The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multi-hop wireless broadcast is a critical component in ad-hoc wireless networks. Vehicular Ad-hoc Networks (VANET) in particular utilize broadcast as a primary communication mechanism in many applications. Such networks exhibit situations of very high node densities so it is important that the broadcast protocols used to support applications on these networks scale well to high densities. This work...
Due to the mobility of nodes, servers and clients, the reliability of service delivery over MANETs is a major concern. Traditional route discovery based method is to predict and detect breakdown of connectivity and try to find an alternative path from the client to the same server (We call it traditional rerouting method). The introduction of service delivery platform over MANETs enables and facilitates...
Analysis on the basis of the protocol Gnutella0.6, the use P4P technologies for sensing conveniently network topology information, proposes a P4P-based Gnutella routing algorithm, in which nodes join algorithm to consider the network topology and as far as possible to join super-nodes that close to itself. When routing algorithm forwards query packet, it give priority to select the physical proximity...
Most of the existing routing schemes for opportunistic forwarding either rely on a priori known topology information, or provide explicit protocol information in the data packet header. In this paper, we present a routing protocol for opportunistic forwarding that dynamically create candidate priority forwarding lists without the need for any explicit control information in data packet headers, and...
The features of P2P networking architecture can contribute to robustness and scalability, however, it also introduces network-oblivious traffic, which brings big pressure to the ISPs. Meanwhile, since traffic of P2P applications occupies much of bandwidth in bottleneck links, non-p2p applications may be severely harmed due to lack of bandwidth. To conquer this problem, previous works mainly focused...
Monitoring at the flow level is crucial to ensure the correct operation of networks. Any sizable network relies on a number of monitoring probes, both to provide different observation points but also to scale to the ever-increasing number of flows that go through it. This situation gives rise to the difficult problem of assigning monitoring of flows to the available probes so that the network-wide...
In this paper, we formulate multi-channel assignment in Wireless Sensor Networks (WSNs) as an optimization problem and show it is NP-hard. We then propose a distributed Game Based Channel Assignment algorithm (GBCA) to solve the problem. GBCA takes into account both the network topology information and transmission routing information. We prove that there exists at least one Nash Equilibrium in the...
Routing in wireless ad hoc networks are vulnerable to traffic analysis, spoofing and denial of service attacks due to open wireless medium communications. Anonymity mechanisms in ad hoc networks are critical security measures used to mitigate these problems by concealing identification information, such as those of nodes, links, traffic flows, paths and network topology information from harmful attackers...
We present a control plane architecture for a service-oriented carrier-grade ethernet transport network. Our control plane is based on a centralized management system and separate control elements. Network topology information is gathered from the control elements with ethernet-extended IS-IS protocol. Based on the topology, the management system is able to provision transport tunnels in the domain...
Aiming at the growing problem of network congestion, an improved random early detection algorithm is proposed for the internal network and applied on a TCP congestion control algorithm based on partition of network segment. By using known network information and network topology information, the method is more effective, and better results are achieved.
Anomaly detection is fundamental to ensure reliability and security in computer networks. In this work, it is proposed an anomaly detection system that monitors the network in three different levels. In the first one, data is collected from simple network management protocol (SNMP) objects and compared to profiles of normal traffic, in order to detect behavior changes. Second level of analysis includes...
Network topology information helps one analyze faults in IP networks and their locations. Rectifying such faults is a key role of an enterprise IP network management system. Thus, the automatic discovery of enterprise network topology has been the subject of rigorous study for many years. This paper proposes a Simple Network Management Protocol (SNMP)-based solution that handles various types of network...
In this paper, the authors describe the development of a framework for collaborative spontaneous networks. A spontaneous network is created when a group of users comes together and uses wireless computing devices in order to carry- out a collaborative activity. The target of this framework is to provide efficient communications for groups of users in such a scarce resource environment. The architecture...
Transmission scheduling is a key design problem in wireless multi-hop networks and many scheduling algorithms have been proposed to maximize the spatial reuse and minimize the time-division multiple- access (TDMA) frame length. Most of scheduling algorithms are graph-based, dependent on the exact network topology information and cannot adapt to the dynamic wireless environment. Some topology-independent...
The interplay between signal processing and wireless networking plays a crucial role in sensor networks deployed for detection and estimation applications. In this paper, an opportunistic power assignment strategy for IR-UWB sensor networks is presented which is designed to optimize detection performance in terms of the global probability of error. The opportunistic power assignment strategy utilizes...
Reactive power optimization is an important measure to improve the secure and economic performance of power systems. To reduce the dimension of solution space and solve the time-consuming problem more effectively, a network partition method for distributed reactive power optimization is introduced to divide a large-scale power system into several small-scale subsystems. The voltage response of nodes...
Network topology information has many uses for networked applications including the design of reliability and performance enhancing schemes. This information is often acquired by network discovery techniques that rely on ICMP and/or SNMP support from the infrastructure. Unfortunately, network infrastructure may support such services at varying levels. In cases where such support is limited, techniques...
Accurate network topology information can play very important role in a network management system. Discovering network topology is a prerequisite for many critical network management tasks including reactive and proactive resource management, fault management, and root-cause analysis. Unfortunately, the equipment managed in an NMS includes switches as well as routers, so a network management system...
We propose a distributed monitoring scheme for an ad-hoc/mesh network topology, and design a distributed hash table based peer-to-peer system to log the topology information. A manager can rebuild a model of the network topology at any time in the past of its history by querying any node in the network. Merging and splitting of the monitoring overlays over time are supported by our protocol.
Coordinates-based distance prediction algorithms can improve the performance of many Internet applications, especially in the peer-to-peer architecture and overlay construction. But some recent researches indicate that the performance gain via distance prediction based on coordinates, rather disappointed, can be significantly worse than the improvement obtained by direct measurement algorithm, and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.