The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data center technology is growing in last few years because it can accommodate variety of applications. Some data-intensive applications are deadline sensitive and require minimum flow completion time. In literature, many proposals exist for either reducing average flow completion time or the long tail of flow completion. The state of art proposal is pFabric [3] with shortest remaining size first...
Internet Service Providers (ISPs) need to cope with a growing amount of over-the-top (OTT) traffic, often without a share in the high revenues of the content providers. To achieve an efficient global delivery of content, today content providers usually employ content delivery networks (CDNs) located at the edge of ISP networks from where content is delivered to end users via IP unicast. Many OTT services...
In this paper, we show that the use of directional antennas in wireless ad hoc networks can actually increase interference due to limitations of virtual carrier sensing. We derive a simple mathematical expression for interference in both physical and virtual carrier sense networks, which reveals counter-intuitively that receivers in large dense networks with directional antennas can experience larger...
Many proposals for the next generation of the Internet suggest moving from an end-point oriented to an information-centric oriented architecture. Many of these proposals are based on the publish/subscribe paradigm, which lends itself naturally to native multicast support, a key factor for efficient content distribution. However, the design of efficient reliable transport protocols for multicast is...
Network requirements are evolved from data communications between two hosts to accessing a large amount of information through networks. The current Internet uses address-centric network communication model, which is suitable for the communications between hosts but not efficient in the communications between hosts and networks. Given this fact, Information-Centric networking (ICN) becomes the hot...
We present a design of an OpenFlow controller handling IP multicast and a method to switch a multicast tree to the other with little packet loss. Reducing packet loss during reconstruction of multicast tree triggered by a failure has been an important problem to make multicast communications more reliable. One approach for this problem is to use redundant trees for multicast trees, but algorithms...
Application-layer multicast (ALM) has recently emerged as a promising solution for diverse group-oriented applications. Unlike dedicated routers in IP multicast, the autonomous end-hosts are generally unreliable and even selfish. A strategic host might cheat about its private information to affect protocol execution and, in turn, to improve its individual benefit. Specifically, in a link-weighted...
We propose TOMIMN as a novel overlay multicast approach, which exploits the support from IP multicast routers to construct a topology-aware overlay tree. Compared with most overlay multicast schemes, TOMIMN tree is compatible with the physical network and effective in saving bandwidth resource. Due to the network layer support, no complicated algorithm is needed to adjust the overlay topology in response...
Future IP-based Airborne Networks, important components in net-centric military communications, are envisioned to consist of a persistent backbone core network and dynamic tactical edge networks. The backbone would consist of quasi-stable platforms equipped with multiple high-capacity directional wireless links. The tactical edge networks would consist of highly dynamic platforms such as fighter jets...
The requirements on IP routers are increasing for every new generation of designs. The driving forces are growing traffic volumes and demands for new services. We argue that the SoftRouter architecture that separates the implementation of control plane functions from packet forwarding functions would improve the scalability, flexibility and reliability of future routers. This paper presents the design...
While multicasting is considered valuable for content distribution, it is not widely supported on the Internet. Content providers have instead turned to peer assisted content distribution in order to efficiently serve large numbers of clients via unicast, thus removing the bandwidth bottleneck from their side. The redundant unicast transmissions of the same packet are not avoided however, they are...
In Peer-to-Peer (P2P) networks if adversaries such as Sybil attackers have got most identities in the network, they will control routing table or traffic. In this paper, we propose a framework based on two complementary techniques to defense malicious node after they transmit data to other malicious peers instead of honest peers. The first approach, based on behaviors of destination nodes, is used...
Mobility of user devices connecting to the Internet is of major interest in today's research in networking. For users as well as for applications, network mobility should be transparent. Reliable transport protocols like TCP has served well the wired Internet where the packet losses are mainly due to congestion, but is not ready for mobile IP wired-cum-wireless environments where the significant packet...
A fast loss recovery scheme for IP multicast services is presented in this paper. In this scheme, the head field of retransmission request packets contains the one-way delay between the requestor and the sender of the lost packet, and the head field of repair packets contains the one-way delay between the repairer and the requestor. Each member in the multicast group compares its own one-way delay...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.