The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Low-level design parameters such as router micro-architecture (RMA), flow controls (resource allocation), routing techniques and traffic patterns have a major significance on cost and performance of Network on Chip (NOC) design. This work proposes an efficient virtual channel (VC) buffer management structure and a dynamic VC allocation mechanism for the router to minimize latency, and area (buffer...
There are many costs associated with the building and running a telecommunications network, both capital (CAPEX) and operational (OPEX) costs. On the one hand, complex routing schemes activated in multi-layer networks, like MPLS, logically imply assignment of costs to a collection of modules, from more than one layer, so defining the cost model is a non-trivial task. On the other hand, optimization...
The heterogeneous network (HetNet) which consists of several small cell base stations (BSs) and an overlaid macro cell BS is a promising solution to accomplish very high data rate and energy-efficient communication. The design of energy-efficient mechanisms and radio resource allocation among BSs is an important issue in HetNet. There are a variety of ON/OFF switching algorithms for BSs in the literature...
This paper addresses the distributed resource allocation problem for a network of multiple agents with directed and time-varying communication topologies. Suppose that the total amount of resources is a constant, represented by an equality constraint, and that the amount of resources allocated to each agent is subject to an inequality constraint, called the state constraint. We then aim to solve it...
Most existing packet-based on-chip networks assume routers have buffers to buffer packets at times of contention. Recently, deflection-based bufferless routing algorithms have been proposed as an alternative design to reduce the area, power, and complexity disadvantages associated with buffering in routers. While bufferless routing shows significant promise at an algorithmic level, these algorithms...
The communication between processing elements are suffering challenges due to latency. The arbitration algorithm used inside an arbitration unit of a network-on-chip based router plays a significant role in determining the performance of the whole network-on-chip based mesh. This paper revaluates some of the standard forms of the arbitration algorithms and presents the synthesis and implementation...
In Software Defined Network(SDN), every switch contains multiple flow tables, each flow table containing multiple flow entries. The number of flow entries determines the number of flows that can be forwarded by the switch. Link resources(like bandwidth) is no longer the only one to be considered when routing because node resources(like flow table) may also cause network bottlenecks. Moreover, from...
Cloud providers use virtualization technologies to provide an isolated execution environment and agile resource provisioning. However, virtualized data centers consume huge amounts of energy, which increases the operational costs. To optimize resource usage and reduce energy consumption of Infrastructure as a Service (IaaS) Cloud, it needs a continuous monitoring and consolidation of VMs using live...
‘Efficiency’ is a booming word in the current global scenario. The paper describes such an algorithm named ‘cell zooming’ that aims at providing energy efficiency to the operating cellular network. Energy efficiency is achieved by operating some selected base stations in sleep mode. The energy consumed in sleep mode is much lesser when compared to the normal operation. Here, the performance analysis...
Fast and precise demand shaping is critical for the electrical power grid. With residential and small-business customers, a distributed approach to demand shaping is desirable for reasons of scalability and of privacy. The Color Power architecture [1] provides such an approach, but the controller previously used was badly limited. We now present an improved control algorithm, Color Power 2.0, based...
This paper proposes an efficient scheme of computational resource scheduling for target contents searching in large-scale networks, in the case where a user requests prioritized multiple content items. In this scheme, a limited number of available resources are selected for the searching taking account of a content's existence probability, processing capacity, bandwidth and so on, and assigned to...
This paper considers a group of UAVs that travel from origin to destination locations. Individual agents can choose to either fly directly to their destination or pair with other agents into a leader-follower formation to conserve fuel. In the latter case, only the follower experiences a cost benefit, and hence UAVs must negotiate how to fairly allocate the task of leading. We show that selfish agents...
A group of switch schedulers make packet scheduling decisions based on predefined bandwidth allocation for each flow. Allocating bandwidth for best effort flows is challenging due to lack of allocation criteria and fairness principles. In this paper, we propose sequential and parallel algorithms to allocate bandwidth for best effort flows in a switch, to achieve fairness and efficiency. The proposed...
Performances of packet switch with buffers on input are given. Analyze of SLIP algorithm has done for following types of scenarios: different buffer capacity, different number of iteration, different acceleration. In addition, ideal case for fair allocation of recourse's and experimental results are given.
This paper presents our work toward organizing and managing various forms of federations of virtualized infrastructures. We adopt the Ponder2 policy framework and the SMC architecture as a powerful engineering approach, which we apply to semantic-aware management of federations of Future Internet (FI) virtualized infrastructures. To cater for context-awareness, we plan for a common information model,...
In this paper, we propose a processor allocation mechanism for run-time assignment of a set of communicating tasks of input applications onto the processing nodes of a Chip Multiprocessor (CMP), when the arrival order and execution lifetime of the input applications are not known a priori. This mechanism targets the on-chip communication and aims to reduce the power and latency of the NoC employed...
Network Virtualization has recently emerged to provide scalable, customized and on-demand virtual network services over a shared substrate network. How to provide VN services with resiliency guarantees against network failures has become a critical issue, meanwhile the service resource usages should be minimized under the strict constraints such as link bandwidth capability and service resiliency...
Reducing program size is a critical issue in many embedded systems which require more functionalities without increasing the memory size. One of the approaches is to adopt a mixed-width instruction set architecture (ISA) which usually has an instruction set in general formats (usually 32-bit long) as normal instruction set and an instruction set in shorter format(usually 16-bit long) with limited...
In this paper, we propose an autonomous system consisting of cooperative mobile robots and fiber optic sensors (FSs) for intruder detection in perimeter defense tasks. The system concept is that FSs will sense perimeter intrusions and act as a cueing sensor to an ensemble of robots. These robots in turn engage the potential intruder, performing surveillance and/or neutralization of the intrusion....
While an extensive set of research project deals with the saving power problem of electronic devices powered by electric battery, few have interest in large scale distributed systems permanently plugged in the wall socket. However, a rapid study shows that each computer, member of a distributed system platform, consume a substantial quantity of power especially when those resources are idle. Today,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.