The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Live video contents in crowdsourced live streaming services are transcoded into multiple quality versions to better service viewers with different network and device configurations. Cloud computing becomes a natural choice to handle this transcoding service due to its elasticity and significant computational power. However, given the huge concurrent channel numbers in this crowdsourced live streaming...
Ever-increasing research effort has been dedicated to multi-group radio frequency identification (RFID) systems where all tags are partitioned into multiple groups, such as group-level queries, and multi-group missing tag detection. However, it is assumed in the existing work that all tags know their individual group IDs, which thus leaves group labeling problem unaddressed. To tackle the under-investigated...
Recent years have witnessed a growing popularity of file synchronization systems. In this paper, we take a first step towards the understandings of a new Peer-to-Peer file synchronization system, Resilio Sync. Our real-world measurement identifies its unique features and reveals its potential fairness issues
During the past decade, we have witnessed the pervasive penetration of mobile smart devices such as smartphones, tablets, and wearable devices, which significantly enrich Internet applications and improve user experience. In the foreseeable future, mobile smart devices are predicted to take up over 50% of global devices/connections and surpass 4/5 of mobile data traffic by 2021 [1]. Such mobile smart...
In this paper, we study a resource granularity effect on the optimal resource assignment of MME and S/P-GW in a single vEPC server. We distinguished communications of M2M devices and smartphones and modeled the vEPC server by using queueing theory. Numerical analysis under a fixed number of hardware resources of MME and S/P-GW is done for various resource granularities of the vEPC server. The evaluation...
There has been explosive growth in Mobile Personal Livestreaming (MPL) market since 2016. MPL services are booming not only because they introduce the popular live content by spontaneous and personalized broadcasters, but also because they are deliberately designed to be the innovative social networking service (SNS) platforms. The latter is a very important aspect that distinguishes MPL from the...
Cloud computing represents a disruptive innovation in the way of provisioning and managing IT and network resources. One of the main challenge of this paradigm is the monitoring of the actual services performance offered by different Cloud service providers. For this reason, service level management plays a central role to ensure the quality of services in Public Cloud and requires a structured approach...
NFV together with SDN promises to provide more flexible and efficient service provision methods by decoupling the network functions (NFs) from the physical network topology and devices, but requires the real-time and automatic composition and verification for service function chain (SFC). However, most of SFCs today are still typically built through manual configuration processes, which are slow and...
Recently, as the development of content-centric networking and Telco-CDNs, inter-domain cache sharing has attracted increased attention. With inter-domain cache sharing, ISPs can further reduce transit cost and improve the quality-of-service (QoS) by accessing their neighbors' caching devices. Currently, cache sharing is limited to free-peering ISPs. Enabling eyeball ISPs to share caches with their...
Providing the new power system with well-tailored communication architecture is a key factor to guarantee expected smart grid capabilities. Among many requirements, quality of service awareness is a relevant feature for the smart grid communication system. Indeed, various data flows are to be exchanged in order to ensure smart grid services, having each different resilience, bandwidth and latency...
Mobile devices are ubiquitous but their resources are limited. However, they must be capable to run computationally intensive software, for example for image stitching, face recognition, and simulation-based artificial intelligence. As a solution, mobile devices can use nearby resources to offload computation. Distributed computing environments provide such features but ignore the nature of mobile...
The recent deployment of novel network concepts, such as M2M communication or IoT, has undoubtedly stimulated the placement of a new set of services, leveraging both centralized resources in Cloud Data Centers and distributed resources shared by devices at the edge of the network. Moreover, Fog Computing has been recently proposed having as one of its main assets the reduction of service response...
The topology of data centers changes dynamically due to link malpositions, hardware failures or software crushes. However, many topology enabled protocols or applications must know the current topology of data center precisely, which triggers the topology calibration problem. Topology calibration needs to deduce the different nodes and links between two given topologies effectively. Based on the existing...
Network Function Virtualization has attracted attention from both academia and industry as it can help the service provider to obtain agility and flexibility in network service deployment. In general, the enterprises require their flows to pass through a specific sequence of virtual network function (VNF) that varies from service to service. In addition, for each VNF required in the coming service...
The promises of SDN and NFV technologies to boost innovation and to reduce the time-to-market of new services is changing the way in which residential networks will be deployed, managed and maintained in the near future. New user-centric management models for residential networks combining SDN-based residential gateways and cloud technologies have already been proposed, providing flexibility and ease...
In multi-tenant shared clouds, applications of different tenants compete for the shared network and thus suffer significant unpredictability of performance. The progress is an essential metric to measure the overall data transfer rate of a tenant and to indicate how fast a tenant can complete data transfer. Most previous work of network allocation or schedule focus on achieving the tradeoff among...
Matching multiple patterns is the key technology in firewall, Intrusion Detection Systems, etc. However, most of the web services nowadays tend to compress their traffic for less transferring data and better user experience, which has challenged the multi-pattern matching original working only on raw content. Naive and straightforward solutions towards this challenge either decompress the compressed...
Traffic statistics are fundamental for many network measurement tasks like heavy hitter identification, traffic matrix estimator, anomaly detection, etc. However, traditional techniques like NetFlow and sFlow only provide coarse-grained statistics due to packet or flow sampling. Even Software Defined Networking (SDN) offers fine-grained traffic statistics collection, most of existing methods focus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.