SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:1063 6692 OR L773:1558 2566 "

Sökning: L773:1063 6692 OR L773:1558 2566

  • Resultat 1-10 av 53
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Al-Zubaidy, Hussein, et al. (författare)
  • Network-Layer Performance Analysis of Multihop Fading Channels
  • 2016
  • Ingår i: IEEE/ACM Transactions on Networking. - : IEEE. - 1063-6692 .- 1558-2566. ; 24:1, s. 204-217
  • Tidskriftsartikel (refereegranskat)abstract
    • A fundamental problem for the delay and backlog analysis across multihop paths in wireless networks is how to account for the random properties of the wireless channel. Since the usual statistical models for radio signals in a propagation environment do not lend themselves easily to a description of the available service rate, the performance analysis of wireless networks has resorted to higher-layer abstractions, e. g., using Markov chain models. In this paper, we propose a network calculus that can incorporate common statistical models of fading channels and obtain statistical bounds on delay and backlog across multiple nodes. We conduct the analysis in a transfer domain, where the service process at a link is characterized by the instantaneous signal-to-noise ratio at the receiver. We discover that, in the transfer domain, the network model is governed by a dioid algebra, which we refer to as the algebra. Using this algebra, we derive the desired delay and backlog bounds. Using arguments from large deviations theory, we show that the bounds are asymptotically tight. An application of the analysis is demonstrated for a multihop network of Rayleigh fading channels with cross traffic at each hop.
  •  
2.
  • Andersin, Michael, et al. (författare)
  • Soft and safe admission control in cellular networks
  • 1997
  • Ingår i: IEEE/ACM Transactions on Networking. - : IEEE/ACM. - 1063-6692 .- 1558-2566. ; 5:2, s. 255-265
  • Tidskriftsartikel (refereegranskat)abstract
    • We study the mobile admission control problem in a cellular PCS network where transmitter powers are constrained and controlled by a distributed constrained power control (DCPC) algorithm. Receivers are subject to nonnegligible noise, and the DCPC attempts to bring each receiver's CIR (carrier-to-interference ratio) above a given quality target. Two classes of distributed admission control are considered. One is a noninteractive admission control (N-IAC), where an admission decision is instantaneously made based on the system state. The other is an interactive admission control (IAC), under which the new mobile is permitted to interact with one or more potential channels before a decision is made. The algorithms are evaluated with respect to their execution time and their decision errors. Two types of errors are examined: type I error, where a new mobile is erroneously accepted and results in outage; and type II error, where a new mobile is erroneously rejected and results in blocking. The algorithms in the N-IAC class accept a new mobile if and only if the uplink and the downlink interferences are below certain corresponding thresholds. These algorithms are subject to errors of type I and type II. In the IAC class, we derive a soft and safe (SAS) admission algorithm, which is type I and type II error free, and protects the CIR's of all active links at any moment of time. A fast-SAS version, which is only type I error-free, is proposed for practical implementation, and is evaluated in several case studies.
  •  
3.
  • Araldo, Andrea, et al. (författare)
  • Caching Encrypted Content Via Stochastic Cache Partitioning
  • 2018
  • Ingår i: IEEE/ACM Transactions on Networking. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 1063-6692 .- 1558-2566. ; 26:1, s. 548-561
  • Tidskriftsartikel (refereegranskat)abstract
    • In-network caching is an appealing solution to cope with the increasing bandwidth demand of video, audio, and data transfer over the Internet. Nonetheless, in order to protect consumer privacy and their own business, content providers (CPs) increasingly deliver encrypted content, thereby preventing Internet service providers (ISPs) from employing traditional caching strategies, which require the knowledge of the objects being transmitted. To overcome this emerging tussle between security and efficiency, in this paper we propose an architecture in which the ISP partitions the cache space into slices, assigns each slice to a different CP, and lets the CPs remotely manage their slices. This architecture enables transparent caching of encrypted content and can be deployed in the very edge of the ISP's network (i.e., base stations and femtocells), while allowing CPs to maintain exclusive control over their content. We propose an algorithm, called SDCP, for partitioning the cache storage into slices so as to maximize the bandwidth savings provided by the cache. A distinctive feature of our algorithm is that ISPs only need to measure the aggregated miss rates of each CP, but they need not know the individual objects that are requested. We prove that the SDCP algorithm converges to a partitioning that is close to the optimal, and we bound its optimality gap. We use simulations to evaluate SDCP's convergence rate under stationary and nonstationary content popularity. Finally, we show that SDCP significantly outperforms traditional reactive caching techniques, considering both CPs with perfect and with imperfect knowledge of their content popularity.
  •  
4.
  • Archambault, Emile, et al. (författare)
  • Routing and spectrum assignment in elastic filterless optical networks
  • 2016
  • Ingår i: IEEE/ACM Transactions on Networking. - : IEEE. - 1063-6692 .- 1558-2566. ; 24:6, s. 3578-3592
  • Tidskriftsartikel (refereegranskat)abstract
    • Elastic optical networking is considered a promising candidate to improve the spectral efficiency of optical networks. One of the most important planning challenges of elastic optical networks is the NP-hard routing and spectrum assignment (RSA) problem. In this paper, we investigate offline RSA in elastic filterless optical networks, which use a passive broadcast-and-select architecture to offer network agility. Here elastic optical network is referred to as the optical network that can adapt the channel bandwidth, data rate, and transmission format for each traffic demand in order to offer maximum throughput. In elastic filterless networks, the presence of unfiltered signals resulting from the drop-and-continue node architecture must be considered as an additional constraint in the RSA problem. In this paper, first the RSA problem in elastic filterless networks is formulated by using integer linear program (ILP) to obtain optimal solutions for small networks. Due to the problem complexity, two efficient RSA heuristics are also proposed to achieve suboptimal solutions for larger networks in reasonable time. Simulation results show that significant bandwidth savings in elastic filterless networks can be achieved compared to the fixed-grid filterless solutions. The proposed approach is further tested in multi-period traffic scenarios and combined with periodical spectrum defragmentation, leading to additional improvement in spectrum utilization of elastic filterless optical networks.
  •  
5.
  • Athanasiou, Georgios, et al. (författare)
  • Optimizing Client Association for Load Balancing and Fairness in Millimeter Wave Wireless Networks
  • 2015
  • Ingår i: IEEE/ACM Transactions on Networking. - : Institute of Electrical and Electronics Engineers (IEEE). - 1063-6692 .- 1558-2566. ; 23:3, s. 836-850
  • Tidskriftsartikel (refereegranskat)abstract
    • Millimeter-wave communications in the 60-GHz band are considered one of the key technologies for enabling multigigabit wireless access. However, the special characteristics of such a band pose major obstacles to the optimal utilization of the wireless resources, where the problem of efficient client association to access points (APs) is of vital importance. In this paper, the client association in 60-GHz wireless access networks is investigated. The AP utilization and the quality of the rapidly vanishing communication links are the control parameters. Because of the tricky non-convex and combinatorial nature of the client association optimization problem, a novel solution method is developed to guarantee balanced and fair resource allocation. A new distributed, lightweight, and easy-to-implement association algorithm, based on Lagrangian duality theory and subgradient methods, is proposed. It is shown that the algorithm is asymptotically optimal, that is, the relative duality gap diminishes to zero as the number of clients increases.
  •  
6.
  • Barbette, Tom, 1990-, et al. (författare)
  • Cheetah : A High-Speed Programmable Load-Balancer Framework with Guaranteed Per-Connection-Consistency
  • 2022
  • Ingår i: IEEE/ACM Transactions on Networking. - : Institute of Electrical and Electronics Engineers (IEEE). - 1063-6692 .- 1558-2566. ; 30:1, s. 354-367
  • Tidskriftsartikel (refereegranskat)abstract
    • Large service providers use load balancers to dispatch millions of incoming connections per second towards thousands of servers. There are two basic yet critical requirements for a load balancer: uniform load distribution of the incoming connections across the servers, which requires to support advanced load balancing mechanisms, and per-connection-consistency (PCC), i.e, the ability to map packets belonging to the same connection to the same server even in the presence of changes in the number of active servers and load balancers. Yet, simultaneously meeting these requirements has been an elusive goal. Today's load balancers minimize PCC violations at the price of non-uniform load distribution. This paper presents Cheetah, a load balancer that supports advanced load balancing mechanisms and PCC while being scalable, memory efficient, fast at processing packets, and offers comparable resilience to clogging attacks as with today's load balancers. The Cheetah LB design guarantees PCC for any realizable server selection load balancing mechanism and can be deployed in both stateless and stateful manners, depending on operational needs. We implemented Cheetah on both a software and a Tofino-based hardware switch. Our evaluation shows that a stateless version of Cheetah guarantees PCC, has negligible packet processing overheads, and can support load balancing mechanisms that reduce the flow completion time by a factor of 2-3 ×.
  •  
7.
  • Barbette, Tom, 1990-, et al. (författare)
  • Combined stateful classification and session splicing for high-speed NFV service chaining
  • 2021
  • Ingår i: IEEE/ACM Transactions on Networking. - : IEEE. - 1063-6692 .- 1558-2566.
  • Tidskriftsartikel (refereegranskat)abstract
    • Network functions such as firewalls, NAT, DPI, content-aware optimizers, and load-balancers are increasingly realized as software to reduce costs and enable outsourcing. To meet performance requirements these virtual network functions (VNFs) often bypass the kernel and use their own user-space networking stack. A naïve realization of a chain of VNFs will exchange raw packets, leading to many redundant operations, wasting resources. In this work, we design a system to execute a pipeline of VNFs. We provide the user facilities to define (i) a traffic class of interest for the VNF, (ii) a session to group the packets (such as the TCP 4-tuple), and (iii) the amount of space per session. The system synthesizes a classifier and builds an efficient flow table that when possible will automatically be partially offloaded and accelerated by the network interface. We utilize an abstract view of flows to support seamless inspection and modification of the content of any flow (such as TCP or HTTP). By applying only surgical modifications to the protocol headers, we avoid the need for a complex, hard-to-maintain user-space TCP stack and can chain multiple VNFs without re-constructing the stream multiple times, allowing up to 5x improvement over standard approaches.
  •  
8.
  • Björkman, Mats, et al. (författare)
  • Performance modeling of multiprocessor implementations of protocols
  • 1998
  • Ingår i: IEEE/ACM Transactions on Networking. - : Institute of Electrical and Electronics Engineers (IEEE). - 1063-6692 .- 1558-2566. ; 6:3, s. 262-273
  • Tidskriftsartikel (refereegranskat)abstract
    • Two major performance bottlenecks in multiprocessor execution of protocols are contention for shared memory and for locks. Locks are used to protect shared messages and/or shared protocol state in a memory shared by competing processors. Mutual exclusion
  •  
9.
  • Briat, C., et al. (författare)
  • The Conservation of Information, Towards an Axiomatized Modular Modeling Approach to Congestion Control
  • 2015
  • Ingår i: IEEE/ACM Transactions on Networking. - 1063-6692 .- 1558-2566. ; 23:3, s. 851-865
  • Tidskriftsartikel (refereegranskat)abstract
    • We derive a modular fluid-flow network congestion control model based on a law of fundamental nature in networks: the conservation of information. Network elements such as queues, users, and transmission channels and network performance indicators like sending/acknowledgment rates and delays are mathematically modeled by applying this law locally. Our contributions are twofold. First, we introduce a modular metamodel that is sufficiently generic to represent any network topology. The proposed model is composed of building blocks that implement mechanisms ignored by the existing ones, which can be recovered from exact reduction or approximation of this new model. Second, we provide a novel classification of previously proposed models in the literature and show that they are often not capable of capturing the transient behavior of the network precisely. Numerical results obtained from packet-level simulations demonstrate the accuracy of the proposed model.
  •  
10.
  • Castiglione, Luca Maria, et al. (författare)
  • Cooperative Intersection Crossing Over 5G
  • 2021
  • Ingår i: IEEE/ACM Transactions on Networking. - 1558-2566 .- 1063-6692. ; 29:1, s. 303-317
  • Tidskriftsartikel (refereegranskat)abstract
    • IEEE Autonomous driving is a safety critical application of sensing and decision-making technologies. Communication technologies extend the awareness capabilities of vehicles, beyond what is achievable with the on-board systems only. Nonetheless, issues typically related to wireless networking must be taken into account when designing safe and reliable autonomous systems. The aim of this work is to present a control algorithm and a communication paradigm over 5G networks for negotiating traffic junctions in urban areas. The proposed control framework has been shown to converge in a finite time and the supporting communication software has been designed with the objective of minimizing communication delays. At the same time, the underlying network guarantees reliability of the communication. The proposed framework has been successfully deployed and tested, in partnership with Ericsson AB, at the AstaZero proving ground in Goteborg, Sweden. In our experiments, three heterogeneous autonomous vehicles successfully drove through a 4-way intersection of 235 square meters in an urban scenario.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 53
Typ av publikation
tidskriftsartikel (53)
Typ av innehåll
refereegranskat (53)
Författare/redaktör
Dán, György (10)
Proutiere, Alexandre (3)
Al-Zubaidy, Hussein (3)
Chiesa, Marco (3)
Hjalmarsson, Håkan (2)
Carlsson, Niklas (2)
visa fler...
Wosinska, Lena (2)
Fischione, Carlo (2)
Chen, Jiajia (2)
Schapira, M (2)
Johansson, Karl Henr ... (2)
Shi, Guodong (2)
Gunningberg, Per (2)
Vasilakos, Athanasio ... (2)
He, Qing (1)
Brunström, Anna, 196 ... (1)
Grinnemo, Karl-Johan ... (1)
Alay, Özgü (1)
Vasilakos, Athanasio ... (1)
Yang, Guang (1)
Furdek, Marija, 1985 ... (1)
Muhammad, Ajmal (1)
Wosinska, Lena, 1951 ... (1)
Björkman, Mats (1)
Fodor, Gábor (1)
Gross, James, 1975- (1)
Johansson, Karl H. (1)
Zander, Jens (1)
Sandberg, Henrik (1)
Johansson, Karl Henr ... (1)
Pink, Stephen (1)
Hurtig, Per, 1980- (1)
Moldeklev, Kjersti (1)
Schmid, Stefan (1)
Gurtov, Andrei (1)
Gross, James, Profes ... (1)
Champati, Jaya Praka ... (1)
Haridi, Seif (1)
Fodor, Viktoria (1)
Liebeherr, Joerg (1)
Burchard, Almut (1)
Petrova, Marina (1)
Aurell, Erik (1)
Papadimitratos, Pana ... (1)
Kleijn, W. Bastiaan (1)
El-Ansary, Sameh (1)
Falcone, Paolo, 1977 (1)
Johansson, Mikael (1)
Jönsson, Ulf T. (1)
Papaefstathiou, Vasi ... (1)
visa färre...
Lärosäte
Kungliga Tekniska Högskolan (41)
Linköpings universitet (4)
Luleå tekniska universitet (3)
Chalmers tekniska högskola (3)
Uppsala universitet (2)
RISE (1)
visa fler...
Karlstads universitet (1)
visa färre...
Språk
Engelska (53)
Forskningsämne (UKÄ/SCB)
Teknik (37)
Naturvetenskap (20)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy