The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a throughput-maximum resource provision scheme in the OFDMA-based Wireless Virtual Network (WVN). The proposed scheme takes the dynamics of both traffic arrivals and wireless channels into consideration. Furthermore, we consider a more flexible service contract where average resource provision is guaranteed for each slice. As it is practically impossible to know future traffic...
Sparse code multiple access (SCMA) is a new type of non-orthogonal modulation suggested for 5G systems offering lower bit-error rate and higher spectral efficiency. There are many challenges when designing high throughput SCMA message passing decoders to meet the standards expected from 5G networks. Particularly, the message passing algorithm (MPA) needs many exponential computations to calculate...
We study the resource allocation problem in RAN-level integrated HetNets. This emerging HetNets paradigm allows for dynamic traffic splitting across radio access technologies for each client, and then for aggregating the traffic inside the network to improve the overall resource utilization. We focus on the max-min fair service rate allocation across the clients, and study the properties of the optimal...
In this paper, a distributed Dual-Ring Tree scatternet formation is proposed to generate a reliable topology for Bluetooth networks. To mitigate the formation complexity, each root distributively connects with its downstream roots with local topology instead of global nodes information, instructs them to connect together, and generates a desired dual-ring subnet via distributed computation with three...
Multipath TCP (MPTCP) enables transmission via multiple routes for an end-to-end connection to improve resource usage of regular TCP. Due to the increasing concern in green computing, there has been significant interest in designing energy-efficient multipath transport. For existing MPTCP congestion control algorithms, the research community still lacks a comprehensive understanding of which components...
Scheduling and managing queues with bounded buffers are among the most fundamental problems in computer networking. Traditionally, it is often assumed that all the properties of each packet are known immediately upon arrival. However, as traffic becomes increasingly heterogeneous and complex, such assumptions are in many cases invalid. In particular, in various scenarios information about packet characteristics...
By softwarizing traditional dedicated hardware based functions to virtualized network functions (VNFs) that can run on standard commodity servers, network function virtualization (NFV) technology promises high efficiency, flexibility and scalability. To NFV service providers, one primary concern is to maximize network throughput and reduce service time. To reach this goal, two main challenges should...
Modern datacenters are increasingly required to deal with latency-sensitive applications. A major question here is how to represent latency in desired objectives. Incorporation of multiple traffic characteristics (e.g., packet values and required processing requirements) significantly increases the complexity of buffer management policies. In this work, we consider weighted throughput optimization...
In addition to providing substantial performance enhancements, future 5G networks will also change the mobile network ecosystem. Building on the network slicing concept, 5G allows to “slice” the network infrastructure into separate logical networks that may be operated independently and targeted at specific services. This opens the market to new players: the infrastructure provider, which is the owner...
The analysis of data encryption algorithm performance is becoming an increasing concern. Since most of the algorithms are involved in other applications such as banking services, e-government and online applications, implementation issues are practical concerns. Many experiments have been proposed to compare these techniques based on several parameters such as encryption time, decryption time and...
In this paper, we investigate optimal resource allocation for multicarrier (MC) multiple-input single-output non-orthogonal multiple access (MISO-NOMA) downlink systems. The resource allocation design for the maximization of the weighted system throughput is formulated as a non-convex optimization problem taking into account the quality-of-service requirements of the downlink receivers. We employ...
A lot of researches exploit the flexibility of Software-Defined Networking (SDN) to conduct traffic engineering in order to improve network performance and enhance robustness to failures. As the upgrade of a traditional network to a full SDN deployment is an incremental process, the coexistence of SDN switches and legacy switches forms a hybrid SDN. Due to the different forwarding characteristics...
Software Defined Network (SDN) is an architectural trend in networking towards the use of the centralized controller to get better performance. However, due to limited resources (especially limited flow table size and controller processing capacity), it may result in low-throughput and long-delay for a set of bursty flows. In this paper, we first combine the flow table size constraint and the controller...
Adaptive contention window algorithms are most commonly used in CSMA/CA to improve the throughput, fairness and reduce the latency and the collision probabilities in today's applications. All the calculations are done with keeping perfect carrier sensing in mind. There is a huge role played by sensing errors like probability of false alarm and probability of miss detection, in the carrier sensing...
Deployment of low power base-stations (referred to as HetNet) within cellular systems can improve system capacity, coverage and enhance users experience. However, the inter-tier and intra-tier interference in such systems can significantly impact overall system performance, which makes interference and spectral resource management more complex. To build, operate HetNet networks, mobile operators have...
We consider the problem of scheduling packets of different lengths via k directed parallel communication links. The links are prone to simultaneous errors --- if an error occurs, all links are affected. Dynamic packet arrivals and errors are modelled by a worst-case adversary. The goal is to optimize competitive throughput of online scheduling algorithms. Two types of failures are considered: jamming,...
Data center energy consumption has become one of the top concerns in designing and operating large-scale data centers as cloud service providers such as Amazon, Google, IBM and Microsoft have begun to establish more data centers in response to growing requests in clouds. In recent years, extensive efforts have been put into the research of reducing the energy consumption of servers. With the improvement...
We study the problem of serving randomly arriving and delay-sensitive traffic over a multi-channel communication system with time-varying channel states and unknown statistics. This problem deviates from the classical exploration-exploitation setting in that the design and analysis must accommodate the dynamics of packet availability and urgency as well as the cost of each channel use at the time...
Backpressure-based adaptive routing algorithms have been studied extensively in the literature. Although backpressure-based adaptive routing algorithms have been shown to be network-wide throughput optimal, they typically have poor delay performance under light or moderate loads because packets may be sent over unnecessarily long routes. Further, backpressure-based algorithms have required every node...
With the spreading of multi-core architectures, operating systems and applications are becoming increasingly more concurrent and their scalability is often limited by the primitives used to synchronize the different hardware threads. In this paper, we address the problem of how to optimize the throughput of a system with multiple producer and consumer threads. Such applications typically synchronize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.