The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We describe a “crowd measurement” project, referred to as PoQeMoN, whose main objective is to identify Quality of Service (QoS) indicators in order to predict the Quality of Experience (QoE) for HTTP YouTube content on mobile networks. Results are based on experiments on an operational network. The second contribution of this paper is to show that the proposed indicator is easy to implement in order...
In this paper, the performance of the toroidal cellular simulation structure under users' mobility, time-varying traffic, and dynamic channel assignment is evaluated. The toroidal cellular simulation structure has been proposed to effectively eliminate the so called edge effect (elimination of the inflow/outflow of handoff traffic streams to/from the examined area). However, in the toroidal cellular...
The problem of coverage in three-dimensional (3D) wireless sensor networks is challenging and hard. In this paper, we focus on the problem of k-coverage of a 3D field of interest (FoI), where every point is covered by at least k sensors. First, we propose three sensor placement strategies to guarantee k-coverage of a 3D FoI. Second, we compute the corresponding sensor density. Third, we investigate...
Deployment of Network Function Virtualization (NFV) over multiple clouds accentuates its advantages like flexibility of virtualization, proximity to customers and lower total cost of operation. However, NFV over multiple clouds has not yet attained the level of performance to be a viable replacement for traditional networks. One of the reasons is the absence of a standard based Fault, Configuration,...
In the literature, there are many clustering algorithms proposed for the vehicle ad hoc networks (VANETs) to improve network stability and scalability. However, there is a lack of comprehensive comparison among them. In this paper, we show that there exists unfair comparison of clustering algorithms, in the aspect of simulators, performance metrics, simulation scenarios, and configuration of algorithms...
Modern mobile devices contain powerful Multi-Processor System-on-Chips (MPSoCs) that are performance throttled by Dynamic Power Management (DPM) runtime systems to extend battery lifetime. Applications on mobile devices commonly generate highly interactive workloads, dependent on interaction between the processor cores, peripherals, external resources and the user, such as touch input during web-browsing...
When two nodes in an opportunistic network meet, a utility function is generally employed to select the data that have to be exchanged between them, in order to maximize the chance of message delivery and to minimize congestion. The utility function computes weighted sums of various parameters, such as node centrality, similarity, trust, etc. Most of the existing solutions pre-compute the weights...
With the 5G technology, data traffic is going to grow by a factor of 1000, while the number of connected devices is likely going to be two orders of magnitude higher. With smartphones being cornerstone in our daily lives, understanding mobile network performance is critical for providing a superior user experience and, consequently, determining the success of an application. This paper presents a...
Mobile Broadband (MBB) access networks are becoming more and more used worldwide, and the devices adopted to access them are increasing in number and complexity (smartphones, mobile hotspots, vehicular infotainment systems). The highly dynamic nature of such scenarios calls for continuous monitoring and measurement of the network, and possibly cross-layer management of network applications. A recent...
The popularity of Location-Based Services (LBSs) has resulted in varieties of applications with more conveniences in our daily life. However, since mobile users need to submit some sensitive information to the untrusted LBS servers, they may lose their privacy while they are enjoying the provided social activities. In this paper, we first point out and define the Time-Sensitive Side Information (TSSI)...
Modular-based channel hopping (CH) rendezvous algorithms can provide guaranteed rendezvous for Cognitive Radio Networks (CRNs) without time synchronization or Common Control Channels (i.e., blind rendezvous). The Enhanced Jump-Stay (EJS) scheme [1] has now been recognized as arguably the best in terms of Maximum-Time-To-Rendezvous (MTTR) and bounds for the Expected-Time-To-Rendezvous (ETTR) for users...
The pervasiveness of smartphones equipped with various built-in sensors combined with the capability of serving multiple applications that could access social network information introduces next generation soft biometrics tools that could be used to verify a user's identity through their social behavior. Smart mobile devices can provide multi-modal data acquisition from various social networking applications,...
Multi-tenancy allows diverse agents sharing the infrastructure in the 5th generation of mobile networks. Such a feature calls for more automated and faster planning procedures in order to adapt the network capacity to the varying traffic demand. To achieve these goals, Small Cells offer network providers more flexible, scalable, and cost-effective solutions compared to macrocell deployments. This...
Mobile network operators collect a humongous amount of network measurements. Among those, sector Key Performance Indicators (KPIs) are used to monitor the radio access, i.e., the "last mile" of mobile networks. Thresholding mechanisms and synthetic combinations of KPIs are used to assess the network health, and rank sectors to identify the underperforming ones. It follows that the available...
Mobile AdHoc NETworks (MANETs) have been identified as a key emerging technology for scenarios in which IEEE 802.11 or cellular communications are either infeasible, inefficient, or cost-ineffective. Smartphones are the most adequate network nodes in many of these scenarios, but it is not straightforward to build a network with them. We extensively survey existing possibilities to build applications...
Quality-to-Experience (QoE) refers to users' experience when using an application. Network operators typically focus on Quality-of-Service (QoS) metrics such as throughput, delay, and packet loss. However, these QoS metrics only matter if they impact users' experience of the application they are using. Therefore, it is crucial for network operators to monitor Quality of Experience (QoE). However,...
The consideration of mobile web page and service access for optimization schemes requires a detailed interpretation that goes beyond the commonplace evaluations of HTTP-delivered objects. Evaluating mobile browser interactions with popular web sites, we note that a non-negligible amount of data is delivered with HTTPS and web site interactions could almost exclusively rely on HTTPS delivery of their...
This paper presents an online algorithm for mobile user speed estimation in 3GPP Long Term Evolution (LTE)/LTE-Advanced (LTE-A) networks. The proposed method leverages on uplink (UL) sounding reference signal (SRS) power measurements performed at the base station, also known as eNodeB (eNB), and remains effective even under large sampling period. Extensive performance evaluation of the proposed algorithm...
Due to the massive explosion of social networking and content sharing, it is becoming challenging to transmit a huge amount of multimedia content over wireless mobile networks. The existing paradigm of mobile multimedia sharing has yet to effectively address the energy and bandwidth limitations of wireless devices. Content-Centric Networking (CCN) has been proposed as a possible way to drive the current...
An opportunistic network (OPPNET) is an alternative to a mobile ad-hoc network (MANET) in which no complete path is needed. If a complete path is unavailable, the source node sends the message through relay nodes until the message arrives at its destination. Friendship-Based Routing (FBR) is routing scheme for an OPPNET which uses the inter-contact time of each node to find a good relay node. Unfortunately,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.