The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We study computing all-pairs shortest paths (APSP) on distributed networks (the CONGEST model). The goal is for every node in the (weighted) network to know the distance from every other node using communication. The problem admits (1+o(1))-approximation Õ(n)-time algorithms [2], [3], which are matched with \tilde Ω(n)-time lower bounds [4], [5],\footnote{\tilde \Theta, Õ...
For Smart Transformers (ST), reliability is one of the major problems when compared to the traditional low-frequency transformers. Modular ST with advanced control algorithms could increase the reliability compared to the non-modular solutions. This could be achieved by distributing differently the power among the cells depending on their aging. This unequal power transfer is a challenge for Cascaded...
It is important to use healthy communication and appropriate routing techniques to increase performance in wireless body area networks. At present, the biggest problem of sensor nodes that bring such networks into the uneasiness is limited energy resources. In this paper, it is proposed to make road selection by calculating the distances of the nodes and the battery levels while making the routing...
Segment Routing (SR) can be used as a traffic engineering strategy to counteract increasing loads on networks like Internet Service Provider (ISP) backbones. Many SR approaches, however, optimize traffic flows that were measured in the past. This paper introduces a new tunnel training architecture. It aims to show that the results of these strategies can still be beneficial for routing new traffic...
The resource-constrained nature of sensor nodes makes wireless sensor networks (WSNs) especially susceptible to denial-of-service (DoS) attacks. Due to the wireless communication medium, it is difficult to prevent attacks such as jamming. Hence, mechanisms to detect attacks during operation are required. The current generation of intrusion detection systems are still rather heavyweight, as some form...
It has been found that almost all routing protocols can induce network congestion due to control message complexity. To overcome this overhead various optimization processes are used. One such process is gossiping, where each node forwards a message with some probability, to reduce the overhead of the routing protocols. In this paper, we show how gossiping can be used to improve the performance of...
When configuring a delay tolerant network (DTN), there are many aspects that need to be taken into consideration for an effective and efficient network. One aspect is a buffer management strategy. Buffer strategies are used to determine which packets need to be forwarded or dropped. This paper will focus on the variety of buffer management strategies available, providing a comprehensive survey and...
The vision of wireless multimedia sensor networks (WMSNs) nowadays is to afford real-time multimedia applications using the pervasive wireless sensors around us. This necessitates strict QoS conditions, which have led to new emerging challenges in terms of data delivery in the Internet of Things era. Accordingly, multipath routing protocols with multi-constraints are recommended in WMSNs. In this...
Hierarchical network architectures are widely deployed to reduce routing overheads and increase scalability. In our work, we are interested in deploying a P2P overlay in ultimately large-scale Mobile Ad-Hoc Networks (MANETs). We therefore study the performance of such an approach, creating a number of hierarchical network configurations and deploy Chord over them. The clusters are MANETs, running...
As the technology scales toward deeper submicron, system-on-chip designs have migrated from fairly simple single processor and memory designs to relatively complicated systems with higher communication requirements. Network-on-chip architectures emerged as promising solutions for future system-on-chip communication architecture designs. However, the switching and routing algorithm design of network-on-chip...
Prefix hijacking is a serious threat in the Internet routing landscape. The Border Gateway Protocol has no origin authentication by design. Countermeasures, e.g. on-top authentication as implemented by R-PKI infrastructures, are not yet deployed on a very large scale. Being victim of prefix hijacking is a difficult situation with few options. Not only the owner of a prefix is victim but all the networks...
Delay Tolerant Networks (DTNs) differ from the traditional Mobile Ad Hoc networks (MANETs) in that DTNs are not always interconnected. The issue of routing data in a DTN is considered here. Many routing protocols exist for DTNs. Some are based on comparing nodes to each other, whereas others focus on the internal properties of the messages they hold. There are wide ranges of protocols, and they perform...
A Content Delivery Network (CDN) is a distributed system composed of a large number of nodes that allows users to request objects from nearby nodes. CDN not only reduces the end-to-end latency on the user side but also offloads Content Providers (CPs) providing resilience against Distributed Denial of Service (DDoS) attacks. However, by caching objects and processing users' requests, CDN service providers...
Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications...
The paper proposes a new technique for deadlock control for a class of generalized Petri net (PN) with S4PR net, from the concept of control siphon. One important property of PN is to design structure, in terms of siphons, in order to the characterization of the deadlock prevent, and analytic structure of the synchronization subsystem which is needed to control place in a system. An efficient siphon...
E-health is one of the domains which will need more and more IoT solutions in the future, as it requires short delays for life-dependency situations and safe local storage spaces for privacy matters. The emergency context demands efficient communication and computing capacities, and the cloud vision as well as traditional TCP/IP way of communication cannot really suit these requirements. New approaches...
Software defined networking (SDN) technology promises a new bright future to IP network. Significant number of SDN researches have been done so far to facilitate network operation and management efficiently. However, until now there are only few frameworks to support emulation, verification, and implementation of the SDN. Mininet is one of the most popular tools because of the openness, cost effectiveness,...
A flying ad hoc network (FANET) that consists of multiple unmanned aerial vehicles (UAVs) is a promising technology for future networked systems. In this paper, we study a way to construct a topology for the FANET that guarantees end-to-end communication between the ground control station (GCS) and each mission UAV that performs its given task via optimizing the locations of the relay UAVs. To this...
The quality of service multicast routing problem (QoSMRP) is a very interesting research issue for transmission in communication networks. It is known to be an NP-hard problem, so many heuristic algorithms have been employed for solving this problem. This paper proposes two hybrid approaches based on the hybridization of Firefly algorithm (FA) with Quantum Evolutionary algorithm (QEA) to solve the...
The Border Gateway Protocol (BGP) has been deployed more than 25 years ago to cope with Internet scalability. BGP is a path-vector, policy-routing protocol which is used to exchange reachability information among Autonomous Systems (ASes), enabling service providers to express their policies, by means of the attachment of several attributes to network prefixes. On any given Autonomous System (AS),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.