Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks

  • Aziz D.
  • Bakker H.
  • Bega D.
  • Han B.
  • Holland O.
  • Mannweiler C.
  • Michalopoulos D.
  • Rost P.
  • Sartori C.
  • Sastry N.
  • Sciancalepore V.
  • Tayade S.

We argue for network slicing as an efficient solution that addresses the diverse requirements of 5G mobile networks, thus providing the necessary flexibility and scalability associated with future network implementations. We elaborate on the challenges that emerge when designing 5G networks based on network slicing. We focus on the architectural ...

Reduced Switching Connectivity for Large Scale Antenna Selection

  • Garcia Rodriguez A.
  • Masouros C.
  • Rulikowski P.

In this paper, we explore reduced-connectivity radio frequency (RF) switching networks for reducing the analog hardware complexity and switching power losses in antenna selection (AS) systems. In particular, we analyze different hardware architectures for implementing the RF switching matrices required in AS designs with a reduced number of RF chains. ...

Approximation Algorithms for the NFV Service Distribution Problem

  • Feng H.
  • Llorca J.
  • Molisch A.
  • Raz D.
  • Tulino A.

Distributed cloud networking builds on network functions virtualization (NFV) and software defined networking (SDN) to enable the deployment of network services in the form of elastic virtual network functions (VNFs) instantiated over general purpose servers at distributed cloud locations. We address the design of fast approximation algorithms for the NFV ...

On Active Queue Management in Cellular Networks

  • Beshay J.
  • Francini A.
  • Nasrabadi A.
  • Prakash R.

Active queue management (AQM) is broadly accepted as the tool of choice for tackling bufferbloat (the accumulation of large queueing delays) in network buffers. CoDel and PIE are considered two of the most promising AQM schemes, but little has been done to adopt them in cellular networks, which are particularly ...

BLESS: Bluetooth Low Energy Service Switching using SDN

  • Lakshman T.
  • Mukherjee S.
  • Uddin M.

Bluetooth Low Energy (BLE) is a low-energy personal area wireless network technology that is of increasing importance for large-scale Internet of Things (IoT) deployment. By de- sign, BLE is localized to small regions and to simple network topologies. Moreover, it is not designed for dynamic enforce- ment of policy and ...

Extracting Mobile User Behavioral Similarity via Cell-Level Location Trace

  • Cao J.
  • Chen S.
  • Kennedy W.
  • Kim N.
  • Zhang Y.

We study mobile user behavior from cell-level location trace (CLLT). Since CLLT contains no GPS coordinates of mobile users, we infer approximate user locations from the cell locations they visit. We build upon the vast literature on user behavior analysis and demonstrate the ability to extract user behavior in the ...

Statistical Network Behavior Based Threat Detection

  • Cao J.
  • Drabeck L.
  • He R.

Malware, short for malicious software, contuses to morph and change and anti-virus software may have problems detecting malicious software that have not been seen before. By employing machine learning techniques, one can learn the general behavior pattern of different threat types and use this to detect variants of threats that ...

Poster abstract: A sliding counting bloom filter

  • Ben Basat R.
  • Einziger G.
  • Friedman R.
  • Kassner Y.

Bloom filters and their variants support membership or multiplicity queries with a low probabilistic error. For many networking applications, recent data is more significant than older data, motivating the need for sliding window solutions. In this work, we introduce Sliding Window Approximate Membership Protocol (SWAMP), a simple algorithm for membership ...

Randomized admission policy for efficient top-k and frequency estimation

  • Ben Basat R.
  • Einziger G.
  • Friedman R.
  • Kassner Y.

Network management protocols often require timely and meaningful insight about per flow network traffic. This paper introduces Randomized Admission Policy (RAP) - a novel algorithm for the frequency and top-k estimation problems, which are fundamental in network monitoring. We demonstrate space reductions compared to the alternatives by a factor of ...

Network function virtualization enablement within SDN data plane

  • Hao F.
  • Lakshman T.
  • Mekky H.
  • Mukherjee S.
  • Zhang Z.

Software Defined Networking (SDN) can benefit a Network Function Virtualization solution by chaining a set of network functions (NF) to create a network service. Currently, control on NFs is isolated from the SDN, which creates routing inflexibility, flow imbalance and choke points in the network as the controller remains oblivious ...

Optimal elephant flow detection

  • Ben Basat R.
  • Einziger G.
  • Friedman R.
  • Kassner Y.

Monitoring the traffic volumes of elephant flows, including the total byte count per flow, is a fundamental capability for online network measurements. We present an asymptotically optimal algorithm for solving this problem in terms of both space and time complexity. This improves on previous approaches, which can only count the ...

MIMO Pre-Equalization With Decision Feedback for High-Speed Chip-to-Chip Communication

  • Guenach M.
  • Jacobs L.
  • Moeneclaey M.

In this contribution, we present a multiple-input multiple-output (MIMO) transceiver scheme for very high-speed off-chip communication over low-cost electrical interconnects. Linear MIMO pre-equalization at the transmitter is combined with decision feedback equalization (DFE) at the receiver to counteract the adverse effect of inter symbol interference (ISI) and crosstalk (XT). Elegant ...

Cell-Edge-Aware Precoding for Downlink Massive MIMO Cellular Networks

  • Andrews J.
  • Geraci G.
  • Quek T.
  • Yang H.

We propose a cell-edge-aware (CEA) zero forcing (ZF) precoder that exploits the excess spatial degrees of freedom provided by a large number of base station (BS) antennas to suppress inter-cell interference at the most vulnerable user equipments (UEs). We evaluate the downlink performance of CEA-ZF, as well as that of ...

Efficient time-domain phase noise mitigation in cm-wave wireless communications

  • Lahetkangas E.
  • Levanen T.
  • Syrjala V.
  • Valkama M.

The topic of this paper is low-complexity yet high-precision phase-noise mitigation in a realistic cm-wave radio link. The proposed algorithm for phase-noise induced intercarrier interference mitigation works in time domain. We propose a filtering solution that is computationally very simple to implement on silicon. Noise from initial phase-noise estimate is ...

Taxonomy augmented object recognition

  • Ji Q.
  • Wang X.
  • Yue Zhao

Realistic scene object recognition in computer vision still faces great challenges due to the large intra-class variation of object images caused by factors like object appearance variation and viewpoint change. To address this challenge, we propose to exploit the semantic relationships embedded in object taxonomy for improved object recognition. Specifically, ...

Fundamental Limits of Cache-Aided Interference Management

  • Avestimehr A.
  • Maddah-Ali M.
  • Naderializadeh N.

We consider a system, comprising a library of $N$ files (e.g., movies) and a wireless network with a $K_{T}$ transmitters, each equipped with a local cache of size of $M_{T}$ files and a $K_{R}$ receivers, each equipped with a local cache of size of $M_{R}$ files. Each receiver will ask ...

Distributed Staircase Codes for Connectionless Optical Metro Networks

  • Gebhard U.
  • Lei M. Zhang
  • Schmalen L.

We demonstrate a multipoint-to-point network architecture for optical metro networks with distributed FEC encoding based on a novel modification of staircase codes. We show that our scheme can maximize the throughput on the network by using a simple rate-adaptation scheme.

On prediction of resource consumption of service requests in cloud environments

  • Derakhshan F.
  • Randriamasy S.
  • Roessler H.
  • Schefczik H.

The functional efficiency of cloud solutions depends on their responsive allocation of processing resources to individual tasks according to their predefined completion time. An optimum usage of resources requires an accurate prediction of resource consumption. In this paper we introduce a novel method for predicting the resource consumption of processing ...

Towards Automated IoT Service Recommendation

  • Le Pallec .
  • Nesrine Ammar
  • Noirie L.

Today, people buy connected objects for limited usages, although these objects could be used in many other IoT services they are not aware of. In this demo paper, we illustrate a solution that helps people to better leverage their connected objects by recommending all services they could benefit from.

Stimulus-based Sandbox for Learning Resource Dependencies in Virtualized Distributed Applications

  • Aghasaryan A.
  • Bouzid M.
  • Kostadinov D.

In this paper, we describe a profiling sandbox for cloud-based distributed applications where the dependencies on available computing resources can be methodically elucidated by dynamically applying a series of unitary perturbations on the underlying computing resources. Each such perturbation applied to an application node acts as a stimulus which propagates ...