Featured Researches

Networking And Internet Architecture

A Game-Theoretic Drone-as-a-Service Composition for Delivery

We propose a novel game-theoretic approach for drone service composition considering recharging constraints. We design a non-cooperative game model for drone services. We propose a non-cooperative game algorithm for the selection and composition of optimal drone services. We conduct several experiments on a real drone dataset to demonstrate the efficiency of our proposed approach.

Read more
Networking And Internet Architecture

A General Framework for Charger Scheduling Optimization Problems

This paper presents a general framework to tackle a diverse range of NP-hard charger scheduling problems, optimizing the trajectory of mobile chargers to prolong the life of Wireless Rechargeable Sensor Network (WRSN), a system consisting of sensors with rechargeable batteries and mobile chargers. Existing solutions to charger scheduling problems require problem-specific design and a trade-off between the solution quality and computing time. Instead, we observe that instances of the same type of charger scheduling problem are solved repeatedly with similar combinatorial structure but different data. We consider searching an optimal charger scheduling as a trial and error process, and the objective function of a charging optimization problem as reward, a scalar feedback signal for each search. We propose a deep reinforcement learning-based charger scheduling optimization framework. The biggest advantage of the framework is that a diverse range of domain-specific charger scheduling strategy can be learned automatically from previous experiences. A framework also simplifies the complexity of algorithm design for individual charger scheduling optimization problem. We pick three representative charger scheduling optimization problems, design algorithms based on the proposed deep reinforcement learning framework, implement them, and compare them with existing ones. Extensive simulation results show that our algorithms based on the proposed framework outperform all existing ones.

Read more
Networking And Internet Architecture

A Haystack Full of Needles: Scalable Detection of IoT Devices in the Wild

Consumer Internet of Things (IoT) devices are extremely popular, providing users with rich and diverse functionalities, from voice assistants to home appliances. These functionalities often come with significant privacy and security risks, with notable recent large scale coordinated global attacks disrupting large service providers. Thus, an important first step to address these risks is to know what IoT devices are where in a network. While some limited solutions exist, a key question is whether device discovery can be done by Internet service providers that only see sampled flow statistics. In particular, it is challenging for an ISP to efficiently and effectively track and trace activity from IoT devices deployed by its millions of subscribers --all with sampled network data. In this paper, we develop and evaluate a scalable methodology to accurately detect and monitor IoT devices at subscriber lines with limited, highly sampled data in-the-wild. Our findings indicate that millions of IoT devices are detectable and identifiable within hours, both at a major ISP as well as an IXP, using passive, sparsely sampled network flow headers. Our methodology is able to detect devices from more than 77% of the studied IoT manufacturers, including popular devices such as smart speakers. While our methodology is effective for providing network analytics, it also highlights significant privacy consequences.

Read more
Networking And Internet Architecture

A Model for Reliable Uplink Transmissions in LoRaWAN

Long range wide area networks (LoRaWAN) technology provides a simple solution to enable low-cost services for low power internet-of-things (IoT) networks in various applications. The current evaluation of LoRaWAN networks relies on simulations or early testing, which are typically time consuming and prevent effective exploration of the design space. This paper proposes an analytical model to calculate the delay and energy consumed for reliable Uplink (UL) data delivery in Class A LoRaWAN. The analytical model is evaluated using a real network test-bed as well as simulation experiments based on the ns-3 LoRaWAN module. The resulting comparison confirms that the model accurately estimates the delay and energy consumed in the considered environment. The value of the model is demonstrated via its application to evaluate the impact of the number of end-devices and the maximum number of data frame retransmissions on delay and energy consumed for the confirmed UL data delivery in LoRaWAN networks. The model can be used to optimize different transmission parameters in future LoRaWAN networks.

Read more
Networking And Internet Architecture

A Model of WiFi Performance With Bounded Latency

In September 2020, the Broadband Forum published a new industry standard for measuring network quality. The standard centers on the notion of quality attenuation. Quality attenuation is a measure of the distribution of latency and packet loss between two points connected by a network path. A vital feature of the quality attenuation idea is that we can express detailed application requirements and network performance measurements in the same mathematical framework. Performance requirements and measurements are both modeled as latency distributions. To the best of our knowledge, existing models of the 802.11 WiFi protocol do not permit the calculation of complete latency distributions without assuming steady-state operation. We present a novel model of the WiFi protocol. Instead of computing throughput numbers from a steady-state analysis of a Markov chain, we explicitly model latency and packet loss. Explicitly modeling latency and loss allows for both transient and steady-state analysis of latency distributions, and we can derive throughput numbers from the latency results. Our model is, therefore, more general than the standard Markov chain methods. We reproduce several known results with this method. Using transient analysis, we derive bounds on WiFi throughput under the requirement that latency and packet loss must be bounded.

Read more
Networking And Internet Architecture

A New Abstraction for Internet QoE Optimization

A perennial quest in networking research is how to achieve higher quality of experience (QoE) for users without incurring more resources. This work revisits an important yet often overlooked piece of the puzzle: what should the QoE abstraction be? A QoE abstraction is a representation of application quality that describes how decisions affect QoE. The conventional wisdom has relied on developing hand-crafted quality metrics (e.g., video rebuffering events, web page loading time) that are specialized to each application, content, and setting. We argue that in many cases, it maybe fundamentally hard to capture a user's perception of quality using a list of handcrafted metrics, and that expanding the metric list may lead to unnecessary complexity in the QoE model without a commensurate gain. Instead, we advocate for a new approach based on a new QoE abstraction called visual rendering. Rather than a list of metrics, we model the process of quality perception as a user watching a continuous "video" (visual rendering) of all the pixels on their screen. The key advantage of visual rendering is that it captures the full experience of a user with the same abstraction for all applications. This new abstraction opens new opportunities (e.g., the possibility of end-to-end deep learning models that infer QoE directly from a visual rendering) but it also gives rise to new research challenges (e.g., how to emulate the effect on visual rendering of an application decision). This paper makes the case for visual rendering as a unifying abstraction for Internet QoE and outlines a new research agenda to unleash its opportunities.

Read more
Networking And Internet Architecture

A Non-intrusive Failure Prediction Mechanism for Deployed Optical Networks

Failures in optical network backbone can lead to major disruption of internet data traffic. Hence, minimizing such failures is of paramount importance for the network operators. Even better, if the network failures can be predicted and preventive steps can be taken in advance to avoid any disruption in traffic. Various data driven and machine learning techniques have been proposed in literature for failure prediction. Most of these techniques need real time data from the networks and also need different monitors to measure key optical parameters. This means provision for failure prediction has to be available in network nodes, e.g., routers and network management systems. However, sometimes deployed networks do not have failure prediction built into their initial design but subsequently need arises for such mechanisms. For such systems, there are two key challenges. Firstly, statistics of failure distribution, data, etc., are not readily available. Secondly, major changes cannot be made to the network nodes which are already commercially deployed. This paper proposes a novel implementable non-intrusive failure prediction mechanism for deployed network nodes using information from log files of those devices. Numerical results show that the mechanism has near perfect accuracy in predicting failures of individual network nodes.

Read more
Networking And Internet Architecture

A Novel Emergency Light Based Smart Building Solution: Design, Implementation and Use Cases

Deployment of Internet of Things (IoT) in smart buildings has received considerable interest from both the academic community and commercial sectors. Unfortunately, widespread adoption of current smart building solutions is inhibited by the high costs associated with installation and maintenance. Moreover, different types of IoT devices from different manufacturers typically form distinct networks and data silos. There is a need to use a common backbone network that facilitates interoperability and seamless data exchange in a uniform way. In this paper, we present EMIoT, a novel solution for smart buildings that breaks these barriers by leveraging existing emergency lighting systems. In EMIoT, we embed a wireless LoRa module in each emergency light to turn them into wireless routers. EMIoT has been deployed in more than 50 buildings of different types in Sydney Australia and has been successfully running over two years. We present the design and implementation of EMIoT in this paper. Moreover, we use the deployment in a residential building as a use case to show the performance of EMIoT in real-world environments and share lessons learned. Finally, we discuss the advantages and disadvantages of EMIoT. This paper provides practical insights for IoT deployment in smart buildings for practitioners and solution providers.

Read more
Networking And Internet Architecture

A Novel Software-based Multi-path RDMA Solutionfor Data Center Networks

In this paper we propose Virtuoso, a purely software-based multi-path RDMA solution for data center networks (DCNs) to effectively utilize the rich multi-path topology for load balancing and reliability. As a "middleware" library operating at the user space, Virtuoso employs three innovative mechanisms to achieve its goal. In contrast to existing hardware-based MP-RDMA solution, Virtuoso can be readily deployed in DCNs with existing RDMA NICs. It also decouples path selection and load balancing mechanisms from hardware features, allowing DCN operators and applications to make flexible decisions by employing the best mechanisms (as "plug-in" software library modules) as needed. Our experiments show that Virtuoso is capable of fully utilizing multiple paths with negligible CPU overheads

Read more
Networking And Internet Architecture

A Novel Traffic Rate Measurement Algorithm for QoE-Aware Video Admission Control

With the inevitable dominance of video traffic on the Internet, providing perceptually good video quality is becoming a challenging task. This is partly due to the bursty nature of video traffic, changing network conditions and limitations of network transport protocols. This growth of video traffic has made Quality of Experience (QoE) of the end user the focus of the research community. In contrast, Internet service providers are concerned about maximizing revenue by accepting as many sessions as possible, as long as customers remain satisfied. However, there is still no entirely satisfactory admission algorithm for flows with variable rate. The trade-off between the number of sessions and perceived QoE can be optimized by exploiting the bursty nature of video traffic. This paper proposes a novel algorithm to determine the upper limit of the aggregate video rate that can exceed the available bandwidth without degrading the QoE of accepted video sessions. A parameter β that defines the exceedable limit is defined. The proposed algorithm results in accepting more sessions without compromising the QoE of on-going video sessions. Thus it contributes to the optimization of the QoE-Session trade-off in support of the expected growth of video traffic on the Internet.

Read more

Ready to get started?

Join us today