The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As for the traditional Internet, network management usually did not evolve together with the newly introduced networking technology, and becomes a post-technology these days. In order to avoid patching Software-Defined Networking (SDN) later, an additional management plane may possibly be of great significance. Currently, both SDN management and non-SDN network management still coexist, and Simple...
This paper considers the second-order consensus problem of discrete-time multi-agent systems over fixed and undirected network topologies. A distributed consensus protocol utilizing the current and one-step delayed position information is proposed. It is interesting to found that second-order consensus in such a discrete-time multi-agent system cannot be ensured without any one-step delayed position...
Considering the problem of unified description of data modeling languages for computer network management, information specification ontology may be a prospective solution. However, basics of a unified mathematical theory are still lacking for ontology building. Delighted by the philosophical thinking of conceptual scheme for descriptive metaphysics, this paper tries to utilize formal concept analysis...
Based on the analysis of accomplishments and trends of modern technologies (such as the computer, wireless communication, creature science, nanotechnology, medical science, et al.), this paper makes a prediction of the future network, and proposes a new concept - the human body network (HBN), which is formed by people around the world whom are equipped with special micro chip in their body. The HBN...
In this paper, we present an extensible, component-oriented, concurrent discrete-event driven wireless sensor network simulation platform: H-Sim. The components of the H-Sim system have high reusability and low coupling, it can solve the problems of having high coupling between modules and difficult to debug and use which exist in other simulation systems like NS-2. H-Sim can simulate the sensor nodes...
The efficient configuration management of heterogeneous network devices from different vendors is a great challenge. The network configuration protocol (NETCONF) is presented as a new solution. It aims to overcome the shortcomings of simple network management protocol (SNMP) and command line interface (CLI) which are predominantly used for configuration tasks at present. This paper gives an architecture...
These days, P2P technologies, in particular, have been emerging as a promising solution that may be used in the field of network management. This paper first studies current evolution of network management solutions. Then an evaluation of existing solutions is provided and P2P technologies are then introduced to make up their limitations in term of performance, scalability, flexibility, maintainability...
These days, the NETCONF protocol has evolved as an XML-based standardization to meet the ever-pressing configuration management demands. And with the emergence of NETCONF, it is expected that a separate effort to study data modeling in the interest of network management should be undertaken. XML schema and YANG have become two main candidate data modeling languages for NETCONF-based network management...
We present a mathematical framework for the performance evaluation of proactive and reactive routing protocols operating in mobile ad hoc networks (MANETs). The model captures the functionality of the routing protocols together with the characterization of the performance of the medium access control protocol (MAC). It reveals the interplay between the protocol functionality and network parameters,...
With the popularity of heterogeneous network devices and security products, pervasive network security management has been a fashion. However, a chief problem lies in how to characterize various attack scenarios from the viewpoint of both security information and security policies for automation. This paper discusses the potential of applying an integration of ontology-based and policy-based approaches...
In mobile ad hoc networks (MANETs), nodes mobility causes network topologies to change dynamically over time, which complicates important tasks such as broadcasting and routing. Neighborhood tracking is a task to determine the neighborhood local view of a mobile node in time which can facilitate the forwarding decision in the design of network protocols. In this paper, we propose a predictive synchronization...
We consider broadcast protocols in wireless networks that have limited energy and computation resources. There exist localized power aware broadcast protocols with directional antennas in the literature. They assume, however, impractical models where two nodes can communicate if and only if they exist within their transmission radius. In this paper, we consider practical models for localized power...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.