Client-side architecture for mobile service QoS monitoring using Generalized Extreme Value theorem

Ammar Kamel*, Ala Al-Fuqaha

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Citations (Scopus)

Abstract

The vast demand for mobile services is resulting in new challenges for traditional network management. This paper presents a new mobile service management architecture that solely relies on data collected from the mobile clients without the need to insert measurement probes in the core transport network. The proposed architecture is based on an algorithm that exploits Generalized Extreme Value models (GEV) and Joint Probability Distributions (JPD) to predict potential mobile service degradations. The extracted prediction models are based on collected extreme values of Quality of Service (QoS) parameters. Since the parameter monitoring effort is delegated to the mobile clients, our proposed architecture is more scalable and serves to offload the service from the monitoring burden inherent in traditional service management architectures. The performance analysis presented in this paper illustrates the efficacies of the proposed approach compared to traditional service management approaches.

Original languageEnglish
Title of host publication2011 IEEE GLOBECOM Workshops, GC Wkshps 2011
Pages690-694
Number of pages5
DOIs
Publication statusPublished - 2011
Externally publishedYes
Event2011 IEEE GLOBECOM Workshops, GC Wkshps 2011 - Houston, TX, United States
Duration: 5 Dec 20119 Dec 2011

Publication series

Name2011 IEEE GLOBECOM Workshops, GC Wkshps 2011

Conference

Conference2011 IEEE GLOBECOM Workshops, GC Wkshps 2011
Country/TerritoryUnited States
CityHouston, TX
Period5/12/119/12/11

Keywords

  • Extreme Values
  • Generalized Extreme Value
  • Joint Probability Distribution
  • Mobile Services
  • Quality of Service

Fingerprint

Dive into the research topics of 'Client-side architecture for mobile service QoS monitoring using Generalized Extreme Value theorem'. Together they form a unique fingerprint.

Cite this