The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We introduce structural transformations that allow simplifying a given network while preserving its original “bandwidth” and “routing” capabilities, transparently to specific allocations. We minimize a certain objective such as the aggregate capacity of network links, number of nodes, or number of links, in such a way that all the bandwidth that could be routed in the original network can also be...
The spined cube is a variant of the hypercube and it provides a promising topology of interconnection networks for massively parallel systems. The diameter of the n-spined cube is almost equal to (n + 3) / 3, which is smallest among the variants of the hypercube. In this paper, we propose a shortest-path routing algorithm in spined cubes.
The locally twisted cube provides a prospective topology suitable for interconnection networks of the massively parallel systems. A routing algorithm is proposed in this paper that tolerates faulty vertices in locally twisted cubes based on two kinds of routing probabilities. A computer experiment is also conducted to verify the performance of our algorithm.
Wireless devices such as sensors have increasingly more processing, storage, and networking capabilities, making wireless sensor networks (WSNs) get lots of attentions in recent years. In addition, the cost of sensors is constantly decreasing making it possible to use large quantities of these sensors in a wide variety of important applications in environmental, military, commercial, health care,...
In this poster, we consider software-defined wireless sensor networks (SDWSNs) and present a lightweight flow management to reconfigure flow entries in flow-table when link fault occurs in the data plane of SDWSNs.
The rise in population aging witnesses the widespread attention towards the healthcare also by means of efficient and non invasive healthcare monitoring platforms. Intra Body Area Networks (I-BANs) are envisaged as the tool to implement this platform and will exploit the human body as the transmission medium, causing undesirable overheating of tissues and organs crossed by electromagnetic signals...
High throughput data transfers across the Internet has become a challenge with deployment of data centers and cloud platforms. In this paper, we propose to utilize the cores of a router to build multiple abstractions of the underlying topology to parallelize end-to-end (e2e) streams for bulk data transfers. By abstracting a different graph for each core, we steer each core to calculate a different...
Datacenter networks (DCNs) play an important role in supporting cloud computing and Internet-based services. The cost and power consumption of a DCN grow rapidly with the increases of network scale and bandwidth requirement. The cost, complexity and efficiency of a DCN are determined by several design factors including the topology, addressing and routing. In this paper, we propose a simple and cost-effective...
By carefully selecting and establishing overlay edges and computing multiple underlay-edge-disjoint paths, the ability to still fulfill demands in a VPN in case of edge-failures can be significantly increased. This article presents an approach to construct efficient and optimally resilient VPN overlay topologies together with the corresponding overlay paths to fulfill a given set of demands (connectivity...
Efficient and secure device to device communication is a necessary enabler for realization of fog and edge computing models. With an ever-increasing number, diversity, and geographical distribution of heterogeneous devices, ranging from pervasive sensor networks to edge cloudlets, the interconnection and network management of these devices emerges as a major challenge. Peer-to-peer (P2P) network overlays...
Although shared path protection has been employed for protecting traffic flows against network failures, to our knowledge, it has not been considered for path protection in elastic optical networks with space division multiplexing (SDM). In this paper, we propose an algorithm to dynamically generate primary and backup paths using a shared backup scheme. The proposed algorithm is compared to the Failure-Independent...
This paper discusses multi-point address channel design in fly-by topology for high speed memory interface. Waveform behaviors at DRAM locations along the channel are examined in depth with eye opening data in various channel design factors and device termination settings. Eye opening is exacerbated on the front DRAM from the controller more prominently due to ring-backs from high frequency reflections...
There has been explosive growth of satellite applications in the past decades. Broadcast is a fundamental operation in satellite networks, which is required for satellites self-organization, routing discovery, coordination and collaborations. In this paper, we study the problem of delay bounded and energy efficient broadcast in satellite networks. Broadcast routing is a challenging issue in satellite...
Network messaging delay historically constitutes a large portion of the wall-clock time for High Performance Computing (HPC) applications, as these applications run on many nodes and involve intensive communication among their tasks. Dragonfly network topology has emerged as a promising solution for building exascale HPC systems owing to its low network diameter and large bisection bandwidth. Dragonfly...
We analyze topological entropy in wireless networks that are subject to local scattering and macroscopic shadowing effects. To this end, we model a network as a random geometric graph with probabilistic pair connections (due to channel randomness) and define uncertainty as the Shannon entropy of the underlying graph ensemble. We present new bounds on topological entropy that are functionals of the...
Leveraging Software-Defined Networking (SDN) and middleboxes, application-level policies can be propagated to the network. SMART is an SDN middlebox architecture that differentiates network flows based on tenant inputs. By leveraging FlowTags software middlebox in addition to the OpenFlow rules, it supports a larger scope of tenant preferences and rules from the application layer to alter the network...
Interconnection network is a main concern in the architecture design of highly parallel systems such as high density data centers and supercomputers that reach millions of endpoints, e.g., 10M cores for Sunway TaihuLight system. As the number of endpoints of such systems has gradually increased to meet the higher computing and storage demand, the interconnection network is required to provide a low...
On most supercomputers, except some torus network based systems, resource managers allocate nodes to jobs without considering the sharing of network resources by different jobs. Such network-oblivious resource allocations result in link sharing among multiple jobs that can cause significant performance variability and performance degradation for individual jobs. In this paper, we explore low-diameter...
It is compared of widely used CAD Expedision, PADS, Altium designer, SPECCTRA (PCB Alegro Router) and Topological Router (TopoR) to determine the most effective system of routing of printed circuit boards. A comparison method of analysis of hierarchies T. Saaty using criteria, objectively reflecting the design parameters of the topology of the designed products, which directly depend on the efficiency...
A promising approach for dealing with the increasing demand of data traffic is the use of device-to-device (D2D) technologies, in particular when the destination can be reached directly, or though few retransmissions by peer devices. Thus, the cellular network can offload local traffic that is transmitted by an ad hoc network, e.g., a mobile ad hoc network (MANET), or a vehicular ad hoc network (VANET)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.