The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A large number of intelligent components for managing the Future Internet have been proposed recently or are currently being investigated. However, before these network components can be deployed in real-life networks, they need to be thoroughly validated through realistic and large scale experiments. Testbed facilities provide a means to set up large scale network topologies but offer only a limited...
With the rapid development of Internet, it has become an essential infrastructure for communication today, while the IP layer has a poor ability in fast failure recovery, which impending the improving of the Internet performance. Concerned to the single link failure problems, this paper proposed a fast link failure recovery mechanism based on multi-topology. Firstly, by theoretical analysis, the number...
Overlay networks create a structured virtual topology above the basic transport protocol level. It allows implementing network services that are not totally tied to the underlying network infrastructure. Many overlay network protocols have been proposed to organize nodes into various topologies with emphasis on different networking properties. Presently there are a lot of services and applications...
Research in large-scale distributed systems, such as P2P systems, often relies critically on simulations to validate research results. Though systems such as PlanetLab can be used to test on real networks in some cases, there are still significant practical challenges to evaluating large-scale distributed systems on actual hardware. Actual measured datasets such as the ones measured with King's method...
To construct energy optimal Internet, a new traffic engineering concept aggregating traffic into specific links and dynamically powering off interfaces of routers/switches should be introduced. This paper proposes a network topology design algorithm and examines link power management.
The transmission bandwidth consumed by delivering rich content, such as movie files, is enormous, so it is urgent for ISPs to design an efficient delivery system minimizing the amount of network resources consumed. To serve users rich content economically and efficiently, an ISP itself should provide servers with huge storage capacities at a limited number of locations within its network. Therefore,...
The paper presents a proposal of a new multicast routing algorithm for finding a multicast tree in packet-switched networks. The objective of the MLRA (Multicast Routing Algorithm with Lagrange Relaxation) is to minimize the cost of paths between the source and each destination node using Lagrange relaxation, and eventually, minimize the total cost of multicast tree. A wide range of simulation experiments...
QoS in Convergent networks is widely discussed item in IP networks. But with the implementation of the Next Generation Networks by most operators around the world, QoS for different services and applications must fulfill. In order to deal with this problem, we simulate end to end QoS parameters, according to ITU Y.1540 and Y.1541 recommendations and different scheduling algorithms proposed by manufacturers...
Recently, scaling problems faced by today's Internet are attracting more and more attentions. It is commonly recognized that separating IP address into identifier and locator is an effective way to solve the problem. How to map identity onto locator is a critical challenge for the locator/ID separation network. We present a resolution of mapping service based on one-hop DHT to resolve a locator for...
Analyzed the features of router-level topology simulation, and proposed an algorithm HRSA facing router-level network topology simulation based on Dijkstra algorithm aiming at actual Internet stratified topology structure. By the way of adding the shortest routing table on the core router, the time of searching the shortest path in router-level topology simulation has been reduced effectively. The...
The control systems in current and future power systems need reliable real-time information transmission. Internet Protocol (IP) based communication systems for wide-area frequency stability predictive control systems are proposed in this paper. The key technologies, such as network topology, communication protocols, and communication modes are studied. The frequency stability predictive control algorithm...
Previously, we studied the performance of transport layer multihoming (e.g., STCP). Using the emulated application of the bulk data transfer, we investigate existing overlay multicast schemes and find that all of them have a inherit performance limitation caused by tansport layer singlehoming (e.g., TCP). Based on this, we design a new overlay multicast architucture named the Hierarchy Overlay Multicast...
In large Internet backbones, Service Providers typically have to explicitly manage the traffic flows in order to optimize the use of network resources. This process is often referred to as Traffic Engineering (TE). Common objectives of traffic engineering include balance traffic distribution across the network and avoiding congestion hot spots. Raj P H and SVK Raja designed the Bayesian network approach...
The access link quality experienced by the end users depends on the amount of traffic and on the presence of network anomalies. Different techniques exist to detect anomalies, but little attention has been devoted to quantify the access link quality and to which extent network anomalies affect the end user's access link experience. We refer to this aspect as the impact factor of the anomaly, that...
Several studies have found some properties of Internet such as Triangle Inequality Violations (TIVs). The studies have reported the existence of TIV in the Internet delay space. Triangle inequality violations that are important to peer-to-peer applications can be leveraged to build overlay routing to improve peer-to-peer performance. How to select relay nodes becomes a crucial factor to overlay routing...
The increasing growth of the global Internet making the shortcomings of its unstructured topology and distributed routing algorithm are exposed more rapidly. To design a controllable, scalable and manageable backbone network with a simple, efficient architecture is very imperative. Among many topologies, Tree topology which has a natural hierarchical structure and explicit end-to-end transmission...
Currently attackers are trying to paralyze servers and networks with various types of DDoS attacks. For example, on 7th July in 2009, a DDoS attack occurred against 48 web sites in South Korea and U.S.A. In this attack, the attack traffic pattern and the botnet construction methods are different from that of previous version. Due to the differences of the attack patterns, the 7.7 DDoS attack was not...
Wireless Mesh Network is a new broadband wireless network structure, That is, a high-capacity, high-speed distribution network, It is different from traditional wireless networks, can be seen as the integration of wireless LAN and mobile Ad hoc networks, and it played both advantages, is a wireless version of the Internet. Wireless Mesh networks are gradually expanding into the civilian commercial...
Understanding the relationship of the latency among network nodes is important to cope with the problems of network measurements. There are some researches touched on this point but seldom explicit studies. In this paper, we study the similarity of the network nodes based on RTT. And have some new conclusion mainly: Similarity between two nodes will change little when just make the short of the two...
Considerable effort has been spent on collecting all the information of routers by using traceroute-like probes in the router-level topology measurements. This method has been argued to introduce uncontrolled sampling biases on statistical properties of the sample graph and heavy load to the network being measured. In order to improve the quality of the maps induced by the method, researchers are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.