Search results for: FAILURES OF NETWORK NODES/LINKS - Bridge of Knowledge

Search

Search results for: FAILURES OF NETWORK NODES/LINKS

Search results for: FAILURES OF NETWORK NODES/LINKS

  • Wireless systems of threats monitoring

    The concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.

  • Polynomial Algorithm for Minimal (1,2)-Dominating Set in Networks

    Publication

    - Electronics - Year 2022

    Dominating sets find application in a variety of networks. A subset of nodes D is a (1,2)-dominating set in a graph G=(V,E) if every node not in D is adjacent to a node in D and is also at most a distance of 2 to another node from D. In networks, (1,2)-dominating sets have a higher fault tolerance and provide a higher reliability of services in case of failure. However, finding such the smallest set is NP-hard. In this paper, we...

    Full text available to download

  • Multi-agent systems registration and maintenance of address mapping without agent self-registation

    Monitoring of dynamic multi-agent systems, here agents are allowed to appear and disappear, and can migrate between network nodes is a complex tasks. Applying the traditional monitoring methods is not effective, as little can be assumed in advance about such environments. It is necessary to track changes in addressing and availability of agents to create and maintain mapping between agents and their network addresses. The...

    Full text to download in external service

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • An approach to improve the time efficiency of disjoint paths calculation

    Publication

    - Year 2015

    Failures of network elements can be appropriately dealt with by utilization of alternate disjoint paths to provide redirection of flows affected by failures of the respective working paths. Known approaches can be broadly divided by decision on backup paths installation into proactive and reactive mechanisms, as well as based on the scope of recovery actions into local and global rerouting. There are several important scenarios...

    Full text to download in external service

  • On-line Search in Two-Dimensional Environment

    Publication

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. As a way of modeling two-dimensional shapes, we restrict our attention to networks that are embedded into partial grids:...

    Full text to download in external service

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publication

    - Year 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Full text to download in external service

  • Assessing the time effectiveness of trust management in fully synchronised wireless sensor networks

    Publication

    - Year 2013

    The paper presents the results of the time effectiveness assessment of the distributed WSN Cooperative Trust Management Method - WCT2M in a fully synchronized Wireless Sensor Network (WSN). First we introduce some basic types of synchronization patterns in WSN based on the idea of sleep scheduling. Then we explain how WCT2M works in the network applying the fully synchronized sleep scheduling pattern. Such networks were subjected...

    Full text available to download

  • Optimization of Wireless Networks for Resilience to Adverse Weather Conditions

    Publication
    • M. Pióro
    • E. Fitzgerald
    • I. Kalesnikau
    • D. Nace
    • J. Rak

    - Year 2020

    In this chapter, we consider how adverse weather conditions such as rain or fog affect the performance of wireless networks, and how to optimize these networks so as to make them robust to these conditions. We first show how to analyze the weather conditions in order to make them useful for network optimization modelling. Using an example realistic network, we show how to optimize two types of wireless networks: free-space optical...

    Full text to download in external service

  • On Symmetry of Uniform and Preferential Attachment Graphs

    Publication

    - ELECTRONIC JOURNAL OF COMBINATORICS - Year 2014

    Motivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...

    Full text available to download

  • RSS-based DoA Estimation Using ESPAR Antennas and Interpolated Radiation Patterns

    In this letter, it is shown how an algorithm, which employs received signal strength (RSS) values in order to estimate direction-of-arrival (DoA) of impinging signals in wireless sensor network (WSN) nodes equipped with electronically steerable parasitic array radiator (ESPAR) antennas, can easily be improved by applying an interpolation algorithm to radiation patterns recorded in the calibration phase of the DoA estimation process....

    Full text available to download

  • Investigation of continuous wave jamming in an IEEE 802.15.4 network

    Publication

    This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...

    Full text to download in external service

  • Disaster-resilient communication networks: Principles and best practices

    Publication
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Year 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Full text to download in external service

  • The Methodology of identifying the place to install shunt compensators in the transmission network

    This methodology of selection and localization of static com- paper presents pensators in wide network. Proposed method is based on analysis of voltage area power profiles in the nodes of the power grid, and designating locations, In Which Voltages ex- cessively tend to change in time. Practical way of modeling the SVC device in PLANS program you Presented, as well as some example results of research.

  • A concept of measurement system based on the Z-Wave standard

    Publication

    In the paper a new concept of measurement system based on the Z-Wave standard is presented. This standard is dedicated to use mainly in home automation systems, but its properties enable to use it in dispersed measurement systems and support wireless communication between measurement nodes in a mesh-type network. In the paper basic metrological aspects of the Z-Wave standard and an example of impedance measurement system are discussed.

    Full text available to download

  • Optimizing FSO networks resilient to adverse weather conditions by means of enhanced uncertainty sets

    Publication

    - Optical Switching and Networking - Year 2021

    This work deals with dimensioning of wireless mesh networks (WMN) composed of FSO (free space optics) links. Although FSO links realize broadband transmission at low cost, their drawback is sensitivity to adverse weather conditions causing transmission degradation on multiple links. Hence, designing such FSO networks requires an optimization model to find the cheapest configuration of link capacities that will be able to carry...

    Full text to download in external service

  • Gossiping by energy-constrained mobile agents in tree networks

    Publication

    - THEORETICAL COMPUTER SCIENCE - Year 2021

    Every node of an edge-weighted tree network contains a data packet. At some nodes are placed mobile agents, each one possessing an amount of energy (not necessarily the same for all agents). While walking along the network, the agents spend the energy proportionally to the distance traveled and collect copies of the data packets present at the visited network nodes. An agent visiting a node deposits there copies of all currently...

    Full text to download in external service

  • A survey on network resiliency methodologies against weather-based disruptions

    Publication
    • M. Tornatore
    • J. Andre
    • P. Babarczi
    • T. Braun
    • E. Folstad
    • P. Heegaard
    • A. Hmaity
    • M. Furdek
    • L. Jorge
    • W. Kmiecik... and 9 others

    - Year 2016

    Due to the increasing dependence on network services of our society, research has recently been concentrating on enhancing traditional protection strategies to withstand large-scale failures, as in case of disaster events. The recently-formed EU-funded RECODIS project aims at coordinating and fostering research collaboration in Europe on disaster resiliency in communication networks. In particular, the Working Group (WG) 2 of the...

    Full text to download in external service

  • Disciplines and measures of information resilience

    Publication
    • J. Rak
    • M. Jonsson
    • D. Hutchison
    • J. Sterbenz

    - Year 2017

    Communication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...

    Full text to download in external service

  • Mechanizmy bezpieczeństwa transmisji w systemie netBaltic

    artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...

    Full text to download in external service

  • The realization of ASON/GMPLS control plane

    Publication

    ASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols like RSVP-TE, OSPF-TE, LMP. This solution is named ASON/GMPLS. In this chapter we present the control plane problems and proposes ASON/GMPLS network realization that are tested on testbed consists of three and...

  • Measures of region failure survivability for wireless mesh networks

    Publication

    - WIRELESS NETWORKS - Year 2015

    Wireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...

    Full text available to download

  • Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs

    Publication
    • D. Santos
    • A. de Sousa
    • C. Mas-Machuca
    • J. Rak

    - IEEE Access - Year 2021

    In Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...

    Full text available to download

  • Wireless Systems of Threats Monitoring

    The concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...

  • A new approach to design of weather disruption-tolerant wireless mesh networks

    Publication

    Wireless Mesh Networks, offering transmission rates of 1–10 Gb/s per a millimeter-wave link (utilizing the 71–86 GHz band) seem to be a promising alternative to fiber optic backbone metropolitan area networks because of significantly lower costs of deployment and maintenance. However, despite providing high transmission rates in good weather conditions, high-frequency wireless links are very susceptible to weather disruptions....

    Full text available to download

  • Performance Models of a Multidomain IMS/NGN Service Stratum

    Publication

    - Year 2021

    This paper quantifies call processing performance (CPP) of a multidomain IMS/NGN architecture, which was proposed to deliver current and future telecommunication services with strict quality requirements, independently of the transport network technologies. A realistic simulation model is used as a reference for evaluation of the analytical results, in which vari-ous types of queuing systems are applied to model the opera-tion...

    Full text to download in external service

  • Selection of optimal location and rated power of capacitor banks in distribution network using genetic algorithm

    Publication

    In this paper, the problem of placement and rated power of capacitor banks in the Distribution Network (DN) is considered. We try to suggest the best places for installing capacitor banks and define their reactive power. The considered formulation requires the optimization of the cost of two different objectives. Therefore the use of properly multiobjective heuristic optimization methods is desirable. To solve this problem we use...

    Full text to download in external service

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • THE UNSUSTAINABILITY OF PUBLIC-SECTOR ORGANIZATIONAL NETWORKS: A CASE STUDY OF VOLUNTARY COURT NETWORKS

    Publication

    - Zeszyty Naukowe. Organizacja i Zarządzanie / Politechnika Śląska - Year 2020

    Purpose: The purpose of this study is to identify the problem of sustainability of public-sector 12 organizational networks on the example of common courts and what it implies for further 13 research. Methodology: The study used qualitative research tools in the form of structured 14 interviews. Interviews were conducted with 36 presidents and directors of common courts. 15 After conducting and transcribing each interview, their...

    Full text available to download

  • Topology Discovery of Hierarchical Ethernet LANs without SNMP support

    Publication

    - Year 2015

    This paper presents an algorithm that allows for discovery of layer-2 hierarchical Ethernet network topology using agents running on selected end nodes. No SNMP, MIB, hardware, firmware, or operating system-level software modification is required. The method is based on transmission of customized Ethernet frames among installed software agents. It can be used to discover the topology of LAN or one VLAN segment as long as no MAC...

  • Computer-aided analysis of resonance risk in power system with Static Var Compensators

    Static Var Compensators operation in a power system may significantly improve voltage profiles in nodes and the reactive power balance, as well as ensure greater system stability in emergency conditions. However these devices may be a cause of a resonance in the system. The aim of this paper is to call attention to the need to include resonance phenomena in a compensator’s location evaluation process. The analysis performed in...

    Full text available to download

  • Remote Monitoring System for Impedance Spectroscopy using Wireless Sensor Network

    Publication

    - Year 2012

    The architecture of a miniaturized impedanceanalyser with wireless communication module for remoteImpedance Spectroscopy (IS) of anticorrosion coatings ondifficult-to-reach objects (e.g. on the steel construction ofthe bridge) is described in this paper. Some practical aspectsof implementation of a Wireless Sensor Network (WSN) arealso discussed. A low scale, middle range, WSN networkcomposed of a Base Station (BS) with a Personal...

    Full text to download in external service

  • Tryton Supercomputer Capabilities for Analysis of Massive Data Streams

    The recently deployed supercomputer Tryton, located in the Academic Computer Center of Gdansk University of Technology, provides great means for massive parallel processing. Moreover, the status of the Center as one of the main network nodes in the PIONIER network enables the fast and reliable transfer of data produced by miscellaneous devices scattered in the area of the whole country. The typical examples of such data are streams...

    Full text available to download

  • BADANIE MOŻLIWOŚCI SYMULACYJNYCH ŚRODOWISKA ‘MININET’ POD KĄTEM WSPARCIA PROTOKOŁU NETCONF

    Niniejszy artykuł został poświęcony zagadnieniu wykorzystania środowiska emulacyjnego Mininet do testowania mechanizmów działania protokołu NETCONF. Omówiono w nim projekt inżynierski, którego wynikiem było zaimplementowanie wirtualnego środowiska, umożliwiającego prowadzenie takich badań. Opisano także wyniki testów emulacji dwóch pierścieniowych domen sieciowych, składających się z 30 węzłów.

    Full text to download in external service

  • Supply current signal and artificial neural networks in the induction motor bearings diagnostics

    Publication

    This paper contains research results of the diagnostics of induction motor bearings based on measurement of the supply current with usage of artificial neural networks. Bearing failure amount is greater than 40% of all engine failures, which makes their damage-free operation crucial. Tests were performed on motors with intentionally made bearings defects. Chapter 2 introduces the concept of artificial neural networks. It presents...

  • Metaheuristic algorithms for optimization of resilient overlay computing systems

    Publication
    • K. Walkowiak
    • W. Charewicz
    • M. Donajski
    • J. Rak

    - Logic journal of the IGPL - Year 2014

    The idea of distributed computing systems has been gaining much interest in recent years owing to the growing amount of data to be processed for both industrial and academic purposes. However, similar to other systems, also distributed computing systems are vulnerable to failures. Due to strict QoS requirements, survivability guarantees are necessary for provisioning of uninterrupted service. In this article, we focus on reliability...

    Full text to download in external service

  • Relay-aided Wireless Sensor Network Discovery Algorithm for Dense Industrial IoT utilizing ESPAR Antennas

    Publication

    - IEEE Internet of Things Journal - Year 2021

    Industrial Internet of Things (IIoT) applicationsrequire reliable and efficient wireless communication. Assumingdense Wireless Sensor Networks (WSNs) operating in a harshenvironment, a concept of a Time Division Multiple Access(TDMA) based WSN enriched with Electronically SteerableParasitic Array Radiator (ESPAR) antennas is proposed andexamined in this work. The utilized...

    Full text available to download

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Diagnosing wind turbine condition employing a neural network to the analysis of vibroacoustic signals

    It is important from the economic point of view to detect damage early in the wind turbines before failures occur. For this purpose, a monitoring device was built that analyzes both acoustic signals acquired from the built-in non-contact acoustic intensity probe, as well as from the accelerometers, mounted on the internal devices in the nacelle. The signals collected in this way are used for long-term training of the autoencoder...

    Full text available to download

  • On-line Search in Two-Dimensional Environment

    We consider the following on-line pursuit-evasion problem. A team of mobile agents called searchers starts at an arbitrary node of an unknown network. Their goal is to execute a search strategy that guarantees capturing a fast and invisible intruder regardless of its movements using as few searchers as possible. We require that the strategy is connected and monotone, that is, at each point of the execution the part of the graph...

    Full text available to download

  • Leader election for anonymous asynchronous agents in arbitrary networks

    Publication

    - DISTRIBUTED COMPUTING - Year 2014

    We consider the problem of leader election among mobile agents operating in an arbitrary network modeled as an undirected graph. Nodes of the network are unlabeled and all agents are identical. Hence the only way to elect a leader among agents is by exploiting asymmetries in their initial positions in the graph. Agents do not know the graph or their positions in it, hence they must gain this knowledge by navigating in the graph...

    Full text available to download

  • A survey of strategies for communication networks to protect against large-scale natural disasters

    Publication
    • T. Gomes
    • J. Tapolcai
    • C. Esposito
    • D. Hutchison
    • F. Kuipers
    • J. Rak
    • D. Amaro
    • A. Iossifides
    • R. Travanca
    • J. Andre... and 8 others

    - Year 2016

    Recent natural disasters have revealed that emergency networks presently cannot disseminate the necessary disaster information, making it difficult to deploy and coordinate relief operations. These disasters have reinforced the knowledge that telecommunication networks constitute a critical infrastructure of our society, and the urgency in establishing protection mechanisms against disaster-based disruptions. Hence, it is important...

    Full text to download in external service

  • RNDM 2016 Workshop and 2nd Meeting of COST CA15127-RECODIS: Highlights from the Resilience Week in Halmstad, Sweden

    Publication
    • M. Jonsson
    • J. Rak
    • D. Papadimitriou
    • A. Somani

    - IEEE COMMUNICATIONS MAGAZINE - Year 2017

    Leading network resilience researchers took part in the Resilience Week on Sept. 12-15, 2016 at Halmstad University, SE by Prof. Magnus Jonsson from the Centre for Research on Embedded Systems (CERES), Halmstad University, SE, and Prof. Jacek Rak from Gdansk University of Technology, PL. It included two major events: - The 2nd Meeting of COST CA15127–RECODIS Action (Resilient Communication Services Protecting End-user Applications...

    Full text to download in external service

  • Deep Learning-Based LOS and NLOS Identification in Wireless Body Area Networks

    In this article, the usage of deep learning (DL) in ultra-wideband (UWB) Wireless Body Area Networks (WBANs) is presented. The developed approach, using channel impulse response, allows higher efficiency in identifying the direct visibility conditions between nodes in off-body communication with comparison to the methods described in the literature. The effectiveness of the proposed deep feedforward neural network was checked on...

    Full text available to download

  • A Development of a Capacitive Voltage Divider for High Voltage Measurement as Part of a Combined Current and Voltage Sensor

    Publication

    - Elektronika Ir Elektrotechnika - Year 2020

    This article deals with the development of capacitive voltage divider for high voltage measurements and presents a method of analysis and optimization of its parameters. This divider is a part of a combined voltage and current sensor for measurements in high voltage power networks. The sensor allows continuous monitoring of the network distribution status and performs a quick diagnosis and location of possible network failures....

    Full text available to download

  • Long-distance quantum communication over noisy networks without long-time quantum memory

    Publication
    • P. Mazurek
    • A. Grudka
    • M. Horodecki
    • P. Horodecki
    • J. Łodyga
    • Ł. Pankowski
    • A. Przysiężna

    - PHYSICAL REVIEW A - Year 2014

    The problem of sharing entanglement over large distances is crucial for implementations of quantum cryptography. A possible scheme for long-distance entanglement sharing and quantum communication exploits networks whose nodes share Einstein-Podolsky-Rosen (EPR) pairs. In Perseguers et al. [Phys. Rev. A 78, 062324 (2008)] the authors put forward an important isomorphism between storing quantum information in a dimension D and transmission...

    Full text available to download

  • Maximizing SDN resilience to node‐targeted attacks through joint optimization of the primary and backup controllers placements

    Publication
    • M. Pióro
    • M. Mycek
    • A. Tomaszewski
    • A. de Sousa

    - NETWORKS - Year 2024

    In Software Defined Networks (SDN) packet data switches are configured by a limited number of SDN controllers, which respond to queries for packet forwarding decisions from the switches. To enable optimal control of switches in real time the placement of controllers at network nodes must guarantee that the controller-to-controller and switch-to-controller communications delays are bounded. Apart from the primary controllers that...

    Full text to download in external service

  • The selected hydrotechnical conditions of the Dnieper – Bug Channel and the Pripyat River in the development of the International Waterway E40

    Publication

    - Bulletin of the Maritime Institute in Gdańsk - Year 2017

    International waterway E40 (MDW E40) is included in the network of inland waterways of transnational importance. It is a link between two areas: the Baltic Sea and the Black Sea. E40 route runs through three countries: Poland, Belarus and Ukraine. The article presents the results of the study on the analysis of two very important sections of the MDW E40 on the Belarusian section, it is:. the Dnieper – Bug Channel and the Pripy...

    Full text available to download

  • Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT

    Publication
    • P. Jagannathan
    • S. Gurumoorthy
    • A. Stateczny
    • P. B. Divakarachar
    • J. Sengupta

    - SENSORS - Year 2021

    In recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...

    Full text available to download

  • Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network

    The capability of proactive in-network caching and sharing of content is one of the most important features of an informationcentric network (ICN). We describe an ICN model featuring autonomous agents controlling the content routers. Such agents are unlikely to share cached content with other agents without an incentive to do so. To stimulate cooperation between agents, we adopt a reputation and trust building scheme that is able...

    Full text available to download