The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Owing to the heterogeneity and high degree of connectivity of various networks, there likely exist multiple available paths between a source and a destination. To be able to simultaneously and efficiently use such parallel paths, it is essential to facilitate high quality network services at high speeds. So, traffic splitting, having a significant impact on quality of services (QoS), is an important...
DHT-based peer-to-peer systems have been proposed in the past few years. Scalability, fault tolerance and searching speed of the DHT based P2P systems have been greatly improved in contrast to the unstructured P2P systems. These DHT-base systems have the problem of load imbalance. We present a load balancing method taking into account Zipf-like requests distribution and the impact of physical networks...
In this paper, we present a system that optimally and dynamically allocates the available computing resources to virtual machines that support virtual collaboration environments. Such environments are emerging fast via on-line social networks, virtual worlds, and the "Web 3.0" or "collaborative Web" paradigm. We use a utility-based framework to differentiate the applications hosted...
Implementation of heterogeneous wireless networks is a key issue that needs to be attended for delivering 4G services. The concept of reconfigurable interoperability defines mechanisms for coexistence of the wireless networks and intelligent management and reconfiguration within such systems. This paper elaborates the design of reconfigurable interoperable wireless communication system (RIWCoS). It...
In distributed virtual environment (DVE) systems, a distributed server infrastructure is often used to reduce the latency between servers and clients. Under this infrastructure, mapping clients to proper servers is one of the key issues for improving the interactivity and overall performance. Most traditional methods of mapping the clients to servers only consider the load balancing problem. However,...
The server mirroring method has extensively used as the technology for contents delivery networks. Several mirror servers that serve same contents are located in a network, and an access is navigated to one of the mirror servers based on the delay time and the load balance. The location of the mirror servers with high reliability against a failure and small delay times of accesses is important. In...
As part of the resource allocation mechanisms, each router must implement some queuing discipline that governs how packets are buffered while waiting to be transmitted. Various queuing disciplines can be used to control which packets get transmitted (bandwidth allocation) and which packets get dropped (buffer space). The queuing discipline also affects the latency experienced by a packet, by determining...
Traffic engineering (TE) has become a challenging task for network management and resources optimization due to traffic uncertainty and to the difficulty to predict traffic variations. To address this uncertainty in a robust and efficient way, two almost antagonist approaches have emerged during the last years: robust routing and dynamic load-balancing. The former copes with traffic uncertainty in...
Despite ??airborne network (AN) topology design?? and careful planning of AN trajectories, unexpected disruptions (from hardware failures to changes in mission requirements and hostile attacks) may cause nodes not to connect to one another directly or indirectly either because they are out of one another's range or because nodes do not meet one another according to their preplanned trajectories. Since...
A mission critical environment (MCE) consists of error-prone, highly variable, and highly rate limited communication channels. Paradoxically, this substantially increases the need to perform optimal task allocation (OTA), while at the same time making it much harder to perform OTA efficiently. To simplify the problem, we consider OTA for publish/subscribe-based MCE since it has unique characteristics...
With the rapid development of wireless communication, it is an inevitable trend that WLAN as a wireless access mode will integrate with 3GPP system and form the interworking network. How to realize the fast and authentic handover scheme of WLAN-3GPP interworking network becomes one of the focus issues in this field. In view of the weaknesses of existing handover schemes, this paper proposes an improved...
Accurate searching in current structured P2P network is popular, but range query is very difficult and complex. In this paper, based on the Pastry, we propose a resources allocating mechanism for searching the objects among certain ranges in P2P network, and give the searching algorithm in detail. This mechanism does not need change the original P2P infrastructure, the algorithm is simple and easy...
Taking the uplink scheduling technique in 3GPP LTE system into consideration, the two-level buffer state report (BSR) scheme is proposed as a better candidate solution for uplink resource allocation in LTE system and future beyond third-generation system. In the proposed two-level scheme, the second level BSR content is a complement information of the BSR in LTE system which is regarded as the first...
There are a number of unreliable resources in grid market, which correspondingly bring to resource service risk. It obviously affects grid scheduling and utility seriously. In this paper, a classified approach is proposed to divide resource service risk into tangible risk and intangible risk according to how the resource service risk engenders. Then it introduces the models of tangible risk and intangible...
Multi-nexthop routing mechanisms is the key point in network congestion, and the essential question is how to forward packets among multi-nexthop to reach equiponderant forwarding. This paper proposes an equiponderant forwarding strategy in multi-nexthop routing, which forwards the packets according to the actual capability of each node, and resolves the equiponderant forwarding problem of multi-nexthop...
The schedulers for concurrent real-time tasks are algorithms that are allocate in processor resources to the different tasks and at different times, in this sense, it is necessary to measure their efficiency based on the time constraints of the tasks in real time, this measurement should be performed on local and global. This paper proposes the measurement of this efficiency through the operating...
DCUR follows the same procedure as define in Bellman-Ford but uses two vectors, namely least cost and least delay vector. The main drawback of DCUR is its assumption of link costs. It means that the minimum cost path is more often chosen and therefore the load distribution is not fair for the minimum cost paths. In this paper we propose a way to modify the cost and delay metrics dynamically in the...
Dynamic server provisioning is critical to quality-of-service assurance for multi-tier Internet applications. In this paper, we address three important and challenging problems. First, we propose an efficient server provisioning approach on multi-tier clusters based on an end-to-end resource allocation optimization model. It is to minimize the number of servers allocated to the system while the average...
In grid computing, most of the SLA management systems focus on static SLAs, where the guarantee terms are defined as constants or bounds. None of them support dynamic SLAs based on analytical expressions. Therefore, to enforce dynamic SLAs and to improve services offered to applications, we propose a new monitoring method to control the resource utilization and to reconfigure them when necessary in...
Grid computing has emerged as a way to share geographically and organizationally distributed resources that may belong to different institutions or administrative domains. In this context, the scheduling and resource management is usually performed by a grid resource broker. The scheduling task consists of distributing the jobs among the different centers resources and the need to coordinate the grid...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.