The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As an emerging technology, Mobile Edge Computing (MEC) is introduced to reduce network delay and provide context-aware services. MEC servers are located in close proximity to users, enabling users to seamlessly access services running on edge facilities. However, capacity and bandwidth constraints of MEC servers limit the number of services to be deployed. Therefore, an important problem is how to...
Causal consistency is an intermediate consistency model that can be achieved together with high availability and high-performance requirements even in presence of network partitions. In the context of partitioned data stores, it has been shown that implicit dependency tracking using clocks is more efficient than explicit dependency tracking by sending dependency check messages. Existing clock-based...
We analyze the MX/G/1 queue in the framework of Markov decision processes (MDPs). The service times become known upon arrival, and each job incurs a cost according to a given cost function. The value function is a central concept in MDP theory as it characterizes the value of the system's state with respect to future developments. We derive compact expressions for the generating functions for general...
Internet of vehicles (IoVs) emerges as a promising technology to facilitate vehicular wireless communication by approving vehicle-to-everything (V2X) services for intelligent transportation systems including vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) and vehicle-to-pedestrian (V2P) services. V2V networks have been rapidly developed to support short distance data transmission among vehicles...
Network performance anomalies can be defined as abnormal and significant variations in a network's traffic levels. Being able to detect anomalies is critical for both network operators and end users. However, the accurate detection without raising false alarms can become a challenging task when there is high variance in the traffic. To address this problem, we present in this paper a novel methodology...
Most load balancing techniques implemented in current data centers tend to rely on a mapping from packets to server IP addresses through a hash value calculated from the flow five-tuple. The hash calculation allows extremely fast packet forwarding and provides flow `stickiness', meaning that all packets belonging to the same flow get dispatched to the same server. Unfortunately, such static hashing...
The availability and reasonable cost of broadband Internet made it an attractive and favourable option to billions of users worldwide. Being a fast service also encourages its users to use real-time applications which is streaming and live data transfer includes VoIP and video streaming. The performance of such applications in Wireless Local Area Network (WLAN) may be highly affected by security protocols...
Behavior of stochastic Petri net can be approximated by difference equation resulting after fluidification. Vásquez et al. have introduced Gaussian noise to reduce approximation error. We suggest a method to reduce the number of additions of noise while keeping errors as small as Vasquez's method.
Qos of broadband network is important. ISPs have some methods for evaluate it. But they are not efficient enough. This paper present a new method in which delay and scale of windows of TCP messages are used for evaluating performance of broadband. Comparison between delay or scale of window s of samples is the core idea of the method. There are two kinds of comparison. One is absolute terms of above-mentioned...
We derive a simple, closed, equation for the delay caused by random outages or downtimes that affect a node in a communications network. The model is an M/G/1 queue with nonexhaustive interruptions, in which the server goes on and off successively, at random times, no matter whether the current job is finished or not. The arrival process is Poisson; while the distributions of service and on/off times...
This paper proposes a simultaneous transmission method of Multi-View Video and Audio (MVV-A) with MPEG-DASH. In the MPEG-DASH protocol, the server stores multi-bitrate encoded videos in advance and transmits an appropriate video depending on network condition. In the simultaneous transmission method, the minimum bitrate videos of unselected viewpoints are transmitted with the video of the selected...
Modern internet traffic is heavily composed of some form of video communication. In addition, video streaming is slowly replacing regular phone connections. Given that most video transport utilizes Video over Hypertext Transfer Protocol/Transmission Control Protocol (HTTP/TCP), it is important to understand TCP performance in transporting video streams. Recently, multipath transport protocols have...
A new time dissemination and synchronization service over public switched telephone network (PSTN) has been established at CSIR-NPL. The time synchronization accuracy achieved using is this service is ± 10 ms. The measurement of round trip delay and its cancellation in the final time code sent to the receiver has been implemented in this service. In this paper, the technical details of this service...
Low latency anonymity systems, like Tor and I2P, support private online communications, but offer limited protection against powerful adversaries with widespread eavesdropping capabilities. It is known that general-purpose communications, such as web and file transfer, are difficult to protect in that setting. However, online instant messaging only requires a low bandwidth and we show it to be amenable...
The use of Deep Packet Inspection (DPI) equipment in a network could simplify the conventional work load for system management and accelerate the control action. The authors proposed a congestion control method that uses a DPI device installed in a network to estimate overload conditions of servers or network links and, upon detecting an overload condition, resolves congestion by moving some virtual...
In current large-scale distributed key-value stores, a single end-user request may lead to key-value access across tens or hundreds of servers. The tail latency of these key-value accesses is crucial to the user experience and greatly impacts the revenue. To cut the tail latency, it is crucial for clients to choose the best replica server as much as possible for the service of each key-value access...
Ubiquitous in-network caching is one of the important aspects of the Information-Centric Networking (ICN), which has been a hot topic of ICN research. Many works have tried to propose better caching schemes to solve the drawbacks of the default en-route scheme, but most of them are insufficient to improve performance of entire network for just considering single layer optimization factor. Also considering...
Efficient content retrieval is crucial for Named Data Delay Tolerant Networking (NDDTN). Previous studies have shown that using social properties reasonably can improve availability of forwarding data packets, reduce overhead and delay. In this paper, a forwarding strategy, called RIF based on Region of Interest (ROI), is proposed and put forward for NDDTN. RIF computes cumulative visiting time and...
This paper proposes a novel signaling compression method to meet the requirement of the MCPTT call service under limited physical carrier capacity of carrier aggregated broadband system. In addition, we design an architecture that hosts compression proxies on both the user and network side without the modification of core network of LTE system. The signaling compression method has been implemented...
Due to the increasing dependency of critical infrastructure on synchronized clocks, network time synchronization protocols have become an attractive target for attackers. We identify data origin authentication as the key security objective and therefore conduct a comprehensive, theoretical evaluation of data origin authentication schemes from different application fields with regard to their applicability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.