Filters








456 Hits in 8.9 sec

Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis

Fabio Ricciato, Francesco Vacirca, Philipp Svoboda
2007 Computer Networks  
In this work we address the problem of inferring the presence of a capacity bottleneck from passive measurements in a 3G network.  ...  The study is based on one month of packet traces collected in the UMTS core network of mobilkom austria AG & Co KG, the leading mobile telecommunications provider in Austria, EU.  ...  This study is based on several weeks of packet traces collected by passive monitoring the core network links of a large operational 3G network (mobilkom austria AG & Co KG, the leading mobile operator  ... 
doi:10.1016/j.comnet.2006.07.011 fatcat:klh4it6cmndo7ezzqargb2ls6i

Challenges in 5G: how to empower SON with big data for enabling 5G

Ali Imran, Ahmed Zoha
2014 IEEE Network  
Finally, we demonstrate the key concepts of our proposed BSON framework through a case study of a problem that the classic 3G/4G SON fails to solve.  ...  To cope with similar challenges in the context of 3G and 4G networks, recently, self-organizing networks, or SONs, have been researched extensively.  ...  Acknowledgment This work was made possible by NPRP grant No. 5-1047-2-437 from the Qatar National Research Fund (a member of The Qatar Foundation).  ... 
doi:10.1109/mnet.2014.6963801 fatcat:yfsizqlazvanjo4uxhkhvwemia

Analysis and Measurement of TCP/IP Performance over GPRS Networks [chapter]

L. Benetazzo, M. Bertocco, C. Narduzzi, R. Tittoto
2003 Lecture Notes in Computer Science  
Mobile networks implement sophisticated mechanisms in order to provide mobility and capacity in a wide area.  ...  The paper focuses its attention on a set of phenomena (excess queuing, delay spikes, redundant retransmissions and bandwidth oscillations) that were observed in real mobile GPRS systems.  ...  The authors would like to acknowledge the support granted by Tektronix Padova S.p.a. for the studies reported in this work.  ... 
doi:10.1007/978-3-540-39867-7_28 fatcat:nzyjvbvm7fbspkxk5eppcw7iii

Traffic monitoring and analysis in 3G networks: lessons learned from the METAWIN project

F. Ricciato, P. Svoboda, J. Motz, W. Fleischer, M. Sedlak, M. Karner, R. Pilz, P. Romirer-Maierhofer, E. Hasenleithner, W. Jäger, P. Krüger, F. Vacirca (+1 others)
2006 e & i Elektrotechnik und Informationstechnik  
In this article the main lessons are summarized learned from a two-year research activity on traffic monitoring and analysis on top of an operational 3G network.  ...  A 3G network is a magnificently complex object embedded in a highly heterogeneous and ever-changing usage environment.  ...  A mobile 3G network combines two different paradigms: cellular and IP.  ... 
doi:10.1007/s00502-006-0362-y fatcat:oduiq23v4ff5dpbx72pkst2qri

Big data analytics for wireless and wired network design: A survey

Mohammed S. Hadi, Ahmed Q. Lawey, Taisir E.H. El-Gorashi, Jaafar M.H. Elmirghani
2018 Computer Networks  
In this paper, we conduct a survey on the role that big data analytics can play in the design of data communication networks.  ...  Third, there is a detailed review of the current academic and industrial efforts toward network design using big data analytics.  ...  The Wireless Network Guardian detects user anomalies in mobile networks where a comparable topic was discussed in [110] .  ... 
doi:10.1016/j.comnet.2018.01.016 fatcat:xqjwzzeww5c3bhyv3yrpuhsgye

Exploratory approach for network behavior clustering in LoRaWAN

Domenico Garlisi, Alessio Martino, Jad Zouwayhed, Reza Pourrahim, Francesca Cuomo
2021 Journal of Ambient Intelligence and Humanized Computing  
Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies.  ...  We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database.  ...  We also thank Jacopo Maria Valtorta for having started with us this kind of study in our previous work (Valtorta et al. 2019) .  ... 
doi:10.1007/s12652-021-03121-z fatcat:bz2ey5j2f5h5vgdhhe2zadc3pm

RAMS: A Protocol Extension to PMIPv6 for Improving Handover Performance of Multicast Traffic

Luis M. Contreras, Carlos Jesus Bernardos, Ignacio Soto
2011 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
Ricciato, “Towards anomaly detection in one-way delay measurements for 3G mobile networks: A preliminary study,” in Proc. of the 8th IEEE international workshop on IP Operations and Management  ...  The study in [21] is based on an IPv4-based network.  ... 
doi:10.22667/jowua.2011.06.31.067 dblp:journals/jowua/ContrerasBS11 fatcat:4axefpgcfbe4jchqc3f7nibiaa

Instant Handoffs for Wireless Infrastructure Meshed Networks

Alexander A. Kist
2008 2008 Australasian Telecommunication Networks and Applications Conference  
network but none of the proposed solutions deploying a P2P network had studied the impacting of decentralization on call setup delay.  ...  In addition, a recent study for the ACCC suggests that Distribution Areas (DAs), the fundamental geographic unit for access networks are not well laid out.  ... 
doi:10.1109/atnac.2008.4783338 fatcat:5vdigbtf5nfo7ifyeepevnth54

Mobile Broadband Public Safety Grade Network and Counter Remotely Piloted Aircraft Systems

Marian Buric
2018 Zenodo  
This paper starts up from a complete model for a Counter Remotely Aircraft System and proposes a Mobile Broadband Public Safety Grade Network as solution for information flow between its architectural  ...  One of the key issue regarding the operational requirements is deploying of a Counter Remotely Aircraft System over metropolitan area which seems to be one of the most attractive target for terrorists.  ...  A continuous process based on anomaly detection theory, statistical signal processing coupled with well-defined rules for intruder behavior analysis will be used.  ... 
doi:10.5281/zenodo.2575307 fatcat:u2qsjtyw65gmln5hrarmjtyve4

RICERCANDO: Data Mining Toolkit for Mobile Broadband Measurements [article]

Veljko Pejovic, Ivan Majhen, Miha Janez, Blaz Zupan
2019 arXiv   pre-print
Increasing reliance on mobile broadband (MBB) networks for communication, vehicle navigation, healthcare, and other critical purposes calls for improved monitoring and troubleshooting of such networks.  ...  We implement and release RICERCANDO as open-source software, and validate its usability on case studies from MONROE pan-European MBB measurement testbed.  ...  of Ljubljana, including Jernej Kernc, Vesna Tanko, and Anže Starič for their contributions to RICERCANDO; to Janez Sterle for his help with the explanation of the observed network anomalies; and to David  ... 
arXiv:1901.07287v1 fatcat:knwqmzfrbvdl7a7pixkwuyqd6e

Obtaining in-context measurements of cellular network performance

Aaron Gember, Aditya Akella, Jeffrey Pang, Alexander Varshavsky, Ramon Caceres
2012 Proceedings of the 2012 ACM conference on Internet measurement conference - IMC '12  
First, we conduct a large scale measurement study, based on data collected from a large cellular provider and from hundreds of controlled experiments, to shed light on the issues underlying in-context  ...  Second, we design and deploy a prototype active measurement service for Android phones based on these key insights.  ...  ACKNOWLEDGEMENTS We would like to thank our 12 volunteers for running our measurement system on their mobile devices. This work is partially supported by a grant from the NSF.  ... 
doi:10.1145/2398776.2398807 dblp:conf/imc/GemberAPVC12 fatcat:jcsyjz4w2vcthale5jcbofskzi

AD HOC Networks Security [chapter]

Pietro Michiardi, Refik Molva
2005 Mobile Ad Hoc Networking  
Mobile ad hoc networks (MANET) do not rely on any fixed infrastructure but communicate in a self-organized way.  ...  nodes of the network, it is possible to detect anomalies in routing traffic flows in the network.  ... 
doi:10.1002/0471656895.ch12 fatcat:nvyejsdkbvhlrbqr3myxriwdue

A Survey on Analyzing Encrypted Network Traffic of Mobile Devices [article]

Ashutosh Bhatiaa, Ankit AgrawalaAyush Bahugunaa, Kamlesh Tiwaria, K. Haribabua, Deepak Vishwakarmab
2020 arXiv   pre-print
This paper proposes a framework to categorize the research works on analyzing encrypted network traffic related to mobile devices.  ...  A significant amount of traffic over the Internet belongs to the applications running over mobile devices.  ...  This research was supported by the Center for Artificial Intelligence and Robotics (CAIR) lab of Defence Research and Development Organisation (DRDO), India, Bangalore under the CARS scheme.  ... 
arXiv:2006.12352v1 fatcat:cysjaqpqdfbxjn7b2gsy6gyelu

A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

Shuo Wang, Xing Zhang, Yan Zhang, Lin Wang, Juwo YANG, Wenbo Wang
2017 IEEE Access  
In this survey, we make an exhaustive review on the state-of-the-art research efforts on mobile edge networks.  ...  Next, a comprehensive survey of issues on computing, caching and communication techniques at the network edge is presented respectively.  ...  ACKNOWLEDGMENT The authors would like to thank the editor and the anonymous reviewers for their constructive comments and suggestions, which improve the quality of this paper.  ... 
doi:10.1109/access.2017.2685434 fatcat:omhcphk735czrnmjnwkoory6hq

Denial of Service Attacks in Wireless Networks: The Case of Jammers

Konstantinos Pelechrinis, Marios Iliofotou, Srikanth V. Krishnamurthy
2011 IEEE Communications Surveys and Tutorials  
In this survey, we present a detailed up-to-date discussion on the jamming attacks recorded in the literature. We also describe various techniques proposed for detecting the presence of jammers.  ...  The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack.  ...  The rest of this section presents studies related to intrusion detection in wireless networks. A.  ... 
doi:10.1109/surv.2011.041110.00022 fatcat:3shw3wsgf5hzthokvk3cwjusfu
« Previous Showing results 1 — 15 out of 456 results