• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 166
  • 25
  • 21
  • 11
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 234
  • 234
  • 195
  • 193
  • 114
  • 80
  • 64
  • 57
  • 42
  • 39
  • 36
  • 33
  • 30
  • 28
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Performance Analysis of A Banyan Based ATM Switching Fabric with Packet Priority

Yan, Zhaohui 09 October 1995 (has links)
Since the emergence of the Asynchronous Transfer Mode ( A TM ) concept, various switching architectures have been proposed. The multistage interconnection networks have been proposed for the switching architecture under the A TM environment. In this thesis, we propose a new model for the performance analysis of an A TM switching fabric based on single-buffered Banyan network. In this model, we use a three-state, i.e., "empty", "new" and "blocked" Markov chain model to describe the behavior of the buffer within a switching element. In addition to traditional statistical analysis including throughput and delay, we also examine the delay variation. Performance results show that the proposed model is more accurate in describing the switch behavior under uniform traffic environment in comparison with the "two-state" Markov chain model developed by Jenq, et. al.[4] [6] . Based on the "three-state" model, we study a packet priority scheme which gives the blocked packet higher priority to be routed forward during contention. It is found that the standard deviation of the network delay is reduced by about 30%.
192

Optimal erasure protection assignment for scalably compressed data over packet-based networks

Thie, Johnson, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2004 (has links)
This research is concerned with the reliable delivery of scalable compressed data over lossy communication channels. Recent works proposed several strategies for assigning optimal code redundancies to elements of scalable data, which form a linear structure of dependency, under the assumption that all source elements are encoded onto a common group of network packets. Given large data and small network packets, such schemes require very long channel codes with high computational complexity. In networks with high loss, small packets are more desirable than long packets. The first contribution of this thesis is to propose a strategy for optimally assigning elements of the scalable data to clusters of packets, subject to constraints on packet size and code complexity. Given a packet cluster arrangement, the scheme then assigns optimal code redundancies to the source elements, subject to a constraint on transmission length. Experimental results show that the proposed strategy can outperform the previous code assignment schemes subject to the above-mentioned constraints, particularly at high channel loss rates. Secondly, we modify these schemes to accommodate complex structures of dependency. Source elements are allocated to clusters of packets according to their dependency structure, subject to constraints on packet size and channel codeword length. Given a packet cluster arrangement, the proposed schemes assign optimal code redundancies to the source elements, subject to a constraint on transmission length. Experimental results demonstrate the superiority of the proposed strategies for correctly modelling the dependency structure. The last contribution of this thesis is to propose a scheme for optimizing protection of scalable data where limited retransmission is possible. Previous work assumed that retransmission is not possible. For most real-time or interactive applications, however, retransmission of lost data may be possible up to some limit. In the present work we restrict our attention to streaming sources (e.g., video) where each source element can be transmitted in one or both of two time slots. An optimization algorithm determines the transmission and level of protection for each source element, using information about the success of earlier transmissions. Experimental results confirm the benefit of limited retransmission.
193

Real-Time Services in Packet-Switched Networks for Embedded Applications

Fan, Xing January 2007 (has links)
Embedded applications have become more and more complex, increasing the demands on the communication network. For reasons such as safety and usability, there are real-time constraints that must be met. Also, to offer high performance, network protocols should offer efficient user services aimed at specific types of communication. At the same time, it is desirable to design and implement embedded networks with reduced cost and development time, which means using available hardware for standard networks. To that end, there is a trend towards using switched Ethernet for embedded systems because of its hight bit rate and low cost. Unfortunately, since switched Ethernet is not specifically designed for embedded systems, it has several limitations such as poor support for QoS because of FCFS queuing policy and high protocol overhead. This thesis contributes towards fulfilling these requirements by developing (i) real-time analytical frameworks for providing QoS guarantees in packet-switched networks and (II) packet-merging techniques to reduce the protocol overhead. We have developed two real-time analytical frameworks for networks with FCFS queuing in the switches, one for FCFS queuing in the source nodes and one for EDF queuing in the source nodes. The correctness and tightness of the real-time analytical frameworks for different network components in a singel-switch neetwork are given by strict theoretical proofs, and the performance of our end-to-end analyses is evaluated by simulations. In conjunction with this, we have compared our results to Network Calculus (NC), a commonly used analytical scheme for FCFS queuing. Our comparison study shows that our anlysis is more accurate than NC for singel-switch networks. To reduce the protocol overhead, we have proposed two active switched Ethernet approaches, one for real-time many-to-many communication and the other for the real-time short message traffic that is often present in embedded applications. A significant improvement in performance achieved by using our proposed active networks is demonstrated. Although our approaches are exemplified using switched Ethernet, the general approaches are not limited to switched Ethernet networks but can easily be moified to other similar packet-switched networks.
194

Design, analysis and simultion for optical access and wide-area networks.

Chen, Jiajia January 2009 (has links)
Due to the tremendous growth of traffic volume caused by both exponential increase of number of Internet users and continual emergence of new bandwidth demanding applications, high capacity networks are required in order to satisfactorily handle the extremely large amount of traffic. Hence, optical fiber communication is the key technology for the network infrastructure. This thesis addresses design, analysis and simulation of access and core networks targeting important research problems, which need to be tackled for the effective realization of next generation optical networks. Among different fiber access architectures, passive optical network (PON) is considered as the most promising alternative for the last mile connection due to its relatively low cost and resource efficiency. The inherent bursty nature of the user generated traffic results in dynamically changing bandwidth demand on per subscriber basis. In addition, access networks are required to support differentiated quality of service and accommodate multiple service providers. To address these problems we proposed three novel scheduling algorithms to efficiently realize dynamic bandwidth allocation in PON, along with guaranteeing both the priority and fairness of the differentiated services among multiple users and/or service providers. Meanwhile, because of the increasing significance of reliable access to network services, an efficient fault management mechanism needs to be provided in PON. In addition, access networks are very cost sensitive and the cost of protection should be kept as low as possible. Therefore, we proposed three novel cost-effective protection architectures keeping in mind that reliability requirement in access networks should be satisfied at the minimal cost. Regarding the optical core networks, replacing electronic routers with all-optical switching nodes can offer significant advantages in realizing high capacity networks. Because of the technological limitations for realizing all-optical nodes, the focus is put on the ingenious architecture design. Therefore, we contributed on novel switching node architectures for optical circuit and packet switching networks. Furthermore, we addressed different aspects of routing and wavelength assignment (RWA) problem, which is an important and hard task to be solved in wavelength routed networks. First, we proposed an approach based on the information summary protocol to reduce the large amount of control overhead needed for dissemination of the link state information in the case of adaptive routing. In addition, transparency in optical networks may cause vulnerability to physical layer attacks. To target this critical security related issue, we proposed an RWA solution to minimize the possible reachability of a jamming attack. Finally, in order to evaluate our ideas we developed two tailor-made simulators based on discrete event driven system for the detailed studies of PON and switched optical networks. Moreover, the proposed tabu search heuristic for our RWA solution was implemented in C++. / QC 20100707
195

Compiler Optimizations for Multithreaded Multicore Network Processors

Zhuang, Xiaotong 07 July 2006 (has links)
Network processors are new types of multithreaded multicore processors geared towards achieving both fast processing speed and flexibility of programming. The architecture of network processors considers many special properties for packet processing, including multiple threads, multiple processor cores on the same chip, special functional units, simplified ISA and simplified pipeline, etc. The architectural peculiarities of network processors raise new challenges for compiler design and optimization. Due to very high clocking speeds, the CPU memory gap on such processors is huge, making registers extremely precious. Moreover, the register file is split into two banks, and for any ALU instruction, the two source operands must come from different banks. We present and compare three different approaches to do register allocation and bank assignment. We also address the problem of sharing registers across threads in order to maximize the utilization of hardware resources. The context switches on the IXP network processor only happen when long latency operations are encountered. As a result, context switches are highly frequent. Therefore, the designer of the IXP network processor decided to make context switches extremely lightweight, i.e. only the program counter(PC) is stored together with the context. Since registers are not saved and restored during context switches, it becomes difficult to share registers across threads. For a conventional processor, each thread can assume that it can use the entire register file, because registers are always part of the context. However, with lightweight context switch, each thread must take a separate piece of the register file, making register usage inefficient. Programs executing on network processors typically have runtime constraints. Scheduling of multiple programs sharing a CPU must be orchestrated by the OS and the hardware using certain sharing policies. Real time applications demand a real time aware OS kernel to meet their specified deadlines. However, due to stringent performance requirements on network processors, neither OS nor hardware mechanisms is typically feasible. In this work, we demonstrate that a compiler approach could achieve some of the OS scheduling and real time scheduling functionalities without introducing a hefty overhead.
196

A distributed routing algorithm for ER-LSP setup in MLPS networks [electronic resource] / by Naga Siddhardha Garige.

Garige, Naga Siddhardha. January 2003 (has links)
Title from PDF of title page. / Document formatted into pages; contains 62 pages. / Thesis (M.S.E.E.)--University of South Florida, 2003. / Includes bibliographical references. / Text (Electronic thesis) in PDF format. / ABSTRACT: The rapid growth of the Internet, in the last few years, has generated a need to enhance the existing IP networks in the areas of availability, dependability and scalability in order to provide a mission critical networking environment. In contemporary IP networks, data packets are routed as a function of the destination address and a single metric such as hop-count or delay. This approach tends to cause message traffic to converge onto the same link, which significantly increases congestion and leads to unbalanced network resource utilization. One solution to this problem is provided by Traffic Engineering (TE), which uses, bandwidth guaranteed, Explicitly Routed Label Switched Paths (ER-LSPs). Due to the dramatic increase in the backbone speeds, current research focuses more on traffic engineering with LSPs for clear control over the traffic distribution in the network. / ABSTRACT: However, the growing popularity of the Internet is driving the Internet Service Providers to adapt new technologies in order to support multiple classes of applications with different characteristics and performance requirements. Multi-Protocol Label Switching (MPLS), which was proposed by the IETF provides essential facilities for traffic engineering and reliable QoS services for the Internet. MPLS networks provide the required flexibility for operators to manage their traffic with ER-LSPs. Even though conventional routing algorithms support the ER-LSP setup in MPLS networks, they are not efficient in link residual capacity information updates and limit resource utilization, which eventually leads to LSP failures and unbalanced network resource utilization. This thesis proposes a new architecture with a cluster based distributed routing algorithm to setup bandwidth guaranteed ER-LSPs in MPLS backbone networks. / ABSTRACT: The proposed routing algorithm confines the route discovery region in order to reduce the routing overhead and computes all possible routes from ingress node to egress node. Based on LSP requirements and network load conditions, the egress node selects the most suitable path from the available paths in order to setup the LSP. This routing scheme optimizes network resource utilization by evenly distributing traffic throughout the network. The Resource Reservation Protocol (RSVP) works in conjunction with the routing protocol for resource reservation and label distribution along the LSP. / System requirements: World Wide Web browser and PDF reader. / Mode of access: World Wide Web.
197

Performance analysis of signalling system No. 7 networks during signalling transfer point congestion.

Chana, Amish Harkisan. January 2002 (has links)
The growth of mobile networks and the imminent deployment of third generation networks and services will require signalling networks to maintain their integrity during increased unanticipated traffic volumes. As signalling networks become larger and more complex, an analysis ofprotocol operation is necessary to determine the effectiveness of the current protocol implementation and to evaluate the applicability of the proposed enhancements. The objective of this study ,is to develop analytical models to analyse the impact of Signalling Transfer Point congestion on network performance when simple message discard schemes are used as the primary flow control mechanism, and to investigate suitable congestion and flow control mechanisms to help alleviate the congestion. Unlike previous studies, that are localised and only concentrate on the nodes around the congested entity, the models presented here examine the impact of network wide and focused overloads on the entire network. The study considers both the fixed-line and mobile network environments, and analyses the performance of the ISDN User Part and Mobile Application Part protocols. The call completion rate and location update success rate are used to measure performance, instead of message throughput, since these parameters provide a more appropriate measure of the grade-of-service and more accurately reflect the level of service provided to a customer. The steady state equilibrium models, derived here, can be used to quickly estimate the safe operating regions of a signalling network, while the transient models provide a more intuitive perspective of the traffic processes that lead to congestion . Furthermore, these models can be used to examine the network performance for different message priority schemes, routing algorithms, overload scenarios and network configurations. The performance of various congestion control mechanisms that incorporate non-linear throttling schemes is also evaluated, together with an examination of the impact of congestion on multiple user parts in a mobile network environment. Message priority schemes are found to offer little or no advantage in a fixed network environment, but in a mobile network they can be used to maintain the network's performance at an optimum level during periods of overload. Network performance is also improved if congestion controls block load-generating traffic at the initial onset of congestion and then gradually restore traffic as the performance improves . / Thesis (Ph.D.)-University of Natal, Durban, 2002.
198

Capture effects in spread-aloha packet protocols.

Mpako, Vuyolwethu Maxabiso Wessels. January 2005 (has links)
Research in the field of random access protocols for narrow-band systems started as early as the 1970s with the introduction of the ALOHA protocol. From the research done in slotted narrow-band systems, it is well known that contention results in all the packets involved in the contention being unsuccessful. However, it has been shown that in the presence of unequal power levels, ore of the contending packets may be successful. Ibis is a phenomenon called capture. Packet capture has been shown to improve the performance of slotted narrow-band systems. Recently, much work has been done in the analysis of spread-spectrum ALOHA type code-division multiple access (CDMA) protocols. The issue of designing power control techniques to improve the performance of CDMA systems by reducing multiple access interference (MAl) has been a subject of much research. It has been shown that in the presence of power control schemes, the performance of spread-ALOHA CDMA systems is improved. However, it is also widely documented that the design of power control schemes capable of the ideal of compensation of radio propagation techniques is not possible for various reasons, and hence the imperfections in power control. None of the research known to the author has looked at capture in spread-ALOHA systems, and to a greater extent, looked at expressions for the performance of spreadALOHA systems in the presence of capture. In this thesis we introduce spread-ALOHA systems with capture as a manifestation of the imperfections in power control. We propose novel expressions for the computation of the perfonnance ofspread-ALOHA systems with capture. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, 2005.
199

A token based MAC protocol for wireless ad hoc networks.

Liu, Yi-Sheng. January 2003 (has links)
The emergence of portable terminals in work and living environments is accelerating the progression of wireless networks. A wireless ad hoc network is a new network concept where users establish peer-to-peer communication among themselves independently, in their small area. Since the wireless medium is a shared resource, it becomes an important design issue to efficiently allocate bandwidth among users. MAC (Medium Access Control) layer arbitrates the channel access to the wireless medium and is also responsible for bandwidth allocation to different users, therefore a large amount of research has been conducted on various MAC protocols for ad hoc wireless networks. This dissertation begins with a survey of existing wireless MAC protocols. The survey includes protocols designed for different network generations and topologies, classifying them based on architecture and mode of operation. Next, we concentrate on the MAC protocols proposed for distributed wireless networks. We propose a new MAC protocol based on a token-passing strategy; which not only incorporates the advantages of the guaranteed access scheme into the distributed type of wireless networks, but also the data rate and delay level QoS guarantees. Data rate QoS provides fairness into sharing of the channel, while delay level QoS introduces a flexible prioritized access to channels by adjusting transmission permission to the current network traffic activities. A simulation model for the protocol is developed and delay and throughput performance results are presented. To examine the efficiency and performance of the proposed MAC scheme in an ad hoc wireless environment, it is incorporated into the Bluetooth structured network. The model is then simulated in the Bluetooth environment and performance results are presented. Furthermore, an analytical model is proposed and an approximate delay analysis conducted for the proposed MAC scheme. Analytical results are derived and compared with results obtained from computer simulations. The dissertation concludes with suggestions for improvements and future work. / Thesis (M.Sc.-Engineering)-University of Natal, 2003.
200

On accessing multiple mirror servers in parallel

Abdel-Hamid, Yousry Salaheldin 14 August 2008 (has links)
In this thesis, an extensive simulation study is done to gauge the performance of parallel access to multiple mirror sites on the Internet. The study is based on the Digital Fountain approach designed by J. Byers et al. in which Tornado codes are used to minimize decoding time at the expense of injecting extra packets into the system. In this study, both Reed-Solomon and Tornado codes are considered. The results indicate that randomly permuting the packets at every mirror site is not the optimal solution. A new technique, which staggers the packets, is shown to be superior. This study employs OPNET Modeler, which is a powerful event driven simulation tool. Simulations results show that using Reed-Solomon codes with staggered packet transmission provides dramatically improved system performance.

Page generated in 0.1355 seconds