The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We study the prototype for fine-grained bandwidth allocating managers (FGBAM) which allot communication bandwidth inside heterogeneous software-defined networks (SDN) based on user-defined policies. FGBAM can be beneficial in enabling Quality-of-Service (QoS) during both normal periods and disaster recovery time. FGBAM consists of two parts: the web-based front end and the back end for enforcing bandwidth...
This paper presents a novel quality-of-service (QoS) management system for SDN networks with the feature of distributing bandwidth for applications in different slicing networks. Thus, the applications in different sliced networks (different divisions of an enterprise) can have different bandwidth management policies. The proposed system is also integrated into a vCPE framework to achieve network...
In this paper, we propose an anti-interference cooperative spectrum sharing strategy based on fairness secondary users selection where the secondary system can gain spectrum access to the primary system. Specifically, secondary user STb and STq are selected to transmit the primary and secondary signal by using different bandwidth in the second transmission slot which occupies a part of the whole transmission...
We propose a cooperative spectrum sharing strategy in which the secondary system can access to the licensed spectrum of the primary system if it can help the primary system achieve the target rate. Specifically, the secondary system acts as a decode-and-forward relay for the primary system by splitting a fraction of its transmission bandwidth to help forward primary signal. It uses the remaining bandwidth...
In this paper, we propose an anti-interference cooperative spectrum sharing strategy in cognitive two-phase full-duplex relaying networks, in which the secondary system acts as a decode-and-forward relay to assist the primary system achieve the target transmission rate. As a reward, the secondary system can gain access to the licensed primary spectrum to transmit its own signal in both two phases...
For mobile multi-hop wireless network, IEEE 802.16j/MR network can not only supply large area wireless deployment, but also provide high quality network service to mobile users. In this paper, we will be focusing on QoS supporting for mobile users in the IEEE 802.16-MR network. The probability of a mobile user who visits a RS is known beforehand. With the same visiting probability of each RS and the...
This paper targets at service provisioning and bandwidth allocation in single-service overlay multicast network by modeling it as a first-price monopoly auction. We propose a game theoretic pricing mechanism for determining the distribution of a typical multimedia content from an origin server, via the unicast links. By leveraging the rich theory of strategic mechanism design of microeconomics, we...
Wireless clients must associate to a specific Access Point (AP) to communicate over the Internet. Current association methods are based on maximum Received Signal Strength Index (RSSI) implying that a client associates to the strongest AP around it. This is a simple scheme that has performed well in purely distributed settings. Modern wireless networks, however, are increasingly being connected by...
Tactical data links are an essential contribution to automatic "real-time" communication. In the current tactical environment, most users are pre-allocated a fixed amount of bandwidth. As a result, there should be bandwidth wastes and no guarantee of QoS. If the network is flooded, delaying of important messages may happen. So We need proper network management framework in TDL system. And...
Multi-path is a technique to increase the reliability of the internet connection in IP network. The implementation of this technique can be described as a host with two TCP paths work together, when one of them fails the other will back up the connection. Since TCP does not support multi-homing, the right term for this technique is multi-path. The fairness problem arises when multi-path host uses...
Developing distributed applications for MANETs is a complex task due to the latter's bandwidth constrained nature. Further, in tactical MANETs, there is a need to prioritize traffic generated by distributed applications so that high priority traffic gets preferential access to the bandwidth constrained communication medium. Finally, applications must be designed to accommodate network bandwidth and...
The proliferation of handheld devices with the support of multiple interfaces makes it a common requirement of users to have access to multiple access networks simultaneously in order to obtain increased performance. Aggregating bandwidth of two or more Internet connections makes Internet applications to use the total available bandwidth in order to increase the goodput and reliability with link redundancy...
In WiMAX network, service flows with different priorities are defined. The priority of real time traffic is higher than that of non real time traffic. As bandwidth is limited, the resource must be allocated in advance to guarantee the delay time of real time traffic in WiMAX network. For this, the proposed algorithm must respond quickly to the sudden shortage of resource. In this paper, we will propose...
We consider a wireless system in which a base station allocates bandwidth to users, based on their bandwidth requests in time frames. We design a self-tuning mechanism for the case when users may cheat by requesting more bandwidth than what they truly need, in order to relieve congestion for themselves when the system is overloaded. Our self-tuning mechanism guarantees that the system will automatically...
Vehicles in Intelligent Transportation System employ IEEE 802.11p/1609 protocols to communicate with other vehicles or roadside infrastructure within a specific area. Messages related with traffic safety can be delivered timely for collision avoidance and etc. Meanwhile, non-safety related infotainment messages can also be transmitted besides safety-critical information. Many of the safety critical...
Nowadays, web servers are suffering from flash crowds and application layer DDoS attacks that can severely degrade the availability of services. It is difficult to prevent them because they comply with the communication protocol. Peer-to-peer (P2P) networks have been exploited to amplify DDoS attacks, but we believe their available resource, such as distributed storage and network bandwidth, can be...
Data Center Networks represent the convergence of computing and networking, of data and storage networks, and of packet transport mechanisms in Layers 2 and 3. Congestion control algorithms are a key component of data transport in this type of network. Recently, a Layer 2 congestion management algorithm, called QCN (Quantized Congestion Notification), has been adopted for the IEEE 802.1 Data Center...
In this paper, the Multiprocessor Bandwidth Inheritance (M-BWI) protocol is presented, which constitutes an extension of the Bandwidth Inheritance (BWI) protocol to symmetric multiprocessor and multicore systems. Similarly to priority inheritance, M-BWI reduces priority inversion in reservation-based scheduling systems, it allows the coexistence of hard, soft and non-real-time tasks, it does not require...
In the BitTorrent peer-to-peer file sharing protocol, it is observed that when a group of peers known to each other (due to geographical proximity or otherwise) are aiming for the same file, it is downloaded by a single peer and then shared within the group or it is downloaded individually. This is an inefficient approach as the fidelity rests on one peer or all peers (promoting redundancy), thus...
In network based path tracking control of systems with multiple unmanned ground vehicles (UGVs), performance can be affected by network constraints including time-varying network delays and bandwidth limitation. Different static as well as dynamic bandwidth management strategies like Larger Error First (LEF), Rate Monotonic (RM), Behavior Control (BC) Based Allocation etc. have been proposed in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.