14 research outputs found

    Application of Punctured Turbo Codes with Unequal Error Protection to Wireless ATM Networks

    Get PDF
    In the wireless asynchronous transfer mode (ATM) networks, a custom data link control (DLC) layer protocol with stronger error correction ability is needed for mitigating the affect of radio channel errors. This paper applies punctured turbo code schemes to the protection of the header and various payloads in wireless ATM cell, which are realized by the combination of programmable interleaving and puncturing. Their performance is analyzed for Rayleigh fading channel, which shows more significant reduction in cell loss rate (CLR) than the previous systems. Our proposal also provides good balance designs for CLR and the payload bit error rate (BER), and offers potential for future evolutionary improvement of the wireless ATM codingscheme

    Atomic Predicates-Based Data Plane Properties Verification in Software Defined Networking using Spark

    No full text
    Software-Defined Networking (SDN) is an innovational network architecture which gives network administrators the ability to directly control the whole network by programming on a centralized controller. Due to network complexity, networks are unlikely to be bug-free. The ability to verify data plane properties will make network management easier for network administrators in SDN. In this paper, we present a novel atomic predicates based data plane properties verification method for SDN using Spark which is a big data processing framework. First, we verify packet reachability which is a fundamental data plane property. Then, we verify other data plane properties such as loop-freedom and nonexistence of black holes. In addition, the proposed method can detect a security threat existing in SDN called firewall bypass threat with packet reachability verification. By adopting atomic predicates, we achieve less computational and storage overhead. We implement the methods and study the performance. The results of experiments show that we can efficiently and accurately detect loops, black holes and firewall bypass threats