The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a data communication network, several flows contend to utilize limited and shared network resources, however, this gives rise to congestion along with other network issues. So, this leads to the development of congestion control based methods/ protocols to support the deployment of real-time multimedia applications while ensuring reliability and fairness. This paper presents a simulation based...
FlexRay has been taken as the next generation protocol of automotive network and has been applied to the safety critical control systems in vehicle. Frame packing is one of key problems in the design of vehicular communication because it directly relates to communication reliability and network utilization. In this paper, the transmission reliability and the slot utilization are defined for FlexRay...
NVMe is emerging as the standard protocol for communicating with high performance storage devices over the PCIe interface, independent of the underlying storage technology. Being a relatively new standard, there is a distinct lack of tools that can help in evaluating contemporary and future storage solutions built on NVMe. In this paper, we provide the design and analysis of FlexDrive, a software...
With prevalence of remote storage services, data privacy issues become more serious owing to loss of control to outsourced data. In the meanwhile, the service providers tend to minimize storage utility costs. To minimize the storage costs while preserving data privacy, secure deduplication techniques have been proposed, which are categorized into client-side or server-side approaches. Client-side...
In this paper, we present a novel idea of multipath multicast, which is imperative to bandwidth intensive applications, in the context of multimedia streaming. In addition to congestion control, multipath TCP (MPTCP) has been proposed to establish multiple paths in a network to improve network reliability. Application-layer multicast (ALM) has been proposed to leverage end systems instead of dedicated...
Personal cloud storage systems, like Dropbox, are revolutionizing the way people think about and access their files. As the prevailing model, these systems use unicast to push file changes to each of the "unsynced" devices. And as a result, they transmit multiple times the same information, once per unsynced device. This puts an unnecessary strain on outgoing bandwidth at the datacenters...
A very common problem in the sensor networks area, where large numbers of sensors transmit data to a single sink node, is reliable transport. As sensors become cheaper and more powerful, sensor networks face the challenge of controlling all these devices in a efficient manner, which naturally leads to a sink-driven transport scheme. In this paper we propose RT-SENMOS, a sink-driven reliable transport...
Power utilities are increasingly dependent on the use of communications networks. These networks are evolving to be packet-based, rather than using conventional Time-Division Multiplexing (TDM) technologies. Transporting current differential protection traffic over a packet network is especially challenging, due to the safety-critical nature of protection, the strict requirements for low delay and...
The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control algorithms becomes even more relevant for networked applications running in environments such as data centers. Therefore, we provide an extensive overview of relevant TCP congestion...
In ongoing efforts, our team has developed DISCO (Distributed Cross-layer Architecture for Network Awareness and Opportunistic Transport), a cross-layer framework to enable network awareness and automated adaptation of transport, network and application parameters in a MANET. DISCO automates discovery of new applications and services, and applies rule-based logic and machine learning to enable the...
The research community has devoted much attention to the use of classic network technologies for advanced traffic engineering, but the use of software-defined networking (SDN) for this purpose, particularly in regards to Quality of Service (QoS) optimizations, remains relatively unexplored. We have developed a QoS framework that leverages SDN capabilities to achieve optimal throughputs for all QoS...
IEEE 802.11ah is proven to be a suitable communication standard for Smart City projects. However, due to the absence of Restricted Access Window (RAW) size adjustment and proper relay node solution, it fails to optimally utilize the resources in heterogeneous networks. In this paper, we propose a method to estimate the RAW size based on traffic loads and provide Relay node support for stations to...
Existing InfiniBand drivers require the communication buffers to be pinned in physical memory during communication. Most runtimes leave these buffers pinned until the end of the run. Such situation limits the swappable memory space for applications. To address these concerns, Mellanox has recently introduced the On-Demand Paging (ODP) feature for InfiniBand. With ODP, communication buffers are paged...
In mixed-critical networks is very important to provide appropriate mechanisms which prevent lost of data during communication, especially if that are high-priority frames. As a basis for analysis, in this paper we observed principles of multy-priority based traffic integration in TTEthernet networks that can be configured as strictly deterministic, or mixed-critical. It is analyzed influence of the...
We introduce POSTAL, a new range-free positioning protocol for mobile ad hoc networks (MANETs) that eliminates the need of constantly flooding the whole network with positioning information. The proposed protocol is based on regions of interest which are connected components of the MANET spanning a beacon (or reference) node and one or more nodes interested in estimating their position. These regions...
Elbrus is an explicitly parallel VLIW instruction set architecture developed by MCST. In this paper, we introduce the microarchitecture of the 5th generation 8-core Elbrus-8C processor implemented on 28nm. Elbrus-8C has 5x the peak performance for floating-point operations as compared with its predecessor, the Elbrus-4C processor, due to improved single-core performance and doubled number of cores...
Present data center (DC) network provisioning schemes primarily utilize conventional load-balancing technologies, offering individual application performance improvement. Diversity in application usage however, makes isolated application prioritization a performance caveat for users with varying application trends. The present paper proposes a user profiling approach to capture application trends...
Quality of Service (QoS) control is an important concept in computer networking, as it is related to end-user experience. While providing QoS guarantees over the Internet has long been deemed too complicated, the emergence of Software Defined Networking (SDN), and OpenFlow as its most popular standard, may facilitate QoS control. In this paper, we consider how to enable bandwidth guarantees with OpenFlow...
In the Public Key infrastructure (PKI) model, digital certificates play a vital role in securing online communication. Communicating parties exchange and validate these certificates, the validation fails if a certificate has been revoked. In this paper we propose the Certificate Revocation Guard (CRG) to efficiently check certificate revocation while minimising bandwidth, latency and storage overheads...
There are many high-speed TCP variants with different congestion control algorithms, which are designed for specific settings or use cases. Distinct features of these algorithms are meant to optimize different aspects of network performance, and the choice of TCP variant strongly influences application performance. However, setting up tests to help with the decision of which variant to use can be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.