• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 38
  • 10
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 68
  • 68
  • 12
  • 11
  • 11
  • 11
  • 11
  • 10
  • 9
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Enhancing the performance of mobile networks using Kubernetes : Load balancing traffic by utilizing workload estimation / Lastbalansering av trafik i ett Kuberneteskluster med hjälp av arbetsbelastningestimering

Laukka, Lucas, Fransson, Carl January 2023 (has links)
As global mobile network usage increases rapidly and users demand lower latency, the importance of stable 5G networks is more critical than ever. One way to orchestrate mobile network backends is by using Kubernetes. Kubernetes allows for automatic restarts and scaling of containers and provides an easy way to route incoming connections to applications running in containers. By routing the incoming connections using different load-balancing algorithms, it is possible to reduce latency through more efficient usage of worker nodes.  This thesis aims to identify ways to use load balancing inside a Kubernetes cluster to increase throughput and reduce latency in a mobile network system. We perform a literature study on possible ways to implement load balancing in Kubernetes and possible algorithms to use in the load balancing. Using the study results, we model a simplified mobile network system in a Kubernetes cluster and implement a load balancer at the Service level. By running simulations on this model, we compare three algorithms existing in Kubernetes as well as a dynamic algorithm using estimated workloads in terms of latency and throughput. The existing algorithms that are compared include Round Robin, Least Connections, and Random. The results show a potential to reduce latency by up to 31% compared to the native Random algorithm when utilizing a dynamic load balancer at the Service level.
22

Online System for OrienteeringResults : A portable solution for collecting, processing andtransmitting orienteering results in real-time / Uppkopplat system för beräkning av orienteringsresultat : En portabel lösning för insamling, behandling och överföring av

Kallhauge, Mattias, Turesson, Kjell January 2022 (has links)
Today orienteering competitions use digital sensors to collect the punches from each runner. This is done by a chip that the runner carries and punches at each control where a sensor is placed. This data is then collected and processed by a computer program to calculate the results. Since the orienteering competitions often occur in areas without common infrastructures, it requires the organisers to build their own for power and network. This thesis set out to investigate if it is possible to build a system where the data could be read, processed and presented without these locally built infrastructures. Furthermore, it investigates how much power the system would require. To test this a Raspberry Pi computer is used, where an orienteering sensor alongside a 4G modem is connected. On the Raspberry Pi a program is built for reading the data via an API communicating with the sensor. Then through mobile network the reserved data is sent to a result calculation server. These results are then presented on a website in order of best time. The energy consumption is measured through the amount of current the device uses. It was discovered that the device’s peak current was 798 mA which leads to that for a standard competition time of 8 hours a battery with the capacity of 6384 mA·h would be required. / Idag använder orienteringstävlingar digitala sensorer för att registrera stämplingar för de tävlande. Det görs med ett chip som löparen har med sig och stämplar i sensorer vid varje kontroll. Detta data läses sedan av och processas av ett datorprogram för att kalkylera ett resultat. Eftersom orienteringstävlingar ofta sker i områden utan allmän infrastruktur, krävs det att arrangören bygger upp egen infrastruktur för elektricitet och nätverk. Den här avhandlingen avser att undersöka om det är möjligt att bygga ett system där datat inhämtas, processas och presenteras utan att behöva bygga upp denna lokala infrastruktur. Vidare är syftet att undersöka hur mycket energi ett sådant system kräver. För att göra detta används en Raspberry Pi dator med en orienteringssensor och ett 4G modem. På Raspberry Pi:en skapas ett program vilket läser ut orienteringschipets data via ett API som kommunicerar med sensorn, och skickar via mobilt nätverk datat till en resultatberäkningsserver. Dessa resultat presenteras sedan på en webbsida. Den krävda batterikapaciteten beräknas utifrån hur mycket ström Raspberry Pi:en använder. Undersökningen visade att datorns maximala strömförbrukning var 798 mA vilket leder till att den krävda batterikapaciteten för att klara en tävlingsdag på 8 timmar är 6384 mA·h.
23

Accelerating Audio Data Analysis with In-Network Computing

Wu, Huanzhuo 19 July 2023 (has links)
Digital transformation will experience massive connections and massive data handling. This will imply a growing demand for computing in communication networks due to network softwarization. Moreover, digital transformation will host very sensitive verticals, requiring high end-to-end reliability and low latency. Accordingly, the emerging concept “in-network computing” has been arising. This means integrating the network communications with computing and also performing computations on the transport path of the network. This can be used to deliver actionable information directly to end users instead of raw data. However, this change of paradigm to in-network computing raises disruptive challenges to the current communication networks. In-network computing (i) expects the network to host general-purpose softwarized network functions and (ii) encourages the packet payload to be modified. Yet, today’s networks are designed to focus on packet forwarding functions, and packet payloads should not be touched in the forwarding path, under the current end-to-end transport mechanisms. This dissertation presents fullstack in-network computing solutions, jointly designed from network and computing perspectives to accelerate data analysis applications, specifically for acoustic data analysis. In the computing domain, two design paradigms of computational logic, namely progressive computing and traffic filtering, are proposed in this dissertation for data reconstruction and feature extraction tasks. Two widely used practical use cases, Blind Source Separation (BSS) and anomaly detection, are selected to demonstrate the design of computing modules for data reconstruction and feature extraction tasks in the in-network computing scheme, respectively. Following these two design paradigms of progressive computing and traffic filtering, this dissertation designs two computing modules: progressive ICA (pICA) and You only hear once (Yoho) for BSS and anomaly detection, respectively. These lightweight computing modules can cooperatively perform computational tasks along the forwarding path. In this way, computational virtual functions can be introduced into the network, addressing the first challenge mentioned above, namely that the network should be able to host general-purpose softwarized network functions. In this dissertation, quantitative simulations have shown that the computing time of pICA and Yoho in in-network computing scenarios is significantly reduced, since pICA and Yoho are performed, simultaneously with the data forwarding. At the same time, pICA guarantees the same computing accuracy, and Yoho’s computing accuracy is improved. Furthermore, this dissertation proposes a stateful transport module in the network domain to support in-network computing under the end-to-end transport architecture. The stateful transport module extends the IP packet header, so that network packets carry message-related metadata (message-based packaging). Additionally, the forwarding layer of the network device is optimized to be able to process the packet payload based on the computational state (state-based transport component). The second challenge posed by in-network computing has been tackled by supporting the modification of packet payloads. The two computational modules mentioned above and the stateful transport module form the designed in-network computing solutions. By merging pICA and Yoho with the stateful transport module, respectively, two emulation systems, i.e., in-network pICA and in-network Yoho, have been implemented in the Communication Networks Emulator (ComNetsEmu). Through quantitative emulations, the experimental results showed that in-network pICA accelerates the overall service time of BSS by up to 32.18%. On the other hand, using in-network Yoho accelerates the overall service time of anomaly detection by a maximum of 30.51%. These are promising results for the design and actual realization of future communication networks.
24

PERFORMANCE ANALYSIS OF HYBRID RESERVATION HANDOFF SCHEME FOR INTEGRATED WIRELESS MOBILE NETWORK

WANG, JINGAO 11 October 2001 (has links)
No description available.
25

A privacy-preserving reputation scheme for trust management on VANETs applications / Um esquema de reputação preservando a privacidade para o gerenciamento de confiança em aplicações VANETs

Jaimes, Luz Marina Santos 10 August 2017 (has links)
Vehicles will use pseudonyms instead of relying on long-term certificates to provide security and privacy. Pseudonyms are short-term public key certificates that do not contain identity-linking information about the vehicle. However, there is a constant risk that authorised vehicles may send fake messages or behave selfishly, and this can affect the performance of the Vehicular Ad hoc NETwork (VANET). In this context, trust management is another important component of security services in VANETs, which provides a unified system for establishing a relationship between the nodes and helps by keeping record of the behaviour of the vehicles. Nevertheless, it is a challenging task to monitor the evolving pattern of the vehicular behaviour, since communication between the vehicles is anonymous. It is not easy to find a balanced solution that meets the requirements of security, privacy, and trust management in VANET. In view of this, we put forward a Preserving-Privacy Reputation Scheme (PPRS) applied to VANETs, in which a reputation server through a Roadside Unit receives feedback about the behaviour of the vehicles. The server updates and certifies the reputation of the vehicles by matching their anonymous identities with their real ones. Our scheme introduces geographical areas of security, in which the security of an area can be adapted to higher or lower levels depending on the reputation of the vehicles. In addition, complex reputation is examined, in which the reputation of a vehicle is linked to several behavioural factors. A further key area that is explored is the performance evaluation of PPRS which is conducted through a set of simulations in a grid scenario, based on an opportunistic message forwarding application. The results showed the effectiveness of PPRS in terms of assessing the behaviour of the vehicles and taking measures against the misbehaving vehicles. We used SUMO to simulate the mobility model; OMNET++ and Veins supported the simulation of the network model. In addition, Crypto++ was used to implement the elliptical curve cryptographic functions of signature and verification of messages, as recommended by the security standards. Finally, we employ a pseudonym changing strategy in which the reputation is discretised at two levels of reputation. The strategy was implemented in a realistic traffic simulation scenario, and was compared with the so called status and synchronous strategies through a serie of simulations. The results showed that the number of pseudonyms used in our strategy is lower than the strategies mentioned above, and maintains the rate of success of changing pseudonym achieved by the synchronous strategy. / Os veículos usarão pseudônimos em vez de certificados de longo prazo para fornecer segurança e privacidade. Os pseudônimos são certificados de chaves públicas de curto prazo que não contêm informação da identidade do veículo. No entanto, existe risco que veículos autorizados possam enviar mensagens falsas ou se comportar de maneira egoísta, e isso pode afetar o desempenho das redes veiculares (VANETs). Nesse contexto, o gerenciamento de confiança é um importante serviço de segurança nas VANETs, o qual fornece um sistema unificado para estabelecer relações entre os nós e ajuda a manter um registro do comportamento dos veículos. No entanto, é uma tarefa desafiante monitorar o padrão evolutivo do comportamento veicular, já que a comunicação entre os veículos é anônima. Não é uma tarefa fácil encontrar uma solução equilibrada que atenda aos requisitos de segurança, privacidade e gerenciamento de confiança em VANET. Em vista disso, apresentamos um Esquema de Reputação Preservando a Privacidade (ERPP) aplicado a VANETs, no qual um servidor de reputação através de uma unidade de acostamento recebe avaliações sobre o comportamento dos veículos. O servidor atualiza e certifica a reputação dos veículos relacionando seus identidades anônimas com as reais. ERPP introduz áreas geográficas de segurança, na qual a segurança de uma área pode ser adaptada a níveis mais elevados ou mais baixos dependendo da reputação dos veículos. Além, uma reputação complexa é examinada, na qual a reputação de um veículo está vinculada a vários fatores do comportamento. Uma outra área que é explorada é a avaliação de desempenho do ERPP o qual é conduzida através de simulações em um cenário urbano, com base na aplicação de encaminhamento oportunista de mensagens. Os resultados mostraram a eficácia do ERPP em termos de avaliar o comportamento dos veículos e tomar medidas contra os veículos mal comportados. Utilizamos SUMO para simular o modelo de mobilidade; OMNET++ e Veins suportaram o modelo de red; and Crypto++ foi usado para implementar as funções criptográficas de curvas elípticas de assinatura e verificação de mensagens como recomendam os padrões de segurança. Finalmente, empregamos uma estratégia de mudança de pseudônimo na qual a reputação é discretizada em dois níveis de reputação. A estratégia foi implementada em um cenário de simulação de tráfego realista e foi comparada com as estratégias nomeadas de estado e síncrona mediante simulações. Os resultados mostraram que o número de pseudônimos utilizados em nossa estratégia é menor que os esquemas mencionados, e mantém a taxa de sucesso de mudança de pseudônimo alcançada pela estratégia síncrona.
26

無線行動網路中以跨層設計混合式多點傳輸策略的研究 / Cross layer hybrid multicasting policy over wireless mobile network

陳吉定, Chen, Ji Ding Unknown Date (has links)
在無線傳輸網路環境日益普遍的今日,以往各類型只在固定網路傳輸上的應用都紛紛的套用在具移動性要求的無線傳輸網路上。然而無線網路的傳輸環境比固定網路有更多使用上的條件限制以及需克服技術上的問題,像是與基地台傳輸距離的限制而產生對傳輸連線上換手( Handover )的需求,以及因為換手而導致傳輸時各種時間上的延遲( Delay )和抖動( Jitter ),若是多媒體 (Multimedia) 的多點傳輸( Multicasting )需求,則更要對傳輸內容的特性和傳輸協定的可靠性、可擴展性及穩定性加以考量。再者因為在無線傳輸環境中接收端和發送端都可能是處於移動的狀態,所以整個傳輸架構的健全性 ( Robustness )也十分重要。基於這些需求,本論文提出利用跨層(Cross Layer)設計來匯集較低網層協定在傳輸速率(Throughput)上的優勢,以及由較高網層協定提供之針對傳輸內容不同需求的應用彈性,降低協定在既有網路中實現的困難度,以期Wireless網路提供多點傳輸時在滿足穩定性及可靠性的要求下,達到最佳的傳輸速率表現。 / Applications of wireless mobile network are prevalent in recent years. Many applications inherited or developed from wired network have been proposed to enable mobile nodes to connect to wireless mobile network to access resources/services from Internet using multicasting protocol. However, wireless mobile networks have difficulty in forwarding information due to its inherent dynamism and frequent topology changes. To multicast multimedia data stream, we have to consider not only the issues of reliability, robustness, scalability and stability of routing protocol, but also the content of transmission. Besides, when handover occurs frequently during transmission, the throughput decreases rapidly due to severe jitter and delay. This thesis presents a hybrid multicasting policy for wireless mobile network to build a multicasting architecture using cross layer design of network layer and application layer to manage quality transmission according to flexible requirements. In summary, our goal is to optimize throughput in order to fulfill the requirement of reliability and stability of multicasting in wireless mobile network.
27

Identification and Analysis of Market Indicators : a predictive tool for anticipating future demand fluctuations on the telecom mobile network equipment market / Identifiering och analys av marknadsindikatorer : ett verktyg för att förutsäga framtida efterfrågeförändringar på marknaden för utrustning till mobiltelefonisystem

Lind, Rutger, Törnblad, Johan January 2002 (has links)
Background: Forecasting is an instrument that the managers rely upon for their anticipations of the future. Subcontractors control their operations according to the forecast volumes provided by the telecom mobile network equipment suppliers. The information in the forecasts is however not sufficient. Purpose: The purpose of this thesis is to identify and test relevant and available market indicators for prediction of future demand fluctuations on the telecom mobile network equipment market. Realisation: During a number of interviews, factors that are driving the network equipment market were clarified. The aim of this part was to identify possible market indicators. Hypotheses were set up to test the chosen indicators. In the second part, the indicators were tested statistically. Finally, the theoretical and logical support of the results was discussed. Result: To predict future movements in network equipment demand, the market indicators should focus on the telecom mobile operators, and their ability, need, and willingness to make new investments. The market indicators proven to be of most importance after the regression analyses were long-term market interest rates and telecom corporate bond indices.
28

ASPIRE: Adaptive Service Provider Infrastructure for VANETs

Koulakezian, Agop 25 August 2011 (has links)
User desire for ubiquitous applications on-board a vehicle motivates the necessity for Network Mobility (NEMO) solutions for Vehicular Ad-Hoc Networks (VANETs). Due to the dynamic topology of VANETs, this approach incurs excessive infrastructure cost to maintain stable connectivity and support these applications. Our solution to this problem is focused on a novel NEMO-based Network Architecture where vehicles are the main network infrastructure. Within this Architecture, we present a Network Criticality-based clustering algorithm, which adapts to mobility changes to form stable self-organizing clusters of vehicles and dynamically builds on vehicle clusters to form more stable Mobile Networks. Simulation results show that the proposed method provides more stable clusters, lower handoffs and better connectivity compared to popular density-based vehicle clustering methods. In addition, they confirm the validity of the proposed Network Architecture. The proposed method is also robust to channel error and exhibits better performance when the heterogeneity of vehicles is exploited.
29

ASPIRE: Adaptive Service Provider Infrastructure for VANETs

Koulakezian, Agop 25 August 2011 (has links)
User desire for ubiquitous applications on-board a vehicle motivates the necessity for Network Mobility (NEMO) solutions for Vehicular Ad-Hoc Networks (VANETs). Due to the dynamic topology of VANETs, this approach incurs excessive infrastructure cost to maintain stable connectivity and support these applications. Our solution to this problem is focused on a novel NEMO-based Network Architecture where vehicles are the main network infrastructure. Within this Architecture, we present a Network Criticality-based clustering algorithm, which adapts to mobility changes to form stable self-organizing clusters of vehicles and dynamically builds on vehicle clusters to form more stable Mobile Networks. Simulation results show that the proposed method provides more stable clusters, lower handoffs and better connectivity compared to popular density-based vehicle clustering methods. In addition, they confirm the validity of the proposed Network Architecture. The proposed method is also robust to channel error and exhibits better performance when the heterogeneity of vehicles is exploited.
30

Mobiltelefoni - en djungel för konsumenterna : Vilka faktorer påverkar valet av mobiloperatör? / :

Broo, David January 2011 (has links)
Sammanfattning Ämnesfördjupande arbete inom marknadsföring, Ekonomihögskolan vid Linnéuniversitetet Civilekonomprogrammet, 4FE03E, VT 2011. Författare: David Broo Handledare: Sarah Philipson Titel: Mobiltelefoni – en djungel för konsumenterna. Vilka faktorer påverkar deras val av mobiloperatör? Syfte: Uppsatsens syfte är att undersöka vilka faktorer som påverkar de svenska konsumenternas val av mobiloperatör. Ett delsyfte är att undersöka vad som påverkar deras lojalitet till sin operatör. Frågeställning: Vilka faktorer påverkar de svenska konsumenternas val av mobiloperatör? Metod: Det teoretiska materialet består av litteratur och vetenskapliga artiklar. Den empiriska delen genomfördes med hjälp av två fokusgrupper med totalt 20 studenter från Linnéuniversitetet i Växjö samt genom diverse hemsidor, branschpress och facktidningar. Slutsats: Trygghet, täckning och pris är viktiga faktorer i konsumenternas val av operatör. Det verkar dock som om operatörerna inte differentierar sig i tillräcklig utsträckning. Etiska värden, frihet och flexibilitet är faktorer som skulle kunna bidra till en tydligare differentiering av operatörernas varumärken. I dagsläget är konsumenterna lojala till sin operatör då de inte anser det vara lönt att byta. De uppfattar istället branschen som "en djungel" och är därför lojala till sin operatör. Nyckelord: Varumärke, konsumenter, lojalitet, mobiloperatör, konsumentbeteende / Abstract This is a master thesis within the field of marketing written at the Economic institution on the Linnaeus University in Växjö, 4FE03E, spring 2011. Author: David Broo Tutor: Sarah Philipson Title: Mobile telephony – a jungle for the consumers. Which factors affect the choice of mobile network operator? Purpose: Purpose of this essay is to explore which factors that affect the Swedish consumer’s choice of mobile network operator. A part of the purpose is also to explore which factors that affect the loyalty to their mobile network operator. Research question: Which factors affect the Swedish consumer’s choice of mobile network operator? Method: The theoretical material consists of literature and scientific articles. The empirical part was conducted by four focus groups with a total of 20 students from Linnaeus University in Växjö, and from electronic sources, various trade press and journals. Conclusion: Safety, coverage and price are key factors in consumer’s selection of mobile network operator. It seems that the mobile network operators do not differentiate themselves sufficiently. Ethical values, freedom and flexibility are factors that could contribute to a clearer differentiation of the brands of the mobile network operators. Currently consumers are loyal to their mobile network operator because of they do not consider it worthwhile to change. They are instead seeing the industry as "a jungle" and are therefore loyal. Keywords: Brand name, consumer’s, loyalty, mobile network operator, consumer behavior

Page generated in 0.0492 seconds