Topology-aware task placement in small-world optical data center network

  • Guo H.
  • Wang C.
  • Wu J.
  • Zhang D.

Based on the small-world optical data center network architecture, we propose a topology-aw are task placement scheme. Simulation results verified that it can effectively shorten the completion time of computing tasks' data transfer.

Content delivery network slicing: QoE and cost awareness

  • Bagaa M.
  • Flinck H.
  • Retal S.
  • Taleb T.

Content Delivery Networks (CDNs) emerged to manage the great amount of content, as well as the transmissions over long distances. In recent years, this concept proves to be a promising solution for emergent enterprises. In this paper, we present a Content Delivery Network as a Service (CDNaaS) platform which can ...

A simplified deterministic channel model for user mobility investigations in 5G networks

  • Awada A.
  • Enqvist A.
  • Lobinger A.
  • Talukdar A.
  • Viering I.

High frequency bands are considered for the fifth generation (5G) mobile networks to handle the continuous increase in the demand for cellular data traffic. However, the propagation conditions in high frequency bands are more challenging than in low frequency bands, making the radio link more susceptible to obstruction. These new ...

A refactoring approach for optimizing mobile networks

  • Bujari A.
  • Flinck H.
  • Palazzi C.
  • Pozza M.
  • Rao A.
  • Tarkoma S.

Mobile networks are expected to serve a wide range of verticals, however the Long Term Evolution (LTE) network is optimized for basic mobile operator services only. The network functions serving LTE networks are largely implemented as dedicated single function devices that offer poor customization options. This intrinsic inflexibility makes current ...

Optimizing service replication for mobile delay-sensitive applications in 5G edge network

  • Bagaa M.
  • Farris I.
  • Flick H.
  • Taleb T.

Extending cloud infrastructure to the Network Edge represents a breakthrough to support delay-sensitive applications in next 5G cellular systems. In this context, to enable ultrashort response times, fast relocation of service instances between edge nodes is required to cope with user mobility. To face this issue, proactive service replication is ...

Pilot contamination is not a fundamental asymptotic limitation in massive MIMO

  • Bjornson E.
  • Hoydis J.
  • Sanguinetti L.

Massive MIMO (multiple-input multiple-output) provides great improvements in spectral efficiency over legacy cellular networks, by coherent combining of the signals over a large antenna array and by spatial multiplexing of many users. Since its inception, the coherent interference caused by pilot contamination has been believed to be an impairment that ...

Cache-aided interference management in wireless cellular networks

  • Avestimehr A.
  • Maddah-Ali M.
  • Naderializadeh N.

We consider the problem of interference management in wireless cellular networks with caches at both base stations and receivers and we characterize the degrees-of-freedom (DoF) per cell to within an additive gap of 1 and a multiplicative gap of 2 for all system parameters, under one-shot linear schemes. Our result ...

Assuring virtual network function image integrity and host sealing in Telco cloue

  • Lal S.
  • Oliver I.
  • Ravidas S.
  • Taleb T.

In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious ...

A Smart2 Gaussian process approach for indoor localization with RSSI fingerprints

  • Bisio I.
  • Lavagetto F.
  • Sciarrone A.
  • Yiu S.

Location Fingerprinting (LF) is a promising localization technique that enables many commercial and emergency Location-Based Services (LBS). The idea of this paper is two- folded. First, a Gaussian Process (GP) is used during the training (offline) phase of an indoor positioning algorithm to generate the fingerprint database, reducing the expensive ...

Enhancing coexistence in the unlicensed band with massive MIMO

  • Bonfante A.
  • Claussen H.
  • Garcia-Rodriguez A.
  • Geraci G.
  • Giordano L.
  • Lopez-Perez D.

We consider cellular base stations (BSs) equipped with a large number of antennas and operating in the unlicensed band. We denote such system as massive MIMO unlicensed (mMIMO-U). We design the key procedures required to guarantee coexistence between a cellular BS and nearby Wi-Fi devices. These include: neighboring Wi-Fi channel ...

How to optimally allocate resources for coded distributed computing?

  • Avestimehr A.
  • Li S.
  • Maddah-Ali M.
  • Yu Q.

To execute cloud computing tasks over a data center hosting hundreds of thousands of server nodes, it is natural to distribute computations across the nodes to take advantage of parallel processing. However, as we allocate more computing resources and further distribute the computations, a large amount of intermediate data must ...

Link scheduling for mmWave WMN backhaul

  • Chen D.
  • Kilpi J.
  • Paananen J.
  • Seppanen K.
  • Suihko T.
  • Wainio P.

A new link scheduling approach for millimeter wave wireless mesh network is presented. The proposed link scheduling solution is designed to work together with a multiple overlapping spanning trees-based routing schemes on a mesh network topology. The link schedule computation will minimize the end-to-end delay along a subset of shortest-hop ...

SMS and one-time-password interception in LTE networks

  • Holtmanns S.
  • Oliver I.

The Interconnection network connects the communication networks themselves to each other enabling features such as roaming and data services between those said networks. It has been known since 2014 that using the legacy SS7 (Signaling System No. 7) protocol SMS based traffic can be intercepted. Network providers are now moving ...

Lightweight service replication for ultra-short latency applications in mobile edge networks

  • Farris I.
  • Flinck H.
  • Iera A.
  • Taleb T.

Edge Cloud infrastructure will play a key role in extending the range of supported real-time cloud applications, by guaranteeing extremely fast response times. However, user mobility requires fast relocation of service instances, which represents an open challenge for resource-constrained cloudlets interconnected by high-latency and low-bandwidth links. In this paper, we ...

Compressive high-speed stereo imaging

  • Pang S.
  • Sun Y.
  • Yuan X.

A compressive high-speed stereo imaging system is reported. The system is capable of reconstructing 3D videos at a frame rate 10 times higher than the sampling rate of the imaging sensors. An asymmetric configuration of stereo imaging system has been implemented by including a high-speed spatial modulator in one of ...

An experimental system for verifying topology changes in mobile communication networks

  • Ali-Tolppa J.
  • Carle G.
  • Sanneck H.
  • Tsvetkov T.

Automatic Configuration Management (CM) parameter change assessment, the so-called Self-Organizing Network (SON) verification, is an important enabler for stable and high-quality modern mobile communication networks. However, it also presents a new set of challenges. While improving network stability and resolving unexpected conflicts caused by parallel configuration changes, SON verification can ...

An adaptive detection and prevention architecture for unsafe traffic in SDN enabled mobile networks

  • Kantola R.
  • Khatri V.
  • Monshizadeh M.

The forthcoming 5G cloud networks will utilize software defined networking (SDN) and network functions virtualization (NFV) to provide new services. However, applying these technologies introduce new threats to network. To detect the security attacks and malicious traffic both on end user and cloudified mobile network, we apply centralized monitoring and ...

Sharing performance measurement events across domains

  • Apajalahti K.
  • Kapoor S.
  • Niiranen J.
  • Raisanen V.

Network management activities, such as fault analysis and configuration management, are eventually related to changes in network measurements. Some measurement event might be either a trigger or objective of a management activity. We argue that sharing the semantics of performance data across networks provides a basis for more advanced automation. ...

A Web-based framework for fast synchronization of live video players

  • De Turck F.
  • De Vleeschauwer D.
  • Pauwels D.
  • Petrangeli S.
  • Van Der Hooft J.
  • Wauters T.

The increased popularity of social media and mobile devices has radically changed the way people consume multimedia content online. As an example, users can experience the same event (e.g. a sports event or a concert) together using social media, even if they are not in the same physical location. Moreover, ...

Layer-independent PCI assignment method for Ultra-Dense multi-layer co-channel mobile Networks

  • Ali-Tolppa J.
  • Mwanje S.

Ultra-Dense Networks (UDNs) are Heterogeneous Networks (HetNets) that deploy a high density of small cells over-laying the traditional macro cells. If several Long Term Evolution (LTE) layers share the available spectrum, assigning the Physical Cell Identities (PCIs) becomes complicated due to the density and the diversity of the network. Since ...