The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
IPv6 has become popular now-a-days among the ISPs, organization and end users because of its magnificent features and due to the limitation of IPv4. The migration from IPv4 to IPv6 is mandatory due to the address scarcity and security vulnerabilities of IPv4. But the deployment of IPv6 is far beyond satisfactory level in Bangladesh. So, a smooth as well as effective transition mechanism is needed...
Packet forwarding anomaly is an abnormal network state where flows are forwarded along wrong paths. Current practice of forwarding anomaly detection in Software Defined Networks (SDN) is achieved by sending probing packets or analyzing flow statistics. However, these approaches are not effective and efficient. For example, the probing approaches cannot capture all attacks, and the statistics approaches...
VANET is a part of MANET which is specific on communication between vehicle to vehicle or between vehicles to its surrounding environment infrastructure. One of the most widely used routing protocol at VANET implementation are AODV (Ad-hoc On-Demand Distance Vector) and DSDV (Destination Sequence Distance Vector Routing), which are topology based routing protocol. VANET dynamic network architecture...
Improving availability and throughput is a significant challenge for data center networks. Recent studies have attempted to use a variety of routing and multipathing techniques. However, no method has yet managed to combine availability and throughput improvement with actual deployability, usually because of dedicated hardware requirements. In this study, we focus on commodity-based layer-3 data center...
Requests in SIP (Session Initiation Protocol) usually pass through several servers. Since resources are considerably consumed to keep the state, state distribution problem is raised among several servers where the goal is to increase throughput, accessibility of servers and reduce overload. In this paper, the optimisation problem was formulated and implemented as a distributed algorithm on Asterisk...
This study presents new channel utilization methods for a multi-channel wireless backbone network (WBN). To flexibly and efficiently use multiple channels, we exploit OpenFlow as a baseline function. In this paper, we propose a new framework to build an OpenFlow-based multi-channel WBN and then implement two new channel utilization methods: (i) a flow direction aware channel assignment method (DCA)...
Cloud networking imposes new requirements in terms of connection resiliency and throughput among virtual machines, hypervisors and users. A promising direction is to resort to multipath communications, yet existing protocols still struggle to take advantage of the path diversity offered by IP networks. Multipath TCP (MPTCP) can create several TCP subflows on different interfaces and concurrently forward...
Low-dimensional k-ary n-cubes were the most popular topologies in parallel computers, and they are still gaining a great interest in the context of on-chip networks. Clustered networks have been suggested to further reduce the diameter of low-dimensional k-ary n-cubes such as mesh and torus. This paper studies the performance merits of clustering with torus topology in terms of average message latency,...
Most network applications nowadays are related to the distribution of contents from a source to a number of users. Several developments such as CDN and P2P networking have been used to provide access to contents at the network edges. However, they have no ability to leverage caching at the network level and still rely on a host-based communication model. Recently, Content Centric Networking (CCN)...
We present a method to find an alternate path, after a link failure, from a source node to a destination node, before the Interior Gateway Protocol (e.g., OSPF or IS-IS) has had a chance to reconverge in response to the failure. The target application is a small (up to tens of nodes) regional access subnetwork of a service provider's network, which is a typical access scale encountered in practice...
Network requirements are evolved from data communications between two hosts to accessing a large amount of information through networks. The current Internet uses address-centric network communication model, which is suitable for the communications between hosts but not efficient in the communications between hosts and networks. Given this fact, Information-Centric networking (ICN) becomes the hot...
NoC (Network-on-Chip) has been proposed as a new solution to deal with the global communication problem of complex SoC(System-on-Chip). An evaluation tool is essential for optimizing the NoC design, through which the functionality and performance of the NoC are verified. This paper presents a coverage-driven and hierarchical NoC verification platform based on System Verilog language. It is applicable...
Middle Boxes serve for the security in Data Center Networks (DCNs). Together with the growth of the services and applications in DCNs, flexible and scalable middle box deployment is highly required. The current middle box deployment methods are error prone. In this paper we propose Policy Aware Data center network (PAD), a flexible and scalable middle box provisioning architecture. PAD supports traditional...
A Network-on-Chip (NoC) is a new paradigm in complex System-on-Chip (SoC) designs that provides efficient on-chip communication architecture. It offers scalable communication to SoC and allows decoupling of communication and computation. In NoC, design space exploration is critical due to trade-offs among latency, area, and power consumption. Hence, analytical modeling is an important step for early...
Cloud computing has emerged to provide infrastructure for cost-effectively hosting applications with dynamically changing demands for computational resources. Dynamic resource allocation in cloud computing is made possible through virtualization technologies. In addition, live migration of services hosted in virtual machines (VMs) among multiple data centers is expected to add more flexibility in...
The Proxy Mobile IPv6 (PMIPv6) have been widely studied as a mobility management protocol to effectively use the limited wireless resources. Recently, there have been some researches to apply PMIPv6 to multicasting, which is core technology of Internet broadcast system. However, PMIPv6 based multicasting has a problem in that it shows the disconnection of services during the handover because it does...
This paper proposes a new dimension order routing algorithm for Mesh-of-Tree based Network-on-Chip design. It simplifies the router design as well. It results in significant saving in the energy consumed by the network. For uniform traffic, the saving is as high as 63%. It offers the flexibility of designing routers of different sizes for mapping of applications.
Wireless mesh networks (WMNs) are comprised of nodes with multiple radio interfaces and provide broadband residential internet access or connectivity to temporal events. Our goal is to simplify the network deployment of such a mesh network, and towards that we are presenting procedures for automatic configuration and optimisation of the network. We first present an architecture framework that supports...
This paper considers that multi protocol label switching (MPLS) and differential services (DiffServ) architectures are being applied to IP networks to provide more scalability, service differentiation. The traditional Diffserv mechanism provides classifier for edge router to examine incoming packets and mark packets with a code point that reflects the desired level of service, the core router responsibilities...
When multiple overlay networks are constructed over the same underlying IP network, overlay paths on different overlay networks may share some links on the IP network. In general, however, because overlay networks do not recognize the existence of each other, they have no consideration on such shared physical links. In this paper, a cooperative routing method for multiple overlay networks is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.