The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increasing demand of parallel applications in cluster computing requires the use of interconnection networks to provide low and bounded communication delays. However, message congestion appears when communication load between nodes is not fairly distributed over the network. Congestion spreading increases latency and reduces network throughput causing important performance degradation. In this...
Operators of federated networks require timely detection and diagnosis of networking problems. For detection of such problems, access to monitoring data that exists in multiple organisations is necessary. This paper presents an ongoing work on an Alarms Service which uses a standards-based access mechanism to obtain monitoring data from multiple organisations and then raises alarms based on pre-defined...
Sensor networks are the next generation of technology for use in various applications, including tracking, monitoring and control. However, sensor networks still have some inherent security and hardware problems. The cluster routing scheme has been proposed in attempt to reduce duplication reports. Moreover, statistical en-route filtering (SEF) has been proposed to detect and drop the injected fabricated...
Distributed denial of service (DDoS) attacks have become a major threat to organizations and especially to Internet and intranet. In DDoS attacks targets are overwhelmed by sending an enormous amount of traffic from a number of attack sites. The major tasks of any defense system are to detect these attacks accurately and early on, before it causes an unrecoverable loss. Most of the research in this...
A wireless sensor network (WSN) is composed of a large number of nodes deployed in a wide area. In the sensor network, there are some special nodes referred as sinks which play the role of data collector. Sinks are connected to internet so that they can forward data to the data collecting server. Thus each sensor can forward the information they sensed to any one of these sinks. In this paper, we...
Distributed denial of service (DDoS) attacks have become a major threat to organizations and especially to Internet and intranet. In DDoS attacks targets are overwhelmed by sending an enormous amount of traffic from number of attack sites. The major tasks of any defense system are to detect these attacks accurately and early on, before it causes an unrecoverable loss. Most of the research in this...
This presentation aims to localize an inter-domain failure due to inter-domain link failure or intra-domain link within optical domain (OD) that cause inter-domain effect. Delay analysis of the inter-domain localization protocol without power monitoring for three different cases is presented. Limited-perimeter vector matching protocol is also discussed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.