International Journal of Network Management最新文献

筛选
英文 中文
Traffic Engineering Optimization in Hybrid Software-Defined Networks: A Mixed Integer Non-Linear Programming Model and Heuristic Algorithm 混合软件定义网络中的流量工程优化:一个混合整数非线性规划模型和启发式算法
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-04-28 DOI: 10.1002/nem.70017
Samiullah Mehraban, Rajesh K. Yadav
{"title":"Traffic Engineering Optimization in Hybrid Software-Defined Networks: A Mixed Integer Non-Linear Programming Model and Heuristic Algorithm","authors":"Samiullah Mehraban,&nbsp;Rajesh K. Yadav","doi":"10.1002/nem.70017","DOIUrl":"https://doi.org/10.1002/nem.70017","url":null,"abstract":"<div>\u0000 \u0000 <p>In contemporary networking infrastructure, the integration of software-defined networking (SDN) concepts with traditional networking methodologies has given rise to hybrid software-defined networking (HSDN); as the current network infrastructure evolves, it combines the programmability of SDN with the established protocols of traditional network infrastructure. This paradigm shift introduces novel opportunities and challenges in traffic engineering (TE), necessitating innovative solutions to enhance network performance, resource utilization, and efficiency. In this study, we examined the challenges associated with TE in a hybrid SDN environment, where traditional network devices coexist alongside SDN nodes; we investigated the routing optimization of traffic engineering in a migrated hybrid network and formulated the problem as a mixed integer non-linear programming model. We proposed a heuristic algorithm (H-STE) that optimizes both the OSPF weight setting and the splitting ratio of SDN nodes in the hybrid environment. Extensive evaluations were conducted using real network topologies to validate our method. The results demonstrate that a 30% deployment ratio of SDN nodes significantly improves traffic engineering performance. Specifically, the Maximum Link Utilization (MLU) stabilizes at this ratio, indicating near-optimal network efficiency. This research provides valuable insights for researchers, practitioners, and network architects navigating SDN, hybrid SDN, and traffic engineering optimization.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143883799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MTS-PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows MTS-PolKA:针对大象和小鼠流量的带源路由的加权多路径流量分流技术
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-04-16 DOI: 10.1002/nem.70016
Giancarlo O. dos Santos, Cristina K. Dominicini, Gilmar L. Vassoler, Rafael S. Guimarães, Isis Oliveira, Domingos Jose P. Paraiso, Rodolfo S. Villaça
{"title":"MTS-PolKA: Weighted Multipath Traffic Splitting With Source Routing for Elephant and Mice Flows","authors":"Giancarlo O. dos Santos,&nbsp;Cristina K. Dominicini,&nbsp;Gilmar L. Vassoler,&nbsp;Rafael S. Guimarães,&nbsp;Isis Oliveira,&nbsp;Domingos Jose P. Paraiso,&nbsp;Rodolfo S. Villaça","doi":"10.1002/nem.70016","DOIUrl":"https://doi.org/10.1002/nem.70016","url":null,"abstract":"<p>Modern datacenter networks rely on multi-root tree topologies, to ensure efficient and reliable connectivity. However, traditional traffic engineering solutions like equal cost multiple path (ECMP) and weighted-cost multipath (WCMP) often fall short in addressing dynamic and heterogeneous traffic conditions. Specifically, these approaches struggle with asymmetric topologies and the allocation of elephant flows, which require more granular and agile traffic management. This paper introduces MTS-PolKA (<i>Multipath Traffic Split Polynomial Key-based Architecture</i>), a novel traffic splitting mechanism designed to enhance traffic engineering in datacenter networks. MTS-PolKA enables packet-level traffic distribution across multiple paths by embedding a source routing label in the packet header that dictates the per-flow traffic division profile. Unlike existing methods that require reconfiguring network tables at each switch, MTS-PolKA enables dynamic adjustments across all switches in the path through simple packet header modifications, significantly enhancing the agility and efficiency of traffic management. The implementation of MTS-PolKA on programmable switches using the P4 language, along with the residue number system (RNS) and M-PolKA architecture, showcases its potential through experiments conducted in the Mininet emulator. The results highlight the ability of MTS-PolKA to maintain flow stability, explore network multipaths, and enable rapid reconfigurations of traffic division profiles, enhancing the performance and efficiency of modern datacenter networks.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70016","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143840790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a Trust Mechanism to Enhance Security Protection in SDN-Based IoT Network 基于sdn的物联网网络信任机制的设计与开发
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-04-09 DOI: 10.1002/nem.70015
Pang-Wei Tsai, Chao-Wei Lee, Ting-Wen Wang
{"title":"Design and Development of a Trust Mechanism to Enhance Security Protection in SDN-Based IoT Network","authors":"Pang-Wei Tsai,&nbsp;Chao-Wei Lee,&nbsp;Ting-Wen Wang","doi":"10.1002/nem.70015","DOIUrl":"https://doi.org/10.1002/nem.70015","url":null,"abstract":"<div>\u0000 \u0000 <p>A reliable and trustworthy network is essential for ensuring efficient data transmission, particularly because the widespread adoption of the Internet of Things (IoT) requires management of a large and diverse set of smart devices. In addition, privacy and security concerns in IoT systems, such as access authentication, authorization, and accounting, have become increasingly important. Software-defined networking (SDN) offers a flexible and adaptive approach to network management and is a promising solution for addressing these challenges. Hence, this paper proposes a security mechanism that leverages the operational behaviors and characteristics of IoT devices to analyze their traffic flows using an SDN controller, thereby enhancing the overall security of IoT networks. The proposed architecture integrates a two-factor authentication process to prevent unauthorized access while utilizing SDN-based traffic monitoring to enforce fine-grained access control. Experimental results show that the implemented solution assists the SDN controller in detecting abnormal behaviors and triggering mitigation measures, thereby minimizing disruptions to normal traffic flows in testing scenarios.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond Size: Investigating the Impact of Scaled-Down Network Telescopes on Threat Detection 超越规模:调查缩小网络望远镜对威胁检测的影响
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-03-20 DOI: 10.1002/nem.70014
Arthur Vinícius Cunha Camargo, Lisandro Granville, Leandro M. Bertholdo
{"title":"Beyond Size: Investigating the Impact of Scaled-Down Network Telescopes on Threat Detection","authors":"Arthur Vinícius Cunha Camargo,&nbsp;Lisandro Granville,&nbsp;Leandro M. Bertholdo","doi":"10.1002/nem.70014","DOIUrl":"https://doi.org/10.1002/nem.70014","url":null,"abstract":"<div>\u0000 \u0000 <p>Cyber threat intelligence relies on network telescopes to detect attacks and emerging threats, traditionally utilizing a substantial portion of the IPv4 address space. However, the escalating scarcity and value of this resource force companies and research centers to grapple with the challenge of repurposing their address spaces, potentially impacting cybersecurity effectiveness and hindering research efforts. In this article, we first investigate the historical usage of IPv4 address space in network telescopes and the current reduction trend in several initiatives. Then, we examine the impact of reducing the allocated space on the ability of these systems to identify attackers and attack campaigns. We explore two network telescopes with the intention of assessing the impact of this reduction by quantifying the losses in several ways. Our findings reveal that even halving the allocated space for a network telescope may still permit the detection of 80% of unique cyberattack sources and the address allocation schema has little to no influence on this detection. We also found that most of the proportions and patterns remain present, albeit with reduced intensity.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Adaptive Routing Architecture for IoT Multipath Video Transmission 面向物联网多径视频传输的自适应路由架构
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-03-14 DOI: 10.1002/nem.70013
Fabiano Bhering, Debora Oliveira, Célio Albuquerque, Diego Passos, Katia Obraczka
{"title":"An Adaptive Routing Architecture for IoT Multipath Video Transmission","authors":"Fabiano Bhering,&nbsp;Debora Oliveira,&nbsp;Célio Albuquerque,&nbsp;Diego Passos,&nbsp;Katia Obraczka","doi":"10.1002/nem.70013","DOIUrl":"https://doi.org/10.1002/nem.70013","url":null,"abstract":"<p>Video applications in wireless multihop Internet of Things (IoT) scenarios can benefit from multipath routing strategies to meet their often stringent quality of service (QoS) requirements. However, the dynamics of the underlying network and video service requirements call for a multipath routing fabric that can dynamically adapt to changing conditions. In this paper, we present a wireless multipath routing architecture that is able to adapt to varying network topology conditions and video traffic characteristics by finding new paths dynamically, resulting in enhanced end user's quality of experience. Additionally, we provide an overview of the IoT wireless video application landscape and a taxonomy of the state-of-the-art in route selection mechanisms for multipath routing.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture 6G网络切片架构下的品牌设计数据安全与隐私保护
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-02-27 DOI: 10.1002/nem.70009
Peng Li, Jianing Du
{"title":"Brand Design Data Security and Privacy Protection Under 6G Network Slicing Architecture","authors":"Peng Li,&nbsp;Jianing Du","doi":"10.1002/nem.70009","DOIUrl":"https://doi.org/10.1002/nem.70009","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid growth of networking technology has generated several situations and issues in the field of safeguarding critical brand design data in the present hyper connected context, particularly with the arrival of the 6<sup>th</sup> Generation (6G). As brand development relies more on cloud-based services, protecting client data and intellectual property (IP) is essential. By using 6G network slicing architecture, which contains dedicated, secure network sections for brand design services, improved encryption, and anomaly detection systems, the research suggested a solution to such issues. The data includes features such as network performance, security measurements, and user data privacy measures. The methodology entails pre-processing brand design data with Z-score normalization to standardize feature distributions, followed by Principal Component Analysis (PCA) for a decrease of dimensions. The proposed method uses a Fully Homomorphic Encryption Driven Quantum Support Vector Machine (FHE-QSVM) to detect anomalies in real time while assuring safe and efficient resource allocation in dedicated slices. FHE-QSVM anomaly detection model produced significant metrics, with accuracy (98%), recall (96%), precision (97%), and F1-score (96%) data by accurately categorizing threats while maintaining data confidentiality. The finding shows the FHE-QSVM enhances both the security and privacy of brand design data by accurately categorizing threats while maintaining data confidentiality. Overall, this strategy offers a scalable solution for secure AI-powered brand design services, highlighting the importance of creative encryption, real-time monitoring, and 6G network slicing to meet contemporary data security standards.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing 基于6G网络切片的智能数字媒体交互系统的设计与实现
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-02-27 DOI: 10.1002/nem.70011
Na Liu
{"title":"Design and Implementation of Intelligent Digital Media Interaction System Based on 6G Network Slicing","authors":"Na Liu","doi":"10.1002/nem.70011","DOIUrl":"https://doi.org/10.1002/nem.70011","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid growth in intelligent digital media interaction systems (IDMIS) has created new difficulties in controlling and optimizing content distribution and engagement, especially with the impending 6G networks. The purpose of the investigate is to create an intelligent system that uses 6G network slicing to increase digital media communication and user experience through seamless connectivity, dynamic content distribution, and real-time engagement. The structure includes a dynamic, multilayered architecture for IDMIS, and network capital is allocated through 6G network slicing based on user demand and content type. The system includes machine learning (ML) algorithms that predict user behavior and optimize media delivery in real time. To correctly predict user behavior, the research gathers data that capture users' performance and preference (historical interaction data, demographics, contextual data, and user feedback). Once collected, data are processed to reduce dimensionality using principal component analysis (PCA). Refined Support Vector Machine Integrated with Flying Fox Optimization (RSVM-FFO) predicts user behavior and optimizes media delivery in real time. Metrics are used to evaluate the RSVM-FFO approach, such as F1-score (98.12%), accuracy (98.59%), precision (98.57%), and recall (98.17%). The results reveal that the suggested systems considerably improve media interaction effectiveness by reducing latency and bandwidth usage while providing a highly responsive user experience. Finally, advancement in the delivery of high-performance, customized media services is the combination of an IDMIS with 6G network slicing.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143513824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computationally Efficient Approach for 6G-AI-IoT Network Slicing and Error-Free Transmission 6G-AI-IoT网络切片和无差错传输的高效计算方法
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-02-23 DOI: 10.1002/nem.70007
Yunxiang Qi
{"title":"Computationally Efficient Approach for 6G-AI-IoT Network Slicing and Error-Free Transmission","authors":"Yunxiang Qi","doi":"10.1002/nem.70007","DOIUrl":"https://doi.org/10.1002/nem.70007","url":null,"abstract":"<div>\u0000 \u0000 <p>Many smart gadgets are connecting to the Internet, and Internet-of-Things (IoT) technologies are enabling a variety of applications. Artificial intelligence (AI) of Things (AIoT) devices are anticipated to possess human-like decision-making, reasoning, perception, and other capacities with the combination of AI and IoT. AIoT gadgets are expected to be extensively utilized across several domains, as anticipated by 6G networks. With AI's steady advancements in speech recognition, computer vision, and natural language processing—not to mention its ability to analyze large amounts of data—semantic communication is now feasible. A new paradigm in wireless communication is opened by semantic communication, which seeks to explore the meaning behind the bits and only transmits the information that may be used, as opposed to attaining error-free transmission. The combination of IoT with AI provides prominent features to overcome various important issues in cloud computing networks. However, there is bottleneck of delay and precision. Therefore, this paper proposed a new method to overcome this problem. First, the network slicing feature maps were extracted by convolutional neural networks. Next, the processing delay is reduced by semantic compression. Simulation results show that the proposed approach makes 99.2% reduction in communication complexity and an 80% reduction in transmission delay as compared with traditional methods. Taking the Resnet18 network as an example, the running time of the semantic communication method is only 0.8% of the traditional method.</p>\u0000 </div>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges DeFi生态系统中的期权合约:机遇、解决方案和技术挑战
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-02-16 DOI: 10.1002/nem.70005
Srisht Fateh Singh, Vladyslav Nekriach, Panagiotis Michalopoulos, Andreas Veneris, Jeffrey Klinck
{"title":"Option Contracts in the DeFi Ecosystem: Opportunities, Solutions, and Technical Challenges","authors":"Srisht Fateh Singh,&nbsp;Vladyslav Nekriach,&nbsp;Panagiotis Michalopoulos,&nbsp;Andreas Veneris,&nbsp;Jeffrey Klinck","doi":"10.1002/nem.70005","DOIUrl":"https://doi.org/10.1002/nem.70005","url":null,"abstract":"<p>This paper investigates the current landscape of option trading platforms for cryptocurrencies, encompassing both centralized and decentralized exchanges. Option contracts in cryptocurrency markets offer functionalities akin to traditional markets, providing investors with tools to mitigate risks, particularly those arising from price volatility, while also allowing them to capitalize on future volatility trends. The paper discusses these applications of option contracts in the context of decentralized finance (DeFi), emphasizing their utility in managing market uncertainties. Despite a recent surge in the trading volume of options contracts on cryptocurrencies, decentralized platforms account for less than 1<i>%</i> of this total volume. Hence, this paper takes a closer look by examining the design choices of these platforms to understand the challenges hindering their growth and adoption. It identifies technical, financial, and adoption-related challenges that decentralized exchanges face and provides commentary on existing platform responses. Subsequently, the paper analyzes the impact of absent options markets on the inefficiencies of automated market maker liquidity. It examines historical on-chain data for 14 ERC20 token pairs on Ethereum. The analysis shows 1143 instances in which deeper liquidity levels, as high as <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mo>×</mo>\u0000 <mn>6</mn>\u0000 </mrow>\u0000 <annotation>$$ times 6 $$</annotation>\u0000 </semantics></math> more, could have been achieved by establishing an options market.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem 加强TCP连接的运输助手:调查安置问题
IF 1.5 4区 计算机科学
International Journal of Network Management Pub Date : 2025-02-16 DOI: 10.1002/nem.70006
Jaime Galán-Jiménez, Mohamed Faten Zhani, José Gómez-delaHiz, John Kaippallimalil
{"title":"Transport Assistants to Enhance TCP Connections: Investigating the Placement Problem","authors":"Jaime Galán-Jiménez,&nbsp;Mohamed Faten Zhani,&nbsp;José Gómez-delaHiz,&nbsp;John Kaippallimalil","doi":"10.1002/nem.70006","DOIUrl":"https://doi.org/10.1002/nem.70006","url":null,"abstract":"<p>As of today, transport control protocol (TCP) remains the de-facto transport protocol in the Internet. However, TCP may incur high delays, especially when retransmitting lost packets as they have to be retransmitted only by the source and after a timeout that is roughly equal to a round trip time. To reduce such delay, recent work proposed to deploy a special network function, called transport assistant (TA), that is able to detect and retransmit lost TCP packets from inside the network rather than the source and thereby reduces retransmission delays. Unfortunately, there is no study on the impact of the placement of the TA on its performance benefits in terms of packet delivery delay. In this paper, we focus on the TA placement problem. We discuss the trade-offs and parameters to be considered to select the best placement for the TA. We first mathematically model the TCP packet delivery delay, that is, the time needed to deliver TCP packets, when the TA is deployed. We also formulate, as an integer linear program (ILP), the problem of placing multiple TAs in order to reduce TCP packet delivery delays while minimizing their deployment costs. We consider use-cases, one where a TA could handle a single flow and another where a TA could handle multiple flows. We then propose two heuristics to solve the problem with minimal execution time. Through experiments, we demonstrated that the deployment of TAs could reduce TCP packet delivery delays by up to 30% and could be leveraged to guide routing and load balancing. Moreover, we show that using the proposed heuristics for placing TAs could lead to performance that is close to the optimal solutions obtained with the ILP but with lower execution time.</p>","PeriodicalId":14154,"journal":{"name":"International Journal of Network Management","volume":"35 2","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/nem.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143424217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信