scispace - formally typeset
Search or ask a question
Author

Toktam Mahmoodi

Bio: Toktam Mahmoodi is an academic researcher from King's College London. The author has contributed to research in topics: Computer science & Radio access network. The author has an hindex of 28, co-authored 122 publications receiving 2691 citations. Previous affiliations of Toktam Mahmoodi include Imperial College London & Sharif University of Technology.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2008

227 citations

Proceedings ArticleDOI
08 Dec 2008
TL;DR: A cross-layer solution that involves the adaptation of lower layer characteristics based on the detected TCP flavor in order to maximize the fairness among TCP flows is presented and it is shown that the proposed scheme considerably improves the fairness over wireless links among different TCP flavors.
Abstract: A significant body of recent research has analyzed the problematic behavior of TCP over wireless links, and a plethora of modifications to TCP have been proposed in order to increase its performance in such contexts. Two schools of thought have emerged: the first proposes changes to the end-to- end protocol, while the second explores the potential to enhance lower layers as a means to improve the end-to-end performance of TCP. This paper focuses on the latter, and in contrast to most research in this area, which thus-far has concentrated on a single TCP flavor, examines the case where different TCP flavors are competing over a wireless link. To this end, we present and assess a cross-layer solution that involves the adaptation of lower layer characteristics (i.e., the coding rate) based on the detected TCP flavor, in order to maximize the fairness among TCP flows. Through extensive numerical investigations, we show that the proposed scheme considerably improves the fairness over wireless links among different TCP flavors. Our approach also has a minimal effect on the aggregate throughput of the TCP flows, and in cases where the packet error rate is very low, has a small positive effect on throughput.

209 citations

Journal ArticleDOI
TL;DR: This survey focuses on how the fifth generation of mobile networks will allow haptic applications to take life, in combination with the haptic data communication protocols, bilateral teleoperation control schemes and hapticData processing needed.
Abstract: Touch is currently seen as the modality that will complement audition and vision as a third media stream over the Internet in a variety of future haptic applications which will allow full immersion and that will, in many ways, impact society. Nevertheless, the high requirements of these applications demand networks which allow ultra-reliable and low-latency communication for the challenging task of applying the required quality of service for maintaining the user’s quality of experience at optimum levels. In this survey, we enlist, discuss, and evaluate methodologies and technologies of the necessary infrastructure for haptic communication. Furthermore, we focus on how the fifth generation of mobile networks will allow haptic applications to take life, in combination with the haptic data communication protocols, bilateral teleoperation control schemes and haptic data processing needed. Finally, we state the lessons learned throughout the surveyed research material along with the future challenges and infer our conclusions.

179 citations

Proceedings Article
18 May 2016
TL;DR: This paper proposes a novel heuristicbased admission control mechanism able to dynamically allocate network resources to different slices in order to maximize the satisfaction of the users while guaranteeing to meet the requirements of the slices they belong to.
Abstract: 5G mobile network is expected to serve flexible requirements hence dynamically allocate network resources according to the demands. Network slicing, where network resources are packaged and assigned in an isolated manner to set of users according to their specific requirements, is considered as a key paradigm to fulfil diversity of requirements. There will clearly be conflicting demands in allocation of such slices, and the effective provisioning of network slicing poses several challenges. Indeed, network slicing has a twofold impact in terms of user/traffic prioritization as it dictates for the simultaneous management of the priority among different slices (i.e., interslice) and the priority among the users belonging to the same slice (i.e., intra-slice). In this paper, we propose a novel heuristicbased admission control mechanism able to dynamically allocate network resources to different slices in order to maximize the satisfaction of the users while guaranteeing to meet the requirements of the slices they belong to. Through simulations, we demonstrate how our proposal provides (i) higher user experience in individual slices, (ii) increased utilization of network resources and (iii) higher scalability when the number of users in each slice increases.

161 citations

Journal ArticleDOI
TL;DR: In this paper, the most relevant 5G use cases that require ultra-low latency, from both technical and business perspectives, are analyzed and the potential market benefits for operators are analyzed.
Abstract: A large number of new consumer and industrial applications are likely to change the classic operator’s business models and provide a wide range of new markets to enter. This paper analyzes the most relevant 5G use cases that require ultra-low latency, from both technical and business perspectives. Low latency services pose challenging requirements to the network, and to fulfill them, operators need to invest in costly changes in their network. In this sense, it is not clear whether such investments are going to be amortized with these new business models. In light of this, specific applications and requirements are described and the potential market benefits for operators are analyzed. Conclusions show that the operators have clear opportunities to add value and position themselves strongly with the increasing number of services to be provided by 5G.

148 citations


Cited by
More filters
Proceedings ArticleDOI
22 Jan 2006
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Abstract: We will review some of the major results in random graphs and some of the more challenging open problems. We will cover algorithmic and structural questions. We will touch on newer models, including those related to the WWW.

7,116 citations

Journal ArticleDOI
TL;DR: The present paper analyzes in detail the potential of 5G technologies for the IoT, by considering both the technological and standardization aspects and illustrates the massive business shifts that a tight link between IoT and 5G may cause in the operator and vendors ecosystem.
Abstract: The IoT paradigm holds the promise to revolutionize the way we live and work by means of a wealth of new services, based on seamless interactions between a large amount of heterogeneous devices. After decades of conceptual inception of the IoT, in recent years a large variety of communication technologies has gradually emerged, reflecting a large diversity of application domains and of communication requirements. Such heterogeneity and fragmentation of the connectivity landscape is currently hampering the full realization of the IoT vision, by posing several complex integration challenges. In this context, the advent of 5G cellular systems, with the availability of a connectivity technology, which is at once truly ubiquitous, reliable, scalable, and cost-efficient, is considered as a potentially key driver for the yet-to emerge global IoT. In the present paper, we analyze in detail the potential of 5G technologies for the IoT, by considering both the technological and standardization aspects. We review the present-day IoT connectivity landscape, as well as the main 5G enablers for the IoT. Last but not least, we illustrate the massive business shifts that a tight link between IoT and 5G may cause in the operator and vendors ecosystem.

1,224 citations

Journal ArticleDOI
TL;DR: A comprehensive survey, analyzing how edge computing improves the performance of IoT networks and considers security issues in edge computing, evaluating the availability, integrity, and the confidentiality of security strategies of each group, and proposing a framework for security evaluation of IoT Networks with edge computing.
Abstract: The Internet of Things (IoT) now permeates our daily lives, providing important measurement and collection tools to inform our every decision. Millions of sensors and devices are continuously producing data and exchanging important messages via complex networks supporting machine-to-machine communications and monitoring and controlling critical smart-world infrastructures. As a strategy to mitigate the escalation in resource congestion, edge computing has emerged as a new paradigm to solve IoT and localized computing needs. Compared with the well-known cloud computing, edge computing will migrate data computation or storage to the network “edge,” near the end users. Thus, a number of computation nodes distributed across the network can offload the computational stress away from the centralized data center, and can significantly reduce the latency in message exchange. In addition, the distributed structure can balance network traffic and avoid the traffic peaks in IoT networks, reducing the transmission latency between edge/cloudlet servers and end users, as well as reducing response times for real-time IoT applications in comparison with traditional cloud services. Furthermore, by transferring computation and communication overhead from nodes with limited battery supply to nodes with significant power resources, the system can extend the lifetime of the individual nodes. In this paper, we conduct a comprehensive survey, analyzing how edge computing improves the performance of IoT networks. We categorize edge computing into different groups based on architecture, and study their performance by comparing network latency, bandwidth occupation, energy consumption, and overhead. In addition, we consider security issues in edge computing, evaluating the availability, integrity, and the confidentiality of security strategies of each group, and propose a framework for security evaluation of IoT networks with edge computing. Finally, we compare the performance of various IoT applications (smart city, smart grid, smart transportation, and so on) in edge computing and traditional cloud computing architectures.

1,008 citations