The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many trust management systems implicitly assume that the required credentials can be obtained without difficulty. In consequence, it is necessary to have a convenient way to discover desired credentials in the network for successful deployment of trust management systems. Obviously, in distributed environments, this assumption may not be easy to achieve due to failure of different components. In this...
Hierarchical PCE is evaluated in GMPLS-based multi-domain WSONs. Simulations show that PCE providing edge nodes sequence using detailed information of inter-domain links achieves the best performance guaranteeing a lightweight control plane.
With the recent focus on cloud computing a new type of system topology came up: clusters in geographically distributed datacenters that are connected by high-latency networks. Current structured overlay networks (SONs) are not well prepared for such environments with heterogeneous network performance and correlated node failures. We show how the beneficial features of SONs, namely self-management,...
Emerging Web2.0 applications such as virtual worlds or social networking websites strongly differ from usual OLTP applications. First, the transactions are encapsulated in an API such that it is possible to know which data a transaction will access, before processing it. Second, the simultaneous transactions are very often commutative since they access distinct data. Anticipating that the workload...
Scalability of ad hoc network has been one of the important areas of research in the field. Most of the research works in ad hoc network focus on routing and medium access protocols and produce simulation results for a network size of 50 to 100 nodes. Because of multi-hop nature of ad hoc network, scalability is directly related to routing protocols. In this paper, we have conducted simulations to...
Today, peer-to-peer (P2P) systems are used as a promising platform to deploy new applications and services in the internet. There are much interest in emerging P2P overlay network because they provide a good substrate for creating large scale data sharing, content distribution and application-level multicast applications. Overlay networks also have following advantages: redundant storage, efficient...
At the beginning of its journey, wireless sensor networks (WSNs) were not built keeping security in mind. Along with the proliferation of sensor applications, the need for security in sensor networks has been increased. However, due to the resource constrained sensor nodes as well as its unique nature of communication, it is very difficult to use traditional security solutions for sensor networks...
Recent studies on inter-domain DWDM networks have focused on topology abstraction for state summarization, i.e. transforming a physical topology to a virtual mesh, tree, or star network. Although these schemes give very good inter- domain blocking reduction, associated inter-domain routing overheads are significant, particularly as the number of domains and border OXC nodes increase. To address these...
Two stateless path computation element (PCE) implementations to be used in GMPLS-based wavelength routed optical networks (WRONs) are discussed (fully stateless PCE, F-SL-PCE, and contention avoidance stateless PCE, CA-SL-PCE). The proposed CA-SL-PCE implementation exploits static management information for avoiding resource contentions among subsequent lightpath requests, while preserving network...
The next generation Internet will be highly diversified in both underlying networking technologies and supported networking applications. The diversified Internet architecture requires effective collaboration among heterogeneous network domains to support various application requirements. One of the challenges to achieve this objective lies in enabling network domain collaboration and network-application...
Chord is a scalable peer-to-peer (P2P) lookup protocol that solves the problem of efficiently locating nodes with designed data items. However, Chord is known to be limited in routing efficiency since all nodes are placed on the overlay without taking into account the underlying network topology. In this paper, we introduce AChord, a topology-aware version of Chord that utilizes anycast, along with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.