The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wireless sensor network is said to form a belt-barrier for a region if it is able to detect any object moving from outside the region to inside. Recently, Cheng and Tsai found if camera sensors are used to form a belt-barrier, the breadth of the barrier becomes an important quality factor to ensure high quality of monitoring (QoM). Then, they proposed the minimum β-breadth belt-barrier construction...
One of the mechanisms to achieve energy efficiency in virtualized/cloud environments is consolidation of workloads on an optimal number of servers and switching-off of idle or underutilized servers. Central to this approach is the migration of virtual machines at runtime. In this paper we investigate the cost (migration time) of virtual machines migration. We shall show that migration time exponentially...
In this paper, we address the challenge of providing secondary users access to licensed spectrum when there are active primary user transmissions. The motivation is to eliminate the disruption to secondary user communications by the resurgence of primary user transmissions. We propose a novel protocol, termed spectrum co-access protocol (SCAP), for secondary users to transparently and simultaneously...
TCP with network coding (TCP/NC) makes the packet loss, which is caused by wireless transmission error, have no effect on congestion control. Current proposals prefer to use delay-based congestion control aspect(congestion avoidance phase) of TCP Vegas to deal with the congestion problem of TCP/NC. However, it is oversimplified and may lead to unfairness when both TCP flow and TCP/NC flow coexist...
Nowadays, due to the rapid growing popularity of Internet, the global routing system suffers from great scalability problem. Many solutions are proposed to solve the problem, including FIB aggregation, core/edge separation solutions, et al. The limitation of these existing solutions is that they all make the assumption that all addresses in the Internet must be globally visible and these routing information...
When the traffic matrix of an IP network changes significantly, network operators will re-optimize the link weights to achieve optimal traffic distribution in the network. In such cases, network link weights need to be migrated from the old setting to the re-optimized setting based on a pre-determined sequence of migration operations. In this paper, we study the links weights migration problem in...
Nowadays, the fast development of wireless mesh networks have led to a significant growth of energy consumption. Green mesh networks consisting of rechargeable routers supplied by renewable energy sources such as solar power have become a cost-effective alternative solution. In this paper, we study the rechargeable router placement problem and formulate it as an optimization problem to minimize the...
In opportunistic networks, nodes hold packets in permanent storage and make independent routing decisions on sporadically emerging links. This helps to achieve connectivity even if an end-to-end contemporaneous path does not exist between a pair of nodes. Next-hop decision is generally dependent on future probability of encounters with a destination node while other constraints on nodes' resources...
Interference alignment (IA) is a scheme to approach the capacity at high signal-to-noise ratio (SNR) in multiuser multiple-input multiple-output (MIMO) interference networks. To implement the IA scheme in a frequency-division duplexing (FDD) system, transmitter channel state information (CSIT) is fed back from the receiver with finite bits. However, such CSIT is subject to quantization errors and...
Over the course of the past two decades, network use has continued to outpace network capacity growth. This has lead to increasing network congestion, which hinders day to day use as well as Internet content innovation. Modifying how Internet Service Providers (ISPs) charge the user is one way to control congestion and improve collective social welfare. In this paper, we discuss several Internet pricing...
P2P file streaming has become very popular in online video sharing. Under the video on demand (VoD) setting, peers in the network may be interested in different portions of the same video. It is a new challenge to distribute the server load to peers under the VoD setting while at the same time maintaining the streaming performance, i.e., low latency and good fluency. Our approach is to use techniques...
Most cellular network communication strategies are focused on data traffic scenarios rather than energy balance and efficient utilization. Thus mobile users(cell phones) in hot cells may suffer from low throughput due to energy loading imbalance problem. In state-of-art cellular network technologies, relay stations extend cell coverage and enhance signal strength for mobile users. However, busy traffic...
In recent years, the BitTorrent (BT) has been one of the most efficient mechanisms for Peer-to-Peer (P2P) non-realtime content distribution. Many approaches for streaming videos over BitTorrent have been proposed by modifying the piece selection policy to cope with the real time requirement. Most of them provide the continuity of video playback at the cost of the variety of pieces on P2P streaming...
The incredible rise in popularity of mobile smart devices has placed tremendous pressure on wireless service providers. While much of the pressure arises from increasingly rich multimedia and social offerings, a sizable portion of the traffic originates when the user is not actively interacting with the device. The focus of this paper is to explore the prevalence and utility of smartphone background...
The flow-based OpenFlow architecture decouples the control plane and data plane, and it has involved great evolution towards traditional networks. A particular important issue in OpenFlow architecture is controller capacity, which can be defined as the number of switches a controller can manage. In this paper, we model the flow set-up requests from switches to controller as a batch arrival process...
Virtual network embedding is considered an important problem to solve in order to make infrastructure virtual-ization economically reasonable. The most efficient algorithms proposed so far define link and node mappings as optimal solutions of Integer Programming (IP) problems. They exhibit reasonably good performance only for small problem instance sizes, including few tens of nodes and links per...
Performance evaluation of mobile networks needs accurate simulation set up including realistic characteristics. The most important issue in mobile networks' simulation is the mobility of the nodes. Since mobile nodes usually are carried by humans, thus, nodes mobility should be modelized as human movement. To the best of our knowledge, none of the existing mobility models have the ability to modelize...
This article presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol in terms of usable...
Peer-to-Peer (P2P) file-sharing is becoming increasingly popular in recent years. In 2012, it was reported that P2P traffic consumed over 5,374 petabytes per month, which accounted for approximately 20.5% of consumer internet traffic. TV is the popular content type on The Pirate Bay (the world's largest BitTorrent indexing website). In this paper, an analysis of the swarms of the most popular pirated...
The advent of globally distributed computing services and network access allows ‘big data’ on consumption to be used to model, explain and predict consumer behavior at resolutions that range from individual cities to whole countries. Given access to suitable infrastructure, the most significant challenge is to create conditions under which ‘Data Scientists’ may access and manipulate the required data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.