The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Multipath inter-domain routing can solve many technical flaws which have been exposed in BGP, but the market-driven factors have more direct relationship with its deployment. In order to analyze impact of these market-driven elements, this paper established an optimization model for Internet service provider (ISP) revenues based on user's utility function. Then, the solution using Lagrange multiplier...
In this paper, we propose a scheme for improved performance of resource reservation and call admission control for cellular networks called Predictive User Mobility Behavior (PUMB) scheme. This algorithm is proposed in which bandwidth is allocated more efficiently to neighboring cells by key mobility parameters in order to provide Quality of Service (QoS) guarantees for transferring traffic. The cell...
Future trend in the development of communication network is the All-IP network, which provides mobile P2P network huge space for development. However, the P2P technology subverts the centralized control mode in traditional telecommunication system, so it makes traditional communication network billing control face a lot of difficulties. We propose a flow oriented billing model for mobile P2P network...
By development and the spread of a wireless technology,the mobile ad hoc network (Manet) that can be easily constructed only with mobile nodes is getting much attention.However, it is difficult to control the performance of the entire network appropriately, as a network consists of individual communication nodes operating autonomously and there is no device that controls the entire network. Recently,...
The main question of aggregated Multicast is how to match group to tree perfectly. In this paper, we present a new group-tree matching algorithm which is based on group-member matched group-tree matching algorithm, and here it is called GTBA algorithm. It is presented on the base of analyzing and concluding the traditional group-tree matching algorithms' advantages and disadvantages. The GTBA algorithm...
As technologies such as symmetrical multiprocessing (SMP) and multicore processor (MCP) advanced, more and more computational cores are contained in one node. Therefore, parallel applications running on a cluster can exchange data among processes through either intra-node or inter-node communication. This gives rise to the question of how much network bandwidth impact on parallel computing performance...
In this paper we study a reliable downloading algorithm for BitTorrent-like systems, and attest it in mathematics. BitTorrent-like systems have become immensely popular peer-to-peer file distribution tools in the Internet in recent years. We analyze them in theory and point out some of their limitations especially in reliability, and propose an algorithm to resolve these problems by using the redundant...
Constant rate transmission and transport (CRTT) is an effective bandwidth smoothing scheme resulting in one fixed rate during the whole duration of variable bit-rate video, which, however, needs a large client buffer size. The minimum buffer requirement (MBR) of CRTT, besides benefiting the design of some piecewise transmission scheme, can examine whether we can transmit the requested video with a...
uDAPL is portable and platform independent communication library, which provides RDMA as well as send/recv operations. Some well known software has attempted to take advantage of uDAPL's portability, such as Open MPI, MVAPICH2, Intel MPI, and Cluster OpenMP. However, network performance is still the bottleneck for those software. Engaging "multirail" network is a method to by-pass it. In...
With the rapid advance of computer and network technology, more and more applications are deployed in the customer-side network. These applications require different quality of service (QoS), but have to share a few bandwidth limited Internet connections. Owing to the IP network's best-effort delivery mechanism, the QoS requirements are hard to be satisfied. There have been plenty of QoS solutions...
Cognitive radio (CR) is an emerging technology in wireless access, aiming at vastly improving the way radio spectrum is utilized. Its basic idea is that a secondary user (unlicensed user) can be permitted to use licensed spectrum, provided that it does not interfere with any primary users (licensed users). CR technology enables the development of an intelligent and adaptive wireless communication...
Traffic anomaly detection is one of the most important technologies that should be considered in network security and administration. In this paper, we propose a traffic anomaly detection mechanism that includes traffic monitoring and traffic analysis. We develop an analytical system called WISE-Mon that inspects the traffic behavior by monitoring and analyzing the traffic. We establish a criterion...
The challenge of building secure memory is to realize highly efficient memory encryption and authentication without compromising security. For such purpose, each off-chip memory chunk, as well as its integrity code, is encrypted through OTP cipher. The encryption pads used by OTP cipher are deduced from unique counters, and the storage of counters is verified by hash tree. As counters cannot be tampered,...
Search indices for distributed information are an important building block for many mobile, decentralized applications. However, the network load caused by nodes registering their information in the index can become quite significant especially in mobile networks like vehicular ad-hoc networks (VANETs), where nodes need to register periodically due to their mobility. Our goal in this paper is to encode...
Finite element method is introduced to analyze the transmission characteristics of depressed trapezoidal-ridge waveguide in this paper, solves the cutoff wavelength of the dominant mode, bandwidth and field patterns of the typical model size, discussions the influence of the trapezoidal-ridge size on the transmission characteristics. Some numerical results and figures are presented.
In this paper, we establish a hidden 802.11 wireless channel, with the masking of the channel achieved by inserting intentional errors in the frame check sequence (FCS). We design a frame handler module to provide a proof-of-concept model of the side-channel using MATLAB and Simulink with communication toolbox. We justify using MATLAB over the other simulation tools because of its existing functions:...
GRAMMAR (EC FP7) is a project aiming to deliver IP for future Galileo mass market receivers. One of the outcomes of this project will be an advanced Galileo receiver prototype. In this paper we present the research for finding the optimal dual frequency option for a Galileo mass market receiver. We discuss the impact of multiple frequencies on baseband algorithms and the implementation issues of a...
Service-oriented architecture (SOA) provides the flexibility of dynamically composing business processes in enterprise computing. However, they must be enhanced to support real-time activities in future SOA applications such as media streaming, control applications, cyber-physical, and intelligent vehicle systems. In this paper, we present the RT-Llama SOA middleware to support predictability in real-time...
To ensure Quality of Service (QoS) for data centers, it is critical to enforce a fair share of storage resources between competing users. Interposed schedulers are one of the most practical methods for performance isolation. Most fair queuing-based proportional sharing algorithms for existing interposed scheduler are variants of counterparts designed for network routers and may result in breaking...
Multimedia applications are often characterised by implicit temporal constraints but, in many cases, they are not programmed using any specialised real-time API. These ??Legacy applications?? have no way to communicate their temporal constraints to the OS kernel, and their quality of service (QoS), being necessarily linked to the temporal behaviour, fails to satisfy acceptable standards. In this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.