The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents design and evaluation of software defined data center network architecture with hybrid optical wavelength routing and electrical packet switching (HWRE), which largely improves network performance such as packet delay and network throughput.
The SmartNIC is a User-Programmable 10GE NIC designed around industry standards to meet the demands of high performance networking in HPC and datacenter communities. The SmartNIC enables application-specific offload engines to be developed. Application developers can implementation application-aware offload engines, network developers can test and develop network protocol offload engines, and researchers...
In this paper we present a fault tolerant Mesh based Network-on-Chip design that helps to tolerate router faults along with core recovery mechanism. Spare links are used to provide a connection to horizontal and vertical routers pivoting the failed one. To compliment the modified topology a routing algorithm has been developed that uses minimal and non minimal paths to communicate between source and...
In this paper, we consider an application provider that executes simultaneously periodic long running jobs and needs to ensure a minimum throughput to guarantee QoS to its users; the application provider uses virtual machine (VM) resources offered by an IaaS provider. Aim of the periodic jobs is to compute measures on data collected over a specific time frame. We assume that the IaaS provider offers...
A high-speed non-binary LDPC decoder based on Trellis Min-Max algorithm with layered schedule is presented. The proposed approach compresses the check-node output messages into a reduced set, decreasing the number of messages sent to the variable node. Additionally, the memory resources from the layered architecture are reduced. The proposed decoder was implemented for the (2304,2048) NB-LDPC code...
This paper describes a new reliable transport protocol designed to run on top of a multicast network service for delivery of continuously generated files. The motivation for this work is to support scientific computing Grid applications that require file transfers between geographically distributed data enters. For example, atmospheric research scientists at various universities subscribe to real-time...
The device people use to capture multimedia has changed over the years with the rise of smart phones. Smart phones are readily available, easy to use, and capture multimedia with high quality. While consumers capture all of this media, the storage requirements are not changing significantly. Therefore, people look towards cloud storage solutions. The typical consumer stores files within a single provider...
Exploiting multi-user diversity (MUD) for multicast consists in choosing the data rate(s) utilized to serve a number of users who have different channel qualities. Some of the proposed multicast schemes aim to maximize the throughput (e.g. EMTH), while others seek to reduce the transmission time (e.g. EMTT). Actually, it is well known that the process of computing the accurate MUD multicast throughput...
Hybrid automatic repeat request (HARQ) can make efficient and reliable transmission possible for radio communications. However, in the HARQ scheme, packet control information (PCI), such as HARQ block identifiers (HARQ block ids) in selective repeat ARQ (SR-ARQ), are required and the reduction of PCI overhead is an issue. In particular, type-II HARQ handles a large amount of PCI because it includes...
Nowadays, marine scientists have a growing interest to know what happens in the ocean water column. One potential technology is to use underwater acoustic sensor networks that providing continuous sea environmental data. Although a number of MAC techniques can be used in these networks, Spatial-TDMA is one of the most efficient in terms of energy, which is a critical parameter in underwater networks...
Network Function Virtualization (NFV) is an emerging solution that aims at improving the flexibility, the efficiency and the manageability of networks, by leveraging virtualization and cloud computing technologies to run network appliances in software. However, the “softwarization” of network functions raises reliability concerns, as they will be exposed to faults in commodity hardware and software...
Since IEEE 802.11ad doesn't have any recovery mechanism for multicast technology at Media Access Control (MAC) layer, the lost packets can't be detected and retransmitted under the influence of interference, conflictions or other issues. Given this, a Multi-Leader Based Protocol (MLBP) is proposed to reduce the control overhead under the premise of improving the reliability of Millimetre Wave WPANs...
During the normal operational use, integrated circuits go through what is popularly known as wearout or aging. At system level, aging causes gradual speed degradation of the design over their service life. In a many-core homogeneous design and over a period of activity, this can lead to variation in speed depending on the workload distribution on cores. In the same design context, Voltage Scaling...
Underwater environment suffers from a number of impairments which effect reliability and integrity of data being transmitted. Cooperative transmission is well known for reliable data transfer. Hence, cooperative routing can be implemented in Underwater Wireless Sensor Networks (UWSNs) in order to reduce the impact of existing link impairments on transmitted data. Cooperative routing involves data...
The paper proposes a method for providing reliable Interest packet delivery in CCN. In window-based flow control mechanism for CCN, Interest packet is very informative. Loss of Interest packets due to congestion in the network pays a heavy price. We propose an ACK-based mechanism to recover the lost Interest packets as quickly as possible. Using actual implementation, we have been able to show how...
We investigate a cross-layer relay selection scheme based on Q-learning algorithm. For the study, we consider multi-relay adaptive decode and forward (DF) cooperative-diversity networks over multipath time-varying Rayleigh fading channels. The proposed scheme selects relay subsets that maximizes the link layer transmission efficiency without having knowledge of channel state information (CSI). Results...
Ensuring QoS guarantees for real-time multimedia traffic in WLANs has recently attracted a lot of attention from standardization bodies and researchers. In order to increase the granularity of traffic prioritization and QoS support provided by EDCA, the intra-access category prioritization mechanism has been proposed in the recent IEEE 802.11aa amendment. In order to improve real time transmission...
Reliable Node based routing (RNBR) is a trust based routing protocol for mobile adhoc network which presents reliable nodes for efficient routing to achieve high throughput. It is always a challenge to secure a node from internal and external adversaries' attack, which impact the reliability of the node. This paper presents a light weight node securing mechanism to prevent node from various attacks...
This paper proposes a redefined multiple access control (MAC) protocol of IEEE 802.15.4 standard, incorporating an adaptive synchronization algorithm with optimal sleep period. The modified standard, namely AS 802.15.4 provides better power consumption, reliability and synchronization among the sensors than the existing protocol. AS 802.15.4 MAC protocol is modelled using a four dimensional Markov...
Legacy 802.11b/g protocols have been successfully applied in wireless long-distance (WiLD) networks to provide low-cost network connectivity for rural areas and developing countries, by designing TDMA MAC protocols. In contrast, we investigate the performance, and enhancement of using 802.11n for WiLD networks still using CSMA/CA. Our extensive experiments from our testbed show that, although 802...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.