The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rise in population aging witnesses the widespread attention towards the healthcare also by means of efficient and non invasive healthcare monitoring platforms. Intra Body Area Networks (I-BANs) are envisaged as the tool to implement this platform and will exploit the human body as the transmission medium, causing undesirable overheating of tissues and organs crossed by electromagnetic signals...
High throughput data transfers across the Internet has become a challenge with deployment of data centers and cloud platforms. In this paper, we propose to utilize the cores of a router to build multiple abstractions of the underlying topology to parallelize end-to-end (e2e) streams for bulk data transfers. By abstracting a different graph for each core, we steer each core to calculate a different...
Datacenter networks (DCNs) play an important role in supporting cloud computing and Internet-based services. The cost and power consumption of a DCN grow rapidly with the increases of network scale and bandwidth requirement. The cost, complexity and efficiency of a DCN are determined by several design factors including the topology, addressing and routing. In this paper, we propose a simple and cost-effective...
By carefully selecting and establishing overlay edges and computing multiple underlay-edge-disjoint paths, the ability to still fulfill demands in a VPN in case of edge-failures can be significantly increased. This article presents an approach to construct efficient and optimally resilient VPN overlay topologies together with the corresponding overlay paths to fulfill a given set of demands (connectivity...
Efficient and secure device to device communication is a necessary enabler for realization of fog and edge computing models. With an ever-increasing number, diversity, and geographical distribution of heterogeneous devices, ranging from pervasive sensor networks to edge cloudlets, the interconnection and network management of these devices emerges as a major challenge. Peer-to-peer (P2P) network overlays...
Although shared path protection has been employed for protecting traffic flows against network failures, to our knowledge, it has not been considered for path protection in elastic optical networks with space division multiplexing (SDM). In this paper, we propose an algorithm to dynamically generate primary and backup paths using a shared backup scheme. The proposed algorithm is compared to the Failure-Independent...
This paper discusses multi-point address channel design in fly-by topology for high speed memory interface. Waveform behaviors at DRAM locations along the channel are examined in depth with eye opening data in various channel design factors and device termination settings. Eye opening is exacerbated on the front DRAM from the controller more prominently due to ring-backs from high frequency reflections...
There has been explosive growth of satellite applications in the past decades. Broadcast is a fundamental operation in satellite networks, which is required for satellites self-organization, routing discovery, coordination and collaborations. In this paper, we study the problem of delay bounded and energy efficient broadcast in satellite networks. Broadcast routing is a challenging issue in satellite...
Network messaging delay historically constitutes a large portion of the wall-clock time for High Performance Computing (HPC) applications, as these applications run on many nodes and involve intensive communication among their tasks. Dragonfly network topology has emerged as a promising solution for building exascale HPC systems owing to its low network diameter and large bisection bandwidth. Dragonfly...
We analyze topological entropy in wireless networks that are subject to local scattering and macroscopic shadowing effects. To this end, we model a network as a random geometric graph with probabilistic pair connections (due to channel randomness) and define uncertainty as the Shannon entropy of the underlying graph ensemble. We present new bounds on topological entropy that are functionals of the...
Leveraging Software-Defined Networking (SDN) and middleboxes, application-level policies can be propagated to the network. SMART is an SDN middlebox architecture that differentiates network flows based on tenant inputs. By leveraging FlowTags software middlebox in addition to the OpenFlow rules, it supports a larger scope of tenant preferences and rules from the application layer to alter the network...
Interconnection network is a main concern in the architecture design of highly parallel systems such as high density data centers and supercomputers that reach millions of endpoints, e.g., 10M cores for Sunway TaihuLight system. As the number of endpoints of such systems has gradually increased to meet the higher computing and storage demand, the interconnection network is required to provide a low...
On most supercomputers, except some torus network based systems, resource managers allocate nodes to jobs without considering the sharing of network resources by different jobs. Such network-oblivious resource allocations result in link sharing among multiple jobs that can cause significant performance variability and performance degradation for individual jobs. In this paper, we explore low-diameter...
It is compared of widely used CAD Expedision, PADS, Altium designer, SPECCTRA (PCB Alegro Router) and Topological Router (TopoR) to determine the most effective system of routing of printed circuit boards. A comparison method of analysis of hierarchies T. Saaty using criteria, objectively reflecting the design parameters of the topology of the designed products, which directly depend on the efficiency...
A promising approach for dealing with the increasing demand of data traffic is the use of device-to-device (D2D) technologies, in particular when the destination can be reached directly, or though few retransmissions by peer devices. Thus, the cellular network can offload local traffic that is transmitted by an ad hoc network, e.g., a mobile ad hoc network (MANET), or a vehicular ad hoc network (VANET)...
Bit Indexed Explicit Replication (BIER) is a novel multicast forwarding scheme for IP networks that avoids states in replicating routers by encoding the multicast information into a bit string in the packet header. In addition, the BIER-TE variant encodes the multicast tree in the header and allows for network programmability. We propose the use of maximally redundant trees (MRTs) for 1+1 protection...
The IPv6 Routing Protocol for Low-power and Lossy Networks (RPL) has been recently standardized for routing in the constrained Internet of Things networks. Unfortunately, the RPL storing mode has been found restricted by storage limitations in the routers along the downward path. In fact, unreachable destinations problem may be easily encountered when a router fails, due to lack of memory, to store...
Software Defined networks (SDNs) paradigm tries to improve the network performance, facilitating the network management and the scalability basing on open-source software and adding a new entity called controller that manages the entire network. One of the goals of the controller is taking decisions in regards to routing instead of distributing it among the network nodes, as usual. However, this field...
Software defined network (SDN) is one of the most interesting research topic that is currently being investigated. The inclusion of artificial intelligence (AI) can improve the performance of routing protocols. Nowadays the application of AI over routing protocols is only applied to real devices, especially in wireless sensor nodes. In this paper, we present a new proposal to implement an intelligent...
The continuous increase in data traffic, heterogeneous access networks, and the diversity in the Quality of Service (QoS) requirements of the applications is expected to significantly increase the management complexity of 5G networks. Software Defined Networking provides an effective management architecture enabling more efficient utilization of 5G network resources. In this paper, a novel failure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.