Bell Labs

Displaying 1-29 of 29 results

  • White Papers // Aug 2013

    Design Patterns for Tunable and Efficient SSD-based Indexes

    A number of data-intensive systems require using random hash-based indexes of various forms, e.g., hash tables, Bloom filters, and locality sensitive hash tables. In this paper, the authors present general SSD optimization techniques that can be used to design a variety of such indexes while ensuring higher performance and easier...

    Provided By Bell Labs

  • White Papers // Aug 2013

    Improved OT Extension for Transferring Short Secrets

    The authors propose an optimization and generalization of OT extension of researcher crypto 2003. For computational security parameter k, their OT extension for short secrets offers O (log k) factor performance improvement in communication and computation, compared to prior paper. In concrete terms, for today's security parameters, this means approx....

    Provided By Bell Labs

  • White Papers // Jun 2012

    Stratos: Virtual Middleboxes as First-Class Entities

    Enhancing application deployments in today's clouds using virtual middleboxes is challenging due to the lack of network control and the inherent difficult in intelligently scaling middleboxes to cope with application demands. The authors' position is that application and middlebox composition and scaling must occur in concert, and addressing the challenges...

    Provided By Bell Labs

  • White Papers // May 2012

    IA-TCP: A Rate Based Incast-Avoidance Algorithm for TCP in Data Center Networks

    In recent years, the data center networks commonly accommodate applications such as MapReduce and web search that inherently shows the in cast communication pattern; multiple workers simultaneously transmit TCP data to a single aggregator. In this environment, the TCP performance is significantly degraded in terms of goodput and query completion...

    Provided By Bell Labs

  • White Papers // May 2012

    Coordinated Dual-Layer Beamforming for Public Safety Network: Architecture and Algorithms

    The revolutionary success of commercial broadband wireless network has spurred significant interest in employing related technologies such as 3GPP Long Term Evolution (LTE) technologies to build a nationwide mobile broadband network for public safety entities. The successful deployment and operation of a public safety network, however, are more challenging than...

    Provided By Bell Labs

  • White Papers // May 2012

    Energy Benefit of Distributed In-Network Processing for Personalized Media Service Delivery

    In-network processing of media streams will be necessary in order to meet the personalization, interactive, and real time requirements of future video centric media services. Using Multi-View Video (MVV) streaming as an example, the authors investigate the energy tradeoff between video processing and transport for the delivery of personalized media...

    Provided By Bell Labs

  • White Papers // Mar 2012

    Distributed STBC-OFDM and Distributed SFBC-OFDM for Frequency-Selective and Time-Varying Channels

    Distributed Space-Time Block Coding with Orthogonal Frequency Division Multiplexing (DSTBC-OFDM) and Distributed Space-Frequency Block Coding with Orthogonal Frequency Division Multiplexing (DSFBC-OFDM) are introduced in this paper. Unlike the original DSTBC scheme which was designed for networks with a fixed number of relays operating in frequency-nonselective channels with insignificant Doppler spread,...

    Provided By Bell Labs

  • White Papers // Jan 2012

    Network Tomography: Identifiability and Fourier Domain Estimation

    Network tomography has been regarded as one of the most promising methodologies for performance evaluation and diagnosis of the massive and decentralized Internet. It can be used to infer unobservable network behaviors from directly measurable metrics and does not require cooperation between the network internal elements and the end users....

    Provided By Bell Labs

  • White Papers // Jan 2012

    Bandwidth Estimation for Best-Effort Internet Traffic

    A fundamental problem of Internet traffic engineering is bandwidth estimation: determining the bandwidth (bits/sec) required to carry traffic with a specific bit rate (bits/sec) offered to an Internet link and satisfy quality-of-service requirements. The traffic is packets of varying sizes arriving for transmission on the link. Packets can queue up...

    Provided By Bell Labs

  • White Papers // Nov 2011

    IBAKE: Identity-Based Authenticated Key Exchange Protocol

    The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of attention, motivated mainly by the desire to eliminate the need for large-scale public key infrastructure. The authors follow this trend in this...

    Provided By Bell Labs

  • White Papers // Jun 2011

    Modeling Data Transfer in Content-Centric Networking

    Content-centric networking proposals, as Parc's CCN, have recently emerged to define new network architectures where content, and not its location, becomes the core of the communication model. These new paradigms push data storage and delivery at network layer and are designed to better deal with current Internet usage, mainly centered...

    Provided By Bell Labs

  • White Papers // May 2011

    Toward Energy Efficient Content Dissemination

    A major role of today's Internet is to provide efficient content dissemination among users, such as distributing multimedia content and sharing user generated data. To meet the ever-increasing demands, the Internet has been rapidly growing, and it now includes a web of tens of millions of networked devices ranging from...

    Provided By Bell Labs

  • White Papers // Apr 2011

    Experimental Evaluation of Memory Management in Content-Centric Networking

    Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and centers it around content dissemination and retrieval. Most of the issues faced by the current IP infrastructure in terms of mobility management, security, scalability, which are accrued by today's Internet...

    Provided By Bell Labs

  • White Papers // Apr 2011

    Misuse Detection in Consent-Based Networks

    Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc NETworks (MANETs) require destination-based consent networking, where consent needs to be given to send to a destination in any path. These networks are susceptible to...

    Provided By Bell Labs

  • White Papers // Jan 2011

    Interference Alignment in Dense Wireless Networks

    The authors consider arbitrary dense wireless networks, in which n nodes are placed in an arbitrary (deterministic) manner on a square region of unit area and communicate with each other over Gaussian fading channels. They provide inner and outer bounds for the n ? n-dimensional unicast and the n ?...

    Provided By Bell Labs

  • White Papers // Jan 2011

    Energy-Aware Scheduling Algorithms for Network Stability

    A key problem in the control of packet-switched data networks is to schedule the data so that the queue sizes remain bounded over time. Scheduling algorithms have been developed in a number of different models that ensure network stability as long as no queue is inherently overloaded. However, this literature...

    Provided By Bell Labs

  • White Papers // Jan 2011

    An Indoor Wireless System for Personalized Shopping Assistance

    By integrating wireless, video, speech and real-time data access technologies, a unique shopping assistant service can be created that personalizes the attention provided to a customer based on individual needs, without limiting his movement, or causing distractions for others in the shopping center. The authors have developed this idea into...

    Provided By Bell Labs

  • White Papers // Nov 2010

    Memory-Constrained Aggregate Computation Over Data Streams

    Computing multiple aggregation queries over a data stream has applications in many domains: IP network monitoring, stock trading, analysis of Web logs, fraud detection in telecom networks and retail transactions, querying sensor node readings, etc. Salient characteristics of these applications include: very high data arrival rates that make it impractical...

    Provided By Bell Labs

  • White Papers // Jul 2010

    A Stochastic Geometry Model for the Best Signal Quality in a Wireless Network

    In a wireless network composed of randomly scattered nodes, the characterization of the distribution of the best signal quality received from a group of nodes is of primary importance for many network design problems. In this paper, using shot noise models for the interference field, the authors develop a framework...

    Provided By Bell Labs

  • White Papers // Jan 2010

    Hardness of Robust Network Design

    The authors settle the complexity status of the robust network design problem in undirected graphs. The fact that the flow-cut gap in general graphs can be large, poses some difficulty in establishing a hardness result. Instead this paper introduces a single-source version of the problem where the flow cut gap...

    Provided By Bell Labs

  • White Papers // Jan 2010

    Data Cleaning for Decision Support

    Data cleaning may involve acquisition, at same effort or expense, of high-quality of data. Such data can serve not only to correct individual errors, but also to improve the reliability model for data sources. However, there has been little research into this latter role foe acquired data. This paper defines...

    Provided By Bell Labs

  • White Papers // Jan 2010

    Network Coding-Based Broadcast in Mobile Ad Hoc Networks

    Broadcast operation, which disseminates information network-wide, is very important in multi-hop wireless networks. Due to the broadcast nature of wireless media, not all nodes need to transmit in order for the message to reach every node. Previous work on broadcast support can be classified as probabilistic (each node rebroadcasts a...

    Provided By Bell Labs

  • White Papers // Dec 2009

    Routing for Energy Minimization in the Speed Scaling Model

    The authors study network optimization that considers energy minimization as an objective. Studies have shown that mechanisms such as speed scaling can significantly reduce the power consumption of telecommunication networks by matching the consumption of each network element to the amount of processing required for its carried traffic. Most existing...

    Provided By Bell Labs

  • White Papers // Dec 2009

    Routing and Scheduling for Energy and Delay Minimization in the Powerdown Model

    Energy conservation is drawing increasing attention in data networking. One school of thought believes that a dominant amount of energy saving comes from turning off network elements. The difficulty is that transitioning between the active and sleeping modes consumes considerable energy and time. This results in an obvious trade-off between...

    Provided By Bell Labs

  • White Papers // Sep 2009

    Efficient Linear Precoding in Downlink Cooperative Cellular Networks With Soft Interference Nulling

    A simple line network model is proposed to study the downlink cellular network. Without base station cooperation, the system is interference-limited. The interference limitation is overcome when the base stations are allowed to jointly encode the user signals, but the capacity-achieving dirty paper coding scheme can be too complex for...

    Provided By Bell Labs

  • White Papers // Jul 2009

    MAC Precomputation With Applications to Secure Memory

    The authors present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, ShMAC's message-dependent computation is much faster and smaller in hardware than the evaluation of a PseudoRandom Permutation (PRP), and can be implemented by...

    Provided By Bell Labs

  • White Papers // Jun 2009

    Impact of Interfering Bluetooth Piconets on a Collocated p-Persistent CSMA-Based WLAN

    In this paper, the effect of co-channeled BlueTooth (BT) piconets on a Carrier Sense Multiple Access (CSMA)-based Wireless Local Area Network (WLAN) is investigated. Specifically, the p-persistent CSMA protocol is considered for WLAN and the probability of error of a WLAN packet is calculated in the presence of interfering BT...

    Provided By Bell Labs

  • White Papers // May 2009

    Queue Back-Pressure Random Access in Multi-Hop Wireless Networks: Optimality and Stability

    A model for wireless networks with slotted-Aloha-type random access and with multi-hop flow routes is considered. The goal is to devise distributed algorithms for utility-optimal end-to-end throughput allocation and queueing stability. A class of Queue Back-pressure Random access Algorithms (QBRAs), in which actual queue lengths of the flows in each...

    Provided By Bell Labs

  • White Papers // Jan 2009

    Decentralized Utility Maximization in Heterogeneous Multicell Scenarios with Interference Limited and Orthogonal Air Interfaces

    Overlapping coverage of multiple radio access technologies provides new multiple degrees of freedom for tuning the fairness throughput trade-off in heterogeneous communication systems through proper resource allocation. This paper treats the problem of resource allocation in terms of optimum air interface and cell selection in cellular multi-air interface scenarios. The...

    Provided By Bell Labs

  • White Papers // Dec 2009

    Routing for Energy Minimization in the Speed Scaling Model

    The authors study network optimization that considers energy minimization as an objective. Studies have shown that mechanisms such as speed scaling can significantly reduce the power consumption of telecommunication networks by matching the consumption of each network element to the amount of processing required for its carried traffic. Most existing...

    Provided By Bell Labs

  • White Papers // Dec 2009

    Routing and Scheduling for Energy and Delay Minimization in the Powerdown Model

    Energy conservation is drawing increasing attention in data networking. One school of thought believes that a dominant amount of energy saving comes from turning off network elements. The difficulty is that transitioning between the active and sleeping modes consumes considerable energy and time. This results in an obvious trade-off between...

    Provided By Bell Labs

  • White Papers // Jan 2010

    Hardness of Robust Network Design

    The authors settle the complexity status of the robust network design problem in undirected graphs. The fact that the flow-cut gap in general graphs can be large, poses some difficulty in establishing a hardness result. Instead this paper introduces a single-source version of the problem where the flow cut gap...

    Provided By Bell Labs

  • White Papers // Jan 2010

    Data Cleaning for Decision Support

    Data cleaning may involve acquisition, at same effort or expense, of high-quality of data. Such data can serve not only to correct individual errors, but also to improve the reliability model for data sources. However, there has been little research into this latter role foe acquired data. This paper defines...

    Provided By Bell Labs

  • White Papers // Jan 2010

    Network Coding-Based Broadcast in Mobile Ad Hoc Networks

    Broadcast operation, which disseminates information network-wide, is very important in multi-hop wireless networks. Due to the broadcast nature of wireless media, not all nodes need to transmit in order for the message to reach every node. Previous work on broadcast support can be classified as probabilistic (each node rebroadcasts a...

    Provided By Bell Labs

  • White Papers // Jun 2009

    Impact of Interfering Bluetooth Piconets on a Collocated p-Persistent CSMA-Based WLAN

    In this paper, the effect of co-channeled BlueTooth (BT) piconets on a Carrier Sense Multiple Access (CSMA)-based Wireless Local Area Network (WLAN) is investigated. Specifically, the p-persistent CSMA protocol is considered for WLAN and the probability of error of a WLAN packet is calculated in the presence of interfering BT...

    Provided By Bell Labs

  • White Papers // Jul 2009

    MAC Precomputation With Applications to Secure Memory

    The authors present ShMAC (Shallow MAC), a fixed input length message authentication code that performs most of the computation prior to the availability of the message. Specifically, ShMAC's message-dependent computation is much faster and smaller in hardware than the evaluation of a PseudoRandom Permutation (PRP), and can be implemented by...

    Provided By Bell Labs

  • White Papers // Jan 2011

    Interference Alignment in Dense Wireless Networks

    The authors consider arbitrary dense wireless networks, in which n nodes are placed in an arbitrary (deterministic) manner on a square region of unit area and communicate with each other over Gaussian fading channels. They provide inner and outer bounds for the n ? n-dimensional unicast and the n ?...

    Provided By Bell Labs

  • White Papers // Sep 2009

    Efficient Linear Precoding in Downlink Cooperative Cellular Networks With Soft Interference Nulling

    A simple line network model is proposed to study the downlink cellular network. Without base station cooperation, the system is interference-limited. The interference limitation is overcome when the base stations are allowed to jointly encode the user signals, but the capacity-achieving dirty paper coding scheme can be too complex for...

    Provided By Bell Labs

  • White Papers // Nov 2010

    Memory-Constrained Aggregate Computation Over Data Streams

    Computing multiple aggregation queries over a data stream has applications in many domains: IP network monitoring, stock trading, analysis of Web logs, fraud detection in telecom networks and retail transactions, querying sensor node readings, etc. Salient characteristics of these applications include: very high data arrival rates that make it impractical...

    Provided By Bell Labs

  • White Papers // Jul 2010

    A Stochastic Geometry Model for the Best Signal Quality in a Wireless Network

    In a wireless network composed of randomly scattered nodes, the characterization of the distribution of the best signal quality received from a group of nodes is of primary importance for many network design problems. In this paper, using shot noise models for the interference field, the authors develop a framework...

    Provided By Bell Labs

  • White Papers // Jan 2011

    An Indoor Wireless System for Personalized Shopping Assistance

    By integrating wireless, video, speech and real-time data access technologies, a unique shopping assistant service can be created that personalizes the attention provided to a customer based on individual needs, without limiting his movement, or causing distractions for others in the shopping center. The authors have developed this idea into...

    Provided By Bell Labs

  • White Papers // Jun 2011

    Modeling Data Transfer in Content-Centric Networking

    Content-centric networking proposals, as Parc's CCN, have recently emerged to define new network architectures where content, and not its location, becomes the core of the communication model. These new paradigms push data storage and delivery at network layer and are designed to better deal with current Internet usage, mainly centered...

    Provided By Bell Labs

  • White Papers // Apr 2011

    Experimental Evaluation of Memory Management in Content-Centric Networking

    Content-Centric Networking is a new communication architecture that rethinks the Internet communication model, designed for point-to-point connections between hosts, and centers it around content dissemination and retrieval. Most of the issues faced by the current IP infrastructure in terms of mobility management, security, scalability, which are accrued by today's Internet...

    Provided By Bell Labs

  • White Papers // Jan 2011

    Energy-Aware Scheduling Algorithms for Network Stability

    A key problem in the control of packet-switched data networks is to schedule the data so that the queue sizes remain bounded over time. Scheduling algorithms have been developed in a number of different models that ensure network stability as long as no queue is inherently overloaded. However, this literature...

    Provided By Bell Labs

  • White Papers // Jan 2009

    Decentralized Utility Maximization in Heterogeneous Multicell Scenarios with Interference Limited and Orthogonal Air Interfaces

    Overlapping coverage of multiple radio access technologies provides new multiple degrees of freedom for tuning the fairness throughput trade-off in heterogeneous communication systems through proper resource allocation. This paper treats the problem of resource allocation in terms of optimum air interface and cell selection in cellular multi-air interface scenarios. The...

    Provided By Bell Labs

  • White Papers // May 2009

    Queue Back-Pressure Random Access in Multi-Hop Wireless Networks: Optimality and Stability

    A model for wireless networks with slotted-Aloha-type random access and with multi-hop flow routes is considered. The goal is to devise distributed algorithms for utility-optimal end-to-end throughput allocation and queueing stability. A class of Queue Back-pressure Random access Algorithms (QBRAs), in which actual queue lengths of the flows in each...

    Provided By Bell Labs

  • White Papers // Apr 2011

    Misuse Detection in Consent-Based Networks

    Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc NETworks (MANETs) require destination-based consent networking, where consent needs to be given to send to a destination in any path. These networks are susceptible to...

    Provided By Bell Labs

  • White Papers // Jan 2012

    Network Tomography: Identifiability and Fourier Domain Estimation

    Network tomography has been regarded as one of the most promising methodologies for performance evaluation and diagnosis of the massive and decentralized Internet. It can be used to infer unobservable network behaviors from directly measurable metrics and does not require cooperation between the network internal elements and the end users....

    Provided By Bell Labs

  • White Papers // Nov 2011

    IBAKE: Identity-Based Authenticated Key Exchange Protocol

    The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of attention, motivated mainly by the desire to eliminate the need for large-scale public key infrastructure. The authors follow this trend in this...

    Provided By Bell Labs

  • White Papers // Jan 2012

    Bandwidth Estimation for Best-Effort Internet Traffic

    A fundamental problem of Internet traffic engineering is bandwidth estimation: determining the bandwidth (bits/sec) required to carry traffic with a specific bit rate (bits/sec) offered to an Internet link and satisfy quality-of-service requirements. The traffic is packets of varying sizes arriving for transmission on the link. Packets can queue up...

    Provided By Bell Labs

  • White Papers // May 2011

    Toward Energy Efficient Content Dissemination

    A major role of today's Internet is to provide efficient content dissemination among users, such as distributing multimedia content and sharing user generated data. To meet the ever-increasing demands, the Internet has been rapidly growing, and it now includes a web of tens of millions of networked devices ranging from...

    Provided By Bell Labs

  • White Papers // May 2012

    IA-TCP: A Rate Based Incast-Avoidance Algorithm for TCP in Data Center Networks

    In recent years, the data center networks commonly accommodate applications such as MapReduce and web search that inherently shows the in cast communication pattern; multiple workers simultaneously transmit TCP data to a single aggregator. In this environment, the TCP performance is significantly degraded in terms of goodput and query completion...

    Provided By Bell Labs

  • White Papers // May 2012

    Coordinated Dual-Layer Beamforming for Public Safety Network: Architecture and Algorithms

    The revolutionary success of commercial broadband wireless network has spurred significant interest in employing related technologies such as 3GPP Long Term Evolution (LTE) technologies to build a nationwide mobile broadband network for public safety entities. The successful deployment and operation of a public safety network, however, are more challenging than...

    Provided By Bell Labs

  • White Papers // May 2012

    Energy Benefit of Distributed In-Network Processing for Personalized Media Service Delivery

    In-network processing of media streams will be necessary in order to meet the personalization, interactive, and real time requirements of future video centric media services. Using Multi-View Video (MVV) streaming as an example, the authors investigate the energy tradeoff between video processing and transport for the delivery of personalized media...

    Provided By Bell Labs

  • White Papers // Mar 2012

    Distributed STBC-OFDM and Distributed SFBC-OFDM for Frequency-Selective and Time-Varying Channels

    Distributed Space-Time Block Coding with Orthogonal Frequency Division Multiplexing (DSTBC-OFDM) and Distributed Space-Frequency Block Coding with Orthogonal Frequency Division Multiplexing (DSFBC-OFDM) are introduced in this paper. Unlike the original DSTBC scheme which was designed for networks with a fixed number of relays operating in frequency-nonselective channels with insignificant Doppler spread,...

    Provided By Bell Labs

  • White Papers // Jun 2012

    Stratos: Virtual Middleboxes as First-Class Entities

    Enhancing application deployments in today's clouds using virtual middleboxes is challenging due to the lack of network control and the inherent difficult in intelligently scaling middleboxes to cope with application demands. The authors' position is that application and middlebox composition and scaling must occur in concert, and addressing the challenges...

    Provided By Bell Labs

  • White Papers // Aug 2013

    Design Patterns for Tunable and Efficient SSD-based Indexes

    A number of data-intensive systems require using random hash-based indexes of various forms, e.g., hash tables, Bloom filters, and locality sensitive hash tables. In this paper, the authors present general SSD optimization techniques that can be used to design a variety of such indexes while ensuring higher performance and easier...

    Provided By Bell Labs

  • White Papers // Aug 2013

    Improved OT Extension for Transferring Short Secrets

    The authors propose an optimization and generalization of OT extension of researcher crypto 2003. For computational security parameter k, their OT extension for short secrets offers O (log k) factor performance improvement in communication and computation, compared to prior paper. In concrete terms, for today's security parameters, this means approx....

    Provided By Bell Labs