Abstract With the motivation of seamlessly extending wireless sensor networks to the external environment, service-oriented architecture comes up as a promising solution. However, as sensor nodes are failure prone, this consequently renders the whole wireless sensor network to seriously faulty. When a particular node is faulty, the service on it should be migrated into those substitute sen…
Abstract Recent work on Information Centric Networking enables the exploitation of the caching resources of the new generation of routers [Content Routers (CR)]. So far, only a basic Least Recently Used strategy implemented on every CR has been proposed. In this paper, we introduce a cooperative caching strategy in the context of a Content-Centric-Network (CCN). This strategy has been designe…
Abstract Large-scale collaborative e-science requires fast and reliable data transfer with guaranteed performance, which is made possible by reserving bandwidth as needed in advance in high-performance networks. In scientific applications, users typically know the data size, the data available time, and the deadline to finish the data transfer, and they always wish to achieve the earliest pos…
Abstract Traffic classification is an important aspect in network operation and management, but challenging from a research perspective. During the last decade, several works have proposed different methods for traffic classification. Although most proposed methods achieve high accuracy, they present several practical limitations that hinder their actual deployment in production networks. …
Abstract An intermediate node in an inter-flow network coding scheme needs to know exactly which are the previous hop and next hop of a packet before coding. It is difficult to incorporate inter-flow network coding into opportunistic routing (OR) because the next hop of a packet in OR can’t be determined in advance. Coding-aware opportunistic routing (CAR) is proposed in this paper to ad…
Abstract A shared risk link group (SRLG) is a set of links which share a common risk of failure. Routing protocols in Generalized MultiProtocol Label Switching, using distributed SRLG information, can calculate paths avoiding certain SRLGs. For single SRLG failure an end-to-end SRLG-disjoint path pair can be calculated, but to ensure connection in the event of multiple SRLG failures a set …
Abstract Time synchronization is a fundamental requirement for many services provided by distributed systems. For this purpose, several time synchronization protocols have been proposed. However, they either achieve high accuracy by adding further network traffic, even more than common protocols such as network time protocol and precision time protocol, or consume a lot of time in addition…
Abstract Detection of abnormal internet traffic has become a significant area of research in network security. Due to its importance, many predictive models are designed by utilizing machine learning algorithms. The models are well designed to show high performances in detecting abnormal internet traffic behaviors. However, they may not guarantee reliable detection performances for new inc…
Abstract New kinds of services and data flows, such as cloud computing, server virtualization, or quality of service (QoS)-aware Internet services, have led to higher demands on network resources. Thus, they have also led to increased bandwidth consumption and unexpected congestion, especially in backbones. In this article a novel proposal is studied, with the aim of improving the performa…
Abstract RFID technology is the popular technology in recent years and applies to many automatic identification applications such as supply chain management, thief-prevention and so on. Supply chain system with the help of RFID system reduces the cost in business operation. Different members in the supply chain connect to the same RFID tag for acquiring their own data. Members can protect …
Abstract Availability of good quality monitoring data is a vital need for management of today’s data centers. However, effective use of monitoring tools demands an understanding of the monitoring requirements that system administrators most often lack. Instead of a well-defined process of defining a monitoring strategy, system administrators adopt a manual and intuition-based approach. I…
Abstract Conventionally, network migration models study competition between emerging and incumbent technologies by considering the resulting increase in revenue and associated cost of migration. We propose to advance the science in the existing network migration models by considering additional critical factors, including (1) synergistic relationships across multiple technologies, (2) redu…
Abstract Rapid growth in mobile communication and the proliferation of smartphones have drawn significant attention to location-based services (LBSs). One of the most important factors in the vitalization of LBSs is the accurate position estimation of a mobile device. The traditional global positioning system method has a critical weakness in terms of its limited availability, e.g., in ind…
Abstract Information Retrieval (IR) systems aim to retrieve data that satisfies certain requirements and constitute an important service in many types of networks, including Delay/Disruption Tolerant Networks (DTNs). In current DTN based IR systems, the data that satisfies a query is assumed to be stored on a single node. Therefore, once a node receives a query in which it has the correspo…
Abstract The classification of encrypted network traffic represents an important issue for network management and security tasks including quality of service, firewall enforcement, and security. Traffic classification becomes more challenging since the traditional techniques, such as port numbers or Deep Packet Inspection, are ineffective against Peer-to-Peer Voice over Internet Protocol (Vo…
Abstract A network coding based peer-to-peer (P2P) file sharing system has been proposed in recent years. It uses the random combination of encoded pieces to make the file sharing more effective. Most of the conventional P2P file sharing systems adopt a random (or rarest piece first) transmission policy to avoid too many duplicated pieces and rare pieces occurring in the network. Network c…