Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 16 Nov 2024Bibliometrics
research-article
ECN Marking With Micro-Burst Traffic: Problem, Analysis, and Improvement

In data centers, batching schemes in end hosts can introduce micro-burst traffic into the network. The packet dropping caused by micro-bursts usually leads to severe performance degradations. Therefore, much attention has been paid to avoiding buffer ...

research-article
Delayed Installation and Expedited Eviction: An Alternative Approach to Reduce Flow Table Occupancy in SDN Switches

Limited flow table size in switches is a major concern for SDN applications. The common approach to overcome this problem is to identify elephant flows and solely focus on them. However, there is no gold standard to assess the effectiveness of such ...

research-article
Deploying Chains of Virtual Network Functions: On the Relation Between Link and Server Usage

Recently, network function virtualization has been proposed to transform from network hardware appliances to software middleboxes. Normally, a demand needs to invoke several virtual network functions VNFs following the order determined by the service ...

research-article
Minimum Cost SDN Routing With Reconfiguration Frequency Constraints

Software-defined network SDN controllers include mechanisms to globally reconfigure the network in order to respond to a changing environment. As demands arrive or leave the system, the globally optimum flow configuration changes over time. Although the ...

research-article
Charging Utility Maximization in Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously

Wireless energy charging has been regarded as a promising technology for prolonging sensor lifetime in wireless rechargeable sensor networks WRSNs. Most existing studies focused on one-to-one charging between a mobile charger and a sensor that suffers ...

research-article
A New Backpressure Algorithm for Joint Rate Control and Routing With Vanishing Utility Optimality Gaps and Finite Queue Lengths

The backpressure algorithm has been widely used as a distributed solution to the problem of joint rate control and routing in multi-hop data networks. By controlling an algorithm parameter, the backpressure algorithm can achieve an arbitrarily small ...

research-article
Computation Peer Offloading for Energy-Constrained Mobile Edge Computing in Small-Cell Networks

The ultra-dense deployment of small-cell base stations SBSs endowed with cloud-like computing functionalities paves the way for pervasive mobile edge computing, enabling ultra-low latency and location-awareness for a variety of emerging mobile ...

research-article
LBP: Robust Rate Adaptation Algorithm for SVC Video Streaming

Video streaming today accounts for up to 55% of mobile traffic. In this paper, we explore streaming videos encoded using scalable video coding SVC scheme over highly variable bandwidth conditions, such as cellular networks. SVC’s unique encoding scheme ...

research-article
Root Cause Analysis of Anomalies of Multitier Services in Public Clouds

Anomalies of multitier services of one tenant running in cloud platform can be caused by the tenant’s own components or performance interference from other tenants. If the performance of a multitier service degrades, we need to find out the root causes ...

research-article
Hamming Metric Multi-Granularity Locality-Sensitive Bloom Filter

A Bloom filter is a type of space-efficient data structure that supports membership tests in numerous network applications. Recently, emerging applications require an approximate membership test AMT rather than conventional exact-matching membership ...

research-article
An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters

In data-parallel computing frameworks, intermediate parallel data is often produced at various stages which needs to be transferred among servers in the datacenter network e.g., the shuffle phase in MapReduce. A stage often cannot start or be completed ...

research-article
GeneWave: Fast Authentication and Key Agreement on Commodity Mobile Devices

Device-to-device communication is widely used for mobile devices and Internet of Things. Authentication and key agreement are critical to build a secure channel between two devices. However, existing approaches often rely on a pre-built fingerprint ...

research-article
Noise Tolerant Localization for Sensor Networks

Most range-based localization approaches for wireless sensor networks WSNs rely on accurate and sufficient range measurements, yet noise and data missing are inevitable in distance ranging. Existing localization approaches often suffer from unsatisfied ...

research-article
Security Policy Violations in SDN Data Plane

Software-defined networking SDN utilizes a centralized controller to distribute packet processing rules to network switches. However, rules are often generated by the applications developed by different organizations, so they may conflict with each ...

research-article
Quality-Aware Pricing for Mobile Crowdsensing

Mobile crowdsensing has been considered as a promising approach for large scale urban data collection, but has also posed new challenging problems, such as incentivization and quality control. Among the other incentivization approaches, posted pricing ...

research-article
Middlebox-Based Packet-Level Redundancy Elimination Over Encrypted Network Traffic

To eliminate redundant transfers over WAN links and improve network efficiency, middleboxes have been deployed at ingress/egress. These middleboxes can operate on individual packets and are application layer protocol transparent. They can identify and ...

research-article
Hierarchical Model Predictive Traffic Engineering

Hierarchical traffic control is a promising approach for improving scalability in the face of network size. In this scheme, multiple controllers are introduced in a network, and these hierarchically decide operations. At the bottom layer, controllers ...

research-article
Heavy-Traffic Analysis of QoE Optimality for On-Demand Video Streams Over Fading Channels

This paper proposes online scheduling policies to optimize quality of experience QoE for video-on-demand applications in wireless networks. We consider wireless systems, where an access point transmits video content to clients over fading channels. The ...

research-article
Collaborative Learning of Stochastic Bandits Over a Social Network

We consider a collaborative online learning paradigm, wherein a group of agents connected through a social network are engaged in learning a stochastic multi-armed bandit problem. Each time an agent takes an action, the corresponding reward is ...

research-article
Efficient CSMA Using Regional Free Energy Approximations

Distributed link scheduling algorithms based on carrier sense multiple access and Gibbs sampling are known to achieve throughput optimality, if certain parameters called the fugacities are appropriately chosen. However, the problem of computing these ...

research-article
Learning-Aided Stochastic Network Optimization With State Prediction

We investigate the problem of stochastic network optimization in the presence of state prediction and non-stationarity. Based on a novel state prediction model featured with a distribution-accuracy curve, we develop the predictive learning-aided control ...

research-article
Constant IP Lookup With FIB Explosion

With the fast development of Internet, the forwarding tables in backbone routers have been growing fast in size. An ideal IP lookup algorithm should achieve constant, yet small, IP lookup time, and on-chip memory usage. However, no prior IP lookup ...

research-article
Joint Optimization of Flow Table and Group Table for Default Paths in SDNs

Software-defined networking SDN separates the control plane from the data plane to ease network management and provide flexibility in packet routing. The control plane interacts with the data plane through an interface that configures the forwarding ...

research-article
Traffic Engineering Using Segment Routing and Considering Requirements of a Carrier IP Network

Internet Service Providers are challenged by increasing traffic demands. Advanced Traffic Engineering TE is one way to overcome this challenge. Segment Routing SR is a relatively new approach for TE. To decide whether SR is a good approach for ...

research-article
Wireless Charger Placement for Directional Charging

Wireless power transfer technology has witnessed huge development because of its convenience and reliability. This paper concerns the fundamental issue of wireless charger PLacement with Optimized charging uTility PLOT, i.e., given a fixed number of ...

research-article
Multi-Armed Bandit in Action: Optimizing Performance in Dynamic Hybrid Networks

Today’s home networks are often composed of several technologies such as Wi-Fi or power-line communication PLC. Yet, current network protocols rarely fully harness this diversity and use each technology for a specific, pre-defined role, for example, ...

research-article
Low-Power Wide-Area Network Over White Spaces

As a key technology driving the Internet-of-Things, low-power wide-area networks LPWANs are evolving to overcome the range limits and scalability challenges in traditional wireless sensor networks. This paper proposes a new LPWAN architecture called ...

research-article
A Sorted-Partitioning Approach to Fast and Scalable Dynamic Packet Classification

The advent of software-defined networking SDN leads to two key challenges for packet classification on the dramatically increased dynamism and dimensionality. Although packet classification is a well-studied problem, no existing solution satisfies these ...

research-article
Video Streaming in Distributed Erasure-Coded Storage Systems: Stall Duration Analysis

The demand for global video has been burgeoning across industries. With the expansion and improvement of video-streaming services, cloud-based video is evolving into a necessary feature of any successful business for reaching internal and external ...

research-article
Probability Prediction-Based Reliable and Efficient Opportunistic Routing Algorithm for VANETs

In the vehicular ad hoc networks VANETs, due to the high mobility of vehicles, the network parameters change frequently and the information that the sender maintains may outdate when it wants to transmit data packet to the receiver, so for improving the ...

Subjects

Currently Not Available

Comments

Please enable JavaScript to view thecomments powered by Disqus.