The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a model for mobile caching in which the rate of requests for content is dependent on the popularity and the freshness of the information. We model popularity based on the history of requests and freshness based on the age of the content. We consider a discrete time (slotted) system in which new packets arrive at a limited capacity cache at discrete times. We prove that the optimal policy...
The paper describes an extension, at the approximation level, of shunt-peaking technique to increase the filter/amplifier bandwidth. The frequency dependent square modulus of transfer function is multiplied by a polynomial of squared frequency. Using a standard procedure of restoration one finds the new transfer function which is the result of multiplication of initial transfer function by the zeros...
A 300MS/s 12b SAR ADC achieving 61.6dB peak SNDR is presented. It reaches 60.5dB SNDR and 78.7dB SFDR with 0.8Vpp,diff input amplitude at Nyquist. The key elements are a comparator with inverter-based preamplifier and a SAR-based common-mode regulation. The regulation adjusts the common mode on a sample-by-sample basis to improve common-mode rejection. The ADC consumes 7.0mW from a single 0.85V supply,...
This paper presents a technique for detection of selected targets in the context of ultrawideband noise radar. The technique applies to scenarios where targets can be modeled as having a few predominant scatterers, such as some made man-made targets. The basic idea is to change the signal used as reference for detection in such a way that it is adapted to the predominant scatterers of the targets...
Software-defined networking (SDN) is a promising future network architecture which introduces new dimensionsin flexibility and adaptability to cope with different Quality of service (QoS) metrics, such as latency constraint, loss rate, etc. In this paper, we provide differentiated Services for flows of a topic-oriented publish/subscribe system to address some of the QoS guarantee issues, by leveraging...
This paper presents a supply noise insensitive digital phase-locked loop (PLL) using a wide bandwidth noise suppression loop (NSL). Unlike previous techniques using regulation or calibration on the voltage-controlled oscillator (VCO) that lead to voltage headroom reduction, the proposed approach employs a wide bandwidth feedback loop around the oscillator, which suppresses supply noise without any...
Conventional dynamic element matching limits the continuous time ΣΔ ADC architecture at high speeds. This work introduces a Time-Interleaved Reference Data-Weighted-Averaging (TI-RDWA) architecture that breaks the speed limitation of the traditional DEM decoder. Time-interleaving eliminates the reference voltage settling bottleneck, enabling DWA operation at 5 GHz, while still achieving the benefits...
Signal coordination is one of the most widely employed strategies to efficiently operate signal plans in a network. The impact on a network varies depending on signal plans as well as the spatial shape of coordination groups. Improper coordination groups may worsen the traffic flow and level of service Finding ideal decomposition points of an arterial is critical in a system-wide perspective. This...
In this work, we introduce a powerful hardware-based rogue access point (PrAP), which can relay traffic between a legitimate AP and a wireless station back and forth, and act as a man-in-the-middle attacker. Our PrAP is built of two dedicated wireless routers interconnected physically, and can relay traffic rapidly between a station and a legitimate AP. Through extensive experiments, we demonstrate...
In modern data centers, many flow-based and task-based schemes have been proposed to speed up the data transmission in order to provide fast, reliable services for millions of users. However, existing flow-based schemes treat all flows in isolation, contributing less to or even hurting user experience due to the stalled flows. Other prevalent task-based approaches, such as centralized and decentralized...
Owing to Ethernet's low cost, high bandwidth and architecture openness, much attention has been paid to develop converged Ethernet to support both time-critical services and conventional communication services on a unified network infrastructure. The greatest challenge here is providing low and deterministic latency for time-critical packets. Recently, the IEEE time sensitive networking task group...
The various flows in production datacenters usually can be classified into two types: bandwidth-hungry and delay-sensitive. To improve their performance, datacenter networks require effective load balancing and flow control protocols, respectively. However, as the two techniques are typically employed separately in current datacenters, they are unable to optimize the network in a coordinated way....
Many video streaming services employ the dynamic adaptive streaming over HTTP (DASH) technique to achieve better user's QoE. Named-data Networking (NDN) can bring many benefits to the video distribution with in-network cache and stateful forwarding. However, simply applying DASH technique to NDN causes problems. First, in-network cache may affect download time which makes bitrate adaptation a difficult...
To speed up the recovery from network failures, an extensive list of methods have been proposed. Many failure-recovery methods are proposed based on tunneling or marking, which increase the packet processing burden on routers and consume extra bandwidth. With neither tunneling nor marking, existing methods guarantee recovery from any single-link failure if a detour for the failed link exists, but...
the widespread availability of high-speed broadband Internet access brings online-enabled revenue model to gaming industry. However, Today’s Internet does not guarantee a quality level beyond best effort for the majority of applications used by home users. As a consequence, data flows transferred over the Internet can experience bandwidth constraints. At homes, this bandwidth constraint becomes more...
Upload and download traffic often coexist in mobile networks. However, TCP download throughput could be substantially degraded by upload traffic even if the downlink is not the bottleneck. Previous works such as RSFC and TCP-RRE can substantially improve TCP download throughput in the presence of concurrent TCP upload flows, albeit at the expense of significantly degraded upload throughput performance...
5G New Radio (NR) is envisioned to support three broad categories of services: evolved mobile broadband (eMBB), ultra-reliable and low-latency communications (URLLC), and massive machine-type communications (mMTC). The URLLC services refer to future applications that require secure data communications from one end to another with ultra-high reliability and deadline-based low latency requirements....
Due to the widespread use of broadband communication media, it is often the case that the conventional TCP cannot fully utilize such broad bandwidth; hence, many improvements on TCP itself and a lot of accelerating methods which use multiple TCP flows have been proposed. In addition, video hosting services on the Internet as a new medium have become popular, and progressive downloading methods, which...
A two-path time-interleaved third-order ΣΔ modulator is presented. A domino-free solution moves a part of the required processing in the second path from the digital domain to the analog domain and relaxes the timing constraints of the second path ADC. Simulation results, achieved in a 65 nm CMOS technology, show that it is possible to achieve 90-dB SNR with a −6 dBFS input signal, a 4-bit quantizer,...
A network latency emulator allows IT architects to thoroughly investigate how network latencies impact workload performance. Software-based emulation tools have been widely used by researchers and engineers. It is possible to use commodity server computers for emulation and set up an emulation environment quickly without outstanding hardware cost. However, existing software-based tools built in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.