نتایج جستجو برای: control plane

تعداد نتایج: 1438618  

Journal: :Computer Networks 2014
Aaron Yi Ding Jon Crowcroft Sasu Tarkoma Hannu Flinck

In recent years we have seen a fast change in the networking industry: leading by the Software Defined Networking (SDN) paradigm that separates the control plane from the data plane to enable programmability and centralized control of the network infrastructure, the SDN design not only simplifies the network management but also accelerates the innovation speed of deploying advanced network appl...

2005
Raffaele Bolla Roberto Bruschi

Nowadays, networking equipment is realized by using decentralized architectures that often include special-purpose hardware elements. The latter considerably improve the performance on one hand, while on the other they limit the level of flexibility. Indeed, it is very difficult both to have access to details about internal operations and to perform any kind of interventions more complex than a...

Journal: :IEICE Transactions 2008
Masaki Aida Chisa Takano Masayuki Murata Makoto Imase

Recently problems with commercial IP telephony systems have been reported one after another, in Japan. One of the important causes is congestion in the control plane. It has been recognized that with the current Internet it is important to control not only congestion caused by overload of the data plane but also congestion caused by overload of the control plane. In particular, “retry traffic,”...

2004
Aristotelis Glentis Nancy Alonistioti

The development, delivery and management of mobile services are the subject of many research activities in both the academia and industry. The ultimate goal of these efforts is a dynamic environment that enables the delivery of situation-aware, personalized multimedia services over heterogeneous, ubiquitous infrastructures, commonly termed as systems beyond 3rd generation (3G). Reconfigurabilit...

2010
Rob Sherwood Glen Gibb Kok-Kiong Yap Guido Appenzeller Martín Casado Nick McKeown Guru M. Parulkar

A persistent problem in computer network research is validation. When deciding how to evaluate a new feature or bug fix, a researcher or operator must trade-off realism (in terms of scale, actual user traffic, real equipment) and cost (larger scale costs more money, real user traffic likely requires downtime, and real equipment requires vendor adoption which can take years). Building a realisti...

Journal: :CoRR 2018
Yanpeng Yang Hossein Shokri Ghadikolaei Carlo Fischione Marina Petrova Ki Won Sung

Millimeter-wave (mmWave) networks rely on directional transmissions, in both control plane and data plane, to overcome severe path-loss. Nevertheless, the use of narrow beams complicates the initial cell-search procedure where we lack sufficient information for beamforming. In this paper, we investigate the feasibility of random beamforming for cell-search. We develop a stochastic geometry fram...

2007
Feng Zhao Xicheng Lu Baosheng Wang Peidong Zhu

This paper focuses on the design of IBGP networks, which are very important to the reliability and stability of Internet. Although several metrics have been presented to measure the robustness of IBGP networks, they only considered the impact of route reflection networks on the control plane. A robust network should have low sensitivity to traffic load variations. So we propose a new metric to ...

Journal: :Optical Switching and Networking 2012
Isaac Seoane Eusebi Calle José Alberto Hernández Juan Segovia Ricardo Romeral Pere Vilà Manuel Urueña Marc Manzano

Network reliability and resilience has become a key design parameter for network operators and Internet service providers. These often seek ways to have their networks fully operational for at least 99.999% of the time, regardless of the number and type of failures that may occur in their networks. This article presents a continuous-time Markov chain model to characterise the propagation of fai...

2001
Roberto Mameli Stefano Salsano

This paper describes a solution for the Intserv operations over Diffserv network, based on the use of a Bandwidth Broker for the resource allocation. The Architectural scenario is described, which is based on the current IETF work in this area. For the communication of the admission control request to the Bandwidth Broker, the use of COPS protocol is proposed and the detailed protocol specifica...

2007
Jon Oberheide Evan Cooke Farnam Jahanian

As virtualization continues to become increasingly popular in enterprise and organizational networks, operators and administrators are turning to live migration of virtual machines for the purpose of workload balancing and management. However, the security of live virtual machine migration has yet to be analyzed. This paper looks at this poorly explored area and attempts to empirically demonstr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید