The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networks provide the ability to manage networks from a centralised point through separating control plane from the data plane. This brings opportunities in terms of manageability, flexibility and cost savings in network operations. This centralisation, however, also brings about a potentially serious performance bottleneck and poses a scalability issue in high performance networks...
WiFi networks have becoming popular in the past decade to provide network access due to its inexpensive but high-bandwidth infrastructure. With the increasingly dense WiFi deployment and the rapid proliferation of network devices and applications, the demand for more bandwidth, constrained delay performance and less power consumption is soaring; however, the traditional WiFi networks have become incapable...
Recently, it has been noted that the inefficiencies in peer-to-peer (P2P) overlay networks result in a large quantity of traffic among internet service providers (ISPs) or autonomous systems (ASes). To optimize cross-ISP/AS traffic, the existing approaches introduce network-aware strategies in which peers select geographically close peers as neighbors using topological information. However, each P2P...
Distributed software transactional memory (D-STM) is an emerging, alternative concurrency control model for distributed systems that promises to alleviate the difficulties of lock-based distributed synchronization -- e.g., distributed deadlocks, live locks, and lock convoying. We consider Herlihy and Sun's dataflow D-STM model, where objects are migrated to invoking transactions, and the \emph{closed...
Barrier synchronization is a key programming primitive for shared memory embedded MPSoCs. As the core count increases, software implementations cannot provide the needed performance and scalability, thus making hardware acceleration critical. In this paper we describe an interconnect extension implemented with standard cells and with a mainstream industrial toolflow. We show that the area overhead...
This work presents a study in progress about voice broadcasting on WLAN networks based on IP protocol (VoIP). This study proposes a latency analysis of these networks to broadcast VoIP considering implemented and non-implemented WDS (Wireless Distribution System) environments. In this context the study aims to identify mainly the problems that affect voice transmission on IP networks. VoIP sample...
Many protocols and communication standard appear in the Substation Automation System (SAS) world. Advanced communication standards a low the exchange of peer to peer information between primary devices in order to accomplish distributed automation application inside SAS. Evaluating the conformity of primary devices towards security and SAS architectures towards required specifications is a non trivial...
Network community needs a flexible platform for network experiment of new architectures, algorithms and protocols in the process of network innovation. However, building such a platform faces lots of challenges due to complicate requirements. In this paper, we present ExpoNet, a platform for rapid concurrent experiment of network innovation on the virtualized programmable infrastructure. ExpoNet integrates...
SNMPv2 is the most popular Network Management Protocol for its simplicity, wide support in most of the Operating Systems and network devices. The weakness in SNMPv2 was lack of proper security mechanism which led to the improved version SNMPv3 in 1999 [1]. It required separate PKI infrastructure and lacked support in older network devices so it could not get wide popularity and adaptation. Therefore...
The combination of the high-performance psort sorting library and of a carefully tuned desktop-class cluster allowed us to improve the previous record on the Datamation sort benchmark by over an order of magnitude, sorting a million 100 byte records from disk to disk in a few dozen milliseconds. Of the many implementation and configuration choices we faced, the most crucial were judicious data placement...
It is costly to have defective networks and nodes. There are many factors involved in the cost of defective design of networks. The size of development team, stage of development when the defect occurs, routing protocols and subtlety of the defect are only a few of the possibilities. Testing software, therefore has to be designed to detect the defect, and as early as possible in the design cycle....
Through analyzing of the delay composition of message transmission in CAN bus, it discusses the two main parts of information delay in CAN network??Fthe frame delay and media access delay. The frame delay is determined by frame length and baud rate, so we can reach different frame delay under the different frame structure and different baud rate. Through the latitudinal and longitudinal comparison,...
The synchronization is a key point in measurement and control systems, which use technologies such as network communication, local computing and distributed objects. Modern industrial application is demanding the synchronization for higher precision, this paper analyzes a variety of synchronous time synchronization protocols used in the current industrial Ethernet applications, mean-while explains...
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation requirement frequently, the massive delay is inevitable. Without the modification to TPM, we propose Batch Integrity Report Protocol (BIRP) to overcome the performance bottleneck. B-IRP...
In this paper we point out the necessity for monitoring the status of a Delay-Tolerant Network (DTN) and present the network monitoring functionalities we implemented in a small network comprising of three nodes based on the DTN2 implementation of the DTN Bundle protocol. The methods used to gather the appropriate statistics are described and the key parameters needed to describe the DTN network status...
As cloud computing is taking off, the presence of high-performance interactive Internet applications is exploding. By nature, these applications require responsive client-server data exchange and lossless, in-order delivery. Previous work has shown that by using forward error correction (FEC), it is possible to reduce the data streaming latency caused by retransmissions of lost packets. However, the...
There has been a dramatic increase in interactive cloud based software applications. Compared to classical real-time media applications (voice over IP (VoIP)/conferencing) and non real-time file delivery, these interactive software applications have unique characteristics: 1) they are delay sensitive yet demand in order and reliable data delivery, and 2) the traffic is usually bursty. Traditional...
Telesurgical robot systems (TRS) are often deployed in unattended environments such as battlefields or rural areas. Therefore, adversaries can easily access the devices, compromise the system, and install their own malware. If the integrity and health of the system software and configuration files are not verified before their usage, the safety and lives of the injured soldiers and patients may be...
In this paper we present a simulation framework that is intended to be used for a wide class of network control systems. It is designed in order to allow interaction with the Matlab/Simulink environment. The low-level structure is written using the C++ language so that hardware/network in the loop simulation can be readily done by substituting an arbitrary set of software components with corresponding...
Desktop virtualization is a new delivery method in which desktop operating systems execute in a data center and users access their applications using stateless "thin-client" devices. This paradigm promises significant benefits in terms of data security, flexibility, and reduction of the total cost of ownership. It is important to further improve this approach while maintaining good user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.