Stitch-n-Sync: Discreetly disclosing topology information using logically centralized controllers

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Competitive Mobile Network Operators (MNOs) are typically long-known for their shrewdness to conceal their underlying network topology information. Having said this, in this article, we propose a quasi-distributed topology information sharing framework for network operators based on logically centralized controllers. Through our approach, we present a topology information sharing scheme in which two or more MNOs can cooperatively and more importantly, discreetly reveal their topology information for the sake of utilizing the unused available resources of each other, at times of network failure situations. Our approach has been formulated and developed based on a novel key metric to 'tune' the amount of information sharing. Based on extensive simulations, we then investigate the impacts of network topology information sharing on the network capacity. The overall feasibility is illustrated through significant numerical results.

Original languageEnglish
Title of host publicationProceedings of the 2013 21st IEEE International Conference on Network Protocols, ICNP 2013
PublisherIEEE Computer Society
ISBN (Print)9781479912704
DOIs
Publication statusPublished - 1 Jan 2013
Externally publishedYes
Event2013 21st IEEE International Conference on Network Protocols, ICNP 2013 - Gottingen, Germany
Duration: 7 Oct 201310 Oct 2013

Publication series

NameProceedings - International Conference on Network Protocols, ICNP
ISSN (Print)1092-1648

Conference

Conference2013 21st IEEE International Conference on Network Protocols, ICNP 2013
Country/TerritoryGermany
CityGottingen
Period7/10/1310/10/13

Keywords

  • Distributed Topology Information
  • Logically Centralized Controllers
  • Mobile Backhaul Networks
  • Optimization

Fingerprint

Dive into the research topics of 'Stitch-n-Sync: Discreetly disclosing topology information using logically centralized controllers'. Together they form a unique fingerprint.

Cite this