Approximation Algorithms for the NFV Service Distribution Problem

  • Feng H.
  • Llorca J.
  • Molisch A.
  • Raz D.
  • Tulino A.

Distributed cloud networking builds on network functions virtualization (NFV) and software defined networking (SDN) to enable the deployment of network services in the form of elastic virtual network functions (VNFs) instantiated over general purpose servers at distributed cloud locations. We address the design of fast approximation algorithms for the NFV ...

On Active Queue Management in Cellular Networks

  • Beshay J.
  • Francini A.
  • Nasrabadi A.
  • Prakash R.

Active queue management (AQM) is broadly accepted as the tool of choice for tackling bufferbloat (the accumulation of large queueing delays) in network buffers. CoDel and PIE are considered two of the most promising AQM schemes, but little has been done to adopt them in cellular networks, which are particularly ...

BLESS: Bluetooth Low Energy Service Switching using SDN

  • Lakshman T.
  • Mukherjee S.
  • Uddin M.

Bluetooth Low Energy (BLE) is a low-energy personal area wireless network technology that is of increasing importance for large-scale Internet of Things (IoT) deployment. By de- sign, BLE is localized to small regions and to simple network topologies. Moreover, it is not designed for dynamic enforce- ment of policy and ...

Extracting Mobile User Behavioral Similarity via Cell-Level Location Trace

  • Cao J.
  • Chen S.
  • Kennedy W.
  • Kim N.
  • Zhang Y.

We study mobile user behavior from cell-level location trace (CLLT). Since CLLT contains no GPS coordinates of mobile users, we infer approximate user locations from the cell locations they visit. We build upon the vast literature on user behavior analysis and demonstrate the ability to extract user behavior in the ...

Statistical Network Behavior Based Threat Detection

  • Cao J.
  • Drabeck L.
  • He R.

Malware, short for malicious software, contuses to morph and change and anti-virus software may have problems detecting malicious software that have not been seen before. By employing machine learning techniques, one can learn the general behavior pattern of different threat types and use this to detect variants of threats that ...

Randomized admission policy for efficient top-k and frequency estimation

  • Ben Basat R.
  • Einziger G.
  • Friedman R.
  • Kassner Y.

Network management protocols often require timely and meaningful insight about per flow network traffic. This paper introduces Randomized Admission Policy (RAP) - a novel algorithm for the frequency and top-k estimation problems, which are fundamental in network monitoring. We demonstrate space reductions compared to the alternatives by a factor of ...

Network function virtualization enablement within SDN data plane

  • Hao F.
  • Lakshman T.
  • Mekky H.
  • Mukherjee S.
  • Zhang Z.

Software Defined Networking (SDN) can benefit a Network Function Virtualization solution by chaining a set of network functions (NF) to create a network service. Currently, control on NFs is isolated from the SDN, which creates routing inflexibility, flow imbalance and choke points in the network as the controller remains oblivious ...

Optimal elephant flow detection

  • Ben Basat R.
  • Einziger G.
  • Friedman R.
  • Kassner Y.

Monitoring the traffic volumes of elephant flows, including the total byte count per flow, is a fundamental capability for online network measurements. We present an asymptotically optimal algorithm for solving this problem in terms of both space and time complexity. This improves on previous approaches, which can only count the ...

Poster abstract: A sliding counting bloom filter

  • Ben Basat R.
  • Einziger G.
  • Friedman R.
  • Kassner Y.

Bloom filters and their variants support membership or multiplicity queries with a low probabilistic error. For many networking applications, recent data is more significant than older data, motivating the need for sliding window solutions. In this work, we introduce Sliding Window Approximate Membership Protocol (SWAMP), a simple algorithm for membership ...

Bubble-wake interactions of a sliding bubble pair and the mechanisms of heat transfer

  • Donnelly B.
  • Murray D.
  • Nolan K.
  • O'Reilly Meehan R.

An experimental investigation is reported for the bubble-wake interactions that occur between an in-line air bubble pair sliding under an inclined surface in quiescent water. Three experimental techniques are utilised, namely time- resolved particle image velocimetry (PIV), high speed video and high speed infrared thermography. These allow for the fluid ...

distributed channel probing and sequential access for ultra dense networks: joint spectrum- and energy-aware design

  • Cai L.
  • Guo H.

Ultra dense network (UDN) with universal resource reuse capability is recognized as a promising technology for 5G. In this paper, we advance a distributed channel probing and sequential access (DISCO-SEA) scheme for UDNs, which enables an autonomous procedure for network expanding by blending receiver-transmitter pairing, interference avoidance, spectrum sharing, power ...

Overlapped Subarray Based Hybrid Beamforming for Millimeter Wave Multiuser Massive MIMO

  • Song N.
  • Sun H.
  • Yang T.

For massive multiple input multiple output systems at millimeter wave (mm Wave) bands, we consider an efficient hybrid array architecture, namely, overlapped subarray (OSA), and develop a Unified Low Rank Sparse (ULoRaS) recovery algorithm for hybrid beamforming in downlink multiuser scenarios. The ULoRaS scheme takes advantage of the transmit-receive coordinated ...

Improving Dense Network Performance Through Centralized Scheduling and Interference Coordination

  • Fernández-Lopez V.
  • Mogensen P.
  • Pedersen K.
  • Soret B.
  • Steiner J.

Dense network deployments comprising small cells pose a series of important challenges when it comes to achieving an efficient resource use and curbing intercell interference in the downlink. This paper examines different techniques to treat these problems in a dynamic way, from the network and the receiver sides. As a ...

PERMIT: Network Slicing for Personalized 5G Mobile Telecommunications

  • Corici M.
  • Flinck H.
  • Mada B.
  • Nakao A.
  • Taleb T.

5G mobile systems are expected to meet different strict requirements beyond the traditional operator use cases. Effectively, to accommodate needs of new industry segments such as healthcare and manufacturing, 5G systems need to accommodate elasticity, flexibility, dynamicity, scalability, manageability, agility, and customization along with different levels of service delivery parameters ...

Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks

  • Aziz D.
  • Bakker H.
  • Bega D.
  • Han B.
  • Holland O.
  • Mannweiler C.
  • Michalopoulos D.
  • Rost P.
  • Sartori C.
  • Sastry N.
  • Sciancalepore V.
  • Tayade S.

We argue for network slicing as an efficient solution that addresses the diverse requirements of 5G mobile networks, thus providing the necessary flexibility and scalability associated with future network implementations. We elaborate on the challenges that emerge when designing 5G networks based on network slicing. We focus on the architectural ...

Reduced Switching Connectivity for Large Scale Antenna Selection

  • Garcia Rodriguez A.
  • Masouros C.
  • Rulikowski P.

In this paper, we explore reduced-connectivity radio frequency (RF) switching networks for reducing the analog hardware complexity and switching power losses in antenna selection (AS) systems. In particular, we analyze different hardware architectures for implementing the RF switching matrices required in AS designs with a reduced number of RF chains. ...

MIMO Pre-Equalization With Decision Feedback for High-Speed Chip-to-Chip Communication

  • Guenach M.
  • Jacobs L.
  • Moeneclaey M.

In this contribution, we present a multiple-input multiple-output (MIMO) transceiver scheme for very high-speed off-chip communication over low-cost electrical interconnects. Linear MIMO pre-equalization at the transmitter is combined with decision feedback equalization (DFE) at the receiver to counteract the adverse effect of inter symbol interference (ISI) and crosstalk (XT). Elegant ...

Cell-Edge-Aware Precoding for Downlink Massive MIMO Cellular Networks

  • Andrews J.
  • Geraci G.
  • Quek T.
  • Yang H.

We propose a cell-edge-aware (CEA) zero forcing (ZF) precoder that exploits the excess spatial degrees of freedom provided by a large number of base station (BS) antennas to suppress inter-cell interference at the most vulnerable user equipments (UEs). We evaluate the downlink performance of CEA-ZF, as well as that of ...

Efficient time-domain phase noise mitigation in cm-wave wireless communications

  • Lahetkangas E.
  • Levanen T.
  • Syrjala V.
  • Valkama M.

The topic of this paper is low-complexity yet high-precision phase-noise mitigation in a realistic cm-wave radio link. The proposed algorithm for phase-noise induced intercarrier interference mitigation works in time domain. We propose a filtering solution that is computationally very simple to implement on silicon. Noise from initial phase-noise estimate is ...

Taxonomy augmented object recognition

  • Ji Q.
  • Wang X.
  • Yue Zhao

Realistic scene object recognition in computer vision still faces great challenges due to the large intra-class variation of object images caused by factors like object appearance variation and viewpoint change. To address this challenge, we propose to exploit the semantic relationships embedded in object taxonomy for improved object recognition. Specifically, ...