The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new content-based routing (CBR) approach called ROSE is proposed to realize CBR in very large-scale publish-subscribe systems. ROSE relies on a ring space where subscriptions and events are routed along distinct, albeit intersecting, partitions. An analytical model of ROSE is derived, and validated through simulation. The results from theoretical analysis, simulations, and experiments show that...
Peer-to-Peer (P2P) technologies are considered as one of the fundamental technologies for the next generation Internet. P2P systems are classified into unstructured P2P systems or structured P2P systems depending on their topological structure of network. Most structured P2P systems are based on Chord protocol that is designed by using Distributed Hash Tables (DHTs). However, some issues have not...
Most CMPs use on-chip networks to connect cores and tend to integrate more cores on a single die. As the number of cores increases, on-chip networks will play an important role in the performance of future CMPs. Due to its low area cost, triplet-based network is a good choice for the designers of CMPs. In this paper, we analyze the traffic in the terms of latency and link load. Our models for 9-node...
Measurements of network traffic have shown that self-similarity is a ubiquitous phenomenon spanning across diverse network environments. Previously, the researchers designed network traffic simulation system with sequential methods to generate a small number of network traffics in a short time scale. But there is one difficulty in simulating network traffics using parallel methods with high accuracy...
With the development of Web application, network traffic is constantly increasing. In order to do the performance testing of Web applications, a precise simulation of network traffic is necessary. However, traditional traffic model based on Poisson process can not characterize the behavior of real network traffic. Measurements of network traffic show that the property of the self-similarity is ubiquitous...
Analytical models for fully adaptive wormhole routing in k-ary n-cubes interconnection networks have been widely reported in the literature. However, there are few performance models for 2D-mesh network-on-chip. Most current models assume Poisson traffic, but studies reveal that network traffic shows peculiar types of behavior, such as long-range dependence and self-similarity. An analytical model...
For the characteristic of All-IP networks, the impact of higher mobility of mobile node and higher overlap region of mobile agent on smoother handover was considered. For the existed questions of longer delay, packets loss, and easier failure at handover, the pre-handover in the overlap region based on HMIPv6 protocol and overlap computation was proposed. Instead of matching prefix of broadcasting...
This paper presents an optimization model to the application of signal coordination for urban network based on multi-group partition. The proposed algorithm divides a large signalized network into several subgroups with three or more intersections according to real traffic flow. In each subgroup, signal coordination between neighboring intersections is built by a common cycle and offsets. In order...
Performance predictions from wireless networking laboratory experiments seem to dismatch what is really deployed. To generate realistic traffic is one of the major factors hampering researcherspsila ability to make reliable forecasts. This paper reports on the results of a multiscale analysis of traffic traces captured at an infrastructure 802.11g wireless network. The analyzed traffic is characterized...
One of the key problems for wireless sensor networks (WSNs) is how to make the best of limited energy. The conventional clustering method has the unique potential to be the framework for energy-conserving wireless sensor networks .In this paper, a novel dynamic clustering algorithm based on geographical location information(GL-DC)is proposed for WSNs. Comparing with other algorithms, GL-DC has two...
How much service performance of searching and transmitting is provided by P2P network for a concrete resource? How much success ratio and recall ratio of resourcepsilas searching of existing P2P network is? Rare research is deepened about those questions. This paper, for unstructured P2P network, construct P2P network queuing model, provide calculating method of service performance of concrete resource,...
Classification of intrusion attacks and normal network traffic is a challenging and critical problem in network security. Many classification methods for intrusion detection have been proposed, but there are few algorithms that are capable of distinguishing among the various attacks and normal connections effectively. This paper presents an effective intrusion detection algorithm based on conscientious...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.