54 resultados para communication networks

em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Animal communication often occurs in communication networks in which multiple signalers and receivers are within signaling range of each other. In such networks, individuals can obtain information on the quality and motivation of territorial neighbors by eavesdropping on their signaling interactions. In songbirds, extracting information from interactions involving neighbors is thought to be an important factor in the evolution of strategies of territory defense. In a playback experiment with radio-tagged nightingales Luscinia megarhynchos we here demonstrate that territorial males use their familiar neighbors' performance in a vocal interaction with an unfamiliar intruder as a standard for their own response. Males were attracted by a vocal interaction between their neighbor and a simulated stranger and intruded into the neighbor's territory. The more intensely the neighbor had interacted with playback, the earlier the intrusions were made, indicating that males eavesdropped on the vocal contest involving a neighbor. However, males never intruded when we had simulated by a second playback that the intruder had retreated and sang outside the neighbor's territory. These results suggest that territorial males use their neighbors' singing behavior as an early warning system when territorial integrity is threatened. Simultaneous responses by neighboring males towards unfamiliar rivals are likely to be beneficial to the individuals in maintaining territorial integrity.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

In this letter, we consider wireless powered communication networks which could operate perpetually, as the base station (BS) broadcasts energy to the multiple energy harvesting (EH) information transmitters. These employ “harvest then transmit” mechanism, as they spend all of their energy harvested during the previous BS energy broadcast to transmit the information towards the BS. Assuming time division multiple access (TDMA), we propose a novel transmission scheme for jointly optimal allocation of the BS broadcasting power and time sharing among the wireless nodes, which maximizes the overall network throughput, under the constraint of average transmit power and maximum transmit power at the BS. The proposed scheme significantly outperforms “state of the art” schemes that employ only the optimal time allocation. If a single EH transmitter is considered, we generalize the optimal solutions for the case of fixed circuit power consumption, which refers to a much more practical scenario.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The future convergence of voice, video and data applications on the Internet requires that next generation technology provides bandwidth and delay guarantees. Current technology trends are moving towards scalable aggregate-based systems where applications are grouped together and guarantees are provided at the aggregate level only. This solution alone is not enough for interactive video applications with sub-second delay bounds. This paper introduces a novel packet marking scheme that controls the end-to-end delay of an individual flow as it traverses a network enabled to supply aggregate- granularity Quality of Service (QoS). IPv6 Hop-by-Hop extension header fields are used to track the packet delay encountered at each network node and autonomous decisions are made on the best queuing strategy to employ. The results of network simulations are presented and it is shown that when the proposed mechanism is employed the requested delay bound is met with a 20% reduction in resource reservation and no packet loss in the network.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Models on territory acquisition and tenure predict that territorial animals benefit by adjusting territorial defence behaviour to previous challenges they had experienced within the socially complex environment of communication networks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We study the dissipative dynamics of two independent arrays of many-body systems, locally driven by a common entangled field. We showthat in the steady state the entanglement of the driving field is reproduced in an arbitrarily large series of inter-array entangled pairs over all distances. Local nonclassical driving thus realizes a scale-free entanglement replication and long-distance entanglement distribution mechanism that has immediate bearing on the implementation of quantum communication networks

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Healing algorithms play a crucial part in distributed peer-to-peer networks where failures occur continuously and frequently. Whereas there are approaches for robustness that rely largely on built-in redundancy, we adopt a responsive approach that is more akin to that of biological networks e.g. the brain. The general goal of self-healing distributed graphs is to maintain certain network properties while recovering from failure quickly and making bounded alterations locally. Several self-healing algorithms have been suggested in the recent literature [IPDPS'08, PODC'08, PODC'09, PODC'11]; they heal various network properties while fulfilling competing requirements such as having low degree increase while maintaining connectivity, expansion and low stretch of the network. In this work, we augment the previous algorithms by adding the notion of edge-preserving self-healing which requires the healing algorithm to not delete any edges originally present or adversarialy inserted. This reflects the cost of adding additional edges but more importantly it immediately follows that edge preservation helps maintain any subgraph induced property that is monotonic, in particular important properties such as graph and subgraph densities. Density is an important network property and in certain distributed networks, maintaining it preserves high connectivity among certain subgraphs and backbones. We introduce a general model of self-healing, and introduce xheal+, an edge-preserving version of xheal[PODC'11]. © 2012 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

We review the physics of hybrid optomechanical systems consisting of a mechanical oscillator interacting with both a radiation mode and an additional matterlike system. We concentrate on the cases embodied by either a single or a multi-atom system (a Bose-Einstein condensate, in particular) and discuss a wide range of physical effects, from passive mechanical cooling to the set-up of multipartite entanglement, from optomechanical nonlocality to the achievement of non-classical states of a single mechanical mode. The reviewed material showcases the viability of hybridised cavity optomechanical systems as basic building blocks for quantum communication networks and quantum state-engineering devices, possibly empowered by the use of quantum and optimal control techniques. The results that we discuss are instrumental to the promotion of hybrid optomechanical devices as promising experimental platforms for the study of nonclassicality at the genuine mesoscopic level.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper proposes millimeter wave (mmWave) mobile broadband for achieving secure communication in downlink cellular network. Analog beamforming with phase shifters is adopted for the mmWave transmission. The secrecy throughput is analyzed based on two different transmission modes, namely delay-tolerant transmission and delay-limited transmission. The impact of large antenna arrays at the mmWave frequencies on the secrecy throughput is examined. Numerical results corroborate our analysis and show that mmWave systems can enable significant secrecy improvement. Moreover, it is indicated that with large antenna arrays, multi-gigabit per second secure link at the mmWave frequencies can be reached in the delay-tolerant transmission mode and the adverse effect of secrecy outage vanishes in the delay-limited transmission mode.