Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
As DWDM networks proliferate there is a growing need to address the issue of distributed interdomain lightpath provisioning. Although inter-domain provisioning has been well-studied for packet/cellswitching networks, the wavelength dimension presents many additional challenges. This paper develops a novel hierarchical GMPLS-based framework for provisioning all-optical and opto-electronic multi-domain...
We consider a system where each user has a public key and a private key. In this system, a certificate is a data item that is issued by one user u and contains the public key of another user v. A third user w that knows the public key of u can verify that this certificate has not been corrupted (by an adversary) since it was issued by u, and so can accept the public key in the certificate as the correct...
The Internet traditionally provides best effort service to all applications. While elastic applications are satisfied by this service, inelastic applications such as interactive audio and video suffer from end-to-end delay guarantees. Although guaranteed rate schedulers were developed to provide such guarantees, their scalability has been a concern because they maintain per-flow state. In an effort...
Wireless networks have the feature that the data-rate in a wireless link varies with the signal quality. TCP congestion control cannot handle such data-rate variation in the wireless link and its performance deteriorates. In this paper, we propose a TCP flow control scheme that suits 3G mobile communication systems. The proposed flow control scheme can rapidly respond to data-rate variations by having...
We present a competition detection mechanism for parallel TCP flows and use this to propose a new parallel TCP congestion control scheme called adaptive TCP-P (A-TCP-P). A-TCP-P automatically controls the aggregated aggressiveness of parallel TCP flows to fairly share network bandwidth with single TCP flows independently from the number of the parallel TCP flows while effectively utilizing available...
This paper proposes an attack-resilient routing architecture, called cross-layer active re-routing (CARE), for mobile ad hoc networks (MANETs). Different from existing solutions, CARE does not focus on a particular type of attack, but instead takes a fundamentally general approach-it achieves resilience against a wide range of routing disruption Denial- of-Service (DoS) attacks by treating them and...
Computing and networking systems have been widely used in almost every sector of society. However, they are limited by their capabilities in terms of security, reliability, performance, and scale-ability. We will discuss the various challenges posed by the design and implementation of the computing and networking systems. We will introduce some major initiatives taken by the National Science Foundation...
We consider the problem of allocating bandwidth to a set of traffic flows at a statistical multiplexer to provide both quality-of-service (QoS) and resistance to a class of denial- of-service (DoS) attacks. The target application is QoS signaling in a mobile ad hoc network (MANET) environment where the channel bandwidth is variable and the mobile device handles bandwidth requests arriving from multi-hop...
Layer 1 virtual private network (LI-VPN) is new emerging framework that allows clients to directly set up logical topologies and provision their own services without deploying expensive network infrastructure. Emerging and current networks are partitioned in different domains in order to implement different associated administrative, management, control boundaries. For carriers operating multi-domain...
Span protecting p-cycle has been shown to be a promising approach for survivable WDM network design because of its ability to achieve ring-like recovery speed while maintaining the capacity efficiency of a mesh-restorable network. In [12], the concept of span protecting p-cycle is extended to path-segment protecting p-cycle (flow p-cycle for short) which can protect a multi-span segment of a working...
Simulation is crucial to performance evaluation of switches. Currently stochastic simulation is the predominant approach, which has two drawbacks: few workload patterns and long simulation times. In this paper, we propose a novel switch simulation method that is based on two techniques: exhaustive workload pattern generation and smoothed periodic input generation. The exhaustive workload pattern generation...
In this paper, we developed a local-centralized adaptive clustering algorithm, Two-phase Cluster Formation algorithm (TCF), which concerns not only energy efficiency but also the reliability and the steadiness of the wireless sensor networks. TCF proposes a local-centralized mechanism to elect cluster-heads which makes election of cluster-head more reasonable and improves the efficiency of energy...
Smart route control is being increasingly used as a way to dynamically improve the end-to-end performance of the outbound traffic of multihomed stub domains. However, all the solutions available at present have in common two drawbacks which are key motivations for this work. First, all solutions are standalone, so no routing control interactions exist between the domains sourcing and sinking the traffic...
A large number of clusters are being used in all different organizations such as universities, laboratories, etc. These clusters are, however, usually independent from each other even in the same organization or building. To provide a single image of such clusters to users and utilize them in an integrated manner, cluster-of-clusters has been suggested. However, since research groups usually do not...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.