The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Spanning Tree Protocol (STP) is an approved standard protocol that provides a tree forwarding topology in Ethernet networks. Tree topology ensures a unique path from any node to every other node in the network. One of the main disadvantages of STP is its poor load balancing capabilities that results in uneven load distribution and bottlenecks. In our previous work, we have suggested Shortcut Switching...
High-availability Seamless Redundancy (HSR) is a redundancy protocol for Ethernet (IEEE802.3) networks that provides duplicated frames for separate physical paths with zero recovery time. This means that even in the case of a node or a link failure, there is no stoppage of network operations whatsoever. HSR is suitable for mission critical Ethernet applications, but its main drawback is the extra...
This paper presents a novel scheme for avoiding congestion in the field of wireless sensor networks. Our new scheme provides a priority based approach for wireless sensor cluster network to reduce traffic load using congestion aware routing (CAR). It proposes the new mechanism for the purpose of mitigating congestion which enhances the performance of the network. The proposed mechanism uses congestion...
Fast development of computer and especially Internet caused many issues for its users as well as its benefits. Nowadays, cyber criminals are utilizing Botnets to reach their goals. They have noticed that centralized structure is detected quickly. Hence the Peer to Peer Botnets are the most recent kind of Botnets that, they are applying encryption as well as rootkit capabilities to not being detected...
Network has been gradually dominated by content distribution and retrieval due to the popularity of the content-oriented services, such as file sharing, streaming application and file distributor. Some practical challenges thus arise for network providers in the process of content distribution. For one thing it generates great network traffic and creates pressure to the backbone links. For another,...
In Optical Burst Switching Network, contention is one of the challenging problems. Contention occurs when more than one burst demand for same output wavelength channel in same time. The deflection routing, fiber delay line (FDL) and wavelength conversion are the methods used to resolve contention in OBS Networks. With deflection routing, contending bursts in send in another route rather than primary...
Recently, vehicular delay-tolerant networks (VDTNs) were proposed as a new network architecture for sparse vehicular networks. VDTN architecture adopts the DTN store-carry-and-forward paradigm. At the edge of the network, terminal nodes provide internetworking on heterogeneous networks. In VDTNs, datagrams are assembled in large data packets, called bundles. At the ingress edge node of VDTNs, bundle...
The popularity of community-centric applications has rapidly grown during the recent years. In this paper, we evaluate the robustness of a P2P community management system, where communities are established as autonomous DHT overlays that are advertised in a global DHT overlay. The evaluation is based on the experimental measurements conducted using a DHT-based protocol with two DHT algorithms called...
Medium access control (MAC) protocol plays a crucial role in energy-efficiency, latency reduction and throughput for sensor networks. However, it is nontrivial to achieve good performance in different facets of metrics at the same time. In this paper, we present the performance of an Adaptive Scheduling MAC (AS-MAC) protocol with different Adaptive Scheduling period (AS-period) in multi-hop networks...
We describe here a new burst scheduling algorithm to avoid burst overlapping in the egress router of optical burst switching (OBS) network, and hence to improve the quality of service (QoS) in developing several optical networks to fulfill the increasing demand of Internet facilities. We consider TAG (tell-and-go) protocol where many lightpaths pass in a given link and burst overlap may occur. In...
Captured network traffic data is generally used to evaluate, validate and analyze novel solutions for various network problems. Hence, the quality and the completeness of the network traffic dataset are important for the analysis to yield correct results. However, the quality of the network traffic dataset is never questioned. In this work, we propose a systematic methodology to visually verify the...
The Hierarchical Optimized Link State Routing (HOLSR) protocol was designed to improve scalability of heterogeneous Mobile Ad-Hoc Networks (MANETs). HOLSR is derived from the OLSR protocol and implements Multipoint Relay (MPR) nodes as a flooding mechanism for distributing control information. Unlike OLSR, nodes are organized in clusters and implement Hierarchical Topology Control (HTC) messages for...
Congestion control is vital in the streaming of a video sequence or clip, as network traffic varies unpredictably requiring constant adjustment of the transmission rate. Standard TCP-Friendly Rate Control (TFRC) wastes bandwidth and may react to congestion only when packet loss has already occurred. This paper presents a unicast transport protocol named RRB-SIMD for video streaming over the Internet,...
As networks and data transmission are becoming increasingly important for computational science, we are working on developing a visualization application that uses high-speed networks to aid scientists in their scientific exploration. However, we have identified a major issue in the performance of data transmission when rate-based UDP is used in parallel from multiple senders to a single receiver...
Current P2P applications use various obfuscation techniques to avoid detection, the technique of deep packet inspection (DPI) can detect the characteristics string in P2P protocols, which is regarded as a promising method for future peer-to-peer traffic identification. one prototype system of P2P traffic detection is implemented. This system adopts off-line detection method, and it can identify P2P...
Congestion control mechanisms include three phases: congestion detection, congestion notification and rate adjustment. So far diverse congestion detection methods for sensor networks are proposed. In this paper we introduce numerous congestion detection parameters and examine them in various respects; finally we choose one of them as the best parameter for video traffic in wireless sensor networks...
In this paper Dynamic Sleep Scheduling (DSS) for Minimizing Delay in Wireless Sensor Network is proposed. To reduce delay, DSS identifies nodes for different sleep/wake according to their traffic load at two levels: a) Nodes with different sleep/wake schedule requirement according to their different traffic load based on their topological importance in the network. b) Nodes with different sleep/wake...
As the Session Initiation Protocol (SIP) becomes more and more the core of the communication networks convergence, there is urgent need to manage the critical problem of SIP service availability under extreme overload. This paper proposes a novel solution to control SIP overload. We demonstrate the efficiency of the approach compared with a well known SIP overload control algorithm. The solution builds...
A framework for the joint design of wireless network and controllers is proposed. Multiple control systems are considered where the sensor measurements are transmitted to the controller over the IEEE 802.15.4 protocol. The essential issues of wireless networked control systems (NCSs) are investigated to provide an abstraction of the wireless network for a co-design approach. We first present an analytical...
Streaming media protocol-based applications share communication resources with regular Network/Internet traffic. So, they are exposed to any existing security attacks. In the present paper, we measure this relationship between attacks and applications by introducing a probabilistic verification evaluation. Our approach is novel in that, it is based on the concurrency between models. In addition, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.