The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern cellular networks utilising the long-term evolution (LTE) and the coming 5G set of standards face an ever-increasing demand for low-latency mobile data from connected devices. Header compression is employed to minimise the overhead for IP-based cellular network traffic, thereby decreasing the overall bandwidth usage and, subsequently, transmission delays. Since Robust Header Compression, among...
The paper discusses step-by-step practical flow involved in applying dynamic bandwidth management (DBM) to large industrial system-on-chip (SoC) designs deploying embedded test data compression.
The inter-regional telecommunication network design in Indonesia is strongly influenced by the bandwidth of Voice over Internet Protocol (VoIP), where 40% of the national bandwidth is used to pass voice communication. Indonesia region is divided into seven regional areas; each of these is supported by two IMS Cores, which serves as the active core and the stand-by core. Regionals are interconnected...
We study traffic grooming with shared backup path protection (SBPP) in IP over elastic optical network (EON). Efficient heuristic algorithms are developed to enable joint spare capacity sharing in both IP and optical layer. Results show that two-layer joint spare capacity sharing can significantly improve network capacity utilization and IP-layer protection is more preferable from the perspective...
DRDoS (Distributed Reflection Denial of Service) attack is a kind of DoS (Denial of Service) attack, in which third-party servers are tricked into sending large amounts of data to the victims. That is, attackers use source address IP spoofing to hide their identity and cause third-parties to send data to the victims as identified by the source address field of the IP packet. This is called reflection...
■ Leverages Mali's scalable architecture ■ Scalable to 32 shader cores ■ Major shader core redesign ■ New scalar, clause-based ISA ■ New quad-based arithmetic units ■ New geometry data flow ■ Reduces memory bandwidth and footprint ■ Support for fine grain buffer sharing with the CPU
•Memory requirements have become more strict in time with respect to performance, power, and cost •Keeps innovating technology to correspond to those requirements - Make efforts to extend the value of traditional memory - Figure out innovative memory solution •Close collaboration with partners is essential for delivering the right memory solution.
Dynamic voltage scaling (DVS) is usually combined with partitioning the system into multiple voltage islands (MVI) to further lower dynamic power consumption, and it is widely adopted in SoC design nowadays. However, it brings great challenges with test. Different from SoC with only single voltage level, multi-Vdd SoCs must be tested at multiple voltage settings, which increases test time and test...
The wide use of Multi-processing systems-on-chip (MPSoCs) in embedded systems and the trend to increase the integration between devices have turned these systems vulnerable to attacks. Malicious software executed on compromised IP may become a serious security problem. By snooping the traffic exchanged through the Network-on-chip (NoC), it is possible to infer sensitive information such as secrets...
Modern IP/Optical transport networks are seldom jointly operated and optimized, and do not cater to the usually implicit requirements of applications, which ultimately drive network traffic. In this concept paper we propose a Software Defined Networking (SDN) based Network Orchestrator to manage multi-layer transport networks while taking explicit application requirements into account. We discuss...
Current satellite systems offer flexibility with respect to different resources such as frequency and time. Building upon this flexibility the present paper investigates the user scheduling problem in satellite return links, focusing on the TDMA scheme of the MF-TDMA paradigm. In particular, a scenario is examined based on the MF-TDMA paradigm of the DVB-RCS2 standard, where different user terminals...
Many LTE-Advanced algorithms and protocols rely on node coordination and cooperation to reduce power consumption, increase spectral efficiency and improve cell-edge performance. Functions such as Coordinated Multi Point, Network Assisted Handover, etc., require a standard connection among nodes to support their operations. The LTE X2 interface meets the above requirements and allows operators to connect...
Transport IP/optical networks are evolving in capacity and dynamicity configuration. This evolution gives little to no attention to the specific needs of applications, beyond raw capacity. The ACINO concept is based on facilitating applications to explicitly specify requirements for requested services in terms of high-level (technology agnostic) requirements such as maximum latency or reliability...
This paper introduces the Distributed NFV Orchestrator (DiNO). DiNO integrates and orchestrates Software-Defined Networking (SDN) and Network Function Virtualization (NFV) in a physically and logically distributed manner and optimizes their service quality and resource utilization. In the DiNO architecture, Virtualized Network Functions (VNFs), including servers, middleboxes, and QoS, can be dynamically...
Traceroute is a very useful troubleshooting tool. It reveals the routing path taken by a packet destined to a remote host. Traceroute is originally designed for the legacy IP network. However, the mechanism used by it does not work in an SDN network. In an SDN network, there has been a similar tool called SDN traceroute that provides similar functions as traceroute. However, SDN traceroute does not...
MPTCP (MultiPath TCP) boosts application network performance by aggregating bandwidth over multiple paths. However, it may cause poor performance due to the large number of out-of-order packets especially when the paths have different delays. To resolve this issue, we propose to dynamically add or remove MPTCP paths with the leverage of software-defined networking (SDN). The key idea is to track the...
Wireless Mesh Networks (WMN) usually extend Internet access to unconnected mesh devices by extending the reach of wired access. Typically, in community WiFi networks, the gateway routers see no benefit for providing Internet access to the network other than having the capability of reaching other mesh devices. In this paper, we explore a WMN approach where all mesh devices are home gateway router...
Non-orthogonal multiple access (NOMA) is a promising multiple access scheme for next generation wireless networks. This paper investigates the sum rate maximization problem for NOMA system over a frequency selective fading channel with its users being paired according to their channel powers. A hierarchical power allocation process is proposed, whereby the users are divided into two groups such that...
Recently, mobile video streaming services become very popular. MPEG-DASH is one of the streaming schemes used for the service. In this method, a mobile terminal tries to download video chunks from a streaming server by estimating the available bandwidth of the underlying network. However, it is very difficult to estimate the available bandwidth because this method is working as an OTT (over the top)...
A well-known technique for enhancing the performance and stability of content distribution is the use of multiple dissemination flows. Multipath TCP (MPTCP), the most popular multiflow protocol on the Internet, allows receivers to exploit multiple paths towards a single sender. Nevertheless, MPTCP cannot fully exploit the potential gains of multipath connectivity, as it must fairly share resources...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.