Building a Comprehensive Intent-Based Networking Framework: A Practical Approach from Design Concepts to Implementation
Intent-Based Networking (IBN) is an important step towards achieving network automation. Many challenges of today’s complex network management systems can be tackled by the solutions proposed by IBN. However, although IBN has gained a lot of ...
Mobile-Aware Service Function Chain Intelligent Seamless Migration in Multi-access Edge Computing
With the improvement of service delay and quality requirements for new applications such as unmanned driving, internet of vehicles, and virtual reality, the deployment of network services is gradually moving from the cloud to the edge. This ...
Design and Implementation of a Routing Protocol for VANET to Improve the QoS of the Network
VANET routing has become a very popular area of research as it lays the foundation for the intelligent transportation system (ITS). In VANET, the mobility of the vehicle is high hence the network is dynamic. Therefore, the connectivity between the ...
Novel Initialization Functions for Metaheuristic-Based Online Virtual Network Embedding
Virtual network embedding (VNE) is the process of allocating resources in a substrate (i.e. physical) network to support virtual networks optimally. The VNE problem is an NP-hard problem that has been studied for more than a decade in the ...
Power-Profile in Q-Learning NOMA Random Access Protocols for Throughput Maximization
With the introduction of 5 G technology, various communication services are becoming integrated into more sophisticated systems, such as Ultra-Reliable Low-Latency Communications (URLLC) and Massive Machine-Type Communications (mMTC). The goal is ...
Efficient Flow Table Caching Architecture and Replacement Policy for SDN Switches
Software-defined networks (SDN) rely on flow tables to forward packets from different flows with different policies. To speed up packet forwarding, the rules in the flow table should reside in the forwarding plane as much as possible to reduce the ...
Energy-Aware Microservice-Based Application Deployment in UAV-Based Networks for Rural Scenarios
Yearly, the rates of Internet penetration are on the rise, surpassing 80% in developed nations. Despite this progress, over two billion individuals in rural and low-income regions face a complete absence of Internet access. This lack of ...
Economic Alternatives for the Provision of URLLC and eMBB Services Over a 5G Network
This research work analyzes economic alternatives for the provision of ultra-reliable low latency communication (URLLC) and enhanced mobile broadband (eMBB) services by mobile network operators over the same fifth-generation (5G) network. Two ...
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations
Vehicular ad hoc networks (VANET) facilitate vehicle to everything (V2X) communication between vehicles and road side units (RSU) to exchange safety and alert messages required for the successful implementation of VANET applications. However, ...
EDaTAD: Energy-Aware Data Transmission Approach with Decision-Making for Fog Computing-Based IoT Applications
In the fog computing-based Internet of Things (IoT) architecture, the sensor devices represent the basic elements needed to sense the surrounding environment. They gather and send a huge amount of data to the fog gateway and then to the cloud due ...
AI-Based Intrusion Detection for a Secure Internet of Things (IoT)
The increasing use of intelligent devices connected to the internet has contributed to the introduction of a new paradigm: the Internet of Things (IoT). The IoT is a set of devices connected via the internet that cooperate to achieve a specific ...
Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution
Network Function Virtualization (NFV) is a new technology that allows service providers to improve the cost efficiency of network service provisioning. This is accomplished by decoupling the network functions from the physical environment within ...
Benchmarking Large Language Models for Log Analysis, Security, and Interpretation
Large Language Models (LLM) continue to demonstrate their utility in a variety of emergent capabilities in different fields. An area that could benefit from effective language understanding in cybersecurity is the analysis of log files. This work ...
Enhancing BERT-Based Language Model for Multi-label Vulnerability Detection of Smart Contract in Blockchain
Smart contracts are decentralized applications that hold a pivotal role in blockchain-based systems. Smart contracts are composed of error-prone programming languages, so it is affected by many vulnerabilities (e.g., time dependence, outdated ...
Efficient Scheduling of Charger-UAV in Wireless Rechargeable Sensor Networks: Social Group Optimization Based Approach
Wireless power transfer (WPT) technology enables the replenishment of rechargeable battery energy by the sensor nodes (SNs) in wireless rechargeable sensor networks (WRSNs). The deployment of unmanned aerial vehicles (UAVs) as flying chargers to ...
A Multiobjective Metaheuristic-Based Container Consolidation Model for Cloud Application Performance Improvement
This work describes an approach to enhance container orchestration platforms with an autonomous and dynamic rescheduling system that aims at improving application service time by co-locating highly interdependent containers for network delay ...
Enhancing Cloud Gaming QoE Estimation by Stacking Learning
The Cloud Gaming sector is burgeoning with an estimated annual growth of more than 50%, poised to reach a market value of $22 billion by 2030, and notably, GeForce Now, launched in 2020, reached 20 million users by August 2022. Cloud gaming ...
End-to-End No-wait Scheduling for Time-Triggered Streams in Mixed Wired-Wireless Networks
- Gourav Prateek Sharma,
- Wouter Tavernier,
- Didier Colle,
- Mario Pickavet,
- Jetmir Haxhibeqiri,
- Jeroen Hoebeke,
- Ingrid Moerman
Proprietary communication technologies for time-critical communication in industrial environments are being gradually replaced by Time-sensitive Networking (TSN)-enabled Ethernet. Furthermore, attempts have been made to bring TSN features into ...
Distributed AgriFood Supply Chains
In Agrifood scenarios, where farmers need to ensure that their produce is safely produced, transported, and stored, they rely on a network of IoT devices to monitor conditions such as temperature and humidity throughout the supply chain. However, ...