The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Group communication based on multicast enables efficient one-to-many and many-to-many distribution of real-time data. Multicast communication would therefore be beneficial to popular Internet applications such as IPTV, on-line multiplayer games and audio/video conferencing, and is considered as an important network service for future CCN/ICN architectures. However, multicast exists in many flavors...
In compute clusters, monitoring of infrastructure and application components is essential for performance assessment, failure detection, problem forecasting, better resource allocation, and several other reasons. Present day trends towards larger and more heterogeneous clusters, rise of virtual data-centers, and greater variability of usage suggest that we have to rethink how we do monitoring. We...
With the shift towards cloud computing, application availability becomes a valid concern. Cloud applications have to be taken down to address various hardware and software problems. Even thoug redundancy insulates applications from hardware errors, the software updates and patches still require the service to be taken down for the period of the update. Organizations generally use lowactivity hours...
Vehicular ad hoc networks (VANET) have great potentials in modernizing transportation infrastructure. Deployment of data communications over such systems however is challenging due to node mobility. Unlike traditional networking scenarios, a user initiating a session for seeking traffic data (called receiver) is assumed to not know the identity associated with the counterpart. In reality, he or she...
Although there have been a plethora of studies on TCP performance in supporting of various applications, relatively little is known about the interaction between TCP and BGP, which is a specific application running on top of TCP. This paper investigates BGP's slow route propagation by analyzing packet traces collected from a large ISP and Route Views Oregon collector. In particular we focus on the...
A common feature of emerging future Internet architectures is the ability for applications to select the path, or paths, their packets take between the source and destination. Unlike the current Internet architecture where routing protocols find a single (best) path between a source and destination, future Internet routing protocols will need to present applications with a choice of paths. Even if...
Point of Interest (PoI) coverage problem has been discussed lately. Both practical strategies and theoretical analysis have been proposed. We however argue that coverage solution alone is not enough. In real applications, data from the covered area need to be collected and sent back to the sink. We notice that existing protocols are for general purpose use and not specially designed for PoI monitoring...
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific applications from mobile objects monitoring to data collecting. By eavesdropping the sensor nodes' transmissions and tracing the packets' trajectories in the WSNs, an adversary can capture the location of a source or sink eventually. Thus, the location privacy of both source and sink becomes a significant issue...
Certain popular wireless sensor network applications, including disaster recovery, battlefield communication and athlete monitoring, are characterized by extensive node mobility, intermittent contact between nodes and a highly dynamic network topology. Traditional routing protocols and security schemes are designed for essentially static networks and do not perform well in this case. This has given...
In this paper, we show new smart attacks which were not dealt with in the solutions proposed recently. We focus on the Medium Access Control (MAC), particularly the IEEE 802.11 and we study some hidden vulnerabilities based on the control packets. The malicious nodes can exploit these vulnerabilities to reduce the network's performance, to disturb the monitoring, routing processes and to escape the...
Network coding is known to improve throughput by mixing information from different flows and conveying more information in each transmission. Recently some proposals have demonstrated the benefits of applying network coding to wireless networks with broadcast transmissions. It is expected that the opportunities for coding and the corresponding gains depend on the bit-rate chosen for determining routes...
This paper presents a distributed fermat-point range estimation strategy, which is important in the moving sensor localization applications. The fermat-point is defined as a point which minimizes the sum of distances from three sensors inside a triangle. This point is indeed at the trianglepsilas center of gravity. We solve the problems of large errors and poor performance in the bounding box algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.