4,979 Hits in 3.7 sec

An overlay-network approach for distributed access to SRS

T. Fuhrmann, A. Schafferhans, T. Etzold
2003 CCGrid 2003. 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid, 2003. Proceedings.  
overlay-networks within which database queries can efficiently be routed.  ...  SRS is a widely used system for integrating biological databases. Currently, SRS relies only on locally provided copies of these databases.  ...  Overlay-formation Process The proposed mechanism employs a two-fold overlay for each database that is to be included into the distributed SRS: a replication overlay that distributes databases to the sites  ... 
doi:10.1109/ccgrid.2003.1199420 dblp:conf/ccgrid/FuhrmannSE03 fatcat:6p4ylzx4ivhjlfpjgpnjvbi5fy

Age of Information and Success Probability Analysis in Hybrid Spectrum Access-Based Massive Cognitive Radio Networks

Samuel Okegbile, Bodhaswar Maharaj
2021 Applied Sciences  
SUs first detect the state of the channel via channel sensing and select an appropriate channel access scheme (either underlay or overlay) for their transmissions based on the outcome of the channel sensing  ...  The obtained analyses offer an efficient way to understand the metrics of AoI, throughput and success probability in the hybrid spectrum access-based CRN.  ...  Acknowledgments: The authors will like to appreciate the contributions of Attahiru S. Alfa to this research work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11041940 fatcat:q5yxbi5ixvd4zp6hti5ehj6fzy

Resilient Routing Overlay Network Construction with Super-Relay Nodes

2017 KSII Transactions on Internet and Information Systems  
Overlay routing has emerged as a promising approach to improve reliability and efficiency of the Internet.  ...  Simulations based on a real ISP network and a synthetic Internet topology show that our approach can provide high-quality overlay routing service, while achieving good robustness.  ...  An infrastructure overlay network is deployed and maintained by the third party, which uses fixed nodes distributed in the Internet to facilitate overlay services.  ... 
doi:10.3837/tiis.2017.04.005 fatcat:fcdpzk5upnchxgh6md7cwx6itm

Overdrive an overlay-based geocast service for smart traffic applications

Bernhard Heep, Martin Florian, Johann Volz, Ingmar Baumgart
2013 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS)  
In contrast to other approaches, our overlay is specifically tailored towards supporting mobile nodes-vehicles connected via cellular networks-and leverages their speed and direction for optimizing peering  ...  At the same time, communication overhead is kept low, making OverDrive suitable for the use with cellular networks.  ...  The authors are responsible for the content.  ... 
doi:10.1109/wons.2013.6578313 dblp:conf/wons/HeepFVB13 fatcat:emnuv67lazg7nj2vbpvke6ieii

Optimal Power Allocation for Hybrid Overlay/Underlay Spectrum Sharing in Multiband Cognitive Radio Networks

Junni Zou, Hongkai Xiong, Dawei Wang, Chang Wen Chen
2013 IEEE Transactions on Vehicular Technology  
We employ a hybrid overlay/underlay spectrum sharing scheme, allowing the SU to adapt its way of accessing the licensed spectrum to the status of the primary user (PU).  ...  If the PU is detected to be idle at the selected channel, the SU works in an overlay mode; else, it works in spectrum underlay.  ...  In general, an SU has three spectrum sharing approaches: 1) Opportunistic spectrum access (also known as spectrum overlay) [4] , under which a SU accesses a band only when it is not being used by the  ... 
doi:10.1109/tvt.2012.2235152 fatcat:p6wxn52nzjhjdd3xkovpdhvdjy

Cognitive Non-Orthogonal Multiple Access with Cooperative Relaying: A New Wireless Frontier for 5G Spectrum Sharing [article]

Lu Lv, Jian Chen, Qiang Ni, Zhiguo Ding, Hai Jiang
2018 arXiv   pre-print
Three different cognitive NOMA architectures are presented, including underlay NOMA networks, overlay NOMA networks, and CR-inspired NOMA networks.  ...  For each cognitive NOMA architecture, our proposed cooperative relaying strategy shows its potential to significantly lower outage probabilities.  ...  (i.e., in an overlay mode).  ... 
arXiv:1801.04022v1 fatcat:i35md76srnhalm6e5qouuq656i

DHT-based localized service discovery in wireless mesh networks

Hanno Wirtz, Tobias Heer, Martin Serror, Klaus Wehrle
2012 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012)  
Wireless mesh networks (WMNs) provide highbandwidth wireless network access to mobile clients in extensible, robust multi-hop networks.  ...  In contrast, distributed hash tables (DHTs) offer consistent mapping of service and data identifiers to the providing devices and therefore allow a directed unicast discovery and access.  ...  We provide the result for accessing a service directly without any composition (Direct LR & SR) on each level for comparison.  ... 
doi:10.1109/mass.2012.6502498 dblp:conf/mass/WirtzHSW12 fatcat:v5au4wavubbgnd3trsptsywcvy

Ruta: Dis-aggregated routing system over multi-cloud [article]

Kevin Fang
2022 arXiv   pre-print
Over the years, the SDN evolution create multiple overlay technologies which is inefficient and hard to deploy end-to-end traffic engineering services, Ruta is designed as an unified encapsulation with  ...  access anywhere in the world over internet.  ...  Ruta separate the consistency requirement by using distributed path-calculation and segment routing to decouple overlay route information and linkstate, linecard could use partially linkstate db for path  ... 
arXiv:2112.08686v2 fatcat:xivsgiqnvzbw5gxjoc6frjujfa

Identity based architecture for secure communication in future internet

Antonio F. Gomez-Skarmeta, Pedro Martinez-Julia, Joao Girao, Amardeo Sarma
2010 Proceedings of the 6th ACM workshop on Digital identity management - DIM '10  
allows entities to address each other in an "identity to identity" approach.  ...  We use stackable overlay networks to deliver messages among communication parties and we look at the performance issues related with such kind of networks, being able to come halfway to the optimum.  ...  INITIAL RESULTS In order to get an approach of the behavior of the architecture working on top of a simple overlay network architecture, such as Chord [20] , we made an evaluation implementation to which  ... 
doi:10.1145/1866855.1866866 dblp:conf/dim/Gomez-SkarmetaMGS10 fatcat:wn2w6sbrdrgudg5n2h7ieyinxa

The Throughput Potential of Cognitive Radio: A Theoretical Perspective

Sudhir Srinivasa, Syed Ali Jafar
2006 2006 Fortieth Asilomar Conference on Signals, Systems and Computers  
Channel selection techniques for opportunistic access such as frequency hopping, frequency tracking and frequency coding are presented.  ...  to the duty cycle of the traffic arrivals.  ...  Since all the available power in the selfish approach is used for secondary transmissions, the C selfish overlay curves represent an upperbound on the secondary users capacity.  ... 
doi:10.1109/acssc.2006.356619 fatcat:h3z7e57lxzaptjvwwqxw3ltysq

MMC01-3: Shared Tree for Application-layer Multi-source Multicast

Juncheng Jia, Qian Zhang
2006 IEEE Global Communications Conference, Exhibition, & Industry Forum (GLOBECOM)  
Practically, we propose a distributed protocol for tree construction and tree refinement so as to approach the theoretical optimal.  ...  The simulation results manifest that our proposed heuristic protocol significantly increases the number of sources that can be served in multi-source sessions and the result approaches to the optimal solution  ...  In an end-system multicast approach participating peers organize themselves into an overlay topology and leverage unicast for data delivery.  ... 
doi:10.1109/glocom.2006.199 dblp:conf/globecom/JiaZ06 fatcat:tubngcdhhvd5bhq53hdgthdwsa

Spatial Throughput Characterization in Cognitive Radio Networks with Threshold-Based Opportunistic Spectrum Access

Xiaoshi Song, Changchuan Yin, Danpu Liu, Rui Zhang
2014 IEEE Journal on Selected Areas in Communications  
This paper studies the opportunistic spectrum access (OSA) of the secondary users in a large-scale overlay cognitive radio (CR) network.  ...  To measure the resulting transmission opportunity for the secondary users by the proposed OSA protocols, the concept of spatial opportunity, which is defined as the probability that an arbitrary location  ...  Lemma 5.1: For an overlay CR network with the PRA/PTA protocol, conditioned on a typical SR at the origin, Ψ Ts ra (r) and Υ Ts ta (r) are HPPPs with their respective densities given by ψ Ts ra (r) = μ  ... 
doi:10.1109/jsac.2014.1411rp05 fatcat:3qikexhf6vayzfx3y2lfzhxdxy

NGSON: features, state of the art, and realization

Seung-Ik Lee, Shin-Gak Kang
2012 IEEE Communications Magazine  
In the SON approach, an overlay network is built as a common infrastructure for delivery of multiple value-added services.  ...  To tackle this problem, the service overlay network (SON) [3] was introduced, which is employed as an intermediate layer to support creation and deployment of value-added Internet services over heterogeneous  ...  In the SON approach, an overlay network is built as a common infrastructure for delivery of multiple value-added services.  ... 
doi:10.1109/mcom.2012.6122533 fatcat:zmtchtawqnbjfgatpt7oefsb4u

DSO: Dependable Signing Overlay [chapter]

Guofei Gu, Prahlad Fogla, Wenke Lee, Douglas Blough
2006 Lecture Notes in Computer Science  
DSO utilizes structured P2P overlay routing techniques to provide timely services to legitimate clients. DSO is intended to be a scalable infrastructure for dependable digital signing service.  ...  While providing high fault-tolerance, existing approaches do not satisfy the high intrusion-tolerance requirement in the face of availability, confidentiality and integrity attacks.  ...  To take over any service, an attacker needs to randomly attack the nodes in the overlay network and hope for the best.  ... 
doi:10.1007/11767480_3 fatcat:hxxsdmcjnbacpi3lczol4o6mkm

A Robust Byzantine Fault-Tolerant Replication Technique for Peer-to-Peer Content Distribution

2011 Journal of Computer Science  
Approach: In the study, we wish to develop a robust Byzantine Fault-Tolerance Replication (BFTR) technique for peer-to-peer content distribution systems which contains fault detection and fault recovery  ...  Already we proposed a QoS based overlay network architecture (QIRM) involving an intelligent replica placement algorithm to improve the network utilization of the P2P system.  ...  We model the network with the help of access and overlay links. Each peer is connected with an asymmetric link to its access router.  ... 
doi:10.3844/jcssp.2011.159.166 fatcat:vfb342jbnnczjaqewupeciqks4
« Previous Showing results 1 — 15 out of 4,979 results