The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We obtain the minimum bandwidth required to meet an outage constraint in a multi-tier heterogeneous network assuming “maximum (biased) average received signal power” as the tier association metric. To do so, we model user and access point (AP) locations as Poisson point processes, and obtain the moment generating function (MGF) of the required spectrum; this analysis, in turn, is based on the cumulative...
Since increasing demand for high bit-depth video places large demands upon resources, such as communication bandwidth as well as memory and storage capacity, research into improving the compression ratio (CR) for these videos is critically important. Most conventional video encoders are not amenable to high bit-depth format, so this paper presents novel preprocessing methods designed to improve CR...
The general method available for comparison between the Distributed Hash Table (DHT) based structured overlay networks are average latency per successful lookup and percentage of successful lookups. For a DHT based lookup service with lookup retries for failed lookups, both average latency per successful lookup as well as percentage of successful lookups are key to evaluate the performance. Although,...
As new congestion control mechanisms are developed, their performance relative to existing mechanisms needs to be understood, in particular over wireless networks. This study aimed to evaluate existing TCP congestion control mechanisms using a comprehensive and reproducible methodology designed to be representative of real world usage of wireless networks. The study sought to investigate whether any...
With each technology improvement, parallel systems get larger, and the impact of interconnection networks becomes more prominent. Random topologies and their variants received more and more attention lately due to their low diameter, low average shortest path length and high scalability. However, existing supercomputers still prefer torus and fat-tree topologies, because a number of existing parallel...
With each technology improvement, parallel systems get larger, and the impact of interconnection networks becomes more prominent. Random topologies and their variants received more and more attention lately due to their low diameter, low average shortest path length and high scalability. However, existing supercomputers still prefer torus and fat-tree topologies, because a number of existing parallel...
Due to lack of sufficient compute threads in memory-intensive applications, GPUs often exhaust all the active warps and therefore, the memory latencies get exposed and appear in the critical path. In such a scenario, the shared on-chip and off-chip memory bandwidth appear more performance critical to cores with few or no active warps, in contrast to cores with sufficient active warps. In this work,...
Cloud storage has gained increasing popularity in the past few years. In cloud storage, data is stored in the service provider's data centers, and users access data via the network. For such a new storage model, our prior wisdom about conventional storage may not remain valid nor applicable to the emerging cloud storage. In this paper, we present a comprehensive study and attempt to gain insight into...
Today, communication systems face major shortages in availability of free spectrum. Cognitive radio has evolved as the most feasible technology which can empower us to effectively utilize the available spectrum. A vital component of a Cognitive Radio Network is spectrum sensing, i.e. its ability to detect the presence of a primary user. This paper employs an adaptive threshold detection algorithm...
We present a new analysis of multi-hop network security in the form of a zero-sum game played between an attacker who tries to disrupt a network by disabling one or more nodes, and the nodes of the network who must allocate limited resources in defense of the network. The payoffs in the zero-sum game can be one of several performance metrics that correspond to node centrality measures. In the case...
In order to support orders of traffic explosion with sustainable energy consumption, besides conventional Spectrum Efficiency (SE), Energy Efficiency (EE) is proposed as another critical metric for the next generation mobile networks (5G). This paper proposes to evaluate the potential EE gain of 5G on the basis of EARTH Energy Efficiency Evaluation Framework (E3F). As E3F indicated, the large-scale...
After several years of research towards sophisticated QoS measurement tools and methods, the results given to endusers by most commonly used on-line speed measurement tools are still far from being precise. In order to define a reliable Internet speed measurement methodology for endusers, the impact that the static and dynamic constraints of network nodes and TCP/IP implementations could impose must...
Recent advancements in the architecture of Graphic Processing Unit (GPU), enables the acceleration of many general purpose applications. Even with high memory bandwidth, GPUs are still faced with the challenge of accelerating highly memory intensive applications. To overcome this challenge this paper investigates the impact of scaling up of the memory partitions and also scaling of frequency of the...
Live virtual machine migration has become a core system management tool to achieve load balancing and power saving among different servers. The recent studies mainly focus on the performance improvement for live VM migration. However, there has been little attention on the migration's impact on VMs co-located both source and destination servers during the migration. The impact, which is mainly caused...
Broadband network performance is multi-faceted: it varies by ISP, by content source, by household connection, and by time-of-day. Daily or monthly averages, as published by content providers such as Netflix and Google, do not convey the full picture. In this paper we leverage M-Lab, the world's largest open measurement platform, to characterize broadband performance across Australian households. Our...
The recently proposed concept of Elastic Optical Networks (EON) is expected to largely improve optical network resource utilization due to the possibility to divide the optical spectrum into relatively narrow segments called slices. In turn, the increasing position of numerous IT solutions in the modern world as well as the growth of network traffic trigger the need to develop robust and cost-efficient...
Secrecy capacity is the widely-used metric to evaluate the capability of wireless channels in delivering messages with the assurance of perfect security as well as reliability. However, with the proliferation and diversification of wireless services, there have been urgent needs in fine-grained and decoupled security metrics towards future mobile communications. In this paper, we propose a statistical...
Live virtual machine migration has become a core system management tool to achieve load balancing and power saving among different servers. The recent studies mainly focus on the performance improvement for live VM migration. However, there has been little attention on the migration's impact on VMs co-located both source and destination servers during the migration. The impact, which is mainly caused...
Bandwidth allocation in spectrum-congested wire- less content delivery networks should be performed based on the user's Quality of Experience (QoE). The relationship between QoE and network QoS is context- and user-dependent. We show that modeling the user's QoE introduces additional complexity to the bandwidth allocation problem. While recent research has proposed various ways in which complexity...
Users who retrieve information across disadvantaged networks need to do so in such a way as to minimize network performance impact while maximizing the usefulness and quality of information (QOI) received. Taking advantage of features from all three network genres (telecommunication, information, and social) will enable this balancing act. These users also need to interact using unstructured, ad-hoc...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.