Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, we propose a routing technique to alleviate packet loss due to transient link failures, which are major causes of disruption in the Internet. The proposed technique based on Alternate Next Hop Counters (ANHC) allows routers to calculate backup paths and re-route packets accordingly, thereby bypassing transient failures. This technique guarantees full repair coverage for single link...
Malicious and misconfigured nodes can inject incorrect state into a distributed system, which can then be propagated system-wide as a result of normal network operation. Such false state can degrade the performance of a distributed system or render it unusable. For example, in the case of network routing algorithms, false state corresponding to a node incorrectly declaring a cost of 0 to all destinations...
IP fast reroute is a mechanism that is used to reroute packets around a failed link as soon as the link fails. Most of the IP fast reroute mechanisms, that have been proposed so far, focus on single or dual link failures but can not handle Shared Risk Link Group (SRLG) failures when several links fail at the same time because of some common underlying component failure. Furthermore, most of current...
Dynamic address configuration is essential when maintaining seamless communication sessions in heterogeneous mobile environments. This paper identifies some significant problems when using the Stream Control Transmission Protocol (SCTP) Dynamic Address Reconfiguration (SCTP-DAR) extension. We illustrate that SCTP-DAR can enter a deadlock state during the handover phase, ultimately resulting in communication...
Time-driven sensor networks are devoted to the continuous reporting of data to the user. Typically, their topology is that of a data-gathering tree rooted at the sink, whose vertexes correspond to nodes located at sampling locations that have been selected according to user or application requirements. Thus, generally these locations are not close to each other and the resulting node deployment is...
In wireless sensor networks, there is usually a sink which gathers data from the battery-powered sensor nodes. As sensor nodes around the sink consume their energy faster than the other nodes, several sinks have to be deployed to increase the network lifetime. In this paper, we motivate the need of anycast communications in wireless networks, where all the sinks are identical and can gather data from...
Minimizing energy consumption and ensuring fault tolerance are two important issues in ad-hoc wireless networks. In this paper, we describe a distributed topology control algorithm which minimizes the amount of power needed to maintain bi-connectivity. The algorithm selects optimum power level at each node based on local information only. The resultant topology has two properties: (1) it preserves...
Web caching techniques reduce user-perceived latency by serving the most popular web objects from an intermediate memory. In order to assure that reused objects are not stale, conditional requests are sent to the origin web servers before serving them. Most of the server responses to the conditional requests ratify that the object remains valid and, as a consequence, they do not include the object...
Large-scale shared service hosting environments, such as content delivery networks and cloud computing, have gained much popularity in recent years. A key challenge faced by service owners in these environments is to determine the locations where service instances (e.g. virtual machine instances) should be placed such that the hosting cost is minimized while key performance requirements (e.g. response...
In traffic safety applications for Vehicular ad hoc networks(VANETs), warning messages have to be disseminated in order to increase the number of vehicles receiving the traffic warning information. Hence, redundancy, contention, and packet collisions due to simultaneous forwarding (usually known as the broadcast storm problem) are prone to occur. In the past, several approaches have been proposed...
During the last decade, many new Web applications have emerged and become extremely popular. Together, these new “Web 2” applications have changed how people use the Web and the Internet. In light of these changes, we conduct a longitudinal study of the small-time scaling behavior of Internet traffic using network traffic traces, available from the MAWI repository, that span a period of eight years...
More and more free multi-party video conferencing applications are readily available over the Internet and both Server-to-Client (S/C) or Peer-to-Peer (P2P) technologies are used. Investigating their mechanisms, analyzing their system performance, and measuring their quality are important objectives for researchers, developers and end users. In this paper, we take four representative video conferencing...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.