The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet of vehicles (IoVs) emerges as a promising technology to facilitate vehicular wireless communication by approving vehicle-to-everything (V2X) services for intelligent transportation systems including vehicle-to-vehicle (V2V), vehicle-to-infrastructure (V2I) and vehicle-to-pedestrian (V2P) services. V2V networks have been rapidly developed to support short distance data transmission among vehicles...
We consider the problem of proactive (i.e. predictive) content caching that is aware of the costs of retention of the content in the cache. Prior work on caching (whether proactive or reactive) does not explicitly take into account the storage cost due to the duration of time for which a content is cached. This new problem, which we call retention aware caching, is motivated by two recent technological...
This proposal for demonstration focuses on the realization of the mobile edge cloud for low latency 5G applications by means of a game to engage the audience. Through the use of intelligent application level migration techniques, we demonstrate an agile migration of a tron-like game between multiple potential edge cloud servers, while the game is running, with uninterrupted user interaction. The following...
This paper investigates an unknown input observer design for a large class of linear systems with unknown inputs and commensurate delays. An impulsive finite-time observer is proposed by involving only the past and actual values of the system output. Sufficient conditions are given to guarantee the existence of such an impulsive finite-time observer.
A lot of research shows that network coding can significantly improve the performance of multi-cast transmission. However, due to the inherent disadvantage of network coding, it is very vulnerable to pollution attacks in which adversaries can inject bogus data. Moreover, those bogus data will be used with legitimate data at the downstream nodes, resulting in the failure of decoding original data as...
For stabilizing power frequency in the grid, demand-supply balancing capability by manipulating the demand side, known as Demand Response (DR), is getting attention because of the continuous increase in renewable energy resources and deferrable loads such as electric vehicles in addition to the traditional adjustment function by supply side such as thermal plants. In the future smart grid, it is imperative...
The TCP/IP model is a widely used protocol at present time due to unparalleled popularity of the Internet. Although it is efficient and reliable it does not include the user into its architecture and thus leaves the user without any control over the underlying layers. While the default layering mechanism is set up in such a way that it would give efficient service to most of its clients, it does not...
Responsive Real-Time Collaborator with Audio Channel, or simply, RTCollaborator, is a user- friendly web application using a responsive layout web design that supports voice and text chat and also has a shared board tool. The application allows users to draw on the board, make flowchart diagrams and see each other's changes, drawings and writings at real- time.
We consider a content delivery network where multiple servers are connected to multiple cache-enabled clients. Clients request their corresponding contents from the servers and servers collaboratively transmit packets to fulfill all the requests. It is assumed that some contents are stored in the caches in off-peak time of the network without knowing the actual requests, the so called cache content...
Wireless sensor networks (WSN) provide attractive solutions for data exchange in a variety of applications from military surveillance to medical and environmental monitoring. The commonality in all such applications is that the data collected in some nodes of the network is needed at some other nodes, for instance in a data collector node. The nodes are typically limited in terms of power, memory,...
This paper proposes an approach for the evaluation of DASH-based video transmission from a server located in a Content Delivery Network (CDN) to multiple LTE users. The approach is based on utilizing an analytical model for the HTTP/TCP transmission in the wired/core link, and simulation traces for the packet transmission in the wireless/access link. The core and access link are separately considered...
Traffic engineering (TE) plays an essential role in deciding routes that effectively use network resources. This is particularly important when one considers the increasing time variation of Internet traffic such as streaming and cloud services. Traffic engineering with traffic prediction is one approach to stably accommodating time-varying traffic. This approach calculates routes from predicted traffic...
Flow of packets plays an important role in the network during sending and receiving process. More the packets received are good for the network users as the speed would be more leading to user satisfaction. A network can be tracked based on the packet flow throughout the network. If greater the capacity, the performance also will be great. Efforts were made to measure the incoming traffic in bits...
Modern Data Centers (DCs) host hundreds of thousands of servers running diverse applications and services. The variety of these applications mandates distinct requirements such as latency and throughput. The state-of-the-art TCP protocol fails to meet these requirements, rendering the design of efficient DC transport protocols an urgent need. Since UDP is the most popular protocol besides TCP, it...
The increasing popularity of applications such as video streaming in today's mobile devices introduces higher demand for throughput, and puts a strain especially on cellular links. Cooperation among mobile devices by exploiting both cellular and local area connections is a promising approach to meet the increasing demand. In this paper, we consider that a group of cooperative mobile devices, exploiting...
Agent-level negotiations between an application and a cloud service provider (SP) face two complexities: i) inaccuracy of computational models in capturing the behavior of a cloud-based system made up of diverse components and resources; and ii) disparity in the goals and priorities of an application and the SP in exercising a cloud-based system. The paper suggests trial actions by an agent to learn...
We present a live migration solution based on Proxy Mobile IPv6 (PMIPv6), a light-weight mobility protocol standardized by IETF. PMIPv6 handles node mobility without requiring any support from the moving nodes. In addition, PMIPv6 works with IPv4, IPv6 and dual-stack nodes. Our results from a real testbed show that network connectivity is successfully maintained with little signaling overhead and...
In recent years, home ICT services have been actively proposed. To realize the services, power consumption of sensor station increases when a sensor station often wakes up to report sensor data. In this paper, we proposed an application-aware power-saving control method for sensor stations and confirmed an effect of a proposed method which is constructed as OSGi bundle in HGW. By using the proposed...
Large scale Content Delivery Networks (CDNs) are one of the key components of today's information infrastructure. This paper proposes and analyzes a simple stochastic model for a file-server system wherein servers can work together, as a pooled resource, to meet individual user requests. In such systems basic questions include: How and where to replicate files? What is the impact of dynamic service...
The proliferation of cloud services makes virtualization technology more important. One important feature of virtualization is live Virtual Machine (VM) migration, which can be employed to facilitate load balancing, fault management and server maintenance etc. Two main metrics of evaluating a live VM migration mechanism are total migration time and downtime. The existing literature on live VM migration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.