The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a Wireless Sensor Network (WSN) Nodes are distributed to monitor an area of interest such as a military battlefield, and transmit their data to in-situ Base-Station (BS) through multi-hop paths. In addition to collecting and processing the sensor data, the BS performs network management tasks. Due to such an important role, an adversary would try to locate the BS and target it with Denial-of-Service...
WiFi offloading has been exploited as a quick and viable solution to decrease the burden on cellular networks. In this paper, we study the problem of deploying new WiFi access points (AP) in a city-wide area for offloading purposes. Different than previous work which look at the problem only from operator's perspective and targets the maximization of offloaded traffic volume, we approach the problem...
Mobile messaging has become a trend in our daily lives. The current schema for messaging is to route all the messages between mobile users through a centralized server. This scheme, though reliable, creates very heavy load on the server. It is possible for users to communicate through peer-to-peer (P2P) connection, especially over urban networks characterized by heavy user traffic and dense network...
In this paper, we present a new carpooling recommendation system whose main objective is to find the best carpool matchings and recommend individuals to join their friends during trips or travels. The proposed recommendation system utilizes user's mobility history and user social network information to find carpool matchings. The proposed system employs a probabilistic model based on continuous time...
The problem of the centralized caching is studied in a two-layer network. The first layer of the network is constructed by a server and K1 helpers, and the second layer consists of K1 orthogonal sub-networks, each of which contains a helper and K2 users. The pioneer caching design in the two-layer network is to directly apply the Maddah-Ali & Niesen (MAU) centralized caching [1] into individual...
Opportunistic Networks have been designed for transmitting data in difficult environments, characterized by high mobility, sporadic connectivity, and constrained resources. To sustain these networks, the literature describes methods such as Epidemic and Spray&Wait, which do not learn from the network behaviour, and Gossiping-based algorithms that collect historical network data to improve efficiency...
Routing protocols for Mobile Ad hoc Networks (MANETs) have been extensively studied. However, the presence of malicious nodes makes it difficult to establish a valid route. Some of the well-known source routing protocols presented in the literature which claim to establish secure routes are prone to hidden channel attacks. In this paper, we address this issue and present a novel protocol based on...
The emerging requirements for 5th generation (5G) mobile networks lead to a complete network paradigm refurbishment by leveraging on Network Function Virtualisation (NFV) and Mobile Edge Computing (MEC). While NFV adds flexibility by allowing network functions to be dynamically deployed and inter-connected, MEC brings intelligence at the edge of the mobile network, reduces latency and enhances the...
In Content Delivery Networks (CDNs), knowing the popularity of video content helps the manager to take efficient decisions about which video content should be cached near the end users and also about the duplication degree of each video to satisfy the end user Quality of Experience. This paper focuses on predicting the popularity of video content, in terms of the number of requests. For that purpose,...
For making Mobile ad hoc network (MANET) more energy efficient swarm intelligence is used as a base and the clustered based approach as Bee-Ad Hoc-C which is an evolution from Bee-Ad-Hoc has been chosen as the best method in our previous work along with Stable Cluster Maintenance Scheme. In the proposed method parallel routing has been considered to improve the scalability of the system, reduce the...
Mobile Ad-hoc Networks (MANETs) are one possible solution for infrastructure-independent communication in disaster scenarios. In such scenarios, communication is essential to coordinate first responders and safe lives. But mobile nodes in large areas face several challenges related to connectivity, resulting in frequent partitions and intermittent connections. Protocols as well as network access technologies...
Recently, the rampant enlarging of networks scale have led to a growth in the number of mobile base stations. The research of mobile base stations is more meaningful under this circumstance. In the study of base station distribution, the distribution of base stations in many areas is subject to Poisson distribution. This paper takes three large cities in Britain as an example to explore whether their...
A mobile adhoc network is an independent system of mobile stations associated by wireless link to form a system. This system can be modeled in the form of an uninformed graph. Adhoc networks are peer to peer, multihope networks were data packets are transmitted to a source to destination through intermediate nodes (which serve as router). The infrastructure is not the main issue to setup MANET and...
Using Call Detail Records (CDR) to track mobile locations is becoming increasingly popular. In this paper, we design algorithms to compute a road signature, which is a typical sequence of cell sites that a mobile is connected to when traveling on the road. A good signature provides an easy way to determine whether other mobiles travel on the road in the future.
In this paper, we address the problem of power consumption minimization in Heterogeneous networks (HetNets) of China Mobile by implementing dynamic base stations (BSs) switching operation. Particularly, considering the minimal rate requirements of users as well as the realistic power consumption model of BSs, we formulate the problem as an integer linear programming which is NP-complete. Then, to...
The unprecedented increase in the mobile data traffic volume, as well as the need for network coverage expansion are major concerns for mobile operators. Although new pricing regimes have been actually employed to affect user's behavior over the usage of the network resources, operators still face challenges related to congestion management, cost reduction and revenue generation. Operators are induced...
We report on a case study on model based testingfor a commercially available telecom software system. A mainpurpose is to investigate how different strategies for test suitegeneration affect quality attributes of the generated test suites, in a realistic industrial environment. We develop a functionalmodel in the form of an extended finite state machine, from whichwe generate test suites using several...
Smartphone users' requirements for data plans from mobile network access services have become individualized. To cope with users' requirements, global mobile network operators have been replacing flat-rate data plans with tiered data plans in the mobile market. In addition, mobile virtual network operators who provide data plans to their own customers at retail prices have emerged in the mobile market...
It is widely expected that the core of next-generation cellular networks will be (i) based on software-defined networking (SDN) and network function virtualization (NFV), and (ii) shared between multiple parties, including traditional mobile operators and content providers. Such parties are normally competing with each other; however, they can obtain significant, mutual benefits even from limited...
The paper discusses different implementation options of service function chaining (SFC) in Cloud Computing. The motivation is to increase the efficiency of classical SFC of chaining multiple network functions implemented in dedicated virtual machines, especially due to its latency drawbacks for packet transfer. An alternative implementation of a compound SFC implementation in a single virtual machine...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.