Filters








2,376 Hits in 7.3 sec

Enforcing Customizable Consistency Properties in Software-Defined Networks

Wenxuan Zhou, Dong (Kevin) Jin, Jason Croft, Matthew Caesar, Philip Brighten Godfrey
2015 Symposium on Networked Systems Design and Implementation  
when necessary.  ...  We show a large class of consistency policies are guaranteed by this greedy heuristic alone; in addition, CCG makes judicious use of existing heavier-weight network update mechanisms to provide guarantees  ...  A common characteristic of such properties is that flows are required to traverse a set of waypoints. Definition 2.  ... 
dblp:conf/nsdi/ZhouJCCG15 fatcat:vg5q3dtxjbgnpkcjd7brl5tk4y

Exploring the Boundaries of Robust Stability Under Uncertain Communication: An NCS Toolbox Applied to a Wireless Control Setup

2014 IEEE Control Systems  
the stability analysis procedure.  ...  Truetime and Jitterbug provide the control engineer with necessary answers to questions related to designing control systems that operate reliably under uncertain communication.  ... 
doi:10.1109/mcs.2014.2320394 fatcat:ggplrmzd4vb77ojns2k5xa5gna

Internet performance monitoring

T.M. Chen, L. Hu
2002 Proceedings of the IEEE  
At each protocol layer, the strengths and limitations of the methods are highlighted. Finally, issues and challenges for future research are reviewed.  ...  The tools and methods are discussed according to their protocol layer, starting from the network layer (ATM, MPLS) to IP/ICMP and transport/application layers.  ...  ACKNOWLEDGMENT The authors are deeply indebted to the liaison editor, Prof. B.  ... 
doi:10.1109/jproc.2002.802006 fatcat:nj6c4qljjbccvpymmwv5qodmau

Bandwidth Estimation Algorithms For The Dynamic Adaptation Of Voice Codec

Davide Pierattoni, Ivan Macor, Pier Luca Montessoro
2009 Zenodo  
In the recent years multimedia traffic and in particular VoIP services are growing dramatically.  ...  The promising results obtained during the experimental validation of the algorithm are now the basis for the extension towards a larger set of multimedia services and the integration of our methodology  ...  The diffusion of high speed connections allowed a massive switch to packet telephone calls, which are carried on IP networks that were suited for data transmission.  ... 
doi:10.5281/zenodo.1330489 fatcat:iwnhlj6n5fd6ppg77imqlnxc6e

Charging for packet-switched network communication—motivation and overview

M. Karsten, J. Schmitt, B. Stiller, L. Wolf
2000 Computer Communications  
Packet-switched network technology is expected to form the integration layer for future multi-service networks.  ...  The tools upon which DiffServ builds are mainly network design/engineering and traffic policing or shaping.  ...  Conclusions Many issues in the area of charging for packet-switched networks, particularly the Internet, remain open for further research as can be concluded from many uncertain matters addressed in this  ... 
doi:10.1016/s0140-3664(99)00181-4 fatcat:ckklszuh6re3vcqbmin3mzueza

Reducing the Impact of Uncertainties in Networked Control Systems Using Type-2 Fuzzy Logic

Blaho Michal, Murgaš J´n, Viszus Eugen, Fodrek Peter
2015 Journal of Electrical Engineering  
There are several ways of dealing with the time delays and packet losses in NCS, but only a few authors have ever used type-2 fuzzy controllers for this purpose to our knowledge.  ...  It is presented that this approach can be successfully used to decrease the effects of time delays and packet losses.  ...  Packet loss in the network usually occurs when the signal on the medium is distorted (interference, deffective medium), when the network is overloaded, the data packets are defective, or some of the network  ... 
doi:10.2478/jee-2014-0059 fatcat:otpuw2a2ijhgzmp2d7hloawxdm

A Survey on Network Verification and Testing with Formal Methods: Approaches and Challenges

Yahui Li, Xia Yin, Zhiliang Wang, Jiangyuan Yao, Xingang Shi, Jianping Wu, Han Zhang, Qing Wang
2018 IEEE Communications Surveys and Tutorials  
Network operators need to ensure that their policies are correctly implemented.  ...  Rules in switch S B and switch S C are similarly defined. r A1 on switch R A forwards packets whose destination ip are 192.168.1.0/24 via port p a0 .  ...  Both model checkers, symbolic execution engines and SAT/SMT solvers provide one counterexample when invariant violation occurs.  ... 
doi:10.1109/comst.2018.2868050 fatcat:h3op4heca5d75bpokfsbfevnwe

A new method of encryption wireless energy transmission for EV in the smart grid

Li Ji, Lifang Wang, Chenglin Liao
2017 China Electrotechnical Society Transactions on Electrical Machines and Systems  
Because the energy requirement is time-varying and uncertain, the switch noise is nondeterministic white noise.  ...  waiting for the confirm information from the smart grid side. (2) The second step(the second handshake): Smart grid side receives syn packets, and confirm the customer SYN, and send a SYN packet, that  ... 
doi:10.23919/tems.2017.8241362 fatcat:yjk5pzccmzex5nplkeos2kadci

Low power network on chip architectures: A survey

Muhammad Raza Naqvi
2020 Computer Science and Information Technologies  
In this architecture the packets neglect the meeting to routers are switched off by changing their subnet.  ...  When SST-RAM are superior in Virtual channels are control when its harsh [4] .  ... 
doi:10.11591/csit.v2i3.p158-168 fatcat:rzmirvcyxfao7pu3k2nxsjmhzy

An extensible probe architecture for network protocol performance measurement

David Watson, G. Robert Malan, Farnam Jahanian
2003 Software, Practice & Experience  
To demonstrate Windmill's utility, the results from several experiments are presented.  ...  Windmill is split into three functional components: a dynamically compiled Windmill Protocol Filter (WPF), a set of abstract protocol modules, and an extensible experiment engine.  ...  Additionally, the TCP module exports a peek interface to the byte stream for use when the number or type of data on the stream is uncertain.  ... 
doi:10.1002/spe.557 fatcat:zq7u57eeazcbbbxjklvndu7f24

An extensible probe architecture for network protocol performance measurement

G. Robert Malan, Farnam Jahanian
1998 Computer communication review  
To demonstrate Windmill's utility, the results from several experiments are presented.  ...  Windmill is split into three functional components: a dynamically compiled Windmill Protocol Filter (WPF), a set of abstract protocol modules, and an extensible experiment engine.  ...  Additionally, the TCP module exports a peek interface to the byte stream for use when the number or type of data on the stream is uncertain.  ... 
doi:10.1145/285243.285284 fatcat:2dwe253ztbb6zddx4h7ngbbtfm

An extensible probe architecture for network protocol performance measurement

G. Robert Malan, Farnam Jahanian
1998 Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication - SIGCOMM '98  
To demonstrate Windmill's utility, the results from several experiments are presented.  ...  Windmill is split into three functional components: a dynamically compiled Windmill Protocol Filter (WPF), a set of abstract protocol modules, and an extensible experiment engine.  ...  Additionally, the TCP module exports a peek interface to the byte stream for use when the number or type of data on the stream is uncertain.  ... 
doi:10.1145/285237.285284 dblp:conf/sigcomm/MalanJ98 fatcat:u33l2bj6djbapbgy75gzvccgyi

REMO: Resource efficient distributed network monitoring

Tao Li, Hani Salah, Mu He, Thorsten Strufe, Silvia Santini
2018 NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium  
-Ing.)" mit dem Titel Conserve and Protect Resources in Software-Defined Networking via the Traffic Engineering Approach selbstständig und ohne unzulässige Hilfe Dritter verfasst habe.  ...  Then, the procedure inspects each switch on the identified shortest paths to check whether it can be used to duplicate the flow packets.  ...  Other unmatched flow packets are considered legitimate, and they are sent back to the switch via another port and will trigger packet _ in messages.  ... 
doi:10.1109/noms.2018.8406239 dblp:conf/noms/LiSHSS18 fatcat:4l5kgd46hfcjtjjv7a7apjtba4

Integrated fuzzy filter for distribution outage information

Yan Liu, Noel N Schulz
2002 Electric power systems research  
In many distribution management systems, customer trouble calls have been used as the main data source for low-level outage handling.  ...  Increased distribution SCADA and recent developments in automated meter reading (AMR) systems are providing more metering information about the distribution system below the feeder breaker.  ...  This test case has 25 customers under 6 distribution transformers. All the customers, transformers and fuses are supplied through switch "SW01".  ... 
doi:10.1016/s0378-7796(02)00101-3 fatcat:2l2a6tmkanbunmxxwrlua6j6d4

Pricing for QoS-enabled networks: A survey

Luiz A. DaSilva
2000 IEEE Communications Surveys and Tutorials  
a network expense that is uncertain.  ...  They introduce the concept of smart market pricing, where, prior to transmission, users inform the network of how much they are willing to pay for the transmission of a packet; packets are admitted if  ...  He teaches computer engineering and communications courses and is active in asynchronous and distance learning. He also conducts research at Virginia Tech's Alexandria Research Institute.  ... 
doi:10.1109/comst.2000.5340797 fatcat:n3w2gslupfgbvaouhfbob7rnv4
« Previous Showing results 1 — 15 out of 2,376 results