Amit Sheoran

ORCID: 0000-0001-9194-6376
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Software System Performance and Reliability
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Advanced Image Processing Techniques
  • Markov Chains and Monte Carlo Methods
  • Gaussian Processes and Bayesian Inference
  • Advanced Optical Network Technologies
  • Network Traffic and Congestion Control
  • Image and Video Quality Assessment
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Video Coding and Compression Technologies
  • Machine Learning and Algorithms
  • Customer Service Quality and Loyalty
  • Advanced Malware Detection Techniques
  • Imbalanced Data Classification Techniques
  • Energy Efficiency and Management
  • Electric Power System Optimization
  • Efficiency Analysis Using DEA
  • User Authentication and Security Systems
  • Cloud Computing and Resource Management
  • Data Mining Algorithms and Applications
  • Music and Audio Processing
  • Algorithms and Data Compression

AT&T (United States)
2022-2024

Ministry of Agriculture and Forests
2022

Purdue University West Lafayette
2016-2021

Hewlett-Packard (United States)
2021

In this paper, we make a case for using lightweight containers fine-grained resource flexing Virtualized Network Functions (VNFs) to meet the demands of varying workloads. We quantitatively compare VNF performance and infrastructure usage three instantiations (bare metal, virtual machine, container) selected VNFs. The VNFs experiment with are Mobility Management Entity (MME) Evolved packet core (EPC) architecture cellular networks, Suricata multi-threaded Intrusion Detection System (IDS),...

10.1109/nfv-sdn.2016.7919486 article EN 2016-11-01

Network Functions Virtualization (NFV) has enabled operators to dynamically place and allocate resources for network services match workload requirements. However, unbounded end-to-end (e2e) latency of Service Function Chains (SFCs) resulting from distributed Virtualized (VNF) deployments can severely degrade performance. In particular, SFC instantiations with inter-data center links incur high e2e latencies Level Agreement (SLA) violations. These trigger timeouts protocol errors...

10.1145/3094405.3094408 article EN 2017-08-04

Network Functions Virtualization (NFV) has enabled operators to dynamically place and allocate resources for network services match workload requirements. However, unbounded end-to-end (e2e) latency of Service Function Chains (SFCs) resulting from distributed Virtualized (VNF) deployments can severely degrade performance. In particular, SFC instantiations with inter-data center links incur high e2e latencies Level Agreement (SLA) violations. These trigger timeouts protocol errors...

10.1145/3155055.3155064 article EN ACM SIGCOMM Computer Communication Review 2017-10-25

The adoption of a cloud-native architecture in 5G networks has facilitated rapid deployment and update cellular services. An important part this is the implementation network functions statelessly. However, statelessness its associated serialization de-serialization data database interaction significantly increase latency. In work, we take first steps towards quantifying cost system. We compare different state management paradigms, propose number optimizations to reduce cost. Our preliminary...

10.1145/3493425.3502749 article EN 2021-12-13

Cellular service carriers often employ reactive strategies to assist customers who experience non-outage related individual degradation issues (e.g., performance degradations that do not impact at scale and are likely caused by network provisioning for devices). Customers need contact customer care request assistance before these resolved. This paper presents our with PACE (<u>P</u>ro<u>A</u>ctive <u>C</u>ar<u>E</u>), a novel, proactive system monitors, troubleshoots resolves issues, without...

10.1145/3372224.3419203 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2020-09-18

Network slicing enables communication service providers to partition physical infrastructure into logically independent networks. slices must be provisioned meet the service-level objectives (SLOs) of disparate offerings, such as enhanced mobile broadband, ultrareliable low-latency communications, and massive machine-type communications. orchestrators customize placement scaling achieve SLO each network slice. In this article, we discuss challenges encountered by in allocating resources 5G...

10.1109/mic.2021.3056230 article EN IEEE Internet Computing 2021-02-03

Caller-ID spoofing deceives the callee into believing a call is originating from another user. Spoofing has been strategically used in now-pervasive telephone fraud, causing substantial monetary loss and sensitive data leakage. Unfortunately, caller-ID feasible even when user authentication place. State-of-the-art solutions either exhibit high overhead or require extensive upgrades, thus are unlikely to be deployed near future. In this paper, we seek an effective efficient solution for 4G...

10.1109/infocom.2019.8737567 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2019-04-01

As the primary channel for users to report and resolve service issues, customer care has historically been a critical resource-intensive aspect of operating cellular networks. However, owing inherent complexity in correlating network events with performance experienced by individual users, adoption data-driven solutions leveraging data realtime troubleshooting during calls remained challenge providers (CSPs). In this work, we propose novel ML aSsisted cEllular sErvice diagNosis (SEEN)...

10.1145/3636534.3690678 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2024-12-04

We propose CoRE, a 360° video streaming approach that reduces bandwidth requirements compared to transferring the entire video. CoRE uses non-linear sampling in both spatial and temporal domains achieve robustness view direction prediction error transient wireless network fluctuation. Each frame samples environment all directions, with full resolution over predicted field of gradually decreasing at periphery, so missing pixels are avoided, irrespective magnitude. A chunk has main part rate,...

10.1109/infocom42981.2021.9488700 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2021-05-10

We propose an optimization to reduce the latency incurred by a stateless 5G control plane. The key idea is avoid redundant database read operations. achieve this reading user's state only once and sending it successive network functions in chain. Experimental results show that can total cost 33% on average.

10.1109/lanman54755.2022.9820393 article EN 2022-07-11

We consider the task of learning a parametric Continuous Time Markov Chain (CTMC) sequence model without examples sequences, where training data consists entirely aggregate steady-state statistics. Making problem harder, we assume that states wish to predict are unobserved in data. Specifically, given over transition rates CTMC and some known rates, extrapolate its steady state distribution unobserved. A technical roadblock learn from has been chain rule compute gradients will not work...

10.1609/aaai.v34i04.5806 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2020-04-03

Microservices enable rapid service deployment and scaling. Integrating poorly-understood microservice components into Service Function Chains (SFCs) or graphs limits a provider's control over delivery latency, however. Orchestration frameworks currently instantiate place myriads of without knowing the impact placement decisions on latency.

10.1145/3493425.3502750 article EN 2021-12-13

In this paper, we investigate the impact of debt takeover distribution utilities along with structural reforms to enhance their efficiency, in context a scheme by Indian government improve financial and operation efficiency utilities. The is called Ujwal DISCOM Assurance Yojna (UDAY). study primarily relies on descriptive analysis Difference methodology understand various stakeholders, such as: DISCOMs, generation companies, banks state governments. We found that UDAY DISCOMs companies...

10.2139/ssrn.4090569 article EN SSRN Electronic Journal 2022-01-01

CoRE is an approach for streaming 360° videos based on a non-linear sampling of the equirectangular video cube. robust to view prediction errors.

10.1109/icnp.2019.8888135 article EN 2019-10-01

We consider the task of learning a parametric Continuous Time Markov Chain (CTMC) sequence model without examples sequences, where training data consists entirely aggregate steady-state statistics. Making problem harder, we assume that states wish to predict are unobserved in data. Specifically, given over transition rates CTMC and some known rates, extrapolate its steady state distribution unobserved. A technical roadblock learn from has been chain rule compute gradients will not work...

10.48550/arxiv.2002.04186 preprint EN cc-by-sa arXiv (Cornell University) 2020-01-01

One of the key challenges faced by cellular network customer care agents is identifying if service problem caused network-related issues or user-device-related issues. Some providers [5], [6], therefore, employ machine learning-based troubleshooting frameworks to aid in root cause problems experienced users. However, obtaining large-scale and comprehensive ground truth result data costly requires tremendous manual efforts from networking operators. Due this limitation, training such a...

10.1109/lanman54755.2022.9820585 article EN 2022-07-11

In this work, we examine the challenges that service providers encounter in managing complex function graphs, while controlling delivery latency. Based on lessons learn, outline design of a new system, Invenio, empowers to effectively place microservices without prior knowledge functionality. Invenio correlates user actions with messages they trigger seen network traces, and computes procedural affinity for communication among each action. The values can then be used make placement decisions...

10.1145/3491084.3491429 article EN 2021-12-02
Coming Soon ...