Link dimensioning of hybrid FSO/fiber networks resilient to adverse weather conditions
The presented paper deals with wireless networks composed of FSO (free space optics) links supported by terrestrial optical fiber connections in order to increase resilience to adverse weather conditions. An FSO link realizes, at low ...
Guiltiness: A practical approach for quantifying virtual network functions performance
- Ricardo José Pfitscher,
- Arthur Selle Jacobs,
- Luciano Zembruzki,
- Ricardo Luis dos Santos,
- Eder John Scheid,
- Muriel Figueredo Franco,
- Alberto Schaeffer-Filho,
- Lisandro Zambenedetti Granville
In Network Functions Virtualization (NFV), service providers create customized network services by chaining Virtual Network Functions (VNFs) in forwarding graphs, according to individual client demands. Despite the flexibility promoted ...
Network selection and data dissemination in heterogeneous software-defined vehicular network
Vehicular Ad Hoc Network (VANET) is a promising network that is anticipated to be, adaptable, cost-effective, and able to provide safety, infotainment, and related services on the road via inter-vehicle or vehicle-to-roadside unit ...
Secure Multi-Cloud Network Virtualization
Existing network virtualization systems share a few characteristics, namely they target one data center of a single operator and only offer traditional networking services. As such, their support for critical applications that need to ...
Macro diversity for mmWave cellular communications in indoor environment
For the ITU-R defined enhanced mobile broadband (eMBB) type of generic services, 5G systems will deploy mmWave communications in indoor environments and open area scenarios in outdoor environment. Besides very high path-losses and ...
A lightweight policy enforcement system for resource protection and management in the SDN-based cloud
SDN-based cloud adopts Software-defined Networking (SDN) to provide network services to the cloud, which allows more flexibility in network management. Meanwhile, the SDN controller provides users and administrators with various APIs ...
Energy efficient resource allocation based on relay selection and subcarrier pairing with channel uncertainty in cognitive radio network
More and more mobile devices join in the wireless networks, it has become a challenging problem how to mitigating the interferences and improving the energy efficiency in dynamic wireless communication environment. In this paper, a ...
DODS: A Distributed Outlier Detection Scheme for Wireless Sensor Networks
In many wireless sensor network (WSN) applications, where a plethora of nodes are deployed to sense physical phenomena, erroneous measurements could be generated mainly due to the presence of harsh environments and/or to the depletion ...
Reinforcement learning-based cell selection in sparse mobile crowdsensing
Sparse Mobile Crowdsensing (MCS) is a novel MCS paradigm which allows us to use the mobile devices to collect sensing data from only a small subset of cells (sub-areas) in the target sensing area while intelligently inferring the data ...
A survey on resource scheduling for data transfers in inter-datacenter WANs
Today, datacenter providers spend a lot of money on inter-datacenter WANs to transmit traffic flows between geographically distributed datacenter sites. It is very important for datacenter providers to design resource scheduling ...
A Q-learning algorithm for task scheduling based on improved SVM in wireless sensor networks
Application performance and energy consumption deep exposed to task scheduling of nodes in wireless sensor networks (WSNs). Unreasonable task scheduling of nodes leads to excessive network energy consumption. Thus, a Q-learning ...
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control
The packet delivery ratio and energy consumption serve as important performance metrics for delay tolerant mobile ad hoc networks (MANETs), where there are not continuous end-to-end paths between mobile nodes. Available these ...
BCDN: A proof of concept model for blockchain-aided CDN orchestration and routing
As the conventional definition, the Content Delivery Networks (CDN) build surrogate servers on top of the Internet architecture to provide contents to the end users as fast as possible. However, the high client requests lead to ...
Reactive 3D deployment of a flying robotic network for surveillance of mobile targets
The paper considers deploying a flying robotic network to monitor mobile targets in an area of interest for a specific time period. Each flying robot carries a battery with limited initial energy and a camera with a fixed visible ...
Adaptive bearer split control for 5G multi-RAT scenarios with dual connectivity
- Roberto P. Antonioli,
- Emanuel B. Rodrigues,
- Diego A. Sousa,
- Igor M. Guerreiro,
- Carlos F.M. e Silva,
- Francisco R.P. Cavalcanti
The Dual Connectivity (DC) technology has gained a lot of momentum as an underlying fundamental concept for the deployment of multi-Radio Access Technology (RAT) 5G mobile networks based on the tight interworking between the Long Term ...
Outlier detection in IP traffic modelled as a link stream using the stability of degree distributions over time
This paper aims at precisely detecting and identifying anomalous events in IP traffic. To this end, we adopt the link stream formalism which properly captures temporal and structural features of the data. Within this framework, we ...
A robust authentication scheme with dynamic password for wireless body area networks
- This paper is the first to adopt custom password computation algorithm and dynamic password for WBANs.
With the development of wireless technologies, wireless body area networks (WBANs) are widely used in various applications. WBANs bring convenience to both patients and physicians by permitting patients to enjoy high-quality medical ...
Future directions of networked control systems: A combination of cloud control and fog control approach
Currently, we have witnessed that networked control technology has played a key role in Internet of Things (IoT). However, the volume, variety and velocity properties of big data from IoT make the traditional networked control systems (...
VNE-TD: A virtual network embedding algorithm based on temporal-difference learning
Recently, network virtualization is considered as a promising solution for the future Internet which can help to overcome the resistance of the current Internet to fundamental changes. The problem of embedding Virtual Networks (VN) in ...
ACST: Audit-based compromised switch tolerance for enhancing data plane robustness in software-defined networking
Software-defined networking has stimulated the worldwide interests in both academia and industry for its proven advantages. However, switches in data plane are more vulnerable due to malicious attacks. Consequently, the network may ...
Multi-sink distributed power control algorithm for Cyber-physical-systems in coal mine tunnels
A coal mine tunnel usually has a long-strip shape. Traditional single-sink cyber-physical-systems (CPS) cannot ensure that sensor nodes far from the entrance of a coal mine tunnel promptly and accurately transmit abnormal data from ...