The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While extending network programmability to a larger degree, P4 also raises the risks of incurring runtime bugs after the deployment of P4 programs. These runtime bugs, if not handled promptly and properly, can ruin the functionality and performance of networks. Unfortunately, the absence of runtime debuggers makes troubleshooting of P4 program bugs challenging and intricate for operators. This paper...
Aiming at providing united control of multi-domain optical networks orchestration, we design the Federated Platform based on Open Network Operating System (ONOS). Our implementation includes adding and extending modules in ONOS to provide the global view of multi-domain networks and support cross-domain end-to-end services by communicating with the individual domain controllers through RESTCONF protocol...
A smart computing system is usually composed of smart mobile nodes, such as mobile phones and/or sensor nodes. In this paper, we study the consensus problem in a smart computing system, which has many applications in smart computing, such as smart grid. Due to mobility and failures, smart computing nodes may join and leave a system from time to time. Such dynamicity in node set of a smart computing...
Traffic classification, a mapping of traffic to network applications, is important for a variety of networking and security issues, such as network measurement, network monitoring, as well as the detection of malware activities. In this paper, we propose Securitas, a network trace-based protocol identification system, which exploits the semantic information in protocol message formats. Securitas requires...
We consider the problem of organizing a scattered group of n robots in two-dimensional space. The communication graph of the swarm is connected, but there is no central authority for organizing it. We want to arrange them into a sorted and equally-spaced array between the robots with lowest and highest label, while maintaining a connected communication network. In this paper, we describe a distributed...
IEEE1588 standard Precision Time Protocol (PTP) is proposed to solve the high precision time synchronization problems in the application field. This technique will be ported to LINUX + inhibits PTP program POWERPC platform, makes it with the support of hardware timestamp of 100 ns level timing accuracy. We tested and analyzed software and hardware timestamp that affects the performance of GPS clock...
Service composition, which provides a more effective way to combine several single services into a composite service, is a kind of software reuse techniques. However, one of the most important problems is how to perform service composition correctly and effectively so as to produce high-quality source codes for describing the resulted composite service. In this paper, we propose a model-driven method...
Analysis model for routing protocols for wireless ad hoc networks is significant helpful, since it can be employed to investigate to highlight the most considerable ingredient, enlighten the heuristic approach, provide landmark for performance evaluations, and so forth. A fundamental issue in multicast over an ad hoc network is that what is the optimal multicast throughput in such an environment and...
In this paper, we consider the important aspect of quality of service (QoS) in wireless mesh networks, focusing on packet delays and packet drops. We observe that the options of solely focusing on throughput, and of only depending on the QoS type characterization by the application level protocol is not sufficient. We propose the use of multiple queues to hold the packets based on their QoS requirement...
Due to high mobility, highly dynamic topology and unreliable communication medium of Mobile Ad Hoc Networks (MANETs), nodes mobility must be taken into account in design of a service discovery protocol for such environment. A novel approach, Mobility-aware Attenuated Bloom Filters (maBF), to perform effective and efficient service discovery in MANETs is proposed in this paper. In order to guarantee...
This paper considers the possible application of ride share services in vehicular area networks. We propose a system architecture and protocol for this specific application using the vehicle to vehicle (V2V) and vehicle to road (V2R) communications. We present how the system would integrate with the current VANET infrastructure and the On-Board Unit, and present algorithms for selection of ride share...
In this paper, we propose a hybrid mobile communication approach rendered for the use in remote monitoring system. Based on the various mature, commercial and low cost mobile communication networks, the proposed technique can scheme multiple mobile communication modes and links. Since the protocol is open, general and extensible, functions are divided into three layers, i.e., application layer, data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.