The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Discovering tactical resources (a.k.a. name service or service discovery) in a robust, decentralized, and scalable fashion is critical for the success of tactical communications, particularly in dismounted segments consisting of dismounted soldiers/sensors and mounted segments formed by combat and support vehicles, combat Headquarters (HQ) and Command Post (CP). JXTA-the de facto standard of P2P programming...
Because of transient wireless link failures, incremental node deployment, and node mobility, existing information dissemination protocols used in wireless ad-hoc and sensor networks cause nodes to periodically broadcast "advertisement" containing the version of their current data item even in the "steady state" when no dissemination is being done. This is to ensure that all nodes...
In this work, we aim to improve the gameplay of time-sensitive video games over MANETs. We focus on disconnections problem. Precisely, if the path between a game client and the server breaks, the game on the player side freezes and becomes unplayable until that the network re-establishes the path toward the server. In MANETs, these disconnections occur mainly because of nodes mobility. To overcome...
OpenFlow is a promising candidate for future Internet technology. In the US, OpenFlow-based networks have been installed on several university campuses recently. However, we perceive that there is no structured approach to the operation and management of large-scale OpenFlow-based networks and there are few actual achievements of carrying business traffic on them. The focus of this study is on developing...
This paper investigates power-aware traffic engineering for multi-layer networks utilizing ILP, and proposes a heuristic approach. Simulation results illustrate that partial deployment of TDM-XCs in multi-layer networks with smart traffic engineering contributes to power conservation.
The unifying network architecture has contributed to a wave of work on layered network evolution. The undertaking of this paper is twofold: This paper's first-of-its-kind examination of the problems of logical link mapping and traffic flow routing unveils that backhaul traffic, a flow loop that occurs at any lower link layer below the traffic layer except its own, could happen in the traffic flow...
In this paper, a new routing protocol, named Adaptive Ad hoc On-Demand Distance Vector (AAODV) is presented. AAODV is based on Ad hoc On-Demand Distance Vector (AODV) protocol. Unlike AODV, this protocol is able to establish routes using any of the routing metrics calculated per link, due to its ability to separate paths quality monitoring from routing. In the paper AAODV uses, but it is not limited...
Large switched Ethernet networks are deployed in campus networks, data centers and metropolitan area networks to support various types of services. Congestion is usually handled by deploying more switches and installing higher bandwidth link bundles, although a better use of the existing infrastructure would allow to deal with congestion at lower cost. In this paper, we use constrained-based local...
The access link quality experienced by the end users depends on the amount of traffic and on the presence of network anomalies. Different techniques exist to detect anomalies, but little attention has been devoted to quantify the access link quality and to which extent network anomalies affect the end user's access link experience. We refer to this aspect as the impact factor of the anomaly, that...
Currently implemented Spanning Tree Protocol (STP) cannot meet the requirement of a data center due to its poor bandwidth utilization and lack of multipathing capability. In this paper, we propose a layer-2 multipathing solution, namely dynamic load balancing multipathing (DLBMP), for data center Ethernets. With DLBMP, traffic between two communication nodes can be spread among multiple paths. The...
P2P applications attract a lot of users and generate the dominant portion of the overall traffic in the Internet today. On the one hand, this large amount of traffic results in high operational costs for ISPs, mainly because of expensive interdomain connections. On the other hand, the performance of P2P applications is constricted by suboptimal peer selection or by bandwidth limitations of ISPs. To...
In this paper, we address the problem of survivable traffic grooming in optical WDM networks in which lightpaths are hop constrained. Survivability is provisioned at the wavelength granularity through either dedicated or shared path protection schemes. We propose an auxiliary-graph-based algorithm that addresses grooming, protection, and impairment constraints in a combined manner and that determines...
The benefit of Class-of-Service (CoS) is an important topic in the "Network Neutrality" debate. Proponents of network neutrality suggest that over-provisioning is a viable alternative to CoS. We quantify the extra capacity requirement for an over-provisioned classless (i.e., best-effort) network compared to a CoS network providing the same delay or loss performance for premium traffic. We...
Internet Service Providers (ISPs) have failed to independently reduce the cost peer-to-peer (P2P) traffic. Traffic- throttling devices increase user download times, and caches store content that may infringe copyright. We propose ISP-Managed P2P (IMP): a transparent peer-discovery service that returns peers favorable to ISPs. Unlike similar services, IMP does not require the direct support of developers...
In recent years, many logical topology designing methods in IP over WDM networks have been researched in which HLDA (Heuristic Logical Topology Design Algorithm) and MLDA (Minimum-Delay Logical Topology Design Algorithm) are considered as basic algorithms using overlay architecture model in IP over WDM networks. HLDA and MLDA set up the lightpath between the pair of nodes based on only its traffic...
Most works about all-optical circuit-switched WDM networks considers a shortest path algorithm for fixed routing, like the Dijkstra' algorithm. However, recently, two new algorithms, searching for better load balancing and presenting superior performance than Dijkstra's when submitted to an uniform traffic load, were proposed, the Restricted Routing Technique (RRT) and the Best among the Shortest...
In order to facilitate communication among the active stations on a mobile ad-hoc network (MANET), a routing protocol is used to discover routes between stations. It plays an important role for the overall performance of a MANET. There are factors such as mobility, network size, network load, bandwidth, and signal strength affecting the performance of routing protocols. This paper aims to study the...
We investigate the performance of IEEE 802.15.4 MAC (Medium Access Control) sublayer in beacon-enabled tree-topology Wireless Sensor Networks (WSNs). To our knowledge, current literature has mostly focused on relatively simpler star topology or non-beacon-enabled peer-to-peer networks. In our work, we first respectively evaluate the impact of different traffic loads from the source nodes in each depth...
IEEE 802.15.4 is the emerging next generation wireless standard designed for low-rate wireless personal area networks (LR-WPAN), which suit wireless sensor networks applications. It attempts to provide a low cost, low power and short range wireless networking. The QoS is more challenging in heterogeneous wireless sensors networks, where a diverse mixture of sensors for monitoring temperature, pressure,...
With the rapid advancements in wavelength-division multiplexing (WDM) technology, the capacity of optical fibers is increasing considerably. Traffic streams from users generally have a data-rate that is far less than the bandwidth of optical fibers or that of a lightpath in optical fibers. Traffic grooming can be used to group the traffic streams from various users and match to the data-rate of a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.