The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To deal with dynamic load balancing in large scale distributed systems, we propose to organize computing resources following a logical peer-to-peer overlay and to distribute the load according to the so-defined overlay. We use a tree as a logical structure connecting distributed nodes and we balance the load according to the size of induced sub trees. We conduct extensive experiments involving up...
Historically, scientific computing applications have been statically linked before running on massively parallel High Performance Computing (HPC) platforms. In recent years, demand for supporting dynamically linked applications at large scale has increased. When programs running at large scale dynamically load shared objects, they often request the same file from shared storage. These independent...
Efforts to realize video streaming over Mobile Ad hoc Networks (MANETs) meet many challenges, which are addressed by different techniques. In the highly dynamic and unpredictable environment of MANETs, cross-layer mechanisms seem to be the most suitable for optimising video streaming. This paper presents a survey of 44 studied papers on the area, comparing tools, parameters and metrics used for their...
In this paper we understand BitTorrent protocol from a Markov approximation perspective. We show that together with the underlying rate control algorithm, the rarest first algorithm and choking algorithm in BitTorrent protocol implicitly solve a cooperative combinatorial network utility maximization problem in a distributed manner. This understanding allows us to access properties of BitTorrent from...
We investigate the impact of cooperative relaying on uplink multi-user (MU) wireless video transmission. We formulate the problem as an MU Markov decision process (MDP) that explicitly considers the cooperation at the physical layer and the medium access control sublayer, the video users' heterogeneous traffic characteristics, and the dynamically varying network conditions. Although MDPs notoriously...
Today's abundance of sensors and their wireless/wired networks, coupled with a growing plethora of applications, necessitate a dynamic approach to the assignment of tasks to a network. The current practice in WSN design is almost always application specific, due to functional and resource tradeoffs that have justified much of the tailored research done so far. Identifying this as a major bottleneck...
In our previous work [6], we proposed a cluster based two-phase PPIR protocol to repair the lost packets among end users during the 3G Base Station (BS) broadcast. The PPIR protocol achieves better performance compared with others since cluster heads have the full knowledge of each cluster and collect the data packets efficiently by exchanging control information with cluster members during the first...
In this paper, we describe an improved model Kad-D based on Kademlia[1]. The networks based on Kademlia are not stabilized at all times, for all kinds of nodes in the networks connected to the networks can be cut out of networks frequently. And in mobile environments that are made of intermittent connections and unsettled networks bandwidths, the Kademlia has good performance but the hops, delay and...
Since peer-to-peer (P2P) applications like BitTorrent are prevalent on the Internet, the amount of Internet traffic is explosively growing. The traffic caused by P2P applications to share large files have a considerable impact on the network operation, because P2P applications significantly consume network resources and often saturate the capacity of broadband access, inter-domain, or international...
The paper presents a concept of a rating algorithm aiming at overall peer-to-peer traffic reduction (and locality awareness) and decrease of load on costly links, thus diminishing operator's costs. The rating algorithm is not only performed by a sole Oracle, as is typically proposed, but its operation is also supported by a similar entity located in other domains. Due to this concept, a usually omitted...
In this paper, we consider a two-way asymmetric relaying channel with unmatched traffics from two sources. Aiming at maximizing the sum rate under a minimum rate constraint, we address the optimization problem (in terms of time and power allocation) for two decode-and-forward (DF) strategies, namely, the decode-and-forward with joint modulation (DF-JM) and the decode-and-forward with network-superposition...
The ultimate success of the Wireless Mesh Network paradigm (WMN) in large scale deployments depends on the ability to test it in real world scenarios. A typical application scenario which is worth to be investigated in such a context is peer-to-peer traffic management. The creation of large scale testbeds for evaluating wireless mesh technologies and protocols, and for testing their ability to support...
Multicast has been being developed as a very promising technique to data delivery to a group of destinations simultaneously. Except of first implementation for multicasting in the Internet aka IP Multicast, for past few years some systems defined for end-hosts overlay network have been successfully designed and implemented. Additionally, overlay multicast defined for end-host based networks has been...
Considering a tandem network of queues (each representing the buffer in a router) our objective is to allow each individual queue to dynamically control its own parameters (in this paper the buffer size) using only information available locally and from neighboring nodes. For each node we adopt control approaches that are based on Infinitesimal Perturbation Analysis (IPA) estimates of certain performance...
The evolution of network technologies brought increasing management complexity of networking infrastructure and protocols. Cognitive networking was introduced to deal with such complexity. This work presents a cognitive algorithm for cross-layer performance management which is the core of a decentralized framework for self-configuration of communication protocols. We illustrate the proposed solution...
P2P-based optimization has recently gained interest among distributed function optimization scientists. Several well-known optimization heuristics have been recently re-designed to exploit the peculiarity of such a distributed environment. The final goal is to perform high quality function optimization by means of inexpensive, fully decentralized machines, which may either be purposely organized in...
Applications can be submitted as jobs in grid. Grid jobs usually comprise the scenarios of file stage-in, execution and file stage-out. These scenarios always run in batch mode. It leads to the waiting of the computational resource for data transfer and limits the performance of the grid application, especially when the application is data/communication intensive. Utilizing the file sharing function...
In this paper we consider a linear optimization approach for studying download finish times in peer-to-peer networks that allow but do not require coding. We demonstrate that using the network coding framework simplifies analysis even in scenarios where the optimal solution does not require coding. For example, we use the network coding framework to disprove the claim of Ezovski et al. that in the...
The aviation community is in the process of designing the next generation Aeronautical Telecommunications Network (ATN), based on Internet standards, to provide air- ground communications for the aircraft. Support for mobile networks in the current Internet architecture is provided by the NEtwork Mobility (NEMO) protocol. As currently defined, NEMO Basic Support protocol lacks of Route Optimization...
Applications based on peer-to-peer systems are oblivious to the underlying Internet topology. Chaotic connections between peers generate a large amount of traffic crossing carriers' borders, causing growth of operators' costs and have negative influence on performance (increased download time). In this paper, Yukka method is proposed to improve performance by localizing traffic on the basis of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.