The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid growth of Internet contents from wireless data networks, especially social media, results in unprecedented traffic volume, invoking a challenge to the load of cellular infra-structure. Moreover, instead of traditional quality of service (QoS), the demands of quality of experience (QoE) become a more practical norm, which could barely be improved under present resource allocation on radio...
Shaping subscriber traffic based on token bucket filter (TBF) by Internet service providers (ISPs) results in waste of network resources in shared access when there are few active subscribers, because it cannot allocate excess bandwidth in the long term. New traffic control schemes have been recently proposed to allocate excess bandwidth among active subscribers proportional to their token generation...
Network virtualization is considered to be not only an enabler to overcome the inflexibility of the current Internet infrastructure but also an enabler to achieve an energy-efficient Future Internet. Virtual network embedding (VNE) is a critical issue in network virtualization technology. This paper explores a joint power-aware node and link resource allocation approach to handle the VNE problem with...
For lack of bandwidth allocation (BA) algorithm in IEEE802.16 wireless metropolitan area network standard, in this paper a non-cooperative game and generalized Vickrey auction based BA algorithm is presented. The bandwidth reallocation process between the BS and the accessing request user is modeled as a DAMA (Demand Assigned Media Access) game, where the players maximize their utilities. Then the...
While multiple access links enhance the availability and utilization of multicast service nodes, the resource allocation balancing needs to be performed on a link basis, which is usually not considered in most overlay multicast routing algorithms. To accurately represent the bandwidth consumption of each overlay node, we need not only a multihomed proxy model to describe the overlay multicast routing...
Internet access networks in general and wireless mesh access networks in particular, are the bottleneck of today's communication networks and consequently most strongly responsible for determining the user satisfaction. The limited bandwidth and the fact that access network are most often used as mere bit pipes are however unfavorable for the users' quality of experience (QoE). The lack of application-specific...
Ever increasing demand for more bandwidth over the Internet has lead to the development of many new technologies and architectures. Among these, Hybrid of Wireless and Optical networks have become increasingly important because of their “mobility” and “flexibility” in the wireless part and “robustness” and “high capacity”...
With the deployment of more and more resilience-critical Internet applications, there is a rising demand for multi-homed network sites. This leads to the desire for simultaneously utilising all available access paths to improve application data throughput. This is commonly known as Concurrent Multipath Transfer (CMT); approaches for several Transport Layer protocols have been proposed. Combined with...
The traditional client-server architecture widely adopted on the Internet is not adequate to meet the increasing user loads and bandwidth demands in live streaming systems especially for multimedia content delivery. Peer-to-peer P2P) overlay networks provide excellent system scalability and high resource utilization, which make it an attractive solution to this problem. This paper considers a hybrid...
Recently network virtualization is considered as a powerful way to overcome the current ossification of Internet, and is viewed as the keystone of the next-generation network architecture. In network virtualization, virtual network (VN) embedding problem, which assigns virtual nodes and links to physical network, plays an important role. Due to the scarcity of physical resource, efficient and effective...
Wireless mobile multimedia communications are being greatly increased in the number of users, diversity of applications and interface technologies. Future mobile based Internet will accommodate various wireless technologies and also will need to provide sufficient end-to-end QoS (Quality of Service) mechanism to provide enhanced user's satisfaction. In this paper, we propose a new adaptive end-to-end...
A new streaming media network-architecture based on the fusion of P2P and CDN is proposed in this paper. It uses P2P network as the backbone, selects nodes of high-performance, high-bandwidth, and stable online time as CDN edge servers, and provides non-P2P users with streaming media services under the schedule of the load-balancing servers. Since P2P has the inherent drawback of flow disorder, an...
As an all-IP network provides not only services that have been traditionally provided on the Internet but also many other services, it has a dramatically higher risk than conventional networks that an occurrence of congestion in one service leads to congestion in other services. Unlike conventional networks, an all-IP network should provide not only bandwidth but also processing ability simultaneously...
Virtualization is being widely used in large-scale computing environments, such as clouds, data centers, and grids, to provide application portability and facilitate resource multiplexing while retaining application isolation. In many existing virtualized platforms, it has been found that the network bandwidth often becomes the bottleneck resource, causing both high network contention and reduced...
In computing clouds, it is desirable to avoid wasting resources as a result of under-utilization and to avoid lengthy response times as a result of over-utilization. In this paper, we propose a new approach for dynamic autonomous resource management in computing clouds. The main contribution of this work is two-fold. First, we adopt a distributed architecture where resource management is decomposed...
Data processing on the cloud is increasingly used for offering cost effective services. In this paper, we present a method for resource allocation for data processing services over the cloud taking into account not just the processing power and memory requirements, but the network speed, reliability and data throughput. We also present algorithms for partitioning data, for doing parallel block data...
With Cloud Computing gaining tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary. One of the key technologies deployed in large Cloud infrastructures namely the Amazon EC2 for providing isolation and separate protection domains for multiple clients is virtualization. Therefore, identifying the performance bottlenecks in a virtualized...
Wireless Mesh Network (WMN) is a self-configuring, self-organizing and self-healing communications network in a mesh topology. Every node collaborates on establishing routing path to communicate with each other or use the Internet services. Even though WMN increases reliability and provides high bandwidth, selfish or malicious nodes may disrupt the network-wide collaboration and abuse the available...
Cloud computing represents a promising computing paradigm where computing resources have to be allocated to software for their execution. Self-manageable Cloud infrastructures are required to achieve that level of flexibility on one hand, and to comply to users' requirements specified by means of Service Level Agreements (SLAs) on the other. Such infrastructures should automatically respond to changing...
A computational is a wide-area computing environment for cross-domain resource sharing and service integration. Most clouds generally emphasize sharing resources and services on demand, the scheduling strategy based on selecting resource that are near and owns more bandwidth available has better characteristics. The notion of game theory is proposed in this paper, which can be used as the criteria...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.