• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 62
  • 10
  • 8
  • 7
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 118
  • 118
  • 27
  • 25
  • 20
  • 19
  • 19
  • 18
  • 13
  • 12
  • 12
  • 11
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Στρατηγικές ελέγχου της ισχύος σε κινητά δίκτυα μεγαλύτερα από τρίτης γενιάς

Ρηγοπούλου, Αικατερίνη 03 October 2011 (has links)
Στα πλαίσια της παρούσας διπλωματικής εργασίας έγινε μια εκτενής μελέτη των τρόπων μετάδοσης και των μηχανισμών που συντελούν στην ασύρματη διάδοση. Επίσης παρουσιάστηκαν συνοπτικά ιστορικά στοιχεία σε σχέση με την εξέλιξη των συστημάτων κινητής τηλεφωνίας, καθώς και στοιχεία που αφορούν τις μεθόδους πολλαπλής πρόσβασης που έχουν χρησιμοποιηθεί μέχρι σήμερα. Επιπροσθέτως, ιδιαίτερη σημασία δόθηκε στη μελέτη και περιγραφή της δομής του υπάρχοντος δικτύου κινητής τηλεφωνίας. Ορίστηκαν τα βασικά μέρη στα οποία χωρίζεται και παρουσιάστηκαν εκτενώς οι βασικές λειτουργικές μονάδες που τα αποτελούν, καθώς και οι διεπαφές μέσω των οποίων αυτές επικοινωνούν. Στη συνέχεια, δόθηκε έμφαση στην προτεινόμενη μέθοδο κατανομής των πόρων του συστήματος με χρήση της OFDMA μεθόδου πολλαπλής πρόσβασης, η οποία έχει ως στόχο την ελαχιστοποίηση της ομοκαναλικής παρεμβολής. Τέλος, μετά την ολοκλήρωση των προσομοιώσεων που είχαν ως στόχο τη διερεύνηση της συμπεριφοράς του συστήματος ως προς το ρυθμό εξυπηρέτησης και τη δικαιοσύνη, εξάχθηκαν συμπεράσματα σχετικά με την επιρροή που έχουν στο δίκτυο η μεταβολή του αριθμού των χρηστών κάθε κελιού, η μεταβολή του μεγέθους του κελιού, η κατανομή της ισχύος μεταξύ των χρηστών και ο ρυθμός μετάδοσης λαθών. / Thw sybject of this essay is power allocation in 4G mobile networks. It consists of a thorought description of the basic mechanisms in a mobile network and a throughput and fairness analysis on the recommended power allocation algorithms.
52

Διερεύνηση της παραμέτρου της συμφόρησης της επικοινωνιακής κίνησης στα κυψελωτά δίκτυα τεχνολογίας GSM

Αγγελόπουλος, Βασίλειος 17 September 2012 (has links)
Η παρούσα εργασία διερευνά την παράμετρο της συμφόρησης της επικοινωνιακής κίνησης στα κυψελωτά δίκτυα κινητής τηλεφωνίας GSM. Αρχικά γίνεται μια εισαγωγή στα δίκτυα κινητής τηλεφωνίας ξεκινώντας από τα συστήματα 1ης γενιάς και καταλήγοντας τα σημερινά συστήματα 4ης γενιάς. Στην συνέχεια, παρουσιάζεται η δομή του κυψελωτού δικτύου κινητής τηλεφωνίας GSM δίνοντας έμφαση στην αρχιτεκτονική του, στις διεπαφές και το πρωτόκολλα που χρησιμοποιεί καθώς και στις βασικές λειτουργίες που εκτελεί. Σε μεγαλύτερο βάθος, αναλύονται οι λειτουργίες και τα πρωτόκολλα του HLR κόμβου, ο οποίος αποτελεί και ένα από τα πιο κεντρικά μέρη του δικτύου GSM. Μετά μελετάται η παράμετρος της συμφόρησης στα δίκτυα GSM γενικά δίνοντας τον ορισμό της έννοιας της συμφόρησης, παρουσιάζοντας τα διαφορετικά είδη συμφόρησης και τις αιτίες που την δημιουργούν και καταλήγοντας στους ποικίλους τρόπους αντιμετώπισης της. Το βασικό κομμάτι της παρούσας εργασίας ασχολείται με την διερεύνηση της παραμέτρου της τηλεπικοινωνιακής συμφόρησης μέσα στο HLR κόμβο ενός κυψελωτού δικτύου κινητής τηλεφωνίας GSM, και συγκεκριμένα την συμφόρηση της κεντρικής μονάδας επεξεργασίας CPU του κόμβου αυτού. Περιγράφεται η περίπτωση του ενσωματωμένου HLR κόμβου (Integrated MSC/HLR) ενώ αναλύεται, σε πιο μεγάλη λεπτομέρεια, η περίπτωση του αυτόνομου HLR κόμβου (Stand-alone HLR). Ακολουθεί η παρουσίαση των αιτιών συμφόρησης της CPU ενός αυτόνομου HLR κόμβου και δίνεται ιδιαίτερη προσοχή στην διαδικασία του Location Updating και στην συμφόρηση που συμβαίνει κατά την διάρκεια αυτής της διαδικασίας. Γίνεται μια σύντομη αναφορά σε διάφορους τρόπους αντιμετώπισης αυτού του είδους της συμφόρησης και ύστερα προτείνεται ένας ολοκληρωμένος αλγόριθμος αποφυγής της εν λόγω συμφόρησης. Παρουσιάζεται με λεπτομέρεια το κάθε κομμάτι του αλγορίθμου αυτού και κατασκευάζεται ένας κώδικας προσομοίωσης του. Με βάση αυτών τον κώδικα, πραγματοποιούνται διάφορες μετρήσεις και πειράματα, παρουσιάζονται τα διάφορα αποτελέσματα και τελικά ο αλγόριθμος κρίνεται για την τη καταλληλότητα, την απόδοση, την προσαρμοστικότητα και την αξιοπιστία του. / This paper investigates the parameter of congestion of communication traffic in cellular mobile networks GSM. Initially, an introduction in the mobile networks is presented starting from the first generation systems and ending to the current fourth-generation systems. Then, the structure of cellular mobile GSM network is explored with an emphasis on architecture, interfaces and protocols used and the basic functions it performs. The functions and protocols of the HLR node, which is also one of the most central parts of the network GSM, is analyzed in more detail. Additionally, the parameter of the congestion in GSM networks, in general, is considered giving the definition of congestion, showing the different types and the causes that lead to its appearance and ending to the several ways that can help to prevent its creation or to suppress it. The main part of this study deals with the exploration of the parameter of congestion of telecommunication traffic in the HLR node in a cellular mobile network GSM, namely the congestion of central processing unit CPU of this node. It describes the case of integrated HLR node (Integrated MSC / HLR) and analyzes, in greater detail, the case of autonomous HLR node (Stand-alone HLR). The presentation of the causes of CPU bottlenecks in an autonomous HLR node follows with a particular attention to the Location Updating procedure and the congestion that occurs during this process. A brief reference to the various ways of dealing with this kind of congestion is presented and then an integrated algorithm that aims to avoid the congestion is proposed. Every piece of this algorithm is analyzed in great detail and a simulation code is constructed . Based on this code, various measurements and experiments are carried out , the different results are studied and evaluated and the algorithm is finally judged for its appropriateness, efficiency, adaptability and reliability.
53

ON EVALUATING MACHINE LEARNING APPROACHES FOR EFFICIENT CLASSIFICATION OF TRAFFIC PATTERNS

Kanumuri, Sai Srilakshmi January 2017 (has links)
Context. With the increased usage of mobile devices and internet, the cellular network traffic has increased tremendously. This increase in network traffic has led to increased occurrences of communication failures among the network nodes. Each communication failure among the nodes is defined as a bad event and occurrence of one such bad event acts as a source of origin for several consecutive bad events. These bad events as a whole may eventually lead to node failures (not being able to respond to any data requests). But it requires a lot of human effort and cost to be invested in by the telecom companies to implement workarounds for these node failures. So, there is a need to prevent node failures from happening. This can be done by classifying the traffic patterns between nodes in the network, identify bad events in them and deliver the verdict immediately after their detection. Objectives. Through this study, we aim to find the best suitable machine learning algorithm which can efficiently classify the traffic patterns of SGSN-MME (SGSN (Serving GPRS (General Packet Radio Service) Support node) and MME (Mobility Management Entity). SGSN-MME is a network management tool designed to support the functionalities of two nodes namely SGSN and MME. We do this by evaluating the classification performance of four machine learning classification algorithms, namely Support vector machines (SVMs), Naïve Bayes, Decision trees and Random forests, on the traffic patterns of SGSN and MME. The selected classification algorithm will be developed in such a way that, whenever it detects a bad event, it notifies the user about it by prompting a message saying, “Something bad is happening”. Methods. We have conducted an experiment for evaluating the classification performance of our four chosen classification algorithms on the dataset provided by Ericsson AB, Gothenburg. The experimental dataset is a combination of three logs, one of which represents the traffic patterns in real network and the other two logs contain synthetic traffic patterns that are generated manually. The dataset is unlabeled with 720 data instances and 4019 attributes in it. K-means clustering is performed for dividing the data instances into groups and thereby proceed with labeling them accordingly into good and bad events. Also, since the number of attributes in the experimental dataset are more than the number of instances, feature selection is performed for selecting the subset of relevant attributes which best represents the whole data. All the chosen classification algorithms are trained and tested with ten-fold cross validation sets using the selected subset of attributes and the obtained performance measures like classification accuracy, F1 score and training time are analyzed and compared for selecting the best suitable one among them. Finally, the chosen algorithm is tested on unlabeled real data and the performance measures are analyzed in order to check if is able to detect the bad events correctly or not. Results. Experimental results showed that Random forests outperformed Support vector machines, Naïve Bayes and Decision trees with an average classification accuracy of 99.72% and average F1 score of 99.6, when classification accuracy and F1 score are considered. On the other hand, Naive Bayes outperformed Support vector machines, Decision trees and Random forests with an average training time of 0.010 seconds, when training time is considered. Also, the classification accuracy and F1 score of Random forests on unlabeled data are found to be 100% and 100 respectively. Conclusions. Since our study focuses on classifying the traffic patterns of SGSN-MME more accurately, classification accuracy and F1 score are of highest importance than the training time of algorithm. Therefore, based on experimental results, we conclude that Random forests is the best suitable machine learning algorithm for classifying the traffic patterns of SGSN -MME. However, Naive Bayes can be also used if classification has to be performed in the least time possible and with moderate accuracy (around 70%).
54

RFID in Rail : RFID tracing of rail-borne cargo

Holmlund, Gabriel January 2015 (has links)
SCA transports timber via rail from railway terminals in western Sweden to saw and/or pulp mills located on the east coast. Sometimes timber wagons are lost due to damages inflicted when loading the wagon. Wagons can also be decommissioned for maintenance conducted by the Swedish Transport Administration. Both situations are unpredictable and causes many types of problems. If the wagons could be automatically traced these problems could be predicted and pre-emptive actions could be taken. All wagons used by SCA are equipped with RFID tags and RFID readers are installed at the railway terminals. The purpose of this thesis is to equip the RFID readers with Internet access, collect the data read by the RFID readers and present this data in a single page web application. The actual data collection is done by an already existing system which pushes the train data to the back-end part of the application. The front-end part is made with a JavaScript framework named Ember.js and the back-end part is made with ASP .NET Web API and SQL Server. The application is finished and verified with various tests but is not put in production due to a negotiation delay between SCA with a third-party consultant.
55

Optimisation of traffic steering for heterogeneous mobile networks

Frei, Sandra January 2015 (has links)
Mobile networks have changed from circuit switched to IP-based mobile wireless packet switched networks. This paradigm shift led to new possibilities and challenges. The development of new capabilities based on IP-based networks is ongoing and raises new problems that have to be tackled, for example, the heterogeneity of current radio access networks and the wide range of data rates, coupled with user requirements and behaviour. A typical example of this shift is the nature of traffic, which is currently mostly data-based; further, forecasts based on market and usage trends indicate a data traffic increase of nearly 11 times between 2013 and 2018. The majority of this data traffic is predicted to be multimedia traffic, such as video streaming and live video streaming combined with voice traffic, all prone to delay, jitter, and packet loss and demanding high data rates and a high Quality of Service (QoS) to enable the provision of valuable service to the end-user. While the demands on the network are increasing, the end-user devices become more mobile and end-user demand for the capability of being always on, anytime and anywhere. The combination of end-user devices mobility, the required services, and the significant traffic loads generated by all the end-users leads to a pressing demand for adequate measures to enable the fulfilment of these requirements. The aim of this research is to propose an architecture which provides smart, intelligent and per end-user device individualised traffic steering for heterogeneous mobile networks to cope with the traffic volume and to fulfil the new requirements on QoS, mobility, and real-time capabilities. The proposed architecture provides traffic steering mechanisms based on individual context data per end-user device enabling the generation of individual commands and recommendations. In order to provide valuable services for the end-user, the commands and recommendations are distributed to the end-user devices in real-time. The proposed architecture does not require any proprietary protocols to facilitate its integration into the existing network infrastructure of a mobile network operator. The proposed architecture has been evaluated through a number of use cases. A proof-of-concept of the proposed architecture, including its core functionality, was implemented using the ns-3 network simulator. The simulation results have shown that the proposed architecture achieves improvements for traffic steering including traffic offload and handover. Further use cases have demonstrated that it is possible to achieve benefits in multiple other areas, such as for example improving the energy efficiency, improving frequency interference management, and providing additional or more accurate data to 3rd party to improve their services.
56

AETOS: An Architecture for Offloading Core LTE Traffic Using Software Defined Networking Concepts

Nasim, Kamraan January 2016 (has links)
It goes without saying that cellular users of today have an insatiable appetite for bandwidth and data. Data-intensive applications, such as video on demand, online gaming and video conferencing, have gained prominence. This, coupled with recent innovations in the mobile network such as LTE/4G, poses a unique challenge to network operators in how to extract the most value from their deployments all the while reducing their Total Cost of Operations(TCO). To this end, a number of enhancements have been proposed to the ”conventional” LTE mobile network. Most of these recognize the monolithic and non-elastic nature of the mobile backend and propose complimenting core functionality with concepts borrowed from Software Defined Networking (SDN). In this thesis we shall attempt to explore some existing options within the LTE standard to mitigate large traffic churns. We will then review some SDN-enabled alternatives, and attempt to derive a proof based critique on their merits and drawbacks.
57

On the Incorporation of Quality of Experience (QoE) in Mobile Networks : A technical, regulatory and business analysis

Martinez Ballesteros, Luis Guillermo January 2017 (has links)
Mobile operators face a scenario characterised by new challenges such as growing data consumption, a slowdown in subscriber growth and reduced revenues due to the success of OTT providers. To remain competitive, mobile operators must offer affordable services and think on strategies to retain current customers. Quality of Experience (QoE) is a well-established methodology for measuring and understanding the overall level of customer satisfaction with a service and has been presented as a way to improve telecommunication services. Even though QoE can be used to solve problems such as customer loyalty and optimisation of network resources in mobile networks, there is a great lack of knowledge on how mobile operators can take advantage of QoE and its potential benefits. This thesis explores the incorporation of QoE in mobile networks to improve their service offering from a technical, regulatory and business perspective.The technical level focuses on the definition of the mechanism to integrate QoE in the operation of mobile networks. The second part of this study has been focused on the regulatory framework on Net Neutrality. Finally,the third part of this thesis focuses on the identification of potential business scenarios and models based on the incorporation of QoE in mobile networks. An important conclusion is that due to the nature of the challenges faced by the mobile industry, a QoE analysis cannot be limited to a technical discussion. A technical solution can be the first step to the first step to overcoming industry challenges. However, it is important that a technical decision comes along with an informed analysis of the regulatory conditions and the business implications of the proposed solution. On the other hand, mobile operators require new methods that integrate technical, market and business considerations to improve their service offer. A method analysed in this dissertation is a Customer Experience Management (CEM) platform. Given the technical, regulatory and business factors covered in this thesis, a CEM platform can be used by mobile operators to make a better use of QoE in their business operation. / Mobiloperatörer möter ett scenario som kännetecknas av en ökande trend inom dataförbrukning, tecken på en avmattning i abonnenttillväxten, en en minskning av de traditionella intäkter på grund av framgången med OTT leverantörer. Dessutom, mobila användare har gott om alternativ för att ändra tjänsteleverantören. I det här fallet måste mobiloperatörer förbli konkurrenskraftiga baseras både på pris och deras abonnenter tillfredsställelse. Kvalitet Erfarenhets (QoE) införlivande i mobilnät kan vara ett av alternativen för att möta vissa mobilbranschen utmaningar som omfattar tekniska, kommersiella och marknadsnivå. QoE möjliggör en bredare och mer övergripande förståelse av användarnas erfarenheter med utförandet av applikationer, tjänster och nätverk, samtidigt som kompletterar traditionella techno-centric begrepp som Quality of Service(QoS). Händelse om användningen av QoE data har föreslagits som ettsätt att lösa problem som optimering av nätverksresurser och kundomsättning upplevs av mobiloperatörer, finns det fortfarande en lucka på hur man utnyttjar QoE och dess potentiella fördelar i ramen för mobilnät. Således är den övergripande inriktningen av denna avhandling på att analysera hur mobiloperatörer kan integrera QoE feedback för att förbättra sin serviceerbjudande.Men på grund av arten av de utmaningar som den mobila industrin står inför, denna analys kan inte begränsas till en teknisk nivå diskussion. även hitta en teknisk lösning skulle kunna vara det första steget för att övervinna utmaningarna på marknaden, är det viktigt att ett tekniskt beslut kommer tillsammans med en välgrundad analys av de regulatoriska förutsättningarna för att genomförandet och affärs konsekvenserna av den föreslagna lösningen.Så kan en skådespelare intresserad av genomförandet av det föreslagna i dennaavhandling mekanism har fler verktyg för ett välgrundat beslut fattandet. På teknisk nivå, fokuserar denna uppsats på identifiering av teknisk mekanismför att införliva QoE i mobilnätet. Sedan vår analys kretsar kring identifieringen av regelverket om nätneutralitet och dess potentiella inverkan på genomförandet av den föreslagna mekanismen för införliva QoE i mobilnät. Slutligen, och letar efter en helhetssyn på QoE frågan, erbjuder vi en analys av konsekvenserna av att införliva QoE för hela mobilnät ekosystemet och intressenterna längs hela värdenätverket. / <p>QC 20161229</p> / Quality of Experience: A Techno-economic Analysis / Quality of Experience and Net Neutrality
58

Detekce nevyžádaných zpráv v mobilní komunikaci a na sociálních sítích / Detection of SPAM Messages in Mobile Communication and Social Networks

Jaroš, Ján January 2014 (has links)
This thesis deals with spam in mobile and social networks. It focuses on spam in SMS messages and web service Twitter. Theoretical part provides brief overview of those two media, informations about what spam is, how to defend against it and where does it comes from. There is also a list of methods for spam detection, many of them have their roots in filtration of email communication. The rest of thesis is about design, implementation of application  for spam detection in SMS and Twitter messages and evaluation of its performance.
59

Enhancing Mobility Support in Cellular Networks With Device-Side Intelligence

Haotian Deng (9451796) 16 December 2020 (has links)
Internet goes mobile as billions of users are accessing the Internet through their smartphones. Cellular networks play an essential role in providing “anytime, anywhere” network access as the only large-scale wireless network infrastructure in operation. Mobility support is the salient feature indispensable to ensure seamless Internet connectivity to mobile devices wherever the devices go or are. Cellular network operators deploy a huge number of cell towers over geographical areas each with limited radio coverage. When the device moves out of the radio coverage of its serving cell(s), mobility support is performed to hand over its serving cell(s) to another, thereby ensuring uninterrupted network access.<br>Despite a large success at most places, we uncover that state-of-the-practice mobility support in operational cellular networks suffers from a variety of issues which result in unnecessary performance degradation to mobile devices. In this thesis, we dive into these issues in today’s mobility support and explore possible solutions with no or small changes to the existing network infrastructure.<br>We take a new perspective to study and enhance mobility support. We directly examine, troubleshoot and enhance the underlying procedure of mobility support, instead of higher-layer (application/transport) exploration and optimization in other existing studies. Rather than clean slate network-side solutions, we focus on device-side solutions which are compatible with 3GPP standards and operational network infrastructure, promising immediate benefits without requiring any changes on network side.<br>In particular, we address three technical questions by leveraging the power of the devices. First, how is mobility support performed in reality? We leverage device-side observation to monitor the handoff procedures that happen between the network and the device. We unveil that operator-specific configurations and policies play a decisive role under the standard mechanism and conduct a large-scale measurement study to characterize the extremely complex and diverse handoff configurations used by global operators over the world. Second, what is wrong with the existing mobility support? We conduct model-based reasoning and empirical study to examine network performance issues (e.g., handoff instability and unreachability, missed performance) which are caused by improper handoffs. Finally, how to enhance mobility support? We turn passive devices to proactive devices to enhance mobility support. Specifically, we make a showcase solution which exploits device-side inputs to intervene the default handoff procedure and thus indirectly influence the cell selection decision, thereby improving data speed to mobile devices. All the results in this thesis have been validated or evaluated in reality (over top-tier US carriers like AT&T, Verizon, T-Mobile, some even in global carrier networks).
60

Dynamic Trust Management for Mobile Networks and Its Applications

Bao, Fenye 05 June 2013 (has links)
Trust management in mobile networks is challenging due to dynamically changing network environments and the lack of a centralized trusted authority. In this dissertation research, we design and validate a class of dynamic trust management protocols for mobile networks, and demonstrate the utility of dynamic trust management with trust-based applications. Unlike existing work, we consider social trust derived from social networks in addition to traditional quality-of-service (QoS) trust derived from communication networks to obtain a composite trust metric as a basis for evaluating trust of nodes in mobile network applications. Untreated in the literature, we design and validate trust composition, aggregation, propagation, and formation protocols for dynamic trust management that can learn from past experiences and adapt to changing environment conditions to maximize application performance and enhance operation agility. Furthermore, we propose, explore and validate the design concept of application-level trust optimization in response to changing conditions to maximize application performance or best satisfy application requirements. We provide formal proof for the convergence, accuracy, and resiliency properties of our trust management protocols. To achieve the goals of identifying the best trust protocol setting and optimizing the use of trust for trust-based applications, we develop a novel model-based analysis methodology with simulation validation for analyzing and validating our dynamic trust management protocol design. The dissertation research provides new understanding of dynamic trust management for mobile wireless networks. We gain insight on the best trust composition and trust formation out of social and QoS trust components, as well as the best trust aggregation and propagation protocols for optimizing application performance. We gain insight on how a modeling and analysis tool can be built, allowing trust composition, aggregation, propagation, and formation designs to be incorporated, tested and validated. We demonstrate the utility of dynamic trust management protocol for mobile networks including mobile ad-hoc networks, delay tolerant networks, wireless sensor networks, and Internet of things systems with practical applications including misbehaving node detection, trust-based survivability management, trust-based secure routing, and trust-based service composition. Through model-based analysis with simulation validation, we show that our dynamic trust management based protocols outperform non-trust-based and Bayesian trust-based protocols in the presence of malicious, erroneous, partly trusted, uncertain and incomplete information, and are resilient to trust related attacks. / Ph. D.

Page generated in 0.0766 seconds