A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Diagnosis of capacity bottlenecks via passive monitoring in 3G networks: An empirical analysis
2007
Computer Networks
In this work we address the problem of inferring the presence of a capacity bottleneck from passive measurements in a 3G network. ...
The study is based on one month of packet traces collected in the UMTS core network of mobilkom austria AG & Co KG, the leading mobile telecommunications provider in Austria, EU. ...
This study is based on several weeks of packet traces collected by passive monitoring the core network links of a large operational 3G network (mobilkom austria AG & Co KG, the leading mobile operator ...
doi:10.1016/j.comnet.2006.07.011
fatcat:klh4it6cmndo7ezzqargb2ls6i
Challenges in 5G: how to empower SON with big data for enabling 5G
2014
IEEE Network
Finally, we demonstrate the key concepts of our proposed BSON framework through a case study of a problem that the classic 3G/4G SON fails to solve. ...
To cope with similar challenges in the context of 3G and 4G networks, recently, self-organizing networks, or SONs, have been researched extensively. ...
Acknowledgment This work was made possible by NPRP grant No. 5-1047-2-437 from the Qatar National Research Fund (a member of The Qatar Foundation). ...
doi:10.1109/mnet.2014.6963801
fatcat:yfsizqlazvanjo4uxhkhvwemia
Analysis and Measurement of TCP/IP Performance over GPRS Networks
[chapter]
2003
Lecture Notes in Computer Science
Mobile networks implement sophisticated mechanisms in order to provide mobility and capacity in a wide area. ...
The paper focuses its attention on a set of phenomena (excess queuing, delay spikes, redundant retransmissions and bandwidth oscillations) that were observed in real mobile GPRS systems. ...
The authors would like to acknowledge the support granted by Tektronix Padova S.p.a. for the studies reported in this work. ...
doi:10.1007/978-3-540-39867-7_28
fatcat:nzyjvbvm7fbspkxk5eppcw7iii
Traffic monitoring and analysis in 3G networks: lessons learned from the METAWIN project
2006
e & i Elektrotechnik und Informationstechnik
In this article the main lessons are summarized learned from a two-year research activity on traffic monitoring and analysis on top of an operational 3G network. ...
A 3G network is a magnificently complex object embedded in a highly heterogeneous and ever-changing usage environment. ...
A mobile 3G network combines two different paradigms: cellular and IP. ...
doi:10.1007/s00502-006-0362-y
fatcat:oduiq23v4ff5dpbx72pkst2qri
Big data analytics for wireless and wired network design: A survey
2018
Computer Networks
In this paper, we conduct a survey on the role that big data analytics can play in the design of data communication networks. ...
Third, there is a detailed review of the current academic and industrial efforts toward network design using big data analytics. ...
The Wireless Network Guardian detects user anomalies in mobile networks where a comparable topic was discussed in [110] . ...
doi:10.1016/j.comnet.2018.01.016
fatcat:xqjwzzeww5c3bhyv3yrpuhsgye
Exploratory approach for network behavior clustering in LoRaWAN
2021
Journal of Ambient Intelligence and Humanized Computing
Our study can be used for profiling IoT devices, in order to group them according to their characteristics, as well as detecting network anomalies. ...
We tested our approach on a real LoRaWAN network where the entire captured traffic is stored in a proprietary database. ...
We also thank Jacopo Maria Valtorta for having started with us this kind of study in our previous work (Valtorta et al. 2019) . ...
doi:10.1007/s12652-021-03121-z
fatcat:bz2ey5j2f5h5vgdhhe2zadc3pm
RAMS: A Protocol Extension to PMIPv6 for Improving Handover Performance of Multicast Traffic
2011
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications
Ricciato, “Towards anomaly detection in one-way delay measurements for 3G
mobile networks: A preliminary study,” in Proc. of the 8th IEEE international workshop on IP Operations
and Management ...
The study in [21] is based on an IPv4-based network. ...
doi:10.22667/jowua.2011.06.31.067
dblp:journals/jowua/ContrerasBS11
fatcat:4axefpgcfbe4jchqc3f7nibiaa
Instant Handoffs for Wireless Infrastructure Meshed Networks
2008
2008 Australasian Telecommunication Networks and Applications Conference
network but none of the proposed solutions deploying a P2P network had studied the impacting of decentralization on call setup delay. ...
In addition, a recent study for the ACCC suggests that Distribution Areas (DAs), the fundamental geographic unit for access networks are not well laid out. ...
doi:10.1109/atnac.2008.4783338
fatcat:5vdigbtf5nfo7ifyeepevnth54
Mobile Broadband Public Safety Grade Network and Counter Remotely Piloted Aircraft Systems
2018
Zenodo
This paper starts up from a complete model for a Counter Remotely Aircraft System and proposes a Mobile Broadband Public Safety Grade Network as solution for information flow between its architectural ...
One of the key issue regarding the operational requirements is deploying of a Counter Remotely Aircraft System over metropolitan area which seems to be one of the most attractive target for terrorists. ...
A continuous process based on anomaly detection theory, statistical signal processing coupled with well-defined rules for intruder behavior analysis will be used. ...
doi:10.5281/zenodo.2575307
fatcat:u2qsjtyw65gmln5hrarmjtyve4
RICERCANDO: Data Mining Toolkit for Mobile Broadband Measurements
[article]
2019
arXiv
pre-print
Increasing reliance on mobile broadband (MBB) networks for communication, vehicle navigation, healthcare, and other critical purposes calls for improved monitoring and troubleshooting of such networks. ...
We implement and release RICERCANDO as open-source software, and validate its usability on case studies from MONROE pan-European MBB measurement testbed. ...
of Ljubljana, including Jernej Kernc, Vesna Tanko, and Anže Starič for their contributions to RICERCANDO; to Janez Sterle for his help with the explanation of the observed network anomalies; and to David ...
arXiv:1901.07287v1
fatcat:knwqmzfrbvdl7a7pixkwuyqd6e
Obtaining in-context measurements of cellular network performance
2012
Proceedings of the 2012 ACM conference on Internet measurement conference - IMC '12
First, we conduct a large scale measurement study, based on data collected from a large cellular provider and from hundreds of controlled experiments, to shed light on the issues underlying in-context ...
Second, we design and deploy a prototype active measurement service for Android phones based on these key insights. ...
ACKNOWLEDGEMENTS We would like to thank our 12 volunteers for running our measurement system on their mobile devices. This work is partially supported by a grant from the NSF. ...
doi:10.1145/2398776.2398807
dblp:conf/imc/GemberAPVC12
fatcat:jcsyjz4w2vcthale5jcbofskzi
AD HOC Networks Security
[chapter]
2005
Mobile Ad Hoc Networking
Mobile ad hoc networks (MANET) do not rely on any fixed infrastructure but communicate in a self-organized way. ...
nodes of the network, it is possible to detect anomalies in routing traffic flows in the network. ...
doi:10.1002/0471656895.ch12
fatcat:nvyejsdkbvhlrbqr3myxriwdue
A Survey on Analyzing Encrypted Network Traffic of Mobile Devices
[article]
2020
arXiv
pre-print
This paper proposes a framework to categorize the research works on analyzing encrypted network traffic related to mobile devices. ...
A significant amount of traffic over the Internet belongs to the applications running over mobile devices. ...
This research was supported by the Center for Artificial Intelligence and Robotics (CAIR) lab of Defence Research and Development Organisation (DRDO), India, Bangalore under the CARS scheme. ...
arXiv:2006.12352v1
fatcat:cysjaqpqdfbxjn7b2gsy6gyelu
A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications
2017
IEEE Access
In this survey, we make an exhaustive review on the state-of-the-art research efforts on mobile edge networks. ...
Next, a comprehensive survey of issues on computing, caching and communication techniques at the network edge is presented respectively. ...
ACKNOWLEDGMENT The authors would like to thank the editor and the anonymous reviewers for their constructive comments and suggestions, which improve the quality of this paper. ...
doi:10.1109/access.2017.2685434
fatcat:omhcphk735czrnmjnwkoory6hq
Denial of Service Attacks in Wireless Networks: The Case of Jammers
2011
IEEE Communications Surveys and Tutorials
In this survey, we present a detailed up-to-date discussion on the jamming attacks recorded in the literature. We also describe various techniques proposed for detecting the presence of jammers. ...
The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. ...
The rest of this section presents studies related to intrusion detection in wireless networks.
A. ...
doi:10.1109/surv.2011.041110.00022
fatcat:3shw3wsgf5hzthokvk3cwjusfu
« Previous
Showing results 1 — 15 out of 456 results