The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With rapid growth of LTE network and Voice-over-LTE(VoLTE), detecting and preventing security threats like Denial of Service attack becomes a necessary and urgent requirement. VoLTE is an voice solution based on Internet Protocol and 4G LTE technology, at the same time exposing many vulnerabilities when using packet-switched network. There are many heavy weighted detection systems using content analysis,...
There are hundreds of billions packets passing through the network, how to analyse these big data is an arduous task. In this paper we proposed a new scheme based on cluster algorithm to explore the backbone network traffic pattern. Two new traffic features are introduced to assist the analysing process. These two novel attributes can represent the flow effectively cooperated with a new flow similarity...
Recent advances in wireless network technologies, like the ability to operate in a high-speed mobility environment, have opened up to a number of domains such as that of Intelligent Transport Systems (ITS) whose main component are so-called Vehicular Ad hoc Networks (VANETs). VANETs are associated with two kind of deployments: vehicular to Infrastructure (V2I), managing communications between vehicles...
Efficient event reporting is of vital importance in wireless sensor networks (WSNs). This is especially true in critical-time applications, where ensuring an adequate report latency allows a proper reaction from the network to the occurring phenomena. Despite a QoS analysis based on mean report latency is clearly insufficient for critical-time applications, it is oftentimes presented as the main performance...
In this paper we focus on the problem of self-tuning distributed transactional cloud data stores by presenting an overview of the autonomic mechanisms integrated in the Cloud-TM platform, a transactional cloud data store developed in the context of a recent European project. Cloud-TM takes a holistic approach to self-tuning and elastic scaling, treating them as strongly intertwined problems with the...
Distributed systems can be characterized by processes that communicate with each other by message passing, through communication channels, and may be located at several computers spread over a communication network. These processes and communication channels are usually characterized by synchronous or asynchronous timeliness behavior, according to the characteristics of underlying system (operating...
Random access approaches in Low Earth Orbit (LEO) satellite networks are usually incompatible with the Quality of Service (QoS) requirements for multimedia traffic, especially when hand-held terminals must operate with a very low signal-to-noise ratio. This paper proposes the Satellite Random Network Diversity Multiple Access (SR-NDMA) protocol that handles multimedia traffic under this context through...
As a key enabling technology for the next generation inter-vehicle safety communications, The IEEE 802.11p protocol is currently attracting much attention. Many inter-vehicle safety communications have stringent real-time requirements on broadcast messages to ensure drivers have enough reaction time toward emergencies. Most existing studies only focus on the average delay performance of IEEE 802.11p,...
The global throughput of an 802.11e WLAN is determined by EDCA (Enhanced Distributed Channel Access) parameters, among other aspects, that are usually configured with predetermined and static values. This study carefully evaluates the Quality of Service (QoS) of Wi-Fi with EDCA in several realistic scenarios with noise and a blend of wireless traffic (e.g., voice, video, and best effort, with Pareto...
In this paper, we develop a queueing analytic model that incorporates imperfect sensing in order to measure different performance parameters e.g., collision probability, packet loss probability and queueing delay. This analytic model is useful for call admission control (CAC) decision in cognitive radio network (CRN) when there is a certain sensing error as well as certain quality of service (QoS)...
VoIP service demands strong QoS support for enhanced call quality and increased user satisfaction. Deploying VoIP in opportunistic communication models like cognitive radio requires thorough analysis of the factors involved in design and implementation. The objective of this paper is to implement VoIP successfully over a cognitive radio network and maintain the call quality at an acceptable limit...
In Optical Burst Switching Network, contention is one of the challenging problems. Contention occurs when more than one burst demand for same output wavelength channel in same time. The deflection routing, fiber delay line (FDL) and wavelength conversion are the methods used to resolve contention in OBS Networks. With deflection routing, contending bursts in send in another route rather than primary...
The evolution of wireless sensor technology allows for the provision of enhanced services to miscellaneous application domains. In parallel, Quality of Service (QoS) support becomes necessary to satisfy the needs of these new service models. This paper presents QoS requirements from a service model perspective and describes challenges for QoS support in WSNs. We also provide a review of current efforts...
Considering a tandem network of queues (each representing the buffer in a router) our objective is to allow each individual queue to dynamically control its own parameters (in this paper the buffer size) using only information available locally and from neighboring nodes. For each node we adopt control approaches that are based on Infinitesimal Perturbation Analysis (IPA) estimates of certain performance...
This paper proposes efficient analytical models to dimension the required transport bandwidths for the Long Term Evolution (LTE) access network for the elastic Internet traffic (which is carried by the TCP protocol). The dimensioning models are based on the use of Processor Sharing queuing theory to guarantee a desired end-to-end application QoS target. For validating the analytical dimensioning models,...
The exponential growth of wireless technologies attracted many research to improve the quality of service (QoS) of global wireless networks such as 802.11 and 802.16. In specific, research targeted the physical layer (PHY) parameters and medium access control (MAC) mechanisms to improve QoS. In this paper we provide a simple yet efficient model to maintain the quality of service for wireless networks...
Providing Quality of Service (QoS) and Quality of Experience (QoE) in connection with media data like audio or video is of key importance for the evolution of future packet-based networks. Especially in telecommunications, the subjective service quality as perceived by the end user depends amongst other parameters on the setup success rate as well as on the delay for session setup, which is measured...
In this paper the authors present an analytical model that - compared to previously published work - more accurately captures the delay of IEEE 802.11 protocol under low, medium, and near-saturation load conditions. A Markov chain is used to keep track of the instantaneous number of (active) nodes that have a frame to transmit. One advantage of the proposed analytical model is its ability to estimate...
The efficiency of BitTorrent for file sharing has inspired a number of BitTorrent-based P2P protocols for Video-on-Demand (VoD). It has been shown that these systems are scalable in steady-state: the service quality provided to the users does not depend on the number of users in the system. However, it is not well understood how these systems scale under flash-crowds. In this work, we model a general...
For peer-to-peer (P2P) networks continually to flourish, QoS provision is critical. However, the P2P networks are notoriously dynamic and heterogeneous. As a result, QoS provision in P2P networks is a challenging task with nodes of the varying and intermittent throughput. This raises a fundamental problem: is stable and delicate QoS provision achievable in the highly dynamic and heterogeneous P2P...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.