The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the problem of efficient routing in delay tolerant network. We propose a new routing protocol dubbed as ORION. In ORION, only a single copy of a data packet is kept in the network and transmitted, contact by contact, towards the destination. The aim of the ORION routing protocol is twofold: on one hand, it enhances the delivery ratio in networks where an end-to-end path does...
Sandstorms are serious natural disasters, which are commonly seen in the Middle East, Northern Africa, and Northern China.In these regions, sandstorms have caused massive damages to the natural environment, national economy, and human health. To avoid such damages, it is necessary to effectively monitor the origin and development of sandstorms. To this end, wireless sensor networks (WSNs) can be deployed...
Femtocells are expected as the surest way to increase the system capacity with higher-quality links and more spatial reuse in future networks. In spite of their great potential, the system capacity is highly susceptible to network density because a large portion of users are exposed to inter-cell interference (ICI). In this work, we proposed a dynamic interference avoidance scheme in densely deployed...
We propose two novel techniques for reducing the workload for malware analysis. The first technique is restricted instruction, which accelerates finding the longest common subsequence (LCS) between machine code instruction sequences of malware. The second technique is probabilistic disassembly, which can find the most probable disassembly result of a binary stream without a clue, such as debug symbols...
Energy efficient broadcasting is of paramount importance for many broadcast applications in wireless ad hoc networks. With respects network coding, it has been proved that the energy gain is upper bounded by 3. However, the coding opportunity is often highly dependent on the established routing paths, resulting in that a lot of coding opportunities could be lost in practice. By combining network coding...
The decrease of AS-level route length, called Internet flattening, has a significance impact on the the design of next generation global routing system. However, there is little quantitative assessment of its factors. We report our findings through monitoring and analysis of inter-domain routing. Using BGP routing table and update messages from RouteViews and RIPE RIS, we explore Internet flattening...
Traffic Engineering (TE) aims at distributing traffic through routes to suit a specific goal. BGP addresses TE in a very specific way: it is a single path system, and mixes traffic control and route dissemination by letting attributes influence the choice of the best path. Several techniques have been proposed but due to BGP characteristics they have high complexity requirements such as the need for...
The paper presents a concept of a rating algorithm aiming at overall peer-to-peer traffic reduction (and locality awareness) and decrease of load on costly links, thus diminishing operator's costs. The rating algorithm is not only performed by a sole Oracle, as is typically proposed, but its operation is also supported by a similar entity located in other domains. Due to this concept, a usually omitted...
Emerging technologies of autonomic networks impose demanding requirements on self-healing capabilities of networks. Fault management techniques based on the exploitation of fault propagation models (FPM) are a promising solution to conduct fault isolation and infer the root cause of problems observed in the network. In this study, we investigate a fault propagation model developed for the needs of...
In this paper we present an in-network caching architecture based on content routers to improve the traffic efficiency in the Internet. The main idea is to provide a forwarding fabric where data requests are forwarded towards the closest caches in the network path. Conversely, data chunks from the servers are cached in the content routers along the path, serving further requests. In addition, content...
In multi-domain optical networks, due to confidentiality and management considerations, it may be infeasible to broadcast complete domain state information among domains. Nevertheless, sufficient information on each domain is required in order to keep network activities operating successfully. Topology Aggregation (TA) may be adopted to abstract a domain's detailed topology into an aggregated topology...
Many applications in wireless sensor networks (WSNs) demand security. The standart low-power wireless sensors (TmoteSky, MICA2) have severe resource constraints. Despite some work on the adaptation of public-key cryptography to the resource constrained sensors, it is still not obvious whether the resources on the sensors are sufficient for the current asymmetric algorithms run in decent time and space...
Cooperative communication can significantly enhance transmission reliability and bandwidth efficiency in wireless networks. Most existing works are focused on physical layer issues of cooperative communications. Many upper layer aspects of cooperative communications merit further research. In this paper, we investigate its impacts on network topology and capacity. Specifically, we present a novel...
A key traffic engineering problem in the Open Shortest Path First (OSPF)-based network is the determination of optimal link weights. From the network operators' point of view, there are two approaches to determining a set of link weights: Start-time Optimization (SO) and Run-time Optimization (RO). We previously presented a Preventive Start-time Optimization (PSO) scheme that determines an appropriate...
Carrier Ethernet has rapidly advanced itself to become an important technology for metro transport. PBB-TE or Provider Backbone Bridging -Traffic Engineering is one of the mechanisms being considered for the deployment of Carrier Ethernet. PBB-TE relies on the assignment of a network-specific VLAN tag called the BVID that is further dependent on customer and service provider VLAN tags, service provider...
The mapping of the Internet topological structure is indeed of great importance for a better understanding of the network's internal structure, network management, etc. Current explorations still mainly rely on the extensive use of the traceroute tool from a given set of sources to a given set of destinations. However, the deployment of dedicated measurement infrastructures on sources is often quite...
Due to integrated high-speed networks accommodating various types of services and applications, the quality of service (QoS) requirements for those networks have also become diverse. The network resources are shared by the individual service traffic in the integrated network. Thus, the QoS of all the services may be degraded indiscriminately when the network becomes congested due to a sudden increase...
Security is an important issue in mobile ad hoc networks (MANETs). However, security schemes have significant impacts on throughput. That is because 1) they need some overhead and consume some network resources, thus decrease throughput consequently, 2) most previous works consider security and throughput separately in designing a MANET, which can not achieve an overall optimization of network performance...
Electrical switching, when used to interconnect tens to hundreds of pods (each having a thousand of servers) in the core of a data center, incurs a high cost and power consumption and is expected to be replaced with optical switching soon. In this paper, we consider hypercube-based interconnection using optical switches in the core and study novel routing and wavelength assignment schemes for a new...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.