The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Topology managers expose network information to applications to improve application-level resource management. An example for various ongoing standardization activities is Application-Layer Traffic Optimization (ALTO). Due to privacy and security constraints, exposed network information has to be filtered according to policies. As part of such policies, distance information can be abstracted by presenting...
The multicast paradigm offers tremendous benefits in efficiency for transmitting data across optical networks, allowing a single client to send information to an entire set of endpoints. A multicast request is most efficiently provisioned through the creation of a tree, with the end points, or resources, occasionally serving as branching points. This practice can lead to the source of the request...
In recent years there has been a big increase in the number of network-related experiments using software defined networking (SDN) technology. We report on our practical experience over 2 years running network experiments on three classes of testbed facility, each supporting researchers working at a different innovation stage. We run experiments using the commercial Amazon EC2 cloud facility, pre-commercial...
CGEA (Convergence Gradients Expectation Ant algorithm) is proposed in this paper, which can get the optimal path quickly by precomputing the Convergence grads expectation of improved ant algorithm. QoS metrics of link can be measured by expectation function and the optimal path can be got efficiently by comparing the convergence grads.
With the rapid advancement of wireless technology and the exponential increase of wireless devices in the past decades, there are more consumer applications for MANETs (mobile ad hoc networks) in addition to the traditional military uses. A resilient and robust MANET is essential to high service quality for applications. The dynamically changing topologies of MANETs pose a huge challenge to normal...
Internet vulnerability studies typically consider highly central nodes as favorable targets of intelligent (malicious) attacks. Heuristics that use redundancy adding k extra links in the topology are a common class of countermeasures seeking to enhance Internet robustness. To identify the nodes to be linked most previous works propose very simple centrality criteria that lack a clear rationale and...
Modern distributed service-oriented networks are complex heterogeneous systems. This includes cloud network. To solve synthesis problems of distributed service-oriented structures an algorithm of conformal mapping topology that is based on the definition of hyperbolic virtual coordinates has been proposed. This algorithm requires less iterations than other methods and is able to provide guaranteed...
This paper proposes LIBR, a routing protocol for Wireless Mesh Networks specially designed for linear topologies, i.e., topologies in which nodes are placed following a well-defined line-based pattern. This kind of topology may arise, for example, in power transmission lines, pipelines, roads, and railway lines. By exploring the intrinsic characteristics of these linear topologies, LIBR can achieve...
In order to demonstrate and test new concepts and methods for the future grids, power engineers and researchers need appropriate randomly generated grid network topologies for Monte Carlo experiments. If the random networks are truly representative and if the concepts or methods test well in this environment they would test well on any instance of such a network as the IEEE model systems or other...
Along with the rapid advancement of information technology, the traditional hierarchical supply chain has been quickly evolving into a variety of supply networks, which usually incorporate a large number of entities into complex graph topologies. The study of the resilience of supply networks is an important challenge. In this paper, we exploit the resilience embedded in the network topology by investigating...
In this paper, we tackle the problem of graph generalization in the context of privacy-preserving social network mining. By grouping together nodes that are not only similar but that also belong to the same k-shells, we better preserve the community structure of the graph, its utility in case of clustering-related applications, while still achieving some privacy level through the concept of graph...
Software Defined Networking (SDN) is an emerging networking paradigm that assumes a logically centralized control plane separated from the data plane. Despite all its advantages, separating the control and data planes introduces new challenges regarding resilient communications between the two. That is, disconnections between switches and their controllers could result in substantial packet loss and...
Distributed systems offer many features such as resource sharing, scalability, fault tolerance and reliability. Several distributed algorithms have been proposed in literature to solve fundamental problems such as mutual exclusion and leader election in distributed systems. When more than one algorithm is invented to solve the same problem particularly in asynchronous distributed systems, their performance...
Critical node discovery plays a vital role in assessing the vulnerability of a network to an abrupt change, such as an adversarial attack or human intervention. In this paper, we propose a new metric to characterize the criticality of a node in an arbitrary network which we refer to as the Combined Banzhaf & Diversity Index (CBDI). The metric utilizes a diversity index which is based on the variability...
This paper studies reliability of probabilistic gossip algorithms over the random geometric topologies which model ad hoc networks. We propose an efficient algorithm that ensures higher reliability at lower message complexity than the three families of gossip algorithms. Such an improvement is reasonably estimated by our reliability model. The results obtained by OMNET++ simulator confirm the prediction...
Long-range wireless shortcuts in Network-on-Chip (NoC) architectures are shown to significantly improve energy-efficiency in on-chip data transfer. However, over-utilization of the wireless shortcuts and non-uniform traffic patterns may result in thermal hotpots in the NoC links or switches. In this work we propose a cross-layer approach of optimizing the NoC topology to achieve a balanced traffic...
In the same autonomous system, the routers get the information for routing which is disseminated by the OSPF and EIGRP which are the members of Interior Gateway Protocols (IGP). In this paper, we are comparing the dynamic routing protocols OSPF and EIGRP in different IP schema (IPV4 and IPV6). The comparison is necessary because while designing a network it is important to choose a suitable protocol...
Recently, the Content Oriented Networking (CON) has become a recognized approach that is gaining extensive acceptance and deployment. At the same time, Elastic Optical Networks (EONs) are considered as a very promising approach for effective bandwidth allocation in optical networks. In this paper, we consider various approaches to content distribution in EON protected by the Dedicated Path Protection...
Penetration graph is a kind of attack graph which is widely used in penetration testing. It is an import tool to analyze security vulnerabilities in the network. However, the previous research on the generation methods of penetration graph have met a lot of challenges. Some methods are out of date and not applicable for practical scenarios, some may possibly leave out the import attack paths, some...
Understanding network behavior under challenges is essential to constructing a resilient and survivable network. Due to the mobility and wireless channel properties, it is more difficult to model and analyze MANETs (mobile ad hoc networks) under various challenges. Previously, we have modeled network attacks based on a priori complete knowledge of network structure and mobility. In this paper, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.