The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For many years network operators have struggled to maintain fragile, statically configured and extremely complex networks. The constant threat of viruses, malware, intruders and misconfigured devices has made the task even more difficult. The use of an Intrusion Detection System (IDS) has become a standard defense model in many networks, however they are expensive and difficult to maintain and further...
Information Centric Networking (ICN) is a networking framework for content distribution. The communication is based on a request/response model where the attention is centered on the content. The user sends interest messages naming the content it desires and the network chooses the best node from which delivers the content. This way for retrieving contents naturally fits a context where users continuously...
With recent advances in technology, resource control is a significant challenge for geographically distributed clouds. Users geographically close to the server get better services due to low latency. A few existing scheduling algorithms can provide better strategies through efficient job scheduling and resource allocation techniques. However, these algorithms are not efficient enough for distanced...
A framework and algorithm employing compressed sensing (CS) for orthogonal frequency division multiplexing (OFDM) systems is proposed. A compressive iterative interference cancellation for OFDM signal is presented. Prior knowledge of communication system is exploited to enhance data detection performance. Simulation results indicate that such an advanced data detection and receiver yields significant...
In this paper, we propose an autonomic network management system that analyzes, evaluates, and optimizes the redundancy of routes providing access to remote sites from a local area network. The proposed solution ARRC is based on SNMP as simple network management protocol to monitor the gateways, analyze their layer 3 operations and perform an extra configuration that enhances the availability of network...
The evaluation of performance and quality of service needs the modeling of wireless networks. Among the different models usually considered, the hexagonal network is the most popular. However, it requires extensive numerical computations. The Poisson network model, for which the base stations (BS) locations form a stochastic spatial Poisson process, allows to consider a non constant distance between...
One of key challenges for emerging and future wireless networks will be the support of seamless distributed IP mobility management to support a plethora of different applications. In this paper, an optimization problem for provisioning efficient centralized Mobility Agents (MAs) deployment is formulated, as well as a realistic model is developed for the Distributed Mobility Management (DMM) scheme...
This paper focuses on data replication in structured peer-to-peer systems over highly dynamic networks. A Q-learning-based replication approach is proposed. Data availability is periodically computed using the Q-learning function. The reward/penalty property of this function attenuates the impact of the network dynamism on the replication overhead. Hence, the departure of a node does not necessarily...
Due to the proliferation of Wi-Fi hotspots in public indoor areas (such as restaurants, airport, and shopping malls) and the ubiquity of Wi-Fi in mobile devices, Venue-Based Services are increasingly deployed by venue owners and Wi-Fi operators in their networks to improve their users' experience and generate new revenue streams. These services are locally offered by the venue and client mobile devices...
Traffic Jam in Lebanon has been an increasingly difficult problem with no reliable solution yet. Nowadays, the increasing popularity of smartphone devices equipped with multiple sensors (GPS, accelerometer, gyroscope) present an unprecedented opportunity to measure traffic, help users route around traffic jams and have a representation of the traffic conditions on the roads in real-time. In this paper,...
Recent advances offered by Software Defined Networking and virtualization techniques are creating the favourable conditions to design and develop Future Networks where network functions and services can be virtualized, dynamically instantiated and moved across networks. The ability to dynamically allocate virtual nodes across distributed physical hosts and even more the live migration of the Virtual...
In virtualized data centers, the last hop of the network is no longer handled by a physical network switch, but rather is performed in software inside the server to switch among virtual machines hosted by that server. However, the current I/O network virtualization based on the driver domain is an attractive model since it offers high flexibility and cost-effectiveness. However, it exhibits poor networking...
Security of sensitive data in the network is a key issue in a world where such sensitive data can easily be transferred between different servers and locations (e.g., in networked clouds). In this context, there is a particular need to control the path followed by the data when they move across the cloud (e.g., to avoid crossing -even encrypted- un-trusted nodes or areas). In this paper we proposed...
The current socket API is one obstacle that hinders adoption of new transport protocols like e.g. SCTP, MPTCP, or DCCP. It requires an application to specify the desired transport protocol at the time of implementation. The drawback of this approach is: If new transport protocols are introduced, existing applications need to be modified in order to support them. Therefore applications should select...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.