Academic literature on the topic 'Distributed network with mesh topology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Distributed network with mesh topology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Distributed network with mesh topology"

1

N., Dr Bhalaji. "Reliable Data Transmission with Heightened Confidentiality and Integrity in IOT Empowered Mobile Networks." Journal of ISMAC 2, no. 2 (May 9, 2020): 106–17. http://dx.doi.org/10.36548/jismac.2020.2.004.

Full text
Abstract:
The revolution caused by the communication without wires has brought in multitudes of basic modifications in the data network and the telecommunication, making the integrated networks a reality. The further advancements in the wireless communication has enabled to set personal networks using the portable devices, and are termed as the adhoc networks. The networks formed under specific circumstances or a reason could follow any one of the topology to convey the information. W ireless mesh network is the form of such network mentioned above that organized in a mesh topology. This network formed in mesh topology contains several consumers who are arranged in the distributed manner and forward the packets in a one or more than one hop model. The protocols that help in sorting out the path for sending and receiving the information are has a vital influence over the network in mesh topology as they affect the throughput, life of established links etc. Integrating the wireless mesh topology to the internet of things has improved the way of information sharing by linking multitudes tangible things around. The mesh topology wireless networks formed using the portable devices or other –wise called as the mobile networks that are connected over internet are open to security breaches as the mesh holds few nodes that are malicious. This makes the information conveyed to be either compromised or manipulated. The article in order to ensure the reliability in the transmission of the data with the heightened confidentiality and integrity in the IOT empowered mobile networks proposes a routing strategy that is robust across the consumers in mesh, the gateway and the routers. The channels across the devices in the mesh are formed based on the efficiency of the connections for the distribution of the data. The simulation process of the proposed work using the network simulator 2 shows the performance improvement of the proposed work with respect to throughput of the network, packet loss rate, packet delivery rate, latency, energy efficiency and the computational overhead.
APA, Harvard, Vancouver, ISO, and other styles
2

Chafe, Chris. "Distributed acoustical meshes on the Internet." Journal of the Acoustical Society of America 156, no. 4_Supplement (October 1, 2024): A39. https://doi.org/10.1121/10.0035023.

Full text
Abstract:
An acoustical mesh distributed over the Internet is constructed of scattering junction nodes with bidirectional audio streaming between them. Components of common network music performance (NMP) applications like JackTrip can be adapted for experimentation with the concept. In the usual context of ensemble NMP, an audio hub server accepts bidirectional audio connections from multiple clients. The clients are located apart from each other physically and the hub server handles audio to and from the ensemble of sites, typically comprising a band or choir. The usual spoke and wheel topology (single hub server/mulitple hub clients) requires some modifications to run as a mesh of interconnected scattering juntions. The resulting waveguide mesh topology is explored for its properties, some of which resemble extensions of waveguide mesh physical model simulations of musical instruments and rooms. The acoustical medium that this creates is a live, vibrating acoustic mesh across Internet space. Unique properties, such as non-uniform distribution of nodes, are described in an experiment that explores analogies to plates and membranes and is characterized by the inherently anisotropic propagation of the network.
APA, Harvard, Vancouver, ISO, and other styles
3

Jalil, Muhammad Arif Bin. "A Brief Overview: Computer Network Based on Physical and Logical Topology." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1154–60. http://dx.doi.org/10.22214/ijraset.2022.40833.

Full text
Abstract:
Abstract: The classification of network topologies according to how they are implemented is examined in depth from a variety of perspectives. Each type of topology is used to accomplish a certain purpose and capture the system's structure at varying levels of detail. Distributed computer systems have been an important and popular topic in computing in recent years. It provides highend performance at an affordable price .In a distributed computing environment, autonomous computers are connected via a communication network that is arranged in a geometrical shape known as network topology. Keywords: Bus, Star, Ring, Tree, Mesh, Network Topology, Physical Topology, Logical Topology.
APA, Harvard, Vancouver, ISO, and other styles
4

WANG, XINYANG, DEYU QI, and NAQIN ZHOU. "Embedding Strategies of Mesh Network into the Exchanged Crossed Cube." Journal of Interconnection Networks 18, no. 02n03 (June 2018): 1850011. http://dx.doi.org/10.1142/s0219265918500111.

Full text
Abstract:
The topology of interconnection networks plays an important role in the performance of parallel and distributed computing systems, and the embeddings of interconnection networks can help adapt their topology features into new interconnection network structures. Being a basic and popular structure, the mesh network has wide application range as the result of some of its topology features. Meanwhile, as an important variant of hypercube, the Exchanged Crossed Cube(ECQ) combines advantages of crossed cube and exchanged hypercube, i.e. the promotion of network performance and the reduce of communication cost. To enlarge the application range of the ECQ, this paper discusses the embedding strategies of Mesh network into ECQ and proposes 4 methods to embed meshes into ECQ. We distinguish these methods by comparing their dilation, expansion, loading and congestion. The comparison result shows that compromise among four of the above parameters has to be made to achieve the improvement of some parameters.
APA, Harvard, Vancouver, ISO, and other styles
5

Elzain and Wu. "Software Defined Wireless Mesh Network Flat Distribution Control Plane." Future Internet 11, no. 8 (July 25, 2019): 166. http://dx.doi.org/10.3390/fi11080166.

Full text
Abstract:
Wireless Mesh Networks (WMNs), have a potential offering relatively stable Internet broadband access. The rapid development and growth of WMNs attract ISPs to support users’ coverage anywhere anytime. To achieve this goal network architecture must be addressed carefully. Software Defined Networking (SDN) proposes new network architecture for wired and wireless networks. Software Defined Wireless Networking (SDWN) has a great potential to increase efficiency, ease the complexity of control and management, and accelerate technology innovation rate of wireless networking. An SDN controller is the core component of an SDN network. It needs to have updated reports of the network status change, as in network topology and quality of service (QoS) in order to effectively configure and manage the network it controls. In this paper, we propose Flat Distributed Software Defined Wireless Mesh Network architecture where the controller aggregates entire topology discovery and monitors QoS properties of extended WMN nodes using Link Layer Discovery Protocol (LLDP) protocol, which is not possible in multi-hop ordinary architectures. The proposed architecture has been implemented on top of POX controller and Advanced Message Queuing Protocol (AMQP) protocol. The experiments were conducted in a Mininet-wifi emulator, the results present the architecture control plane consistency and two application cases: topology discovery and QoS monitoring. The current results push us to study QoS-routing for video streaming over WMN.
APA, Harvard, Vancouver, ISO, and other styles
6

Fan, Wen Qi, Sheng Chun Huang, and Ji Bo Wei. "Key Technology Research on Wireless Mesh Network MAC Protocol." Applied Mechanics and Materials 696 (November 2014): 215–21. http://dx.doi.org/10.4028/www.scientific.net/amm.696.215.

Full text
Abstract:
Wireless Mesh Networks (WMN) is distributed broadband wireless network architecture with characteristic of high throughput and high data rate. The quantity of research being conducted in this area has dramatically increased recently. Medium Access Control (MAC) is the key technology to exploit the multi-hop advantage of WMN. This paper introduces two major research topic of MAC design in WMN, the topology control and link scheduling. A survey of recent research on these topics is given in detail.
APA, Harvard, Vancouver, ISO, and other styles
7

BOUHRAOUA, ABDELHAFID, and MUHAMMAD E. S. ELRABAA. "IMPROVED MODIFIED FAT-TREE TOPOLOGY NETWORK-ON-CHIP." Journal of Circuits, Systems and Computers 20, no. 04 (June 2011): 757–80. http://dx.doi.org/10.1142/s0218126611007591.

Full text
Abstract:
C-based cycle-accurate simulations are used to evaluate the performance of a Network-on-Chip (NoC) based on an improved version of the modified Fat Tree topology. The modification simplifies routing further and guarantee orderly reception of packets without any loss of performance. Several traffic models have been used in these simulations; Bursty and non-bursty traffic with uniformly-distributed destination addresses and non-uniformly-distributed destination addresses. A simple new traffic model has been developed for generating non-uniformly-distributed destination addresses. This model is general enough to be used in developing new NoC architectures and captures universally accepted place-and-route methodologies. Simulation results are used to illustrate how the hardware resources of a modified Fat Tree NoC can be minimized without affecting the network performance. The performance of a NoC with regular Mesh topology was also evaluated for comparison with the modified Fat Tree topology.
APA, Harvard, Vancouver, ISO, and other styles
8

Eigel, Martin, Marvin Haase, and Johannes Neumann. "Topology Optimisation under Uncertainties with Neural Networks." Algorithms 15, no. 7 (July 12, 2022): 241. http://dx.doi.org/10.3390/a15070241.

Full text
Abstract:
Topology optimisation is a mathematical approach relevant to different engineering problems where the distribution of material in a defined domain is distributed in some optimal way, subject to a predefined cost function representing desired (e.g., mechanical) properties and constraints. The computation of such an optimal distribution depends on the numerical solution of some physical model (in our case linear elasticity) and robustness is achieved by introducing uncertainties into the model data, namely the forces acting on the structure and variations of the material stiffness, rendering the task high-dimensional and computationally expensive. To alleviate this computational burden, we develop two neural network architectures (NN) that are capable of predicting the gradient step of the optimisation procedure. Since state-of-the-art methods use adaptive mesh refinement, the neural networks are designed to use a sufficiently fine reference mesh such that only one training phase of the neural network suffices. As a first architecture, a convolutional neural network is adapted to the task. To include sequential information of the optimisation process, a recurrent neural network is constructed as a second architecture. A common 2D bridge benchmark is used to illustrate the performance of the proposed architectures. It is observed that the NN prediction of the gradient step clearly outperforms the classical optimisation method, in particular since larger iteration steps become viable.
APA, Harvard, Vancouver, ISO, and other styles
9

Kelagadi, Hemantaraj M., and Priyatam Kumar. "Distributed Topology Control Techniques for Wireless Sensor Networks: An Overview." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 7 (October 2, 2017): 425. http://dx.doi.org/10.23956/ijarcsse/v7i7/0225.

Full text
Abstract:
The recent technological innovations and development like the Internet of Things (IoT), Smart Grids and Smart Environment applications tend to enhance the scalability, self-organizing capability of the mesh networks as well as the wireless sensor networks. As the wireless sensor network have limited energy resources, there is a need of utilizing these limitations in an efficient way in order to accomplish such advanced energy efficiency and better lifetime can be taken care by the operation of topology control methods. In this survey the issue of energy efficiency is formed upon and a comprehensive study of topology control technologies that can be used for enhancement of battery lifetime in WSNs is presented. An insight of how energy efficiency can be achieved by design is provided by review of the significant topology control algorithms based on the energy conservation approach adopted, those algorithms are classified further and evaluated on the basis of communication so as to aid the designer to select best suitable techniques for their applications. A number of open research issues for achieving the energy efficiency by means of controlling topology are identified based on the survey conducted.
APA, Harvard, Vancouver, ISO, and other styles
10

Kang, Yingxi, Beiping Tang, and Xiaodong Hu. "High-Performance Computing Web Search System Based on Computer Big Data." Scalable Computing: Practice and Experience 25, no. 3 (April 12, 2024): 1932–39. http://dx.doi.org/10.12694/scpe.v25i3.2794.

Full text
Abstract:
File sharing, streaming media, collaborative computing, and other P2P systems are all unicast to establish the corresponding overlapping network. The superimposed network is generally carried out based on the existing primary network. In this way, the access of each node is random. At the same time, this will cause the topological structure of the upper and lower layers to be inconsistent. This will increase the communication delay between nodes and cause an excellent bandwidth burden to the underlying network. The existing topology matching methods still face problems, such as poor scalability and long node aggregation time. This paper aims to design a topological distributed node aggregation method based on network coordination and distributed hash table (DHT) algorithm. This paper established a two-dimensional mesh model of nodes based on equal-distance concentric circles and divided into two equal areas. The parts of multiple namespaces correspond one by one according to their location. Because nodes are kept close, neighbours can be aggregated through DHT's primary "publish" and "search" primitives. Experimental results show that the TANRA method can match the network's topology under a slight delay and a large number of nodes. The TANRA method can effectively reduce the path delay in structured networks.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Distributed network with mesh topology"

1

MUBEEN, SAAD. "EVALUATION OF SOURCE ROUTING FOR MESH TOPOLOGY NETWORK ON CHIP PLATFORMS." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-9591.

Full text
Abstract:

Network on Chip is a scalable and flexible communication infrastructure for the design of core based System on Chip. Communication performance of a NoC depends heavily on the routing algorithm. Deterministic and adaptive distributed routing algorithms have been advocated in all the current NoC architectural proposals. In this thesis we make a case for the use of source routing for NoCs, especially for regular topologies like mesh. The advantages of source routing include in-order packet delivery; faster and simpler router design; and possibility of mixing non-minimal paths in a mainly minimal routing. We propose a method to compute paths for various communications in such a way that traffic congestion is avoided while ensuring deadlock free routing. We also propose an efficient scheme to encode the paths.

We developed a tool in Matlab that computes paths for source routing for both general and application specific communications. Depending upon the type of traffic, this tool computes paths for source routing by selecting best routing algorithm out of many routing algorithms. The tool uses a constructive path improvement algorithm to compute paths that give more uniform link load distribution. It also generates different types of traffics. We also developed a simulator capable of simulating source routing for mesh topology NoC. The experiments and simulations which we performed were successful and the results show that the advantages of source routing especially lower packet latency more than compensate its disadvantages. The results also demonstrate that source routing can be a good routing candidate for practical core based SoCs design using network on chip communication infrastructure.

APA, Harvard, Vancouver, ISO, and other styles
2

Quan, Yongyun. "Topology-based Device Self-identification in Wireless Mesh Networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-261147.

Full text
Abstract:
In the context of the Internet of Things (IoT), commissioning is the process of securely adding a new device to a network. It covers many different tasks, including the physical deployment of devices and configuration of parameters. It is network installers who need to manually commission each device one by one with the help of commissioning tools. In practice, the first task for a network installer is to identify each device correctly before configuring it with proper parameters. Individually identifying each device, especially in a large network, is a very time-consuming process. This is also known as the identification problem. This project is going to address the problem.A novel device identification approach is presented in the thesis, and there is no human intervention involved in the identification process. Devices are trying to identify themselves based on predefined rules and given information. The approach is therefore called device self-identification, and it is implemented in two different algorithms. One is the centralized device selfidentification, and the other is the distributed device self-identification. In short, only one device participates in the device identification process in the centralized approach, and in the distributed counterpart, every device is part of the identification process.The results of the implementations show the potential of the new way to identify devices in IoT. Devices in both the centralized approach and the distributed approach are able to identify themselves given necessary information about the network. A detailed discussion regarding the two proposed algorithms and the network information is presented in the thesis.
I samband med Internet of Things (IoT) är igångkörning processen att säkert lägga till en ny enhet i ett nätverk. Den täcker många olika uppgifter, inklusive fysisk distribution av enheter och konfigurering av parametrar. Det är nätverksinstallatörer som måste manuellt beställa varje enhet en efter en med hjälp av installationsverktyg. I praktiken är den första uppgiften för en nätverksinstallatör att korrekt identifiera varje enhet innan den konfigureras med lämpliga parametrar. Att identifiera varje enhet speciellt i ett stort nätverk är en mycket tidskrävande process. Detta är också känt som identifieringsproblemet. Detta projekt kommer att ta itu med problemet.En nyhetsidentifieringsmetod presenteras i avhandlingen och det finns ingen mänsklig intervention involverad i identifieringsprocessen. Enheter försöker identifiera sig baserat på fördefinierade regler och information. Tillvägagångssättet kallas därför enhetens självidentifiering och det implementeras i två olika algoritmer, en är centraliserad enhetens självidentifiering och den andra är distribuerad enhetens självidentifiering. Kort sagt, endast en enhet deltar i enhetsidentifieringsprocessen i centraliserat tillvägagångssätt, och i distribuerad motsvarighet är varje enhet en del av identifieringsprocessen.Resultaten av implementationerna visar potentialen för det nya sättet att identifiera enheter i IoT. Enheter i både centraliserat tillvägagångssätt och distribuerat tillvägagångssätt kan identifiera sig med den information som krävs för nätverket. En detaljerad diskussion om de två föreslagna algoritmerna och nätverksinformationen presenteras i avhandlingen.
APA, Harvard, Vancouver, ISO, and other styles
3

Champenois, Florient. "Configuration et analyse temporelle de réseaux avioniques à sauts multiples." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT036.

Full text
Abstract:
Dans le domaine des réseaux temps réels critiques embarqués, la tendance est à l'augmentation des exigences en termes d'embarquabilité et de bande passante, cela afin de répondre aux nouveaux défis que proposent les véhicules autonomes et les drones. Pour répondre à ces besoins Safran mets en place un nouveau modèle certifiable de réseau distribué à topologie maillée. Cette thèse Cifre prend place au sein de ce projet, afin de proposer un ensemble de méthodes et d'outils permettant de répondre à ces défis et ainsi améliorer les réseaux critiques embarqués. Dans cet objectif, nous présentons un ensemble d'améliorations au nouveau modèle de réseau de Safran en y incorporant la redondance multi-chemins en lieu et place de la redondance multi-plans actuellement d'usage dans l'aéronautique pour satisfaire les contraintes de tolérances aux pannes. Les travaux de la thèse ont également permis l'adoption de plusieurs mesures améliorants les capacités du réseau. D'autre part, les travaux ont également porté sur la mise en place d'une méthode de calcul de borne pessimiste de pire temps de transmission. En effet, la présence de cycles d'interdépendances entre les flux de données au sein de ces réseaux, amène la très grande majorité des méthodes de calcul actuel à ne pas pouvoir converger vers un résultat. Une partie des travaux a donc consisté à produire une adaptation de l'approche trajectoire permettant d'adresser de tel réseau tout en offrant des optimisations afin d'améliorer le passage à l'échelle. La dernière partie des travaux a consisté à mettre en place une méthodologie de production de configuration réseau satisfaisant les contraintes en termes de tolérance aux pannes, de temps de transmission et d'embarquabilité. Cette méthode basée sur un algorithme génétique multicritères permet également d'optimiser la configuration produite en fonction de plusieurs critères afin d'offrir un résultat plus que satisfaisant. Enfin, les travaux présentés dans cette thèse sont validés à l'aide d'un ensemble complet d'expérimentations permettant de conclure à la pertinence des propositions
In the field of embedded real times critical networks, the current trend is to increase requirements in terms of embeddability and bandwidth, in order to meet the new challenges posed by autonomous vehicles and drones. To meet these needs, Safran is establishing a new certifiable model of a distributed network based on a mesh topology. This thesis is taking place within this project, in order to propose a set of methods and tools to meet these needs and thus improve embedded critical networks.With this objective in view, the thesis consisted, firstly, of presenting a range of improvements to Safran's new network model by incorporating multi-path redundancy in place of the multi-plane redundancy currently used in aeronautics to satisfy fault tolerance constraints. The thesis also led to the adoption of several measures to improve others networks capabilities.Secondly, the work also focused on the implementation of a method for calculating a pessimistic worst-case transmission time bound. The presence of cycles of dependencies between data flows within these networks impedes the vast majority of current computation methods to converge on a result. Part of the work has therefore consisted in producing an adaptation of the trajectory approach that can address such networks, while offering optimizations to improve scaling.The final part of the work involved implementing a methodology to produce network configurations that satisfy constraints in terms of fault tolerance, transmission time, and embeddability. This method, which is based on a multi-criteria genetic algorithm, also enables the configuration produced to be optimized as a function of several criteria in order to offer a more than satisfactory result.Finally, the approaches presented in this thesis are tested using a complete set of experiments, allowing us to conclude that it is pertinent
APA, Harvard, Vancouver, ISO, and other styles
4

Scheidemantel, Austin, Ibrahim Alnasser, Benjamin Carpenter, Paul Frost, Shivhan Nettles, and Chelsie Morales. "Situational Wireless Awareness Network." International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604295.

Full text
Abstract:
ITC/USA 2010 Conference Proceedings / The Forty-Sixth Annual International Telemetering Conference and Technical Exhibition / October 25-28, 2010 / Town and Country Resort & Convention Center, San Diego, California
The purpose of this paper is to explain the process to implementing a wireless sensor network in order to improve situational awareness in a dense urban environment. Utilizing a system of wireless nodes with Global Positioning System (GPS) and heart rate sensors, a system was created that was able to give both position and general health conditions. By linking the nodes in a mesh network line of sight barriers were overcome to allow for operation even in an environment full of obstruction.
APA, Harvard, Vancouver, ISO, and other styles
5

Mudali, Pragasen. "Topology control for wireless mesh networks and its effect on network performance." Thesis, University of Zululand, 2017. http://hdl.handle.net/10530/1565.

Full text
Abstract:
A thesis submitted to the Faculty of Science and Agriculture in fulfilment of the Degree of Doctor of Philosophy in the Department of Computer Science at the University of Zululand, 2017
InfrastructureWireless Mesh Networks (I-WMNs) are increasingly used to provide network connectivity and Internet access to previously under-served areas in the developing world. It is common for some of these deployments to be battery-powered due to a lack of electrical infrastructure in the targeted areas. Thus, the energy-efficiency of these networks gains additional importance. Topology Control (TC) has been previously reported to improve the energy-efficiency and network performance of wireless ad-hoc networks, including I-WMNs. However,simulation-based studies have been relied upon to reach these conclusions and the study of TC prototypes applicable to I-WMNs has largely been limited to design issues. Thus, the study of the efficacy of TC prototypes as a mechanism for improving energy-fficiency and network performance remains an open issue. The thesis addresses this knowledge gap by studying the dynamic, run-time behaviours and the network topologies created by two standards-compatible TC prototypes. This study provides unique insight into how the prototypes consume computational resources, maintain network connectivity, produce cumulative transceiver power savings and affect the workings of the routing protocol being employed. This study also documents the topology instability caused by transceiver power oscillations produced by the PlainTC prototype. A context-based solution to reduce transceiver power oscillations and the subsequent topology instability is proposed. This solution applies the Principal Component Analysis statistical method to historical network data in order to derive the weights associated with each of the identified context variables. A threshold value is defined that only permits a node to adjust its transceiver power output if the observed change in a node’s context exceeds the threshold. The threshold mechanism is incorporated into the PlainTC+ prototype and is shown to reduce topology instability whilst improving network performance when compared to PlainTC.The results obtained in this study suggest that I-WMN topologies formed by TC are able to closely match the performance of networks that do not employ TC. However, this study shows that TC negatively affects the energy efficiency of the network despite achieving cumulative transceiver power savings.
APA, Harvard, Vancouver, ISO, and other styles
6

Dharmaraj, Anusha. "Distributed Topology-based Resource Allocation for a Femtocell-based Cellular Network." University of Cincinnati / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1439281440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kobo, Hlabishi. "Situation-aware routing for wireless mesh networks with mobile nodes." Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6647_1370594682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Castmo, Thomas. "Analysis of a wireless mesh network : investigating technologies and building prototypes for a distributed radio network /." Göteborg : IT University of Göteborg, 2005. http://www.ituniv.se/w/index.php?option=com_itu_thesis&Itemid=319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Komali, Ramakant S. "Game-Theoretic Analysis of Topology Control." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/28358.

Full text
Abstract:
Ad hoc networks are emerging as a cost-effective, yet, powerful tool for communication. These systems, where networks can emerge and converge on-the-fly, are guided by the forward-looking goals of providing ubiquitous connectivity and constant access to information. Due to power and bandwidth constraints, the vulnerability of the wireless medium, and the multi-hop nature of ad hoc networks, these networks are becoming increasingly complex dynamic systems. Besides, modern radios are empowered to be reconfigurable, which harbors the temptation to exploit the system. To understand the implications of these issues, some of which pose significant challenges to efficient network design, we study topology control using game theory. We develop a game-theoretic framework of topology control that broadly captures the radio parameters, one or more of which can be tuned under the purview of topology control. In this dissertation, we consider two parameters, viz. transmit power and channel, and study the impact of controlling these on the emergent topologies. We first examine the impact of node selfishness on the network connectivity and energy efficiency under two levels of selfishness: (a) nodes cooperate and forward packets for one another, but selfishly minimize transmit power levels and; (b) nodes selectively forward packets and selfishly control transmit powers. In the former case, we characterize all the Nash Equilibria of the game and evaluate the energy efficiency of the induced topologies. We develop a better-response-based dynamic that guarantees convergence to the minimal maximum power topology. We extend our analysis to dynamic networks where nodes have limited knowledge about network connectivity, and examine the tradeoff between network performance and the cost of obtaining knowledge. Due to the high cost of maintaining knowledge in networks that are dynamic, mobility actually helps in information-constrained networks. In the latter case, nodes selfishly adapt their transmit powers to minimize their energy consumption, taking into account partial packet forwarding in the network. This work quantifies the energy efficiency gains obtained by cooperation and corroborates the need for incentivizing nodes to forward packets in decentralized, energy-limited networks. We then examine the impact of selfish behavior on spectral efficiency and interference minimization in multi-channel systems. We develop a distributed channel assignment algorithm to minimize the spectral footprint of a network while establishing an interference-free connected network. In spite of selfish channel selections, the network spectrum utilization is shown to be within 12% of the minimum on average. We then extend the analysis to dynamic networks where nodes have incomplete network state knowledge, and quantify the price of ignorance. Under the limitations on the number of available channels and radio interfaces, we analyze the channel assignment game with respect to interference minimization and network connectivity goals. By quantifying the interference in multi-channel networks, we illuminate the interference reduction that can be achieved by utilizing orthogonal channels and by distributing interference over multiple channels. In spite of the non-cooperative behavior of nodes, we observe that the selfish channel selection algorithm achieves load balancing. Distributing the network control to autonomous agents leaves open the possibility that nodes can act selfishly and the overall system is compromised. We advance the need for considering selfish behavior from the outset, during protocol design. To overcome the effects of selfishness, we show that the performance of a non-cooperative network can be enhanced by appropriately incentivizing selfish nodes.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
10

Simmons, Randall J. Curran Christopher C. "Mesh networks within a distributed operations framework utilizing IP based radios." Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FSimmons.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2007.
Thesis Advisor(s): Bordetsky, Alex. "September 2007." Description based on title screen as viewed on Oct. 22, 2007. Includes bibliographical references (p. 93-95). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Distributed network with mesh topology"

1

Kang, Cheoul Shin. Hybrid-Meshnet, a local area mesh network with distributed control. 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kang, Cheoul Shin. Hybrid-Meshnet, a local area mesh network with distributed control. 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Distributed network with mesh topology"

1

You, Chuanchuan, Tong Wang, BingYu Zhou, Hui Dai, and Baolin Sun. "A Distributed Energy-aware Trust Topology Control Algorithm for Service-Oriented Wireless Mesh Networks." In Lecture Notes in Computer Science, 276–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13498-2_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Khedkar, Archana B., and Vinayak L. Patil. "Computer Network Optimization Using Topology Modification." In Intelligent Distributed Computing, 117–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-11227-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Friese, Philipp A., and Martin Schulz. "Exploring the ARM Coherent Mesh Network Topology." In Architecture of Computing Systems, 221–35. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-66146-4_15.

Full text
Abstract:
AbstractThe continuously rising number of cores per socket puts a growing demand on on-chip interconnects. The topology of these interconnects are largely kept hidden from the user, yet, they can be the source of measurable performance differences for large many-core processors due to core placement on that interconnect. This paper investigates the ARM Coherent Mesh Network (CMN) on an Ampere Altra Max processor. We provide novel insights into the interconnect by experimentally deriving key information on the CMN topology, such as the position of cores or memory and cache controllers. Based on this insight, we evaluate the performance characteristics of several benchmarks and tune the thread-to-core mapping to improve application performance. Our methodology is directly applicable to all ARM-based processors using the ARM CMN, but in principle applies to all mesh-based on-chip networks.
APA, Harvard, Vancouver, ISO, and other styles
4

Sekiyama, Kosuke, and Hirohisa Araki. "Network Topology Reconfiguration Based on Risk Management." In Distributed Autonomous Robotic Systems 8, 27–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00644-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rahman, M. M. Hafizur, Rizal Mohd Nor, Md Rabiul Awal, Tengku Mohd Bin Tengku Sembok, and Yasuyuki Miura. "Long Wire Length of Midimew-Connected Mesh Network." In Distributed Computing and Internet Technology, 97–102. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-28034-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Afroz, Nahid, Bhabani P. Sinha, Rabiul Islam, and Subir Bandyopadhyay. "A New Network Topology with Multiple Three-Dimensional Meshes." In Distributed Computing - IWDC 2004, 379–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30536-1_42.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jamakovic, A., D. C. Dimitrova, M. Anwander, T. Macicas, T. Braun, J. Schwanbeck, T. Staub, and B. Nyffenegger. "Real-World Energy Measurements of a Wireless Mesh Network." In Energy Efficiency in Large Scale Distributed Systems, 218–32. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40517-4_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pham, Van Dai, Duc Tran Le, Ruslan Kirichek, and Alexander Shestakov. "Research on Using the AODV Protocol for a LoRa Mesh Network." In Distributed Computer and Communication Networks, 149–60. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-66471-8_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Angskun, Thara, George Bosilca, and Jack Dongarra. "Binomial Graph: A Scalable and Fault-Tolerant Logical Network Topology." In Parallel and Distributed Processing and Applications, 471–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-74742-0_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bocewicz, Grzegorz, Andrzej Jardzioch, and Zbigniew Banaszak. "Modelling and Performance Evaluation of Fractal Topology Streets Network." In Distributed Computing and Artificial Intelligence, 13th International Conference, 483–94. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40162-1_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Distributed network with mesh topology"

1

Mao, Yingling, Yu Liu, Xiaojun Shang, and Yuanyuan Yang. "Network Topology Design for Distributed Quantum Computing." In 2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS), 1213–23. IEEE, 2024. http://dx.doi.org/10.1109/icdcs60910.2024.00115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chi, Sulin, and Tetsuya Shimamura. "Topology Reconstruction Approach for Distributed Blind Equalization Over Sensor Network." In 2024 IEEE SENSORS, 1–4. IEEE, 2024. https://doi.org/10.1109/sensors60989.2024.10785092.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, Youyao, and Jungang Han. "A Mesh-Connected Rings Topology for Network-on-Chip." In 2012 13th International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT). IEEE, 2012. http://dx.doi.org/10.1109/pdcat.2012.142.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kong, Zhen, Cheng-Zhong Xu, and Yu-Kwong Kwok. "Downlink Resource Auction in a Tree Topology Structured Wireless Mesh Network." In 2010 IEEE 16th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 2010. http://dx.doi.org/10.1109/icpads.2010.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Avakyan, Yulia, Ekaterina Kuznetsova, and Ruslan Kirichek. "Methodology for testing LPWAN networks with mesh topology." In ICFNDS '20: The 4th International Conference on Future Networks and Distributed Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3440749.3442623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Prasad, Rajesh, Hongyi Wu, Dmitri Perkins, and Nian-Feng Tzeng. "Local Topology Assisted XOR Coding in Wireless Mesh Networks." In 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops). IEEE, 2008. http://dx.doi.org/10.1109/icdcs.workshops.2008.97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Zhu, H., K. Lu, and M. Li. "Distributed Topology Control in Multi-Channel Multi-Radio Mesh Networks." In 2008 IEEE International Conference on Communications. IEEE, 2008. http://dx.doi.org/10.1109/icc.2008.557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ranjitkar, Arun, Sung-Won Lee, and Young-Bae Ko. "Distributed Web-Topology Formation with Directional Antenna in Mesh Environment." In 2008 Fourth International Conference on Networked Computing and Advanced Information Management (NCM). IEEE, 2008. http://dx.doi.org/10.1109/ncm.2008.216.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ghosh, Amitabha, Yi Wang, and Bhaskar Krishnamachari. "Efficient Distributed Topology Control in 3-Dimensional Wireless Networks." In 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks. IEEE, 2007. http://dx.doi.org/10.1109/sahcn.2007.4292821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ishii, Tomoyuki, and Atsushi Inoie. "An Efficient Topology Construction Algorithm for Mesh-Pull Peer-to-Peer Streaming Networks." In Parallel and Distributed Computing and Systems. Calgary,AB,Canada: ACTAPRESS, 2012. http://dx.doi.org/10.2316/p.2012.757-022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography