The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Introducing Peer-to-Peer (P2P) technology into IP Multimedia Subsystem (IMS) is hard but important, especially to the streaming media service. Based on the strength analysis of IMS and P2P, three solutions with the features of signaling centralized and media distributed are compared, and eventually the solution of managing P2P via application server is selected. For the purpose of reusing the public...
Analyzed the features of router-level topology simulation, and proposed an algorithm HRSA facing router-level network topology simulation based on Dijkstra algorithm aiming at actual Internet stratified topology structure. By the way of adding the shortest routing table on the core router, the time of searching the shortest path in router-level topology simulation has been reduced effectively. The...
The following topics are dealt with: graph theory; topology; internet routing; wireless network performance; internet trust; security; neutral access network; optical access network; nextaccess; and mobile network.
There are two causes of network congestion: one is the lack of network resources, and the other is the irrational allocation of network resources. While traditional congestion control methods such as rate control, window mechanism, queue control, etc. can be applied to solve the congestion problem, but for the later congestion case, the fundamental solution is to make more effectively use of the network...
Rerouting around faulty components and migration of jobs both require reconfiguration of data structures in the Queue Pairs residing in the hosts on an InfiniBand cluster. In this paper we report an implementation of dynamic reconfiguration of such host side data-structures. Our implementation preserves the Queue Pairs, and lets the application run without being interrupted. With this implementation,...
This paper proposes a new ring structure of network coding (RSNC) based on existing network coding topology, enlarging the field of application and reducing the complexity of coding. On the basis of real-time monitoring and dynamic allocation for network bandwidth, RSNC is applied to the CERNET backbone network. The route of the packet is decided by the source node when it sends data packet and it...
The increasing growth of the global Internet making the shortcomings of its unstructured topology and distributed routing algorithm are exposed more rapidly. To design a controllable, scalable and manageable backbone network with a simple, efficient architecture is very imperative. Among many topologies, Tree topology which has a natural hierarchical structure and explicit end-to-end transmission...
Currently implemented Spanning Tree Protocol (STP) cannot meet the requirement of a data center due to its poor bandwidth utilization and lack of multipathing capability. In this paper, we propose a layer-2 multipathing solution, namely dynamic load balancing multipathing (DLBMP), for data center Ethernets. With DLBMP, traffic between two communication nodes can be spread among multiple paths. The...
Data center networks (DCNs) usually have a regular topology providing high bandwidth and low latency with multi-paths. In a data-intensive application on DCNs, it is important to be able to use all the available bandwidth. However, this is not easy to achieve because of the locality of congestion information. In this paper, we propose a reactive reroute strategy to incorporate with IEEE 802.1Qau standards...
With the properties of openness and dynamic in topology, wireless sensor networks are challenged with great security threats. In this paper we focus on the wormhole attack which is proved to be particularly dangerous to the resource-limited sensor nodes. We present the SA-TC algorithm for detecting and thus defending against this serious threat. It is based on the on-demand multi-path routings and...
Considerable effort has been spent on collecting all the information of routers by using traceroute-like probes in the router-level topology measurements. This method has been argued to introduce uncontrolled sampling biases on statistical properties of the sample graph and heavy load to the network being measured. In order to improve the quality of the maps induced by the method, researchers are...
P2P applications attract a lot of users and generate the dominant portion of the overall traffic in the Internet today. On the one hand, this large amount of traffic results in high operational costs for ISPs, mainly because of expensive interdomain connections. On the other hand, the performance of P2P applications is constricted by suboptimal peer selection or by bandwidth limitations of ISPs. To...
With the rapid development of IPv6 network, constructing a router-level topology of IPv6 is helpful for network management, network simulation, protocol design, etc. As same as IPv4, the well-known IPv6 topology discovery tool, traceroute6, also brings an important problem named alias resolution. In this paper, we present one novel heuristic method, called Route Positional Method (RPM), for IPv6 alias...
Failure recovery in IP networks is critical to high-quality service provisioning. In IP over wavelength division multiplexing (WDM) networks, a fiber carries multiple IP logical links. When a fiber fails, all the logical links it carries are disconnected simultaneously. This is called a shared risk link group (SRLG) failure. Recovery from SRLG failures using route recalculation could lead to long...
The transport traffic in WDM optical networks are provided to the networks customers in the form of lightpath via virtual topology reconfiguration (VTR), thus the algorithm to perform such an VTR has crucial impact on the resource usage efficiency. This paper proposes the routing algorithm of the Virtual Topology Reconfiguration based on the Genetic Algorithm (VTR-GA) for static traffic in the IP/WDM...
Most works about all-optical circuit-switched WDM networks considers a shortest path algorithm for fixed routing, like the Dijkstra' algorithm. However, recently, two new algorithms, searching for better load balancing and presenting superior performance than Dijkstra's when submitted to an uniform traffic load, were proposed, the Restricted Routing Technique (RRT) and the Best among the Shortest...
IEEE 802.15.4 is the emerging next generation wireless standard designed for low-rate wireless personal area networks (LR-WPAN), which suit wireless sensor networks applications. It attempts to provide a low cost, low power and short range wireless networking. The QoS is more challenging in heterogeneous wireless sensors networks, where a diverse mixture of sensors for monitoring temperature, pressure,...
The objective of the paper is to implement topology control by maintain minimum degree and connectivity between nodes from the Virtual-Backbone (VB) updates. VB construction is very familiar, to reduce flooding and broadcast storm problem in wireless networks. Nodes in MANET, move anywhere at any time, it requires strong topology and connectivity maintenance between VB and other nodes. To overcome...
The technology based on Wavelength Division Multiplexing (WDM) applied to optical networks has resolved the bandwidth waste in this kind of networks. WDM divides the bandwidth of an optical fiber in different wavelengths that can be used by electronic devices to send and receive data without bottlenecks. Another problem appears when the necessity of choice of the path and the wavelengths to interconnect...
In the recent years, the use of real-time Ethernet protocols becomes more and more relevant for time-critical networked industrial applications. In this context, this paper presents a method to compute the worst-case packet delays on switched Ethernet. Based on an evaluation of the packet delays at each switch port and the network topology, we construct a weighted directed graph that allows to find...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.