1 |
Efficient communications for fine-grain distributed computersMiller, Philip Robert January 1991 (has links)
No description available.
|
2 |
Design and simulation of metropolitan area communications networksCarrapatoso, E. M. E. M. January 1987 (has links)
No description available.
|
3 |
Transmission of time critical data over a packet satellite linkSalleh, Ahmad Zaki Mohd January 1994 (has links)
This thesis presents some new techniques in frame oriented transmission systems with particular emphasis on HDLC (High Level Data Link Control) links. The advent of multimedia and applications requiring high bandwidth has prompted the development of high performance networks. In addition to that, accessibility is also an important issue. Satellite links have become a major contributor in providing access to larger networks where terrestrial connections are not possible due to geographical constraints. The development of VSATs (Very Small Aperture Terminal) has further increased the interest in providing extra-terrestrial links as a means of accessing a network. Because VSAT links are less reliable than terrestrial connections, bandwidth management becomes an important issue. The major problems are identified in this thesis. Frame oriented transmission systems have provided a very efficient method for data transmission. Data from several sources may be multiplexed into a common link. Recently, data networks have been successfully used for the transmission of various types of traffic. This diverse traffic has different QOS requirements such as throughput and delay. Certain types of traffic have an inherent priority. This traffic is referred to as time-critical or temporal. Temporal data has a short lifetime after which the data become useless regardless of whether the data has been corrupted or not. Some data sources such as voice and video, are able to tolerate small amounts of errors provided they are received within their lifetime period. From here we see that there are two very contrasting features of the data types. Conventional packet protocols are designed to ensure data integrity in return for packet delays due to retransmission and congestion control.
|
4 |
Optimising signalling rate and internal diversity order for mobile cellular DS-CDMA systemsAllpress, Stephen Alan January 1993 (has links)
No description available.
|
5 |
PRACTICAL CLOUD COMPUTING INFRASTRUCTUREJames A Lembke (10276463) 12 March 2021 (has links)
<div>Cloud and parallel computing are fundamental components in the processing of large data sets. Deployments of distributed computers require network infrastructure that is fast, efficient, and secure. Software Defined Networking (SDN) separates the forwarding of network data by switches (data plane) from the setting and managing of network policies (control plane). While this separation provides flexibility for setting network policies affecting the establishment of network flows in the data plane, it provides little to no fault tolerance for failures, either benign or caused by corrupted/malicious applications. Such failures can cause network flows to be incorrectly routed through the network or stop such flows altogether. Without protection against faults, cloud network providers using SDN run the risk of inefficient allocation of network resources or even data loss. Furthermore, the asynchronous nature existing protocols for SDN does not provide a mechanism for consistency in network policy updates across multiple switches.</div><div>In addition, cloud and parallel applications require an efficient means for accessing local system data (input data sets, temporary storage locations, etc.). While in many cases it may be possible for a process to access this data by making calls directly to a file system (FS) kernel driver, this is not always possible (e.g. when using experimental distributed FSs where the needed libraries for accessing the FS only exist in user space).</div><div>This dissertation provides a design for fault tolerance of SDN and infrastructure for advancing the performance of user space FSs. It is divided into three main parts. The first part describes a fault tolerant, distributed SDN control plane framework. The second part expands upon the fault tolerant approach to SDN control plane by providing a practical means for dynamic control plane membership as well as providing a simple mechanism for controller authentication through threshold signatures. The third part describes an efficient framework for user space FS access.</div><div>This research makes three contributions. First, the design, specification, implementation, and evaluation of a method for fault tolerant SDN control plane that is inter-operable with existing control plane applications involving minimal instrumentation of the data plane runtime. Second, the design, specification, implementation and evaluation of a mechanism for dynamic SDN control plane membership that all ensure consistency of network policy updates and minimizes switch overhead through the use of distributed key generation and threshold signatures. Third, the design, specification, implementation, and evaluation of a user space FS access framework that is correct to the Portable Operating System Interface (POSIX) specification with significantly better performance over existing user space access methods, while requiring no implementation changes for application programmers.</div>
|
6 |
Towards a Traffic-aware Cloud-native Cellular CoreAmit Kumar Sheoran (11184387) 26 July 2021 (has links)
<div>Advances in virtualization technologies have revolutionized the design of the core of cellular networks. However, the adoption of microservice design patterns and migration of services from purpose-built hardware to virtualized hardware has adversely affected the delivery of latency-sensitive services.</div><div><br></div><div>In this dissertation, we make a case for cloud-native (microservice container packaged) network functions in the cellular core by proposing domain knowledge-driven, traffic-aware, orchestration frameworks to make network placement decisions. We begin by evaluating the suitability of virtualization technologies for the cellular core and demonstrating that container-driven deployments can significantly outperform other virtualization technologies such as Virtual Machines for control and data plane applications.</div><div><br></div><div>To support the deployment of latency-sensitive applications on virtualized hardware, we propose using Virtual Network Function (VNF) bundles (aggregates) to handle transactions. Specifically, we design Invenio to leverage a combination of network traces and domain knowledge to identify VNFs involved in processing a specific transaction, which are then collocated by a traffic-aware orchestrator. By ensuring that a user request is processed by a single aggregate of collocated VNFs, Invenio can significantly reduce end-to-end latencies and improve user experience.</div><div><br></div><div>Finally, to understand the challenges in using container-driven deployments in real-world applications, we develop and evaluate a novel caller-ID spoofing detection solution in Voice over LTE (VoLTE) calls. Our proposed solution, NASCENT, cross validates the caller-ID used during voice-call signaling with a previously authenticated caller-ID to detect caller-ID spoofing. Our evaluation with traditional and container-driven deployments shows that container-driven deployment can not only support complex cellular services but also outperform traditional deployments.</div><div><br></div>
|
7 |
Network coding for multicast communications over satellite networksJaff, Esua K., Susanto, Misfa, Ali, Muhammad, Pillai, Prashant, Hu, Yim Fun January 2015 (has links)
No / Random packet errors and erasures are common in satellite
communications. These types of packet losses could become significant in
mobile satellite scenarios like satellite-based aeronautical communications
where mobility at very high speeds is a routine. The current adaptive coding
and modulation (ACM) schemes used in new satellite systems like the DVBRCS2
might offer some solutions to the problems posed by random packet
errors but very little or no solution to the problems of packet erasures where
packets are completely lost in transmission. The use of the current ACM
schemes to combat packet losses in a high random packet errors and erasures
environment like the satellite-based aeronautical communications will result in
very low throughput. Network coding (NC) has proved to significantly improve
throughput and thus saves bandwidth resources in such an environment. This
paper focuses on establishing how in random linear network coding (RLNC)
the satellite bandwidth utilization is affected by changing values of the
generation size, rate of packet loss and number of receivers in a satellite-based
aeronautical reliable IP multicast communication. From the simulation results,
it shows that the bandwidth utilization generally increases with increasing
generation size, rate of packet loss and number of receivers.
|
8 |
Ensuring Network Designs Meet Performance Requirements under FailuresYiyang Chang (6872636) 13 August 2019 (has links)
<div>
<div>
<div>
<p>With the prevalence of web and cloud-based services, there is an ever growing
requirement on the underlying network infrastructure to ensure that business critical traffic is continually serviced with acceptable performance. Networks must meet
their performance requirements under failures. The global scale of cloud provider
networks and the rapid evolution of these networks imply that failures are the norm
in production networks today. Unplanned downtime can cost billions of dollars, and
cause catastrophic consequences. The thesis is motivated by these challenges and
aims to provide a principled solution to certifying network performance under failures. Network performance certification is complicated, due to both the variety of
ways a network can fail, and the rich ways a network can respond to failures. The
key contributions of this thesis are: (i) a general framework for robustly certifying
the worst-case performance of a network across a given set of uncertain scenarios. A
key novelty is that the framework models flexible network response enabled by recent
emerging trends such as Software-Defined Networking; (ii) a toolkit which automates
the key steps needed in robust certification making it suitable for use by a network
architect, and which enables experimentation on a wide range of robust certification
of practical interest; (iii) Slice, a general framework which efficiently classifies failure
scenarios based on whether network performance is acceptable for those scenarios,
and which allows reasoning about performance requirements that must be met over
a given percentage of scenarios. We also show applications of our frameworks in synthesizing designs that are guaranteed to meet a performance goal over all or a desired percentage of a given set of scenarios. The thesis focuses on wide-area networks, but
the approaches apply to data-center networks as well.</p></div></div></div>
|
9 |
Equalizing, Complementary, Heuristic Orientation of Situated AgentsEunsun C. Smith (5930864) 03 January 2019 (has links)
<div>Cognitive agent architectures embed social learning algorithms and normative frameworks for adopting others’ influenced goals. However, there exists inefficiency in providing continuous, situational decision-making to emerge social, altruistic norms. The thesis reconstructs social-ecological learning mechanisms to functionally and efficiently internalize situational cooperation. By orienting agents to be self-aware of their three-dimensional vectors, i.e., physical, emotional and intellectual in graphical representations, this thesis hypothesizes the parsimonious, action-predictive four emotions that not only link perceptions, action, and cognition by events but also the emotional continuity functional to social-ecological rationality of agents in continuum. Twelve Meridian system is employed to conceptualize the equalizing, complementary, heuristic orientation (ECHO) model. ECHO simulates “naturalistic” cooperation to model embodied, social-ecological orientations by self-organizing emotions to emerge functional social network formations. ECHO delineates the soma links to perceptions, namely Twelve Meridian channels as “direct pipes” that initiates and conduct emotions and consciousness of three dimensional agenthood: physical, emotional, and intellectual desires. ECHO reconstructs emotions as entities to induce systemic, self-organized rule of delegation by integrating agents’ percepts and actuations. By modeling constitutional emotions and consciousness of eight entities, emotions within entities as “individualized emotional processors,” are constructing and integrating purposeful social, altruistic events for the efficacy of situated agents.<br></div>
|
10 |
Covert Communication NetworksNix, Timothy Glen 16 December 2013 (has links)
A covert communications network (CCN) is a connected, overlay peer-to-peer network used to support communications within a group in which the survival of the group depends on the confidentiality and anonymity of communications, on concealment of participation in the network to both other members of the group and external eavesdroppers, and finally on resilience against disconnection. In this dissertation, we describe the challenges and requirements for such a system. We consider the topologies of resilient covert communications networks that: (1) minimize the impact on the network in the event of a subverted node; and (2) maximize the connectivity of the survivor network with the removal of the subverted node and its closed neighborhood. We analyze the properties of resilient covert networks, propose measurements for determining the suitability of a topology for use in a covert communication network, and determine the properties of an optimal covert network topology. We analyze multiple topologies and identify two constructions that are capable of generating optimal topologies. We then extend these constructions to produce near-optimal topologies that can “grow” as new nodes join the network. We also address protocols for membership management and routing. Finally, we describe the architecture of a prototype system for instantiating a CCN.
|
Page generated in 0.0974 seconds