The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data centers play an important role with the fast growth of cloud computing used in our daily life. Traditional data center networks based on the fat-tree topology have their own drawbacks and limitations which prevent them from providing high performance to satisfy the increasing demand for cloud services. In this paper, we first design a new flexible network fabric for data center networks based...
In this paper, we present a novel approach to assign paths to data streams in a mission-centric heterogeneous wireless mesh network where nodes have multi-channel radio interfaces. Different than conventional packet-switching routing, our approach assigns the paths using a link utility based on sub-topologies of non-orthogonal frequencies. We use a graph coloring algorithm to calculate the utility...
To contend with increasing requirement of cloud based applications nowadays, it is becoming very essential for the data center networks (DCN) to expand the network capacity very frequently. A good DCN topology must possess several properties for any dimensions of the network such as low diameter, high bisection bandwidth, low cost of deployment etc. Moreover, a DCN topology must also show efficiency...
We consider a class of spatially distributed linear systems with finite bandwidth. By means of spatial localization techniques, it is shown that exponential stability of this class of systems can be verified in a decentralized and spatially localized fashion, which is practically relevant to many real-world applications. Our proposed necessary and sufficient stability certificates are independent...
Cloud data center is becoming more and more important for tenants because cloud resources and associated services can be shared by multi-tenant. Although resource isolation and traffic control, which are effective ways to protect the QoS of tenants, have been used extensively, the topology of the network needs to be further studied extensively. In this paper, combining VN with SDN, a topology-aware...
In Data center network, with the rapid development of network applications, how to balance the network load has become the focus of everyone's attention. It is required to fully utilize the resources such as bandwidth to provide high bandwidth for various cloud computing service. In this paper, we propose a dynamic load balancing routing mechanism based on disturbance under SDN. The proposed scheme...
IP - VPN and VPN Service Provider (VSP) customersmaintain the quality for the routing and signaling entities. In thenetwork, VSP is getting viewing by VPN like opaque entity andlimiting meaningful interaction between the VPN and VSP. In thispaper, we will reduce the (Crankback + Miscall) Ratio for theVPN network and increase the VPN Successive Rato. As from theresults session, VPN (Crankback + Miscall)...
The performance of wireless mesh networks (WMNs) deployed for Internet access in rural settings is affected by several factors. Typically, deployments in African domains use cheap and computationally constrained devices with challenges such as power fluctuations, gateway congestion, VSAT communications asymmetry and low bandwidth, which affects throughput under dynamic scenarios. Caching methods can...
The ability of Ethernet Ring Protection Switching (ERPS) to provide carrier grade switchover has made Ethernet technology viable in telecommunication carrier networks enabling network operators to replace SONET/SDH/PDH. Adaptive modulation (AM) is another evolution in technology which may effectively double the capacity of microwave links in favorable weather condition. In this paper, we propose an...
In the network environment with limited network resources, the overall bandwidth is usually competitively shared among various application users. The traffic engineering techniques presented for resolving the bandwidth sharing, e.g. limited traffic rate and traffic blocking, may not be able to satisfy the requirement for all types of services. In this paper, we propose an effective routing mechanism...
This article presents the first experimental results of an integrating Radio-Frequency DAC (RF-DAC) we called the Riemann Pump. This DAC is part of a complete waveform generator architecture based on the quantization of the signal variations and the conversion of the as-obtained digital signal into the analog domain. This technique provides an improvement of the coding efficiency with respect to conventional...
Network Function Virtualization (NFV) explores the virtualization technologies to offer Network-as-a- Service (NaaS) through connected virtual network functions. The network operations that were previously performed by specialized hardware are consolidated as software-based virtual network functions (VNFs). These VNFs can be implemented in the telecom clouds with high volume servers, switches and...
With the increasing popularity of cloud computing, the huge amount of energy consumed by data centers has gained much attention. Current proposals address the energy efficiency problem by two major methods: optimizing the allocation of physical servers and network elements (routers or switches). In order to improve resource utilization and minimize the energy consumption, the former method focuses...
Network Function Virtualization (NFV) is promising to lower the network operator's capital expenditure and operational expenditure by replacing proprietary hardware-based network equipment with software-based virtual network functions that can be consolidated into telecom clouds. In particular, NFV provides an efficient way to deploy network services using service function chains that consist of a...
This paper presents an eigendecomposition approach for virtual resource embedding in cloud infrastructures. Instead of relying on combinatorial or iterative approaches, the method uses structural description of resource graphs to achieve near optimal joint node and link mapping. The solution extends and generalizes prior work on eigendecomposition of the adjacency matrices for undirected graphs to...
One of the prominent problems in cloud datacenters is the unpredictability of tenants' applications. Although this problem has been recognized, prior solutions do not consider the bandwidth allocation from both the perspective of tenants' network resource requests and the applications' actual network requirements. To address this issue, we present SpongeNet+, a comprehensive solution that consists...
This paper presents a lightweight and simple structure of slotted circularly polarized (CP) patch antenna using conductive textile. ShieldIt Super is used as a conductive textile and felt is used as a substrate of the antenna. The prototype is designed with a total dimension of 36 mm × 36 mm and spaced by a 3 mm thick felt fabric for Body-centric Wireless Communication (BCWC) operating in the 5.2...
The shared nature of cloud network infrastructures causes unpredictable network performance, which may degrade the performance of these applications. Recently, several works propose to explicitly reserve the network bandwidth in the cloud with virtual network abstraction models, which pre-specify the network bandwidth between virtual machines (VMs) for a tenant job. However, the pre-specification...
The control of excessive downloads by rogue users in organizational LANs is the subject of this work. Two mechanisms have been used in order to accomplish this. The first mechanism, is TCP rate control (TCR), it is a receiver-based flow control technique that can be used to effectively rate limit rogue users' flows, making more bandwidth available to regular users. The second mechanism, admission...
Slow Start algorithm helps the TCP flows to quickly ramp up their congestion window (cwnd) by employing an exponential increase pattern. This pattern of increasing cwnd leads to consecutive loss of packets in bulk, and hence, results in large number of packets being re-transmitted. Recently, the limitations of this approach have become apparent as many Internet applications are becoming more sensitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.