Results 11 - 20
of
60
Strong performance guarantees for asynchronous crossbar schedulers
- In IEEE INFOCOM
, 2006
"... Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance guarantees now makes it possible to engineer systems that perform well, even under extreme traffic conditions. Until recent ..."
Abstract
-
Cited by 29 (3 self)
- Add to MetaCart
Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance guarantees now makes it possible to engineer systems that perform well, even under extreme traffic conditions. Until
Network Border Patrol
"... The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications which are unresponsive t ..."
Abstract
-
Cited by 18 (0 self)
- Add to MetaCart
to network congestion. In this paper, we propose and investigate a new congestion avoidance mechanism called Network Border Patrol (NBP). NBP relies on the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network
AMES: A Framework For Fair Bandwidth Sharing
"... Abstract—Fair bandwidth sharing has been an active research area since the early days of networking. Today’s networks employ packet dropping as the primary mechanism for reacting to congestion, while transport layer protocols are designed to adapt their rates based on the observed packet losses. Due ..."
Abstract
- Add to MetaCart
Sharing (AMES), where every core router in the network employs linkspecific queuing, round-robin scheduling, and reacts to congestion by restricting the adjacent routers from transmitting, rather than dropping packets. The core-routers do not maintain any perflow information, nor perform any flow
Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet
, 2000
"... The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications that are unresponsive to ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
to network congestion. To address this flaw, we propose and investigate a novel congestion avoidance mechanism called Network Border Patrol (NBP). NBP relies on the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter
Restricted Injection Flow Control for -ary ¡-cube Networks
"... The interconnection network is a critical component of a large parallel computer. Network throughput above saturation is an important parameter, because many parallel programs are either bandwidth-limited or bursty and work above the saturation point for significant periods of their execution time. ..."
Abstract
- Add to MetaCart
resources. When applying these new mechanisms to a low dimensional ¤-ary ¥-cube network, such as the 2D torus, we obtain two families of routers which are evaluated by means of simulation. Varying the restriction level of the flow control policy has an immediate effect on the maximum network throughput
1 Security Architecture for Cluster based Ad Hoc Networks
"... Abstract- Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks. Deploying security mechanisms is difficult due to inherent properties of ad hoc networks, such as the high dynamics of their topology, restricted bandwidth, and limited resources in end device. With such dynamicity in ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract- Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks. Deploying security mechanisms is difficult due to inherent properties of ad hoc networks, such as the high dynamics of their topology, restricted bandwidth, and limited resources in end device. With such dynamicity
A Proposal for a High-Performance Active Hardware Architecture
, 1999
"... Introduction Active networking is a new approach to generalize the capability of networks. By executing end user specified programs within the network, data packets can be handled in a customized way. This allows the easy introduction of new network layer protocols and applications without changing ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
changing components of the network infrastructure. [1] To implement an active network, traditional network routers have to be augmented by the capability to execute customized code, which goes beyond the common header processing and signaling. Currently, this is achieved by using workstations as routers
Prefix Forwarding for Publish/Subscribe
"... We present a prefix forwarding algorithm for content-based publish/subscribe systems. Our algorithm performs only one content-based match per message regardless of the number of routers (hops) traversed from the source to the destination. Moreover, prefix forwarding preserves the decoupling properti ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
properties of publish/subscribe system. Prefix forwarding does not put any restriction on the content of the messages. The presented algorithm does not introduce any false negatives and allows to tune the false positive rate to balance the bandwidth and processing overheads. We provide experimental results
unknown title
"... Congestion is an important issue which researchers focus on in the Transmission Control Protocol (TCP) network environment. To keep the stability of the whole network, congestion control algorithms have been extensively studied. Queue management method employed by the routers is one of the important ..."
Abstract
- Add to MetaCart
resource utilization, identifying and restricting disproportionate bandwidth usage, and their deployment complexity. We compare the performance of FRED, BLUE, SFB, and CHOKe based on simulation results, using RED and Drop Tail as the evaluation baseline. The characteristics of different algorithms are also
A time division beacon scheduling mechanism for IEEE 802.15.4/ZigBee cluster-tree wireless sensor networks
- in Proc. 19th Euromicro Conf. Real-Time Systems (ECRTS
, 2007
"... While the IEEE 802.15.4/Zigbee protocol stack is being considered as a promising technology for low-cost low-power Wireless Sensor Networks (WSNs), several issues in their specifications are still open. One of those ambiguous issues is how to build a synchronized cluster-tree network, which is quite ..."
Abstract
-
Cited by 21 (2 self)
- Add to MetaCart
is quite suitable for ensuring QoS support in WSNs. In fact, the current IEEE 802.15.4/Zigbee specifications restrict the synchronization in the beacon-enabled mode (by the generation of periodic beacon frames) to star-based networks, while they support multi-hop networking using the peer-to-peer mesh
Results 11 - 20
of
60