The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud Data Center (DC) service orchestration and resource management are important applications of the Software Defined Networking (SDN) paradigm. In this paper, we introduce a novel dynamic allocation strategy for Virtual Machine (VM) allocation called Enhanced multi-objective Worst Fit (E-WF). E-WF combines the multi-objective Best Fit and Worst Fit allocation strategies, and it exploits the history...
In this study, an efficient device-to-device communication-assisted transmission mechanism that improves proximity-based emergency services by prioritizing elderly adults is proposed. The proposed method allows substantially enhanced service quality to be provided to users experiencing life-threatening situations, while ensuring that service quality is maintained for users facing less dire situations...
Recognizing the central role of Lagrange multipliers in network resource allocation, a novel learn-and-adapt stochastic dual gradient (LA-SDG) method is developed in this paper to learn the empirical optimal Lagrange multiplier from historical data, and adapt to the upcoming resource allocation strategy. Remarkably, it only requires one more sample (gradient) evaluation than the celebrated stochastic...
Fair and efficient coflow scheduling improves application-level networking performance in today's datacenters. Ideally, a coflow scheduler should provide isolation guarantees on the minimum coflow progress to achieve predictable networking performance. Network operators, on the other hand, strive to decrease the average coflow completion time (CCT). Unfortunately, optimal isolation guarantees and...
The paper proposes a method of hierarchical QoS routing based on reservation of network resources. It describes the case of organization of distributed source routing when one of the border routers consistently solves two interconnected network tasks: calculation of the required routes and determination of the allocation order of link resource to be reserved in order to meet end-to-end QoS-requirements...
This work proposes a framework for proactive resource allocation in IaaS clouds to improve the system performance. In this system framework, the over-commit approach is applied to improve resource utilization and to show the performance impact. Although the over-commit approach could obtain better resource utilization, there are still some risks. When the amount of aggregated resources requested by...
Larger share of total energy consumed by mobile network operators (MNOs) is wasted to ensure seamless coverage. Three to six MNOs covering the same geographical area results in even more energy waste. Division of scarce resource, i.e., spectrum into small chunks also deteriorates the overall performance. With exponential growth of the traffic and insignificant marginal revenue, it is time for the...
Optimal energy and spectrum cooperative allocation is investigated for the downlink of two energy harvesting base stations in this paper. In particular, the joint maximization of the users' utilities and the base stations' revenues in two adjacent cells is considered. Each user can join either cell 1 or cell 2. When the users' choices on which cell to join are fixed, the energy and spectrum allocation...
Cloud computing technology is rapidly emerging as quite an efficient execution platform for even highly trusted scientific applications. Efficient resource management plays a pivotal role in the execution along with attaining high performance standards in Distributed environments. Resource provisioning and scheduling has become an important area of research in cloud resource management. Clouds can...
In recent years, the number of requests to transfer large files via large high-speed computer networks has been increasing rapidly. Typically, these requests are handled in the “best effort” manner and resulting in unpredictable completion times. In this paper, we consider a model where a transfer request either must be completed by a user-specified deadline or must be rejected if its deadline cannot...
Long Term Evolution (LTE) is a technology, based on Third Generation partnership project (3GPP) which provides high data rates in the order of several hundreds of Mbps for data transmission. In order to achieve high data rates with good amount of spectral efficiency, it is required to allocate resources optimally. Physical Downlink Control Channel (PDCCH) is used to provide control information to...
With the rapid development of cloud computing, data center's resource management has become a critical component in its business model. CPU, memory and network in a data center have many effective partitioning methods among the virtual machines that could offer high-efficiency, enhanced fairness and performance guarantee. However, in existing software based virtualization architecture (e.g., Xen),...
In recent years most Internet Service Providers (ISPs) have come across one of the important problems. That is, how to manage automatic adjustment of the bandwidth in the field of Virtual Private Networks (VPNs).One solution, is a model called Autonomic Service Architecture (ASA), which can manage the bandwidth allocation for individual customers. Nevertheless, this model has two main drawbacks. One...
Mobile traffic is increasing exponentially year by year and it will be over 1000 times higher than that of today in the near future. In order to tackle this matter, millimeter wave mobile access networks which can provide several GHz bandwidth attract international attention. This paper investigates the candidates of millimeter wave spectrum for 5G by referring to several ongoing 5G R&D projects...
We describe and demonstrate a fully distributed algorithm that enables prioritized TCP flows to allocate network resources (bandwidth) among themselves. The algorithm does not require any explicit communication among the different TCP flows. It enables autonomous adaptation to loss of network resources due to cyber attack or failure, while ensuring that users receive prioritized utility from available...
Recently, cognitive radio technology has been a lot of attention to improve bandwidth efficiency. In this paper, we propose an adaptive bandwidth management scheme based on the mechanism design and negotiation theory. According to the user`s utility, QoS and trust value, the proposed scheme allocates total resources while dynamically controlling the selfish users. In addition, proposed scheme is able...
Fair sharing of bandwidth among tenants in datacenters is important to guarantee prompt execution while providing isolation between different jobs. Existing bandwidth allocation methods lack a concept of a task reflecting the dependency between allocations on links. Moreover, existing approaches do not consider the tenants to be smart individuals and lack understanding of a threat that strategic players...
This paper studies the problem of joint allocation of transmission power and bandwidth in cooperative networks. The goal is to minimize transmission energy consumption in a network with M coordinated transmission points (CTPs) under respective data rate constraints of N mobile terminals (MTs). We propose a joint power and bandwidth allocation scheme for downlink data transmission based on mathematical...
We investigate the coexistence issue between 802.22 and 802.11af networks over the TV White Space (TVWS). The coexistence scheme is vulnerable to selfish attacks. In this paper, the scenario of selfish attack wherein 802.22 subscribers intend to occupy the allocated spectrum selfishly is studied. Consequently, 802.11af users have less opportunity to access the spectrum, which leads to low overall...
In this paper, we address dynamic spectrum access for Primary Operators (POs) for LTE-Advanced systems. We propose a dynamic spectrum access framework that exploits the capabilities of carrier aggregation to efficiently utilize the unutilized spectrum which varies with time and space when static spectrum access policies are adopted. A spectrum owner (SO) adopts an auction scheme for accessing spectrum...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.