The self-protecting multipath (SPM) is a simple protection switching mechanism that can be implemented, e.g., by MPLS. We present a linear program to optimize the SPM load balancing parameters for network dimensioning...
详细信息
The self-protecting multipath (SPM) is a simple protection switching mechanism that can be implemented, e.g., by MPLS. We present a linear program to optimize the SPM load balancing parameters for network dimensioning. Our study shows that the SPM is a very efficient mechanism in the sense that it requires only little backup capacity since it outperforms the p-cycle approach and the shortest path rerouting by far. The investigation of the computation time and the memory consumption recommends the Simplex method as an LP solver rather than an interior point method (IPM). The computation time of the program depends mainly on the number of links in the network and it is well feasible for small and and medium size networks. For large networks, however, fast heuristics are required.
This paper presents a new full-search block-matching algorithm: Multi-stage Interval-based Motion Estimation algorithm (MIME). The proposed algorithm is a block based motion estimation algorithm that utilizes successi...
详细信息
In this paper, we consider adaptive bandwidth allocation (ABA) for capacity tunnels as an effective means for multi-hour network design. Traffic engineering (TE) tunnels established in a network from border-to-border ...
详细信息
In this paper, we consider adaptive bandwidth allocation (ABA) for capacity tunnels as an effective means for multi-hour network design. Traffic engineering (TE) tunnels established in a network from border-to-border (b2b) can be used not only for route pinning between ingress/egress node pairs but also for efficient implementation of resilient network admission control. If static bandwidth allocation (SBA) based on peak-rate traffic assumptions is used to dimension the b2b tunnels, fluctuations of the network traffic can lead to under- or overprovisioning of network capacity in the tunnels. If ABA is used instead, the tunnel sizes are dynamically adapted to current traffic conditions. The efficient use of network capacity assigned to TE tunnels strongly depends on the structure of these tunnels. The contribution of this paper is an assessment of the bandwidth savings that are achievable with ABA in comparison to SBA for various tunnel structures with different path layouts and load balancing strategies. Our results show that the capacity savings due to ABA depend on the routing and load balancing schemes provisioned in the network and that these savings may be increased by appropriately chosen tunnel implementations
Peer-to-peer (P2P) applications are extremely popular on the Internet because they allow users to share information in a decentralized manner. Internet users use file-sharing applications (e.g., BitTorrent, KaZaA) to ...
详细信息
Peer-to-peer (P2P) applications are extremely popular on the Internet because they allow users to share information in a decentralized manner. Internet users use file-sharing applications (e.g., BitTorrent, KaZaA) to share and exchange files and collaboration applications (e.g., Jabber, Groove) to exchange chat messages and work on shared documents. A reference architecture for a domain provides an architecture template which can be used as a starting point for designing the software architecture of a system in that domain. Despite the popularity of P2P applications there is no reference architecture for the P2P domain. This paper presents a reference architecture for the P2P domain. The reference architecture has been designed to satisfy the concerns that a P2P application needs to address. The reference architecture takes a service-centric view of the P2P domain. The reference architecture can be used to describe the structure of existing P2P applications and middlewares. The paper validates the reference architecture by describing the structure of some of the existing P2P applications and middlewares using the reference architecture
Determinism is mandatory for replicating distributed objects with strict consistency guarantees. Multithreaded execution of method invocations is a source of nondeterminism, but helps to improve performance and avoids...
详细信息
Determinism is mandatory for replicating distributed objects with strict consistency guarantees. Multithreaded execution of method invocations is a source of nondeterminism, but helps to improve performance and avoids deadlocks that nested invocations can cause in a single-threaded execution model. This paper contributes a novel algorithm for deterministic thread scheduling based on the interception of synchronisation statements. It assumes that shared data are protected by mutexes and client requests are sent to all replicas in total order; requests are executed concurrently as long as they do not issue potentially conflicting synchronisation operations. No additional communication is required for granting locks in a consistent order in all replicas. In addition to reentrant mutex locks, the algorithm supports condition variables and time-bounded wait operations. An experimental evaluation shows that, in some typical usage patterns of distributed objects, the algorithm is superior to other existing approaches
In P2P systems, the speed of searching for desired lists of sharable files is one of the most important measurement issues in evaluation of overall system performance. Although the searching schemes of existing non-st...
详细信息
In P2P systems, the speed of searching for desired lists of sharable files is one of the most important measurement issues in evaluation of overall system performance. Although the searching schemes of existing non-structured P2P systems have been improved to enhance speed considerably, they still never reach to the level of those of the centralized and structured systems. In this paper, we propose a multi-node global directory in P2P systems, where all the lists of sharable resources of the joining peers are aggregated and divided into the chosen nodes while keeping collating sequence as a whole to make one big linked list. Thus in indexed sequential searching, the system provides us with convenience of using the command like 'dir' of MS-DOS, and in general keyword searching, which is naturally impossible for the structured P2P systems, the searching speed is even faster than those of centralized P2P systems since a small list segment is scanned at each node synchronously in parallel
The main focuses of the 2nd International Middleware Doctoral Symposium took place at Middleware 2005 are discussed. The symposium is a forum for an invited group of doctoral students and it provides an opportunity fo...
详细信息
The main focuses of the 2nd International Middleware Doctoral Symposium took place at Middleware 2005 are discussed. The symposium is a forum for an invited group of doctoral students and it provides an opportunity for them to obtain guidance from mentors and to meet with their peers. The event is aimed to give students constructive criticism before their thesis defense and foster discussions related to future career opportunities. The symposium attracted many high-quality submissions, ensuring a competitive selection process.
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes...
详细信息
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes have to be done by an operator, especially when it comes to the adaption of a node to its environment, i.e., the cells surrounding its own. This is an expensive and inflexible method. Moreover, the required manual interference hampers the adaptivity of B3G networks towards topology changes. In this work, we present an architecture that allows for the detection of neighboring cells, thereby enabling an easy or even autonomic configuration of the access nodes. In addition to this, the presented Kademlia-based overlay network enables the storage of information needed for network management, such as configuration data or performance measures
The international standard IEC 61499 defines an event-driven, distributed application based on Function Blocks. Such a block represents a kind of object with an internal behaviour. The blocks interact via input and ou...
详细信息
暂无评论