The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper discusses on-going work investigating the use of IEEE 802.15.4 in a network architecture for factory automation, which aims at satisfying the requirements of industrial applications. In particular, one of the targets of the proposed architecture is to meet the typical real-time and QoS requirements found in industrial networks in a flexible way.
This paper extends our work in developing an agent-based architecture for improved mobile QoS in next generation IP networks. Here the performance of the protocol, called AMP, is evaluated against the IETF's standard Mobile IP protocol in supporting a variety of traffic. The analyses were done using the network simulator ns2 where specialized nodes were developed as part of the protocol. The parameters...
The present paper proposes a novel method for computing inter-domain paths subject to multiple independent additive constraints in MPLS-TE networks. An efficient solution to this problem is a key element for providing services with guaranteed performance across domain boundaries. However, the inherent hardness of the multi-constrained path computation as well as inter-domain scalability and security...
The future Internet would benefit from the delivery of high performance services crossing several carriers and bringing new incomes to telco operators. Such services compel carriers to guarantee quality of service (QoS) inside their boundaries. As carriers are independently administrated, architectures and processes must be reconsidered so that requirements for autonomy and confidentiality are respected...
In multiservice networks, QoS monitoring needs to be carried out in a per-class basis so that each service class measuring requirements and behavior are met and sensed properly. Facing the shortage of off-the-shelf class-based monitoring solutions, this work is focused on the development of a flexibly QoS monitoring tool oriented to multiservice networks. In this context, after discussing main QoS...
IETF is working on the design of new architectures and signaling solutions to support inter-AS (autonomous system) GMPLS-TE (generalized multi protocol label switching with traffic engineering) for multi-domain, multi-carrier connection setup with guaranteed quality of service (QoS). In addition, the path computation element (PCE) working group is developing the framework for inter-domain path computation...
Providing network QoS involves, among other things, ensuring network survivability in spite of network faults. Fault recovery mechanisms should reduce recovery time, especially for real-time and mission-critical applications while guaranteeing QoS requirements, in terms of bandwidth and delay constraints and maximizing network resources utilization. In this paper, we propose a scalable recovery mechanism...
Combining cross-layering and autonomic paradigms is considered, until now, the best alternative for better Quality of Service (QoS) support in wireless networks. We adopt this combination in the design of a new architecture called Cross- Layer Engine (XLEngine) having the ability to make optimizations based on local and network wide knowledge. The unique mode to acquire this network knowledge is that...
Wireless Multimedia Sensor Networks (WMSNs) is comprised of small embedded video motes capable of extracting the surrounding environmental information, locally processing it and then wirelessly transmitting it to parent node or sink. It is comprised of video sensor, digital signal processing unit and digital radio interface. In this paper we have surveyed existing WMSN hardware and communication protocol...
Many application systems maintain state as part of their behavioral semantics. This state can reflect continuous state, e.g., sensor measurements, or discrete state. Modeling notations like Simulink combine the two to support modeling of hybrid control systems. In this paper we examine whether the intended behavior of state-based systems is implemented correctly by different runtime architectures...
This thesis puts forward an innovative model of health management service grid, and gives the overall architecture of health management grid platform system by which a health management service model can be established based on the analysis of present condition of health management in China. This paper also presents a new integrated model about the health management service resources by using the...
In this paper, we propose a cross-transmission protocol architecture for resource discovery in P2P overlay networks, where each client in the network can query and get the resource identifiers for other P2P overlay networks (like Infohash in Bittorrent network, AICH Top Hash in Emule/Edonkey network). In this way, client can download files from multi-overlay P2P networks simultaneously rather than...
Despite the interest, the utilization of today's networking environment including a variety of access technologies and various services and capabilities is still minimal. Multiaccess mobile devices already on the market provide a capability to hand over the heterogeneous networks but so far there has not been any commonly approved way to efficiently capitalize on this feature. Media Independent Handover...
While network-on-chip aspects such as topologies, routing strategies or quality-of-service have been largely studied, the mapping of real applications on distributed NoC-based architecture is still an open issue. In this paper, we address this issue for complex reconfigurable data-flow applications. We introduce the concept of communication and configuration controller (CCC) which interacts both with...
In order to enable rapid and cost-effective deployment of WiMAX networks, relay technology which does not require backhaul line, can be considered as an essential feature for performing a successful business development. In the scope of a proposed Multi-Hop relay network architecture, (based on the recently developed IEEE 802.16j standard in order to enhance throughput, network coverage and capacity...
Voice over IP (VoIP) is the future of telephony service which is being widely deployed currently besides the legacy public switched telephone network (PSTN). In this paper we review a minimum cost deployment solution for VoIP for private networks using available open source tools with considering the fact that currently private networks are mostly behind the NAT and the fact that in this case VoIP...
Broadband PLC seems to be gaining popularity as an access network technology so that the standardization efforts are rising notably. Broadband PLC gives the opportunity of delivering services such as telephony, TV and Internet through the power line, but also entails managing the quality of service that these applications need. In this paper, a centralized quality of service architecture for PLC access...
This paper analyzes the shortages of traditional Web/CORBA based network management architecture firstly, and then puts forward a new Web/CORBA based architecture for network management with TCP connection, which applies information push technology and notification service to traditional model. It changes the passive state of server and implements network management in an active state. It can push...
Today's best-effort Internet with "one fits all" principle comes to an impasse. Addressed to different QoS requirements of today's network services, we propose a QoS oriented Network Architecture that bases on network virtualization. It provides multiple virtual networks deploying on the same substrate, each is designed with a special designing goal and is running a customized protocol....
Functional verification plays an important role in the design flow of an intellectual property (IP) core and, in general, of an embedded system. The industrial trend of the last two decades has been to produce more and more complex embedded systems by integrating several IP cores on a single chip die; while this is easily possible thanks to the availability of ready-to-use off-the-shelf components,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.