Energy efficiency, which has emerged as a top priority in cloud ecosystems, is the outcome of appropriate pricing mechanisms and resource allocations. Static pricing mechanisms are the most dominant approach among all the others. They are simple to implement for the service providers and easy to understand for the service users. Inaccurate price calculation and low efficient resource allocation in static pricing mechanisms made researchers discover other solutions to overcome these issues. Double auction mechanisms are among the most appropriate dynamic models. The main challenge of conventional double auction mechanisms is not considering the cloud ecosystems' specifications, such as dynamic online features. The term dynamic refers to the many variable parameters in cloud ecosystems, and they constantly change. Conventional static offline pricing solutions are set based on a series of parameters before running the process. In dynamic online methods, we customize our pricing models based on dynamic and current parameters. Also, we continuously optimize these methods to attain optimal results. In this seminar, firstly, we define a Dynamic Online Double Auction Mechanism (DODAM) for the IaaS environment, which covers a broader range of IaaS parameters by considering the dynamic online features of such markets. Considering the features of cloud dynamic online ecosystems, DODAM provides an appropriate price scheduling for service providers and service users. Cloud secondary market is a new paradigm in IaaS ecosystems. In these markets, brokers and reseller buyers have attained their resources from service providers of the cloud primary markets in the form of timed packages and repackage them into smaller chunks. As unsold packages do not transfer to the next intervals, brokers and reseller buyers need to sell their packages as much as possible. We develop a mechanical design that includes a market-based pricing model and a resource allocation algorithm in such markets as our second contribution. Next, by formulating the inherent competitive features in cloud secondary markets, we improve the pricing and resource allocation mechanisms in such competitive ecosystems. In the last contribution, we proposed a Priority-based Dynamic Online Double Auction Model (PB-DODAM), considering the perishability and time constraints of traded resources in IaaS secondary markets. The provided experimental results show that all proposed mechanisms drastically increase resource utilization and the overall utility. Speaker(s): Dr. Reza Dibaj Virtual: https://events.vtools.ieee.org/m/276942
Events
Calendar of Events
|
Monday
|
Tuesday
|
Wednesday
|
Thursday
|
Friday
|
Saturday
|
Sunday
|
|---|---|---|---|---|---|---|
2 events,
-
-
Dr Arslan has graciously offered to continue the discussion on 5G technologies. The topic is Flexible Radio Access Beyond 5G: A Future Projection. Abstract: Today's wireless services and systems have come a long way since the rollout of the conventional voice-centric cellular systems. The demand for wireless access in voice and multi-media applications has increased tremendously. The trend on the variety and the number of mobile devices along with the mobile applications will certainly continue beyond 5G, creating a wide range of technical challenges. One of the biggest challenges is the security of the communication beyond the classical crypto based approaches which secure the information. In this talk, security aspects of the physical communication and also physical signal which is called Physical Layer Security (PHY Security) will be discussed. Latest trends, threats, and techniques to improve the security of the physical signal will be discussed. The tentative outline of the talk will be as follows: Wireless Communication trends, requirements Importance of secure communication Classification of communication security PHY security: Communication and REM PHY security: Eavesdropping, Spoofing & Jamming Anti-jamming capable communication Cross-layer security - Secure communication & other advanced radio access technologies Case- studies a- Security in URLLC (URLL & Secure communication) b- Security in vehicular network (V2V and V2I) c- Security in NOMA d- Security in LIS Speaker(s): Dr. Arslan Arslan |
0 events,
|
0 events,
|
0 events,
|
1 event,
-
Note: Virtual platform will be delivered to registrants a couple of hours before starting the event. Contact: IEEE Montreal Section Young Professionals Abstract: The number of devices requesting for wireless communications is growing exponentially. Network densification via the deployment of many base stations (BSs) of different types is one of the mechanisms that can be employed to satisfy the ever-increasing demand for bandwidth/capacity in wireless networks. However, deploying fiber to the small cells may be expensive and impractical when the number of small cells increases. For this reason, as well as because of the traffic jams and infrastructure displacements caused by fiber optic installation, millimeter wave (mmw)-based wireless backhaul is currently considered as an alternative, providing (almost) the same rate as fiber optic with significantly less price and no digging. With this background, integrated access and backhaul (IAB) networks, where the operator can utilize part of the radio resources for wireless backhauling, has recently received considerable attention. The purpose of IAB is to replace existing backhaul systems with flexible wireless backhaul using the existing 3GPP bands providing not only backhaul but also existing cellular services in the same node. This creates more flexibility and reduces the implementation cost. For 5G NR, IAB is currently considered as a work item in 3GPP, and it is known as one of the main novelties of 5G. In this talk, we review the main backhauling techniques, and present the main motivations/standardization agreements on IAB. Moreover, We present comparisons between the IAB networks and the cases where all or part of the small access points are fiber-connected. Finally, we study the robustness of IAB networks to environmental effects and verify the effect of the blockage, the tree foliage, the rain as well as the antenna height/gain on the coverage rate of IAB setups, as the key differences between the fiber-connected and IAB networks. As we show, IAB is an attractive setup enabling 5G and beyond. |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
1 event,
-
Workshop Description: In the workshop, first the attendees will revisit the basic concepts of Python programming related to (1) writing and executing Python scripts to perform basic tasks, (2) entering and executing basic Python commands in a Jupyter Notebook, and (3) creating objects, data types such as strings, integers, Booleans, variables, lists, loops, coordinate system, if-statements, inequalities, etc. Later, this workshop will discuss the implementation of random variables and probability models in Python. In particular, we will introduce numpy that includes the basic understanding of arrays, matrices, matrices operations, random data generation and exercises. Furthermore, since understanding of Matplotlib is necessary to iplot functions and models in Python, we will explore basic strategies to plot using matplotlib Speaker(s): Taha Sajjad |
0 events,
|
0 events,
|
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|
0 events,
|