The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Survivability is an essential feature in the design of WDM mesh networks for continuous service delivery in the case of failures. Segment p-cycles (also known as flow p-cycles) offer an interesting protection approach with a good trade-off between protection capacity cost and recovery speed. In this paper, we propose a new design method for segment p-cycles based on a large scale optimization tool,...
In the highly connected Internet most of domains have more than one interconnection link to different providers. In such a multi-homed scenario destinations for inter-domain traffic may be reachable through multiple egress routers with different offered cost and path performance. In this paper, we address the problem of route selection in a multi-homed stub network to optimize transit costs and paths...
In this paper, we propose to tackle the design problem of two-level metropolitan Internet protocol (IP) networks with modular routers including the design of the points of presence. We first propose a model that deals with selecting the number of routers and their types to install in each point of presence, selecting the interface card types to install in each router, finding the access and the backbone...
The simplistic design of the original Internet is being slowly replaced by the presence of advanced middleboxes that are introduced in the network. While some of these middleboxes are transparent and passively monitor the network, others can directly affect the data traffic (e.g., content accelerators). Forecasting user and middlebox traffic patterns are usually done through oversimplified models...
In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor...
Most of previous research on survivable networks has been related to unicast communications. In this paper we propose a new approach to network survivability of anycast communications. To the best of our knowledge, anycast defined as one-to-one-of-many technique has not received much attention recently. To provide network survivability, we use the single backup path approach, i.e. each demand has...
Transit traffic exchanged with transit providers costs more for network providers compared to intra-domain traffic or traffic exchanged over peering links. We have measured and analyzed the peer distribution in BitTorrent, which is one of peer-assisted content delivery networks (CDNs). From the peer distribution, we show the potential of the high-cost transit traffic reduction. We then propose a peer...
Hiding information in network traffic may lead to leakage of confidential information. In this paper we introduce a new steganographic system: the PadSteg (Padding Steganography). To authors' best knowledge it is the first information hiding solution which represents inter-protocol steganography i.e. usage of relation between two or more protocols from the TCP/IP stack to enable secret communication...
This paper discusses an approach for distributing a large number of multimedia (video) titles to users located at the leaves of a tree network. The proposed approach is to build multicast trees, over which the content files are sent to user disks, followed by delayed local playback of the content. The work concentrates on exact and heuristic methods for an efficient tree packing in several download...
This paper deals with optimal load balancing in telecommunication networks. For a capacitated telecommunications network with single path routing and an estimated traffic demand matrix, we wish to determine the routing paths aiming at min-max optimization of link loads. To solve this problem, we propose a column (path) generation based heuristic. In the first step, we use column generation to solve...
The roll-out of next generation access networks is a complex process which depends not only on technical or commercial factors, but also on market conditions and regulatory decisions. The path adopted by the different agents towards the new networks will not be homogeneous, neither about technologies and platforms, nor the commercial model or roll-out strategies. These elements will depend on expectations...
The following topics are dealt with: optical network; quality of service; telecommunication network management; network security; generation network routing; network planning; and wireless network.
A lightpath design and management tool with parallel processing capabilities and a flexible upgradability, allowing new functions to be added to the system without any system program changes, has been designed and implemented for IP-over-CWDM networks with ROADMs. The tool can process applications composed of some sub applications in parallel in multi machines for high-speed performance. In addition,...
Over the past decade, wireline Service Providers (SP) have been looking for ways to evolve the existing PSTN network to Next Generation Network (NGN). The economics of the PSTN migration to NGN could not result in a positive business case for SPs. However, new market conditions are squeezing SPs' margins for traditional voice services in the PSTN. Meanwhile, recently standardized IP Multimedia Services...
The transmission bandwidth consumed by delivering rich content, such as movie files, is enormous, so it is urgent for ISPs to design an efficient delivery system minimizing the amount of network resources consumed. To serve users rich content economically and efficiently, an ISP itself should provide servers with huge storage capacities at a limited number of locations within its network. Therefore,...
The paper presents a proposal of a new multicast routing algorithm for finding a multicast tree in packet-switched networks. The objective of the MLRA (Multicast Routing Algorithm with Lagrange Relaxation) is to minimize the cost of paths between the source and each destination node using Lagrange relaxation, and eventually, minimize the total cost of multicast tree. A wide range of simulation experiments...
Assuming that the traffic matrix belongs to a polytope, we present a new routing paradigm where each traffic demand is routed independently of the other demands. The routing of each demand is a combination of two extreme routing depending on the current volume of the demand. This new routing paradigm is easy to implement in networks and quite efficient in terms of network cost.
Estimation of traffic demand is a major requirement in numerous telecommunication network applications. As traffic level typically varies with time, online applications such as dynamic routing and dynamic capacity allocation need to accurately estimate traffic in real time to optimize network operations. While optimizing network capacity, the effect of estimation error on Grade of Service must also...
A major challenge affecting the lifetime of Wireless Sensor Networks (WSN) is energy. This study focuses on the deployment schemes that achieve energy minimization in WSN through appropriate transmission range assignment. We examine two simplified deployment schemes. First, when the sensor nodes have to be placed in a linear network, and next when they have to be placed in a multihop tree network...
Seamless mobility is a serious challenge facing the Internet. The IP semantic overload issue presents the technical barriers to the development of mobility. However, the existing mobility support schemes may hardly meet the application requirements. In this paper, we propose SMOS, a seamless mobility support scheme in the Locator/Identifier Split network using techniques including route optimization,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.