Filters








31,717 Hits in 9.8 sec

Twofold control loop network-level congestion control

Andrea Calvagna, Giuseppe Tropea
2007 Transactions on Emerging Telecommunications Technologies  
Active monitoring of a network's congestion level can be coupled with network-level traffic control to maximise usage of bandwidth resources and avoid congestion.  ...  We present edge nodes and core nodes regulation algorithms, and show results of extensive tests done on a real implementation.  ...  ECN [17] also regulates bitrates at network edge routers, based on feedback from the core nodes, but the system is tailored to a pure DiffServ environment, and regulation is just for traffic aggregates  ... 
doi:10.1002/ett.1095 fatcat:hl4i42yuojg5li2gtqf2gwjovq

Coordinated modular functionality and prognostic potential of a heart failure biomarker-driven interaction network

Francisco Azuaje, Yvan Devaux, Daniel R Wagner
2010 BMC Systems Biology  
Putative biomarkers can, in general, be distinguished as "information traffic" mediators within this network.  ...  Results: We found that the structural and functional architecture of this PPI network is highly modular.  ...  This research was in part supported by the Société pour la Recherche sur les Maladies Cardiovasculaires, the Ministère de la Culture, de l'Enseignement Supérieur et de la Recherche, and the Fonds National  ... 
doi:10.1186/1752-0509-4-60 pmid:20462429 pmcid:PMC2890499 fatcat:razc6bssuvawjnrchwnst6ejlq

A framework for deterministic delay guarantee in OBS networks

Guoqiang Hu, Carla Raffaelli
2010 Photonic network communications  
It incorporates the deterministic delay model in the ingress edge node as well as in the SCUs of core nodes.  ...  In OBS networks, the delay of control packets in the switch control unit (SCU) of core nodes influences burst loss performance in the optical switching and should be constrained.  ...  Acknowledgments The study described in this article was carried out with the support of the BONE-project ("Building the Future Optical Network in Europe"), a Network of Excellence funded by the European  ... 
doi:10.1007/s11107-010-0268-9 fatcat:rgruutqbxbgwnhnwr2kftan5ki

Robust optical burst switching

A. Maach, Gv. Bochmann, H. Mouftah
2004 11th International Telecommunications Network Strategy and Planning Symposium. NETWORKS 2004,  
Simulation results also show that the retransmission technique is particularly suitable for metropolitan or local area network where the additional delay incurred by the retransmission is negligible.  ...  The simulation results indicate that this scheme can transform an optical burst switching to a robust burst forwarder.  ...  Using this information one could adjust the traffic at the edge nodes.  ... 
doi:10.1109/netwks.2004.241294 fatcat:q6vy5dzytzgxdbwmhqq5s3a2ym

Algorithm of Intelligent Urban Traffic

2019 Bulletin of V.N. Karazin Kharkiv National University, series «Mathematical modeling. Information technology. Automated control systems»  
Such regulation is carried out with a help of a computer program that takes into account the vehicle road situation at the intersection and the corresponding correction of the traffic lights signal phases  ...  At a second stage it is necessary to plan an optimal route for each vehicle using, for example, A*-algorithm and the spectrum of data received from an infrastructure of the urban network.  ...  The base of traffic regulation technology at the first phase is that an outgoing cell serves a separate regulated intersection.  ... 
doi:10.26565/2304-6201-2019-42-02 fatcat:3447pp2ehrbbbammcdxpq4xszm

Drug-target network in myocardial infarction reveals multiple side effects of unrelated drugs

Francisco J. Azuaje, Lu Zhang, Yvan Devaux, Daniel R. Wagner
2011 Scientific Reports  
We report a computational approach that combines different sources of drug and protein interaction information to assemble the myocardial infarction drug-target interactome network (My-DTome).  ...  We find evidence that these modules may be regulated by microRNAs with potential therapeutic roles in MI. Different drugs can jointly impact a module.  ...  Acknowledgements This work was supported by grants from the National Funds of Research, the Society for Research on Cardiovascular Diseases and the Ministry of Culture, Higher Education and Research of  ... 
doi:10.1038/srep00052 pmid:22355571 pmcid:PMC3216539 fatcat:cdvtihmtjfgerjrnictadbhmfu

Statistical Point-to-Set Edge-Based Quality of Service Provisioning [chapter]

Satish Raghunath, Shivkumar Kalyanaraman
2003 Lecture Notes in Computer Science  
The model is demonstrated to be parsimonious in parameters and completely implemented at the edge of the network.  ...  In this paper we propose an edge-based quality of service architecture aimed at site-to-site private networks over the Internet.  ...  Unlike existing work, we obtain bounds on per-path traffic statistics at the edge of the network exploiting the point-to-set model.  ... 
doi:10.1007/978-3-540-45188-4_14 fatcat:gpj3nvuwa5cnbjwgvwzc3xcada

Scalable monitoring support for resource management and service assurance

A. Asgari, R. Egan, P. Trimintzios, G. Pavlou
2004 IEEE Network  
Deployment of QoS-based value-added services in IP networks necessitates the employment of resource management techniques and specifically the use of traffic engineering.  ...  Continuous monitoring of network status and its resources are necessary to ensure proper network operation.  ...  The authors would like to thank their colleagues in the two projects, especially Mark Irons, for their useful contributions to the ideas presented in this article, and the anonymous reviewers for their  ... 
doi:10.1109/mnet.2004.1355030 fatcat:n64g76xdtzhb7lyx5duruxssra

Building Quality-of-Service Monitoring Systems for Traffic Engineering and Service Management

Abolghasem (Hamid) Asgari, Panos Trimintzios, Mark Irons, Richard Egan, George Pavlou
2003 Journal of Network and Systems Management  
Deployment of quality-of-service (QoS) based value-added services in IP networks necessitates the use of traffic engineering.  ...  Traffic engineering allows service providers to use the network resources efficiently, according to the different quality levels associated with the range of services they offer.  ...  The authors would like to thank their colleagues who participated in the TEQUILA project for the fruitful discussions, which have also contributed to the ideas presented in this article.  ... 
doi:10.1023/b:jons.0000005471.24268.d5 fatcat:qedfqrsapjgchnu622xfdq5ue4

The Burstiness Behavior of Regulated Flows in Networks [chapter]

Yu Ying, Ravi Mazumdar, Catherine Rosenberg, Fabrice Guillemin
2005 Lecture Notes in Computer Science  
In this paper we study the impact of statistical multiplexing on leaky-bucket regulated traffic streams as they pass through the network.  ...  In particular we show that the burstiness of a flow is randomized as it transits through the nodes with mean equal to its initial burstiness value at the ingress.  ...  These traffic processes are initially leakybucket regulated at the entrance of the network.  ... 
doi:10.1007/11422778_74 fatcat:iuvvvcwlhrdrvhamslvd4xdoqe

Efficient On-Line Traffic Policing for Confidence Level based Traffic Model

Lie Qian
2015 Transactions on Networks and Communications  
A state-dependent token bucket based statistical regulator was proposed to police the traffic using S-BIND parameters.  ...  Measurement-based admission control algorithms [3-6] measure the traffic condition in the network and estimate the QoS in the network with the new arriving traffic flows.  ...  After the new traffic is admitted, regulators need to be deployed at the ingress edge routers to ensure that the traffic behave as described in the admission control process Confidence-level-based Statistical  ... 
doi:10.14738/tnc.35.1446 fatcat:aoi35od33vbc7imequ6vpy2vbu

Dynamic Core Provisioning for Quantitative Differentiated Services

R.R.-F. Liao, A.T. Campbell
2004 IEEE/ACM Transactions on Networking  
Persistent service level violations are reported to the core provisioning algorithm, which dimensions traffic aggregates at the network ingress edge.  ...  The core provisioning algorithm is designed to address the difficult problem of provisioning DiffServ traffic aggregates (i.e., rate-control can only be exerted at the root of any traffic distribution  ...  ACKNOWLEDGMENTS This work is funded in part by a grant from the Intel Corporation for "Signaling Engine for Programmable IXA Networks".  ... 
doi:10.1109/tnet.2004.826292 fatcat:bup7ebuydrftbinjhxctzenpru

A Traffic Management Model for Virtual Private Network Links [chapter]

Leila Lamti
2000 IFIP Advances in Information and Communication Technology  
Some definitions are given in the following: Customer Edge Device: It is the edge device at the customer side that connects the LAN to the provider network.  ...  Provider Edge Device: It is the edge device at the provider side to which the customer edge device is connected. As for the customer edge device, it may be an IP router or an ATM switch.  ... 
doi:10.1007/978-0-387-35580-1_12 fatcat:vzvyim5c6nhh7o53mqmlz2j4xm

Discovering vesicle traffic network constraints by model checking

Ankit Shukla, Arnab Bhattacharyya, Lakshmanan Kuppusamy, Mandayam Srivas, Mukund Thattai, Yongtang Shi
2017 PLoS ONE  
These processes are regulated by specific molecular interactions, as summarized in the Rothman-Schekman-Sudhof model of vesicle traffic.  ...  What constraints must such a graph satisfy, if it is to represent a biologically realizable vesicle traffic network?  ...  By studying a large sample of randomly generated traffic rules, such analyses can make statistical claims about vesicle traffic.  ... 
doi:10.1371/journal.pone.0180692 pmid:28683137 pmcid:PMC5500374 fatcat:hvbd36a5bzdbzajsfx4wp7lqxy

Output power distributions of mobile radio base stations based on network measurements

D Colombi, B Thors, T Persson, N Wirén, L-E Larsson, C Törnevik
2013 IOP Conference Series: Materials Science and Engineering  
For the 3G network considered, direct measurements of output power levels were possible, while for the 2G networks, output power levels were estimated from measurements of traffic volumes.  ...  For high traffic hours, the 90 th percentile of the averaged output power was found to be below 65% and 45% of the available output power for the 2G and 3G systems, respectively.  ...  Both voice and data (GPRS+EDGE) traffic were included in the analysis.  ... 
doi:10.1088/1757-899x/44/1/012016 fatcat:chksn4svz5ewxmoegyninbxbb4
« Previous Showing results 1 — 15 out of 31,717 results