Search results for "Network packet"

showing 10 items of 160 documents

An Energy Saving Mechanism Based on Vacation Queuing Theory in Data Center Networks

2018

To satisfy the growing need for computing resources, data centers consume a huge amount of power which raises serious concerns regarding the scale of the energy consumption and wastage. One of the important reasons for such energy wastage relates to the redundancies. Redundancies are defined as the backup routing paths and unneeded active ports implemented for the sake of load balancing and fault tolerance. The energy loss may also be caused by the random nature of incoming packets forcing nodes to stay powered on all the times to await for incoming tasks. This paper proposes a re-architecturing of network devices to address energy wastage issue by consolidating the traffic arriving from di…

010302 applied physicsQueueing theorybusiness.industryComputer scienceNetwork packet020206 networking & telecommunicationsFault tolerance02 engineering and technologyEnergy consumptionData center networksLoad balancing (computing)01 natural sciencesNetworking hardwareBackupPower consumption0103 physical sciencesVacation queuing theory0202 electrical engineering electronic engineering information engineeringData centerbusinessComputer network
researchProduct

A Novel Fault-Tolerant Routing Algorithm for Mesh-of-Tree Based Network-on-Chips

2019

Use of bus architecture based communication with increasing processing elements in System-on-Chip (SoC) leads to severe degradation of performance and speed of the system. This bottleneck is overcome with the introduction of Network-on-Chips (NoCs). NoCs assist in communication between cores on a single chip using router based packet switching technique. Due to miniaturization, NoCs like every Integrated circuit is prone to different kinds of faults which can be transient, intermittent or permanent. A fault in any one component of such a crucial network can degrade performance leaving other components non-usable. This paper presents a novel Fault-Tolerant routing Algorithm for Mesh-of-Tree …

010302 applied physicsRouterNetwork packetbusiness.industryComputer scienceFault toleranceTopology (electrical circuits)Hardware_PERFORMANCEANDRELIABILITY02 engineering and technologyFault (power engineering)01 natural sciencesBottleneckPacket switching020204 information systems0103 physical sciencesHardware_INTEGRATEDCIRCUITS0202 electrical engineering electronic engineering information engineeringRouting (electronic design automation)businessComputer network
researchProduct

A Stochastic Routing Algorithm for Distributed IoT with Unreliable Wireless Links

2016

Punctual and reliable transmission of collected information is indispensable for many Internet of Things (IoT) applications. Such applications rely on IoT devices operating over wireless communication links which are intrinsically unreliable. Consequently to improve packet delivery success while reducing delivery delay is a challenging task for data transmission in the IoT. In this paper, we propose an improved distributed stochastic routing algorithm to increase packet delivery ratio and decrease delivery delay in IoT with unreliable communication links. We adopt the concept of absorbing Markov chain to model the network and evaluate the expected delivery ratio and expected delivery delay …

020203 distributed computingbusiness.industryComputer scienceNetwork packetDistributed computingReliability (computer networking)020206 networking & telecommunications02 engineering and technologyAbsorbing Markov chain0202 electrical engineering electronic engineering information engineeringWirelessRouting (electronic design automation)businessAlgorithmWireless sensor networkData transmissionComputer network2016 IEEE 83rd Vehicular Technology Conference (VTC Spring)
researchProduct

Reliable diagnostics using wireless sensor networks

2019

International audience; Monitoring activities in industry may require the use of wireless sensor networks, for instance due to difficult access or hostile environment. But it is well known that this type of networks has various limitations like the amount of disposable energy. Indeed, once a sensor node exhausts its resources, it will be dropped from the network, stopping so to forward information about maybe relevant features towards the sink. This will result in broken links and data loss which impacts the diagnostic accuracy at the sink level. It is therefore important to keep the network's monitoring service as long as possible by preserving the energy held by the nodes. As packet trans…

0209 industrial biotechnologyGeneral Computer ScienceComputer science[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]02 engineering and technologyData loss[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Network topology[SPI.AUTO]Engineering Sciences [physics]/Automatic[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingPrognostics and health management[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringAdaBoostElectroniquebusiness.industryNetwork packetGeneral Engineering[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationWireless sensor networksRandom forest[SPI.TRON]Engineering Sciences [physics]/Electronics[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Sensor node020201 artificial intelligence & image processing[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Gradient boosting[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkComputer networkComputers in Industry
researchProduct

Rough Set Theory for Optimization of Packet Management Mechanism in IP Routers

2020

Bandwidth and consequently optimum overall efficiency of network system relies greatly on mechanism of packet management in IP routers. Our research objective is to implement rough set theory to minimizing number of the network system attributes responsible for decision making in selection of those packets, which improve its transmission. Such an approach is called priority queuing system model, as we assign priority to the packets selected, following rough set theory. Regardless of the file format, for all the routers, packets are transmitted in sequence one-by-one. Nonetheless, quality of streaming data largely depends on how much the packet loss is minimized, or eliminated at all, if pos…

021103 operations researchNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBandwidth (signal processing)0211 other engineering and technologies02 engineering and technologySystem modelIPv6Set (abstract data type)Transmission (telecommunications)Packet lossRough setbusinessComputer network
researchProduct

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

2020

Malicious programs vary widely in their functionality, from key-logging to disk encryption. However, most malicious programs communicate with their operators, thus revealing themselves to various security tools. The security tools incorporated within an operating system are vulnerable to attacks due to the large attack surface of the operating system kernel and modules. We present a kernel module that demonstrates how kernel-mode access can be used to bypass any security mechanism that is implemented in kernel-mode. External security tools, like firewalls, lack important information about the origin of the intercepted packets, thus their filtering policy is usually insufficient to prevent c…

021110 strategic defence & security studiesSoftware_OPERATINGSYSTEMSNetwork securitybusiness.industryComputer scienceNetwork packet0211 other engineering and technologiesHypervisor02 engineering and technologyAttack surfaceComputer securitycomputer.software_genreOperator (computer programming)Trusted computing baseDisk encryptionKernel (image processing)020204 information systems0202 electrical engineering electronic engineering information engineeringbusinesscomputer
researchProduct

A Clustering approach for profiling LoRaWAN IoT devices

2019

Internet of Things (IoT) devices are starting to play a predominant role in our everyday life. Application systems like Amazon Echo and Google Home allow IoT devices to answer human requests, or trigger some alarms and perform suitable actions. In this scenario, any data information, related device and human interaction are stored in databases and can be used for future analysis and improve the system functionality. Also, IoT information related to the network level (wireless or wired) may be stored in databases and can be processed to improve the technology operation and to detect network anomalies. Acquired data can be also used for profiling operation, in order to group devices according…

050101 languages & linguisticsIoTComputer scienceIoT; LoRa; LoRaWAN; machine learning; k-means; anomaly detection; cluster analysisk-means02 engineering and technologyLoRaSilhouette0202 electrical engineering electronic engineering information engineeringProfiling (information science)Wireless0501 psychology and cognitive sciencesCluster analysisbusiness.industryNetwork packetSettore ING-INF/03 - Telecomunicazioni05 social sciencesk-means clusteringanomaly detectionLoRaWANmachine learning020201 artificial intelligence & image processingAnomaly detectionInternet of ThingsbusinessComputer networkcluster analysis
researchProduct

Observer-Based ${H}_{\infty }$ Control Design for Nonlinear Networked Control Systems with Limited Information

2013

Published version of an article in the journal: Abstract and Applied Analysis. Also available from the publisher at: http://dx.doi.org/10.1155/2013/604249 Open Access This paper is concerned with the problem of designing a robust observer-based H∞ controller for discrete-time networked systems with limited information. An improved networked control system model is proposed and the effects of random packet dropout, time-varying delay, and quantization are considered simultaneously. Based on the obtained model, a stability criterion is developed by constructing an appropriate Lyapunov-Krasovskii functional and sufficient conditions for the existence of a dynamic quantized output feedback cont…

Article SubjectStability criterionNetwork packetlcsh:MathematicsApplied MathematicsObserver (special relativity)Networked control systemlcsh:QA1-939VDP::Mathematics and natural science: 400::Mathematics: 410::Analysis: 411Quantization (physics)Nonlinear systemControl theoryControl systemObserver basedAnalysisMathematics
researchProduct

Hopfield Neural Network - Based Approach for Joint Dynamic Resource Allocation in Heterogeneous Wireless Networks

2006

This paper presents a comprehensive approach to solve the problem of joint dynamic resource allocation (JDRA) in heterogeneous wireless networks using a Hopfield neural network (HNN). A generic formulation for packet services with delay constraints is proposed to decide the optimal bit rate and radio access technology (RAT) allocation. Some illustrative simulations results in a basic scenario are presented to evaluate performance of the proposed algorithm.

Artificial neural networkComputer scienceWireless networkRadio access technologyNetwork packetDistributed computingBit rateResource allocationJoint (audio engineering)Dynamic resourceIEEE Vehicular Technology Conference
researchProduct

An Encrypted Traffic Classification Framework Based on Convolutional Neural Networks and Stacked Autoencoders

2020

In recent years, deep learning-based encrypted traffic classification has proven to be effective; especially, using neural networks to extract features from raw traffic to classify encrypted traffic. However, most of the neural networks need a fixed-sized input, so that the raw traffic need to be trimmed. This will cause the loss of some information; for example, we do not know the number of packets in a session. To solve these problems, a framework, which implements both a convolutional neural network (CNN) and a stacked autoencoder (SAE), is proposed in this paper. This framework uses a CNN to extract high-level features from raw network traffic and uses an SAE to encode the 26 statistica…

Artificial neural networkbusiness.industryNetwork packetComputer scienceDeep learningFeature extraction020206 networking & telecommunicationsPattern recognition02 engineering and technologyEncryptionAutoencoderConvolutional neural networkTraffic classification0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusiness2020 IEEE 6th International Conference on Computer and Communications (ICCC)
researchProduct