The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 802.16e IEEE standard (WiMAX) enables efficient utilization of radio resources by leveraging the demand assigned multiple access (DAMA) technology. A number of uplink (UL) bandwidth request methods and traffic scheduling schemes are described in this standard; however, their particular implementation, including algorithms and methods of parallel execution are left for vendor's discretion. A subscriber...
We discuss a fundamentally new approach to digital packetized video bandwidth prediction (i.e., bandwidth forecasting). This fundamentally new approach provides an accurate bandwidth forecast at the expense of increased queueing delay. We outline this new forecasting method we call feedforward bandwidth indication (FFBI), compare it to existing forecasting methods, and analyze the tradeoffs associated...
This paper reports on the results of service performance in FON network - Wi-Fi network where each hotspot has its owner, Fonero, who has priority in service, and the right to grant access to the limited number of visitors of his hotspot. Simulation model developed assuming that users in FON behave similar to the users in Wi-Fi, and taking into account service priority of Fonero. Results of simulation...
In this work, we consider a multi-hop cognitive radio network with multiple flows. The challenges induced by the random behaviors of the primary users are investigated in a stochastic network utility maximization framework. To fully utilize the scarce network resource, we propose an optimal traffic splitting scheme for each source node to explore multiple paths effectively. In addition, the algorithm...
This paper presents an analysis of satellite communications (SATCOM) systems that use Internet protocol (IP) with quality of service (QoS) metrics, and addresses IP efficiency measures. Key contributing elements for the IP efficiency are network structure, provisional efficiency, and bandwidth-on-demand features. IP bandwidth gains will also depend on the network size, the level of hierarchy, and...
A network intrusion detection (ID) system detects malicious behavior by analyzing network traffic. Malicious behavior may target the disruption of communications, infrastructure services, and applications. A number of ID techniques proposed for dynamic wireless networks (e.g., sensor, ad-hoc and mobile ad-hoc networks) are based on the creation of an overlay hierarchy or other structure to organize...
The Tactical Ground Reporting (TIGR) system provides a unique multimedia patrol preparation and debriefing tool tailored to the needs of the patrol leader, and is used by all U.S. Army brigades in Iraq and Afghanistan. The distribution of data from geographically dispersed patrols requires network awareness and policy flexibility. The TIGR system utilizes an application overlay on to the tactical...
The increasing popularity of P2P and multimedia applications around the world has resulted in significant global increases in network traffic. This paper investigates the traffic changes in our enterprise network by analyzing the day-long traffic traces from 2007 to 2009. We observe that there has been a substantial increase in traffic in the past few years; however, no single application type is...
Optimizing the satisfaction of users of distributed applications is an important yet non-trivial task. Data corruption incurred during network transmission plays a significant role in this context since it is likely to result in user frustration. As a countermeasure, Forward Error Correction (FEC) schemes complement source data with redundant information to enable data recovery at destination-side...
Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex hardware to determine and configure new routing paths. We propose onchip bandwidth-adaptive networks to mitigate the performance problems of oblivious routing and the complexity issues...
Transport multiple protocol label switching (transport-MPLS, T-MPLS) is one of networking schemes for packet transport network (PTN). It specifies a connection-oriented, packet-switched architecture for carrier class Ethernet. In order to evaluate the performance of T-MPLS network, we have to apply this technology to the real network topology with Internet-bound traffic (e.g., VoIP, P2P, Http). In...
P2P software bring convenient and pleasure to P2P users, but become a problem of ISP, because they produce huge traffic on network, especially on cross-network links, which increases financial burden on ISP. The reason partially comes from the fact that when P2P software build their overlay network, they ignore the underlying network topology, and select neighbors randomly, so most of the traffic...
Full-scale IT introduction in the near future is expected to increase information flows vastly and this information explosion will also increase the number of IT devices in use, positioning the energy consumption of IT devices themselves as a key issue. Most of conventional measures to treat energy consumption handle servers and network devices separately. This paper first identifies that the network...
Multi-nexthop routing mechanisms is the key point in network congestion, and the essential question is how to forward packets among multi-nexthop to reach equiponderant forwarding. This paper proposes an equiponderant forwarding strategy in multi-nexthop routing, which forwards the packets according to the actual capability of each node, and resolves the equiponderant forwarding problem of multi-nexthop...
Informing users about new resource assignments has to be broadcast, thus generating a substantial amount of the mapping overhead that influences the system throughput. In particular, the performance of voice-over-Internet protocol (VoIP) services is seriously affected by the mapping overhead because the VoIP packet size is small. In order to reduce the mapping overhead, a semi-fixed mapping scheme...
The active queue management in Internet routers exploits the idea that an incoming packet can be dropped by the router even if there is some available buffering space in the router. Therefore, the router can send congestion signals to TCP before the actual congestion occurs, preventing queues and delays from growing too high. Many active queue management algorithms has been proposed till now. Unfortunately,...
This paper focuses on congestion control but while previous works considered scalar sensor nodes which only report events in the size of a few bytes, we are addressing congestion control for information-intensive flows such as video flows for surveillance applications in pervasive wireless multimedia sensor networks. The proposed framework that we describe in this paper tries to put several mechanisms...
A new end-to-end available bandwidth measurement method based on the parity-packet pair model is proposed on the basis of analyzing the relationship between the separation time and background traffic of the packet pair. This method breaks the constraint that the tense link and the bottleneck link must be the same link, and is able to measure the end-to-end available bandwidth, even in many complex...
The convergence of different types of networks into a common data center infrastructure poses a superset challenge on the part of the underlying component technology. IP networks are feature-rich, storage networks are lossless with controlled topologies, and transaction networks are low-latency with low jitter, parallel multicast. A successful converged enhanced Ethernet (CEE) switch should pass the...
In this paper, we propose an architecture for load balancing, which contains an adaptive packet scheduler with a bursty traffic splitting algorithm. The scheduler has one classifier which classifies the flows into aggressive and normal flow. Aggressive flows are treated as high priority flows. Based on the buffer occupancy threshold, a trigger handler checks for load un-balance of the network and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.