Search results for: ROUTING PERFORMANCE - Bridge of Knowledge

Search

Search results for: ROUTING PERFORMANCE

Filters

total: 121
filtered: 119

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: ROUTING PERFORMANCE

  • RF Input-Quasi-Reflectionless Dispersive-Delay Structures Based on Complementary-Diplexer Circuits

    Publication

    - Year 2024

    A class of RF dispersive-delay structures (DDSs) with input-quasi-reflectionless behavior is reported. It is based on the exploitation of complementary-diplexer circuit networks, in which the out-of-band RF-input-power echoes reflected by the main bandpass-filter-(BPF)-type channel are dissipated by the resistively-terminated auxiliary bandstop-filter-(BSF)-type channel. Specifically, it is shown that the influence of the absorptive...

    Full text to download in external service

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes

    Publication

    - Year 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS

    Publication

    - Year 2013

    In this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publication
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Year 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Full text available to download

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • Impact of Urbanization on Stormwater Runoff from a Small Urban Catchment: Gdańsk Małomiejska Basin Case Study

    This paper deals with the impact of different forms of urbanization on the basin outflow. The influence of changes in land cover/use, drainage system development, reservoirs, and alternative ways of stormwater management (green roofs, permeable pavements) on basin runoff was presented in the case of a small urban basin in Gdańsk (Poland. Seven variants of area development (in the period of 2000-2012) – three historical and four...

    Full text available to download

  • Analiza algorytmów rutingu wspierających QoS w DiffServ.

    Publication

    - Year 2004

    W artykule podjęto tematykę związaną z opisem oraz analizą dostępnych algorytmów rutingu wspierających QoS dla specyficznej architektury sieci IP - DiffServ. Główną przyczyną jaka skłania do badania procedur rutingu QoS o wielu ograniczeniach (multi constrained routing) jest brak jak dotąd jednoznacznie sprecyzowanych, dokładnych metod pozwalających wyznaczyć drogi połączeniowe dla usług, dla których ma być gwarantowana jakość...

  • Analiza algorytmów rutingu wspierających QoS w DiffServ

    Publication

    - Year 2005

    W pracy podjęto tematykę związaną z opisem oraz analizą dostępnych algorytmów rutingu wspierających QoS dla specyficznej architektury sieci IP - DiffServ. Główną przyczyną jaka skłania do badania procedur rutingu QoS o wielu ograniczeniach (multi constrained routing) jest brak jak dotąd jednoznacznie sprecyzowanych, dokładnych metod pozwalających wyznaczyć drogi połączeniowe dla usług, dla których ma być gwarantowana jakość (QoS...

  • A repeated game formulation of network embedded coding for multicast resilience in extreme conditions

    Publication
    • C. Esposito
    • A. Castiglione
    • F. Palmieri
    • F. Pop
    • J. Rak

    - Year 2017

    Computer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...

    Full text to download in external service

  • How Machine Learning Contributes to Solve Acoustical Problems

    Publication
    • M. A. Roch
    • P. Gerstoft
    • B. Kostek
    • Z. Michalopoulou

    - Journal of the Acoustical Society of America - Year 2021

    Machine learning is the process of learning functional relationships between measured signals (called percepts in the artificial intelligence literature) and some output of interest. In some cases, we wish to learn very specific relationships from signals such as identifying the language of a speaker (e.g. Zissman, 1996) which has direct applications such as in call center routing or performing a music information retrieval task...

    Full text available to download

  • Simulation-Based Approach to a More Efficient Handling Strategy for a Container Terminal Storage Yard: Case Study of the Baltic Hub Container Terminal

    Publication

    - Polish Maritime Research - Year 2024

    The primary objective of this research was to implement a more efficient handling strategy in the container terminal storage yard at the Baltic Hub Container Terminal (BHCT). Following an analysis of the current logistics system associated with starboard-side mooring, an attempt was made to shift the mooring to the port side. Two routing strategies corresponding to the analysed mooring operations were tested using a developed...

    Full text available to download

  • Clonal selection in discrete optimization

    Publication

    - Year 2009

    W rozprawie zajmujemy się efektywnymi metodami przybliżonego rozwiązywania problemów optymalizacji dyskretnej, a w szczególności algorytmami opartymi na metodzie selekcji klonalnej (SK), należącymi do kategorii sztucznych systemów immunologicznych. Techniki optymalizacji to znaczące pole badań w informatyce, a niektóre ze starszych technik, takie jak algorytmy genetyczne, symulowane wyżarzanie czy przeszukiwanie tabu, stały się...

  • Compact Quasi-Elliptic-Type Inline Waveguide Bandpass Filters With Nonlinear Frequency-Variant Couplings

    Publication

    This work presents the design techniques to synthesize a class of compact inline quasi-elliptic-type waveguide cavity bandpass filters based on novel nonlinear frequency-variant couplings (NFVCs). These highly dispersive frequency-variant couplings (FVCs) are realized by means of a pair of partial-height posts that are placed at the junctions between every two cavity resonators. Each NFVC produces a transmission pole in between...

    Full text to download in external service

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • FLOOD MANAGEMENT IN URBAN BASINS OF THE CITY OF GDAŃSK

    Publication

    Over the last years, the City of Gdańsk suffers twice from flash floods. Both events were caused by intense storms which produced significant surface runoff and caused inundation private and cities properties. The first case of July 2001 flood [3], [9] was the turning point for the city authorities, who decide to look close on the flood management in small urban catchments. The aim of research projects was to establish technical...

  • Dynamic host configuration protocol for IPv6 improvements for mobile nodes

    In wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...

    Full text available to download

  • Analysis of IPv6 handovers in IEEE 802.16 environment

    The second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...

    Full text available to download

  • Analysis of IPv6 Handovers in IEEE 802.16 environment

    Zaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...

    Full text available to download