The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an efficient new snapshot mechanism, briefed as Live Save, to make real time backup of the VM state to the local host. The proposed Live Save will iteratively send the state data, store the snapshot file in the local host and send the entire file directly to a remote host when necessary - to save significant bandwidth consumption. We also set up an advanced Improved Live Save which...
Accessing the Internet through Wi-Fi networks offers an inexpensive alternative for offloading data from mobile broadband connections. Businesses such as fast food restaurants, coffee shops, hotels, and airports, provide complimentary Internet access to their customers through Wi-Fi networks. Clients can connect to the Wi-Fi hotspot using different wireless devices. However, network administrators...
BBR is a recently proposed congestion control. Instead of using packet loss as congestion signal, like many currently used congestion controls, it uses an estimate of the available bottleneck link bandwidth to determine its sending rate. BBR tries to provide high link utilization while avoiding to create queues in bottleneck buffers. The original publication of BBR shows that it can deliver superior...
The nature of Internet traffic has changed dramatically within the last few years, where a large volume of traffic is originated from mobile applications (known as apps), web based multimedia streaming, computation offloading like cloud computing and Internet of Things (IoT) etc. These types applications generate multiple parallel short lived end-to-end connections. However, the three major requirements...
TCP LoLa is a new delay-based congestion control that supports both, low queuing delay and high network utilization in high speed wide-area networks. This is particularly useful for traffic mixes consisting of bandwidth demanding and delay sensitive flows (e.g., long file transfer and interactive "web 2.0" traffic). TCP LoLa keeps the queuing delay at the bottleneck link low around a fixed...
The virtual networking embedding (VNE) problem is a core issue in network virtualization. This is also a challenging problem as it contains different kinds of constraints, and its complexity becomes even higher in an online VNE problem with thousands of virtual network (VN) requests. In this paper, we proposed an ant colony system based VNE algorithm, called ACS-VNE, for the online VNE problem. The...
Fueled by increasing network bandwidth and decreasing costs, the popularity of over-the-top large-scale live video streaming has dramatically increased over the last few years. In this paper, we present a measurement study of adaptive bitrate video streaming for a large-scale live event. Using server-side logs from a commercial content delivery network, we study live video delivery for the annual...
Internet connection is essential for daily life, however not all areas are covered by Internet access due to historical reasons. For example, with 3.7 million daily passengers, London underground system has no WiFi or cellular signal provided during travelling due to legacy reasons. Deploy new access infrastructure need to consider the integrating problem with the current environment, also bring a...
The growth of electronic devices connected to the Internet brings new concerns. These include security, privacy, user rights, data generation, spectrum management, and liability. Countries and organizations are developing policies to accommodate the Internet of Things (IoT). In this paper, we identified IoT indicators useful for policy makers. We considered four categories of indicators. These were:...
Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). This process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by anonymity tools, additionally hiding the source,...
Web-based E-Learning uses Internet technologies and digital media to deliver education content to learners. Many universities in recent years apply their capacity in producing Massive Open Online Courses (MOOCs). They have been offering MOOCs with an expectation of rendering a comprehensive online apprenticeship. Typically, an online content delivery process requires an Internet connection. However,...
In this paper, two different packet timing and IP ID based network steganography approaches have been proposed to provide confidential transmission of information. In the proposed packet timing approach, it is seen that the bandwidth is higher than the previous methods. The proposed IP ID field based approach has been found to be more effective than previous methods in ensuring the uniqueness of the...
Current networks are multi-service packet-switched environments, very often based on Internet Protocol, where the provision of good quality services is a great challenge. The most popular service, offered by almost every network, is voice transmission. As a real-time service, it places high demands on bandwidth and delay. The paper describes selected network dimensioning problems for the voice over...
This paper proposes a new algorithm called Path Associativity Centralized Explicit Congestion Control (PACEC). PACEC works on a Software Defined Networking (SDN) framework. In PACEC, a congestion control decision is based on global information network conditions. PACEC uses global information network to identify network resources along the path from the source to the destination and provides this...
This paper will discuss the distributed caching strategies in clustered heterogeneous cellular networks. Basically, there are two obstacles to accomplish the caching policy in the wireless access networks, i.e., the limited storage capacity of small cells and the too small coverage area of each base station to imply content aggregation effect. Traditionally, the existing caching strategies only concern...
The number of Internet users in Indonesia in 2020 will increase up to 136.2 million users, while the Internet traffic will increase up to 2.1 Exabyte per month. However, 88% of internet traffic goes to international link and only 12% of traffic goes to domestic server. The problem is that the current capacity of Indonesian international links is only 20 Gbps, while the the required capacity is predicted...
Consumers frequently get Internet access through a single home gateway. Gateways using conventional FIFO queue management can introduce hundreds or even thousands of milliseconds of additional delay when congested by bulk TCP data transfers. This delay impacts negatively on any latency-sensitive interactive traffic (such as Voice over IP, or First Person Shooter games). Such applications prefer network...
Multimedia streaming is a significant source of Internet traffic, with Netflix and YouTube accounting for more than 50% of North American fixed network peak download traffic in 2016. Dynamic Adaptive Streaming over HTTP (DASH) is a recent standard for live and on-demand video streaming services, where clients adapt the video quality on-the-fly to match the network capacity by requesting multi-rate...
Internet Exchange Points (IXPs) play a key role in the Internet architecture, enabling cost-effective connections among multiple autonomous systems (ASes). The management of IXP networks includes the activity of taking care of elephant flows; they represent a small number of the total flows of an IXP, but have high impact on the overall network traffic. Managing elephant flows involves adequate identification...
Network virtualization is a dynamic context leading to imbalance for substrate network (SN) resources which can affect the virtual network (VN) request further. In this paper, we propose the GRC-mopso-VNE algorithm to solve the VNE problem taking link resources into consideration in the stage of node mapping. A novel metric is developed, i.e., global resource capacity (GRC), to evaluate the mapping...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.