The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new design is proposed to enhance an existing architecture for delivering future millimeter-waveband (mm-WB) Radio-over-Fibre (RoF) for wireless services with the use of Dense Wavelength Division Multiplexing (DWDM) architecture over a Passive Optical Network (PON). For the conceptual illustration, we deployed the original DWDM RoF-PON system then redesigned its infrastructure. In the downlink,...
Nowadays many systems and applications require the identification of traffic classes, which must be compliant to specific pre-defined constraints. Traditional networking approaches are based on traffic shaping, which is used to force the traffic to comply to the service agreements. This task is usually demanded to the underlying devices and this choice causes limited flexibility since the network...
Cloud Data Centers are becoming a more and more important reality nowadays, as more and more services are being offered in the form of Cloud resources. In order to accommodate as many requests as possible, Data Centers typically deploy oversubscription, which requires a thoughtfully calibrated usage of the computing and network resources of the system. We especially need to re-think the usage of network...
The paper deals with a newly designed self-learning adaptive algorithm enabling detecting any non-standard movement in marine traffic based on the bio-inspired virtual pheromone method. The algorithm detects non-standard vessel movements purely based on the common marine traffic patterns from the Automated Identification System. The proposed approach provides rapid self-learning and fast adaptation...
Millimeter-wave (mmWave) communication is a promising technology that enables high rate (Giga-bit) multi-media applications. In this paper, we consider the directional multigigabit (DMG) transmission problem in IEEE 802.11ad wireless local area network (WLAN). We propose an amendment to the original MAC design of IEEE 802.11ad to eliminate the need to perform beamforming training during station (STA)...
Cryptosystems, even after recent algorithmic improvements, can be vulnerable to side-channel attacks (SCA). In this paper, we investigate one of the powerful class of SCAs based on machine learning techniques in the forms of Principal Component Analysis (PCA) and multi-class classification. For this purpose, a support vector machine (SVM) is investigated as a robust and efficient multi-class classifier...
Recently, the 3rd Generation Partnership Project (3GPP) has developed a sidehaul system to cope with the explosively increasing mobile data traffic. The sidehaul system is based on single carrier-frequency division multiple access (SC-FMDA) due to its low peak-to-average power ratio (PAPR). Also, a demodulation reference signal (DMRS) is designed to support multiple input multiple output (MIMO). In...
Energy consumption of the computer fleet can be one of the main costs for corporations in maintaining local sites or offices. In order to adjust the power management policies used to put computers in a low-consumption state, the utilization pattern of the users must be known. In particular, the inactivity periods of the users must be characterized. This paper presents a method to extract the parameters...
In this paper we propose new caching and test their performance. We use Memcached platform to test the caching algorithm performance. Memcached is an extremely popular open-source, distributed key-value store system that powers several of the Internet's busiest websites such as LiveJournal, Wikipedia, Facebook and others.
Due to the proliferation of new threats from spammers, attackers, and criminal enterprises, Anomaly-based Intrusion Detection Systems have emerged as a key element in network security and different statistical approaches have been considered in the literature. To cope with scalability issues, random aggregation through the use of sketches seems to be a powerful prefiltering stage that can be applied...
The software defined paradigm is recently emerging as a very promising approach to simplify the way complex network applications are designed and integrated in large scale network scenarios. Typical examples of network-wide applications that may well benefit for such an approach are monitoring and security applications that collect information from multiple vantage points to provide higher lever analyses...
Broadcasting is used in on-demand routing protocols to discover routes in Mobile Ad-hoc Networks (MANETs). On-demand routing protocols, such as AODV (Ad-hoc On-demand Distance Vector) routing, commonly employ pure flooding based broadcasting. However, pure flooding generates excessively redundant routing traffic that may lead to broadcast storm problem (BSP) and deteriorate the performance of MANETs...
In this paper, a primary-secondary resource-management controller on vehicular networks is designed and tested. We formulate the resource-management problem as a constrained stochastic network utility maximization problem and derive the optimal resource management controller, which dynamically allocates the access time-windows to the secondary-users. We provide the optimal steady-state controllers...
In this paper, we consider the impact of spectrum fragmentation along the optical single/multipath routing transmission on the efficiency of the elastic optical network (EON). Using O-OFDM multicarrier transmission as a promising technique makes it possible to choose an adequate portion of available spectrum to satisfy the requested capacity. In a multipath routing scheme, distributing the light path...
Packet processing on commodity hardware is a cost-efficient and flexible alternative to specialized networking hardware. In case of Linux, the classical QoS mechanisms (e.g DiffServ) assume that the outgoing link is the bottleneck. However, on commodity hardware the CPU typically becomes the bottleneck in packet processing. Taking into account current trends in the Internet, we assume that the percentage...
For green cluster computing resource management systems have to be energy-aware. CHERUB is such an energy-aware resource management system which works together with the Linux Virtual Server. Experiments in a small cluster setup with two nodes have shown the benefit of CHERUB. This paper presents necessary design changes to make CHERUB also work in big cluster setups. Our methodological approach is...
Simulation is a compelling option for evaluating Internet protocols, configurations and behaviors. While current simulation tools have been used effectively to consider questions in small-scale networks, they are incapable of evaluating large scale phenomena such as routing configurations, DDoS attacks and data center deployments. In this paper, we describe pfs, a parallelized version of the fs flow-level...
Mean Value Analysis (MVA) has long been a standard approach for performance analysis of computer systems. While the exact load-dependent MVA algorithm is an efficient technique for computer system performance modeling, it fails to address several features of multi-core platforms. In addition, the load-dependent MVA algorithm suffers from numerical difficulties under heavy load conditions. The goal...
In this paper, the problem of coverage and exploration of unknown and mined spaces is investigated using a team of robots. The goal is to propose a strategy capable to minimize the overall exploration and mine disarming time, whileavoiding that robots pass many times through the same places. The key problem is that the robots simultaneously have to explore different regions of the environment and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.