The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although power flow of current power utility network, smart grid system exchange digital information and power flow bidirectional interaction between provider and user. Thanks to communication networks, exchange of information between end user and power suppliers can estimate the power consumption more precisely and stable operation of power utility can be possible. To provide these advantages, importance...
We have started production of an information and control network TC-net 1G on a commercial basis. TC-net 1G connects control devices at high speed in supervision and control systems, such as general industry and infrastructure systems. TC-net 1G, developed based on technologies of TC-net, has accelerated transmission performance to 1Gbps, enhanced surveillance of RAS (Reliability Availability Serviceability)...
The positive effect of traffic localization in P2P systems is widely praised as it allows to decrease the amount of traffic crossing inter-ISP links. At the same time its negative effect is often overlooked. In this paper we concentrate on the biased choice of peers as a way to localize traffic in P2P BitTorrent-like file sharing systems. We demonstrate, evaluate and discuss the negative effect of...
The most important problem in multicast routing is Steiner tree problem, which has been proved to be NP-complete. This article proposed an algorithm based on Artificial Bee Colony Optimization (ABC). In this algorithm, we optimize the Steiner tree directly. It is not the same as traditional methods that find paths and integrate them to generate a Steiner tree. This algorithm use the characteristic...
In this paper, we consider topology identification of large-scale interconnected dynamical systems. The system topology under study has the structure of a directed graph. Each edge of the directed network graph represents a Finite Impulse Response (FIR) filter with a possible transport delay. Each node is a summer, whose inputs are the signals from the incoming edges, while the output of the summer...
A methodology for the stability analysis of linear consensus protocols for groups of agents driven by second order dynamics is presented in this paper. It is assumed that the communication topologies are undirected and that the time delays incur between the agents are constant and uniform for all the channels. The proposed technique takes advantage of the general structure of consensus protocols that...
With the emergence of bandwidth intensive applications new methodologies need to be developed for improvement of network blocking performance, without supplying extra resources in dynamic wavelength-division-multiplexing (WDM) networks. Rerouting is one among the viable and cost-effective solutions to reduce the blocking probability (BP) of optical WDM networks. Similarly, set-up delay tolerance,...
This paper considers the consensus problem of double integrator multi-agent systems where each agent is subject to input saturations, and the velocity (second state) of each agent is not available for feedback. We present a unified approach to the consensus algorithms design that extends most of the existent consensus algorithms developed for double integrator multi-agents in ideal situations to handel...
The NoC synthesis defined as the generation of a Network On Chip (NoC) architecture optimized for a specific application subject to various constraints, is a very important step in ASIC design methodologies. In this work we will present a new NoC synthesis method based on linear programming. We will apply our algorithm on multimedia coregraphs like 263 enc MP3 dec, MPEG4 and H.264. We reduce the complexity...
Given the growing need for interoperability among various communication services (IP, PSTN, PLMN), ENUM technology has become fundamental to the development of VoIP services. Through modeling and simulation, this paper presents a performance study of the ENUM protocol considering the response time for E.164 numbers resolution which is an important performance requirement that is directly linked to...
In this paper, the exponentially synchronization is investigated for stochastic complex networks with both switching topology and time-varying delays via pinning control. The model of complex network is quite general since many factors such as noise perturbations, switching topology and internal and outer time-varying delays are considered. By employing the Lyapunov-Krasovskii functional, the It¡§o...
Spanning tree protocol (STP) is a link layer protocol used for link management, prevention of loop formation etc. in the network. Although STP is widely used, it is still prone to many kinds of attacks that exploit the lack of security features both in basic working process and STP packet format. By exploiting STP control packet an attacker can pretend to be the new root in STP domain and perform...
In wireless sensor networks, saving energy is crucial in order to increase the network lifetime. Energy is often saved by synchronizing the nodes activity, and having long periods of inactivity, or by having nodes exchange a global activity schedule. The synchronization and the exchange of a global schedule are two examples where information is boadcast from a specific node to the whole network. In...
Network Virtualization (NV) is one of the most promising technique to enable innovation in today's network. A recent approach toward NV has been proposed through FlowVisor, whose aim is to leverage on the specific features of an OpenFlow-controlled network to share the same hardware forwarding plane among multiple logical networks. However, FlowVisor lacks some features to enable a full implementation...
In this paper we present and analyze a new interconnection network, Extended Folded Cube. We prove that this topology has better properties than other variations of the basic Hypercube: smaller diameter, lower cost factor and constant node degree. Furthermore, it maintains several attractive properties including symmetry, hierarchical, expansive, recursive, etc. For this new design, optimal routing...
An ad hoc wireless network has a dynamic nature that leads to constant changes in its network topology. As a consequence, the routing problem becomes more complex and challengeable, and it probably is the most addressed and studied problem in ad hoc networks. Based on the routing information update mechanism Ad hoc wireless networks routing protocols are classified into Proactive, Reactive and Hybrid...
Topology has significant effects on the most important parameters of a network such as latency and power consumption. The sphere based topology is a new structure for Network-on-Chips that forms in sphere shape. We have used a Zone-Order label based algorithm for the routing that is a general algorithm for routing requirements, and it is based on spanning tree. We have compared sphere based topology...
In this paper, we deal with the problem of distributed data fusion in unsafe large-scale sensor networks. Data fusion application is the phase of processing the collected data by sensor nodes before sending it the end user. During this phase, resource failures are more likely to occur and can have an adverse effect on the application. To achieve/ensure the convergence of node states to the average...
As the dominant Internet application, peer-to-peer (P2P) file sharing systems account for the major portion of Internet traffic, posing significant burden on ISPs. Many ISPs have attempted to discriminate against P2P traffic, making it important to alleviate such severe conflict. In this paper, we propose a novel architecture called iDTT that aims to use the underutilized off-peak time network capacity...
The usage of satellite communication (SATCOM) resources by the Department of Defense (DOD) to deliver global IP-based services has increased dramatically in the last decade. The rapid growth in demand for IP-based application services in the DOD and the flexibility of information services in commercial communication networks are influencing the designs of the future DOD communication satellite systems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.