147 results on '"Network overhead"'
Search Results
2. Toward efficient vehicular-based virtual network infrastructure for smart cities
- Author
-
Islam Tharwat Abdel-Halim and Hossam Mahmoud Ahmed Fahmy
- Subjects
Heterogeneous vehicular networks ,Infrastructure stability ,Mobility prediction ,Network overhead ,Traffic offloading ,Engineering (General). Civil engineering (General) ,TA1-2040 - Abstract
Future smart cities will undoubtedly generate and process an immense volume of data. Developing a smart network infrastructure is thus becoming a key component for the better development and efficient governance of smart cities. The main objective of this article is to examine the feasibility of utilizing moving vehicles to develop an efficient Vehicular-based Virtual Network Infrastructure (VVNI) for smart cities. The basic idea here is to divide the whole city into distinct cells, then predict and evaluate the vehicle eligibility to act efficiently as a centralized communication and information hub for each cell. Specifically, we present the basic framework of the proposed VVNI, and identify the corresponding efficiency requirements in terms of service availability, cost, and quality; then we introduce novel metrics to characterize the vehicle's ability to cope with these requirements. Several simulation scenarios were conducted to assess the efficiency of the proposed VVNI. The simulation results demonstrate how the proposed model outperforms existing models and improves system performance in three benchmark areas: throughput, packet delivery ratio, and latency, especially in medium- and high-density network scenarios with slower vehicle velocities. The simulation results are promising to further enhance the development of the proposed network infrastructure.
- Published
- 2023
- Full Text
- View/download PDF
3. FL_GIoT: Federated Learning Enabled Edge-Based Green Internet of Things System: A Comprehensive Survey
- Author
-
Joseph Bamidele Awotunde, Samarendra Nath Sur, Rasheed Gbenga Jimoh, Dayo Reuben Aremu, Dinh-Thuan Do, and Byung Moo Lee
- Subjects
Federated learning ,network overhead ,energy consumption ,edge computing ,green Internet of Things ,security and privacy ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In today’s world, the importance of the Green Internet of Things (GIoT) in the transformed sustainable smart cities cannot be overstated. For a variety of applications, the GIoT may make use of advanced machine learning (ML) methodologies. However, owing to high processing costs and privacy issues, centralized ML-based models are not a feasible option for the large data kept at a single cloud server and created by multiple devices. In such circumstances, edge-based computing may be used to increase the privacy of GIoT networks by bringing them closer to users and decentralizing them without requiring a central authority. Nonetheless, enormous amounts of data are stored in a distribution mechanism, and managing them for application purposes remains a difficulty. Hence, federated learning (FL) is one of the most promising solutions for bringing learning to end devices through edge computing without sharing private data with a central server. Therefore, the paper proposes a federated learning-enabled edge-based GIoT system, which seeks to improve the communication strategy while lowering liability in terms of energy management and data security for data transmission. The proposed model uses FL to produce feature values for data routing, which could aid in sensor training for identifying the best routes to edge servers. Furthermore, combining FL-enabled edge-based techniques simplifies security solutions while also allowing for a more efficient computing system. The experimental results show an improved performance against existing models in terms of network overhead, route interruption, energy consumption, and end-to-end delay, route interruption.
- Published
- 2023
- Full Text
- View/download PDF
4. Research on Network Overhead of Two Kinds of Wireless Ad Hoc Networks Based on Network Fluctuations
- Author
-
Shang, Jianhua, Liu, Ying, Tong, Xin, Barbosa-Povoa, Ana Paula, Editorial Board Member, de Almeida, Adiel Teixeira, Editorial Board Member, Gans, Noah, Editorial Board Member, Gupta, Jatinder N. D., Editorial Board Member, Heim, Gregory R., Editorial Board Member, Hua, Guowei, Editorial Board Member, Kimms, Alf, Editorial Board Member, Li, Xiang, Editorial Board Member, Masri, Hatem, Editorial Board Member, Nickel, Stefan, Editorial Board Member, Qiu, Robin, Editorial Board Member, Shankar, Ravi, Editorial Board Member, Slowiński, Roman, Editorial Board Member, Tang, Christopher S., Editorial Board Member, Wu, Yuzhe, Editorial Board Member, Zhu, Joe, Editorial Board Member, Zopounidis, Constantin, Editorial Board Member, Shi, Xianliang, editor, Bohács, Gábor, editor, Ma, Yixuan, editor, Gong, Daqing, editor, and Shang, Xiaopu, editor
- Published
- 2022
- Full Text
- View/download PDF
5. Adaptive extreme learning machine ‐ Fuzzy system framework for energy optimization of IOTs in wireless sensor networks.
- Author
-
Subramaniam Nachimuthu, Deepa, I, Jasmine Selvakumari Jeya, and Baladhandapani, Aruna Devi
- Abstract
In this paper, a new adaptive extreme learning machine (ELM) neural network‐Fuzzy system framework is developed for effective and efficient network energy optimization of internet‐of‐things (IoTs) sensor nodes in wireless sensor networks (WSNs). Each sensor nodes in a WSN communicates with one another in varied methods to transfer the data from IoT cloud to the other virtual modes. Optimization of IoTs in sensor networks tends to handle the network energy and accuracy with the help of extremely complex clustering techniques. Henceforth, this paper has developed a novel adaptive ELM‐Fuzzy system framework to handle the network energy level in an optimum way and thus achieving better data accuracy and network throughput by reducing the overhead of the network to the maximum possible. Numerical simulations carried out proves the consistency and efficacy of the modeled novel adaptive ELM‐ Fuzzy system framework for IoT based sensor network on comparing with traditional techniques from previous literatures. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
6. Data Aggregation Aware Routing for Distributed Training
- Author
-
Chen, Zhaohong, Long, Xin, Wu, Yalan, Chen, Long, Wu, Jigang, Liu, Shuangyin, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Zhang, Yong, editor, Xu, Yicheng, editor, and Tian, Hui, editor
- Published
- 2021
- Full Text
- View/download PDF
7. Proposing a new method for improving RPL to support mobility in the Internet of things.
- Author
-
Hoghooghi, Samaneh and Javidan, Reza
- Abstract
The internet engineering task force working group has proposed IPv6 Routing Protocol for Low‐power and Lossy (RPL) networks for the energy‐constrained networks on the Internet of things. This protocol has limitations and does not pay particular attention to mobile nodes. We introduce a new method to improve the RPL protocol with the aim to provide continuous connectivity for mobile nodes. Using additional fields to RPl control packets, a parent is responsible for mobility detection and informs a mobile node for maintaining the energy of it and reduces network overheads. A mobile node chooses a new parent based on metrics namely expected transmission count, received signal strength indicator and residual energy, before disconnection from previous parent. Memory has also been defined that maintains a list of previous parents and when selecting a new parent, a mobile node gets help from this list to select stable parents. They used the Cooja simulator to evaluate the performance of the proposed protocol and the results compared with the RPL and mRPL from the aspect of packet delivery ratio, network overhead, end‐to‐end delay, energy consumption, and end‐to‐end throughput under different scenarios. The simulation results showed the effectiveness of the proposed method. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
8. A Low Overhead and Stable Clustering Scheme for Crossroads in VANETs
- Author
-
Huo, Yan, Liu, Yuejia, Xing, Xiaoshuang, Cheng, Xiuzhen, Ma, Liran, Jing, Tao, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Xu, Kuai, editor, and Zhu, Haojin, editor
- Published
- 2015
- Full Text
- View/download PDF
9. Reducing the network overhead of user mobility–induced virtual machine migration in mobile edge computing.
- Author
-
Zhang, Fei, Liu, Guangming, Zhao, Bo, Fu, Xiaoming, and Yahyapour, Ramin
- Subjects
VIRTUAL machine systems ,MOBILE computing ,SMARTPHONES ,MOBILE apps ,HEURISTIC algorithms - Abstract
Summary: With the popularity of mobile devices (such as smartphones and tablets) and the development of the Internet of Things, mobile edge computing is envisioned as a promising approach to improving the computation capabilities and energy efficiencies of mobile devices. It deploys cloud data centers at the edge of the network to lower service latency. To satisfy the high latency requirement of mobile applications, virtual machines (VMs) have to be correspondingly migrated between edge cloud data centers because of user mobility. In this paper, we try to minimize the network overhead resulting from constantly migrating a VM to cater for the movement of its user. First, we elaborate on two simple migration algorithms (M‐All and M‐Edge), and then, two optimized algorithms are designed by classifying user mobilities into two categories (certain and uncertain moving trajectories). Specifically, a weight‐based algorithm (M‐Weight) and a mobility prediction–based heuristic algorithm (M‐Predict) are proposed for the two types of user mobilities, respectively. Numerical results demonstrate that the two optimized algorithms can significantly lower the network overhead of user mobility–induced VM migration in mobile edge computing environments. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
10. A Forwarding Game Approach for Reducing Topology Control Traffic in MANETs.
- Author
-
Amraoui, Hicham, Habbani, Ahmed, and Hajami, Abdelmajid
- Subjects
- *
AD hoc computer networks , *ARTIFICIAL neural networks , *PARTICLE swarm optimization - Abstract
With the advances of mobile ad hoc networks, reducing control traffic has become one of the most important fields that need to be addressed in different routing protocols. In such networks, where optimized link state routing (OLSR) is used as a routing protocol, each node broadcasts the topology control (TC) messages so as to share the network topology with other devices. Furthermore, and in order to optimize the TC overhead, OLSR uses a mechanism called multi-point relays (MPR) which is considered as the key functionality of this protocol. However, the redundant control packets will always exist and circulate across the network. In this paper, the key novelty is to propose a forwarding strategy for a robust minimization of the topology control traffic. The suggested solution is based on the forwarding game theoretic approach. Moreover, the proposal aims to control the duplicate transmission of TC messages forwarded by MPR nodes in order to improve the network overhead and energy consumption. Additionally, the simulation results using network simulator 3 are presented to confirm the effectiveness of the proposed solution. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
11. A prediction-based protocol for online target tracking in VSNs
- Author
-
Lyes Khelladi, Zouina Doukha, and Abdessamed Derder
- Subjects
Rest (physics) ,Basis (linear algebra) ,Computer science ,Performance comparison ,Real-time computing ,Process (computing) ,Network overhead ,Overhead (computing) ,Electrical and Electronic Engineering ,Tracking (particle physics) ,Protocol (object-oriented programming) - Abstract
In this paper, we propose the use of a prediction approach for real-time tracking in VSNs. Our solution anticipates the target’s future direction and concentrates the tracking process in specific zones to enhance the tracking precision. Furthermore, it optimizes the network load by concentrating tracking data in the predicted zones and thereby lightens the overhead on the rest of the network. To achieve this, the prediction module calculates probabilities of undertaking each direction at intersections on the basis of three parameters: road type, checkpoints avoidance and direction trends. We have conducted a stimulative study considering two types of movement profile : known and unknown profile respectively. Simulation results show a prediction success rate above 60% and up to 85% for the known profile scenarios. In addition, the performance comparison with a previous solution revealed a significant decrease in terms of network overhead, reaching a network load of 3080,622 bits/s using the prediction module as compared to 5006,88 bits for the previous protocol.
- Published
- 2021
12. An Efficient and Reliable flooding in MANETs
- Author
-
Jung, Jinman, Cho, Yookun, Kim, Yeongkwun, Yi, Sangho, Park, Hyungbae, Shin, Sung Y., editor, Gantenbein, Rex, editor, Kuo, Tei-Wei, editor, and Hong, Jiman, editor
- Published
- 2010
- Full Text
- View/download PDF
13. Detecting and Preventing the Electronic Transmission of Illicit Images and Its Network Performance
- Author
-
Ibrahim, Amin, Martin, Miguel Vargas, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, and Goel, Sanjay, editor
- Published
- 2010
- Full Text
- View/download PDF
14. ERASP: An Efficient and Robust Adaptive Superpeer Overlay Network
- Author
-
Liu, Wenjun, Yu, Jiguo, Song, Jingjing, Lan, Xiaoqing, Cao, Baoxiang, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Zhang, Yanchun, editor, Yu, Ge, editor, Bertino, Elisa, editor, and Xu, Guandong, editor
- Published
- 2008
- Full Text
- View/download PDF
15. Investigating Orphan Transactions in the Bitcoin Network
- Author
-
Ari Trachtenberg, Muhammad Anas Imtiaz, and David Starobinski
- Subjects
Computer Networks and Communications ,Computer science ,Node (networking) ,Byte ,Memory pool ,Joins ,020206 networking & telecommunications ,02 engineering and technology ,Discount points ,Computer security ,computer.software_genre ,Overhead (business) ,0202 electrical engineering, electronic engineering, information engineering ,Network overhead ,Electrical and Electronic Engineering ,Database transaction ,computer - Abstract
Orphan transactions are those whose parental income sources are missing at the time that they are processed. These transactions typically languish in a local buffer until they are evicted or all their parents are discovered, at which point they may be propagated further. To date, there has been little work in the literature on characterizing the nature and impact of such orphans, and yet it is intuitive that they should affect the performance of the Bitcoin network. This work thus seeks to methodically research such effects through a measurement campaign on live Bitcoin nodes. Our data show that about 45% of orphan transactions end up being included in the blockchain. Surprisingly, orphan transactions tend to have fewer parents on average than non-orphan transactions, and their missing parents have a lower fee, larger size, and lower transaction fee per byte than all other received transactions. Moreover, the network overhead incurred by these orphan transactions can be significant, exceeding 17% when using the default orphan memory pool size (i.e., 100 transactions), although this overhead can be made negligible, without significant computational or memory demands, if the pool size is simply increased to 1000 transactions. Finally, we show that when a node with an empty mempool first joins the network, 25% of the transactions that it receives become orphan, whereas in steady-state this quantity drops to about 1%.
- Published
- 2021
16. Policy-Induced Unsupervised Feature Selection : A Networking Case Study
- Author
-
Taghia, J., Moradi, F., Larsson, H., Lan, X., Ebrahimi, Masoumeh, Johnsson, A., Taghia, J., Moradi, F., Larsson, H., Lan, X., Ebrahimi, Masoumeh, and Johnsson, A.
- Abstract
A promising approach for leveraging the flexibility and mitigating the complexity of future telecom systems is the use of machine learning (ML) models that can analyze the network performance, as well as taking proactive actions. A key enabler for ML models is timely access to reliable data, in terms of features, which require pervasive measurement points throughout the network. However, excessive monitoring is associated with network overhead. Considering domain knowledge may provide clues to find a balance between overhead reduction and meeting requirements on future ML use cases by monitoring just enough features. In this work, we propose a method of unsupervised feature selection that provides a structured approach in incorporation of the domain knowledge in terms of policies. Policies are provided to the method in form of must-have features defined as the features that need to be monitored at all times. We name such family of unsupervised feature selection the policy-induced unsupervised feature selection as the policies inform selection of the latent features. We evaluate the performance of the method on two rich sets of data traces collected from a data center and a 5G-mmWave testbed. Our empirical evaluations point at the effectiveness of the solution., QC 20230612
- Published
- 2022
- Full Text
- View/download PDF
17. IP Traceback Algorithm for DoS/DDoS Attack
- Author
-
Yim, Hong-bin, Jung, Jae-il, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Kim, Young-Tak, editor, and Takano, Makoto, editor
- Published
- 2006
- Full Text
- View/download PDF
18. Efficient and Coordinated Checkpointing for Reliable Distributed Data Stream Management
- Author
-
Brettlecker, Gert, Schuldt, Heiko, Schek, Hans-Jörg, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Manolopoulos, Yannis, editor, Pokorný, Jaroslav, editor, and Sellis, Timos K., editor
- Published
- 2006
- Full Text
- View/download PDF
19. Genius: Peer-to-Peer Location-Aware Gossip Using Network Coordinates
- Author
-
Ning, Ning, Wang, Dongsheng, Ma, Yongquan, Hu, Jinfeng, Sun, Jing, Gao, Chongnan, Zheng, Weiming, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Sunderam, Vaidy S., editor, van Albada, Geert Dick, editor, Sloot, Peter M. A., editor, and Dongarra, Jack, editor
- Published
- 2005
- Full Text
- View/download PDF
20. Discovering Topologies at Router Level
- Author
-
Emma, Donato, Pescapé, Antonio, Ventre, Giorgio, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Magedanz, Thomas, editor, Madeira, Edmundo R. M., editor, and Dini, Petre, editor
- Published
- 2005
- Full Text
- View/download PDF
21. Scalable Coordination Techniques for Distributed Network Monitoring
- Author
-
Sharma, Manish R., Byers, John W., Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Dovrolis, Constantinos, editor
- Published
- 2005
- Full Text
- View/download PDF
22. AESOP: Altruism-Endowed Self-organizing Peers
- Author
-
Ntarmos, Nikos, Triantafillou, Peter, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Ng, Wee Siong, editor, Ooi, Beng-Chin, editor, Ouksel, Aris M., editor, and Sartori, Claudio, editor
- Published
- 2005
- Full Text
- View/download PDF
23. Resource Dissemination Policies on Grids
- Author
-
Beltrán, Marta, Bosque, Jose L., Guzmán, Antonio, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Meersman, Robert, editor, Tari, Zahir, editor, and Corsaro, Angelo, editor
- Published
- 2004
- Full Text
- View/download PDF
24. Characterizing the Scalability of Decision- Support Workloads on Clusters and SMP Systems
- Author
-
Zhang, Yanyong, Sivasubramaniam, Anand, Zhang, Jianyong, Nagar, Shailabh, Franke, Hubertus, Goos, Gerhard, editor, Hartmanis, Juris, editor, van Leeuwen, Jan, editor, Monien, Burkhard, editor, and Feldmann, Rainer, editor
- Published
- 2002
- Full Text
- View/download PDF
25. Network overhead crowd management mechanism of virtual mobile Internet.
- Author
-
Wu, Hai-yan, Li, Wei-ping, and Wang, Jin
- Subjects
WIRELESS Internet ,VIRTUAL machine systems ,MOBILITY management (Mobile radio) ,COST control ,INTERNET administration ,RESOURCE management - Abstract
It has become the hot research issue that solves the bottleneck of resource management in the development of Internet through virtualization. However, there are the challenges of mobility management, resource management, and network overhead management in the virtualization of the Internet. First, based on the mobile Internet network construction and management mode, the mobile Internet virtual model was proposed for managing the differences of the port communication between the mobile Internet protocol layer and protocol layer. Secondly, based on the network management cost control and the reconstruction of the Internet virtualization, we designed the network overhead crowd optimization space and management vector. The network overhead crowd management mechanism is proposed, which will transport the mobile virtualization Internet topology to point-to-point structure. Finally, the simulation results verified the advantages of the network overhead management mechanism of the virtual mobile Internet in terms of the cost and real time of the network overhead management. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
26. Smart Load Balancing Algorithms in Cloud Computing—A Review
- Author
-
S. Anto, P. Madhavan, K. R. Jothi, M. Kohar, and M. Chadha
- Subjects
Computer science ,business.industry ,Distributed computing ,Network overhead ,Fault tolerance ,Cloud computing ,Load balancing (computing) ,business - Published
- 2020
27. Conclusion and Future Research Directions
- Author
-
Feng, Zhiyong, Zhang, Qixun, Zhang, Ping, Feng, Zhiyong, Zhang, Qixun, and Zhang, Ping
- Published
- 2015
- Full Text
- View/download PDF
28. PhD Forum Abstract: Efficient Computing and Communication Paradigms for Federated Learning Data Streams
- Author
-
Saira Bano
- Subjects
Focus (computing) ,Apache Kafka ,Computer science ,Data stream mining ,business.industry ,Distributed computing ,Deep learning ,Federated learning ,Fault tolerance ,Deep Learning ,Scalability ,Network overhead ,Artificial intelligence ,Latency (engineering) ,business - Abstract
In this work, we proposed an integration of Federated Learning with Apache Kafka, an open-source framework that enables the management of continuous data streams with fault tolerance, low latency, and horizontal scalability. Our main focus is to evaluate the impact of learning delays and network overhead when hundred of users are sending their model updates for the aggregation to improve the global model in Federated Learning.
- Published
- 2021
29. An enhanced low overhead and stable clustering scheme for crossroads in VANETs.
- Author
-
Huo, Yan, Liu, Yuejia, Ma, Liran, Cheng, Xiuzhen, and Jing, Tao
- Subjects
- *
VEHICULAR ad hoc networks , *AD hoc computer networks , *CLUSTERING of particles , *NETWORK performance , *LOAD balancing (Computer networks) - Abstract
In this paper, we study the clustering problem for crossroads in Vehicular Ad hoc Networks (VANETs). Considering the load balancing of both the whole network and each cluster based on the multiple metrics, an Enhanced Low Overhead and Stable Clustering (EnLOSC) scheme is presented to ensure the stability and security of clusters and to reduce the communication overhead in this case. The proposed capability metric, designed to find the vehicles with similar direction and better channel quality, is exploited in the processes of formation and maintenance to determine which node is suitable for a cluster head. Based on this, a Cluster Head Electing in Advance Mechanism (CHEAM) is developed in order to fairly select a new head for 'isolated' vehicles that may not belong to a cluster. Meanwhile, other metrics are related to the node density and cluster size, which are exploited in the Cluster Merging and Splitting Mechanisms to keep the system load balancing and to improve the communication quality. Furthermore, the proposed Discovery and Elimination Scheme (DES) is designed to tackle the malicious nodes that may hurt the cluster communication. Accordingly, an enhanced cluster maintenance strategy with multi-metrics and a secure scheme is proposed so as to reduce the number of isolated vehicles, keep appropriate loading for each cluster head, and protect the whole link over cluster communication. Numerical results and discussion indicate that the cluster stability, communication overhead, load balance, and security can be significantly enhanced by our proposed scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
30. A deep learning based data forwarding algorithm in mobile social networks
- Author
-
Qingshan Wang, Haoen Yang, Bin Deng, Wei Huang, and Qi Wang
- Subjects
Structure (mathematical logic) ,Computer Networks and Communications ,Computer science ,business.industry ,Network packet ,Node (networking) ,Deep learning ,Process (computing) ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Recurrent neural network ,0203 mechanical engineering ,Path (graph theory) ,0202 electrical engineering, electronic engineering, information engineering ,Network overhead ,Artificial intelligence ,business ,Algorithm ,Software - Abstract
The large-scale collection of mobile trajectories in mobile social networks makes it possible for us to use artificial intelligence, including deep learning, to explore the hidden attributes of the data and redesign data forwarding algorithms. In this paper, a data forwarding algorithm based on deep learning is proposed to transform data package communication from opportunistic forwarding to fixed path forwarding. First, by compiling statistics on real traces, we find that the number of connected nodes decreases linearly with the decrease of the sampling period, making it possible to use deep learning to process the node meeting data. Next, we design the recurrent neural network with an LSTM (Long Short-Term Memory) structure – a supervised deep learning system – to predict the probability of nodes meeting. We further propose a deep learning data forwarding algorithm which makes full use of fixed paths composed of instantaneous high-probability links. Finally, simulation results show that the algorithm proposed in this paper can effectively improve packet delivery ratio while greatly reducing network overhead.
- Published
- 2019
31. Adaptive extreme learning machine ‐ Fuzzy system framework for energy optimization of <scp>IOTs</scp> in wireless sensor networks
- Author
-
Jasmine Selvakumari Jeya I, Aruna Devi Baladhandapani, and Deepa Subramaniam Nachimuthu
- Subjects
Complementary and alternative medicine ,Computer science ,Real-time computing ,Pharmaceutical Science ,Network overhead ,Pharmacology (medical) ,Fuzzy control system ,Residual energy ,Energy minimization ,Wireless sensor network ,Extreme learning machine - Published
- 2021
32. Intermediate Pseudonym Certificate Generation for C-ITS
- Author
-
Hacène Fouchal
- Subjects
Computer science ,business.industry ,Pseudonym ,Certificate ,Computer security ,computer.software_genre ,Set (abstract data type) ,Public-key cryptography ,Identity (object-oriented programming) ,Network overhead ,business ,computer ,Anonymity ,Sign (mathematics) - Abstract
One of the most known mechanism to ensure privacy is the use of anonymity which means that drivers have to change their identity as much as possible. In the meantime, each message has to be authenticated when it is sent. To do so, each driver should sign its messages using its private key and has to send its certificate along with the message. The use of one certificate per driver will not ensure privacy since a certificate is easily correlated to the driver identity. For this reason, each driver will use a set of certificates denoted pseudonyms certificates (PC) Each vehicle has a set of PCs which will be used to sign sent messages and will be used as a part of the driver id. A PC is used for a limited period of time. In this paper we allow to a vehicle to generate additional PCs to its neighbors when they are close together for a period of time. It will allow to these neighbors to have more PCs. The neighbors will be able to change their PCs more frequently. Our choice is to allow a pseudonym derivation when a minimum number of vehicles are driving close to each other. The disadvantage of such a method is the network overhead which will increase due to sending of the driver vehicle certificate in each sent message.
- Published
- 2021
33. An Effective Location-Based Alert Messages Dissemination Scheme for Software Defined Vehicular Networks
- Author
-
Raoua Chakroun, Thierry Villemur, Slim Abdellatif, Équipe Services et Architectures pour Réseaux Avancés (LAAS-SARA), Laboratoire d'analyse et d'architecture des systèmes (LAAS), Université Toulouse Capitole (UT Capitole), Université de Toulouse (UT)-Université de Toulouse (UT)-Institut National des Sciences Appliquées - Toulouse (INSA Toulouse), Institut National des Sciences Appliquées (INSA)-Université de Toulouse (UT)-Institut National des Sciences Appliquées (INSA)-Université Toulouse - Jean Jaurès (UT2J), Université de Toulouse (UT)-Université Toulouse III - Paul Sabatier (UT3), Université de Toulouse (UT)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université de Toulouse (UT)-Université Toulouse Capitole (UT Capitole), and Université de Toulouse (UT)
- Subjects
Scheme (programming language) ,Vehicular ad hoc network ,business.industry ,Computer science ,Process (computing) ,Software ,Control theory ,Key (cryptography) ,Network overhead ,[INFO]Computer Science [cs] ,business ,Software-defined networking ,computer ,Computer network ,computer.programming_language - Abstract
International audience; Software Defined Networking (SDN) is considered as a key paradigm for future vehicular networks and its adoption may pave the way to novel approaches to support emerging and legacy ITS services, such as Alert Message (AM) dissemination. Historically, to meet the low dissemination delay requirements and full vehicle coverage, Vehicular Ad-hoc NeTworks (VANETs) were considered as the underlying assumption of most proposed AM dissemination schemes. With SDN, vehicular-to-infrastructure (V2I) links are a viable alternative that adds to Vehicle-to-vehicle (V2V) links. Moreover, a global view of the network at a centralized controller complemented with information on vehicles and their route helps to adjust the dissemination procedure to improve its performance and efficiency. In this paper, we propose a location-based AMs dissemination scheme that combines V2I broadcasts with V2V rebroadcasts in order to provide a low delivery delay, very limited collisions, high information coverage with insignificant signaling and network overhead. The originality of our scheme stands in the selection process of V2V rebroadcasts which is based on vehicles’ location with respect to predefined rebroadcast points selected by the controller. Our proposal is evaluated and compared to legacy techniques. It shows significant improvements in delivery delays and network resource utilization.
- Published
- 2021
34. Design and Performance Analysis of Routing Protocols for Delay Tolerant Networks
- Author
-
Ravi Singh Pippal and Puneet Dwivedi
- Subjects
First contact ,Routing protocol ,business.industry ,Computer science ,Node (networking) ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network overhead ,Latency (engineering) ,Routing (electronic design automation) ,Size measurement ,business ,Computer network - Abstract
Many of the researchers have done great effort in the field of Delay Tolerant Networks (DTNs). In this paper, all the major routing protocols (first contact, direct delivery, epidemic, prophet, max-prop and spray and wait routing protocols) are likewise investigated by varying the nodes traffic and buffer size. It is obvious from the outcomes shown that no one routing protocol is adequate for all the circumstances and diverse situation. Moreover, as the node traffic increases, Epidemic performs worst in case of Network Overhead. Additionally, as the node traffic increases, Prophet routing protocol performs better. So as to assess the performance, delivery probability ratio, network overhead ratio, avg. latency, avg. hop count and avg. buffer occupancy metrics are utilized.
- Published
- 2020
35. An Effective Low-Delay Server Routing Algorithm in WPAN Meshes.
- Author
-
Ren, Zhi, Wang, Kunlu, Lei, Hongjiang, and Cao, Jianlin
- Abstract
As a routing algorithm defined in IEEE 802.15.5, server routing (SR) can attain the optimal routes between source and destination nodes. However, we found that it has the following two problems: (1) unicasting the Link State Registrations does not utilize the available topology information, and (2) the relay list of Route Formations includes redundant contents. To address these problems, we propose a novel routing algorithm which can obtain more link state information without extra overhead and decrease the redundant information in Route Formations. Theoretical analysis and simulation results show that our proposed algorithm outperforms SR in terms of network overhead and the average end-to-end delay, while keeping the success rate of packets transmission unchanged. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
36. Self-adaptive and fast route recovery algorithm for WPAN mesh networks.
- Author
-
LEI Hongjiang, DENG Ke, ZHENG Yuan, and REN Zhi
- Abstract
The server routing (SR) algorithm has problems of large network overhead and long time route recovery in the route recovery stage of SR. To address this issue, a self-adaptive and fast route recovery algorithm (SFRR) is proposed. In SFRR, two new mechanisms which piggyback the source information and choose adaptively the route recovery mechanism are introduced to reduce the network overhead and improve the speed of the route recovery. Theoretical analysis and simulation results show that the network overhead, the average time of route recovery and the average end-to-end delay of SFRR are outperform that of SR. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
37. Realizing Macro Based Technique for Behavioral Attestation on Remote Platform
- Author
-
Muhammad Binsawad, Waqas Ahmed, Jawad Ali, Alhuseen Omar Alsayed, and Ahmad Shahrafidz Khalid
- Subjects
Measure (data warehouse) ,Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Trusted Computing ,Intrusion detection system ,Trustworthiness ,System call ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Network overhead ,020201 artificial intelligence & image processing ,Macro ,Architecture ,business - Abstract
In Trusted Computing, the client platform is checked for its trustworthiness using Remote Attestation. Integrity Measurement Architecture (IMA) is a well-known technique of TCG based attestation. However, due to static nature of IMA, it cannot be aware of the runtime behavior of applications which leads to integrity problems. To overcome this problem several dynamic behavior-based attestation techniques have been proposed that can measure the run-time behavior of applications by capturing all system-calls produced by them. In this paper, we have proposed a system call based technique of intrusion detection for remote attestation in which macros are used for reporting. Macros are used to denote subsequences of system calls of variable length. The basic goal of this paper is to shorten the number of system calls by the concept of macros which ultimately reduces the processing time as well as network overhead.
- Published
- 2020
38. Reducing the network overhead of user mobility-induced virtual machine migration in mobile edge computing
- Author
-
Xiaoming Fu, Guangming Liu, Ramin Yahyapour, Fei Zhang, and Bo Zhao
- Subjects
010302 applied physics ,Mobile edge computing ,business.industry ,Computer science ,02 engineering and technology ,021001 nanoscience & nanotechnology ,computer.software_genre ,01 natural sciences ,Virtual machine ,0103 physical sciences ,Network overhead ,0210 nano-technology ,business ,Internet of Things ,computer ,Software ,Computer network ,Live migration - Published
- 2018
39. Characterizing Orphan Transactions in the Bitcoin Network
- Author
-
Ari Trachtenberg, David Starobinski, and Muhammad Anas Imtiaz
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Computer science ,Byte ,Memory pool ,020206 networking & telecommunications ,02 engineering and technology ,Computer security ,computer.software_genre ,Discount points ,Overhead (business) ,0202 electrical engineering, electronic engineering, information engineering ,Peer to peer computing ,Network overhead ,020201 artificial intelligence & image processing ,Cryptography and Security (cs.CR) ,Database transaction ,computer - Abstract
Orphan transactions are those whose parental income-sources are missing at the time that they are processed. These transactions are not propagated to other nodes until all of their missing parents are received, and they thus end up languishing in a local buffer until evicted or their parents are found. Although there has been little work in the literature on characterizing the nature and impact of such orphans, it is intuitive that they may affect throughput on the Bitcoin network. This work thus seeks to methodically research such effects through a measurement campaign of orphan transactions on live Bitcoin nodes. Our data show that, surprisingly, orphan transactions tend to have fewer parents on average than non-orphan transactions. Moreover, the salient features of their missing parents are a lower fee and larger size than their non-orphan counterparts, resulting in a lower transaction fee per byte. Finally, we note that the network overhead incurred by these orphan transactions can be significant, exceeding 17% when using the default orphan memory pool size (100 transactions). However, this overhead can be made negligible, without significant computational or memory demands, if the pool size is merely increased to 1000 transactions.
- Published
- 2019
40. Apron-Aware Network Congestion Control Strategy Based on Opportunistic Transmission
- Author
-
Meihan Meng, Jingfang Su, and Weixing Chen
- Subjects
Network congestion ,Network packet ,business.industry ,Computer science ,Replica ,Network overhead ,Load balancing (computing) ,business ,Network congestion control ,Cellular automaton ,Computer network ,Data transmission - Abstract
To improve data transmission efficiency of the apron network, multiple copies of packets are injected into the network. However, this method will result in more redundant data in the network, which further leads to network congestion. To solve the congestion, a Congestion Control Strategy based on Irregular Cellular Automaton (CCSICA) is introduced in this paper. In the apron environment, according to the interaction characteristics of the cellular automaton and surrounding neighbors, the existence of the replica of the neighboring node is fully considered. Then design the corresponding state transfer rules to achieve the purpose of more rational use of limited network resources. The simulation results show that the network overhead ratio and message delivery ratio can be improved dramatically by our proposed strategy.
- Published
- 2019
41. A Network Coding Optimization Scheme for Niche Algorithm based on Security Performance
- Author
-
Sun Xuezi, Guangxian Xu, and Chao Liu
- Subjects
Niche genetic algorithm ,Fitness function ,Computer science ,Linear network coding ,Niche ,0202 electrical engineering, electronic engineering, information engineering ,Network overhead ,020206 networking & telecommunications ,02 engineering and technology ,Information security ,Algorithm ,Running time ,Coding (social sciences) - Abstract
The network coding optimization based on niche genetic algorithm can observably reduce the network overhead of encoding technology, however, security issues haven't been considered in the coding operation. In order to solve this problem, we propose a network coding optimization scheme for niche algorithm based on security performance (SNGA). It is on the basis of multi-target niche genetic algorithm(NGA)to construct a fitness function which with k-secure network coding mechanism, and to ensure the realization of information security and achieve the maximum transmission of the network. The simulation results show that SNGA can effectively improve the security of network coding, and ensure the running time and convergence speed of the optimal solution.
- Published
- 2019
42. Parcel-Fit: Low Network-Overhead Service-Chain Deployment for Better Datacenter Performance
- Author
-
Li-Ping Tung, Hsueh-Hong Kang, I-Chih Wang, and H.-P. Charles Wen
- Subjects
Network Functions Virtualization ,Software deployment ,business.industry ,Computer science ,Acceptance rate ,Network overhead ,Latency (engineering) ,business ,Virtual network ,Bin ,Computer network - Abstract
Network Function Virtualization (NFV) is emerging for service deployment in datacenters and how to efficiently deploying virtual network functions (VNFs) on VMs under SLA requirements is an key topic. Previous studies often overlook the network factor that deteriorates the datacenter performance due to unnecessary network occupation and inter-VM communication in a service function chain over the datacenter network, thus motivating us to develop Parcel-Fit. The concept of Parcel-Fit considers server capacities (i.e., CPU and memory) and network status (i.e. network occupation and server distance) to avoids unnecessary inter-VM communication in the datacenter network and thus minimize total latencies of the service function chain. In addition, Parcel-Fit is also incorporated into prior latency-minimized schemes for deploying service function chains (i.e. Multi-layer Bin Structure and SOVWin) and fulfill more SLA requirements. According to our experimental results, Parcel-Fit outperforms two conventional VM placement strategies (Best-Fit and First-Fit) on the basis of SOVWin/Multilayer Bin Structure by 28.50% less average latency, 24.54% less network occupation, 25.16% more acceptance rate and 72.04% less violation count, achieving better performance for deploying service function chains in datacenters.
- Published
- 2019
43. Analysis of congestion control based on Engset loss formula-inspired queue model in wireless networks
- Author
-
N. S. Kavitha and P. Malathi
- Subjects
General Computer Science ,Transmission delay ,Computer science ,Network packet ,business.industry ,Wireless network ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,02 engineering and technology ,Load balancing (computing) ,Network congestion ,Control and Systems Engineering ,Packet loss ,0202 electrical engineering, electronic engineering, information engineering ,Network overhead ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,business ,Queue ,Computer network - Abstract
Congestion is considered as a potential cause for increased transmission delay when packets are relayed between the source and destination of a mobile ad hoc environment. Thus, balancing the network resources in a distributed manner remains an indispensable consideration in facilitating effective sharing. The efficient sharing of network resources avoids load balancing in mobile nodes, thus preventing their rapid depletion. The proposed method improves the packet delivery rate and throughput of the network and it enables the process of load scheduling based on steady-state equations. Initially, it estimates the minimum queue length based on individual routes, then it sorts the node-disjoint individual routes and finally forwards the packets through the node-disjoint paths identified as reliable. This facilitates improved performances of about 21%, 17% and 25% in terms of packet delivery ratio, throughput and network overhead, compared to the benchmarked baseline queue-based load balancing techniques.
- Published
- 2017
44. An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols.
- Author
-
Han, Seon Yeong and Lee, Dongman
- Abstract
In mobile ad-hoc networks, local link connectivity information is extremely important for route establishment and maintenance. Periodic Hello messaging is a widely-used scheme to obtain local link connectivity information. However, unnecessary Hello messaging can drain batteries while mobile devices are not in use. This paper proposes an adaptive Hello messaging scheme to suppress unnecessary Hello messages without reduced detectability of broken links. Simulation results show that the proposed scheme reduces energy consumption and network overhead without any explicit difference in throughput. [ABSTRACT FROM PUBLISHER]
- Published
- 2013
- Full Text
- View/download PDF
45. Network overhead crowd management mechanism of virtual mobile Internet
- Author
-
Wu, Hai-yan, Li, Wei-ping, and Wang, Jin
- Published
- 2017
- Full Text
- View/download PDF
46. Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks
- Author
-
Guohong Cao and Xiaomei Zhang
- Subjects
Mobile radio ,Contact process ,Computer Networks and Communications ,business.industry ,Computer science ,Distributed computing ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,0202 electrical engineering, electronic engineering, information engineering ,Network overhead ,Pairwise comparison ,020201 artificial intelligence & image processing ,Transient (computer programming) ,Data delivery ,Electrical and Electronic Engineering ,business ,Cluster analysis ,Temporal information ,Software ,Computer network - Abstract
Community detection has received considerable attention because of its applications to many practical problems in mobile networks. However, when considering temporal information associated with a community (i.e., transient community), most existing community detection methods fail due to their aggregation of contact information into a single weighted or unweighted network. In this paper, we propose a contact-burst-based clustering method to detect transient communities by exploiting pairwise contact processes. In this method, we formulate each pairwise contact process as a regular appearance of contact bursts, during which most contacts between the pair of nodes happen. Based on this formulation, we detect transient communities by clustering the pairs of nodes with similar contact bursts. Since it is difficult to collect global contact information at individual nodes, we further propose a distributed method to detect transient communities. In addition to transient community detection, we also propose a new data forwarding strategy for delay tolerant networks, in which transient communities serve as the data forwarding unit. Evaluation results show that our strategy can achieve a much higher data delivery ratio than traditional community-based strategies with comparable network overhead.
- Published
- 2017
47. Qos Provisioning Fuzzy based Stable Election Protocol in WSN
- Author
-
Manwinder Singh and Amarpreet Kaur
- Subjects
Data aggregator ,Qos provisioning ,Computer science ,business.industry ,Network overhead ,Stable election protocol ,business ,Cluster analysis ,Wireless sensor network ,Fuzzy logic ,Computer network ,Efficient energy use - Abstract
— In a Wireless Sensor Network, the most significant parameter of sensor nodes is Energy. One of the demanding concerns in WSNs is Energy Efficiency. The solution to this problem is data aggregation which will decrease the network traffic. Data aggregation can be achieved by using Clustering Schemes which is an essential research area, because it provides multiple benefits such as it upgrades constancy and reduces the network overhead that prolongs the lifespan of the network. The major idea behind the clustering scheme is to deploy the sensor nodes in the network, compress the data gathered from the sensor nodes and then transfers the gathered data to the sink. Cluster head selection is the fundamental part in this procedure. Several Cluster Head Selection Techniques are considered in this paper. This paper proposed a fuzzy interface system which has used to choose a cluster head on the basis of different input parameters given to it. In this method, automated method has followed for the selection. Experimental analysis have performed between proposed, SEP and LEACH protocol on the basis of number of alive nodes, number of dead nodes and throughput. From the analysis, it has been concluded that the proposed technique enhances the lifetime of the network in comparison with other traditional methods
- Published
- 2017
48. Personalized Recommendation Mechanism Based on Collaborative Filtering in Cloud Computing Environment
- Author
-
Xinling Tang, Hongyan Xu, Yonghong Tan, and Yanjun Gong
- Subjects
Information retrieval ,General Computer Science ,Computer science ,business.industry ,Mechanism based ,Cloud computing ,02 engineering and technology ,k-nearest neighbors algorithm ,Set (abstract data type) ,Index score ,020204 information systems ,Distributed data store ,0202 electrical engineering, electronic engineering, information engineering ,Collaborative filtering ,Network overhead ,020201 artificial intelligence & image processing ,business - Abstract
With the advent of cloud computing era and the dramatic increase in the amount of data applications, personalized recommendation technology is increasingly important. However, due to large scale and distributed processing architecture and other characteristics of cloud computing, the traditional recommendation techniques which are applied directly to the cloud computing environment will be faced with low recommendation precision, recommended delay, network overhead and other issues, leading to a sharp decline in performance recommendation. To solve these problems, the authors propose a personalized recommendation collaborative filtering mechanism RAC in the cloud computing environment. The first mechanism is to develop distributed score management strategy, by defining the candidate neighbors (CN) concept screening recommended greater impact on the results of the project set. And the authors build two stage index score based on distributed storage system, in order to ensure the recommended mechanism to locate the candidate neighbor. They propose collaborative filtering recommendation algorithm based on the candidate neighbor on this basis (CN-DCF). The target users are searched in candidate neighbors by the nearest neighbor k project score. And the target user's top-N recommendation sets are predicted. The results show that in the cloud computing environment RAC has a good recommendation accuracy and efficiency recommended.
- Published
- 2017
49. A Dynamic Configuration Scheme of Storage Tiers for an Autonomous Distributed Storage System
- Author
-
Yuta Yokoi, Kiyoshi Shibayama, Hiroaki Hirata, Atsushi Nunome, and Shingo Shimano
- Subjects
Scheme (programming language) ,Computer science ,business.industry ,Node (networking) ,Computer data storage ,Distributed data store ,Network overhead ,business ,Execution time ,computer ,Computer network ,computer.programming_language - Abstract
We have proposed a distributed storage system which dynamically makes storage tiers and optimizes location of data blocks autonomously. This aims to enhance the I/O performance of the storage system without remarkable network overhead. Our system dynamically organizes storage tiers considering device characteristics. And the data blocks will be placed in a suitable storage tier according to their access pattern. In this paper, we propose a method to select the destination storage node for migration using an access characteristic of a data block to be migrated. This method dynamically ranks the storage nodes, and autonomously configures storage tiers based on relative performance to the migration initiator. Simulation results show that our scheme can shorten the execution time of a program with file I/O by 80% at maximum, in comparison with the static migration without considering the access characteristics of the migration data.
- Published
- 2017
50. Varied Priority-Based Data Forwarding via NDN in VANET
- Author
-
Zhou Zhi, Weigang Wu, and Siyang Wang
- Subjects
Data source ,050101 languages & linguistics ,Vehicular ad hoc network ,Computer science ,Network packet ,business.industry ,Node (networking) ,05 social sciences ,02 engineering and technology ,Data type ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,Network overhead ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,business ,Dissemination ,Computer network - Abstract
Recently, Named Data Networking (NDN) has been used for vehicular networks to improve the efficiency of data forwarding. However, existing solutions for vehicular NDN (V-NDN) rarely consider the priority of data packets. In this paper, we propose a priority-based data packet forwarding algorithm. We observed that different data types may have different priorities and the importance of a data packet decreases as the distance between data packet location and data source location increases. Our algorithm handles data packets differently according to their priorities. It first assigns data packets into three priority levels: high, medium and low. Then, when transmitting a data packet, the node uses either push or pull-based methods depending on the data packet's priority. For high-priority data packets, the push-based forwarding algorithm is adopted; for medium-and low-priority data packets, the pull-based forwarding algorithm is employed. With our design, the push-based forwarding algorithm is used in the local area to improve the hit ratio of high priority data; the pull-based forwarding algorithm is used to disseminate data packets to interested nodes and to reduce network overhead. Our algorithm satisfies the vehicle's need for different priority. Compared with existing works, our algorithm has a higher hit ratio than pure pull-based NDN and costs less overhead than traditional IP architectures. Simulations via SUMO, OpenStreetMap and ndnSIM verify the advantages of our work.
- Published
- 2019
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.