The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The selection of a path in a network from one node to another is performed by a routing protocol, often using the shortest path approach. However, it has been shown that in wireless networks, the shortest path approach tends to select paths with wireless links that are only intermittently available and often unstable, resulting in extensive loss of packets in the data delivery process. Instead of...
In this paper, we consider topology identification of large-scale interconnected dynamical systems. The system topology under study has the structure of a directed graph. Each edge of the directed network graph represents a Finite Impulse Response (FIR) filter with a possible transport delay. Each node is a summer, whose inputs are the signals from the incoming edges, while the output of the summer...
With the emergence of bandwidth intensive applications new methodologies need to be developed for improvement of network blocking performance, without supplying extra resources in dynamic wavelength-division-multiplexing (WDM) networks. Rerouting is one among the viable and cost-effective solutions to reduce the blocking probability (BP) of optical WDM networks. Similarly, set-up delay tolerance,...
It is known fact that modern IP networks are adopting eXplicit Control Protocol (XCP) as the de-facto standard. In the implementation of XCP, the XCP sender outputs packets in bursts such that all the packets inside the congestion window are outputted without any interval between them. The burst not only increases the queuing delay, but also makes XCP with heterogeneous delays to be unstable. In the...
While various time synchronization protocols for clocks in wired and/or wireless networks are under development, recently it has been shown by Freris, Graham and Kumar that clocks in distributed networks cannot be synchronized precisely even in idealized situations. In this paper by determining the clock synchronization errors in the similar settings of the impossibility result just mentioned, we...
Spanning tree protocol (STP) is a link layer protocol used for link management, prevention of loop formation etc. in the network. Although STP is widely used, it is still prone to many kinds of attacks that exploit the lack of security features both in basic working process and STP packet format. By exploiting STP control packet an attacker can pretend to be the new root in STP domain and perform...
With the proliferation of wireless networks for prac- tical deployments in recent years, secure fast handoff has become significantly important to provide secured access while reduce the latency caused by handoff procedure. Channel probing/scanning delay has been a major contribution to the overall latency of handoff in IEEE 802.11 based wireless networks. In this paper, we present a novel secure...
In wireless sensor networks, saving energy is crucial in order to increase the network lifetime. Energy is often saved by synchronizing the nodes activity, and having long periods of inactivity, or by having nodes exchange a global activity schedule. The synchronization and the exchange of a global schedule are two examples where information is boadcast from a specific node to the whole network. In...
Network Virtualization (NV) is one of the most promising technique to enable innovation in today's network. A recent approach toward NV has been proposed through FlowVisor, whose aim is to leverage on the specific features of an OpenFlow-controlled network to share the same hardware forwarding plane among multiple logical networks. However, FlowVisor lacks some features to enable a full implementation...
When designing routing protocols for space-based networks, we must take into consideration the unique characteristics of such networks. Since space-based networks are inherently sparse with constrained resources, one needs to design smart routing algorithms that use the resources efficiently to maximize network performance. In Space Exploration Missions, the trajectories and orbits of spacecraft are...
An ad hoc wireless network has a dynamic nature that leads to constant changes in its network topology. As a consequence, the routing problem becomes more complex and challengeable, and it probably is the most addressed and studied problem in ad hoc networks. Based on the routing information update mechanism Ad hoc wireless networks routing protocols are classified into Proactive, Reactive and Hybrid...
Topology has significant effects on the most important parameters of a network such as latency and power consumption. The sphere based topology is a new structure for Network-on-Chips that forms in sphere shape. We have used a Zone-Order label based algorithm for the routing that is a general algorithm for routing requirements, and it is based on spanning tree. We have compared sphere based topology...
In the past decade, significant research has been carried out for realizing intelligent network routing using advertisement, position and near-optimum node selection schemes. In this paper, a grade-based two-level node selection method along with genetic algorithm (GA) is proposed for realizing an efficient routing scheme. This method assumes that the nodes are intelligent and that there exists a...
As the dominant Internet application, peer-to-peer (P2P) file sharing systems account for the major portion of Internet traffic, posing significant burden on ISPs. Many ISPs have attempted to discriminate against P2P traffic, making it important to alleviate such severe conflict. In this paper, we propose a novel architecture called iDTT that aims to use the underutilized off-peak time network capacity...
Traffic Engineering (TE) is required for reducing highly-loaded links / nodes in parts of a network, thereby distributing the traffic load in the network. For efficient use of network resources, it is important to efficiently map traffic demands to network resources. Therefore, we should consider an appropriate definition of ``distance'' in networks with the topological features of the network instead...
The usage of satellite communication (SATCOM) resources by the Department of Defense (DOD) to deliver global IP-based services has increased dramatically in the last decade. The rapid growth in demand for IP-based application services in the DOD and the flexibility of information services in commercial communication networks are influencing the designs of the future DOD communication satellite systems...
This paper identifies regimes of high connectivity and the associated throughput, delay, and energy per bit scaling performance of a power-limited infrastructureless wireless network. Infrastructureless wireless networks are a key strategic technology for future military communications. In their current state, their utility for mission critical applications is limited by their susceptibility to disconnection...
Mobile WiMAX is a broadband technology that is capable of delivering triple play services (voice, data, and video). However, mobility in WiMAX system is still an issue when the mobile station (MS) moves and be handovered between base stations (BSs). This issue can cause unnecessary neighboring BS scanning and association, handover delay, and MAC overhead which may affect real-time applications. In...
Major challenge for TCP is to keep up the new and modern generation in communications networks such as networks with large bandwidth and long delay because when TCP applies on next generation networks will suffer from degradation in performance. The reason behind this shortcoming in performance is due to the congestion control mechanisms supported by TCP variants where these mechanisms depending on...
Wireless mesh networks (WMN) are efficient and low cost solutions for the deployment of broadband access in various environments. To support real-time applications such as multimedia and emergency services, WMNs must provide quality of service (QoS) guarantees and QoS continuity protection. While the capacity of single radio WMNs may severely limit the QoS for such traffic, multiradio WMNs can overcome...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.