Current Issue : April - June Volume : 2016 Issue Number : 2 Articles : 4 Articles
The high increase of bandwidth-intensive applications like high definition video streaming in home and small office environments\nleads to QoS challenges in hybrid wired/wireless local area networks. These networks are often not QoS aware and may contain\nbottlenecks in their topology. In addition, they often have a hybrid nature due to the used access technology consisting of, for\nexample, Ethernet, wireless, and PowerLAN links. In this paper, we present the research work on a novel autonomous system for\nhybrid QoS in local area networks, called QoSiLAN, which does not rely on network infrastructure support but on host cooperation\nand works independently of the access technology. We present a new QoS Signalling Protocol, policing and admission control\nalgorithms, and a new lightweight statistical bandwidth prediction algorithm for autonomous resource management in LANs.\nThis new QoS framework enables link based, access-medium independent bandwidth management without network support.We\nprovide evaluation results for the novel bandwidth prediction algorithm as well as for the QoSiLAN framework and its protocol,\nwhich highlight the features, robustness, and the effectiveness of the proposed system....
Small power plants and buildings with renewable power generation capability have recently been added to traditional central power\nplants. Through these facilities, prosumers appear to have a concurrent role in both energy production and consumption. Based\non bidirectional power transfers by large numbers of prosumers, a smart microgrid has become an important factor in efficiently\ncontrolling the microgrids used in power markets and in conducting effective power trades among grids. In this paper, we present\nan approach utilizing the game theory for effective and efficient energy routing, which is a novel and challenging procedure for\na smart microgrid network. First, we propose strategies for choosing the desired transaction price for both electricity surpluses\nand shortages to maximize profits through energy transactions. An optimization scheme is utilized to search for an energy route\nwith minimum cost using the solving method used in a traditional transportation problem by treating the sale and purchase\nquantities as transportation supply and demand, respectively. To evaluate the effect of the proposed decision strategies,we simulated\nour mechanism, and the results proved that our mechanism yields results pursued by each strategy. Our proposed strategies will\ncontribute to spreading a smart microgrid for enhancing the utilization of microgrids....
In this work, the modeling and stability problem for a communication network system is addressed.\nThe communication network system consists of a transmitter which sends messages to a\nreceiver. The proposed model considers two possibilities. The first one, that messages are successfully\nreceived, while in the second one, during the sending process the transmitter breaks\ndown and as a result the message does not reach the receiver. Timed Petrinets is the mathematical\nand graphical modeling technique utilized. Lyapunov stability theory provides the required tools\nneeded to aboard the stability problem. Employing Lyapunov methods, a sufficient condition for\nstabilization is obtained. It is shown that it is possible to restrict the communication network system\nstate space in such a way that boundedness is guaranteed. However, this restriction results to\nbe vague. This inconvenience is overcome by considering a specific recurrence equation, in the\nmax-plus algebra, which is assigned to the timed Petri net graphical model....
Computation is spanning from PC to Mobile devices. The Mobile Ad hoc Networks (MANETs) are\noptimal choice to accommodate this growing trend but there is a problem, security is the core issue.\nMANETs rely on wireless links for communication. Wireless networks are considered more\nexposed to security attacks as compared to wired networks, especially; MANETs are the soft target\ndue to vulnerable in nature. Lack of infrastructure, open peer to peer connectivity, shared wireless\nmedium, dynamic topology and scalability are the key characteristics of MANETs which make\nthem ideal for security attacks. In this paper, we shall discuss in detail, what does security mean,\nwhy MANETs are more susceptible to security attacks than wired networks, taxonomy of network\nattacks and layer wise analysis of network attacks. Finally, we shall propose solutions to meet the\nsecurity challenges, according to our framed security criteria....
Loading....