The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
The interest in mmWave communications has risen sharply in the last years motivated by their widespread consideration as a technological solution capable of dealing with the stringent rate requirements currently demanded by wireless networks. This momentum gained by mmWave bands springs several technical challenges regarding the allocation of radio resources particularly complex in V2V communications,...
The fourth generation of mobile networks (4G) must overcome the new challenges that have emerged with the explosive growth in demand for mobile traffic and the Internet of Things. Therefore, the OMNs (Operator Mobile Networks) should plan for upgrading 4G to 5G mobile network beyond 2020, which is the expected year for launching 5G. A techno-economic analysis and mathematic modeling approach was considered...
Non-orthogonal multiple access (NOMA) has been considered as one of the key technologies to enhance spectral efficiency and the total throughput for the fifth generation (5G) systems. NOMA can be combined with coordinated multi-point (CoMP) transmission to improve the performance of cell edge users. For a network to benefit from CoMP, its utilisation of resources should be scheduled efficiently. This...
The cellular technology is mostly an urban technology that has been unable to serve rural areas well. This is because the traditional cellular models are not economical for areas with low user density and lesser revenues. In 5G cellular networks, the coverage dilemma is likely to remain the same, thus widening the rural-urban digital divide further. It is about time to identify the root cause that...
Due to recent developments in cloud computing and constantly increasing demand for high bitrate content, both overlay networks and multicasting providing new data-sensitive applications and services have been gaining more and more attention in the last years. In this paper, we assume that the overlay network is deployed to provide multicasting of so-called Deadline-Driven Requests (DDRs), that require...
Cloud computing is an on-demand access model for computing resources most notably embodied by the OpenStack project. As of release Liberty, OpenStack supports provisioning Bare-metal, Virtual machine (VM) and container based hosts. These different hosts incur different overheads. Consequently, the main goal of this paper is to empirically quantify that overhead through a series of experiments. The...
Cloud computing and, in particular, cloud storage, has successfully boosted a variety of applications, in several domains; with proven acceptance and benefits by end users. While peculiar features of the cloud, e.g., redundancy, scalability and accessibility, are still highly desirable, several new scenarios are nowadays emerging, which call for additional features and/or different interpretations...
The infrastructure that supports the digital world is adopting network and system virtualization to raise its reliability and flexibility. However, the allocation of such virtual resources is still performed by human administrators, which limits the agility of such systems to respond to events and new requirements. In this paper we propose an architecture that exploits the capabilities offered by...
Contemporary radio access networks, are commonly utilizing static configuration and deployment, and are inefficient in handling any spatio-temporal fluctuations of the traffic demand. Cloud RAN represents a novel centralized technology based on virtualization technology that can efficiently addresses the problems of legacy networks. Cloud RAN facilitates high data rates and high network and PHY layer...
This paper presents an analytical model to study the performance of cloud applications using message queueing as a service (MaaS). MaaS is a cloud service which allows the development departments to focus on delivering business and computing applications without being concerned with the underlying message queueing infrastructure to be scalable, secure, and reliable. Estimating the service delay (prior...
Scalability is an important requirement in the development and the operation of applications in a cloud environment. To handling heavy concurrency in the input load, many design-related and operational factors should be considered. The microservice architecture patterns provide better means to increase the scalability than traditional software architecture patterns. However, certain aspects of applications...
Machine Learning and Big Data Analysis are seen as the silver bullet to detect and counteract attacks on critical communication infrastructure. Every message is analysed and is to some degree under suspicion. The principle of innocent until proven guilty does not seem to apply to modern communication usage. On the other hand, criminals would gain easily upper hand in communication networks that are...
Network Functions Virtualization (NFV) helps in reducing the dependency on hardware equipments by virtualizing the telecommunication network functions. While the current works have considered different frameworks for NFV and various challenges associated with it, only a few have considered trust as an aspect of NFV. In this paper, we discuss the challenges of incorporating trust in NFV. We discuss...
This paper focuses on placement and chaining of virtualized network functions (VNFs) in Network Function Virtualization Infrastructures (NFVI) for emerging software networks serving multiple tenants. Tenants can request network services to the NFVI in the form of service function chains (in the IETF SFC sense) or VNF Forwarding Graphs (VNF-FG in the case of ETSI) in support of their applications and...
Inspired by significant progress in cloud computing technology, a range of applications are increasingly being offered to customers based on cloud servers. In this paper, we design a moving object detection system that enables clients to forward video captured on mobile devices to a server in the cloud. Within the cloud, the video begins to be processed with the moving object in the video detected...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.