The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ever increasing demand for more bandwidth over the Internet has lead to the development of many new technologies and architectures. Among these, Hybrid of Wireless and Optical networks have become increasingly important because of their “mobility” and “flexibility” in the wireless part and “robustness” and “high capacity”...
Border Gateway Protocol (BGP) is the de facto standard protocol for the inter-domain routing. Due to multi-homing and traffic engineering, the BGP routing table size of default free zone (DFZ) is growing rapidly. Inter-domain routing is facing the scaling challenge. Many solutions have been proposed. Among them, the core-edge separation scheme gets more attentions than others due to its practical...
Numerous studies based on complex measurement platforms have been carried out for over ten years now in order to discover the Internet topology on domain level. It turns out that this topology exhibits certain invariant properties such as a distribution of node degree. This distribution follows a power law. Moreover, the revealed topology is hierarchical. The hierarchy is caused by commercial contracts...
In the maintenance of communication networks, nodes often need to be rebooted or brought off line for software updates, configuration updates or hardware maintenance. ISPs often run the same protocols and use equipment from the same vendor network-wide, increasing the probability that a maintenance window will be network wide. Some of the updates can be critical where we have to update fast, for example,...
Path splicing is a proposed routing architecture for the Internet in which end-hosts (and intermediate routers) are empowered to change the paths their traffic uses by modifying a number of bits in the packet headers. These bits allow intermediate routers to choose alternate paths from the shortest one. To that end, this paper exposes SKWeak (Selective K Weakest links) attacks that exploit the adaptive...
Most of today's high capacity switches and Internet routers do not provide performance guarantees. This is attributed to their underlaying interconnection topology (i.e. the crossbar) and/or to their impractically complex scheduling algorithms. This paper derives a study for a Partially Buffered Crossbar (PBC) switch to practically provide throughput and fairness guarantees. We show how a PBC switch...
Hierarchical, topology-based addressing has long been considered crucial to routing and forwarding scalability. Recently, however, a number of research efforts are considering alternatives to this traditional approach. With the goal of informing such research, we investigated the efficiency of address assignment in the existing (IPv4) Internet-that is, the assignment of prefixes to ASes. In particular,...
Toward the P2P topology mismatch problem, we proposed a novel P2P service re-directing scheme and it is fully described in reference. Furthermore, we have successfully implemented this mechanism in EPON system. Experimental results show that our scheme can effectively reduce core network traffic, and evidently improve clients' downloading rate.
By using SNMP to collect network layer and data link layer information, network topologic can be discovered. This article presents how to get topologic from network step by step. An algorithm is also given for removing duplicate connections on map if VLAN exists.
Energy costs for data centers are a significant part of the overall expenses for their operation. With a reduction of these and associated costs, huge savings can be achieved. This paper describes a way to reduce the energy costs for data centers. The general idea behind our solution is very simple. Instead of routing the information required for any service interaction to and from the data center...
It is shown that the queuing delay involved in the congestion control algorithm is state-dependent and does not depend on the current time. Then, using an accurate formulation for buffers, networks with arbitrary topologies can be built. At equilibrium, our model reduces to the widely used setup by Paganini et al. Using this model, the delay-derivative is analyzed and it is proved that the delay time-derivative...
This paper addresses the issues of automatic address and prefix configuration of MANET routers. Specifically, the paper analyzes the differences between “classic IP networks” and MANETs, emphasizing the interface, link, topology, and addressing assumptions present in “classic IP networks”. The paper presents a model for how this can be matched to the specific...
Wireless networks, especially mobile ad hoc networks (MANET) and cognitive radio networks (CRN), are facing two new challenges beyond traditional random network model: opportunistic links with random nature due to fading and dynamic channel access, and dynamic network topology due to mobility and time varying. For a more general networking of Internet users as social complex networks, such challenges...
A frequent subject in forums, academia and industry is the evolution of the Internet in terms of routing. Basically, the scalability in the Default Free Zone related to (1) the growing rate of the routing tables and (2) the convergence of the routing system, are pointed by routing experts as the main concerns of the current mechanism. Several approaches have emerged, but they normally require a mapping...
Multi-owner structure shaping inter-domain operations is arguably the most important factor determining the end-to-end performance in the current Internet. Financial sustainability of Internet service provisioning has significantly changed the way Internet grows and all the other business sectors using the Internet as infrastructure. Further, scalability of BGP routing table sizes is becoming a stressing...
Spoofed IP traffic (traffic containing packets with incorrect source IP addresses) is often used by Internet-based attackers for anonymity. This method reduces the risk of trace-back and avoids attack detection by traffic-based sensors. An ISP's Security Operations Center (SOC) needs an efficient spoofed source detection mechanism to protect its customers from network based attacks. Typically an SOC...
The topologies of Internet and Internet-based information systems have complex network properties. Designing Internet-based virtual computing environment topology with appropriate properties is significant for both the resource sharing and system performance. We analyses the topology properties of the typical P2P systems, and proposes a new topology generating method, which includes three phases,...
The traditional client-server architecture widely adopted on the Internet is not adequate to meet the increasing user loads and bandwidth demands in live streaming systems especially for multimedia content delivery. Peer-to-peer P2P) overlay networks provide excellent system scalability and high resource utilization, which make it an attractive solution to this problem. This paper considers a hybrid...
We study traffic dynamics and propose a new routing strategy based on the local topological information in scale-free network. According to the new routing strategy with a single tunable parameter, a packet is delivered to next node with probabilities that depend not only on the degrees of the next node but also the estimated waiting time at the new node. The routing algorithm is implemented in BA...
Recently, the characteristics of traceroute probe have been widely studied in the field of Internet topology discovery, which helps researchers to understand the role of Traceroute tool better, such as sampling bias, marginal utility and so on. In this paper, we study three raw datasets of traceroute probe of different platforms and observe an interesting phenomenon: in the process of one probe, every...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.