The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As DWDM networks proliferate there is a growing need to address the issue of distributed interdomain lightpath provisioning. Although inter-domain provisioning has been well-studied for packet/cellswitching networks, the wavelength dimension presents many additional challenges. This paper develops a novel hierarchical GMPLS-based framework for provisioning all-optical and opto-electronic multi-domain...
We consider a system where each user has a public key and a private key. In this system, a certificate is a data item that is issued by one user u and contains the public key of another user v. A third user w that knows the public key of u can verify that this certificate has not been corrupted (by an adversary) since it was issued by u, and so can accept the public key in the certificate as the correct...
The Internet traditionally provides best effort service to all applications. While elastic applications are satisfied by this service, inelastic applications such as interactive audio and video suffer from end-to-end delay guarantees. Although guaranteed rate schedulers were developed to provide such guarantees, their scalability has been a concern because they maintain per-flow state. In an effort...
Wireless networks have the feature that the data-rate in a wireless link varies with the signal quality. TCP congestion control cannot handle such data-rate variation in the wireless link and its performance deteriorates. In this paper, we propose a TCP flow control scheme that suits 3G mobile communication systems. The proposed flow control scheme can rapidly respond to data-rate variations by having...
We present a competition detection mechanism for parallel TCP flows and use this to propose a new parallel TCP congestion control scheme called adaptive TCP-P (A-TCP-P). A-TCP-P automatically controls the aggregated aggressiveness of parallel TCP flows to fairly share network bandwidth with single TCP flows independently from the number of the parallel TCP flows while effectively utilizing available...
This paper proposes an attack-resilient routing architecture, called cross-layer active re-routing (CARE), for mobile ad hoc networks (MANETs). Different from existing solutions, CARE does not focus on a particular type of attack, but instead takes a fundamentally general approach-it achieves resilience against a wide range of routing disruption Denial- of-Service (DoS) attacks by treating them and...
Computing and networking systems have been widely used in almost every sector of society. However, they are limited by their capabilities in terms of security, reliability, performance, and scale-ability. We will discuss the various challenges posed by the design and implementation of the computing and networking systems. We will introduce some major initiatives taken by the National Science Foundation...
We consider the problem of allocating bandwidth to a set of traffic flows at a statistical multiplexer to provide both quality-of-service (QoS) and resistance to a class of denial- of-service (DoS) attacks. The target application is QoS signaling in a mobile ad hoc network (MANET) environment where the channel bandwidth is variable and the mobile device handles bandwidth requests arriving from multi-hop...
Layer 1 virtual private network (LI-VPN) is new emerging framework that allows clients to directly set up logical topologies and provision their own services without deploying expensive network infrastructure. Emerging and current networks are partitioned in different domains in order to implement different associated administrative, management, control boundaries. For carriers operating multi-domain...
Span protecting p-cycle has been shown to be a promising approach for survivable WDM network design because of its ability to achieve ring-like recovery speed while maintaining the capacity efficiency of a mesh-restorable network. In [12], the concept of span protecting p-cycle is extended to path-segment protecting p-cycle (flow p-cycle for short) which can protect a multi-span segment of a working...
Simulation is crucial to performance evaluation of switches. Currently stochastic simulation is the predominant approach, which has two drawbacks: few workload patterns and long simulation times. In this paper, we propose a novel switch simulation method that is based on two techniques: exhaustive workload pattern generation and smoothed periodic input generation. The exhaustive workload pattern generation...
In this paper, we developed a local-centralized adaptive clustering algorithm, Two-phase Cluster Formation algorithm (TCF), which concerns not only energy efficiency but also the reliability and the steadiness of the wireless sensor networks. TCF proposes a local-centralized mechanism to elect cluster-heads which makes election of cluster-head more reasonable and improves the efficiency of energy...
Smart route control is being increasingly used as a way to dynamically improve the end-to-end performance of the outbound traffic of multihomed stub domains. However, all the solutions available at present have in common two drawbacks which are key motivations for this work. First, all solutions are standalone, so no routing control interactions exist between the domains sourcing and sinking the traffic...
A large number of clusters are being used in all different organizations such as universities, laboratories, etc. These clusters are, however, usually independent from each other even in the same organization or building. To provide a single image of such clusters to users and utilize them in an integrated manner, cluster-of-clusters has been suggested. However, since research groups usually do not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.