message delay
Recently Published Documents


TOTAL DOCUMENTS

69
(FIVE YEARS 9)

H-INDEX

12
(FIVE YEARS 2)

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Yaling Li

In order to overcome the problems of low security and high message delay in traditional counseling systems, this article designs and proposes a new counseling system based on the weighted hybrid algorithm. According to the principle of system design, the system architecture diagram and system role are designed. In the hardware part of the system, the user management module, online consultation module, and knowledge base module are designed to realize the psychological consultation function of the system. In the software part, the weighted hybrid algorithm is used to divide the psychological information state of the consultants effectively. Combined with the hardware and software of the system, the overall design of the system is completed. The experimental results show that, compared with the traditional consulting system, the designed system can effectively ensure the information security of consultants and reduce the message delay of the system, which has higher practical application value.


2021 ◽  
Vol Volume 17, Issue 3 ◽  
Author(s):  
Adam Shimi ◽  
Aurélie Hurault ◽  
Philippe Queinnec

In distributed computing, multiple processes interact to solve a problem together. The main model of interaction is the message-passing model, where processes communicate by exchanging messages. Nevertheless, there are several models varying along important dimensions: degree of synchrony, kinds of faults, number of faults... This variety is compounded by the lack of a general formalism in which to abstract these models. One way to bring order is to constrain these models to communicate in rounds. This is the setting of the Heard-Of model, which captures many models through predicates on the messages sent in a round and received on time. Yet, it is not easy to define the predicate that captures a given operational model. The question is even harder for the asynchronous case, as unbounded message delay means the implementation of rounds must depend on details of the model. This paper shows that characterising asynchronous models by heard-of predicates is indeed meaningful. This characterization relies on delivered predicates, an intermediate abstraction between the informal operational model and the heard-of predicates. Our approach splits the problem into two steps: first extract the delivered model capturing the informal model, and then characterize the heard-of predicates that are generated by this delivered model. For the first part, we provide examples of delivered predicates, and an approach to derive more. It uses the intuition that complex models are a composition of simpler models. We define operations like union, succession or repetition that make it easier to derive complex delivered predicates from simple ones while retaining expressivity. For the second part, we formalize and study strategies for when to change rounds. Intuitively, the characterizing predicate of a model is the one generated by a strategy that waits for as much messages as possible, without blocking forever.


2021 ◽  
Vol 13 (03) ◽  
pp. 15-26
Author(s):  
Iyas Alodat

In this paper, we examined the effect on network performance of the various strategies an attacker could adopt to launch Man-In The Middle (MITM) attacks on the wireless network, such as fleet or random strategies. In particular, we're focusing on some of those goals for MITM attackers - message delay, message dropping. According to simulation data, these attacks have a significant effect on legitimate nodes in the network, causing vast amounts of infected packets, end-to-end delays, and significant packet loss.


2021 ◽  
pp. 1-11
Author(s):  
Asim Nadeem ◽  
Agha Kashif ◽  
Sohail Zafar ◽  
Zohaib Zahid

The partition dimension is a variant of metric dimension in graphs. It has arising applications in the fields of network designing, robot navigation, pattern recognition and image processing. Let G (V (G) , E (G)) be a connected graph and Γ = {P1, P2, …, Pm} be an ordered m-partition of V (G). The partition representation of vertex v with respect to Γ is an m-vector r (v|Γ) = (d (v, P1) , d (v, P2) , …, d (v, Pm)), where d (v, P) = min {d (v, x) |x ∈ P} is the distance between v and P. If the m-vectors r (v|Γ) differ in at least 2 positions for all v ∈ V (G), then the m-partition is called a 2-partition generator of G. A 2-partition generator of G with minimum cardinality is called a 2-partition basis of G and its cardinality is known as the 2-partition dimension of G. Circulant graphs outperform other network topologies due to their low message delay, high connectivity and survivability, therefore are widely used in telecommunication networks, computer networks, parallel processing systems and social networks. In this paper, we computed partition dimension of circulant graphs Cn (1, 2) for n ≡ 2 (mod 4), n ≥ 18 and hence corrected the result given by Salman et al. [Acta Math. Sin. Engl. Ser. 2012, 28, 1851-1864]. We further computed the 2-partition dimension of Cn (1, 2) for n ≥ 6.


Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1754
Author(s):  
Depeng Chen ◽  
Carlos Borrego ◽  
Guillermo Navarro-Arribas

This paper focuses on the problem of providing anonymous communications in opportunistic networks. To that end, we propose an approach using Mix networks that enables a relatively simple solution. Opportunistic networks present some constraints that make the deployment of typical network anonymity solutions difficult or infeasible. We show, utilizing simulations on the basis of real mobility traces, that the proposed solution is feasible for some scenarios by introducing a tolerable penalty in terms of message delay and delivery. To investigate the impact of routing strategies, we offer two different methods to select Mix nodes. From the experiment results, we show the trade-off between network performance and security.


Sensors ◽  
2019 ◽  
Vol 19 (13) ◽  
pp. 3020 ◽  
Author(s):  
Linh-An Phan ◽  
Taejoon Kim ◽  
Taehong Kim ◽  
JaeSeang Lee ◽  
Jae-Hyun Ham

The time synchronization protocol is indispensable in various applications of wireless sensor networks, such as scheduling, monitoring, and tracking. Numerous protocols and algorithms have been proposed in recent decades, and many of them provide micro-scale resolutions. However, designing and implementing a time synchronization protocol in a practical wireless network is very challenging compared to implementation in a wired network; this is because its performance can be deteriorated significantly by many factors, including hardware quality, message delay jitter, ambient environment, and network topology. In this study, we measure the performance of the Flooding Time Synchronization Protocol (FTSP) and Gradient Time Synchronization Protocol (GTSP) in terms of practical network conditions, such as message delay jitter, synchronization period, network topology, and packet loss. This study provides insights into the operation and optimization of time synchronization protocols. In addition, the performance evaluation identifies that FTSP is highly affected by message delay jitter due to error accumulation over multi-hops. We demonstrate that the proposed extended version of the FTSP (E-FTSP) alleviates the effect of message delay jitter and enhances the overall performance of FTSP in terms of error, time, and other factors.


2019 ◽  
Vol 29 (01) ◽  
pp. 1950002 ◽  
Author(s):  
Saptaparni Kumar ◽  
Jennifer L. Welch

We present an implementation of the eventually perfect failure detector [Formula: see text] from the original hierarchy of the Chandra-Toueg [3] oracles on an arbitrary partitionable network composed of unreliable channels that can lose and reorder messages. Prior implementations of [Formula: see text] have assumed different partially synchronous models ranging from bounded point-to-point message delay and reliable communication to unbounded message size and known network topologies. We implement [Formula: see text] under very weak assumptions on an arbitrary, partitionable network composed of Average Delayed/Dropped (ADD) channels [11] to model unreliable communication. Unlike older implementations, our failure detection algorithm uses bounded-sized messages to eventually detect all nodes that are unreachable (crashed or disconnected) from it.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 726
Author(s):  
S Murugaveni ◽  
B Priyalakshmi ◽  
K Vijayan

In military network environments is resource-constrained arrange conditions, where end-to-end network is not ensured because of successive deferral, an efficient solution is required for trustful and energy efficient routing. Proposed work, provenance trust based routing is combined with energy efficient route to opt for a high network lifetime. Proposed scheme is designed for peer-to-peer trust assessment and maximize the delivery of correct messages received by destination nodes while minimizing message delay and communication cost Provenance alludes to the historical backdrop of responsibility for esteemed data. Proposed scheme avoids malicious node using provenance model and achieves good network lifetime using energy efficient routing strategy. Node’s trust is calculated dynamically in response to changes in the environmental and node conditions.  


Sign in / Sign up

Export Citation Format

Share Document