Pervasive computing is a developing area. Due to significant technological developments, assistive devices that were impossible to make or that were not even considered for manufacture are now available. The creation ...
详细信息
The main focuses of the 2nd International Middleware Doctoral Symposium took place at Middleware 2005 are discussed. The symposium is a forum for an invited group of doctoral students and it provides an opportunity fo...
详细信息
The main focuses of the 2nd International Middleware Doctoral Symposium took place at Middleware 2005 are discussed. The symposium is a forum for an invited group of doctoral students and it provides an opportunity for them to obtain guidance from mentors and to meet with their peers. The event is aimed to give students constructive criticism before their thesis defense and foster discussions related to future career opportunities. The symposium attracted many high-quality submissions, ensuring a competitive selection process.
In this paper, we consider adaptive bandwidth allocation (ABA) for capacity tunnels as an effective means for multi-hour network design. Traffic engineering (TE) tunnels established in a network from border-to-border ...
详细信息
In this paper, we consider adaptive bandwidth allocation (ABA) for capacity tunnels as an effective means for multi-hour network design. Traffic engineering (TE) tunnels established in a network from border-to-border (b2b) can be used not only for route pinning between ingress/egress node pairs but also for efficient implementation of resilient network admission control. If static bandwidth allocation (SBA) based on peak-rate traffic assumptions is used to dimension the b2b tunnels, fluctuations of the network traffic can lead to under- or overprovisioning of network capacity in the tunnels. If ABA is used instead, the tunnel sizes are dynamically adapted to current traffic conditions. The efficient use of network capacity assigned to TE tunnels strongly depends on the structure of these tunnels. The contribution of this paper is an assessment of the bandwidth savings that are achievable with ABA in comparison to SBA for various tunnel structures with different path layouts and load balancing strategies. Our results show that the capacity savings due to ABA depend on the routing and load balancing schemes provisioned in the network and that these savings may be increased by appropriately chosen tunnel implementations
Peer-to-peer (P2P) applications are extremely popular on the Internet because they allow users to share information in a decentralized manner. Internet users use file-sharing applications (e.g., BitTorrent, KaZaA) to ...
详细信息
Peer-to-peer (P2P) applications are extremely popular on the Internet because they allow users to share information in a decentralized manner. Internet users use file-sharing applications (e.g., BitTorrent, KaZaA) to share and exchange files and collaboration applications (e.g., Jabber, Groove) to exchange chat messages and work on shared documents. A reference architecture for a domain provides an architecture template which can be used as a starting point for designing the software architecture of a system in that domain. Despite the popularity of P2P applications there is no reference architecture for the P2P domain. This paper presents a reference architecture for the P2P domain. The reference architecture has been designed to satisfy the concerns that a P2P application needs to address. The reference architecture takes a service-centric view of the P2P domain. The reference architecture can be used to describe the structure of existing P2P applications and middlewares. The paper validates the reference architecture by describing the structure of some of the existing P2P applications and middlewares using the reference architecture
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes...
详细信息
Configuration and management of radio access nodes in beyond 3G (B3G) networks such as nodeBs, wireless LAN or WIMAX access points is a complex task that consumes a high amount of resources. Most configuration changes have to be done by an operator, especially when it comes to the adaption of a node to its environment, i.e., the cells surrounding its own. This is an expensive and inflexible method. Moreover, the required manual interference hampers the adaptivity of B3G networks towards topology changes. In this work, we present an architecture that allows for the detection of neighboring cells, thereby enabling an easy or even autonomic configuration of the access nodes. In addition to this, the presented Kademlia-based overlay network enables the storage of information needed for network management, such as configuration data or performance measures
In P2P systems, the speed of searching for desired lists of sharable files is one of the most important measurement issues in evaluation of overall system performance. Although the searching schemes of existing non-st...
详细信息
In P2P systems, the speed of searching for desired lists of sharable files is one of the most important measurement issues in evaluation of overall system performance. Although the searching schemes of existing non-structured P2P systems have been improved to enhance speed considerably, they still never reach to the level of those of the centralized and structured systems. In this paper, we propose a multi-node global directory in P2P systems, where all the lists of sharable resources of the joining peers are aggregated and divided into the chosen nodes while keeping collating sequence as a whole to make one big linked list. Thus in indexed sequential searching, the system provides us with convenience of using the command like 'dir' of MS-DOS, and in general keyword searching, which is naturally impossible for the structured P2P systems, the searching speed is even faster than those of centralized P2P systems since a small list segment is scanned at each node synchronously in parallel
The IEEE 802.11 standard is playing an increasingly important role in next generation mobile radio networks. In order to fulfill the requirements of such networks, the Wireless LAN technology has to provide mechanisms...
详细信息
ISBN:
(纸本)9783800729616
The IEEE 802.11 standard is playing an increasingly important role in next generation mobile radio networks. In order to fulfill the requirements of such networks, the Wireless LAN technology has to provide mechanisms for transporting Quality-of-Service (QoS) enabled traffic in large Wireless LAN deployments. In this paper, we show that the existing Medium Access Control (MAC) protocols perform well within single cell scenarios, but their performance drops drastically in environments with overlapping cells. Therefore, we evaluate the robustness of the Enhanced distributed Channel Access (EDCA) MAC protocol in different scenarios with overlapping cells.
The international standard IEC 61499 defines an event-driven, distributed application based on Function Blocks. Such a block represents a kind of object with an internal behaviour. The blocks interact via input and ou...
详细信息
The versatile MOdeling, Specification and Evaluation Language is the core element of the MOSEL-2 tool. This description languages provides a high-level means for specifying models, performance measures, and the graphi...
详细信息
The versatile MOdeling, Specification and Evaluation Language is the core element of the MOSEL-2 tool. This description languages provides a high-level means for specifying models, performance measures, and the graphical presentation of results. The description languages is implemented in form of an evaluation environment that comprises translators to the modeling languages of several third-party performance evaluation tools that evaluate the specified model.
暂无评论