Tag Archive: 'opnet modeler tutorial'

Efficient scheduling of sporadic tasks for real-time wireless sensor networks

Industrial automation requires hard real-time delivery of data that can be of periodic or sporadic in nature. It is challenging to ensure hard real-time delivery of periodic and sporadic data to a multi-hop away destination in a bandwidth constrained environment, such as wireless sensor networks. In this regard, research has been done for joint scheduling […]

Ethernet-based avionic databus and time-space partition switch design

Avionic databuses fulfill a critical function in the connection and communication of aircraft components and functions such as flight-control, navigation, and monitoring. Ethernet-based avionic databuses have become the mainstream for large aircraft owning to their advantages of full-duplex communication with high bandwidth, low latency, low packet-loss, and low cost. As a new generation aviation network […]

Virtual network provisioning over distance-adaptive flexible-grid optical networks [Invited]

In software-defined optical networks (SDONs), network services are provided in terms of virtual optical networks (VONs). VON provisioning requires additional considerations regarding their optical characteristics and constraints compared to virtual networks offered in the electrical domain. In this paper, we present a new VON provisioning procedure that is specifically designed for distance-adaptive flexible-grid optical networks. […]

Exploring Stock Market Using Twitter Trust Network

As social networks are becoming more and more popular, more and more data are available from them. Researchers are now trying to extract useful information from these big data. One possible usage of social media is to investigate stock market. There are two major events to measure in stock market – price change and trade […]

Digging the innate reliability of wireless networked systems

Network reliability of wireless networks exhibits a prominent impact in successful advancement of the networking paradigm. A complete understanding of the network reliability demands its in-depth analysis, which is yet to be attempted in the literature. Therefore, we present a comprehensive study on the network reliability in this paper. Our step-by-step stochastic study, from node-level to […]

Elastic network functions: opportunities and challenges

Network function virtualization (NFV) and software defined networking (SDN) are key technology enablers for cost reductions and new business models in networking. The possibility to automatically and dynamically scale network services at run time is one of the main claims of NFV. Elastic NFV could be similar to what elastic cloud services provide for compute, with pay-per-use […]

Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges

As cloud computing and social networks become ubiquitous in our modern world, what come along with the nearly infinite storage and computing power are the security, privacy, and digital forensic challenges. Due to the completely different ways of data storage and processing in the cloud and social networks compared to their traditional counterparts, digital forensics practitioners are in need to […]

Social power for privacy protected opportunistic networks

Opportunistic networking poses a trade off. On the one hand, social links and the structure inherent in the opportunistic network are private information and should thus be protected. On the other hand, such information can be used to improve performance or security. We present an algorithm that can solve this dilemma: we can recognize pre-established […]

A study of user incentive mechanism in named data networking

Various named data networking (NDN) functions facilitate P2P content distribution, but the user incentive mechanism is missing. In this paper, we study the user incentive mechanism in NDN, particularly the information gathering, i.e., collecting user contribution information to be used to evaluate and reciprocate users, through simulations based on real Bit-Torrent trace. We found that two specific users […]

Flow control enhancements in Content Centric Networking

In window-based flow control mechanism for Content Centric Networking (CCN), for one Interest (a content request packet), more than one Content Objects (content chunks) are expected to be received. TCP’s RTT estimation algorithm cannot be used directly for such scenarios because for some contents, there will be no Interest reference. In this paper, we extend TCP’s RTT estimation for […]