993 resultados para Signalling networks
Resumo:
A transform approach to network coding was in-troduced by Bavirisetti et al. (arXiv:1103.3882v3 [cs.IT]) as a tool to view wireline networks with delays as k-instantaneous networks (for some large k). When the local encoding kernels (LEKs) of the network are varied with every time block of length k >1, the network is said to use block time varying LEKs. In this work, we propose a Precoding Based Network Alignment (PBNA) scheme based on transform approach and block time varying LEKs for three-source three-destination multiple unicast network with delays (3-S3-D MUN-D). In a recent work, Menget al. (arXiv:1202.3405v1 [cs.IT]) reduced the infinite set of sufficient conditions for feasibility of PBNA in a three-source three-destination instantaneous multiple unicast network as given by Das et al. (arXiv:1008.0235v1 [cs.IT]) to a finite set and also showed that the conditions are necessary. We show that the conditions of Meng et al. are also necessary and sufficient conditions for feasibility of PBNA based on transform approach and block time varying LEKs for 3-S3-D MUN-D.
Resumo:
In this paper optical code-division multiple-access (O-CDMA) packet network is considered, which offers inherent security in the access networks. The application of O-CDMA to multimedia transmission (voice, data, and video) is investigated. The simultaneous transmission of various services is achieved by assigning to each user unique multiple code signatures. Thus, by applying a parallel mapping technique, we achieve multi-rate services. A random access protocol is proposed, here, where all distinct codes are used, for packet transmission. The codes, Optical Orthogonal Code (OOC), or 1D codes and Wavelength/Time Single-Pulse-per-Row (W/T SPR), or 2D codes, are analyzed. These 1D and 2D codes with varied weight are used to differentiate the Quality of Service (QoS). The theoretical bit error probability corresponding to the quality of each service is established using 1D and 2D codes in the receiver noiseless case and compared. The results show that, using 2D codes QoS in multimedia transmission is better than using 1D codes.
Resumo:
The algebraic formulation for linear network coding in acyclic networks with each link having an integer delay is well known. Based on this formulation, for a given set of connections over an arbitrary acyclic network with integer delay assumed for the links, the output symbols at the sink nodes at any given time instant is a Fq-linear combination of the input symbols across different generations, where Fq denotes the field over which the network operates. We use finite-field discrete Fourier transform (DFT) to convert the output symbols at the sink nodes at any given time instant into a Fq-linear combination of the input symbols generated during the same generation. We call this as transforming the acyclic network with delay into n-instantaneous networks (n is sufficiently large). We show that under certain conditions, there exists a network code satisfying sink demands in the usual (non-transform) approach if and only if there exists a network code satisfying sink demands in the transform approach. Furthermore, assuming time invariant local encoding kernels, we show that the transform method can be employed to achieve half the rate corresponding to the individual source-destination mincut (which are assumed to be equal to 1) for some classes of three-source three-destination multiple unicast network with delays using alignment strategies when the zero-interference condition is not satisfied.
Resumo:
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
In this paper, we evaluate the performance of a burst retransmission method for an optical burst switched network with intermediate-node-initiation (INI) signaling technique. The proposed method tries to reduce the burst contention probability at the intermediate core nodes. We develop an analytical model to get the burst contention probability and burst loss probability for an optical burst switched network with intermediate-node-initiation signaling technique. The proposed method uses the optical burst retransmission method. We simulate the performance of the optical burst retransmission. Simulation results show that at low traffic loads the loss probability is low compared to the conventional burst retransmission in the OBS network. Result also show that the retransmission method for OBS network with intermediate-node-initiation signaling technique significantly reduces the burst loss probability.
Resumo:
In this work, interference alignment for a class of Gaussian interference networks with general message demands, having line of sight (LOS) channels, at finite powers is considered. We assume that each transmitter has one independent message to be transmitted and the propagation delays are uniformly distributed between 0 and (L - 1) (L >; 0). If receiver-j, j ∈{1,2,..., J}, requires the message of transmitter-i, i ∈ {1, 2, ..., K}, we say (i, j) belongs to a connection. A class of interference networks called the symmetrically connected interference network is defined as a network where, the number of connections required at each transmitter-i is equal to ct for all i and the number of connections required at each receiver-j is equal to cr for all j, for some fixed positive integers ct and cr. For such networks with a LOS channel between every transmitter and every receiver, we show that an expected sum-spectral efficiency (in bits/sec/Hz) of at least K/(e+c1-1)(ct+1) (ct/ct+1)ct log2 (1+min(i, j)∈c|hi, j|2 P/WN0) can be achieved as the number of transmitters and receivers tend to infinity, i.e., K, J →∞ where, C denotes the set of all connections, hij is the channel gain between transmitter-i and receiver-j, P is the average power constraint at each transmitter, W is the bandwidth and N0 W is the variance of Gaussian noise at each receiver. This means that, for an LOS symmetrically connected interference network, at any finite power, the total spectral efficiency can grow linearly with K as K, J →∞. This is achieved by extending the time domain interference alignment scheme proposed by Grokop et al. for the k-user Gaussian interference channel to interference networks.
Resumo:
This paper studies the impact of exclusive contracts between a content provider (CP) and an internet service provider (ISP) in a nonneutral network. We consider a simple linear demand function for the CPs. We studywhen an exclusive contract is benefcial to the colluding pair and evaluate its impact on the noncolluding players at equilibrium. For the case of two CPs and one ISP we show that collusion may not always be benefcial. We derive an explicit condition in terms of the advertisement revenues of the CPs that tells when a collusion is proftable to the colluding entities.
Resumo:
The broadcast nature of the wireless medium jeopardizes secure transmissions. Cryptographic measures fail to ensure security when eavesdroppers have superior computational capability; however, it can be assured from information theoretic security approaches. We use physical layer security to guarantee non-zero secrecy rate in single source, single destination multi-hop networks with eavesdroppers for two cases: when eavesdropper locations and channel gains are known and when their positions are unknown. We propose a two-phase solution which consists of finding activation sets and then obtaining transmit powers subject to SINR constraints for the case when eavesdropper locations are known. We introduce methods to find activation sets and compare their performance. Necessary but reasonable approximations are made in power minimization formulations for tractability reasons. For scenarios with no eavesdropper location information, we suggest vulnerability region (the area having zero secrecy rate) minimization over the network. Our results show that in the absence of location information average number of eavesdroppers who have access to data is reduced.
Resumo:
Several anuran species use multimodal signals to communicate in diverse social contexts. Our study describes acoustic and visual behaviours of the Small Torrent Frog (Micrixalus aff. saxicola), a diurnal frog endemic to the Western Ghats of India. During agonistic interactions males display advertisement calls, foot-flagging and tapping (foot lifting) behaviours to signal the readiness to defend perching sites in perennial streams. Results from a quantitative video analysis of male–male interactions indicate that footflagging displays were used as directional signals toward the opponent male, but were less abundant than calls. The acoustic and visual signals were not functionally linked. The call of Micrixalus aff. saxicola thereby did not act as an alert signal. Analysis of behavioural transitions revealed that kicking behaviours (physical attacks) significantly elicited kicks from interacting males. We suggest that foot-flagging displays ritualized from this frequently observed fighting technique to reduce physical attacks.
Resumo:
Background and PurposeStudies have demonstrated that a moderate intake of amino acids is associated with development of bone health. Methionine, a sulphur-containing essential amino acid, has been largely implicated for improving cartilage formation, however its physiological significance on bone integrity and functionality have not been elucidated. We investigated whether methionine can prevent osteoporotic bone loss. Experimental ApproachThe anti-resorptive effect of methionine, (250mgkg(-1) body wt administered in drinking water for 10 weeks), was evaluated in ovariectomized (OVX) rats by monitoring changes in bone turnover, formation of osteoclasts from blood-derived mononuclear cells and changes in the synthesis of pro-osteoclastogenic cytokines. Key resultsMethionine improved bone density and significantly decreased the degree of osteoclast development from blood mononuclear cells in OVX rats, as indicated by decreased production of osteoclast markers tartarate resistant acid phosphatase b (TRAP5b) and MIP-1. siRNA-mediated knockdown of myeloid differentiation primary response 88 MyD88], a signalling molecule in the toll-like receptor (TLR) signalling cascade, abolished the synthesis of both TRAP5b and MIP-1 in developing osteoclasts. Methionine supplementation disrupted osteoclast development by inhibiting TLR-4/MyD88/NF-B pathway. Conclusions and ImplicationsTLR-4/MyD88/NF-B signalling pathway is integral for osteoclast development and this is down-regulated in osteoporotic system on methionine treatment. Methionine treatment could be beneficial for the treatment of postmenopausal osteoporosis.
Resumo:
We develop an approximate analytical technique for evaluating the performance of multi-hop networks based on beacon-less CSMA/CA as standardised in IEEE 802.15.4, a popular standard for wireless sensor networks. The network comprises sensor nodes, which generate measurement packets, and relay nodes which only forward packets. We consider a detailed stochastic process at each node, and analyse this process taking into account the interaction with neighbouring nodes via certain unknown variables (e.g., channel sensing rates, collision probabilities, etc.). By coupling these analyses of the various nodes, we obtain fixed point equations that can be solved numerically to obtain the unknown variables, thereby yielding approximations of time average performance measures, such as packet discard probabilities and average queueing delays. Different analyses arise for networks with no hidden nodes and networks with hidden nodes. We apply this approach to the performance analysis of tree networks rooted at a data sink. Finally, we provide a validation of our analysis technique against simulations.
Resumo:
Two new anionic inorganic-organic hybrid compounds H3O]Mn-3(mu(3)-OH)(C14H8O6S)(3)(H2O)](DMF)(5), I, and H3O](2)Mn-7(mu(3)-OH)(4)(C14H8O6S)(6)(H2O)(4)](H2O)(2)(DMF)(8), II have been prepared by employing mild solvothennal methods. Both the compounds have three-dimensionally extended structures formed by Mn-6 and Mn-7 clusters, respectively. The connectivity between Mn-6 and Mn-7 clusters and 4,4'-sulfonyldibenzoic acid anions (SDBA(2-)) results in a six connected pcu network in I and an eight connected bcu network in II. The presence of hydronium ion (H-3(O+)) along with the solvent molecules in the channels of both the compounds suggested proton conduction in the solids. Proton conductivity studies gave values of similar to 3 x 10(-4) Omega(-1) cm(-1) 98% relative humidity in both the compounds. The high activation energies indicate a vehicle mechanism in the compounds I and II. Magnetic studies indicate antiferromagnetic behavior in both the compounds.
Resumo:
Cellular signalling events are at the core of every adaptive response. Signalling events link environmental changes to physiological responses, consequently allowing cellular and organismal sustenance and survival. Classical approaches to study cellular signalling have relied on a variety of cell disruptive techniques which yield limited kinetic information, while the underlying events are much more complex. In this article, we discuss how modern live cell imaging microscopy has found increasing utilization in revealing spatio temporal dynamics of various signalling pathways. Utilizing the well studied mitogen-activated protein kinase (MAPK) signalling cascade as a template, the design, construction and utilization of `mobile' (translocation proficient) biosensors, suitable for studying MAPK signalling in living cells are described in detail. Experimental setup and results obtained from these biosensors, based on different proteins involved in the MAPK signalling cascade, have been described along with the setup of a microscope optimal for live cell imaging applications. Utilizing the ability to activate or deactivate signalling pathways using defined activators and specific pharmacological inhibitors, we also show how these sensors can yield unique spatial and temporal kinetic information of signalling in living cells.
Resumo:
Several anuran species use multimodal signals to communicate in diverse social contexts. Our study describes acoustic and visual behaviours of the Small Torrent Frog (Micrixalus aff. saxicola), a diurnal frog endemic to the Western Ghats of India. During agonistic interactions males display advertisement calls, foot-flagging and tapping (foot lifting) behaviours to signal the readiness to defend perching sites in perennial streams. Results from a quantitative video analysis of male-male interactions indicate that foot-flagging displays were used as directional signals toward the opponent male, but were less abundant than calls. The acoustic and visual signals were not functionally linked. The call of Micrixalus aff. saxicola thereby did not act as an alert signal. Analysis of behavioural transitions revealed that kicking behaviours (physical attacks) significantly elicited kicks from interacting males. We suggest that foot-flagging displays ritualized from this frequently observed fighting technique to reduce physical attacks.
Resumo:
We study the tradeoff between delivery delay and energy consumption in a delay-tolerant network in which a message (or a file) has to be delivered to each of several destinations by epidemic relaying. In addition to the destinations, there are several other nodes in the network that can assist in relaying the message. We first assume that, at every instant, all the nodes know the number of relays carrying the message and the number of destinations that have received the message. We formulate the problem as a controlled continuous-time Markov chain and derive the optimal closed-loop control (i.e., forwarding policy). However, in practice, the intermittent connectivity in the network implies that the nodes may not have the required perfect knowledge of the system state. To address this issue, we obtain an ordinary differential equation (ODE) (i.e., a deterministic fluid) approximation for the optimally controlled Markov chain. This fluid approximation also yields an asymptotically optimal open-loop policy. Finally, we evaluate the performance of the deterministic policy over finite networks. Numerical results show that this policy performs close to the optimal closed-loop policy.