration of macro-femto cellular networks

    KAUST Repository

    Shakir, Muhammad; Alouini, Mohamed-Slim

    2012-01-01

    . In this paper, we consider a Heterogeneous network where we complement the macrocell network with low-power low-cost user deployed nodes, such as femtocell base stations to increase the mean achievable capacity of the system. In this context, we integrate macro

  20. Cloud Storage and Bioinformatics in a private cloud deployment: Lessons for Data Intensive research

    OpenAIRE

    Chang, Victor; Walters, Robert John; Wills, Gary

    2013-01-01

    This paper describes service portability for a private cloud deployment, including a detailed case study about Cloud Storage and bioinformatics services developed as part of the Cloud Computing Adoption Framework (CCAF). Our Cloud Storage design and deployment is based on Storage Area Network (SAN) technologies, details of which include functionalities, technical implementation, architecture and user support. Experiments for data services (backup automation, data recovery and data migration) ...

  1. Local Area Networks.

    Science.gov (United States)

    Marks, Kenneth E.; Nielsen, Steven

    1991-01-01

    Discusses cabling that is needed in local area networks (LANs). Types of cables that may be selected are described, including twisted pair, coaxial cables (or ethernet), and fiber optics; network topologies, the manner in which the cables are laid out, are considered; and cable installation issues are discussed. (LRW)

  2. Energy Analysis of Contention Tree-Based Access Protocols in Dense Machine-to-Machine Area Networks

    Directory of Open Access Journals (Sweden)

    Francisco Vázquez-Gallego

    2015-01-01

    Full Text Available Machine-to-Machine (M2M area networks aim at connecting an M2M gateway with a large number of energy-constrained devices that must operate autonomously for years. Therefore, attaining high energy efficiency is essential in the deployment of M2M networks. In this paper, we consider a dense M2M area network composed of hundreds or thousands of devices that periodically transmit data upon request from a gateway or coordinator. We theoretically analyse the devices’ energy consumption using two Medium Access Control (MAC protocols which are based on a tree-splitting algorithm to resolve collisions among devices: the Contention Tree Algorithm (CTA and the Distributed Queuing (DQ access. We have carried out computer-based simulations to validate the accuracy of the theoretical models and to compare the energy performance using DQ, CTA, and Frame Slotted-ALOHA (FSA in M2M area networks with devices in compliance with the IEEE 802.15.4 physical layer. Results show that the performance of DQ is totally independent of the number of contending devices, and it can reduce the energy consumed per device in more than 35% with respect to CTA and in more than 80% with respect to FSA.

  3. Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks

    Science.gov (United States)

    Wu, Peng-Fei; Xiao, Fu; Sha, Chao; Huang, Hai-Ping; Wang, Ru-Chuan; Xiong, Nai-Xue

    2017-01-01

    Unlike conventional scalar sensors, camera sensors at different positions can capture a variety of views of an object. Based on this intrinsic property, a novel model called full-view coverage was proposed. We study the problem that how to select the minimum number of sensors to guarantee the full-view coverage for the given region of interest (ROI). To tackle this issue, we derive the constraint condition of the sensor positions for full-view neighborhood coverage with the minimum number of nodes around the point. Next, we prove that the full-view area coverage can be approximately guaranteed, as long as the regular hexagons decided by the virtual grid are seamlessly stitched. Then we present two solutions for camera sensor networks in two different deployment strategies. By computing the theoretically optimal length of the virtual grids, we put forward the deployment pattern algorithm (DPA) in the deterministic implementation. To reduce the redundancy in random deployment, we come up with a local neighboring-optimal selection algorithm (LNSA) for achieving the full-view coverage. Finally, extensive simulation results show the feasibility of our proposed solutions. PMID:28587304

  4. Node Scheduling Strategies for Achieving Full-View Area Coverage in Camera Sensor Networks

    Directory of Open Access Journals (Sweden)

    Peng-Fei Wu

    2017-06-01

    Full Text Available Unlike conventional scalar sensors, camera sensors at different positions can capture a variety of views of an object. Based on this intrinsic property, a novel model called full-view coverage was proposed. We study the problem that how to select the minimum number of sensors to guarantee the full-view coverage for the given region of interest (ROI. To tackle this issue, we derive the constraint condition of the sensor positions for full-view neighborhood coverage with the minimum number of nodes around the point. Next, we prove that the full-view area coverage can be approximately guaranteed, as long as the regular hexagons decided by the virtual grid are seamlessly stitched. Then we present two solutions for camera sensor networks in two different deployment strategies. By computing the theoretically optimal length of the virtual grids, we put forward the deployment pattern algorithm (DPA in the deterministic implementation. To reduce the redundancy in random deployment, we come up with a local neighboring-optimal selection algorithm (LNSA for achieving the full-view coverage. Finally, extensive simulation results show the feasibility of our proposed solutions.

  5. Mitigating Inter-Network Interference in LoRa Networks

    OpenAIRE

    Voigt, Thiemo; Bor, Martin; Roedig, Utz; Alonso, Juan

    2017-01-01

    Long Range (LoRa) is a popular technology used to construct Low-Power Wide-Area Network (LPWAN) networks. Given the popularity of LoRa it is likely that multiple independent LoRa networks are deployed in close proximity. In this situation, neighbouring networks interfere and methods have to be found to combat this interference. In this paper we investigate the use of directional antennae and the use of multiple base stations as methods of dealing with inter-network interference. Directional a...

  6. Hybrid RRM Architecture for Future Wireless Networks

    DEFF Research Database (Denmark)

    Tragos, Elias; Mihovska, Albena D.; Mino, Emilio

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios from local area to wide area wireless networks. The integration of cellular and local area networks in a unique radio system will provide a g...

  7. Analytical bounds on the area spectral efficiency of uplink heterogeneous networks over generalized fading channels

    KAUST Repository

    Shakir, Muhammad

    2014-06-01

    Heterogeneous networks (HetNets) are envisioned to enable next-generation cellular networks by providing higher spectral and energy efficiency. A HetNet is typically composed of multiple radio access technologies where several low-power low-cost operators or user-deployed small-cell base stations (SBSs) complement the macrocell network. In this paper, we consider a two-tier HetNet where the SBSs are arranged around the edge of the reference macrocell such that the resultant configuration is referred to as cell-on-edge (COE). Each mobile user in a small cell is considered capable of adapting its uplink transmit power according to a location-based slow power control mechanism. The COE configuration is observed to increase the uplink area spectral efficiency (ASE) and energy efficiency while reducing the cochannel interference power. A moment-generating-function (MGF)-based approach has been exploited to derive the analytical bounds on the uplink ASE of the COE configuration. The derived expressions are generalized for any composite fading distribution, and closed-form expressions are presented for the generalized- K fading channels. Simulation results are included to support the analysis and to show the efficacy of the COE configuration. A comparative performance analysis is also provided to demonstrate the improvements in the performance of cell-edge users of the COE configuration compared with that of macro-only networks (MoNets) and other unplanned deployment strategies. © 2013 IEEE.

  8. Interference-Aware Radio Resource Management for Local Area Wireless Networks

    Directory of Open Access Journals (Sweden)

    Ribeiro CássioB

    2011-01-01

    Full Text Available Interference-aware multiple access is an enabler to cost-efficient and reliable high data-rate local area wireless access. In this paper, we propose an interference-aware radio resource management scheme where receivers inform about their throughput, interference, and signal levels by means of broadcast messages tied to data reception. In the proposed scheme, the conventional scheduler is extended to interference-aware operation where individual scheduling decisions are based on estimated change in system-level performance. The performance of the proposed scheme is evaluated in system simulations where it is compared to a conventional scheduler and a centralized scheduler (global optimum. The convergence of the proposed scheduler is analyzed and signaling overhead of an example implementation is characterized. The results demonstrate that the proposed scheme enables fair and efficient wireless access in challenging interference scenarios, for example, multiple networks deployed in the same geographical area and sharing a common band.

  9. 5th International Workshop on Real-World Wireless Sensor Networks

    CERN Document Server

    Hu, Wen; Ferrari, Federico; Zimmerling, Marco; Mottola, Luca

    2014-01-01

    This edited book presents the results of the 5th Workshop on Real-world Wireless Sensor Networks (REALWSN). The purpose of this workshop  was to bring together researchers and practitioners working in the area of sensor networks, with focus on real-world experiments or deployments of wireless sensor networks. Included were, nonetheless, emerging forms of sensing such as those that leverage smart phones, Internet of Things, RFIDs, and robots. Indeed, when working with real-world experiments or deployments, many new or unforeseen issues may arise: the network environment may be composed of a variety of different technologies, leading to very heterogeneous network structures; software development for large scale networks poses new types of problems; the performance of prototype networks may differ significantly from the deployed system; whereas actual sensor network deployments may need a complex combination of autonomous and manual configuration. Furthermore, results obtained through simulation are typically n...

  10. On Applications of Disruption Tolerant Networking to Optical Networking in Space

    Science.gov (United States)

    Hylton, Alan Guy; Raible, Daniel E.; Juergens, Jeffrey; Iannicca, Dennis

    2012-01-01

    The integration of optical communication links into space networks via Disruption Tolerant Networking (DTN) is a largely unexplored area of research. Building on successful foundational work accomplished at JPL, we discuss a multi-hop multi-path network featuring optical links. The experimental test bed is constructed at the NASA Glenn Research Center featuring multiple Ethernet-to-fiber converters coupled with free space optical (FSO) communication channels. The test bed architecture models communication paths from deployed Mars assets to the deep space network (DSN) and finally to the mission operations center (MOC). Reliable versus unreliable communication methods are investigated and discussed; including reliable transport protocols, custody transfer, and fragmentation. Potential commercial applications may include an optical communications infrastructure deployment to support developing nations and remote areas, which are unburdened with supporting an existing heritage means of telecommunications. Narrow laser beam widths and control of polarization states offer inherent physical layer security benefits with optical communications over RF solutions. This paper explores whether or not DTN is appropriate for space-based optical networks, optimal payload sizes, reliability, and a discussion on security.

  11. Deployment of wireless sensor network in pyrochemical processing of metallic fuels

    International Nuclear Information System (INIS)

    Baghyalakshmi, D.; Shrikrishnan, T.S.; Ebenezer, Jemimah; Madhusoodanan, K.; Satya Murty, S.A.V.; Vannia Perumal, S.; Venkatesh, P.; Prabhakara Reddy, B.

    2016-01-01

    With the advent of wireless sensor networking technology, industries started adapting the wireless monitoring systems in phases to measure and control various process parameters. To test the feasibility for implementing Wireless Sensor Network to measure the potentials of an electrochemical cell and the temperatures of actinide drawdown process at Pyrochemical process studies laboratory, at Chemistry Group, IGCAR, Kalpakkam, experiments have been carried out. An experimental setup with two Wireless Sensor Networking nodes has been deployed inside argon atmosphere glove boxes. The Electrorefining studies on U and U based alloys and the studies on actinide recovery from the electrolyte salt in actinide drawdown process are carried out in the glove box. The WSN measuring system was tested and validated by measuring the potentials of an electrochemical cell and the temperatures of actinide drawdown process. The WSN system is proposed to be installed in the hot cells of the Chemistry Group where irradiated U-Zr fuel is reprocessed. This paper briefs the need for remote measuring in pyrochemical reprocessing and validation of the remote signals by measuring the potentials of an electrochemical cell and the temperatures of the actinide draw down process. (author)

  12. Enhanced Deployment Strategy for Role-Based Hierarchical Application Agents in Wireless Sensor Networks with Established Clusterheads

    Science.gov (United States)

    Gendreau, Audrey

    2014-01-01

    Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…

  13. Deployment of Low-Cost, Carbon Dioxide Sensors throughout the Washington Metropolitan Area - The Capital Climate Initiative

    Science.gov (United States)

    Caine, Kristen M.; Bailey, D. Michelle; Houston Miller, J.

    2016-04-01

    According to the IPCC from 1995 to 2005, atmospheric carbon dioxide (CO2) concentrations increased by 19 ppm, the highest average growth rate recorded for any decade since measurements began in the 1950s. Due to its ability to influence global climate change, it is imperative to continually monitor carbon dioxide emission levels, particularly in urban areas where some estimate in excess of 75% of total greenhouse gas emissions occur. Although high-precision sensors are commercially available, these are not cost effective for mapping a large spatial area. A goal of this research is to build out a network of sensors that are accurate and precise enough to provide a valuable data tool for accessing carbon emissions from a large, urban area. This publically available greenhouse gas dataset can be used in numerous environmental assessments and as validation for remote sensing products. It will also be a valuable teaching tool for classes at our university and will promote further engagement of K-12 students and their teachers through education and outreach activities. Each of our sensors (referred to as "PiOxides") utilizes a non-dispersive infrared (NDIR) sensor for the detection of carbon dioxide along with a combination pressure/temperature/humidity sensor. The collection of pressure and temperature increases the accuracy and precision of the CO2 measurement. The sensors communicate using a serial interfaces with a Raspberry Pi microcontroller. Each PiOxide is connected to a website that leverages recent developments in open source GIS tools. In this way, data from individual sensors can be followed individually or aggregated to provide real-time, spatially-resolved data of CO2 trends across a broad area. Our goal for the network is to expand across the entire DC/Maryland/Virginia Region through partnerships with private and public schools. We are also designing GHG Bluetooth beacons that may be accessed by mobile phone users in their vicinity. In two additional

  14. Localization-Free Detection of Replica Node Attacks in Wireless Sensor Networks Using Similarity Estimation with Group Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Chao Ding

    2017-01-01

    Full Text Available Due to the unattended nature and poor security guarantee of the wireless sensor networks (WSNs, adversaries can easily make replicas of compromised nodes, and place them throughout the network to launch various types of attacks. Such an attack is dangerous because it enables the adversaries to control large numbers of nodes and extend the damage of attacks to most of the network with quite limited cost. To stop the node replica attack, we propose a location similarity-based detection scheme using deployment knowledge. Compared with prior solutions, our scheme provides extra functionalities that prevent replicas from generating false location claims without deploying resource-consuming localization techniques on the resource-constraint sensor nodes. We evaluate the security performance of our proposal under different attack strategies through heuristic analysis, and show that our scheme achieves secure and robust replica detection by increasing the cost of node replication. Additionally, we evaluate the impact of network environment on the proposed scheme through theoretic analysis and simulation experiments, and indicate that our scheme achieves effectiveness and efficiency with substantially lower communication, computational, and storage overhead than prior works under different situations and attack strategies.

  15. ASCR Science Network Requirements

    Energy Technology Data Exchange (ETDEWEB)

    Dart, Eli; Tierney, Brian

    2009-08-24

    The Energy Sciences Network (ESnet) is the primary provider of network connectivity for the US Department of Energy Office of Science, the single largest supporter of basic research in the physical sciences in the United States. In support of the Office of Science programs, ESnet regularly updates and refreshes its understanding of the networking requirements of the instruments, facilities, scientists, and science programs that it serves. This focus has helped ESnet to be a highly successful enabler of scientific discovery for over 20 years. In April 2009 ESnet and the Office of Advanced Scientific Computing Research (ASCR), of the DOE Office of Science, organized a workshop to characterize the networking requirements of the programs funded by ASCR. The ASCR facilities anticipate significant increases in wide area bandwidth utilization, driven largely by the increased capabilities of computational resources and the wide scope of collaboration that is a hallmark of modern science. Many scientists move data sets between facilities for analysis, and in some cases (for example the Earth System Grid and the Open Science Grid), data distribution is an essential component of the use of ASCR facilities by scientists. Due to the projected growth in wide area data transfer needs, the ASCR supercomputer centers all expect to deploy and use 100 Gigabit per second networking technology for wide area connectivity as soon as that deployment is financially feasible. In addition to the network connectivity that ESnet provides, the ESnet Collaboration Services (ECS) are critical to several science communities. ESnet identity and trust services, such as the DOEGrids certificate authority, are widely used both by the supercomputer centers and by collaborations such as Open Science Grid (OSG) and the Earth System Grid (ESG). Ease of use is a key determinant of the scientific utility of network-based services. Therefore, a key enabling aspect for scientists beneficial use of high

  16. Optimization Techniques for 3D Graphics Deployment on Mobile Devices

    Science.gov (United States)

    Koskela, Timo; Vatjus-Anttila, Jarkko

    2015-03-01

    3D Internet technologies are becoming essential enablers in many application areas including games, education, collaboration, navigation and social networking. The use of 3D Internet applications with mobile devices provides location-independent access and richer use context, but also performance issues. Therefore, one of the important challenges facing 3D Internet applications is the deployment of 3D graphics on mobile devices. In this article, we present an extensive survey on optimization techniques for 3D graphics deployment on mobile devices and qualitatively analyze the applicability of each technique from the standpoints of visual quality, performance and energy consumption. The analysis focuses on optimization techniques related to data-driven 3D graphics deployment, because it supports off-line use, multi-user interaction, user-created 3D graphics and creation of arbitrary 3D graphics. The outcome of the analysis facilitates the development and deployment of 3D Internet applications on mobile devices and provides guidelines for future research.

  17. Addressing service delivery in rural areas through deployment of information and communication technology platforms

    CSIR Research Space (South Africa)

    Foko, Thato E

    2017-05-01

    Full Text Available deployment of ICT Platforms in the rural areas. The contribution of ICT Platform adds to the important notion of access which enhances service delivery. This is seen through the Technology Acceptance Models used in this paper. The main research methodology...

  18. SYNTHESIS AND REDUCED LOGIC GATE REALIZATION OF MULTI-VALUED LOGIC FUNCTIONS USING NEURAL NETWORK DEPLOYMENT ALGORITHM

    Directory of Open Access Journals (Sweden)

    A. K. CHOWDHURY

    2016-02-01

    Full Text Available In this paper an evolutionary technique for synthesizing Multi-Valued Logic (MVL functions using Neural Network Deployment Algorithm (NNDA is presented. The algorithm is combined with back-propagation learning capability and neural MVL operators. This research article is done to observe the anomalistic characteristics of MVL neural operators and their role in synthesis. The advantages of NNDA-MVL algorithm is demonstrated with realization of synthesized many valued functions with lesser MVL operators. The characteristic feature set consists of MVL gate count, network link count, network propagation delay and accuracy achieved in training. In brief, this paper depicts an effort of reduced network size for synthesized MVL functions. Trained MVL operators improve the basic architecture by reducing MIN gate and interlink connection by 52.94% and 23.38% respectively.

  19. Local area networking handbook

    OpenAIRE

    O'Hara, Patricia A.

    1990-01-01

    Approved for public release; distribution is unlimited. This thesis provides Navy shore based commands with sufficient information on local area networking to (1) decide if they need a LAN, (2) determine what their networking requirements are, and (3) select a LAN that satisfies their requirements. LAN topologies, transmission media, and medium access methods are described. In addition, the OSI reference model for computer networking and the IEEE 802 LAN standards are explained in detail. ...

  20. Deployment Strategies and Clustering Protocols Efficiency

    Directory of Open Access Journals (Sweden)

    Chérif Diallo

    2017-06-01

    Full Text Available Wireless sensor networks face significant design challenges due to limited computing and storage capacities and, most importantly, dependence on limited battery power. Energy is a critical resource and is often an important issue to the deployment of sensor applications that claim to be omnipresent in the world of future. Thus optimizing the deployment of sensors becomes a major constraint in the design and implementation of a WSN in order to ensure better network operations. In wireless networking, clustering techniques add scalability, reduce the computation complexity of routing protocols, allow data aggregation and then enhance the network performance. The well-known MaxMin clustering algorithm was previously generalized, corrected and validated. Then, in a previous work we have improved MaxMin by proposing a Single- node Cluster Reduction (SNCR mechanism which eliminates single-node clusters and then improve energy efficiency. In this paper, we show that MaxMin, because of its original pathological case, does not support the grid deployment topology, which is frequently used in WSN architectures. The unreliability feature of the wireless links could have negative impacts on Link Quality Indicator (LQI based clustering protocols. So, in the second part of this paper we show how our distributed Link Quality based d- Clustering Protocol (LQI-DCP has good performance in both stable and high unreliable link environments. Finally, performance evaluation results also show that LQI-DCP fully supports the grid deployment topology and is more energy efficient than MaxMin.

  1. SON for LTE-WLAN access network selection : design and performance

    NARCIS (Netherlands)

    Willemen, P.; Laselva, D.; Wang, Y.; Kovács, I.; Djapic, R.; Moerman, I.

    2016-01-01

    Mobile network operators (MNOs) are deploying carrier-grade Wireless Local Area Network (WLAN) as an important complementary system to cellular networks. Access network selection (ANS) between cellular and WLAN is an essential component to improve network performance and user quality-of-service

  2. Area and Power Modeling for Networks-on-Chip with Layout Awareness

    Directory of Open Access Journals (Sweden)

    Paolo Meloni

    2007-01-01

    Full Text Available Networks-on-Chip (NoCs are emerging as scalable interconnection architectures, designed to support the increasing amount of cores that are integrated onto a silicon die. Compared to traditional interconnects, however, NoCs still lack well established CAD deployment tools to tackle the large amount of available degrees of freedom, starting from the choice of a network topology. “Silicon-aware” optimization tools are now emerging in literature; they select an NoC topology taking into account the tradeoff between performance and hardware cost, that is, area and power consumption. A key requirement for the effectiveness of these tools, however, is the availability of accurate analytical models for power and area. Such models are unfortunately not as available and well understood as those for traditional communication fabrics. Further, simplistic models may turn out to be totally inaccurate when applied to wire dominated architectures; this observation demands at least for a model validation step against placed and routed devices. In this work, given an NoC reference architecture, we present a flow to devise analytical models of area occupation and power consumption of NoC switches, and propose strategies for coefficient characterization which have different tradeoffs in terms of accuracy and of modeling activity effort. The models are parameterized on several architectural, synthesis-related, and traffic variables, resulting in maximum flexibility. We finally assess the accuracy of the models, checking whether they can also be applied to placed and routed NoC blocks.

  3. Experimental performance evaluation of software defined networking (SDN) based data communication networks for large scale flexi-grid optical networks.

    Science.gov (United States)

    Zhao, Yongli; He, Ruiying; Chen, Haoran; Zhang, Jie; Ji, Yuefeng; Zheng, Haomian; Lin, Yi; Wang, Xinbo

    2014-04-21

    Software defined networking (SDN) has become the focus in the current information and communication technology area because of its flexibility and programmability. It has been introduced into various network scenarios, such as datacenter networks, carrier networks, and wireless networks. Optical transport network is also regarded as an important application scenario for SDN, which is adopted as the enabling technology of data communication networks (DCN) instead of general multi-protocol label switching (GMPLS). However, the practical performance of SDN based DCN for large scale optical networks, which is very important for the technology selection in the future optical network deployment, has not been evaluated up to now. In this paper we have built a large scale flexi-grid optical network testbed with 1000 virtual optical transport nodes to evaluate the performance of SDN based DCN, including network scalability, DCN bandwidth limitation, and restoration time. A series of network performance parameters including blocking probability, bandwidth utilization, average lightpath provisioning time, and failure restoration time have been demonstrated under various network environments, such as with different traffic loads and different DCN bandwidths. The demonstration in this work can be taken as a proof for the future network deployment.

  4. Advanced Networks in Motion Mobile Sensorweb

    Science.gov (United States)

    Ivancic, William D.; Stewart, David H.

    2011-01-01

    Advanced mobile networking technology applicable to mobile sensor platforms was developed, deployed and demonstrated. A two-tier sensorweb design was developed. The first tier utilized mobile network technology to provide mobility. The second tier, which sits above the first tier, utilizes 6LowPAN (Internet Protocol version 6 Low Power Wireless Personal Area Networks) sensors. The entire network was IPv6 enabled. Successful mobile sensorweb system field tests took place in late August and early September of 2009. The entire network utilized IPv6 and was monitored and controlled using a remote Web browser via IPv6 technology. This paper describes the mobile networking and 6LowPAN sensorweb design, implementation, deployment and testing as well as wireless systems and network monitoring software developed to support testing and validation.

  5. Power allocation strategies to minimize energy consumption in wireless body area networks.

    Science.gov (United States)

    Kailas, Aravind

    2011-01-01

    The wide scale deployment of wireless body area networks (WBANs) hinges on designing energy efficient communication protocols to support the reliable communication as well as to prolong the network lifetime. Cooperative communications, a relatively new idea in wireless communications, offers the benefits of multi-antenna systems, thereby improving the link reliability and boosting energy efficiency. In this short paper, the advantages of resorting to cooperative communications for WBANs in terms of minimized energy consumption are investigated. Adopting an energy model that encompasses energy consumptions in the transmitter and receiver circuits, and transmitting energy per bit, it is seen that cooperative transmission can improve energy efficiency of the wireless network. In particular, the problem of optimal power allocation is studied with the constraint of targeted outage probability. Two strategies of power allocation are considered: power allocation with and without posture state information. Using analysis and simulation-based results, two key points are demonstrated: (i) allocating power to the on-body sensors making use of the posture information can reduce the total energy consumption of the WBAN; and (ii) when the channel condition is good, it is better to recruit less relays for cooperation to enhance energy efficiency.

  6. Optimizing small cell deployment by the use of C-RANs

    DEFF Research Database (Denmark)

    Checko, Aleksandra; Holm, Henrik Laumand; Christiansen, Henrik Lehrmann

    2014-01-01

    A Cloud Radio Access Network (C-RAN) is a novel mobile network architecture that has the potential to support extremely dense mobile network deployments enhancing the network capacity while offering cost savings on baseband resources. In this work we analyze cell traffic profiles and evaluate...... the conditions that impact the statistical multiplexing gain in the Baseband Unit (BBU) Pool. We conclude on the set of parameters that maximize the statistical multiplexing gain, leading to the highest potential cost savings. We then propose a packet based architecture that can adapt to changing traffic...... conditions. Furthermore, based on theoretical calculations and Network simulations we present considerations on deployment scenarios to optimize green field deployments in terms of Total Cost of Ownership (TCO). This involves optimizing the mix of cells with different traffic profiles and the BBU Pool...

  7. Dual stack deployment in a carrier grade network to fulfill the demands of next generation of internet

    International Nuclear Information System (INIS)

    Khanzada, T.J.S.

    2013-01-01

    The Internet is migrating from IPv4 (Internet Protocol version 4) to IPv6 (Internet Protocol version 6). The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority) and will be soon exhausted in RIR (Regional Internet Registry) while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge. (author)

  8. Dual Stack Deployment in a Carrier Grade Network to Fulfill the Demands of Next Generation of Internet

    Directory of Open Access Journals (Sweden)

    Tarique Jamil Saifullah Khanzada

    2013-07-01

    Full Text Available The Internet is migrating from IPv4 (Internet Protocol version 4 to IPv6 (Internet Protocol version 6. The high cost of migration services from IPv4-IPv6 and system complexity are main factors for slow adaption of IPv6 This paper presents the implementation of migration techniques from IPv4-IPv6. Furthermore, existing IPv4 addresses have already been depleted in IANA (Internet Assigned Numbers Authority and will be soon exhausted in RIR (Regional Internet Registry while more clients are joining the Internet. Slower rate of the progress of IPv6 confirms complete shifting from IPv4-IPv6 at once is still long away, although fewer parts of IPv6 have been employed in current market goods. Integration of IPv4 and IPv6 is carried in order to take care of online users. In this paper, it is suggested that hierarchical direction finding structural design in IPv4 and IPv6 will improve the efficiency of IPv4 network. This research work provides the way to design the network scenario for the carrier grade set of connections. The carrier grade network scenario routers are named to be Karachi, Sukkur, Islamabad, Multan and Peshawar for the managerial simulation purposes. The carrier grade network deployment is implemented along with dual stack to migrate to IPv6. This study holds the way to deploy IPv4-IPv6 carrier grade network by providing real time scenario which is yet not considered in the literature to the best of our knowledge

  9. EU Armed Forces' Use of Social Media in Areas of Deployment

    OpenAIRE

    Hellman, Maria; Olsson, Eva-Karin; Wagnsson, Charlotte

    2016-01-01

    The advent of social media can be seen both as a risk and an opportunity by armed forces. Previous research has primarily examined whether or not the use of social media endangers or strengthens armed forces’ strategic narrative. We examine armed forces’ perceptions of risks and opportunities on a broad basis, with a particular focus on areas of deployment. The article is based on a survey of perceptions of social media amongst the armed forces of EU member states, thus adding to previous res...

  10. A comprehensive survey of energy-aware routing protocols in wireless body area sensor networks.

    Science.gov (United States)

    Effatparvar, Mehdi; Dehghan, Mehdi; Rahmani, Amir Masoud

    2016-09-01

    Wireless body area sensor network is a special purpose wireless sensor network that, employing wireless sensor nodes in, on, or around the human body, makes it possible to measure biological parameters of a person for specific applications. One of the most fundamental concerns in wireless body sensor networks is accurate routing in order to send data promptly and properly, and therefore overcome some of the challenges. Routing protocols for such networks are affected by a large number of factors including energy, topology, temperature, posture, the radio range of sensors, and appropriate quality of service in sensor nodes. Since energy is highly important in wireless body area sensor networks, and increasing the network lifetime results in benefiting greatly from sensor capabilities, improving routing performance with reduced energy consumption presents a major challenge. This paper aims to study wireless body area sensor networks and the related routing methods. It also presents a thorough, comprehensive review of routing methods in wireless body area sensor networks from the perspective of energy. Furthermore, different routing methods affecting the parameter of energy will be classified and compared according to their advantages and disadvantages. In this paper, fundamental concepts of wireless body area sensor networks are provided, and then the advantages and disadvantages of these networks are investigated. Since one of the most fundamental issues in wireless body sensor networks is to perform routing so as to transmit data precisely and promptly, we discuss the same issue. As a result, we propose a classification of the available relevant literature with respect to the key challenge of energy in the routing process. With this end in view, all important papers published between 2000 and 2015 are classified under eight categories including 'Mobility-Aware', 'Thermal-Aware', 'Restriction of Location and Number of Relays', 'Link-aware', 'Cluster- and Tree

  11. Use of positioning information for performance enhancement of uncoordinated heterogeneous network deployment

    DEFF Research Database (Denmark)

    Semov, Plamen T.; Mihovska, Albena D.; Prasad, Ramjee

    2013-01-01

    with information but the locations of the mobile users and neighboring cells to solve the problem of dynamic physical resource assignment in uncoordinated scenario while accounting for improved allocation and scheduling. The results are compared to the performance when known scheduling algorithms are employed......This paper proposes a novel algorithm for dynamic physical resource allocation based on the use of positioning information during carrier aggregation (CA) in a semi-and uncoordinated deployment of heterogeneous networks (HetNet). The algorithm uses the known Q-learning method enhanced...... and show increased cell throughput, while maintaining an adequate user throughput when employing Q-learning with positioning information....

  12. Local Area Networks (The Printout).

    Science.gov (United States)

    Aron, Helen; Balajthy, Ernest

    1989-01-01

    Describes the Local Area Network (LAN), a project in which students used LAN-based word processing and electronic mail software as the center of a writing process approach. Discusses the advantages and disadvantages of networking. (MM)

  13. Network preservation through a topology control algorithm for wireless mesh networks

    CSIR Research Space (South Africa)

    Aron, FO

    2008-09-01

    Full Text Available to the wireless infrastructure-based networks. The benefits of WMN deployments, however, come with certain challenges e.g., power management. While focussing on WMN applications in rural areas, this paper explains the need for transmit power consumption control...

  14. Design and deployment of an elastic network test-bed in IHEP data center based on SDN

    Science.gov (United States)

    Zeng, Shan; Qi, Fazhi; Chen, Gang

    2017-10-01

    High energy physics experiments produce huge amounts of raw data, while because of the sharing characteristics of the network resources, there is no guarantee of the available bandwidth for each experiment which may cause link congestion problems. On the other side, with the development of cloud computing technologies, IHEP have established a cloud platform based on OpenStack which can ensure the flexibility of the computing and storage resources, and more and more computing applications have been deployed on virtual machines established by OpenStack. However, under the traditional network architecture, network capability can’t be required elastically, which becomes the bottleneck of restricting the flexible application of cloud computing. In order to solve the above problems, we propose an elastic cloud data center network architecture based on SDN, and we also design a high performance controller cluster based on OpenDaylight. In the end, we present our current test results.

  15. Pervasive surveillance-agent system based on wireless sensor networks: design and deployment

    International Nuclear Information System (INIS)

    Martínez, José F; Bravo, Sury; García, Ana B; Corredor, Iván; Familiar, Miguel S; López, Lourdes; Hernández, Vicente; Da Silva, Antonio

    2010-01-01

    Nowadays, proliferation of embedded systems is enhancing the possibilities of gathering information by using wireless sensor networks (WSNs). Flexibility and ease of installation make these kinds of pervasive networks suitable for security and surveillance environments. Moreover, the risk for humans to be exposed to these functions is minimized when using these networks. In this paper, a virtual perimeter surveillance agent, which has been designed to detect any person crossing an invisible barrier around a marked perimeter and send an alarm notification to the security staff, is presented. This agent works in a state of 'low power consumption' until there is a crossing on the perimeter. In our approach, the 'intelligence' of the agent has been distributed by using mobile nodes in order to discern the cause of the event of presence. This feature contributes to saving both processing resources and power consumption since the required code that detects presence is the only system installed. The research work described in this paper illustrates our experience in the development of a surveillance system using WNSs for a practical application as well as its evaluation in real-world deployments. This mechanism plays an important role in providing confidence in ensuring safety to our environment

  16. From a Real Deployment to a Downscaled Testbed : A Methodological Approach

    NARCIS (Netherlands)

    Stajkic, Andrea; Abrignani, Melchiorre Danilo; Buratti, Chiara; Bettinelli, Andrea; Vigo, Daniele; Verdone, Roberto

    2016-01-01

    This paper proposes a novel methodology for the spatial downscaling of real-world deployments of wireless networks, running protocols, and/or applications for the Internet of Things (IoT). These networks are often deployed in environments not easily accessible and highly unpredictable, where doing

  17. United States National Seismographic Network

    International Nuclear Information System (INIS)

    Buland, R.

    1993-09-01

    The concept of a United States National Seismograph Network (USNSN) dates back nearly 30 years. The idea was revived several times over the decades. but never funded. For, example, a national network was proposed and discussed at great length in the so called Bolt Report (U. S. Earthquake Observatories: Recommendations for a New National Network, National Academy Press, Washington, D.C., 1980, 122 pp). From the beginning, a national network was viewed as augmenting and complementing the relatively dense, predominantly short-period vertical coverage of selected areas provided by the Regional Seismograph Networks (RSN's) with a sparse, well-distributed network of three-component, observatory quality, permanent stations. The opportunity finally to begin developing a national network arose in 1986 with discussions between the US Geological Survey (USGS) and the Nuclear Regulatory Commission (NRC). Under the agreement signed in 1987, the NRC has provided $5 M in new funding for capital equipment (over the period 1987-1992) and the USGS has provided personnel and facilities to develop. deploy, and operate the network. Because the NRC funding was earmarked for the eastern United States, new USNSN station deployments are mostly east of 105 degree W longitude while the network in the western United States is mostly made up of cooperating stations (stations meeting USNSN design goals, but deployed and operated by other institutions which provide a logical extension to the USNSN)

  18. Real-time network traffic classification technique for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    Network traffic or data traffic in a Wireless Local Area Network (WLAN) is the amount of network packets moving across a wireless network from each wireless node to another wireless node, which provide the load of sampling in a wireless network. WLAN's Network traffic is the main component for network traffic measurement, network traffic control and simulation. Traffic classification technique is an essential tool for improving the Quality of Service (QoS) in different wireless networks in the complex applications such as local area networks, wireless local area networks, wireless personal area networks, wireless metropolitan area networks, and wide area networks. Network traffic classification is also an essential component in the products for QoS control in different wireless network systems and applications. Classifying network traffic in a WLAN allows to see what kinds of traffic we have in each part of the network, organize the various kinds of network traffic in each path into different classes in each path, and generate network traffic matrix in order to Identify and organize network traffic which is an important key for improving the QoS feature. To achieve effective network traffic classification, Real-time Network Traffic Classification (RNTC) algorithm for WLANs based on Compressed Sensing (CS) is presented in this paper. The fundamental goal of this algorithm is to solve difficult wireless network management problems. The proposed architecture allows reducing False Detection Rate (FDR) to 25% and Packet Delay (PD) to 15 %. The proposed architecture is also increased 10 % accuracy of wireless transmission, which provides a good background for establishing high quality wireless local area networks.

  19. Performance Analysis of Relays in LTE for a Realistic Suburban Deployment Scenario

    DEFF Research Database (Denmark)

    Coletti, Claudio; Mogensen, Preben; Irmer, Ralf

    2011-01-01

    Relays are likely to play an important role in the deployment of Beyond 3G networks, such as LTE-Advanced, thanks to the possibility of effectively extending Macro network coverage and fulfilling the expected high data-rate requirements. Up until now, the relay technology potential and its cost......-effectiveness have been widely investigated in the literature, considering mainly statistical deployment scenarios, like regular networks with uniform traffic distribution. This paper is envisaged to illustrate the performances of different relay technologies (In-Band/Out-band) in a realistic suburban network...... scenario with real Macro site positions, user density map and spectrum band availability. Based on a proposed heuristic deployment algorithm, results show that deploying In-band relays can significantly reduce the user outage if high backhaul link quality is ensured, whereas Out-band relaying and the usage...

  20. Design and implementation about the campus wireless network

    International Nuclear Information System (INIS)

    Qi Fazhi; An Dehai; Wang Yanming; Cui Tao; Chen Gang; Liu Baoxu

    2007-01-01

    With the development of network applications, flexibility and wieldy is becoming more and more important for network users. Based on the analysis of the needs of campus wireless network. This article design and analysis the deployment mechanism, register system and protection system of wireless network. Built a wireless network system base on IHEP network environment, realization the 'always and everywhere' access the network in the IHEP campus area. (authors)

  1. Cognitive networks applications and deployments

    CERN Document Server

    Lloret Mauri, Jaime; Rawat, Danda B; Perez, Javier Manuel Aguiar

    2014-01-01

    INTRODUCTIONEfficient Spectrum Management: Challenges and Solutions; Tarek M. Salem, Sherine M. Abdel-Kader, Salah M. Abdel-MaGeid, and Mohamed ZakiA Survey on Joint Routing and Dynamic spectrum Access in Cognitive Radio Networks; Xianzhong Xie, Helin Yang, and Athanasios V. VasilakosNeighbor Discovery for Cognitive Radio Networks; Athar Ali Khan, Mubashir Husain Rehmani, and Yasir SaleemSPECTRUM SENSINGTime-Domain Cognitive Sensor Networking; Stefano Busanelli, Gianluigi Ferrari, Alessandro Colazzo, and Jean-Michel DricotSpectrum Sensing in Cognitive Wireless Networks; Danda B. Rawat and Chan

  2. How to ensure reliable connectivity for aerial vehicles over cellular networks

    DEFF Research Database (Denmark)

    Nguyen, Huan Cong; Amorim, Rafhael Medeiros de; Wigard, Jeroen

    2018-01-01

    reliable operation of aerial vehicles in various deployment scenarios. In this paper, we investigate the performance of aerial radio connectivity in a typical rural area network deployment using extensive channel measurements and system simulations. First, we highlight that downlink and uplink radio...

  3. Real-life C-RAN deployment considerations

    DEFF Research Database (Denmark)

    Hansen, Line Maria Pyndt; Ruepp, Sarah Renée; Christiansen, Henrik Lehrmann

    2017-01-01

    procedures and best practices for roll out are yet to be established. This work provides a case study, where a small but densely populated part of the network owned by the Danish mobile network operator, TDC, is evaluated for C-RAN deployment. A roadmap is provided which uses traffic data as input...

  4. Wireless local network architecture for Naval medical treatment facilities

    OpenAIRE

    Deason, Russell C.

    2004-01-01

    Approved for public release; distribution is unlimited In today's Navy Medicine, an approach towards wireless networks is coming into view. The idea of developing and deploying workable Wireless Local Area Networks (WLAN) throughout Naval hospitals is but just a few years down the road. Currently Naval Medical Treatment Facilities (MTF) are using wired Local Area Networks (LANs) throughout the infrastructure of each facility. Civilian hospitals and other medical treatment facilities have b...

  5. Potential of dynamic spectrum allocation in LTE macro networks

    Science.gov (United States)

    Hoffmann, H.; Ramachandra, P.; Kovács, I. Z.; Jorguseski, L.; Gunnarsson, F.; Kürner, T.

    2015-11-01

    In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic (i.e. the requested traffic from the users) increases the LTE deployment evolves with macro cells expanded with additional capacity boosting LTE carriers in higher frequency bands complemented with micro or small cells in traffic hotspot areas. For MNOs it is crucial to use the LTE spectrum assets, as well as the installed network infrastructure, in the most cost efficient way. The dynamic spectrum allocation (DSA) aims at (de)activating the available LTE frequency carriers according to the temporal and spatial traffic variations in order to increase the overall LTE system performance in terms of total network capacity by reducing the interference. This paper evaluates the DSA potential of achieving the envisaged performance improvement and identifying in which system and traffic conditions the DSA should be deployed. A self-optimised network (SON) DSA algorithm is also proposed and evaluated. The evaluations have been carried out in a hexagonal and a realistic site-specific urban macro layout assuming a central traffic hotspot area surrounded with an area of lower traffic with a total size of approximately 8 × 8 km2. The results show that up to 47 % and up to 40 % possible DSA gains are achievable with regards to the carried system load (i.e. used resources) for homogenous traffic distribution with hexagonal layout and for realistic site-specific urban macro layout, respectively. The SON DSA algorithm evaluation in a realistic site-specific urban macro cell deployment scenario including realistic non-uniform spatial traffic distribution shows insignificant cell throughput (i.e. served traffic) performance gains. Nevertheless, in the SON DSA investigations, a gain of up

  6. Quantum metropolitan optical network based on wavelength division multiplexing.

    Science.gov (United States)

    Ciurana, A; Martínez-Mateo, J; Peev, M; Poppe, A; Walenta, N; Zbinden, H; Martín, V

    2014-01-27

    Quantum Key Distribution (QKD) is maturing quickly. However, the current approaches to its application in optical networks make it an expensive technology. QKD networks deployed to date are designed as a collection of point-to-point, dedicated QKD links where non-neighboring nodes communicate using the trusted repeater paradigm. We propose a novel optical network model in which QKD systems share the communication infrastructure by wavelength multiplexing their quantum and classical signals. The routing is done using optical components within a metropolitan area which allows for a dynamically any-to-any communication scheme. Moreover, it resembles a commercial telecom network, takes advantage of existing infrastructure and utilizes commercial components, allowing for an easy, cost-effective and reliable deployment.

  7. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  8. Increasing the coverage area through relay node deployment in long term evolution advanced cellular networks

    Science.gov (United States)

    Aldhaibani, Jaafar A.; Ahmad, R. B.; Yahya, A.; Azeez, Suzan A.

    2015-05-01

    Wireless multi-hop relay networks have become very important technologies in mobile communications. These networks ensure high throughput and coverage extension with a low cost. The poor capacity at cell edges is not enough to meet with growing demand of high capacity and throughput irrespective of user's placement in the cellular network. In this paper we propose optimal placement of relay node that provides maximum achievable rate at users and enhances the throughput and coverage at cell edge region. The proposed scheme is based on the outage probability at users and taken on account the interference between nodes. Numerical analyses along with simulation results indicated there are an improvement in capacity for users at the cell edge is 40% increment from all cell capacity.

  9. Dynamic Pathloss Model for Future Mobile Communication Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena Dimitrova; Prasad, Ramjee

    2016-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......— Future mobile communication networks (MCNs) are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network...... planning depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  10. A network of genes, genetic disorders, and brain areas.

    Directory of Open Access Journals (Sweden)

    Satoru Hayasaka

    Full Text Available The network-based approach has been used to describe the relationship among genes and various phenotypes, producing a network describing complex biological relationships. Such networks can be constructed by aggregating previously reported associations in the literature from various databases. In this work, we applied the network-based approach to investigate how different brain areas are associated to genetic disorders and genes. In particular, a tripartite network with genes, genetic diseases, and brain areas was constructed based on the associations among them reported in the literature through text mining. In the resulting network, a disproportionately large number of gene-disease and disease-brain associations were attributed to a small subset of genes, diseases, and brain areas. Furthermore, a small number of brain areas were found to be associated with a large number of the same genes and diseases. These core brain regions encompassed the areas identified by the previous genome-wide association studies, and suggest potential areas of focus in the future imaging genetics research. The approach outlined in this work demonstrates the utility of the network-based approach in studying genetic effects on the brain.

  11. Energy Efficient Clustering Based Network Protocol Stack for 3D Airborne Monitoring System

    Directory of Open Access Journals (Sweden)

    Abhishek Joshi

    2017-01-01

    Full Text Available Wireless Sensor Network consists of large number of nodes densely deployed in ad hoc manner. Usually, most of the application areas of WSNs require two-dimensional (2D topology. Various emerging application areas such as airborne networks and underwater wireless sensor networks are usually deployed using three-dimensional (3D network topology. In this paper, a static 3D cluster-based network topology has been proposed for airborne networks. A network protocol stack consisting of various protocols such as TDMA MAC and dynamic routing along with services such as time synchronization, Cluster Head rotation, and power level management has been proposed for this airborne network. The proposed protocol stack has been implemented on the hardware platform consisting of number of TelosB nodes. This 3D airborne network architecture can be used to measure Air Quality Index (AQI in an area. Various parameters of network such as energy consumption, Cluster Head rotation, time synchronization, and Packet Delivery Ratio (PDR have been analyzed. Detailed description of the implementation of the protocol stack along with results of implementation has been provided in this paper.

  12. Broca's area network in language function.Broca's area network in language function: A pooling-data connectivity study

    Directory of Open Access Journals (Sweden)

    Byron eBernal

    2015-05-01

    Full Text Available Background and Objective. Modern neuroimaging developments have demonstrated that cognitive functions correlate with brain networks rather than specific areas. The purpose of this paper was to analyze the connectivity of Broca's area based on language tasks. Methods. A connectivity modeling study was performed by pooling data of Broca's activation in language tasks. Fifty-seven papers that included 883 subjects in 84 experiments were analyzed. Analysis of Likelihood Estimates of pooled data was utilized to generate the map; thresholds at p < 0.01 were corrected for multiple comparisons and false discovery rate. Resulting images were co-registered into MNI standard space. Results. A network consisting of 16 clusters of activation was obtained. Main clusters were located in the frontal operculum, left posterior temporal region, supplementary motor area, and the parietal lobe. Less common clusters were seen in the sub-cortical structures including the left thalamus, left putamen, secondary visual areas and the right cerebellum. Conclusions. BA44-related networks involved in language processing were demonstrated utilizing a pooling-data connectivity study. Significance, interpretation and limitations of the results are discussed.

  13. Image-based environmental monitoring sensor application using an embedded wireless sensor network.

    Science.gov (United States)

    Paek, Jeongyeup; Hicks, John; Coe, Sharon; Govindan, Ramesh

    2014-08-28

    This article discusses the experiences from the development and deployment of two image-based environmental monitoring sensor applications using an embedded wireless sensor network. Our system uses low-power image sensors and the Tenet general purpose sensing system for tiered embedded wireless sensor networks. It leverages Tenet's built-in support for reliable delivery of high rate sensing data, scalability and its flexible scripting language, which enables mote-side image compression and the ease of deployment. Our first deployment of a pitfall trap monitoring application at the James San Cannot Mountain Reserve provided us with insights and lessons learned into the deployment of and compression schemes for these embedded wireless imaging systems. Our three month-long deployment of a bird nest monitoring application resulted in over 100,000 images collected from a 19-camera node network deployed over an area of 0.05 square miles, despite highly variable environmental conditions. Our biologists found the on-line, near-real-time access to images to be useful for obtaining data on answering their biological questions.

  14. Image-Based Environmental Monitoring Sensor Application Using an Embedded Wireless Sensor Network

    Directory of Open Access Journals (Sweden)

    Jeongyeup Paek

    2014-08-01

    Full Text Available This article discusses the experiences from the development and deployment of two image-based environmental monitoring sensor applications using an embedded wireless sensor network. Our system uses low-power image sensors and the Tenet general purpose sensing system for tiered embedded wireless sensor networks. It leverages Tenet’s built-in support for reliable delivery of high rate sensing data, scalability and its flexible scripting language, which enables mote-side image compression and the ease of deployment. Our first deployment of a pitfall trap monitoring application at the James San Jacinto Mountain Reserve provided us with insights and lessons learned into the deployment of and compression schemes for these embedded wireless imaging systems. Our three month-long deployment of a bird nest monitoring application resulted in over 100,000 images collected from a 19-camera node network deployed over an area of 0.05 square miles, despite highly variable environmental conditions. Our biologists found the on-line, near-real-time access to images to be useful for obtaining data on answering their biological questions.

  15. Research in high speed fiber optics local area networks

    Science.gov (United States)

    Tobagi, F. A.

    1986-01-01

    The design of high speed local area networks (HSLAN) for communication among distributed devices requires solving problems in three areas: the network medium and its topology, the medium access control, and the network interface. Considerable progress was already made in the first two areas. Accomplishments are divided into two groups according to their theoretical or experimental nature. A brief summary is given.

  16. Cognitive Radio-based Home Area Networks

    NARCIS (Netherlands)

    Sarijari, M.A.B.

    2016-01-01

    A future home area network (HAN) is envisaged to consist of a large number of devices that support various applications such as smart grid, security and safety systems, voice call, and video streaming. Most of these home devices are communicating based on various wireless networking technologies

  17. Environmental feasibility study for deployment and construction of mobile gas turbine power plants in urbanized areas

    Directory of Open Access Journals (Sweden)

    Bryukhan Fedor

    2017-01-01

    Full Text Available In the view of current electrical shortage in some regions of Russia, mobile gas turbine power plants (MGTPP have become urgent in recent years. Usually they are used as back-up power sources to cover peak loads in power networks and to ensure uninterrupted power supply to consumers. This paper deals with environmental feasibility study for deployment and construction of the MGTPP in an urban setting. Technogehic factors of the MGTPP impact on the environment have been assessed and possibility of the MGTPP deployment at various sites in different regions of Russia has been identified. The necessity of using the technology of water injection into the gas turbine units combustion chamber to suppress nitrogen oxides in some cases is mentioned. Quantitative assessments of the MGTPP technogehic impact on the environment components have been performed using standard techniques. The calculations have revealed that the MGTPP specifications ensure the levels of technogehic impacts within the standard limits. The results have ensured preparation of pre-design and design documentation related to protection of the environment against the MGTPP complex technogehic impact.

  18. Dynamic Pathloss Model for Place and Time Itinerant Networks

    DEFF Research Database (Denmark)

    Kumar, Ambuj; Mihovska, Albena; Prasad, Ramjee

    2018-01-01

    that are essentially static. Therefore, once the signal level drops beyond the predicted values due to any variance in the environmental conditions, very crowded areas may not be catered well enough by the deployed network that had been designed with the static path loss model. This paper proposes an approach......t Future mobile communication networks are expected to be more intelligent and proactive based on new capabilities that increase agility and performance. However, for any successful mobile network service, the dexterity in network deployment is a key factor. The efficiency of the network planning...... depends on how congruent the chosen path loss model and real propagation are. Various path loss models have been developed that predict the signal propagation in various morphological and climatic environments; however they consider only those physical parameters of the network environment...

  19. Design and analysis of a deployable truss for the large modular mesh antenna

    Science.gov (United States)

    Meguro, Akira

    This paper describes the design and deployment analysis for large deployable modular mesh antennas. Key design criteria are deployability, and the driving force and latching moment requirements. Reaction forces and moments due to mesh and cable network seriously influence the driving force. These forces and moments can be precisely estimated by means of analyzing the cable network using Cable Structure Analyzer (CASA). Deployment analysis is carried out using Dynamic Analysis and Design System (DADS). The influence of alignment errors on the driving reaction force can be eliminated by replacing the joint element with a spring element. The joint slop is also modeled using a discontinuous spring elements. Their design approach for three types of deployable modules and the deployment characterstics of three Bread-Board Models based on those designs are also presented. In order to study gravity effects on the deployment characteristics and the effects of the gravity compensation method, ground deployment analysis is carried out. A planned deployment test that will use aircraft parabolic flight to simulate a micro-gravity environment is also described.

  20. Networking CD-ROMs: The Decision Maker's Guide to Local Area Network Solutions.

    Science.gov (United States)

    Elshami, Ahmed M.

    In an era when patrons want access to CD-ROM resources but few libraries can afford to buy multiple copies, CD-ROM local area networks (LANs) are emerging as a cost-effective way to provide shared access. To help librarians make informed decisions, this manual offers information on: (1) the basics of LANs, a "local area network primer";…

  1. Force10 networks performance in world's first transcontinental 10 gigabit ethernet network verified by Ixia

    CERN Multimedia

    2003-01-01

    Force10 Networks, Inc., today announced that the performance of the Force10 E-Series switch/routers deployed in a transcontinental network has been verified as line-rate 10 GE throughput by Ixia, a leading provider of high-speed, network performance and conformance analysis systems. The network, the world's first transcontinental 10 GE wide area network, consists of a SURFnet OC-192 lambda between Geneva and the StarLight facility in Chicago via Amsterdam and another OC-192 lambda between this same facility in Chicago and Carleton University in Ottawa, Canada provided by CANARIE and ORANO (1/2 page).

  2. Hybrid Control of Long-Endurance Aerial Robotic Vehicles for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Deok-Jin Lee

    2011-06-01

    Full Text Available This paper presents an effective hybrid control approach for building stable wireless sensor networks between heterogeneous unmanned vehicles using long‐ endurance aerial robotic vehicles. For optimal deployment of the aerial vehicles in communication networks, a gradient climbing based self‐estimating control algorithm is utilized to locate the aerial platforms to maintain maximum communication throughputs between distributed multiple nodes. The autonomous aerial robots, which function as communication relay nodes, extract and harvest thermal energy from the atmospheric environment to improve their flight endurance within specified communication coverage areas. The rapidly‐deployable sensor networks with the high‐endurance aerial vehicles can be used for various application areas including environment monitoring, surveillance, tracking, and decision‐making support. Flight test and simulation studies are conducted to evaluate the effectiveness of the proposed hybrid control technique for robust communication networks.

  3. System design choices in smartautonomous networked irrigation systems

    OpenAIRE

    Öberg, Kim; Simonsson, Johanna

    2014-01-01

    Wireless Sensor Networks are often deployed in great numbers spanning large, sometimes hard to reach and hostile, areas with the aim of monitoring environmental conditions through the use of different sensors. Due to decreasing costs of ownership (e.g. non-proprietary protocols), recent advances in processor, radio, and memory technologies and the engineering of increasingly smaller sensing devices, the availability and area of application for wireless sensor networks have steadily been incre...

  4. Continual observation on crop leaf area index using wireless sensors network

    International Nuclear Information System (INIS)

    Jiao, Sihong

    2014-01-01

    Crop structural parameter, i.e. leaf area index(LAI), is the main factor that can effect the solar energy re-assignment in the canopy. An automatic measuring system which is designed on the basis of wireless sensors network(WSN) is present in this paper. The system is comprised of two types of node. One is the measurement nodes which measured solar irradiance and were deployed beneath and above the canopy respectively, and another is a sink node which was used to collect data from the other measurement nodes. The measurement nodes also have ability to repeater data from one node to another and finally transfer signal to the sink node. Then the collected data of sink node are transferred to the data center through GPRS network. Using the field data collected by WSN, canopy structural parameters can be calculated using the direct transmittance which is the ratio of sun radiation captured by the measurement node beneath and above the canopy on different sun altitude angles. The proposed WSN measurement systems which is consisted of about 45 measurement node was deployed in the Heihe watershed to continually observe the crop canopy structural parameters from 25 June to 24 August 2012. To validate the performance of the WSN measured crop structural parameters, the LAI values were also measured by LAI2000. The field preliminary validation results show that the designed system can capture the varies of solar direct canopy transmittance on different time in a day, which is the basis to calculate the target canopy structural parameters. The validation results reveal that the measured LAI values derived from our propose measurement system have acceptable correlation coefficient(R2 from 0.27 to 0.96 and averaged value 0.42) with those derived from LAI2000. So it is a promising way in the agriculture application to utilize the proposed system and thus will be an efficient way to measure the crop structural parameters in the large spatial region and on the long time series

  5. Overview of hybrid fiber-coaxial network deployment in the deregulated UK environment

    Science.gov (United States)

    Cox, Alan L.

    1995-11-01

    Cable operators in the U.K. enjoy unprecedented license to construct networks and operate cable TV and telecommunications services within their franchise areas. In general, operators have built hybrid-fiber-coax (HFC) networks for cable TV in parallel with fiber-copper-pair networks for telephony. The commonly used network architectures are reviewed, together with their present and future capacities. Despite this dual-technology approach, there is considerable interest in the integration of telephony services onto the HFC network and the development of new interactive services for which HFC may be more suitable than copper pairs. Certain technological and commercial developments may have considerable significance for HFC networks and their operators. These include the digitalization of TV distribution and the rising demand for high-rate digital access lines. Possible scenarios are discussed.

  6. Complementarity and Area-Efficiency in the Prioritization of the Global Protected Area Network.

    Directory of Open Access Journals (Sweden)

    Peter Kullberg

    Full Text Available Complementarity and cost-efficiency are widely used principles for protected area network design. Despite the wide use and robust theoretical underpinnings, their effects on the performance and patterns of priority areas are rarely studied in detail. Here we compare two approaches for identifying the management priority areas inside the global protected area network: 1 a scoring-based approach, used in recently published analysis and 2 a spatial prioritization method, which accounts for complementarity and area-efficiency. Using the same IUCN species distribution data the complementarity method found an equal-area set of priority areas with double the mean species ranges covered compared to the scoring-based approach. The complementarity set also had 72% more species with full ranges covered, and lacked any coverage only for half of the species compared to the scoring approach. Protected areas in our complementarity-based solution were on average smaller and geographically more scattered. The large difference between the two solutions highlights the need for critical thinking about the selected prioritization method. According to our analysis, accounting for complementarity and area-efficiency can lead to considerable improvements when setting management priorities for the global protected area network.

  7. Complementarity and Area-Efficiency in the Prioritization of the Global Protected Area Network.

    Science.gov (United States)

    Kullberg, Peter; Toivonen, Tuuli; Montesino Pouzols, Federico; Lehtomäki, Joona; Di Minin, Enrico; Moilanen, Atte

    2015-01-01

    Complementarity and cost-efficiency are widely used principles for protected area network design. Despite the wide use and robust theoretical underpinnings, their effects on the performance and patterns of priority areas are rarely studied in detail. Here we compare two approaches for identifying the management priority areas inside the global protected area network: 1) a scoring-based approach, used in recently published analysis and 2) a spatial prioritization method, which accounts for complementarity and area-efficiency. Using the same IUCN species distribution data the complementarity method found an equal-area set of priority areas with double the mean species ranges covered compared to the scoring-based approach. The complementarity set also had 72% more species with full ranges covered, and lacked any coverage only for half of the species compared to the scoring approach. Protected areas in our complementarity-based solution were on average smaller and geographically more scattered. The large difference between the two solutions highlights the need for critical thinking about the selected prioritization method. According to our analysis, accounting for complementarity and area-efficiency can lead to considerable improvements when setting management priorities for the global protected area network.

  8. Software Updating in Wireless Sensor Networks: A Survey and Lacunae

    Directory of Open Access Journals (Sweden)

    Cormac J. Sreenan

    2013-11-01

    Full Text Available Wireless Sensor Networks are moving out of the laboratory and into the field. For a number of reasons there is often a need to update sensor node software, or node configuration, after deployment. The need for over-the-air updates is driven both by the scale of deployments, and by the remoteness and inaccessibility of sensor nodes. This need has been recognized since the early days of sensor networks, and research results from the related areas of mobile networking and distributed systems have been applied to this area. In order to avoid any manual intervention, the update process needs to be autonomous. This paper presents a comprehensive survey of software updating in Wireless Sensor Networks, and analyses the features required to make these updates autonomous. A new taxonomy of software update features and a new model for fault detection and recovery are presented. The paper concludes by identifying the lacunae relating to autonomous software updates, providing direction for future research.

  9. Analisis Kinerja Local Area Network Menggunakan Router.

    OpenAIRE

    Hutahaean, Yosua

    2012-01-01

    Perangkat internetworking menawarkan komunikasi di antara segmen Local Area Network (LAN). Ada empat tipe utama perangkat internetworking ini: repeater, bridge, router, dan gateway. Perangkat ini dibedakan atas dasar system lapisan Open System Interconnection (OSI) yang digunakan, berfungsi sebagai media komunikasi dari LAN ke LAN. Pada Tugas Akhir ini penulis tertarik untuk membahas analisis kinerja Local Area Network (LAN) menggunakan Router yang menggunakan sistem antrian M/M/1 dimana j...

  10. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... the existing network to include two thematic networks on food security and rural ... Woman conquering male business in Yemen : Waleya's micro-enterprise.

  11. STAR-TYPE LOCAL AREA NETWORK ACCESS CONTROL

    Institute of Scientific and Technical Information of China (English)

    逯昭义; 齐藤忠夫

    1990-01-01

    The multiple access fashion is a new resolution for the star-type local area network (LAN) access control and star-type optical fibre LAN. Arguments about this network are discussed, and the results are introduced.

  12. Fixed Access Network Sharing

    Science.gov (United States)

    Cornaglia, Bruno; Young, Gavin; Marchetta, Antonio

    2015-12-01

    Fixed broadband network deployments are moving inexorably to the use of Next Generation Access (NGA) technologies and architectures. These NGA deployments involve building fiber infrastructure increasingly closer to the customer in order to increase the proportion of fiber on the customer's access connection (Fibre-To-The-Home/Building/Door/Cabinet… i.e. FTTx). This increases the speed of services that can be sold and will be increasingly required to meet the demands of new generations of video services as we evolve from HDTV to "Ultra-HD TV" with 4k and 8k lines of video resolution. However, building fiber access networks is a costly endeavor. It requires significant capital in order to cover any significant geographic coverage. Hence many companies are forming partnerships and joint-ventures in order to share the NGA network construction costs. One form of such a partnership involves two companies agreeing to each build to cover a certain geographic area and then "cross-selling" NGA products to each other in order to access customers within their partner's footprint (NGA coverage area). This is tantamount to a bi-lateral wholesale partnership. The concept of Fixed Access Network Sharing (FANS) is to address the possibility of sharing infrastructure with a high degree of flexibility for all network operators involved. By providing greater configuration control over the NGA network infrastructure, the service provider has a greater ability to define the network and hence to define their product capabilities at the active layer. This gives the service provider partners greater product development autonomy plus the ability to differentiate from each other at the active network layer.

  13. Policy-based Network Management in Home Area Networks: Interim Test Results

    OpenAIRE

    Ibrahim Rana, Annie; Ó Foghlú, Mícheál

    2009-01-01

    This paper argues that Home Area Networks (HANs) are a good candidate for advanced network management automation techniques, such as Policy-Based Network Management (PBNM). What is proposed is a simple use of policy based network management to introduce some level of Quality of Service (QoS) and Security management in the HAN, whilst hiding this complexity from the home user. In this paper we have presented the interim test results of our research experiments (based on a scenario) using the H...

  14. Networked gamma radiation detection system for tactical deployment

    Science.gov (United States)

    Mukhopadhyay, Sanjoy; Maurer, Richard; Wolff, Ronald; Smith, Ethan; Guss, Paul; Mitchell, Stephen

    2015-08-01

    A networked gamma radiation detection system with directional sensitivity and energy spectral data acquisition capability is being developed by the National Security Technologies, LLC, Remote Sensing Laboratory to support the close and intense tactical engagement of law enforcement who carry out counterterrorism missions. In the proposed design, three clusters of 2″ × 4″ × 16″ sodium iodide crystals (4 each) with digiBASE-E (for list mode data collection) would be placed on the passenger side of a minivan. To enhance localization and facilitate rapid identification of isotopes, advanced smart real-time localization and radioisotope identification algorithms like WAVRAD (wavelet-assisted variance reduction for anomaly detection) and NSCRAD (nuisance-rejection spectral comparison ratio anomaly detection) will be incorporated. We will test a collection of algorithms and analysis that centers on the problem of radiation detection with a distributed sensor network. We will study the basic characteristics of a radiation sensor network and focus on the trade-offs between false positive alarm rates, true positive alarm rates, and time to detect multiple radiation sources in a large area. Empirical and simulation analyses of critical system parameters, such as number of sensors, sensor placement, and sensor response functions, will be examined. This networked system will provide an integrated radiation detection architecture and framework with (i) a large nationally recognized search database equivalent that would help generate a common operational picture in a major radiological crisis; (ii) a robust reach back connectivity for search data to be evaluated by home teams; and, finally, (iii) a possibility of integrating search data from multi-agency responders.

  15. Dedicated Carrier Deployment in Heterogeneous Networks with Inter-site Carrier Aggregation

    DEFF Research Database (Denmark)

    Wang, Hua; Rosa, Claudio; Pedersen, Klaus I.

    2013-01-01

    the macrocell or the picocell using simple cell range expansion (RE). Extensive system-level simulations have been conducted to investigate the performance gains that can be achieved with inter-site CA under different traffic models and user distributions. Results show that using inter-site CA between......) or picos with dedicated carrier deployment. Collaborative inter-site carrier aggregation (CA) is proposed in scenarios with macro+RRH deployment to make an efficient use of the fragmented spectrum from multiple cells. While in scenarios with macro+pico deployment, UEs can only connect to either...

  16. The deployment of routing protocols in distributed control plane of SDN.

    Science.gov (United States)

    Jingjing, Zhou; Di, Cheng; Weiming, Wang; Rong, Jin; Xiaochun, Wu

    2014-01-01

    Software defined network (SDN) provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo's two levels of controllers based on ideological inspiration of RCP (routing control platform). Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies.

  17. The Deployment of Routing Protocols in Distributed Control Plane of SDN

    Directory of Open Access Journals (Sweden)

    Zhou Jingjing

    2014-01-01

    Full Text Available Software defined network (SDN provides a programmable network through decoupling the data plane, control plane, and application plane from the original closed system, thus revolutionizing the existing network architecture to improve the performance and scalability. In this paper, we learned about the distributed characteristics of Kandoo architecture and, meanwhile, improved and optimized Kandoo’s two levels of controllers based on ideological inspiration of RCP (routing control platform. Finally, we analyzed the deployment strategies of BGP and OSPF protocol in a distributed control plane of SDN. The simulation results show that our deployment strategies are superior to the traditional routing strategies.

  18. Application of local area network technology in an engineering environment

    International Nuclear Information System (INIS)

    Powell, A.D.; Sokolowski, M.A.

    1990-01-01

    This paper reports on the application of local area network technology in an engineering environment. Mobil Research and Development Corporation Engineering, Dallas, texas has installed a local area network (LAN) linking over 85 microcomputers. This network, which has been in existence for more than three years, provides common access by all engineers to quality output devices such as laser printers and multi-color pen plotters; IBM mainframe connections; electronic mail and file transfer; and common engineering program. The network has been expanded via a wide area ethernet network to link the Dallas location with a functionally equivalent LAN of over 400 microcomputers in Princeton, N.J. Additionally, engineers on assignment at remote areas in Europe, U.S., Africa and project task forces have dial-in access to the network via telephone lines

  19. Collaborative 3D Target Tracking in Distributed Smart Camera Networks for Wide-Area Surveillance

    Directory of Open Access Journals (Sweden)

    Xenofon Koutsoukos

    2013-05-01

    Full Text Available With the evolution and fusion of wireless sensor network and embedded camera technologies, distributed smart camera networks have emerged as a new class of systems for wide-area surveillance applications. Wireless networks, however, introduce a number of constraints to the system that need to be considered, notably the communication bandwidth constraints. Existing approaches for target tracking using a camera network typically utilize target handover mechanisms between cameras, or combine results from 2D trackers in each camera into 3D target estimation. Such approaches suffer from scale selection, target rotation, and occlusion, drawbacks typically associated with 2D tracking. In this paper, we present an approach for tracking multiple targets directly in 3D space using a network of smart cameras. The approach employs multi-view histograms to characterize targets in 3D space using color and texture as the visual features. The visual features from each camera along with the target models are used in a probabilistic tracker to estimate the target state. We introduce four variations of our base tracker that incur different computational and communication costs on each node and result in different tracking accuracy. We demonstrate the effectiveness of our proposed trackers by comparing their performance to a 3D tracker that fuses the results of independent 2D trackers. We also present performance analysis of the base tracker along Quality-of-Service (QoS and Quality-of-Information (QoI metrics, and study QoS vs. QoI trade-offs between the proposed tracker variations. Finally, we demonstrate our tracker in a real-life scenario using a camera network deployed in a building.

  20. A Location-Aware Service Deployment Algorithm Based on K-Means for Cloudlets

    Directory of Open Access Journals (Sweden)

    Tyng-Yeu Liang

    2017-01-01

    Full Text Available Cloudlet recently was proposed to push data centers towards network edges for reducing the network latency of delivering cloud services to mobile devices. For the sake of user mobility, it is necessary to deploy and hand off services anytime anywhere for achieving the minimal network latency for users’ service requests. However, the cost of this solution usually is too high for service providers and is not effective for resource exploitation. To resolve this problem, we propose a location-aware service deployment algorithm based on K-means for cloudlets in this paper. Simply speaking, the proposed algorithm divides mobile devices into a number of device clusters according to the geographical location of mobile devices and then deploys service instances onto the edge cloud servers nearest to the centers of device clusters. Our performance evaluation has shown that the proposed algorithm can effectively reduce not only the network latency of edge cloud services but also the number of service instances used for satisfying the condition of tolerable network latency.

  1. A report on IPv6 deployment activities and issues at Sandia National Laboratories:FY2007.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang; Maestas, Joseph H.

    2007-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. As the emerging Internet network protocol, SNL needs to prepare for its eventual deployment in international, national, customer, and local networks. Additionally, the United States Office of Management and Budget has mandated that IPv6 deployment in government network backbones occurs by 2008. This paper explores the readiness of the Sandia National Laboratories network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution, the Communication & Network Systems, and Network System Design & Implementation Departments.

  2. EarthScope's Transportable Array: Status of the Alaska Deployment and Guide to Resources for Lower48 Deployment

    Science.gov (United States)

    Busby, R. W.; Woodward, R.; Aderhold, K.; Frassetto, A.

    2017-12-01

    The Alaska Transportable Array deployment is completely installed, totaling 280 stations, with 194 new stations and 86 existing stations, 28 of those upgraded with new sensor emplacement. We briefly summarize the deployment of this seismic network, describe the added meteorological instruments and soil temperature gauges, and review our expectations for operation and demobilization. Curation of data from the contiguous Lower-48 States deployment of Transportable Array (>1800 stations, 2004-2015) has continued with the few gaps in real-time data replaced by locally archived files as well as minor adjustments in metadata. We highlight station digests that provide more detail on the components and settings of individual stations, documentation of standard procedures used throughout the deployment and other resources available online. In cooperation with IRIS DMC, a copy of the complete TA archive for the Lower-48 period has been transferred to a local disk to experiment with data access and software workflows that utilize most or all of the seismic timeseries, in contrast to event segments. Assembling such large datasets reliably - from field stations to a well managed data archive to a user's workspace - is complex. Sharing a curated and defined data volume with researchers is a potentially straightforward way to make data intensive analyses less difficult. We note that data collection within the Lower-48 continues with 160 stations of the N4 network operating at increased sample rates (100 sps) as part of the CEUSN, as operational support transitions from NSF to USGS.

  3. Comparing post-deployment mental health services utilization in soldiers deployed to Balkan, Iraq and Afghanistan

    DEFF Research Database (Denmark)

    Madsen, T; Sadowa Vedtofte, M; Nordentoft, M

    2017-01-01

    OBJECTIVE: Insight on how different missions have impacted rates of mental health service (MHS) utilization is unexplored. We compared postdeployment MHS utilization in a national cohort of first-time deployed to missions in Balkan, Iraq, and Afghanistan respectively. METHODS: A prospective...... national cohort study of 13 246 first-time deployed in the period 1996 through 2012 to missions in Balkan area, Iraq, or Afghanistan respectively. Soldiers 'MHS utilization was also compared with a 5:1 sex-, age-, and calendar year-matched never-deployed background population. Postdeployment utilization...... of psychotropics. RESULTS: Utilizing of psychiatric outpatient services and psychotropics was significantly higher in first-time deployed to Iraq and Afghanistan compared with deployed to Balkan. However, the rate of postdeployment admission to psychiatric hospital did not differ between missions. Postdeployment...

  4. Connected vehicle pilot deployment program phase 1, safety management plan - Tampa (THEA).

    Science.gov (United States)

    2016-04-01

    This document presents the Safety Management Plan for the THEA Connected Vehicle (CV) Pilot Deployment. The THEA CV Pilot : Deployment goal is to advance and enable safe, interoperable, networked wireless communications among vehicles, the : infrastr...

  5. A Review of Protocol Implementations and Energy Efficient Cross-Layer Design for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tao Chen

    2012-11-01

    Full Text Available The issues inherent in caring for an ever-increasing aged population has been the subject of endless debate and continues to be a hot topic for political discussion. The use of hospital-based facilities for the monitoring of chronic physiological conditions is expensive and ties up key healthcare professionals. The introduction of wireless sensor devices as part of a Wireless Body Area Network (WBAN integrated within an overall eHealth solution could bring a step change in the remote management of patient healthcare. Sensor devices small enough to be placed either inside or on the human body can form a vital part of an overall health monitoring network. An effectively designed energy efficient WBAN should have a minimal impact on the mobility and lifestyle of the patient. WBAN technology can be deployed within a hospital, care home environment or in the patient’s own home. This study is a review of the existing research in the area of WBAN technology and in particular protocol adaptation and energy efficient cross-layer design. The research reviews the work carried out across various layers of the protocol stack and highlights how the latest research proposes to resolve the various challenges inherent in remote continual healthcare monitoring.

  6. Area Spectral Efficiency and Energy Efficiency Tradeoff in Ultradense Heterogeneous Networks

    Directory of Open Access Journals (Sweden)

    Lanhua Xiang

    2017-01-01

    Full Text Available In order to meet the demand of explosive data traffic, ultradense base station (BS deployment in heterogeneous networks (HetNets as a key technique in 5G has been proposed. However, with the increment of BSs, the total energy consumption will also increase. So, the energy efficiency (EE has become a focal point in ultradense HetNets. In this paper, we take the area spectral efficiency (ASE into consideration and focus on the tradeoff between the ASE and EE in an ultradense HetNet. The distributions of BSs in the two-tier ultradense HetNet are modeled by two independent Poisson point processes (PPPs and the expressions of ASE and EE are derived by using the stochastic geometry tool. The tradeoff between the ASE and EE is formulated as a constrained optimization problem in which the EE is maximized under the ASE constraint, through optimizing the BS densities. It is difficult to solve the optimization problem analytically, because the closed-form expressions of ASE and EE are not easily obtained. Therefore, simulations are conducted to find optimal BS densities.

  7. Lambdastation: a forwarding and admission control service to interface production network facilities with advanced research network paths

    Energy Technology Data Exchange (ETDEWEB)

    DeMar, Philip; Petravick, Don; /Fermilab

    2004-12-01

    Over the past several years, there has been a great deal of research effort and funding put into the deployment of optical-based, advanced technology wide-area networks. Fermilab and CalTech have initiated a project to enable our production network facilities to exploit these advanced research network facilities. Our objective is to forward designated data transfers across these advanced wide area networks on a per-flow basis, making use our capacious production-use storage systems connected to the local campus network. To accomplish this, we intend to develop a dynamically provisioned forwarding service that would provide alternate path forwarding onto available wide area advanced research networks. The service would dynamically reconfigure forwarding of specific flows within our local production-use network facilities, as well as provide an interface to enable applications to utilize the service. We call this service LambdaStation. If one envisions wide area optical network paths as high bandwidth data railways, then LambdaStation would functionally be the railroad terminal that regulates which flows at the local site get directed onto the high bandwidth data railways. LambdaStation is a DOE-funded SciDac research project in its very early stage of development.

  8. A Novel Methodology for Charging Station Deployment

    Science.gov (United States)

    Sun, Zhonghao; Zhao, Yunwei; He, Yueying; Li, Mingzhe

    2018-02-01

    Lack of charging stations has been a main obstacle to the promotion of electric vehicles. This paper studies deploying charging stations in traffic networks considering grid constraints to balance the charging demand and grid stability. First, we propose a statistical model for charging demand. Then we combine the charging demand model with power grid constraints and give the formulation of the charging station deployment problem. Finally, we propose a theoretical solution for the problem by transforming it to a Markov Decision Process.

  9. Realistic Indoor Wi-Fi and Femto deployment Study as the Offloading Solutions to LTE Macro Network

    DEFF Research Database (Denmark)

    Hu, Liang; Coletti, Claudio; Nguyen, Huan Cong

    2012-01-01

    that, in a dual-carrier LTE macro case, Wi-Fi access point density of 230/km2 is required to meet the Key Performance Indicator (KPI) - less than 10% of users have a throughput below 1 Mbps whereas out-band Femto access point density of 1200/km2 is required. Furthermore, we show that in-band Femto cell...... cannot meet the network KPI even at a very high access point density. We also show that Wi-Fi and Femto cell offload the same amount of traffic when they are deployed at the same access point density....

  10. Linkage reliability in local area network

    International Nuclear Information System (INIS)

    Buissson, J.; Sanchis, P.

    1984-11-01

    The local area networks for industrial applications e.g. in nuclear power plants counterparts intended for office use that they are required to meet more stringent requirements in terms of reliability, security and availability. The designers of such networks take full advantage of the office-oriented developments (more specifically the integrated circuits) and increase their performance capabilities with respect to the industrial requirements [fr

  11. University of Tennessee deploys force10 switch for CERN work

    CERN Multimedia

    2007-01-01

    "Force20 networks, the pioneer in building and securing reliable networks, today announced that the University of Tennessee physics department has deployed the C300 resilient switch to analyze data form CERN's Large Hadron Collider." (1/2 page)

  12. On node replication attack in wireless sensor networks

    International Nuclear Information System (INIS)

    Qabulio, M.; Malkani, Y.A.

    2015-01-01

    WSNs (Wireless Sensor Networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs. (author)

  13. On Node Replication Attack in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mumtaz Qabulio

    2016-04-01

    Full Text Available WSNs (Wireless Sensor Networks comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes that are densely deployed to measure a given physical phenomenon. Since WSNs are commonly deployed in a hostile and unattended environment, it is easy for an adversary to physically capture one or more legitimate sensor nodes, re-program and redeploy them in the network. As a result, the adversary becomes able to deploy several identical copies of physically captured nodes in the network in order to perform illegitimate activities. This type of attack is referred to as Node Replication Attack or Clone Node Attack. By launching node replication attack, an adversary can easily get control on the network which consequently is the biggest threat to confidentiality, integrity and availability of data and services. Thus, detection and prevention of node replication attack in WSNs has become an active area of research and to date more than two dozen schemes have been proposed, which address this issue. In this paper, we present a comprehensive review, classification and comparative analysis of twenty five of these schemes which help to detect and/or prevent node replication attack in WSNs

  14. Deployment Strategy for Charging Piles Based on Distribution Network Capacity Planning and Users’ Needs

    Directory of Open Access Journals (Sweden)

    Du Chongyang

    2015-01-01

    Full Text Available Electric vehicles are the most potential transports in the future. However, the large scale of charging facilities will make a great influence on gird. There is a need to make a research on the construction of charging facilities. Based on the power demand characteristics of electric vehicle charging, distribution network capacity, charging system performance and other aspects, this paper mainly researched the deployment strategy of charging piles. First, the authors built up a model with characteristics of charging power demand of electric vehicle and a model of charging service system. The characteristic of daily load curve is analyzed. Second, based on these works, the authors designed the progress of strategy making. At last, the progress was verified by the actual use case.

  15. Simulation studies of a wide area health care network.

    Science.gov (United States)

    McDaniel, J. G.

    1994-01-01

    There is an increasing number of efforts to install wide area health care networks. Some of these networks are being built to support several applications over a wide user base consisting primarily of medical practices, hospitals, pharmacies, medical laboratories, payors, and suppliers. Although on-line, multi-media telecommunication is desirable for some purposes such as cardiac monitoring, store-and-forward messaging is adequate for many common, high-volume applications. Laboratory test results and payment claims, for example, can be distributed using electronic messaging networks. Several network prototypes have been constructed to determine the technical problems and to assess the effectiveness of electronic messaging in wide area health care networks. Our project, Health Link, developed prototype software that was able to use the public switched telephone network to exchange messages automatically, reliably and securely. The network could be configured to accommodate the many different traffic patterns and cost constraints of its users. Discrete event simulations were performed on several network models. Canonical star and mesh networks, that were composed of nodes operating at steady state under equal loads, were modeled. Both topologies were found to support the throughput of a generic wide area health care network. The mean message delivery time of the mesh network was found to be less than that of the star network. Further simulations were conducted for a realistic large-scale health care network consisting of 1,553 doctors, 26 hospitals, four medical labs, one provincial lab and one insurer. Two network topologies were investigated: one using predominantly peer-to-peer communication, the other using client-server communication.(ABSTRACT TRUNCATED AT 250 WORDS) PMID:7949966

  16. Wireless Wide Area Networks for School Districts.

    Science.gov (United States)

    Nair, Prakash

    This paper considers a basic question that many schools districts face in attempting to develop affordable, expandable district-wide computer networks that are resistant to obsolescence: Should these wide area networks (WANs) employ wireless technology, stick to venerable hard-wired solutions, or combine both. This publication explores the…

  17. High-Speed Optical Wide-Area Data-Communication Network

    Science.gov (United States)

    Monacos, Steve P.

    1994-01-01

    Proposed fiber-optic wide-area network (WAN) for digital communication balances input and output flows of data with its internal capacity by routing traffic via dynamically interconnected routing planes. Data transmitted optically through network by wavelength-division multiplexing in synchronous or asynchronous packets. WAN implemented with currently available technology. Network is multiple-ring cyclic shuffle exchange network ensuring traffic reaches its destination with minimum number of hops.

  18. Local AREA networks in advanced nuclear reactors

    International Nuclear Information System (INIS)

    Bicknell, J.; Keats, A.B.

    1984-01-01

    The report assesses Local Area Network Communications with a view to their application in advanced nuclear reactor control and protection systems. Attention is focussed on commercially available techniques and systems for achieving the high reliability and availability required. A basis for evaluating network characteristics in terms of broadband or baseband type, medium, topology, node structure and access method is established. The reliability and availability of networks is then discussed. Several commercial networks are briefly assessed and a distinction made between general purpose networks and those suitable for process control. The communications requirements of nuclear reactor control and protection systems are compared with the facilities provided by current technology

  19. Deployment and Implementation Strategies for Massive MIMO in 5G

    DEFF Research Database (Denmark)

    Panzner, Berthold; Zirwas, Wolfgang; Dierks, Stefan

    2015-01-01

    for 5G is a successful and cost-efficient integration in the overall network concept. This work highlights deployment and implementation strategies for massive MIMO in the context of 5G indoor small cell scenarios. Different massive MIMO deployment scenarios are analyzed for a standard 3GPP indoor...... to spatial streams is varied stepwise from equality to a factor of ten. For implementation of massive MIMO in 5G networks trends in beamforming techniques, mutually coupled subarrays, over the calibration procedure and estimated ADC performance in 2020 time-frame are discussed. Based on the debate the paper...

  20. EMPLOYING SENSOR NETWORK TO GUIDE FIREFIGHTERS IN DANGEROUS AREA

    DEFF Research Database (Denmark)

    Koohi, Hamidreza; Nadernejad, Ehsan; Fathi, Mahmoud

    2010-01-01

    In this paper, we intend to focus on the sensor network applications in firefighting. A distributed algorithm is developed for the sensor network to guide firefighters through a burning area. The sensor network models the danger of the area under coverage as obstacles, and has the property to adapt...... itself against possible changes. The protocol developed, will integrate the artificial potential field of the sensors with the information of the intended place of moving firefighter so that it guides the firefighter step by step through the sensor network by choosing the safest path in dangerous zones....... This protocol is simulated by Visual-Sense and the simulation results are available. Keyword: Firefighter, Sensor Network, Potential Field, Area’s Danger, Navigation...

  1. Strategies for optical transport network recovery under epidemic network failures

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée; Fagertun, Anna Manolova; Kosteas, Vasileios

    2015-01-01

    The current trend in deploying automatic control plane solutions for increased flexibility in the optical transport layer leads to numerous advantages for both the operators and the customers, but also pose challenges related to the stability of the network and its ability to operate in a robust...... manner under different failure scenarios. This work evaluates two rerouting strategies and proposes four policies for failure handling in a connection-oriented optical transport network, under generalized multiprotocol label switching control plane. The performance of the strategies and the policies......, and that there exist a clear trade-off between policy performance and network resource consumption, which must be addressed by network operators for improved robustness of their transport infrastructures. Applying proactive methods for avoiding areas where epidemic failures spread results in 50% less connections...

  2. Impact of High Power Interference Sources in Planning and Deployment of Wireless Sensor Networks and Devices in the 2.4 GHz Frequency Band in Heterogeneous Environments

    Directory of Open Access Journals (Sweden)

    Francisco Falcone

    2012-11-01

    Full Text Available In this work, the impact of radiofrequency radiation leakage from microwave ovens and its effect on 802.15.4 ZigBee-compliant wireless sensor networks operating in the 2.4 GHz Industrial Scientific Medical (ISM band is analyzed. By means of a novel radioplanning approach, based on electromagnetic field simulation of a microwave oven and determination of equivalent radiation sources applied to an in-house developed 3D ray launching algorithm, estimation of the microwave oven’s power leakage is obtained for the complete volume of an indoor scenario. The magnitude and the variable nature of the interference is analyzed and the impact in the radio link quality in operating wireless sensors is estimated and compared with radio channel measurements as well as packet measurements. The measurement results reveal the importance of selecting an adequate 802.15.4 channel, as well as the Wireless Sensor Network deployment strategy within this type of environment, in order to optimize energy consumption and increase the overall network performance. The proposed method enables one to estimate potential interference effects in devices operating within the 2.4 GHz band in the complete scenario, prior to wireless sensor network deployment, which can aid in achieving the most optimal network topology.

  3. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... poor by sharing innovations, best practices and indigenous knowledge using ... A third thematic network - on knowledge management strategies - will play an ...

  4. Assessing the Performance of a Network of Low Cost Particulate Matter Sensors Deployed in Sacramento, California

    Science.gov (United States)

    Mukherjee, A. D.; Brown, S. G.; McCarthy, M. C.

    2017-12-01

    A new generation of low cost air quality sensors have the potential to provide valuable information on the spatial-temporal variability of air pollution - if the measurements have sufficient quality. This study examined the performance of a particulate matter sensor model, the AirBeam (HabitatMap Inc., Brooklyn, NY), over a three month period in the urban environment of Sacramento, California. Nineteen AirBeam sensors were deployed at a regulatory air monitoring site collocated with meteorology measurements and as a local network over an 80 km2 domain in Sacramento, CA. This study presents the methodology to evaluate the precision, accuracy, and reliability of the sensors over a range of meteorological and aerosol conditions. The sensors demonstrated a robust degree of precision during collocated measurement periods (R2 = 0.98 - 0.99) and a moderate degree of correlation against a Beta Attenuation Monitor PM2.5 monitor (R2 0.6). A normalization correction is applied during the study period so that each AirBeam sensor in the network reports a comparable value. The role of the meteorological environment on the accuracy of the sensor measurements is investigated, along with the possibility of improving the measurements through a meteorology weighted correction. The data quality of the network of sensors is examined, and the spatial variability of particulate matter through the study domain derived from the sensor network is presented.

  5. Reduction of environmental impact by FR cycle deployment

    International Nuclear Information System (INIS)

    Katoh, Atsushi; Nakai, Ryodai

    2005-03-01

    In this report radioactive waste generations in terms of disposal volume or disposal field equivalent, and the radioactive toxicity of HLW are evaluated to clarify the promising nuclear scenario for the sake of realization of sustainable society in 21st century. This analysis was conducted based on the outcomes of the mass flow evaluation tool 'FAMILY-21' which calculates a material balance for TRU in the following scenarios. 1) LWR once-through scenario, 2) Pu partly recycling in LWR scenario, 3) Pu full recycling in LWR scenario, 4) FBR deployment scenario, 5) Interim storage scenario. The result shows that the cumulative area of low level radioactive waste (LLW) disposal field at 2150 in the FR cycle deployment scenario is 1.8 times larger than that in the LWR once-through scenario. The area of LLW disposal field at 2150 is a few km 2 in all the scenarios. In contrast, the cumulative area of high level radioactive waste (HLW) disposal field at 2150 in the FR cycle deployment scenario is less than half of that in the LWR once-through scenario. The area of HLW disposal field at 2150 is about 10 times of the area of LLW disposal field. Moreover, the FR deployment reduces the radioactive toxicity of HLW by U/TRU recycling, and shortens the period to decay under the natural Uranium toxicity level. Considering the area of radioactive waste disposal field and the radioactive toxicity of HLW, the advantage of the FR cycle deployment is indicated quantitatively from the viewpoint of the environmental burden reduction. (author)

  6. Security Analysis of a Software Defined Wide Area Network Solution

    OpenAIRE

    Rajendran, Ashok

    2016-01-01

    Enterprise wide area network (WAN) is a private network that connects the computers and other devices across an organisation's branch locations and the data centers. It forms the backbone of enterprise communication. Currently, multiprotocol label switching (MPLS) is commonly used to provide this service. As a recent alternative to MPLS, software-dened wide area networking (SD-WAN) solutions are being introduced as an IP based cloud-networking service for enterprises. SD-WAN virtualizes the n...

  7. Competitive Swarm Optimizer Based Gateway Deployment Algorithm in Cyber-Physical Systems.

    Science.gov (United States)

    Huang, Shuqiang; Tao, Ming

    2017-01-22

    Wireless sensor network topology optimization is a highly important issue, and topology control through node selection can improve the efficiency of data forwarding, while saving energy and prolonging lifetime of the network. To address the problem of connecting a wireless sensor network to the Internet in cyber-physical systems, here we propose a geometric gateway deployment based on a competitive swarm optimizer algorithm. The particle swarm optimization (PSO) algorithm has a continuous search feature in the solution space, which makes it suitable for finding the geometric center of gateway deployment; however, its search mechanism is limited to the individual optimum (pbest) and the population optimum (gbest); thus, it easily falls into local optima. In order to improve the particle search mechanism and enhance the search efficiency of the algorithm, we introduce a new competitive swarm optimizer (CSO) algorithm. The CSO search algorithm is based on an inter-particle competition mechanism and can effectively avoid trapping of the population falling into a local optimum. With the improvement of an adaptive opposition-based search and its ability to dynamically parameter adjustments, this algorithm can maintain the diversity of the entire swarm to solve geometric K -center gateway deployment problems. The simulation results show that this CSO algorithm has a good global explorative ability as well as convergence speed and can improve the network quality of service (QoS) level of cyber-physical systems by obtaining a minimum network coverage radius. We also find that the CSO algorithm is more stable, robust and effective in solving the problem of geometric gateway deployment as compared to the PSO or Kmedoids algorithms.

  8. Competitive Swarm Optimizer Based Gateway Deployment Algorithm in Cyber-Physical Systems

    Directory of Open Access Journals (Sweden)

    Shuqiang Huang

    2017-01-01

    Full Text Available Wireless sensor network topology optimization is a highly important issue, and topology control through node selection can improve the efficiency of data forwarding, while saving energy and prolonging lifetime of the network. To address the problem of connecting a wireless sensor network to the Internet in cyber-physical systems, here we propose a geometric gateway deployment based on a competitive swarm optimizer algorithm. The particle swarm optimization (PSO algorithm has a continuous search feature in the solution space, which makes it suitable for finding the geometric center of gateway deployment; however, its search mechanism is limited to the individual optimum (pbest and the population optimum (gbest; thus, it easily falls into local optima. In order to improve the particle search mechanism and enhance the search efficiency of the algorithm, we introduce a new competitive swarm optimizer (CSO algorithm. The CSO search algorithm is based on an inter-particle competition mechanism and can effectively avoid trapping of the population falling into a local optimum. With the improvement of an adaptive opposition-based search and its ability to dynamically parameter adjustments, this algorithm can maintain the diversity of the entire swarm to solve geometric K-center gateway deployment problems. The simulation results show that this CSO algorithm has a good global explorative ability as well as convergence speed and can improve the network quality of service (QoS level of cyber-physical systems by obtaining a minimum network coverage radius. We also find that the CSO algorithm is more stable, robust and effective in solving the problem of geometric gateway deployment as compared to the PSO or Kmedoids algorithms.

  9. Competitive Swarm Optimizer Based Gateway Deployment Algorithm in Cyber-Physical Systems

    Science.gov (United States)

    Huang, Shuqiang; Tao, Ming

    2017-01-01

    Wireless sensor network topology optimization is a highly important issue, and topology control through node selection can improve the efficiency of data forwarding, while saving energy and prolonging lifetime of the network. To address the problem of connecting a wireless sensor network to the Internet in cyber-physical systems, here we propose a geometric gateway deployment based on a competitive swarm optimizer algorithm. The particle swarm optimization (PSO) algorithm has a continuous search feature in the solution space, which makes it suitable for finding the geometric center of gateway deployment; however, its search mechanism is limited to the individual optimum (pbest) and the population optimum (gbest); thus, it easily falls into local optima. In order to improve the particle search mechanism and enhance the search efficiency of the algorithm, we introduce a new competitive swarm optimizer (CSO) algorithm. The CSO search algorithm is based on an inter-particle competition mechanism and can effectively avoid trapping of the population falling into a local optimum. With the improvement of an adaptive opposition-based search and its ability to dynamically parameter adjustments, this algorithm can maintain the diversity of the entire swarm to solve geometric K-center gateway deployment problems. The simulation results show that this CSO algorithm has a good global explorative ability as well as convergence speed and can improve the network quality of service (QoS) level of cyber-physical systems by obtaining a minimum network coverage radius. We also find that the CSO algorithm is more stable, robust and effective in solving the problem of geometric gateway deployment as compared to the PSO or Kmedoids algorithms. PMID:28117735

  10. Spectrum and service pricing for 802.22 networks

    DEFF Research Database (Denmark)

    Stefan, Andrei Lucian; Rota, Cyril; Pratas, Nuno

    2011-01-01

    of channels which have an impact on the demand, and thus on the spectrum pricing. The second part of the paper exemplifies how a Bertrand game model can solve the issue of service pricing for a Wireless Regional Area Network (WRAN) operator that is trying to deploy an 802.22 network in a region where...... a competitor already exists. In this work the service pricing was envisioned as a network preplanning step, one that would show the potential revenues for an operator by entering as inputs, among other, the competitor's coverage area and spectrum pricing. The case study has been conducted through CNPT1...

  11. Scalable and Hybrid Radio Resource Management for Future Wireless Networks

    DEFF Research Database (Denmark)

    Mino, E.; Luo, Jijun; Tragos, E.

    2007-01-01

    The concept of ubiquitous and scalable system is applied in the IST WINNER II [1] project to deliver optimum performance for different deployment scenarios, from local area to wide area wireless networks. The integration in a unique radio system of a cellular and local area type networks supposes...... a great advantage for the final user and for the operator, compared with the current situation, with disconnected systems, usually with different subscriptions, radio interfaces and terminals. To be a ubiquitous wireless system, the IST project WINNER II has defined three system modes. This contribution...

  12. Impact of different cloud deployments on real-time video applications for mobile video cloud users

    Science.gov (United States)

    Khan, Kashif A.; Wang, Qi; Luo, Chunbo; Wang, Xinheng; Grecos, Christos

    2015-02-01

    The latest trend to access mobile cloud services through wireless network connectivity has amplified globally among both entrepreneurs and home end users. Although existing public cloud service vendors such as Google, Microsoft Azure etc. are providing on-demand cloud services with affordable cost for mobile users, there are still a number of challenges to achieve high-quality mobile cloud based video applications, especially due to the bandwidth-constrained and errorprone mobile network connectivity, which is the communication bottleneck for end-to-end video delivery. In addition, existing accessible clouds networking architectures are different in term of their implementation, services, resources, storage, pricing, support and so on, and these differences have varied impact on the performance of cloud-based real-time video applications. Nevertheless, these challenges and impacts have not been thoroughly investigated in the literature. In our previous work, we have implemented a mobile cloud network model that integrates localized and decentralized cloudlets (mini-clouds) and wireless mesh networks. In this paper, we deploy a real-time framework consisting of various existing Internet cloud networking architectures (Google Cloud, Microsoft Azure and Eucalyptus Cloud) and a cloudlet based on Ubuntu Enterprise Cloud over wireless mesh networking technology for mobile cloud end users. It is noted that the increasing trend to access real-time video streaming over HTTP/HTTPS is gaining popularity among both research and industrial communities to leverage the existing web services and HTTP infrastructure in the Internet. To study the performance under different deployments using different public and private cloud service providers, we employ real-time video streaming over the HTTP/HTTPS standard, and conduct experimental evaluation and in-depth comparative analysis of the impact of different deployments on the quality of service for mobile video cloud users. Empirical

  13. Efficiency Evaluation of Strategies for Dynamic Management of Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Andrea Verônica González

    2017-01-01

    Full Text Available This paper presents and evaluates dynamic management strategies to improve efficiency in event-triggered wireless sensor networks. We are considering mobility, where nodes move themselves to maximize the coverage, and load balancing state-of-the-art techniques, by which the number of nodes sensing the same area is reduced. To explore mobility, we present a simple method by which nodes can dynamically reorganize themselves based on the force fields approach of mobile robotics. Firstly, the strategies are evaluated separately through experiments with different network configurations and, afterwards, a joint evaluation has been conducted to observe the impact of mobility on the efficiency of load balancing techniques. We show that mobile nodes significantly contribute to keeping the coverage as nodes die in mesh and powerfully improving it in random deployments. Load balancing techniques achieve important results, increasing lifetime and the number of sensed events. However, in random deployments, these techniques lose efficiency and become unsuitable strategies. Combining these strategies with mobility, we observe that PS-based technique keeps its contribution in mesh and random deployments, as well as improving its performance for not so dense networks. Ant-based technique when combined with mobile nodes loses performance significantly in mesh and keeps its good performance in random deployed and less dense networks.

  14. On Real-Time Systems Using Local Area Networks.

    Science.gov (United States)

    1987-07-01

    87-35 July, 1987 CS-TR-1892 On Real - Time Systems Using Local Area Networks*I VShem-Tov Levi Department of Computer Science Satish K. Tripathit...1892 On Real - Time Systems Using Local Area Networks* Shem-Tov Levi Department of Computer Science Satish K. Tripathit Department of Computer Science...constraints and the clock systems that feed the time to real - time systems . A model for real-time system based on LAN communication is presented in

  15. Real time network traffic monitoring for wireless local area networks based on compressed sensing

    Science.gov (United States)

    Balouchestani, Mohammadreza

    2017-05-01

    A wireless local area network (WLAN) is an important type of wireless networks which connotes different wireless nodes in a local area network. WLANs suffer from important problems such as network load balancing, large amount of energy, and load of sampling. This paper presents a new networking traffic approach based on Compressed Sensing (CS) for improving the quality of WLANs. The proposed architecture allows reducing Data Delay Probability (DDP) to 15%, which is a good record for WLANs. The proposed architecture is increased Data Throughput (DT) to 22 % and Signal to Noise (S/N) ratio to 17 %, which provide a good background for establishing high qualified local area networks. This architecture enables continuous data acquisition and compression of WLAN's signals that are suitable for a variety of other wireless networking applications. At the transmitter side of each wireless node, an analog-CS framework is applied at the sensing step before analog to digital converter in order to generate the compressed version of the input signal. At the receiver side of wireless node, a reconstruction algorithm is applied in order to reconstruct the original signals from the compressed signals with high probability and enough accuracy. The proposed algorithm out-performs existing algorithms by achieving a good level of Quality of Service (QoS). This ability allows reducing 15 % of Bit Error Rate (BER) at each wireless node.

  16. IP Connected Low Power Wireless Personal Area Networks in the Future Internet

    DEFF Research Database (Denmark)

    Jacobsen, Rune Hylsberg; Toftegaard, Thomas Skjødeberg; Kjærgaard, Jens Kristian

    2012-01-01

    The Internet of Things is a key concept of the Future Internet. The Internet of Things potentially interconnects billions of small devices in a large ubiquitous infrastructure based on the Internet Protocol (IP). Typically, these devices will be limited in computational capacity, memory......WPANs). The authors address the key mechanisms from network aspects down to device design aspects and discuss how technologies interplay to make real application deployment practical for the Internet of Things....

  17. Adaptation of Powerline Communications-Based Smart Metering Deployments to the Requirements of Smart Grids

    Directory of Open Access Journals (Sweden)

    Alberto Sendin

    2015-11-01

    Full Text Available Powerline communications (PLC-based smart meter deployments are now a reality in many regions of the world. Although PLC elements are generally incorporated in smart meters and data concentrators, the underlying PLC network allows the integration of other smart grid services directly over it. The remote control capabilities that automation programs need and are today deployed over their medium voltage (MV grid, can be extended to the low voltage (LV grid through these existing PLC networks. This paper demonstrates the capabilities of narrowband high data rate (NB HDR PLC technologies deployed over LV grids for smart metering purposes to support internet protocol internet protocol (IP communications in the LV grid. The paper demonstrates these possibilities with the presentation of the simulation and laboratory results of IP communications over international telecommunication union: ITU-T G.9904 PLC technology, and the definition of a PLC Network Management System based on a simple network management protocol (SNMP management information base (MIB definition and applicable use cases.

  18. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things.

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-09-18

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified.

  19. Local-area communication networks - An overview

    International Nuclear Information System (INIS)

    Kuemmerle, K.

    1982-01-01

    Local-area communication networks represent a new field of activity. In this paper we first describe three scenarios for the use of these networks, and then discuss various technical approaches. Particular emphasis is put on bus and ring systems with various media access control mechanisms. Specifically, we compare the delay-throughput characteristic of two access methods, carrier-sense multiple access with collision detection and token passing, and discuss some significant differences of bus and ring systems concerning wiring, media, transmission, and reliability. (orig.)

  20. High speed fiber optics local area networks: Design and implementation

    Science.gov (United States)

    Tobagi, Fouad A.

    1988-01-01

    The design of high speed local area networks (HSLAN) for communication among distributed devices requires solving problems in three areas: (1) the network medium and its topology; (2) the medium access control; and (3) the network interface. Considerable progress has been made in all areas. Accomplishments are divided into two groups according to their theoretical or experimental nature. A brief summary is given in Section 2, including references to papers which appeared in the literature, as well as to Ph.D. dissertations and technical reports published at Stanford University.

  1. Rich: Region-based Intelligent Cluster-Head Selection and Node Deployment Strategy in Concentric-based WSNs

    Directory of Open Access Journals (Sweden)

    FAN, C.-S.

    2013-11-01

    Full Text Available In a random deployment, sensor nodes are scattered randomly in the sensing field. Hence, the coverage can not be guaranteed. In contrast, the coverage of uniformly deployment is in general larger than the random deployment. However, uniformly deployment strategy may cause unbalanced traffic pattern in wireless sensor networks (WSNs. In this situation, larger load may be imposed to CHs (cluster heads around the sink. Therefore, CHs close to the sink use up their energy earlier than those farther away from the sink. To overcome this problem, we propose a novel node deployment strategy in the concentric model, namely, Region-based Intelligent Cluster-Head selection and node deployment strategy (called Rich. The coverage, energy consumption and data routing issues are well investigated and taken into consideration in the proposed Rich scheme. The simulation results show that the proposed Rich alleviates the unbalanced traffic pattern significantly, prolongs network lifetime and achieves satisfactory coverage ratio.

  2. Performance analysis of data retrieval in wireless sensor networks

    NARCIS (Netherlands)

    Mitici, M.A.

    2015-01-01

    Wireless sensor networks are currently revolutionizing the way we live, work, and interact with the surrounding environment. Due to their ease of deployment, cost effectiveness and versatile functionality, sensors are employed in a wide range of areas such as environmental monitoring, surveillance

  3. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks.

    Science.gov (United States)

    Liu, Jingwei; Zhang, Lihuan; Sun, Rong

    2016-05-19

    Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs) have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP) is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  4. 1-RAAP: An Efficient 1-Round Anonymous Authentication Protocol for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Jingwei Liu

    2016-05-01

    Full Text Available Thanks to the rapid technological convergence of wireless communications, medical sensors and cloud computing, Wireless Body Area Networks (WBANs have emerged as a novel networking paradigm enabling ubiquitous Internet services, allowing people to receive medical care, monitor health status in real-time, analyze sports data and even enjoy online entertainment remotely. However, because of the mobility and openness of wireless communications, WBANs are inevitably exposed to a large set of potential attacks, significantly undermining their utility and impeding their widespread deployment. To prevent attackers from threatening legitimate WBAN users or abusing WBAN services, an efficient and secure authentication protocol termed 1-Round Anonymous Authentication Protocol (1-RAAP is proposed in this paper. In particular, 1-RAAP preserves anonymity, mutual authentication, non-repudiation and some other desirable security properties, while only requiring users to perform several low cost computational operations. More importantly, 1-RAAP is provably secure thanks to its design basis, which is resistant to the anonymous in the random oracle model. To validate the computational efficiency of 1-RAAP, a set of comprehensive comparative studies between 1-RAAP and other authentication protocols is conducted, and the results clearly show that 1-RAAP achieves the best performance in terms of computational overhead.

  5. Wireless Local Area Network (WLAN) Vulnerability Assessment and Security

    National Research Council Canada - National Science Library

    Kessel, Adam; Goodwin, Shane

    2005-01-01

    The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC...

  6. Mathematical theories of distributed sensor networks

    CERN Document Server

    Iyengar, Sitharama S; Balakrishnan, N

    2014-01-01

    Mathematical Theory of Distributed Sensor Networks demonstrates how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. The book introduces the mathematical and computational structure by discussing what they are, their applications and how they differ from traditional systems. The text also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, the authors discuss some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks.

  7. Performance Analysis of Scheduling Schemes for Femto to Macro Interference Coordination in LTE-Femtocell Deployment Scenario

    Directory of Open Access Journals (Sweden)

    Rafina Destiarti Ainul

    2016-08-01

    Full Text Available Deploying femtocells that have low power level in LTE with small coverage area is an alternative solution for mobile operators to improve indoors network coverage area as well as system capacity. However deploying femtocells (HeNB that were used co-channel frequency, can be brought about interference problem to the Macro BTS (eNB. Close Subscriber Group (CSG of HeNB allows only User equipment (UE to access HeNB. HeNB is the source of interference for UE who cannot access it. Therefore it is necessary for interference coordination methods among the HeNB and eNB. The methods are ICIC (Intercell Interference Coordination and eICIC (enhanced Intercell Interference Coordination.  This paper proposed performance analysis of scheduling schemes for Femto to macro interference coordination that allocated resource in the frequency and time domain using LTE-Femtocell suburban and urban deployment scenario. Simulation result using ICIC methods can improve SINR performance 15.77 % in urban and 28.66 % in suburban, throughput performance 10.11 % in urban and 21.05 % in suburban. eICIC methods can improve SINR performance 17.44 % in urban and 31.14 % in suburban, throughput performance 19.83% in urban and 44.39 % in suburban.The result prove using eICIC method in time domain resource have better performance than using ICIC method in frequency resource. However using eICIC method in suburban deployment scenariocan increase the performance of SINR and throughput more effective than using eICIC method in urban deployment scenario.

  8. Information manual for the experimentation of the deployment of optical fibers on public power distribution networks; Notice d'information pour l'experimentation du deploiement de fibres optiques sur les reseaux publics d'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    During the French inter-ministry committee for the national development (CIADT) of July 9, 2001, the government decided to launch a feasibility study about the deployment of telecommunication optical fibers over the whole territory using the electricity transportation grid. The aim is to give access to high-speed Internet to everyone and at a reasonable cost. This manual summarizes the technical, legal and economical results of the study carried out by the working group: 1 - the actors in concern (managers of power transportation and distribution networks, country authorities, managers and users of telecommunication infrastructures, regulatory agencies, financial organizations); 2 - the telecommunication networks on power lines; 3 - the feasibility of the experimentation (relations between the different partners, conditions); 4 - the implementation of the experimentation (useful contacts, contracts); 5 - the experimentation areas. Appendixes. (J.S.)

  9. Designing a Softwarized Network Deployed on a Fleet of Drones for Rural Zone Monitoring

    Directory of Open Access Journals (Sweden)

    Corrado Rametta

    2017-03-01

    Full Text Available In the last decade, the differences in the information communication technology (ICT infrastructures between urban and rural areas have registered a tremendous increase. ICT infrastructures could strongly help rural communities where many operations are time consuming, labor-intensive and expensive due to limited access and large distances to cover. One of the most attractive solutions, which is widely recognized as promising for filling this gap, is the use of drone fleets. In this context, this paper proposes a video monitoring platform as a service (VMPaaS for wide rural areas not covered by Internet access. The platform is realized with a Software-Defined Network (SDN/Network Functions Virtualization (NFV-based flying ad-hoc network (FANET, whose target is providing a flexible and dynamic connectivity backbone, and a set of drones equipped with high-resolution cameras, each transmitting a video stream of a portion of the considered area. After describing the architecture of the proposed platform, service chains to realize the video delivery service are described, and an analytical model is defined to evaluate the computational load of the platform nodes in such a way so as to allow the network orchestrator to decide the backbone drones where running the virtual functions, and the relative resources to be allocated. Numerical analysis is carried out in a case study.

  10. An overview of trends in distribution network planning: A movement towards smart planning

    DEFF Research Database (Denmark)

    You, Shi; Bindner, Henrik W.; Hu, Junjie

    2014-01-01

    Distribution network planning, historically known as a ‘predict and provide’ process, seeks to determine a set of optimal network solutions for supplying electric demands spatially distributed over a geographic area. Today, the rapid development and deployment of distributed generation and smart...... grid products (e.g., control, communication, and new economic measures) call for urgent improvements in distribution network planning to allow the utilities to proactively modernize their existing distribution grids. This paper reviews the current practices in this area and the emerging trends towards...

  11. Wide area monitoring, protection and control systems the enabler for smarter grids

    CERN Document Server

    Vaccaro, Alfredo

    2016-01-01

    This book is designed to give electrical and electronic engineers involved in the design, operation and maintenance of electrical power networks, the knowledge and skills necessary to deploy synchronised measurement technology (SMT) in Wide Area Monitoring, Protection And Control (WAMPAC) applications.

  12. Local-area networks in nuclear physics (survey)

    International Nuclear Information System (INIS)

    Foteev, V.A.

    1987-01-01

    The design fundamentals, comparative characteristics, and possibilities of local-area networks as applied to physics experiments are examined. The example of Ethernet is used to explain the operation of local networks, and the results of a study of their functional characteristics are presented. Examples of operational local networks in nuclear physics research and atomic engineering are given: the Japan Research Institute of Atomic Energy, the University of California, and Los Alamos National Laboratory; atomic power plant control in Japan; DECnet and Fastbus; network developments at the Siberian Branch of the Academy of Sciences of the USSR and at the Laboratory of Neutron Physics of the Joint Institute for Nuclear Research; and others. It is shown that local networks are important means that considerably increase productivity in data processing

  13. Wireless local area network. A new technology of network

    International Nuclear Information System (INIS)

    Wu Yunjun; Zhao Zongtao

    2003-01-01

    This paper introduces Wireless Local Area Network (WLAN), including the concept, history, characters and the foreground of its development, it also narrates in detail the several key techniques used to implement IEEE802.11 WLAN, and ideas on key technology of future progress in wireless LAN field have also been presented. (authors)

  14. Automatically assessing properties of dynamic cameras for camera selection and rapid deployment of video content analysis tasks in large-scale ad-hoc networks

    Science.gov (United States)

    den Hollander, Richard J. M.; Bouma, Henri; van Rest, Jeroen H. C.; ten Hove, Johan-Martijn; ter Haar, Frank B.; Burghouts, Gertjan J.

    2017-10-01

    Video analytics is essential for managing large quantities of raw data that are produced by video surveillance systems (VSS) for the prevention, repression and investigation of crime and terrorism. Analytics is highly sensitive to changes in the scene, and for changes in the optical chain so a VSS with analytics needs careful configuration and prompt maintenance to avoid false alarms. However, there is a trend from static VSS consisting of fixed CCTV cameras towards more dynamic VSS deployments over public/private multi-organization networks, consisting of a wider variety of visual sensors, including pan-tilt-zoom (PTZ) cameras, body-worn cameras and cameras on moving platforms. This trend will lead to more dynamic scenes and more frequent changes in the optical chain, creating structural problems for analytics. If these problems are not adequately addressed, analytics will not be able to continue to meet end users' developing needs. In this paper, we present a three-part solution for managing the performance of complex analytics deployments. The first part is a register containing meta data describing relevant properties of the optical chain, such as intrinsic and extrinsic calibration, and parameters of the scene such as lighting conditions or measures for scene complexity (e.g. number of people). A second part frequently assesses these parameters in the deployed VSS, stores changes in the register, and signals relevant changes in the setup to the VSS administrator. A third part uses the information in the register to dynamically configure analytics tasks based on VSS operator input. In order to support the feasibility of this solution, we give an overview of related state-of-the-art technologies for autocalibration (self-calibration), scene recognition and lighting estimation in relation to person detection. The presented solution allows for rapid and robust deployment of Video Content Analysis (VCA) tasks in large scale ad-hoc networks.

  15. Sharing cost in social community networks

    DEFF Research Database (Denmark)

    Pal, Ranjan; Elango, Divya; Wardana, Satya Ardhy

    2012-01-01

    their deployment in a residential locality. Our proposed mechanism accounts for heterogeneous user preferences towards different router features and comes up with the optimal (feature-set, user costs) router blueprint that satisfies each user in a locality, in turn motivating them to buy routers and thereby improve......Wireless social community networks (WSCNs) is an emerging technology that operate in the unlicensed spectrum and have been created as an alternative to cellular wireless networks for providing low-cost, high speed wireless data access in urban areas. WSCNs is an upcoming idea that is starting...... reflect their slow progress in capturing the WiFi router market. In this paper, we look at a router design and cost sharing problem in WSCNs to improve deployment. We devise a simple to implement, successful, budget-balanced, ex-post efficient, and individually rational auction-based mechanism...

  16. Ad hoc mobile wireless networks principles, protocols and applications

    CERN Document Server

    Sarkar, Subir Kumar; Puttamadappa, C

    2007-01-01

    Ad hoc mobile wireless networks have seen increased adaptation in a variety of disciplines because they can be deployed with simple infrastructures and virtually no central administration. In particular, the development of ad hoc wireless and sensor networks provides tremendous opportunities in areas including disaster recovery, defense, health care, and industrial environments. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications explains the concepts, mechanisms, design, and performance of these systems. It presents in-depth explanations of the latest wireless technologies

  17. The DARPA quantum network

    International Nuclear Information System (INIS)

    Elliot, B.

    2005-01-01

    Full text: The DARPA quantum network is now in initial operational, with six nodes performing quantum cryptography 24x7 across the Boston metro area between our campuses at Harvard University, Boston University, and BBN Technologies. In this talk, we present our recent activities, including the deployment of this network, building our Mark 1 Entangled QKD system, porting BBN QKD protocol software to NIST and Qinetiq freespace systems, performing initial design of a superconducting single photon detector with U. Rochester and NIST Boulder, and implementing a novel Low-Density Parity Check (LDPC) protocol for QKD. (author)

  18. Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey

    OpenAIRE

    Pearl Antil; Amita Malik

    2014-01-01

    Owing to random deployment, environmental factors, dynamic topology, and external attacks, emergence of holes in wireless sensor networks is inescapable. Hole is an area in sensor network around which sensors cease to sense or communicate due to drainage of battery or any fault, either temporary or permanent. Holes impair sensing and communication functions of network; thus their identification is a major concern. This paper discusses different types of holes and significance of hole detectio...

  19. Deployment of e-health services - a business model engineering strategy.

    Science.gov (United States)

    Kijl, Björn; Nieuwenhuis, Lambert J M; Huis in 't Veld, Rianne M H A; Hermens, Hermie J; Vollenbroek-Hutten, Miriam M R

    2010-01-01

    We designed a business model for deploying a myofeedback-based teletreatment service. An iterative and combined qualitative and quantitative action design approach was used for developing the business model and the related value network. Insights from surveys, desk research, expert interviews, workshops and quantitative modelling were combined to produce the first business model and then to refine it in three design cycles. The business model engineering strategy provided important insights which led to an improved, more viable and feasible business model and related value network design. Based on this experience, we conclude that the process of early stage business model engineering reduces risk and produces substantial savings in costs and resources related to service deployment.

  20. Distributed Large Data-Object Environments: End-to-End Performance Analysis of High Speed Distributed Storage Systems in Wide Area ATM Networks

    Science.gov (United States)

    Johnston, William; Tierney, Brian; Lee, Jason; Hoo, Gary; Thompson, Mary

    1996-01-01

    We have developed and deployed a distributed-parallel storage system (DPSS) in several high speed asynchronous transfer mode (ATM) wide area networks (WAN) testbeds to support several different types of data-intensive applications. Architecturally, the DPSS is a network striped disk array, but is fairly unique in that its implementation allows applications complete freedom to determine optimal data layout, replication and/or coding redundancy strategy, security policy, and dynamic reconfiguration. In conjunction with the DPSS, we have developed a 'top-to-bottom, end-to-end' performance monitoring and analysis methodology that has allowed us to characterize all aspects of the DPSS operating in high speed ATM networks. In particular, we have run a variety of performance monitoring experiments involving the DPSS in the MAGIC testbed, which is a large scale, high speed, ATM network and we describe our experience using the monitoring methodology to identify and correct problems that limit the performance of high speed distributed applications. Finally, the DPSS is part of an overall architecture for using high speed, WAN's for enabling the routine, location independent use of large data-objects. Since this is part of the motivation for a distributed storage system, we describe this architecture.

  1. Process of 3D wireless decentralized sensor deployment using parsing crossover scheme

    Directory of Open Access Journals (Sweden)

    Albert H.R. Ko

    2015-07-01

    Full Text Available A Wireless Sensor Networks (WSN usually consists of numerous wireless devices deployed in a region of interest, each able to collect and process environmental information and communicate with neighboring devices. It can thus be regarded as a Multi-Agent System for territorial security, where individual agents cooperate with each other to avoid duplication of effort and to exploit other agent’s capacities. The problem of sensor deployment becomes non-trivial when we consider environmental factors, such as terrain elevations. Due to the fact that all sensors are homogeneous, the chromosomes that encode sensor positions are actually interchangeable, and conventional crossover schemes such as uniform crossover would cause some redundancy as well as over-concentration in certain specific geographical area. We propose a Parsing Crossover Scheme that intends to reduce redundancy and ease geographical concentration pattern in an effort to facilitate the search. The proposed parsing crossover method demonstrates better performances than those of uniform crossover under different terrain irregularities.

  2. Metropolitian area network services comprised of virtual local area networks running over hybrid fiber-coax and asynchronous transfer mode technologies

    Science.gov (United States)

    Biedron, William S.

    1995-11-01

    Since 1990 there has been a rapid increase in the demand for communication services, especially local and wide area network (LAN/WAN) oriented services. With the introduction of the DFB laser transmitter, hybrid-fiber-coax (HFC) cable plant designs, ATM transport technologies and rf modems, new LAN/WAN services can now be defined and marketed to residential and business customers over existing cable TV systems. The term metropolitan area network (MAN) can be used to describe this overall network. This paper discusses the technical components needed to provision these services as well as provides some perspectives on integration issues. Architecture at the headend and in the backbone is discussed, as well as specific service definitions and the technology issues associated with each. The TCP/IP protocol is suggested as a primary protocol to be used throughout the MAN.

  3. Extending Service Area of IEEE 802.11 Ad Hoc Networks

    Science.gov (United States)

    Choi, Woo-Yong

    2012-06-01

    According to the current IEEE 802.11 wireless LAN standards, IEEE 802.11 ad hoc networks have the limitation that all STAs (Stations) are in the one-hop transmission range of each other. In this paper, to alleviate the limitation of IEEE 802.11 ad hoc networks we propose the efficient method for selecting the most appropriate pseudo AP (Access Point) from among the set of ad hoc STAs and extending the service area of IEEE 802.11 ad hoc networks by the pseudo AP's relaying the internal traffic of IEEE 802.11 ad hoc networks. Numerical examples show that the proposed method significantly extends the service area of IEEE 802.11 ad hoc networks.

  4. Economic benefits of broadened local area networks for electric power plants

    International Nuclear Information System (INIS)

    Holmes, T.

    1988-01-01

    The paper discusses economic benefits which influenced the choice of a broadband local area network for a power plant instead of an alternative multi-cable communication network. Broadband communication networks can offer significant economies over alternative technologies. One-time, cost avoidance savings and recurring annual savings are estimated to total $5.1 million in the first year. The cost/benefit analysis presented here can be used as a guide by other utilities to analyze communication networking alternatives. The paper also includes a discussion of local area network attributes relevant to the power plant installation

  5. Analysis of LTE 800MHz Network Deployment Strategy%LTE 800MHz网络部署策略分析

    Institute of Scientific and Technical Information of China (English)

    余扬尧; 陈杨; 杨芙蓉

    2016-01-01

    Starting ifrst with the current mobile user development situation of the three operators, the paper analyzed the necessity of China telecom LTE 800 MHz network construction, the network coverage, terminal market, construction speed, the business competition, and etc., concluded the short-term, mid-term and long-term deployment strategy for LTE 800 MHz.%首先从当前三大运营商的移动业务用户发展情况入手,分析了中国电信LTE 800 MHz网络建设的必要性,对LTE 800 MHz的网络覆盖、终端市场、建设速度、业务竞争等几个方面进行分析,得出了LTE 800 MHz近、中、远期的部署策略。

  6. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Science.gov (United States)

    Wang, Lusheng; Wang, Yamei; Ding, Zhizhong; Wang, Xiumin

    2015-01-01

    With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs) tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS) game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI). In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG), forming a congestion game with ICI (CGI) and a congestion game with capacity (CGC). For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE). Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell) is profoundly revealed, and the collapse points are identified. PMID:26393617

  7. Cell Selection Game for Densely-Deployed Sensor and Mobile Devices In 5G Networks Integrating Heterogeneous Cells and the Internet of Things

    Directory of Open Access Journals (Sweden)

    Lusheng Wang

    2015-09-01

    Full Text Available With the rapid development of wireless networking technologies, the Internet of Things and heterogeneous cellular networks (HCNs tend to be integrated to form a promising wireless network paradigm for 5G. Hyper-dense sensor and mobile devices will be deployed under the coverage of heterogeneous cells, so that each of them could freely select any available cell covering it and compete for resource with others selecting the same cell, forming a cell selection (CS game between these devices. Since different types of cells usually share the same portion of the spectrum, devices selecting overlapped cells can experience severe inter-cell interference (ICI. In this article, we study the CS game among a large amount of densely-deployed sensor and mobile devices for their uplink transmissions in a two-tier HCN. ICI is embedded with the traditional congestion game (TCG, forming a congestion game with ICI (CGI and a congestion game with capacity (CGC. For the three games above, we theoretically find the circular boundaries between the devices selecting the macrocell and those selecting the picocells, indicated by the pure strategy Nash equilibria (PSNE. Meanwhile, through a number of simulations with different picocell radii and different path loss exponents, the collapse of the PSNE impacted by severe ICI (i.e., a large number of picocell devices change their CS preferences to the macrocell is profoundly revealed, and the collapse points are identified.

  8. Regular Topologies for Gigabit Wide-Area Networks. Volume 1

    Science.gov (United States)

    Shacham, Nachum; Denny, Barbara A.; Lee, Diane S.; Khan, Irfan H.; Lee, Danny Y. C.; McKenney, Paul

    1994-01-01

    In general terms, this project aimed at the analysis and design of techniques for very high-speed networking. The formal objectives of the project were to: (1) Identify switch and network technologies for wide-area networks that interconnect a large number of users and can provide individual data paths at gigabit/s rates; (2) Quantitatively evaluate and compare existing and proposed architectures and protocols, identify their strength and growth potentials, and ascertain the compatibility of competing technologies; and (3) Propose new approaches to existing architectures and protocols, and identify opportunities for research to overcome deficiencies and enhance performance. The project was organized into two parts: 1. The design, analysis, and specification of techniques and protocols for very-high-speed network environments. In this part, SRI has focused on several key high-speed networking areas, including Forward Error Control (FEC) for high-speed networks in which data distortion is the result of packet loss, and the distribution of broadband, real-time traffic in multiple user sessions. 2. Congestion Avoidance Testbed Experiment (CATE). This part of the project was done within the framework of the DARTnet experimental T1 national network. The aim of the work was to advance the state of the art in benchmarking DARTnet's performance and traffic control by developing support tools for network experimentation, by designing benchmarks that allow various algorithms to be meaningfully compared, and by investigating new queueing techniques that better satisfy the needs of best-effort and reserved-resource traffic. This document is the final technical report describing the results obtained by SRI under this project. The report consists of three volumes: Volume 1 contains a technical description of the network techniques developed by SRI in the areas of FEC and multicast of real-time traffic. Volume 2 describes the work performed under CATE. Volume 3 contains the source

  9. Scalability analysis of large-scale LoRaWAN networks in ns-3

    OpenAIRE

    Abeele, Floris Van den; Haxhibeqiri, Jetmir; Moerman, Ingrid; Hoebeke, Jeroen

    2017-01-01

    As LoRaWAN networks are actively being deployed in the field, it is important to comprehend the limitations of this Low Power Wide Area Network technology. Previous work has raised questions in terms of the scalability and capacity of LoRaWAN networks as the number of end devices grows to hundreds or thousands per gateway. Some works have modeled LoRaWAN networks as pure ALOHA networks, which fails to capture important characteristics such as the capture effect and the effects of interference...

  10. Hybrid architecture for building secure sensor networks

    Science.gov (United States)

    Owens, Ken R., Jr.; Watkins, Steve E.

    2012-04-01

    Sensor networks have various communication and security architectural concerns. Three approaches are defined to address these concerns for sensor networks. The first area is the utilization of new computing architectures that leverage embedded virtualization software on the sensor. Deploying a small, embedded virtualization operating system on the sensor nodes that is designed to communicate to low-cost cloud computing infrastructure in the network is the foundation to delivering low-cost, secure sensor networks. The second area focuses on securing the sensor. Sensor security components include developing an identification scheme, and leveraging authentication algorithms and protocols that address security assurance within the physical, communication network, and application layers. This function will primarily be accomplished through encrypting the communication channel and integrating sensor network firewall and intrusion detection/prevention components to the sensor network architecture. Hence, sensor networks will be able to maintain high levels of security. The third area addresses the real-time and high priority nature of the data that sensor networks collect. This function requires that a quality-of-service (QoS) definition and algorithm be developed for delivering the right data at the right time. A hybrid architecture is proposed that combines software and hardware features to handle network traffic with diverse QoS requirements.

  11. Optimal Dimensioning of FiWi Networks over Advanced Metering Infrastructure for the Smart Grid

    DEFF Research Database (Denmark)

    Inga, Esteban; Peralta-Sevilla, Arturo; Hincapié, Roberto

    2015-01-01

    —In this paper, we propose a hybrid wireless mesh network infrastructure which connects the smart meters of each consumer with the data aggregation points (DAP). We suppose a set of smart meters that need to send information, and receive information from a central office on electrical enterprises...... through of the meter data management system (MDMS), and so forming the advanced metering infrastructure (AMI) stage of smart grids. We consider a multi-hop system, where information is routed through several nodes which act as DAP. Wireless mesh networks are known to extend coverage and increase...... deployment efficiency, so they could be an alternative for the connection between Home Area Network (HAN) and the Neighborhood Area Network (NAN). However, the NAN data must be send through wider area cabled networks to Metropolitan Area Network (MAN), and based on the WDM-PON architecture. We consider...

  12. Resource management for multimedia services in high data rate wireless networks

    CERN Document Server

    Zhang, Ruonan; Pan, Jianping

    2017-01-01

    This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.

  13. Multi-parameter observations in the Ibero-Moghrebian region: the Western Mediterranean seismic network (WM) and ROA GPS geodynamic network

    Science.gov (United States)

    Pazos, Antonio; Martín Davila, José; Buforn, Elisa; Gárate Pasquín, Jorge; Catalán Morollón, Manuel; Hanka, Winfried; Udías, Agustín.; Benzzeghoud, Mourad; Harnafi, Mimoun

    2010-05-01

    The plate boundary between Eurasia and Africa plates crosses the called "Ibero-Maghrebian" region from the San Vicente Cape (SW Portugal) to Tunisia including the South of Iberia, Alboran Sea, and northern Morocco and Algeria. In this area, the convergence, with a low rate, is accommodated over a wide and diffuse deformation zone, characterized by a significant and widespread moderate seismic activity [Buforn et al., 1995], and the occurrence of large earthquakes is separated by long time intervals. Since more than hundred years ago San Fernando Naval Observatory (ROA), in collaboration with other Institutes, has deployed different geophysical and geodetic equipment in the Southern Spain - North-western Africa area in order to study this broad deformation zone. Currently a Broad Band seismic net (Western Mediterranean, WM net) is deployed, in collaboration with other institutions, around the Gulf of Cádiz and the Alboran sea, with stations in the South of Iberia and in North Africa (at Spanish places and Morocco), together with the seismic stations a permanent geodetic GPS net is co-installed at the same sites. Also, other geophysical instruments have been installed: a Satellite Laser Ranging (SLR) station at San Fernando Observatory Headquarter, a Geomagnetic Observatory in Cádiz bay area and some meteorological stations. These networks have been recently improved with the deployment of a new submarine and on-land geophysical observatory in the Alboran island (ALBO Observatory), where a permanent GPS, a meteorological station were installed on land and a permanent submarine observatory in 50 meters depth was also deploy in last October (with a broad band seismic sensor, a 3 C accelerometer and a DPG). This work shows the present status and the future plans of these networks and some results.

  14. FloorNet: Deployment and Evaluation of a Multihop Wireless 802.11 Testbed

    Directory of Open Access Journals (Sweden)

    Zink Michael

    2010-01-01

    Full Text Available A lot of attention has been given to multihop wireless networks lately, but further research—in particular, through experimentation—is needed. This attention has motivated an increase in the number of 802.11-based deployments, both indoor and outdoor. These testbeds, which require a significant amount of resources during both deployment and maintenance, are used to run measurements in order to analyze and understand the limitation and differences between analytical or simulation-based figures and the results from real-life experimentation. This paper makes two major contributions: (i first, we describe a novel wireless multihop testbed, which we name FloorNet, that is deployed and operated under the false floor of a lab in our Computer Science building. This false floor provides a strong physical protection that prevents disconnections or misplacements, as well as radio shielding (to some extent thanks to the false floor panels—this later feature is assessed through experimentation; (ii second, by running exhaustive and controlled experiments we are able to analyze the performance limits of commercial off-the-shelf hardware, as well as to derive practical design criteria for the deployment and configuration of mesh networks. These results both provide valuable insights of wireless multihop performance and prove that FloorNet constitutes a valuable asset to research on wireless mesh networks.

  15. Active system area networks for data intensive computations. Final report

    Energy Technology Data Exchange (ETDEWEB)

    None

    2002-04-01

    The goal of the Active System Area Networks (ASAN) project is to develop hardware and software technologies for the implementation of active system area networks (ASANs). The use of the term ''active'' refers to the ability of the network interfaces to perform application-specific as well as system level computations in addition to their traditional role of data transfer. This project adopts the view that the network infrastructure should be an active computational entity capable of supporting certain classes of computations that would otherwise be performed on the host CPUs. The result is a unique network-wide programming model where computations are dynamically placed within the host CPUs or the NIs depending upon the quality of service demands and network/CPU resource availability. The projects seeks to demonstrate that such an approach is a better match for data intensive network-based applications and that the advent of low-cost powerful embedded processors and configurable hardware makes such an approach economically viable and desirable.

  16. Implementation of Multiple Host Nodes in Wireless Sensing Node Network System for Landslide Monitoring

    International Nuclear Information System (INIS)

    Bin Abas, Faizulsalihin; Takayama, Shigeru

    2015-01-01

    This paper proposes multiple host nodes in Wireless Sensing Node Network System (WSNNS) for landslide monitoring. As landslide disasters damage monitoring system easily, one major demand in landslide monitoring is the flexibility and robustness of the system to evaluate the current situation in the monitored area. For various reasons WSNNS can provide an important contribution to reach that aim. In this system, acceleration sensors and GPS are deployed in sensing nodes. Location information by GPS, enable the system to estimate network topology and enable the system to perceive the location in emergency by monitoring the node mode. Acceleration sensors deployment, capacitate this system to detect slow mass movement that can lead to landslide occurrence. Once deployed, sensing nodes self-organize into an autonomous wireless ad hoc network. The measurement parameter data from sensing nodes is transmitted to Host System via host node and ''Cloud'' System. The implementation of multiple host nodes in Local Sensing Node Network System (LSNNS), improve risk- management of the WSNNS for real-time monitoring of landslide disaster

  17. Implementation of Multiple Host Nodes in Wireless Sensing Node Network System for Landslide Monitoring

    Science.gov (United States)

    Abas, Faizulsalihin bin; Takayama, Shigeru

    2015-02-01

    This paper proposes multiple host nodes in Wireless Sensing Node Network System (WSNNS) for landslide monitoring. As landslide disasters damage monitoring system easily, one major demand in landslide monitoring is the flexibility and robustness of the system to evaluate the current situation in the monitored area. For various reasons WSNNS can provide an important contribution to reach that aim. In this system, acceleration sensors and GPS are deployed in sensing nodes. Location information by GPS, enable the system to estimate network topology and enable the system to perceive the location in emergency by monitoring the node mode. Acceleration sensors deployment, capacitate this system to detect slow mass movement that can lead to landslide occurrence. Once deployed, sensing nodes self-organize into an autonomous wireless ad hoc network. The measurement parameter data from sensing nodes is transmitted to Host System via host node and "Cloud" System. The implementation of multiple host nodes in Local Sensing Node Network System (LSNNS), improve risk- management of the WSNNS for real-time monitoring of landslide disaster.

  18. The deployment of carbon monoxide wireless sensor network (CO-WSN) for ambient air monitoring.

    Science.gov (United States)

    Chaiwatpongsakorn, Chaichana; Lu, Mingming; Keener, Tim C; Khang, Soon-Jai

    2014-06-16

    Wireless sensor networks are becoming increasingly important as an alternative solution for environment monitoring because they can reduce cost and complexity. Also, they can improve reliability and data availability in places where traditional monitoring methods are difficult to site. In this study, a carbon monoxide wireless sensor network (CO-WSN) was developed to measure carbon monoxide concentrations at a major traffic intersection near the University of Cincinnati main campus. The system has been deployed over two weeks during Fall 2010, and Summer 2011-2012, traffic data was also recorded by using a manual traffic counter and a video camcorder to characterize vehicles at the intersection 24 h, particularly, during the morning and evening peak hour periods. According to the field test results, the 1 hr-average CO concentrations were found to range from 0.1-1.0 ppm which is lower than the National Ambient Air Quality Standards (NAAQS) 35 ppm on a one-hour averaging period. During rush hour periods, the traffic volume at the intersection varied from 2,067 to 3,076 vehicles per hour with 97% being passenger vehicles. Furthermore, the traffic volume based on a 1-h average showed good correlation (R2 = 0.87) with the 1-h average CO-WSN concentrations for morning and evening peak time periods whereas CO-WSN results provided a moderate correlation (R2 = 0.42) with 24 hours traffic volume due to fluctuated changes of meteorological conditions. It is concluded that the performance and the reliability of wireless ambient air monitoring networks can be used as an alternative method for real time air monitoring.

  19. Final Technical Report: Commercial Advanced Lighting Control (ALC) Demonstration and Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Arnold, Gabe [Efficiency Forward, Inc. / DesignLights Consortium

    2018-02-05

    This three-year demonstration and deployment project sought to address market barriers to accelerating the adoption of Advanced Lighting Controls (ALCs), an underutilized technology with low market penetration. ALCs are defined as networked, addressable lighting control systems that utilize software or intelligent controllers to combine multiple energy-saving lighting control strategies in a single space (e.g., smart-time scheduling, daylight harvesting, task tuning, occupancy control, personal control, variable load-shedding, and plug-load control). The networked intelligent aspect of these systems allows applicable lighting control strategies to be combined in a single space, layered over one another, maximizing overall energy-savings. The project included five real building demonstrations of ALCs across the Northeast US region. The demonstrations provided valuable data and experience to support deployment tasks that are necessary to overcome market barriers. These deployment tasks included development of training resources for building designers, installers, and trades, as well as development of new energy efficiency rebates for the technology from Efficiency Forward’s utility partners. Educating designers, installers, and trades on ALCs is a critical task for reducing the cost of the technology that is currently inflated due to perceived complexity and unfamiliarity with how to design and install the systems. Further, utility and non-utility energy efficiency programs continue to relegate the technology to custom or ill-suited prescriptive program designs that do not effectively deploy the technology at scale. This project developed new, scalable rebate approaches for the technology. Efficiency Forward utilized their DesignLights Consortium® (DLC) brand and network of 81 DLC member utilities to develop and deploy the results of the project. The outputs of the project have included five published case studies, a six-hour ALC technology training curriculum

  20. On Network Coded Filesystem Shim

    DEFF Research Database (Denmark)

    Sørensen, Chres Wiant; Roetter, Daniel Enrique Lucani; Médard, Muriel

    2017-01-01

    Although network coding has shown the potential to revolutionize networking and storage, its deployment has faced a number of challenges. Usual proposals involve two approaches. First, deploying a new protocol (e.g., Multipath Coded TCP), or retrofitting another one (e.g., TCP/NC) to deliver bene...

  1. Hybrid Wavelength Routed and Optical Packet Switched Ring Networks for the Metropolitan Area Network

    DEFF Research Database (Denmark)

    Nord, Martin

    2005-01-01

    Increased data traffic in the metropolitan area network calls for new network architectures. This paper evaluates optical ring architectures based on optical packet switching, wavelength routing, and hybrid combinations of the two concepts. The evaluation includes overall throughput and fairness...... attractive when traffic is unbalanced....

  2. Rogue AP Detection in the Wireless LAN for Large Scale Deployment

    OpenAIRE

    Sang-Eon Kim; Byung-Soo Chang; Sang Hong Lee; Dae Young Kim

    2006-01-01

    The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to...

  3. Multi-Layer Mobility Load Balancing in a Heterogeneous LTE Network

    DEFF Research Database (Denmark)

    Fotiadis, Panagiotis; Polignano, Michele; Laselva, Daniela

    2012-01-01

    This paper analyzes the behavior of a distributed Mobility Load Balancing (MLB) scheme in a multi-layer 3GPP (3rd Generation Partnership Project) Long Term Evolution (LTE) deployment with different User Equipment (UE) densities in certain network areas covered with pico cells. Target of the study...

  4. A report on FY06 IPv6 deployment activities and issues at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Tolendino, Lawrence F.; Eldridge, John M.; Hu, Tan Chang

    2006-06-01

    Internet Protocol version 4 (IPv4) has been a mainstay of the both the Internet and corporate networks for delivering network packets to the desired destination. However, rapid proliferation of network appliances, evolution of corporate networks, and the expanding Internet has begun to stress the limitations of the protocol. Internet Protocol version 6 (IPv6) is the replacement protocol that overcomes the constraints of IPv4. IPv6 deployment in government network backbones has been mandated to occur by 2008. This paper explores the readiness of the Sandia National Laboratories' network backbone to support IPv6, the issues that must be addressed before a deployment begins, and recommends the next steps to take to comply with government mandates. The paper describes a joint, work effort of the Sandia National Laboratories ASC WAN project team and members of the System Analysis & Trouble Resolution and Network System Design & Implementation Departments.

  5. An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge

    Directory of Open Access Journals (Sweden)

    Le Xuan Hung

    2008-12-01

    Full Text Available For many sensor network applications such as military or homeland security, it is essential for users (sinks to access the sensor network while they are moving. Sink mobility brings new challenges to secure routing in large-scale sensor networks. Previous studies on sink mobility have mainly focused on efficiency and effectiveness of data dissemination without security consideration. Also, studies and experiences have shown that considering security during design time is the best way to provide security for sensor network routing. This paper presents an energy-efficient secure routing and key management for mobile sinks in sensor networks, called SCODEplus. It is a significant extension of our previous study in five aspects: (1 Key management scheme and routing protocol are considered during design time to increase security and efficiency; (2 The network topology is organized in a hexagonal plane which supports more efficiency than previous square-grid topology; (3 The key management scheme can eliminate the impacts of node compromise attacks on links between non-compromised nodes; (4 Sensor node deployment is based on Gaussian distribution which is more realistic than uniform distribution; (5 No GPS or like is required to provide sensor node location information. Our security analysis demonstrates that the proposed scheme can defend against common attacks in sensor networks including node compromise attacks, replay attacks, selective forwarding attacks, sinkhole and wormhole, Sybil attacks, HELLO flood attacks. Both mathematical and simulation-based performance evaluation show that the SCODEplus significantly reduces the communication overhead, energy consumption, packet delivery latency while it always delivers more than 97 percent of packets successfully.

  6. A Community Network of 100 Black Carbon Sensors

    Science.gov (United States)

    Preble, C.; Kirchstetter, T.; Caubel, J.; Cados, T.; Keeling, C.; Chang, S.

    2017-12-01

    We developed a low-cost black carbon sensor, field tested its performance, and then built and deployed a network of 100 sensors in West Oakland, California. We operated the network for 100 days beginning mid-May 2017 to measure spatially resolved black carbon concentrations throughout the community. West Oakland is a San Francisco Bay Area mixed residential and industrial community that is adjacent to regional port and rail yard facilities and surrounded by major freeways. As such, the community is affected by diesel particulate matter emissions from heavy-duty diesel trucks, locomotives, and ships associated with freight movement. In partnership with Environmental Defense Fund, the Bay Area Air Quality Management District, and the West Oakland Environmental Indicators Project, we deployed the black carbon monitoring network outside of residences and business, along truck routes and arterial streets, and at upwind locations. The sensor employs the filter-based light transmission method to measure black carbon and has good precision and correspondence with current commercial black carbon instruments. Throughout the 100-day period, each of the 100 sensors transmitted data via a cellular network. A MySQL database was built to receive and manage the data in real-time. The database included diagnostic features to monitor each sensor's operational status and facilitate the maintenance of the network. Spatial and temporal patterns in black carbon concentrations will be presented, including patterns around industrial facilities, freeways, and truck routes, as well as the relationship between neighborhood concentrations and the BAAQMD's monitoring site. Lessons learned during this first of its kind black carbon monitoring network will also be shared.

  7. LANES - LOCAL AREA NETWORK EXTENSIBLE SIMULATOR

    Science.gov (United States)

    Gibson, J.

    1994-01-01

    The Local Area Network Extensible Simulator (LANES) provides a method for simulating the performance of high speed local area network (LAN) technology. LANES was developed as a design and analysis tool for networking on board the Space Station. The load, network, link and physical layers of a layered network architecture are all modeled. LANES models to different lower-layer protocols, the Fiber Distributed Data Interface (FDDI) and the Star*Bus. The load and network layers are included in the model as a means of introducing upper-layer processing delays associated with message transmission; they do not model any particular protocols. FDDI is an American National Standard and an International Organization for Standardization (ISO) draft standard for a 100 megabit-per-second fiber-optic token ring. Specifications for the LANES model of FDDI are taken from the Draft Proposed American National Standard FDDI Token Ring Media Access Control (MAC), document number X3T9.5/83-16 Rev. 10, February 28, 1986. This is a mature document describing the FDDI media-access-control protocol. Star*Bus, also known as the Fiber Optic Demonstration System, is a protocol for a 100 megabit-per-second fiber-optic star-topology LAN. This protocol, along with a hardware prototype, was developed by Sperry Corporation under contract to NASA Goddard Space Flight Center as a candidate LAN protocol for the Space Station. LANES can be used to analyze performance of a networking system based on either FDDI or Star*Bus under a variety of loading conditions. Delays due to upper-layer processing can easily be nullified, allowing analysis of FDDI or Star*Bus as stand-alone protocols. LANES is a parameter-driven simulation; it provides considerable flexibility in specifying both protocol an run-time parameters. Code has been optimized for fast execution and detailed tracing facilities have been included. LANES was written in FORTRAN 77 for implementation on a DEC VAX under VMS 4.6. It consists of two

  8. Method for identifying drivers, barriers and synergies related to the deployment of a CO2 pipeline network : A case study for the Iberian Peninsula and Morocco

    NARCIS (Netherlands)

    Berghout, Niels; Cabal, Helena; Gouveia, João Pedro; van den Broek, Machteld; Faaij, André

    2015-01-01

    This paper provides a method to identify drivers, barriers and synergies (DBS) related to the deployment of a CO2 pipeline network. The method was demonstrated for the West Mediterranean region (WMR) (i.e. Spain, Portugal and Morocco). The method comprises a literature review, analysis of

  9. The impact of antecedent trauma exposure and mental health symptoms on the post-deployment mental health of Afghanistan-deployed Australian troops.

    Science.gov (United States)

    Searle, Amelia K; Van Hooff, Miranda; Lawrence-Wood, Ellie R; Grace, Blair S; Saccone, Elizabeth J; Davy, Carol P; Lorimer, Michelle; McFarlane, Alexander C

    2017-10-01

    Both traumatic deployment experiences and antecedent traumas increase personnel's risk of developing PTSD and depression. However, only cross-sectional studies have assessed whether antecedent trauma moderates stress reactions to deployment experiences. This study prospectively examines whether antecedent trauma moderates the association between deployment trauma and post-deployment PTSD and depressive symptoms after accounting for antecedent mental health problems, in a large Australian Defence Force (ADF) sample. In the ADF Middle East Area of Operations Prospective Study, currently-serving military personnel deployed to Afghanistan across 2010-2012 (n = 1122) completed self-reported measures at pre-deployment and post-deployment. Within multivariable regressions, associations between deployment trauma and PTSD and depressive symptoms at post-deployment were stronger for personnel with greater antecedent trauma. However, once adjusting for antecedent mental health problems, these significant interaction effects disappeared. Instead, deployment-related trauma and antecedent mental health problems showed direct associations with post-deployment mental health problems. Antecedent trauma was also indirectly associated with post-deployment mental health problems through antecedent mental health problems. Similar associations were seen with prior combat exposure as a moderator. Antecedent and deployment trauma were reported retrospectively. Self-reports may also suffer from social desirability bias, especially at pre-deployment. Our main effects results support the pervasive and cumulative negative effect of trauma on military personnel, regardless of its source. While antecedent trauma does not amplify personnel's psychological response to deployment trauma, it is indirectly associated with increased post-deployment mental health problems. Antecedent mental health should be considered within pre-deployment prevention programs, and deployment-trauma within post

  10. Comparing Existing Pipeline Networks with the Potential Scale of Future U.S. CO2 Pipeline Networks

    Energy Technology Data Exchange (ETDEWEB)

    Dooley, James J.; Dahowski, Robert T.; Davidson, Casie L.

    2008-02-29

    There is growing interest regarding the potential size of a future U.S. dedicated CO2 pipeline infrastructure if carbon dioxide capture and storage (CCS) technologies are commercially deployed on a large scale. In trying to understand the potential scale of a future national CO2 pipeline network, comparisons are often made to the existing pipeline networks used to deliver natural gas and liquid hydrocarbons to markets within the U.S. This paper assesses the potential scale of the CO2 pipeline system needed under two hypothetical climate policies and compares this to the extant U.S. pipeline infrastructures used to deliver CO2 for enhanced oil recovery (EOR), and to move natural gas and liquid hydrocarbons from areas of production and importation to markets. The data presented here suggest that the need to increase the size of the existing dedicated CO2 pipeline system should not be seen as a significant obstacle for the commercial deployment of CCS technologies.

  11. Using Deduplicating Storage for Efficient Disk Image Deployment

    Directory of Open Access Journals (Sweden)

    Xing Lin

    2015-08-01

    Full Text Available Many clouds and network testbeds use disk images to initialize local storage on their compute devices. Large facilities must manage thousands or more images, requiring significant amounts of storage. At the same time, to provide a good user experience, they must be able to deploy those images quickly. Driven by our experience in operating the Emulab site at the University of Utah---a long-lived and heavily-used testbed---we have created a new service for efficiently storing and deploying disk images. This service exploits the redundant data found in similar images, using deduplication to greatly reduce the amount of physical storage required. In addition to space savings, our system is also designed for highly efficient image deployment---it integrates with an existing highly-optimized disk image deployment system, Frisbee, without significantly increasing the time required to distribute and install images. In this paper, we explain the design of our system and discuss the trade-offs we made to strike a balance between efficient storage and fast disk image deployment. We also propose a new chunking algorithm, called AFC, which enables fixed-size chunking for deduplicating allocated disk sectors. Experimental results show that our system reduces storage requirements by up to 3x while imposing only a negligible runtime overhead on the end-to-end disk-deployment process.

  12. The Evolving Wide Area Network Infrastructure in the LHC era

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The global network is more than ever taking its role as the great "enabler" for many branches of science and research. Foremost amongst such science drivers is of course the LHC/LCG programme, although there are several other sectors with growing demands of the network. Common to all of these is the realisation that a straightforward over provisioned best efforts wide area IP service is probably not enough for the future. This talk will summarise the needs of several science sectors, and the advances being made to exploit the current best efforts infrastructure. It will then describe current projects aimed as provisioning "better than best efforts" services (such bandwidth on demand), the global optical R&D testbeds and the strategy of the research network providers to move towards hybrid multi-service networks for the next generation of the global wide area production network.

  13. Protocol of Magnetic Field Area Network and its Applications

    International Nuclear Information System (INIS)

    Won, Yunjae; Kang, Shinjae; Lim, Seungok; Kahng, Hyunkook

    2012-01-01

    The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)

  14. Protocol of Magnetic Field Area Network and its Applications

    Energy Technology Data Exchange (ETDEWEB)

    Won, Yunjae; Kang, Shinjae; Lim, Seungok [Korea Electronics Technology Institute, Seoul (Korea, Republic of); Kahng, Hyunkook [Korea Univ., Seoul (Korea, Republic of)

    2012-03-15

    The social needs are increasing in the wireless communication technology based on sensors for the monitoring of natural disasters such as avalanche and storm, the management of underground conditions from ground sinking and landslide, the monitoring of pipes, wires buried under the ground, the management of building and bridge, and the monitoring of the pollutions such as soils and water. However, the conventional wireless communication systems based on EM (Electro Magnetic) waves have not supported reliable communication because of large signal strength attenuation around soil, water, and metals. In order to handle this problem, various efforts in the wireless communication area have been conducted. Magnetic Field Area Network (MFAN) supports the reliable communication service without large signal attenuation around water, soil, and metal. Therefore, Magnetic Field Area Network (MFAN) is expected to be one of promising solutions to the limit of the conventional technologies such as Radio Frequency Indentification (RFID) and Wireless Sensor Network (WSN)

  15. Information manual for the experimentation of the deployment of optical fibers on public power distribution networks; Notice d'information pour l'experimentation du deploiement de fibres optiques sur les reseaux publics d'electricite

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-07-01

    During the French inter-ministry committee for the national development (CIADT) of July 9, 2001, the government decided to launch a feasibility study about the deployment of telecommunication optical fibers over the whole territory using the electricity transportation grid. The aim is to give access to high-speed Internet to everyone and at a reasonable cost. This manual summarizes the technical, legal and economical results of the study carried out by the working group: 1 - the actors in concern (managers of power transportation and distribution networks, country authorities, managers and users of telecommunication infrastructures, regulatory agencies, financial organizations); 2 - the telecommunication networks on power lines; 3 - the feasibility of the experimentation (relations between the different partners, conditions); 4 - the implementation of the experimentation (useful contacts, contracts); 5 - the experimentation areas. Appendixes. (J.S.)

  16. OpenFlow Deployment and Concept Analysis

    Directory of Open Access Journals (Sweden)

    Tomas Hegr

    2013-01-01

    Full Text Available Terms such as SDN and OpenFlow (OF are often used in the research and development of data networks. This paper deals with the analysis of the current state of OpenFlow protocol deployment options as it is the only real representative protocol that enables the implementation of Software Defined Networking outside an academic world. There is introduced an insight into the current state of the OpenFlow specification development at various levels is introduced. The possible limitations associated with this concept in conjunction with the latest version (1.3 of the specification published by ONF are also presented. In the conclusion there presented a demonstrative security application addressing the lack of IPv6 support in real network devices since most of today's switches and controllers support only OF v1.0.

  17. Novel Ethernet Based Optical Local Area Networks for Computer Interconnection

    NARCIS (Netherlands)

    Radovanovic, Igor; van Etten, Wim; Taniman, R.O.; Kleinkiskamp, Ronny

    2003-01-01

    In this paper we present new optical local area networks for fiber-to-the-desk application. Presented networks are expected to bring a solution for having optical fibers all the way to computers. To bring the overall implementation costs down we have based our networks on short-wavelength optical

  18. Software Defined Networking

    DEFF Research Database (Denmark)

    Caba, Cosmin Marius

    Network Service Providers (NSP) often choose to overprovision their networks instead of deploying proper Quality of Services (QoS) mechanisms that allow for traffic differentiation and predictable quality. This tendency of overprovisioning is not sustainable for the simple reason that network...... resources are limited. Hence, to counteract this trend, current QoS mechanisms must become simpler to deploy and operate, in order to motivate NSPs to employ QoS techniques instead of overprovisioning. Software Defined Networking (SDN) represents a paradigm shift in the way telecommunication and data...... generic perspective (e.g. service provisioning speed, resources availability). As a result, new mechanisms for providing QoS are proposed, solutions for SDN-specific QoS challenges are designed and tested, and new network management concepts are prototyped, all aiming to improve QoS for network services...

  19. Wireless Sensor Network Optimization: Multi-Objective Paradigm.

    Science.gov (United States)

    Iqbal, Muhammad; Naeem, Muhammad; Anpalagan, Alagan; Ahmed, Ashfaq; Azam, Muhammad

    2015-07-20

    Optimization problems relating to wireless sensor network planning, design, deployment and operation often give rise to multi-objective optimization formulations where multiple desirable objectives compete with each other and the decision maker has to select one of the tradeoff solutions. These multiple objectives may or may not conflict with each other. Keeping in view the nature of the application, the sensing scenario and input/output of the problem, the type of optimization problem changes. To address different nature of optimization problems relating to wireless sensor network design, deployment, operation, planing and placement, there exist a plethora of optimization solution types. We review and analyze different desirable objectives to show whether they conflict with each other, support each other or they are design dependent. We also present a generic multi-objective optimization problem relating to wireless sensor network which consists of input variables, required output, objectives and constraints. A list of constraints is also presented to give an overview of different constraints which are considered while formulating the optimization problems in wireless sensor networks. Keeping in view the multi facet coverage of this article relating to multi-objective optimization, this will open up new avenues of research in the area of multi-objective optimization relating to wireless sensor networks.

  20. Wireless Sensor Network Optimization: Multi-Objective Paradigm

    Science.gov (United States)

    Iqbal, Muhammad; Naeem, Muhammad; Anpalagan, Alagan; Ahmed, Ashfaq; Azam, Muhammad

    2015-01-01

    Optimization problems relating to wireless sensor network planning, design, deployment and operation often give rise to multi-objective optimization formulations where multiple desirable objectives compete with each other and the decision maker has to select one of the tradeoff solutions. These multiple objectives may or may not conflict with each other. Keeping in view the nature of the application, the sensing scenario and input/output of the problem, the type of optimization problem changes. To address different nature of optimization problems relating to wireless sensor network design, deployment, operation, planing and placement, there exist a plethora of optimization solution types. We review and analyze different desirable objectives to show whether they conflict with each other, support each other or they are design dependent. We also present a generic multi-objective optimization problem relating to wireless sensor network which consists of input variables, required output, objectives and constraints. A list of constraints is also presented to give an overview of different constraints which are considered while formulating the optimization problems in wireless sensor networks. Keeping in view the multi facet coverage of this article relating to multi-objective optimization, this will open up new avenues of research in the area of multi-objective optimization relating to wireless sensor networks. PMID:26205271

  1. Area Green Efficiency (AGE) of Two Tier Heterogeneous Cellular Networks

    KAUST Repository

    Tabassum, Hina

    2012-10-03

    Small cell networks are becoming standard part of the future heterogeneous networks. In this paper, we consider a two tier heterogeneous network which promises energy savings by integrating the femto and macro cellular networks and thereby reducing CO2 emissions, operational and capital expenditures (OPEX and CAPEX) whilst enhancing the area spectral efficiency (ASE) of the network. In this context, we define a performance metric which characterize the aggregate energy savings per unit macrocell area and is referred to as area green efficiency (AGE) of the two tier heterogeneous network where the femto base stations are arranged around the edge of the reference macrocell such that the configuration is referred to as femto-on-edge (FOE). The mobile users in macro and femto cellular networks are transmitting with the adaptive power while maintaining the desired link quality such that the energy aware FOE configuration mandates to (i) save energy, and (ii) reduce the co-channel interference. We present a mathematical analysis to incorporate the uplink power control mechanism adopted by the mobile users and calibrate the uplink ASE and AGE of the energy aware FOE configuration. Next, we derive analytical expressions to compute the bounds on the uplink ASE of energy aware FOE configuration and demonstrate that the derived bounds are useful in evaluating the ASE under worst and best case interference scenarios. Simulation results are produced to demonstrate the ASE and AGE improvements in comparison to macro-only and macro-femto configuration with uniformly distributed femtocells.

  2. Representation of global and national conservation priorities by Colombia's Protected Area Network.

    Science.gov (United States)

    Forero-Medina, German; Joppa, Lucas

    2010-10-12

    How do national-level actions overlap with global priorities for conservation? Answering this question is especially important in countries with high and unique biological diversity like Colombia. Global biodiversity schemes provide conservation guidance at a large scale, while national governments gazette land for protection based on a combination of criteria at regional or local scales. Information on how a protected area network represents global and national conservation priorities is crucial for finding gaps in coverage and for future expansion of the system. We evaluated the agreement of Colombia's protected area network with global conservation priorities, and the extent to which the network reflects the country's biomes, species richness, and common environmental and physical conditions. We used this information to identify priority biomes for conservation. We find the dominant strategy in Colombia has been a proactive one, allocating the highest proportion of protected land on intact, difficult to access and species rich areas like the Amazon. Threatened and unique areas are disproportionately absent from Colombia's protected lands. We highlight six biomes in Colombia as conservation priorities that should be considered in any future expansion of Colombia's protected area network. Two of these biomes have less than 3% of their area protected and more than 70% of their area transformed for human use. One has less than 3% protected and high numbers of threatened vertebrates. Three biomes fall in both categories. Expansion of Colombia's Protected Area Network should consider the current representativeness of the network. We indicate six priority biomes that can contribute to improving the representation of threatened species and biomes in Colombia.

  3. Local area networks an introduction to the technology

    CERN Document Server

    McNamara, John E

    1985-01-01

    This concise book provides an objective introduction to local area networks - how they work, what they do, and how you can benefit from them. It outlines the pros and cons of the most common configurations so you can evaluate them in light of your own needs. You'll also learn about network software, with special emphasis on the ISO layered model of communications protocols.

  4. Unobstructive Body Area Networks (BAN) for efficient movement monitoring.

    Science.gov (United States)

    Felisberto, Filipe; Costa, Nuno; Fdez-Riverola, Florentino; Pereira, António

    2012-01-01

    The technological advances in medical sensors, low-power microelectronics and miniaturization, wireless communications and networks have enabled the appearance of a new generation of wireless sensor networks: the so-called wireless body area networks (WBAN). These networks can be used for continuous monitoring of vital parameters, movement, and the surrounding environment. The data gathered by these networks contributes to improve users' quality of life and allows the creation of a knowledge database by using learning techniques, useful to infer abnormal behaviour. In this paper we present a wireless body area network architecture to recognize human movement, identify human postures and detect harmful activities in order to prevent risk situations. The WBAN was created using tiny, cheap and low-power nodes with inertial and physiological sensors, strategically placed on the human body. Doing so, in an as ubiquitous as possible way, ensures that its impact on the users' daily actions is minimum. The information collected by these sensors is transmitted to a central server capable of analysing and processing their data. The proposed system creates movement profiles based on the data sent by the WBAN's nodes, and is able to detect in real time any abnormal movement and allows for a monitored rehabilitation of the user.

  5. Sunrise deploys mobile network for CERN

    CERN Multimedia

    2004-01-01

    Sunrise, the alternative telecoms provider in Switzerland, is finalizing the installation of a mobile network comprising about forty sites located around the new particle accelerator at CERN (1 paragraph)

  6. Local area networks in radiation detection systems: advantages and pitfalls

    Energy Technology Data Exchange (ETDEWEB)

    Blaauw, M [Interfaculty Reactor Inst., Delft Univ. of Technology (Netherlands); Lindstrom, R M [Inorganic Analytical Research Div., National Inst. of Standards and Technology, Gaithersburg, MD (United States)

    1993-06-01

    Both at the Interfaculty Reactor Institute (IRI) and at the National Institute of Standards and Technology (NIST), local area networks are being used to acquire and process data from multiple [gamma]-ray spectrometers. The IRI system was only recently set up. A comparison is made between the NIST network, the old IRI network and the new IRI network, resulting in recommendations for new systems to be set up. (orig.)

  7. Quality function deployment

    International Nuclear Information System (INIS)

    1981-10-01

    This book indicates quality function deployment with quality and deployment of quality function, process and prospect of quality function deployment and development, product process and conception of quality table, deployment of quality demand, design of quality table and application of concurrent multi design, progress design and quality development, main safe part and management of important function part, quality development and deployment of method of construction, quality deployment and economics, total system of quality function deployment and task of quality function deployment in the present and future.

  8. A Dense Small-Scale Seismic Network in the Ngorongoro Conservation Area (Northern Tanzania)

    Science.gov (United States)

    Parisi, L.; Lombardo, L.; Rodriguez-Mustafa, M.; Mai, P. M.

    2017-12-01

    A temporary deployment consisting of sixteen broadband seismic stations is conducted for the first time in the Ngorongoro Conservation Area (NCA, Northern Tanzania), located at the boundary between the Tanzanian Craton and East African Rift. A deep knowledge of the faulting systems and tectonics of the area is needed to better understand the contribution of the synsedimentary faults to the deposition of the Olduvai and surrounding basins affecting the landscapes of the Homo Habilis first settlements. Complex fault systems have been mapped in the field but their connection, especially at depth, is not well known. A first batch of ten instruments was installed in June 2016. In June 2017 two stations were dismissed and a second batch of six stations was installed in new locations. The current network of fourteen stations will record until May 2018. Stations are equipped with Nanometrics Trillium Compact Posthole 120 s sensor and Centaur digitiser recording continuously at 200 Hz. The whole network covers 1400 km2 and station interspace ranges from 8 to 15 km. We analyse probabilistic power spectra densities of the seismic noise to obtain insights of its origin and test the performances of the stations. Although factories do not exist in the area and most of the stations are far from roads, ambient noise in the range 0.01 - 1 s is relatively high (between -120 dB and -100dB at 0.1 s) probably because of the abundance of livestock living in the NCA. Ambient noise in the period range 1 - 10 s (secondary microseisms) decreases from east to west. Although the main source of the microseisms is located in the Indian Ocean (east of the study area), a contribution from the low period tremors coming from the nearby active volcano Ol Doinyo Lengai (north-east of the study area) is expected. Whereas the longer period noise (10 - 100 s) is very low in the vertical component seismograms, it is higher than the high noise model in the horizontal components for most of the stations

  9. Base Station Placement Algorithm for Large-Scale LTE Heterogeneous Networks.

    Science.gov (United States)

    Lee, Seungseob; Lee, SuKyoung; Kim, Kyungsoo; Kim, Yoon Hyuk

    2015-01-01

    Data traffic demands in cellular networks today are increasing at an exponential rate, giving rise to the development of heterogeneous networks (HetNets), in which small cells complement traditional macro cells by extending coverage to indoor areas. However, the deployment of small cells as parts of HetNets creates a key challenge for operators' careful network planning. In particular, massive and unplanned deployment of base stations can cause high interference, resulting in highly degrading network performance. Although different mathematical modeling and optimization methods have been used to approach various problems related to this issue, most traditional network planning models are ill-equipped to deal with HetNet-specific characteristics due to their focus on classical cellular network designs. Furthermore, increased wireless data demands have driven mobile operators to roll out large-scale networks of small long term evolution (LTE) cells. Therefore, in this paper, we aim to derive an optimum network planning algorithm for large-scale LTE HetNets. Recently, attempts have been made to apply evolutionary algorithms (EAs) to the field of radio network planning, since they are characterized as global optimization methods. Yet, EA performance often deteriorates rapidly with the growth of search space dimensionality. To overcome this limitation when designing optimum network deployments for large-scale LTE HetNets, we attempt to decompose the problem and tackle its subcomponents individually. Particularly noting that some HetNet cells have strong correlations due to inter-cell interference, we propose a correlation grouping approach in which cells are grouped together according to their mutual interference. Both the simulation and analytical results indicate that the proposed solution outperforms the random-grouping based EA as well as an EA that detects interacting variables by monitoring the changes in the objective function algorithm in terms of system

  10. Internet of THings Area Coverage Analyzer (ITHACA for Complex Topographical Scenarios

    Directory of Open Access Journals (Sweden)

    Raúl Parada

    2017-10-01

    Full Text Available The number of connected devices is increasing worldwide. Not only in contexts like the Smart City, but also in rural areas, to provide advanced features like smart farming or smart logistics. Thus, wireless network technologies to efficiently allocate Internet of Things (IoT and Machine to Machine (M2M communications are necessary. Traditional cellular networks like Global System for Mobile communications (GSM are widely used worldwide for IoT environments. Nevertheless, Low Power Wide Area Networks (LP-WAN are becoming widespread as infrastructure for present and future IoT and M2M applications. Based also on a subscription service, the LP-WAN technology SIGFOXTM may compete with cellular networks in the M2M and IoT communications market, for instance in those projects where deploying the whole communications infrastructure is too complex or expensive. For decision makers to decide the most suitable technology for each specific application, signal coverage is within the key features. Unfortunately, besides simulated coverage maps, decision-makers do not have real coverage maps for SIGFOXTM, as they can be found for cellular networks. Thereby, we propose Internet of THings Area Coverage Analyzer (ITHACA, a signal analyzer prototype to provide automated signal coverage maps and analytics for LP-WAN. Experiments performed in the Gran Canaria Island, Spain (with both urban and complex topographic rural environments, returned a real SIGFOXTM service availability above 97% and above 11% more coverage with respect to the company-provided simulated maps. We expect that ITHACA may help decision makers to deploy the most suitable technologies for future IoT and M2M projects.

  11. Prioritising Redundant Network Component for HOWBAN Survivability Using FMEA

    Directory of Open Access Journals (Sweden)

    Cheong Loong Chan

    2017-01-01

    Full Text Available Deploying redundant component is the ubiquitous approach to improve the reliability and survivability of a hybrid optical wireless broadband access network (HOWBAN. Much work has been done to study the cost and impact of deploying redundant component in the network but no formal tools have been used to enable the evaluation and decision to prioritise the deployment of redundant facilities in the network. In this paper we show how FMEA (Failure Mode Effect and Analysis technique can be adapted to identify the critical segment in the network and prioritise the redundant component to be deployed to ensure network survivability. Our result showed that priority must be given to redundancy to mitigate grid power outage particularly in less developed countries which is poised for rapid expansion in broadband services.

  12. Sao Paulo Lightning Mapping Array (SP-LMA): Deployment and Plans

    Science.gov (United States)

    Bailey, J. C.; Carey, L. D.; Blakeslee, R. J.; Albrecht, R.; Morales, C. A.; Pinto, O., Jr.

    2011-01-01

    An 8-10 station Lightning Mapping Array (LMA) network is being deployed in the vicinity of Sao Paulo to create the SP-LMA for total lightning measurements in association with the international CHUVA [Cloud processes of tHe main precipitation systems in Brazil: A contribUtion to cloud resolVing modeling and to the GPM (GlobAl Precipitation Measurement)] field campaign. Besides supporting CHUVA science/mission objectives and the Sao Luz Paraitinga intensive operation period (IOP) in December 2011-January 2012, the SP-LMA will support the generation of unique proxy data for the Geostationary Lightning Mapper (GLM) and Advanced Baseline Imager (ABI), both sensors on the NOAA Geostationary Operational Environmental Satellite-R (GOES-R), presently under development and scheduled for a 2015 launch. The proxy data will be used to develop and validate operational algorithms so that they will be ready for use on "day1" following the launch of GOES-R. A preliminary survey of potential sites in the vicinity of Sao Paulo was conducted in December 2009 and January 2010, followed up by a detailed survey in July 2010, with initial network deployment scheduled for October 2010. However, due to a delay in the Sa Luz Paraitinga IOP, the SP-LMA will now be installed in July 2011 and operated for one year. Spacing between stations is on the order of 15-30 km, with the network "diameter" being on the order of 30-40 km, which provides good 3-D lightning mapping 150 km from the network center. Optionally, 1-3 additional stations may be deployed in the vicinity of Sa Jos dos Campos.

  13. Integration of the White Sands Complex into a Wide Area Network

    Science.gov (United States)

    Boucher, Phillip Larry; Horan, Sheila, B.

    1996-01-01

    The NASA White Sands Complex (WSC) satellite communications facility consists of two main ground stations, an auxiliary ground station, a technical support facility, and a power plant building located on White Sands Missile Range. When constructed, terrestrial communication access to these facilities was limited to copper telephone circuits. There was no local or wide area communications network capability. This project incorporated a baseband local area network (LAN) topology at WSC and connected it to NASA's wide area network using the Program Support Communications Network-Internet (PSCN-I). A campus-style LAN is configured in conformance with the International Standards Organization (ISO) Open Systems Interconnect (ISO) model. Ethernet provides the physical and data link layers. Transmission Control Protocol and Internet Protocol (TCP/IP) are used for the network and transport layers. The session, presentation, and application layers employ commercial software packages. Copper-based Ethernet collision domains are constructed in each of the primary facilities and these are interconnected by routers over optical fiber links. The network and each of its collision domains are shown to meet IEEE technical configuration guidelines. The optical fiber links are analyzed for the optical power budget and bandwidth allocation and are found to provide sufficient margin for this application. Personal computers and work stations attached to the LAN communicate with and apply a wide variety of local and remote administrative software tools. The Internet connection provides wide area network (WAN) electronic access to other NASA centers and the world wide web (WWW). The WSC network reduces and simplifies the administrative workload while providing enhanced and advanced inter-communications capabilities among White Sands Complex departments and with other NASA centers.

  14. Alcohol use in a military population deployed in combat areas: a cross sectional study

    Directory of Open Access Journals (Sweden)

    Hanwella Raveen

    2012-06-01

    Full Text Available Abstract Background Alcohol misuse is more prevalent among military populations. Association between PTSD and heavy drinking have been reported in many studies. Most of the studies on alcohol use among military personnel are from US and UK. Aim of this study is to describe alcohol consumption patterns among military personnel in Sri Lanka, a country where the alcohol consumption among the general population are very different to that in US and UK. Methods Cross sectional study consisting of representative samples of Sri Lanka Navy Special Forces and regular forces deployed in combat areas continuously during a one year period was carried out. Data was collected using a self report questionnaire. Alcohol Use Disorder Identification Test (AUDIT was used to assess alcohol consumption. Results Sample consisted of 259 Special Forces and 412 regular navy personnel. The median AUDIT score was 2.0 (interquartile range 6.0. Prevalence of current drinking was 71.2 %. Of the current users 54.81 % were infrequent users (frequency ≤ once a month while 37.87 % of users consumed 2–4 times a month. Prevalence of hazardous drinking (AUDIT ≥ 8 was 16.69 % and binge drinking 14.01 %. Five (0.75 % had AUDIT total ≥20. There was no significant difference between Special Forces and regular forces in hazardous drinking or binge drinking. Total AUDIT score ≥16 were associated with difficulty performing work. Conclusions High rates of hazardous drinking and binge drinking described among military personnel in US and UK were not seen among SLN personnel deployed in combat areas. This finding contrasts with previously reported association between combat exposure and hazardous alcohol use among military personnel. Alcohol use among military personnel may be significantly influenced by alcohol consumption patterns among the general population, access to alcohol and attitudes about alcohol use. Similar to findings from other countries, heavy

  15. Species-free species distribution models describe macroecological properties of protected area networks.

    Science.gov (United States)

    Robinson, Jason L; Fordyce, James A

    2017-01-01

    Among the greatest challenges facing the conservation of plants and animal species in protected areas are threats from a rapidly changing climate. An altered climate creates both challenges and opportunities for improving the management of protected areas in networks. Increasingly, quantitative tools like species distribution modeling are used to assess the performance of protected areas and predict potential responses to changing climates for groups of species, within a predictive framework. At larger geographic domains and scales, protected area network units have spatial geoclimatic properties that can be described in the gap analysis typically used to measure or aggregate the geographic distributions of species (stacked species distribution models, or S-SDM). We extend the use of species distribution modeling techniques in order to model the climate envelope (or "footprint") of individual protected areas within a network of protected areas distributed across the 48 conterminous United States and managed by the US National Park System. In our approach we treat each protected area as the geographic range of a hypothetical endemic species, then use MaxEnt and 5 uncorrelated BioClim variables to model the geographic distribution of the climatic envelope associated with each protected area unit (modeling the geographic area of park units as the range of a species). We describe the individual and aggregated climate envelopes predicted by a large network of 163 protected areas and briefly illustrate how macroecological measures of geodiversity can be derived from our analysis of the landscape ecological context of protected areas. To estimate trajectories of change in the temporal distribution of climatic features within a protected area network, we projected the climate envelopes of protected areas in current conditions onto a dataset of predicted future climatic conditions. Our results suggest that the climate envelopes of some parks may be locally unique or have

  16. Usage of the cyclotron facility local area network

    International Nuclear Information System (INIS)

    Heinzmann, H.; Peters, J.; Thow, T.J.

    1988-01-01

    Local area network of controllers at the Karlsruhe cyclotyron is shown. Experience after two years of usage is described. The system is applied controlling, data acquisition, management, databases usage

  17. On Efficient Deployment of Wireless Sensors for Coverage and Connectivity in Constrained 3D Space.

    Science.gov (United States)

    Wu, Chase Q; Wang, Li

    2017-10-10

    Sensor networks have been used in a rapidly increasing number of applications in many fields. This work generalizes a sensor deployment problem to place a minimum set of wireless sensors at candidate locations in constrained 3D space to k -cover a given set of target objects. By exhausting the combinations of discreteness/continuousness constraints on either sensor locations or target objects, we formulate four classes of sensor deployment problems in 3D space: deploy sensors at Discrete/Continuous Locations (D/CL) to cover Discrete/Continuous Targets (D/CT). We begin with the design of an approximate algorithm for DLDT and then reduce DLCT, CLDT, and CLCT to DLDT by discretizing continuous sensor locations or target objects into a set of divisions without sacrificing sensing precision. Furthermore, we consider a connected version of each problem where the deployed sensors must form a connected network, and design an approximation algorithm to minimize the number of deployed sensors with connectivity guarantee. For performance comparison, we design and implement an optimal solution and a genetic algorithm (GA)-based approach. Extensive simulation results show that the proposed deployment algorithms consistently outperform the GA-based heuristic and achieve a close-to-optimal performance in small-scale problem instances and a significantly superior overall performance than the theoretical upper bound.

  18. Service creation and deployment on an intelligent network

    OpenAIRE

    Collins, Michael

    1999-01-01

    Active competition in the telecommunications industry has caused a dramatic shift in focus for public network operators. Service designers need to be able to easily and rapidly create services according to the customer’s requirements. This is achievable by using Intelligent Networks (INs). Two primary goals of service development under the Intelligent Network paradigm are rapid service crcation using new software technologies and the minimisation of service development costs through switch ve...

  19. Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network

    DEFF Research Database (Denmark)

    Isah, Abdullahi

    The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria.......The thesis has proposed and implemented a so-called SNS (Social network security) model for intrusion prevention in the Wireless Local Area Network of an organization. An experimental design was used to implement and test the model at a university in Nigeria....

  20. Tactical Voice Communications Over Shipboard Local Area Networks

    National Research Council Canada - National Science Library

    Urie, Glenn

    2001-01-01

    The United States Navy's next generation ship(s) scheduled for commissioning in the year 2004 and beyond will integrate tactical shipboard voice communications system into the local area network (LAN...

  1. Experimental video signals distribution MMF network based on IEEE 802.11 standard

    Science.gov (United States)

    Kowalczyk, Marcin; Maksymiuk, Lukasz; Siuzdak, Jerzy

    2014-11-01

    The article was focused on presentation the achievements in a scope of experimental research on transmission of digital video streams in the frame of specially realized for this purpose ROF (Radio over Fiber) network. Its construction was based on the merge of wireless IEEE 802.11 network, popularly referred as Wi-Fi, with a passive optical network PON based on multimode fibers MMF. The proposed approach can constitute interesting proposal in area of solutions in the scope of the systems monitoring extensive, within which is required covering of a large area with ensuring of a relatively high degree of immunity on the interferences transmitted signals from video IP cameras to the monitoring center and a high configuration flexibility (easily change the deployment of cameras) of such network.

  2. Infrastructure Assisted Data Dissemination for Vehicular Sensor Networks in Metropolitan Areas

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; de Souza Schwartz, Ramon; Dilo, Arta; Scholten, Johan; Havinga, Paul J.M.; Daher, Robil; Vinel, Alexey

    2012-01-01

    Vehicular Sensor Networks (VSNs) are an emerging area of research that combines technologies developed in the domains of Intelligent Transport Systems (ITS) and Wireless Sensor Networks. Data dissemination is an important aspect of these networks. It enables vehicles to share relevant sensor data

  3. Performance verification of network function virtualization in software defined optical transport networks

    Science.gov (United States)

    Zhao, Yongli; Hu, Liyazhou; Wang, Wei; Li, Yajie; Zhang, Jie

    2017-01-01

    With the continuous opening of resource acquisition and application, there are a large variety of network hardware appliances deployed as the communication infrastructure. To lunch a new network application always implies to replace the obsolete devices and needs the related space and power to accommodate it, which will increase the energy and capital investment. Network function virtualization1 (NFV) aims to address these problems by consolidating many network equipment onto industry standard elements such as servers, switches and storage. Many types of IT resources have been deployed to run Virtual Network Functions (vNFs), such as virtual switches and routers. Then how to deploy NFV in optical transport networks is a of great importance problem. This paper focuses on this problem, and gives an implementation architecture of NFV-enabled optical transport networks based on Software Defined Optical Networking (SDON) with the procedure of vNFs call and return. Especially, an implementation solution of NFV-enabled optical transport node is designed, and a parallel processing method for NFV-enabled OTN nodes is proposed. To verify the performance of NFV-enabled SDON, the protocol interaction procedures of control function virtualization and node function virtualization are demonstrated on SDON testbed. Finally, the benefits and challenges of the parallel processing method for NFV-enabled OTN nodes are simulated and analyzed.

  4. An Experimental Study of Advanced Receivers in a Practical Dense Small Cells Network

    DEFF Research Database (Denmark)

    Assefa, Dereje; Berardinelli, Gilberto; Tavares, Fernando Menezes Leitão

    2016-01-01

    leads to significant limitations on the network throughput in such deployments. In addition, network densification introduces difficulty in network deployment. This paper presents a study on the benefits of advanced receiver in a practical uncoordinated dense small cells deployment. Our aim is to show...

  5. Persistent Identifiers for Field Deployments: A Missing Link in the Provenance Chain

    Science.gov (United States)

    Arko, R. A.; Ji, P.; Fils, D.; Shepherd, A.; Chandler, C. L.; Lehnert, K.

    2016-12-01

    Research in the geosciences is characterized by a wide range of complex and costly field deployments including oceanographic cruises, submersible dives, drilling expeditions, seismic networks, geodetic campaigns, moored arrays, aircraft flights, and satellite missions. Each deployment typically produces a mix of sensor and sample data, spanning a period from hours to decades, that ultimately yields a long tail of post-field products and publications. Publishing persistent, citable identifiers for field deployments will facilitate 1) preservation and reuse of the original field data, 2) reproducibility of the resulting publications, and 3) recognition for both the facilities that operate the platforms and the investigators who secure funding for the experiments. In the ocean domain, sharing unique identifiers for field deployments is a familiar practice. For example, the Biological and Chemical Oceanography Data Management Office (BCO-DMO) routinely links datasets to cruise identifiers published by the Rolling Deck to Repository (R2R) program. In recent years, facilities have started to publish formal/persistent identifiers, typically Digital Object Identifiers (DOIs), for field deployments including seismic networks, oceanographic cruises, and moored arrays. For example, the EarthChem Library (ECL) publishes a DOI for each dataset which, if it derived from an oceanographic research cruise on a US vessel, is linked to a DOI for the cruise published by R2R. Work is underway to create similar links for the IODP JOIDES Resolution Science Operator (JRSO) and the Continental Scientific Drilling Coordination Office (CSDCO). We present results and lessons learned including a draft schema for publishing field deployments as DataCite DOI records; current practice for linking these DOIs with related identifiers such as Open Researcher and Contributor IDs (ORCIDs), Open Funder Registry (OFR) codes, and International Geo Sample Numbers (IGSNs); and consideration of other

  6. Connection Management and Recovery Strategies under Epidemic Network Failures in Optical Transport Networks

    DEFF Research Database (Denmark)

    Fagertun, Anna Manolova; Ruepp, Sarah Renée

    2014-01-01

    The current trend in deploying automatic control plane solutions for increased flexibility in the optical transport layer leads to numerous advantages for both the operators and the customers, but also pose challenges related to the stability of the network and its ability to operate in a robust...... manner under attacks. This work proposes four policies for failure handling in a connection-oriented optical transport network, under Generalized MultiProtocol Label Switching control plane, and evaluates their performance under multiple correlated large-scale failures. We employ the Susceptible...... of their transport infrastructures. Applying proactive methods for avoiding areas where epidemic failures spread results in 50% less connections requiring recovery, which translates in improved quality of service to customers....

  7. Dense wavelength division multiplexing devices for metropolitan-area datacom and telecom networks

    Science.gov (United States)

    DeCusatis, Casimer M.; Priest, David G.

    2000-12-01

    Large data processing environments in use today can require multi-gigabyte or terabyte capacity in the data communication infrastructure; these requirements are being driven by storage area networks with access to petabyte data bases, new architecture for parallel processing which require high bandwidth optical links, and rapidly growing network applications such as electronic commerce over the Internet or virtual private networks. These datacom applications require high availability, fault tolerance, security, and the capacity to recover from any single point of failure without relying on traditional SONET-based networking. These requirements, coupled with fiber exhaust in metropolitan areas, are driving the introduction of dense optical wavelength division multiplexing (DWDM) in data communication systems, particularly for large enterprise servers or mainframes. In this paper, we examine the technical requirements for emerging nextgeneration DWDM systems. Protocols for storage area networks and computer architectures such as Parallel Sysplex are presented, including their fiber bandwidth requirements. We then describe two commercially available DWDM solutions, a first generation 10 channel system and a recently announced next generation 32 channel system. Technical requirements, network management and security, fault tolerant network designs, new network topologies enabled by DWDM, and the role of time division multiplexing in the network are all discussed. Finally, we present a description of testing conducted on these networks and future directions for this technology.

  8. Network Access Control For Dummies

    CERN Document Server

    Kelley, Jay; Wessels, Denzil

    2009-01-01

    Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride. You'll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you'll become familiar with what NAC is (and what it isn't) as well as the key business drivers for deploying NAC.Learn the step

  9. Home area networks and IPTV

    CERN Document Server

    Rémy, Jean-Gabriel

    2013-01-01

    The field of Home Area Networks (HAN), a dedicated residential subset of LAN technologies for home-based use, is fast becoming the next frontier for the communications industry.This book describes the various technologies involved in the implementation of a HAN: high-speed Internet connections, indoor implementations, services, software, and management packages. It also reviews multimedia applications (which are increasingly the most important and complex aspects of most HANs) with a detailed description of IPTV technology. It highlights the main technologies used for HANs: information tra

  10. Broadband seismic deployments in East Antarctica: IPY contribution to monitoring the Earth’s interiors

    Directory of Open Access Journals (Sweden)

    Masaki Kanao

    2014-06-01

    Full Text Available “Deployment of broadband seismic stations on the Antarctica continent” is an ambitious project to improve the spatial resolution of seismic data across the Antarctic Plate and surrounding regions. Several international collaborative programs for the purpose of geomonitoring were conducted in Antarctica during the International Polar Year (IPY 2007-2008. The Antarctica’s GAmburtsev Province (AGAP; IPY #147, the GAmburtsev Mountain SEISmic experiment (GAMSEIS, a part of AGAP, and the Polar Earth Observing Network (POLENET; IPY #185 were major contributions in establishing a geophysical network in Antarctica. The AGAP/GAMSEIS project was an internationally coordinated deployment of more than 30 broadband seismographs over the crest of the Gambursev Mountains (Dome-A, Dome-C and Dome-F area. The investigations provide detailed information on crustal thickness and mantle structure; provide key constraints on the origin of the Gamburtsev Mountains; and more broadly on the structure and evolution of the East Antarctic craton and subglacial environment. From GAMSEIS and POLENET data obtained, local and regional seismic signals associated with ice movements, oceanic loading, and local meteorological variations were recorded together with a significant number of teleseismic events. In this chapter, in addition to the Earth’s interiors, we will demonstrate some of the remarkable seismic signals detected during IPY that illustrate the capabilities of broadband seismometers to study the sub-glacial environment, particularly at the margins of Antarctica. Additionally, the AGAP and POLENET stations have an important role in the Federation of Digital Seismographic Network (FDSN in southern high latitude.

  11. A Model for Field Deployment of Wireless Sensor Networks (WSNs) within the Domain of Microclimate Habitat Monitoring

    Science.gov (United States)

    Sanborn, Mark

    2011-01-01

    Wireless sensor networks (WSNs) represent a class of miniaturized information systems designed to monitor physical environments. These smart monitoring systems form collaborative networks utilizing autonomous sensing, data-collection, and processing to provide real-time analytics of observed environments. As a fundamental research area in…

  12. Pipeline network and environment

    International Nuclear Information System (INIS)

    Oliveira Nascimento, I.; Wagner, J.; Silveira, T.

    2012-01-01

    The Rio de Janeiro is one of 27 units of Brazil. It is located in the eastern portion of the Southeast and occupies an area of 43 696.054 km², being effectively the 3rd smallest state in Brazil. This state in recent years has suffered from erosion problems caused by the deployment of the network pipeline. The deployment pipeline is part of the activities related to the oil industry has caused a more intense conflict between the environment and economic activities, modifying the soil structure and distribution of surface and subsurface flows. This study aimed to analyze the erosion caused by the removal of soil for the deployment of pipeline transportation, with the consequences of the emergence of numerous gullies, landslides and silting of rivers. For the development of this study were performed bibliographic research, field work, mapping and digital preparation of the initial diagnosis of active processes and what the consequent environmental impacts. For these reasons, we conclude that the problems could be avoided or mitigated if there was a prior geological risk management. (author)

  13. Scientific Cluster Deployment and Recovery - Using puppet to simplify cluster management

    Science.gov (United States)

    Hendrix, Val; Benjamin, Doug; Yao, Yushu

    2012-12-01

    Deployment, maintenance and recovery of a scientific cluster, which has complex, specialized services, can be a time consuming task requiring the assistance of Linux system administrators, network engineers as well as domain experts. Universities and small institutions that have a part-time FTE with limited time for and knowledge of the administration of such clusters can be strained by such maintenance tasks. This current work is the result of an effort to maintain a data analysis cluster (DAC) with minimal effort by a local system administrator. The realized benefit is the scientist, who is the local system administrator, is able to focus on the data analysis instead of the intricacies of managing a cluster. Our work provides a cluster deployment and recovery process (CDRP) based on the puppet configuration engine allowing a part-time FTE to easily deploy and recover entire clusters with minimal effort. Puppet is a configuration management system (CMS) used widely in computing centers for the automatic management of resources. Domain experts use Puppet's declarative language to define reusable modules for service configuration and deployment. Our CDRP has three actors: domain experts, a cluster designer and a cluster manager. The domain experts first write the puppet modules for the cluster services. A cluster designer would then define a cluster. This includes the creation of cluster roles, mapping the services to those roles and determining the relationships between the services. Finally, a cluster manager would acquire the resources (machines, networking), enter the cluster input parameters (hostnames, IP addresses) and automatically generate deployment scripts used by puppet to configure it to act as a designated role. In the event of a machine failure, the originally generated deployment scripts along with puppet can be used to easily reconfigure a new machine. The cluster definition produced in our CDRP is an integral part of automating cluster deployment

  14. A comprehensive probabilistic analysis model of oil pipelines network based on Bayesian network

    Science.gov (United States)

    Zhang, C.; Qin, T. X.; Jiang, B.; Huang, C.

    2018-02-01

    Oil pipelines network is one of the most important facilities of energy transportation. But oil pipelines network accident may result in serious disasters. Some analysis models for these accidents have been established mainly based on three methods, including event-tree, accident simulation and Bayesian network. Among these methods, Bayesian network is suitable for probabilistic analysis. But not all the important influencing factors are considered and the deployment rule of the factors has not been established. This paper proposed a probabilistic analysis model of oil pipelines network based on Bayesian network. Most of the important influencing factors, including the key environment condition and emergency response are considered in this model. Moreover, the paper also introduces a deployment rule for these factors. The model can be used in probabilistic analysis and sensitive analysis of oil pipelines network accident.

  15. 77 FR 43567 - Medical Area Body Network

    Science.gov (United States)

    2012-07-25

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Parts 2 and 95 [ET Docket No. 08-59; FCC 12-54] Medical... document requests comment on a number of issues related to the designation of Medical Body Area Network (``MBAN'') coordinator(s) for the 2360-2390 MHz band. Although the [[Page 43568

  16. Rapid deployable global sensing hazard alert system

    Science.gov (United States)

    Cordaro, Joseph V; Tibrea, Steven L; Shull, Davis J; Coleman, Jerry T; Shuler, James M

    2015-04-28

    A rapid deployable global sensing hazard alert system and associated methods of operation are provided. An exemplary system includes a central command, a wireless backhaul network, and a remote monitoring unit. The remote monitoring unit can include a positioning system configured to determine a position of the remote monitoring unit based on one or more signals received from one or more satellites located in Low Earth Orbit. The wireless backhaul network can provide bidirectional communication capability independent of cellular telecommunication networks and the Internet. An exemplary method includes instructing at least one of a plurality of remote monitoring units to provide an alert based at least in part on a location of a hazard and a plurality of positions respectively associated with the plurality of remote monitoring units.

  17. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification

    Science.gov (United States)

    Lloret, Jaime; Garcia, Miguel; Bri, Diana; Sendra, Sandra

    2009-01-01

    Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world. PMID:22291533

  18. A Wireless Sensor Network Deployment for Rural and Forest Fire Detection and Verification

    Directory of Open Access Journals (Sweden)

    Sandra Sendra

    2009-10-01

    Full Text Available Forest and rural fires are one of the main causes of environmental degradation in Mediterranean countries. Existing fire detection systems only focus on detection, but not on the verification of the fire. However, almost all of them are just simulations, and very few implementations can be found. Besides, the systems in the literature lack scalability. In this paper we show all the steps followed to perform the design, research and development of a wireless multisensor network which mixes sensors with IP cameras in a wireless network in order to detect and verify fire in rural and forest areas of Spain. We have studied how many cameras, sensors and access points are needed to cover a rural or forest area, and the scalability of the system. We have developed a multisensor and when it detects a fire, it sends a sensor alarm through the wireless network to a central server. The central server selects the closest wireless cameras to the multisensor, based on a software application, which are rotated to the sensor that raised the alarm, and sends them a message in order to receive real-time images from the zone. The camera lets the fire fighters corroborate the existence of a fire and avoid false alarms. In this paper, we show the test performance given by a test bench formed by four wireless IP cameras in several situations and the energy consumed when they are transmitting. Moreover, we study the energy consumed by each device when the system is set up. The wireless sensor network could be connected to Internet through a gateway and the images of the cameras could be seen from any part of the world.

  19. Communication Network Architectures Based on Ethernet Passive Optical Network for Offshore Wind Power Farms

    Directory of Open Access Journals (Sweden)

    Mohamed A. Ahmed

    2016-03-01

    Full Text Available Nowadays, with large-scale offshore wind power farms (WPFs becoming a reality, more efforts are needed to maintain a reliable communication network for WPF monitoring. Deployment topologies, redundancy, and network availability are the main items to enhance the communication reliability between wind turbines (WTs and control centers. Traditional communication networks for monitoring and control (i.e., supervisory control and data acquisition (SCADA systems using switched gigabit Ethernet will not be sufficient for the huge amount of data passing through the network. In this paper, the optical power budget, optical path loss, reliability, and network cost of the proposed Ethernet Passive Optical Network (EPON-based communication network for small-size offshore WPFs have been evaluated for five different network architectures. The proposed network model consists of an optical network unit device (ONU deployed on the WT side for collecting data from different internal networks. All ONUs from different WTs are connected to a central optical line terminal (OLT, placed in the control center. There are no active electronic elements used between the ONUs and the OLT, which reduces the costs and complexity of maintenance and deployment. As fiber access networks without any protection are characterized by poor reliability, three different protection schemes have been configured, explained, and discussed. Considering the cost of network components, the total implementation expense of different architectures with, or without, protection have been calculated and compared. The proposed network model can significantly contribute to the communication network architecture for next generation WPFs.

  20. EU Armed Forces’ Use of Social Media in Areas of Deployment

    Directory of Open Access Journals (Sweden)

    Maria Hellman

    2016-02-01

    Full Text Available The advent of social media can be seen both as a risk and an opportunity by armed forces. Previous research has primarily examined whether or not the use of social media endangers or strengthens armed forces’ strategic narrative. We examine armed forces’ perceptions of risks and opportunities on a broad basis, with a particular focus on areas of deployment. The article is based on a survey of perceptions of social media amongst the armed forces of EU member states, thus adding to previous research through its comparative perspective. Whereas previous research has mainly focused on larger powers, such as the US and the UK, this article includes the views of the armed forces of 26 EU states, including several smaller nations. In analyzing the results we asked whether or not risk and opportunity perceptions were related to national ICT maturity and the existence of a social media strategy. The analysis shows that perceptions of opportunities outweigh perceptions of risks, with marketing and two-way communication as the two most prominent opportunities offered by the use of social media. Also, armed forces in countries with a moderate to high ICT maturity emphasize social media as a good way for marketing purposes.

  1. Declarative Networking

    CERN Document Server

    Loo, Boon Thau

    2012-01-01

    Declarative Networking is a programming methodology that enables developers to concisely specify network protocols and services, which are directly compiled to a dataflow framework that executes the specifications. Declarative networking proposes the use of a declarative query language for specifying and implementing network protocols, and employs a dataflow framework at runtime for communication and maintenance of network state. The primary goal of declarative networking is to greatly simplify the process of specifying, implementing, deploying and evolving a network design. In addition, decla

  2. OPS: Opportunistic pipeline scheduling in long-strip wireless sensor networks with unreliable links

    NARCIS (Netherlands)

    Guo, Peng; Meratnia, Nirvana; Havinga, Paul J.M.; Jiang, He; Zhang, Kui

    2015-01-01

    Being deployed in narrow but long area, strip wireless sensor networks (SWSNs) have drawn much attention in applications such as coal mines, pipeline and structure monitoring. One of typical characteristics of SWSNs is the large hop counts, which leads to long end-to-end delivery delay in

  3. Facilitating ICN deployment with an extended open flow protocol

    NARCIS (Netherlands)

    Zuraniewski, P.W.; Adrichem, N.L.M. van; Ravesteijn, D.; IJntema, W.; Papadopoulos, C.; Fan, C.

    2017-01-01

    Named-Data Networking (NDN) is proposed as an approach to evolve the Internet infrastructure from a host- to an informationcentric (ICN) approach, which is better suited to the current usage of the Internet. However, the deployment of a global NDN-based Internet is still a long way out of reach. The

  4. Real-time visual communication to aid disaster recovery in a multi-segment hybrid wireless networking system

    Science.gov (United States)

    Al Hadhrami, Tawfik; Wang, Qi; Grecos, Christos

    2012-06-01

    When natural disasters or other large-scale incidents occur, obtaining accurate and timely information on the developing situation is vital to effective disaster recovery operations. High-quality video streams and high-resolution images, if available in real time, would provide an invaluable source of current situation reports to the incident management team. Meanwhile, a disaster often causes significant damage to the communications infrastructure. Therefore, another essential requirement for disaster management is the ability to rapidly deploy a flexible incident area communication network. Such a network would facilitate the transmission of real-time video streams and still images from the disrupted area to remote command and control locations. In this paper, a comprehensive end-to-end video/image transmission system between an incident area and a remote control centre is proposed and implemented, and its performance is experimentally investigated. In this study a hybrid multi-segment communication network is designed that seamlessly integrates terrestrial wireless mesh networks (WMNs), distributed wireless visual sensor networks, an airborne platform with video camera balloons, and a Digital Video Broadcasting- Satellite (DVB-S) system. By carefully integrating all of these rapidly deployable, interworking and collaborative networking technologies, we can fully exploit the joint benefits provided by WMNs, WSNs, balloon camera networks and DVB-S for real-time video streaming and image delivery in emergency situations among the disaster hit area, the remote control centre and the rescue teams in the field. The whole proposed system is implemented in a proven simulator. Through extensive simulations, the real-time visual communication performance of this integrated system has been numerically evaluated, towards a more in-depth understanding in supporting high-quality visual communications in such a demanding context.

  5. Performance evaluation of packet video transfer over local area networks

    OpenAIRE

    Lu, Jie

    1993-01-01

    This research investigates the implementation and performance of packet video transfer over local area networks. A network architecture is defined for packet video such that most of the processing is performed by the higher layers of the Open Systems Interconnection (OSI) reference model, while the lower layers provide real-time services. Implementation methods are discussed for coding schemes, including data compression, the network interface unit, and the underlying local are...

  6. Lessons Learned in Deploying the World s Largest Scale Lustre File System

    Energy Technology Data Exchange (ETDEWEB)

    Dillow, David A [ORNL; Fuller, Douglas [ORNL; Wang, Feiyi [ORNL; Oral, H Sarp [ORNL; Zhang, Zhe [ORNL; Hill, Jason J [ORNL; Shipman, Galen M [ORNL

    2010-01-01

    The Spider system at the Oak Ridge National Laboratory's Leadership Computing Facility (OLCF) is the world's largest scale Lustre parallel file system. Envisioned as a shared parallel file system capable of delivering both the bandwidth and capacity requirements of the OLCF's diverse computational environment, the project had a number of ambitious goals. To support the workloads of the OLCF's diverse computational platforms, the aggregate performance and storage capacity of Spider exceed that of our previously deployed systems by a factor of 6x - 240 GB/sec, and 17x - 10 Petabytes, respectively. Furthermore, Spider supports over 26,000 clients concurrently accessing the file system, which exceeds our previously deployed systems by nearly 4x. In addition to these scalability challenges, moving to a center-wide shared file system required dramatically improved resiliency and fault-tolerance mechanisms. This paper details our efforts in designing, deploying, and operating Spider. Through a phased approach of research and development, prototyping, deployment, and transition to operations, this work has resulted in a number of insights into large-scale parallel file system architectures, from both the design and the operational perspectives. We present in this paper our solutions to issues such as network congestion, performance baselining and evaluation, file system journaling overheads, and high availability in a system with tens of thousands of components. We also discuss areas of continued challenges, such as stressed metadata performance and the need for file system quality of service alongside with our efforts to address them. Finally, operational aspects of managing a system of this scale are discussed along with real-world data and observations.

  7. Shape accuracy optimization for cable-rib tension deployable antenna structure with tensioned cables

    Science.gov (United States)

    Liu, Ruiwei; Guo, Hongwei; Liu, Rongqiang; Wang, Hongxiang; Tang, Dewei; Song, Xiaoke

    2017-11-01

    Shape accuracy is of substantial importance in deployable structures as the demand for large-scale deployable structures in various fields, especially in aerospace engineering, increases. The main purpose of this paper is to present a shape accuracy optimization method to find the optimal pretensions for the desired shape of cable-rib tension deployable antenna structure with tensioned cables. First, an analysis model of the deployable structure is established by using finite element method. In this model, geometrical nonlinearity is considered for the cable element and beam element. Flexible deformations of the deployable structure under the action of cable network and tensioned cables are subsequently analyzed separately. Moreover, the influence of pretension of tensioned cables on natural frequencies is studied. Based on the results, a genetic algorithm is used to find a set of reasonable pretension and thus minimize structural deformation under the first natural frequency constraint. Finally, numerical simulations are presented to analyze the deployable structure under two kinds of constraints. Results show that the shape accuracy and natural frequencies of deployable structure can be effectively improved by pretension optimization.

  8. Deployable reflector configurations

    Science.gov (United States)

    Meinel, A. B.; Meinel, M. P.; Woolf, N. J.

    Both the theoretical reasons for considering a non-circular format for the Large Deployable Reflector, and a potentially realizable concept for such a device, are discussed. The optimum systems for diffraction limited telescopes with incoherent detection have either a single filled aperture, or two such apertures as an interferometer to synthesize a larger aperture. For a single aperture of limited area, a reflector in the form of a slot can be used to give increased angular resolution. It is shown how a 20 x 8 meter telescope can be configured to fit the Space Shuttle bay, and deployed with relatively simple operations. The relationship between the sunshield design and the inclination of the orbit is discussed. The possible use of the LDR as a basic module to permit the construction of supergiant space telescopes and interferometers both for IR/submm studies and for the entire ultraviolet through mm wave spectral region is discussed.

  9. How Have Deployments During the War on Terrorism Affected Reenlistment?

    Science.gov (United States)

    2009-01-01

    Ethiopia, certain areas of Greece, Haiti, Indonesia, Iran, Iraq, Israel, Jordan, Kenya, Kosovo, Kuwait, Kyrgyzstan, Lebanon, Liberia, Malaysia ...deployment is a direct source of utility, as modeled in Chapter Three. Deployment is not simply another form of “work” that takes time away from “ leisure

  10. Disrupted functional connectivity of cerebellar default network areas in attention-deficit/hyperactivity disorder.

    Science.gov (United States)

    Kucyi, Aaron; Hove, Michael J; Biederman, Joseph; Van Dijk, Koene R A; Valera, Eve M

    2015-09-01

    Attention-deficit/hyperactivity disorder (ADHD) is increasingly understood as a disorder of spontaneous brain-network interactions. The default mode network (DMN), implicated in ADHD-linked behaviors including mind-wandering and attentional fluctuations, has been shown to exhibit abnormal spontaneous functional connectivity (FC) within-network and with other networks (salience, dorsal attention and frontoparietal) in ADHD. Although the cerebellum has been implicated in the pathophysiology of ADHD, it remains unknown whether cerebellar areas of the DMN (CerDMN) exhibit altered FC with cortical networks in ADHD. Here, 23 adults with ADHD and 23 age-, IQ-, and sex-matched controls underwent resting state fMRI. The mean time series of CerDMN areas was extracted, and FC with the whole brain was calculated. Whole-brain between-group differences in FC were assessed. Additionally, relationships between inattention and individual differences in FC were assessed for between-group interactions. In ADHD, CerDMN areas showed positive FC (in contrast to average FC in the negative direction in controls) with widespread regions of salience, dorsal attention and sensorimotor networks. ADHD individuals also exhibited higher FC (more positive correlation) of CerDMN areas with frontoparietal and visual network regions. Within the control group, but not in ADHD, participants with higher inattention had higher FC between CerDMN and regions in the visual and dorsal attention networks. This work provides novel evidence of impaired CerDMN coupling with cortical networks in ADHD and highlights a role of cerebro-cerebellar interactions in cognitive function. These data provide support for the potential targeting of CerDMN areas for therapeutic interventions in ADHD. © 2015 Wiley Periodicals, Inc.

  11. Disrupted functional connectivity of cerebellar default network areas in attention-deficit/hyperactivity disorder

    Science.gov (United States)

    Kucyi, Aaron; Hove, Michael J.; Biederman, Joseph; Van Dijk, Koene R.A.; Valera, Eve M.

    2015-01-01

    Attention-deficit/hyperactivity disorder (ADHD) is increasingly understood as a disorder of spontaneous brain-network interactions. The default mode network (DMN), implicated in ADHD-linked behaviors including mind-wandering and attentional fluctuations, has been shown to exhibit abnormal spontaneous functional connectivity (FC) within-network and with other networks (salience, dorsal attention and frontoparietal) in ADHD. Although the cerebellum has been implicated in the pathophysiology of ADHD, it remains unknown whether cerebellar areas of the DMN (CerDMN) exhibit altered FC with cortical networks in ADHD. Here, 23 adults with ADHD and 23 age-, IQ-, and sex-matched controls underwent resting state fMRI. The mean time series of CerDMN areas was extracted, and FC with the whole brain was calculated. Whole-brain between-group differences in FC were assessed. Additionally, relationships between inattention and individual differences in FC were assessed for between-group interactions. In ADHD, CerDMN areas showed positive FC (in contrast to average FC in the negative direction in controls) with widespread regions of salience, dorsal attention and sensorimotor networks. ADHD individuals also exhibited higher FC (more positive correlation) of CerDMN areas with frontoparietal and visual network regions. Within the control group, but not in ADHD, participants with higher inattention had higher FC between CerDMN and regions in the visual and dorsal attention networks. This work provides novel evidence of impaired CerDMN coupling with cortical networks in ADHD and highlights a role of the cerebro-cerebellar interactions in cognitive function. These data provide support for the potential targeting of CerDMN areas for therapeutic interventions in ADHD. PMID:26109476

  12. Performability indicators for the traffic analysis of wide area networks

    International Nuclear Information System (INIS)

    Tsopelas, Panagiotis; Platis, Agapios

    2003-01-01

    In connecting computing networks, reliability term is strongly related to the availability of connections of Wide Area networks (WANs) or Local Area networks (LANs). In this paper we will examine the network connections activity of a Greek University in order to provide two sources of information: The Quantity of Information Not Delivered (QIND) and the Information Flow Interruption (IFI). These indicators will provide us with the inference of information from observable characteristics of data flow(s), even when the data is encrypted or otherwise not directly available (traffic), which is lost due to failures or upgrades inside this network. The reliability analysis is obtained by collecting the network failures data (duration and frequency) and traffic (total and average) for a specified period of 1 year. It is assumed that the numerical analysis is based on the fact that the lifetime follows and exponential distribution (here as we are working on discrete time the distribution must be the geometric distribution). Hence a Markov chain model seems suitable for modelling the functioning of this system. An algorithm concentrates the results in a transition probability matrix and calculates the reward functions for the QIND/IFI indicators with the use of the power method. Finally, the application part provides an example of how final results can be used to evaluate the observed network

  13. Next Generation Campus Network Deployment Project Based on Softswitch

    OpenAIRE

    HU Feng; LIU Ziyan

    2011-01-01

    After analyzing the current networks of Guizhou University,we brought forward a scheme of next generation campus networks based on softswitch technology by choosing SoftX3000 switching system of HuaWei and provided the specific solution of accessing campus networks in this paper. It is proved that this scheme is feasible by using OPNET, which not only accomplished the integration of the PSTN and IP networks but also achieved the combining of voice services and data services.

  14. Wireless intelligent network: infrastructure before services?

    Science.gov (United States)

    Chu, Narisa N.

    1996-01-01

    The Wireless Intelligent Network (WIN) intends to take advantage of the Advanced Intelligent Network (AIN) concepts and products developed from wireline communications. However, progress of the AIN deployment has been slow due to the many barriers that exist in the traditional wireline carriers' deployment procedures and infrastructure. The success of AIN has not been truly demonstrated. The AIN objectives and directions are applicable to the wireless industry although the plans and implementations could be significantly different. This paper points out WIN characteristics in architecture, flexibility, deployment, and value to customers. In order to succeed, the technology driven AIN concept has to be reinforced by the market driven WIN services. An infrastructure suitable for the WIN will contain elements that are foreign to the wireline network. The deployment process is expected to seed with the revenue generated services. Standardization will be achieved by simplifying and incorporating the IS-41C, AIN, and Intelligent Network CS-1 recommendations. Integration of the existing and future systems impose the biggest challenge of all. Service creation has to be complemented with service deployment process which heavily impact the carriers' infrastructure. WIN deployment will likely start from an Intelligent Peripheral, a Service Control Point and migrate to a Service Node when sufficient triggers are implemented in the mobile switch for distributed call control. The struggle to move forward will not be based on technology, but rather on the impact to existing infrastructure.

  15. Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ze Wang

    2017-01-01

    Full Text Available The node replication attack is one of the notorious attacks that can be easily launched by adversaries in wireless sensor networks. A lot of literatures have studied mitigating the node replication attack in static wireless sensor networks. However, it is more difficult to detect the replicas in mobile sensor networks because of their node mobility. Considering the limitations of centralized detection schemes for static wireless sensor networks, a few distributed solutions have been recently proposed. Some existing schemes identified replicated attacks by sensing mobile nodes with identical ID but different locations. To facilitate the discovery of contradictory conflicts, we propose a hybrid local and global detection method. The local detection is performed in a local area smaller than the whole deployed area to improve the meeting probability of contradictory nodes, while the distant replicated nodes in larger area can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick discovery by searching of the replicas with reasonable overhead.

  16. Remote Autonomous Sensor Networks: A Study in Redundancy and Life Cycle Costs

    Science.gov (United States)

    Ahlrichs, M.; Dotson, A.; Cenek, M.

    2017-12-01

    The remote nature of the United States and Canada border and their extreme seasonal shifts has made monitoring much of the area impossible using conventional monitoring techniques. Currently, the United States has large gaps in its ability to detect movement on an as-needed-basis in remote areas. The proposed autonomous sensor network aims to meet that need by developing a product that is low cost, robust, and can be deployed on an as-needed-basis for short term monitoring events. This is accomplished by identifying radio frequency disturbance and acoustic disturbance. This project aims to validate the proposed design and offer optimization strategies by conducting a redundancy model as well as performing a Life Cycle Assessment (LCA). The model will incorporate topological, meteorological, and land cover datasets to estimate sensor loss over a three-month period, ensuring that the remaining network does not have significant gaps in coverage which preclude being able to receive and transmit data. The LCA will investigate the materials used to create the sensor to generate an estimate of the total environmental energy that is utilized to create the network and offer alternative materials and distribution methods that can lower this cost. This platform can function as a stand-alone monitoring network or provide additional spatial and temporal resolution to existing monitoring networks. This study aims to create the framework to determine if a sensor's design and distribution is appropriate for the target environment. The incorporation of a LCA will seek to answer if the data a proposed sensor network will collect outweighs the environmental damage that will result from its deployment. Furthermore, as the arctic continues to thaw and economic development grows, the methodology described in paper will function as a guidance document to ensure that future sensor networks have a minimal impact on these pristine areas.

  17. Deploying Monitoring Trails for Fault Localization in All- Optical Networks and Radio-over-Fiber Passive Optical Networks

    Science.gov (United States)

    Maamoun, Khaled Mohamed

    Fault localization is the process of realizing the true source of a failure from a set of collected failure notifications. Isolating failure recovery within the network optical domain is necessary to resolve alarm storm problems. The introduction of the monitoring trail (m-trail) has been proven to deliver better performance by employing monitoring resources in a form of optical trails - a monitoring framework that generalizes all the previously reported counterparts. In this dissertation, the m-trail design is explored and a focus is given to the analysis on using m-trails with established lightpaths to achieve fault localization. This process saves network resources by reducing the number of the m-trails required for fault localization and therefore the number of wavelengths used in the network. A novel approach based on Geographic Midpoint Technique, an adapted version of the Chinese Postman's Problem (CPP) solution and an adapted version of the Traveling Salesman's Problem (TSP) solution algorithms is introduced. The desirable features of network architectures and the enabling of innovative technologies for delivering future millimeter-waveband (mm-WB) Radio-over-Fiber (RoF) systems for wireless services integrated in a Dense Wavelength Division Multiplexing (DWDM) is proposed in this dissertation. For the conceptual illustration, a DWDM RoF system with channel spacing of 12.5 GHz is considered. The mm-WB Radio Frequency (RF) signal is obtained at each Optical Network Unit (ONU) by simultaneously using optical heterodyning photo detection between two optical carriers. The generated RF modulated signal has a frequency of 12.5 GHz. This RoF system is easy, cost-effective, resistant to laser phase noise and also reduces maintenance needs, in principle. A revision of related RoF network proposals and experiments is also included. A number of models for Passive Optical Networks (PON)/ RoF-PON that combine both innovative and existing ideas along with a number of

  18. A Spectrum Handoff Scheme for Optimal Network Selection in NEMO Based Cognitive Radio Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Krishan Kumar

    2017-01-01

    Full Text Available When a mobile network changes its point of attachments in Cognitive Radio (CR vehicular networks, the Mobile Router (MR requires spectrum handoff. Network Mobility (NEMO in CR vehicular networks is concerned with the management of this movement. In future NEMO based CR vehicular networks deployment, multiple radio access networks may coexist in the overlapping areas having different characteristics in terms of multiple attributes. The CR vehicular node may have the capability to make call for two or more types of nonsafety services such as voice, video, and best effort simultaneously. Hence, it becomes difficult for MR to select optimal network for the spectrum handoff. This can be done by performing spectrum handoff using Multiple Attributes Decision Making (MADM methods which is the objective of the paper. The MADM methods such as grey relational analysis and cost based methods are used. The application of MADM methods provides wider and optimum choice among the available networks with quality of service. Numerical results reveal that the proposed scheme is effective for spectrum handoff decision for optimal network selection with reduced complexity in NEMO based CR vehicular networks.

  19. High Bandwidth Communications Links Between Heterogeneous Autonomous Vehicles Using Sensor Network Modeling and Extremum Control Approaches

    Science.gov (United States)

    2008-12-01

    In future network-centric warfare environments, teams of autonomous vehicles will be deployed in a coorperative manner to conduct wide-area...of data back to the command station, autonomous vehicles configured with high bandwidth communication system are positioned between the command

  20. On achieving network throughput demand in cognitive radio-based home area networks

    NARCIS (Netherlands)

    Sarijari, M.A.B.; Abdullah, M.S.; Janssen, G.J.M.; Van der Veen, A.J.

    2015-01-01

    The growing number of wireless devices for in-house use is causing a more intense use of the spectrum to satisfy the required quality-of-service such as throughput. This has contributed to spectrum scarcity and interference problems particularly in home area networks (HAN). Cognitive radio (CR) has

  1. University of Tennessee deploys force10 C-series to analyze data from CERN's Large Hadron Collider

    CERN Multimedia

    2007-01-01

    "Force20 networks, the pioneer in building and securing reliable networks, today announced that the University of Tennessee physics department has deployed the C300 resilient switch to analyze data form CERN's Large Hadron Collider." (1 page)

  2. Analyzing mobile WiMAX base station deployment under different frequency planning strategies

    Science.gov (United States)

    Salman, M. K.; Ahmad, R. B.; Ali, Ziad G.; Aldhaibani, Jaafar A.; Fayadh, Rashid A.

    2015-05-01

    The frequency spectrum is a precious resource and scarce in the communication markets. Therefore, different techniques are adopted to utilize the available spectrum in deploying WiMAX base stations (BS) in cellular networks. In this paper several types of frequency planning techniques are illustrated, and a comprehensive comparative study between conventional frequency reuse of 1 (FR of 1) and fractional frequency reuse (FFR) is presented. These techniques are widely used in network deployment, because they employ universal frequency (using all the available bandwidth) in their base station installation/configuration within network system. This paper presents a network model of 19 base stations in order to be employed in the comparison of the aforesaid frequency planning techniques. Users are randomly distributed within base stations, users' resource mapping and their burst profile selection are based on the measured signal to interference plus-noise ratio (SINR). Simulation results reveal that the FFR has advantages over the conventional FR of 1 in various metrics. 98 % of downlink resources (slots) are exploited when FFR is applied, whilst it is 81 % at FR of 1. Data rate of FFR has been increased to 10.6 Mbps, while it is 7.98 Mbps at FR of 1. The spectral efficiency is better enhanced (1.072 bps/Hz) at FR of 1 than FFR (0.808 bps/Hz), since FR of 1 exploits all the Bandwidth. The subcarrier efficiency shows how many data bits that can be carried by subcarriers under different frequency planning techniques, the system can carry more data bits under FFR (2.40 bit/subcarrier) than FR of 1 (1.998 bit/subcarrier). This study confirms that FFR can perform better than conventional frequency planning (FR of 1) which made it a strong candidate for WiMAX BS deployment in cellular networks.

  3. Model-based monitoring techniques for leakage localization in distribution water networks

    OpenAIRE

    Meseguer Amela, Jordi; Mirats Tur, Josep Maria; Cembrano Gennari, Gabriela; Puig Cayuela, Vicenç

    2015-01-01

    This is an open access article under the CC BY-NC-ND license This paper describes an integrated model-based monitoring framework for leakage localization in district-metered areas (DMA) of water distribution networks, which takes advantage of the availability of a hydraulic model of the network. The leakage localization methodology is based on the use of flow and pressure sensors at the DMA inlets and a limited number of pressure sensors deployed inside the DMA. The placement of these sens...

  4. Knowledge Access in Rural Inter-connected Areas Network ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Knowledge Access in Rural Inter-connected Areas Network (KariaNet) - Phase II ... and indigenous knowledge using information and communication technologies (ICTs) ... for research proposals on the aforementioned topics, action-research projects, ... Evaluating knowledge-sharing methods to improve land utilization and ...

  5. Developing a robust wireless sensor network structure for environmental sensing

    Science.gov (United States)

    Zhang, Z.; Oroza, C.; Glaser, S. D.; Bales, R. C.; Conklin, M. H.

    2013-12-01

    The American River Hydrologic Observatory is being strategically deployed as a real-time ground-based measurement network that delivers accurate and timely information on snow conditions and other hydrologic attributes with a previously unheard of granularity of time and space. The basin-scale network involves 18 sub-networks set out at physiographically representative locations spanning the seasonally snow-covered half of the 5000 km2 American river basin. Each sub-network, covering about a 1-km2 area, consists of 10 wirelessly networked sensing nodes that continuously measure and telemeter temperature, and snow depth; plus selected locations are equipped with sensors for relative humidity, solar radiation, and soil moisture at several depths. The sensor locations were chosen to maximize the variance sampled for snow depth within the basin. Network design and deployment involves an iterative but efficient process. After sensor-station locations are determined, a robust network of interlinking sensor stations and signal repeaters must be constructed to route sensor data to a central base station with a two-way communicable data uplink. Data can then be uploaded from site to remote servers in real time through satellite and cell modems. Signal repeaters are placed for robustness of a self-healing network with redundant signal paths to the base station. Manual, trial-and-error heuristic approaches for node placement are inefficient and labor intensive. In that approach field personnel must restructure the network in real time and wait for new network statistics to be calculated at the base station before finalizing a placement, acting without knowledge of the global topography or overall network structure. We show how digital elevation plus high-definition aerial photographs to give foliage coverage can optimize planning of signal repeater placements and guarantee a robust network structure prior to the physical deployment. We can also 'stress test' the final network

  6. Modeling and analysis of a large deployable antenna structure

    Science.gov (United States)

    Chu, Zhengrong; Deng, Zongquan; Qi, Xiaozhi; Li, Bing

    2014-02-01

    One kind of large deployable antenna (LDA) structure is proposed by combining a number of basic deployable units in this paper. In order to avoid vibration caused by fast deployment speed of the mechanism, a braking system is used to control the spring-actuated system. Comparisons between the LDA structure and a similar structure used by the large deployable reflector (LDR) indicate that the former has potential for use in antennas with up to 30 m aperture due to its lighter weight. The LDA structure is designed to form a spherical surface found by the least square fitting method so that it can be symmetrical. In this case, the positions of the terminal points in the structure are determined by two principles. A method to calculate the cable network stretched on the LDA structure is developed, which combines the original force density method and the parabolic surface constraint. Genetic algorithm is applied to ensure that each cable reaches a desired tension, which avoids the non-convergence issue effectively. We find that the pattern for the front and rear cable net must be the same when finding the shape of the rear cable net, otherwise anticlastic surface would generate.

  7. Potential of dynamic spectrum allocation in LTE macro networks

    NARCIS (Netherlands)

    Hoffmann, H.; Ramachandra, P.; Kovacs, I.Z.; Jorguseski, L.; Gunnarsson, F.; Kurner, T.

    2015-01-01

    In recent years Mobile Network Operators (MNOs) worldwide are extensively deploying LTE networks in different spectrum bands and utilising different bandwidth configurations. Initially, the deployment is coverage oriented with macro cells using the lower LTE spectrum bands. As the offered traffic

  8. Deployment Experiences of British Army Wives Before, During and After Deployment: Satisfaction with Military Life and Use of Support Networks

    National Research Council Canada - National Science Library

    Dandeker, Christopher; French, Claire; Birtles, Catherine; Wessely, S

    2006-01-01

    Introduction and Aims: During deployments, Service wives have to adapt to being alone and taking sole responsibility for their families and house-holds whilst dealing with the additional stress about whether their loved ones will return...

  9. Green heterogeneous wireless networks

    CERN Document Server

    Ismail, Muhammad; Nee, Hans-Peter; Qaraqe, Khalid A; Serpedin, Erchin

    2016-01-01

    This book focuses on the emerging research topic "green (energy efficient) wireless networks" which has drawn huge attention recently from both academia and industry. This topic is highly motivated due to important environmental, financial, and quality-of-experience (QoE) considerations. Specifically, the high energy consumption of the wireless networks manifests in approximately 2% of all CO2 emissions worldwide. This book presents the authors’ visions and solutions for deployment of energy efficient (green) heterogeneous wireless communication networks. The book consists of three major parts. The first part provides an introduction to the "green networks" concept, the second part targets the green multi-homing resource allocation problem, and the third chapter presents a novel deployment of device-to-device (D2D) communications and its successful integration in Heterogeneous Networks (HetNets). The book is novel in that it specifically targets green networking in a heterogeneous wireless medium, which re...

  10. Scientific Cluster Deployment and Recovery – Using puppet to simplify cluster management

    International Nuclear Information System (INIS)

    Hendrix, Val; Yao Yushu; Benjamin, Doug

    2012-01-01

    Deployment, maintenance and recovery of a scientific cluster, which has complex, specialized services, can be a time consuming task requiring the assistance of Linux system administrators, network engineers as well as domain experts. Universities and small institutions that have a part-time FTE with limited time for and knowledge of the administration of such clusters can be strained by such maintenance tasks. This current work is the result of an effort to maintain a data analysis cluster (DAC) with minimal effort by a local system administrator. The realized benefit is the scientist, who is the local system administrator, is able to focus on the data analysis instead of the intricacies of managing a cluster. Our work provides a cluster deployment and recovery process (CDRP) based on the puppet configuration engine allowing a part-time FTE to easily deploy and recover entire clusters with minimal effort. Puppet is a configuration management system (CMS) used widely in computing centers for the automatic management of resources. Domain experts use Puppet's declarative language to define reusable modules for service configuration and deployment. Our CDRP has three actors: domain experts, a cluster designer and a cluster manager. The domain experts first write the puppet modules for the cluster services. A cluster designer would then define a cluster. This includes the creation of cluster roles, mapping the services to those roles and determining the relationships between the services. Finally, a cluster manager would acquire the resources (machines, networking), enter the cluster input parameters (hostnames, IP addresses) and automatically generate deployment scripts used by puppet to configure it to act as a designated role. In the event of a machine failure, the originally generated deployment scripts along with puppet can be used to easily reconfigure a new machine. The cluster definition produced in our CDRP is an integral part of automating cluster deployment

  11. Multi-Level Secure Local Area Network

    OpenAIRE

    Naval Postgraduate School (U.S.); Center for Information Systems Studies Security and Research (CISR)

    2011-01-01

    Multi-Level Secure Local Area Network is a cost effective, multi-level, easy to use office environment leveraging existing high assurance technology. The Department of Defense and U.S. Government have an identified need to securely share information classified at differing security levels. Because there exist no commercial solutions to this problem, NPS is developing a MLS LAN. The MLS LAN extends high assurance capabilities of an evaluated multi-level secure system to commercial personal com...

  12. Deployment and early results from the CanSIM (Canadian Solar Spectral Irradiance Meter) network

    Science.gov (United States)

    Tatsiankou, Viktar; Hinzer, Karin; Schriemer, Henry; McVey-White, Patrick; Beal, Richard

    2017-09-01

    Three of seven stations have been deployed as part of the Canadian Solar Spectral Irradiance (CanSIM) network situated in Ottawa, Varennes and Egbert to measure long term spectral variation of the direct normal (DNI) and global horizontal irradiances (GHI) across the country. Every station is equipped with a solar tracker, SolarSIM-D2+, SolarSIM-G+, and SR20 pyranometer, reporting the spectral DNI, GHI, diffuse horizontal irradiance (DHI) and aerosol optical depth in the 280-4000 nm range, broadband DNI, GHI, and DHI, atmospheric total column ozone and water vapour amounts. The spectral GHI as measured by the SolarSIM-G+ was within 5% as compared to EKO MS-700 spectroradiometer in 350-1050 nm range on 17 March 2017. The difference in the GHI as reported by SolarSIM-G+ and SR20 pyranometer from all stations was within 2% on 14 April 2017. Furthermore, on this day, the daily GHI sum for the Ottawa, Varennes, and Egbert stations was 7.01, 6.95, and 7.11 kWh/m2, respectively, while the daily DNI sum was 10.65, 10.86, 10.04 kWh/m2, respectively.

  13. Deployment Repeatability

    Science.gov (United States)

    2016-04-01

    evaluating the deployment repeatability builds upon the testing or analysis of deployment kinematics (Chapter 6) and adds repetition. Introduction...material yield or failure during a test. For the purposes of this chapter, zero shift will refer to permanent changes in the structure, while reversible ...the content of other chapters in this book: Gravity Compensation (Chapter 4) and Deployment Kinematics and Dynamics (Chapter 6). Repeating the

  14. Deploiment of the national research and educational network “URAN” in the frame of the state program “information and connunication technology in education and science” for 2006-2010.

    Directory of Open Access Journals (Sweden)

    V.G. Galagan

    2009-11-01

    Full Text Available It is shown results of connection of universities and scientific institutions to URAN network including optic fibers deployment in Ukrainian cities and URAN-GEANT 10 Gbps. It is discussed also means of providing of uninterruptable service to metropolitan area network users and implementation of network applied services.

  15. Optical Access Networks

    Science.gov (United States)

    Zheng, Jun; Ansari, Nirwan

    2005-06-01

    Call for Papers: Optical Access Networks With the wide deployment of fiber-optic technology over the past two decades, we have witnessed a tremendous growth of bandwidth capacity in the backbone networks of today's telecommunications infrastructure. However, access networks, which cover the "last-mile" areas and serve numerous residential and small business users, have not been scaled up commensurately. The local subscriber lines for telephone and cable television are still using twisted pairs and coaxial cables. Most residential connections to the Internet are still through dial-up modems operating at a low speed on twisted pairs. As the demand for access bandwidth increases with emerging high-bandwidth applications, such as distance learning, high-definition television (HDTV), and video on demand (VoD), the last-mile access networks have become a bandwidth bottleneck in today's telecommunications infrastructure. To ease this bottleneck, it is imperative to provide sufficient bandwidth capacity in the access networks to open the bottleneck and thus present more opportunities for the provisioning of multiservices. Optical access solutions promise huge bandwidth to service providers and low-cost high-bandwidth services to end users and are therefore widely considered the technology of choice for next-generation access networks. To realize the vision of optical access networks, however, many key issues still need to be addressed, such as network architectures, signaling protocols, and implementation standards. The major challenges lie in the fact that an optical solution must be not only robust, scalable, and flexible, but also implemented at a low cost comparable to that of existing access solutions in order to increase the economic viability of many potential high-bandwidth applications. In recent years, optical access networks have been receiving tremendous attention from both academia and industry. A large number of research activities have been carried out or

  16. Experiences and recommendations in deploying a real-time, water quality monitoring system

    Science.gov (United States)

    O'Flynn, B.; Regan, F.; Lawlor, A.; Wallace, J.; Torres, J.; O'Mathuna, C.

    2010-12-01

    Monitoring of water quality at a river basin level to meet the requirements of the Water Framework Directive (WFD) using conventional sampling and laboratory-based techniques poses a significant financial burden. Wireless sensing systems offer the potential to reduce these costs considerably, as well as provide more useful, continuous monitoring capabilities by giving an accurate idea of the changing environmental and water quality in real time. It is unlikely that the traditional spot/grab sampling will provide a reasonable estimate of the true maximum and/or mean concentration for a particular physicochemical variable in a water body with marked temporal variability. When persistent fluctuations occur, it is likely only to be detected through continuous measurements, which have the capability of detecting sporadic peaks of concentration. Thus, in situ sensors capable of continuous sampling of parameters required under the WFD would therefore provide more up-to-date information, cut monitoring costs and provide better coverage representing long-term trends in fluctuations of pollutant concentrations. DEPLOY is a technology demonstration project, which began planning and station selection and design in August 2008 aiming to show how state-of-the-art technology could be implemented for cost-effective, continuous and real-time monitoring of a river catchment. The DEPLOY project is seen as an important building block in the realization of a wide area autonomous network of sensors capable of monitoring the spatial and temporal distribution of important water quality and environmental target parameters. The demonstration sites chosen are based in the River Lee, which flows through Ireland's second largest city, Cork, and were designed to include monitoring stations in five zones considered typical of significant river systems--these monitor water quality parameters such as pH, temperature, depth, conductivity, turbidity and dissolved oxygen. Over one million data points

  17. Experiences and recommendations in deploying a real-time, water quality monitoring system

    International Nuclear Information System (INIS)

    O'Flynn, B; O'Mathuna, C; Regan, F; Lawlor, A; Wallace, J; Torres, J

    2010-01-01

    Monitoring of water quality at a river basin level to meet the requirements of the Water Framework Directive (WFD) using conventional sampling and laboratory-based techniques poses a significant financial burden. Wireless sensing systems offer the potential to reduce these costs considerably, as well as provide more useful, continuous monitoring capabilities by giving an accurate idea of the changing environmental and water quality in real time. It is unlikely that the traditional spot/grab sampling will provide a reasonable estimate of the true maximum and/or mean concentration for a particular physicochemical variable in a water body with marked temporal variability. When persistent fluctuations occur, it is likely only to be detected through continuous measurements, which have the capability of detecting sporadic peaks of concentration. Thus, in situ sensors capable of continuous sampling of parameters required under the WFD would therefore provide more up-to-date information, cut monitoring costs and provide better coverage representing long-term trends in fluctuations of pollutant concentrations. DEPLOY is a technology demonstration project, which began planning and station selection and design in August 2008 aiming to show how state-of-the-art technology could be implemented for cost-effective, continuous and real-time monitoring of a river catchment. The DEPLOY project is seen as an important building block in the realization of a wide area autonomous network of sensors capable of monitoring the spatial and temporal distribution of important water quality and environmental target parameters. The demonstration sites chosen are based in the River Lee, which flows through Ireland's second largest city, Cork, and were designed to include monitoring stations in five zones considered typical of significant river systems-–these monitor water quality parameters such as pH, temperature, depth, conductivity, turbidity and dissolved oxygen. Over one million data

  18. A local area network and information management system for a submarine overhaul facility

    OpenAIRE

    Bushmire, Jeffrey D

    1990-01-01

    A preliminary design of a local area network for a submarine overhaul facility is developed using System Engineering concepts. SOFLAN, the Submarine Overhaul Facility Local Area Network, is necessary to provide more timely and accurate information to submarine overhaul managers in order to decrease the overhaul time period and become more competitive. The network is a microcomputer based system following the Ethernet and IEEE 802.3 standards with a server .. client architecture. SOFLAN serves...

  19. Local area networks in NAA; Advantages and pitfalls

    Energy Technology Data Exchange (ETDEWEB)

    Blaauw, M [Technische Univ. Delft (Netherlands). Interfaculty Reactor Inst.; Lindstrom, R M [National Inst. of Standards and Technology, Gaithersburg, MD (United States). Inorganic Analytical Research Div.

    1993-03-01

    Both at IRI and at NIST, Local Area Networks (LANs) are being used to acquire and process data from multiple gamma-ray spectrometers. Differences and similarities between three systems are discussed, resulting in recommendations for new systems to be set up. (author) 3 figs.

  20. A local area network for medical research; planning, realization and experience.

    Science.gov (United States)

    Schosser, R; Weiss, C; Messmer, K

    1991-01-01

    This report focuses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing "official" (e.g., IEEE 802.3) and "de facto" standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users' demands.

  1. Proceedings of International Conference on Communication and Networks

    CERN Document Server

    Verma, Pramode; Trivedi, Bhushan

    2017-01-01

    The volume contains 75 papers presented at International Conference on Communication and Networks (COMNET 2015) held during February 19–20, 2016 at Ahmedabad Management Association (AMA), Ahmedabad, India and organized by Computer Society of India (CSI), Ahmedabad Chapter, Division IV and Association of Computing Machinery (ACM), Ahmedabad Chapter. The book aims to provide a forum to researchers to propose theory and technology on the networks and services, share their experience in IT and telecommunications industries and to discuss future management solutions for communication systems, networks and services. It comprises of original contributions from researchers describing their original, unpublished, research contribution. The papers are mainly from 4 areas – Security, Management and Control, Protocol and Deployment, and Applications. The topics covered in the book are newly emerging algorithms, communication systems, network standards, services, and applications. .

  2. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  3. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  4. A High-Resolution Sensor Network for Monitoring Glacier Dynamics

    Science.gov (United States)

    Edwards, S.; Murray, T.; O'Farrell, T.; Rutt, I. C.; Loskot, P.; Martin, I.; Selmes, N.; Aspey, R.; James, T.; Bevan, S. L.; Baugé, T.

    2013-12-01

    adoption of beacon based time division multiple access (tdma). In-house single-epoch GNSS processing software provides 1-2 cm coordinate time-series capable of detecting a major calving event during the 2012 pilot study. These data can be synthesised with other remotely sensed data e.g. airborne lidar, oblique photogrammetry and TanDEM-X satellite imagery derived DEMs giving an opportunity to fine-tune glacial models delivering a deeper understanding of the contribution to sea-level rise made by tidewater glaciers such as Helheim. The flexibility of our network would make it suitable for deployment in other extreme environments such as areas at risk from earthquakes and landslides.

  5. Virtual Networking Performance in OpenStack Platform for Network Function Virtualization

    Directory of Open Access Journals (Sweden)

    Franco Callegati

    2016-01-01

    Full Text Available The emerging Network Function Virtualization (NFV paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.

  6. SNL evaluation of Gigabit Passive Optical Networks (GPON).

    Energy Technology Data Exchange (ETDEWEB)

    Heckart, David G.; Roybal, Glen B.; Walker, Betty R.; Pratt, Thomas Joseph; Gossage, Steven Allen; Trujillo, Sandra M.; Fischer, Bob; Brenkosh, Joseph Peter; Rudolfo, Gerald F.; Dirks, David H.; Schutt, James Alan

    2009-08-01

    Gigabit Passive Optical Networks (GPON) is a networking technology which offers the potential to provide significant cost savings to Sandia National Laboratories in the area of network operations. However, a large scale GPON deployment requires a significant investment in equipment and infrastructure. Before a large scale GPON system was acquired and built, a small GPON system manufactured by Motorola was acquired and tested. The testing performed was to determine the suitability of GPON for use at SNL. This report documents that testing. This report presents test results of GPON system consisting of Motorola and Juniper equipment. The GPON system was tested in areas of data throughput, video conferencing, VOIP, security, and operations and management. The GPON system performed well in almost all areas. GPON will not meet the needs of the low percentage of users requiring a true 1-10 Gbps network connection. GPON will also most likely not meet the need of some servers requiring dedicated throughput of 1-10 Gbps. Because of that, there will be some legacy network connections that must remain. If these legacy network connections can not be reduced to a bare minimum and possibly consolidated to a few locations, any cost savings gained by switching to GPON will be negated by maintaining two networks. A contract has been recently awarded for new GPON equipment with larger buffers. This equipment should improve performance and further reduce the need for legacy network connections. Because GPON has fewer components than a typical hierarchical network, it should be easier to manage. For the system tested, the management was performed by using the AXSVison client. Access to the client must be tightly controlled, because if client/server communications are compromised, security will be an issue. As with any network, the reliability of individual components will determine overall system reliability. There were no failures with the routers, OLT, or Sun Workstation Management

  7. Protocol for Communication Networking for Formation Flying

    Science.gov (United States)

    Jennings, Esther; Okino, Clayton; Gao, Jay; Clare, Loren

    2009-01-01

    diverse local-area networks, this protocol offers both (1) a random- access mode needed for the early PFF deployment phase and (2) a time-bounded-services mode needed during PFF-maintenance operations. Switching between these two modes could be controlled by upper-layer entities using standard link-management mechanisms. Because the early deployment phase of a PFF mission can be expected to involve multihop relaying to achieve network connectivity (see figure), the proposed protocol includes the open shortest path first (OSPF) network protocol that is commonly used in the Internet. Each spacecraft in a PFF network would be in one of seven distinct states as the mission evolved from initial deployment, through coarse formation, and into precise formation. Reconfiguration of the formation to perform different scientific observations would also cause state changes among the network nodes. The application protocol provides for recognition and tracking of the seven states for each node and for protocol changes under specified conditions to adapt the network and satisfy communication requirements associated with the current PFF mission phase. Except during early deployment, when peer-to-peer random access discovery methods would be used, the application protocol provides for operation in a centralized manner.

  8. Wide area data replication in an ITER-relevant data environment

    International Nuclear Information System (INIS)

    Centioli, C.; Iannone, F.; Panella, M.; Vitale, V.; Bracco, G.; Guadagni, R.; Migliori, S.; Steffe, M.; Eccher, S.; Maslennikov, A.; Mililotti, M.; Molowny, M.; Palumbo, G.; Carboni, M.

    2005-01-01

    The next generation of tokamak experiments will require a new way of approaching data sharing issues among fusion organizations. In the fusion community, many researchers at different worldwide sites will analyse data produced by International Thermonuclear Experimental Reactor (ITER), wherever it will be built. In this context, an efficient availability of the data in the sites where the computational resources are located becomes a major architectural issue for the deployment of ITER computational infrastructure. The approach described in this paper goes beyond the usual site-centric model mainly devoted to granting access exclusively to experimental data stored at the device sites. To this aim, we propose a new data replication architecture relying on a wide area network, based on a Master/Slave model and on synchronization techniques producing mirrored data sites. In this architecture, data replication will affect large databases (TB) as well as large UNIX-like file systems, using open source-based software components, namely MySQL, as database management system, and RSYNC and BBFTP for data transfer. A test-bed has been set up to evaluate the performance of the software components underlying the proposed architecture. The test-bed hardware layout deploys a cluster of four Dual-Xeon Supermicro each with a raid array of 1 TB. High performance network line (1 Gbit over 400 km) provides the infrastructure to test the components on a wide area network. The results obtained will be thoroughly discussed

  9. Projected impacts of climate change on a continent-wide protected area network

    DEFF Research Database (Denmark)

    Hole, David G; Willis, Stephen G; Pain, Deborah J

    2009-01-01

    Despite widespread concern, the continuing effectiveness of networks of protected areas under projected 21st century climate change is uncertain. Shifts in species' distributions could mean these resources will cease to afford protection to those species for which they were originally established...... species). Persistence of suitable climate space across the network as a whole, however, is notably high, with 88-92% of priority species retaining suitable climate space in >or= 1 IBA(s) in which they are currently found. Only 7-8 priority species lose climatic representation from the network. Hence......, despite the likelihood of significant community disruption, we demonstrate that rigorously defined networks of protected areas can play a key role in mitigating the worst impacts of climate change on biodiversity....

  10. Rogue AP Detection in the Wireless LAN for Large Scale Deployment

    Directory of Open Access Journals (Sweden)

    Sang-Eon Kim

    2006-10-01

    Full Text Available The wireless LAN standard, also known as WiFi, has begun to use commercial purposes. This paper describes access network architecture of wireless LAN for large scale deployment to provide public service. A metro Ethernet and digital subscriber line access network can be used for wireless LAN with access point. In this network architecture, access point plays interface between wireless node and network infrastructure. It is important to maintain access point without any failure and problems to public users. This paper proposes definition of rogue access point and classifies based on functional problem to access the Internet. After that, rogue access point detection scheme is described based on classification over the wireless LAN. The rogue access point detector can greatly improve the network availability to network service provider of wireless LAN.

  11. Network Penetration Testing and Research

    Science.gov (United States)

    Murphy, Brandon F.

    2013-01-01

    This paper will focus the on research and testing done on penetrating a network for security purposes. This research will provide the IT security office new methods of attacks across and against a company's network as well as introduce them to new platforms and software that can be used to better assist with protecting against such attacks. Throughout this paper testing and research has been done on two different Linux based operating systems, for attacking and compromising a Windows based host computer. Backtrack 5 and BlackBuntu (Linux based penetration testing operating systems) are two different "attacker'' computers that will attempt to plant viruses and or NASA USRP - Internship Final Report exploits on a host Windows 7 operating system, as well as try to retrieve information from the host. On each Linux OS (Backtrack 5 and BlackBuntu) there is penetration testing software which provides the necessary tools to create exploits that can compromise a windows system as well as other operating systems. This paper will focus on two main methods of deploying exploits 1 onto a host computer in order to retrieve information from a compromised system. One method of deployment for an exploit that was tested is known as a "social engineering" exploit. This type of method requires interaction from unsuspecting user. With this user interaction, a deployed exploit may allow a malicious user to gain access to the unsuspecting user's computer as well as the network that such computer is connected to. Due to more advance security setting and antivirus protection and detection, this method is easily identified and defended against. The second method of exploit deployment is the method mainly focused upon within this paper. This method required extensive research on the best way to compromise a security enabled protected network. Once a network has been compromised, then any and all devices connected to such network has the potential to be compromised as well. With a compromised

  12. Networking wireless sensors

    National Research Council Canada - National Science Library

    Krishnamachari, Bhaskar

    2005-01-01

    ... by networking techniques across multiple layers. The topics covered include network deployment, localization, time synchronization, wireless radio characteristics, medium-access, topology control, routing, data-centric techniques, and transport protocols. Ideal for researchers and designers seeking to create new algorithms and protocols and enginee...

  13. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Donghai Zhu

    2016-01-01

    Full Text Available Wireless Mesh Networks (WMNs have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigms in data transmission for WMNs. In this paper, we develop a novel OpenCoding protocol, which combines the SDN technique with intra-flow network coding for WMNs. Our developed protocol can simplify the deployment and management of the network and improve network performance. In OpenCoding, a controller that works on the control plane makes routing decisions for mesh routers and the hop-by-hop forwarding function is replaced by network coding functions in data plane. We analyze the overhead of OpenCoding. Through a simulation study, we show the effectiveness of the OpenCoding protocol in comparison with existing schemes. Our data shows that OpenCoding outperforms both traditional routing and intra-flow network coding schemes.

  14. Flow whitelisting in SCADA networks

    NARCIS (Netherlands)

    Barbosa, Rafael Ramos Regis; Sadre, Ramin; Pras, Aiko

    2013-01-01

    Supervisory control and data acquisition (SCADA) networks are commonly deployed in large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber attacks due to the common use of standard communications protocols and increased interconnections with corporate networks and

  15. Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes

    Science.gov (United States)

    Bleda, Andrés L.; Jara, Antonio J.; Maestre, Rafael; Santa, Guadalupe; Gómez Skarmeta, Antonio F.

    2012-01-01

    The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT) and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain. PMID:22778653

  16. Evaluation of the impact of furniture on communications performance for ubiquitous deployment of Wireless Sensor Networks in smart homes.

    Science.gov (United States)

    Bleda, Andrés L; Jara, Antonio J; Maestre, Rafael; Santa, Guadalupe; Gómez Skarmeta, Antonio F

    2012-01-01

    The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT) and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain.

  17. Evaluation of the Impact of Furniture on Communications Performance for Ubiquitous Deployment of Wireless Sensor Networks in Smart Homes

    Directory of Open Access Journals (Sweden)

    Antonio F. Gómez Skarmeta

    2012-05-01

    Full Text Available The extensions of the environment with the integration of sensing systems in any space, in conjunction with ubiquitous computing are enabling the so-called Smart Space Sensor Networks. This new generation of networks are offering full connectivity with any object, through the Internet of Things (IoT and/or the Web, i.e., the Web of Things. These connectivity capabilities are making it feasible to sense the behaviours of people at home and act accordingly. These sensing systems must be integrated within typical elements found at home such as furniture. For that reason, this work considers furniture as an interesting element for the transparent location of sensors. Furniture is a ubiquitous object, i.e., it can be found everywhere at home or the office, and it can integrate and hide the sensors of a network. This work addresses the lack of an exhaustive study of the effect of furniture on signal losses. In addition an easy-to-use tool for estimating the robustness of the communication channel among the sensor nodes and gateways is proposed. Specifically, the losses in a sensor network signal due to the materials found within the communication link are evaluated. Then, this work proposes a software tool that gathers the obtained results and is capable of evaluating the impact of a given set of materials on the communications. This tool also provides a mechanism to optimize the sensor network deployments during the definition of smart spaces. Specifically, it provides information such as: maximum distances between sensor nodes, most suitable type of furniture to integrate sensors, or battery life of sensor nodes. This tool has been validated empirically in the lab, and it is currently being used by several enterprise partners of the Technological Centre of Furniture and Wood in the southeast of Spain.

  18. A Game Theoretic Framework for Bandwidth Allocation and Pricing in Federated Wireless Networks

    Science.gov (United States)

    Gu, Bo; Yamori, Kyoko; Xu, Sugang; Tanaka, Yoshiaki

    With the proliferation of IEEE 802.11 wireless local area networks, large numbers of wireless access points have been deployed, and it is often the case that a user can detect several access points simultaneously in dense metropolitan areas. Most owners, however, encrypt their networks to prevent the public from accessing them due to the increased traffic and security risk. In this work, we use pricing as an incentive mechanism to motivate the owners to share their networks with the public, while at the same time satisfying users' service demand. Specifically, we propose a “federated network” concept, in which radio resources of various wireless local area networks are managed together. Our algorithm identifies two candidate access points with the lowest price being offered (if available) to each user. We then model the price announcements of access points as a game, and characterize the Nash Equilibrium of the system. The efficiency of the Nash Equilibrium solution is evaluated via simulation studies as well.

  19. Local multipoint distribution system (LDMS) versus free-space optical (FSO) networks

    Science.gov (United States)

    Willebrand, Heinz A.; Clark, Gerald R.; Willson, Bryan; Andreu von Euw, Christian G.; Roy, Joe; Mayhew, Laurel M.

    2001-11-01

    This paper compares two emerging broadband access methodologies, Free Space Optics (FSO) and Local Multipoint Distribution System (LMDS) and the atmospheric propagation characteristics of each when exposed to a dynamically changing channel. The comparison focuses on bandwidth, availability, and distance requirements for the new broadband market and how LMDS and FSO can be used to meet these requirements. Possible network topologies and their associated costs are examined. This comparison takes into account the total cost of deployment, including equipment costs, installation fees, access fees, and spectrum licensing fees. LMDS and FSO are compared on speed of deployment, scalability, aggregate bandwidth, and bandwidth per customer. Present and projected capabilities of each technology are considered for their suitability in different locations in the network, from the Wide Area Network (WAN), to the Metropolitan Area Network (MAN), all the way to Last Mile Access. There is a discussion on the relative performance of LMDS and FSO, focusing on the different factors that can affect link availability. Since network design is a large factor in assuring overall reliability, the flexibility of each technology with regard to network design is compared. LMDS and FSO are both line of sight, space-propagated technologies, and as such, they are both susceptible to path impediments and atmospheric attenuation, dispersion, scattering, and absorption. LMDS and FSO are affected very differently by different meteorological phenomena. Problematic atmospheric conditions are, specifically scintillation, rainfall, and fog, are examined. In addition to a discussion of these conditions, various techniques for minimizing atmospheric and environmental effects are investigated. The paper concludes with a summary of findings and recommendations for a number of broadband wireless applications.

  20. An Implementation of Wireless Body Area Networks for Improving Priority Data Transmission Delay.

    Science.gov (United States)

    Gündoğdu, Köksal; Çalhan, Ali

    2016-03-01

    The rapid growth of wireless sensor networks has enabled the human health monitoring of patients using body sensor nodes that gather and evaluate human body parameters and movements. This study describes both simulation model and implementation of a new traffic sensitive wireless body area network by using non-preemptive priority queue discipline. A wireless body area network implementation employing TDMA is designed with three different priorities of data traffics. Besides, a coordinator node having the non-preemptive priority queue is performed in this study. We have also developed, modeled and simulated example network scenarios by using the Riverbed Modeler simulation software with the purpose of verifying the implementation results. The simulation results obtained under various network load conditions are consistent with the implementation results.

  1. Intelligent Resource Management for Local Area Networks: Approach and Evolution

    Science.gov (United States)

    Meike, Roger

    1988-01-01

    The Data Management System network is a complex and important part of manned space platforms. Its efficient operation is vital to crew, subsystems and experiments. AI is being considered to aid in the initial design of the network and to augment the management of its operation. The Intelligent Resource Management for Local Area Networks (IRMA-LAN) project is concerned with the application of AI techniques to network configuration and management. A network simulation was constructed employing real time process scheduling for realistic loads, and utilizing the IEEE 802.4 token passing scheme. This simulation is an integral part of the construction of the IRMA-LAN system. From it, a causal model is being constructed for use in prediction and deep reasoning about the system configuration. An AI network design advisor is being added to help in the design of an efficient network. The AI portion of the system is planned to evolve into a dynamic network management aid. The approach, the integrated simulation, project evolution, and some initial results are described.

  2. Wireless multihop backhauls for rural areas: A preliminary study.

    Directory of Open Access Journals (Sweden)

    Zainab Zaidi

    Full Text Available Rural areas have very low revenue potential. The major issue in providing low-cost broadband to rural areas is to provide reliable backhaul connections that spread over tens or even hundreds of miles, connecting villages to the nearest service provider. Along with aerial networks of Google and Facebook, there has been a considerable amount of research toward long-distance terrestrial WiFi links. As a comparison, WiFi routers are easier to be deployed and maintained by non-technical people from the local communities, whereas the aerial networks require professional support to operate. Moreover, they are still in the experimentation phase. However, the long distance WiFi links require high-gain directional antennas and very expensive tall towers for high data rates. On the other hand, multihop paths with stronger links may provide better data rates without the need of tall towers. In this paper, we evaluated the concept of using such multihop WiFi links for long backhaul connections. Our simulation results show that these networks can possibly be a cost-effective and practical solution for rural connectivity. These initial results can serve as a first step to understand the comprehensive feasibility of using multihop WiFi networks for backhaul connections in rural area.

  3. Wireless multihop backhauls for rural areas: A preliminary study.

    Science.gov (United States)

    Zaidi, Zainab; Lan, Kun-Chan

    2017-01-01

    Rural areas have very low revenue potential. The major issue in providing low-cost broadband to rural areas is to provide reliable backhaul connections that spread over tens or even hundreds of miles, connecting villages to the nearest service provider. Along with aerial networks of Google and Facebook, there has been a considerable amount of research toward long-distance terrestrial WiFi links. As a comparison, WiFi routers are easier to be deployed and maintained by non-technical people from the local communities, whereas the aerial networks require professional support to operate. Moreover, they are still in the experimentation phase. However, the long distance WiFi links require high-gain directional antennas and very expensive tall towers for high data rates. On the other hand, multihop paths with stronger links may provide better data rates without the need of tall towers. In this paper, we evaluated the concept of using such multihop WiFi links for long backhaul connections. Our simulation results show that these networks can possibly be a cost-effective and practical solution for rural connectivity. These initial results can serve as a first step to understand the comprehensive feasibility of using multihop WiFi networks for backhaul connections in rural area.

  4. Wireless multihop backhauls for rural areas: A preliminary study

    Science.gov (United States)

    Zaidi, Zainab; Lan, Kun-chan

    2017-01-01

    Rural areas have very low revenue potential. The major issue in providing low-cost broadband to rural areas is to provide reliable backhaul connections that spread over tens or even hundreds of miles, connecting villages to the nearest service provider. Along with aerial networks of Google and Facebook, there has been a considerable amount of research toward long-distance terrestrial WiFi links. As a comparison, WiFi routers are easier to be deployed and maintained by non-technical people from the local communities, whereas the aerial networks require professional support to operate. Moreover, they are still in the experimentation phase. However, the long distance WiFi links require high-gain directional antennas and very expensive tall towers for high data rates. On the other hand, multihop paths with stronger links may provide better data rates without the need of tall towers. In this paper, we evaluated the concept of using such multihop WiFi links for long backhaul connections. Our simulation results show that these networks can possibly be a cost-effective and practical solution for rural connectivity. These initial results can serve as a first step to understand the comprehensive feasibility of using multihop WiFi networks for backhaul connections in rural area. PMID:28403167

  5. Bringing fiber to the home to rural areas in Denmark

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, M. Tahir

    2009-01-01

    In order to support development of rural areas, and avoid that these  areas are being depopulated, access to fast broadband networks can contribute by facilitating tele working, distance learning, ICT for industries and farming etc. In this paper we show how broadband and Fiber To The Home (FTTH......) is developing in Denmark, and that FTTH is also being deployed in rural areas. A main reason for this is that consumer-owed utility companies have decided to invest heavily in the field, to a large extent with the philosophy that, since all consumers are a part of the investment, everybody should also benefit...

  6. Flow whitelisting in SCADA networks

    NARCIS (Netherlands)

    Barbosa, Rafael Ramos Regis; Pras, Aiko; Sadre, Ramin

    Supervisory Control And Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities. Modern SCADA networks are becoming more vulnerable to network attacks, due to the now common use of standard communication protocols and increased interconnection to

  7. Flow Whitelisting in SCADA Networks

    NARCIS (Netherlands)

    Barbosa, R.R.R.; Pras, Aiko; Sadre, R.

    2013-01-01

    Supervisory Control And Data Acquisition (SCADA) networks are commonly deployed to aid the operation of large industrial facilities. Modern SCADA networks are becoming more vulnerable to network attacks, due to the now common use of standard communication protocols and increased interconnection to

  8. The deployment of new energy technologies and the need for local learning

    International Nuclear Information System (INIS)

    Neij, Lena; Heiskanen, Eva; Strupeit, Lars

    2017-01-01

    The objective of this paper is to identify local aspects of technological learning in the deployment of solar photovoltaic (PV), a globally important form of distributed energy technology. We review literature in the economics of innovation and economic geography to identify the need for local learning when adopting new technologies and seek evidence on the local aspects of learning processes in the deployment of new (energy) technologies. The analysis focuses on the empirical evidence of learning processes in PV deployment. Our findings show that learning for PV deployment exhibits characteristics of local learning identified in the innovation literature (tacit knowledge, shared narratives, user relations and learning in interorganizational networks). In addition, we show that competencies in the deployment of PV rely on learning processes that are closely connected to the historically and geographically distinctive characteristics of the built environment. We also find evidence of the significance of proximity in (local) learning, as well as examples of knowledge being codified over time into national and global knowledge flows. We conclude with policy implications that acknowledge the importance of local learning for deployment. - Highlights: • PV deployment exhibits characteristics of local learning. • Some processes of local learning have become codified on a national level. • Based on a proximity in local learning we stress the importance of local policy.

  9. The ADVANCE project: Formal evaluation of the targeted deployment. Volume 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1997-01-01

    The Advanced Driver and Vehicle Advisory Navigation ConcEpt (ADVANCE) was an invehicle advanced traveler information system (ATIS) that operated in the northwest suburbs of Chicago, Illinois. It was designed to provide origin-destination shortest-time route guidance to a vehicle based on (a) an on-board static (fixed) data base of average network link travel times by time of day, combined as available and appropriate with (b) dynamic (real-time) information on traffic conditions provided by radio frequency (RF) communications to and from a traffic information center (TIC). Originally conceived in 1990 as a major project that would have installed 3,000 to 5,000 route guidance units in privately owned vehicles throughout the test area, ADVANCE was restructured in 1995 as a {open_quotes}targeted deployment,{close_quotes} in which approximately 80 vehicles were to be equipped with the guidance units - Mobile Navigation Assistants (MNAs) - to be in full communication with the TIC while driving the ADVANCE test area road system. Volume one consists of the evaluation managers overview report, and several appendices containing test results.

  10. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  11. Coexistence of Named Data Networking (NDN) and Software-Defined Networking (SDN)

    Science.gov (United States)

    2017-09-01

    COD) for deploying the data found by CL at optimal node, and c) Path Optimizer (PO) for balancing network traffic in both spatial and temporal...and software- defined networking with big data . Ithaca (NY): Cornell University Library; 2016 Nov 19. arXiv: 1611.06299v1 [cs.NI]. Approved for...ARL-TN-0845 ● SEP 2017 US Army Research Laboratory Coexistence of Named Data Networking (NDN) and Software-Defined Networking

  12. The ISMAR high frequency coastal radar network: Monitoring surface currents for management of marine resources

    DEFF Research Database (Denmark)

    Carlson, Daniel Frazier

    2015-01-01

    The Institute of Marine Sciences (ISMAR) of the National Research Council of Italy (CNR) established a High Frequency (HF) Coastal Radar Network for the measurement of the velocity of surface currents in coastal seas. The network consists of four HF radar systems located on the coast of the Gargano...... Promontory (Southern Adriatic, Italy). The network has been operational since May 2013 and covers an area of approximately 1700 square kilometers in the Gulf of Manfredonia. Quality Assessment (QA) procedures are applied for the systems deployment and maintenance and Quality Control (QC) procedures...

  13. An Analysis of IPsec Deployment Performance in High and Low Power Devices

    OpenAIRE

    Ronan, John; Davy, Stephen; Rossebo, Judith

    2004-01-01

    Virtual Private Networks (VPNs) use the Internet or other network service as a backbone to provide a secure connection across a potentially hostile WAN. Such security guarantees provide the motivation for VPN deployment. This security does, however, come at a performance cost brought about by the increased processing overhead. This paper presents an investigation into these overheads. In particular, this investigation will consider different user resource availability based on the client plat...

  14. Towards Designing PLC Networks for Ubiquitous Connectivity in Enterprises

    OpenAIRE

    Ali, Kamran; Pefkianakis, Ioannis; Liu, Alex X.; Kim, Kyu-Han

    2016-01-01

    Powerline communication (PLC) provides inexpensive, secure and high speed network connectivity, by leveraging the existing power distribution networks inside the buildings. While PLC technology has the potential to improve connectivity and is considered a key enabler for sensing, control, and automation applications in enterprises, it has been mainly deployed for improving connectivity in homes. Deploying PLCs in enterprises is more challenging since the power distribution network is more com...

  15. Autonomous QoS Management and Policing in Unmanaged Local Area Networks

    Directory of Open Access Journals (Sweden)

    Christopher Köhnen

    2015-01-01

    Full Text Available The high increase of bandwidth-intensive applications like high definition video streaming in home and small office environments leads to QoS challenges in hybrid wired/wireless local area networks. These networks are often not QoS aware and may contain bottlenecks in their topology. In addition, they often have a hybrid nature due to the used access technology consisting of, for example, Ethernet, wireless, and PowerLAN links. In this paper, we present the research work on a novel autonomous system for hybrid QoS in local area networks, called QoSiLAN, which does not rely on network infrastructure support but on host cooperation and works independently of the access technology. We present a new QoS Signalling Protocol, policing and admission control algorithms, and a new lightweight statistical bandwidth prediction algorithm for autonomous resource management in LANs. This new QoS framework enables link based, access-medium independent bandwidth management without network support. We provide evaluation results for the novel bandwidth prediction algorithm as well as for the QoSiLAN framework and its protocol, which highlight the features, robustness, and the effectiveness of the proposed system.

  16. A multiscale network analysis of protected-area connectivity for mammals in the United States.

    Science.gov (United States)

    Minor, Emily S; Lookingbill, Todd R

    2010-12-01

    Protected areas must be close, or connected, enough to allow for the preservation of large-scale ecological and evolutionary processes, such as gene flow, migration, and range shifts in response to climate change. Nevertheless, it is unknown whether the network of protected areas in the United States is connected in a way that will preserve biodiversity over large temporal and spatial scales. It is also unclear whether protected-area networks that function for larger species will function for smaller species. We assessed the connectivity of protected areas in the three largest biomes in the United States. With methods from graph theory--a branch of mathematics that deals with connectivity and flow--we identified and measured networks of protected areas for three different groups of mammals. We also examined the value of using umbrella species (typically large-bodied, far-ranging mammals) in designing large-scale networks of protected areas. Although the total amount of protected land varied greatly among biomes in the United States, overall connectivity did not. In general, protected-area networks were well connected for large mammals but not for smaller mammals. Additionally, it was not possible to predict connectivity for small mammals on the basis of connectivity for large mammals, which suggests the umbrella species approach may not be an appropriate design strategy for conservation networks intended to protect many species. Our findings indicate different strategies should be used to increase the likelihood of persistence for different groups of species. Strategic linkages of existing lands should be a conservation priority for smaller mammals, whereas conservation of larger mammals would benefit most from the protection of more land. © 2010 Society for Conservation Biology.

  17. Software defined networking applications in distributed datacenters

    CERN Document Server

    Qi, Heng

    2016-01-01

    This SpringerBrief provides essential insights on the SDN application designing and deployment in distributed datacenters. In this book, three key problems are discussed: SDN application designing, SDN deployment and SDN management. This book demonstrates how to design the SDN-based request allocation application in distributed datacenters. It also presents solutions for SDN controller placement to deploy SDN in distributed datacenters. Finally, an SDN management system is proposed to guarantee the performance of datacenter networks which are covered and controlled by many heterogeneous controllers. Researchers and practitioners alike will find this book a valuable resource for further study on Software Defined Networking. .

  18. REAL TIME ANALYSIS OF WIRELESS CONTROLLER AREA NETWORK

    Directory of Open Access Journals (Sweden)

    Gerardine Immaculate Mary

    2014-09-01

    Full Text Available It is widely known that Control Area Networks (CAN are used in real-time, distributed and parallel processing which cover manufacture plants, humanoid robots, networking fields, etc., In applications where wireless conditions are encountered it is convenient to continue the exchange of CAN frames within the Wireless CAN (WCAN. The WCAN considered in this research is based on wireless token ring protocol (WTRP; a MAC protocol for wireless networks to reduce the number of retransmissions due to collision and the wired counterpart CAN attribute on message based communication. WCAN uses token frame method to provide channel access to the nodes in the system. This method allow all the nodes to share common broadcast channel by taken turns in transmitting upon receiving the token frame which is circulating within the network for specified amount of time. This method provides high throughput in bounded latency environment, consistent and predictable delays and good packet delivery ratio. The most important factor to consider when evaluating a control network is the end-to-end time delay between sensors, controllers, and actuators. The correct operation of a control system depends on the timeliness of the data coming over the network, and thus, a control network should be able to guarantee message delivery within a bounded transmission time. The proposed WCAN is modeled and simulated using QualNet, and its average end to end delay and packet delivery ratio (PDR are calculated. The parameters boundaries of WCAN are evaluated to guarantee a maximum throughput and a minimum latency time, in the case of wireless communications, precisely WCAN.

  19. Sao Paulo Lightning Mapping Array (SP-LMA): Deployment, Operation and Initial Data Analysis

    Science.gov (United States)

    Blakeslee, R.; Bailey, J. C.; Carey, L. D.; Rudlosky, S.; Goodman, S. J.; Albrecht, R.; Morales, C. A.; Anseimo, E. M.; Pinto, O.

    2012-01-01

    An 8-10 station Lightning Mapping Array (LMA) network is being deployed in the vicinity of Sao Paulo to create the SP-LMA for total lightning measurements in association with the international CHUVA [Cloud processes of the main precipitation systems in Brazil: A contribution to cloud resolving modeling and to the GPM (Global Precipitation Measurement)] field campaign. Besides supporting CHUVA science/mission objectives and the Sao Luiz do Paraitinga intensive operation period (IOP) in November-December 2011, the SP-LMA will support the generation of unique proxy data for the Geostationary Lightning Mapper (GLM) and Advanced Baseline Imager (ABI), both sensors on the NOAA Geostationary Operational Environmental Satellite-R (GOES-R), presently under development and scheduled for a 2015 launch. The proxy data will be used to develop and validate operational algorithms so that they will be ready for use on "day1" following the launch of GOES-R. A preliminary survey of potential sites in the vicinity of Sao Paulo was conducted in December 2009 and January 2010, followed up by a detailed survey in July 2010, with initial network deployment scheduled for October 2010. However, due to a delay in the Sao Luiz do Paraitinga IOP, the SP-LMA will now be installed in July 2011 and operated for one year. Spacing between stations is on the order of 15-30 km, with the network "diameter" being on the order of 30-40 km, which provides good 3-D lightning mapping 150 km from the network center. Optionally, 1-3 additional stations may be deployed in the vicinity of Sao Jos dos Campos.

  20. An energy-efficient leader election mechanism for wireless body area networks

    OpenAIRE

    Zhang , Rongrong; Moungla , Hassine; Mehaoua , Ahmed

    2014-01-01

    International audience; In Wireless Body Area Networks (WBANs), the energy consumption determines the lifetime of the entire network. As a result, how to conserve the energy to prolong the network lifetime becomes a key problem in WBANs. In this paper, to address the energy conservation problem in WBANs, we develop an Energy-Efficient Leader Election mechanism, called EELE. In EELE, each node competes for the leader following the distributed leader election algorithm in which a utility functi...

  1. Distributed clone detection in static wireless sensor networks: random walk with network division.

    Science.gov (United States)

    Khan, Wazir Zada; Aalsalem, Mohammed Y; Saad, N M

    2015-01-01

    Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND) for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s) by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads.

  2. Distributed clone detection in static wireless sensor networks: random walk with network division.

    Directory of Open Access Journals (Sweden)

    Wazir Zada Khan

    Full Text Available Wireless Sensor Networks (WSNs are vulnerable to clone attacks or node replication attacks as they are deployed in hostile and unattended environments where they are deprived of physical protection, lacking physical tamper-resistance of sensor nodes. As a result, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones/replicas into the network. If these clones are not efficiently detected, an adversary can be further capable to mount a wide variety of internal attacks which can emasculate the various protocols and sensor applications. Several solutions have been proposed in the literature to address the crucial problem of clone detection, which are not satisfactory as they suffer from some serious drawbacks. In this paper we propose a novel distributed solution called Random Walk with Network Division (RWND for the detection of node replication attack in static WSNs which is based on claimer-reporter-witness framework and combines a simple random walk with network division. RWND detects clone(s by following a claimer-reporter-witness framework and a random walk is employed within each area for the selection of witness nodes. Splitting the network into levels and areas makes clone detection more efficient and the high security of witness nodes is ensured with moderate communication and memory overheads. Our simulation results show that RWND outperforms the existing witness node based strategies with moderate communication and memory overheads.

  3. Cluster-based Data Gathering in Long-Strip Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    FANG, W.

    2012-02-01

    Full Text Available This paper investigates a special class of wireless sensor networks that are different from traditional ones in that the sensor nodes in this class of networks are deployed along narrowly elongated geographical areas and form a long-strip topology. According to hardware capabilities of current sensor nodes, a cluster-based protocol for reliable and efficient data gathering in long-strip wireless sensor networks (LSWSN is proposed. A well-distributed cluster-based architecture is first formed in the whole network through contention-based cluster head election. Cluster heads are responsible for coordination among the nodes within their clusters and aggregation of their sensory data, as well as transmission the data to the sink node on behalf of their own clusters. The intra-cluster coordination is based on the traditional TDMA schedule, in which the inter-cluster interference caused by the border nodes is solved by the multi-channel communication technique. The cluster reporting is based on the CSMA contention, in which a connected overlay network is formed by relay nodes to forward the data from the cluster heads through multi-hops to the sink node. The relay nodes are non-uniformly deployed to resolve the energy-hole problem which is extremely serious in the LSWSN. Extensive simulation results illuminate the distinguished performance of the proposed protocol.

  4. Directional MAC approach for wireless body area networks.

    Science.gov (United States)

    Hussain, Md Asdaque; Alam, Md Nasre; Kwak, Kyung Sup

    2011-01-01

    Wireless Body Area Networks (WBANs) designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA) at BAN Coordinator (BAN_C) node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  5. Directional MAC Approach for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Md. Asdaque Hussain

    2011-01-01

    Full Text Available Wireless Body Area Networks (WBANs designed for medical, sports, and entertainment applications, have drawn the attention of academia and industry alike. A WBAN is a special purpose network, designed to operate autonomously to connect various medical sensors and appliances, located inside and/or outside of a human body. This network enables physicians to remotely monitor vital signs of patients and provide real time feedback for medical diagnosis and consultations. The WBAN system can offer two significant advantages: patient mobility due to their use of portable monitoring devices and a location independent monitoring facility. With its appealing dimensions, it brings about a new set of challenges, which we do not normally consider in such small sensor networks. It requires a scalable network in terms of heterogeneous data traffic, low power consumption of sensor nodes, integration in and around the body networking and coexistence. This work presents a medium access control protocol for WBAN which tries to overcome the aforementioned challenges. We consider the use of multiple beam adaptive arrays (MBAA at BAN Coordinator (BAN_C node. When used as a BAN_C, an MBAA can successfully receive two or more overlapping packets at the same time. Each beam captures a different packet by automatically pointing its pattern toward one packet while annulling other contending packets. This paper describes how an MBAA can be integrated into a single hope star topology as a BAN_C. Simulation results show the performance of our proposed protocol.

  6. Time-division optical interconnects for local-area and micro-area networks

    Science.gov (United States)

    Krol, Mark F.; Boncek, Raymond K.; Johns, Steven T.; Stacy, John L.

    1991-12-01

    This report describes the development of an optical Time-Division Multiple-Access (TDMA) interconnect suitable for applications in local-area and micro-area networks. The advantages of using time-division techniques instead of frequency-division, wavelength-division, or code-division techniques in a shared-medium environment are discussed in detail. Furthermore, a detailed description of the TDMA architecture is presented along with various experiments pertaining to the actual components needed to implement the system. Finally, experimental data is presented for an actual optical TDMA test bed. The experimental data demonstrates the feasibility of the architecture, and shows that currently the system has the capability to accommodate up to 50 channels. The bit-error-rate per channel was measured to be less than 10(exp -9) for pseudo-random bit-sequences.

  7. Characterization of the Network of Protected Areas in Puerto Rico

    Science.gov (United States)

    J. Castro-Prieto; Maya Quinones; William Gould

    2016-01-01

    Our goal was to describe the biodiversity and associated landscape diversity and forest cover characteristics within the network of terrestrial protected areas in Puerto Rico. We conducted spatial analysis to quantify different indicators of diversity at these sites. We found that protected areas in Puerto Rico overlap the most species-rich regions on the island,...

  8. Supporting Military Families with Young Children throughout the Deployment Lifecycle

    Science.gov (United States)

    2017-10-01

    Traumatic Stress Studies (ISTSS) Conference. Chicago, IL. 2. Kritikos*, T.K. & DeVoe, E.R. Relationship quality of recently deployed military...prevention and family orientation of the study . We continue to have impact on multiple disciplinary areas, including social work, psychology , and public...resilience in Active Duty military families through all phases of the deployment cycle. The study will be conducted in three phases. In phase 1

  9. INTRUSION DETECTION PREVENTION SYSTEM (IDPS PADA LOCAL AREA NETWORK (LAN

    Directory of Open Access Journals (Sweden)

    Didit Suhartono

    2015-02-01

    Full Text Available Penelitian ini berjudul “Intrusion Detection Prevention System Local Area Network (LAN” yang bertujuan untuk memproteksi jaringan dari usaha- usaha penyusupan yang dilakukan oleh seorang intruder. Metode yang digunakan pada penelitian ini adalah menggunakan metode kerangka pikir sebagai acuan dari tahap- tahap penelitian yang penulis lakukan. IDS difungsikan sebagai pendeteksi adanya serangan sesuai rule yang ada kemudian pesan peringatan disimpan dalam database dan dikirim via sms kepada seorang network administrator, sedangkan Firewall digunakan sebagai packet filtering dengan cara menentukan security policy yang dinilai penting. Hasilnya adalah ketika IDS memberikanpesan peringatan ketika ada serangan, seorang network administrator dapat memblok adanya serangan tersebut dengan cara manual dengan firewall, ataupun firewall akan memblok sendiri serangan tersebut sesuai dengan security policy yang diterapkan oleh network adminisrator sebelumnya

  10. AC Electric Field Communication for Human-Area Networking

    Science.gov (United States)

    Kado, Yuichi; Shinagawa, Mitsuru

    We have proposed a human-area networking technology that uses the surface of the human body as a data transmission path and uses an AC electric field signal below the resonant frequency of the human body. This technology aims to achieve a “touch and connect” intuitive form of communication by using the electric field signal that propagates along the surface of the human body, while suppressing both the electric field radiating from the human body and mutual interference. To suppress the radiation field, the frequency of the AC signal that excites the transmitter electrode must be lowered, and the sensitivity of the receiver must be raised while reducing transmission power to its minimally required level. We describe how we are developing AC electric field communication technologies to promote the further evolution of a human-area network in support of ubiquitous services, focusing on three main characteristics, enabling-transceiver technique, application-scenario modeling, and communications quality evaluation. Special attention is paid to the relationship between electro-magnetic compatibility evaluation and regulations for extremely low-power radio stations based on Japan's Radio Law.

  11. Home Network Security

    NARCIS (Netherlands)

    Scholten, Hans; van Dijk, Hylke

    2008-01-01

    Service discovery and secure and safe service usage are essential elements in the deployment of home and personal networks. Because no system administrator is present, setup and daily operation of such a network has to be automated as much as possible with a high degree of user friendliness. To

  12. Hole Detection for Quantifying Connectivity in Wireless Sensor Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Pearl Antil

    2014-01-01

    Full Text Available Owing to random deployment, environmental factors, dynamic topology, and external attacks, emergence of holes in wireless sensor networks is inescapable. Hole is an area in sensor network around which sensors cease to sense or communicate due to drainage of battery or any fault, either temporary or permanent. Holes impair sensing and communication functions of network; thus their identification is a major concern. This paper discusses different types of holes and significance of hole detection in wireless sensor networks. Coverage hole detection schemes have been classified into three categories based on the type of information used by algorithms, computation model, and network dynamics for better understanding. Then, relative strengths and shortcomings of some of the existing coverage hole detection algorithms are discussed. The paper is concluded by highlighting various future research directions.

  13. Program For Local-Area-Network Electronic Mail

    Science.gov (United States)

    Weiner, Michael J.

    1989-01-01

    MailRoom is computer program for local-area network (LAN) electronic mail. Enables users of LAN to exchange electronically notes, letters, reminders, or any sort of communication via their computers. Links all users of LAN into communication circle in which messages created, sent, copied, printed, downloaded, uploaded, and deleted through series of menu-driven screens. Includes feature that enables users to determine whether messages sent have been read by receivers. Written in Microsoft QuickBasic.

  14. 77 FR 36903 - Accelerating Broadband Infrastructure Deployment

    Science.gov (United States)

    2012-06-20

    ... the Nation's global competitiveness in the 21st century, driving job creation, promoting innovation, and expanding markets for American businesses. Broadband access also affords public safety agencies... infrastructure has been deployed in a vast majority of communities across the country, today too many areas still...

  15. Home Area Networks and the Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    Clements, Samuel L.; Carroll, Thomas E.; Hadley, Mark D.

    2011-04-01

    With the wide array of home area network (HAN) options being presented as solutions to smart grid challenges for the home, it is time to compare and contrast their strengths and weaknesses. This white paper examines leading and emerging HAN technologies. The emergence of the smart grid is bringing more networking players into the field. The need for low consistent bandwidth usage differs enough from the traditional information technology world to open the door to new technologies. The predominant players currently consist of a blend of the old and new. Within the wired world Ethernet and HomePlug Green PHY are leading the way with an advantage to HomePlug because it doesn't require installing new wires. In the wireless the realm there are many more competitors but WiFi and ZigBee seem to have the most momentum.

  16. Main concept of local area network protection on the basis of the SAAM 'TRAFFIC'

    International Nuclear Information System (INIS)

    Vasil'ev, P.M.; Kryukov, Yu.A.; Kuptsov, S.I.; Ivanov, V.V.; Koren'kov, V.V.

    2002-01-01

    In our previous paper we developed a system for acquisition, analysis and management of the network traffic (SAAM 'Traffic') for a segment of the JINR local area computer network (JINR LAN). In our present work we consider well-known scenarios of attacks on local area networks and propose protection methods based on the SAAM 'Traffic'. Although the system for LAN protection is installed on a router computer, it is not analogous to the firewall scheme and, thus, it does not hinder the performance of distributed network applications. This provides a possibility to apply such an approach to GRID-technologies, where network protection on the firewall basis can not be basically used. (author)

  17. Rapidly Evolving Distributed Systems by Bridging the Deployment Gap

    National Research Council Canada - National Science Library

    Wolf, Alexander

    2000-01-01

    .... The University of Colorado EDCS project has been successful in achieving its objective: producing innovative, useful, and interesting research results in the areas of software configuration and deployment...

  18. Rapidly Evolving Distributed Systems by Bridging the Deployment Gap

    National Research Council Canada - National Science Library

    Wolf, Alexander

    2001-01-01

    .... The University of Colorado EDCS project has been successful in achieving its objective; producing innovative, useful and interesting research results in the areas of software configuration and deployment...

  19. The Design and Implementation of a Novel Open Source Massive Deployment System

    Directory of Open Access Journals (Sweden)

    Steven J. H. Shiau

    2018-06-01

    Full Text Available The hypervisor and container are emerging cloud computing and fog computing technologies, which enable rapid system deployment. However, both of the technologies depend on the operating system (OS and applications that are installed on the host machines. System deployment is the activity to deliver and install OSs and applications onto computers. Such deployment activities are widely required in the infrastructure of cloud computing, fog computing, high-performance computing clusters, and classrooms of computer education. Albeit the concept of system deployment is not new, traditional solutions cannot support the rapid evolution of open source file systems. Furthermore, existing solutions cannot support the massive deployment of disks in a computer as well as the massive deployment in large-scale computers. To resolve the issue, the authors proposed novel system architecture as well as software that is openly available. The experiments are undertaken by deploying a Linux system to 1 to 30 Universal Serial Bus (USB flash drives in a single machine and to 1 to 32 machines in a network using the software that is being developed in this work. The results have demonstrated the feasibility and efficiency of the proposed work. The relationships between the bus bandwidth, the writing rate of the USB flash drive, and the number of flash drives were also formulated as a govern equation. Performance evaluation and cost savings in comparing to the deployment cases adopting commercial software were also provided for demonstrating the performance enhancement and cost reduction by using the novel deployment system. In general, the proposed architecture and the developed software are highly effective from the aspects of both performance and cost.

  20. Clustering algorithm in initialization of multi-hop wireless sensor networks

    NARCIS (Netherlands)

    Guo, Peng; Tao, Jiang; Zhang, Kui; Chen, Hsiao-Hwa

    2009-01-01

    In most application scenarios of wireless sensor networks (WSN), sensor nodes are usually deployed randomly and do not have any knowledge about the network environment or even their ID's at the initial stage of their operations. In this paper, we address the clustering problems with a newly deployed

  1. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  2. Community Based Networks and 5G Wi-Fi

    DEFF Research Database (Denmark)

    Williams, Idongesit

    2018-01-01

    This paper argues on why Community Based Networks should be recognized as potential 5G providers using 5G Wi-Fi. The argument is hinged on findings in a research to understand why Community Based Networks deploy telecom and Broadband infrastructure. The study was a qualitative study carried out...... inductively using Grounded Theory. Six cases were investigated. Two Community Based Network Mobilization Models were identified. The findings indicate that 5G Wi-Fi deployment by Community Based Networks is possible if policy initiatives and the 5G Wi-Fi standards are developed to facilitate the causal...

  3. Medium access control and network layer design for 60 GHz wireless personal area networks

    NARCIS (Netherlands)

    An, X.

    2010-01-01

    The unlicensed frequency band around 60 GHz is a very promising spectrum due to its potential to provide multiple gigabits per second based data rates for short range wireless communication. Hence, 60 GHz radio is an attractive candidate to enable ultra high rate Wireless Personal Area Networks

  4. MAILROOM- A LOCAL AREA NETWORK ELECTRONIC MAIL PROGRAM

    Science.gov (United States)

    Weiner, M. J.

    1994-01-01

    The Mailroom program is a Local Area Network (LAN) electronic mail program. It allows LAN users to electronically exchange notes, letters, reminders, or any sort of communication via their computer. The Mailroom program links all LAN users into a communication circle where messages can be created, sent, copied, printed, downloaded, uploaded, and deleted through a series of menu-driven screens. Mailroom includes a feature which allows users to determine if a message they have sent has been read by the receiver. Each user must be separately installed and removed from Mailroom as they join or leave the network. Mailroom comes with a program that accomplishes this with minimum of effort on the part of the Network Administrator/Manager. There is also a program that allows the Network Administrator/Manager to install Mailroom on each user's workstation so that on execution of Mailroom the user's station may be identified and the configurations settings activated. It will create its own configuration and data/supporting files during the setup and installation process. The Mailroom program is written in Microsoft QuickBasic. It was developed to run on networked IBM XT/ATs or compatibles and requires that all participating workstations share a common drive. It has been implemented under DOS 3.2 and has a memory requirement of 71K. Mailroom was developed in 1988.

  5. WiFi networks and malware epidemiology.

    Science.gov (United States)

    Hu, Hao; Myers, Steven; Colizza, Vittoria; Vespignani, Alessandro

    2009-02-03

    In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch massive fraudulent attacks. In this article, we consider several scenarios for the deployment of malware that spreads over the wireless channel of major urban areas in the US. We develop an epidemiological model that takes into consideration prevalent security flaws on these routers. The spread of such a contagion is simulated on real-world data for georeferenced wireless routers. We uncover a major weakness of WiFi networks in that most of the simulated scenarios show tens of thousands of routers infected in as little as 2 weeks, with the majority of the infections occurring in the first 24-48 h. We indicate possible containment and prevention measures and provide computational estimates for the rate of encrypted routers that would stop the spreading of the epidemics by placing the system below the percolation threshold.

  6. WiFi networks and malware epidemiology

    Science.gov (United States)

    Hu, Hao; Myers, Steven; Colizza, Vittoria; Vespignani, Alessandro

    2009-01-01

    In densely populated urban areas WiFi routers form a tightly interconnected proximity network that can be exploited as a substrate for the spreading of malware able to launch massive fraudulent attacks. In this article, we consider several scenarios for the deployment of malware that spreads over the wireless channel of major urban areas in the US. We develop an epidemiological model that takes into consideration prevalent security flaws on these routers. The spread of such a contagion is simulated on real-world data for georeferenced wireless routers. We uncover a major weakness of WiFi networks in that most of the simulated scenarios show tens of thousands of routers infected in as little as 2 weeks, with the majority of the infections occurring in the first 24–48 h. We indicate possible containment and prevention measures and provide computational estimates for the rate of encrypted routers that would stop the spreading of the epidemics by placing the system below the percolation threshold. PMID:19171909

  7. Mastering Windows 7 Deployment

    CERN Document Server

    Finn, Aidan; van Surksum, Kenneth

    2011-01-01

    Get professional-level instruction on Windows 7 deployment tools Enterprise-level operating system deployment is challenging and requires knowledge of specific tools. It is expected that Windows 7 will be extensively deployed in businesses worldwide. This comprehensive Sybex guide provides thorough coverage of the Microsoft deployment tools that were specifically created for Windows 7, preparing system administrators, MIS professionals, and corporate programmers to tackle the task effectively.Companies worldwide are expected to deploy Windows 7 as their enterprise operating system; system admi

  8. Future Wireless Network: MyNET Platform and End-to-End Network Slicing

    OpenAIRE

    Zhang, Hang

    2016-01-01

    Future wireless networks are facing new challenges. These new challenges require new solutions and strategies of the network deployment, management, and operation. Many driving factors are decisive in the re-definition and re-design of the future wireless network architecture. In the previously published paper "5G Wireless Network - MyNET and SONAC", MyNET and SONAC, a future network architecture, are described. This paper elaborates MyNET platform with more details. The design principles of ...

  9. Introduction to wireless sensor networks

    CERN Document Server

    Forster, Anna

    2016-01-01

    Explores real-world wireless sensor network development, deployment, and applications. The book begins with an introduction to wireless sensor networks and their fundamental concepts. Hardware components, operating systems, protocols, and algorithms that make up the anatomy of a sensor node are described in chapter two. Properties of wireless communications, medium access protocols, wireless links, and link estimation protocols are described in chapter three and chapter four. Routing basics and metrics, clustering techniques, time synchronization and localization protocols, as well as sensing techniques are introduced in chapter five to nine. The concluding chapter summarizes the learnt methods and shows how to use them to deploy real-world sensor networks in a structured way.

  10. Frequency of gingival and periodontal diseases among troops deployed in operational area

    International Nuclear Information System (INIS)

    Yousaf, A.; Manzoor, M.A.; Rafi, S.

    2014-01-01

    Objective: To find the Frequency of Gingival and Periodontal Diseases among Troops Deployed in Operational Area and to evaluate the treatment needs which might be helpful in oral health policy planning and specific intervention against periodontal disease. Design: Descriptive study. Place and Duration of Study: The study was conducted at 140 mobile dental unit Swat from Dec 2009 to June 2011. Subjects and Methods: the periodontal status of 1500 personnels of Pakistan Army was examined using Basic periodontal Examination Index. Data was evaluated by SPSS version 16. Percentage of various gingival and periodontal disease traits was calculated and treatment needs determined. Results: Out of total 1500 subjects 12.8% subjects were having satisfactory periodontal health and required no treatment whereas 38.3% were having gingivitis requiring oral hygiene instruction and prophylaxis. Gingivitis modified by local factors was seen in 23.5% and required oral hygiene instruction and correction of modifying factors. Some (13.6%) were having mild periodontitis and required scaling, root planning and oral hygiene instruction whereas 11.8% were having moderate or advance periodontitis and required comprehensive periodontal treatment including surgical treatment. Conclusion: A large number of cases (82.7%) of gingivitis and periodontitis were detected in subject population which shows lack of awareness and self -consciousness among troops regarding their oral hygiene. (author)

  11. Traffic Management for Next Generation Transport Networks

    DEFF Research Database (Denmark)

    Yu, Hao

    required by the next generation transport network to provide Quality-of-Service (QoS) guaranteed video services. Augmenting network capacity and upgrading network nodes indicate long deployment period, replacement of equipment and thus significant cost to the network service providers. This challenge may...... slacken the steps of some network operators towards providing IPTV services. In this dissertation, the topology-based hierarchical scheduling scheme is proposed to tackle the problem addressed. The scheme simplifies the deployment process by placing an intelligent switch with centralized traffic...... management functions at the edge of the network, scheduling traffic on behalf of the other nodes. The topology-based hierarchical scheduling scheme is able to provide outstanding flow isolation due to its centralized scheduling ability, which is essential for providing IPTV services. In order to reduce...

  12. A Belief-Space Approach to Integrated Intelligence - Research Area 10.3: Intelligent Networks

    Science.gov (United States)

    2017-12-05

    A Belief-Space Approach to Integrated Intelligence- Research Area 10.3: Intelligent Networks The views, opinions and/or findings contained in this...Technology (MIT) Title: A Belief-Space Approach to Integrated Intelligence- Research Area 10.3: Intelligent Networks Report Term: 0-Other Email: tlp...students presented progress and received feedback from the research group . o wrote papers on their research and submitted them to leading conferences

  13. RACOON: a multiuser QoS design for mobile wireless body area networks.

    Science.gov (United States)

    Cheng, Shihheng; Huang, Chingyao; Tu, Chun Chen

    2011-10-01

    In this study, Random Contention-based Resource Allocation (RACOON) medium access control (MAC) protocol is proposed to support the quality of service (QoS) for multi-user mobile wireless body area networks (WBANs). Different from existing QoS designs that focus on a single WBAN, a multiuser WBAN QoS should further consider both inter-WBAN interference and inter-WBAN priorities. Similar problems have been studied in both overlapped wireless local area networks (WLANs) and Bluetooth piconets that need QoS supports. However, these solutions are designed for non-medical transmissions that do not consider any priority scheme for medical applications. Most importantly, these studies focus on only static or low mobility networks. Network mobility of WBANs will introduce unnecessary inter-network collisions and energy waste, which are not considered by these solutions. The proposed multiuser-QoS protocol, RACOON, simultaneously satisfies the inter WBAN QoS requirements and overcomes the performance degradation caused by WBAN mobility. Simulation results verify that RACOON provides better latency and energy control, as compared with WBAN QoS protocols without considering the inter-WBAN requirements.

  14. Availability Issues in Wireless Visual Sensor Networks

    Science.gov (United States)

    Costa, Daniel G.; Silva, Ivanovitch; Guedes, Luiz Affonso; Vasques, Francisco; Portugal, Paulo

    2014-01-01

    Wireless visual sensor networks have been considered for a large set of monitoring applications related with surveillance, tracking and multipurpose visual monitoring. When sensors are deployed over a monitored field, permanent faults may happen during the network lifetime, reducing the monitoring quality or rendering parts or the entire network unavailable. In a different way from scalar sensor networks, camera-enabled sensors collect information following a directional sensing model, which changes the notions of vicinity and redundancy. Moreover, visual source nodes may have different relevancies for the applications, according to the monitoring requirements and cameras' poses. In this paper we discuss the most relevant availability issues related to wireless visual sensor networks, addressing availability evaluation and enhancement. Such discussions are valuable when designing, deploying and managing wireless visual sensor networks, bringing significant contributions to these networks. PMID:24526301

  15. A Mobile Sensor Network System for Monitoring of Unfriendly Environments.

    Science.gov (United States)

    Song, Guangming; Zhou, Yaoxin; Ding, Fei; Song, Aiguo

    2008-11-14

    Observing microclimate changes is one of the most popular applications of wireless sensor networks. However, some target environments are often too dangerous or inaccessible to humans or large robots and there are many challenges for deploying and maintaining wireless sensor networks in those unfriendly environments. This paper presents a mobile sensor network system for solving this problem. The system architecture, the mobile node design, the basic behaviors and advanced network capabilities have been investigated respectively. A wheel-based robotic node architecture is proposed here that can add controlled mobility to wireless sensor networks. A testbed including some prototype nodes has also been created for validating the basic functions of the proposed mobile sensor network system. Motion performance tests have been done to get the positioning errors and power consumption model of the mobile nodes. Results of the autonomous deployment experiment show that the mobile nodes can be distributed evenly into the previously unknown environments. It provides powerful support for network deployment and maintenance and can ensure that the sensor network will work properly in unfriendly environments.

  16. An Optimal Online Resource Allocation Algorithm for Energy Harvesting Body Area Networks

    Directory of Open Access Journals (Sweden)

    Guangyuan Wu

    2018-01-01

    Full Text Available In Body Area Networks (BANs, how to achieve energy management to extend the lifetime of the body area networks system is one of the most critical problems. In this paper, we design a body area network system powered by renewable energy, in which the sensors carried by patient with energy harvesting module can transmit data to a personal device. We do not require any a priori knowledge of the stochastic nature of energy harvesting and energy consumption. We formulate a user utility optimization problem. We use Lyapunov Optimization techniques to decompose the problem into three sub-problems, i.e., battery management, collecting rate control and transmission power allocation. We propose an online resource allocation algorithm to achieve two major goals: (1 balancing sensors’ energy harvesting and energy consumption while stabilizing the BANs system; and (2 maximizing the user utility. Performance analysis addresses required battery capacity, bounded data queue length and optimality of the proposed algorithm. Simulation results verify the optimization of algorithm.

  17. Challenges in Second-Generation Wireless Mesh Networks

    Directory of Open Access Journals (Sweden)

    Pescapé Antonio

    2008-01-01

    Full Text Available Wireless mesh networks have the potential to provide ubiquitous high-speed Internet access at low costs. The good news is that initial deployments of WiFi meshes show the feasibility of providing ubiquitous Internet connectivity. However, their performance is far below the necessary and achievable limit. Moreover, users' subscription in the existing meshes is dismal even though the technical challenges to get connectivity are low. This paper provides an overview of the current status of mesh networks' deployment, and highlights the technical, economical, and social challenges that need to be addressed in the next years. As a proof-of-principle study, we discuss the above-mentioned challenges with reference to three real networks: (i MagNets, an operator-driven planned two-tier mesh network; (ii Berlin Freifunk network as a pure community-driven single-tier network; (iii Weimar Freifunk network, also a community-driven but two-tier network.

  18. Radio compatibility studies for medical body area network systems

    NARCIS (Netherlands)

    Chrysallos, E.

    2013-01-01

    Evolution in healthcare during the last two decades has had tremendous impact on people's lives, extending life expectancy and improving patient care. One of the reasons this happened is the introduction of Medical Body Area Network Systems (MBANSs), a technology enabling the measurement and

  19. Five Years of Designing Wireless Sensor Networks in the Doñana Biological Reserve (Spain): An Applications Approach

    Science.gov (United States)

    Larios, Diego F.; Barbancho, Julio; Sevillano, José L.; Rodríguez, Gustavo; Molina, Francisco J.; Gasull, Virginia G.; Mora-Merchan, Javier M.; León, Carlos

    2013-01-01

    Wireless Sensor Networks (WSNs) are a technology that is becoming very popular for many applications, and environmental monitoring is one of its most important application areas. This technology solves the lack of flexibility of wired sensor installations and, at the same time, reduces the deployment costs. To demonstrate the advantages of WSN technology, for the last five years we have been deploying some prototypes in the Doñana Biological Reserve, which is an important protected area in Southern Spain. These prototypes not only evaluate the technology, but also solve some of the monitoring problems that have been raised by biologists working in Doñana. This paper presents a review of the work that has been developed during these five years. Here, we demonstrate the enormous potential of using machine learning in wireless sensor networks for environmental and animal monitoring because this approach increases the amount of useful information and reduces the effort that is required by biologists in an environmental monitoring task. PMID:24025554

  20. Five years of designing wireless sensor networks in the Doñana Biological Reserve (Spain): an applications approach.

    Science.gov (United States)

    Larios, Diego F; Barbancho, Julio; Sevillano, José L; Rodríguez, Gustavo; Molina, Francisco J; Gasull, Virginia G; Mora-Merchan, Javier M; León, Carlos

    2013-09-10

    Wireless Sensor Networks (WSNs) are a technology that is becoming very popular for many applications, and environmental monitoring is one of its most important application areas. This technology solves the lack of flexibility of wired sensor installations and, at the same time, reduces the deployment costs. To demonstrate the advantages of WSN technology, for the last five years we have been deploying some prototypes in the Doñana Biological Reserve, which is an important protected area in Southern Spain. These prototypes not only evaluate the technology, but also solve some of the monitoring problems that have been raised by biologists working in Doñana. This paper presents a review of the work that has been developed during these five years. Here, we demonstrate the enormous potential of using machine learning in wireless sensor networks for environmental and animal monitoring because this approach increases the amount of useful information and reduces the effort that is required by biologists in an environmental monitoring task.

  1. Green heterogeneous small-cell networks: Toward reducing the CO2 emissions of mobile communications industry using uplink power adaptation

    KAUST Repository

    Shakir, Muhammad Zeeshan; Qaraqe, Khalid A.; Tabassum, Hina; Alouini, Mohamed-Slim; Serpedin, Erchin; Imran, Muhammad Ali

    2013-01-01

    Heterogeneous small cell networks, or Het- SNets, are considered as a standard part of future mobile networks in which multiple lowpower low-cost user deployed base stations complement the existing macrocell infrastructure. This article proposes an energy-efficient deployment of the cells where the small cell base stations are arranged around the edge of the reference macrocell, and the deployment is referred to as cell-on-edge (COE) deployment. The proposed deployment ensures an increase in the network spectral and energy efficiency by facilitating cell edge mobile users with small cells. Moreover, COE deployment guarantees reduction of the carbon footprint of mobile operations by employing adaptive uplink power control. In order to calibrate the reduction in CO2 emissions, this article quantifies the ecological and associated economical impacts of energy savings in the proposed deployment. Simulation results quantify the improvements in CO2 emissions and spectral and energy gains of the proposed COE deployment compared to macro-only networks and typical small cell deployment strategies where small cells are randomly deployed within a given macrocell. © 2013 IEEE.

  2. Green heterogeneous small-cell networks: Toward reducing the CO2 emissions of mobile communications industry using uplink power adaptation

    KAUST Repository

    Shakir, Muhammad Zeeshan

    2013-06-01

    Heterogeneous small cell networks, or Het- SNets, are considered as a standard part of future mobile networks in which multiple lowpower low-cost user deployed base stations complement the existing macrocell infrastructure. This article proposes an energy-efficient deployment of the cells where the small cell base stations are arranged around the edge of the reference macrocell, and the deployment is referred to as cell-on-edge (COE) deployment. The proposed deployment ensures an increase in the network spectral and energy efficiency by facilitating cell edge mobile users with small cells. Moreover, COE deployment guarantees reduction of the carbon footprint of mobile operations by employing adaptive uplink power control. In order to calibrate the reduction in CO2 emissions, this article quantifies the ecological and associated economical impacts of energy savings in the proposed deployment. Simulation results quantify the improvements in CO2 emissions and spectral and energy gains of the proposed COE deployment compared to macro-only networks and typical small cell deployment strategies where small cells are randomly deployed within a given macrocell. © 2013 IEEE.

  3. NEMESIS : A Multigigabit Optical Local Area Network

    OpenAIRE

    Popescu, Adrian; Akyildizapo, Ian

    1994-01-01

    A new architecture is developed for an integrated 20 Gbps fiber optic Local Area Network (LAN) that supports data rates up to 9.6 Gbps. The architecture does not follow the standard, vertically-oriented Open System Interconnection (OSI) layering approach of other LANs. Instead, a horizontally-oriented model is introduced for the communication process to open up the three fundamental bottlenecks, i.e., opto-electronic, service and processing bottlenecks, that occur in a multi-Gbps integrated c...

  4. Dynamic Sensor Networks

    National Research Council Canada - National Science Library

    Schott, Brian

    2004-01-01

    ...: Declarative Languages and Execution Environment includes topographical soldier interface and a sensor network simulation environment for algorithm development, deployment planning, and operational support. Finally, Task 3...

  5. Uplink scheduling and adjacent-channel coupling loss analysis for TD-LTE deployment.

    Science.gov (United States)

    Yeo, Woon-Young; Moon, Sung Ho; Kim, Jae-Hoon

    2014-01-01

    TD-LTE, one of the two duplexing modes in LTE, operates in unpaired spectrum and has the advantages of TDD-based technologies. It is expected that TD-LTE will be more rapidly deployed in near future and most of WiMax operators will upgrade their networks to TD-LTE gradually. Before completely upgrading to TD-LTE, WiMax may coexist with TD-LTE in an adjacent frequency band. In addition, multiple TD-LTE operators may deploy their networks in adjacent bands. When more than one TDD network operates in adjacent frequency bands, severe interference may happen due to adjacent channel interference (ACI) and unsynchronized operations. In this paper, coexistence issues between TD-LTE and other systems are analyzed and coexistence requirements are provided. This paper has three research objectives. First, frame synchronization between TD-LTE and WiMax is discussed by investigating possible combinations of TD-LTE and WiMax configurations. Second, an uplink scheduling algorithm is proposed to utilize a leakage pattern of ACI in synchronized operations. Third, minimum requirements for coexistence in unsynchronized operations are analyzed by introducing a concept of adjacent-channel coupling loss. From the analysis and simulation results, we can see that coexistence of TD-LTE with other TDD systems is feasible if the two networks are synchronized. For the unsynchronized case, some special cell-site engineering techniques may be required to reduce the ACI.

  6. Musical Imagery Involves Wernicke's Area in Bilateral and Anti-Correlated Network Interactions in Musicians.

    Science.gov (United States)

    Zhang, Yizhen; Chen, Gang; Wen, Haiguang; Lu, Kun-Han; Liu, Zhongming

    2017-12-06

    Musical imagery is the human experience of imagining music without actually hearing it. The neural basis of this mental ability is unclear, especially for musicians capable of engaging in accurate and vivid musical imagery. Here, we created a visualization of an 8-minute symphony as a silent movie and used it as real-time cue for musicians to continuously imagine the music for repeated and synchronized sessions during functional magnetic resonance imaging (fMRI). The activations and networks evoked by musical imagery were compared with those elicited by the subjects directly listening to the same music. Musical imagery and musical perception resulted in overlapping activations at the anterolateral belt and Wernicke's area, where the responses were correlated with the auditory features of the music. Whereas Wernicke's area interacted within the intrinsic auditory network during musical perception, it was involved in much more complex networks during musical imagery, showing positive correlations with the dorsal attention network and the motor-control network and negative correlations with the default-mode network. Our results highlight the important role of Wernicke's area in forming vivid musical imagery through bilateral and anti-correlated network interactions, challenging the conventional view of segregated and lateralized processing of music versus language.

  7. Dual-Beam Antenna Design for Autonomous Sensor Network Applications

    Directory of Open Access Journals (Sweden)

    Jean-Marie Floc'h

    2012-01-01

    Full Text Available This paper describes our contribution in the ANR project called CAPNET dedicated to the site security (autonomous sensor network. The network is autonomous in term of energy and it is very easy to deploy on the site (the time to deploy each node of the network is around 10 minutes. The first demonstrator was deployed in the fire base station of Brest, France with 10 nodes with a security perimeter around 1.5 km. Our contribution takes place in the field of antennas, with the development of two systems: a single-beam antenna reserved for the supervisor or the last node of the network, and a dual-beam antenna dedicated to the node in linear configuration. For the design and optimization of antennas, we use HFSS CAD software from ANSOFT. The antennas have been designed and successfully measured.

  8. Structural and effective connectivity reveals potential network-based influences on category-sensitive visual areas

    Directory of Open Access Journals (Sweden)

    Nicholas eFurl

    2015-05-01

    Full Text Available Visual category perception is thought to depend on brain areas that respond specifically when certain categories are viewed. These category-sensitive areas are often assumed to be modules (with some degree of processing autonomy and to act predominantly on feedforward visual input. This modular view can be complemented by a view that treats brain areas as elements within more complex networks and as influenced by network properties. This network-oriented viewpoint is emerging from studies using either diffusion tensor imaging to map structural connections or effective connectivity analyses to measure how their functional responses influence each other. This literature motivates several hypotheses that predict category-sensitive activity based on network properties. Large, long-range fiber bundles such as inferior fronto-occipital, arcuate and inferior longitudinal fasciculi are associated with behavioural recognition and could play crucial roles in conveying backward influences on visual cortex from anterior temporal and frontal areas. Such backward influences could support top-down functions such as visual search and emotion-based visual modulation. Within visual cortex itself, areas sensitive to different categories appear well-connected (e.g., face areas connect to object- and motion sensitive areas and their responses can be predicted by backward modulation. Evidence supporting these propositions remains incomplete and underscores the need for better integration of DTI and functional imaging.

  9. Highball: A high speed, reserved-access, wide area network

    Science.gov (United States)

    Mills, David L.; Boncelet, Charles G.; Elias, John G.; Schragger, Paul A.; Jackson, Alden W.

    1990-01-01

    A network architecture called Highball and a preliminary design for a prototype, wide-area data network designed to operate at speeds of 1 Gbps and beyond are described. It is intended for applications requiring high speed burst transmissions where some latency between requesting a transmission and granting the request can be anticipated and tolerated. Examples include real-time video and disk-disk transfers, national filestore access, remote sensing, and similar applications. The network nodes include an intelligent crossbar switch, but have no buffering capabilities; thus, data must be queued at the end nodes. There are no restrictions on the network topology, link speeds, or end-end protocols. The end system, nodes, and links can operate at any speed up to the limits imposed by the physical facilities. An overview of an initial design approach is presented and is intended as a benchmark upon which a detailed design can be developed. It describes the network architecture and proposed access protocols, as well as functional descriptions of the hardware and software components that could be used in a prototype implementation. It concludes with a discussion of additional issues to be resolved in continuing stages of this project.

  10. The role of actor-networks in the early stage mobilisation of low carbon heat networks

    International Nuclear Information System (INIS)

    Ambrose, Aimee; Eadson, Will; Pinder, James

    2016-01-01

    Low carbon heat networks (LCHNs) offer great potential for carbon and heating cost reduction. Despite these benefits, LCHNs provide for just two per cent of heat demand in the UK, when estimates suggest they have the potential to provide for around 43 per cent. These low levels of LCHN provision are in stark contrast to the Nordic nations which exemplify some of the highest quality and most extensive heat networks in the world. It is within this context that the Pioneer Cities project (the project) was launched by the UK government to help local authorities overcome barriers to the deployment of LCHNs. This paper reports the findings of an evaluation of this project, drawing on 86 interviews across five local authorities, analysed using elements of Actor Network Theory (ANT). The evaluation found that the project’s success has been limited. Participating local authorities have encountered challenges regarding marketisation, public sector retrenchment and inexperience in mobilising LCHNs. These factors militate against the formation of the robust actor-networks required to deploy LCHNs. Analysis using ANT reveals insights into why LCHNs remain elusive in the UK and suggests that policy makers need to strengthen local authorities’ ability to lead and deliver complex infrastructure projects. - Highlights: •Low carbon heat networks (LCHNs) reduce carbon emissions from heat production and reduce costs. •Yet market issues and local government cut backs undermine successful delivery of LCHNs. •Local authorites are charged by government with deploying LCHNS but are not well placed to do so. •Policy makers need to ‘prepare the ground’ for LCHN deployment through policy and incentives.

  11. Fiber optic configurations for local area networks

    Science.gov (United States)

    Nassehi, M. M.; Tobagi, F. A.; Marhic, M. E.

    1985-01-01

    A number of fiber optic configurations for a new class of demand assignment multiple-access local area networks requiring a physical ordering among stations are proposed. In such networks, the data transmission and linear-ordering functions may be distinguished and be provided by separate data and control subnetworks. The configurations proposed for the data subnetwork are based on the linear, star, and tree topologies. To provide the linear-ordering function, the control subnetwork must always have a linear unidirectional bus structure. Due to the reciprocity and excess loss of optical couplers, the number of stations that can be accommodated on a linear fiber optic bus is severely limited. Two techniques are proposed to overcome this limitation. For each of the data and control subnetwork configurations, the maximum number of stations as a function of the power margin, for both reciprocal and nonreciprocal couplers, is computed.

  12. Evaluation of Integration Degree of the ASG-EUPOS Polish Reference Networks With Ukrainian GeoTerrace Network Stations in the Border Area

    Science.gov (United States)

    Siejka, Zbigniew

    2017-09-01

    GNSS systems are currently the basic tools for determination of the highest precision station coordinates (e.g. basic control network stations or stations used in the networks for geodynamic studies) as well as for land, maritime and air navigation. All of these tasks are carried out using active, large scale, satellite geodetic networks which are complex, intelligent teleinformatic systems offering post processing services along with corrections delivered in real-time for kinematic measurements. Many countries in the world, also in Europe, have built their own multifunctional networks and enhance them with their own GNSS augmentation systems. Nowadays however, in the era of international integration, there is a necessity to consider collective actions in order to build a unified system, covering e.g. the whole Europe or at least some of its regions. Such actions have already been undertaken in many regions of the world. In Europe such an example is the development for EUPOS which consists of active national networks built in central eastern European countries. So far experience and research show, that the critical areas for connecting these networks are border areas, in which the positioning accuracy decreases (Krzeszowski and Bosy, 2011). This study attempts to evaluate the border area compatibility of Polish ASG-EUPOS (European Position Determination System) reference stations and Ukrainian GeoTerrace system reference stations in the context of their future incorporation into the EUPOS. The two networks analyzed in work feature similar hardware parameters. In the ASG-EUPOS reference stations network, during the analyzed period, 2 stations (WLDW and CHEL) used only one system (GPS), while, in the GeoTerrace network, all the stations were equipped with both GPS and GLONASS receivers. The ASG EUPOS reference station network (95.6%) has its average completeness greater by about 6% when compared to the GeoTerrace network (89.8%).

  13. Towards Effective Intra-flow Network Coding in Software Defined Wireless Mesh Networks

    OpenAIRE

    Donghai Zhu; Xinyu Yang Yang; Peng Zhao; Wei Yu

    2016-01-01

    Wireless Mesh Networks (WMNs) have potential to provide convenient broadband wireless Internet access to mobile users.With the support of Software-Defined Networking (SDN) paradigm that separates control plane and data plane, WMNs can be easily deployed and managed. In addition, by exploiting the broadcast nature of the wireless medium and the spatial diversity of multi-hop wireless networks, intra-flow network coding has shown a greater benefit in comparison with traditional routing paradigm...

  14. A Performance Evaluation Model for Mobile Ad Hoc Networks and Sensor Networks

    Directory of Open Access Journals (Sweden)

    Heng LUO

    2014-03-01

    Full Text Available Potential applications in areas such as military sites and disaster relief fields that are characterized by absence of prefixed infrastructure justify the development of mobile ad hoc networks (MANETs and wireless sensor networks (WSNs. However, unfavorable wireless links and dynamic topology are still challenging, leading to the proposal of a collection of routing protocols for MANETs and WSNs. Nevertheless the performance of algorithms may vary with deployment scenario due to the application dependent philosophy behind algorithms. In this paper, the performance evaluation problem for MANETs and WSNs is investigated and a novel performance ranking model, termed AHP-SAW, is proposed. For simplicity but without loss of generality, the performance of two routing protocols DSDV and DSR are studies based on which ranking results are provided. Extensive simulations show that an overall 37.2 %, at most, gain may be achieved based on the AHP-SAW model.

  15. Analysis of Heterogeneous Networks with Dual Connectivity in a Realistic Urban Deployment

    DEFF Research Database (Denmark)

    Gerardino, Guillermo Andrés Pocovi; Barcos, Sonia; Wang, Hua

    2015-01-01

    the performance in this realistic layout. Due to the uneven load distribution observed in realistic deployments, DC is able to provide fast load balancing gains also at relatively high load - and not only at low load as typically observed in 3GPP scenarios. For the same reason, the proposed cell selection...

  16. Bird-plant interaction networks: a study on frugivory in Brazilian urban areas

    Directory of Open Access Journals (Sweden)

    Diego Silva Freitas Oliveira

    2015-12-01

    Full Text Available In Brazil, few studies compare the consumption of native and exotic fruits, especially in an urban environment. The Network Theory may be useful in such studies, because it allows evaluating many bird and plant species involved in interactions. The goals of this study were: evaluate a bird frugivory interaction network in an urban environment; checking the role played by native and exotic plants in the network and comparing the consumer assemblies of these two plant groups. A literature review on bird frugivory in Brazilian urban areas was conducted, as well as an analysis to create an interaction network on a regional scale. The analysis included 15 papers with 70 bird species eating fruits from 15 plant species (6 exotic and 9 native. The exotic and native fruit consumers did not form different groups and the interaction network was significantly nested (NODF = 0.30; p < 0.01 and not modular (M = 0.36; p = 0.16. Two exotic plant species are in the generalist core of the frugivory network (Ficus microcarpa and Michelia champaca. The results point out that a relatively diversified bird group eats fruits in Brazilian urban areas in an opportunistic way, with no preference for native or exotic plants.

  17. Heterogeneous cellular networks

    CERN Document Server

    Hu, Rose Qingyang

    2013-01-01

    A timely publication providing coverage of radio resource management, mobility management and standardization in heterogeneous cellular networks The topic of heterogeneous cellular networks has gained momentum in industry and the research community, attracting the attention of standardization bodies such as 3GPP LTE and IEEE 802.16j, whose objectives are looking into increasing the capacity and coverage of the cellular networks. This book focuses on recent progresses,  covering the related topics including scenarios of heterogeneous network deployment, interference management i

  18. Technical Survey on Applications of Wireless Sensor Networks in Nuclear Power Plants

    International Nuclear Information System (INIS)

    Jiang, Jin; Bari, Ataul; Chen, Dongyi; Hashemian, Hash M.

    2014-01-01

    Even though there is no general consensus on using wireless technologies in nuclear power plants, potential applications of wireless sensor networks within nuclear power plants (NPPs) has been investigated. The topics of interests include potential interaction of wireless sensor networks with the sensitive protection equipment, radiation damage of the electronics on board sensor nodes, optimal placement of relay nodes that collect and forward data in the network, and possible applications, such as radiation dose and level monitoring, and equipment condition monitoring. Several wireless sensor networks have been deployed on site of NPPs on a trial basis to perform these tasks. Different aspects of deployment of such wireless sensor networks in NPPs have also been examined. Industrial standards or guidelines for deployment of WSNs in NPPs are also been considered. This paper examines the state of the art of wireless sensor networks in NPPs

  19. Technical Survey on Applications of Wireless Sensor Networks in Nuclear Power Plants

    Energy Technology Data Exchange (ETDEWEB)

    Jiang, Jin; Bari, Ataul [University of Western Ontario, Ontario (Canada); Chen, Dongyi [University of Electronic Science and Technology of China, Chengdu (China); Hashemian, Hash M. [AMS Technology Center, Knoxville (United States)

    2014-08-15

    Even though there is no general consensus on using wireless technologies in nuclear power plants, potential applications of wireless sensor networks within nuclear power plants (NPPs) has been investigated. The topics of interests include potential interaction of wireless sensor networks with the sensitive protection equipment, radiation damage of the electronics on board sensor nodes, optimal placement of relay nodes that collect and forward data in the network, and possible applications, such as radiation dose and level monitoring, and equipment condition monitoring. Several wireless sensor networks have been deployed on site of NPPs on a trial basis to perform these tasks. Different aspects of deployment of such wireless sensor networks in NPPs have also been examined. Industrial standards or guidelines for deployment of WSNs in NPPs are also been considered. This paper examines the state of the art of wireless sensor networks in NPPs.

  20. Networks in Buildings: Which Path Forward?

    Energy Technology Data Exchange (ETDEWEB)

    Nordman, Bruce

    2008-08-17

    To date, digital networks have principally been installed for connecting information technology devices, with more modest use in consumer electronics, security, and large building control systems. The next 20 years will see much greater deployment of networks in buildings of all types, and across all end uses. Most of these are likely to be introduced primarily for reasons other than energy efficiency, and add energy use for network interfaces and network products. Widespread networking could easily lead to increased energy use, and experience with IT and CE networks suggests this may be likely. Active engagement by energy efficiency professionals in the architecture and design of future networks could lead to their being a large and highly cost-effective tool for efficiency. However, network standards are complex and take many years to develop and negotiate so that lack of action on this in the near term may foreclose important opportunities for years or decades to come. Digital networks need to be common globally, providing another challenge to building systems and elements that are more commonly designed only for national or regional markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some examples of past network designs and use and the lessons they hold for future building networks. It also highlights key needed areas for research, policy, and standards development.

  1. A Movement-Assisted Deployment of Collaborating Autonomous Sensors for Indoor and Outdoor Environment Monitoring.

    Science.gov (United States)

    Niewiadomska-Szynkiewicz, Ewa; Sikora, Andrzej; Marks, Michał

    2016-09-14

    Using mobile robots or unmanned vehicles to assist optimal wireless sensors deployment in a working space can significantly enhance the capability to investigate unknown environments. This paper addresses the issues of the application of numerical optimization and computer simulation techniques to on-line calculation of a wireless sensor network topology for monitoring and tracking purposes. We focus on the design of a self-organizing and collaborative mobile network that enables a continuous data transmission to the data sink (base station) and automatically adapts its behavior to changes in the environment to achieve a common goal. The pre-defined and self-configuring approaches to the mobile-based deployment of sensors are compared and discussed. A family of novel algorithms for the optimal placement of mobile wireless devices for permanent monitoring of indoor and outdoor dynamic environments is described. They employ a network connectivity-maintaining mobility model utilizing the concept of the virtual potential function for calculating the motion trajectories of platforms carrying sensors. Their quality and utility have been justified through simulation experiments and are discussed in the final part of the paper.

  2. Deployment of a Grid-based Medical Imaging Application

    CERN Document Server

    Amendolia, S R; Frate, C; Gálvez, J; Hassan, W; Hauer, T; Manset, D; McClatchey, R; Odeh, M; Rogulin, D; Solomonides, T; Warren, R

    2005-01-01

    The MammoGrid project has deployed its Service-Oriented Architecture (SOA)-based Grid application in a real environment comprising actual participating hospitals. The resultant setup is currently being exploited to conduct rigorous in-house tests in the first phase before handing over the setup to the actual clinicians to get their feedback. This paper elaborates the deployment details and the experiences acquired during this phase of the project. Finally the strategy regarding migration to an upcoming middleware from EGEE project will be described. This paper concludes by highlighting some of the potential areas of future work.

  3. Wheeling and Banking Strategies for Optimal Renewable Energy Deployment. International Experiences

    Energy Technology Data Exchange (ETDEWEB)

    Heeter, Jenny [National Renewable Energy Lab. (NREL), Golden, CO (United States); Vora, Ravi [National Renewable Energy Lab. (NREL), Golden, CO (United States); Mathur, Shivani [National Renewable Energy Lab. (NREL), Golden, CO (United States); Madrigal, Paola [Energy Regulatory Commission (Mexico); Chatterjee, Sushanta K. [Central Electricity Regulatory Commission (India); Shah, Rakesh [SunEdison, Mumbai (India)

    2016-03-01

    This paper defines the principles of wheeling (i.e., transmission) tariffs and renewable energy (RE) banking provisions and their role in RE deployment in countries with plans for large-scale RE. It reviews experiences to date in the United States, Mexico, and India and discusses key policy and regulatory considerations for devising more effective wheeling and/or banking provisions for countries with ambitious RE deployment targets. The paper addresses the challenges of competing needs of stakeholders, especially those of RE generators, distribution utilities, and transmission network owners and operators. The importance of wheeling and banking and their effectiveness for financial viability of RE deployment is also explored. This paper aims to benefit policymakers and regulators as well as key renewable energy stakeholders. Key lessons for regulators include: creating long-term wheeling and banking policy certainty, considering incentivizing RE through discounted transmission access, and assessing the cost implications of such discounts, as well as expanding access to renewable energy customers.

  4. Group Authentication Scheme for Neighbourhood Area Networks (NANs in Smart Grids

    Directory of Open Access Journals (Sweden)

    Bashar Alohali

    2016-05-01

    Full Text Available A Neighbourhood Area Network is a functional component of the Smart Grid that interconnects the end user domain with the Energy Services Provider (ESP domain. It forms the “edge” of the provider network, interconnecting homes instrumented with Smart Meters (SM with the ESP. The SM is a dual interface, wireless communication device through which information is transacted across the user (a home and ESP domains. The security risk to the ESP increases since the components within the home, interconnected to the ESP via the SM, are not managed by the ESP. Secure operation of the SM is a necessary requirement. The SM should be resilient to attacks, which might be targeted either directly or via the network in the home. This paper presents and discusses a security scheme for groups of SMs in a Neighbourhood Area Network that enable entire groups to authenticate themselves, rather than one at a time. The results show that a significant improvement in terms of resilience against node capture attacks, replay attacks, confidentiality, authentication for groups of SMs in a NAN that enable entire groups to authenticate themselves, rather than one at a time.

  5. Shared "core" areas between the pain and other task-related networks.

    Directory of Open Access Journals (Sweden)

    Franco Cauda

    Full Text Available The idea of a 'pain matrix' specifically devoted to the processing of nociceptive inputs has been challenged. Alternative views now propose that the activity of the primary and secondary somatosensory cortices (SI, SII, the insula and cingulate cortex may be related to a basic defensive system through which significant potentially dangerous events for the body's integrity are detected. By reviewing the role of the SI, SII, the cingulate and the insular cortices in the perception of nociceptive and tactile stimuli, in attentional, emotional and reward tasks, and in interoception and memory, we found that all these task-related networks overlap in the dorsal anterior cingulate cortex, the anterior insula and the dorsal medial thalamus. A thorough analysis revealed that the 'pain-related' network shares important functional similarities with both somatomotor-somatosensory networks and emotional-interoceptive ones. We suggest that these shared areas constitute the central part of an adaptive control system involved in the processing and integration of salient information coming both from external and internal sources. These areas are activated in almost all fMRI tasks and have been indicated to play a pivotal role in switching between externally directed and internally directed brain networks.

  6. Stochastic Characterization of Communication Network Latency for Wide Area Grid Control Applications.

    Energy Technology Data Exchange (ETDEWEB)

    Ameme, Dan Selorm Kwami [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Guttromson, Ross [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-10-01

    This report characterizes communications network latency under various network topologies and qualities of service (QoS). The characterizations are probabilistic in nature, allowing deeper analysis of stability for Internet Protocol (IP) based feedback control systems used in grid applications. The work involves the use of Raspberry Pi computers as a proxy for a controlled resource, and an ns-3 network simulator on a Linux server to create an experimental platform (testbed) that can be used to model wide-area grid control network communications in smart grid. Modbus protocol is used for information transport, and Routing Information Protocol is used for dynamic route selection within the simulated network.

  7. A key design to prolong lifetime of wireless sensor network

    International Nuclear Information System (INIS)

    Qiu, Bo; Chen, XiQiu; Wu, Qi

    2016-01-01

    In order to solve the contradiction between the connectivity of the wireless sensor network and the key storage consumption, under the premise of reducing network storage consumption, the key pre-distribution management scheme with higher connectivity rate is proposed using the hexagonal network deployment information, which adopts the idea of the matrix space for the square deployment information strategy to reduce the burden of the network storage. Ability against the capture attack is improved obviously. The results show that contradiction between the network connectivity rate and the energy consumption has a better solution, and the proposed algorithm is suitable for the wireless sensor networks of energy limited.

  8. The Seismic Broad Band Western Mediterranean (wm) Network and the Obs Fomar Pool: Current state and Obs activities.

    Science.gov (United States)

    Pazos, Antonio; Davila, Jose Martin; Buforn, Elisa; Bezzeghoud, Mourad; Harnafi, Mimoun; Mattesini, Mauricio; Caldeira, Bento; Hanka, Winfried; El Moudnib, Lahcen; Strollo, Angelo; Roca, Antoni; Lopez de Mesa, Mireya; Dahm, Torsten; Cabieces, Roberto

    2016-04-01

    The Western Mediterranean (WM) seismic network started in 1996 as an initiative of the Royal Spanish Navy Observatory (ROA) and the Universidad Complutense de Madrid (UCM), with the collaboration of the GeoForschungsZentrum (GFZ) of Potsdam. A first broad band seismic station (SFUC) was installed close to Cádiz (South Spain). Since then, additional stations have been installed in the Ibero-Moghrebian region. In 2005, the "WM" code was assigned by the FDSN and new partners were jointed: Evora University (UEVO, Portugal), the Scientifique Institute of Rabat (ISRABAT, Morocco), and GFZ. Now days, the WM network is composed by 15 BB stations, all of them with Streckaisen STS-2 or STS-2.5 sensors, Quanterra or Earthdata digitizers and SeiscomP. Most them have co-installed a permanent geodetic GPS stations, and some them also have an accelerometer. There are 10 stations deployed in Spanish territory (5 in the Iberian peninsula, 1 in Balearic islands and 4 in North Africa Spanish places) with VSAT or Internet communications, 2 in Portugal (one of them without real time), and 3 in Morocco (2 VSAT and 1 ADSL). Additionally, 2 more stations (one in South Spain and one in Morocco) will be installed along this year. Additionally ROA has deployed a permanent real time VBB (CMG-3T: 360s) station at the Alboran Island. Due to the fact that part of the seismic activity is located at marine areas, and also because of the poor geographic azimuthal coverage at some zones provided by the land stations (specially in the SW of the San Vicente Cape area), ROA and UCM have acquired six broad band "LOBSTERN" OBS, manufactured by KUM (Kiel, Germany), conforming the OBS FOMAR pool. Three of them with CMG-40T sensor and the other with Trillium 120. These OBS were deployed along the Gibraltar strait since January to November 2014 to study the microseismicity in the Gibraltar strait area. In September 2015 FOMAR network has been deployed in SW of the San Vicente Cape for 8 months as a part of

  9. Network performance of a wireless sensor network for temperature monitoring in vineyards

    DEFF Research Database (Denmark)

    Liscano, Ramiro; Jacoub, John Khalil; Dersingh, Anand

    2011-01-01

    Wireless sensor networks (WSNs) are an emerging technology which can be used for outdoor environmental monitoring. This paper presents challenges that arose from the development and deployment of a WSN for environmental monitoring as well as network performance analysis of this network. Different...... components in our sensor network architecture are presented like the physical nodes, the sensor node code, and two messaging protocols; one for collecting sensor and network values and the other for sensor node commands. An information model for sensor nodes to support plug-and-play capabilities in sensor...... networks is also presented....

  10. Achievable capacity design for irregular and clustered high performance mesh networks

    CSIR Research Space (South Africa)

    Olwal, TO

    2012-11-01

    Full Text Available interference, it is assumed that no any two HPNs are placed within a radius less than 400 m at the edge and less than 700 m toward the centre of the deployment area. However, between any two HPNs the largest separation distance is allowed as much possible... q mc p bit-meters/sec when cm = O(n). Proof : Let us consider that in irregular and static networks, the node den- sity varies over space (i.e., an area) but stays constant over time. Suppose the regularity rate (probability) of HPN...

  11. Asynchronous transfer mode and Local Area Network emulation standards, protocols, and security implications

    OpenAIRE

    Kirwin, John P.

    1999-01-01

    A complex networking technology called Asynchronous Transfer Mode (ATM) and a networking protocol called Local Area Network Emulation (LANE) are being integrated into many naval networks without any security-driven naval configuration guidelines. No single publication is available that describes security issues of data delivery and signaling relating to the transition of Ethernet to LANE and ATM. The thesis' focus is to provide: (1) an overview and security analysis of standardized protocols ...

  12. Letting the managers manage: analyzing capacity to conserve biodiversity in a cross-border protected area network

    Directory of Open Access Journals (Sweden)

    Sarah Clement

    2016-09-01

    Full Text Available Biodiversity loss is one of the most significant drivers of ecosystem change and is projected to continue at a rapid rate. While protected areas, such as national parks, are seen as important refuges for biodiversity, their effectiveness in stemming biodiversity decline has been questioned. Public agencies have a critical role in the governance of many such areas, but there are tensions between the need for these agencies to be more "adaptive" and their current operating environment. Our aim is to analyze how institutions enable or constrain capacity to conserve biodiversity in a globally significant cross-border network of protected areas, the Australian Alps. Using a novel conceptual framework for diagnosing biodiversity institutions, our research examined institutional adaptive capacity and more general capacity for conserving biodiversity. Several intertwined issues limit public agencies' capacity to fulfill their conservation responsibilities. Narrowly defined accountability measures constrain adaptive capacity and divert attention away from addressing key biodiversity outcomes. Implications for learning were also evident, with protected area agencies demonstrating successful learning for on-ground issues but less success in applying this learning to deeper policy change. Poor capacity to buffer political and community influences in managing significant cross-border drivers of biodiversity decline signals poor fit with the institutional context and has implications for functional fit. While cooperative federalism provides potential benefits for buffering through diversity, it also means protected area agencies have restricted authority to address cross-border threats. Restrictions on staff authority and discretion, as public servants, have further implications for deploying capacity. This analysis, particularly the possibility of fostering "ambidexterity" - creatively responding to political pressures in a way that also achieves a desirable

  13. Application of local area networks to accelerator control systems at the Stanford Linear Accelerator

    International Nuclear Information System (INIS)

    Fox, J.D.; Linstadt, E.; Melen, R.

    1983-03-01

    The history and current status of SLAC's SDLC networks for distributed accelerator control systems are discussed. These local area networks have been used for instrumentation and control of the linear accelerator. Network topologies, protocols, physical links, and logical interconnections are discussed for specific applications in distributed data acquisition and control system, computer networks and accelerator operations

  14. Industrial Wireless Sensors: A User's Perspective on the Impact of Standards on Wide-spread Deployment

    Energy Technology Data Exchange (ETDEWEB)

    Taft, Cyrus W. [Taft Engineering, Inc.; Manges, Wayne W [ORNL; Sorge, John N [Southern Company Services, Inc.

    2012-01-01

    The role of wireless sensing technologies in industrial instrumentation will undoubtedly become more important in the years ahead. . Deployment of such instrumentation in an industrial setting with its heightened security and robustness criteria hinges on user acceptance of verified performance as well as meeting cost requirements. Today, industrial users face many choices when specifying a wireless sensor network, including radio performance, battery life, interoperability, security, and standards compliance. The potential market for industrial wireless sensors is literally millions of wireless instruments and it is imperative that accurate information for applying the technology to real-world applications be available to the end-user so that they can make informed deployment decisions. The majority of industrial wireless automation designs now being deployed or being considered for deployment are based on three different standards . The HART Communications Foundation s WirelessHART (IEC 62591), the International Society of Automation s ISA100.11a, and the offering from the Industrial Wireless Alliance of China known as WIA-PA (IEC 62601). Aside from these industrial automation standards, users must also be cognizant of the underlying wireless network standards IEEE 802.11, IEEE 802.15.4, and IEEE 802.15.3a and their interactions with the three principal industrial automation protocols mentioned previously. The crucial questions being asked by end users revolve around sensor network performance, interoperability, reliability, and security. This paper will discuss potential wireless sensor applications in power plants, barriers to the acceptance of wireless technology, concerns related to standards, and provide an end user prospective on the issues affecting wide-spread deployment of wireless sensors. Finally, the authors conclude with a discussion of a recommended path forward including how standards organizations can better facilitate end user decision making and

  15. Pre-deployment dissociation and personality as risk factors for post-deployment post-traumatic stress disorder in Danish soldiers deployed to Afghanistan

    DEFF Research Database (Denmark)

    Ponce de León, Beatriz; Andersen, Søren; Karstoft, Karen Inge

    2018-01-01

    Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre-deployme......Objective: This study investigated whether pre-deployment dissociation was associated with previously identified post-traumatic stress disorder (PTSD) symptom trajectories from before to 2.5 years after military deployment. Furthermore, it examined whether the tendency to dissociate, pre...

  16. Resistance Genes in Global Crop Breeding Networks.

    Science.gov (United States)

    Garrett, K A; Andersen, K F; Asche, F; Bowden, R L; Forbes, G A; Kulakow, P A; Zhou, B

    2017-10-01

    Resistance genes are a major tool for managing crop diseases. The networks of crop breeders who exchange resistance genes and deploy them in varieties help to determine the global landscape of resistance and epidemics, an important system for maintaining food security. These networks function as a complex adaptive system, with associated strengths and vulnerabilities, and implications for policies to support resistance gene deployment strategies. Extensions of epidemic network analysis can be used to evaluate the multilayer agricultural networks that support and influence crop breeding networks. Here, we evaluate the general structure of crop breeding networks for cassava, potato, rice, and wheat. All four are clustered due to phytosanitary and intellectual property regulations, and linked through CGIAR hubs. Cassava networks primarily include public breeding groups, whereas others are more mixed. These systems must adapt to global change in climate and land use, the emergence of new diseases, and disruptive breeding technologies. Research priorities to support policy include how best to maintain both diversity and redundancy in the roles played by individual crop breeding groups (public versus private and global versus local), and how best to manage connectivity to optimize resistance gene deployment while avoiding risks to the useful life of resistance genes. [Formula: see text] Copyright © 2017 The Author(s). This is an open access article distributed under the CC BY 4.0 International license .

  17. A conservation planning approach to mitigate the impacts of leakage from protected area networks.

    Science.gov (United States)

    Bode, Michael; Tulloch, Ayesha I T; Mills, Morena; Venter, Oscar; Ando, Amy W

    2015-06-01

    Protected area networks are designed to restrict anthropogenic pressures in areas of high biodiversity. Resource users respond by seeking to replace some or all of the lost resources from locations elsewhere in the landscape. Protected area networks thereby perturb the pattern of human pressures by displacing extractive effort from within protected areas into the broader landscape, a process known as leakage. The negative effects of leakage on conservation outcomes have been empirically documented and modeled using homogeneous descriptions of conservation landscapes. Human resource use and biodiversity vary greatly in space, however, and a theory of leakage must describe how this heterogeneity affects the magnitude, pattern, and biodiversity impacts of leakage. We combined models of household utility, adaptive human foraging, and biodiversity conservation to provide a bioeconomic model of leakage that accounts for spatial heterogeneity. Leakage had strong and divergent impacts on the performance of protected area networks, undermining biodiversity benefits but mitigating the negative impacts on local resource users. When leakage was present, our model showed that poorly designed protected area networks resulted in a substantial net loss of biodiversity. However, the effects of leakage can be mitigated if they are incorporated ex-ante into the conservation planning process. If protected areas are coupled with nonreserve policy instruments such as market subsidies, our model shows that the trade-offs between biodiversity and human well-being can be further and more directly reduced. © 2014 Society for Conservation Biology.

  18. A Fault Tolerance Mechanism for On-Road Sensor Networks

    Directory of Open Access Journals (Sweden)

    Lei Feng

    2016-12-01

    Full Text Available On-Road Sensor Networks (ORSNs play an important role in capturing traffic flow data for predicting short-term traffic patterns, driving assistance and self-driving vehicles. However, this kind of network is prone to large-scale communication failure if a few sensors physically fail. In this paper, to ensure that the network works normally, an effective fault-tolerance mechanism for ORSNs which mainly consists of backup on-road sensor deployment, redundant cluster head deployment and an adaptive failure detection and recovery method is proposed. Firstly, based on the N − x principle and the sensors’ failure rate, this paper formulates the backup sensor deployment problem in the form of a two-objective optimization, which explains the trade-off between the cost and fault resumption. In consideration of improving the network resilience further, this paper introduces a redundant cluster head deployment model according to the coverage constraint. Then a common solving method combining integer-continuing and sequential quadratic programming is explored to determine the optimal location of these two deployment problems. Moreover, an Adaptive Detection and Resume (ADR protocol is deigned to recover the system communication through route and cluster adjustment if there is a backup on-road sensor mismatch. The final experiments show that our proposed mechanism can achieve an average 90% recovery rate and reduce the average number of failed sensors at most by 35.7%.

  19. Multi-operator collaboration for green cellular networks under roaming price consideration

    KAUST Repository

    Ghazzai, Hakim; Yaacoub, Elias E.; Alouini, Mohamed-Slim

    2014-01-01

    This paper investigates the collaboration between multiple mobile operators to optimize the energy efficiency of cellular networks. Our framework studies the case of LTE-Advanced networks deployed in the same area and owning renewable energy generators. The objective is to reduce the CO2 emissions of cellular networks via collaborative techniques and using base station sleeping strategy while respecting the network quality of service. Low complexity and practical algorithm is employed to achieve green goals during low traffic periods. Cooperation decision criteria are also established basing on derived roaming prices and profit gains of competitive mobile operators. Our numerical results show a significant save in terms of CO2 compared to the non-collaboration case and that cooperative mobile operator exploiting renewables are more awarded than traditional operators.

  20. Multi-operator collaboration for green cellular networks under roaming price consideration

    KAUST Repository

    Ghazzai, Hakim

    2014-09-01

    This paper investigates the collaboration between multiple mobile operators to optimize the energy efficiency of cellular networks. Our framework studies the case of LTE-Advanced networks deployed in the same area and owning renewable energy generators. The objective is to reduce the CO2 emissions of cellular networks via collaborative techniques and using base station sleeping strategy while respecting the network quality of service. Low complexity and practical algorithm is employed to achieve green goals during low traffic periods. Cooperation decision criteria are also established basing on derived roaming prices and profit gains of competitive mobile operators. Our numerical results show a significant save in terms of CO2 compared to the non-collaboration case and that cooperative mobile operator exploiting renewables are more awarded than traditional operators.