• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 11
  • 2
  • 1
  • 1
  • Tagged with
  • 16
  • 16
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

VN Embedding in SDN-based Metro Optical Network for Multimedia Services

Zaman, Faisal Ameen January 2017 (has links)
Currently a growing number of users depend on the Edge Cloud Computing Paradigm in a Metro Optical Network (MON). This has led to increased competition among the Cloud Service Providers (CPs) to supply incentives for the user through guaranteed Quality of Service (QoS). If the CP fails to guarantee the QoS for the accepted request, then the user will move to another CP. Making an informed decision dynamically in such a sensitive situation demands that the CP knows the user's application requirements. The Software Defined Networking (SDN) paradigm enabled the CP to achieve such desired requirement. Therefore, a framework called Virtual Network Embedding on SDN-based Metro Optical Network (VNE-MON) is proposed in this Thesis. The use of SDN paradigm in the framework guarantees profit to the CP as well as QoS to the user.\par The design concept of the SDN control plane, raises concerns regarding its scalability, reliability and performance compared to a traditionally distributed network. To justify concerns regarding the SDN, the performance of VNE-MON and its possible dependancy on the controller location is investigated. Several strategies are proposed and formulated using Integer Linear Programming to determine the controller location in a MON. Performance results from the assessment of the VNE-MON illustrates that it is more stable compare to GMPLS-based network. It is evident that the controller location's attributes have a significant effect on the efficacy of the accepted VN request.
12

A Multimedia Ontology-Driven Architecture for Autonomic Quality of Service Management in Home Networks / Une Architecture Multimédia Dirigée par les Ontologies pour la Gestion Autonome de la Qualité de Service dans les Réseaux Domestiques

Gomez montalvo, Jorge 16 February 2012 (has links)
Dans le contexte actuel de l’Internet, un enjeu de recherche majeur est de permettre aux applications et à leurs utilisateurs de disposer de systèmes de communication offrant une qualité de service (QdS) optimale. Ceci en fonction des ressources machine et réseau disponibles, dont les capacités et les performances, hétérogènes et variables, ne sont pas connues à l’avance. Le provisionnement optimal de la QdS dans ces futurs systèmes de communication autonomes nécessite d’une part la caractérisation des services et des ressources de communication disponibles, et d’autre part la prise en compte des expressions des besoins et des préférences des différents acteurs du système (utilisateurs, fournisseurs des services, etc.). Le sujet de la thèse porte sur la définition d’un cadre sémantique de QdS basé sur les ontologies pour la caractérisation des ressources et des services de communication dans le but de fournir la meilleure QdS au regard des besoins et des préférences des utilisateurs. Ce cadre sera utilisé dans la définition des objectifs et des contraintes de QdS et dans l’élaboration de modèles de décision. L'ensemble sera utilisé pour la mise en œuvre de QdS dans les systèmes de communication autonomes situés dans un contexte de réseaux domestiques / In the current context of the Internet, a major research challenge is to enable applications and users to have their communications systems with an optimal quality of service (QoS). Indeed, QoS provisioning should take into account the available machine and network resources, which capacities and performances are heterogeneous, variable, and not known in advance. The optimal QoS provisioning for the future autonomous communication systems requires the characterization of available services and communication resources and also taking into account the expressions of needs and preferences of different actors in the system (users, service providers, etc.). The subject of this thesis deals with the definition of a QoS ontology-based semantic framework for the characterization of network resources and communication services in order to provide better QoS according to the needs and preferences of users. This framewor! k will be used in the definition of objectives and QoS constraints as well as in the development of decision models in order to provide QoS for autonomous communication systems located in the context of home networks
13

Evaluation of bandwidth management technique using dynamic LSP tunnelling and LDP in MPLS for sustainable mobile wireless networks

Mustapha, O.Z., Hu, Yim Fun, Sheriff, Ray E., Abd-Alhameed, Raed, Ali, M. 08 October 2021 (has links)
No / Fairness in bandwidth resource allocation is highly significance to the advancement of the future generation mobile and wireless technologies. It is likely that restriction of bandwidth due to the employment of some scheduling scheme would not be an appropriate option for the future development of communication systems. However, there is need to consider an implementation that would lead to good network performance and avoid unguaranteed bandwidth delivery. This paper focusses on evaluating the performance of Bandwidth Allocation using Dynamic Label Switching Paths (LSPs) Tunnelling and Label Distribution Protocol (LDP) signalling in Multi-Protocol Label Switching (MPLS) network. This will make provision for bandwidth allocation and reservation possible. An appropriate bandwidth allocation would have a positive impact on throughput as well as the delay. The results of an IP (Internet Protocol) Network without MPLS enabled is compared with MPLS model network. Furthermore, implementation of dynamic and static LSPs models are presented with about 75% decrease in packet delay variation for dynamic LSP when compared from static LSP. In addition, the models of bandwidth estimation, bandwidth allocation, delay and jitter are provided. Performance metrics used in this respect for multimedia services (Voice and Video conferencing) confirm that the modified models are improved in comparison with the baseline, having highest throughput of about 51% increment, and packet delay variation decreases drastically.
14

Flexible Radio Resource Management for Multicast Multimedia Service Provision : Modeling and Optimization / Allocation de ressources radio pour les services multimédias : modélisation et optimisation

Xu, Qing 29 August 2014 (has links)
Le conflit entre la demande de services multimédia en multidiffusion à haut débit (MBMS) et les limites en ressources radio demandent une gestion efficace de l'allocation des ressources radio (RRM) dans les réseaux 3G UMTS. À l'opposé des travaux existant dans ce domaine, cette thèse se propose de résoudre le problème de RRM dans les MBMS par une approche d’optimisation combinatoire. Le travail commence par une modélisation formelle du problème cible, désigné comme Flexible Radio Resource Management Model (F2R2M). Une analyse de la complexité et du paysage de recherche est effectuée à partir de ce modèle. Tout d’abord on montre qu'en assouplissant les contraintes de code OVSF, le problème de RRM pour les MBMS peut s'apparenter à un problème de sac à dos à choix multiples (MCKP). Une telle constatation permet de calculer les limites théoriques de la solution en résolvant le MCKP similaire. En outre, l'analyse du paysage montre que les espaces de recherche sont accidentés et constellés d'optima locaux. Sur la base de cette analyse, des algorithmes métaheuristiques sont étudiés pour résoudre le problème. Nous montrons tout d'abord que un Greedy Local Search (GLS) et un recuit simulé (SA) peuvent trouver de meilleures solutions que les approches existantes implémentées dans le système UMTS, mais la multiplicité des optima locaux rend les algorithmes très instables. Un algorithme de recherche tabou (TS) incluant une recherche à voisinage variable (VNS) est aussi développé et comparé aux autres algorithmes (GLS et SA) et aux approches actuelles du système UMTS ; les résultats de la recherche tabou dépassent toutes les autres approches. Enfin les meilleures solutions trouvées par TS sont également comparées avec les solutions théoriques générées par le solveur MCKP. On constate que les meilleures solutions trouvées par TS sont égales ou très proches des solutions optimales théoriques. / The high throughputs supported by the multimedia multicast services (MBMS) and the limited radio resources result in strong requirement for efficient radio resource management (RRM) in UMTS 3G networks. This PhD thesis proposes to solve the MBMS RRM problem as a combinatorial optimization problem. The work starts with a formal modeling of the problem, named as the Flexible Radio Resource Management Model (F2R2M). An in-depth analysis of the problem complexity and the search landscape is done from the model. It is showed that, by relaxing the OVSF code constraints, the MBMS RRM problem can be approximated as a Multiple-Choice Knapsack Problem (MCKP). Such work allows us to compute the theoretical solution bounds by solving the approximated MCKP. Then the fitness landscape analysis shows that the search spaces are rough and reveal several local optimums. Based on the analysis, some metaheuristic algorithms are studied to solve the MBMS RRM problem. We first show that a Greedy Local Search (GLS) and a Simulated Annealing (SA) allow us to find better solutions than the existing approaches implemented in the UMTS system, however the results are instable due to the landscape roughness. Finally we have developed a Tabu Search (TS) mixed with a Variable Neighborhood Search (VNS) algorithm and we have compared it with GLS, SA and UMTS embedded algorithms. Not only the TS outperforms all the other approaches on several scenarios but also, by comparing it with the theoretical solution bounds generated by the MCKP solver, we observe that TS is equal or close to the theoretical optimal solutions.
15

BlueYou: uma plataforma de comunicação ciente de contexto baseada em serviços para computação móvel

Almeida, Ricardo Aparecido Perez de 14 April 2011 (has links)
Made available in DSpace on 2016-06-02T19:05:52Z (GMT). No. of bitstreams: 1 3803.pdf: 3743774 bytes, checksum: 49431d1966e0013e1955f7cb03a6cf70 (MD5) Previous issue date: 2011-04-14 / Financiadora de Estudos e Projetos / The raising number of mobile devices with high computing capacity and support to different wireless transmission technologies has been motivating the creation of communication services capable to provide information to users anytime and anywhere. Particularly, it s possible to note the existence of a massive number of devices equipped with the Bluetooth communication technology, available in millions of devices. Plenty of mechanisms for content dissemination and sharing have been developed for use with Bluetooth technology in different application scenarios, such as mobile marketing, u-commerce and mobile learning. Most of these mechanisms, however, are used for specific purposes or are highly dependent on a communication infrastructure. Moreover, most of them use only little information about different contexts related to the environment, the users and the state of the devices involved in the transmissions. This work presents the project and a feasibility analysis of a context-aware communication platform that enables the delivery of data to mobile devices. Different types of information may be delivered, as produced by the execution of services which generate or retrieve them prior to transmission. Transmissions to the devices occur via wireless communication technologies, especially the Bluetooth. Called BlueYou, this platform makes use of context information and the profiles of mobile device to set policies for content delivery and content adaptation. Moreover, in order to expand the access to the services that generate the contents to deliver by BlueYou, the platform is integrated with a communication mechanism that creates an opportunistic ad hoc networking between mobile devices to transmit data to a particular recipient. As a result, it is expected that BlueYou can be widely used without requiring high deployment costs (financial, technological or time), and can serve as a basis for future studies involving communication patterns and interaction between users of mobile technologies. / O crescente número de dispositivos móveis com capacidade computacional elevada e suporte a diferentes tecnologias de transmissão sem fio tem motivado a criação de serviços de comunicação capazes de fornecer informações aos usuários a qualquer momento e em qualquer lugar. Particularmente, nota-se a existência maciça de dispositivos equipados com a tecnologia de comunicação Bluetooth, disponível em bilhões de dispositivos. Diversos mecanismos para a disseminação e o compartilhamento de conteúdo foram desenvolvidos para serem utilizados com a tecnologia Bluetooth, em diferentes cenários de aplicação, tais como mobile marketing, ucommerce e mobile learning. A maioria desses mecanismos, contudo, atende a propósitos específicos ou é altamente dependente de uma infraestrutura de comunicação. Além disso, percebe-se que há pouco uso de informações sobre diferentes contextos relacionados ao ambiente, aos usuários e ao estado dos dispositivos envolvidos nas transmissões. Este trabalho apresenta o projeto e a análise de viabilidade de uma plataforma de comunicação ciente de contexto que possibilita o envio de informações para dispositivos móveis. Diferentes tipos de informação podem ser enviados, tais como informações produzidas por serviços, os quais realizam a geração ou a obtenção dos conteúdos a transmitir. Transmissões ocorrem através de tecnologias de comunicação sem fio, em especial a tecnologia Bluetooth. Denominada BlueYou, esta plataforma faz uso de informações de contexto e de uma base de dados de dispositivos móveis para definir políticas de entrega e de adaptação dos conteúdos que transmite. Além disso, visando a expandir o acesso aos serviços que geram os conteúdos a transmitir via BlueYou, a plataforma se integra com um mecanismo de comunicação oportunística que cria redes ad hoc entre dispositivos móveis para a transmissão de dados a destinatários específicos. Como resultado, espera-se que BlueYou seja uma plataforma que possa ser amplamente utilizada sem exigir altos custos de implantação, sejam eles financeiros, tecnológicos ou de tempo, e que possa servir de base para estudos futuros envolvendo padrões de comunicação e interação entre usuários de tecnologias móveis.
16

A Dynamic Security And Authentication System For Mobile Transactions : A Cognitive Agents Based Approach

Babu, B Sathish 05 1900 (has links)
In the world of high mobility, there is a growing need for people to communicate with each other and have timely access to information regardless of the location of the individuals or the information. This need is supported by the advances in the technologies of networking, wireless communications, and portable computing devices with reduction in the physical size of computers, lead to the rapid development in mobile communication infrastructure. Hence, mobile and wireless networks present many challenges to application, hardware, software and network designers and implementers. One of the biggest challenge is to provide a secure mobile environment. Security plays a more important role in mobile communication systems than in systems that use wired communication. This is mainly because of the ubiquitous nature of the wireless medium that makes it more susceptible to security attacks than wired communications. The aim of the thesis is to develop an integrated dynamic security and authentication system for mobile transactions. The proposed system operates at the transactions-level of a mobile application, by intelligently selecting the suitable security technique and authentication protocol for ongoing transaction. To do this, we have designed two schemes: the transactions-based security selection scheme and the transactions-based authentication selection scheme. These schemes use transactions sensitivity levels and the usage context, which includes users behaviors, network used, device used, and so on, to decide the required security and authentication levels. Based on this analysis, requisite security technique, and authentication protocols are applied for the trans-action in process. The Behaviors-Observations-Beliefs (BOB) model is developed using cognitive agents to supplement the working of the security and authentication selection schemes. A transaction classification model is proposed to classify the transactions into various sensitivity levels. The BOB model The BOB model is a cognitive theory based model, to generate beliefs over a user, by observing various behaviors exhibited by a user during transactions. The BOB model uses two types of Cognitive Agents (CAs), the mobile CAs (MCAs) and the static CAs (SCAs). The MCAs are deployed over the client devices to formulate beliefs by observing various behaviors of a user during the transaction execution. The SCA performs belief analysis, and identifies the belief deviations w.r.t. established beliefs. We have developed four constructs to implement the BOB model, namely: behaviors identifier, observations generator, beliefs formulator, and beliefs analyser. The BOB model is developed by giving emphasis on using the minimum computation and minimum code size, by keeping the resource restrictiveness of the mobile devices and infrastructure. The knowledge organisation using cognitive factors, helps in selecting the rational approach for deciding the legitimacy of a user or a session. It also reduces the solution search space by consolidating the user behaviors into an high-level data such as beliefs, as a result the decision making time reduces considerably. The transactions classification model This model is proposed to classify the given set of transactions of an application service into four sensitivity levels. The grouping of transactions is based on the operations they perform, and the amount of risk/loss involved if they are misused. The four levels are namely, transactions who’s execution may cause no-damage (level-0), minor-damage (level-1), significant-damage (level-2) and substantial-damage (level-3). A policy-based transaction classifier is developed and incorporated in the SCA to decide the transaction sensitivity level of a given transaction. Transactions-based security selection scheme (TBSS-Scheme) The traditional security schemes at application-level are either session or transaction or event based. They secure the application-data with prefixed security techniques on mobile transactions or events. Generally mobile transactions possesses different security risk profiles, so, empirically we may find that there is a need for various levels of data security schemes for the mobile communications environment, which face the resource insufficiency in terms of bandwidth, energy, and computation capabilities. We have proposed an intelligent security techniques selection scheme at the application-level, which dynamically decides the security technique to be used for a given transaction in real-time. The TBSS-Scheme uses the BOB model and transactions classification model, while deciding the required security technique. The selection is purely based on the transaction sensitivity level, and user behaviors. The Security techniques repository is used in the proposed scheme, organised under three levels based on the complexity of security techniques. The complexities are decided based on time and space complexities, and the strength of the security technique against some of the latest security attacks. The credibility factors are computed using the credibility module, over transaction network, and transaction device are also used while choosing the security technique from a particular level of security repository. Analytical models are presented on beliefs analysis, security threat analysis, and average security cost incurred during the transactions session. The results of this scheme are compared with regular schemes, and advantageous and limitations of the proposed scheme are discussed. A case study on application of the proposed security selection scheme is conducted over mobile banking application, and results are presented. Transactions-based authentication selection scheme (TBAS-Scheme) The authentication protocols/schemes are used at the application-level to authenticate the genuine users/parties and devices used in the application. Most of these protocols challenges the user/device to get the authentication information, rather than deploying the methods to identify the validity of a user/device. Therefore, there is a need for an authentication scheme, which intelligently authenticates a user by continuously monitoring the genuinity of the activities/events/ behaviors/transactions through out the session. Transactions-based authentication selection scheme provides a new dimension in authenticating users of services. It enables strong authentication at the transaction level, based on sensitivity level of the given transaction, and user behaviors. The proposed approach intensifies the procedure of authentication by selecting authentication schemes by using the BOB-model and transactions classification models. It provides effective authentication solution, by relieving the conventional authentication systems, from being dependent only on the strength of authentication identifiers. We have made a performance comparison between transactions-based authentication selection scheme with session-based authentication scheme in terms of identification of various active attacks, and average authentication delay and average authentication costs are analysed. We have also shown the working of the proposed scheme in inter-domain and intra-domain hand-off scenarios, and discussed the merits of the scheme comparing it with mobile IP authentication scheme. A case study on application of the proposed authentication selection scheme for authenticating personalized multimedia services is presented. Implementation of the TBSS and the TBAS schemes for mobile commerce application We have implemented the integrated working of both the TBSS and TBAS schemes for a mo-bile commerce application. The details on identifying vendor selection, day of purchase, time of purchase, transaction value, frequency of purchase behaviors are given. A sample list of mobile commerce transactions is presented along with their classification into various sensitivity levels. The working of the system is discussed using three cases of purchases, and the results on trans-actions distribution, deviation factor generation, security technique selection, and authentication challenge generation are presented. In summary, we have developed an integrated dynamic security and authentication system using, the above mentioned selection schemes for mobile transactions, and by incorporating the BOB model, transactions classification model, and credibility modules. We have successfully implemented the proposed schemes using cognitive agents based middleware. The results of experiments suggest that incorporating user behaviors, and transaction sensitivity levels will bring dynamism and adaptiveness to security and authentication system. Through which the mobile communication security could be made more robust to attacks, and resource savvy in terms of reduced bandwidth and computation requirements by using an appropriate security and authentication technique/protocol.

Page generated in 0.0728 seconds