The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the problem of efficientlyrestoring sufficient resources in a communications network tosupport the demand of mission critical services after a large scaledisruption. We give a formulation of the problem as an MILPand show that it is NP-hard. We propose a polynomial timeheuristic, called Iterative Split and Prune (ISP) that decomposesthe original problem recursively into smaller...
Recently, a number of offloading approaches have been proposed to reduce the burden on the cellular infrastructure, especially during peak hours. Ranging from pure data offloading concepts using local caches to fully-fledged services operating on ad hoc networks, these approaches are mostly tuned towards their performance. Consequently, cache hit ratios, achieved throughput, or end-to-end latencies,...
The Advanced Metering Infrastructure (AMI) is a fundamental component of the Smart Grid architecture. The AMI consists of a collection of Neighborhood Area Networks (NANs), which interconnects the smart meters to the utility company. In this paper, we address two important performance metrics regarding the NAN design, the topology's resilience and the network capacity. We propose an analysis methodology...
This paper discusses a composition problem of a resilient tree on a graph modeling a communication network whose links are intermittent. The resiliency of a tree is defined exploiting the binary relation on two kinds of edge weights: availability and commonality. Availability represents a probabilistic stability of a communication link corresponding to an edge, and commonality indicates the influence...
This paper presents Multipath-ChaMeLeon (MCML) as an update of the existing ChaMeLeon (CML) routing protocol. CML is a hybrid and adaptive protocol designed for Mobile Ad-Hoc Networks (MANETs), supporting emergency communications. M-CML adopts the attributes of the proactive Optimized Link State Protocol (OLSR) and extends it so as to implement a multipath routing approach based on the Expected Transmission...
With the rapid increase in the size and scale of modern systems, topology-aware process mapping has become an important approach for improving system efficiency. A poor placement of processes across compute nodes could cause significant congestion within the interconnect. In this paper, we propose a new greedy mapping heuristic as well as a mapping refinement algorithm. The heuristic attempts to minimize...
The rapid increase of portable devices providing a multitude of mobile applications have led to excessive cellular traffic demands and consequently to the overload of cellular networks. Recently, migrating this traffic by opportunistic vehicular networks has attracted a great interest and appeared as a promising solution. Indeed, only a limited set of vehicles (seeds) is selected to download objects...
Application performance data accounting for resource contention and other external influences is highly coveted and extremely difficult to obtain. "Why did my application's performance change from the last time it ran?" is a question shared by application developers, program analysts, and system administrators. The answer to this question impacts nearly all programmatic and R&D efforts...
Deployment of portable access points (APs) in disaster affected areas has been heralded by many contemporary researchers as a key technique to formulate disaster recovery networks. However, existing research works do not effectively address one of its key problems, i.e., the low capacity of the backbone network (constructed by the APs) which is unable to satisfy the high user demands emanating from...
Vehicular network applications are emerging to bring many benefits to the users during their journey. However, the design and deployment of such applications require studies that provide insightful information about the network formed by vehicles. To this end, in the last years researchers have been characterizing real mobility traces collected from taxis equipped with GPS devices. However, these...
Wireless sensor networks (WSNs) may consist of a large number of resource-constrained sensor nodes. These nodes probe their surroundings and transmit their measurements over multi-hop routes to an in-situ Base-Station (BS). Given the critical role of the BS, it can be targeted by an adversary's attack. Basically, the adversary may intercept transmissions made by the individual nodes, even without...
We address the online virtual network embedding problem within the Cloud's backbone to optimally map the virtual routers and links in the substrate network in order to maximize the Cloud's provider revenue. Since the problem is NP-hard, we propose a novel approach, named VNE-GH, to significantly reduce the problem size using the Gomory-Hu transformation without losing useful information on the virtual...
The stability of links in mobile cognitive networks (MCNets) is significantly affected by primary user activities and node mobility, which makes topology control and stable routing more challenging than that in traditional wireless networks. In multi-channel multi-hop MCNets, it will become worse. In this paper, we propose a primary user activity prediction model to reveal channel utilization patterns...
The topological structure of the Internet - the interconnection of routers and autonomous systems (ASes) - is large and complex. Frequently it is necessary to evaluate network protocols and applications on “Internet-like” graphs in order understand their security, resilience, and performance properties. A fundamental obstacle to emulation and simulation is creating realistic Internet-like topologies...
The Internet of Things (IoT) is a new paradigm that envisions ubiquitous connectivity. It provides new ways in which distributed systems can be imagined with devices communicating with each other and also with humans. The data provided by such a large, heterogeneous network can be leveraged to provide enhanced services to society and solve problems previously deemed impossible. Most devices in IoT...
The Routing Protocol for Low power and lossy network (RPL) is recommended by Internet Engineering Task force (IETF) for IPv6 based Low Power Personal Area Network (6LoWPAN). RPL is a proactive routing protocol for Internet of Things (IoT) that has applications in smart homes, smart cities and smart world. RPL creates a Directed Acyclic Graph (DAG) of the network topology. Rank in a primitive construct...
Low power and lossy networks (LLNs) consist of devices having limited battery power, less memory, reduced processing capability. RPL (Routing Protocol for low power and Lossy networks), is an approved Internet Engineering Task Force (IETF) standard routing protocol for IPv6-based LLNs. RPL uses a proactive routing approach and the sink or controller node within the network creates a Directed Acyclic...
Clustering is a widely used solution to provide routing scalability in wireless ad hoc networks. The design of clustering schemes is a complex problem due to the dynamic nature of this type of networks. This work proposes a Social-aware Clustering Scheme (SoCS) based on link history to improve the performance of clustering management operations. Each node maintains a history of past links with neighbour...
Current practices of fault-tolerant network design ignore the fact that most network infrastructure faults are localized or spatially correlated (i.e., confined to regions). Network operators require new tools to mitigate the impact of such region based faults on their infrastructures. Utilizing the support from the U.S. Department of Defense, and by consolidating a wide range of theories and solutions...
With each technology improvement, parallel systems get larger, and the impact of interconnection networks becomes more prominent. Random topologies and their variants received more and more attention lately due to their low diameter, low average shortest path length and high scalability. However, existing supercomputers still prefer torus and fat-tree topologies, because a number of existing parallel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.