The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A well-known technique for enhancing the performance and stability of content distribution is the use of multiple dissemination flows. Multipath TCP (MPTCP), the most popular multiflow protocol on the Internet, allows receivers to exploit multiple paths towards a single sender. Nevertheless, MPTCP cannot fully exploit the potential gains of multipath connectivity, as it must fairly share resources...
In tactical networks, the quality of service of flows which demand an assured data rate requires connection admission control, and this process can be strongly improved by coupling it with QoS-oriented routing. The TACOMS phase 2 intelligent routing solution does not only choose paths according to their ability to provide a specified data rate, it can also select the route of a flow as a function...
Modern data center networks (DCNs) often use multi-rooted topologies, which offer multipath capability, for increased bandwidth and fault tolerance. However, traditional routing algorithms for the Internet have no or limited support for multipath routing, and cannot fully utilize available bandwidth in such DCNs. As a result, they route all the traffic through a single path, and thus form congestion...
Cloud Computing is becoming a mainstream paradigm, as organizations, large and small, begin to harness its benefits. This novel technology brings new challenges, mostly in the protocols that govern its underlying infrastructure. Traffic engineering in cloud data centers is one of these challenges that has attracted attention from the research community, particularly since the legacy protocols employed...
In this paper we present Roller chain, a novel Distributed Hash Table that offers efficient data storage through the combination of gossip-based and structured overlay networks. The unstructured component maintains clusters of fully connected nodes, where each cluster acts as a virtual node in the structured component. This architecture simplifies the management of data replication and balances the...
The performance of an interconnection network is typically measured by two metrics: average latency and peak network throughput. Average network throughput is usually reported in the belief the network is fair and all source nodes are supposedly able to inject at the same rate. However, most systems exhibit significant network unfairness under non-uniform loads. At high loads, if link utilization...
This article presents the main features of Layer 1 L1VPN Virtual-Private Networks. It focuses particularly on aspects such as the provision and modeling of services within inter-domain environments, the supply of a Layer 1 VPN, the existent and proposed architectures, and the type of services offered through Networking Technologies together with Optical Transmission. Interaction between these aspects...
The study and understanding of the social behavior of insects has contributed to the definition of some algorithms that are capable of solving several types of optimization problems. In 1997 Di Caro and Dorigo developed the first routing algorithm for wired networks, called AntNet, using an approach which was inspired in the behavior of ant colonies. At each node, AntNet, similar to others Ant Colony...
Delay Tolerant Networking (DTN) has been proposed as a global overlay architecture to provide network connectivity in challenged environments such as deep-space communications field. Bundle Protocol along with its convergence layer protocols transform end-to-end reliability into questionable hop-by-hop reliable communication and imposes a two-tier routing policy that allows flexible routes only within...
We present a lab-trial of multi-domain path computation using a hierarchical PCE when domain topologies are aggregated as dynamic virtual meshes. We detail the extended path computation procedures, control plane extensions and the overall performance.
Our proposed information-diffusion-based routing (IDBR) is implemented on Tsinghua University's large-scale ASON test-bed. The procedure of IDBR is validated together with RSVP-TE signaling in the experiment. Results show that the IDBR is fast converged and has low bandwidth consumption.
The PERCS system was designed by IBM in response to a DARPA challenge that called for a high-productivity high-performance computing system. A major innovation in the PERCS design is the network that is built using Hub chips that are integrated into the compute nodes. Each Hub chip is about 580 mm2 in size, has over 3700 signal I/Os, and is packaged in a module that also contains LGA-attached optical...
Single processor performance has exhibited substantial growth over the last three decades [1] as shown in Figure 1. What is also desired are techniques which enable connecting together multiple processors in order to create scalable, modular and resilient multiprocessor systems. Beginning with the production of the Intel® Xeon® processor 5500 series, (previously codenamed “Nehalem-EP”), the Intel®...
In large multi-domain networks, topology aggregation - besides assuring scalability - has a side-effect as it introduces undesired inaccuracies in the routing information. Such inaccuracy affects the efficiency of routing. In this paper, with the application of a threshold-based aggregation model, the relation between scalability and routing efficiency has been examined by evaluating two different...
The resource of DTN (Delay Tolerant Network) is constrained and its links are unstable, so the states of network can't be fed back in time to the source node of data. The rate control mechanism and window mechanism of congestion control can't solve the congestion problem of DTN. The paper has proposed A DTN Congestion Control Mechanism Based on Distributed Storage (DCM). When the congestion of a DTN...
Protected circuits provisioning on an optical network based on ROADMs is demonstrated using a GMPLS control plane with physical impairments considerations (link attenuation and PMD). Therefore, messages exchanged between nodes related to signaling procedures and topological data flooding were altered, in order to carry the necessary information for WDM network control. To operate properly, a RWA algorithm...
Exploring the use of all-optical MEM switches on local area network (LAN) to increase bandwidth and reduce energy cost has received increasing attention. Compared to traditional electronic switches, an all-optical switch provides higher bandwidth, less energy cost and cheaper wiring. Once the optical port count per switch becomes a resource constraint, an all-optical switched core can change the network...
A multimetric QoS routing protocol (MQOLSR) is proposed in this paper, which providing different QoS for different applications flow in an ad hoc network. The protocol, which integrates QoS measurement and packet forwarding, expands the topology discovery and routing computing mechanism of the OLSR protocol. It can provide different routing and forwarding service according to different application...
The downsizing of transistor dimensions enabled in the future nanotechnologies will inevitably increase the number of faults in the complex ULSI chips. To maintain the production yield at acceptable level, several levels of protection mechanisms will have to be implemented to tolerate the permanent and transient faults occurring in the physical layers. In this paper, we study fault tolerance at the...
Low-cost wireless routers are changing the way people connect to the Internet. They are also very cheap, albeit quite limited, Linux boxes. These attributes make them ideal candidates for wireless mesh routers. This paper presents a minimally invasive mechanism for redundant multipath routing in kernel-space to achieve high reliability with high throughput in a mesh network. This service is essential...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.