Search results for "Computer network"

showing 10 items of 1634 documents

An improvement of the batch-authentication and key agreement framework for P2P-based online social networks

2014

Batch authentication is the way to authenticate multiple users simultaneously to provide better efficiency. In [1], three batch authentication protocols are proposed based on different primitives, to provide simultaneous authentication of multiple users in online social networks (OSNs). In this paper, we briefly introduce the original protocols, describe their security vulnerabilities and related attacks, and propose modifications to make them secure again.

Authenticationbusiness.industryComputer scienceAuthentication protocolNetwork Access ControlData_MISCELLANEOUSChallenge–response authenticationEncryptionbusinessAKAComputer network2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)
researchProduct

Efficient techniques for energy saving in data center networks

2018

Data centers are constructed with a huge number of network devices to support the expanding cloud based services. These devices are used to achieve the highest performance in case of full utilization of the network. However, the peak capacity of the network is rarely reached. Consequently, many devices are set into idle state and cause a huge energy waste leading to a non-proportionality between the network load and the energy consumed. In this paper, we propose a new approach to improve the efficiency of data centers in terms of energy consumption. Our approach exploits the correlation in time of the inter-node communication traffic and some topological features to maximize energy saving w…

Average path lengthNetwork topologyComputer Networks and Communicationsbusiness.industryComputer scienceScalability020206 networking & telecommunicationsCloud computingData center network02 engineering and technologyEnergy consumptionData center network Network topology Average path length Energy consumption ScalabilityNetwork topologyAverage path lengthNetworking hardware020202 computer hardware & architectureEnergy consumptionScalability0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]Data centerbusinessEnergy (signal processing)Computer networkComputer Communications
researchProduct

Construction of Disjoint Virtual Backbones for Wireless Sensor Networks

2020

A wireless sensor network is a wireless network of sensors aimed at monitoring physical events. It has ingratiated itself into almost all areas of human endeavors. Data dissemination in these networks is quite challenging and is generally accomplished by flooding. But flooding introduces broadcast storm problem due from implosion and overlap. To overcome this, topology management can prescribe a virtual backbone network to which routing is confined. In this paper we propose an algorithm that constructs multiple disjoint virtual backbone networks, using only nodes' locations. The disjointedness makes routing more robust and the network exploitation energy efficient. Simulations show our algo…

Backbone networkWireless networkbusiness.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciences030204 cardiovascular system & hematologyConnected dominating setFlooding (computer networking)03 medical and health sciences[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0302 clinical medicine0502 economics and business050211 marketingRouting (electronic design automation)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Broadcast radiationbusinessWireless sensor networkDisseminationComputingMilieux_MISCELLANEOUSComputer network
researchProduct

Resource Allocation for Multi-Access Edge Computing with Fronthaul and Backhaul Constraints

2021

Edge computing is able to provide proximity solutions for the future wireless network to accommodate different types of devices with various computing service demands. Meanwhile, in order to provide ubiquitous connectivities to massive devices over a relatively large area, densely deploying remote radio head (RRH) is considered as a cost-efficient solution. In this work, we consider a vertical and heterogeneous multiaccess edge computing system. In the system, the RRHs are deployed for providing wireless access for the users and the edge node with computing capability can process the computation requests from the users. With the objective to minimize the total energy consumption for process…

Backhaul (telecommunications)Wireless networkComputer sciencebusiness.industryWirelessResource allocationResource managementEnergy consumptionbusinessRemote radio headEdge computingComputer network2021 17th International Symposium on Wireless Communication Systems (ISWCS)
researchProduct

Baseline port surveys for invasive marine species in the Northeastern Baltic

2006

Marine ecosystems around the world are being transformed and degraded by non-indigenous species, which affect the structure and function of the ecosystem, causing major ecological and economic implications. Ships have been recognized as a major vector for the introduction of non-indigenous harmful organisms, carrying them in ballast water tanks and sediments. Activities to prevent and mitigate the impact of invasive alien species have to be based on cooperation. Financed by Phare Cross Border Co-operation Programme in the Baltic Sea Region (2005–2006) Latvia together with Estonia will focus on baseline port surveys for non-indigenous species in the north-eastern part of the Baltic Sea.

Baltic seaEnvironmental protectionBaseline (sea)Environmental scienceMarine ecosystemEcosystemWater tanksAlien speciesPort (computer networking)Marine species2006 IEEE US/EU Baltic International Symposium
researchProduct

A New Scalable and Cost-Effective Congestion Management Strategy for Lossless Multistage Interconnection Networks

2005

In this paper, we propose a new congestion management strategy for lossless multistage interconnection networks that scales as network size and/or link bandwidth increase. Instead of eliminating congestion, our strategy avoids performance degradation beyond the saturation point by eliminating the HOL blocking produced by congestion trees. This is achieved in a scalable manner by using separate queues for congested flows. These are dynamically allocated only when congestion arises, and deallocated when congestion subsides. Performance evaluation results show that our strategy responds to congestion immediately and completely eliminates the performance degradation produced by HOL blocking whi…

Bandwidth managementQueueing theorybusiness.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMultistage interconnection networksBlocking (statistics)Network traffic controlNetwork congestionScalabilityBandwidth (computing)businessComputer network11th International Symposium on High-Performance Computer Architecture
researchProduct

Congestion Avoidance Using DYnamic COdec MAnagement: A solution for ISP

2005

The large diffusion of VoIP is an essential key for the success of emerging Internet service providers. These ISPs conflict with the interests of historical and predominant network maintainers which often control the network infrastructure and telephone services. To win this competition, emerging ISPs have to adopt strategic QoS solutions which will capture the attention of network users and phone clients. This paper presents a solution which is able to obtain the same performance of a 64 Kbps channel reducing the costs for over-provisioning network bandwidth. DyCoMa is a mechanism studied for VoIP applications in network with a limited bandwidth for multimedia services. It works preventing…

Bandwidth managementVoice over IPComputer sciencebusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSNetwork traffic controlNetwork congestionBandwidth allocationBandwidth (computing)CodecTelecommunicationsbusinessComputer network2005 Asia-Pacific Conference on Communications
researchProduct

Applicability of Interference Coordination in Highly Loaded HSUPA Network

2010

This paper evaluates the performance of highly loaded High Speed Uplink Packet Access (HSUPA) network with and without network wide static Interference Coordination (IC). IC alternates the priorities for user transmission periods throughout the network to achieve reduced interference levels and higher performance. A large variety of combinations including, e.g., different schedulers, cell center/edge user definitions (user splits) and interference targets are investigated in this paper. Performance is analyzed using a quasi-static system level simulator which is also used to support Third Generation Partnership Project (3GPP) standardization work. The simulator contains detailed and commonl…

Base stationEngineeringStandardizationTime-division multiplexingbusiness.industry3rd Generation Partnership Project 2Telecommunications linkFadingbusinessHigh-Speed Uplink Packet AccessScheduling (computing)Computer network2010 IEEE 71st Vehicular Technology Conference
researchProduct

Multimode WSN: Improving Robustness, Fault Tolerance and Performance of Randomly Deployed Wireless Sensor Network

2010

This paper proposes an advanced, robust and flexible solution that applies the (revised) concept of Always Best Connected (ABC) Network, typical of multimode modern mobile devices, to Wireless Sensor Network. Hostile environments and unpredictable conditions (e.g. interferences) can negatively affect communication range, potentially increasing the number of unconnected nodes in random deployments. Multimode Wireless Sensor Network (MM-WSN) is provided with an adaptive mechanism for environmental condition evaluation and with the ability of self-configuring itself for optimal networking independence of detected conditions. Proposed solution is based on advanced smart nodes provided with mult…

Base stationKey distribution in wireless sensor networksWireless ad hoc networkRobustness (computer science)business.industryComputer scienceDistributed computingMobile wireless sensor networkWirelessNetwork performancebusinessWireless sensor networkComputer network2010 2nd International Conference on Computational Intelligence, Communication Systems and Networks
researchProduct

User-cell association in heterogenous small cell networks: A context-aware approach

2015

Deploying small cells to complement the traditional cellular networks is foreseen as a major feature of the next generation of wireless networks. In this paper, a novel approach for addressing the cell association problem in heterogenous small cell networks is proposed. The presented approach exploits different types of information extracted from the user devices and environment to improve the way in which users are assigned to their serving small cell base stations (SBSs). We formulate the problem within the framework of matching theory, where the players, namely the users and SBSs, have interdependent preferences over the members of the opposite set. We also utilize the fuzzy synthetic ev…

Base stationMatching (statistics)Wireless networkComputer sciencebusiness.industryQuality of serviceDistributed computingCellular networkContext (language use)Small cellbusinessFuzzy logicComputer network2015 IEEE/CIC International Conference on Communications in China (ICCC)
researchProduct