The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: optical network; quality of service; telecommunication network management; network security; generation network routing; network planning; and wireless network.
In this paper, we show the recent progress of photonic technologies for new generation network. Modulation format free optical packet switching node, ultra-wide band optical switching technologies, polarization independent optical switch, burst-mode Tx. and Rx., bust mode EDFA, and other rerated key technologies are represented.
Standard optical fiber has potential capacity of multiple Tbit/s. Efficient utilization of the already installed fiber infrastructure is of outmost importance. Starting with passive wavelength division multiplexing (pWDM) this paper discusses the potential solutions for a managed optical lambda or a complete optical transmission layer independent of the transceivers themselves. The problems from the...
In realistic mobile heterogeneous environment, the quality perceived by user is variable and dependant on following major factors: available bit rate variation, packet loss and latency. Even though QoS management is enabled in most modern telecommunication systems, it does not ensure the actual end-user perceived quality of service level. Therefore, to make sure that operator follows SLA provisions,...
The rapid introduction of new mobile data services presents many challenges to wireless service providers. Unlike voice services, whose traffic characteristics are well understood, new data services are far more volatile and their demand on network resources is harder to predict. Data volumes are exploding and impacting not only the ability of the network to support such traffic but are also driving...
The paper deals with the need of high availability of services in the GMPLS-based optical network. The influence of control plane reliability on transport plane services is studied. Several models of control plane implementation with different levels of reliability are mentioned. The impact of applying these models on the availability of services over long-term operation is examined using simulation...
In the paper we investigate the methods of constructing the routing tree in WiMAX networks with mesh topology. The concept of network efficiency optimization by building the routing tree characterized by selected topological properties that are independent on network load is presented. As an important partial result, correlations between topological parameters of the tree and network efficiency have...
Diameter protocol is getting more and more important roles in Next Generation Mobile Network Infrastructure. However, in many cases Diameter interfaces are still under standardization. In this paper, we introduce a flexible Diameter based testing system. The strong point of this system is the capability to keep up with the development of Diameter related standards. It is also friendly, scalable and...
The paper discusses alternative approaches to introduce multi-layer relations between network resources in balancing demand and supply in a bandwidth market. Two multi-commodity double auction models have been presented with illustrative examples.
Service providers are being thrust into the Internet Web 2.0 world where rapid innovation and flexible, open business models are the norm. Network Services operators have a critical need to establish and execute a business strategy that leverages their own particular operating strengths in combination with the application and service innovations thriving in the internet marketplace. They recognize...
The multicommodity exchange for trading bandwidth commodities in undirected networks, in the form of the BUCBT bandwidth exchange model, is presented. The BUCBT model allows for the most efficient allocations of undirected resources. An associated allocation model is formulated as a multicommodity network flow problem with directed flows. The equivalence of the associated model to the undirected bandwidth...
Survivability is an essential feature in the design of WDM mesh networks for continuous service delivery in the case of failures. Segment p-cycles (also known as flow p-cycles) offer an interesting protection approach with a good trade-off between protection capacity cost and recovery speed. In this paper, we propose a new design method for segment p-cycles based on a large scale optimization tool,...
In the highly connected Internet most of domains have more than one interconnection link to different providers. In such a multi-homed scenario destinations for inter-domain traffic may be reachable through multiple egress routers with different offered cost and path performance. In this paper, we address the problem of route selection in a multi-homed stub network to optimize transit costs and paths...
In this paper, we propose to tackle the design problem of two-level metropolitan Internet protocol (IP) networks with modular routers including the design of the points of presence. We first propose a model that deals with selecting the number of routers and their types to install in each point of presence, selecting the interface card types to install in each router, finding the access and the backbone...
The simplistic design of the original Internet is being slowly replaced by the presence of advanced middleboxes that are introduced in the network. While some of these middleboxes are transparent and passively monitor the network, others can directly affect the data traffic (e.g., content accelerators). Forecasting user and middlebox traffic patterns are usually done through oversimplified models...
In this paper, we address a method for an intrusion detection system (IDS) in wireless sensor networks (WSNs). The type of the attack that we address in this paper focuses on dropping packets attacks (DPA) in WSNs and we focus on the design of security enforcement mechanisms for preventing attacks as well. we present a signaling game-theoretic model to analyze intrusion detection in wireless sensor...
Most of previous research on survivable networks has been related to unicast communications. In this paper we propose a new approach to network survivability of anycast communications. To the best of our knowledge, anycast defined as one-to-one-of-many technique has not received much attention recently. To provide network survivability, we use the single backup path approach, i.e. each demand has...
Transit traffic exchanged with transit providers costs more for network providers compared to intra-domain traffic or traffic exchanged over peering links. We have measured and analyzed the peer distribution in BitTorrent, which is one of peer-assisted content delivery networks (CDNs). From the peer distribution, we show the potential of the high-cost transit traffic reduction. We then propose a peer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.