137 research outputs found
Recent Advances in Wireless Communications and Networks
This book focuses on the current hottest issues from the lowest layers to the upper layers of wireless communication networks and provides "real-time" research progress on these issues. The authors have made every effort to systematically organize the information on these topics to make it easily accessible to readers of any level. This book also maintains the balance between current research results and their theoretical support. In this book, a variety of novel techniques in wireless communications and networks are investigated. The authors attempt to present these topics in detail. Insightful and reader-friendly descriptions are presented to nourish readers of any level, from practicing and knowledgeable communication engineers to beginning or professional researchers. All interested readers can easily find noteworthy materials in much greater detail than in previous publications and in the references cited in these chapters
Software-Driven and Virtualized Architectures for Scalable 5G Networks
In this dissertation, we argue that it is essential to rearchitect 4G cellular core networks–sitting between the Internet and the radio access network–to meet the scalability, performance, and flexibility requirements of 5G networks. Today, there is a growing consensus among operators and research community that software-defined networking (SDN), network function virtualization (NFV), and mobile edge computing (MEC) paradigms will be the key ingredients of the next-generation cellular networks. Motivated by these trends, we design and optimize three core network architectures, SoftMoW, SoftBox, and SkyCore, for different network scales, objectives, and conditions. SoftMoW provides global control over nationwide core networks with the ultimate goal of enabling new routing and mobility optimizations. SoftBox attempts to enhance policy enforcement in statewide core networks to enable low-latency, signaling-efficient, and customized services for mobile devices. Sky- Core is aimed at realizing a compact core network for citywide UAV-based radio networks that are going to serve first responders in the future. Network slicing techniques make it possible to deploy these solutions on the same infrastructure in parallel. To better support mobility and provide verifiable security, these architectures can use an addressing scheme that separates network locations and identities with self-certifying, flat and non-aggregatable address components. To benefit the proposed architectures, we designed a high-speed and memory-efficient router, called Caesar, for this type of addressing schemePHDComputer Science & EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttps://deepblue.lib.umich.edu/bitstream/2027.42/146130/1/moradi_1.pd
MOBILITY SUPPORT ARCHITECTURES FOR NEXT-GENERATION WIRELESS NETWORKS
With the convergence of the wireless networks and the Internet and the booming
demand for multimedia applications, the next-generation (beyond the third generation, or
B3G) wireless systems are expected to be all IP-based and provide real-time and non-real-time
mobile services anywhere and anytime. Powerful and efficient mobility support is
thus the key enabler to fulfil such an attractive vision by supporting various mobility
scenarios. This thesis contributes to this interesting while challenging topic.
After a literature review on mobility support architectures and protocols, the thesis
starts presenting our contributions with a generic multi-layer mobility support framework,
which provides a general approach to meet the challenges of handling comprehensive
mobility issues. The cross-layer design methodology is introduced to coordinate the
protocol layers for optimised system design. Particularly, a flexible and efficient cross-layer
signalling scheme is proposed for interlayer interactions. The proposed generic
framework is then narrowed down with several fundamental building blocks identified to
be focused on as follows.
As widely adopted, we assume that the IP-based access networks are organised into
administrative domains, which are inter-connected through a global IP-based wired core
network. For a mobile user who roams from one domain to another, macro (inter-domain)
mobility management should be in place for global location tracking and effective handoff
support for both real-time and non-real-lime applications. Mobile IP (MIP) and the Session
Initiation Protocol (SIP) are being adopted as the two dominant standard-based macro-mobility
architectures, each of which has mobility entities and messages in its own right.
The work explores the joint optimisations and interactions of MIP and SIP when utilising
the complementary power of both protocols. Two distinctive integrated MIP-SIP
architectures are designed and evaluated, compared with their hybrid alternatives and other
approaches. The overall analytical and simulation results shown significant performance
improvements in terms of cost-efficiency, among other metrics.
Subsequently, for the micro (intra-domain) mobility scenario where a mobile user
moves across IP subnets within a domain, a micro mobility management architecture is
needed to support fast handoffs and constrain signalling messaging loads incurred by intra-domain
movements within the domain. The Hierarchical MIPv6 (HMIPv6) and the Fast
Handovers for MIPv6 (FMIPv6) protocols are selected to fulfil the design requirements.
The work proposes enhancements to these protocols and combines them in an optimised
way. resulting in notably improved performances in contrast to a number of alternative
approaches
HUC-HISF: A Hybrid Intelligent Security Framework for Human-centric Ubiquitous Computing
制度:新 ; 報告番号:乙2336号 ; 学位の種類:博士(人間科学) ; 授与年月日:2012/1/18 ; 早大学位記番号:新584
A Fully Userspace Remote Storage Access Stack
As computer networking has evolved and the available throughput has increased, the efficiency of the network software stack has become increasingly important. This is because the latency introduced by software has gone from insignificant, compared to historically poor network performance, to the largest component of latency for a modern local-area network. Currently, the vast majority of code that accesses the hardware is part of the kernel, because the kernel is responsible for ensuring that user applications do not interfere with each other when accessing the hardware. Remote Direct Memory Access~(RDMA) provides a solution for applications to perform direct data transfers over the network without requiring context switches into the kernel, but relies instead on specialized hardware interfaces to handle the virtual address mappings and transport protocols. This more intelligent hardware allows for direct control from the userspace application, eliminating the cost of context switches into the kernel. This in turn reduces the overall latency of message transfers.
Just like networking, storage is currently undergoing a similar evolution. For most of the recent history of computing, the most common durable storage mechanism has been mechanical hard disk drives, which can only be accessed at block level and have high latency compared to the software drivers used to access the data. However, the introduction of solid state disks~(SSDs) based on Flash significantly decreased the latency, as there are no mechanical parts that need to move to access the data. Upcoming non-volatile memory solutions reduce this latency even further, and even allow byte-level access to the storage medium. Thus, just like with networking, software drivers become the bottleneck and we look for solutions to bypass the kernel to improve the efficiency of direct userspace access to storage.
This thesis offers two contributions as part of a solution to these problems. The first part introduces urdma, a software RDMA driver which leverages the Data Plane Development Kit (DPDK) to perform network data transfers in userspace without specialized RDMA interface hardware. The second part examines remote locking protocols, which are required for synchronization in distributed storage systems. We define an RDMA locking mechanism referred to as Verbs Offload Locking Technology (VOLT), which allows acquisition of a remote lock object without any CPU usage by the target node. This offloading allows VOLT to be used with disaggregated memory servers that have limited onboard CPU resources, while also lowering the application overhead for remote locking. Finally, we define a bytecode framework using enhanced Berkeley Packet Filter (eBPF) bytecode for extending the capabilities of an RDMA-capable network interface card (NIC) with new operations, and show how this can be used to implement our remote locking operation
- …