The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) has emerged to be an ultimate solution for the management of data centers. The separation of control plane from the data plane has made it possible to manage physical and virtual networks through the SDN controller. This paper presents a novel Dynamic Multipath Scheduling Protocol (DMSP) for effective scheduling of packets on SDN virtual links, thus achieving full...
As the amount of digital data the world generates explodes, data centers and HPC systems that process this big data will require high bandwidth and high capacity main memory. Unfortunately, conventional memory technologies either provide high memory capacity (e.g., DDRx memory) or high bandwidth (GDDRx memory), but not both. Memory networks, which provide both high bandwidth and high capacity memory...
In datacenter networks, big scale, high performance and fault-tolerance, low-cost, and graceful expandability are pursued features. Recently, random regular networks, as the Jellyfish, have been proposed for satisfying these stringent requirements. However, their completely unstructured design entails several drawbacks. As a related alternative, in this paper we propose Random Folded Clos (RFC) networks...
Computational applications are subject to various kinds of numerical errors, ranging from deterministic round-off errors to soft errors caused by non-deterministic bit flips, which do not lead to application failure but corrupt application results. Non-deterministic bit flips are typically mitigated in hardware using various error correcting codes (ECC). But in practice, due to performance and cost...
This paper proposes a new congestion control method based on a hop-by-hop rate control in named data networking (NDN). The proposed method suppresses the excessive reduction of Interest sending rate due to continuous negative acknowledgement (NACK) packets caused by the propagation delay. The proposed method limits the rate reduction to once per congestion. The point of our method is not to change...
Data centers play an important role with the fast growth of cloud computing used in our daily life. Traditional data center networks based on the fat-tree topology have their own drawbacks and limitations which prevent them from providing high performance to satisfy the increasing demand for cloud services. In this paper, we first design a new flexible network fabric for data center networks based...
Network Function Virtualization not only can help service providers to offer network services flexibly, but also can reduce cost of supplying space and energy for physical devices. User requests may demand different numbers of services in a chain, in which the related flows can be directed to different machines hosting required virtualized network functions (VNFs) in a designated order. As a result,...
Cloud data center is becoming more and more important for tenants because cloud resources and associated services can be shared by multi-tenant. Although resource isolation and traffic control, which are effective ways to protect the QoS of tenants, have been used extensively, the topology of the network needs to be further studied extensively. In this paper, combining VN with SDN, a topology-aware...
IP - VPN and VPN Service Provider (VSP) customersmaintain the quality for the routing and signaling entities. In thenetwork, VSP is getting viewing by VPN like opaque entity andlimiting meaningful interaction between the VPN and VSP. In thispaper, we will reduce the (Crankback + Miscall) Ratio for theVPN network and increase the VPN Successive Rato. As from theresults session, VPN (Crankback + Miscall)...
Wavelength division multiplexing (WDM) divides the huge bandwidth available on a fiber into several non-overlapping wavelength channels and enables data transmission over these channels simultaneously. Failure of the optical fiber causes loss of huge amount of data which can interrupt communication. There are several approaches to ensure network survivability. In survivability, we consider dedicated...
The performance of wireless mesh networks (WMNs) deployed for Internet access in rural settings is affected by several factors. Typically, deployments in African domains use cheap and computationally constrained devices with challenges such as power fluctuations, gateway congestion, VSAT communications asymmetry and low bandwidth, which affects throughput under dynamic scenarios. Caching methods can...
The ability of Ethernet Ring Protection Switching (ERPS) to provide carrier grade switchover has made Ethernet technology viable in telecommunication carrier networks enabling network operators to replace SONET/SDH/PDH. Adaptive modulation (AM) is another evolution in technology which may effectively double the capacity of microwave links in favorable weather condition. In this paper, we propose an...
Radio access technology (RAT) selection has recently received much attention from the research community due to the increasing deployment of heterogeneous wireless networks. Most prior works mainly focus on proposing an efficient algorithm that yields good performances, and evaluate their solutions on a certain network model, particularly in cases when every user can connect to all the available base...
In the network environment with limited network resources, the overall bandwidth is usually competitively shared among various application users. The traffic engineering techniques presented for resolving the bandwidth sharing, e.g. limited traffic rate and traffic blocking, may not be able to satisfy the requirement for all types of services. In this paper, we propose an effective routing mechanism...
With the increasing popularity of cloud computing, the huge amount of energy consumed by data centers has gained much attention. Current proposals address the energy efficiency problem by two major methods: optimizing the allocation of physical servers and network elements (routers or switches). In order to improve resource utilization and minimize the energy consumption, the former method focuses...
Network Function Virtualization (NFV) is promising to lower the network operator's capital expenditure and operational expenditure by replacing proprietary hardware-based network equipment with software-based virtual network functions that can be consolidated into telecom clouds. In particular, NFV provides an efficient way to deploy network services using service function chains that consist of a...
Reliable network time measurement tools are important to ensure that monitoring network systems work properly, but their development do not consider security as a concern and, for example, delay attacks could compromise those tools effectiveness. Indeed, nowadays the network time measurement is not always reliable. Some researches do propose to increase network time measurement reliability using Openflow...
This paper discusses the Correntropy Induced Metric (CIM) based Growing Neural Gas (GNG) architecture. CIM is a kernel method based similarity measurement from the information theoretic learning perspective, which quantifies the similarity between probability distributions of input and reference vectors. We apply CIM to find a maximum error region and node insert criterion, instead of euclidean distance...
Load-balancing and network optimization in SDN networks require efficient flow splitting during the path computation phase. The way flow splitting is typically implemented in switches is to map the output of an hash function computed on the headers of incoming flows to the content stored in a Ternary Content Addressable Memory (TCAM), a very efficient but scarce resource. Although a large TCAM budget...
Traffic engineering (TE) has long been used by network providers to reduce network congestion and improve resource utilization. Due to its significance, several traffic engineering algorithms have been proposed in literature. However, most of these algorithms optimize maximum link utilization (MLU) in network, and/or assume that network has the capability to route demands on arbitrary paths. Optimizing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.