The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We define k-content connectivity as the reachability of at least one content from any point of a data center network under concurrent k-1 failures. A flexible content placement algorithm is proposed to achieve k-content connectivity.
Facing with the huge P2P traffic challenge, network coding shows great advantages in improving system efficiency. This paper proposed a solution to integrate network coding into passive optical networks and compatible with the existing Ethernet passive optical network named NC-PON. To increase more efficiency, a software defined passive optical networks with network coding (SDNC-PON), which combines...
With the growth of cloud computing and other high-bitrate disaster recovery center (DRC) support service, DRC networks play an important role in the future networks. But the nature or man-made disaster is the main threaten of survivability. In this paper, we focus on the protection of DRC node based on contentconnectivity against disaster in disaster recovery center networks. An integer linear programming...
We discuss the role of multi-layer plan in PON design and introduce a PON planning tool. Starting from the multi-layer mapping and routing mechanism, the automatic plan algorithm of multi-layers and related failure simulation are analyzed. Automatic planning and failure simulation based on the multi-layer model are experimentally demonstrated.
A channel-sharing method was proposed to improve the bandwidth and energy efficiency per detection task in wireless sensor network. The sensor nodes transmitted their log-likelihood ratios (LLR) to the fusion center in approximately descending order of the absolute value of their LLRs by modifying the value of backoff timer and frame interval according to the values of their LLRs. Simulation results...
We optimized circular Bragg grating reflectors to achieve high reflection (>0.95) over a wide bandwidth (339nm, reflectance higher than 0.8) for TE mode and to reduce footprint just to 10.96 μm2.
The FlexRay communication protocol is expected to be the de-facto technique standard for the next generation high-speed networks on vehicles. A number of recent studies has thus investigated message scheduling techniques for FlexRay systems. However, most existing work focused on either the scheduling of periodic messages on the static segment or the scheduling of hard aperiodic messages on the dynamic...
In this paper, a 30GHz horn antenna with different feeding structures is discussed based on low temperature co-fired ceramic (LTCC) technology. The antenna with high gain is first designed by analyzing operation mechanisms of horn antennas and its implementation on LTCC structures. Then, radiation patterns are studied under stripline and microstrip feedings. The achieved fractional bandwidth is from...
Name-based routing in content-centric networks leads to a paradigm shift from a host-to-host to a host-to-content communication model. However, name-based routing faces many challenges. In this paper, we mainly focus on the scalability challenge and address it via a hybrid, reactive routing approach, where we augment the content-centric networking design with an Infrastructure Information Base (IIB)...
Network virtualization decouples the traditional Internet Service Provider (ISP) into the infrastructure provider (InP) and the service provider (SP). Disruptive technologies hence can be easily employed by the SP and transparently mapped to the physical network managed by the InP after resolving the network embedding problem. In this work, we investigate the survivable network embedding (SNE) problem...
In this paper, we study the virtual network embedding (VNE) problem in the network virtualization context, which aims at mapping the virtual network requests of the service providers (SPs) to the substrate networks managed by the infrastructure providers (InPs). Given the NP-Completeness of the VNE problem, prior approaches primarily rely on solving/relaxing the link-based Integer Linear Programming...
Network virtualization is regarded as a promising solution to the revolution of the current Internet. With virtualization, disruptive technologies can be easily deployed over the logic (service) network and transparently mapped to the physical network via the network embedding process. In this work, we address the survivability issue in the virtualization context via resolving the survivable network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.