Based on QoS framework-SWAN, A gateway-centric adaptive QoS-aware multipath routing protocol (GC-AQMR) is presented. It can ensure that each mobile node has a set of link-disjoint and loop-free routing to the gateway....
详细信息
Based on QoS framework-SWAN, A gateway-centric adaptive QoS-aware multipath routing protocol (GC-AQMR) is presented. It can ensure that each mobile node has a set of link-disjoint and loop-free routing to the gateway. Moreover, the intermediate node in the path also has the multipath information to the gateway. When the intermediate node experiences the congestion or link-break, it can switch adaptively to an alternate path with the additional path information. Simulations have shown that the SWAN system adopting GC-AQMR outperforms the SWAN with AODV protocol on all the performance metrics: Packet delivery ratio, average end-to-end delay/throughput and the fairness among real-time flows.
Mobile ad hoc network (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastruct...
详细信息
Mobile ad hoc network (MANET) is a type of wireless network consisting of a set of self-configured mobile hosts that can communicate with each other using wireless links without the assistance of any fixed infrastructure. This has made it possible for us to create distributed mobile computing applications and has also brought several new challenges in the field of distributed algorithm design. Checkpointing is a well explored fault tolerance technique for the wired and cellular mobile networks. However, it is not directly applicable to MANET owing to its dynamic topology, limited availability of stable storage, partitioning and the absence of fixed infrastructure. In this paper, we propose an adaptive, coordinated and non-blocking checkpointing algorithm to provide fault tolerance in cluster-based MANET, where only a minimum number of mobile hosts in the cluster should take checkpoints. The performance analysis and simulation results show that the proposed scheme requires less coordinating-message cost and performs well compared to the related previous works. Copyright ? 2018 Inderscience Enterprises Ltd.
Data mining tools are widely used in computernetworks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The purpose of this study is to compare these two tools in ter...
详细信息
ISBN:
(纸本)9781665478250
Data mining tools are widely used in computernetworks. The well-known and mostly used tools to secure computers and network systems are WEKA and TANAGRA. The purpose of this study is to compare these two tools in terms of detection accuracy and computation time. This comparison was conducted using a well-known NSL-KDD dataset. Experiments show that TANAGRA achieves better results than WEKA in detection accuracy. But, TANAGRA is competitive with WEKA in terms of computation time.
The features used in many image analysis-based applications are frequently of very high dimension. Feature extraction offers several advantages in high-dimensional cases, and many recent studies have used multi-task f...
详细信息
Cloud computing is a suitable solution for professionals, companies, and institutions that need to have access to computational resources on demand. Clouds rely on proper management to provide such computational resou...
详细信息
Cloud computing is a suitable solution for professionals, companies, and institutions that need to have access to computational resources on demand. Clouds rely on proper management to provide such computational resources with adequate quality of service, which is established by Service Level Agreements (SLAs), to customers. In this context, cloud monitoring is a critical function to achieve such proper management. Cloud monitoring systems have to accomplish requirements to perform its functions properly, and currently, there are plenty of requirements which includes: timeliness, adaptability, comprehensiveness, and scalability. However, such requirements usually have mutual influence, which is positive or negative, among them-selves, and it has prevented the development of complete cloud monitoring solutions. This paper presents a mathematical model to predict the mutual influence between timeliness and scalability, which is a step forward in cloud monitoring because it paves the way for the development of complete monitoring solutions. It complements our previous work that identified the monitoring parameters (e.g., frequency sampling, amount of monitoring data) that influence timeliness and scalability. Evaluations present the effectiveness of the mathematical model based on a comparison of the results provided by the mathematical model and the results obtained via simulation.
暂无评论