The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The objective of this work is to build an efficient WSN (Wireless Sensor Network) with long lifetime for indoor monitoring application, which requires network auto-organization and robustness against node failure and node association. In this paper, a novel MAC protocol, ADCF (Adaptive and Distributed Collision-Free), is proposed. ADCF uses CFBS (Collision-Free Beacon Slot) and CFDS (Collision-Free...
Cluster management has become a multi objective task that involves many disciplines like power optimization, fault tolerance, dependability and online system operation analysis. Efficient and secure operation of these clusters is a key objective of any data center policy. In addition, the service provided by these servers must fulfill a level of quality of service (QoS) to the customers. Applying...
Immersive, end-to-end applications using mixed multimedia data pose new requirements to the underlying network architecture. These requirements are related to two distinct categories of content delivery. Starting from the overlaying principles of the Future Internet Architecture, the network overlay principles and the Content Delivery Network approach we define our proposed architecture based on two...
The virtual circuit characteristic of MPLS and GMPLS architectures has enabled the implement of Traffic Engineering (TE) and Differentiated Services (Diff-Serv) profile to networks. Both schemes are possible by the application of preemption policies and priority of path assignment. With the advent of Path Computation Element (PCE) the routing task can be centralized and properly (re-)designed to accommodate...
The ongoing trend towards a global services economy creates considerable market opportunities for various stakeholders. A service intermediary who offers complex services to customers and consumes services from suppliers and thus creates a service value network, faces the challenge of adhering to agreed service levels while minimizing associated costs, risks and potential penalties. Starting from...
Virtual Content Aware Networks (VCAN) constructed as overlays over IP network substrate is considered an efficient solution to incrementally introduce content awareness at network level. Planning, mapping on top of multiple domains IP network and optimizing these VCANs is still an open research issue. This paper is focused on intradomain planning and VCAN mapping, with QoS guarantees, thus continuing...
Cyber-Physical Systems (CPS) form an emerging discipline that integrates embedded computers with the physical processes under control. Typically, Cyber-Physical applications include low profile computing components, such as sensors and actuators that must communicate to carry out complex tasks. They may be found in different applications domains e.g. intelligent buildings, industrial automation or...
Total ordering is a messaging guarantee increasingly required of content-based pub/sub systems, which are traditionally focused on performance. The main challenge is the uniform ordering of streams of publications from multiple publishers within an overlay broker network to be delivered to multiple subscribers. Our solution integrates total ordering into the pub/sub logic instead of offloading it...
Carriers usually deploy traffic engineering (TE) technologies coupled with network control plane protocol suites, such as MPLS and GMPLS, to offer value added network connectivity services to their customers. However, automated Quality of Service across multiple carriers still remains a challenge for Network Service Providers, and many stumbling blocks exist due to the complex integration of different...
Spectrum sharing is a key problem in cognitive radio networks (CR). After the spectrum sensing and decision processes, detected or predicted spectrum holes need to be utilized by the CR users conforming to specific principles. In this paper, we extended our previously proposed work on a distributed spectrum sharing mechanism by enabling defining service classes among CR users and accomplish spectrum...
This paper proposes a new multi-rate H.264 scalable video multicast in lossy network using network coding. We first prioritize video layer based on its effect to the end-to-end video quality. Each video layer is routed via the path obtained from the optimization framework under the constraints on QoS guarantees. Different destinations may receive different number of video layers depended on their...
This paper presents a Hybrid Service Overlay Network (H-SON) for composing Service Specific Overlay Networks (SSON) in mobile environments. The overlay topology is organized into dynamically-adaptable hierarchical Chord rings reflecting node mobility and service quality transformation. Moreover, our loss-based utility function is used to predict the client's QoE. Node resources can thus be automatically...
The operation of wireless network protocol stacks is heavily dependent on the actual deployment of the system and especially on the corresponding network topology, e.g. due to channel contention. The nature of wireless communication does not allow for a-priori determination of network topology, network-defining metrics such as neighbor density and routing span may drastically differ for various deployments...
The large scale and high performance requirements of Cloud computing pose many challenges to the data center network operators. These networks typically require high bisection bandwidth, strict performance isolation, and power-efficient operation. Recently, many researchers have proposed various network controller systems for programming networks, each of them to individually address only one of these...
Constrained minimum Steiner tree (CMST) problem is a key issue in multicast routing with quality of service (QoS) support. Many heuristics have been developed to solve this NP-complete problem. The bounded shortest multicast algorithm (BSMA) has been proved to be able to find solutions of very low cost with reasonable computation time. As such, it is still being widely used as a benchmark to evaluate...
Content distribution networks (CDNs) using storage clouds have recently started to emerge. Compared to traditional CDNs, storage cloud-based CDNs have the advantage of cost effectively offering hosting services to Web content providers without owning infrastructure. However, existing work on replica placement in CDNs does not readily apply in the cloud. In this paper, we investigated the joint problem...
Due to the Internet¡¦s scalability and connectivity, enterprises and organizations increasingly rely upon it to provide services for customers. However, attackers intelligently attack enterprises and organizations through continuous vulnerability exploitation and advanced malware. Recently, assailants have applied the characteristics of fast propagation and epidemic attack infection to launch more...
How to apply timely and effective defense strategies against attackers while maximizing system survivability is a critical issue for a defender. This paper mathematically models attack and defense scenarios, using various defensive mechanisms during both the planning and defending stages and under quality of service constraints. This model incorporates high degrees of randomness, as attackers are...
Wireless Sensor Network (WSN) deployment appears like a crucial step for network Quality of Service (QoS). In this context a real conception has to be planed before a deployment on the studied area. Actually researches use a simple and regular Area of Deployment (AoD) representation and do not allow interactive interface for a non programmer. Our approach tries to provide a tool to elaborate a strategy...
Streaming live video over the Internet presents great challenges due to its sheer bandwidth requirements. Client/Server model suffers from scalability issues and high deployment cost to provide this service. Peer-to-Peer (P2P) approach provides an excellent alternative due to its potential scalability and ease of deployment. Nonetheless, a major limitation of P2P approach lies in its high dependency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.