The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Congestion presents a significant challenge in ad hoc networks due to their unstructured and distributed nature. In most congestion detection schemes for such networks, the affected node itself detects whether it is congested or not. The detection approach proposed in this paper performs detection with information estimators from neighbouring uncongested nodes that may be able to relieve the congestion...
The proliferation of web services and the wide choice of Web technologies has resulted in the increasing use of web browsers by service-oriented applications. To decrease the overloading of websites and thus make them more attractive for SOA applications, various solutions to deliver content and resources through web browsers are considered. Among existing approaches, WebRTC is used for the P2P content...
This paper investigates the multi-broker based network control and management paradigm for realizing scalable and cost-effective service provisioning in multi-domain software-defined optical networks. Experimental results verify the feasibility of the proposal and demonstrate ∼ 7.6× blocking reduction comparing with the conventional single-broker based solution.
The current Internet architecture follows a hostcentric communication model, intended for machine to machine connection and message passing. Modern Internet users are mainly interested in accessing information by name, irrespective of physical location. Information centric networking (ICN) was developed to rethink Internet foundations. Innetwork caching is one of the main features of ICN. Studying...
Software Defined Networks split the data plane from the control plane. They can be used in wireless networks and will bring flexibility, less interference, simple management, less energy consumption and load balancing. They can also improve service quality, handover and mobility between different service providers. In previous methods, when link states were changed the controller deleted the stored...
The economic operation of islanding microgrids is getting more and more attention. In view of the problems of information burden and high cost of communication, poor expansion in the centralized control, a fully distributed optimization method for the economic operation of islanding microgrids is proposed. The proposed method is decentralized based on the Gossip algorithm, in which only through exchanging...
In HPC applications, it is widely understood that in situ systems will play a significant role in next generation systems. The rate that next-generation leadership machines will be able to generate data will exceed the bandwidths of the planned I/O systems, leading to a need for in situ processing of the resulting data to reduce it. There have been a number of techniques proposed for in situ workflow...
Kademlia is a widely successful Distributed Hash Table (DHT) implementation, better known for its use in the BitTorrent protocol. In this paper, we revisit its overlay management separately from the DHT operations to allow it to be used with other distributed abstractions by providing an accurate and consistent view of the k-closest nodes to any given identifier. We then present invariants that avoid...
Next-generation 5G concepts are driving infrastructure providers to enable novel services for network operators, such as Virtual Network Function (VNF) and Network Function Virtualization (NFV). Inside a single infrastructure provider, several solutions are available to satisfy the 5G requirements using Software Defined Networking (SDN). However, emerging industry verticals require geographically-distributed...
A Bike Sharing System (BSS) may be modeled as a graph with two node types: stations with finite bike inventory subject to time-varying demand and intersections to represent the underlying transportation network. Mobile agents (replenishment trucks) travel on the arcs of the graph to reset station inventories and make routing decisions at intersections. One-way rides create inventory imbalances across...
High Performance Computing(HPC) applications are highly optimized to maximize allocated resources for the job such as compute resources, memory and storage. Optimal performance for MPI applications requires the best possible affinity across all the allocated resources. Typically, setting process affinity to compute resources is well defined, i.e MPI processes on a compute node have processor affinity...
The paper presents a study of the performance variations of the Bayesian model of peer-assessment implemented in OpenAnswer, in terms of the grades prediction accuracy. OpenAnswer (OA) models a peer assessment session as a Bayesian network. For each student, a sub-network contains variables describing relevant aspects of both the individual cognitive state and the state of the current assessment session...
In this paper, we propose an OpenFlow-assisted framework for P2P (peer-to-peer) live streaming, which incorporates an OpenFlow-assisted architecture and an OpenFlow-assisted algorithm. The architecture combines the characteristics and advantages of both BitTorrent system and OpenFlow network. The algorithm can dynamically calculate the path and corresponding available bandwidth for each flow according...
Overlay multicast is regarded as a promising way for distributing file or live stream during recent years. In this paper, we reinforce an optimal DAGs (directed acyclic graphs) construction algorithm by relaxing its partitioning and sorting conditions. We employ a realistic topology (CERNET2 backbone) to evaluate several typical types of optimal DAGs in terms of the underlay performance metrics. Simulation...
Encapsulation is one of the basic characteristics of object-oriented programming. However, the access modifiers provided by common object-oriented languages do not help much because they only encapsulate the member references rather than the objects pointed to by them. Bad encapsulation makes object-oriented programs difficult to understand and reason about, thus concealing potential software vulnerabilities...
Wireless communication presents the most attractive sign of development in this decades. It contributes to the appearance of Wireless Sensor Network (WSN) which is invented in order to increase the supervision capacity for such phenomenon. It gets more regard from both the customers and the research society. (WSNs) is composed from numerous wireless sensor nodes which suffer from a very serious energy...
Modern Intelligent Transport Systems are based on communications between different devices (fixed and/or mobile). As many communication solutions have appeared, and the bandwidth used is similar, the more crowded communications channels have become. For non-critical applications there are several convenient (common) solutions that must be considered, such as Wi-Fi, Bluetooth or ZigBee, that can ensure...
Broadcast is a fundamental operation in Mobile Ad-Hoc Networks (MANETs). A large variety of broadcast algorithms have been proposed. They differ in the way message forwarding between nodes is controlled, and in the level of information about the topology that this control requires. Deployment scenarios for MANETs vary widely, in particular in terms of nodes density and mobility. The choice of an algorithm...
We present a distributed self-adjusting algorithm for skip graphs that minimizes the average routing costs between arbitrary communication pairs by performing topological adaptation to the communication pattern. Our algorithm is fully decentralized, conforms to the CONGEST model (i.e. uses O(logn) bit messages), and requires O(logn) bits of memory for each node, where n is the total number of nodes...
Internet Protocol version 6 (IPv6) over Low power Wireless Personal Area Networks (6LoWPAN) is extensively used in wireless sensor networks (WSNs) due to its ability to transmit IPv6 packet with low bandwidth and limited resources. 6LoWPAN has several operations in each layer. Most existing security challenges are focused on the network layer, which is represented by its routing protocol for low-power...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.