logical topology
Recently Published Documents


TOTAL DOCUMENTS

132
(FIVE YEARS 12)

H-INDEX

10
(FIVE YEARS 2)

Author(s):  
Keyang Cheng ◽  
Qing Liu ◽  
Rabia Tahir ◽  
Liangmin Wang ◽  
Maozhen Li

Author(s):  
Alexandre Truppel ◽  
Tsun-Ming Tseng ◽  
Davide Bertozzi ◽  
Jose Carlos Alves ◽  
Ulf Schlichtmann

Author(s):  
R. R. Abrarov ◽  
M. E. Burlakov

As part of this work, proposed the Mesh network architecture, which provides decentralization, security, anonymity and connection of devices without a dedicated router or Internet access. The nodes establish connections directly using Android P2P Wi-Fi technology, which complies with the Wi-Fi Direct standard. P2P Wi-Fi API organizes group communication and allows applications to connect to neighboring devices without the need for an Internet connection or access point. Despite the fact that in the Wi-Fi Direct standard there are no restrictions on connecting groups to each other, the Android Wi-Fi P2P API does not allow organize a connection between several groups. This is due to the fact that the IP addresses of owners of different groups in Wi-Fi Direct are always the same and unchanged. Communication between a P2P client and an inherited client that also owns another group is allowed in both directions. This provides connections between groups, where a P2P client acts as a proxy to access a neighboring group. Thus communication between nodes in a multigroup network is ensured through the use of transport layer tunnels installed in the logical topology and packet switching at the application level. When one or more nodes access the Internet, remote nodes outside the Wi-Fi coverage area communicate with the mesh through the application server. This architecture allows build a corporate, public or home network based on a wireless Mesh network, the nodes of which can be access points, computers and mobile devices of users.


2020 ◽  
pp. 452-478
Author(s):  
Pankaj Kumar Mishra ◽  
Subhash Kumar

Underground mines include a number of challenges due to their hostile milieu. Therefore, geotechnical and environmental monitoring mainly in underground coal mines have always been a critical task to ensure safe working conditions. If the monitoring device is cable based, then it requires an huge amount of cable deployment which can pose not only the high maintenance cost but difficulty in laying out the cable throughout the underground galleries. on the other hand, if it is direct wireless communication between sensing devices and the central processing unit, it is also not so feasible due to the crisscross, uneven and incline path. Therefore, Wireless Sensor Networks grab an opportunity to be deployed in such a hostile environment. Keeping in view, in the present chapter, attempts have been made to discuss the different aspects of wireless sensor network for underground coal mining services applications to overcome the various threats. Further, the best suited logical topology has been identified for the same.


2019 ◽  
Vol 0 (0) ◽  
Author(s):  
Yassine Khlifi ◽  
Majid Alotaibi

AbstractOptical label switching is introduced for ensuring fast data transfer, quality of service (QoS) support, and better resource management. However, the important issue is how to optimize resource usage and satisfy traffic constraints for improving network performance and design. This paper proposes a dynamic approach that optimizes the resource in terms of link capacity and FDL (fiber delay line) buffering as well as a wavelength converter. The proposed approach decreases the resources usage and guarantees QoS support for various traffic demands. The optimization strategy consists of two stages: path building and traffic management. The path building assures logical topology making using the cumulative cost of available resource and traffic requirements including unicast and multicast. The traffic management solves the resource formulation problem during the traffic transfer by guaranteeing the required loss and blocking delay. Simulation work is conducted for validating the proposed approach and evaluating its performances and effectiveness. Simulation results show that our proposal minimizes effectively the use of link capacity of lightpath and light-tree. Moreover, our approach optimizes the use of buffering capacity and wavelength converter and guarantees QoS support according to traffic requirements.


Sign in / Sign up

Export Citation Format

Share Document