The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future tactical communications involves high data rate best effort traffic working alongside real-time traffic for time-critical applications with hard deadlines. Unavailable bandwidth and/or untimely responses may lead to undesired or even catastrophic outcomes. Ethernet-based communication systems are one of the major tactical network standards due to the higher bandwidth, better utilization, and...
Using the cloud for software defined networks opens new possibilities for the organization of computing processes of network controllers. The article considers the possibility of using an “endless train” method for virtualization of individual functional opportunities of SDN OpenDayLight controller. This method allows organizing controller computer processes caused by the need to serve the dynamically...
One of the major tasks when deploying real-time Ethernet networks is their configuration to achieve real-time behavior. In this paper we present an approach for a self-configuring plug-n-play network that automatically sets up devices and offers hard real-time guarantees to such devices. A new architecture and a protocol based on OpenFlow are proposed to achieve a system that can react to failures...
A challenge in the adoption of the OpenFlow (OF)-based SDN paradigm is related to the limited number of OF rules supported by the network devices. The technology used to implement the OF rules is TCAM, which is expensive and power demanding. Due to this, the network devices are either very costly or they can support a very limited number of OF rules. One way to cope with this limitation, is to perform...
Minimizing the energy consumption and hence extending the network lifetime is a key requirement when designing an efficient sensor network protocol. QoS-aware routing in Wireless Sensor Network (WSN), aims to take into account other networks performance aspects as minimizing end-to-end delay (as well as jitter), reducing packet loss rate and minimizing the energy consumption of the network during...
This paper presents the application of QoS about a heterogeneous network based on DWDM transmission technique as core and having as edges two technology platforms, ATM and Ethernet applied QoS in residential services such as VoIP, video conferencing, digital television and data link high rates of transmission. With this design and implementation performance were performed measurements to services...
In tactical networks, the quality of service of flows which demand an assured data rate requires connection admission control, and this process can be strongly improved by coupling it with QoS-oriented routing. The TACOMS phase 2 intelligent routing solution does not only choose paths according to their ability to provide a specified data rate, it can also select the route of a flow as a function...
The research trends in computer and wireless communication networks are growingly facilitated with the emergence of various Network Simulation tools. Network simulation software enables users to model network behavior demonstrating the packet transmission behavior and interaction amongst the nodes. These models are further used to analyze and predict the behavior of a computer network on various devices...
Traffic Flow Confidentiality (TFC) aims to prevent analysis of traffic flows. According to the principles of Protected Core Networking (PCN), TFC should be provided as a service in the network and not implemented by the users. Since provisioning of TFC in the entire network might not be practical or economical feasible, solutions are required for forwarding traffic on paths where sufficient TFC is...
The Low Extra Delay Background Transport (LEDBAT) protocol is a recently standardized protocol that aims to offer a scavenger service (i.e. the goal is to exploit the remaining and unused capacity of a link). LEDBAT is a delay-based protocol mainly defined by two parameters: a target queuing delay and a gain. The RFC 6817 provides guidelines to configure both parameters that strongly impact on the...
The momentum around Software-defined Networking (SDN) is increasing. It has become clear that the network architecture needs to evolve to be able to provide current and next generation networking services, both from a performance and implementation point of view. However, most of the current SDN research has looked to specificities of SDN and few have looked from a full stack perspective. Although...
In this paper we present an idea of a propriety Software Defined residential Network (SDrN) and we show as a use case, a multicast streaming service that can be hosted on such networks. To verify the feasibility of the service in the context of quality of service, we offer to the providers of online streaming services (in some cases the ISPs themselves), APIs to control and validate the QoS of the...
MANETs (Mobile Ad-Hoc Network) are temporary networks composed of many autonomous nodes. Service discovery is the technology of finding services matching one's needs in the network, which is crucial to the usability of MANETs. In this work we inherit the property of swarm intelligence based service discovery architecture for MANET and prove the efficiency of our system based on 3 factors: Congestion...
The Resource Reservation Protocol (RSVP) represents one of the most important protocols in the field of Quality of Service (QoS). Over time different extensions of RSVP have been proposed by the Internet Engineering Task Force (IETF) in order to mitigate the scalability issue of the protocol. The RSVP Bundle extension is such a scalability extension. Most important network simulation tools do not...
In this paper, we design an architecture to implement a QoS system based on OpenFlow. The system can filter malicious packets that have no permission to gain quality of service, and can guarantee scheduling the fastest path for QoS packets in working network. By predicting and estimating current network flows, we implement to assign optimal path for QoS flow without affecting the rest of the normal...
This paper shows that end to end traffic flows in a network that pass through disjoint paths affect each other. We refer to this as transitive relationship between traffic flows. We measure interdependencies among network elements by traffic correlation which leads to this transitive relationship between traffic flows. We show that the effect of transitive relationship becomes significant under certain...
In this paper, we detect two attacks targeting the QoS-OLSR protocol MANET. The Cluster-based model QoS-OLSR is a multimedia protocol designed on top of Optimized Link State Routing (OLSR) protocol. The quality of service (QoS) of the nodes is considered during the selection of the multi-point relays (MPRs) nodes. In this work, we identify two attacks that can be launched against the QoS-OLSR protocol:...
Conventionally, network migration models study competition between emerging and incumbent technologies by considering the revenue increase and migration cost. We propose to extend the existing network migration models with new critical factors, including (i) synergistic relationships across multiple technologies, (ii) reduction in operation expenditures (OpEx), and, (iii) effect of social factors...
The paper describes a service model for cost-effective event reporting to clients over a wide-area network. The service provider (SP) maintains multiple protocol mechanisms to replicate the event pages at different proxy nodes of the distribution network. The mechanisms, which embody server-driven and client-driven replica update schemes to synchronize the page copies, reduce the access latency on...
This paper analyzes the convergence properties of a distributed proportional-integral protocol for coordination of a network of agents with multiple leaders, dynamic information flow, and quantized measurements. We show that the integral term of the protocol allows the follower agents to ‘learn’ the reference rate, rather than have it available a priori, and also provides disturbance rejection capabilities.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.