The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper the calculations of the robustness of a network is addressed. After a brief description of the most relevant metrics, our Network Robustness Simulator(NRS) is presented as well as its structure and working model. The NRS computes the robustness I a dynamic scenario, it copes with multiple failures and different types of attack. In particular, the addition of the epidemic based model...
Content Delivery Networks (CDNs) are a key en-abler for the distribution of large amounts of data with high capacity and low latency. For instance, content streaming companies extensively use geographical distribution and replication to meet the ever-growing demand for media. Optical networks are the only future-proof technology available that meets the reach and capacity requirements of CDNs. However,...
The article focuses on experimental measurement of multi-carrier narrowband Power Line Communication. The aim of experimental measurements was comparison of multi-carrier narrowband Power Line Communication from the view-point of possible communication distance, available data rate and impact of noise. The specifications G3-PLC and PRIME are considered. The field test results and data rate measurements...
Physical topology design of optical networks is a NP-hard problem and is frequently accomplished by using heuristics and metaheuristics. Previous works investigated the suitability of a tunable version of the Gabriel method to represent optical networks regarding performance and cost. In this paper, we study the robustness of a heuristics based on Gabriel graphs deployed in three different backbone...
We consider the problem of placing the minimum number of monitors in a dynamic network to identify additive link metrics from path metrics measured along cycle-free paths between monitors. Our goal is robust monitor placement, i.e., the same set of monitors can maintain network identifiability under topology changes. Our main contribution is a set of monitor placement algorithms with different performance-complexity...
By carefully selecting and establishing overlay edges and computing multiple underlay-edge-disjoint paths, the ability to still fulfill demands in a VPN in case of edge-failures can be significantly increased. This article presents an approach to construct efficient and optimally resilient VPN overlay topologies together with the corresponding overlay paths to fulfill a given set of demands (connectivity...
By overlay topology optimization with regard to the minimum number of overlay edges that need to breakdown until all communication between two chosen nodes ceases, the robustness against optimal attacks can be maximized and the network can still perform its operation despite (multiple) link-failures. This article presents an approach to construct optimally resilient topologies on the basis of a metric...
High throughput is of particular interest in data center and HPC networks. Although myriad network topologies have been proposed, a broad head-to-head comparison across topologies and across traffic patterns is absent, and the right way to compare worst-case throughput performance is a subtle problem. In this paper, we develop a framework to benchmark the throughput of network topologies, using a...
MANET (mobile ad hoc network) technology has become increasingly attractive for real-world applications in the past decade. Dynamic and intermittent connectivity caused by node mobility poses a huge challenge to the operation of MANETs that require end-to-end paths for communication. The attacks against critical nodes could result in a more degraded network service. In this paper, we evaluate the...
Regionally-correlated failures or attacks pose a great challenge to the normal network communication for physical backbone networks. When the same intensity of challenges occur at different physical locations, the damage to the network connectivity varies greatly. In this paper, we propose a critical region identification model and demonstrate its effectiveness in finding critical regions for fiber-level...
Due to their intrinsic characteristics, Wireless Sensor Networks (WSN) are prone to failure, mainly because of their energy limitations. Considering this, the use of self-healing mechanisms becomes necessary in order to create a more fault-tolerant and robust WSN. With this problem at hand, we have proposed and developed DACA, a Disjoint path And Clustering Algorithm that increases the network lifetime...
With the rapid advancement of wireless technology and the exponential increase of wireless devices in the past decades, there are more consumer applications for MANETs (mobile ad hoc networks) in addition to the traditional military uses. A resilient and robust MANET is essential to high service quality for applications. The dynamically changing topologies of MANETs pose a huge challenge to normal...
Internet vulnerability studies typically consider highly central nodes as favorable targets of intelligent (malicious) attacks. Heuristics that use redundancy adding k extra links in the topology are a common class of countermeasures seeking to enhance Internet robustness. To identify the nodes to be linked most previous works propose very simple centrality criteria that lack a clear rationale and...
Along with the rapid advancement of information technology, the traditional hierarchical supply chain has been quickly evolving into a variety of supply networks, which usually incorporate a large number of entities into complex graph topologies. The study of the resilience of supply networks is an important challenge. In this paper, we exploit the resilience embedded in the network topology by investigating...
Improving resilience against failures and targeted attacks is an important aspect of network design. The resilience and cost of networks are two opposing objectives in which a designer should consider when building networks. We develop a heuristic algorithm that balances the centrality of networks by adding a set of links that minimizes the variance of graph centrality measures in a least costly fashion...
In this paper, a novel algorithm for finding the optimal correspondence between two sets of image features has been introduced. The proposed algorithm pays attention not only to the similarity between features but also to the spatial layout of every matched feature and its neighbors. Unlike related methods that use geometrical relations between the neighboring features, the proposed method employees...
In cooperative localization, distributed algorithm is more attractive than its centralized counterpart due to the low complexity and robustness. However, the position ambiguity of cooperative mobile terminal (MT) is usually neglected by related works, causing the loss of accuracy in distributed algorithms. In this paper, we establish an element-wise-weighted total least-squares (EW-TLS) model for...
In order to understand the role of critical nodes in mobile ad hoc networks (MANETs), dynamic topologies are modelled as time-varying graphs and network topologies within a certain time window are aggregated as a weighted static graph. Critical node behaviour has been previously studied by evaluating how end-to-end throughput is impacted by the removal of high centrality nodes. However, different...
The path geo-diversification mechanism introduced in this paper takes geographical diversity of physical network topology into consideration when making routing decisions. It enables the network to be more resilient against area-based challenges by exploiting nodes' multiple ingress and egress ports. It shows better performance compared to OSPF when the network is subject to area-based challenges...
As society progressively depends on large-scale telecommunications networks and their connectivity rapidly rises over time, it becomes of vital importance to study their topological features. On the backbone level uncertain disturbances of its constituent parts may affect a sizable proportion of the population, thus this can well explain the recent focus on evaluating backbone robustness metrics....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.