2014
DOI: 10.1109/tii.2014.2321740
|View full text |Cite
|
Sign up to set email alerts
|

Cognitive Packet Network for Bilateral Asymmetric Connections

Abstract: 14.10.14 KB. Ok to add accepted version to spira

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
2

Relationship

3
6

Authors

Journals

citations
Cited by 30 publications
(21 citation statements)
references
References 49 publications
0
21
0
Order By: Relevance
“…One approach for consideration in future work is to resequence the data [36] so as to drop data items before they enter into the learning algorithm if they have been superseded by fresher and more relevant items. Another important direction is to consider bandwidth optimisation or bandwidth guarantees, in addition to delay minimisation, as is done in recent work with CPN where applications require asymmetric QoS (delay for upstream and bandwidth for downstream) [37], as well as energy consumption aspects in the network as a whole [38]. Another question of interest would be to consider the time is takes [39], [40], as well as the energy consumption, for finding users or other resources such as virtual machines or files, in a large overlay network, prior to setting up connections to the appropriate overlay node or to a destination node that can be reached from several overlay nodes.…”
Section: Discussionmentioning
confidence: 99%
“…One approach for consideration in future work is to resequence the data [36] so as to drop data items before they enter into the learning algorithm if they have been superseded by fresher and more relevant items. Another important direction is to consider bandwidth optimisation or bandwidth guarantees, in addition to delay minimisation, as is done in recent work with CPN where applications require asymmetric QoS (delay for upstream and bandwidth for downstream) [37], as well as energy consumption aspects in the network as a whole [38]. Another question of interest would be to consider the time is takes [39], [40], as well as the energy consumption, for finding users or other resources such as virtual machines or files, in a large overlay network, prior to setting up connections to the appropriate overlay node or to a destination node that can be reached from several overlay nodes.…”
Section: Discussionmentioning
confidence: 99%
“…Future work can exploit the insight gained in this paper for the detection and mitigation of signalling attacks in mobile networks. One aspect that requires attention is the identification of possible locations, such as specific cells, where attacks may originate, and methods related to search and smart traffic routing may prove valuable in this context [50,51]. Another important aspect relates to identifying sets of representative features for the detection of signalling attacks and storms, and of the misbehaving UEs.…”
Section: Discussionmentioning
confidence: 99%
“…CDMA evolution data only (1xEV-DO), 3GPP high speed packet data access (HSPA), WiMAX, and LTE are widely used cellular packet data networks [10][11][12][13]. They have network asymmetry with respect to network performance [27,28]. To satisfy demanding mobile subscribers, networks allocate more downlink bandwidth than uplink bandwidth because mobile subscribers generally download content from the internet.…”
Section: Problem Statementmentioning
confidence: 99%