The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer Network has great effect on improving the efficiency of the communication system and application requirements in our life. In order to establish transmission path with movement characteristics and improve the efficiency of information transmission in Computer Network, the optimized clustering routing protocol based on node position using the minimum distance routing competition mechanism...
Many phenomena in our world can be modeled as networks, from neurons in the human brain, computer networks and bank transactions to social interactions. Anomaly detection is an important data mining task consisting in detecting rare objects that deviate from the majority of the data. Contextual collective anomaly detection techniques can be applied to intrusion detection in computer networks, bank...
Nowadays CLARA (Latin Americas Consortium for Advanced Networks) is partially stagnated with no grow since last update in 2013, with this review we hope in a near future offer a new proposal for updating and reactivation of advanced networks in Latin America. A step by step simulation was developed in order to get first approach to how CLARA works; then a step by step emulation was developed with...
Computer network plays vital role in our day to day life's critical issues such as hospitals, fire brigade, military. The errors or failures in such computer network create significant loss. These failures or errors should be taken into account while designing a computer network. Designing and improving computer network performance includes complex tasks, which takes more time and money. The network...
In modern computer networks loading and bandwidth of communication links are optimized for providing high-quality service of network traffic, new services and technologies. As a rule, for this task the protocols of dynamic routing based on Dijkstra algorithm are used. Protocols of multipath routing for ensuring reliability and accuracy of the provided information allow to divide critical traffic and...
Communication or computer networks are undergoing a fast development in various fields of applications like Information technology, business, e-commerce, medical applications etc. Even more, wireless sensor networks targets the applications like temperature sensing, destruction estimation, military and many others where human support is required only at remote console. Whatever is the communication...
This paper considers software tools and linguistic constructions of the network simulator TRIADNS. Nowadays network applications - especially in the area of wireless networks - are becoming more and more complex which makes the design and the testing almost impossible without appropriate software. This software available to aid the user in simulating previously designed scenarios, scalable algorithms...
Configuration validation is the process of automatically assessing whether the various configuration parameters of a network's devices are set to appropriate values according to a set of formal constraints given beforehand. Virtually all automated validation solutions presented to date assume a centralized and complete knowledge of the network's configuration to perform their analysis. We present...
The productive allocation is one of the most important factors for the development of Chip Multi-Processor (CMP) systems. The efficiency of CMP depends on the design of Processor Allocator which is driven by allocation schemes. A good allocation algorithm should identify available processors with minimum fragmentation and in as short period of time as possible. The goal of this paper is to present...
This part of research focuses on analysis and evaluation for synthesis problem of a computer network heterogeneous structure. Where the core of the network has a ring topology, the network lower level-topology tree, and this paper composed of two interrelated parts. Firstly, this part of presented herein addresses one of problems concerned with planning of computer networks with heterogeneous structure...
We have proposed a design tool for synthesizing multitier computer networks based on the concept of molecular assembly (MA), where the network's nodes integrate intelligently together by exploiting various forces of attraction existing between the nodes. Three forces are defined and the forces are the distance force, the incoming flow force and the outgoing flow force. Our simulation results demonstrate...
Many computation-intensive scientific applications feature complex workflows of distributed computing modules with intricate execution dependencies. Such scientific workflows must be mapped and executed in shared environments to support distributed scientific collaborations. We formulate workflow mapping as an optimization problem for latency minimization, whose difficulty essentially arises from...
Data of network forum is massive and instant. Topics are plentiful. So it challenges to compare the authority value of lots of users. There are many difference between academic paper rank and rank of users in network forum, such as scale in quality, usage, citation count, file length. Difference between user rank with web page is: clear link relation in web but not in network forum, mutual-reinforcement...
With the growing speed of computer networks, the core routers have to increase performance of longest prefix match (LPM) operation on IP address. While existing LPM algorithms are able to achieve high throughput for IPv4 addresses, the IPv6 processing speed is limited. In this paper we propose a new Hast-Tree Bitmap algorithm for fast longest prefix match for both IPv4 and IPv6 networks. The algorithm...
Packet classification is an important topic for high speed routers nowadays. There are many packet classification algorithms based on decision tree like Hicuts, Hyper cuts and Hyper split. Because Hicuts and Hyper cuts divides the rule sets by cutting the address space into equal-sized subspaces, their cutting efficiency is not good. Although Hyper split proposed a good end-point-based cutting scheme,...
In this work the decision of some applied tasks of theory of numbers and possibility of construction of the high-performance special processors on their basis are presented. It is shown that the system of remaining classes nowadays is perspective in the modern computer systems. The effective algorithm of search of prime numbers is offered.
Orchestra is proposed to change the traditional design process of routing protocols and it firstly introduces the concept of evolution into routing design. The disadvantage of traditional genetic algorithm, such as the bad searching quality and long computation time, makes the Orchestra has a bad performance and can not be applied to large scale network routing design. To improve Orchestra, a distributed...
In this work we propose two decomposition algorithms LR-SVNE and D-SVNE for solving the SVNE problem efficiently. We focus on the design of survivable VN embedding with resource constraints. The VN embedding problem with resource constraints is NP-hard, hence most work focuses on devising heuristic solutions. Simulation results show that our algorithms perform well in terms of both time complexity...
With regard to the impact of multimedia digital service transfer delay in computer network, we apply the simplified Smith predictor algorithm combined with the recursive algorithm, and propose a recursive optimization control algorithm based on predictor. The method is easy to implement and has a practical application in multimedia networks. The simulation result shows that this method can adjust...
Network virtualization has been proposed as a powerful vehicle for running multiple customized networks on a shared infrastructure. Virtual network embedding is a critical step for network virtualization that deals with efficient mapping of virtual nodes and virtual links onto the substrate network resources. Previous work in virtual network embedding primarily focused on designing heuristic algorithms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.