The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Service continuity is a critical issue in wireless networks. Unfortunately, jamming attacks seriously threatens the continuity of wireless networks. The open nature of wireless mediums makes it vulnerable to any wireless capable devices. There are only few researches address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming...
Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy...
Virtual Content Aware Networks (VCAN) constructed as overlays over IP network substrate is considered an efficient solution to incrementally introduce content awareness at network level. Planning, mapping on top of multiple domains IP network and optimizing these VCANs is still an open research issue. This paper is focused on intradomain planning and VCAN mapping, with QoS guarantees, thus continuing...
Cloud computing has emerged to provide infrastructure for cost-effectively hosting applications with dynamically changing demands for computational resources. Dynamic resource allocation in cloud computing is made possible through virtualization technologies. In addition, live migration of services hosted in virtual machines (VMs) among multiple data centers is expected to add more flexibility in...
To improve the efficiency and the topology mismatch problem of P2P overlay network, a new method of topology construction, CLSP2P, was introduced. The topology construction of CLSP2P not only consideration the physical location of nodes, but also consideration the semantic information of nodes: Nodes in CLSP2P were first organized as autonomous domain based on their physical location, then the nodes...
We propose a memory and CPU usage prediction model for application-layer multicast networks. The predicted values are used in the distribution of end-hosts to overlay-hosts. Such a distribution enables us to limit the maximum resource consumption for a given node, leading to an efficient utilization of overlay-hosts and, finally, to an increased overall performance of the system. The model parameters...
Although significant efforts have been devoted in the literature to measurements of the Internet topology, little attention has been given to the qualification of routing deviations and multipath dynamics at the Autonomous System (AS) routing level. We observed Internet AS-level routes toward thousands of destinations for several weeks between 2009 and 2010 to have a better understanding of these...
Structured P2P system doesn't consider the actual physical topology when building the logical overlay, which would cause a serious mismatching between logical overlay network and physical network and affect the routing performance of the system. An advanced algorithm of K-bucket updating strategy base on structured Kademlia system was proposed. Using Landmark Binning algorithm and RTT detection will...
In this paper, we consider hybrid circuit/packet networks. A hybrid circuit/packet network consists of a circuit network co-existing with a packet network; generally the packet network is embedded on top of the circuit network. However, in certain cases such as the DOE energy sciences network (ESnet), the circuit network and the packet network are deployed side-by-side (e.g. they have common end-node...
Two multi-layer network backup capacity recovery mechanisms, which are static and dynamic mechanisms, have been proposed to realize survivability strategy in IP over WDM multi-layer network. Compared with the static one, the dynamic backup capacity mechanism is adopted as its flexibility which is more suitable for the development in the current network. To achieve better performance of resource utilization,...
Resource utilization is an important issue that needs to be taken into account when providing recovery mechanism in networks. In this paper, we investigate the recovery scheme for multi-layer network which cannot only manage the operation confusion among each layer, but also reserve network resources effectively. Then, we proposed an algorithm that adapts the concept of multi-layer approach to multicast...
Today's converged networks are mainly characterized by their support of real-time and high priority traffic requiring a certain level of quality of service (QoS). In this context, traffic classification and prioritization are key features in providing preferential treatments of the traffic in the core of the network. In this paper, we address the joint problem of path allocation and admission control...
Valiant load balancing (VLB), also called two-stage load balancing, is gaining popularity as a routing scheme that can serve arbitrary traffic matrices. To date, VLB network design is well understood on a logical full-mesh topology, where VLB is optimal even when nodes can fail. In this paper, we address the design and capacity provisioning of arbitrary VLB network topologies. First, we introduce...
An important and fundamental issue in designing structured P2P systems is the tradeoff between the number of logical links and the number of hops. This paper presents K-Chord (KC), a flexible protocol based on Chord and the idea of proportional search. We conduct an in-depth study on KC. Let D denote any given number, in order to guarantee that each query can be resolved in 0(D) hops, it is necessary...
Network management is one of the important areas in todaypsilas computing world. A basic requirement for the management of a complex network is the definition of high-level and flexible models to coordinate the accesses to the resources data and services provided by the network nodes. Most of the network management platforms are based on polling-based centralized SNMP management model which has the...
Hard guarantees on message delivery timeliness and recovery delay from network equipment failures are required by several distributed real-time applications such as video conferencing. In order to meet these requirements many schemes have been proposed to provide solutions by reserving additional resources a priori along a disjoint backup path. One of the approaches in the literature proposes segmented...
Resource reservation in mobile environments is an important task in the future when the userpsilas point of attachment to the network changes frequently due to mobility. One crucial issue of this task is to release unnecessary reservation along old path after departure of mobile node(s). Although this can be done automatically by a soft state mechanism, default soft statepsilas lifetime which is conceived...
The Automatically Switched Optical Networks (ASONs) and the Generalized Multi Protocol Label Switching (GMPLS) control plane are envisaged to play an important role in the next generation Internet. They provide optical networks with intelligence and automation and they enable the Multilayer Traffic Engineering (MTE) paradigm which facilitates the IP/optical adaptive integrated routing. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.