81 |
Contribuições ao calculo de banda e de probabilidade de perda para trafego multifractal de redes / Contributions to the effective bandwidth and loss probability computing for multifractal network trafficVieira, Flavio Henrique Teles 19 December 2006 (has links)
Orientador: Lee Luan Ling / Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-08T01:26:33Z (GMT). No. of bitstreams: 1
Vieira_FlavioHenriqueTeles_D.pdf: 4214611 bytes, checksum: 755dfe9865aff1214f8e551afde7541d (MD5)
Previous issue date: 2006 / Resumo: A modelagem multifractal generaliza os modelos de tráfego existentes na literatura e se mostra apropriada para descrever as características encontradas nos fluxos de tráfego das redes atuais. A presente tese investiga abordagens para alocação de banda, predição de tráfego e estimação de probabilidade de perda de bytes considerando as características multifractais de tráfego. Primeiramente, um Modelo Multifractal baseado em Wavelets (MMW) é proposto. Levando em consideração as propriedades deste modelo, são derivados o parâmetro de escala global, a função de autocorrelação e a banda efetiva para processos multifractais. A capacidade de atualização em tempo real do MMW aliada à banda efetiva proposta permite o desenvolvimento de um algoritmo de estimação adaptativa de banda efetiva. Através deste algoritmo é introduzido um esquema de provisão adaptativo de banda efetiva. Estuda-se também a alocação de banda baseada em predição de tráfego. Para este fim, propõe-se um preditor adaptativo fuzzy de tráfego, o qual é aplicado em uma nova estratégia de alocação de banda. O preditor fuzzy adaptativo proposto utiliza funções de base ortonormais baseadas nas propriedades do MMW. Com relação à probabilidade de perda para tráfego multifractal, derivase uma expressão analítica para a estimação da probabilidade de perda de bytes considerando que o tráfego obedece ao MMW. Além disso, uma caracterização mais completa do comportamento de fila é efetuada pela obtenção de limitantes para a probabilidade de perda e para a ocupação média do buffer em termos da banda efetiva do MMW. Por fim, é apresentado um esquema de controle de admissão usando o envelope efetivo proposto para o MMW oriundo do cálculo de rede estatístico, que garante que os fluxos admitidos obedeçam simultaneamente aos requisitos de perda e de retardo. As simulações realizadas evidenciam a relevância das propostas apresentadas / Abstract: Multifractal modeling generalizes the existing traffic models and is believed to be appropriate to describe the characteristics of traffic flows of modern communication networks. This thesis investigates some novel approaches for bandwidth allocation, traffic prediction and byte loss probability estimation, by considering the multifractal characteristics of the network traffic. Firstly, a Wavelet based Multifractal Model (WMM) is proposed. Taking into account the properties of this multifractal model, we derive the global scaling parameter, the autocorrelation function and the effective bandwidth for multifractal processes. The real time updating capacity of the WMM in connection with our effective bandwidth proposal allows us to develop an algorithm for adaptive effective bandwidth estimation. Then, through this algorithm, an adaptive bandwidth provisioning scheme is introduced. In this work, we also study a prediction-based bandwidth allocation case. For this end, we develop an adaptive fuzzy predictor, which is incorporated into a novel bandwidth allocation scheme. The proposed adaptive fuzzy predictor makes use of orthonormal basis functions based on the properties of the WMM. Additionally, we derive an analytical expression for the byte loss probability estimation assuming that the traffic obeys the MMW. Besides, a more complete characterization of the queuing behavior is carried out through the estimation of the bounds for the loss probability and mean queue length in buffer in terms of the WMM based effective bandwidth. Finally, an admission control scheme is presented that uses the WMM based effective envelope derived through the statistical network calculus, guaranteeing that the admitted flows simultaneously attend the loss and delay requirements. The computer simulation results confirm the relevance of the presented proposals / Doutorado / Telecomunicações e Telemática / Doutor em Engenharia Elétrica
|
82 |
Políticas para servidores web baseados em sessões visando qualidade e diferenciação de serviços / Policies to web servers based on sessions aiming quality and differentiation of servicesAlessandra Kelli Barbato 25 April 2008 (has links)
Este trabalho propõe políticas para servidores Web baseados em sessões, visando ao oferecimento de garantias de qualidade de serviço (Quality of Service - QoS) a seus usuários. Para o fornecimento de QoS, dois tipos de políticas são consideradas: as responsáveis pela diferenciação de serviços e as responsáveis pelo controle de admissão. Alguns algoritmos de escalonamento foram desenvolvidos com o objetivo de oferecer melhores serviços para as sessões prioritárias: o algoritmo de escalonamento baseado em sessão (SBSA) e o algoritmo de escalonamento baseado em sessão com diferenciação de serviços (SBSA-DS). Quanto ao controle de admissão, foram consideradas duas novas políticas, as quais utilizam diferentes parâmetros para a tomada de decisão e têm como objetivo garantir a finalização do maior número de sessões prioritárias. A partir dos resultados obtidos nos experimentos realizados por meio de simulação, constatou-se que o emprego dos algoritmos e das políticas desenvolvidos melhora o atendimento das sessões para as quais deve ser oferecido um serviço preferencial. Portanto, em servidores Web preocupados com a garantia de QoS para seus usuários, os quais interagem com o sistema por meio de sessões, o uso dessas novas técnicas se mostra adequado / This work considers policies for Web servers based on sessions, aiming at the guarantees of Quality of Service (QoS) to the systems users. Two types of policies are considered: the responsible for the differentiation of services and the responsible for the admission control. Some scheduling algorithms had been developed to offer better services for the priority sessions: the Session Based Scheduling Algorithm (SBSA) and the Session Based Scheduling Algorithm with Differentiation of Services (SBSA-DS). In relation to the admission control, two new policies had been considered, which use different parameters to help the decisions and have as objective guarantee the finalization of as many priority sessions as possible. From the obtained results of the experiments realized by mean of simulation, it is evidenced that the use of the developed algorithms and policies improves the attendance of the sessions that deserve preferential service. Therefore, in Web servers worried in the guarantee the QoS for their users, which interact with the system by sessions, the use of these new techniques reveals adequate
|
83 |
Desenvolvimento de um gerador de carga de trabalho baseado em sessões para servidores web / Development of a generator workload session based for web serversDayse Silveira de Almeida 13 April 2011 (has links)
Esta dissertação de mestrado apresenta o projeto, implementação e teste de um gerador de carga de trabalho para servidores Web que permite a caracterização de sessões e que representa uma carga real. O gerador desenvolvido gera carga visando à alimentar programas que simulam o comportamento de servidores Web. Para a definição dos parâmetros utilizados no gerador de carga sintética desenvolvido, diversos estudos sobre a carga em servidores Web encontrados na literatura, logs de servidores Web reais e benchmarks para servidores Web, foram utilizados. Vários algoritmos de controle de admissão e de escalonamento de requisições descritos na literatura foram implementados para teste e validação do gerador desenvolvido. Visando a utilização de sessões, é proposto nesta dissertação um algoritmo de controle de admissão, RED-SB (Random Early Detection - Session Based) que se baseia em um algoritmo (RED) que não considera sessão. Esses algoritmos foram executados utilizando-se um modelo de simulação de servidor Web com suporte a diferenciação de serviços, chamado SWDS (Servidor Web com Diferenciação de Serviços) / This MSc dissertation presents the design, implementation and tests of a workload generator for Web servers that allows the characterization of sessions and represents a real workload. The generator developed generates a workload to be used as an input to programs that simulate the behavior of Web servers. For the definition of the parameters used in the synthetic workload generator developed, several studies about the web server load described in the literature, actual web server logs and benchmarks for Web servers were used. Several algorithms for admission control and scheduling of requests described in the literature were implemented for testing and validation of the generator developed. Aiming at the utilization of sessions, this dissertation proposes an admission control algorithm RED-SB (Random Early Detection - Session based) which is based on an algorithm (RED) that does not consider session. These algorithms were implemented using a simulation model ofWeb server that supports service differentiation, called SWDS (Web Server with Service Differentiation)
|
84 |
Optimalizace přístupu do CDMA sítí / Optimization of Access to CDMA NetworksKejík, Petr January 2011 (has links)
The aim of this dissertation thesis is an optimization of access to CDMA networks. To be more specific, this thesis deals with an optimization of admission control in UMTS network. The first part of the thesis deals with the present progress of the particular topic. Thereinafter there is an analysis of admission control in UMTS system. An own UMTS simulation program was created in MATLAB. This program enables implementation and simulation of the selected admission control algorithms. The thesis is focused on load factor based, fuzzy logic based and genetic algorithms. The created UMTS simulator was used for the mutual comparison of all algorithms. The aims of this thesis are the suitable UMTS model design, evaluation and possible optimization of selected algorithms.
|
85 |
Advanced Scheduling Techniques for Mixed-Criticality SystemsMahdiani, Mitra 10 August 2022 (has links)
Typically, a real-time system consists of a controlling system (i.e., a computer) and a controlled system (i.e., the environment). Real-time systems are those systems where correctness depends on two aspects: i) the logical result of computation and, ii) the time in which results are produced. It is essential to guarantee meeting timing constraints for this kind of systems to operate correctly. Missing deadlines in many cases -- in so-called hard real-time systems -- is associated with economic loss or loss of human lives and must be avoided under all circumstances.
On the other hand, there is a trend towards consolidating software functions onto fewer processors in different domains such as automotive systems and avionics with the aim of reducing costs and complexity. Hence, applications with different levels of criticality that used to run in isolation now start sharing processors. As a result, there is a need for techniques that allow designing such mixed-criticality (MC) systems -- i.e., real-time systems combining different levels of criticality -- and, at the same time, complying with certification requirements in the different domains.
In this research, we study the problem of scheduling MC tasks under EDF (Earliest Deadline First) and propose new approaches to improve scheduling techniques. In particular, we consider that a mix of low-criticality (LO) and high-criticality (HI) tasks are scheduled on one processor. While LO tasks can be modeled by minimum inter-arrival time, deadline, and worst-case execution time (WCET), HI tasks are characterized by two WCET parameters: an optimistic and a conservative one.
Basically, the system operates in two modes: LO and HI mode. In LO mode, HI tasks run for no longer than their optimistic execution budgets and are scheduled together with the LO tasks. The system switches to HI mode when one or more HI tasks run for more than their conservative execution budgets. In this case, LO tasks are immediately discarded so as to be able of accommodating the increase in HI execution demand. We propose an exact test for mixed-criticality EDF, which increases efficiency and reliability when compared with the existing approaches from the literature. On this basis, we further derive approximated tests with less complexity and, hence, a reduced running time that makes them more suitable for
online checks.:Contents
1. Introduction 1
1.1. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2. Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3. Structure of this Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2. Concepts, Models and Assumptions 7
2.1. Real-Time Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.1.1. Tasks Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2. Scheduling Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.2.1. Feasibility versus Schedulability . . . . . . . . . . . . . . . . . . . . . . 9
2.2.2. Schedulability Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.3. Mixed-Criticality Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.4. Basic Nomenclature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.5. The Earliest Deadline First Algorithm . . . . . . . . . . . . . . . . . . . . . . 13
2.5.1. EDF-VD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.5.2. Mixed-Criticality EDF . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.5.3. Demand Bound Function . . . . . . . . . . . . . . . . . . . . . . . . . 16
3. Related Work 17
3.1. Uniprocessor Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.1.1. Uniprocessor Scheduling Based on EDF . . . . . . . . . . . . . . . . . 18
3.2. Multiprocessor Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.2.1. Multiprocessor Scheduling Based on EDF . . . . . . . . . . . . . . . . 20
4. Introducing Utilization Caps 23
4.1. Introducing Utilization Caps . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.1.1. Fixed utilization caps . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.1.2. Optimized utilization caps . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2. Findings of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5. Bounding Execution Demand under Mixed-Criticality EDF 29
5.1. Bounding Execution Demand . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.2. Analytical Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.2.1. The GREEDY Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 35
5.2.2. The ECDF Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
5.3. Finding Valid xi . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5.4. Findings of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
6. Approximating Execution Demand Bounds 41
6.1. Applying Approximation Techniques . . . . . . . . . . . . . . . . . . . . . . . 41
6.2. Devi’s Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
6.2.1. Per-task deadline scaling . . . . . . . . . . . . . . . . . . . . . . . . . . 42
6.2.2. Uniform deadline scaling . . . . . . . . . . . . . . . . . . . . . . . . . . 44
6.2.3. Complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
6.3. Findings of this Chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
7. Evaluation and Results 49
7.1. Mixed-Criticality EDF . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
7.2. Obtaining Test Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
7.2.1. The Case Di = Ti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
7.2.2. The Case Di ≤ Ti . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
7.3. Weighted schedulability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
7.4. Algorithms in this Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . 51
7.4.1. The EDF-VD and DEDF-VD Algorithms . . . . . . . . . . . . . . . . 51
7.4.2. The GREEDY algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 52
7.4.3. The ECDF algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
7.5. Evaluation of Utilization Caps . . . . . . . . . . . . . . . . . . . . . . . . . . 53
7.5.1. 10 tasks per task set . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
7.5.2. 20 tasks per task set . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
7.5.3. 50 tasks per task set . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
7.5.4. Comparison of runtime . . . . . . . . . . . . . . . . . . . . . . . . . . 59
7.6. Evaluation of Execution Demand Bounds . . . . . . . . . . . . . . . . . . . . 61
7.6.1. Comparison for sets of 10 tasks . . . . . . . . . . . . . . . . . . . . . . 61
7.6.2. Comparison for sets of 20 tasks . . . . . . . . . . . . . . . . . . . . . . 64
7.7. Evaluation of Approximation Techniques . . . . . . . . . . . . . . . . . . . . . 67
7.7.1. Schedulability curves . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
7.7.2. Weighted schedulability . . . . . . . . . . . . . . . . . . . . . . . . . . 69
7.7.3. Comparison of runtime . . . . . . . . . . . . . . . . . . . . . . . . . . 72
7.8. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
8. Conclusion and Future Work 77
8.1. Outlook/Future Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Bibliography 83
A. Introduction 91
A.1. Multiple Levels of Criticality . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
A.1.1. Ordered mode switches . . . . . . . . . . . . . . . . . . . . . . . . . . 91
A.1.2. Unordered mode switches . . . . . . . . . . . . . . . . . . . . . . . . . 93
B. Evaluation and Results 95
B.1. Uniform Distribution for Task Periods . . . . . . . . . . . . . . . . . . . . . . 95
|
86 |
Call admission control in cloud radio access networksSigwele, Tshiamo, Pillai, Prashant, Hu, Yim Fun January 2014 (has links)
No / Over the past decade, wireless communications has experienced tremendous growth, and this growth is likely to multiply in the near future. The proliferation of mobile users and an ever increasing demand for multimedia services has resulted in greater capacity requirements. Radio frequency spectrum is scarce and cannot meet this ever increasing demand and the required Quality of Service (QoS) will no longer be achieved if efficient Radio Resource Management (RRM) solutions are not found. Conventional Radio Access Networks (RAN) have standalone Base Stations (BS) with capacity preconfigured for peak loads. These RANs have high call blocking and dropping rates since BSs resources cannot be shared. Cloud based RANs (C-RAN) have been proposed as a cost and energy efficient way of meeting high capacity demand of future wireless access networks by consolidating BSs to the cloud. Instead of relying on rejection of new call requests due to limited BS resources, C-RAN takes benefit of the cloud elasticity, which allows dynamic provisioning of cloud BS resources. This paper presents a novel C-RAN Call Admission Control (C-RAN CAC) to ensure Grade of Service (GoS) by improving blocking probability and improvement of call waiting times. Call blocking probability, call average waiting time and system utilization are used to evaluate the performance of the proposed CAC algorithm.
|
87 |
Adaptive Measurement Strategies for Network Optimization and Control / Adaptiva Mätstrategier för Optimering och Reglering av NätverkLindståhl, Simon January 2023 (has links)
The fifth generation networks is rapidly becoming the new network standardand its new technological capabilities are expected to enable a far widervariety of services compared to the fourth generation networks. To ensurethat these services can co-exist and meet their standardized requirements,the network’s resources must be provisioned, managed and reconfigured ina far more complex manner than before. As such, it is no longer sufficientto select a simple, static scheme for gathering the necessary information totake decisions. Instead, it is necessary to adaptively, with regards to networksystem dynamics, trade-off the cost in terms of power, CPU and bandwidthconsumption of the taken measurements to the value their information brings.Orchestration is a wide field, and the way to quantify the value of a givenmeasurement heavily depends on the problem studied. As such, this thesisaddresses adaptive measurement schemes for a number of well-defined networkoptimization problems. The thesis is presented as a compilation, whereafter an introduction detailing the background, purpose, problem formulation,methodology and contributions of our work, we present each problemseparately through the papers submitted to several conferences. First, we study the problem of optimal spectrum access for low priorityservices. We assume that the network manager has limited opportunitiesto measure the spectrum before assigning one (if any) resource block to thesecondary service for transmission, and this measurement has a known costattached to it. We study this framework through the lens of multi-armedbandits with multiple arm pulls per decision, a framework we call predictivebandits. We analyze such bandits and show a problem specific lower bound ontheir regret, as well as design an algorithm which meets this regret asymptotically,studying both the case where measurements are perfect and the casewhere the measurement has noise of known quantity. Studying a syntheticsimulated problem, we find that it performs considerably better compared toa simple benchmark strategy. Secondly, we study a variation of admission control where the controllermust select one of multiple slices to enter a new service into. The agentdoes not know the resources available in the slices initially, and must insteadmeasure these, subject to noise. Mimicking three commonly used admissioncontrol strategies, we study this as a best arm identification problem, whereone or multiple arms is ”correct” (the arm chose by the strategy if it had fullinformation). Through this framework, we analyze each strategy and devisesample complexity lower bounds, as well as algorithms that meet these lowerbounds. In simulations with synthetic data, we show that our measurementalgorithm can vastly reduce the number of required measurements comparedto uniform sampling strategies. Finally, we study a network monitoring system where the controller mustdetect sudden changes in system behavior such as batch traffic arrivals orhandovers, in order to take future action. We study this through the lensof change point detection but argue that the classical framework is insufficientfor capturing both physical time aspects such as delay as well as measurementcosts independently, and present an alternative framework whichiidecouples these, requiring more sophisticated monitoring agents. We show,both through theory and through simulation with both synthetic data anddata from a 5G testbed, that such adaptive schedules qualitatively and quantitativelyimprove upon classical change point detection schemes in terms ofmeasurment frequency, without losing classical optimality guarantees such asthe one on required measurements post change. / Femte generationens nätverk håller snabbt på att bli den nya standarden och dess teknologiska förmågor förväntas bereda väg för en avsevärt större variation av tjänster jämfört med fjärde generationens nätverk. För att se till att dessa tjänster kan samexistera och möta sina standardiserade krav måste nätverkens resurser provisioneras, hanteras och omkonfigureras på ett mycket mer komplext vis än tidigare. Det är därmed inte längre tillräckligt att välja en simpel, statisk plan för att samla den nödvändiga information som krävs för att ta beslut. Istället behöver man adaptivt, med hänsyn till nätversystemens dynamik, avväga mätningarnas kostnad i termer av effekt-, CPU- och bandbreddskonsumtion mot det värde som de medför. Den här sortens nätverksorkestrering är ett brett fält, och hur mätningarnas värde ska kvantifieras beror i hög grad på vilket optimeringsproblem som studeras. Således bemöter den här avhandlningen adaptiva mätplaner för ett antal väldefinerade optimeringsproblem. Avhandlingen tar formen av en sammanlänkning, där följandes en introduktion som beskriver bakgrund, syfte, problemformulering, metodologi och forskningsbidrag så presenterar vi varje problem separat genom de artiklar vi inlämnat till olika konferenser. Först studerar vi optimal spektrumaccess för lågprioritetstjänster. Vi antar att nätverksregulatorn har begränsat med möjligheter att mäta spektrumanvändning innan den tillger som mest ett resursblock till tjänsten med lägre prioritet att skicka data på, och de här mätningarna har en känd kostnad. Vi studerar det här ramverket från perspektivet av flerarmade banditer med flera armdragningar per beslut, ett ramverk vi benämner förutsägande banditer (predictive bandits). Vi analyserar sådana banditer och visar en problemspecifik undre gräns på dess inlärningsförlust, samt designar en algorithm som presterar lika bra som denna gräns i den asymptotiska regimen. Vi studerar fallet där mätningarna är perfekta såväl som fallet där mätningarna har brus med känd storlek. Genom att studera ett syntetiskt simulerat problem av detta slag finner vi att vår algoritm presterar avsevärt bättre jämfört med en simplare riktmärkesstrategi. Därefter studerar vi en variation av tillträdeskontroll, där en regulator måste välja en av ett antal betjänter att släppa in en ny tjänst till (om någon alls). Agenten vet ursprungligen inte vilka resurser som finns betjänterna tillgängliga, utan måste mäta detta med brusiga mätningar. Vi härmar tre vanligt använda tillträdesstrategier och studerar detta som ett bästa-arms identifieringsproblem, där en eller flera armar är "korrekta" (det vill säga, de armar som hade valts av tillträdesstrategin om den hade haft perfekt kännedom). Med det här ramverket analyserar vi varje strategi och visar undre gränser på antalet mätningar som krävs, och skapar algoritmer som möter dessa gränser. I simuleringar med syntetisk data visar vi att våra mätalgoritmer kan drastiskt reducera antalet mätningar som krävs jämfört med jämlika mätstrategier. Slutligen studerar vi ett övervakningssystem där agenten måste upptäcka plötsliga förändringar i systemets beteende såsom förändringar i trafiken eller överräckningar mellan master, för att kunna agera därefter. Vi studerar detta med ramverket förändringsdetektion, men argumenterar att det klassiska ramverket är otillräckligt för att bemöta aspekter berörande fysisk tid (som fördröjning) samtidigt som den bemöter mätningarnas kostnad. Vi presenterar därmed ett alternativt ramverk som frikopplar de två, vilket i sin tur kräver mer sostifikerade övervakningssystem. Vi visar, genom både teori och simulering med både syntetisk och experimentell data, att sådana adaptiva mätscheman kan förbättra mätfrekvensen jämfört med klassiska periodiska mätscheman, både kvalitativt och kvantitativt, utan att förlora klassiska optimalitetsgarantier såsom det på antalet mätningar som behövs när förändringen har skett. / <p>QC 20230915</p>
|
88 |
Optimal Call Admission Control Policies in Wireless Cellular Networks Using Semi Markov Decision ProcesNi, Wenlong January 2008 (has links)
No description available.
|
89 |
Common Radio Resource Management Strategies for Quality of Service Support in Heterogeneous Wireless NetworksCalabuig Soler, Daniel 12 March 2010 (has links)
Hoy en día existen varias tecnologías que coexisten en una misma zona formando un sistema heterogéneo. Además, este hecho se espera que se vuelva más acentuado con todas las nuevas tecnologías que se están estandarizando actualmente. Hasta ahora, generalmente son los usuarios los que eligen la tecnología a la que se van a conectar, ya sea configurando sus terminales o usando terminales distintos. Sin embargo, esta solución es incapaz de aprovechar al máximo todos los recursos. Para ello es necesario un nuevo conjunto de estrategias. Estas estrategias deben gestionar los recursos radioeléctricos conjuntamente y asegurar la satisfacción de la calidad de servicio de los usuarios.
Siguiendo esta idea, esta Tesis propone dos nuevos algoritmos. El primero es un algoritmo de asignación dinámica de recusos conjunto (JDRA) capaz de asignar recursos a usuarios y de distribuir usuarios entre tecnologías al mismo tiempo. El algoritmo está formulado en términos de un problema de optimización multi-objetivo que se resuelve usando redes neuronales de Hopfield (HNNs). Las HNNs son interesantes ya que se supone que pueden alcanzar soluciones sub-óptimas en cortos periodos de tiempo. Sin embargo, implementaciones reales de las HNNs en ordenadores pierden esta rápida respuesta. Por ello, en esta Tesis se analizan las causas y se estudian posibles mejoras.
El segundo algoritmo es un algoritmo de control de admisión conjunto (JCAC) que admite y rechaza usuarios teniendo en cuenta todas las tecnologías al mismo tiempo. La principal diferencia con otros algorimos propuestos es que éstos últimos toman las dicisiones de admisión en cada tecnología por separado. Por ello, se necesita de algún mecanismo para seleccionar la tecnología a la que los usuarios se van a conectar. Por el contrario, la técnica propuesta en esta Tesis es capaz de tomar decisiones en todo el sistema heterogéneo. Por lo tanto, los usuarios no se enlazan con ninguna tecnología antes de ser admitidos. / Calabuig Soler, D. (2010). Common Radio Resource Management Strategies for Quality of Service Support in Heterogeneous Wireless Networks [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/7348
|
90 |
Performance analysis and enhancement of QoS framework for fixed WiMAX networks : design, analysis and evaluation of 802.16 Point-to-Multipoint (PMP) Quality of Service Framework based on uplink scheduler and call admission control analysisLaias, Elmabruk M. January 2009 (has links)
Given the current developments and advances in the scientific and technological aspects of human knowledge and introducing new approaches in various fields of telecommunication technologies and industries, there has been an increasing growth in its players' plans and a positive change in their outlooks in order to achieve the target of "anywhere and anytime access". Recent developments of WiMAX (Worldwide interoperability for Microwave Access) networks, as a sign of increasing needs and demands for new telecommunication services and capabilities, have led to revolutions in global telecommunication which should be perceived properly in terms of the commercial and technical aspects in order to enjoy the new opportunities. Most experts believe that WiMAX technology is a preliminary step to develop Fourth Generation networks known as 4G technologies. It has not only succeeded in the utilization of several of the latest telecommunication techniques in the form of unique practical standards, but also paved the way for the quantitative and qualitative developments of high-speed broadband access. IEEE 802.16 Standard introduces several advantages, and one of them is the support for Quality of Services (QoS) at the Media Access Control (MAC) level. For these purposes, the standard defines several scheduling classes at MAC layer to treat service flow in a different way, depending on QoS requirements. In this thesis, we have proposed a new QoS framework for Point-to-Multi Point (PMP) 802.16 systems operating in Time Division Duplexing (TDD) mode over a WirelessMAN-OFDM physical layer. The proposed framework consists of a Call Admission Control (CAC) module and a scheduling scheme for the uplink traffic as well as a simple frame allocation scheme. The proposed CAC module interacts with the uplink scheduler status and it makes its decision based on the scheduler queue status; on the other hand, the proposed scheduling scheme for the uplink traffic aims to support realtime flows and adapts the frame-by-frame allocations to the current needs of the connections, with respect to the grants boundaries fixed by the CAC module. Extensive OPNET simulation demonstrates the effectiveness of the proposed architecture.
|
Page generated in 0.0877 seconds