The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quality-based routing protocols are proposed to restrict message flooding within only high quality nodes in delay tolerant networks (DTNs). However, different quality threshold mechanisms have diverse impact on the network and we investigate this issue in the paper. Through theoretical analysis we show that heterogeneous threshold mechanism suffers a severe nodal cost imbalance problem. Furthermore,...
In order to solve the problem that the structure of P2P network's logical network and physical topology do not match at a large extent, information of resources' searching are time-consuming, we propose an improved P2P chord model which was based on the IP-LCO algorithm. The adoption of IPv6 addresses can solve the unmatched problem, and LCO algorithm can quickly location the resources' network node...
Multipath inter-domain routing can solve many technical flaws which have been exposed in BGP, but the market-driven factors have more direct relationship with its deployment. In order to analyze impact of these market-driven elements, this paper established an optimization model for Internet service provider (ISP) revenues based on user's utility function. Then, the solution using Lagrange multiplier...
This paper is a quantities analysis on packet switched network with a view to generalize load balancing and determination of appropriate routing algorithm in multipath environment. Several routing algorithms have been introduced for routing of packets from source to destination. Some of them promised that they will route accurately but it seems with increased workload. Some of them promised that they...
This paper presents a support for the development of distributed virtual environments (DVEs) on P2P architectures. A hierarchical overlay is defined by pairing each peer with a weight which is proportional to its networking bandwidth. Peers characterized by higher weights are assigned a greater workload, in terms of connections with other peers and of number of passive objects they manage, and can...
The keep-alive protocol (or Hello protocol) relying on exchanging periodical keep-alive or Hello messages is often used by many network protocols to detect link, node or other network-related failures. The effectiveness of the Hello protocol depends on the proper setting of its two parameters. Most existing work on the study of the parameter settings was related to a specific environment in connection...
This paper presents a transaction-level on-chip communication network model, including routers and links, which can be easily employed in a system-level system-on-chip simulation framework for early functional verification and architecture analysis. The model is capable of providing NoC's latency and throughput information during simulating process and developed in SystemC to achieve high simulation...
Chord as a classical structured P2P network allows efficient location of the node that stores a desired content. In original Chord model, the participating nodes are equivalent, but it is not true in reality; besides, the semantic property of the content in the model is not taken into account. To advance the performance of Chord, we proposed an improved Chord model based on Topic-Cluster and Hierarchic...
ZigBee standard is a developing low-cost, low power consumption, short-distance wireless communication standard and routing algorithm improvement plays an important part in updating the protocol. Based on the analysis of existed ZigBee routing algorithm, this paper proposes an improvement by comprehensive using of Cluster-Tree algorithm and the "piggyback" technology to increase effective...
Recently, it has been argued that reputation mechanisms could be used to improve routing by conditioning next-hop decisions to the past behavior of peers. However, churn may severely hinder the applicability of reputations mechanisms. In particular, short peer lifetimes imply that reputations are typically generated from a small number of transactions and are few reliable. To examine how high rates...
Completion time estimation for workflow instances is an important basis for real time workflow management and scheduling. Current researches on this topic omitted the fact that: instances of workflow that contains OR-SPLIT are certain to bypass some activities, thus at a particular time point, estimation of completion time for workflow instances should be based merely on activities that were already...
The paper maps on the complaints of the workflow example in the Electric Operation & Maintenance System (EOMS) to the complaints workflow net, which is easy to computerize. To improve the execution efficiency of the model in practical applications, a kind of method is proposed. The method detects the bottleneck which affects the execution efficiency of the system through Markov analysis method,...
The use of firewalls to enforce access control policies can result in extremely complex networks. Each individual firewall may have hundreds or thousands of rules, and when combined in a network, they may result in unexpected combined behavior. To mitigate this problem, there has been interest in the use of model checking techniques for analyzing the behavior of firewall policy configurations, and...
As churn is an inherent character of a network. Researchers find it could bring down the performance of networks. We investigate this in another point of view, and find that searching one resource repeatedly can bring up search efficiency, though churn does bring down the performance for one time search. In this paper, we build a churned peer to peer network in which the connections are re-connected...
Production split and merge are widely used in many manufacturing systems to increase production capacity and variety, improve product quality, and carry out scheduling and control activities. In this paper, we present analytical methods to analyze such systems with exponential machine reliability models, operating under circulate, strictly circulate, priority and percentage split/merge policies.
Proxy Mobile IPv6 has been developed from the concept of network-based mobility support protocol in the IETF. The recently published specification of proxy mobile IPv6 only focuses on the mobility support. Then, route optimization issues are left in the basket for further works. In this paper, we provide the performance analysis in where the recently proposed route optimization is evaluated in terms...
Delay-tolerant networks (DTN) have the capacity to interconnect devices in roomy regions unlike traditional networks. Based on common sense, the more similar the mobility pattern of nodes, the more stable their relative positions, which results in a connection between them with a longer duration In this paper, a novel routing scheme using the similarity degree of mobility pattern is proposed to optimize...
The key in P2P network is to locate resources effectively.Chord is a kind of structured P2P network, but the routing table in Chord suffers serious information redundancy and it is not very efficient.Therefore, an improved chord routing algorithm is proposed.On the premise of not increasing the length of routing table, repetitious entries are deleted and anticlockwise routing in the same amount are...
Multi agent system (MAS) reputation has some shortcoming in the existing model, such as system dynamic analysis and storage capacity. Based on dynamic analysis of MAS trusting model and its problems on system storage, this paper proposes a new trust mechanism which uses combined dynamic time to modify the weight of time. To mimic the dynamic ability of MAS system, we introduce a new parameter of dynamic...
Delay-tolerant networks (DTNs) have the capacity to interconnect the devices in roomy regions unlike todaypsilas networks. In this paper, we propose a routing scheme named time interval routing (TIR) to increase deliver ratio and decrease deliver latency in DTNs. TIR, only using limited and local information as well as simple algorithm, chooses the node in transmission range with the least time interval...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.