Enabling Delay-Guaranteed Congestion Control With One-Bit Feedback in Cellular Networks
Unexpected large packet delays are often observed in cellular networks due to huge network queuing caused by excessive traffic coming into the network. To deal with the large queue problem, many congestion control algorithms try to find out how much ...
Improved Algorithms for Co-Scheduling of Edge Analytics and Routes for UAV Fleet Missions
Unmanned Aerial Vehicles (UAVs) or drones are increasingly used for urban applications like traffic monitoring and construction surveys. Autonomous navigation allows drones to visit waypoints and accomplish activities as part of their mission. A common ...
Enforcing Fairness in the Traffic Policer Among Heterogeneous Congestion Control Algorithms
Traffic policing is widely used by ISPs to limit their customers’ traffic rates. It has long been believed that a well-tuned traffic policer offers a satisfactory performance for TCP. However, we find this belief breaks with the emergence of new ...
Joint Optimization of QoE and Fairness for Adaptive Video Streaming in Heterogeneous Mobile Environments
The rapid growth of mobile video traffic and user demand poses a more stringent requirement for efficient bandwidth allocation in mobile networks where multiple users may share a bottleneck link. This provides content providers an opportunity to jointly ...
A Blockchain-Based Scheme for Secure Data Offloading in Healthcare With Deep Reinforcement Learning
With the widespread popularity of the Internet of Things and various intelligent medical devices, the amount of medical data is rising sharply, and thus medical data processing has become increasingly challenging. Mobile edge computing technology allows ...
State Disaggregation for Dynamic Scaling of Network Functions
Network Function Virtualization promises better utilization of computational resources by dynamically scaling resources on demand. However, most network functions (NFs) are stateful and require state updates on a per-packet basis. During a scaling ...
TrafAda: Cost-Aware Traffic Adaptation for Maximizing Bitrates in Live Streaming
- Yizong Wang,
- Dong Zhao,
- Chenghao Huang,
- Fuyu Yang,
- Teng Gao,
- Anfu Zhou,
- Huanhuan Zhang,
- Huadong Ma,
- Yang Du,
- Aiyun Chen
The business growth of live streaming causes expensive bandwidth costs from the Content Delivery Network service. It necessitates traffic adaptation, i.e., adapting video bitrates for cost-efficient bandwidth utilization, especially under the 95 <inline-...
Joint Request Updating and Elastic Resource Provisioning With QoS Guarantee in Clouds
In a commercial cloud, service providers (e.g., video streaming service provider) rent resources from cloud vendors (e.g., Google Cloud Platform) and provide services to cloud users, making a profit from the price gap. Cloud users acquire services by ...
Improvement of Copa: Behaviors and Friendliness of Delay-Based Congestion Control Algorithm
Delay-based congestion control has drawn a lot of attention in both academics and industry recently. Specifically, the Copa algorithm proposed in NSDI can achieve consistent high performance under various network environments and has already been deployed ...
Toward Improved Path Programmability Recovery for Software-Defined WANs Under Multiple Controller Failures
Enabling path programmability is an essential feature of Software-Defined Networking (SDN). During controller failures in Software-Defined Wide Area Networks (SD-WANs), a resilient design should maintain path programmability for offline flows, which were ...
Privacy-Preserving and Lightweight Verification of Deep Packet Inspection in Clouds
In the trend of network middleboxes as a service, enterprise customers adopt in-the-cloud deep packet inspection (DPI) services to protect networks. As network misconfigurations and hardware failures notoriously exist, recent efforts envision to ensure ...
Decentralized Caching Under Nonuniform File Popularity and Size: Memory-Rate Tradeoff Characterization
This paper aims to characterize the memory-rate tradeoff for decentralized caching under nonuniform file popularity and size. We consider a recently proposed decentralized modified coded caching scheme (D-MCCS) and formulate the cache placement ...
Toward Scalable and Low-Cost Traffic Testing for Evaluating DDoS Defense Solutions
To date, security researchers evaluate their solutions of mitigating distributed denial-of-service (DDoS) attacks via kernel-based or kernel-bypassing testing tools. However, kernel-based tools exhibit poor scalability in attack traffic generation while ...
Covert Communication With Acoustic Noise
Along with the proliferation of IoT devices, people have a lot of concerns on the privacy issues brought by them. Existing solutions, employing encryption or trying to hide the communication in PHY layer, often suffer from the limited capability of IoT ...
Parallel Successive Learning for Dynamic Distributed Model Training Over Heterogeneous Wireless Networks
- Seyyedali Hosseinalipour,
- Su Wang,
- Nicolò Michelusi,
- Vaneet Aggarwal,
- Christopher G. Brinton,
- David J. Love,
- Mung Chiang
Federated learning (FedL) has emerged as a popular technique for distributing model training over a set of wireless devices, via iterative local updates (at devices) and global aggregations (at the server). In this paper, we develop parallel successive ...
A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling
Link scheduling plays a pivotal role in accommodating stringent reliability and latency requirements. In this paper, we focus on the availability and effectiveness of applying protocol interference model (PIM) under Rayleigh fading model to solve the ...
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage
Secret sharing is a useful method for secure distributed data storage. Such a distributed data storage can avoid the information leakage under an attack to a limited number of distributed servers. While such distributed servers send their shares to an end ...
Segmented Entanglement Establishment With All-Optical Switching in Quantum Networks
There are two conventional methods to establish an entanglement connection in a Quantum Data Networks (QDN). One is to create single-hop entanglement links first and then connect them with quantum swapping, and the other is forwarding one of the entangled ...
Robust Routing Made Easy: Reinforcing Networks Against Non-Benign Faults
With the increasing scale of communication networks, the likelihood of failures grows as well. Since these networks form a critical backbone of our digital society, it is important that they rely on robust routing algorithms which ensure connectivity ...
Experimental Evaluation on Priority-Aware Guaranteed Resource Allocation for Resource Pool Based Reconfigurable Hardware
This paper proposes a priority-aware guaranteed hardware resource allocation in virtual packet optical nodes (VPONs) and describes experimental evidence of service provisioning with the proposed method on testbed. A network based on the VPON brings ...
Wi-Fi Multi-Link Operation: An Experimental Study of Latency and Throughput
In this article, we investigate the real-world capability of the multi-link operation (MLO) framework—one of the key MAC-layer features included in the IEEE 802.11be amendment—by using a large dataset containing 5 GHz spectrum occupancy ...
Approximation Algorithms for Computing Virtual Backbones Considering Routing Costs in Wireless Networks
The strategy of constructing a virtual backbone (VB) to perform routing tasks is considered a mature method for addressing the broadcast storm problem in wireless sensor networks (WSNs). A WSN can be regarded as a unit disk graph (UDG), and its VBs can be ...
High-Granularity Modulation for OFDM Backscatter
Orthogonal frequency-division multiplexing (OFDM) has been widely used in WiFi, LTE, and adopted in 5G. Recently, researchers have proposed multiple OFDM-based WiFi backscatter systems that use the same underlying design principle (i.e., codeword ...
Entanglement Routing Design Over Quantum Networks
Quantum networks have emerged as a future platform for quantum information exchange and applications, with promising capabilities far beyond traditional communication networks. Remote quantum entanglement is an essential component of a quantum network. ...
Q-DDCA: Decentralized Dynamic Congestion Avoid Routing in Large-Scale Quantum Networks
The quantum network that allows users to communicate in a quantum way will be available in the foreseeable future. The network capable of distributing Bell state entangled pairs faces many challenges due to entanglement decoherence and limited network ...
Empowering In-Network Classification in Programmable Switches by Binary Decision Tree and Knowledge Distillation
Given the high packet processing efficiency of programmable switches (e.g., P4 switches of Tbps), several works are proposed to offload the decision tree (DT) to P4 switches for in-network classification. Although the DT is suitable for the match-action ...
Resource Critical Flow Monitoring in Software-Defined Networks
Flow monitoring is widely applied in software-defined networks (SDNs) for monitoring network performance. Especially, detecting heavy hitters can prevent the Distributed Denial of Service (DDoS) attack. However, many existing approaches fall into one of ...
Per-Flow Network Measurement With Distributed Sketch
Sketch-based method has emerged as a promising direction for per-flow measurement in data center networks. Usually in such a measurement system, a sketch data structure is placed as a whole at one switch for counting all passing packets, but when ...
Enabling OFDMA in Wi-Fi Backscatter
This paper for the first time demonstrates how to enable OFDMA in Wi-Fi backscatter for capacity and concurrency enhancement. With our design, the excitation signal is reflected, modulated and shifted to lie in the frequency band of the OFDM subcarrier by ...
ViChaser: Chase Your Viewpoint for Live Video Streaming With Block-Oriented Super-Resolution
The usage of live streaming services has led to a substantial increase in live video traffic. However, the perceived quality of experience of users is frequently limited by variations in the upstream bandwidth of streamers. To address this issue, several ...
Subjects
Currently Not Available