Noise-assisted concurrent multipath traffic distribution in ad hoc networks.

ScientificWorldJournal

Graduate School of Information Science and Technology, Osaka University, 1-5 Yamadaoka, Suita, Osaka 565-0871, Japan.

Published: June 2014

The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3844172PMC
http://dx.doi.org/10.1155/2013/543718DOI Listing

Publication Analysis

Top Keywords

concurrent multipath
8
multipath traffic
8
traffic distribution
8
hoc networks
8
attractor perturbation
8
average end-to-end
8
end-to-end delay
8
noise-assisted concurrent
4
distribution hoc
4
networks concept
4

Similar Publications

Decoding of polar-coded OFDM systems over multipath fading channels with interleaving and channel state information.

Sci Rep

December 2024

Central South University of Forestry and Technology, Electronic Information and Physics College, Tianxin Area, Changsha City, Hunan Province, 410004, China.

In this paper, we investigate the decoding performance and corresponding decoding strategies for polar-coded orthogonal frequency division multiplexing (OFDM) system operating under multipath fading channels. Multipath fading channels lead to frequency selective fading of the OFDM signal, resulting in varying levels of noise interference across different subcarriers after equalization. Furthermore, frequency selective fading induces burst errors in the equalized information, thereby significantly degrading the decoding performance.

View Article and Find Full Text PDF

LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network.

Entropy (Basel)

June 2023

Department of Next-Generation Mobile Communication and Cyber Space Security, Information Engineering University, Zhengzhou 450001, China.

The increasing demand for end-to-end low-latency and high-reliability transmissions between edge computing nodes and user elements in 5G Advance edge networks has brought new challenges to the transmission of data. In response, this paper proposes LERMS, a packet-level encoding transmission scheme designed for untrusted 5GA edge networks that may encounter malicious transmission situations such as data tampering, discarding, and eavesdropping. LERMS achieves resiliency against such attacks by using 5GA Protocol data unit (PDU) coded Concurrent Multipath Transfer (CMT) based on Lagrangian interpolation and Raptor's two-layer coding, which provides redundancy to eliminate the impact of an attacker's malicious behavior.

View Article and Find Full Text PDF

At present, in robot technology, remote control of robot is realized by wireless communication technology, and data anti-interference in wireless channel becomes a very important part. Any wireless communication system has an inherent multi-path propagation problem, which leads to the expansion of generated symbols on a time scale, resulting in symbol overlap and Inter-symbol Interference (ISI). ISI in the signal must be removed and the signal restores to its original state at the time of transmission or becomes as close to it as possible.

View Article and Find Full Text PDF

Objective: To carry out multipath cytogenetic analysis of a rare case of acute myeloid leukemia (AML) with 11q23 aberration and D13S319 deletion.

Methods: G+R banding technique was used to analyze the chromosomal karyotype of the patient after 24 h of cell culture. Combined interphase and metaphase fluorescence in situ hybridization (FISH) was used to detect specific chromosomal sites for complex translocations and minor missing fragments.

View Article and Find Full Text PDF

Towards attack tolerant networks: Concurrent multipath routing and the butterfly network.

PLoS One

December 2019

School of Information, University of Michigan, Ann Arbor, Michigan, United States of America.

It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet's router network typically have heavy-tailed degree distributions, making them highly vulnerable to targeted attacks against central nodes. While cryptographic solutions exist, they fail to address the underlying topological problem, and remain vulnerable to man-in-the-middle attacks and coercion.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!