We gratefully acknowledge support from
the Simons Foundation and member institutions.

Networking and Internet Architecture

New submissions

[ total of 10 entries: 1-10 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Fri, 24 Jan 20

[1]  arXiv:2001.08253 [pdf, other]
Title: To schedule or not to schedule: when no-scheduling can beat the best-known flow scheduling algorithm in datacenter networks
Subjects: Networking and Internet Architecture (cs.NI)

Conventional wisdom for minimizing the average flow completion time (AFCT) in the datacenter network (DCN), where flow sizes are highly variable, would suggest scheduling every individual flow. However, we show that considering scheduling delay (including scheduler's computational and communication delays), serving most of the flows without any scheduling and only in first-come-first-served (FCFS) manner significantly improves their performance even when it is compared to the shortest remaining processing time (SRPT)-known as optimum algorithm when scheduling delay is zero. To do so, we only require to have two coarse classes of flows categorized based on flows' sizes (1st-class including flows smaller than a threshold, H, and 2nd-class including others) and serve 1st-class flows always before serving 2nd-class ones. To show that, we take SRPT scheduling algorithm accompanied by the global knowledge of flows, formulate impact of scheduling delay on its performance, and prove that for any flow size distribution and network load (<1), there is always a threshold, H, which guarantees 1st-class flows achieve lower AFCT under FCFS compared to SRPT. Our numerically calculated results and extensive flow-level simulations show that on average, more than 90% of flows could be in 1st-class and consequently do not require any scheduling.

[2]  arXiv:2001.08288 [pdf, ps, other]
Title: Characterizing Smart Home IoT Traffic in the Wild
Comments: 12 pages, to be published in IoTDI 2020
Subjects: Networking and Internet Architecture (cs.NI)

As the smart home IoT ecosystem flourishes, it is imperative to gain a better understanding of the unique challenges it poses in terms of management, security, and privacy. Prior studies are limited because they examine smart home IoT devices in testbed environments or at a small scale. To address this gap, we present a measurement study of smart home IoT devices in the wild by instrumenting home gateways and passively collecting real-world network traffic logs from more than 200 homes across a large metropolitan area in the United States. We characterize smart home IoT traffic in terms of its volume, temporal patterns, and external endpoints along with focusing on certain security and privacy concerns. We first show that traffic characteristics reflect the functionality of smart home IoT devices such as smart TVs generating high volume traffic to content streaming services following diurnal patterns associated with human activity. While the smart home IoT ecosystem seems fragmented, our analysis reveals that it is mostly centralized due to its reliance on a few popular cloud and DNS services. Our findings also highlight several interesting security and privacy concerns in smart home IoT ecosystem such as the need to improve policy-based access control for IoT traffic, lack of use of application layer encryption, and prevalence of third-party advertising and tracking services. Our findings have important implications for future research on improving management, security, and privacy of the smart home IoT ecosystem.

[3]  arXiv:2001.08489 [pdf, other]
Title: WoV: WiFi-based VLC testbed
Subjects: Networking and Internet Architecture (cs.NI)

We present a complete Visible Light Communications (VLC) transceiver system consisting of low-cost Commercial-Off-The-Shelf (COTS) components. In particular, we show that COTS IEEE 802.11n (WiFi) devices can be used so that the physical and data link layers of radio frequency (RF) WiFi, i.e. 2.4 GHz, are reused for VLC. Moreover, as WiFi is fully integrated with the Linux system, higher protocols from network to transport and application layer can be used and tested in VLC-related experiments. Our approach has the advantage that a VLC experimenter can fully focus on VLC-related low-level aspects like the design of novel VLC front-ends, e.g. LED drivers, lenses, and photodetectors and test their impact directly on the full network protocol stack in an end-to-end manner with real applications like adaptive video streaming. We present first results from experiments using our prototype showing the performance of unidirectional VLC transmission. Here we analyze the distortions introduced as well as the relationship between signal strength on frame error rate for different MCS and the maximum communication distance. Experimental results reveal that a data rate of up to 150 Mbps is possible over short ranges.

[4]  arXiv:2001.08495 [pdf, ps, other]
Title: Congestion Control Mechanisms in IEEE 802.11p and Sidelink C-V2X
Authors: Alessandro Bazzi
Subjects: Networking and Internet Architecture (cs.NI)

Connected vehicles are expected to play a major role in the next future to improve safety and traffic efficiency on the road and short-range technologies have been defined to enable the direct exchange of information. To this aim, two solutions are currently the subject of a debate that goes beyond the technician, i.e., IEEE 802.11p and sidelink cellular-vehicle-to-anything (C-V2X). Tested and mature for deployment the first, possibly more efficient the second. In both cases, one of the main aspects is the management of channel congestions, which can cause serious packet losses and have a critical impact on the reliability of applications. Congestions can be managed through different approaches, including the control of transmission power, packet generation frequency, and the adopted modulation and coding scheme. Congestion management has been well studied in IEEE 802.11p, with consolidated algorithms included in the standards, whereas it appears somehow as a new topic looking at C-V2X. In this work, a review of the main congestion control mechanisms and a discussion of their applicability and efficiency in the two technologies is provided. This topic is addressed without focusing on specific algorithms and with the aim to provide general guidelines as a starting point for new proposals.

[5]  arXiv:2001.08557 [pdf, other]
Title: Synchronous Transmissions in Low-Power Wireless: A Survey of Communication Protocols and Network Services
Comments: Submitted to ACM Computing Surveys
Subjects: Networking and Internet Architecture (cs.NI); Distributed, Parallel, and Cluster Computing (cs.DC); Systems and Control (eess.SY)

Low-power wireless communication is a central building block of Cyber-physical Systems and the Internet of Things. Conventional low-power wireless protocols make avoiding packet collisions a cornerstone design choice. The concept of synchronous transmissions challenges this view. As collisions are not necessarily destructive, under specific circumstances, commodity low-power wireless radios are often able to receive useful information even in the presence of superimposed signals from different transmitters. We survey the growing number of protocols that exploit synchronous transmissions for higher robustness and efficiency as well as unprecedented functionality and versatility compared to conventional designs. The illustration of protocols based on synchronous transmissions is cast in a conceptional framework we establish, with the goal of highlighting differences and similarities among the proposed solutions. We conclude the paper with a discussion on open research questions in this field.

[6]  arXiv:2001.08684 [pdf, other]
Title: Discovering the IPv6 Network Periphery
Subjects: Networking and Internet Architecture (cs.NI)

We consider the problem of discovering the IPv6 network periphery, i.e., the last hop router connecting endhosts in the IPv6 Internet. Finding the IPv6 periphery using active probing is challenging due to the IPv6 address space size, wide variety of provider addressing and subnetting schemes, and incomplete topology traces. As such, existing topology mapping systems can miss the large footprint of the IPv6 periphery, disadvantaging applications ranging from IPv6 census studies to geolocation and network resilience. We introduce "edgy," an approach to explicitly discover the IPv6 network periphery, and use it to find >~64M IPv6 periphery router addresses and >~87M links to these last hops -- several orders of magnitude more than in currently available IPv6 topologies. Further, only 0.2% of edgy's discovered addresses are known to existing IPv6 hitlists.

Cross-lists for Fri, 24 Jan 20

[7]  arXiv:2001.08259 (cross-list from eess.SP) [pdf, other]
Title: Energy-Efficient Offloading in Delay-Constrained Massive MIMO Enabled Edge Network Using Data Partitioning
Authors: Rafia Malik, Mai Vu
Subjects: Signal Processing (eess.SP); Networking and Internet Architecture (cs.NI); Optimization and Control (math.OC)

We study a wireless edge-computing system which allows multiple users to simultaneously offload computation-intensive tasks to multiple massive-MIMO access points, each with a collocated multi-access edge computing (MEC) server. Massive-MIMO enables simultaneous uplink transmissions from all users, significantly shortening the data offloading time compared to sequential protocols, and makes the three phases of data offloading, computing, and downloading have comparable durations. Based on this three-phase structure, we formulate a novel problem to minimize a weighted sum of the energy consumption at both the users and the MEC server under a round-trip latency constraint, using a combination of data partitioning, transmit power control and CPU frequency scaling at both the user and server ends. We design a novel nested primal-dual algorithm using two different methods to solve this problem efficiently. Optimized solutions show that for larger requests, more data is offloaded to the MECs to reduce local computation time in order to meet the latency constraint, despite higher energy cost of wireless transmissions. Massive-MIMO channel estimation errors under pilot contamination also causes more data to be offloaded to the MECs. Compared to binary offloading, partial offloading with data partitioning is superior and leads to significant reduction in the overall energy consumption.

[8]  arXiv:2001.08541 (cross-list from physics.soc-ph) [pdf]
Title: Characterizing cycle structure in complex networks
Comments: 12 pages, 5 figures and 3 tables
Subjects: Physics and Society (physics.soc-ph); Networking and Internet Architecture (cs.NI); Combinatorics (math.CO); Data Analysis, Statistics and Probability (physics.data-an)

The ubiquitous existence of cycles is one of important originations of network complexity, as cycle is the simplest structure that brings redundant paths in connectivity and feedback effects in dynamics. Hence the in-depth analyses on cycle structure may yield novel insights, metrics, models and algorithms for network science. By measuring the extent to which a node is involved in other nodes' smallest cycles, this paper proposes an index, named cycle ratio, to quantify the importance of individual nodes. Experimental tests on real networks suggest that cycle ratio contains rich information in addition to well-known benchmark indices, that is, the node rankings by cycle ratio are largely different from rankings by degree, H-index and coreness, while the rankings by the three benchmarks are very similar to each other. Further experiments show that cycle ratio performs overall better than the three benchmarks in identifying critical nodes that maintain network connectivity and facilitate network synchronization.

[9]  arXiv:2001.08585 (cross-list from eess.SP) [pdf]
Title: Explosive Material Detection and Security Alert System (e-DASS)
Comments: 6 pages, 6 figures
Subjects: Signal Processing (eess.SP); Networking and Internet Architecture (cs.NI)

The terrorism rate in Pakistan becomes higher even after the advancement of information technology. Especially APS Attack and numerous other in different part of country. The root cause of such attacks as according to our research is as: terrorists utilizing the benefit of lack of a full proof security check system. Traditional explosive detection systems are large in size, expensive and require manual attention. These systems are not much useful due to its public visibility intruder or terrorists can easily bypass the system using another route. This term paper is mainly focusing on explosive material detection using IoT with WSN. Explosive Material Detection and security alert system (e-DASS) consists of several hundreds of nodes depending upon the geographical area we are going to cover. Each node should be able to communicate with the other node and update the information if necessary. Tracking of the target can be done in an easier and faster way because all the nodes are synchronized. (e-DASS) is a power efficient explosive detection system. Most of the times nodes will be in the idle state, unless and until positive presence of an explosive is found.

[10]  arXiv:2001.08586 (cross-list from eess.SP) [pdf]
Title: Integrated Mobile Solutions in an Internet-of-Things Development Model
Authors: Issam Damaj (1), Safaa Kasbah (2) ((1) Rafik Hariri University, (2) Lebanese American University)
Comments: 31 pages, 16 figures, 3 tables
Journal-ref: EAI/Springer Innovations in Communications and Computing, Springer, Netherlands, (2019)3-31
Subjects: Signal Processing (eess.SP); Networking and Internet Architecture (cs.NI)

The Internet-of-Things (IoT) is a revolutionary technology that is rapidly changing the world. IoT systems strive to provide automated solutions for almost every life aspect; traditional devices are becoming connected, ubiquitous, pervasive, wireless, context-aware, smart, controlled through mobile solutions, to name but a few. IoT devices can now be found in our apartments, places of work, cars, buildings, and in almost every aspect of life. In this investigation, we propose an IoT system Development Model (IDM). The proposed IDM enables the development of IoT systems from concept to prototyping. The model comprises concept refinement pyramids, decision trees, realistic constraint lists, architecture and organization diagrams, communication interface patterns, use cases, and menus of analysis metrics and evaluation indicators. The investigation confirms that the proposed model enjoys several properties, such as, clarity, conciseness, thoroughness, productivity, etc. The model is deployed for a variety of systems that belong to heterogeneous areas of application; the model is proven to be effective in application and successful in integrating mobile solutions. This chapter includes the presentation of the IDM submodels, the reasoning about their usefulness, and the technical developments of several systems. The chapter includes thorough discussions, analysis of the model usability and application, and in-depth evaluations.

[ total of 10 entries: 1-10 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2001, contact, help  (Access key information)