Networking and Internet Architecture (cs.NI)

  • PDF
    Autonomous vehicles can construct a more accurate perception of their surrounding environment by exchanging rich sensor data with nearby vehicles. Such exchange can require larger bandwidths than currently provided by ITS-G5/DSRC and Cellular V2X. Millimeter wave (mmWave) communications can provide higher bandwidth and could complement current V2X standards. Recent studies have started investigating the potential of IEEE 802.11ad to support high bandwidth vehicular communications. This paper introduces the first performance evaluation of the IEEE 802.11ad MAC (Medium Access Control) and beamforming mechanism for mmWave V2V communications. The study highlights existing opportunities and shortcomings that should guide the development of mmWave communications for V2V communications.
  • PDF
    Public safety networks avail to disseminate information during emergency situations through its dedicated servers. Public safety networks accommodate public safety communication (PSC) applications to track the location of its utilizers and enable to sustain transmissions even in the crucial scenarios. Despite that, if the traditional setups responsible for PSCs are unavailable, it becomes prodigiously arduous to handle any of the safety applications, which may cause havoc in the society. Dependence on a secondary network may assist to solve such an issue. But, the secondary networks should be facilely deployable and must not cause exorbitant overheads in terms of cost and operation. For this, LoRaWAN can be considered as an ideal solution as it provides low power and long-range communication. However, an excessive utilization of the secondary network may result in high depletion of its own resources and can lead to a complete shutdown of services, which is a quandary at hand. As a solution, this paper proposes a novel network model via a combination of LoRaWAN and traditional public safety networks, and uses a self-enforcing agreement based game theory for allocating resources efficiently amongst the available servers. The proposed approach adopts memory and energy constraints as agreements, which are satisfied through Nash equilibrium. The numerical results show that the proposed approach is capable of efficiently allocating the resources with sufficiently high gains for resource conservation, network sustainability, resource restorations and probability to continue at the present conditions even in the complete absence of traditional Access Points (APs) compared with a baseline scenario with no failure of nodes.
  • PDF
    This letter characterizes the optimal policies for bandwidth use and storage for the problem of distributed storage in Internet of Things (IoT) scenarios, where lost nodes cannot be replaced by new nodes as is typically assumed in Data Center and Cloud scenarios. We develop an information flow model that captures the overall process of data transmission between IoT devices, from the initial preparation stage (generating redundancy from the original data) to the different repair stages with fewer and fewer devices. Our numerical results show that in a system with 10 nodes, the proposed optimal scheme can save as much as 10.3% of bandwidth use, and as much as 44% storage use with respect to the closest suboptimal approach.
  • PDF
    Dense deployments of Small Cells are required to deliver the capacity promised by 5G networks. In this paper we present SWAM, a system that builds on commodity Wi-Fi routers with multiple wireless interfaces to provide a wireless access infrastructure supporting multi-tenancy, mobility, and integrated wireless access and backhaul. An infrastructure provider can deploy inexpensive SWAM nodes to cover a given geographical area, and re-sell this capacity to provide on-demand connectivity for Mobile Network Operators. Our main contribution is the design of the SWAM datapath and control plane, which are inspired by the overlay techniques used to enable multi-tenancy in data-center networks. We prototype SWAM in an office wireless testbed, and validate experimentally its functionality.
  • PDF
    A perennial question in computer networks is where to place functionality among components of a distributed computer system. In data centers, one option is to move all intelligence to the edge, essentially relegating switches and middleboxes, regardless of their programmability, to simple static routing policies. Another is to add more intelligence to the middle of the network in the hopes that it can handle any issue that arises. This paper presents an architecture, called Volur, that provides a third option by facilitating the co-existence of an intelligent network with an intelligent edge. The key architectural principle of Volur is predictability of the network. We describe the key design requirements, and show through case studies how our approach facilitates more democratic innovation of all parts of the network. We also demonstrate the practicality of our architecture by describing how to implement the architecture on top of existing hardware and by deploying a prototype on top of a large production data center.

Recent comments

Aram Harrow Mar 19 2013 02:59 UTC

The original quantum Pagerank paper used adiabatic evolution, and this one uses the Szegedy walk. I wonder how the methods compare.

Another thing I'd like someone to figure out at some point is whether these can be done using resources scaling like poly log(# vertices) for power law graphs. T

...(continued)