The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software-defined networking (SDN) is one of the most debated topics in the modern IT industry. This networking concept implies that all network control functions are concentrated in a single logical center referred to as the SDN controller. This paper dwells upon the ways to reduce control traffic latency in the OpenFlow-based software-defined network. We have analyzed and classified the main latency...
Analysis of Network Intermediate Connectivity is one of the important and challenging issues in Vehicular Adhoc Network (VANET). Gradually, intermediate connectivity among the nodes becomes a popular interesting research paradigm in high mobility domain. It depends upon the movement pattern of the vehicles and the routing of packet transmission depends upon the connectivity of the nodes. Among the...
In this paper we discuss about 3 general issues on mesh topology in “networks on chip” (NOC): Utilizing multi-level mesh for delay reduction, using route by considering the mesh topology concept, and finally an optimal model of mesh topology named “multi-level mesh topology” which is defined based on 5-layer network model is suggested. In multi-level mesh topology we can see that this architecture...
Topology control is one of the key technologies in ad hoc network. Recently some topology control algorithms focus on reducing the end-to-end delay have been proposed. However, they do not consider the delay which is caused by contending for the shared channel and collision at MAC layer. In this paper, we put forward a new delay model to character the link delay which is composed by the transmission...
Multipath TCP is an extension to TCP protocol that allows a single connection to be split across multiple paths. MPTCP overcomes few limitations of TCP thereby offering added benefits like increased throughput and network resource utilization and resilience to possible link failures. Different data paths over the network face different end-to-end path delay. The performance of MPTCP is affected not...
Load balancing and delay optimizing play significant roles in improving network performance. However, in the current networks, only local load balance (LB) and mean delay optimization mechanisms are adopted, which ignore the jitter and the network's status. In this paper, a dynamic LB algorithm is proposed to optimize the network delay with a global view (LBGV). It makes a traffic distribution decision...
Content distribution schemes for Video on Demand (VoD) systems, based on the peer-to-peer (P2P) technology, have attracted more and more attention. Recently, people mainly focus on the latency performance, security, interaction, scalability, and so on. We propose a new network topology model — Similarity Crossed Cube(S-CQ for short), which combines with the feature of crossed cube and establishes...
In this paper, we investigate the topology boundary conditions in wireless mesh networks (WMNs) with focus on the maximum network diameter of such networks under different performance requirements. Specifically, we derive an end-to-end maximum node number upper bound, i.e., an upper bound on the network diameter as a function of end-to-end delay requirement, and an end-to-end maximum node number upper...
In this paper, we study the formation and update process of agent's opinion of view in the social network. Based on the Non-Bayesian learning model, we develop three kinds of social learning models: Static social network model with fixed delay; Random evolution of dynamic social network model; Deterministic evolution of dynamic social network model with fixed delay. By applying the algebraic graph...
A multi-frame Neighbor Discovery Protocol over a DTN network with RFID Devices is proposed. This protocol is based on a Sift-distribution (s-Persistent) in order to differentiate the access probability to slots among RFID devices. Moreover, our approach has been considered in a mono-frame and multi-frame scenario. Our s-Persistent approach is applied in a simulated test and in a real test-bed in order...
The limited capacity of batteries of nodes imposes a constraint on ad hoc networks. Thus, energy efficiency is critical to prolong the network lifetime. Network traffic should be routed such that the energy consumption is minimized. In this paper, we discuss the energy-efficient multicast problem in ad hoc networks with the respect of delay. Multicast routing deals with finding a multicast tree, which...
In this paper, we propose two adaptive algorithms to control Destination Advertisement Option (DAO) packet emissions in RPL non-storing mode: a centralized, or controlled by the DAG root, and a distributed. We propose new mechanisms to derive the most appropriate value for the DelayDAO Timer, a timer that determines how long a node should wait before transmitting its destination advertisement packet...
The paper describes a service model for cost-effective event reporting to clients over a wide-area network. The service provider (SP) maintains multiple protocol mechanisms to replicate the event pages at different proxy nodes of the distribution network. The mechanisms, which embody server-driven and client-driven replica update schemes to synchronize the page copies, reduce the access latency on...
MPLS-Traffic Engineering (MPLS-TE) provides many recovery mechanisms such as rerouting and protection. Existing one-to-one backup and path-based backup schemes are not resource efficient. We propose Common Protection Path (CPP), a novel protection scheme which selects a common protection path for traffic demands having the same ingress and egress routers. CPP also factors in path failure probability...
This paper studies the consensus among identical agents that are at most critically unstable and coupled through networks with uniform constant communication delay. An achievable upper bound of delay tolerance is obtained which explicitly depends on agent dynamics and network topology. The dependence on network topology disappears in the case of undirected networks. For any delay satisfying this upper...
Data processing tasks are increasingly spread across the internet to account for the spatially distributed nature of many data sources. In order to use network resources efficiently, subtasks need to be distributed in the network so data can be filtered close to the data sources. Previous approaches to this operator placement problem relied on various heuristics to constrain the complexity of the...
This paper studies the consensus among identical agents that are at most critically unstable and coupled through networks with uniform constant communication delay. An achievable upper bound of delay tolerance is obtained which explicitly depends on agent dynamics and network topology. The dependence on network topology disappears in the case of undirected networks. For any delay satisfying this upper...
Ad hoc On-demand Distance Vector (AODV) is one of reactive routing protocol in Mobile Ad hoc Network (MANET) and many variants are developed based on modifying this protocol. Purposes of modification were mostly related to security and performance improvement, yet the additional processes being introduced in the modification could incur overheads to the modified AODV. The purpose of this paper is...
Video-on-demand (VoD) is a rapidly growing method for viewing and sharing video content over the Internet. However, video on demand consumes a significant amount of bandwidth, forcing content publishers and content delivery networks to examine approaches such as the use of peer-to-peer (P2P) technologies to assist in video distribution. We study the performance impact of a peer localization strategy...
In smart metering systems, when the density of node is high or distance of communication range is large, the adjacent node number becomes large. If routing based on the number of hop from the sink node is used in such a network, the deviation of load will become large and it will shorten the network lifetime, also degrades other network performance. In this paper, we proposed the techniques solving...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.