Search results for: ROUTING - Bridge of Knowledge

Search

Search results for: ROUTING

Search results for: ROUTING

  • MATHEMATICAL MODELING OF FLOOD MANAGEMENT SYSTEM IN THE CITY OF GDAŃSK, ORUŃSKI STREAM CASE STUDY

    Aim of the study This study analyses the efficiency of flood protection in a small urban catchment, based on a system of small reservoirs. Material and methods To assess the flood routing and surge reduction, a mathematical model of the river catchment was implemented. This was a lumped hydrological model, based on the SCS-CN method. Channel routing was performed, using kinematic wave equation. The sub-catchments have been determined...

    Full text available to download

  • A bound on the number of middle-stage crossbars in f-cast rearrangeable Clos networks

    Publication

    - Year 2015

    In 2006 Chen and Hwang gave a necessary and sufficient condition under which a three-stage Clos network is rearrangeable for broadcast connections. Assuming that only crossbars of the first stage have no fan-out property, we give similar conditions for f-cast Clos networks, where f is an arbitrary but fixed invariant of the network. Such assumptions are valid for some practical switching systems, e.g. high-speed crossconnects....

  • Badanie wybranych algorytmów rutingu QoS w sieciach MPLS

    W pracy dokonano przeglądu wybranych, opublikowanych algorytmów rutingu QoS dla sieci MPLS. Zrealizowano program "Ruting QoS" w środowisku MATLAB, w którym zaimplementowano trzy algorytmy: Profile-Based Routing, Kowalika-Colliera oraz Erbasa-Mathara. Przedstawiono i omówiono sieci, które zostały użyte do badań. Przebadano zaimplementowane algorytmy w przykładowych sieciach. Porównano badane algorytmy pod względem: procentu obsłużonych...

  • Water Resources Management 2022/2023

    e-Learning Courses
    • T. Kolerski
    • A. M. Mustafa

    Water Resources Management as defined for purpose of this course includes both water use and water excess management. The fundamental water resources engineering processes are the hydrologic processes and the hydraulic processes. The common threads that relate to the explanation of these processes are the fundamentals of fluid mechanics. The hydrologic processes include rainfall, evaporation, infiltration, rainfall-runoff and routing,...

  • Bartosz Sawik

    People

    Dr Bartosz Sawik is a Professor at the Department of Business Informatics and Engineering Management, AGH University of Science and Technology, Krakow, Poland and at the Institute of Smart Cities, GILT-OR Group, Department of Statistics, Computer Science and Mathematics, Public University of Navarre, Pamplona, Spain. He is a Visiting Researcher at the University of California, Berkeley, USA. He has a Ph.D. and a M.Sc. and Eng....

  • Future research directions in design of reliable communication systems

    Publication
    • J. Rak
    • M. Pickavet
    • K. S. Trivedi
    • J. A. Lopez
    • A. M. C. A. Koster
    • J. P. Sterbenz
    • E. Çetinkaya
    • T. Gomes
    • M. Gunkel
    • K. Walkowiak
    • D. Staessens

    - TELECOMMUNICATION SYSTEMS - Year 2015

    In this position paper on reliable networks, we discuss new trends in the design of reliable communication systems. We focus on a wide range of research directions including protection against software failures as well as failures of communication systems equipment. In particular, we outline future research trends in software failure mitigation, reliability of wireless communications, robust optimization and network design, multilevel...

    Full text available to download

  • INFLUENCE OF A VERTEX REMOVING ON THE CONNECTED DOMINATION NUMBER – APPLICATION TO AD-HOC WIRELESS NETWORKS

    Publication

    - Year 2015

    A minimum connected dominating set (MCDS) can be used as virtual backbone in ad-hoc wireless networks for efficient routing and broadcasting tasks. To find the MCDS is an NP- complete problem even in unit disk graphs. Many suboptimal algorithms are reported in the literature to find the MCDS using local information instead to use global network knowledge, achieving an important reduction in complexity. Since a wireless network...

    Full text to download in external service

  • Towards the boundary between easy and hard control problems in multicast Clos networks

    In this article we study 3-stage Clos networks with multicast calls in general and 2-cast calls, in particular. We investigate various sizes of input and output switches and discuss some routing problems involved in blocking states. To express our results in a formal way we introduce a model of hypergraph edge-coloring. A new class of bipartite hypergraphs corresponding to Clos networks is studied. We identify some polynomially...

    Full text available to download

  • Model of control plane of ASON/GMPLS network

    ASON (Automatic Switched Optical Network) is a concept of optical network recommended in G.8080/Y.1304 by ITU-T. Control Plane of this network could be based on GMPLS (Generalized Multi-Protocol Label Switching) protocols. This solution, an ASON control plane built on GMPLS protocols is named ASON/GMPLS. In the paper, we decompose the control plane problem and show the main concepts of ASON network. We propose a hierarchical architecture...

  • Decisional DNA based intelligent knowledge model for flexible manufacturing system

    Publication

    - JOURNAL OF INTELLIGENT & FUZZY SYSTEMS - Year 2019

    Modeling an effective mechanism for design and control strategies for the implementation of a flexible manufacturing system (FMS) has been a challenge. Consequently, to overcome this issue various techniques have applied in the past but most of these models are effective only for some specific situation or an element of FMS. In this study, the knowledge representation technique of Decisional DNA (DDNA) is applied to FMS to develop...

    Full text to download in external service

  • A taxonomy of challenges to resilient message dissemination in VANETs

    Publication

    - Year 2016

    Inter-vehicular communications is seen as a promising solution to a number of issues related with public road safety, road congestion management, and infotainment. However, Vehicular Ad-hoc NETworks (VANETs) characterized by high mobility of vehicles and facing a number of other issues related with high frequency wireless communications and network disconnections, encounter major challenges related with reliability of message delivery....

    Full text to download in external service

  • Fundamental Schemes to Determine Disjoint Paths for Multiple Failure Scenarios

    Publication
    • T. Gomes
    • L. Jorge
    • R. Girão-Silva
    • J. Yallouz
    • P. Babarczi
    • J. Rak

    - Year 2020

    Disjoint path routing approaches can be used to cope with multiple failure scenarios. This can be achieved using a set of k (k> 2) link- (or node-) disjoint path pairs (in single-cost and multi-cost networks). Alternatively, if Shared Risk Link Groups (SRLGs) information is available, the calculation of an SRLG-disjoint path pair (or of a set of such paths) can protect a connection against the joint failure of the set of links...

    Full text to download in external service

  • The Development of a Combined Method to Quickly Assess Ship Speed and Fuel Consumption at Different Powertrain Load and Sea Conditions

    Decision support systems (DSS) recently have been increasingly in use during ships operation. They require realistic input data regarding different aspects of navigation. To address the optimal weather routing of a ship, which is one of the most promising field of DSS application, it is necessary to accurately predict an actually attainable speed of a ship and corresponding fuel consumption at given loading conditions and predicted...

    Full text available to download

  • Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes

    Publication

    - Year 2019

    A novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...

    Full text available to download

  • Universal Augmentation Schemes for Network Navigability

    Publication
    • P. Fraigniaud
    • C. Gavoille
    • A. Kosowski
    • E. Lebhar
    • Z. Lotker

    - THEORETICAL COMPUTER SCIENCE - Year 2009

    Rozważano problem uzupełniania grafu (reprezentującego np. sieci społeczne) poprzez dodanie w każdym węźle jednego dodatkowego skierowanego połączenia (długodystansowego). Dokładniej, dla każdego węzła definiuje się listę prawdopodobieństw istnienia połączenia wychodzącego z danego węzła do wszystkich pozostałych węzłów; wartości tych prawdopodobieństw muszą sumować się do jedności. Routing zachłanny w takiej sieci polega na przekazywaniu...

    Full text available to download

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publication

    - IEEE Transactions on Network and Service Management - Year 2021

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Full text available to download

  • DST-Based Detection of Non-cooperative Forwarding Behavior of MANET and WSN Nodes

    Publication

    - Year 2009

    . Selfish node behavior can diminish the reliability of a mobile ad hoc network (MANET) or a wireless sensor network (WSN). Efficient detection of such behavior is therefore essential. One approach is to construct a reputation scheme, which has network nodes determine and share reputation values associated with each node; these values can next be used as input to a routing algorithm to avoid end-to-end routes containing ill-reputed...

  • INTER-LAYER SHARING OF BACKUP PATH CAPACITIES PROVIDING FAST SERVICE RECOVERY IN IP-MPLS/WDM NETWORKS

    Publication

    - Year 2013

    In this paper, we investigate the issue of providing the transmission continuity in IP-MPLS/WDM networks in the presence of failures of nodes/links. Special focus is put on assuring fast restoration of flows affected after a failure in a scenario assuming sharing the backup path capacities in order to decrease the overall bandwidth consumption. In particular, we propose a new approach to inter-layer sharing of link capacity reserved...

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publication
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Year 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Full text available to download

  • Enhancing Availability for Critical Services

    Publication
    • T. Gomes
    • L. Martins
    • R. Girão-Silva
    • D. Tipper
    • A. Pašić
    • B. Vass
    • L. Garrote
    • U. J. Nunes
    • M. Zachariasen
    • J. Rak

    - Year 2020

    Traditional approaches to provide classes of resilient service take the physical network availability as an input and then deploy redundancy and restoration techniques at various layers, often without full knowledge of mappings between layers. This makes it hard (and often inefficient) to ensure the high availability required by critical services which are typically a small fraction of the total traffic. Here, the innovative technique...

    Full text to download in external service

  • Impact of Urbanization on Stormwater Runoff from a Small Urban Catchment: Gdańsk Małomiejska Basin Case Study

    This paper deals with the impact of different forms of urbanization on the basin outflow. The influence of changes in land cover/use, drainage system development, reservoirs, and alternative ways of stormwater management (green roofs, permeable pavements) on basin runoff was presented in the case of a small urban basin in Gdańsk (Poland. Seven variants of area development (in the period of 2000-2012) – three historical and four...

    Full text available to download

  • Analiza algorytmów rutingu wspierających QoS w DiffServ.

    Publication

    - Year 2004

    W artykule podjęto tematykę związaną z opisem oraz analizą dostępnych algorytmów rutingu wspierających QoS dla specyficznej architektury sieci IP - DiffServ. Główną przyczyną jaka skłania do badania procedur rutingu QoS o wielu ograniczeniach (multi constrained routing) jest brak jak dotąd jednoznacznie sprecyzowanych, dokładnych metod pozwalających wyznaczyć drogi połączeniowe dla usług, dla których ma być gwarantowana jakość...

  • A repeated game formulation of network embedded coding for multicast resilience in extreme conditions

    Publication
    • C. Esposito
    • A. Castiglione
    • F. Palmieri
    • F. Pop
    • J. Rak

    - Year 2017

    Computer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...

    Full text to download in external service

  • Analiza algorytmów rutingu wspierających QoS w DiffServ

    Publication

    - Year 2005

    W pracy podjęto tematykę związaną z opisem oraz analizą dostępnych algorytmów rutingu wspierających QoS dla specyficznej architektury sieci IP - DiffServ. Główną przyczyną jaka skłania do badania procedur rutingu QoS o wielu ograniczeniach (multi constrained routing) jest brak jak dotąd jednoznacznie sprecyzowanych, dokładnych metod pozwalających wyznaczyć drogi połączeniowe dla usług, dla których ma być gwarantowana jakość (QoS...

  • How Machine Learning Contributes to Solve Acoustical Problems

    Publication
    • M. A. Roch
    • P. Gerstoft
    • B. Kostek
    • Z. Michalopoulou

    - Journal of the Acoustical Society of America - Year 2021

    Machine learning is the process of learning functional relationships between measured signals (called percepts in the artificial intelligence literature) and some output of interest. In some cases, we wish to learn very specific relationships from signals such as identifying the language of a speaker (e.g. Zissman, 1996) which has direct applications such as in call center routing or performing a music information retrieval task...

    Full text available to download

  • Clonal selection in discrete optimization

    Publication

    - Year 2009

    W rozprawie zajmujemy się efektywnymi metodami przybliżonego rozwiązywania problemów optymalizacji dyskretnej, a w szczególności algorytmami opartymi na metodzie selekcji klonalnej (SK), należącymi do kategorii sztucznych systemów immunologicznych. Techniki optymalizacji to znaczące pole badań w informatyce, a niektóre ze starszych technik, takie jak algorytmy genetyczne, symulowane wyżarzanie czy przeszukiwanie tabu, stały się...

  • Compact Quasi-Elliptic-Type Inline Waveguide Bandpass Filters With Nonlinear Frequency-Variant Couplings

    Publication

    This work presents the design techniques to synthesize a class of compact inline quasi-elliptic-type waveguide cavity bandpass filters based on novel nonlinear frequency-variant couplings (NFVCs). These highly dispersive frequency-variant couplings (FVCs) are realized by means of a pair of partial-height posts that are placed at the junctions between every two cavity resonators. Each NFVC produces a transmission pole in between...

    Full text to download in external service

  • Enhancing Resilience of FSO Networks to Adverse Weather Conditions

    Publication

    - IEEE Access - Year 2021

    Optical wireless networks realized by means of gigabit optical wireless communication (OWC) systems are becoming, in a variety of applications, an important alternative, or a complementary solution, to their fiber-based counterparts. However, performance of the OWC systems can be considerably degraded in periods of unfavorable weather conditions, such as heavy fog, which temporarily reduce the effective capacity of the network....

    Full text available to download

  • FLOOD MANAGEMENT IN URBAN BASINS OF THE CITY OF GDAŃSK

    Publication

    Over the last years, the City of Gdańsk suffers twice from flash floods. Both events were caused by intense storms which produced significant surface runoff and caused inundation private and cities properties. The first case of July 2001 flood [3], [9] was the turning point for the city authorities, who decide to look close on the flood management in small urban catchments. The aim of research projects was to establish technical...

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Dynamic host configuration protocol for IPv6 improvements for mobile nodes

    In wireless networks mobile clients change their physical location, which results in changing point of attachment to the network. Such handovers introduce unwanted periods, when node does not have communication capabilities. Depending on many conditions, such events may require reconfiguration of layer 2 (e.g. IEEE 802.16) or both 2 and 3 layers (IPv6). This paper investigates delays introduced in the latter type of handover. IPv6...

    Full text to download in external service

  • Analysis of IPv6 handovers in IEEE 802.16 environment

    The second generation of WiMAX solutions, based on IEEE 802.16-2005 standard, offers limited mobility support. Unfortunately, after quickly changing the point of attachment on the WiMAX data link layer (DLL), very slow and inefficient IPv6 reconfiguration takes place. Delays introduced by automatic configuration (DHCPv6 and IPv6 protocols) and Mobile IPv6 can easily diminish or even render useless all benefits gained using the...

    Full text to download in external service

  • Analysis of IPv6 Handovers in IEEE 802.16 environment

    Zaprezentowano pełną analizę wpływu poszczególnych faz procesu przełączania w warstwie drugiej i trzeciej na przerwy w transmisji wynikające ze zmiany stacji bazowej BS przez przemieszczający się węzeł ruchomy MN. Zaproponowano i przebadano symulacyjnie 10 scenariuszy przełączania, w tym 8 różnych algorytmów stanowej autokonfiguracji węzłów MN, wspierających protokół IPv6 w środowiskach sieci WiMAX. W badaniach wskazano na możliwości...

    Full text to download in external service

  • A New Heuristic Algorithm for Effective Preemption in MPLS Networks

    Publication

    - Year 2006

    W artykule opisano nowy algorytm wywłaszczania przeznaczony dla sieci MPLS. Umożliwia on alokację zasobów sieci dla nowej ścieżki uwzględniając koszt usuniętych jednej lub wielu istniejących już ścieżek. Proponowany heurystyczny algorytm wybiera ścieżki do wywłaszczenia wykorzystując informację o topologii sieci. Używa funkcji optymalizacji minimalizującej stratę pasma na poziomie sieci. Przedstawiono i omówiono wyniki badań symulacyjnych...

  • Router Selfishness in Community Wireless Mesh Networks: Cross-Layer Benefits and Harms

    Publication

    Węzły sieci mesh nie są poddane administracyjnej kontroli, zarazem nie odczuwają ograniczeń energetycznych. Są przez to skłonne do zachowań egoistycznych w warstwach 2 i 3 OSI, w szczególności w odniesieniu do protokołów MAC i routingowych. W pracy przebadano symulacyjnie wybrane aspekty środowiska mesh uzasadniające podjęcie ataków egoistycznych i zidentyfikowano trzy: gęstość rozmieszczenia i położenie routerów oraz warstwa OSI...

  • Projekt netBaltic - cele i zaproponowane rozwiązania

    Celem projektu netBaltic było pokazanie realizowalności szerokopasmowej sieci teleinformatycznej na morzu, umożliwiającej wdrożenie wielu nowych usług i aplikacji, w tym aplikacji dedykowanych dla środowisk morskich, zapewniających poprawę bezpieczeństwa i efektywności żeglugi. Prace w ramach projektu byly realizowane - przy istotnym finansowaniu przez NCBR w ramach Programu Badań Stosowanych - przez zespoły badawcze z Wydziału...

    Full text to download in external service

  • Service-based Resilience for Embedded IoT Networks

    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service