The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using forward error correction (FEC) in off-line streaming, permitting large buffers, yields spectacular results, but real-time streaming puts hard restrictions on the buffer size and therefore does not allow FEC to deal with long link failures on a single path route. Multi-path routing however can make FEC efficient also for realtime streaming. In this paper, we introduce a capillary routing algorithm...
Bluetooth application developers have to address technical challenges imposed by the heterogeneity of the wide range of hardware and software capabilities present in the Bluetooth enabled devices. The wireless nature and the mobility of devices place an added strain on resource management. To manage such diversity of software and hardware, middleware based solution with the emphasis on transport level...
Modeling applications and quality of service (QoS) features is now quite easy using UML and its extensions (profiles). However, to write code ensuring properties such as deadlines remains difficult. For non-critical systems, a simpler approach attempting to supply QoS properties but without guarantee may be satisfactory. In this direction, we propose to build adaptable autonomous systems that modify...
Since the Internet is developing rapidly in size and in complexity as well, it is very hard to adjust quality of service (QoS) parameters. In order to guarantee service quality, efficient resource reservation is needed. The allocation of resources requires a dynamic reconfiguration mechanism that configures a switch, taking into account the incoming traffic fluctuations. This paper presents a new...
Input-queued switch architecture has become attractive for implementing high performance routers because the switching fabric and the buffer need not run at a multiple of input link's rate. It is challenging to provide a scheduling technique that is both highly efficient and fair in resource allocation. We propose an iterative cell-based fair scheduling (iCFS) scheme, based on SLIP that support fair...
The growing popularity of video services and Internet-based applications is fueling demand for higher data rates in the access network. This paper examines gigabit passive optical networks and how they provide future-proof solutions for triple-play applications. The focus is mainly on the physical layer. Technical challenges are addressed and economical feasibility is discussed
In a heterogeneous networking environment, the knowledge of the time before a vertical handover (TBVH) for any network is vital in correctly assigning connections to available channels. In this paper, we introduce a predictive mathematical model for calculating the estimated TBVH component from available network parameters and discuss the different scenarios that arise based on a mobile host's trajectory...
A careful study of the TCP (transmission control protocol) protocol shows that the congestion control mechanism is unfair in an environment where flows with different sizes compete for scarce resources. Short connections tend to lose to long connections in their competition for bandwidth. This is because short connections do not gain detailed knowledge of the network state, and therefore they are...
For an interpretation system, a priori knowledge of the observed scene is necessary to identify objects and if necessary to determine their description. These objects are identified by comparing the extracted data from images to an a priori description of the object or object class. Therefore the use of an appropriate knowledge can efficiently reduce the complexity of matching image data to object...
Ants are social insects that work in groups to collectively achieve certain goals that can not be achieved by a single ant. One of the most interesting ants' behaviors is the highly optimized path that ants follow, in their foraging, between the source of food and the colony's nest. Researchers are inspired by such optimized behavior in several applications. In this paper, we introduce an integrated...
Active networks are an approach in which the nodes of the network perform customized computations on the messages flowing through them. Peer-to-peer networks may be characterized by the capacity of the participants to share their own hardware resources (CPU, memory, bandwidth, printers). Combining the technologies of P2P and active networks, this paper presents an innovative concept, the use of a...
Vehicle routing problems (VRPs) is an outstanding topic in the domain of logistics. Besides the theoretical interest of VRP, its importance arises mainly from its significant applications. A prevalent variation of the VRP called the capacitated VRP (CVRP) assumes that vehicle capacity is limited and that the sum of demands in a route served by a vehicle should not surpass its capacity. The classical...
With the ever growing deployment of networks and the Internet, the importance of network security has increased. Recently, however, systems that detect intrusions, which are important in security countermeasures, have been unable to provide proper analysis or an effective defense mechanism. Instead, they have overwhelmed human operators with a large volume of intrusion detection alerts. This paper...
The study of loop networks has been motivated mainly by conception problems in the construction of local area networks and in the design of topologies for parallel processing computer systems. This paper discusses the degree-diameter problem for chordal ring of degree six networks. We focus upon maximizing the number of vertices in the graph for given diameter and degree. We improve the result of...
We propose a high-speed multiple valued interconnection network connecting K elements; since the natural property of current (KCL) leads to a linear algebraic addition, we have used current instead of voltage for representing the logic "0" and "1". In the proposed network we present how to determine appropriate current level for implementing any network with given elements
Work on efficient processing of long running queries on data flows has attracted much attention nowadays in modern data base management systems. The query optimizer within every query processing engine uses statistical properties to select an efficient execution plan. Since many application programs work with data flows, in a query processing engine which supports long running queries on data resources,...
To enhance the traditional techniques of detecting distributed attacks, an algebraic tool for correlating alerts is proposed in this paper. It is mainly based on a new concept called multi-violation detectors (MvD). While MvDs allow event and alert correlation, they can be mathematically managed, constructed, and learned. The proposed method is validated at the end of the paper based on a case study
Traffic modeling is an important tool for performance evaluation of networks. Simple models like Poisson process have been discredited in modeling Internet traffic. At the same time, characterization studies of Internet traffic revealed the presence of different types of correlations in Internet traffic. In this paper, we explore the use of M|G|infin process in capturing traffic correlations. We use...
Moving from Internet protocol version four (IPv4) to Internet protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been proposed by IETF IPng Transition Working Group (NGTrans). One of them is dual stack transition mechanism (DSTM). This paper reviews the implementation...
The purpose of this article is to remove CPU from heavy services of protocol processing, and alleviate the bottlenecks of communication system to suit for the high speed network. Methodology-by analysis and design with Linux specialties binding to functions of ML403 development version, to code or modify portion of kernel code and use VHDL to design the hardware section. Result-by analysis the design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.