Search results for "Network simulation"
showing 10 items of 29 documents
Hpdm : A Hybrid Pseudonym Distribution Method for Vehicular Ad-Hoc Networks
2016
Abstract Protecting the location privacy of drivers is still one of the main challenges in Vehicular Ad-hoc Networks (VANETs). The changing of pseudonym is commonly accepted as a solution to this problem. The pseudonyms represent fake vehicle identifiers. Roadside Units (RSUs) play a central role in the existing pseudonyms distribution solutions. Indeed, the VANET area should totally be covered by RSUs in order to satisfy the demand of vehicles in terms of pseudonyms. However, the total coverage is costly and hard to be achieved, especially in the first phase of VANETs deployment. In addition, RSUs could be overloaded due to the large number of pseudonyms requests that could be received fro…
Cost-Effective eHealth System Based on a Multi-Sensor System-on-Chip Platform and Data Fusion in Cloud for Sport Activity Monitoring
2018
eHealth systems provide medical support to users and contribute to the development of mobile and quality health care. They also provide results on the prevention and follow-up of diseases by monitoring health-status indicators and methodical data gathering in patients. Telematic management of health services by means of the Internet of Things provides immediate support and it is cheaper than conventional physical presence methods. Currently, wireless communications and sensor networks allow a person or group to be monitored remotely. The aim of this paper is to develop and assess a system for monitoring physiological parameters to be applied in different scenarios, such as health or sports.…
A Clustering Approach for Improving Network Performance in Heterogeneous Systems
2000
A lot of research has focused on solving the problem of computation-aware task scheduling on heterogeneous systems. In this paper, we propose a clustering algorithm that, given a network topology, provides a network partition adapted to the communication requirements of the applications running on the machine. Also, we propose a criterion to measure the quality of each one of the possible mappings of processes to processors based on that network partition. Evaluation results show that these proposals can greatly improve network performance, providing a basis of a communication-aware scheduling technique.
Incorporating Uncertainties into Traffic Simulators
2007
P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research
2006
Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…
Improving scalability of web applications based on stability of the network with the use of controller PI
2015
This paper presents mathematical model of a computer network and then the model has been presented in the form of a flow chart. RED algorithm is a standard in computer network. RED algorithm has been replaced with the PI controller. In the article it has been assumed that a computer network is a particular dynamic system and it can be examined using known methods of the theory of dynamic systems. We tested of stability for the real computer networks. This method is called method the uncertain parameters space.
Topology management in unstructured P2P networks using neural networks
2007
Resource discovery is an essential problem in peer-to-peer networks since there is no centralized index in which to look for information about resources. In a pure P2P network peers act as servers and clients at the same time and in the Gnutella network for example, peers know only their neighbors. In addition to developing different kinds of resource discovery algorithms, one approach is to study the different topologies or structures of the P2P network. In many cases topology management is based on either technical characteristics of the peers or their interests based on the previous resource queries. In this paper, we propose a topology management algorithm which does not predetermine fa…
Attracting sets in network regulatory theory
2016
Modern telecommunication networks are very complex and they should be able to deal with rapid and unpredictable changes in traffic flows. Virtual Network Topology is used to carry IP traffic over Wavelength-division multiplexing optical network. To use network resources in the most optimal way, there is a need for an algorithm, which will dynamically re-share resources among all devices in the particular network segment, based on links utilization between routers. Attractor selection mechanism could be used to dynamically control such Virtual Network Topology. The advantage of this algorithm is that it can adopt to very rapid, unknown and unpredictable changes in traffic flows. This mechani…
A Logical Architecture for Active Network Management
2006
This paper focuses on improving network management by exploiting the potential of “doing” of the Active Networks technology, together with the potential of “planning,” which is typical of the artificial intelligent systems. We propose a distributed multiagent architecture for Active Network management, which exploits the dynamic reasoning capabilities of the Situation Calculus in order to emulate the reactive behavior of a human expert to fault situations. The information related to network events is generated by programmable sensors deployed across the network. A logical entity collects this information, in order to merge it with general domain knowledge, with a view to identifying the roo…
VEF Traces: A Framework for Modelling MPI Traffic in Interconnection Network Simulators
2015
Simulation is often used to evaluate the behaviour and measure the performance of computing systems. Specifically, in high-performance interconnection networks, the simulation has been extensively considered to verify the behaviour of the network itself and to evaluate its performance. In this context, network simulation must be fed with network traffic, also referred to as network workload, whose nature has been traditionally synthetic. These workloads can be used for the purpose of driving studies on network performance, but often such workloads are not accurate enough if a realistic evaluation is pursued. For this reason, other non-synthetic workloads have gained popularity over last dec…