The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A lot of research has been proposed to improve network performance in the data center. However, with the development of distributed applications, these applications face a new performance bottleneck since existing solutions almost ignore the application level optimization. The concept of coflow has been proposed which provides a chance for us to optimize network in application level rather than individual...
This paper investigates the network function virtualization (NFV)-enabled multicast problem, and proposes a steiner tree-based algorithm to reduce the cost of virtual network function (VNF) deployment and routing. In the algorithm, to minimize the bandwidth consumption, the Steiner tree is constructed by taking all the destination nodes as the terminals. Then a interconnection node of the tree is...
The recent spread of mobile networks has paved the way for building a pervasive social networking (PSN) environment, which enables people to access social networking services (SNS) anytime and from anywhere. There have been extensive studies on MANETs (Mobile Ad-hoc NETworks), which use mobile terminals for relaying information. While the feasibility of using them as emergency networks in the aftermath...
An online learning problem with side information is considered. The problem is formulated as a graph structured stochastic Multi-Armed Bandit (MAB). Each node in the graph represents an arm in the bandit problem and an edge between two arms indicates closeness in their mean rewards. It is shown that such side information induces a Unit Interval Graph and several graph properties can be leveraged to...
The concept of mesh networks brings many challenges to the research community when designing such system. In this paper, we propose a new routing model to account for the link utilization between nodes, as well as the remaining energy left in each node. The framework, called Distributed Split-path, is implemented on top of the Optimized Link-State Routing (OLSR) protocol. We demonstrate the improvement...
This work studies centrality metrics as forwarding load predictors, for both unicast and multicast traffic, within dynamic ad hoc network topologies. We present results from a series of emulation experiments based around an emergency response mobile network scenario. From collected temporal topological and traffic data, we calculate a rank correlation measure between predictive centrality metrics...
Mobile tactical networks (MTNs) in military communications extend the capabilities of mobile ad-hoc networks (MANETs). The MTNs are dynamic, infrastructureless, self-forming and self-healing systems designed for non-line-of-sight (NLOS) operations using multi-hop relaying. Unlike their commercial counterparts, MTNs have to offer much higher levels of security, jamming resistance, and service robustness...
Collecting data in time is crucial for the wireless sensor network (WSN), especially for some WSNs who suffer from inconstant link connections. Our observations in the intertidal wireless sensor network (IT-WSN) reveal that end-to-end delay is severe and a big challenge to be solved. Existing routing protocols perform well in WSNs with good link quality but show deficiency when node states change...
There has been a significant increase in the number of sensors deployed to accomplish military missions. These sensors might be on manned or unmanned resources, and might collect quantitative and/or qualitative information important for mission success. Of critical importance for mission success is ensuring that the collected information is routed to the people/systems that need the information for...
Development of semiconductor process makes devices have smaller area, lower power, and reduced wire connections. To achieve this purpose, macro placement plays an important role in the design flow. In this paper, we present a routability-driven macro placement algorithm considering pins location to optimized scaled routing congestion and macro placement area. By considering pins location, reclassify...
Wireless Sensor Network (WSN) is widely used in IOT, military and environmental application. However, WSN is energy-constrained and the network nodes placed in hostile environment are hard to replace. Therefore, designing an energy-efficient routing algorithm is significant. Many solutions have been proposed to optimize energy consumption in conventional wireless sensor network, but they don't work...
Aimed at the inapplicability of LEACH protocol for large-scale sensor network and uneven energy consumption, a Distributed Self-organizing Clustering Routing protocol (DSCR) for large-scale sensor network is proposed. Based on clustering, the network routing is divided into two levels: parent cluster and cluster. The cluster structure is formed by the back-off mechanism related to the residual energy...
Ancient Bagan is one of the culture heritage region of Myanmar and most tourist attraction areas. The trip planning mobile application of Ancient Bagan region is developed for providing efficient access to location-based information requires on the trip anywhere and anytime. The spatial index structure is an important role for retrieving the two dimensional geographical location effectively and efficiently...
Software Defined Networking (SDN) is a developing networking paradigm that advocates a complete overhaul of the conventional networking. SDN decouples the control logic from the data forwarding functionality; which traditionally are coupled on the network device. The coupling stifles innovation and evolution because the network often becomes rigid. Software Defined Wireless Sensor Networks (SDWSN)...
This paper deals with ship scheduling and inventory management by considering both shipping costs and demurrage costs with hourly precision. First, the formulation of an optimization model of the problem is described. Then, a hierarchical scheduling approach is newly introduced, which enables us to get a schedule close to the optimal within reasonable computational time. Moreover, through some computational...
The combination of Device-to-Device (D2D) Communication in 5G Cellular Networks and vehicular networks will not only increase the performance of vehicular networks, but also increase the revenues for network operators and services providers. This paper proposes a 5G D2D routing method oriented to vehicular networks, which can increase the connectivity and scalability of vehicular networks while alleviating...
Border Gateway Protocol (BGP) has been the de facto inter-domain routing protocol since it was introduced. Its destination-based routing nature, which is not able to choose a specific end-to-end AS-level route, might overload some popular peering (or inter-AS) links, while making some others underused. This could result in congestion and cause service disruption. To cope with the issue of destination-based...
With the fast development of cloud computing and online business of Internet, the importance of data center is gradually increasing. Conventional Ethernet protocols can hardly meet the scalability and performance requirements of data centers (DCs). The traditional method solves the congestion problem by reducing the network throughput. In this paper, based on software-defined networks (SDNs) technology,...
Vehicular Ad-hoc Networks (VANETs) experience diverse network environments ranging from infrastructure based with dense connected vehicle communication in urban highways to infrastructurless with sparse connected vehicle communication in rural highways. Routing protocols in such challenging environments should be adaptive to work with or without a fixed infrastructure under a quickly varying connected...
Industrial IoT networks are typically used for monitoring systems and supporting control loops, as well as for movement detection systems, process control and factory automation. To this end, data generated by monitoring IoT devices are collected, elaborated and sent to controllers and actuators. The routing of data from IoT sensors to actuators is an integral part of any large-scale industrial network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.