The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the US Government's cancellation of the Transformational Satellite Communications (TSAT) program, Internet Protocol (IP) networking using Military Satellite Communications (MILSATCOM) is not currently planned. In order to support military IP based communications over MILSATCOM systems; affordable, effective and efficient solutions must be developed. An alternate near-term MILSATCOM networking...
Named Data Networking is a new concept that takes a fundamentally different approach to what is found in Internet Protocol (IP) network systems. IP-type networks name locations (in the form of IP addresses) to route messages to destinations when sending data. Named Data Networks (NDNs), on the other hand, are primarily concerned about the data itself and not necessarily about the locations where the...
The paper proposes an FPGA-like approach to on-chip communication and comes up with a design methodology where switches are avoided and where two any IPs are connected if and only if they are communicating. It avoids the problem of costly (time, area, energy) intermediate hop counts of on-chip networks (NOCs) between any two source-destination pairs. The second novelty is that without knowing the...
The multicast communication is one of the fundamental types of the modern network connections. Even though the concept is not new, and exists as a part of the TCP/IP protocol stack, the reality of the backbone networks has been rejecting the technology, mostly due to the economical reasons. On the other hand the development of the basic point to point connections increased the overall Internet capabilities...
Multipath routing is an important and promising technique to increase the Internet's reliability and to give users greater control over the service they receive. Currently the interdomain routing protocol limits each router to using a single route for a destination network, which does not satisfy the diverse requirements of end users. In this paper, in order to support the effective and efficient...
NoC (Network-on-Chip) has been proposed as a new solution to deal with the global communication problem of complex SoC(System-on-Chip). An evaluation tool is essential for optimizing the NoC design, through which the functionality and performance of the NoC are verified. This paper presents a coverage-driven and hierarchical NoC verification platform based on System Verilog language. It is applicable...
We study the measurement of the Internet according to two graph parameters: tree width and hyper bolicity. Both tell how far from a tree a graph is. They are computed from snapshots of the Internet released by CAIDA, DIMES, AQUALAB, UCLA, Rocket fuel and Strasbourg University, at the AS or at the router level. On the one hand, the tree width of the Internet appears to be quite large and being far...
The Proxy Mobile IPv6 (PMIPv6) have been widely studied as a mobility management protocol to effectively use the limited wireless resources. Recently, there have been some researches to apply PMIPv6 to multicasting, which is core technology of Internet broadcast system. However, PMIPv6 based multicasting has a problem in that it shows the disconnection of services during the handover because it does...
Prioritization of flows in a home network based on traffic classification is still no guarantee that enough bandwidth will be available between a server and a client. Besides, such QoS technologies need to be supported by every device in the end-to-end path to be effective, which is relatively expensive for the owners of home networks. In any small-scale IP network (best-effort or QoS-enabled) it...
In this paper, we describe a path-based intrinsic monitoring protocol that can efficiently associate SNMP based MIB information to a network path within a single administrative domain. Our method is based on intrinsic monitoring, a lightweight metric collection protocol that makes use of the IPv6 Router Alert hop-by-hop option. The main advantage of our approach is that operators can rapidly associate...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
Application Layer Multicast (ALM) has become a popular form of content distribution. It shows some favourable properties like inherent scalability and the overcoming of the traditional client-server bottleneck. In the future, a large fraction of the participants in ALM systems will be mobile (eg. smart-phones or netbooks) and demand for a proper inclusion and mobility handling. After analyzing current...
In the signaling plane of an IMS (IP Multimedia Subsystem) network, the interrogating Call/Session Control Function (I-CSCF) is required to choose the serving CSCF (S-CSCF) for user requests arriving at the proxy CSCFs (P-CSCF). This requires S-CSCF selection in such a way that the response time is minimized. However, in an overloaded situation, the P-CSCF entry points for arriving requests must balance...
The benefit of Class-of-Service (CoS) is an important topic in the "Network Neutrality" debate. Proponents of network neutrality suggest that over-provisioning is a viable alternative to CoS. We quantify the extra capacity requirement for an over-provisioned classless (i.e., best-effort) network compared to a CoS network providing the same delay or loss performance for premium traffic. We...
Multi-domain traffic engineering is a major focus area for carriers and crankback signaling offers a very promising alternative. However, even though various crankback studies have been done, there remains significant latitude for improved multi-domain designs. To address these challenges, this work develops a novel solution for intra/inter-domain signaling crankback in IP/MPLS networks. Namely, dynamic...
Multi-domain traffic engineering is a major focus area for carriers and crankback signaling offers a very promising alternative. However, even though various crankback studies have been done, there remains significant latitude for improved multi-domain designs. To address these challenges, this work develops a novel solution for intra/inter-domain signaling crankback in IP/MPLS networks. Namely, dynamic...
According to the P2P network based on Distributed Hash Table (DHT), Flooding will be combined with the DHT system, the physical proximity of nodes in the network will be used to reduce the latency and optimize routing before the formation of the logical topology. An improved EKademlia based on original model is constructed, EKademlia inherits the advantages of DHT and Kademlia, and it is superior...
Application Layer Multicast (ALM) has resolved the issue of deployment, but effectiveness inferiors to IP multicast. To build a high efficient multicast tree, this research focuses on the distributed spanning tree algorithm by using nearest physical topology node selection strategy, which is based on a new group communication model named MixCast. The average delay and average join time of the tree...
A mobility management scheme for an all-IP Wireless Metropolitan Area Network (WMAN) is developed in this paper. The proposed scheme is topology-independent and user-independent, in the sense that it does not assume any mobility pattern, delay constraint, or network topology. The key idea is to use a topology-learning algorithm that enables to perform localized mobility management, by efficiently...
Structured P2P system doesn't consider the actual physical topology when building the logical overlay, which would cause a serious mismatching between logical overlay network and physical network and affect the routing performance of the system. An advanced algorithm of K-bucket updating strategy base on structured Kademlia system was proposed. Using Landmark Binning algorithm and RTT detection will...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.