Mobile Internet is one of the most popular networks in the world. Constructing the physical structure of mobile Internet is the key to modeling the network. The existing studies of fixed Internet are not suitable for ...
详细信息
ISBN:
(纸本)9781849198196
Mobile Internet is one of the most popular networks in the world. Constructing the physical structure of mobile Internet is the key to modeling the network. The existing studies of fixed Internet are not suitable for mobile Internet and a deep understanding of traffic graph in mobile Internet is required. In this paper, we construct a user-server network graphs from the complete flow records of mobile Internet collected from our self-developed equipment deployed in southern China. We investigate the characteristics of the properties of Web, IM and overall traffic as the complex network point of view. Different types of traffic have different characteristics. In addition, node degree and node strength distribution of servers show that mobile network follow the power law, however, node degree and node strength distribution of users do not possess the power law property. We further study the distributions of average strength for each edge of node which follow the power law, and find the regular pattern of exponents for different applications. These discoveries could be used by the ISPs and researchers to optimize the deployment of network resources and enhance the security of the network and the Quality of Services(QoS).
Opportunistic spectrum access (OSA) is a promising method to improve the spectrum utilization. In this paper, we propose a weighted power control approach to further exploit the flexibility of OSA. We first give the d...
详细信息
We proposed a novel blocking probability (BP) balance scheme called BPB to improve SLICE network performance under dynamic traffic, by not only considering network's average BP value but also balancing each node...
详细信息
Recently, there have been many mo- bile value-added services in the Chinese mo- bile telecommunication market nowadays. Am- ong them, the characteristics of Multimedia Mes- saging Service (MMS) have not yet been ful...
详细信息
Recently, there have been many mo- bile value-added services in the Chinese mo- bile telecommunication market nowadays. Am- ong them, the characteristics of Multimedia Mes- saging Service (MMS) have not yet been fully understood. In this paper, with the help of a cloud computing platform, we investigated the flow-level charactefistcs of Chinese MMS. All of the experimental data were collected by the TMS equipment deployed in a major node in Sou- them China. The collection time spanned six mo- nths. We performed high-level analysis to show the basic distributions of MMS characteristics. Then, by analysing the detailed MMS features, we determined the distribution of personal MMS, and made a comprehensive comparison between 2G and 3G MMS. Finally, we tried to build a model on the personal MMS inter-arrival time, and we found that the Weibull distribution was optimum.
For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This pa...
详细信息
For Peer-to-Peer (P2P) streaming services in mobile networks, the selection of appropriate neighbour peers from candidate peers with demanding data is an important approach to improve Quality-of-Service (QoS). This paper proposes a novel Effective Capacity Peer Selection (ECPS) scheme based on effective capacity. In the ECPS scheme, the neighbour peer selection problem was modeled using the Multiple Attribute Decision Making (MADM) theory, which considered multiple factors of candidate peers, including Signal to Interference and Noise Ratio (SINR), residency time, power level, security, moving speed, and effective capacity. This model could increase the suitability of ECPS for wireless mobile environments. Then, the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) was used to solve the MADM problem and identify the preferred neighbour peers. Simulation results show that the ECPS scheme can improve the network throughput, reduce packet delay by about 82%, and almost double the packet delivery ratio of the mobile P2P streaming service.
RETE is the most efficient forward inference algorithm for the development of context-aware rule-based systems. The performance of context reasoning engines in context-aware systems depends mainly on the efficiency of...
详细信息
The interference problem is a bottleneck of femtocell development as more and more femtocells are deployed. This paper considers interference from macro-cell as well as femtocells and puts forward a novel interference...
详细信息
ISBN:
(纸本)9781849198196
The interference problem is a bottleneck of femtocell development as more and more femtocells are deployed. This paper considers interference from macro-cell as well as femtocells and puts forward a novel interference avoidance scheme. The proposed scheme employs cognitive radio technology which can sniff the resources usage to obtain the real-time environment information, and then allocates the frequency resources to femtocell network. In this way, interference mitigation is fulfilled. Simulations verify that the proposed scheme is able to achieve higher capacity and lower interference than the classical dedicated channel and co-channel deployment schemes.
This paper proposes a novel parametric channel estimation approach for orthogonal frequency-division multiplexing (OFDM) systems. The method is composed of two parts: estimation of channel parameters and estimation of...
详细信息
ISBN:
(纸本)9781849197298
This paper proposes a novel parametric channel estimation approach for orthogonal frequency-division multiplexing (OFDM) systems. The method is composed of two parts: estimation of channel parameters and estimation of channel coefficients. The exponentially embedded family (EEF) criterion is exploited to determine the number of channel paths as well as the multipath time delays. Based on these parameters, channel frequency responses are estimated. Additionally, our scheme is computational efficient due to the needless of eigenvalue decomposition (EVD) or the estimation of signal parameters by rotational invariance technique (ESPRIT). Simulations are provided to validate the performance of our algorithm from the perspectives of channel parameter error probability (CPEP) and mean square error (MSE).
Caching scheme will change the original feature of the network in Content Centric networking (CCN). So it becomes a challenge to describe the caching node importance according to network traffic and user behavior. In ...
详细信息
ISBN:
(纸本)9781849198196
Caching scheme will change the original feature of the network in Content Centric networking (CCN). So it becomes a challenge to describe the caching node importance according to network traffic and user behavior. In this work, a new metric named Request Influence Degree (RID) is defined to reflect the degree of node importance. Then the caching performance of CCN has been addressed with specially focusing on the size of individual CCN router caches. Finally, a newly content store space heterogeneous allocation scheme based on the metric RID across the CCN network has been proposed. Numerical experiments reveal that the new scheme can decrease the routing stretch and the source server load contrasting that of the homogeneous assignment and several graph-related centrality metrics allocations.
We present a fundamentally different approach to improve the security of cloud storage. In contrast to previous methods, our approach introduces third party trusted timestamp and certificate into Cloud storage framewo...
详细信息
ISBN:
(纸本)9781849198196
We present a fundamentally different approach to improve the security of cloud storage. In contrast to previous methods, our approach introduces third party trusted timestamp and certificate into Cloud storage framework. And user's request is multiply validated. There are three main aspects. (i) Certificate identifies the user's identity;(ii) Trusted timestamp is added to the user's operation request;(iii) Cloud storage system communicates with TSA and Directory server for user information verification. Furthermore, our approach has two important features. First, we use PKI technology to improve cloud storage system security, and through Directory server to authenticate the user certificate status. Second, Cloud storage vets user's operation requests based on trusted timestamps and stores user's operation records, which can provide security services including safety audit, electronic evidence and other services. Our results show that our mechanism can vet and monitor various types of data operations in cloud storage system under the premise of increasing a very small overhead, and the security of cloud storage has greatly enhanced.
暂无评论