• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 60
Next 10 →

Strong performance guarantees for asynchronous crossbar schedulers

by Jonathan Turner - In IEEE INFOCOM , 2006
"... Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance guarantees now makes it possible to engineer systems that perform well, even under extreme traffic conditions. Until recent ..."
Abstract - Cited by 29 (3 self) - Add to MetaCart
Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance guarantees now makes it possible to engineer systems that perform well, even under extreme traffic conditions. Until

Network Border Patrol

by Célio Albuquerque, Brett J. Vickers, Tatsuya Suda
"... The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications which are unresponsive t ..."
Abstract - Cited by 18 (0 self) - Add to MetaCart
to network congestion. In this paper, we propose and investigate a new congestion avoidance mechanism called Network Border Patrol (NBP). NBP relies on the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network

AMES: A Framework For Fair Bandwidth Sharing

by Srinivasan Ramasubramanian, Sathya Parathasarathy, Arun K. Somani
"... Abstract—Fair bandwidth sharing has been an active research area since the early days of networking. Today’s networks employ packet dropping as the primary mechanism for reacting to congestion, while transport layer protocols are designed to adapt their rates based on the observed packet losses. Due ..."
Abstract - Add to MetaCart
Sharing (AMES), where every core router in the network employs linkspecific queuing, round-robin scheduling, and reacts to congestion by restricting the adjacent routers from transmitting, rather than dropping packets. The core-routers do not maintain any perflow information, nor perform any flow

Network Border Patrol: Preventing Congestion Collapse and Promoting Fairness in the Internet

by Célio Albuquerque, Brett J. Vickers, Tatsuya Suda , 2000
"... The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications that are unresponsive to ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
to network congestion. To address this flaw, we propose and investigate a novel congestion avoidance mechanism called Network Border Patrol (NBP). NBP relies on the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter

Restricted Injection Flow Control for  -ary ¡-cube Networks

by C Izu, C. Carrión, J. A. Gregorio, R. Beivide
"... The interconnection network is a critical component of a large parallel computer. Network throughput above saturation is an important parameter, because many parallel programs are either bandwidth-limited or bursty and work above the saturation point for significant periods of their execution time. ..."
Abstract - Add to MetaCart
resources. When applying these new mechanisms to a low dimensional ¤-ary ¥-cube network, such as the 2D torus, we obtain two families of routers which are evaluated by means of simulation. Varying the restriction level of the flow control policy has an immediate effect on the maximum network throughput

1 Security Architecture for Cluster based Ad Hoc Networks

by Preetida Vinayakray-jani, Sugata Sanyal
"... Abstract- Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks. Deploying security mechanisms is difficult due to inherent properties of ad hoc networks, such as the high dynamics of their topology, restricted bandwidth, and limited resources in end device. With such dynamicity in ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract- Mobile Ad hoc Networks (MANETs) are subject to various kinds of attacks. Deploying security mechanisms is difficult due to inherent properties of ad hoc networks, such as the high dynamics of their topology, restricted bandwidth, and limited resources in end device. With such dynamicity

A Proposal for a High-Performance Active Hardware Architecture

by Tilman Wolf, Tilman Wolf , 1999
"... Introduction Active networking is a new approach to generalize the capability of networks. By executing end user specified programs within the network, data packets can be handled in a customized way. This allows the easy introduction of new network layer protocols and applications without changing ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
changing components of the network infrastructure. [1] To implement an active network, traditional network routers have to be augmented by the capability to execute customized code, which goes beyond the common header processing and signaling. Currently, this is achieved by using workstations as routers

Prefix Forwarding for Publish/Subscribe

by Zbigniew Jerzak
"... We present a prefix forwarding algorithm for content-based publish/subscribe systems. Our algorithm performs only one content-based match per message regardless of the number of routers (hops) traversed from the source to the destination. Moreover, prefix forwarding preserves the decoupling properti ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
properties of publish/subscribe system. Prefix forwarding does not put any restriction on the content of the messages. The presented algorithm does not introduce any false negatives and allows to tune the false positive rate to balance the bandwidth and processing overheads. We provide experimental results

unknown title

by G. F. Ali Ahammed, Reshma Banu
"... Congestion is an important issue which researchers focus on in the Transmission Control Protocol (TCP) network environment. To keep the stability of the whole network, congestion control algorithms have been extensively studied. Queue management method employed by the routers is one of the important ..."
Abstract - Add to MetaCart
resource utilization, identifying and restricting disproportionate bandwidth usage, and their deployment complexity. We compare the performance of FRED, BLUE, SFB, and CHOKe based on simulation results, using RED and Drop Tail as the evaluation baseline. The characteristics of different algorithms are also

A time division beacon scheduling mechanism for IEEE 802.15.4/ZigBee cluster-tree wireless sensor networks

by Anis Koubâa, André Cunha, Mário Alves - in Proc. 19th Euromicro Conf. Real-Time Systems (ECRTS , 2007
"... While the IEEE 802.15.4/Zigbee protocol stack is being considered as a promising technology for low-cost low-power Wireless Sensor Networks (WSNs), several issues in their specifications are still open. One of those ambiguous issues is how to build a synchronized cluster-tree network, which is quite ..."
Abstract - Cited by 21 (2 self) - Add to MetaCart
is quite suitable for ensuring QoS support in WSNs. In fact, the current IEEE 802.15.4/Zigbee specifications restrict the synchronization in the beacon-enabled mode (by the generation of periodic beacon frames) to star-based networks, while they support multi-hop networking using the peer-to-peer mesh
Next 10 →
Results 11 - 20 of 60
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University