• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Hybrid Access Control Mechanism in Two-Tier Femtocell Networks

Mantravadi, Sirisha 1987- 14 March 2013 (has links)
The cellular industry is undergoing a major paradigm shift from voice-centric, structured homogeneous networks to a more data-driven, distributed and heterogeneous architecture. One of the more promising trends emerging from this cellular revolution is femtocells. Femtocells are primarily viewed as a cost-effective way to improve both capacity and indoor coverage, and they enable offloading data-traffic from macrocell network. However, efficient interference management in co-channel deployment of femtocells remains a challenge. Decentralized strategies such as femtocell access control have been identified as an effective means to mitigate cross-tier interference in two-tier networks. Femtocells can be configured to be either open access or closed access. Prior work on access control schemes show that, in the absence of any coordination between the two tiers in terms of power control and user scheduling, closed access is the preferred approach at high user densities. Present methods suggest that in the case of orthogonal multiple access schemes like TDMA/OFDMA, femtocell access control should be adaptive according to the estimated cellular user density. The approach we follow, in this work, is to adopt an open access policy at the femtocell access points with a cap on the maximum number of users allowed on a femtocell. This ensures the femto owner retains a significant portion of the femtocell resources. We design an iterative algorithm for hybrid access control for femtocells that integrates the problems of uplink power control and base station assignment. This algorithm implicitly adapts the femtocell access method to the current user density. The distributed power control algorithm, which is based on Yates' work on standard interference functions, enables users to overcome the interference in the system and satisfy their minimum QoS requirements. The optimal allocation of femtocell resources is incorporated into the access control algorithm through a constrained sum-rate maximization to protect the femto owner from starvation at high user densities. The performance of a two-tier OFDMA femtocell network is then evaluated under the proposed access scheme from a home owner viewpoint, and network operator perspective. System-level simulations show that the proposed access control method can provide a rate gain of nearly 52% for cellular users, compared to closed access, at high user densities and under moderate-to-dense deployment of femtocells. At the same time, the femto owner is prevented from going into outage and only experiences a negligible rate loss. The results obtained establish the quantitative performance advantage of using hybrid access at femtocells with power control at high user densities. The convergence properties of the proposed iterative hybrid access control algorithm are also investigated by varying the user density and the mean number of femto access points in the network. It is shown that for a given system model, the algorithm converges quickly within thirty iterations, provided a feasible solution exists.
2

Design And Implementation Of A Hybrid And Configurable Access Control Model

Turan, Ugur 01 October 2009 (has links) (PDF)
A hybrid and configurable access control model is designed to satisfy the requirements of using different access control models in the same schema. The idea is arised to completely combine and configure the two main access control models, discretionary and mandatory which have been widely used in many systems so far with their advantages and disadvantages. The motivation originates from the fact that / in real life usage, discretionary based systems needs some strict policies and mandatory based systems needs some flexibility. The model is designed to combine these two appoaches in a single and configurable model, with some required real life extensions, in a conflictfree fashion and configurable degree of combination. Implementation of the model has been done and main important cases which shows the power and expressiveness of the model are designed and implemented. The authorization process is in the responsibility of the model which can be combined with secured authentication and auditing schemas. The new approaches as Role-Based, Context-Based and Temporal access control can easily be embedded in the model due to its generic and modular design.

Page generated in 0.0319 seconds