Journal articles on the topic 'Distributed router'

To see the other types of publications on this topic, follow the link: Distributed router.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Distributed router.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Yufeng, Le Tian, Han Qiu, and Chuanhao Zhang. "Research Notes: Distributed Shadow for Router Security Defense." International Journal of Software Engineering and Knowledge Engineering 28, no. 02 (February 2018): 193–206. http://dx.doi.org/10.1142/s021819401840003x.

Full text
Abstract:
Router security defense technologies emerging in recent years could hardly detect and block the new booming threats with unknown signatures such as hardware Trojan, zero-day attacks, etc. We present a novel router defense technology, distributed router shadow, which builds a closed execution environment to deceive attacks entering into the router, thereby misleading the attackers into regarding it as the real attack target and executing the suspicious code to maximize the chances of detonating the system exploit; thus the original router is prevented from attacking and the suspicious code can be detected. Our experiment and analysis show that the router shadow can defend not only attacks with signature but also some new attacks without signature.
APA, Harvard, Vancouver, ISO, and other styles
2

Effiong, Charles, Gilles Sassatelli, and Abdoulaye Gamatié. "Combined Distributed Shared-Buffered and Diagonally-Linked Mesh Topology for High-Performance Interconnect." Micromachines 13, no. 12 (December 17, 2022): 2246. http://dx.doi.org/10.3390/mi13122246.

Full text
Abstract:
Networks-on-Chip (NoCs) have become the de-facto on-chip interconnect for multi/manycore systems. A typical NoC router is made up of buffers used to store packets that are unable to advance to their desired destination. However, buffers consume significant power/area and are often underutilized, especially in cases of applications with non-uniform traffic patterns thus leading to performance degradation for such applications. To improve network performance, the Roundabout NoC (R-NoC) concept is considered. R-NoC is inspired by real-life multi-lane traffic roundabouts and consists of lanes that are shared by multiple input/output ports to maximize buffering resource utilization. R-NoC relies on router-internal adaptive routing that decides the lane path based on back pressure. Back pressure makes it possible to assess lane utilization and route packets accordingly. This is made possible thanks to the use of elastic buffers for control flow, a clever type of handshaking in a way similar to asynchronous circuits. Another prominent feature of R-NoC is that internal routing and arbitration are completely distributed which allows for significant freedom in deciding internal router topology and parameters. This work leverages this property and proposes novel yet unexplored configurations for which an in-depth evaluation of corresponding implementations on 45 nm CMOS technology is given. Each configuration is evaluated performance and power-wise on both synthetic and real application traffic. Several R-NoC configurations are identified and demonstrated to provide very significant performance improvements over standard mesh configurations and a typical input-buffered router, without compromising area and power consumption. Exploiting the distributed nature of R-NoC routers, a diagonally-linked configuration is then proposed which incurs moderate area overhead and features yet better performance and energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles
3

Kim, Changsu, Hankil Kim, Jongwon Lee, and Hoekyung Jung. "Web Server-based Distributed Machine Socialization System." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 2 (April 1, 2018): 631. http://dx.doi.org/10.11591/ijece.v8i2.pp631-637.

Full text
Abstract:
<p>In recent years, there has been an increasing trend of offering services that are useful to users, such as Google's Nest, through machine socialization between parts and devices in specific spaces such as automobiles, homes, and factories. The existing inter - device collaboration system is a centralized system using router, and it controls collaboration between devices by building OpenWrt and web server on router. However, due to the limited hardware resources on the router, it generates network traffic congestion as the number of requests from the client increases or the number of clients connected to the server increases. In this paper, we propose a distributed machine collaboration system based on web server using inter - device collaboration algorithm. The study of Micro Controller Unit (MCU) has reduced the traffic incidence by solving the request sent to the router from each device by oneself.</p>
APA, Harvard, Vancouver, ISO, and other styles
4

Bao, Zhen Shan, Bao Ping Wang, and Wen Bo Zhang. "Design and Performance Evaluation of Distributed Virtual Router Based on OpenStack." Applied Mechanics and Materials 687-691 (November 2014): 2888–92. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2888.

Full text
Abstract:
With the booming of Cloud Compute, OpenStack has been more widely used in Data Center, but in tradition deployment of OpenStack, the traffic must traverse network node to get routing decision. So the network node would be a bottle-neck due to the increasing amount of data flow. In order to solve this problem, this paper propose an extensible design, we create a internal virtual router in each compute node, the internal virtual router just can process the East-West traffic in lay2. With the help of distributed router, the East-West traffic can be delivered directly from the source hypervisor to the destination hypervisor, no longer need to traverse the router in network node to get routing decision, Therefore, North-South and East-West traffic don't impact each other anymore. North-South traffic enjoys all the bandwidth of router in network node exclusively, hence reduce the load of the network node. Experiment results show that OpenStack with distributed router has a much better performance evaluation than original OpenStack. This will dramatically increase the total bandwidth, and also bring other advantages.
APA, Harvard, Vancouver, ISO, and other styles
5

Barolli, Admir, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, and Leonard Barolli. "Performance Evaluation of Chi-Square and Normal Distributions of Mesh Clients for WMNs Considering Five Router Replacement Methods." International Journal of Distributed Systems and Technologies 13, no. 1 (January 1, 2022): 1–14. http://dx.doi.org/10.4018/ijdst.296247.

Full text
Abstract:
In our previous work, we implemented a simulation system to solve the node placement problem in WMNs considering Particle Swarm Optimization (PSO) and Distributed Genetic Algorithm (DGA), called WMN-PSODGA. In this paper, we compare Chi-square and Normal distributions of mesh clients for different router replacement methods. The router replacement methods considered are Constriction Method (CM), Random Inertia Weight Method (RIWM), Linearly Decreasing Inertia Weight Method (LDIWM), Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that for both distributions, the mesh routers cover all mesh clients for all router replacement methods. In terms of load balancing, Normal distribution shows better results than Chi-square. The best router replacement method for this distribution is LDIWM. Thus, the best scenario is the Normal distribution of mesh clients with LDIWM as a router replacement method.
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Kicheon. "Analysis of Distributed DDQ for QoS Router." ETRI Journal 28, no. 1 (February 8, 2006): 31–44. http://dx.doi.org/10.4218/etrij.06.0104.0193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Subramanian, Kausik, Loris D'Antoni, and Aditya Akella. "Synthesis of Fault-Tolerant Distributed Router Configurations." ACM SIGMETRICS Performance Evaluation Review 46, no. 1 (January 17, 2019): 87–89. http://dx.doi.org/10.1145/3308809.3308853.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Subramanian, Kausik, Loris D'Antoni, and Aditya Akella. "Synthesis of Fault-Tolerant Distributed Router Configurations." ACM SIGMETRICS Performance Evaluation Review 46, no. 1 (January 17, 2019): 87–89. http://dx.doi.org/10.1145/3292040.3219652.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Subramanian, Kausik, Loris D'Antoni, and Aditya Akella. "Synthesis of Fault-Tolerant Distributed Router Configurations." Proceedings of the ACM on Measurement and Analysis of Computing Systems 2, no. 1 (April 3, 2018): 1–26. http://dx.doi.org/10.1145/3179425.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chrysoulas, C., E. Haleplidis, G. Kostopoulos, R. Haas, S. Denazis, and O. Koufopavlou. "Towards a service-enabled distributed router architecture." IET Circuits, Devices & Systems 2, no. 1 (2008): 60. http://dx.doi.org/10.1049/iet-cds:20070041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mellah, H., O. Cherkaoui, and Y. Lemieux. "A distributed controller for a virtualized router." Journal of Internet Services and Applications 3, no. 3 (October 16, 2012): 311–18. http://dx.doi.org/10.1007/s13174-012-0070-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Saravanan, K., and R. Asokan. "An New Efficient Cluster Based Detection Mechanisms for Distributed Denial of Services (DDoS) Attacks." International Journal of Mathematics and Computers in Simulation 15 (November 27, 2021): 147–52. http://dx.doi.org/10.46300/9102.2021.15.27.

Full text
Abstract:
Cluster aggregation of statistical anomaly detection is a mechanism for defending against denial of service attack (dos) and distributed denial-of-service (DDoS) attacks. DDoS attacks are treated as a congestioncontrol problem; because most of the congestion is occurred in the malicious hosts not follow the normal endto- end congestion control. Upstream routers are also notified to drop such packets in order that the router’s resources are used to route legitimate traffic hence term cluster aggregation. If the victim suspects that the cluster aggregations are solved by most of the clients, it increases the complexity of the cluster aggregation. This aggregation solving technique allows the traversal of the attack traffic throughout the intermediate routers before reaching the destination. In this proposal, the aggregation solving mechanism is cluster aggregation to the core routers rather than having at the victim. The router based cluster aggregation mechanism checks the host system whether it is legitimate or not by providing a aggregation to be solved by the suspected host.
APA, Harvard, Vancouver, ISO, and other styles
13

Gottschalk, Thomas D., Philip Amburn, and Dan M. Davis. "Advanced Message Routing for Scalable Distributed Simulations." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 2, no. 1 (January 2005): 17–28. http://dx.doi.org/10.1177/154851290500200103.

Full text
Abstract:
On large Linux clusters, scalability is the ability of the program to utilize additional processors in a way that provides a near-linear increase in computational capacity for each node employed. Without scalability, the cluster may cease to be useful after adding a very small number of nodes. The Joint Forces Command (JFCOM) Experimentation Directorate (J9) has recently been engaged in Joint Urban Operations (JUO) experiments and counter mortar analyses. Both required scalable codes to simulate over 1 million SAF clutter entities, using hundreds of CPUs. The JSAF application suite, utilizing the redesigned RTI-s communications system, provides the ability to run distributed simulations with sites located across the United States, from Norfolk, Virginia, to Maui, Hawaii. Interest-aware routers are essential for scalable communications in the large, distributed environments, and the RTI-s framework, currently in use by JFCOM, provides such routers connected in a basic tree topology. This approach is successful for small to medium sized simulations, but faces a number of constraining limitations precluding very large simulations. To resolve these issues, the work described herein utilizes a new software router infrastructure to accommodate more sophisticated, general topologies, including both the existing tree framework and a new generalization of the fully connected mesh topologies. The latter were first used in the SF Express ModSAF simulations of 100,000 fully interacting vehicles. The new software router objects incorporate an augmented set of the scalable features of the SF Express design, while optionally using low-level RTI-s objects to perform actual site-to-site communications. The limitations of the original MeshRouter formalism have been eliminated, allowing fully dynamic operations. The mesh topology capabilities allow aggregate bandwidth and site-to-site latencies to match actual network performance. The heavy resource load at the root node now can be distributed across routers at the participating sites. Most significantly, realizable point-to-point bandwidths remain stable as the underlying problem size increases, sustaining scalability claims.
APA, Harvard, Vancouver, ISO, and other styles
14

Soteriou, V., R. S. Ramanujam, B. Lin, and Li-Shiuan Peh. "A High-Throughput Distributed Shared-Buffer NoC Router." IEEE Computer Architecture Letters 8, no. 1 (January 2009): 21–24. http://dx.doi.org/10.1109/l-ca.2009.5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Chang, C. Y., T. W. Hou, and C. K. Shieh. "Design of wormhole router for distributed memory multiprocessors." Electronics Letters 27, no. 25 (1991): 2385. http://dx.doi.org/10.1049/el:19911476.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Tamee, K., P. P. Yupapin, and S. Mitatha. "Distributed photon network sensors via a wavelength router." IET Wireless Sensor Systems 1, no. 1 (March 1, 2011): 26–30. http://dx.doi.org/10.1049/iet-wss.2010.0046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Barolli, Admir, Kevin Bylykbashi, Ermioni Qafzezi, Shinji Sakamoto, Leonard Barolli, and Makoto Takizawa. "A comparison study of chi-square and uniform distributions of mesh clients for different router replacement methods using WMN-PSODGA hybrid intelligent simulation system." Journal of High Speed Networks 27, no. 4 (November 10, 2021): 319–34. http://dx.doi.org/10.3233/jhs-210670.

Full text
Abstract:
Wireless Mesh Networks (WMNs) are gaining a lot of attention from researchers due to their advantages such as easy maintenance, low upfront cost and high robustness. Connectivity and stability directly affect the performance of WMNs. However, WMNs have some problems such as node placement problem, hidden terminal problem and so on. In our previous work, we implemented a simulation system to solve the node placement problem in WMNs considering Particle Swarm Optimization (PSO) and Distributed Genetic Algorithm (DGA), called WMN-PSODGA. In this paper, we compare chi-square and uniform distributions of mesh clients for different router replacement methods. The router replacement methods considered are Constriction Method (CM), Random Inertia Weight Method (RIWM), Linearly Decreasing Inertia Weight Method (LDIWM), Linearly Decreasing Vmax Method (LDVM) and Rational Decrement of Vmax Method (RDVM). The simulation results show that for chi-square distribution the mesh routers cover all mesh clients for all router replacement methods. In terms of load balancing, the method that achieves the best performance is RDVM. When using the uniform distribution, the mesh routers do not cover all mesh clients, but this distribution shows good load balancing for four router replacement methods, with RIWM showing the best performance. The only method that shows poor performance for this distribution is LDIWM. However, since not all mesh clients are covered when using uniform distribution, the best scenario is chi-square distribution of mesh clients with RDVM as a router replacement method.
APA, Harvard, Vancouver, ISO, and other styles
18

Bianco, Andrea, Fikru Getachew Debele, and Luca Giraudo. "Differential energy saving algorithms in a distributed router architecture." Computer Communications 50 (September 2014): 175–86. http://dx.doi.org/10.1016/j.comcom.2014.02.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mastilak, Lukas, Marek Galinski, Pavol Helebrandt, Ivan Kotuliak, and Michal Ries. "Enhancing Border Gateway Protocol Security Using Public Blockchain." Sensors 20, no. 16 (August 11, 2020): 4482. http://dx.doi.org/10.3390/s20164482.

Full text
Abstract:
Communication on the Internet consisting of a massive number of Autonomous Systems (AS) depends on routing based on Border Gateway Protocol (BGP). Routers generally trust the veracity of information in BGP updates from their neighbors, as with many other routing protocols. However, this trust leaves the whole system vulnerable to multiple attacks, such as BGP hijacking. Several solutions have been proposed to increase the security of BGP routing protocol, most based on centralized Public Key Infrastructure, but their adoption has been relatively slow. Additionally, these solutions are open to attack on this centralized system. Decentralized alternatives utilizing blockchain to validate BGP updates have recently been proposed. The distributed nature of blockchain and its trustless environment increase the overall system security and conform to the distributed character of the BGP. All of the techniques based on blockchain concentrate on inspecting incoming BGP updates only. In this paper, we improve on these by modifying an existing architecture for the management of network devices. The original architecture adopted a private blockchain implementation of HyperLedger. On the other hand, we use the public blockchain Ethereum, more specifically the Ropsten testing environment. Our solution provides a module design for the management of AS border routers. It enables verification of the prefixes even before any router sends BGP updates announcing them. Thus, we eliminate fraudulent BGP origin announcements from the AS deploying our solution. Furthermore, blockchain provides storage options for configurations of edge routers and keeps the irrefutable history of all changes. We can analyze router settings history to detect whether the router advertised incorrect information, when and for how long.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Guang. "The Design and Implementation of Fast-Path Architecture for IPv6 Control Router." Applied Mechanics and Materials 596 (July 2014): 892–96. http://dx.doi.org/10.4028/www.scientific.net/amm.596.892.

Full text
Abstract:
In view of the difficulties of the current router architecture such as capacity, scalability, and power consumption, a fast-path architecture of IPv6 router suitable for parallel processing is proposed. The fast-path architecture of IPv6 router is designed and implemented using NoC structure. Thereby, a parallel processing structure of IP packets combining the distributed IP address lookup and the parallel IP packet switching is implemented. It is convenient to replace the search algorithm and to expand the hardware scale, and it can improve the overall performance of the router effectively.
APA, Harvard, Vancouver, ISO, and other styles
21

Gai, Xinnan, Yali Wang, Renliang Chen, and Liang Zou. "Research on Hybrid Microgrid Based on Simultaneous AC and DC Distribution Network and Its Power Router." Energies 12, no. 6 (March 20, 2019): 1077. http://dx.doi.org/10.3390/en12061077.

Full text
Abstract:
Under the dual pressure of environmental pollution and energy crisis, the global energy consumption structure reform deepens unceasingly and the concept of energy internet has developed rapidly. The widespread volatility, randomness, and uncertainty of distributed new energy generation impose new requirements on distribution systems. The zigzag transformer is used as the coupling and isolating device for simultaneous AC–DC transmission. The basic principle and structure of simultaneous AC–DC power distribution network is analyzed. The topology structure of the simultaneous AC–DC hybrid microgrid and basic operating principle of the microgrid under different operating modes are proposed for the distributed power grid technology. Combined with power electronic technology, a modular multi-interface structure of power routers applied to AC–DC hybrid microgrid and its control strategy are proposed to realize the power routing control of microgrid and ensure reliable operation control of the microgrid. By building the model of simultaneous AC–DC hybrid microgrid and its power router, the rationality and effectiveness of the power router for microgrid routing control are verified.
APA, Harvard, Vancouver, ISO, and other styles
22

Fethellah, Nour El Houda, Hafida Bouziane, and Abdallah Chouarfia. "New Efficient Caching Strategy based on Clustering in Named Data Networking." International Journal of Interactive Mobile Technologies (iJIM) 13, no. 12 (December 18, 2019): 104. http://dx.doi.org/10.3991/ijim.v13i12.11403.

Full text
Abstract:
<p>The Named Data Networking NDN is one of the most proposed architecture for the new model of Internet communications based on contents distribution, called Information-Centric Network ICN. It is widely accepted by the research community since it has become dominant in ICN design that resolves TCP-IP based Internet problems such as bandwidth, delay, location dependent and congestion. Based on location host IP addresses, TCP-IP designed for Peer-to-Peer communication P2P. NDN architecture is oriented Content Centric Networking CCN, where the data is stored on routers and distributed to users from the nearest router. Cache capacities of routers are limited compared to forwarded contents. To move from TCP-IP model to CCN model, many papers propose several new contents distribution based architecture ICN. In this paper, we propose a novel strategy to optimize the use of network resources inspired from Network clustering and cluster head selection in MANETs. Specifically, the improved K-medoids cluster algorithm is used to divide the global network in clusters, where for each cluster; three routers are selected as content routers. The first is the main caching router as well as the second and the third are the secondary caching router. The caching router selection process relies on three relevant criteria consisting of the distance between a node and its cluster centroid, the number of neighbors, and the congestion level. Two Multi Attribute Decision–Making methods MADM are applied, namely TOPSIS and AHP. Performance analysis of our proposed strategy with the established criteria showed � its effectiveness and strong potential.<em></em></p>
APA, Harvard, Vancouver, ISO, and other styles
23

Malialis, Kleanthis, and Daniel Kudenko. "Multiagent Router Throttling: Decentralized Coordinated Response Against DDoS Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 27, no. 2 (July 14, 2013): 1551–56. http://dx.doi.org/10.1609/aaai.v27i2.19000.

Full text
Abstract:
Distributed denial of service (DDoS) attacks constitute a rapidly evolving threat in the current Internet. In this paper we introduce Multiagent Router Throttling, a decentralized DDoS response mechanism in which a set of upstream routers independently learn to throttle traffic towards a victim server. We compare our approach against a baseline and a popular throttling technique from the literature, and we show that our proposed approach is more secure, reliable and cost-effective. Furthermore, our approach outperforms the baseline technique and either outperforms or has the same performance as the popular one.
APA, Harvard, Vancouver, ISO, and other styles
24

Prayogo, Oldy Ray, and Imam Riadi. "Router Forensic Analysis against Distributed Denial of Service (DDoS) Attacks." International Journal of Computer Applications 175, no. 39 (December 30, 2020): 19–25. http://dx.doi.org/10.5120/ijca2020920944.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Liu, Yingpei, Yan Li, Haiping Liang, Jia He, and Hanyang Cui. "Energy Routing Control Strategy for Integrated Microgrids Including Photovoltaic, Battery-Energy Storage and Electric Vehicles." Energies 12, no. 2 (January 18, 2019): 302. http://dx.doi.org/10.3390/en12020302.

Full text
Abstract:
The Energy Internet is an inevitable trend of the development of electric power system in the future. With the development of microgrids and distributed generation (DG), the structure and operation mode of power systems are gradually changing. Energy routers are considered as key technology equipment for the development of the Energy Internet. This paper mainly studies the control of the LAN-level energy router, and discusses the structure and components of the energy router. For better control of the power transmission of an energy router, the energy routing control strategy for an integrated microgrid, including photovoltaic (PV) energy, battery-energy storage and electric vehicles (EVs) is studied. The front stage DC/DC converter of the PV system uses maximum power point tracking (MPPT) control. The constant current control is used by the bidirectional DC/DC converter of the battery-energy storage system and the EV system when they discharge. The DC/AC inverters adopt constant reactive power and constant DC voltage control. Constant current constant voltage control is adopted when an EV is charged. The control strategy model is simulated by Simulink, and the simulation results verify the feasibility and effectiveness of the proposed control strategy. The DG could generate reactive power according to the system instructions and ensure the stable output of the DC voltage of the energy router.
APA, Harvard, Vancouver, ISO, and other styles
26

Farhadi Beldachi, Arash, Mohammad Hosseinabady, and Jose Luis Nunez-Yanez. "Configurable Router Design for Dynamically Reconfigurable Systems based on the SoCWire NoC." International Journal of Reconfigurable and Embedded Systems (IJRES) 2, no. 1 (March 1, 2013): 27. http://dx.doi.org/10.11591/ijres.v2.i1.pp27-48.

Full text
Abstract:
New Field Programmable Gate Arrays (FPGAs) are capable of implementing complete multi-core System-on-Chip (SoC) with the possibility of modifying the hardware configuration at run-time with partial dynamic reconfiguration. The usage of a soft reconfigurable Network-on-Chip (NoC) to connect these cores is investigated in this paper. We have used a standard switch developed with the objective of supporting dynamically reconfigurable FPGAs as the starting point to create a novel configurable router. The configurable router uses distributed routing suitable for regular topologies and can vary the number of local ports and communication ports to build multi dimensional networks (i.e., 2D and 3D) with different topologies. The evaluation results show that the selection of the ideal router is different depending on traffic patterns and design objectives. Overall, the mesh network with a four local ports router offers a higher level of performance with lower complexity compared to the traditional mesh with one local port router.
APA, Harvard, Vancouver, ISO, and other styles
27

ISHIZU, Kentaro, Homare MURAKAMI, Stanislav FILIN, and Hiroshi HARADA. "Cognitive Wireless Router System by Distributed Management of Heterogeneous Wireless Networks." IEICE Transactions on Communications E93-B, no. 12 (2010): 3311–22. http://dx.doi.org/10.1587/transcom.e93.b.3311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chae, C. J. "Distributed wavelength router for optical virtual private networking in metropolitan areas." Electronics Letters 42, no. 3 (2006): 173. http://dx.doi.org/10.1049/el:20063698.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Liu, Baoquan, Jingwen Chen, Yinxin Zhu, Yan Liu, and Yong Shi. "Distributed control strategy of a microgrid community with an energy router." IET Generation, Transmission & Distribution 12, no. 17 (September 30, 2018): 4009–15. http://dx.doi.org/10.1049/iet-gtd.2018.5420.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Louati, Wajdi, Ines Houidi, Manel Kharrat, Djamal Zeghlache, and Hormuzd M. Khosravi. "Dynamic service deployment in a distributed heterogeneous cluster based router (DHCR)." Cluster Computing 11, no. 4 (May 1, 2008): 355–72. http://dx.doi.org/10.1007/s10586-008-0056-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Tamee, Kreangsak, Keerayoot Srinuanjan, Somsak Mitatha, and Preecha P. Yupapin. "Distributed Sensors Using a PANDA Ring Resonator Type in Multiwavelength Router." IEEE Sensors Journal 11, no. 9 (September 2011): 1987–92. http://dx.doi.org/10.1109/jsen.2011.2108997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Ohara, Seiji, Ermioni Qafzezi, Admir Barolli, Shinji Sakamoto, Yi Liu, and Leonard Barolli. "WMN-PSODGA - An Intelligent Hybrid Simulation System for WMNs Considering Load Balancing." International Journal of Distributed Systems and Technologies 11, no. 4 (October 2020): 39–52. http://dx.doi.org/10.4018/ijdst.2020100103.

Full text
Abstract:
Wireless mesh networks (WMNs) are becoming an important networking infrastructure because they have many advantages, such as low cost and increased high-speed wireless Internet connectivity. In the authors' previous work, they implemented a hybrid simulation system based on particle swarm optimization (PSO) and distributed genetic algorithm (DGA), called WMN-PSODGA. Moreover, they added to the fitness function a new parameter for mesh router load balancing a number of covered mesh clients per router (NCMCpR). In this article, the authors consider Exponential, Weibull, and Normal distributions of mesh clients and carry out a comparison study. The simulation results show that the performance of the Exponential, Weibull and Normal distributions was improved by considering load balancing when using WMN-PSODGA. For the same number of mesh clients, the Normal distribution behaves better than the other distributions. This is because all mesh clients are covered by a smaller number of mesh routers and the standard deviation is improved by effectively using NCMCpR.
APA, Harvard, Vancouver, ISO, and other styles
33

Nafir, Abdenacer, Smaine Mazouzi, and Salim Chikhi. "A New Information-Based Heuristic for Distributed DDoS Detection and Mitigation." International Journal of Organizational and Collective Intelligence 12, no. 4 (October 1, 2022): 1–16. http://dx.doi.org/10.4018/ijoci.312221.

Full text
Abstract:
In this paper a novel collective method for DDoS detection is introduced. The method is distributed and implemented as a multi-agent system, and where local decision is based on an information-based heuristic, namely the entropy. According the calculated entropy a router exchange data with its neighbors aiming at collectively decide if a DDoS is ongoing or not. Most of the works of the literature that are based on the entropy they have used source addresses. The authors' method is based on the entropy of the distances traveled by the packets, so spoofing IP packets will be hard to perform by hackers. Each router combines its decision with those of its neighbors. Such a collective detection allows to apply defense against the attack despite the victim is out of service or cannot perform DDoS mitigation because the traffic is congested in its neighborhood. Conducted experiments using the platform OMNet++ show the potential of the new method for efficient collaborative and distributed detection and mitigation of DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
34

Araújo Júnior, Carlos Alberto, Helio Garcia Leite, Carlos Pedro Boechat Soares, Daniel Henrique Breda Binoti, Amaury Paulo de Souza, Antônio Ferraz Santana, and Carlos Moreira Miquelino Eleto Torre. "A MULTI-AGENT SYSTEM FOR FOREST TRANSPORT ACTIVITY PLANNING." CERNE 23, no. 3 (September 2017): 329–37. http://dx.doi.org/10.1590/01047760201723032335.

Full text
Abstract:
ABSTRACT This study aims to propose and implement a conceptual model of an intelligent system in a georeferenced environment to determine the design of forest transport fleets. For this, we used a multi-agent systems based tool, which is the subject of studies of distributed artificial intelligence. The proposed model considers the use of plantation mapping (stands) and forest roads, as well as information about the different vehicle transport capacities. The system was designed to adapt itself to changes that occur during the forest transport operation process, such as the modification of demanded volume or the inclusion of route restrictions used by the vehicles. For its development, we used the Java programming language associated with the LPSolve library for the optimization calculation, the JADE platform to develop agents, and the ArcGis Runtime to determine the optimal transport routes. Five agents were modelled: the transporter, controller, router, loader and unloader agents. The model is able to determine the amount of trucks among the different vehicles available that meet the demand and availability of routes, with a focus on minimizing the total costs of timber transport. The system can also rearrange itself after the transportation routes change during the process.
APA, Harvard, Vancouver, ISO, and other styles
35

Bulatov, Yuri, Andrey Kryukov, and Konstantin Suslov. "Simulation of Power Router-Based DC Distribution Systems with Distributed Generation and Energy Storage Units." Energies 16, no. 1 (December 25, 2022): 214. http://dx.doi.org/10.3390/en16010214.

Full text
Abstract:
The development of the electric power industry needs to be understood against the current backdrop of the transition to technological platforms facilitating the adoption of smart grids. Smart grids can be made up of separate clusters (microgrids) consisting of power consumers, power grids, and distributed generation (DG) units. To improve energy efficiency, DC microgrids can be integrated into smart grids to deliver power to consumers within a building (or several buildings) and at the sites of C&I facilities. It is advisable to carry out integrations of DC and AC microgrids with DG and energy storage units on the basis of power routers used to couple grids of different voltage classes. This study outlines a computer model of power router-based integration of DC and AC microgrids with distributed generation and energy storage units. The model was developed in the MATLAB environment. The paper also features the results of a study of the proposed methods as applied to voltage control under normal and emergency operating conditions of a DC and AC distribution grid.
APA, Harvard, Vancouver, ISO, and other styles
36

Hou, Lei, Kun Su, Cheng Qing, Tian Xia, Chao Yang, and Lijuan Duan. "Modelling and Simulation Analysis of Power Flow Router in Energy Internet." E3S Web of Conferences 257 (2021): 02031. http://dx.doi.org/10.1051/e3sconf/202125702031.

Full text
Abstract:
With a large number of distributed generation (DG) and controllable load connected to the power grid under the background of energy Internet development, the security and stability of the grid are challenged. Power flow control has become a problem of the operation of the power grid. Power flow router (PFR) has become an important element of energy Internet. It is an effective way to realize the power flow control of active distribution network when abundant distributed resources are connected to the grid. In this paper, the steady-state and dynamic operation characteristics of PFR are studied, and the corresponding mathematical model is established. The effect of PFR on optimizing the power flow and improving the dynamic characteristics of distribution network is analysed by the 14-node distribution network case simulating.
APA, Harvard, Vancouver, ISO, and other styles
37

Hussain, S. M. Suhail, Furquan Nadeem, Mohd Asim Aftab, Ikbal Ali, and Taha Selim Ustun. "The Emerging Energy Internet: Architecture, Benefits, Challenges, and Future Prospects." Electronics 8, no. 9 (September 15, 2019): 1037. http://dx.doi.org/10.3390/electronics8091037.

Full text
Abstract:
Energy Internet is a concept proposed to harness, control, and manage energy resources effectively, with the help of information and communication technology. It improves a reliability of the system, and provides an increased utilization of energy resources by integrating the smart grid with the Internet. A scalable and reliable information and communication architecture is a crucial factor for both the operation and management of the energy Internet. The routing or managing of electrical energy is performed through an energy router (ER), synonymous with a communication router, which routes data packets instead of energy packets. In this paper, a holistic review of the energy Internet evolution in terms of the architecture, types of ERs, and the benefits and challenges of its implementation is presented. An exhaustive summary of the designs and architectures of the different types of ERs is also presented in this paper. The benefits of the energy Internet, along with the challenges of its implementation on a large-scale distributed architecture with the inclusion of renewable energy resources, is discussed. Finally, future prospects for the energy Internet for achieving guaranteed reliability and security is presented.
APA, Harvard, Vancouver, ISO, and other styles
38

Mirabella, O., Lo Bello, and A. Raucea. "Improving routing in long-distance wireless mesh networks via a distributed embedded router." Journal of Parallel and Distributed Computing 68, no. 3 (March 2008): 361–71. http://dx.doi.org/10.1016/j.jpdc.2007.05.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Lutfi, Salkin, Amal Khairan, Yasir Muin, and Munazat Salmin. "Optimal Filter Assignment Policy Against Distributed Denial of Service Attack on Router Mikrotik." MATEC Web of Conferences 372 (2022): 04008. http://dx.doi.org/10.1051/matecconf/202237204008.

Full text
Abstract:
Information technology is currently one of the things that almost all universities widely adopt. The development of information technology requires universities to manage potential resources effectively and efficiently. as stated in the regulation of the Minister of Research, Technology, and Higher Education Number 62 of 2017 concerning the governance of information technology in the university environment that is to support the achievement of increasing access, relevance, quality of higher education, innovation, and strengthening governance and accountability of a university. The consequence of the application of information technology is the emergence of information security risks, the threat of this attack is a concern that every university must be wary of to secure network infrastructure from these attacks. Open access provides great potential for everyone to commit crimes against network infrastructure. as explained that computer network security is part of a system that is very important to be maintained, for that it is necessary to make efforts that can be made by the party responsible for securing the University X network from DDoS attacks. the method used to secure the network infrastructure makes a filtering policy to block DDoS attacks, the results obtained from the application according to the filter rules applied to the proxy device successfully block DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
40

Cui, Xianyang, Yulong Liu, Ding Yuan, Tao Jin, and Mohamed A. Mohamed. "A New Five-Port Energy Router Structure and Common Bus Voltage Stabilization Control Strategy." Sustainability 15, no. 4 (February 6, 2023): 2958. http://dx.doi.org/10.3390/su15042958.

Full text
Abstract:
Multi-port energy routers are a core device that integrates distributed energy sources and enables energy-to-energy interconnections. For the energy routing system, the construction of its topology, the establishment of internal model switching and the control of common bus voltage stability are the key elements of the research. In this paper, a five-port energy router structure is proposed, including a PV port, an energy storage port, a grid-connected port, a DC load port, and an AC load port. Among them, the energy storage port and the grid-connected port involve bidirectional energy flow, which are the core ports of control. For the system state, a model switching strategy is proposed based on the topology and the port energy flow direction. When the external conditions change, the system can be stabilized by means of a quick response from the energy storage port. When the energy storage is saturated, the state is switched, and the grid-connected port works to achieve system stability. The rapid stabilization of the bus voltage and the free flow of energy are achieved by combining the fast response of the model predictive control with the properties of multiple model switching. Finally, the feasibility of this energy router topology and control strategy is verified by building simulations in MATLAB.
APA, Harvard, Vancouver, ISO, and other styles
41

Chen, Meifu, Mingchao Xia, and Qifang Chen. "Research on Distributed Source-Load Interaction Strategy Considering Energy Router-Based Active Distribution Network." IEEE Access 7 (2019): 150505–16. http://dx.doi.org/10.1109/access.2019.2946865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Cui, Xianyang, Yulong Liu, Ding Yuan, Tao Jin, and Mohamed A. Mohamed. "A Hierarchical Coordinated Control Strategy for Power Quality Improvement in Energy Router Integrated Active Distribution Networks." Sustainability 15, no. 3 (February 1, 2023): 2655. http://dx.doi.org/10.3390/su15032655.

Full text
Abstract:
The energy router (ER) is a current power electronic device which can integrate distributed energy, provide power for different types of loads, and simultaneously realize the free flow of energy. In traditional active distribution networks, power quality is affected due to the access of photovoltaics (PV) and various loads. Hence, this problem can be improved by accessing the ER. This paper shows the power quality improvement of the grid when the ER is used to integrate PV, energy storage, and AC/DC loads. At the same time, an energy coordination strategy for ER is proposed. The IEEE 13 node model is developed to analyze power quality fluctuations when distributed energy and AC/DC loads are directly connected to the grid. For the power quality analysis, five indicators were selected and the hierarchical analysis method was used to obtain the indicators of power quality. After the use of ER under the coordinated control of ER, the energy is distributed twice and the power quality of the grid improves. The feasibility of ER topology and the control strategy have been verified through an established active distribution networks model with ER. It is verified that when the ER is connected to active distribution networks, the power quality improves accordingly, and it can effectively deal with the characteristics of distributed energy fluctuations and improve the flexibility of the power grid.
APA, Harvard, Vancouver, ISO, and other styles
43

Anggrawan, Anthony, Raisul Azhar, Bambang Krismono Triwijoyo, and Mayadi Mayadi. "Developing Application in Anticipating DDoS Attacks on Server Computer Machines." MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer 20, no. 2 (May 30, 2021): 427–34. http://dx.doi.org/10.30812/matrik.v20i2.410.

Full text
Abstract:
The use of server computer machines in companies is primarily a web hosting server that is very easy to experience threats, especially external security threats such as attempts to infiltrate, hacking, viruses, and other malicious attacks. Having a secure server is indispensable for working online and especially if involved in business-related network transactions. The Server's realization to be safe from threats is to protect the server machine's security on the hardware and software side and pay attention to network security that goes to the server machine. Generally, firewall applications on router devices have configuration limitations in securing the network, namely non-integrated applications. In other words, it is necessary to manage the perfect firewall configuration to anticipate Distributed Daniel attacks of Service (DDoS) attacks. Therefore, this study aims to integrate existing firewall applications for router devices into an integrated program to secure the network. The methodology used is the Network Development Life Cycle (NDLC). The research results on this developed application program can overcome DDoS attacks without setting up a firewall on the router device and can automatically monitor DDoS attack activities from outside the Server. Securing servers from DDoS attacks without setting up a firewall on the router device and automating the monitoring of DDoS attack activity from outside the Server are the novelties of this study that have not been available in previous studies.
APA, Harvard, Vancouver, ISO, and other styles
44

Bhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (June 6, 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.

Full text
Abstract:
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.
APA, Harvard, Vancouver, ISO, and other styles
45

Anandha Lakshmi, R., and T. Suresh. "A Relative Study of Various Routing Protocols in Mobile Ad Hoc Network." Asian Journal of Computer Science and Technology 7, S1 (November 5, 2018): 78–81. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1800.

Full text
Abstract:
Mobile Ad hoc Network (MANET) is an infrastructure fewer networks built on a multihop conveying idea. It transmits data from base node to end node. Because MANETS don’t have any fixed infrastructure and it works in a distributed manner. For efficient communication, many routing protocols are used in MANET. Routing protocols are to find a new route to transmit data from base to accurate end through the midway nodes. Every in-between node is act as a router. So, this paper is covers the routing protocols AODV, DSR, DSDV and OLSR to keep current routing information from every node to each other nodes. The purpose of this paper to offers a relative study of routing protocols in MANET and energy aware performance metrics are analyzed on two routing protocols of AODV and DSDV.
APA, Harvard, Vancouver, ISO, and other styles
46

Wan, Neng, Ke Du, Rong Mo, and Gongnan Xie. "A “Model to Model” Collaborative Perception Methodology for Distributed Design." Advances in Mechanical Engineering 6 (January 1, 2014): 520672. http://dx.doi.org/10.1155/2014/520672.

Full text
Abstract:
To solve the problem of collaborative engineering changes of models distributed in heterogeneous design platforms, a “model to model” perception methodology is proposed in this paper. A self-management collaborative architecture is presented by peer to peer architecture and multiagent system. The network addresses correlation between heterogeneous platforms is built up by the perception router ontology. In the same way, the correlation between design models is described by the feature relation ontology. The design changes are encapsulated by the model modification ontology. Along with the ontology above, the design change search method is devised to catch the geometric changes; the influence search method is proposed to discover the influenced design feature and the design change adapting method is used to preserve the correlation coherence after perception. Through the work, the conventional design perception mode among designers has transformed into direct perception among models instead.
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Yuyang, Qiuye Sun, Danlu Wang, and Sen Lin. "A Virtual Inertia-Based Power Feedforward Control Strategy for an Energy Router in a Direct Current Microgrid Application." Energies 12, no. 3 (February 6, 2019): 517. http://dx.doi.org/10.3390/en12030517.

Full text
Abstract:
Due to the uncertainty of the power load and the randomness of distributed generations, low-voltage direct current (LVDC) bus voltage fluctuation will greatly affect the safety of an energy router-enabled direct current (DC) microgrid. In this paper, a power feedforward control strategy based on a dual active bridge (DAB) DC/DC converter in an energy router-based DC Microgrid is proposed. Based on this strategy, the LVDC bus voltage is controlled by virtual inertia control of the DC microgrid, instead of by the DAB converter. Thus, two benefits of the proposed strategy can be achieved: the power feedforward control can be realized, to mitigate the voltage fluctuation range of the LVDC bus; and the modulation algorithm in the DAB converter can be simplified. Experimental results verify the correctness and effectiveness of the proposed control method.
APA, Harvard, Vancouver, ISO, and other styles
48

Liu, Qiao, Wenjing Zhang, Sheng Ding, Hui Li, and Yong Wang. "Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding." Sensors 20, no. 4 (February 21, 2020): 1138. http://dx.doi.org/10.3390/s20041138.

Full text
Abstract:
Smart homes have been shown to be one of the most important applications of Internet of Things (IoT); however, security issues are still the main drawback to be improved, especially facing the problem of terminal power constraint and distributed network architecture. In this paper, we propose a novel secure group data exchange protocol in smart homes with physical layer approaches which retains the benefit of key sharing needless and lightweight computation. As the core technique, nested lattice physical layer network coding is conduct in each sensor node to form a summed data at a home router. With such summed data, the untrusted home router attack and external eavesdropper attack can be resistant. Performance has been analyzed for the proposed protocol in terms of time slot cost, security resistance, and secrecy capacity. Finally, simulations have been conducted to demonstrate the theoretical analysis.
APA, Harvard, Vancouver, ISO, and other styles
49

Yau, D. K. Y., J. C. S. Lui, Feng Liang, and Yeung Yam. "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles." IEEE/ACM Transactions on Networking 13, no. 1 (February 2005): 29–42. http://dx.doi.org/10.1109/tnet.2004.842221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kumarasamy, Saravanan. "An effective defence mechanism for Distributed Denial-of-Service (DDoS) attacks using router-based techniques." International Journal of Critical Infrastructures 6, no. 1 (2010): 73. http://dx.doi.org/10.1504/ijcis.2010.029577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography