The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper analyzes the transmission efficiency of two kinds of communication technologies: summation frame and individual frame. The abstract models for these two communication technologies using linear topology, which is the most popular topology in industrial control field, are proposed in this paper. The simulation results based on the models show that summation frame has a significant performance...
Aiming at providing united control of multi-domain optical networks orchestration, we design the Federated Platform based on Open Network Operating System (ONOS). Our implementation includes adding and extending modules in ONOS to provide the global view of multi-domain networks and support cross-domain end-to-end services by communicating with the individual domain controllers through RESTCONF protocol...
Abstraction and Control of TE Networks (ACTN) refers to the set of virtual network operations needed to operate, control and manage large-scale multi-domain, multi-layer and multi-vendor TE networks, so as to facilitate network programmability, automation, efficient resource sharing. This paper provides scalable telemetry streaming mechanisms that describe Key Performance Indicator (KPI) telemetry...
Recent empirical evidence from research on temporal networks has shown that the time constraints imposed on individual interactions are crucial for understanding the generic structure and dynamics of networks. A desirable but challenging task is sampling the waiting time distribution (WTD) associated with their internal interactions, a defining feature that reflects the added time dimension of temporal...
Service Function Chaining (SFC) consists of SFC data plane and control plane from the aspect of architecture. The standard document of I-D.ietf-sfc-control-plane-00 describes requirements for delivering information between SFC control elements and SFC functional elements. This paper defines requirements of management of SFC control plane and defines Yang data model of management operations performed...
In building automation systems, the diversity of existing field level networks is a major challenge for fully integrated solutions. Typical approaches achieve integration by shifting the needed complexity to the automation or management layer. In contrast, this paper focuses on leaving the complexity at the field level to provide a homogeneous view to upper layers without compromising reliability...
This paper studies means of archiving energy balance in Wireless Sensor Networks (WSNs) as criterion to increase network lifetime. While protocols for balancing energy through centralized computation have been established, effective solutions for more realistic distributed settings are still an open research field. In this work, we present a novel approach for balancing energy in WSNs in a distributed...
The specific capabilities of Wireless Sensor Networks (WSNs), such as fast deployment and flexibility, together with the low cost solutions that can be achieved, bring new opportunities for an all-new range of applications, far from the typical scenarios of low requirements and high redundancy. Some of these new scenarios involve the assurance of predefined performance goals. To guarantee that these...
Because of road accidents vehicular networks were originally designed to enhance road safety, and have much evolved in these recent years towards being driven by exchanging and accessing multimedia information. Indeed, Such applications are very greedy in terms of transmitted traffic and used bandwidth and then meet some limits in vehiculars envirements. In this work we address the problem of optimal...
In this paper, we demonstrate an implementation of a Network Services Abstraction Layer (NSAL) on top of the network control and management plane. Furthermore, we introduce a unified data model for both Software Defined Networking (SDN) and legacy devices that allows managing and configuring both networks in a unified way in order to achieve Quality of Service (QoS) for time-critical tasks (e.g. VoIP)...
This paper presents an economic perspective on traffic attraction and countermeasures. The results demonstrate that tier-1, tier-2, and tier-3 networks have significant financial incentives to attract traffic. In comparison to ASes from the lower tiers, the tier-1 networks are in a stronger position to benefit from traffic attraction with respect to: (a) the degree of the attainable gain, (b) impact...
The deployment of new security technologies in existing network topologies requires exhaustive testing before usage to avoid down time of the production systems. Nowadays, the required testing is in many cases omitted due to the complexity of creating test cases and experimental set ups. The VISA (Virtual IT Security Architectures) project [1], funded by the German Federal Ministry of Research, aims...
Particle Swarm Optimisation (PSO) implementations are commonly ad hoc creations, despite the high degree of similarity between variants of the algorithm. Although a “canonical” form of the algorithm is generally understood, differences in the execution of the experiment may produce unique results. It is valuable to establish a common understanding of the informational representation and execution...
Node faults may be frequent in a mobile ad hoc network (MANET). Most work related to fault detection and localization for MANETS essentially use changes in topology to identify faults. Most of this work does not distinguish between node movement that results in a functioning node moving out of range of all other nodes versus a node that crashes as the result of a radio transmitter malfunctioning or...
In this paper we describe the implementation of a declarative framework to support the development of distributed management applications. The framework is based on an extension of declarative networking, an asynchronous computational model that uses recursive SQL as its foundation and has been successfully used for the implementation of multiple networking protocols including opinion-based preferential...
This paper describes an experimental study of the overlay topologies of real-world Bittorrent networks, focusing on the activity of the nodes of its P2P topology and especially their dynamic relationships. Peer Exchange Protocol (PEX) messages are analyzed to infer topologies and their properties, capturing the variations of their behavior. Our measurements, verified using the Kolmogorov-Smirnov goodness...
An accurate model of network topology is the fundamental to design a new network protocol. Recent efforts have been made to produce many topologies for the Internet, but few can give attention the power-law distribution characteristic in each tier of the Internet. We propose Leetar, a new Internet topology generator, which can generate topologies that contains many tiers and each tier match the power-law...
Node failures may be frequent in MANETs, but there can be many different causes for those failures. Nodes may lose power, crash, or simply move out of range of other nodes in the network. Identifying the root cause is complicated by a lack of fixed monitoring and analysis infrastructure. Past research has focused on monitoring using either ping, heartbeat, or gossip-based approaches, which can incur...
We present a distributed adaptive node-specific signal estimation (DANSE) algorithm that operates in a wireless sensor network with a tree topology. The algorithm extends the DANSE algorithm for fully connected sensor networks, as described in previous work. It is argued why a tree topology is the natural choice if the network is not fully connected. If the node-specific desired signals share a common...
Epidemic-based communications, or 'gossiping', provides a robust and scalable method for maintaining a knowledge base in a sensor network faced with an unpredictable network environment. Since sensed information is often periodic in time, protocols should be able to manage multiple messages in an efficient way. We describe a mathematical model of gossiping dealing with multiple messages. We present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.