Search results for "Computer network"
showing 10 items of 1634 documents
An improvement of the batch-authentication and key agreement framework for P2P-based online social networks
2014
Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.
Efficient techniques for energy saving in data center networks
2018
Data centers are constructed with a huge number of network devices to support the expanding cloud based services. These devices are used to achieve the highest performance in case of full utilization of the network. However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a new approach to improve the efficiency of data centers in terms of energy consumption. Our approach exploits the correlation in time of the inter-node communication traffic and some topological features to maximize energy saving w…
Construction of Disjoint Virtual Backbones for Wireless Sensor Networks
2020
A wireless sensor network is a wireless network of sensors aimed at monitoring physical events. It has ingratiated itself into almost all areas of human endeavors. Data dissemination in these networks is quite challenging and is generally accomplished by flooding. But flooding introduces broadcast storm problem due from implosion and overlap. To overcome this, topology management can prescribe a virtual backbone network to which routing is confined. In this paper we propose an algorithm that constructs multiple disjoint virtual backbone networks, using only nodes' locations. The disjointedness makes routing more robust and the network exploitation energy efficient. Simulations show our algo…
Resource Allocation for Multi-Access Edge Computing with Fronthaul and Backhaul Constraints
2021
Edge computing is able to provide proximity solutions for the future wireless network to accommodate different types of devices with various computing service demands. Meanwhile, in order to provide ubiquitous connectivities to massive devices over a relatively large area, densely deploying remote radio head (RRH) is considered as a cost-efficient solution. In this work, we consider a vertical and heterogeneous multiaccess edge computing system. In the system, the RRHs are deployed for providing wireless access for the users and the edge node with computing capability can process the computation requests from the users. With the objective to minimize the total energy consumption for process…
Baseline port surveys for invasive marine species in the Northeastern Baltic
2006
Marine ecosystems around the world are being transformed and degraded by non-indigenous species, which affect the structure and function of the ecosystem, causing major ecological and economic implications. Ships have been recognized as a major vector for the introduction of non-indigenous harmful organisms, carrying them in ballast water tanks and sediments. Activities to prevent and mitigate the impact of invasive alien species have to be based on cooperation. Financed by Phare Cross Border Co-operation Programme in the Baltic Sea Region (2005–2006) Latvia together with Estonia will focus on baseline port surveys for non-indigenous species in the north-eastern part of the Baltic Sea.
A New Scalable and Cost-Effective Congestion Management Strategy for Lossless Multistage Interconnection Networks
2005
In this paper, we propose a new congestion management strategy for lossless multistage interconnection networks that scales as network size and/or link bandwidth increase. Instead of eliminating congestion, our strategy avoids performance degradation beyond the saturation point by eliminating the HOL blocking produced by congestion trees. This is achieved in a scalable manner by using separate queues for congested flows. These are dynamically allocated only when congestion arises, and deallocated when congestion subsides. Performance evaluation results show that our strategy responds to congestion immediately and completely eliminates the performance degradation produced by HOL blocking whi…
Congestion Avoidance Using DYnamic COdec MAnagement: A solution for ISP
2005
The large diffusion of VoIP is an essential key for the success of emerging Internet service providers. These ISPs conflict with the interests of historical and predominant network maintainers which often control the network infrastructure and telephone services. To win this competition, emerging ISPs have to adopt strategic QoS solutions which will capture the attention of network users and phone clients. This paper presents a solution which is able to obtain the same performance of a 64 Kbps channel reducing the costs for over-provisioning network bandwidth. DyCoMa is a mechanism studied for VoIP applications in network with a limited bandwidth for multimedia services. It works preventing…
Applicability of Interference Coordination in Highly Loaded HSUPA Network
2010
This paper evaluates the performance of highly loaded High Speed Uplink Packet Access (HSUPA) network with and without network wide static Interference Coordination (IC). IC alternates the priorities for user transmission periods throughout the network to achieve reduced interference levels and higher performance. A large variety of combinations including, e.g., different schedulers, cell center/edge user definitions (user splits) and interference targets are investigated in this paper. Performance is analyzed using a quasi-static system level simulator which is also used to support Third Generation Partnership Project (3GPP) standardization work. The simulator contains detailed and commonl…
Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless Sensor Network
2010
This paper proposes an advanced, robust and flexible solution that applies the (revised) concept of Always Best Connected (ABC) Network, typical of multimode modern mobile devices, to Wireless Sensor Network. Hostile environments and unpredictable conditions (e.g. interferences) can negatively affect communication range, potentially increasing the number of unconnected nodes in random deployments. Multimode Wireless Sensor Network (MM-WSN) is provided with an adaptive mechanism for environmental condition evaluation and with the ability of self-configuring itself for optimal networking independence of detected conditions. Proposed solution is based on advanced smart nodes provided with mult…
User-cell association in heterogenous small cell networks: A context-aware approach
2015
Deploying small cells to complement the traditional cellular networks is foreseen as a major feature of the next generation of wireless networks. In this paper, a novel approach for addressing the cell association problem in heterogenous small cell networks is proposed. The presented approach exploits different types of information extracted from the user devices and environment to improve the way in which users are assigned to their serving small cell base stations (SBSs). We formulate the problem within the framework of matching theory, where the players, namely the users and SBSs, have interdependent preferences over the members of the opposite set. We also utilize the fuzzy synthetic ev…