The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The router’s buffer accommodates transient packets to guarantee that the network’s links do not become idle. However, buffer overflow causes packet loss, which is a signal of congestion. In content centric networking (CCN), the interest packet, which is used for requesting content, may be dropped due to such congestion. Each interest packet is assigned a specific lifetime, and when the lifetime expires...
Content Centric Networking (CCN) is one of the Future Internet architectures that aims at improving content distribution and retrieval, where content is requested by name rather than IP address. Each content is partitioned into small units, namely chunks. In CCN, the consumer sends Interest packet in order to get a chunk of Data. Upon successful reception of the requested chunk, the consumer sends...
Most existing work on path computation has been focused on the shortest-path problem, which is to find the optimal path between an origin and destination pair. To get an optimal route, they usually consider travel time moving forward on the road and distance from a source to a target as crucial factors to value and select a path. However, it is not sufficient for real life traffic. Firstly, when we...
In the initial proposal of Content Centric Networking (CCN), routers store all passing contents (a content composed of several segments). So, in the best case, the routers provide the contents directly to the users when the requested contents are stored in its cache. In the worst case, the requested content is just only located at the original server which is faraway from the current Autonomous System...
Internet has grown very rapidly in the last couple of decades and still growing because of the expansion and utilization of various services and applications. Consequently, demand of delay and throughput sensitive services, like audio/video is also increasing. Information Centric Networking (ICN) is proposed as an architecture for the future Internet to meet the modern users and application requirements...
The revolutionized vision of IoT has united heterogeneous devices to foster the systems of cohesive intelligent things. In addition, Fog computing has also envisioned a new form of cloud computing paradigm. Therefore, Fog provides edge computing to such IoT devices with varied capabilities and resources. However, a balanced and efficient pairing or matching strategy for edge IoT nodes is crucial to...
Recently cloud service has been introduced in order for many enterprises to achieve purposes such as improvement in efficiency, cost reduction and revolution in business process. However spoofing or poison attacks on VM inside the cloud cause the deterioration of cloud system and those attacks can make the huddle for spreading the cloud services. Many researches are now under way to solve such problems...
Content Centric Networking (CCN) is one of the most promising network architectures of future Internet. In CCN, Content Router (CR) floods request in the network to find the content. This flooding may degrade the network performance by generating too much traffic. Also, in legacy CCN architecture, each CR caches all contents that pass through it. Thus, same contents are replicated in all CRs along...
To gather data of a larger area and improve the capability in the system, vehicles in Vehicular Ad-hoc NETworks (VANETs) are organized into clusters. Moreover, the effectiveness of application in VANET depends on performance of Medium Access Control (MAC) protocol. In addition, cluster-based MAC protocols can avoid or limit channel contention, provide fairness to channel access, increase radio network...
In Content Centric Network, caching and forwarding schemes can affect the performance of the whole network. The original caching and forwarding schemes are simple, but these schemes have some drawbacks. Firstly, the original caching scheme stores the same content on several neighboring routers along the request path. This redundant caching does not use the limited storage space available to the routers...
The forthcoming Intelligent Transportation System aims to achieve safety and productivity in transportation using vehicular ad hoc networks (VANETs) to support the communications system required. Currently, some clustering approaches have been proposed to improve the performance of VANETs due to their dynamic nature, high scalability and load balancing results. However, the host mobility and the constantly...
Intrusion detection system (IDS) is one of the basic components of network security. IDS can use signatures or abnormal behaviors to detect attacks. When IDS uses signatures, in order to detect more attacks, we have to implement more attack signatures on IDS. However, in resource-constrained wireless sensor networks, it is not efficient to implement all of attack signatures. And it is hard to maintain...
Recently, one of the most popular applications on the Internet is the social networking, such as, Facebook and Twitter. Finding resources using recent Peer-to-Peer (P2P) schemes in a social network has limits, such as distance problem between peers etc. So, in this paper, we present an efficient social P2P management scheme based on interesting keywords. We compare our proposal with the recent P2P...
The conventional method of joint rate and power control (JRPC) relies on high signal-to-interference ratio (SIR) assumption which achieves only suboptimal results. By using a novel successive convex approximations method, we can attain the global optimal source rates and link powers in a distributed fashion exploiting message passing. Through simulations, our method converges faster than the previous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.