The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network Function Virtualization (NFV) explores the virtualization technologies to offer Network-as-a- Service (NaaS) through connected virtual network functions. The network operations that were previously performed by specialized hardware are consolidated as software-based virtual network functions (VNFs). These VNFs can be implemented in the telecom clouds with high volume servers, switches and...
Hardware calibration is a necessary procedure to establish the reciprocity of the uplink (UL) and downlink channels (DL) in a time division duplex (TDD) mode of operation. In practice, any calibration scheme is prone to errors. Such errors result in a residual mismatch between UL and DL channels, which, in turn, can significantly affect the quality of DL transmission. In this paper, we study the effects...
Software Defined Networks (SDN) provide a high simplification of the network management by decoupling the control plane from the data plane through the use of controllers. Distributed-Denial-of-Service (DDoS) attacks can make SDN controllers unavailable to process legitimate flow requests from switches. The main approaches to protect controllers against DDoS attacks are essentially based on the attack...
Packet classification is an indispensable yet challenging functionality of modern network devices. Despite more than fifteen years of research, algorithmic solutions still fall short of meeting the line-speed of high performance routers or switches. As a result, the industry is still relying on TCAMbased hardware solutions for parallel lookups. SAX-PAC, a recently proposed hybrid framework, uses a...
Network Function Virtualization along with Network Service Chaining envision a reduction in the respective cost that end users, service providers, and network operators are experiencing, while providing complete and high quality services. However, the vast range of available services and the service on-demand model, creates dynamic traffic conditions that necessitates a flexible and automatic network...
Virtualization of optical access systems is being pursued to speedup service deployment and reduce CAPEX/OPEX. Several passive optical network (PON) specifications have been standardized and the applicability of virtualization to access networks is being considered. We have proposed a programmable optical line terminal (OLT) that performs OLT functions by software processing on general-purpose hardware...
White Space (WS) Networking crucially relies on the active monitoring of spatio-temporal spectrum usage (to identify WS opportunities). To achieve this, one way is to gather spectrum data via wide-area sensor deployment and construct better Radio Environment Maps (REMs) with spatial models such as Kriging and Gaussian Process (GP). An economically viable alternative is via incentivized crowdsourcing,...
As more and more data-intensive applications have been moved to the cloud, the cloud network has become the new performance bottleneck for cloud applications. To boost application performance, the concept of coflow has been proposed to bring application-awareness into the cloud network. A coflow consists of many individual data flows, and a coflow is completed only when all its component flows are...
In this paper, we propose a novel iterative algorithm based on successive convex approximation for the nonconvex energy efficiency optimization problem in massive MIMO networks. The stationary points of the original problem are found by solving a sequence of successively refined approximate problems, and the proposed algorithm has the following advantages: 1) fast convergence as the structure of the...
For polar codes, cyclic redundancy check (CRC)-aided successive cancellation list (CA-SCL) decoder has attracted increasing attention from both academia and industry. In this paper, a hardware efficient and low-latency CA-SCL polar decoder based on distributed sorting is first proposed. For path metric (PM) sorting of each level, a distributed sorting (DS) algorithm is proposed to reduce the comparison...
Authentication is the first step to access a resource (service, website, data, etc.), so it is of vital importance in a system. The most widely used authentication mechanisms are one-factor authentication based on password and two-factor authentication methods which require a password and another factor (verification code, biometric feature, hardware token, software plug-in, etc.). However, in many...
In this paper, we investigate the performance analysis of dual hop relaying system consisting of asymmetric Radio Frequency (RF)/Free Optical Space (FSO) links. The RF channels follow a Rayleigh distribution and the optical links are subject to Gamma-Gamma fading. We also introduce impairments to our model and we suggest Partial Relay Selection (PRS) protocol with Amplify-and-Forward (AF) fixed gain...
Betweenness centrality is a popular metric in social science, and recently it was adopted also in computer science. Betweenness identifies the node, or the nodes, that are most suitable to perform critical network functions, such as firewalling and intrusion detection. However, computing centrality is resource-demanding, we can not give for granted that it can be computed in real time at every change...
In this paper, we construct an analytical design framework for energy efficient scheduling for delay-constrained spectrum aggregation (ESSA), where the practical hardware limitations on SA capability bring various technical challenges. Specifically, the conventional water-filling power control cannot be adopted over all the channels, and the delay-aware scheduling solution should interact with the...
The performance of List Successive-Cancellation Decoding (LSCD) of Polar Codes with large list size have exceeded that of Turbo codes and Low-Density Parity-Check codes. However, large list size results in huge computation complexity and this limits the applicability of LSCD in high-throughput and power- sensitive applications. In this work, a low complexity design for LSCD with large list size based...
Current perspectives for satellite communications are massively envisaging the introduction of a new generation of satellites based on semi-transparent transponder architectures. In this frame, technological constraints related to the development and implementation of novel payloads, that include significant on-board digital processing, call for careful system modeling and accurate digital hardware...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.