The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Users of cloud computing platforms pose different types of demands for multiple resources on servers (physical or virtual machines). Besides differences in their resource capacities, servers may be additionally heterogeneous in their ability to service users — certain users' tasks may only be serviced by a subset of the servers. We identify important shortcomings in existing multi-resource fair allocation...
SINET5 is a new 100-Gbps-based academic backbone network, which started full-scale operations in April 2016. It uses multi-protocol label switching-transport profile (MPLS-TP) systems and reconfigurable optical add-drop multiplexers (ROADMs) to create a nationwide network and has more than 50 backbone IP routers to provide a wide range of services, such as several virtual private network (VPN) services...
A key requirement for Active and Assisted Living (AAL) environments is the exchange of data between different communication endpoints to support wide range of services and applications. Used communication protocols need to support the bidirectional flow of information and have to be optimized with regard to security or latency constraints. To address these issues, RESTful approaches have recently...
This paper details a measurement study on the impact of different HTTP-based application layer protocols, namely HTTP/1, HTTP/2 and QUIC, on video streaming performance. In this context we evaluate the influence on the initial delay until video playout is started using the live version of the YouTube platform. Furthermore, we evaluate how different network parameters, i.e. bandwidth, RTTs and packet...
Given the growing demands for network services based sometimes on reduced resources, efficient solutions are continuously developed in order to operate the network infrastructures in optimum conditions. From network management viewpoint, the main challenge is related to traffic management solutions using data flow limitations for some specific users while giving higher priorities to others. If for...
Cognitive radio is an emerging technology that has been under heavy research in the recent years, as it is considered to be a promising solution for the spectrum scarcity problem. In the European Defense Agency's project Cognitive Radio for Dynamic Spectrum Management (CORASMA) a high precision cognitive radio simulation environment was developed based on an artificial UHF waveform. Target of that...
Networked control systems (NCS) have attracted considerable attention in recent years. While the stabilizability and optimal control of NCS for a given communication system has already been studied extensively, the design of the communication system for NCS has recently seen an increase in more thorough investigation. In this paper, we address an optimal scheduling problem for a set of NCS sharing...
It is necessary to monitor the usage of network resources in the core network, and give the solution to avoiding network congestion problems. Congestion control method in Huawei's routers and switches is analyzed. Based on it, then a real-time network traffic analysis and quality of service management platform was designed. With four-tier architecture and five functional modules, the platform achieves...
A flow monitoring scheme allows an SDN controller to periodically collect the statistics (e.g., data rates) of all flows in the network. The rate of a flow passing through multiple switches can be collected from any switch along the path. But if a flow only passes through a single switch, i.e., a lonely flow, its flow rate must be collected from that particular switch. While polling a switch for flow...
Nowadays, search engines are prominent tools, which are required by users, for finding information in web. Multimedia search engines are of special importance due to two different reasons; 1) attractiveness of multimedia contents and 2) growing rate of the creation and online dissemination of such contents. In this paper every effort is made to analyze and recognize the propensities of the users of...
Good quality time-scale modification (TSM) of speech, and audio is a long standing challenge. The crux of the challenge is to maintain the perceptual subtilities of temporal variations in pitch and timbre even after time-scaling the signal. Widely used approaches, such as phase vocoder, and waveform overlap-add (OLA), are based on quasi-stationary assumption and the time-scaled signals have perceivable...
Information Centric Networks(ICN) can employ per-node forwarding strategies to provide an optimal transport service. This paper describes the design of an ICN Forwarder that implements Application-Adaptive Forwarding(AAF): an optimized multipath forwarding strategy for differentiated services that can adapt dynamically to changing link characteristics and implement different operator policies with...
Named Data Networking (NDN) routers can cache previously forwarded Data packets, and those can be reused when a matching Interest packet arrives. Unlike traditional IP routers and HTTP caches that exist as separate devices, designing a scalable NDN router is a new challenge because it should perform fast forwarding and massive-scale caching at the same time. This paper proposes a design of an NDN...
Protection of critical server from cyber attacks is vital, especially in the case of active attacks like Distributed Denial of Service (DDoS). Seamless services are provided by the constant availability of the server which plays an important factor in providing the customer good Quality of Service (QoS). Monitoring and rate limiting the flow of packets will protect the victim systems by allowing only...
High performance embedded applications are developed using system-on-chips (SoCs) which in turn include silicon intensive, integrated application processors. These SoCs integrate multi-core processor (i.e., ARM Cortex9 or A15) with variety of memory interface controllers, communication interface controllers and special purpose accelerators. Traditionally bus matrix is used for integrating these intellectual...
Software Defined Network (SDN) facilitates network programmers with easier network monitoring, identification of anomalies, instant implementation of changes, central control to the whole network in a cost effective and efficient manner. These features could be beneficial for securing and maintaining entire network. Being a promising network paradigm, it draws a lot of attention from researchers in...
We propose a novel mechanically-coupled filter design which for the first time combines two distinct physical vibration modes, including length-extensional (LE) and degenerate in-plane shear (IPS) modes excited in a single filter structure, fabricated using InvenSense AlN-on-silicon platform. By taking advantage of typical LE-based (LE-LE) and IPS-based (IPS-IPS) monotonic filter designs but without...
The purpose of this research is to address the issue of enhancing the Quality of Service(QoS) in IP networks, to make it more optimal in a given network of networks using a novel approach. In this approach, QoS is provided to the packet even when the packet crosses its access network into the backbone. It proposes a new design or set of features in the routers which maps and translates the QoS provisioning...
In recent years, video streaming services based on the client server (C/S) model have become common. When distributed through these services, video files need to be watermarked with a unique ID to identify clients, so as to deter illegal video capturing. However, the download bandwidth at servers limit the number of clients that can view video files simultaneously. With peer-to-peer (P2P) communication,...
IP - VPN and VPN Service Provider (VSP) customersmaintain the quality for the routing and signaling entities. In thenetwork, VSP is getting viewing by VPN like opaque entity andlimiting meaningful interaction between the VPN and VSP. In thispaper, we will reduce the (Crankback + Miscall) Ratio for theVPN network and increase the VPN Successive Rato. As from theresults session, VPN (Crankback + Miscall)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.