Filters








407 Hits in 3.1 sec

TARA: Topology-Aware Resource Adaptation to Alleviate Congestion in Sensor Networks

Jaewon Kang, Yanyong Zhang, Badri Nath
2007 IEEE Transactions on Parallel and Distributed Systems  
In many cases, using traffic control can violate fidelity requirements.  ...  Unlike in traditional wired or other wireless counterparts, sensor network deployments provide elastic resource availability for satisfying the fidelity level required by applications.  ...  RELATED WORK Most of prior work have focused on traffic control. A guideline of congestion control in sensor networks was first given in [16] .  ... 
doi:10.1109/tpds.2007.1030 fatcat:wg7f6wyyqjffdnnerk4dlqghta

Reverse engineering the Internet

Neil Spring, David Wetherall, Thomas Anderson
2004 Computer communication review  
We argue that reverse engineering the Internet is feasible based on continuing improvements in measurement techniques, the potential to infer new properties from external measurements, and an accounting  ...  annotating a map of the Internet with properties such as: client populations, features and workloads; network ownership, capacity, connectivity, geography and routing policies; patterns of loss, congestion, failure  ...  Client location Clients create a demand for traffic.  ... 
doi:10.1145/972374.972376 fatcat:qjfyrpl5xbfdnbssypk7pgc5ga

Overlay Node Placement: Analysis, Algorithms and Impact on Applications

Sabyasachi Roy, Himabindu Pucha, Zheng Zhang, Y. Charlie Hu, Lili Qiu
2007 27th International Conference on Distributed Computing Systems (ICDCS '07)  
Over all client-server pairs, we registered 20269 loss incidences out of which 1648 were inferred as long term failures. 287 long term failures were concluded to be server failures, leaving us with 1361  ...  SOSR Failure recovery using overlay routing has been studied in Detour [1] and RON [2] .  ... 
doi:10.1109/icdcs.2007.127 dblp:conf/icdcs/RoyPZHQ07 fatcat:7vsz735bgbbgbggl2qxtdhh42q

A Survey of Fast-Recovery Mechanisms in Packet-Switched Networks

Marco Chiesa, Andrzej Kamisinski, Jacek Rak, Gabor Retvari, Stefan Schmid
2021 IEEE Communications Surveys and Tutorials  
While reactions to failures in the data plane can be significantly faster compared to control plane mechanisms, implementing fast recovery in the data plane is challenging, and has recently received much  ...  ACKNOWLEDGMENT The authors would like to thank Thomas Holterbach, James Kempf, Michael Menth, Daniel Merling, Ankit Singla, and Laurent Vanbever for their insightful comments received on the paper draft  ...  preplanned detour after a failure.  ... 
doi:10.1109/comst.2021.3063980 fatcat:t6z3ph7d6vhvjerxhgx2kh762u

One tunnel is (often) enough

Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas Anderson, Arvind Krishnamurthy
2014 Proceedings of the 2014 ACM conference on SIGCOMM - SIGCOMM '14  
We evaluate its performance and failure recovery properties in both simulation and live settings.  ...  This is especially relevant as the Internet is increasingly used for applications where correct and continuous operation is essential.  ...  More importantly, a number of technology trends have converged to merit a fresh look at Detour-like systems for addressing Internet reliability: • Large-scale ISPs have deployed sophisticated traffic and  ... 
doi:10.1145/2619239.2626318 dblp:conf/sigcomm/PeterJZWAK14 fatcat:hrmnil3acvadbfeoulsxnzbmhq

One tunnel is (often) enough

Simon Peter, Umar Javed, Qiao Zhang, Doug Woos, Thomas Anderson, Arvind Krishnamurthy
2014 Computer communication review  
We evaluate its performance and failure recovery properties in both simulation and live settings.  ...  This is especially relevant as the Internet is increasingly used for applications where correct and continuous operation is essential.  ...  More importantly, a number of technology trends have converged to merit a fresh look at Detour-like systems for addressing Internet reliability: • Large-scale ISPs have deployed sophisticated traffic and  ... 
doi:10.1145/2740070.2626318 fatcat:tcw3xa2dejg3livk4lq2op53s4

SafeGuard

Ang Li, Xiaowei Yang, David Wetherall
2009 Proceedings of the 5th international conference on Emerging networking experiments and technologies - CoNEXT '09  
We show that this simple design enables routers to detect path inconsistencies during route changes and resolve on a working path for anticipated failure and restoration scenarios.  ...  The results show that SafeGuard converges faster than a state-of-the-art IP fast restoration mechanism and reduces periods of disruption to a minimal duration, i.e., the failure detection time.  ...  We thank Landon Cox, Srihari Nelakuditi, and the anonymous reviewers for their helpful feedback and suggestions.  ... 
doi:10.1145/1658939.1658974 dblp:conf/conext/LiYW09 fatcat:ldoavgbarrbkhbxjhkijw3j23i

Forecasting the Impact of IXP Outages Using Anycast

Leandro M. Bertholdo, João M. Ceron, Lisandro Z. Granville, Roland Van Rijswijk-Deij
2021 Zenodo  
They provide an infrastructure for traffic exchange, attracting Internet Service Providers (ISPs), Content Delivery Networks (CDNs) and cloud providers, leading to a plethora of options for network operators  ...  We deployed an anycast infrastructure to connect to major IXPs, simulate outages, and map the impact of such failures.  ...  In [40], who showed African traffic detouring through Europe.  ... 
doi:10.5281/zenodo.5793242 fatcat:uxnxgbvrmbaxboc3wlefyaxdmq

Analysis on ideal network structures to improve reliability by multi-path and multi-homing BGP routing in the Internet

Hiroshi Fujinoki
2009 2009 International Conference on Ultra Modern Telecommunications & Workshops  
The multi-homing configurations of degree three improved the reliability up to 50% for link failure rate up to 50% compared to degree of two in our analyses.  ...  The goal of this project is to find properties for the ideal network structure that maximizes the advantage of multipath and multi-home routing.  ...  It is responsible also for reliability in a sense that ongoing transmissions will be sustained by detouring them through alternative routes if some of the links are down.  ... 
doi:10.1109/icumt.2009.5345518 dblp:conf/icumt/Fujinoki09 fatcat:fgmrolug4fedxfogkuz4vb3r4m

Scotch

An Wang, Yang Guo, Fang Hao, T.V. Lakshman, Songqing Chen
2014 Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies - CoNEXT '14  
This can cause performance degradation if the switch has to handle a high traffic load, as for instance due to flash crowds or DDoS attacks.  ...  ., DDoS attacks) traffic surge.  ...  The authors thank anonymous reviewers for their constructive comments. Yang Guo would like to thank Muralidharan Kodialam for helpful discussions.  ... 
doi:10.1145/2674005.2675002 dblp:conf/conext/WangGHLC14 fatcat:hyftekm42fcydnwlxelytw2ywe

IP fast reroute with remote Loop-Free Alternates: The unit link cost case

Levente Csikor, Gabor Retvari
2012 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems  
Unfortunately, LFA cannot provide protection for all possible failure cases in general.  ...  Up to not so long ago, Loop-Free Alternates (LFA) was the only viable option for providing fast protection in pure IP and MPLS/LDP networks.  ...  Note that the tunnelled traffic is restricted to shortest paths just like "normal" traffic, hence the tunnel must avoid the failure as well.  ... 
doi:10.1109/icumt.2012.6459750 dblp:conf/icumt/CsikorR12 fatcat:gujjezr56zbv7fsvhkl46qn5lm

What's (Not) Validating Network Paths: A Survey [article]

Kai Bu, Yutian Yang, Avery Laird, Jiaqing Luo, Yingjiu Li, Kui Ren
2018 arXiv   pre-print
Validating network paths taken by packets is critical for a secure Internet architecture.  ...  Due likely to a long-standing confusion between routing and forwarding, only limited solutions for path validation exist in the literature.  ...  The authors would also like to thank Editors and Reviewers of ACM Computing Surveys in advance for their review efforts and helpful feedback.  ... 
arXiv:1804.03385v2 fatcat:u7xza25eqzddbnjatqfnd4sxoe

Cooperative Driving in Mixed Traffic: An Infrastructure-assisted Approach

Rahi Avinash Shet, Shengyue Yao
2021 IEEE Open Journal of Intelligent Transportation Systems  
The simulation results revealed that the HL strategy makes it feasible for CAVs to drive in automated mode in an urban mixed traffic network, while its performance relies on the CAV penetration rate and  ...  Automated driving in urban traffic requires extensive information from the surroundings.  ...  Among the failed merging cases, the merging was aborted at 0.47s for the fastest case and after 70s for the worst case. These merging failures can be inferred with different causes.  ... 
doi:10.1109/ojits.2021.3125740 fatcat:q53l6g7f6zbwrn6haltwabp2ay

AN ANALYTICAL APPROACH TO THE SAFETY OF ROAD NETWORKS

ENRICO ZIO, GIOVANNI SANSAVINI, ROBERTO MAJA, GIOVANNA MARCHIONNI
2008 International Journal of Reliability, Quality and Safety Engineering (IJRQSE)  
Vulnerability analysis Further insights in the properties of the road network of Figure 1 can be inferred from an analysis of the most vulnerable road sections, i.e. those edges most crucial for the  ...  As for the multiplicative factor α ij accounting for the traffic flow intensity c ij on link ij, it is given by: A limitation of the proposed model is that no relation is accounted for between travel  ... 
doi:10.1142/s0218539308002939 fatcat:2u27ecffbbbhties55wk4yqrqq

On providing fast protection with remote loop-free alternates

Levente Csikor, Gábor Rétvári
2015 Telecommunications Systems  
Unfortunately, LFA cannot provide protection for all possible failure cases in general.  ...  as well as to find optimization methods to tweak a network for 100% rLFA coverage.  ...  Note that the tunnelled traffic is restricted to shortest paths just like "normal" traffic, hence the tunnel must avoid the failure as well.  ... 
doi:10.1007/s11235-015-0006-9 fatcat:3kegteoyhve65c6ugeuu3e6y4q
« Previous Showing results 1 — 15 out of 407 results