Spelling suggestions: "subject:"telekommunikation."" "subject:"telekommunikations.""
321 |
Performance Optimization of a Service in Virtual and Non - Virtual EnvironmentTamanampudi, Monica, Sannareddy, Mohith Kumar Reddy January 2019 (has links)
In recent times Cloud Computing has become an accessible technology which makes it possible to provide online services to end user by the network of remote servers. With the increase in remote servers and resources allocated to these remote servers leads to performance degradation of service. In such a case, the environment on which service is made run plays a significant role in order to provide better performance and adds up to Quality of Service. This paper focuses on Bare metal and Linux container environments as request response time is one of the performance metrics to determine the QOS. To improve request response time platforms are customized using real-time kernel and compiler optimization flags to optimize the performance of a service. UDP packets are served to the service made run in these customized environments. From the experiments performed, it concludes that Bare metal using real-time kernel and level 3 Compiler optimization flag gives better performance of a service.
|
322 |
Optimization of Packet Throughput in Docker ContainersGinka, Anusha, Salapu, Venkata Satya Sameer January 2019 (has links)
Container technology has gained popularity in recent years, mainly because it enables a fast and easy way to package, distribute and deploy applications and services. Latency and throughput have a high impact on user satisfaction in many real-time, critical and large-scale online services. Although the use of microservices architecture in cloud-native applications has enabled advantages in terms of application resilience, scalability, fast software delivery and the use of minimal resources, the packet processing rates are not correspondingly higher. This is mainly due to the overhead imposed by the design and architecture of the network stack. Packet processing rates can be improved by making changes to the network stack and without necessarily adding more powerful hardware. In this research, a study of various high-speed packet processing frameworks is presented and a software high-speed packet I/O solution i.e., as hardware agnostic as possible to improve the packet throughput in container technology is identified. The proposed solution is identified based on if the solution involves making changes to the underlying hardware or not. The proposed solution is then evaluated in terms of packet throughput for different container networking modes. A comparison of the proposed solution with a simple UDP client-server application is also presented for different container networking modes. From the results obtained, it is concluded that packet mmap client-server application has higher performance when compared with simple UDP client-server application.
|
323 |
Design and Performance of an Event Handling and Analysis Platform for vSGSN-MME event using the ELK stackBandari Swamy Devender, Vamshi Krishna, Adike, Sneha January 2019 (has links)
Data Logging is the main activity to be considered in maintaining a server or database in working condition without any errors or failures. Data collection can be automatic, so, no human presence is necessary. To store the data of logs for many days and visualizing became a huge problem in recent days. Coming to node SGSN-MME, which is the main component of the GPRS network, which handles all packet switched data within the mobile operator's network. A lot of log data is generated and stored in file systems on the redundant File Server Boards in SGSN-MME node. The evolution of the SGSN-MME is taking it from dedicated, purpose-built, hardware into virtual machines in the Cloud, where virtual file server boards fit very badly. The purpose of this thesis is to give a better way to store the log data and add visualization using the ELK stack concept. Fetching useful information from logs is one of the most important part of this stack and is being done in Logstash using its grok filters and a set of input, filter and output plug-ins which helps to scale this functionality for taking various kinds of inputs ( file,TCP, UDP, gemfire, stdin, UNIX, web sockets and even IRC and twitter and many more) , filter them using (groks,grep,date filters etc.)and finally write output to ElasticSearch. The Research Methodology involved in carrying out this thesis work is a Qualitative approach. A study is carried using the ELK concept with respect to Legacy approach in Ericsson company. A suitable approach and the better possible solution is given to the vSGSN-MME node to store the log data. Also to provide the performance and uses multiple users of input providers and provides the analysis of the graphs from the results and analysis. To perform the tests accurately, readings are taken in defined failure scenarios. From the test cases, a plot is provided on the CPU load in vSGSN-MME which easily gives the suitable and best promising way.
|
324 |
Enhancement of Networking Capabilities in P2P OpenStackPeddireddy, Vidyadhar reddy January 2019 (has links)
In recent times, there’s been a trend towards setting up smaller clouds at the edge of the network and interconnecting them across multiple sites. In these scenarios, the software used for managing the resources should be flexible enough to scale. Considering OpenStack the most widely used cloud software, It is observed that the compute service has shown performance degradation when the deployment reaches fewer hundreds of nodes. Finding out solutions to address the scalability issue in OpenStack, Ericsson has developed a new architecture that supports massive scalability of OpenStack clouds. However, the challenges with multicloud networking in P2P OpenStack remained unsolved. This thesis work as an extension to Ericsson’s P2P OpenStack project investigates various multi-cloud networking techniques and proposes two decentralized designs for cross Neutron networking in P2P OpenStack. The design-1 is based on OpenStack Tricircle project and design-2 is based on VPNaaS. This thesis work implements VPNaaS design to support the automatic interconnection of Virtual machines that belong to the same user but deployed in different OpenStack clouds. We evaluate this thesis for control plane operation under two different scenarios namely single user case and multiple users cases. In both scenarios, request-response time is chosen as an evaluating parameter. Results show that there is an increase in request-response time when users in the system are increased.
|
325 |
Performance Assessment of Resource Management Strategies for Cellular and Wireless Mesh Networks / Leistungsbewertung von Ressourcenmanagementstrategien für zelluläre und drahtlose Mesh-NetzwerkeWamser, Florian January 2015 (has links) (PDF)
The rapid growth in the field of communication networks has been truly amazing in the last decades. We are currently experiencing a continuation thereof with an increase in traffic and the emergence of new fields of application. In particular, the latter is interesting since due to advances in the networks and new devices, such as smartphones, tablet PCs, and all kinds of Internet-connected devices, new additional applications arise from different areas. What applies for all these services is that they come from very different directions and belong to different user groups. This results in a very heterogeneous application mix with different requirements and needs on the access networks.
The applications within these networks typically use the network technology as a matter of course, and expect that it works in all situations and for all sorts of purposes without any further intervention. Mobile TV, for example, assumes that the cellular networks support the streaming of video data. Likewise, mobile-connected electricity meters rely on the timely transmission of accounting data for electricity billing. From the perspective of the communication networks, this requires not only the technical realization for the individual case, but a broad consideration of all circumstances and all requirements of special devices and applications of the users.
Such a comprehensive consideration of all eventualities can only be achieved by a dynamic, customized, and intelligent management of the transmission resources. This management requires to exploit the theoretical capacity as much as possible while also taking system and network architecture as well as user and application demands into account. Hence, for a high level of customer satisfaction, all requirements of the customers and the applications need to be considered, which requires a multi-faceted resource management.
The prerequisite for supporting all devices and applications is consequently a holistic resource management at different levels. At the physical level, the technical possibilities provided by different access technologies, e.g., more transmission antennas, modulation and coding of data, possible cooperation between network elements, etc., need to be exploited on the one hand. On the other hand, interference and changing network conditions have to be counteracted at physical level. On the application and user level, the focus should be on the customer demands due to the currently increasing amount of different devices and diverse applications (medical, hobby, entertainment, business, civil protection, etc.).
The intention of this thesis is the development, investigation, and evaluation of a holistic resource management with respect to new application use cases and requirements for the networks. Therefore, different communication layers are investigated and corresponding approaches are developed using simulative methods as well as practical emulation in testbeds. The new approaches are designed with respect to different complexity and implementation levels in order to cover the design space of resource management in a systematic way. Since the approaches cannot be evaluated generally for all types of access networks, network-specific use cases and evaluations are finally carried out in addition to the conceptual design and the modeling of the scenario.
The first part is concerned with management of resources at physical layer. We study distributed resource allocation approaches under different settings. Due to the ambiguous performance objectives, a high spectrum reuse is conducted in current cellular networks. This results in possible interference between cells that transmit on the same frequencies. The focus is on the identification of approaches that are able to mitigate such interference.
Due to the heterogeneity of the applications in the networks, increasingly different application-specific requirements are experienced by the networks. Consequently, the focus is shifted in the second part from optimization of network parameters to consideration and integration of the application and user needs by adjusting network parameters. Therefore, application-aware resource management is introduced to enable efficient and customized access networks.
As indicated before, approaches cannot be evaluated generally for all types of access networks. Consequently, the third contribution is the definition and realization of the application-aware paradigm in different access networks. First, we address multi-hop wireless mesh networks. Finally, we focus with the fourth contribution on cellular networks. Application-aware resource management is applied here to the air interface between user device and the base station. Especially in cellular networks, the intensive cost-driven competition among the different operators facilitates the usage of such a resource management to provide cost-efficient and customized networks with respect to the running applications. / In den heutigen Zugangsnetzen steigt der Verkehr immer mehr an. Es gibt immer mehr Applikationen und Anwendungen, resultierend aus dem technischen Fortschritt bei Geräten für den Endverbraucher und dem technologischen Fortschritt im Netzwerk. Gleichzeitig ergeben sich auch immer unterschiedlichere Anwendungsfelder (Maschine-zu-Maschine-Kommunikation, Anwendungen aus dem Gesundheitswesen, Ultra-High-Definition Fernsehen, neue kommerzielle Dienste für das Transportwesen und für Firmen, Assistenzsysteme für ältere Menschen, Sensornetzwerke, etc.) und damit hohe, heterogene Anforderungen an die Zugangsnetze.
Aus technischer Sicht der Kommunikationsnetze bedeutet dies, dass nicht nur einzelne Anwendungen im Netzwerk unterstützt werden müssen, sondern dass eine breite Berücksichtigung aller Umstände und Anforderungen nötig ist. Dies gilt zusätzlich zu den üblichen Anforderungen, wie beispielsweise Kosten- und Energieeinsparungen im Netzwerk.
Eine solche umfassende Berücksichtigung aller Eventualitäten kann nur durch ein dynamisches, individuelles und intelligentes Management der Übertragungsressourcen erreicht werden. Dabei muss einerseits die theoretische Kapazität soweit wie möglich ausgenutzt werden und andererseits aber sowohl die System- und Netzarchitektur als auch das Nutzer- und Applikationsverhalten angemessen in Betracht gezogen werden. Hierfür ist ein vielschichtiges Ressourcenmanagement auf verschiedenen Ebenen nötig.
Das Ziel dieser Doktorarbeit ist die Entwicklung, Untersuchung und Bewertung von einem ganzheitlichen Ressourcenmanagement im Hinblick auf neue Anforderungen und aufkommende, neue Anwendungsfelder. Es werden entsprechende Ansätze auf verschiedenen Kommunikationsebenen mit sowohl Simulationsstudien als auch praktischer Emulationen und Messungen in Testbeds entwickelt. Die untersuchten und entwickelten Ansätze unterscheiden sich hinsichtlich der Komplexität und der Ebene auf der sie arbeiten mit dem Ziel den gesamten Gestaltungsraum auf systematische Art und Weise abzudecken. Da die Ansätze in der Regel nicht allgemeingültig für alle Arten von Zugangsnetzen evaluiert werden können, sind in der Arbeit Implementierungsbeispiele enthalten. Zusätzlich werden technologiespezifische Bewertungen durchgeführt neben der Modellierung des Szenarios und der Applikationsanforderungen. Es werden Mobilfunknetze und drahtlose Mesh-Zugangsnetzwerke in dieser Arbeit betrachtet.
Teil 1: Untersuchungen zum Ressourcenmanagement auf der physikalischen Ebene: Der erste Teil beschäftigt sich mit dem Management von Ressourcen auf der physikalischen Übertragungsebene. Es werden verteilte Ressourcenallokationsansätze unter verschiedenen Einstellungen für Mobilfunknetze untersucht. Der Schwerpunkt der Arbeit im ersten Teil liegt auf der Identifizierung von Ansätzen, die in der Lage sind, Interferenzen zu reduzieren. Es werden verschiedene Koordinierungsmechanismen entwickelt und vorgeschlagen, die zu einer effizienteren Ressourcennutzung führen.
Teil 2: Spezifikation und Entwicklung von anwendungsorientiertem Ressourcenmanagement: Aufgrund der unterschiedlichen Anwendungen und Dienste, werden die Netze zunehmend mit heterogenen, anwendungsspezifischen Anforderungen von Applikationen konfrontiert. Dementsprechend liegt der Schwerpunkt im zweiten Teil auf der Optimierung der Netzwerkcharakteristiken und -parameter unter Berücksichtigung von Anwendungen und deren Bedürfnissen. Es wird anwendungsbezogenes Ressourcenmanagement eingeführt und spezifiziert, um effiziente und maßgeschneiderte Zugangsnetze zu ermöglichen.
Teil 3: Anwendungsbeispiele & Emulation, Messung und Leistungsanalyse von anwendungsbezogenem Ressourcenmanagement für drahtlose Mesh-Zugangsnetzwerke und zelluläre Mobilfunknetze: Man kann Ressourcenmanagementansätze und -algorithmen nicht allgemeingültig für alle Arten von Zugangsnetzen untersuchen. Je nach Netzwerktyp und –technologie ergeben sich unterschiedliche Netzwerkeigenschaften. In der Arbeit werden Anwendungsbeispiele von applikationsbezogenem Ressourcenmanagement gegeben. Zum einen werden drahtlose Multi-Hop Mesh-Netzwerke betrachtet. Mesh-Netzwerke bieten viele verschiedene Optionen und Managementmöglichkeiten bei der Übertragung von Daten. Somit stellt ein solches Netz eine ausgezeichnete Gelegenheit dar, die Vorteile von anwendungsbezogenem Ressourcenmanagement zu quantifizieren. Die Bewertung erfolgt in einem Mesh-Testbed mit empirischen Messungen anhand von YouTube. Diese praktische Implementierung veranschaulicht die Vorteile des Konzepts, zeigt die Machbarkeit und quantifiziert den Nutzen für YouTube. Ein weiterer Typ von Netzwerk, das untersucht wird, ist das Mobilfunknetz. Im letzten Teil der Arbeit wird anwendungsorientiertes Ressourcenmanagement für die Luftschnittstelle im Mobilfunk zwischen Teilnehmergerät und der Basisstation spezifiziert und bewertet.
|
326 |
Distribution and Individual Watermarking of Streamed Content for Copy ProtectionStenborg, Karl-Göran January 2005 (has links)
<p>Media such as movies and images are nowadays produced and distributed digitally. It is usually simple to make copies of digital content. Consequently illegal pirate copies can be duplicated and distributed in large quantities. One way to deter authorized content receivers from illegally redistributing the media is watermarking. If individual watermarks are contained in the digital media and a receiver is a pirate and redistributes it, the pirate at the same time distributes his identity. Thus a located pirate copy can be traced back to the pirate. The watermarked media should otherwise be indistinguishable from the original media content.</p><p>To distribute media content scalable transmission methods such as broadcast and multicast should be used. This way the distributor will only need to transmit the media once to reach all his authorized receivers. But since the same content is distributed to all receivers the requirement of individual watermarks seems to be contradictory.</p><p>In this thesis we will show how individually watermarked media content can be transmitted in a scalable way. Known methods will be reviewed and a new method will be presented. The new method is independent of what type of distribution that is used. A system with robust watermarks that are difficult to remove is described. Only small parts of the media content will be needed to identify the pirates. The method will only give a small data expansion compared to distribution of non-watermarked media.</p><p>We will also show how information theory tools can be used to expand the amount of data in the watermarks given a specific size of the media used for the watermarking. These tools can also be used to identify parts of the watermark that have been changed by deliberate deterioration of the watermarked media, made by pirates.</p> / Report code: LiU-Tek-Lic-2005:67.
|
327 |
A study of security in wireless and mobile paymentsAli, Ahmed January 2010 (has links)
<p>Mobile payments are increasing in popularity in recent years. New mobile solutions are being developed in the form of new Internet capable mobile devices such as the IPhone and new wireless networks such as the LTE and WiMAX networks.</p><p>This report will present, explain and compare some of the most popular wireless networks that enable mobile payments, from a security point of view. The chosen networks are 3G with connection to GSM, and WLAN networks. The main security mechanisms involved in each network, and how they work will be studied. Security requirements and some of the most important threats each network faces will be presented and discussed. The main purpose of the report is to examine if mobile payments offer an acceptable level of security to the average user.</p>
|
328 |
Software Communication Architecture - Waveform Distribution with MHALDackenberg, Jens January 2010 (has links)
<p>For a long time radio devices have been constructed in hardware with a fixed functionality. This way of constructing radio devices is starting to change with the concept of Software Defined Radio (SDR) evolving. The SDR concept leads to more flexible and long lasting radio devices. In order to make the radio software more standardized and portable, the U.S. military has defined the Software Communication Architecture (SCA). Internal communication within the SCA is done by CORBA, which limit waveforms to be only distributed over CORBA-capable hardware. The U.S. military has defined the Modem Hardware Abstraction Layer(MHAL) to enable distribution over devices not supporting CORBA. This thesis presents an implementation of MHAL and an underlying transport mechanism based on Ethernet. The implementation is done for the OSSIE package. The implementation is evaluated both in terms of real-time and throughput performance. The results show that MHAL achieves good performance, in comparison to CORBA, and can greatly be used to distribute waveforms over both CORBA and non-CORBA capable devices.</p>
|
329 |
Frequency Domain Link Adaptation for OFDM-based Cellular Packet DataRuberg, Anders January 2006 (has links)
<p>In order to be competitive with emerging mobile systems and to satisfy the ever growing request for higher data rates, the 3G consortium, 3rd Generation Partnership Project (3GPP), is currently developing concepts for a long term evolution (LTE) of the 3G standard. The LTE-concept at Ericsson is based on Orthogonal Frequency Division Multiplexing (OFDM) as downlink air interface. OFDM enables the use of frequency domain link adaptation to select the most appropriate transmission parameters according to current channel conditions, in order to maximize the throughput and maintain the delay at a desired level. The purpose of this thesis work is to study, implement and evaluate different link adaptation algorithms. The main focus is on modulation adaptation, where the differences in performance between time domain and frequency domain adaptation are investigated. The simulations made in this thesis are made with a simulator developed at Ericsson. Simulations show in general that the cell throughput is enhanced by an average of 3% when using frequency domain modulation adaptation. When using the implemented frequency domain power allocation algorithm, a gain of 23-36% in average is seen in the users 5th percentile throughput. It should be noted that the simulations use a realistic web traffic model, which makes the channel quality estimation (CQE) difficult. The CQE has great impact on the performance of frequency domain adaptation. Throughput improvements are expected when using an improved CQE or interference avoidance schemes. The gains with frequency domain adaptation shown in this thesis work may be too small to motivate the extra signalling overhead required. The complexity of the implemented frequency domain power allocation algorithm is also very high compared to the performance enhancement seen.</p>
|
330 |
Investigation of IEEE standard 802.16 Medium AccessRobles Rico, Pedro Francisco January 2006 (has links)
<p>This paper is a study of IEEE Standard 802.16 Medium Access Control (MAC) Layer in Distributed Mesh Networks. IEEE Standard 802.16 is a Wireless Metropolitan Area Network (WMAN) technology that can connect different IEEE 802.11 (Wifi) host post with each other and to other parts of internet. It can provide network for a wireless router and at the same time this router can be installed in the office, house or university.</p><p>WiMAX (Worldwide Interoperability for Microwave Access) is a certification mark for products that pass conformity and interoperability tests for the IEEE 802.16 standards. Products that pass the conformity tests for WiMAX are capable of forming wireless connections between them to permit the carrying of internet packet data. The idea of WiMAX is similar than Wi-Fi but it is not the same. It is a step much higher than Wi-Fi because it is focused to offer internet for a whole city.</p><p>It has much higher capacity and longer distances. IEEE 802.16 defines a MAC Layer that supports multiple physical layer (PHY) Specifications and different topologies; Point to Multipoint (PMP) and Mesh Networks. In this first topology there exist a Base Station (BS) that have direct links with all the Subscriber Stations (SS). If any Subscriber Station requires transmitting to another SS, the message must convey the Base Station.</p>
|
Page generated in 0.0823 seconds