The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Routing design is widely considered as one of the most challenging parts of enterprise network design. The challenges come from the typical large scale of such networks, the diverse objectives to meet through design, and a wide variety of protocols and mechanisms to choose from. As a result network operators often find it difficult to understand and trouble-shoot the routing design of their networks...
In traditional query processing approaches, execution engine executes query according to an efficient query execution plan generated by query optimizer. However, PDBMS (Peer-based Database Management System) runs in an unpredictable environment, where optimizer is not able to generate an efficient query execution plan based on available statistics. We present a distributed, adaptive data integration...
The goal of enabling ubiquitous video broadcasting on the Internet has been a long cherished vision in the networking community. Prior efforts aimed at achieving this goal based on the IP Multicast architecture have been unsuccessful. In recent years, peer-to-peer (P2P) streaming has emerged as a promising alternative technology, which has matured to the point that there are several commercial offerings...
Data replication is a common method to reduce the bandwidth consumption and the access latency in distributed systems. The existing replication methods mostly deal with the read-only data, thus the replica management mechanism is relatively simple. Most replication methods replicate files in all nodes or two endpoints on a query path. Naturally, the larger number of replicas, the better performance...
The existing replica location services mostly deal with read-only data, thus the replica location mechanism is relatively simple. This paper aims to provide global replica view in logic for better supporting all-around replica management to realize optimal replication strategy and replication selection strategy. We present the bidirectional linked list based replica location service (BLL-RLS) on tree-based...
IEC 61850 is a new international standard for the communication networks and systems in substation which allows the implementation of high-speed peer-to-peer communication based applications. The new standard has significant impact on the development in power system protection and provides a vehicle for future advances in many areas. All major substation protection and control equipment manufactures...
The mechanism for a peer to randomly choose logical neighbors, without any knowledge about the physical topology, causes a serious topology mismatch between the overlay networks and the physical network. A flooding-based search is robust to node failure, but the response message will be lost if any node on the response path fails, and the flooding search may causes heavy network traffic. In order...
The topological properties of P2P overlay networks are the key factor that dominates the performance of search. Most systems construct logical overlay topologies without considering the underlying physical topology, which causes a serious topology mismatch between the P2P overlay network and the physical network. Thus location of the underlying network should be taken into account during the construction...
In this paper, we present an extensive study of key dissemination schemes in an overlay multicast context, and the first to involve actual implementation, real traces, and performance in Internet environments. Given that rekey traffic has stronger resilience requirements and is burstier than data traffic, we consider whether data and keys must be distributed using the same overlay or using two separate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.