skip to main content
Reflects downloads up to 16 Oct 2024Bibliometrics
research-article
ClassBench-ng: Benchmarking Packet Classification Algorithms in the OpenFlow Era

Packet classification, i.e., the process of categorizing packets into flows, is a first-class citizen in any networking device. Every time a new packet has to be processed, one or more header fields need to be compared against a set of pre-installed ...

research-article
CoNICE: Consensus in Intermittently-Connected Environments by Exploiting Naming With Application to Emergency Response

In many scenarios, information must be disseminated over intermittently-connected environments when the network infrastructure becomes unavailable, e.g., during disasters where first responders need to send updates about critical tasks. If such updates ...

research-article
Buffer-Aware User Selection and Resource Allocation for an Opportunistic Cognitive Radio Network: A Cross-Layer Approach

In this paper, we focus on a cross-layer resource allocation problem for an opportunistic cognitive radio network, where secondary users (SUs) share a primary network’s licensed spectrum only when the primary network is sensed to be idle. We ...

research-article
Fast Retrieval of Large Entries With Incomplete Measurement Data

In network-wide monitoring, finding the large monitoring data entries is a fundamental network management function. However, the retrieval of large entries is extremely difficult and challenging as a result of incompleteness of network measurement data. ...

research-article
Shufflecast: An Optical, Data-Rate Agnostic, and Low-Power Multicast Architecture for Next-Generation Compute Clusters

An optical circuit-switched network core has the potential to overcome the inherent challenges of a conventional electrical packet-switched core of today’s compute clusters. As optical circuit switches (OCS) directly handle the photon beams without ...

research-article
State-Dependent Multi-Constraint Topology Configuration for Software-Defined Service Overlay Networks

Service Overlay Network (SON) is an efficient solution for ensuring the end-to-end Quality of Service (QoS) in different real-world applications, including Video-on-Demand, Voice over IP, and other value-added Internet-based services. Although SON offers ...

research-article
Federated Edge Network Utility Maximization for a Multi-Server System: Algorithm and Convergence

We propose a novel Federated Edge Network Utility Maximization (FEdg-NUM) architecture for solving a large-scale distributed network utility maximization (NUM) problem. In FEdg-NUM, clients with private utilities communicate to a peer-to-peer network of ...

research-article
Sponsored Data: On the Effect of ISP Competition on Pricing Dynamics and Content Provider Market Structures

We analyze the effect of sponsored data when Internet service providers (ISPs) compete for subscribers and content providers (CPs) compete for a share of the bandwidth usage by customers. Our model is of a full information, leader-follower game. ISPs lead ...

research-article
Open Access
ZCNET: Achieving High Capacity in Low Power Wide Area Networks

In this paper, a novel LPWAN technology, ZCNET, is proposed, which achieves significantly higher network capacity than existing solutions, such as LoRa, Sigfox, and RPMA. The capacity boost of ZCNET is mainly due to two reasons. First, a ZCNET node ...

research-article
Scheduling With Age of Information Guarantee

Age of Information (AoI) is an application layer performance metric that quantifies the freshness of information. This paper investigates scheduling problems at network edge when there is an AoI requirement for each source node, which we call Maximum AoI ...

research-article
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack

Traffic monitoring services collect traffic reports and respond to users’ traffic queries. However, the reports and queries may reveal the user’s identity and location. Although different anonymization techniques have been applied to protect ...

research-article
Congestion Control for Cross-Datacenter Networks

Geographically distributed applications hosted on cloud are becoming prevalent. They run on <italic>cross-datacenter network</italic> that consists of multiple data center networks (DCNs) connected by a wide area network (WAN). Such a cross-DC network ...

research-article
Learning Quantum Drift-Diffusion Phenomenon by Physics-Constraint Machine Learning

Recently, deep learning (DL) is widely used to detect physical phenomena and has obtained encouraging results. Several works have shown that it can learn quantum phenomenon. Subsequently, quantum machine learning (QML) has been paid more attention by ...

research-article
Topology Inference With Multivariate Cumulants: The M&#x00F6;bius Inference Algorithm

Many tasks regarding the monitoring, management, and design of communication networks rely on knowledge of the routing topology. However, the standard approach to topology mapping&#x2014;namely, active probing with traceroutes&#x2014;relies on cooperation ...

research-article
Localizability With Range-Difference Measurements: Numerical Computation and Error Bound Analysis

This paper studies the localization problem using noisy range-difference measurements, or equivalently time difference of arrival (TDOA) measurements. There is a reference sensor, and for each other sensor, the TDOA measurement is obtained with respect to ...

research-article
An Incentive Mechanism for Sustainable Blockchain Storage

Miners in a blockchain system are suffering from ever-increasing storage costs, which in general have not been properly compensated by the users&#x2019; transaction fees. This reduces the incentives for the miners&#x2019; participation and may jeopardize ...

research-article
Multi-Associated Parameters Aggregation-Based Routing and Resources Allocation in Multi-Core Elastic Optical Networks

Space division multiplexing (SDM), as a potential means of enhancing the capacity of optical transmission systems, has attracted widespread attention. However, the adoption of SDM technology has also additionally increased resource dimensions, introduced ...

research-article
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures

Software-Defined Networking (SDN). SDN enables network innovations with a centralized controller controlling the whole network through the control channel. Because the control channel delivers all network control traffic, its security and reliability are ...

research-article
A Theoretical Framework for Random Access: Stability Regions and Transmission Control

As one of the two fundamental types of multiple access, random access has been widely adopted in various communication networks, and expected to play an increasingly central role owing to the rising popularity of Machine-to-Machine (M2M) communications. ...

research-article
Accelerating Federated Learning via Parallel Servers: A Theoretically Guaranteed Approach

With the growth of participating clients, the centralized parameter server (PS) will seriously limit the scale and efficiency of Federated Learning (FL). A straightforward approach to scale up the FL system is to construct a Parallel FL (PFL) system with ...

research-article
Deficit Round-Robin: A Second Network Calculus Analysis

Deficit Round-Robin (DRR) is a widespread scheduling algorithm that provides fair queueing with variable-length packets. Bounds on worst-case delays for DRR were found by Boyer et al., who used a rigorous network calculus approach and characterized the ...

research-article
Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers

Crowdsensing is an emerging paradigm of ubiquitous sensing, through which a crowd of workers are recruited to perform sensing tasks collaboratively. Although it has stimulated many applications, an open fundamental problem is how to select among a massive ...

research-article
SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks

The past decades have seen a proliferation of middlebox deployment in various scenarios, including backbone networks and cloud networks. Since flows have to traverse specific service function chains (SFCs) for security and performance enhancement, it ...

research-article
Charging Path Optimization in Mobile Networks

We study a class of generic charging path optimization problems arising from emerging networking applications, where mobile chargers are dispatched to deliver energy to mobile agents (e.g., robots, drones, vehicles), which have specified tasks and ...

research-article
DeepCC: Bridging the Gap Between Congestion Control and Applications via Multiobjective Optimization

The increasingly complicated and diverse applications have distinct network performance demands, e.g., some desire high throughput while others require low latency. Traditional congestion controls (CC) have no perception of these demands. Consequently, ...

research-article
Overbooking-Empowered Computing Resource Provisioning in Cloud-Aided Mobile Edge Networks

Conventional computing resource trading over mobile networks generally faces many challenges, e.g., excessive decision-making latency, undesired trading failures, and underutilization of dynamic resources, owing to the constraint of wireless networks. To ...

research-article
Locating Link Failures in WSNs via Cluster Consensus and Graph Decomposition

With the popularization of network equipment and the rapid development of information technology, the scale and complexity of wireless sensor networks (WSNs) continue to expand. How to effectively locate link failures has become a challenging problem in ...

research-article
Fresh Caching of Dynamic Content Over the Wireless Edge

We introduce a framework and provably-efficient schemes for &#x2018;fresh&#x2019; caching at the (front-end) local cache of content that is subject to &#x2018;dynamic&#x2019; updates at the (back-end) database. We start by formulating the hard-cache-...

research-article
Tagcaster: Activating Wireless Voice of Electronic Toll Collection Systems With Zero Start-Up Cost

This work enhances the machine-to-human communication between electronic toll collection (ETC) systems and drivers by providing an AM broadcast service to deployed ETC systems. This study is the first to show that ultra-high radio frequency identification ...

research-article
A Tale of Three Videoconferencing Applications: Zoom, Webex, and Meet

Since the outbreak of the COVID-19 pandemic, videoconferencing has become the default mode of communication in our daily lives at homes, workplaces and schools, and it is likely to remain an important part of our lives in the post-pandemic world. Despite ...

Subjects

Comments