ClassBench-ng: Benchmarking Packet Classification Algorithms in the OpenFlow Era
Packet classification, i.e., the process of categorizing packets into flows, is a first-class citizen in any networking device. Every time a new packet has to be processed, one or more header fields need to be compared against a set of pre-installed ...
CoNICE: Consensus in Intermittently-Connected Environments by Exploiting Naming With Application to Emergency Response
In many scenarios, information must be disseminated over intermittently-connected environments when the network infrastructure becomes unavailable, e.g., during disasters where first responders need to send updates about critical tasks. If such updates ...
Buffer-Aware User Selection and Resource Allocation for an Opportunistic Cognitive Radio Network: A Cross-Layer Approach
In this paper, we focus on a cross-layer resource allocation problem for an opportunistic cognitive radio network, where secondary users (SUs) share a primary network’s licensed spectrum only when the primary network is sensed to be idle. We ...
Fast Retrieval of Large Entries With Incomplete Measurement Data
In network-wide monitoring, finding the large monitoring data entries is a fundamental network management function. However, the retrieval of large entries is extremely difficult and challenging as a result of incompleteness of network measurement data. ...
Shufflecast: An Optical, Data-Rate Agnostic, and Low-Power Multicast Architecture for Next-Generation Compute Clusters
An optical circuit-switched network core has the potential to overcome the inherent challenges of a conventional electrical packet-switched core of today’s compute clusters. As optical circuit switches (OCS) directly handle the photon beams without ...
State-Dependent Multi-Constraint Topology Configuration for Software-Defined Service Overlay Networks
Service Overlay Network (SON) is an efficient solution for ensuring the end-to-end Quality of Service (QoS) in different real-world applications, including Video-on-Demand, Voice over IP, and other value-added Internet-based services. Although SON offers ...
Federated Edge Network Utility Maximization for a Multi-Server System: Algorithm and Convergence
We propose a novel Federated Edge Network Utility Maximization (FEdg-NUM) architecture for solving a large-scale distributed network utility maximization (NUM) problem. In FEdg-NUM, clients with private utilities communicate to a peer-to-peer network of ...
Sponsored Data: On the Effect of ISP Competition on Pricing Dynamics and Content Provider Market Structures
We analyze the effect of sponsored data when Internet service providers (ISPs) compete for subscribers and content providers (CPs) compete for a share of the bandwidth usage by customers. Our model is of a full information, leader-follower game. ISPs lead ...
ZCNET: Achieving High Capacity in Low Power Wide Area Networks
In this paper, a novel LPWAN technology, ZCNET, is proposed, which achieves significantly higher network capacity than existing solutions, such as LoRa, Sigfox, and RPMA. The capacity boost of ZCNET is mainly due to two reasons. First, a ZCNET node ...
Scheduling With Age of Information Guarantee
Age of Information (AoI) is an application layer performance metric that quantifies the freshness of information. This paper investigates scheduling problems at network edge when there is an AoI requirement for each source node, which we call Maximum AoI ...
User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack
Traffic monitoring services collect traffic reports and respond to users’ traffic queries. However, the reports and queries may reveal the user’s identity and location. Although different anonymization techniques have been applied to protect ...
Congestion Control for Cross-Datacenter Networks
Geographically distributed applications hosted on cloud are becoming prevalent. They run on <italic>cross-datacenter network</italic> that consists of multiple data center networks (DCNs) connected by a wide area network (WAN). Such a cross-DC network ...
Learning Quantum Drift-Diffusion Phenomenon by Physics-Constraint Machine Learning
Recently, deep learning (DL) is widely used to detect physical phenomena and has obtained encouraging results. Several works have shown that it can learn quantum phenomenon. Subsequently, quantum machine learning (QML) has been paid more attention by ...
Topology Inference With Multivariate Cumulants: The Möbius Inference Algorithm
Many tasks regarding the monitoring, management, and design of communication networks rely on knowledge of the routing topology. However, the standard approach to topology mapping—namely, active probing with traceroutes—relies on cooperation ...
Localizability With Range-Difference Measurements: Numerical Computation and Error Bound Analysis
This paper studies the localization problem using noisy range-difference measurements, or equivalently time difference of arrival (TDOA) measurements. There is a reference sensor, and for each other sensor, the TDOA measurement is obtained with respect to ...
An Incentive Mechanism for Sustainable Blockchain Storage
Miners in a blockchain system are suffering from ever-increasing storage costs, which in general have not been properly compensated by the users’ transaction fees. This reduces the incentives for the miners’ participation and may jeopardize ...
Multi-Associated Parameters Aggregation-Based Routing and Resources Allocation in Multi-Core Elastic Optical Networks
Space division multiplexing (SDM), as a potential means of enhancing the capacity of optical transmission systems, has attracted widespread attention. However, the adoption of SDM technology has also additionally increased resource dimensions, introduced ...
Disrupting the SDN Control Channel via Shared Links: Attacks and Countermeasures
Software-Defined Networking (SDN). SDN enables network innovations with a centralized controller controlling the whole network through the control channel. Because the control channel delivers all network control traffic, its security and reliability are ...
A Theoretical Framework for Random Access: Stability Regions and Transmission Control
As one of the two fundamental types of multiple access, random access has been widely adopted in various communication networks, and expected to play an increasingly central role owing to the rising popularity of Machine-to-Machine (M2M) communications. ...
Accelerating Federated Learning via Parallel Servers: A Theoretically Guaranteed Approach
With the growth of participating clients, the centralized parameter server (PS) will seriously limit the scale and efficiency of Federated Learning (FL). A straightforward approach to scale up the FL system is to construct a Parallel FL (PFL) system with ...
Deficit Round-Robin: A Second Network Calculus Analysis
Deficit Round-Robin (DRR) is a widespread scheduling algorithm that provides fair queueing with variable-length packets. Bounds on worst-case delays for DRR were found by Boyer et al., who used a rigorous network calculus approach and characterized the ...
Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers
Crowdsensing is an emerging paradigm of ubiquitous sensing, through which a crowd of workers are recruited to perform sensing tasks collaboratively. Although it has stimulated many applications, an open fundamental problem is how to select among a massive ...
SAFE-ME: Scalable and Flexible Policy Enforcement in Middlebox Networks
The past decades have seen a proliferation of middlebox deployment in various scenarios, including backbone networks and cloud networks. Since flows have to traverse specific service function chains (SFCs) for security and performance enhancement, it ...
Charging Path Optimization in Mobile Networks
We study a class of generic charging path optimization problems arising from emerging networking applications, where mobile chargers are dispatched to deliver energy to mobile agents (e.g., robots, drones, vehicles), which have specified tasks and ...
DeepCC: Bridging the Gap Between Congestion Control and Applications via Multiobjective Optimization
The increasingly complicated and diverse applications have distinct network performance demands, e.g., some desire high throughput while others require low latency. Traditional congestion controls (CC) have no perception of these demands. Consequently, ...
Overbooking-Empowered Computing Resource Provisioning in Cloud-Aided Mobile Edge Networks
Conventional computing resource trading over mobile networks generally faces many challenges, e.g., excessive decision-making latency, undesired trading failures, and underutilization of dynamic resources, owing to the constraint of wireless networks. To ...
Locating Link Failures in WSNs via Cluster Consensus and Graph Decomposition
With the popularization of network equipment and the rapid development of information technology, the scale and complexity of wireless sensor networks (WSNs) continue to expand. How to effectively locate link failures has become a challenging problem in ...
Fresh Caching of Dynamic Content Over the Wireless Edge
We introduce a framework and provably-efficient schemes for ‘fresh’ caching at the (front-end) local cache of content that is subject to ‘dynamic’ updates at the (back-end) database. We start by formulating the hard-cache-...
Tagcaster: Activating Wireless Voice of Electronic Toll Collection Systems With Zero Start-Up Cost
This work enhances the machine-to-human communication between electronic toll collection (ETC) systems and drivers by providing an AM broadcast service to deployed ETC systems. This study is the first to show that ultra-high radio frequency identification ...
A Tale of Three Videoconferencing Applications: Zoom, Webex, and Meet
Since the outbreak of the COVID-19 pandemic, videoconferencing has become the default mode of communication in our daily lives at homes, workplaces and schools, and it is likely to remain an important part of our lives in the post-pandemic world. Despite ...