ECN Marking With Micro-Burst Traffic: Problem, Analysis, and Improvement
In data centers, batching schemes in end hosts can introduce micro-burst traffic into the network. The packet dropping caused by micro-bursts usually leads to severe performance degradations. Therefore, much attention has been paid to avoiding buffer ...
Delayed Installation and Expedited Eviction: An Alternative Approach to Reduce Flow Table Occupancy in SDN Switches
Limited flow table size in switches is a major concern for SDN applications. The common approach to overcome this problem is to identify elephant flows and solely focus on them. However, there is no gold standard to assess the effectiveness of such ...
Deploying Chains of Virtual Network Functions: On the Relation Between Link and Server Usage
Recently, network function virtualization has been proposed to transform from network hardware appliances to software middleboxes. Normally, a demand needs to invoke several virtual network functions VNFs following the order determined by the service ...
Minimum Cost SDN Routing With Reconfiguration Frequency Constraints
Software-defined network SDN controllers include mechanisms to globally reconfigure the network in order to respond to a changing environment. As demands arrive or leave the system, the globally optimum flow configuration changes over time. Although the ...
Charging Utility Maximization in Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously
Wireless energy charging has been regarded as a promising technology for prolonging sensor lifetime in wireless rechargeable sensor networks WRSNs. Most existing studies focused on one-to-one charging between a mobile charger and a sensor that suffers ...
A New Backpressure Algorithm for Joint Rate Control and Routing With Vanishing Utility Optimality Gaps and Finite Queue Lengths
The backpressure algorithm has been widely used as a distributed solution to the problem of joint rate control and routing in multi-hop data networks. By controlling an algorithm parameter, the backpressure algorithm can achieve an arbitrarily small ...
Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks
The ultra-dense deployment of small-cell base stations SBSs endowed with cloud-like computing functionalities paves the way for pervasive mobile edge computing, enabling ultra-low latency and location-awareness for a variety of emerging mobile ...
LBP: Robust Rate Adaptation Algorithm for SVC Video Streaming
Video streaming today accounts for up to 55% of mobile traffic. In this paper, we explore streaming videos encoded using scalable video coding SVC scheme over highly variable bandwidth conditions, such as cellular networks. SVC’s unique encoding scheme ...
Root Cause Analysis of Anomalies of Multitier Services in Public Clouds
Anomalies of multitier services of one tenant running in cloud platform can be caused by the tenant’s own components or performance interference from other tenants. If the performance of a multitier service degrades, we need to find out the root causes ...
Hamming Metric Multi-Granularity Locality-Sensitive Bloom Filter
A Bloom filter is a type of space-efficient data structure that supports membership tests in numerous network applications. Recently, emerging applications require an approximate membership test AMT rather than conventional exact-matching membership ...
An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters
In data-parallel computing frameworks, intermediate parallel data is often produced at various stages which needs to be transferred among servers in the datacenter network e.g., the shuffle phase in MapReduce. A stage often cannot start or be completed ...
GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices
Device-to-device communication is widely used for mobile devices and Internet of Things. Authentication and key agreement are critical to build a secure channel between two devices. However, existing approaches often rely on a pre-built fingerprint ...
Noise Tolerant Localization for Sensor Networks
Most range-based localization approaches for wireless sensor networks WSNs rely on accurate and sufficient range measurements, yet noise and data missing are inevitable in distance ranging. Existing localization approaches often suffer from unsatisfied ...
Security Policy Violations in SDN Data Plane
Software-defined networking SDN utilizes a centralized controller to distribute packet processing rules to network switches. However, rules are often generated by the applications developed by different organizations, so they may conflict with each ...
Quality-Aware Pricing for Mobile Crowdsensing
Mobile crowdsensing has been considered as a promising approach for large scale urban data collection, but has also posed new challenging problems, such as incentivization and quality control. Among the other incentivization approaches, posted pricing ...
Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic
To eliminate redundant transfers over WAN links and improve network efficiency, middleboxes have been deployed at ingress/egress. These middleboxes can operate on individual packets and are application layer protocol transparent. They can identify and ...
Hierarchical Model Predictive Traffic Engineering
- Tatsuya Otoshi,
- Yuichi Ohsita,
- Masayuki Murata,
- Yousuke Takahashi,
- Keisuke Ishibashi,
- Kohei Shiomoto,
- Tomoaki Hashimoto
Hierarchical traffic control is a promising approach for improving scalability in the face of network size. In this scheme, multiple controllers are introduced in a network, and these hierarchically decide operations. At the bottom layer, controllers ...
Heavy-Traffic Analysis of QoE Optimality for On-Demand Video Streams Over Fading Channels
This paper proposes online scheduling policies to optimize quality of experience QoE for video-on-demand applications in wireless networks. We consider wireless systems, where an access point transmits video content to clients over fading channels. The ...
Collaborative Learning of Stochastic Bandits Over a Social Network
We consider a collaborative online learning paradigm, wherein a group of agents connected through a social network are engaged in learning a stochastic multi-armed bandit problem. Each time an agent takes an action, the corresponding reward is ...
Efficient CSMA Using Regional Free Energy Approximations
Distributed link scheduling algorithms based on carrier sense multiple access and Gibbs sampling are known to achieve throughput optimality, if certain parameters called the fugacities are appropriately chosen. However, the problem of computing these ...
Learning-Aided Stochastic Network Optimization With State Prediction
We investigate the problem of stochastic network optimization in the presence of state prediction and non-stationarity. Based on a novel state prediction model featured with a distribution-accuracy curve, we develop the predictive learning-aided control ...
Constant IP Lookup With FIB Explosion
With the fast development of Internet, the forwarding tables in backbone routers have been growing fast in size. An ideal IP lookup algorithm should achieve constant, yet small, IP lookup time, and on-chip memory usage. However, no prior IP lookup ...
Joint Optimization of Flow Table and Group Table for Default Paths in SDNs
Software-defined networking SDN separates the control plane from the data plane to ease network management and provide flexibility in packet routing. The control plane interacts with the data plane through an interface that configures the forwarding ...
Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network
Internet Service Providers are challenged by increasing traffic demands. Advanced Traffic Engineering TE is one way to overcome this challenge. Segment Routing SR is a relatively new approach for TE. To decide whether SR is a good approach for ...
Wireless Charger Placement for Directional Charging
Wireless power transfer technology has witnessed huge development because of its convenience and reliability. This paper concerns the fundamental issue of wireless charger PLacement with Optimized charging uTility PLOT, i.e., given a fixed number of ...
Multi-Armed Bandit in Action: Optimizing Performance in Dynamic Hybrid Networks
Today’s home networks are often composed of several technologies such as Wi-Fi or power-line communication PLC. Yet, current network protocols rarely fully harness this diversity and use each technology for a specific, pre-defined role, for example, ...
Low-Power Wide-Area Network Over White Spaces
As a key technology driving the Internet-of-Things, low-power wide-area networks LPWANs are evolving to overcome the range limits and scalability challenges in traditional wireless sensor networks. This paper proposes a new LPWAN architecture called ...
A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classification
The advent of software-defined networking SDN leads to two key challenges for packet classification on the dramatically increased dynamism and dimensionality. Although packet classification is a well-studied problem, no existing solution satisfies these ...
Video Streaming in Distributed Erasure-Coded Storage Systems: Stall Duration Analysis
The demand for global video has been burgeoning across industries. With the expansion and improvement of video-streaming services, cloud-based video is evolving into a necessary feature of any successful business for reaching internal and external ...
Probability Prediction-Based Reliable and Efficient Opportunistic Routing Algorithm for VANETs
In the vehicular ad hoc networks VANETs, due to the high mobility of vehicles, the network parameters change frequently and the information that the sender maintains may outdate when it wants to transmit data packet to the receiver, so for improving the ...
Subjects
Currently Not Available