The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Overlay multicast is regarded as a promising way for distributing file or live stream during recent years. In this paper, we reinforce an optimal DAGs (directed acyclic graphs) construction algorithm by relaxing its partitioning and sorting conditions. We employ a realistic topology (CERNET2 backbone) to evaluate several typical types of optimal DAGs in terms of the underlay performance metrics. Simulation...
Software-Defined Networking (SDN) is an innovative approach to provisioning and delivering QoS (Quality of Service) services, yet it is still devoid of context-differentiating services. In this paper we propose a network application (Autonomic QoS Broker) and a controller module that implements the OpenVSwitch Database Management Protocol (OVSDB). These two components were implemented and validated...
The current design drivers for multi-cores, namely performance per watt, scalability and flexibility, make the Networks-on-Chip (NoCs) the de-facto on-chip interconnect. State of the art NoCs can exploit heterogeneous solutions and complex DVFS techniques to fulfill also the variability of the application requirements. Relevant showstoppers to the design of a truly flexible NoC fitting all the possible...
Software-Defined Networking (SDN) is a new paradigm that is attracting significant attention from both academy and industry. In recent years, increasing research efforts have addressed the conception of programming interfaces—northbound APIs—which allow business-applications to properly communicate with SDN controllers and program the network. However, most of current SDN controllers still offer low-level...
The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control algorithms becomes even more relevant for networked applications running in environments such as data centers. Therefore, we provide an extensive overview of relevant TCP congestion...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
Vehicular ad hoc networks (VANETs) have been attracting interest for their potential roles in intelligent transport systems (ITS). In order to enable distributed ITS, there is a need to maintain some information in the vehicular networks without the support of any infrastructure such as road side units. In this paper, we propose a protocol which can store the data in VANETs by transferring data to...
The general method available for comparison between the Distributed Hash Table (DHT) based structured overlay networks are average latency per successful lookup and percentage of successful lookups. For a DHT based lookup service with lookup retries for failed lookups, both average latency per successful lookup as well as percentage of successful lookups are key to evaluate the performance. Although,...
Cloud storage has gained increasing popularity in the past few years. In cloud storage, data is stored in the service provider's data centers, and users access data via the network. For such a new storage model, our prior wisdom about conventional storage may not remain valid nor applicable to the emerging cloud storage. In this paper, we present a comprehensive study and attempt to gain insight into...
Existing incentive schemes for peer-to-peer (P2P) file-sharing are rate-based, giving room for strategic peers to benefit from manipulative behaviors so as to treat honest peers unfairly. Specifically, strategic peers can achieve high performance by providing high upload rates which are useless to the system. On the other hand, honest peers suffer from getting low download rates even if they devote...
Monitoring is an essential aspect of maintaining and developing computer systems which increases in difficulty proportional to the size of the system. The need for robust monitoring tools has become more evident with the advent of cloud computing. Infrastructure as a Service (IaaS) clouds allow end users to deploy vast numbers of virtual machines as part of dynamic and transient architectures. Current...
Dynamic, large social events with concurrent activities, in which participants view, but also provide high-quality content to other visitors, pose one of many challenges to multimedia delivery. Distributing content in such a situation is difficult, and requires strong support from the underlying network, in order to quickly respond to changes in supply and demand. A Flock is a flexible overlay built...
In the area of network performance and discovery, network tomography focuses on reconstructing network properties using only end-to-end measurements at the application layer. One challenging problem in network tomography is reconstructing available bandwidth along all links during multiple source / multiple destination transmissions. The traditional measurement procedures used for bandwidth tomography...
The need for service resilience is leading to a steadily growing number of multi-homed Internet sites. In consequence, this results in a growing demand for utilising multiple Internet accesses simultaneously, in order to improve application payload throughput during normal operation. Multi-path Transport Layer protocol extensions - like Multi-Path TCP (MPTCP) for TCP and Concurrent Multipath Transfer...
The peer-to-peer networking technologies and systems provide a rapid and scalable content distribution mechanism for the increasing client population to access an explosive volume of media files on the Internet. Whereas the BitTorrent protocol and its derivatives are the most popular peer-to-peer file sharing applications, this paper proposes the performance measurement and analysis of BitTorrent...
The traffic explosion and the variety of applications have complicated network management by exhausting network resources and diversifying SLAs. We propose NMS that optimizes paths to accommodate more traffics and maps logical and physical resources to realize virtual networks of different qualities. Simulation results showed the NMS doubled accommodated traffics.
In this paper we present the concept of community downloads as a mechanism to improve the overall performance of BitTorrent clients. A community is a group of nodes interested in the same content working cooperatively inside a swarm. To reinforce this cooperation among community nodes, we designed two new algorithms: Group Rarest-First (piece selection) and Group-Balanced Tit-for-tat (unchoke policy)...
P2P content providers are motivated to localize traffic within Autonomous Systems and therefore alleviate the tension with ISPs stemming from costly inter-AS traffic generated by geographically distributed P2P users. In this paper, we first present a new three-tier framework to conduct a thorough study on the impact of various capacity aware or locality aware neighbor selection and chunk scheduling...
In this work we deal with video streams over TCP networks and propose an alternative measurement to the widely used and accepted peak signal to noise ratio (PSNR) due to the limitations of this metric in the presence of temporal errors. A test-bed was created to simulate buffer under-run in scalable video streams and the pauses produced as a result of the buffer under-run were inserted into the video...
The Ad-hoc On-demand Distance Vector (AODV) is the most typical reactive routing protocol in MANET. It has been extensively studied through not only computer simulations but also implementations on real network. In this paper, an implementation of AODV routing protocol with multi-metric was presented. In the implementation, an Uppsala University routing protocol, AODV-UU was modified in order to apply...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.