The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern engineering systems (such as the Internet) consist of multiple coupled subsystems. Such subsystems are designed with local (possibly conflicting) goals, with little or no knowledge of the implementation details of other subsystems. Despite the ubiquitous nature of such systems very little is formally known about their properties and global dynamics.
A Delay Tolerant Network (DTN) technique is used in this research for approaching the digital divide problem in Indonesia. In this research, a train system was chosen as infrastructures as DTN routers using Wi-Fi. Tens/hundreds/thousands of remote areas are passed through by a train, this makes Internet services proposed having low costs and appropriate for remote areas. The complete Internet services...
The IPv6 protocol is the next-generation IP protocol that addresses many of the shortcomings that exist in the IPv4 protocol. Some of the enhancements include increased address space, mandatory security and provisioning of stateless auto-configuration, a technique through which a new node forms its own address without the assistance of centralized host configuration servers operating in the network...
In this paper we discuss various approaches to simulating real-time Internet-based teleoperation systems. Focus is on simulation of the communication link, which is a critical component in teleoperation systems. Some of the objectives of simulations are to compare the performance of operators in fixed network conditions and to compare the performance of an operator over varying network conditions...
The ever growing number of Internet subscribers through mobile devices has led to the requirement of better mobility management protocols. Mobile IP version 6 (MIPv6) by IETF supports IPv6 mobility by providing mobile nodes with uninterrupted Internet connectivity and services. MIPv6 provides network layer mobility but handoff from one network to another network causes handoff latency. Due to this...
Network virtualization is a promising technique for building the Internet of the future since it enables the low cost introduction of new features into network elements. An open issue in virtualization is how to search for an efficient mapping of virtual network elements onto those of the existing physical network, also called the substrate network. Mapping is an NP-hard problem and existing solutions...
This paper is concerned with the design of the dynamic neural network based networked predictive controller for Networked control systems with random network delay in both forward and feedback channel. The proposed controller mainly consists of the control prediction generator and network delay compensator. The control prediction generator is used to generate a set of future control predictions using...
One-way audiovisual quality and mouth-to-ear delay (MED) are two important quality metrics in the design of real-time video-conferencing systems, and their trade-offs have significant impact on the user-perceived quality. In this paper, we address one aspect of this larger problem by developing efficient loss-concealment schemes that optimize the one-way quality under given MED and network conditions...
As the dominant Internet application, peer-to-peer (P2P) file sharing systems account for the major portion of Internet traffic, posing significant burden on ISPs. Many ISPs have attempted to discriminate against P2P traffic, making it important to alleviate such severe conflict. In this paper, we propose a novel architecture called iDTT that aims to use the underutilized off-peak time network capacity...
We consider joint congestion control and wireless link-scheduling design for mobile TCP applications. Adopting queueing delay as the congestion measure, we show that the optimal TCP congestion control and link scheduling scheme amounts to window-control oriented implicit primal-dual solvers for underlying network utility maximization. Based on this idea, we develop readily deployable, scalable yet...
This paper introduces a way for approaching electronic contracts management involving two parties. Contract monitoring automation is achieved by giving legal clauses a formal representation. Inspired from the file system properties, a mechanism for dynamic reorganization of contracts on Google Docs is proposed.
The paper analyzed the current congestion control problems, proposed a new method about estimating the maximum drop probability of Random Early Detection (RED). The paper also gives the application method of the improved RED algorithm. Finally, the paper verified the correctness and validity of the method.
High reliability and performance are needed as the Internet becomes an important social infrastructure. Network delay is one of measures of performance of network. As delay between two nodes correlates roughly with the distance between them, the diameter of the network which is the maximum distance of all two nodes must be small. In addition, it is necessary to keep small network delay against network...
Traffic Engineering (TE) is required for reducing highly-loaded links / nodes in parts of a network, thereby distributing the traffic load in the network. For efficient use of network resources, it is important to efficiently map traffic demands to network resources. Therefore, we should consider an appropriate definition of ``distance'' in networks with the topological features of the network instead...
In order to fulfill the users' insatiable interests in accessing the Internet services and information wirelessly, one of key optimization techniques is caching frequently accessed the data items in a local cache. However, a strong consistency is implicitly assumed in most caching schemes but it may frequently occur a long query delay. In this paper, we propose a consistency-sensitive data access...
In the past decade, we have witnessed accelerated and multi-faceted developments in hyper-connected world, providing wired/wireless licensed or unlicensed-based access networks such as DSL, cable, or WiFi™, cellular and WiMAX networks. Today, since we have virtually unlimited digital data in the network accessible from everywhere, a divers set of contents and aggressive traffic have accentuated the...
IPTV will be one of the main drivers of network innovation in the near future. Its bandwidth demands, especially if combined with HDTV, require smart algorithms for content distribution. One approach that is currently discussed intensively is Application Layer Multicast (ALM), which allows to scale to large node numbers by incorporating the resources of participating peers. In addition, locality-aware...
A key element to realizing the smart energy grid of the future is the deployment of an efficient and reliable information network. An intelligent combination of wired networks (the Internet), wireless networks and power line communication networks can be used to deliver control and application messages generated by the smart grid. Integration of these three network types is non-trivial due to the...
Mobile Ad-hoc Networks (MANETs) exhibit unpredictable topology with heterogeneous node contact rates, high mobility and limited information. When dealing with such challenging environments, the mobility model has a key role in testing the performance and proving the expected behavior of routing algorithms. While synthetic mobility models have been largely used to measure quantitative aspects of routing...
We propose a modified Transmission Control Protocol (TCP) flow classification method and Round Trip Time (RTT) computation method which is more precise and more dynamic than the traditional fixed timeout method, especially for long, sparse TCP flows and long RTTs. Then we present passive measurement results for TCP RTT and RTT variation in network traffic traces. Analysis shows several interesting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.