The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The topology of interconnection networks is the cardinal factor influencing the performance of computer architecture. The most popularly used network topologies are Mesh and its modified versions. Various performance parameters used to measure the network efficiency are latency, throughput, and cost. In this paper, the main objective is to modify C2Mesh in order to enhance performance throughput and...
In this paper, a Three-Dimensional (3D) flexible routing algorithm is proposed for generic 3D Network-on-Chip (NoC). The proposed approach, Direct-Elevator, is based on the Elevator-First Algorithm which is independent of the network topology, number of interconnects and placement of interconnects. Direct-Elevator is tailored for 3D-NoC structures, offering a lower communication latency than its predecessor...
By measuring throughput, delay, loss-rate and jitter, we present how SDN framework yields a 45% performance increase in highly interconnected topologies like torus and hypercube compared to current Layer2 switching technologies, applied to data center architectures.
the network topology of interconnection networks plays a fundamental role in the performance of computer architecture. The most commonly used network topologies are Mesh, Torus and their extended versions. Various performance parameters such as latency, throughput, and cost can be used to measure the efficiency of a network. In this paper, the aim is to compare four topologies on basis of average...
Distributed desynchronization approaches lead to time-division multiple access (TDMA) of the shared medium without requiring a central coordinator. All such methods are based on the principle of reactive listening of periodic fire messages. The advantage of distributed desynchronization (DESYNC-TDMA) is the fact that it comprises a decentralized approach of very low complexity. It is therefore of...
In this demo, we provide a Mininet-based Software-Defined Network (SDN) simulation environment that improves the total flow throughput and scalability of the overall network. Mininet is a suitable and manageable tool to implement the proposed SDN based flow admission control module in order to configure the entire topology since it has already built in Open-Flow switches and virtual controllers. This...
Mobile ad hoc networks or MANETs are infrastructureless wireless networks where each node can freely move and directly connect to the other nodes located within its transmission range to form the topology in any arbitrary pattern. Hence, to ensure network connectivity, each node tends to use the maximum transmission power to extend its transmission range. However, this maximized transmission range...
With a current utilization of around 25% of its total weight, optimization of cabling and harness plays an important role in the design of an aircraft. This is a multi-objective optimization problem as the physical properties of the harness (e.g., length and weight) as well as the logical properties of the underlying network (survivability and performance) have to be taken into account. We propose...
MAC interference in IEEE 802.11 network is caused by overlapped signal ranges and complex carrier sensing topology. Data throughput and wireless coverage increases by sender's transmission power in free space and this property identified the transmission power as a standard indication for wireless efficiency; however, increased transmission power also implies longer reachable signal range and higher...
The infrastructure of the Smart Grid communication will require the use of security protocols based on standards of the state-of-the-art. This work proposes a method of parameterization of the IPsec protocol framework, aimed at security of data interoperability in Smart Grid, according to the requirement levels for the security services: Integrity, Confidentiality and Availability, recommended by...
How to effectively distribute and share increasingly large volumes of data in large-scale network applications is a key challenge for Internet infrastructure. Although NDN, a promising new future internet architecture which takes data oriented transfer approaches, aims to better solve such needs than IP, it still faces problems like data redundancy transmission and inefficient in-network cache utilization...
Based on the OpenScale architecture, we proposed an SDN-assisted traffic adaptive topology reconstruction scheme by rearranging long-reach lightpaths on top of the sub-wavelength switching regular lattice network. Simulation results verified the good performance of the proposed scheme.
With the integration of cores increasing, the on-chip-network (NoC) latency and the throughput are getting worse in traditional structures. This paper proposed a novel parameter-based on the hierarchical mesh interconnected NoC (PHMNoC) to improve the integration and performance. We use structural parameters and cross-layer threshold parameter to achieve scalability for different system size and balance...
With the development of Medium Access Control (MAC) technologies, various Slot Assignment (SA) schemes have been proposed to enhance the overall performance of Time Division Multiple Address (TDMA) techniques, especially to achieve better slot utilization, higher system throughput, collision-free transmission and Quality of Service (QoS) provision in mobile, multi-hop wireless networks. Different...
Many data center applications have deadline requirements, which pose a requirement of deadline-awareness in network transport. Completing within deadlines is a necessary requirement for flows to be completed. Transport protocols in current data centers try to share the network resources fairly and are deadline-agnostic. Recently several works try to address the problem by making as many flows meet...
It has been shown that the highest throughput for broadcasting messages in a point-to-point network is achieved with a ring topology. Although several ring-based group communication protocols have benefited from this observation, broadcasting messages along a ring overlay may lead to high latencies: In a system with n processes, at least n-1 communication steps are necessary for all processes to deliver...
Wireless Sensor Network (WSN) is a promising technology for many applications, such as industrial, environment, and health-care application. The first requirement of WSN is energy efficiency in order to increase the network node lifetime. The second is reliability because packet drop cannot be tolerated in critical time applications. In this paper, we use NS2 simulation to evaluate and analyze the...
Underwater sensor networks are gaining prominence in various applications of underwater monitoring and resource explorations. The minimum energy routing algorithms [2] are implemented in underwater oil resource explorations. The topologies already in use are wired where all sensor nodes behave as coordinator, except the PAN coordinator. This may increase the depletion of battery energy, and cost of...
As an essential part of next generation Internet, Wireless Mesh Networks (WMNs) have attracted much research attention due to its potential advantages including low up-front cost, ease of deployment, enhanced capacity and service coverage. However, the inherit features of wireless multi-hop networks have put forward a severe challenge for traffic engineering problem. Conventional traffic engineering...
This paper proposes the analytical expressions for the IEEE 802.11 string-topology multi-hop networks using Markov-chain model. For achieving that, the proposed analysis procedure includes two proposals, which are: (i) Bianchi's Markov-chain model is modified for considering a relationship between the backoff timer and frame length, and (ii) the interferences, such as hidden node collision and carrier...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.