摘要 :
Today enterprises expand their activities and co-operate with each other in order to adapt their production to the fast changing market environment. The different forms of co-operation need new management approaches from the indiv...
展开
Today enterprises expand their activities and co-operate with each other in order to adapt their production to the fast changing market environment. The different forms of co-operation need new management approaches from the individual enterprises, to co-ordinate the work of the different manufacturing organisations. A new, co-operative manufacturing network model is proposed for co-ordinating the production of SMEs, based on the holonic paradigm. The model has been developed in the frame of an ESPRIT Project by four countries. The paper shortly describes the main modules of the model and introduces an application under realisation in Hungary, in an agricultural SME network.
收起
摘要 :
In this paper, we first briefly explain why mobile network computers should be used as mobile terminals based on the concept of mobile network computer and cloud computing. Then, we illustrate the related aspects of cloud computin...
展开
In this paper, we first briefly explain why mobile network computers should be used as mobile terminals based on the concept of mobile network computer and cloud computing. Then, we illustrate the related aspects of cloud computing including classification, characteristics, and technology. Finally, we investigate why mobile network computer can better realize mobile cloud computing using the cloud computing platform. Mobile network computer is an important concept, which is rational from both mobile network communications and mobile network computing perspective. We aim to promote the concept of the mobile network computer. Furthermore, we mainly illustrate that mobile network computers should be the terminals of mobile communication networks. Mobile network computers define modern mobile terminals better and reflect the nature of multiple mobile terminals based on the structure of their integrated computers and the capability of multimedia based on the concepts of mobile network computer and cloud computing. Moreover, we also illustrate how mobile network computing is realized by mobile network computers using the cloud computing platform. Computers are the main terminals of fixed and mobile networks, respectively. With the introduction of cloud computing, mobile network computers can better highlight their value using the cloud computing platform. The concept of mobile network computer is appropriate in the information age.
收起
摘要 :
Internet performance measurement is commonly perceived as a high-cost control-plane activity and until now it has tended to be implemented on top of the network's forwarding operation. Consequently, measurement mechanisms have oft...
展开
Internet performance measurement is commonly perceived as a high-cost control-plane activity and until now it has tended to be implemented on top of the network's forwarding operation. Consequently, measurement mechanisms have often had to trade relevance and accuracy over non-intrusiveness and cost effectiveness. In this paper, we present the software implementation of an in-line measurement mechanism that uses native structures of the Internet Protocol version 6 (IPv6) stack to piggyback measurement information on data-carrying traffic as this is routed between two points in the network. We carefully examine the overhead associated with both the measurement process and the measurement data, and we demonstrate that direct two-point measurement has minimal impact on throughput and on system processing load. The results of this paper show that adequately engineered measurement mechanisms that exploit selective processing do not compromise the network's forwarding efficiency, and can be deployed in an always-on manner to reveal the true performance of network traffic over small timescales.
收起
摘要 :
Network coding techniques offer an emerging solution to efficient data transmission in Delay Tolerant Networks (DTN). To date, abundant techniques have been developed on exploiting network coding in DTN, however, most of them brin...
展开
Network coding techniques offer an emerging solution to efficient data transmission in Delay Tolerant Networks (DTN). To date, abundant techniques have been developed on exploiting network coding in DTN, however, most of them bring additional overhead due to the extra coded message redundancy. In this paper, we analyze the coded message redundancy issue, and then propose NTC, an efficient network coding scheme for DTN. In NTC, a novel metric named "redundancy ratio" is introduced within the anti-entropy message exchange process. We also discuss the design and implementation of practical NTC in detail. To evaluate the performance of our proposed NTC scheme, we implement NTC in ONE, the current state-of-the-art simulator for DTN. Simulation results show that, comparing with existing schemes, our proposed NTC scheme has significant advantages in enhancing the message delivery ratio and reducing the transmission overhead.
收起
摘要 :
Recent advances in wireless networking technology and the increasing demand for ubiquitous, mobile connectivity demonstrate the importance of providing reliable systems for managing the reconfiguration and disconnection of compone...
展开
Recent advances in wireless networking technology and the increasing demand for ubiquitous, mobile connectivity demonstrate the importance of providing reliable systems for managing the reconfiguration and disconnection of components. The design of such systems requires tools and techniques appropriate to the task. Many formal models of computation, including UNITY, are not adequate for expressing reconfiguration and disconnection and are, therefore, inappropriate vehicles for investigating the impact of mobility on the construction of modular and composable systems. Algebraic formalisms such as the /spl pi/-calculus have been proposed for modeling mobility. This paper addresses the question of whether UNITY, a state-based formalism with a foundation in temporal logic, can be extended to address concurrent, mobile systems. In the process, we examine some new abstractions for communication among mobile components that express reconfiguration and disconnection and which can be composed in a modular fashion.
收起
摘要 :
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cryptographic tunnels, which grows quadratically wit...
展开
The Internet Protocol Security Architecture IPsec is hard to deploy in large, nested, or dynamic scenarios. The major reason for this is the need for manual configuration of the cryptographic tunnels, which grows quadratically with the total amount of IPsec gateways. This way of configuration is error-prone, cost-intensive and rather static. When private addresses are used in the protected subnetworks, the problem becomes even worse as the routing cannot rely on public infrastructures. In this article, we present a fully automated approach for the distributed configuration of IPsec domains. Utilizing peer-to-peer technology, our approach scales well with respect to the number of managed IPsec gateways, reacts robust to network failures, and supports the configuration of nested networks with private address spaces. We analyze the security requirements and further desirable properties of IPsec policy negotiation, and show that the distribution of security policy configuration does not impair security of transmitted user data in the resulting virtual private network (VPN). Results of a prototype implementation and simulation study reveal that the approach offers good characteristics for example with respect to quick reconfiguration of all gateways after a central power failure (robustness), or after insertion of new gateways (scalability and agility).
收起
摘要 :
The most demanding tenants of shared clouds require complete isolation from their neighbors, in order to guarantee that their application performance is not affected by other tenants. Unfortunately, while shared clouds can offer a...
展开
The most demanding tenants of shared clouds require complete isolation from their neighbors, in order to guarantee that their application performance is not affected by other tenants. Unfortunately, while shared clouds can offer an option, whereby tenants obtain dedicated servers, they do not offer any network provisioning service, which would shield these tenants from network interference. In this paper, we introduce links as a service (LaaS), a new abstraction for cloud service that provides isolation of network links. Each tenant gets an exclusive set of links forming a virtual fat-tree, and is guaranteed to receive the exact same bandwidth and delay as if it were alone in the shared cloud. Consequently, each tenant can use the forwarding method that best fits its application. Under simple assumptions, using bipartite graph properties and pigeonhole-based analysis, we derive theoretical conditions for enabling the LaaS without capacity over-provisioning in fat-trees. New tenants are only admitted in the network, when they can be allocated hosts and links that maintain these conditions. We also provide new results on the numbers of tenants and hosts that can fit while guaranteeing network isolation. The LaaS is implementable with common network gear, tested to scale to large networks, and provides full tenant isolation at the cost of a limited reduction in the cloud utilization.
收起
摘要 :
We introduce the concept of Internet factories. Internet factories structure the task of creating and managing application-specific overlay networks using infrastructure-as-a-ser-vice clouds. We describe the Internet factory archi...
展开
We introduce the concept of Internet factories. Internet factories structure the task of creating and managing application-specific overlay networks using infrastructure-as-a-ser-vice clouds. We describe the Internet factory architecture and report on a proof of concept with three examples that progressively illustrate its working. In one of these examples, we demonstrate the creation of a 163-node IPv6 network over 18 cloud locations around the world. Internet factories include the use of libraries that capture years of experience and knowledge in network and systems engineering. Consequently, Internet factories solve the problem of creating and managing on-demand application-specific overlay networks without exposing all their intricacies to the application developer.
收起
摘要 :
In business networks, firms share common interests, which motivate them to develop relationships with each other for their mutual benefit (Johanson and Mattsson, 1988; Johanson and Vahlne, 2003). The benefits offered form value ne...
展开
In business networks, firms share common interests, which motivate them to develop relationships with each other for their mutual benefit (Johanson and Mattsson, 1988; Johanson and Vahlne, 2003). The benefits offered form value networks. In e-commerce businesses, where the product is intangible, and where knowledge is one of the main resources of the firms (Allee, 2000), the term "value network" is a useful alternative to the term "value chain" (which is commonly used in industrial production). These value networks are dynamic and may change when a firm deepen its existing relationships, establishes new ones, or ends problematic ones (Griffith and Harvey, 2004; Larson and Starr, 1993).
收起
摘要 :
By a News Reporter-Staff News Editor at Network Daily News - Current study
results on computing have been published. According to news reporting from Peking University by NewsRx
journalists, research stated, “With the explosive...
展开
By a News Reporter-Staff News Editor at Network Daily News - Current study
results on computing have been published. According to news reporting from Peking University by NewsRx
journalists, research stated, “With the explosive growth of online information, recommender systems play
a key role to alleviate such information overload.”
收起