The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cartesian routing is an alternative to existing routing techniques. Its basic principle is that the network is topologically dependent instead of routing table dependent. Cartesian routing does not use routing tables, so the routing table searching time is eliminated. Cartesian core routing (CCR) was proposed to replace BGP and become the backbone routing protocol without influencing network end users...
Networking, communications and computing research employ state-of-the-art infrastructure and facilities to develop and test next generation Internet applications including electronic education and electronic health. With this focus, the Internetworking Program at Dalhousie University has established an Advanced Internetworking Laboratory (AIL) research and development space in Atlantic Canada. The...
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become relevant. The rising threat of cyber attacks makes the IP traceback problem very relevant to today's Internet security. Unfortunately, there is no easy way to track IP traffic to its source due to the stateless nature of the IP protocol, and to the use of concealment techniques such...
In this paper, a modeling toolkit is proposed for modeling user behavior from FTP server log files. This toolkit can develop analytical models from the data at hand with minimum assumptions. Analytic models are intended to be data driven, which means users are not required to be experts on mathematics or statistics. Moreover, the toolkit provides a simple yet practical way to generate simulated traffic...
In mobile networks, when the mobile terminal (MT) has an active call while crossing the boundary of two systems, it is required that the existing connection shouldn't be lost. To meet this demand, the signaling protocol of mobility management must be designed for supporting location registration and call delivery for roaming users who move beyond their home network. The objective of this paper is...
IP address lookup is a multifaceted problem because of increasing routing table sizes, increased traffic, higher speed links, and the migration to 128 bit IPv6 addresses. Routers bring into play the packet's destination address to determine for each packet the next hop. IP address lookup is complicated because it requires a longest matching prefix search. We propose a CREW based multiprocessor organization...
This paper presents a study of our proposed architecture for the setup of a multipoint-to-multipoint (MP2MP) label switched path (LSP). This form of LSP is needed for establishing uni-directional multicast shared trees. Such trees are required for information distribution in applications such as video conferencing. The presented architecture is intended for multicast applications within a single autonomous...
We propose a novel software defined radio implementation of a four-channel transceiver testbed with signaling-wavelength-spaced antennas. The radio frequency (RF) side of the system will be implemented using commercial off the shelf (COTS) products, whereas the baseband processing portion of the system will be implemented on a pair of Altera Stratix II EP2S180 development boards with high-speed analog...
We introduce the comprehensive information filtering system (CIFS), an architecture for information filtering for mobile users that takes into account not only information relevance but also adaptive context, trust, privacy, and mobility. The uniqueness of the approach lies in the application of several implicit and explicit user profiling methods with the goal of building an in-depth, adaptive user...
One of the most important phases of the IDS/IPS design identifies the set of features that the system will use. This decision may influence both the performance of the system, and the types of attacks that it will detect. We present a feature classification schema for network intrusion detection, along with the implementation design, intended to provide a better understanding regarding the features...
This paper presents two MIMO-MB-OFDM UWB systems which include the space-time block coded MB-OFDM (STBC-MB-OFDM) UWB and convolutional space-time block coded MB-OFDM (CCSTBC-MB-OFDM) UWB. A series of experiments is conducted over the UWB channels with 2ISO and 2I2O configurations. Experimental results indicate that the 2I2O STBC-MB-OFDM is applicable to the real-time multimedia service in the general...
While many scheduling algorithms have been proposed so far for input buffered crossbar switches, the challenge still remains to develop low complexity scheduling algorithms. These algorithms should be easy to implement and provide higher throughput and better utilization of switch space under both uniform and non-uniform traffic arrivals. In this paper, we propose modifications for two established...
A new forecasting technique called the extended structural model (ESM) is presented. This technique is derived from the basic structural model (BSM) by the introduction of extra parameters that were assumed to be 1 in the BSM. The ESM model is constructed from the training sequence using the standard Kalman filter recursions, and then the extra parameters are estimated to minimize the mean absolute...
For optical communication networks, the wavelength division multiple access (WDMA) system has been developed at first and maturely commercialized. Although WDMA can be used to satisfy the requirement mentioned above, it has the disadvantage of low efficiency in utilizing bandwidth (for the high bandwidth optical communication system). Thus, the optical code division multiple access (OCDMA) is developed...
This paper proposes an adaptive extension of a least squares Volterra predistorter to compensate for the non-linearity of the high power amplifier (HPA) with memory effects in orthogonal frequency division multiplexing (OFDM) systems at the transmitter side. Specifically, the input and output of the nonlinear HPA are accessed in the feedback loop structure to obtain the Volterra kernel parameters...
The issue of deployment strategy of sensor nodes to -extend the lifetime of a multi-hop wireless sensor network is addressed. Based on load-balancing concept, an algorithm is proposed to deploy homogeneous sensor nodes in a wireless sensor network with a given number of sensor nodes which are continuously monitoring an area of interest. The densities of sensor nodes ore determined by solving an optimization...
We study the optimal survivability design problem under a scheduled traffic model in wavelength convertible WDM optical mesh networks. In this model, a set of demands is given, and the setup time and teardown time of a demand are known in advance. We formulate the joint routing and wavelength assignment problems as integer linear programs that maximally exploit network resource reuse in both space...
Performance evaluation is required at every stage in the life cycle of a network protocol. Analytical modeling is the method of choice for fast and cost effective evaluation of a network protocol. One of the most efficient high level formalisms used for analytical modeling of network protocols is stochastic Petri nets (SPN's). Yet, complexity of nowadays network protocols, which results in the state...
We describe Divalia, a new peer-to-peer (P2P) file exchange framework that targets mobile wireless ad-hoc networks. The framework supports anonymous transfers, to protect user privacy, as well as pre-authentication of data to be received, to reduce the likelihood of spoofs and the resulting bandwidth wastage. Divalia is composed of two parts: the hash set dual-request protocol, to challenge a would-be...
Recently, there has been increasing interest in applying MPLS (multi-protocol label switching) to IP-based wireless access networks. During a handover on a mobile MPLS-based network a registration update message is sent from the foreign agent (FA) to the home agent (HA) which results in a handover delay. There have been proposals for handover processing mechanisms over MPLS-based networks using micro-mobility...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.