The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Base station (BS) sleeping is an effecting way to improve the energy-efficiency of cellular networks. Considering BS sleep mode operation under different scenarios, we focus on three wake-up policies: single vacation (SV) policy, multiple vacation (MV) policy and N policy. A hysteresis time is also considered to avoid frequent BS mode-changing operation. By modeling the systems as M/G/1 vacation queues,...
With the advent of high speed links, online flow measurement for, e.g., flow round trip time (RTT), becomes difficult due to the enormous amount of requirements on computational resources. We address this problem by proposing the double-deletion bloom filter (DDBF) scheme, which alleviates potential hash collisions of a standard bloom filter by explicitly deleting used records and implicitly deleting...
Video streaming is a kind of bandwidth hungry application. As a consequence, the number of streaming flows may be restricted. In this paper, a novel video streaming framework is designed, where multiple NVSs (Network Video Servers) form into a server group to collaboratively provide quality services. A novel problem - Maximum Streaming Flows (MSF), aiming to maximize the number of simultaneously online...
We consider an integrated service system, where real-time (RT) calls of multiple rate requirements and non-real-time (NRT) calls share the total system capacity. Typically, RT calls are given strict priority over NRT calls, therefore, NRT performance is dependent on the RT process. When RT call arrival processes are not Poisson processes, the effect of the RT traffic burstiness on the NRT performance...
We model how Internet Service Providers design tier rates, tier prices, and network capacity. Web browsing and video streaming are considered as the two dominant Internet applications. We propose a novel set of utility functions that depend on a user's willingness to pay for each application, the performance of each application, and the time devoted to each application. For a monopoly provider, the...
We study the impact of degree-preserving rewiring on the routing table configuration in an OSPF network. Degree-preserving rewiring may be applied to optimize specific network characteristics, such as assortativity. Rewiring has significant impact on IP router tables. This manifests itself through the number of nodes that are affected by the rewiring and the average number of routing table entries...
This paper addresses a Bayesian game theoretic framework for determining the association rules that decide to which cell a given mobile user should associate in LTE two-tier Heterogeneous Networks (HetNets). Users are assumed to compete to maximize their throughput by picking the best locally serving cell with respect to their own measurement, their demand and a partial statistical channel state information...
There is a form of unfairness phenomenon found in data center networks,which was identified by P. Prakash. This phenomenon shows that the throughput of a flow with smaller RTT is less than the throughput of a flow with large RTT. This is completely contrary to the classic TCP protocol. P. Prakash gives an explanation based on port blackout theory. However, after careful analysis, we have found another...
With the introduction of Software Defined Networking (SDN), the concept of an external and optionally centralized network control plane, i.e. controller, is drawing the attention of researchers and industry. A particularly important task in the SDN context is the placement of such external resources in the network. In this paper, we discuss important aspects of the controller placement problem with...
Wireless information-centric networks consider storage one of the network primitives, and propose to cache data within the network in order to improve latency to access content and reduce bandwidth consumption. We study the throughput capacity of an information-centric network when the data cached in each node has a limited lifetime. The results show that with some fixed request and cache expiration...
In this paper we present a new analysis of energy consumption in cellular networks. We focus on the distribution of energy consumed by a base station for one isolated cell. We first define the energy consumption model in which the consumed energy is divided into two parts: The additive part and the broadcast part. The broadcast part is the part of energy which is oblivious of the number of mobile...
The virtualization trend in today's Internet decouples services from the constraints of the underlying physical infrastructure. This decoupling facilitates more flexible and efficient resource allocations: the service can be realized at any place in the substrate network which fulfills the service specification requirements.
Heterogeneous wireless networks have been introduced to enable cellular networks to handle the continuously increasing amount of mobile data traffic. In heterogeneous networks, the deployment of macrocells is accompanied by the use of low power pico and femtocells (referred to as microcells) in hotspot areas inside the macrocell, which increases the data rate per unit area. In this paper, we study...
Mobile communication platforms of individual agents and ground vehicles, ships and aircrafts of both civil and military services often operate in highly dynamic conditions with constantly changing infrastructure and access to communication resources. Efficient techniques for rapid and yet stable communication of such fleets with their control centres and between cooperating vehicles within the fleet...
The concurrent use of networks provides a powerful means to boost performance in areas covered by multiple networks where only limited bandwidth is available. However, despite its enormous potential for performance improvement only little is known about how to effectively exploit the potential for performance improvement in practical deployments. This raises the need for traffic-splitting-and-reassembly...
Recently, a negative interplay has been shown to arise when scheduling/AQM techniques and low-priority congestion control protocols are used together: namely, AQM resets the relative level of priority among congestion control protocols. This work explores this issue by (i) studying a fluid model that describes system dynamics of heterogeneous congestion control protocols competing on a bottleneck...
A packet-switched network node with constant capacity (in bps) is considered, where packets within each flow are served in the first in first out (FIFO) manner. While this single node system is perhaps the simplest computer communication system, its stochastic service curve characterization and independent case analysis in the context of stochastic network calculus (snetcal) are still basic and many...
We utilize portfolio theory of finance and investment science in order to show how a cloud broker can select a portfolio of connectivities in order to accommodate requirements for cloud services of users, who need better than the best effort Quality of Service (QoS). Following economic theory, we assume that cloud broker makes his decision by choosing appropriate tradeoff between profit and risk....
Going back to the Internet of one decade ago, HTTP-based content and web services were provided by centralized or barely distributed servers. Single hosts providing exclusive services at fixed IP addresses was the standard approach. Current situation has drastically changed, and the mapping of IPs to different content and services is nowadays extremely dynamic. The adoption of large CDNs by major...
Multi-Camera Networks (MCN) are becoming increasingly important in today's society needs and daily-life with application-oriented multiple tasks running in each camera such as video surveillance, object tracking and localization etc. The ultimate goal of MCN is to best satisfy such tasks' preferences/expectations required by users, which has not been well-addressed by previous works. This paper investigates...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.