The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) separates the control plane from the data plane to ease network management and provide flexibility in packet routing. The control plane interacts with the data plane through the forwarding tables, usually including a flow table and a group table, at each switch. Due to high cost and power consumption of Ternary Content Addressable Memory (TCAM), commodity switches...
In recent years, dramatic growth of mobile data traffic has left the operators no choice but to consider Wi-Fi networks as an economic complementary solution. To achieve this, WLANs require to adopt some of the key features of carrier-grade operators, such as centralized resource management. As an emerging paradigm, Software Defined Networking (SDN) can be used to provide salient centralized network...
New Long-Range radio technologies have recently emerged in the IoT landscape. These technologies work in the Sub-GHz bands, allowing low-power communications over long distances. They are typically based on star-topology networks, where nodes send the data directly to a base station connected to the Internet. One of such technologies is LoRa. Enabled LoRa-based multihop communications would open up...
Event detection has become a ubiquitous application in the domain of wireless sensor networks. In any distributed event detection system, duplicate event data that can increase the likelihood of network congestion is a primary concern, and in-network data aggregation is a popular approach to alleviate this problem; similarly, duplicate data can be discarded. We propose a novel approach that utilises...
Swarm of drones are increasingly deployed to perform a variety of critical missions such as surveillance, rescue in disaster areas etc. To guarantee success of a mission, the controlling software should pursue two goals. Firstly, it should ensure safety, i.e., guarantee collision avoidance. Secondly, it should prevent a premature depletion of the batteries of the drones by minimizing their travel...
Big Data concerns processing of large volumes of digital data with high velocity and variety. Big Data technologies allow the analysis of data in real time, which is critical for various eScience applications. In order to meet the growing demand of Big Data applications, the infrastructures must be flexible enough to adapt to the characteristics of the applications. Most of the solutions presented...
Among the schemes proposed for failure recovery in software-defined networks, installing backup paths in advance is considered to be an effective approach to reduce the recovery latency. However, the pre-installation poses undue storage overheads on flow tables. In this paper, we propose a customized and cost-efficient backup scheme, which achieves fast recovery from any single-link failure. We introduce...
In some special circumstances, e.g. tsunamis, floods, battlefields, earthquakes, etc., communication infrastructures are damaged or non-existent, as well as unmanned aerial vehicle (UAV) cluster. For the communication between people or UAVs, UAVs or mobile smart devices (MSDs) can be used to construct Mobile Ad Hoc Networks (MANETs), and Multipath TCP (MPTCP) can be used to simultaneously transmit...
The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing protocol. The route recovery algorithm in reactive routing protocols like AODV occurs only after a link failure is detected. However, we propose a new route...
Due to the rapid growth in scale and complexity of information networks, self-organizing systems have been focused on for realizing new network control architectures that have high scalability, adaptability, and robustness. However, in self-organizing systems, the uncertainty (incompleteness, ambiguity, and dynamicity) of information observable for components in the system can lead to the slow adaptation...
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution...
The original design of the Internet was a resilient, distributed system, that may be able to route around (and therefore recover from) massive disruption—up to and including nuclear war. However, network routing effects and business decisions cause traffic to often be routed through a relatively small set of Autonomous Systems (ASes). This is not merely an academic issue; it has practical...
Current approaches to Information-Centric Networking (ICN) facilitate the publication and retrieval of content in a network through a variety of discovery, caching and forwarding approaches, thus defining an equivalent of the data plane in the current Internet infrastructure. However, in contrast to the current Internet, ICN lacks a definition of the control plane for the management of the operation...
In Information-Centric Networks (ICN), contents are cached on some intermediary routers. This creates thus a new situation which is totally different from the traditional path-selection paradigm: the source/destination paradigm no longer exists; instead, the new paradigm is how to find a path through a selected group of caches, so that the content is delivered via the shortest way. This paper addresses...
To achieve optimal data routing along fiber optics, analytical and algorithmic methods are used. When some degradation factors cause temporary optical fiber impairment, optimization of data routing is an essential problem. However, the temporality is quite vague and, some network parameters are difficult to quantify. While optimizing temporarily changed route in an optical network, any cooperating...
Most of the routing protocols for wireless networks have focused on finding a feasible route from a source to a destination. Routing Protocols in Multi-hop Wireless Networks (MHWNs) face more serious security and reliability challenges. Radio jamming attacks are especially harmful to the reliability of links, as they can effectively disrupt communication between any node pairs result in that links...
Wireless sensor networks (WSNs) are used in many mission-critical applications, such as target tracking on a battlefield, emergency alarms, and disaster detection. In such applications, QoS provisioning in the timeliness domain is indispensable. Moreover, because of the diversity of sensory data, QoS provisioning should support not only one but multiple levels of end-to-end delay constraints. As a...
In today's datacenters, there is an increasing demand for more network traffic capacity. The majority of the increase in traffic is internal to the datacenter, i.e., it flows between different servers within the datacenter. This category of traffic is often referred to as east-west traffic and traditional hierarchical architectures are not well equipped to handle this type of traffic. Instead, they...
For a given a graph, a distance oracle is a data structure that answers distance queries between pairs of vertices. We introduce an O(n 5/3)-space distance oracle which answers exact distance queries in O(log n) time for n-vertex planar edge-weighted digraphs. All previous distance oracles for planar graphs with truly subquadratic space (i.e., space O(n 2- ) for some constant 0) either required query...
Wearable devices, such as wristbands, smart-watches, eyewear, and wearable bio-monitors have become the focus of much attention in past year. One in ten U.S. consumers over the age of 18 now owns a modern activity tracker. These ubiquitous devices are a natural platform for formation of ad hoc networks. With almost 40% of users are above the age of 45, these older adopters are focused on improving...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.