3,144 research outputs found

    Quantitative analysis of access strategies to remote information in network services

    Get PDF

    Software-Driven and Virtualized Architectures for Scalable 5G Networks

    Full text link
    In this dissertation, we argue that it is essential to rearchitect 4G cellular core networks–sitting between the Internet and the radio access network–to meet the scalability, performance, and flexibility requirements of 5G networks. Today, there is a growing consensus among operators and research community that software-defined networking (SDN), network function virtualization (NFV), and mobile edge computing (MEC) paradigms will be the key ingredients of the next-generation cellular networks. Motivated by these trends, we design and optimize three core network architectures, SoftMoW, SoftBox, and SkyCore, for different network scales, objectives, and conditions. SoftMoW provides global control over nationwide core networks with the ultimate goal of enabling new routing and mobility optimizations. SoftBox attempts to enhance policy enforcement in statewide core networks to enable low-latency, signaling-efficient, and customized services for mobile devices. Sky- Core is aimed at realizing a compact core network for citywide UAV-based radio networks that are going to serve first responders in the future. Network slicing techniques make it possible to deploy these solutions on the same infrastructure in parallel. To better support mobility and provide verifiable security, these architectures can use an addressing scheme that separates network locations and identities with self-certifying, flat and non-aggregatable address components. To benefit the proposed architectures, we designed a high-speed and memory-efficient router, called Caesar, for this type of addressing schemePHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/146130/1/moradi_1.pd

    An Energy Efficient and Cost Reduction based Hybridization Scheme for Mobile Ad-hoc Networks (MANET) over the Internet of Things (IoT)

    Get PDF
    Wireless networks are viewed as the best-used network and specifically Portable Specially Appointed Organizations (MANETs) have tracked down numerous applications for its information transmission progressively. The plan issues in this organization are to confine the utilization of energy while communicating data and give security to the hubs. Soa protocol needs to be energy efficient to avoid network failures. Thereby this paper brings an effective energy efficient to optimize LEAR and make it energy efficient. The energy-mindfulness element is added to the LEAR guiding convention in this work using the Binary Particle Swarm Optimization method (BPSO). The recommended method selects programmes taking into account course length in addition to the programme level of energy when predicting the future. To get good results, the steered challenge is first designed using LEAR. The next step is to choose a route that enhances the weighting capability of the study hours and programming power used.This MANET has been secured using the cryptographic method known as AES.According to experimental findings, the proposed hybrid version outperformed other cutting-edge models

    First experimental assessment of ABNO-driven in-operation flexgrid network re-optimization

    Get PDF
    Traffic affected by link failures can be recovered using path restoration schemes. In dynamically operated networks provided with a control plane, restoration algorithms run in a centralized element, such as the path computation element (PCE). To increase traffic restorability in flexgrid networks, multiple paths, subconnections, can be used to restore every single affected connection. However, the multipath restoration scheme might result in a poor resource utilization entailing a lesser grade of service. In-operation network planning algorithms can be used to mitigate this problem once the failed link is repaired; we propose solving the so-called multipath after failure repair optimization problem (MP-AFRO) to reduce subconnections count by aggregating those belonging to the same original connection and rerouting the resulting connection to release spectral resources. The MP-AFRO problem is modeled using a mixed integer linear program formulation. In view of the complexity of the model and the limited time to solve the problem, we propose a heuristic algorithm that provides a good tradeoff between complexity and optimality. The performance on the MP-AFRO heuristic is firstly validated by simulation. Next, the heuristic algorithm is deployed inside an in-operation planning tool in the form of back-end PCE (bPCE) inside the application-based network operations architecture controlling a network; the bPCE is connected to the centralized active stateful PCE. MP-AFRO is experimentally demonstrated using a distributed field trial test-bed connecting the premises of Telefonica (Madrid), CNIT (Pisa), and UPC (Barcelona).Peer ReviewedPostprint (author’s final draft

    A Comparison Study on the Performance of Different Applications using MANET Routing Protocols under Various Circumstances

    Get PDF
    Mobile adhoc network is a collection of mobile devices that communicate amongst each other using message passing to collaborate in a wireless medium, without any centralized management; each device acts as a router, sends and receive packets. Nodes can move freely and can set itself in any adhoc network. Adhoc networks are widely use in the absence of the wired network infrastructure. Quality of service of routing in ad hoc networks is an important and complicated issue with a changing topology. In this work we carried out a comparison study in a simulation scenarios on the performance of different routing protocols i.e., proactive and reactive, with different standard applications such as FTP, HTTP and database under various circumstances by means of network size, load, and speed of nodes. As a conclusion of this study, results show when measuring performance of delay and throughput of FTP, HTTP and Database traffic, delay and throughput metrics, using AODV, DSR, OLSR routing protocols, under 10, 50 and 100 nodes with spee of 10, 30 m/s. When using DSR routing protocol it showed the worst results under various network size and speed between other protocols, while when using AODV routing protocol it performed in a better way in which it showed a good performance in small and medium network size. OLSR routing protocol performed the best to be used in all network size especially in large network size.مانيت هي عبار ة عن مجموعة من االجهز ة تحتوي عمى أجهز ة السمكية، تتعاون مع بعضها البعض الرسال، استقبال و نقل المعمومات من خالل وسط السمكي، هوائي، من دون اي تحكم مركزي، كل جهاز يمكن اعتبار ة كجهاز راوتر يعتمد عمى نفسة بحيث يستقبل و يرسل المعمومات و هذة المجموعة تسمى بالمانيت. أي جهاز بهذة المجموعة يمكنة التحرك بحرية و يمكنة االنضمام الي مجموعة مانيت بالوقت الذي يريدة و بالمكان الذي يريدة. تستخدم المانيت باألمكان الذي اليوجد فيها بنية تحتية ثابتة، باألمكان التي يحصل فيها كوارث طبيعية و األمكان الذي يصعب فيها وجود اتصال بالوقت الذي يكون هو ضروري لوجود شبكة بين الجهز ة. تستخدم هذة األجهزة بروتوكالت لنقل المعمومات مثل DSR AODV و غيرها من البروتوكالت، حيث ان المانيت شبكة سريعة التغيير فان جودة هذة البروتوكالت هو أمر مهم. في هذة الرسالة قمنا بدراسة التطبيقات،database HTTP FTP ، لشبكة المانيت باستخدام البروتوكالت AODV ، DSR ، OLSR كال عمى حدى، تحت متغيرات و ظروف معينة لمعرفة اي بروتوكل هو االنسب الستخدامة مع اي تطبيق تحت هذة الظروف. و كنتيجة لهذة الدراسة، عند قياس أداء FTP ،Database، HTTP مقاييس اإلنتاجية، وذلك باستخدام AODV ،DSR ،OLSR بروتوكوالت التوجية ، تحت 01،01 و 011 عقدة وتصل سرعتها من 01 ، 01 م / ث.تبين انة عند استخدام بروتوكول توجية DSR أظهرت أسوأ نتائج في جميع اإلطار ت من حيت حجم الشبكة والسرعة بين البروتوكوالت األخرى، بينما عند استخدام بروتوكول التوجية AODV تنفذ ذلك بطريقة أفضل بحيت أظهرت أداء جيدا في حجم الشبكة الصغير والمتوسطة. اما بنسبة لبروتوكول التوجية OLSR اظهر أداء أفضل الستخدامها في جميع احجام الشبكة وخصوصا في حجم شبكة الواسع

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Advancing Urban Flood Resilience With Smart Water Infrastructure

    Full text link
    Advances in wireless communications and low-power electronics are enabling a new generation of smart water systems that will employ real-time sensing and control to solve our most pressing water challenges. In a future characterized by these systems, networks of sensors will detect and communicate flood events at the neighborhood scale to improve disaster response. Meanwhile, wirelessly-controlled valves and pumps will coordinate reservoir releases to halt combined sewer overflows and restore water quality in urban streams. While these technologies promise to transform the field of water resources engineering, considerable knowledge gaps remain with regards to how smart water systems should be designed and operated. This dissertation presents foundational work towards building the smart water systems of the future, with a particular focus on applications to urban flooding. First, I introduce a first-of-its-kind embedded platform for real-time sensing and control of stormwater systems that will enable emergency managers to detect and respond to urban flood events in real-time. Next, I introduce new methods for hydrologic data assimilation that will enable real-time geolocation of floods and water quality hazards. Finally, I present theoretical contributions to the problem of controller placement in hydraulic networks that will help guide the design of future decentralized flood control systems. Taken together, these contributions pave the way for adaptive stormwater infrastructure that will mitigate the impacts of urban flooding through real-time response.PHDCivil EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/163144/1/mdbartos_1.pd
    corecore