The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information centric networking (ICN) is one of the emerging Internet paradigms proposed to overcome the shortcoming of the current host-centric Internet. With ubiquitous in-network caching, ICN can facilitate content delivery and reduce network delay. In this paper, we propose a novel collaborative caching scheme based on routers' position to cache popular videos on the edge routers which are closer...
Opportunistic networks (OppNet) enable users to connect each other via wireless communication without connecting to the Internet. These networks have fragile structures and the topology of the network is changed frequently, so it is impossible to have a Trust Third Party as a certificate authority. There are many different attacks against these networks and one of them is Sybil Attack. In this paper,...
Decentralized systems, such as overlay networks or content delivery networks, form a virtual network on top of a physical network leading to inefficiencies in handling network traffic as physical locations are not considered. Therefore, this work investigates, analyzes, and evaluates two feasible network locality metrics for decentralized systems to overcome such inefficiencies. Furthermore, those...
NDN (Named Data Networking) as one approach of the Content-Centric Networking (CCN) architecture, proposed by Jacobson, 2006, conceptually, has some advantages compares to the current Internet technology which build based on host-to-host TCP/IP protocol stack. However, technically, we have to examine the NDN approach, beside to prove the concept, also to get as much as able the opportunities of improvement...
Routing in Delay-/Disruption-Tolerant Networking (DTN) has long been recognized as a challenging research topic. The difficulty lies in the fact that link intermittency and network partitioning, possibly coupled with long delays, prevent the use of Internet solutions based on an up-to-date comprehensive knowledge of network topology, as communicated by routing protocols. In the literature on DTN routing,...
Service function chaining provides a new service deployment model that delivers the traffic along the predefined logical paths of service functions with no regard of network topologies or transport mechanisms. The traffic path of service functions needs to be recovered at failure of the service functions but it may incur a signaling delay among control-plane and data-plane components. In order to...
The Low Extra Delay Background Transport (LEDBAT) protocol is a recently standardized protocol that aims to offer a scavenger service (i.e. the goal is to exploit the remaining and unused capacity of a link). LEDBAT is a delay-based protocol mainly defined by two parameters: a target queuing delay and a gain. The RFC 6817 provides guidelines to configure both parameters that strongly impact on the...
Recent progress in network topology modeling has shown that it is possible to create smaller-scale replicas of large complex networks, like the Internet, while simultaneously preserving several important topological properties. However, the constructed replicas do not include notions of capacities and latencies, and the fundamental question of whether smaller networks can reproduce the performance...
The resource of DTN (Delay Tolerant Network) is constrained and its links are unstable, so the states of network can't be fed back in time to the source node of data. The rate control mechanism and window mechanism of congestion control can't solve the congestion problem of DTN. The paper has proposed A DTN Congestion Control Mechanism Based on Distributed Storage (DCM). When the congestion of a DTN...
A mobility management scheme for an all-IP Wireless Metropolitan Area Network (WMAN) is developed in this paper. The proposed scheme is topology-independent and user-independent, in the sense that it does not assume any mobility pattern, delay constraint, or network topology. The key idea is to use a topology-learning algorithm that enables to perform localized mobility management, by efficiently...
Measurement studies of the Internet topology have revealed that the degree distribution exhibits a power-law attribute. That is, the probability P(k) that a node has k outgoing links follows P(k) ~ k-gamma. However, it is known that the power-law degree distribution alone does not determine traffic-level behaviors in Internet topologies. In this paper, we investigate packet-level delay behavior of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.