The concept of biologically inspired networking has been introduced to tackle unpredictable and unstable situations in computer networks, especially in wireless ad hoc networks where network conditions are continuously changing, resulting in the need of robustness and adaptability of control methods. Unfortunately, existing methods often rely heavily on the detailed knowledge of each network component and the preconfigured, that is, fine-tuned, parameters. In this paper, we utilize a new concept, called attractor perturbation (AP), which enables controlling the network performance using only end-to-end information. Based on AP, we propose a concurrent multipath traffic distribution method, which aims at lowering the average end-to-end delay by only adjusting the transmission rate on each path. We demonstrate through simulations that, by utilizing the attractor perturbation relationship, the proposed method achieves a lower average end-to-end delay compared to other methods which do not take fluctuations into account.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3844172 | PMC |
http://dx.doi.org/10.1155/2013/543718 | DOI Listing |
Sci Rep
December 2024
Central South University of Forestry and Technology, Electronic Information and Physics College, Tianxin Area, Changsha City, Hunan Province, 410004, China.
In this paper, we investigate the decoding performance and corresponding decoding strategies for polar-coded orthogonal frequency division multiplexing (OFDM) system operating under multipath fading channels. Multipath fading channels lead to frequency selective fading of the OFDM signal, resulting in varying levels of noise interference across different subcarriers after equalization. Furthermore, frequency selective fading induces burst errors in the equalized information, thereby significantly degrading the decoding performance.
View Article and Find Full Text PDFEntropy (Basel)
June 2023
Department of Next-Generation Mobile Communication and Cyber Space Security, Information Engineering University, Zhengzhou 450001, China.
The increasing demand for end-to-end low-latency and high-reliability transmissions between edge computing nodes and user elements in 5G Advance edge networks has brought new challenges to the transmission of data. In response, this paper proposes LERMS, a packet-level encoding transmission scheme designed for untrusted 5GA edge networks that may encounter malicious transmission situations such as data tampering, discarding, and eavesdropping. LERMS achieves resiliency against such attacks by using 5GA Protocol data unit (PDU) coded Concurrent Multipath Transfer (CMT) based on Lagrangian interpolation and Raptor's two-layer coding, which provides redundancy to eliminate the impact of an attacker's malicious behavior.
View Article and Find Full Text PDFFront Neurorobot
June 2021
Guangdong Shenglu Telecommunication Tech. Co., Ltd, Foshan, China.
At present, in robot technology, remote control of robot is realized by wireless communication technology, and data anti-interference in wireless channel becomes a very important part. Any wireless communication system has an inherent multi-path propagation problem, which leads to the expansion of generated symbols on a time scale, resulting in symbol overlap and Inter-symbol Interference (ISI). ISI in the signal must be removed and the signal restores to its original state at the time of transmission or becomes as close to it as possible.
View Article and Find Full Text PDFZhonghua Yi Xue Yi Chuan Xue Za Zhi
January 2020
Department of Hematology, Peking University Third Hospital, Beijing 100191, China.
Objective: To carry out multipath cytogenetic analysis of a rare case of acute myeloid leukemia (AML) with 11q23 aberration and D13S319 deletion.
Methods: G+R banding technique was used to analyze the chromosomal karyotype of the patient after 24 h of cell culture. Combined interphase and metaphase fluorescence in situ hybridization (FISH) was used to detect specific chromosomal sites for complex translocations and minor missing fragments.
PLoS One
December 2019
School of Information, University of Michigan, Ann Arbor, Michigan, United States of America.
It is crucial for large-scale communication networks such as the internet to be resilient against attacks such as censorship and surveillance, which pose a threat to free expression and free association. Self-organized networks such as the internet's router network typically have heavy-tailed degree distributions, making them highly vulnerable to targeted attacks against central nodes. While cryptographic solutions exist, they fail to address the underlying topological problem, and remain vulnerable to man-in-the-middle attacks and coercion.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!