4,013 research outputs found

    Content Delivery in Erasure Broadcast Channels with Cache and Feedback

    Full text link
    We study a content delivery problem in a K-user erasure broadcast channel such that a content providing server wishes to deliver requested files to users, each equipped with a cache of a finite memory. Assuming that the transmitter has state feedback and user caches can be filled during off-peak hours reliably by the decentralized content placement, we characterize the achievable rate region as a function of the memory sizes and the erasure probabilities. The proposed delivery scheme, based on the broadcasting scheme by Wang and Gatzianas et al., exploits the receiver side information established during the placement phase. Our results can be extended to centralized content placement as well as multi-antenna broadcast channels with state feedback.Comment: 29 pages, 7 figures. A short version has been submitted to ISIT 201

    Reliable multicast transport by satellite: a hybrid satellite/terrestrial solution with erasure codes

    Get PDF
    Geostationary satellites are an efficient way to provide a large scale multipoint communication service. In the context of reliable multicast communications, a new hybrid satellite/terrestrial approach is proposed. It aims at reducing the overall communication cost using satellite broadcasting only when enough receivers are present, and terrestrial transmissions otherwise. This approach has been statistically evaluated for a particular cost function and seems interesting. Then since the hybrid approach relies on Forward Error Correction, several practical aspects of MDS codes and LDPC codes are investigated in order to select a code

    Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments

    Get PDF
    The organization of data on wireless channels, which aims to reduce the access time of mobile clients, is a key problem in data broadcasts. Many scheduling algorithms have been designed to organize flat data on air. However, how to effectively schedule semi-structured information such as XML data on wireless channels is still a challenge. In this paper, we firstly propose a novel method to greatly reduce the tuning time by splitting query results into XML snippets and to achieve better access efficiency by combining similar ones. Then we analyze the data broadcast scheduling problem of on-demand XML data broadcasts and define the efficiency of a data item. Based on the definition, a Least Efficient Last (LEL) scheduling algorithm is also devised to effectively organize XML data on wireless channels. Finally, we study the performance of our algorithms through extensive experiments. The results show that our scheduling algorithms can reduce both access time and tuning time signifcantly when compared with existing work

    Acquisitions as a Response to Deregulation: Evidence from the Cable Television Industry

    Get PDF
    This paper studies the dynamics of an industry that is subject to exclusive geographical licensing. I develop a model of license ownership that predicts the evolution of profit-maximizing entry and acquisition decisions by firms over time, starting from an initial allocation of licenses. The entry and acquisition process is modeled as a one-sided coalition-formation game as in Farrell and Scotchmer (1988), where acquisition payoffs depend on economies of scale and agglomeration (economies of density). I estimate the model for the cable television industry in Canada using a panel that I have constructed from 1990 to 1996. The dataset builds up from the national regulator's license ownership decision files, and contains license-level information on acquisition decisions, subscribership, and subscription profits. The model is estimated in two steps. I first estimate firms' license-level profit functions, and then estimate the parameters of the fixed, merger and entry cost functions by Simulated Maximum Likelihood. Through counterfactual simulations, I use the estimated model to quantify the extent to which economies of scale and density drive acquisition behaviour, and to evaluate how merger activity reacts to a partial deregulation that occurs in 1994. Counterfactual experiments are also used to evaluate policies that stimulate entry or reduce acquisitions in the early years of the sample. The main finding is that these policies can lead to more productive dominant firms in the long-run as the industry consolidates.Acquisition, Entry, Coalition Formation, Economies of Density, Economies of Scale, Simulated Maximum Likelihood, Cable Television

    Reliable routing scheme for indoor sensor networks

    Get PDF
    Indoor Wireless sensor networks require a highly dynamic, adaptive routing scheme to deal with the high rate of topology changes due to fading of indoor wireless channels. Besides that, energy consumption rate needs to be consistently distributed among sensor nodes and efficient utilization of battery power is essential. If only the link reliability metric is considered in the routing scheme, it may create long hops routes, and the high quality paths will be frequently used. This leads to shorter lifetime of such paths; thereby the entire network's lifetime will be significantly minimized. This paper briefly presents a reliable load-balanced routing (RLBR) scheme for indoor ad hoc wireless sensor networks, which integrates routing information from different layers. The proposed scheme aims to redistribute the relaying workload and the energy usage among relay sensor nodes to achieve balanced energy dissipation; thereby maximizing the functional network lifetime. RLBR scheme was tested and benchmarked against the TinyOS-2.x implementation of MintRoute on an indoor testbed comprising 20 Mica2 motes and low power listening (LPL) link layer provided by CC1000 radio. RLBR scheme consumes less energy for communications while reducing topology repair latency and achieves better connectivity and communication reliability in terms of end-to-end packets delivery performance

    Classification of Existing Virtualization Methods Used in Telecommunication Networks

    Full text link
    This article studies the existing methods of virtualization of different resources. The positive and negative aspects of each of the methods are analyzed, the perspectivity of the approach is noted. It is also made an attempt to classify virtualization methods according to the application domain, which allows us to discover the method weaknesses which are needed to be optimized.Comment: 4 pages, 3 figure
    • …
    corecore