The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aeronautical ad hoc networks (AANETs) can have a hybrid topology of intermittently connected clusters and mesh network. The hybrid network topology compounded with highly dynamic nature of AANET leads to variable connectivity in the network. The connectivity in the network for direct air-to-air communication between aircrafts is primarily a function of velocity of air vehicles, position of air vehicles,...
ABNO's OAM Handler is extended with big data analytics capabilities to anticipate traffic changes in volume and direction. Predicted traffic is used to trigger virtual network topology re-optimization. When the virtual topology needs to be reconfigured, predicted and current traffic matrices are used to find the optimal topology. A heuristic algorithm to adapt current virtual topology to meet both...
The diversity in the way different cloud providers offer their services, give their SLAs, present their QoS, support different technologies, etc., complicates the portability and interoperability of cloud applications, and favors vendor lock-in. Standards like TOSCA, and tools supporting them, have come to help in the provider-independent description of cloud applications. After the variety of proposed...
In this paper, we investigate the quasi-synchronization problem of linearly coupled dynamical systems with directed topology structure via event triggered coupling configurations. These decentralized principles employ the states of each node's neighborhoods at event-triggered time to implement the diffusion term on this node. By the criteria of the next triggered time, we prove that the coupled system...
The Secure Autonomous Response Networks (SARNET) framework introduces a mechanism to respond autonomously to security attacks in Software Defined Networks (SDN). Still the range of responses possible and their effectiveness need to be properly evaluated such that the decision making process and the self-learning capability of such systems are optimized. To this purpose we developed a touch-table driven...
In Software Defined Infrastructure (SDI), a network topology consists of many converged heterogeneous resources, both physical and virtual, for computing and networking. However, the network topology is dynamic due to various physical and logical activities such as addition of new racks, VM addition/deletion/migration, and network creation/modification/deletion. In this paper we propose SDIGraph,...
Recently, a number of offloading approaches have been proposed to reduce the burden on the cellular infrastructure, especially during peak hours. Ranging from pure data offloading concepts using local caches to fully-fledged services operating on ad hoc networks, these approaches are mostly tuned towards their performance. Consequently, cache hit ratios, achieved throughput, or end-to-end latencies,...
Multi-domain network performance monitoring (NPM) federations, such as perfSONAR rely on collaborative measurement intelligence to identify network anomaly events and diagnose performance bottlenecks affecting data-intensive science applications. In this paper, we present a novel measurement recommendation scheme to assist network operators and application users by recommending pertinent samples from...
Recent years have seen a trend in network and service infrastructures adopting software networking paradigms. Traditional hardware, such as servers, network equipment and middleboxes, are evolving towards flexible equivalent software technologies: namely virtualized servers, routers and network functions, respectively. At this stage, such Software-Defined Infrastructures (SDI) are mixing traditional...
For multi-agent systems (MASs), event-triggered strategies typically require less control task execution and information transmission in achieving a collective behaviour compared to the time-triggered control schemes. This paper investigates exponential event-based consensus in directed topologies for MASs with general linear dynamic agents. The proposed control scheme involves a piecewise continuous...
One of the main issues in wireless sensor networks (WSNs) is energy conservation due to limited power of sensor node battery. To save energy, WSNs operate in duty-cycling work mode, when the sensor nodes alternate between active and dormant states. In this paper, we propose an active node set selection algorithm (ANSS), based on preference aggregation. The aim of the algorithm is to reduce the number...
Nowadays, the application of wireless sensor networks in monitoring of high-speed railways is rare or immature in China. In this paper, a deployment strategy of nodes along the railway is proposed for minimizing the total energy consumption. As high-speed trains have high requirements on the real-time and reliability of monitoring networks, the real-time, robustness and lifetime of networks are analyzed...
In this paper, we present a fast failover mechanism and a fast switchover mechanism to deal with link failure and congestion problems. In the fast failover mechanism, the controller pre-establishes multiple paths for each source-destination pair in the related OpenFlow-enabled (OF) switches. When a link becomes faulty, OF switches are able to failover the affected flows to another path. Based on the...
Wireless sensor networks have become an attractive choice for many monitoring applications in an unattended setups; some of these applications such as pipeline, railroad and highways monitoring require the sensors to be placed in a linear topology. These sensors need to be placed as far apart while still maintaining a minimum required coverage in order to minimize the required node count and reduce...
In many distributed sensing applications, continuous sensor monitoring requires processing with a significant energy footprint, which hinders autonomous operation and battery lifetime of sensor nodes. In our research we explore the power savings gained by splitting the hardware architecture for continuous monitoring into two stages: an always-on ultra-low-power mixed-signal wake-up circuit placed...
Software Fault Tolerance is an ability of computer software to continue its normal operation despite the presence of system or hardware faults. Most companies are moving towards a microservices-based architecture where complex applications are developed with a suite of small services, each of which communicates using some common protocols like Hypertext Transfer Protocol (HTTP). While this architecture...
The last decade can be considered an embryonic period for seafloor networks with the introduction of sizeable networks off the West Coast of Canada, off the West Coast of the United States and in the Mediterranean Sea, as well as smaller networks spread throughout the world's oceans. The amount of data currently available is expected to pale in comparison to future prospects as the infrastructure...
The specific capabilities of Wireless Sensor Networks (WSNs), such as fast deployment and flexibility, together with the low cost solutions that can be achieved, bring new opportunities for an all-new range of applications, far from the typical scenarios of low requirements and high redundancy. Some of these new scenarios involve the assurance of predefined performance goals. To guarantee that these...
Most devices deployed in the Internet of Things (IoT) are expected to suffer from resource constraints. Using specialized tools on such devices for monitoring IoT networks would take away precious resources that could otherwise be dedicated towards their primary task. In many IoT applications such as Advanced Metering Infrastructure (AMI) networks, higher order devices are expected to form the backbone...
Nowadays, monitoring per-flow metrics, such as throughput and delay, in OpenFlow networks represents an important input to implement traffic engineering approaches. Per-flow monitoring mechanisms require to uniquely identify the complete network path followed by all the packets of the corresponding flow. For example, in order to measure path delay, monitoring mechanisms regularly inject probe packets...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.