154,993 research outputs found
Impact of traffic mix on caching performance in a content-centric network
For a realistic traffic mix, we evaluate the hit rates attained in a
two-layer cache hierarchy designed to reduce Internet bandwidth requirements.
The model identifies four main types of content, web, file sharing, user
generated content and video on demand, distinguished in terms of their traffic
shares, their population and object sizes and their popularity distributions.
Results demonstrate that caching VoD in access routers offers a highly
favorable bandwidth memory tradeoff but that the other types of content would
likely be more efficiently handled in very large capacity storage devices in
the core. Evaluations are based on a simple approximation for LRU cache
performance that proves highly accurate in relevant configurations
Leveraging OpenStack and Ceph for a Controlled-Access Data Cloud
While traditional HPC has and continues to satisfy most workflows, a new
generation of researchers has emerged looking for sophisticated, scalable,
on-demand, and self-service control of compute infrastructure in a cloud-like
environment. Many also seek safe harbors to operate on or store sensitive
and/or controlled-access data in a high capacity environment.
To cater to these modern users, the Minnesota Supercomputing Institute
designed and deployed Stratus, a locally-hosted cloud environment powered by
the OpenStack platform, and backed by Ceph storage. The subscription-based
service complements existing HPC systems by satisfying the following unmet
needs of our users: a) on-demand availability of compute resources, b)
long-running jobs (i.e., days), c) container-based computing with
Docker, and d) adequate security controls to comply with controlled-access data
requirements.
This document provides an in-depth look at the design of Stratus with respect
to security and compliance with the NIH's controlled-access data policy.
Emphasis is placed on lessons learned while integrating OpenStack and Ceph
features into a so-called "walled garden", and how those technologies
influenced the security design. Many features of Stratus, including tiered
secure storage with the introduction of a controlled-access data "cache",
fault-tolerant live-migrations, and fully integrated two-factor authentication,
depend on recent OpenStack and Ceph features.Comment: 7 pages, 5 figures, PEARC '18: Practice and Experience in Advanced
Research Computing, July 22--26, 2018, Pittsburgh, PA, US
A mobile controlled algorithm for improving the throughput in a s-aloha ds-cdma system
This paper presents a novel adaptive DS-CDMA slotted-ALOHA packet random access scheme with transmitter-based spreading codes for mobiles. It is aimed at improving the throughput and message delay delivery when traffic load values below the saturation point of the conventional DS-CDMA slotted-ALOHA system are sensed in the channel. For this purpose a mobile assisted algorithm is envisaged to control the change of the transmission rate according to the traffic load. This algorithm revealed that the optimum behavior, obtained using a Markov chain model, may be almost reached at a low complexity cost. Moreover, priorities between mobiles could be easily established. Finally, a traffic model based on a realistic statistical length distribution of the messages illustrates how the delay delivery can be greatly reduced.Peer ReviewedPostprint (published version
Wireless Communication using Unmanned Aerial Vehicles (UAVs): Optimal Transport Theory for Hover Time Optimization
In this paper, the effective use of flight-time constrained unmanned aerial
vehicles (UAVs) as flying base stations that can provide wireless service to
ground users is investigated. In particular, a novel framework for optimizing
the performance of such UAV-based wireless systems in terms of the average
number of bits (data service) transmitted to users as well as UAVs' hover
duration (i.e. flight time) is proposed. In the considered model, UAVs hover
over a given geographical area to serve ground users that are distributed
within the area based on an arbitrary spatial distribution function. In this
case, two practical scenarios are considered. In the first scenario, based on
the maximum possible hover times of UAVs, the average data service delivered to
the users under a fair resource allocation scheme is maximized by finding the
optimal cell partitions associated to the UAVs. Using the mathematical
framework of optimal transport theory, a gradient-based algorithm is proposed
for optimally partitioning the geographical area based on the users'
distribution, hover times, and locations of the UAVs. In the second scenario,
given the load requirements of ground users, the minimum average hover time
that the UAVs need for completely servicing their ground users is derived. To
this end, first, an optimal bandwidth allocation scheme for serving the users
is proposed. Then, given this optimal bandwidth allocation, the optimal cell
partitions associated with the UAVs are derived by exploiting the optimal
transport theory. Results show that our proposed cell partitioning approach
leads to a significantly higher fairness among the users compared to the
classical weighted Voronoi diagram. In addition, our results reveal an inherent
tradeoff between the hover time of UAVs and bandwidth efficiency while serving
the ground users
- …