The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Wireless Sensor and Actor Networks have been receiving a growing attention from the research community because of their suitability for critical applications. Maintaining inter-actor connectivity becomes extremely crucial in such situations where actors have to quickly plan optimal coordinated response to detected events. Failure of critical actor partitions the inter-actor network into...
This paper discusses a novel data center architecture based on load-balanced forwarding with in-packet Bloom filters enabled by two support services that distribute the directory and topology state of OpenFlow controller applications. By deploying an army of Rack Managers acting as OpenFlow controllers, the proposed architecture promises scalability, performance and fault-tolerance. We conjecture...
Search efficiency and accuracy of resource are important considerations in P2P networks. Most researches focus on improving search efficiency through efficient search mechanisms. However, they ignore the impact of P2P network topology on search efficiency, especially in heterogeneous network environments. In this paper, we propose a novel semantic topology construction method CATS (Capacity-Aware...
Based on the requirement analysis of capability modeling and simulation, put forward the concept model of complex communication network capability. And built an effects simulating framework, includes topology, traffic, damage, jamming and environment. In addition, give a verified instance.
The topologies of Internet and Internet-based information systems have complex network properties. Designing Internet-based virtual computing environment topology with appropriate properties is significant for both the resource sharing and system performance. We analyses the topology properties of the typical P2P systems, and proposes a new topology generating method, which includes three phases,...
Network size is one of the fundamental information of distributed applications. The approach to estimate network size must feature both high accuracy and robustness in order to adapt to the dynamic environment in different topologies. However, existing approaches fail to guarantee accuracy and robustness simultaneously in dynamic topologies due to the randomness of nodes sampled. In this paper, we...
The traditional client-server architecture widely adopted on the Internet is not adequate to meet the increasing user loads and bandwidth demands in live streaming systems especially for multimedia content delivery. Peer-to-peer P2P) overlay networks provide excellent system scalability and high resource utilization, which make it an attractive solution to this problem. This paper considers a hybrid...
The fat-tree topology has become a popular choice for InfiniBand fabrics due to its inherent deadlock freedom, fault-tolerance and full bisection bandwidth. InfiniBand is used by more than 40% of the systems on the latest Top 500 list, and many of these systems are based on a fat-tree topology. However, the current InfiniBand fat-tree routing algorithm suffers from flaws that reduce its scalability...
The proliferation of large-scale P2P VoD overlays has created the demands to characterize and to understand the emergent properties of P2P VoD applications. In this paper, we investigate the P2P VoD overlay network by active measurements with the help of the developed software, VoDCrawler. Different from other existing work, our study focuses on the topology of the overlay networks. From the study,...
Population characteristics such as density or dispersion are heavily used in exploring the viability of infrastructure investments and telecommunication networks' development, but not much attention has been paid to the effects of distribution of population sizes. In this paper, a fast method is presented for estimating the backbone network cost using population size distribution as an input parameter,...
In this paper, we present a Branch-and-price algorithm for solving the Optimal Topology Design Problem of complex networks, based on a tightened deterministic formulation for the problem. The algorithm, which incorporates a delayed column generation approach within a Branch-and-bound framework, was proven to work well, being capable of finding optimal topologies within very low computational times,...
Recently, the characteristics of traceroute probe have been widely studied in the field of Internet topology discovery, which helps researchers to understand the role of Traceroute tool better, such as sampling bias, marginal utility and so on. In this paper, we study three raw datasets of traceroute probe of different platforms and observe an interesting phenomenon: in the process of one probe, every...
Designing the architecture of future network requires the understanding of how a topological structure influences the performance of a network. The study of the topology known as complex network theory has revealed the omnipresence of power law topology in many real networks. This power law topology is known to provide high efficiency in data exchange among individual nodes as well as robustness against...
The ever-increasing requirements for performance, flexibility, and robustness are imposing a severe strain on the Internet's stagnated architecture. Network virtualization arises as a potential solution for improving the current situation by letting multiple networks with different requirements, architectures and protocols to coexist and share the same infrastructure in an independent way. These advantages...
Current Internet service-provider networks are typically over-provisioned, with the actual traffic through a network element often being much less than the capacity of the network element. However, current network element power consumption is largely independent of actual traffic. This presents an opportunity to reduce network power usage. Such an opportunity may be exploited locally, by redesigning...
Current trends in applications, services and socializing increase demands for network infrastructures, capable of supporting real-time traffic and Quality of Service (QoS). In this work, we aim at improving the inherently stringent wireless multi-hop network structure, based on the notion of inverse Topology Control (iTC). Taking into account socially-induced network churn operations, we focus on...
Wireless Mesh Networks aim to provide high-bandwidth broadband connections to a large community and thus, should be able to accommodate a large number of users accessing the Internet. Due to high estimated traffic volume in Wireless Mesh Networks, scalability and fault tolerance become important requirements in algorithm design. We propose a Failure Recovery Mechanism (FRM) for the channel assignment...
Network models can be used to represent interacting subsystems in the brain or other biological systems. These subsystems can be identified by partitioning a graph representation of the network into highly connected modules. In this paper we describe a modularity-based partitioning method based on a Gaussian model of a directed graph. Using the degrees of each node, we first compute the conditional...
Our research team at the University of Nebraska's Advanced Telecommunications Engineering Lab (TEL) is working closely with the North American freight railroad industry to leverage wireless sensor networks (WSN) onboard railcars for advanced monitoring and alerting. Because freight train WSNs exhibit a linear chain-like topology of significant length, the existing IEEE 802.15.4 communication protocol,...
Border Gateway Protocol (BGP) is almost the most important operating instance among inter-domain routing protocol. In order to improve its performance, researchers proposed to use different tie-breaking metric instead of AS-hop count. However, to the best knowledge of authors, there is no evaluation on how other tie-breaking metric influences BGP's performance. In this paper, tie-breaking metric models...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.