Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A Novel Architecture for Data-Repeaters in the Future Internet
Date
2015-09-01
Author
GÜNAY, MELİH
Al-Turjman, Fadi
Kucukoglu, Irem
ŞİMŞEK, YILMAZ
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
105
views
0
downloads
Cite This
With the explosion of multimedia and heavily bandwidth-demanding applications, the Internet is wasted by repeated downloads of popular data. Hence, the information-centric networks (ICNs), or so-called future Internet, have been proposed for efficient data delivery. In this paper, we propose to place data repeaters (DRs) in high-demand regions. Placement of the DRs in these regions is optimized though the deployment approach that achieves two main network objectives: 1) minimizing data-delivery traffic and 2) minimizing data-publisher load. We formulate the deployment problem as a mixed integer linear program that determines the optimal set of deployment locations among the candidate hot spots to meet the future Internet objective. Our simulation results demonstrate that the significant data-delivery traffic and publishers' load reductions are possible by incorporating the proposed deployment strategy. Through simulations, we also use the optimized deployment approach to investigate the factors that affect the optimal DR allocation in the ICN, such as the DRs' count, network size, hot spots distribution, and publishers' load-balance. Using our results, we make observations on how service providers can best deploy/utilize DRs in the future Internet.
Subject Keywords
Cost
,
Data repeaters (DRs) deployment
,
Future Internet
,
Information-centric networks (ICNs)
,
Publisher offloading
URI
https://hdl.handle.net/11511/67638
Journal
CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE
DOI
https://doi.org/10.1109/cjece.2015.2451518
Collections
Engineering, Article
Suggestions
OpenMETU
Core
A Context Aware Notification Architecture Based on Distributed Focused Crawling in the Big Data Era
AKYOL, MEHMET ALİ; Gökalp, Mert Onuralp; Kayabay, Kerem; Eren, Pekin Erhan; Koçyiğit, Altan (2017-09-08)
The amount of data created in various sources over the Web is tremendously increasing. Trying to keep track of relevant sources is an increasingly time-consuming task. The traditional way of accessing information over the Web is pull-based. Users need to query data sources in certain time intervals where an important piece of information can be lately recognized or even missed completely. Technologies including RSS help users to get push-based notifications from websites. Discovering the relevant informatio...
Improved link prediction for location based social networks with novel features and contextual feature reduction
Bayrak, Ahmet Engi; Polat, Faruk; Department of Computer Engineering (2019)
High penetration of broadband Internet access has made a revolution on the web usage, where users have become content generators rather than just consuming. People started to communicate, interact, maintain relationship and share data (image, video, note, location, etc.) with their acquaintances through varying online social network sites which are the key factors of that internet usage revolution. Online social networks with location sharing and interaction between people are called Location Based Social N...
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing
Bhargava, Bharat; Angın, Pelin; Ranchal, Rohit; Lingayat, Sunil (2015-01-01)
The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints when accessing cloud services are still at an immature state. The highly dynamic nature of networks and clouds ma...
A FUZZY CONCEPTUAL MODEL FOR MULTIMEDIA DATA WITH A TEXT-BASED AUTOMATIC ANNOTATION SCHEME
Kucuk, Dilek; Burcuozgur, N.; Yazıcı, Adnan; KOYUNCU, Murat (World Scientific Pub Co Pte Lt, 2009-08-01)
The size of multimedia data is increasing fast due to the abundance of multimedia applications. Modeling the semantics of the data effectively is crucial for proper management of it. In this paper, we present a fuzzy conceptual data model for multimedia data which is also generic in the sense that it can be adapted to all multimedia domains. The model takes an object-oriented approach and it handles fuzziness at different representation levels where fuzziness is inherent in multimedia applications and shoul...
A simulation environment for cybersecurity attack analysis based on network traffic logs
Daneshgadeh, Salva; Oney, Mehmet Ugur; Kemmerich, Thomas; Baykal, Nazife (2019-01-01)
The continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
M. GÜNAY, F. Al-Turjman, I. Kucukoglu, and Y. ŞİMŞEK, “A Novel Architecture for Data-Repeaters in the Future Internet,”
CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE
, pp. 300–306, 2015, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/67638.