The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To utilize P2P as the carrying technology for HD-VOD within MAN, the traffic distribution on every hierarchical links is analyzed, which shows the most traffic would pass through the core switch and induces the jam in the backbone. The optimizing method is proposed to eliminate the jam by selecting the nearest source node as the preferred. The analysis proves that the traffic through the core switch...
Internet Service Providers (ISPs) run the internal flavor of the Border Gateway Protocol (iBGP) for distributing routing information among border routers. While configuration languages allow routers to change iBGP attributes as a BGP message travels within the ISP's network, most prior work neglected this possibility, focusing only on the common case where iBGP attributes are left untouched. In this...
In this paper we analyze performance of network coding focusing on two specific network coding schemes: XOR and random linear network coding. We have simulated different topologies and traffic patterns in order to provide better understanding of network coding behavior and its possible bottlenecks. As a part of our performance evaluation we address computational complexity of coding and decoding operations...
The IEEE 802.15.4 standard was developed for the purpose of media access control of low power wireless personal area networks. Wireless sensor network devices have the general characteristics of low power capabilities and operation. From this point of view, it makes technical sense to use the IEEE 802.15.4 standard for the MAC layer of wireless sensor networks. There are several modes of operation...
The capacity of a multi-hop wireless network is the traffic payload that it can transport. This is a prominent quality of service issue, particularly in the highly constrained settings of 802.11 wireless mesh network. In this paper, we consider two complementary definitions of the capacity. A network-wise capacity is defined as the sum of the upload traffic, and a flow- wise capacity highlighting...
Earth observation data will be moved through satellite constellations to ground stations by space internet. Routing observation traffic in this environment is constrained by factors such as satellite orbits, satellite capabilities, observation schedules, ground station schedules, and rapidly evolving natural events. Among many global routing algorithms, Dijkstra Algorithm is mostly preferred as it...
Wireless Mesh Network (WMN) has been considered as a key emerging technology to construct next generation wireless communication networks. It combines the advantages of both mobile ad-hoc network (MANET) and traditional fixed network, attracting significant industrial and academic attentions. In WMN, the load balancing becomes a hot topic in enhancing the QoS provision as a load balanced WMN exhibits...
This paper proposes and investigates the performance of a dynamic routing and wavelength code assignment (RWCA) algorithm using hybrid technology with wavelength and optical code division multiplexing (WDM/OCDM) for Optical Burst Switching (OBS) network. An OCDM-based multigranularity optical cross-connect (MG-OXC) is used to enable the better granularity in optical path (wavelength and code) switching...
In this paper, chaos theory is applied to study the traffic behavior of wireless sensor networks (WSN). Through reconstruction of phase space and calculation of maximum Lyapunov exponent, we find that WSN traffic is chaotic, and different topologies of WSN could cause a little variation on embedded dimensions and maximum Lyapunov exponents, but doesn't change chaotic characteristics of traffic in...
The broadcast nature of wireless transmission makes network coding possible in wireless networks. The state-of-the-art algorithm, referred to as COPE, utilizes opportunistic listening to encode packets from different unicast sessions. In theory, the network coding gain of COPE is only dependent on the network topology. In practice, it is also dependent on the traffic pattern and MAC layer scheduling...
P2P application has accounted a large proportion of the total Internet traffic. However, existing P2P topology formation protocols always assume a homogeneous environment or neglect the underlying Internet topology. These methods will increase inter-domain traffic so that ISPs always restrict the P2P traffic and current neighbor selection procedure always randomly chooses a peer as its neighbor probably...
The network management area deals with large amounts of data. Some of its protocols and techniques are not completely understood when it comes to usage patterns and most used features. The understanding of such characteristics is a challenging process, due to the massive data amount involved. This process can be supported by information visualization techniques. These consist in visual representations...
Video streaming with HDTV or UHDV quality will be provided and widely demanded in the future. However, the transmission bit-rate of high-quality video streaming is quite large, so generated traffic flows will cause link congestion. Therefore, when providing streaming services of rich content, it is important to flatten the link utilization, i.e., reduce the maximum link utilization. To achieve this...
Monitoring at the flow level is crucial to ensure the correct operation of networks. Any sizable network relies on a number of monitoring probes, both to provide different observation points but also to scale to the ever-increasing number of flows that go through it. This situation gives rise to the difficult problem of assigning monitoring of flows to the available probes so that the network-wide...
We consider broadcasting from a single source to multiple destinations in a linear wireless erasure network with feedback. The problem is to find the maximum stable throughput under different transmission policies with opportunistic network coding and forwarding. Given stochastically varying traffic, we assume that network coding decisions are based on the availability of queued packets. The network...
There are two basic approaches to allocate protection resources for fast restoration. The first allocates resources upon the arrival of each connection request; yet, it incurs significant set-up time and is often capacity-inefficient. The second approach allocates protection resources during the network configuration phase; therefore, it needs to accommodate any possible arrival pattern of connection...
Flooding search is a basic searching scheme for unstructured peer-to-peer networks. This technique produces exponentially redundant messages in each hop. Subsequent growths of redundant messages will limit system scalability and will cause unnecessary traffic in network areas. To improve this searching scheme and reduce redundant messages, this paper proposed a novel algorithm (SmoothFlood) which...
Although having high potential for broadband wireless access, wireless mesh networks are known to suffer from throughput and fairness problems, and are thus hard to scale to large size. To this end, hierarchical architectures provide a solution to this scalability problem. In this paper, we address the problem of design and optimization of a tiered wireless access network. At the lower tier, mesh...
As the more complex of the transport network's architecture, and the bigger of its scale, the analysis and management of the network fault is becoming more and more difficult. We need to do kinds of experiments to confirm various network breakdown phenomena in different networks and the influence which it brings to the service. But doing the experiments in real networks would bring some security risks,...
Energy conservation is drawing increasing attention in data networking. One school of thought believes that a dominant amount of energy saving comes from turning off network elements. The difficulty is that transitioning between the active and sleeping modes consumes considerable energy and time. This results in an obvious trade-off between saving energy and provisioning performance guarantees such...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.