The efficient transmission of TCP traffic over OBS networks is a challenging problem, due to the high sensitivity of TCP congestion control mechanism to losses. In this work, we propose solutions to this problem, thro...
详细信息
The efficient transmission of TCP traffic over OBS networks is a challenging problem, due to the high sensitivity of TCP congestion control mechanism to losses. In this work, we propose solutions to this problem, through the burst assembly and scheduling mechanism of OBS. We investigate and propose algorithms to achieve performance enhancements for TCP traffic by taking into account TCP state information. We prove our claims with references to well-established TCP models, and validate the proposed algorithms through simulations.
A corporate network consists of many individual network security components. Firewall, active directory, and IDS are some examples of these components. Each network security component has its own high level security p...
详细信息
ISBN:
(纸本)9780791802977
A corporate network consists of many individual network security components. Firewall, active directory, and IDS are some examples of these components. Each network security component has its own high level security policy which is translated into low level security mechanisms. There is a wide gap between high level and low level representation of security policy making enforcement of high level security policy faces some essential difficulties. Consistency, verification, and maintenance are the major ones of these difficulties. One approach to overcome these difficulties is to present security policy in an intermediate level and then automate the translation of the intermediate level security policy into low level security mechanisms. Extended Organization Based Access control (EOrBAC) model is valuable step towards introducing this intermediate level. One of the major advantages of EOrBAC is its ability to model most network security components. This paper extends the work of EOrBAC by applying its concept on active directory network security component. Also, an EOrBAC based network security management toolkit is developed to realize this approach.
The technological as well as software advances in microelectronics and embedded component design have led to the development of low cost, small-sized devices capable of forming wireless, ad-hoc networks and sensing a ...
详细信息
ISBN:
(纸本)9781424443277
The technological as well as software advances in microelectronics and embedded component design have led to the development of low cost, small-sized devices capable of forming wireless, ad-hoc networks and sensing a number of qualities of their environment, while performing computations that depend on the sensed qualities as well as information received by their peers. These sensor networks rely on the collective power of the separate devices as well as their computational and sensing capabilities to understand "global" environmental states through locally sampled information and local sensor interactions. Due to the locality of the sensor networks, that naturally arises due to the locality of their communications capabilities, a number of interesting connections exist between these networks and geometrical concepts and problems. In this paper we study two simple problems that pertain to the formation of low power and low interference communication patterns in fixed topology sensor networks. We study the problem of using multihop communication links instead of direct ones as well as the problem of forming a communication ring of sensor networks so as to reduce power consumption as well as interference from other nodes. Our focus is on the connection between sensor networks and geometrical concepts, rather than on practicality, so as to highlight their interrelationship.
We present a set of three new time-dependent models with increasing flexibility for realistic route planning in flight networks. By these means, we obtain small graph sizes while modeling airport procedures in a reali...
详细信息
ISBN:
(纸本)9783939897118
We present a set of three new time-dependent models with increasing flexibility for realistic route planning in flight networks. By these means, we obtain small graph sizes while modeling airport procedures in a realistic way. With these graphs, we are able to efficiently compute a set of best connections with multiple criteria over a full day. It even turns out that due to the very limited graph sizes it is feasible to precompute full distance tables between all airports. As a result, best connections can be retrieved in a few microseconds on real world data.
In transparent wavelength routed optical networks, the signal quality degrades due to physical layer impairments. Certain physical effects make routing decisions made for one lightpath affect and be affected by the de...
详细信息
ISBN:
(纸本)9781424448258
In transparent wavelength routed optical networks, the signal quality degrades due to physical layer impairments. Certain physical effects make routing decisions made for one lightpath affect and be affected by the decisions for other lightpaths. To safely establish a lightpath for a new connection two main approaches can be used. The most common approach is to select a lightpath that has acceptable transmission quality under the worst case interference assumption. This ensures that the selected lightpath will not become infeasible due to the possible establishment of future interfering connections, but it sacrifices candidate path space for a quick and stable lightpath selection process. The second approach is to consider the actual current network utilization and account for the interference among lightpaths so as to perform a cross layer optimization between the network and physical layers. In the latter approach, the algorithm has to evaluate and check if the establishment of the new lightpath turns infeasible some of the already established connections. The question that arises is whether the performance benefits obtained through the second approach are worth the added complexity introduced by the cross-layer optimization required.
We propose and evaluate an impairment-aware multi-parametric routing and wavelength assignment algorithm for online traffic in transparent optical networks. In such networks the signal quality of transmission degrades...
详细信息
We propose and evaluate an impairment-aware multi-parametric routing and wavelength assignment algorithm for online traffic in transparent optical networks. In such networks the signal quality of transmission degrades due to physical layer impairments. In the multi-parametric approach, a vector of cost parameters is assigned to each link, from which the cost vectors of candidate lightpaths are calculated. In the proposed scheme the cost vector includes impairment generating source parameters, such as the path length, the number of hops, the number of crosstalk sources and other inter-lightpath interfering parameters, so as to indirectly account for the physical layer effects. For a requested connection the algorithm calculates a set of candidate lightpaths, whose quality of transmission is validated using a function that combines the impairment generating parameters. For selecting the lightpath we propose and evaluate various optimization functions that correspond to different IA-RWA algorithms. Our performance results indicate that the proposed algorithms utilize efficiently the available resources and minimize the total accumulated signal degradation on the selected lightpaths, while having low execution times.
This paper proposes a power control mechanism for the efficient radio bearer selection in the multimedia broadcast/multicast service (MBMS) framework of Universal Mobile Telecommunications System (UMTS). The selection...
详细信息
This paper proposes a power control mechanism for the efficient radio bearer selection in the multimedia broadcast/multicast service (MBMS) framework of Universal Mobile Telecommunications System (UMTS). The selection of the most efficient transport channel in terms of power consumption is a key point for MBMS enabled UMTS networks, since a wrong transport channel selection for the transmission of the MBMS data could result to a significant decrease in the total capacity of the network. Different UMTS transport channels and power saving techniques are examined and an algorithm that selects the most efficient combination of the above parameters is proposed. The proposed MBMS power control mechanism selects the transport channel that minimizes the base station's transmission power in every cell of the network that serves multicast users.
In short-term generation unit asset valuation, a decision whether to turn the unit "on" or "off" is relied upon the present realization of electricity and fuel prices. When the electricity and fuel...
详细信息
Active shape models (ASMs) are statistical, deformable models, exhibiting a remarkable performance for the segmentation of the lung fields in plain chest radiographs. In this paper we propose a novel approach to impro...
详细信息
Active shape models (ASMs) are statistical, deformable models, exhibiting a remarkable performance for the segmentation of the lung fields in plain chest radiographs. In this paper we propose a novel approach to improving the robustness of the original ASM against weak lung field boundaries, which can cause leaking of the shape's contour into the lung fields. The ASM is shielded against leaking by the prior application of a grey-level selective thresholding scheme that subtracts irrelevant anatomic structures from the radiograph. The proposed approach copes with affine lung field projections and features resistance to the presence of dense external objects used for patient's monitoring and support. Its advantageous performance is demonstrated on a challenging set of chest radiographs obtained from patients with bacterial pulmonary infections.
Baltic Olympiad in informatics (BOI1) is an annual informatics competition established by the three Baltic countries Estonia, Latvia and Lithuania in 1995 for upper secondary school students. BOI was later expanded to...
详细信息
暂无评论