2,985,692 research outputs found
Two snap-stabilizing point-to-point communication protocols in message-switched networks
A snap-stabilizing protocol, starting from any configuration, always behaves
according to its specification. In this paper, we present a snap-stabilizing
protocol to solve the message forwarding problem in a message-switched network.
In this problem, we must manage resources of the system to deliver messages to
any processor of the network. In this purpose, we use information given by a
routing algorithm. By the context of stabilization (in particular, the system
starts in an arbitrary configuration), this information can be corrupted. So,
the existence of a snap-stabilizing protocol for the message forwarding problem
implies that we can ask the system to begin forwarding messages even if routing
information are initially corrupted. In this paper, we propose two
snap-stabilizing algorithms (in the state model) for the following
specification of the problem: - Any message can be generated in a finite time.
- Any emitted message is delivered to its destination once and only once in a
finite time. This implies that our protocol can deliver any emitted message
regardless of the state of routing tables in the initial configuration. These
two algorithms are based on the previous work of [MS78]. Each algorithm needs a
particular method to be transform into a snap-stabilizing one but both of them
do not introduce a significant overcost in memory or in time with respect to
algorithms of [MS78]
An acoustic metamaterial lens for acoustic point-to-point communication in air
Acoustic metamaterials have become a novel and effective way to control sound
waves and design acoustic devices. In this study, we design a 3D acoustic
metamaterial lens (AML) to achieve point-to-point acoustic communication in
air: any acoustic source (i.e. a speaker) in air enclosed by such an AML can
produce an acoustic image where the acoustic wave is focused (i.e. the field
intensity is at a maximum, and the listener can receive the information), while
the acoustic field at other spatial positions is low enough that listeners can
hear almost nothing. Unlike a conventional elliptical reflective mirror, the
acoustic source can be moved around inside our proposed AML. Numerical
simulations are given to verify the performance of the proposed AML
An analysis of point-to-point communication for application to the lunar flyer program
Determining optimum frequency for point-to-point communication in vicinity of line-of-sight horizon on lunar surfac
Performance Analysis of Point-to-Point LoRa End Device Communication
LoRa is an emerging communication technology that can be used in any field. Many types of
research have analyzed LoRa network using a gateway and several end devices to many
monitoring applications. However, the communication performance between LoRa end devices
only has not been evaluated. This research tested a LoRa communication between two end
devices in a point-to-point topology. From the experiment results with various payload lengths,
the optimum payload is only 48 bytes with the default module configuration. Longer payload
resulted in a decreased performance. Thus, this research implemented a waiting protocol that
can increase the Packet Reception Ratio of 100-byte payload from 49.87% to 97.52%
Error Mitigation of Point-to-Point Communication for Fault-Tolerant Computing
Fault tolerant systems require the ability to detect and recover from physical damage caused by the hardware s environment, faulty connectors, and system degradation over time. This ability applies to military, space, and industrial computing applications. The integrity of Point-to-Point (P2P) communication, between two microcontrollers for example, is an essential part of fault tolerant computing systems. In this paper, different methods of fault detection and recovery are presented and analyzed
Session Types for Broadcasting
Up to now session types have been used under the assumptions of point to
point communication, to ensure the linearity of session endpoints, and reliable
communication, to ensure send/receive duality. In this paper we define a
session type theory for broadcast communication semantics that by definition do
not assume point to point and reliable communication. Our session framework
lies on top of the parametric framework of broadcasting psi-calculi, giving
insights on developing session types within a parametric framework. Our session
type theory enjoys the properties of soundness and safety. We further believe
that the solutions proposed will eventually provide a deeper understanding of
how session types principles should be applied in the general case of
communication semantics.Comment: In Proceedings PLACES 2014, arXiv:1406.331
Covert communication with Gaussian noise: from random access channel to point-to-point channel
We propose a covert communication protocol for the spread-spectrum multiple
random access with additive white Gaussian noise (AWGN) channel. No existing
paper has studied covert communication for the random access channel. Our
protocol assumes binary discrete phase-shift keying (BPSK) modulation, and it
works well under imperfect channel state information (I-CSI) for both the
legitimate and adversary receivers, which is a realistic assumption in the low
power regime. Also, our method assumes that the legitimate users share secret
variables in a similar way as the preceding studies. Although several studies
investigated the covert communication for the point-to-point communication, no
existing paper considers the covert communication under the above uncertainty
assumption even for point-to-point communication. Our protocol under the above
uncertainty assumption allows O(n) legitimate senders and O(n/log n) active
legitimate senders. Furthermore, our protocol can be converted to a protocol
for point-to-point communication that works under the above uncertainty
assumption
- …