Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2024: 0.7
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Oulad Nassar, Badr | Tachibana, Takuji
Article Type: Research Article
Abstract: Hop-based burst-cluster transmission has been proposed to improve fairness in optical burst switching networks, and a burst-cluster is generated from multiple bursts. By arranging bursts from the smallest number of hops to the largest one, the burst loss probability for a small (large) number of hops increases (decreases), improving fairness. However, depending on the amount of traffic on each link, the burst loss probability for a small number of hops becomes larger than that for a large number of hops for some source nodes. Therefore, all source nodes can not always improve fairness. In this paper, an adaptive burst reordering …algorithm for the hop-based burst-cluster transmission is proposed. Here, each source node calculates the burst loss probability for each number of hops from the number of received ACK and NACK messages. Next, the source node changes the order of bursts within a burst-cluster dynamically. The performance of the proposed method has been evaluated in tandem networks and mesh networks such as NSFNET and ARPA2 by simulation. Numerical examples show that the proposed method is effective for improving the local fairness for each source node regardless of the amount of traffic on each link. Show more
Keywords: Adaptive burst reordering, fairness, hop-based burst-cluster transmission, optical burst switching
DOI: 10.3233/JHS-200625
Citation: Journal of High Speed Networks, vol. 26, no. 1, pp. 1-12, 2020
Authors: Kharat, Prashant | Kulkarni, Muralidhar
Article Type: Research Article
Abstract: Quick UDP Internet (QUIC) protocol is a transport and application layer solution developed by Google, which is the strong competitor to popular and well established Transmission Control Protocol (TCP). The QUIC protocol is being updated faster resulting into many new versions of the protocol. In this paper, the performance of Modified QUIC (ModQUIC) protocol has been tested with respect to congestion control using India’s rapidly growing Internet service provider, the Reliance Jio 4G network (JioFi), which has captured 17% of the market share in a short time. This experimental study investigated ModQUIC protocol performance with congestion control mechanisms CUBIC and …Bottleneck Bandwidth Round-trip-propagation-time (BBR) in the JioFi network. The experiment is conducted using a testbed, developed with JioFi and RaspberryPi-3 wireless router along with network emulator: Netem. The ModQUIC performance is verified using test video files stored on Google drive. The performance is tested in packet loss and packet reorder situations using metrics, Throughput and Retransmission Ratio (RTR). We observed that overall ModQUIC/BBR performance is better than ModQUIC/CUBIC in the current Internet. We observed that Reliance Jio is an economical solution for highly populated countries like India, but not a contemporary solution to fulfill India’s newly launched digitization project. Show more
Keywords: Congestion control, QUIC, ModQUIC, protocol technology, JioFi, high-speed networks, transport layer
DOI: 10.3233/JHS-200627
Citation: Journal of High Speed Networks, vol. 26, no. 1, pp. 13-26, 2020
Authors: Kolici, Vladi | Liu, Yi | Qafzezi, Ermioni | Elmazi, Donald | Barolli, Leonard
Article Type: Research Article
Abstract: Peer-to-peer (P2P) networks are a technology that makes two or more peers to communicate randomly in a network by using appropriate data and communication systems without the help of any central administration. P2P networks are very dynamic, where the peers join and leave the network freely. There are many issues in P2P networks, such as security, peers heterogeneity and the quality of coordination between peers. In this work, we have considered the latter and present a distributed event-based awareness approach for P2P groupware systems. We propose two Fuzzy-based Peer Coordination Quality Systems (FPCQS) for improving peer Awareness and Group Synchronization …in mobile P2P networks according to four input parameters: Group Synchronization (GS), Peer Communication Cost (PCC), Peer Mobility (PM) and Time for Finishing the Required Task (TFRT). The output of our systems is Peer Coordination Quality (PCQ). We make a comparison study between FPCQS1 and FPCQS2. The simulation results show that when GS is increased, the PCQ is increased. But, by increasing PCC, the PCQ is decreased. When the PM is 50 units, the PCQ is the best. Considering the effect of TFRT parameter, we found that when TFRT is increased, the PCQ is decreased. Comparing the complexity, the FPCQS2 is more complex than FPCQS1. However, FPCQS2 considers also the TFRT, which makes the system more reliable. Show more
Keywords: Peer-to-Peer, peer awareness, fuzzy logic, intelligent systems, group synchronization
DOI: 10.3233/JHS-200628
Citation: Journal of High Speed Networks, vol. 26, no. 1, pp. 27-39, 2020
Authors: Singh, Pooja | Gill, Nasib S.
Article Type: Research Article
Abstract: In this paper, a self-observation and recommendation based trust model with defense scheme to filter dishonest recommendations is proposed and analyzed to reduce the impact of false positive and false negative attacks in WANET. The Bayesian statistical approach is used to compute direct and indirect trust values. The confidence value assures the maturity of the interactive relationship between the trust evaluating node and the evaluated node. The defense scheme filters the received recommendations by comparing them with the node’s own opinion and in case of no interaction with the evaluated node, it compares with a trusted neighbor’s opinion. The neighbor …nodes are tagged into three categories: Trusted neighbor, untrusted neighbor and unknown neighbor according to the overall similarity score. The defense scheme only accepts the recommendations from trusted and unknown neighbors. The proposed trust model is simulated and the results show that the model is capable of mitigating the influence of badmouthing and ballot-stuffing attacks. Show more
Keywords: Wireless Ad hoc Network, Trust model, Bayesian statistical approach, Direct and indirect trust, recommendation filtration
DOI: 10.3233/JHS-200629
Citation: Journal of High Speed Networks, vol. 26, no. 1, pp. 41-54, 2020
Authors: Muthamil Sudar, K. | Deepalakshmi, P.
Article Type: Research Article
Abstract: Software-Defined Network (SDN) has recently emerged as a network paradigm due to its high network programmability and flexibility which can overcome the problem in traditional networks by decoupling the control plane from the data plane. The data plane will forward the packets as per the decision made by the controller in the control plane. This centralized control will help to provide the abstract view of the entire network infrastructure. Since the controller is a core part of SDN, it is more prone for attacks and turns as a major threat to the entire network. Distributed Denial of Service (DDoS) attack …can then overload the SDN controller and switch flow table which leads to a performance degrade of the network. To address this problem, we have deployed two level security mechanisms. In level one, an entropy-based mechanism is proposed to detect the DDoS flooding attack in the early stage by temporarily holding the particular flow. In level two, a machine learning-based C4.5 technique is proposed to detect the attack by analysing additional features and send a permanent alert to drop the packets. The results are analysed with K-fold validation technique in terms of sensitivity, specificity and accuracy. Show more
Keywords: Software-defined networks (SDN), distributed denial of service (DDoS), flooding attack, entropy, machine learning, C4.5, K-fold validation
DOI: 10.3233/JHS-200630
Citation: Journal of High Speed Networks, vol. 26, no. 1, pp. 55-76, 2020
Authors: Mohammadi, Reza | Javidan, Reza | Rikhtegar, Negar | Keshtgari, Manijeh
Article Type: Research Article
Abstract: Software Defined Network (SDN) is a new networking paradigm which can be used to provide desired traffic engineering policies over a network. Recently, multicast applications such as video conferencing, IPTV and online gaming have emerged in most environments. One of the main issues in such applications is to provide essential Quality of Service (QoS) for end users. Due to limitations of IP-based networks, guaranteeing QoS parameters such as end-to-end delay and packet loss for multicast applications pose many challenges. In SDN, however, the network controller has a global view on network resources and network administrators can use desired policies for …increasing network performance regarding QoS requirements. In this paper a new adaptive traffic engineering method is proposed which models the QoS provisioning problem as an Integer Linear Programming (ILP) and solves the problem by ant colony algorithm. Performance evaluation results show that the proposed method achieves higher performance in comparison with other traditional multicast routing protocols such as PIM-SM. Show more
Keywords: Software Defined Network (SDN), Quality of Service (QoS), multicast traffic engineering, ant colony, Integer Mathematical Programming (ILP)
DOI: 10.3233/JHS-200631
Citation: Journal of High Speed Networks, vol. 26, no. 1, pp. 77-88, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]