2,206 research outputs found
What is the best spatial distribution to model base station density? A deep dive into two european mobile networks
This paper studies the base station (BS) spatial distributions across different scenarios in urban, rural, and coastal zones, based on real BS deployment data sets obtained from two European countries (i.e., Italy and Croatia). Basically, this paper takes into account different representative statistical distributions to characterize the probability density function of the BS spatial density, including Poisson, generalized Pareto, Weibull, lognormal, and \alpha -Stable. Based on a thorough comparison with real data sets, our results clearly assess that the \alpha -Stable distribution is the most accurate one among the other candidates in urban scenarios. This finding is confirmed across different sample area sizes, operators, and cellular technologies (GSM/UMTS/LTE). On the other hand, the lognormal and Weibull distributions tend to fit better the real ones in rural and coastal scenarios. We believe that the results of this paper can be exploited to derive fruitful guidelines for BS deployment in a cellular network design, providing various network performance metrics, such as coverage probability, transmission success probability, throughput, and delay
A critical look at power law modelling of the Internet
This paper takes a critical look at the usefulness of power law models of the
Internet. The twin focuses of the paper are Internet traffic and topology
generation. The aim of the paper is twofold. Firstly it summarises the state of
the art in power law modelling particularly giving attention to existing open
research questions. Secondly it provides insight into the failings of such
models and where progress needs to be made for power law research to feed
through to actual improvements in network performance.Comment: To appear Computer Communication
Performance Comparison of Contention- and Schedule-based MAC Protocols in Urban Parking Sensor Networks
Network traffic model is a critical problem for urban applications, mainly
because of its diversity and node density. As wireless sensor network is highly
concerned with the development of smart cities, careful consideration to
traffic model helps choose appropriate protocols and adapt network parameters
to reach best performances on energy-latency tradeoffs. In this paper, we
compare the performance of two off-the-shelf medium access control protocols on
two different kinds of traffic models, and then evaluate their application-end
information delay and energy consumption while varying traffic parameters and
network density. From the simulation results, we highlight some limits induced
by network density and occurrence frequency of event-driven applications. When
it comes to realtime urban services, a protocol selection shall be taken into
account - even dynamically - with a special attention to energy-delay tradeoff.
To this end, we provide several insights on parking sensor networks.Comment: ACM International Workshop on Wireless and Mobile Technologies for
Smart Cities (WiMobCity) (2014
On the multiresolution structure of Internet traffic traces
Internet traffic on a network link can be modeled as a stochastic process.
After detecting and quantifying the properties of this process, using
statistical tools, a series of mathematical models is developed, culminating in
one that is able to generate ``traffic'' that exhibits --as a key feature-- the
same difference in behavior for different time scales, as observed in real
traffic, and is moreover indistinguishable from real traffic by other
statistical tests as well. Tools inspired from the models are then used to
determine and calibrate the type of activity taking place in each of the time
scales. Surprisingly, the above procedure does not require any detailed
information originating from either the network dynamics, or the decomposition
of the total traffic into its constituent user connections, but rather only the
compliance of these connections to very weak conditions.Comment: 57 pages, color figures. Figures are of low quality due to space
consideration
Catalog Dynamics: Impact of Content Publishing and Perishing on the Performance of a LRU Cache
The Internet heavily relies on Content Distribution Networks and transparent
caches to cope with the ever-increasing traffic demand of users. Content,
however, is essentially versatile: once published at a given time, its
popularity vanishes over time. All requests for a given document are then
concentrated between the publishing time and an effective perishing time.
In this paper, we propose a new model for the arrival of content requests,
which takes into account the dynamical nature of the content catalog. Based on
two large traffic traces collected on the Orange network, we use the
semi-experimental method and determine invariants of the content request
process. This allows us to define a simple mathematical model for content
requests; by extending the so-called "Che approximation", we then compute the
performance of a LRU cache fed with such a request process, expressed by its
hit ratio. We numerically validate the good accuracy of our model by comparison
to trace-based simulation.Comment: 13 Pages, 9 figures. Full version of the article submitted to the ITC
2014 conference. Small corrections in the appendix from the previous versio
On the accuracy of phase-type approximations of heavy-tailed risk models
Numerical evaluation of ruin probabilities in the classical risk model is an
important problem. If claim sizes are heavy-tailed, then such evaluations are
challenging. To overcome this, an attractive way is to approximate the claim
sizes with a phase-type distribution. What is not clear though is how many
phases are enough in order to achieve a specific accuracy in the approximation
of the ruin probability. The goals of this paper are to investigate the number
of phases required so that we can achieve a pre-specified accuracy for the ruin
probability and to provide error bounds. Also, in the special case of a
completely monotone claim size distribution we develop an algorithm to estimate
the ruin probability by approximating the excess claim size distribution with a
hyperexponential one. Finally, we compare our approximation with the heavy
traffic and heavy tail approximations.Comment: 24 pages, 13 figures, 8 tables, 38 reference
Exploring networks with traceroute-like probes: theory and simulations
Mapping the Internet generally consists in sampling the network from a
limited set of sources by using traceroute-like probes. This methodology, akin
to the merging of different spanning trees to a set of destination, has been
argued to introduce uncontrolled sampling biases that might produce statistical
properties of the sampled graph which sharply differ from the original ones. In
this paper we explore these biases and provide a statistical analysis of their
origin. We derive an analytical approximation for the probability of edge and
vertex detection that exploits the role of the number of sources and targets
and allows us to relate the global topological properties of the underlying
network with the statistical accuracy of the sampled graph. In particular, we
find that the edge and vertex detection probability depends on the betweenness
centrality of each element. This allows us to show that shortest path routed
sampling provides a better characterization of underlying graphs with broad
distributions of connectivity. We complement the analytical discussion with a
throughout numerical investigation of simulated mapping strategies in network
models with different topologies. We show that sampled graphs provide a fair
qualitative characterization of the statistical properties of the original
networks in a fair range of different strategies and exploration parameters.
Moreover, we characterize the level of redundancy and completeness of the
exploration process as a function of the topological properties of the network.
Finally, we study numerically how the fraction of vertices and edges discovered
in the sampled graph depends on the particular deployements of probing sources.
The results might hint the steps toward more efficient mapping strategies.Comment: This paper is related to cond-mat/0406404, with explorations of
different networks and complementary discussion
- …