The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the inefficient implementation of Service Function Chaining, which comes from the use of a single flow table. It is because the number of flow entries in the flow table significantly increases according to the increment of the number of service chains. So the switch should look up larger flow table to process packets, and this also makes harder to update the path of the service...
This paper is concerned with the formation method for multi-robot systems with obstacles. Consensus formation cannot avoid obstacles in the process of movement, and algorithms based on relative distances are not applicable to the situations requiring rigid topology. An algorithm has been designed combining consensus protocols and the modified artificial potential field method for the second-order...
The main purpose of this paper is to define a mathematical formulation of a VoIP call using SIP protocol. This formulation that we propose has been obtained from the use of the function of matlab. The result leads us in the near future to model the behavior of SIP calls at a server asterisk while taking into account parameters hardware resources such as CPU, memory and also the bandwidth. Subsequently,...
This paper introduces the hybrid electric vehicle information system, which is realized by modbus protocol. Using a remote terminal control unit (RTU) with EVEW touch-screen, the system achieves the communication between electronic control units (ECU) and the RTU by means of the modbus protocol at the baud rate 38400kb/s, and it finishes the task of human-machine exchange. Hybrid electric vehicle...
Most network operators have considered reducing Label Switched Routers (LSR) label spaces (i.e. the number of labels that can be used) as a means of simplifying management of underlaying Virtual Private Networks (VPNs) and, hence, reducing operational expenditure (OPEX). This letter discusses the problem of reducing the label spaces in Multiprotocol Label Switched (MPLS) networks using label merging...
Three applications in wireless networks where model-free stochastic learning is applicable, are discussed. The learning based optimization problems are formulated and simulation results are presented. Some open issues are also discussed.
This paper describes a new path computation model in Multi-protocol Label Switching (MPLS) and Generalized MPLS (GMPLS) networks. It introduces a path computation element (PCE), which is functionally separate from label switching routers (LSRs). The Path Computation Element (PCE) is an entity that is capable of computing a network path or route based on a network graph, and applying computational...
Internet Relay Chat (IRC) is a critical application in military networks for maintaining situational awareness and conducting battle management at all echelons. But these networks are often subject to frequent disconnections, limited bandwidth, and long delays, especially when using satellite services and field radios. Such conditions are inhospitable to TCP, and thus the standard IRC protocol, which...
This paper proposes an adaptive participant's presumption protocol (AP3) that can be used to atomically commit Internet transactions. AP3 interoperates a one-phase commit protocol, namely, implicit-yes vote, and two-phase commit protocols, namely, presumed abort and presumed commit, in a dynamic fashion. Thus, it offers the performance advantage of the combined protocols, whenever possible, while...
In this paper we introduce a new tool for controlling the knowledge transfer process in cryptographic protocol design. It is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature. Specifically, we show how two parties A and B can interactively generate a random integer N = p??q such that its secret, i.e., the prime factors (p, q),...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.