Event Category: External Presentation (External Speaker)

Value of Information in Optimal Flow-Level Scheduling of Users with Markovian Time-Varying Channels

In this paper we design, characterize in closed-form, and evaluate a new index rule for Markovian time-varying channels, which gives rise to a simple opportunistic scheduling rule for flow-level scheduling in wireless downlink systems. For user channels we employ the Gilbert-Elliot model with a flow-level interpretation: the channel condition follows a general two-state Markov chain with distinct probabilities of finishing the flow transmission.

Read more arrow_right_alt

10 Lessons from 10 Years of Measuring and Modeling the Internet's Autonomous Systems

Formally, the Internet inter-domain routing system is a collection of networks, their policies, peering relationships and organizational affiliations, and the addresses they advertize. It also includes components like Internet exchange points. By its very definition, each and every aspect of this system is impacted by BGP, the de-facto standard inter-domain routing protocol.

Read more arrow_right_alt

iBGP Deceptions: More Sessions, Fewer Routes

Internal BGP (iBGP) is used to distribute interdomain routes within a single ISP. The interaction between iBGP and the underlying IGP can lead to routing and forwarding anomalies. For this reason, several research contributions aimed at defining sufficient conditions to guarantee anomaly-free configurations and providing design guidelines for network operators.

Read more arrow_right_alt

Corridor-based routing using opportunistic forwarding in OFDMA multi-hop networks

In multi-hop networks, conventional unipath routing approaches force the data transmission to follow a fixed sequence of nodes. In this talk, we widen this path to create a corridor of forwarding nodes. Within this corridor, data can be split and joined at different nodes as the data travels through the corridor towards the destination node. To split data, decode-and forward OFDMA is used since with OFDMA, one can exploit the benefits of opportunistically allocating different subcarriers to different nodes according to their channel conditions. To avoid interference, each subcarrier is only allocated once per hop. For the presented scheme, the problem of optimizing the network throughput by means of resource and power allocation is formulated and two suboptimal algorithms are proposed to solve this problem with feasible effort. Simulations show that in multi-hop networks corridor-based routing using opportunistic forwarding outperforms conventional unipath routing approaches in terms of achievable throughput.

Read more arrow_right_alt

The Next Generation Wireless Sensor Network Challenges for an Emergency Preparedness and Response Class of Applications: A Necessary Public Safety and Security

Wireless sensor network and wireless multimedia network technologies combined with interactive 3D virtual visualization can converge into really interesting and functional applications such as detailed real-time monitoring of environments, emergency response and preparedness, distributed collaborative training, and remote walkthroughs, just to name a few examples. With the recent advances in wireless communication, and the proliferation of portable computer and micro-sensor devices, we are witnessing a growing interest in using wireless multimedia sensor networks and collaborative virtual environment technologies for safety and security class of applications.

Read more arrow_right_alt

Silver-lining: a firsthand vision of launching a technological start-up

Vishal Misra together with Dan Rubinstein launched at the beginning of 2011 the company Silver Lining. This company is a very ambitious tech start-up arising from two professors of Columbia University, and has already attracted a lot of interest and a substantial amount of funding from investors. Silver Lining is developing a very advanced product in the area of content distribution networks that is expected to have high impact. Vishal Misra, co-founder and its current CEO, will give a first-hand account on the development of this interesting initiative.

Read more arrow_right_alt

All-path and Torii-HLMAC: beyond link-state routing protocols in shortest path bridges for campus and data center networks

The dominant paradigm in both IETF and IEEE 802.1 standards for shortest path bridges is based on link-state routing in layer two. This results on hybrid devices of router and switch.

Read more arrow_right_alt

Technique for Indoor Position Location of Wireless LAN Clients

If you would like more information about James Aweya, please visit his homepage.

Read more arrow_right_alt

On Security and Quality of Service in Multihop Wireless Networks

On Security and Quality of Service in Multihop Wireless Networks Mobile Ad hoc Networks, Wireless Mesh Networks and Wireless Sensor Networks have attracted remarkable attention in the research community in recent years. Fashioned from whatever devices are immediately available, the self-organizing nature of these networks promises spontaneous, untethered communication in absence of infrastructure, or the organic growth of wireless meshed networks. However, the fact that ad hoc and mesh networks are not yetdeployed at large indicates that they are not ready for prime time. This talk discusses selected issues in the area of quality of service and security for multihop wireless networks. We start with an overview on the work carried out at the Mobile Networking & Ubiquitous Communications group at Technische Universität Darmstadt, Germany.

Read more arrow_right_alt

Delay Tolerant Bulk Data Transfers on the Internet or how to book some terabytes on "red-eye" bandwidth

Many emerging scientific and industrial applications require transferring multiple terabytes of data on a daily basis. Examples include pushing scientific datasets from particle accelerators/colliders to laboratories around the world, synchronizing data centers in different continents, and replicating collections of high definition videos from Olympic Games, taking Location on a different time-zone. A convenient property of all above applications is their ability to tolerate delivery delays from a few hours to a few days. Such Delay-Tolerant Bulk (DTB) transfers are currently being serviced through the postal system using hard drives and DVDs, or through expensive dedicated networks.

Read more arrow_right_alt

Recent Comments

    Archives

    Categories