The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of data transmission over digital networks, especially of delay sensitive traffic, has meant that research into improved network control and management has increased. Network domain boundaries are key points in the network where service provisioning, flow control, and management occur between organizations. This paper presents a flexible automated approach that utilizes Software Defined...
The article investigates the algorithm for distributing wireless network traffic in a group of robots. Within the framework of the research, an experiment was performed to compare the dynamic and static aggregation methods for wireless data transmission channels in the autonomous robots networks. The results of the conducted experiment showed that the static method of channel policy allows to increase...
A wide variety of applications are making use of battery powered real-time systems in the present world. We address the need of an energy efficient design of real-time systems to reduce power consumption while ensuring the timing constraints. We propose a novel algorithm Energy Efficient Bandwidth Inheritance (EE-BWI) Protocol which is an extension of the well-known Bandwidth Inheritance (BWI) Protocol...
The interactions between Active Queue Management (AQM) algorithms and TCP have been extensively investigated in the last few years. However, majority of the studies are conducted without considering the consequences of different attacks on TCP flows. This research work aims to investigate the performance of TCP flows under Low-Rate Denial-of-Service (LDoS) attacks. In particular, we have performed...
Wireless sensor networks (WSN) nowadays are used in variety of applications having various quality of service (QoS) requirements. Hence they are required to provide different levels of Quality of Services based on the type of applications. As these Wireless Sensor Networks are constrained by the processing speed, memory capacity, energy more concentration is given in these area ignoring other parameters...
In scenarios where a number of client nodes share a gateway in order to access a high-delay link, the original TCP as well as TCP variants specifically designed to improve performance on those links fail to provide optimal performance; this is due to the indirect inference of both end-to-end congestion and local channel conditions. To mitigate the former, C²ML (Congestion Control Middleware Layer)...
We present OpenFlow-enabled dynamic restoration in elastic optical networks, detailing the restoration framework and algorithm, failure isolation mechanism, OpenFlow protocol extensions, and quantitatively presenting the restoration performance via the experimental validation on the Global Environment for Network Innovations (GENI) testbed.
In an ad-hoc network, packet flow management is a major challenge due to rapid change of network structure. In heterogeneous queue monitoring scenario, some protocol dispatch packets according to their priority. As a result of these queue monitoring policies, packets that have lower priority leads to starvation even if they have travelled a long hop distance, hence the packet is dropped. Considering...
An unmanned ground vehicle (UGV) network operates as an intermittently connected system, distributed over large geographic areas. The cooperative nature of a UGV network requires that bandwidth be allocated depending on necessity between individual UGV nodes. In this paper, we study the problem of dynamic bandwidth provisioning in a UGV network. Specifically, we integrate the use of a basic statistical...
The availability of cheaper and high capacity Random Access Memory (RAM) has resulted in the growth of buffer size in all the computing devices. This aberrant increase of buffer capacity in network devices has resulted into high latency, leading to reduced throughput; thus decreasing the tendency of absorbing spontaneous burst of traffic. The requirement for Active Queue Management (AQM) has been...
This paper studies peer-to-peer networks with the objective of imposing a proportionally fair allocation of peer upload capacity. We begin with a tutorial review on the feasibility of achieving these allocations with idealized assumptions on connectivity and rate control, as well as a distributed algorithm based on peer reciprocity that can achieve it. To impose some of the constraints of real networks...
Physical Layer (PHY) techniques such as Spatial Multiplexing, Eigen Beamforming, Eigen Beamnulling, Power Control, Spectrum Segmentation and Link Adaptation have been proved effective in improving the Network Area Spectral Efficiency of ad hoc networks. Several works have focused on optimizing the parameters of these PHY techniques individually to maximize different components of the Network Area...
In this paper we present the design of an Advanced Centralized RWA Protocol (ACRP) in which the cost of a lightpath is computed based on its number of available free wavelengths and number of wavelength conversions. Centralized Management System (CMS I) assigns optimal primary and backup lightpaths. CMS II updates the optimal primary and backup lightpaths as and when the number of free wavelengths...
Peer-assisted content delivery systems can provide scalable download service for popular files. For mildly popular content, however, these systems are less helpful in offloading servers as the request rate for less popular files may not enable formation of self-sustaining torrents (where the entire content of the file is available among the peers themselves). As there typically is a long tail of mildly...
Soc is a technology that integrates heterogeneous system components such as microprocessors, memory logic and DSP's into a single chip. The overall performance of SoC design depends on efficient on-chip communication architectures. Efficient interconnection architecture is necessary interprocessor communication, communication between processors and peripherals and between processor and memory. The...
Our goal is to maintain 1+1 path protection as much as possible after a single failure occurs for ensuring carrier-grade reliability. An obvious approach is preparing a third path that is disjoint with the primary and backup paths, but applicability to actual networks with this approach is extremely restricted. From our evaluation, the recovery ratio for reconstructing 1+1 path protection decreases...
Tactical data links are an essential contribution to automatic "real-time" communication. In the current tactical environment, most users are pre-allocated a fixed amount of bandwidth. As a result, there should be bandwidth wastes and no guarantee of QoS. If the network is flooded, delaying of important messages may happen. So We need proper network management framework in TDL system. And...
With the rapid development of network technology, computer network evolved to the mobile wireless Internet gradually, and showing a highly heterogeneous trend. The traditional TCP protocol is designed for wire circumstance and is obviously poor in such circumstance. This paper proposes a new TCP scheme, called TCP-C, which is based on Explicit Congestion Notification algorithm ( ECN), referencing...
In wireless communication networks, TCP is a widely applied solution as it guarantees the delivery of data by implementing acknowledgement based techniques and used in wired networks as it ensures guard against the common remedy congestion in networks. Deploying TCP over wireless networks, restrictions such as random link errors, random packet loss, node distance, constantly changing topology are...
Based on the static scheduling algorithm, the article, which introduced a dynamic priority promotion mechanism for CAN, proposed a scheduling algorithm with the advantages of both static scheduling algorithm and dynamic scheduling algorithm. The algorithm can improve the real-time transmission of data; especially data with low priority and the utilization rate of CAN network bandwidth being very high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.