The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Graph algorithms are increasingly used in applications that exploit large databases. However, conventional processor architectures are inadequate for handling the throughput and memory requirements of graph computation. Lincoln Laboratory's graph-processor architecture represents a rethinking of parallel architectures for graph problems. Our processor utilizes innovations that include a sparse matrix-based...
The Generalized Nets apparatus is applied here to describe the MiMa-algorithm for computing a conflict-free schedule for packet switch. In the paper we propose a family of patterns for nonuniform traffic simulation. The results for throughput on a switch node with MiMa-algorithm by computer simulations with these patterns are presented. The necessary computations have been executed on BG01-IPP grid-cluster...
Today's Internet suffers from a very complex problem-congestion. It is one of the top-ten listed fundamentally important problems in networking. It causes many important data to be lost. Wastage of network resources results from this. It makes the network easily become gridlocked, with little or no data being transported end-to-end. To protect data transfer from this problem various models of TCP...
Decentralized cognitive radio networks (CRN) require efficient channel access protocols to enable cognitive secondary users (SUs) to access the primary channels in an opportunistic way Without any coordination. In this paper, we develop a distributed spectrum access protocol for the case where the SUs aim to maximize the total system throughput while competing for spectrum resources. To model the...
Traffic management, road sensing and multimedia delivery in vehicular ad-hoc network (VANET) are application domains whose performance depend on network throughput. Rate adaptation is the key method to maximize the throughput by estimating the current channel qualities and deciding the best bitrate for the next frames. In VANET, rate adaptation is more challenging due to the rapid variation of channel...
In this paper, we present a big-data self organizing network (Bi-SON) framework aiming to optimize energy efficiency of ultra-dense small cells. Although small cell can enhance the capacity of cellular mobile networks, ultra-dense small cells suffer from severe interference and poor energy efficiency. The self organizing network (SON) can automatically manage and optimize the system performance. However,...
Passive optical network (PON) has become the vital technology for the next generation access networks. The advancement of optical technology extends the span of the PON from 20 to 100 km. Such an extended PON is known as Long-Reach PON (LR-PON). But the data transmission in the existing LR-PONs suffer from longer propagation delays between the optical line terminal (OLT) and optical network units...
Throughput, area and power optimized designs for the advanced encryption standard algorithm are proposed in this paper. The presented designs are suitable for the encrypt-only AES-128 algorithm. Both designs integrate pipelining and iterative architectures in one design. This is achieved through applying the concept of partial loop unrolling where iterations and multistage pipelining are used to optimize...
Cognitive radio sensor network (CRSN) is a novel wireless sensor network, which can effectively alleviate the scarcity of spectrum resource by equipping the cognitive technology. Usually, CRSN deploys numerous sensor nodes around the monitoring area. But the energy and storage of those nodes are both limited. Compared with the centralized CRSN, we focus more on a decentralized situation without the...
The interactions between Active Queue Management (AQM) algorithms and TCP have been extensively investigated in the last few years. However, majority of the studies are conducted without considering the consequences of different attacks on TCP flows. This research work aims to investigate the performance of TCP flows under Low-Rate Denial-of-Service (LDoS) attacks. In particular, we have performed...
The data scale in many data centers is growing explosively with emerging applications and usages of big data technologies. Data distribution is a key issue in large-scale distributed storage systems to place petabytes of data or even beyond, among tens or hundreds of thousands of storage devices. In the meantime, heterogeneous storage systems, such as those having devices with hard disk drives (HDDs)...
In this project, a hardware implementation of the AES-256 encryption and decryption algorithm is proposed. The AES cryptography algorithm can be used to encryption and decryption blocks of 128 bits and is capable of using cipher keys of 256 bits. Feature of the proposed pipeline design is depending on the round keys, which are consumed different round of encryption, are generated in parallel way with...
Secure communications become more, more important with the exponential growth of Internet data services. However, to massively deploy such services in current networks, we need to deal with different architectures, time-consuming encryption/decryption algorithms. Recently, numerous research efforts have been focused on parallel computing using high-end discrete GPGPU to achieve peak throughput, while...
In this paper we study the design of LDPC decoding scheme for very high throughput optical communications for a full self-seeded optical architecture dedicated to cloud radio access network (C-RAN). The objective of this paper is to demonstrate the potentiality of Bit Flipping (BF) algorithms. It is shown that the Gradient Descent Bit Flipping (GDBF) algorithm with a little improvement is suitable...
In this work, we focus on designing high-throughput anycast mechanisms in a software Defined Network (SDN), as anycast routing serves as a fundamental building block for many services. Specifically, we investigate two main challenges for efficient implementation of a SDN-based anycast system: high throughput anycast routing (HTAR) and congestion-free anycast reconfiguration (CFAR). For the first challenge,...
Software Defined Network (SDN) provides a new fine-grained interface enables the routing algorithm to have an a global view of the network throughputs, connectivity and flows at the data-path. This paper aims to provide a novel approach for dynamic routing algorithm for Software Defined Network in Wide Area Network (SDN-WAN); based on using a modified shortest-widest path algorithm with a fine-grained...
ZigBee is a sensor based IEEE 802.15.4 wireless standard. ZigBee has taken a role in the utilization of wireless network for diverse applications in home, office or industrial automation. The vast use of ZigBee devices which bring forth a huge application traffic. ZigBee Coordinator processes the application traffic. This traffic waits to be executed in the Coordinator queue. Routers transfer the...
In this work, a novel architecture of Secure Hash Algorithm-1(SHA-1) for increased throughput and reduced area is presented. Various acceleration techniques are applied such as pre-computation, loop unfolding, and pipelining simultaneously. Carry Save Adder using Carry Lookahead Adder in its final stage is used for multi-input addition function to achieve high performance. The proposed architecture...
This paper presents a high throughput, area optimized FPGA based design of the 128-bit Advanced Encryption Standard (AES) algorithm using a combination of techniques such as pipelining, sub-pipelining and loop unrolling. To make a tradeoff between area and throughput, a modified AES architecture is proposed. Multiplication by 2 and 3 in MixColumns operation is redesigned using multiplication by 2...
In heterogeneous cellular networks, users are sometimes forcibly redirected into a low power base station (BS) for the purpose of data offloading. In order to guarantee an acceptable performance for such users, who suffer from severe inter-tier interference, enhanced inter-cell interference coordination (eICIC) was proposed. Using this technique, macro BSs periodically mute their data transmission...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.