The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is demand for solutions capable of managing the constantly increasing video traffic loads over wireless networks while ensuring sufficient QoS and QoE for mobile video services. This paper presents a hierarchical network management architecture for optimized mobile video streaming in heterogeneous multi-access networks. The architecture jointly utilizes the access diversity of multi-access networks...
One-way delay monitoring is necessary for the time-sensitive media streaming. The conventional methods of one-way delay measurement require the clocks used at both the source and sink nodes of a path have to be synchronized. Clock synchronization can be performed either through GPS or NTP-based methods. Both approaches bear certain limitations. This paper describes a novel method of estimating the...
During the widening of information technology, the need to a framework that efficiently constructs connection vectors from online data flow for evaluating intrusion detection models has become fundamental. Moreover, known datasets in intrusion detection are either outdated or offline aggregated. Therefore, these datasets are not adequate for performance evaluation anymore. In this paper we present...
Three-dimensional video has recently gained great popularity as it enhances the viewing experience. Streaming of 3D video over IP networks will soon become a common means of multimedia consumption, thanks to the recent standardization efforts such as MPEG-DASH and 3D-HEVC. To this end, rate adaptation techniques are required to overcome the unreliable nature of IP networks. In this paper, we propose...
Shared resources are an essential part of cloud computing. Virtualization and multi-tenancy provide a number of advantages for increasing resource utilization and for providing on demand elasticity. However, these cloud features also raise many security concerns related to cloud computing resources. In this paper, we propose an architecture and approach for leveraging the virtualization technology...
In this paper, we introduce an approach for resource allocation of elastic and inelastic adaptive real-time traffic in fourth generation long term evolution (4G-LTE) system. In our model, we use logarithmic and sigmoidal-like utility functions to represent the users applications running on different user equipments (UE)s. We present a resource allocation optimization problem with utility proportional...
One approach to obtain scalable routing table sizes at the cost of a possible deviation from shortest paths is the creation of a limited number of spanning trees along which packets are forwarded greedily. An often overlooked drawback of this approach, however, is the potentially severe overhead for reorganizing tree structures and updating routing tables in the presence of node or link failures....
Coherent optical interleave-division multiple-access (OIDMA) has been recently proposed for next generation passive optical network (NG-PON) systems. In this paper we present a performance evaluation and comparison of coherent OIDMA and coherent optical code-division multiple-access (OCDMA) PONs in terms of ONU launch power, PON reach, bit error rate (BER), user bit rate, and number of users. Results...
Finding connected components in a graph is a well-known problem in a wide variety of application areas such as social network analysis, data mining, image processing, and etc. In this paper, we present an efficient and scalable approach in MapReduce to find all the connected components in a given graph. We compare our approach with the state-of-the-art on a real-world graph. We also demonstrate the...
In high-performance networks with both advance and immediate reservations, activating an advance reservation may result in the preemption of some ongoing data transfers based on immediate reservations due to insufficient bandwidth. To minimize such service disruption, we explore the interactions between advance and immediate reservations, and propose an integrated reservation solution with two components:...
We propose a software-defined wireless sensor network system whose behavior can be redefined even after deployment by the injection of sensor node roles by means of wireless network communications. Two main technologies are used to develop this system, role generation and delivery mechanism, and a reconfigurable wireless sensor network with many reconfigurable sensor nodes. In the role generation...
This paper provides a theoretical performance analysis of different classes of multicast routing algorithms, namely the Shortest Path Tree, the Steiner Tree, compact routing and greedy routing. Our motivation is to determine the routing scheme which would yield the best trade-off between the stretch of the multicast routing paths, the memory space required to store the routing information and routing...
In this paper, we consider a cooperative wireless network in which there are multiple sources and multiple relays. Owing to unreliable wireless channels, the network connections between nodes vary. This leads to the failure of intermediate nodes for generating linear combinations of incoming messages in network coding schemes. We propose an analytical framework to evaluate the performance of the reconstructing...
Wireless network coding has attracted considerable research interest due to its promise of delivering increased capacity with high energy efficiency via the transmission of packet combinations from multiple flows. Much of this interest is based on the approach of the COPE protocol [1], which uses broadcasts of XOR combinations of packets to reduce the number of transmissions required, as long as they...
In this paper we leverage the concept of information leakage to demonstrate the correlation between network traffic and available power levels in wireless sensor nodes brought about as a result of dynamic duty cycling. We show that this correlation can be used to remotely infer sensor node power levels. Essentially, our premise is that by determining the send rate of a wireless sensor node the current...
This paper proposes a simple Wireless Sensor Network (WSN)-based air quality monitoring system (WSN-AQMS) for industrial and urban areas. The proposed framework comprises a set of gas sensors (ozone, CO, and NO2) that are deployed on stacks and infrastructure of a Zigbee WSN and a central server to support both short-term real-time incident management and a long-term strategic planning. This architecture...
Wireless mesh networks(WMNs) have emerged as a key technology for new wireless network technology as well as part of the next generation Internet. The capacity of a wireless mesh network is improved by equipping mesh nodes with multi-radios tuned to non-overlapping channels. By letting these nodes utilize the available channels opportunistically, we increase the utilization of the available bandwidths...
Recently, Information-Centric Network (ICN) has been attracting much attention with its promising future as next-generation Internet architecture. While ICN is scalable and efficient in Internet, concerns are raised when deploying it in ad-hoc networks. Current ICN proposal strictly follows a receiver-driven transport design. However, many applications in multi-hop ad-hoc network are push-based and...
With the advancement of mobile technology, mobile sensing becomes increasingly popular for applications in environmental protection, traffic monitoring, and health care. Apart from sensing, mobile phones have also been suggested to facilitate data collection from wireless sensors in their surroundings. The idea is to use smart phones to collect data from wireless sensors through short range communication,...
Mobile Ad-hoc Networks are increasingly deployed in military networks as well as special kinds of civil law enforcement and emergency operation domains. Compared to wired and other types of wireless networks, MANETs are particularly vulnerable to a wide range of attacks and require high security and privacy guarantees due to their critical mission. Research efforts have focused on developing secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.