• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 28
  • 28
  • 28
  • 9
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

A New Framework For Qos Provisioning In Wireless Lans Using The P-persistent Mac Protocol

Anna, Kiran Babu 01 January 2010 (has links)
The support of multimedia traffic over IEEE 802.11 wireless local area networks (WLANs) has recently received considerable attention. This dissertation has proposed a new framework that provides efficient channel access, service differentiation and statistical QoS guarantees in the enhanced distributed channel access (EDCA) protocol of IEEE 802.11e. In the first part of the dissertation, the new framework to provide QoS support in IEEE 802.11e is presented. The framework uses three independent components, namely, a core MAC layer, a scheduler, and an admission control. The core MAC layer concentrates on the channel access mechanism to improve the overall system efficiency. The scheduler provides service differentiation according to the weights assigned to each Access Category (AC). The admission control provides statistical QoS guarantees. The core MAC layer developed in this dissertation employs a P-Persistent based MAC protocol. A weight-based fair scheduler to obtain throughput service differentiation at each node has been used. In wireless LANs (WLANs), the MAC protocol is the main element that determines the efficiency of sharing the limited communication bandwidth of the wireless channel. In the second part of the dissertation, analytical Markov chain models for the P-Persistent 802.11 MAC protocol under unsaturated load conditions with heterogeneous loads are developed. The Markov models provide closed-form formulas for calculating the packet service time, the packet end-to-end delay, and the channel capacity in the unsaturated load conditions. The accuracy of the models has been validated by extensive NS2 simulation tests and the models are shown to give accurate results. In the final part of the dissertation, the admission control mechanism is developed and evaluated. The analytical model for P-Persistent 802.11 is used to develop a measurement-assisted model-based admission control. The proposed admission control mechanism uses delay as an admission criterion. Both distributed and centralized admission control schemes are developed and the performance results show that both schemes perform very efficiently in providing the QoS guarantees. Since the distributed admission scheme control does not have a complete state information of the WLAN, its performance is generally inferior to the centralized admission control scheme. The detailed performance results using the NS2 simulator have demonstrated the effectiveness of the proposed framework. Compared to 802.11e EDCA, the scheduler consistently achieved the desired throughput differentiation and easy tuning. The core MAC layer achieved better delays in terms of channel access, average packet service time and end-to-end delay. It also achieved higher system throughput than EDCA for any given service differentiation ratio. The admission control provided the desired statistical QoS guarantees.
22

Principles and Methods of Adaptive Network Algorithm Design under Various Quality-of-Service Requirements

Li, Ruogu 19 December 2012 (has links)
No description available.
23

Prediction of 5G system latency contribution for 5GC network functions / Förutsägelse av 5G-systemets latensbidrag för 5GC-nätverksfunktioner

Cheng, Ziyu January 2023 (has links)
End-to-end delay measurement is deemed crucial for network models at all times as it acts as a pivotal metric of the model’s effectiveness, assists in delineating its performance ceiling, and stimulates further refinement and enhancement. This premise holds true for 5G Core Network (5GC) models as well. Commercial 5G models, with their intricate topological structures and requirement for reduced latencies, necessitate an effective model to anticipate each server’s current latency and load levels. Consequently, the introduction of a model for estimating the present latency and load levels of each network element server would be advantageous. The central content of this article is to record and analyze the packet data and CPU load data of network functions running at different user counts as operational data, with the data from each successful operation of a service used as model data for analyzing the relationship between latency and CPU load. Particular emphasis is placed on the end-to-end latency of the PDU session establishment scenario on two core functions - the Access and Mobility Management Function (AMF) and the Session Management Function (SMF). Through this methodology, a more accurate model has been developed to review the latency of servers and nodes when used by up to 650, 000 end users. This approach has provided new insights for network level testing, paving the way for a comprehensive understanding of network performance under various conditions. These conditions include strategies such as "sluggish start" and "delayed TCP confirmation" for flow control, or overload situations where the load of network functions exceeds 80%. It also identifies the optimal performance range. / Latensmätningar för slutanvändare anses vara viktiga för nätverksmodeller eftersom de fungerar som en måttstock för modellens effektivitet, hjälper till att definiera dess prestandatak samt bidrar till vidare förfining och förbättring. Detta antagande gäller även för 5G kärnnätverk (5GC). Kommersiella 5G-nätverk med sin komplexa topologi och krav på låg latens, kräver en effektiv modell för att prediktera varje servers aktuella last och latensbidrag. Följdaktligen behövs en modell som beskriver den aktuella latensen och dess beroende till lastnivå hos respektive nätverkselement. Arbetet består i att samla in och analysera paketdata och CPU-last för nätverksfunktioner i drift med olika antal slutanvändare. Fokus ligger på tjänster som används som modelldata för att analysera förhållandet mellan latens och CPU-last. Särskilt fokus läggs på latensen för slutanvändarna vid PDU session-etablering för två kärnfunktioner – Åtkomst- och mobilitetshanteringsfunktionen (AMF) samt Sessionshanteringsfunktionen (SMF). Genom denna metodik har en mer exakt modell tagits fram för att granska latensen för servrar och noder vid användning av upp till 650 000 slutanvändare. Detta tillvägagångssätt har givit nya insikter för nätverksnivåtestningen, vilket banar väg för en omfattande förståelse för nätverprestanda under olika förhållanden. Dessa förhållanden inkluderar strategier som ”trög start” och ”fördröjd TCP bekräftelse” för flödeskontroll, eller överlastsituationer där lasten hos nätverksfunktionerna överstiger 80%. Det identifierar också det optimala prestandaområdet.
24

車用行動網路中以車行方向為基礎的貪婪路由演算法 / Moving Direction Based Greedy Routing Algorithm for VANET

黃祥德 Unknown Date (has links)
由於VANET上的行動節點移動速度快,加上受到道路及交通號制的限制,導致網路拓樸快速改變,容易造成網路斷訊,影響資料封包在網路上的傳送效能。在傳統的MANET上有許多用來傳送資料封包的路由機制,並不直接適用在VANET上。隨著Global Position System (GPS)的普及,越來越多的車輛都具備GPS,用以輔助行車定位之用。在本研究中我們將透過GPS取得車輛的地理資訊,提出一個適用於VANET中以車行方向為基礎的貪婪路由演算法(MDBG)。 本論文目的在強化VANET網路上資料封包的路由選擇策略。所提出的路由機制將會透過hello message來取得相鄰車輛的位置和車行方向,並利用目標要求(DREQ)、目標回應(DREP)來獲得目標車輛的資訊。進而運用車輛的車行方向,選擇適當的相鄰車輛找出一條穩定的路由路徑。當來源車輛和目標車輛的車行方向相同時,AODV能有不錯的效能表現。而我們的路由演算法(MDBG)將強化當來源車輛和目標車輛的車行方向相反,並且逐漸遠離時的效能表現。實驗模擬的結果顯示MDBG在封包到達率、吞吐量和平均端對端延遲上較之於AODV及DSR演算法有更優異的表現。 / Packets transmission over VANET is intermittent due to rapid change of network topology. This comes from both high mobility of mobile nodes and road limitation. Intermittent transmission causes inefficient packet delivery. Those routing protocols applicable to MANET might not be suitable for VANET. On the other hand, Global Position System (GPS) is becoming prevalent in assisting positioning for vehicles. In this research, we develop a Moving Direction Based Greedy (MDBG) routing algorithm for VANET. MDBG algorithm is based on the geographical information collected by GPS. The objective of the thesis is to enhance routing decision in packet delivery. The "hello message" is used to retrieve the locations and moving directions of neighboring vehicles. Destination REQuest (DREQ) and Destination REPly (DREP) messages are used to retrieve target vehicle information. The source vehicle will thus use these information together with its own moving direction information to establish a stable routing path by selecting appropriate neighboring vehicles. AODV algorithm is proved to have good performance as both the source vehicle and target vehicle have the same moving direction. MDBG algorithm is proposed to leverage the problem as source vehicle and target vehicle move far apart in opposite directions. Simulation results show that MDBG outperforms both AODV and DSR in packet arrival rate, throughput and average end-to-end delay.
25

Modélisation, évaluation et validation des systèmes temps réel distribués / Modeling, evaluation and validation of distributed real time systems.

Benammar, Nassima 17 September 2018 (has links)
Dans cette thèse, nous analysons les réseaux des systèmes temps-réel distribués et plus particulièrement ceux des domaines de l’avionique et de l’automobile. Nous nous sommes focalisés sur deux protocoles : « Avionic Full DupleX Switched Ethernet » (AFDX), « Audio Vidéo Bridging Ethernet » (AVB). Dans ces domaines critiques, le déterminisme du réseau doit être garanti. Il consiste, notamment, en la détermination d’une borne garantie du délai de bout en bout de traversée du réseau pour chaque trame ; et un dimensionnement des files d’attente des trames suffisamment grand pour garantir qu’aucune d’entre elle ne débordera et ainsi, éviter toute perte de trame.Il existe plusieurs méthodes pour l’évaluation des délais et nous avons, principalement, travaillé sur la méthode « Forward end-to-end delay Analysis » (FA). FA avait déjà été définie avec la politique d’ordonnancement « First-In-First-Out » dans le contexte de l’AFDX. Nous sommes repartis de cette approche, nous l’avons reformulé et généralisé à n’importe quel réseau Ethernet commuté. Nous l’avons aussi étendu aux priorités statiques et au protocole AVB et sa politique de service « Credit Based Shaper ». Pour chaque contribution, des démonstrations formelles ont été présentées et une expérimentation incluant une comparaison de FA avec les principales approches d’évaluation sur un exemple industriel. Finalement, nous avons développé et démontré formellement une approche pour le dimensionnement des files d’attente en termes de nombre de trames. Cette approche a été expérimentée également sur une configuration industrielle. / In this thesis, we analyze networks in the context of distributed real-time systems, especially in the fields of avionics, with “Avionics Full DupleX Switched Ethernet” (AFDX), and automobile, with “Audio Video Bridging Ethernet” (AVB). For such applications, network determinism needs to be guaranteed. It involves, in particular, assessing a guaranteed bound on the end-to-end traversal time across the network fr each frame; and dimensioning the buffers in order to avoid any loss of frame because of a buffer overflow.There are several methods for worst-case delay analysis, and we have mainly worked on the “Forward end-to-end Delay Analysis” (FA) method. FA had already been developed for “First-In-First-Out” scheduling policy in the AFDX context, so we generalized it to any Switched Ethernet network. We have also extended it to handle static priorities and the AVB protocol, shaping policy named “Credit Based Shaper” (CBS). Each contribution has been formaly proved and experiments have been led on industrial configurations. For our experimentations, we have compared our results with the results of competing approaches. Finally, we have developed and formally demonstrated an approach for buffer dimensioning in terms of number of frames. This approach has also been tested on an industrial configuration and has produced tight bounds.
26

Scalable Trajectory Approach for ensuring deterministic guarantees in large networks / Passage à l'échelle de l'approche par trajectoire dans de larges réseaux

Medlej, Sara 26 September 2013 (has links)
Tout comportement défectueux d’un système temps-réel critique, comme celui utilisé dans le réseau avionique ou le secteur nucléaire, peut mettre en danger des vies. Par conséquent, la vérification et validation de ces systèmes est indispensable avant leurs déploiements. En fait, les autorités de sécurité demandent d’assurer des garanties déterministes. Dans cette thèse, nous nous intéressons à obtenir des garanties temporelles, en particulier nous avons besoin de prouver que le temps de réponse de bout-en-bout de chaque flux présent dans le réseau est borné. Ce sujet a été abordé durant de nombreuses années et plusieurs approches ont été développées. Après une brève comparaison entre les différentes approches existantes, une semble être un bon candidat. Elle s’appelle l’approche par trajectoire; cette méthode utilise les résultats établis par la théorie de l'ordonnancement afin de calculer une limite supérieure. En réalité, la surestimation de la borne calculée peut entrainer la rejection de certification du réseau. Ainsi une première partie du travail consiste à détecter les sources de pessimisme de l’approche adoptée. Dans le cadre d’un ordonnancement FIFO, les termes ajoutant du pessimisme à la borne calculée ont été identifiés. Cependant, comme les autres méthodes, l’approche par trajectoire souffre du problème de passage à l’échelle. En fait, l’approche doit être appliquée sur un réseau composé d’une centaine de commutateur et d’un nombre de flux qui dépasse les milliers. Ainsi, il est important qu’elle soit en mesure d'offrir des résultats dans un délai acceptable. La première étape consiste à identifier, dans le cas d’un ordonnancement FIFO, les termes conduisant à un temps de calcul important. L'analyse montre que la complexité du calcul est due à un processus récursif et itératif. Ensuite, en se basant toujours sur l’approche par trajectoire, nous proposons de calculer une limite supérieure dans un intervalle de temps réduit et sans perte significative de précision. C'est ce qu'on appelle l'approche par trajectoire scalable. Un outil a été développé permettant de comparer les résultats obtenus par l’approche par trajectoire et notre proposition. Après application sur un réseau de taille réduite (composé de 10 commutateurs), les résultats de simulations montrent que la durée totale nécessaire pour calculer les bornes des milles flux a été réduite de plusieurs jours à une dizaine de secondes. / In critical real-time systems, any faulty behavior may endanger lives. Hence, system verification and validation is essential before their deployment. In fact, safety authorities ask to ensure deterministic guarantees. In this thesis, we are interested in offering temporal guarantees; in particular we need to prove that the end-to-end response time of every flow present in the network is bounded. This subject has been addressed for many years and several approaches have been developed. After a brief comparison between the existing approaches, the Trajectory Approach sounded like a good candidate due to the tightness of its offered bound. This method uses results established by the scheduling theory to derive an upper bound. The reasons leading to a pessimistic upper bound are investigated. Moreover, since the method must be applied on large networks, it is important to be able to give results in an acceptable time frame. Hence, a study of the method’s scalability was carried out. Analysis shows that the complexity of the computation is due to a recursive and iterative processes. As the number of flows and switches increase, the total runtime required to compute the upper bound of every flow present in the network understudy grows rapidly. While based on the concept of the Trajectory Approach, we propose to compute an upper bound in a reduced time frame and without significant loss in its precision. It is called the Scalable Trajectory Approach. After applying it to a network, simulation results show that the total runtime was reduced from several days to a dozen seconds.
27

QoS routing for mobile ad hoc networks using genetic algorithm

Abdullah, Jiwa January 2007 (has links)
Mobile Ad Hoc Networks (MANETs) are a class of infrastructure less network architecture which are formed by a collection of mobile nodes that communicate with each other using multi-hop wireless links. They eliminate the need for central management, hence each node must operate cooperatively to successfully maintain the network. Each node performs as a source, a sink and a router. Future applications of MANETs are expected to be based on all-IP architecture, carrying a multitude of real-time multimedia applications such as voice, video and data. It would be necessary for MANETs to have an efficient routing and quality of service (QoS) mechanism to support diverse applications. This thesis proposes a set of cooperative protocols that provide support for QoS routing. The first is the on-demand, Non-Disjoint Multiple Routes Discovery protocol (NDMRD). NDMRD allows the establishment of multiple paths with node non-disjoint between source and destination node. It returns to the source a collection of routes with the QoS parameters. The second part of the protocol is the Node State Monitoring protocol for the purpose of monitoring, acquisition, dissemination and accumulation of QoS route information. The third part of the protocol implements the QoS route selection based on a Genetic Algorithm. The GA is implemented online with predetermined initial population and weighted-sum fitness function which operates simultaneously on the node bandwidth, media access delay, end to end delay and the node connectivity index (NCI). The term node connectivity index is a numerical value designed to predict comparatively the longest time a node-pair might be connected wirelessly.
28

Reproducibility and Applicability of a Fuzzy-based Routing Algorithm in Wireless Sensor Networks

Rönningen, Hannes, Olofsson, Erik January 2023 (has links)
Wireless sensor networks is a broad subject with many applications and interesting research areas, such as optimization within connectivity and energy efficiency. One problem is that most published articles in this field use customized simulation environments and do not provide source code of their implementation. By not including aspects of implementation, it becomes difficult to determine how the results are achieved, which questions the validity and reliability of the works. This thesis aims to reproduce one of these researched methods, an algorithm that balances battery life with efficient routing within a network using fuzzy logic, with the goal to increase the reliability of the methodology within its field. The research question constructed on the foundation of these premises is thus “Is reproducibility satisfactory in a research work on a multi-objective routing algorithm, using fuzzy logic, in wireless sensor networks?, a case study by Minhas et al”. Two additional research questions emerge from the first one: “How does the reproduced algorithm perform in comparison to a selection of dif erent routing algorithms?” and “Is the reproduced algorithm, as is, applicable to a less idealistic environment?” To answer the research questions a computer simulation method is used to build, execute, and analyze the output of the algorithms. The results show that the implemented algorithm performs noticeably better in both lifetime and ratio to the shortest path compared with the original implementation, hinting towards the implementation and reproducibility deviating from expected results. The reproduced algorithm is also compared to two other algorithms under a different simulation environment, where it performs better in lifetime and packet delivery rate whilst performing slightly worse in energy efficiency and total energy consumption. Due to the significant differences in performance against the reproduced article’s implementation the study concludes that the reproducibility is not satisfactory. Lastly, it concludes that it does not perform well in a less idealistic simulation environment, making it less applicable.

Page generated in 0.118 seconds