The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The recent technological advances related to computing, storage, cloud, networking and the unstoppable deployment of end-user devices, are all coining the so-called Internet of Things (IoT). IoT embraces a wide set of heterogeneous services in highly impacting societal sectors, such as Healthcare, Smart Transportation or Media delivery, all of them posing a diverse set of requirements, including real...
In this contribution, a recently conducted measurement campaign is introduced for investigating the characteristics of propagation channels for massive multiple-input multiple-output (MIMO) scenarios in a lecture hall environment. The channel responses for waves of higher frequency band ranging from 13 GHz to 17 GHz was measured with a vertically standing virtual two-dimensional (2-D) 20 × 20 = 400-element...
To cope with the rapidly expanding network scale and population, the heterogeneous content centric networks (HCCNs) have emerged, where the naming content can be shared among different sub-networks by using interest packets. However, In the HCCNs, as these sub-networks are managed by different operators and some sub-network may exhibit selfish behaviors due to the limited resource, how to design a...
Network virtualization has become one of the most prominent solutions that can efficiently deal with the dramatic increase of data demand in mobile networks. In order to allow multiple virtual networks to coexist in the same substrate network, the need for development of efficient virtual network embedding algorithms and techniques is imperative. The main purpose of this paper is to provide an optimization...
Different services have different requirements in failure recovery. However, in the current network, the failure recovery schemes generally handle all the traffics in the same manner, which is inefficient. Software Defined Networking (SDN) enhances network flexibility by centralized control of traffics and resources. In this paper, we develop a Declarative Failure Recovery System (DFRS) for customized...
The utilization of Ethernet in the cellular terrestrial cloud radio access network (C-RAN) fronthaul is considered as a way for improving C-RAN network reconfigurability and efficiency in terms of both capital and operational expenditures. Moreover CPRI line bit rate dynamic reconfiguration may spare further capital expenditures by avoiding a peak traffic capacity allocation. A possible solution for...
Multi-radio multi-channel (MRMC) is a promising approach to relieve the overload caused by the explosive growth of video streaming traffic in wireless mesh networks (WMNs). Previous studies have shown that in MRMC WMNs, network capacity can be increased significantly by proper design of channel assignment and routing algorithm. Multi-path routing can make good use of the network capacity improvement...
The decoupling of control and data plane in software-defined networking (SDN) has been shown to be promising to improve routing performance in the context of intradomain routing. The applicability of SDN in inter-domain routing, especially with respect to route convergence, has not been properly explored. In this work, we propose a mathematical model to quantify the BGP convergence time for inter-domain...
In this paper, we study the outage probability of the amplify-and-forward (AF) cognitive relaying in spectrumsharing environments with outdated channel state information (CSI) over Rayleigh fading channels. A selection of the best relay in the secondary system with outdated channel information is considered. We derive a closed-form expression for the tight lower bound on the end-to-end outage probability...
In LTE and LTE-Advanced systems the rate of requests on the Random Access CHannel (RACH) can be high. Indeed, the Machine Type Communication (MTC) implies to have a high number of devices that need to request radio resources for transmitting small amount of data. Furthermore, reducing the time in which radio resources are allocated to Human Type Communications (HTC) for energy savings purposes, may...
Information-Centric Networking (ICN) or Content-Centric Networking (CCN), as it also known for, has recently been proposed as an evolutionary framework to propel the current Internet network architecture towards a content oriented design. Mobility-aware caching can be deemed as indispensable for improving the experience of mobile users. To this end, we propose a proactive caching with redirection...
Cross-layer design is a promising way to improve Quality of Services (QoS) by making use of the state information from different layers. In this paper, transmissions with random data arrival over fading channels are investigated. Probabilistic scheduling and adaptive modulation aware of both the queue state and the channel state are applied, hence we can formulate a Markov Decision Process. Based...
Wireless radio-frequency (RF) technologies has had universal wide-scale deployment. Despite this, the practical limitations of the RF spectrum being unable to meet the challenges (e.g. lack of security, high interference, limited bandwidth, scalability) of RF based communication networks have become increasingly apparent over the past decade. With the ever-growing of data heavy wireless communications,...
This paper presents a mechanism to use Traffic Analysis (TA) for identifying sources of tunneled video streaming traffic. The key idea is to probe encrypted and tunneled video streaming traffic at a client-side firewall so that the firewall can identify the traffic source using traffic analysis, and block or throttle traffic from that particular source. The key contribution in this paper is to evaluate...
The viral and dense deployment of small cell base stations (SBSs) will lie at the heart of 5G cellular networks. However, such dense networks can consume a significant amount of energy. In order to reduce the network's reliance on unsustainable energy sources, one can deploy self-powered SBSs that rely solely on energy harvesting. Due to the uncertainty of energy arrival and the finite capacity of...
Establishing and maintaining time synchronization among the nodes in a distributed wireless network with desired accuracy is challenging. In upcoming machine type communication (MTC) applications a fast, scalable and accurate synchronization method is highly desired. We view the clock synchronization problem as peer-to-peer (P2P) continuously running process where clock master with a stable clock...
We consider a two-user energy harvesting broadcast channel, and characterize the delay minimal transmission policies that minimize the total delay experienced by the data packets in the system. We consider a continuous time system where the delay experienced by each bit is given by the time spent by the bit in the queue waiting to be transmitted to its receiver. We consider the case where all data...
We propose a multi-hop reliable broadcasting (M-HRB) scheme suitable for a wide range of vehicular ad-hoc network (VANET) applications in urban setting. Multi-hop reliability is performed using local state information. Basically, a street is divided into multiple cells to form grid-like zones. We apply a proactive local state processing scheme exploiting features of periodic beacons to estimate wireless...
Interplanetary Networks (IPN) are classified among challenged networks and hence are hard to model using static graphs. Furthermore, they do not behave optimally when operated using the standards and techniques of static networks. Delay Tolerant Networking (DTN) is one of the suggested solutions to overcome these networks' challenges. The more widely used implementation of DTN uses Contact Graph Routing...
In this paper, we study the end-to-end delay of a linear multihop network with mobile relays located on the line connecting the source-destination pair. The network operates in an interference-limited environment, where the interfering signals are from nodes with positions following the Poisson point process (PPP) on a two-dimensional plane. Due to node mobilities, the relay nodes are assumed to move...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.