Tag Archive: '2016 ns3 projects'
Cloud computing and virtualization are two key technology priorities for telecom service providers. Besides total cost reduction, there are many strategic objectives while adopting cloud technology into the telecom sector. Telecom service providers core assets and strength lies in their communicationnetworks, but these alone are not enough to maintain the industry in the higher level […]
Software-Defined Networking not only addresses the shortcoming of traditional network technologies in dealing with frequent and immediate changes in cloud data centers but also made network resource management open and innovation-friendly. To further accelerate the innovation pace, accessible and easy-to-learn testbeds are required which estimate and measure the performance of network and host capacity provisioning approaches simultaneously within a data center. This is […]
The performance of wide area network (WAN) has a direct impact on user experience of cloud usage. In order to provide on-demand and performance-assured WAN connections, we design and implement a SDN-based system called Grace, which abstracts the underlying network resources into life-cyclenetwork services to provide the predefined network performance via open APIs.With the advantages of this system, we demonstrate that WAN […]
This paper examines a possible vulnerability with the potential for a malicious entity to prevent a mobile device from handing over from a global system for mobile communications (GSM) to universal mobile telecommunications system (UMTS) network because the GSM network maintains the stand-alone dedicated control channel (SDCCH) uplink time slots. The process of testing this vulnerability requires the development […]
As power consumption of the Internet has been growing quickly in recent years, saving energy has become an important problem of networking research, for which the most promising solution is to find the minimum-power network subsets and shut down other unnecessary network devices and links to satisfy changing traffic loads. However, in traditional networks, it is difficult to implement a coordinated strategy […]
We consider a multihypothesis social learning problem in which an agent has access to a set of private observations and chooses an opinion from a set of experts to incorporate into its final decision. To model individual biases, we allow the agent and experts to have general loss functions and possibly different decision spaces. We characterize the […]
Opportunistic Internet of Things (IoT) extends the concept of opportunistic networking combining human users carrying mobile devices and smart things. It explores the relationships between humans and the opportunistic connection of smart objects. This paper presents a software infrastructure, named Opportunistic IoT Platform (OIoT), which helps developers to create and manage opportunistic IoT communities between smart devices. […]
The introduction of ubiquitous systems, wearable computing and ‘Internet of Things’ technologies in our digital society results in a large-scale data generation. Environmental, home, and mobile sensors are only a few examples of the significant capabilities to collect massive data in real-time from a plethora of heterogeneous social environments. These capabilities provide us with a unique opportunity to understand […]
In this paper, we investigate capacity scaling laws of wireless social networks under the social-based session formation. We model a wireless social network as a three-layered structure, consisting of the physical layer, social layer, and session layer; and we introduce a cross-layer distance & density-aware model, called the population-based formation model, under which: 1) for each node vk, the number of its friends/followers, denoted […]
This work focuses on mitigation of the network congestion in a Machine to Machine (M2M) cloud. Since the inception of M2M cloud communication technology, the number of M2M devices has radically increased. This has consequently increased the overall traffic of the network which, in turn, makes the entire network congestion prone. The work assumes an underlying clustered network topology of the M2M devices. […]