The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Queue management in Named Data Networks (NDN) has gained a lot of attention recently. Unlike the traditional IP architecture, the transport mechanism in NDN is intricate and comprises of in-network caching of data packets at routers. Hence, the most effective avoidance of congestion can occur at the routers itself. In this paper, we make two contributions: first, we propose a back pressure based congestion...
Wireless sensor networks (WSNs) are widely used nowadays in various domains. In general, the applications in which the WSN is deployed need that this network presents a minimal degree of reliability, effectiveness and robustness. However, the specificity of the nodes deployed in this type of networks makes them prone to failures. In this paper, we discuss the recovery from simultaneous failures for...
Internet topology measurement studies rely on a few vantage points to trace towards a large number of destinations. Such traces contain significant overlaps, which increase the measurement traffic and duration. As there is considerable redundancy in the generated measurement probes, researchers have been exploring probe reduction approaches with minimal loss of the topological information. To decrease...
A crucial problem in distributed systems is the probability of failure occurrence in resources. Recent studies have been searching different ways for improving the execution time of applications and enhancing fault-tolerant mechanisms. In many cases testing is performed using simulated environments. This work presents the implementation of a simulator for computational grids prone to resource failures...
Cloud-based applications require dynamic resource allocation to cope with changing workloads and unexpected request spikes. The use of container technology increases manageability, portability, and scalability, but changes how the applications are provisioned and maintained. This paper presents MicroCloud, a novel architecture for providing multiple containerized applications with fine-grained resource...
Monitoring techniques have been deeply studied in wired networks using gossip and hierarchical approaches. However, when applied to a MANET, several problematics arise. We present a hybrid distributed monitoring architecture for MANETs. We get inspired of gossip-based and hierarchical-based algorithms for query dissemination and data aggregation. We define gossip-based mechanisms that help our virtual...
Service Function Chaining (SFC) consists of SFC data plane and control plane from the aspect of architecture. The standard document of I-D.ietf-sfc-control-plane-00 describes requirements for delivering information between SFC control elements and SFC functional elements. This paper defines requirements of management of SFC control plane and defines Yang data model of management operations performed...
Allocating resources to virtualized network functions and services to meet service level agreements is a challenging task for NFV management and orchestration systems. This becomes even more challenging when agile development methodologies, like DevOps, are applied. In such scenarios, management and orchestration systems are continuously facing new versions of functions and services which makes it...
With the moving of distribution systems towards a renewed architecture, new monitoring and control functionalities have emerged; with them a large amount of information need to be treated. Not all this information is strictly necessary; a relevant part of it can be simplified by the concept of Load Area: a group of prosumers whose power injection has a similar impact on the distribution grid operating...
The fault rate of on-load tap-changer (OLTC) has always been in a high level, and that is exactly the primary reason of transformer faults. As a result, an on-line detection method of OLTC was proposed. The embedded platform and wireless sensor network (WSN) technology was introduced into the on-line detection system. WSN was used to obtain OLTC status information. The embedded platform software,...
This paper presents a power reference modifier for seamless transfer considering the power balance in the parallel operation. When the PCS (Power Conditioning System) is disconnected from the grid, the PCS should operate in the stand-alone mode to supply energy to the critical loads. If multiple PCSs work as one PCS, slave PCSs maintain the current control mode even if master PCS change its control...
Big data analytics is applied for IP traffic prediction. When the virtual topology needs to be reconfigured, predicted and current traffic matrices are used to find the optimal topology. Exhaustive simulation results reveal large benefits.
We present a reconfigurable dragonfly architecture for High-Performance-Computing (HPC) systems leveraging optical-circuit-switching. An SDN control plane monitors network traffic characteristics and optimizes the connectivity. Software-controlled reconfiguration of the optically interconnected topology is experimentally demonstrated.
In this work, we consider the usage of wireless sensor networks (WSN) to monitor an area of interest, in order to diagnose on real time its state. Each sensor node forwards information about relevant features towards the sink where the data is processed. Nevertheless, energy conservation is a key issue in the design of such networks and once a sensor exhausts its resources, it will be dropped from...
The correct functioning of inter-domain routing is of vital importance to the ever expanding Internet. As a common threat to the Internet, prefix hijackings often hijack traffic destined to some Autonomous Systems(ASes), leading to routing black holes or traffic interception. In this paper, we study two typical categories of prefix hijackings, namely false origin hijacking and man-in-the-middle interception,...
P2P architectures have been widely adopted by botnets for their high robustness. As the complex Command and Control (C&C) mechanism inevitably leads to too many interactions among bots, the P2P topology characteristics of traditional P2P botnet architectures is likely to be exposed to defenders, which makes them vulnerable to graph-based tracking. Inspired by the infeasibility of monitoring the...
Internet of Things becomes one of the main trends in development of future networks. It introduces new challenges to network operator, like exponential growth of the traffic, large amount of network nodes to manage or variety of services. Some IoT services include the control of critical processes such as remote manipulation of a robotic arm in tele-surgery. In such processes, keeping very low end-to-end...
Complex application deployment and management over multiple heterogeneous PaaS platform is one of the key problems that have emerged with the cloud technology revolution. Presently, vendor lock-in has become a major PaaS technology challenge. Multi-Cloud PaaS Architecture (MCPA) has been recently proposed research project, intended to resolve complexity and interoperability challenges. MCPA offers...
The design of conventional process plants is guided by the idea of structuring the process in functional units. Because of cost reduction this design is often neglected during the implementation phase. There is a huge potential in the re-modularization looking at the re-usability which directly effects the engineering efficiency when developing new plants. Furthermore, there is the possibility to...
Flooding Peer-to-Peer (P2P) networks form the basis of services such as the electronic currency system Bitcoin. The decentralized architecture enables robustness against failure. However, knowledge of the network's topology can allow adversaries to attack specific peers in order to, e.g., isolate certain peers or even partition the network. Knowledge of the topology might be gained by observing the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.