We compare the capacity requirements of two new end-to-end (e2e) protection switching mechanisms: the self-protecting multipath (SPM) and several (multi-)path protection (PP) methods. Their structure consists of disjo...
详细信息
We compare the capacity requirements of two new end-to-end (e2e) protection switching mechanisms: the self-protecting multipath (SPM) and several (multi-)path protection (PP) methods. Their structure consists of disjoint parallel e2e paths and the traffic is distributed over these paths according to a load balancing function. If one of the paths fails, the traffic is redistributed to the working paths according to a path failure specific load balancing function. The contribution of this work is the calculation of the path layout and the load balancing functions for both the PP and the SPM method. We use exact optimizations and simple heuristics for that objective and take a dimensioning approach to compare the capacity requirements of the different mechanisms. Our results illustrate, e.g., that the savings potential depends on the network topology and that 17% additional capacity can be sufficient for full resilience against all single router and link failures in well designed networks
The evaluation framework for e-Government services proposed in this paper is designed to be a comprehensive guidance. The framework, which is intentionally used to ensure that government services meet the settled obje...
详细信息
Voice over IP is becoming an important application for wireless networks based in the IEEE 802.11 standard, but many problems must be addressed for the success of this combination, such as providing high number of con...
详细信息
Voice over IP is becoming an important application for wireless networks based in the IEEE 802.11 standard, but many problems must be addressed for the success of this combination, such as providing high number of connections with acceptable speech quality and minimal level of security. This paper presents the results related with a QoS evaluation tool implementation and its utilization in a VoWLAN environment in order to evaluate the performance of the VoIP system with the IPSec used to guarantee confidentiality. In addition, we demonstrate how this QoS tool can be deployed inside the network operation to assist network nodes on selecting more accurate IPSec parameters to reduce the security impact on the real-time traffic
As the increasing of system performance and computing power, embeddedsystems are more complicated and interactive. Therefore, operating system (OS) plays a more important role in embeddedsystems to utilize various h...
详细信息
As the increasing of system performance and computing power, embeddedsystems are more complicated and interactive. Therefore, operating system (OS) plays a more important role in embeddedsystems to utilize various hardware and software resources. However, no OS can meet all requirements of various embeddedsystems. Due to the advance of reconfigurable processors, system requirements can be more dynamic. embedded OS has becoming more critical in the development of embeddedsystems and thus there is a strong need of configurable embedded OS to better and faster build up the target system. In this paper, we propose a configurable OS, called COS, based on SOA (service-oriented architecture) for embedded SoC (system on a chip) systems to build an application specific OS according to the system requirements. COS can be easily configured to better utilize the resources of the target embedded platform and have better support to the embedded application. Moreover, the COS can easily extend new features or functionalities of other OSes and even be adapted to the designs of other OSes. We implement COS on an ARM platform to prove its configurability and also evaluate its overhead. We believe that COS can be configured to meet the various requirements in embedded SoC systems and help to speed up the embedded system development process
RTnet is a distributed real-time network protocol, to be used on fully-connected local area networks with a broadcast capability. It supports on-the-fly addition and removal of network nodes, resource-lavish and resou...
详细信息
A role paradigm conformance model (RPCM) called Typehole model was developed and implemented in Java. It does not use Is-role-of inheritance and is free from the object schizophrenia (OS) problem (OSP). An extended di...
详细信息
Shortcomings of the existing IP technology, e.g. lack for mobility and multicast, have in practice not been successfully addressed. With the emergence of small personal networked devices, these shortcomings negatively...
Today's collaborative applications over the web span domains as diverse as enterprise e-commerce applications and biomedical applications. We have previously developed and formally investigated "Web Coordinat...
详细信息
ISBN:
(纸本)0769523129
Today's collaborative applications over the web span domains as diverse as enterprise e-commerce applications and biomedical applications. We have previously developed and formally investigated "Web Coordination Bonds," a theoretically powerful artifact for interconnecting autonomous web objects for control and data flows, and for enforcing dependencies. Here, we describe BondFlow, a system that enables the configuration and execution of workflows using web bonds over heterogeneous web objects. The system automatically generates lightweight proxy wrapper objects to enable encapsulated web services to be interconnected through web bonds. The small footprint wrappers (less than 10 KB) can reside on Java-enabled handheld devices. We describe the design, architecture and performance of the Bond-Flow system. Our initial performance results indicate that both wrapper creation time and web bond related execution time are small. In contrast to our BondFlow system, existing systems need expert programming to create workflows, do not easily allow distributed coordination of workflows, and usually do not support heterogeneity of device, data and network. The system is preliminary, and further research is ongoing to extend its configuration and execution platforms.
distributed mobile systems are characterized by asymmetry in both network connectivity and computing power, mobility of hosts and their constraints. To address these issues, existing approaches attempt to completely r...
详细信息
Existing grid models target purely data parallel applications without inter-task communication. This paper proposes a transparent programming model to support communicating parallel tasks in a wide area grid. The prop...
详细信息
暂无评论