1,265 research outputs found

    Network Flow Optimization Using Reinforcement Learning

    Get PDF

    Internet of Things and Sensors Networks in 5G Wireless Communications

    Get PDF
    The Internet of Things (IoT) has attracted much attention from society, industry and academia as a promising technology that can enhance day to day activities, and the creation of new business models, products and services, and serve as a broad source of research topics and ideas. A future digital society is envisioned, composed of numerous wireless connected sensors and devices. Driven by huge demand, the massive IoT (mIoT) or massive machine type communication (mMTC) has been identified as one of the three main communication scenarios for 5G. In addition to connectivity, computing and storage and data management are also long-standing issues for low-cost devices and sensors. The book is a collection of outstanding technical research and industrial papers covering new research results, with a wide range of features within the 5G-and-beyond framework. It provides a range of discussions of the major research challenges and achievements within this topic

    Internet of Things and Sensors Networks in 5G Wireless Communications

    Get PDF
    This book is a printed edition of the Special Issue Internet of Things and Sensors Networks in 5G Wireless Communications that was published in Sensors

    Internet of Things and Sensors Networks in 5G Wireless Communications

    Get PDF
    This book is a printed edition of the Special Issue Internet of Things and Sensors Networks in 5G Wireless Communications that was published in Sensors

    Medium access control mechanisms for high speed metropolitan area networks

    Get PDF
    In this dissertation novel Medium Access Control mechanisms for High Speed Metropolitan Area networks are proposed and their performance is investigated under the presence of single and multiple priority classes of traffic. The proposed mechanisms are based on the Distributed Queue Dual Bus network, which has been adopted by the IEEE standardization committee as the 802.6 standard for Metropolitan Area Networks, and address most of its performance limitations. First, the Rotating Slot Generator scheme is introduced which uses the looped bus architecture that has been proposed for the 802.6 network. According to this scheme the responsibility for generating slots moves periodically from station to station around the loop. In this way, the positions of the stations relative to the slot generator change continuously, and therefore, there are no favorable locations on the busses. Then, two variations of a new bandwidth balancing mechanism, the NSW_BWB and ITU_NSW are introduced. Their main advantage is that their operation does not require the wastage of channel slots and for this reason they can converge very fast to the steady state, where the fair bandwidth allocation is achieved. Their performance and their ability to support multiple priority classes of traffic are thoroughly investigated. Analytic estimates for the stations\u27 throughputs and average segment delays are provided. Moreover, a novel, very effective priority mechanism is introduced which can guarantee almost immediate access for high priority traffic, regardless of the presence of lower priority traffic. Its performance is thoroughly investigated and its ability to support real time traffic, such as voice and video, is demonstrated. Finally, the performance under the presence of erasure nodes of the various mechanisms that have been proposed in this dissertation is examined and compared to the corresponding performance of the most prominent existing mechanisms

    Per-host DDoS mitigation by direct-control reinforcement learning

    Get PDF
    DDoS attacks plague the availability of online services today, yet like many cybersecurity problems are evolving and non-stationary. Normal and attack patterns shift as new protocols and applications are introduced, further compounded by burstiness and seasonal variation. Accordingly, it is difficult to apply machine learning-based techniques and defences in practice. Reinforcement learning (RL) may overcome this detection problem for DDoS attacks by managing and monitoring consequences; an agent’s role is to learn to optimise performance criteria (which are always available) in an online manner. We advance the state-of-the-art in RL-based DDoS mitigation by introducing two agent classes designed to act on a per-flow basis, in a protocol-agnostic manner for any network topology. This is supported by an in-depth investigation of feature suitability and empirical evaluation. Our results show the existence of flow features with high predictive power for different traffic classes, when used as a basis for feedback-loop-like control. We show that the new RL agent models can offer a significant increase in goodput of legitimate TCP traffic for many choices of host density

    An investigation into buffer management mechanisms for the Diffserv assured forwarding traffic class

    Get PDF
    Includes bibliographical references.One of the service classes offered by Diffserv is the Assured Forwarding (AF) class. Because of scalability concerns, IETF specifications recommend that microflow and aggregate-unaware active buffer management mechanisms such as RIO (Random early detecLion with ln/Out-ofprofile) be used in the core of Diffserv networks implementing AF. Such mechanisms have, however, been shown to provide poor performance with regard to fairness, stability and network controL Furthermore, recent advances in router technology now allow routers to implement more advanced scheduling and buffer management mechanisms on high-speed ports. This thesis evaluates the performance improvements that may be realized when implementing the Diffserv AF core using a hierarchical microflow and aggregate aware buffer management mechanism instead of RIO. The author motivates, proposes and specifies such a mechanism. The mechanism. referred to as H-MAQ or Hierarchical multi drop-precedence queue state Microflow-Aware Quelling, is evaluated on a testbed that compares the performance of a RIO network core with an H-MAQ network core

    An adaptive approach on the carrier sensing range of CSMA/CA multi-hop wireless networks.

    Get PDF
    Ruan, Sichao.Thesis (M.Phil.)--Chinese University of Hong Kong, 2008.Includes bibliographical references (leaves 62-65).Abstracts in English and Chinese.Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Multihop Ad Hoc Wireless Networks --- p.1Chapter 1.1.1 --- Introduction to Multihop Ad Hoc Networks --- p.2Chapter 1.1.2 --- Scalability of Ad Hoc Wireless Networks --- p.3Chapter 1.2 --- Hidden Terminal Problem --- p.3Chapter 1.3 --- Exposed Terminal Problem --- p.5Chapter 1.4 --- Overview of the Thesis --- p.6Chapter 2 --- Background --- p.8Chapter 2.1 --- MAC Protocols for Wireless Networks --- p.8Chapter 2.1.1 --- Aloha --- p.8Chapter 2.1.2 --- CSMA/CA --- p.9Chapter 2.1.3 --- IEEE 802.11 DCF Standard --- p.10Chapter 2.2 --- Related Work --- p.12Chapter 2.2.1 --- Schemes for Hidden Node Problem --- p.12Chapter 2.2.2 --- Schemes for Exposed Node Problem --- p.13Chapter 2.3 --- Tradeoff between Hidden and Exposed Nodes --- p.14Chapter 2.4 --- The Effect of Carrier Sensing Range --- p.17Chapter 3 --- Analysis on Carrier Sensing Range --- p.18Chapter 3.1 --- Analysis Model --- p.18Chapter 3.1.1 --- Terminal Configurations --- p.18Chapter 3.1.2 --- Timing/Packet Parameters --- p.19Chapter 3.1.3 --- Protocol Approximation --- p.20Chapter 3.1.4 --- Throughput Measurement --- p.21Chapter 3.2 --- Derivation of Throughput --- p.21Chapter 3.2.1 --- Channel Modeling --- p.22Chapter 3.2.2 --- Actual Transmission Rate --- p.24Chapter 3.2.3 --- Case One --- p.24Chapter 3.2.4 --- Case Two --- p.26Chapter 3.2.5 --- Mathematical Form of Throughput --- p.28Chapter 3.2.6 --- Analysis Results --- p.30Chapter 3.3 --- Implications --- p.31Chapter 3.3.1 --- Value of Sensing Range in CSMA/CA --- p.31Chapter 3.3.2 --- Need for New MAC Protocols --- p.32Chapter 4 --- MAC Protocols by Congestion Control --- p.34Chapter 4.1 --- Motivations and Principles --- p.34Chapter 4.1.1 --- Balancing Hidden and Exposed Nodes --- p.35Chapter 4.1.2 --- Controlling Carrier Sensing Range --- p.36Chapter 4.1.3 --- Non-homogenous Sensing Range --- p.36Chapter 4.2 --- Algorithm Descriptions --- p.38Chapter 4.2.1 --- Core Concept --- p.38Chapter 4.2.2 --- LDMI Control Scheme --- p.40Chapter 4.2.3 --- Tahoe Control Scheme --- p.41Chapter 5 --- Simulation Analysis --- p.44Chapter 5.1 --- Simulation Configurations --- p.44Chapter 5.1.1 --- Geometric Burst Traffic Model --- p.45Chapter 5.1.2 --- Network Topology --- p.46Chapter 5.1.3 --- Simulation Parameters --- p.47Chapter 5.2 --- Throughput Comparisons --- p.48Chapter 5.3 --- Fairness Comparisons --- p.50Chapter 5.3.1 --- Situation of Unfairness --- p.50Chapter 5.3.2 --- Fairness Measurement --- p.52Chapter 5.4 --- Convergence Comparisons --- p.54Chapter 5.5 --- Summary of Performance Comparison --- p.55Chapter 6 --- Conclusions --- p.56Chapter A --- Categories of CSMA/CA --- p.58Chapter A.1 --- 1-persistent CSMA/CA --- p.58Chapter A.2 --- non-persistent CSMA/CA --- p.58Chapter A.3 --- p-persistent CSMA/CA --- p.59Chapter B --- Backoff Schemes --- p.60Chapter B.1 --- Constant Window Backoff Scheme --- p.60Chapter B.2 --- Geometric Backoff Scheme --- p.60Chapter B.3 --- Binary Exponential Backoff Scheme --- p.61Bibliography --- p.6
    • …
    corecore