Results 1 to 10 of about 547,474 (285)

Efficient and safe software defined network topology discovery protocol

open access: yes网络与信息安全学报, 2023
The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is ...
Dong LI, Junqing YU, Yongpu GU, Pengcheng ZHAO
doaj   +3 more sources

Study on Topology Reconfiguration of Optical Interconnection Network in Data Center

open access: yesGuangtongxin yanjiu, 2022
Aiming at preventing the network performance deterioration caused by fixed link topology connections in optically switched networks, this paper proposes and validates an interconnection and control mechanism that can automatically optimize and ...
Wen YANG   +6 more
doaj   +3 more sources

Topology Duration Optimization for UAV Swarm Network under the System Performance Constraint

open access: yesApplied Sciences, 2023
Network topology construction plays an important role in the application of large-scale unmanned aerial vehicle (UAV) swarm. Current researches usually perform the topology construction in terms of criteria of nodes energy consumption, transmission delay
Rui Zhou   +4 more
doaj   +1 more source

Research on Energy-Aware Topology Strategy Based on Wireless Sensor in Internet of Things [PDF]

open access: yesInternational Journal of Computational Intelligence Systems, 2014
Since the finitude of hardware and network dynamic limit the bandwidth based on wireless sensor in the wireless internet of things (IOT), it is difficult to obtain the network topology information accurately and timely.
XueFei Tang, XinZheng Niu, Shahzad Ali
doaj   +1 more source

Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network

open access: yesEmitter: International Journal of Engineering Technology, 2013
IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area.
M. Udin Harun Al Rasyid   +2 more
doaj   +3 more sources

Discovering the network topology: an efficient approach for SDN [PDF]

open access: yes, 2016
Network topology is a physical description of the overall resources in the network. Collecting this information using efficient mechanisms becomes a critical task for important network functions such as routing, network management, quality of service ...
Cervelló Pastor, Cristina   +2 more
core   +4 more sources

Active Topology Inference using Network Coding [PDF]

open access: yes, 1998
Our goal is to infer the topology of a network when (i) we can send probes between sources and receivers at the edge of the network and (ii) intermediate nodes can perform simple network coding operations, i.e., additions.
Buchbinder, E.I.   +3 more
core   +3 more sources

Novel Online Dimensionality Reduction Method with Improved Topology Representing and Radial Basis Function Networks. [PDF]

open access: yesPLoS ONE, 2015
This paper presents improvements to the conventional Topology Representing Network to build more appropriate topology relationships. Based on this improved Topology Representing Network, we propose a novel method for online dimensionality reduction that ...
Shengqiao Ni   +3 more
doaj   +1 more source

Network Topology Inference Based on Subset Structure Fusion

open access: yesIEEE Access, 2020
Network topology measurement is an important component in network research. Network tomography is able to accurately infer network topology by using end-to-end measurement without cooperation of internal routers.
Jian Ye   +3 more
doaj   +1 more source

A hierarchical network model for network topology design using genetic algorithm

open access: yesMATEC Web of Conferences, 2017
Network topology design has directly impact on network construction costs and network performance. Majority of current network topology design take the network physical topology parameters into consideration, such as the reliability and cost constraints,
Wang Chunlin   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy