The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents simulation results for a mobile ad-hoc network running Dynamic Source Routing reactive protocol under the conditions of limited availability and heightened response times of network nodes. Authors conclude that dynamic source routing stops being efficient in large networks and propose a hybrid routing protocol that includes the proactive phase and uses availability criterion...
Egress selection in an Internet Service Provider (ISP) is the process of selecting an egress router to route interdomain traffic across the ISP such that a traffic engineering objective is achieved. In traditional ISP networks, traffic through the ISP is carried through the network and exits via an egress that is closest to the source in an attempt to minimize network resources for transit traffic...
Hierarchical network architectures are widely deployed to reduce routing overheads and increase scalability. In our work, we are interested in deploying a P2P overlay in ultimately large-scale Mobile Ad-Hoc Networks (MANETs). We therefore study the performance of such an approach, creating a number of hierarchical network configurations and deploy Chord over them. The clusters are MANETs, running...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
BTLive is a novel, unique, mesh/push-based peer-to-peer (P2P) live video streaming mechanism. Previous studies show that it achieves significantly lower streaming delays than other approaches but suffers from a high overhead, where peers receive up to 33% duplicate video chunks. Other P2P streaming mechanisms, most of which are either mesh/pull or tree/push-based, do not experience duplicates at such...
This paper describes the development of a data exchange protocol for self-organizing computing environments with minimal latency. The protocol is implemented using standard software libraries for mobile device networks. The neighborhood method involves building a route using two broadcast requests, and the method proposed here is implemented using two broadcast requests. One of these requests is issued...
Software Defined Networks split the data plane from the control plane. They can be used in wireless networks and will bring flexibility, less interference, simple management, less energy consumption and load balancing. They can also improve service quality, handover and mobility between different service providers. In previous methods, when link states were changed the controller deleted the stored...
In this paper, we propose different techniques for message passing and event-driven communication among hierarchically organized objects. Proposed techniques are suitable for dynamic tree-structured applications, where application entities are organized in a tree and added to it in run time. Examples of such applications are modeling and simulation tools where application objects often follow parent-child...
Despite years of research, the Internet still lacks a routing protocol with guaranteed termination. As is well-known, decentralization of routing decisions among the Autonomous Systems (ASes) that comprise the Internet may result in permanent oscillations of the state of its routing protocol — the Border Gateway Protocol (BGP). Some permanent oscillations are made from routing loops — the propagation...
Dynamicity and infrastructure-less nature of MANETs expose the routing in such networks to a variety of attacks, and moreover, make the conventional fixed policy routing algorithms inefficient. To deal with the routing challenges and varying behavior of malicious nodes in such networks, employing reinforcement learning algorithms and proper trust models seem promising. In this paper, we introduce...
Kademlia is a widely successful Distributed Hash Table (DHT) implementation, better known for its use in the BitTorrent protocol. In this paper, we revisit its overlay management separately from the DHT operations to allow it to be used with other distributed abstractions by providing an accurate and consistent view of the k-closest nodes to any given identifier. We then present invariants that avoid...
Information Centric Networking (ICN) is future Internet architecture for distribution of the contents which are location independent and are cached in the ICN nodes, making them efficient for distribution and retrieval. ICN architecture is based on new protocols for unique naming and transferring of data objects over the network. Its focus is on delivery of data objects to the end user rather than...
Internet of Things (IoT) is an emerging paradigm in information technology (IT) that integrates advancements in sensing, computing and communication to offer enhanced services in everyday life. IoTs are vulnerable to sybil attacks wherein an adversary fabricates fictitious identities or steals the identities of legitimate nodes. In this paper, we model sybil attacks in IoT and evaluate its impact...
Epidemic algorithms have found their way into many areas of computer science, such as databases and distributed systems, and recently for communication in Opportunistic or Delay Tolerant Networks (DTNs). To ensure analytical tractability, existing analyses of epidemic spreading predominantly consider homogeneous contact rates between nodes. However, this assumption is generally not true in real scenarios...
A Bike Sharing System (BSS) may be modeled as a graph with two node types: stations with finite bike inventory subject to time-varying demand and intersections to represent the underlying transportation network. Mobile agents (replenishment trucks) travel on the arcs of the graph to reset station inventories and make routing decisions at intersections. One-way rides create inventory imbalances across...
Internet of Things (IoT) is widely recognized as a key enabling driver in environmental monitoring systems, thanks to its inherent capabilities to provide sensing and actuation functionalities on a distributed basis. At the same time, the majority of IoT applications are Information Centric by design: they target specific actions that are not related to any network node but can be provided by multiple...
Partial disjoint multipath routing has been largely deployed in networks such as wireless sensor networks, outperforming single path routing in load balance and fault tolerance, etc. However, disjoint multipath routing has not been widely deployed in networks, because the difficulty of designing an accordingly distributed algorithm. Software defined networking (SDN) is based on the abstract of the...
In this paper, we firstly propose the concept of aerostat cluster in the space and ground integration network. Then we discuss the structure of the near space aerostat network based on the business requirements of communication. After that, we design the routing algorithm (named ISPR) in near space network and make an in-depth analysis. Lastly, we propose an access method (named G_AAT) to achieve...
Mobile devices have changed from being terminal equipment for making voice calls, video calls, playing games and sending messages to including differing functionalities such as acting as a server and client for sharing information. Information sharing directly between modern mobile phones can be done using Bluetooth or WiFi functionalities. Such a network does not need a fixed infrastructure, thereby...
In this paper, we propose an OpenFlow-assisted framework for P2P (peer-to-peer) live streaming, which incorporates an OpenFlow-assisted architecture and an OpenFlow-assisted algorithm. The architecture combines the characteristics and advantages of both BitTorrent system and OpenFlow network. The algorithm can dynamically calculate the path and corresponding available bandwidth for each flow according...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.