1,036,081 research outputs found

    Progressive damage assessment and network recovery after massive failures

    Get PDF
    After a massive scale failure, the assessment of damages to communication networks requires local interventions and remote monitoring. While previous works on network recovery require complete knowledge of damage extent, we address the problem of damage assessment and critical service restoration in a joint manner. We propose a polynomial algorithm called Centrality based Damage Assessment and Recovery (CeDAR) which performs a joint activity of failure monitoring and restoration of network components. CeDAR works under limited availability of recovery resources and optimizes service recovery over time. We modified two existing approaches to the problem of network recovery to make them also able to exploit incremental knowledge of the failure extent. Through simulations we show that CeDAR outperforms the previous approaches in terms of recovery resource utilization and accumulative flow over time of the critical service

    Linear integrated location-inventory models for service parts logistics network design

    Get PDF
    We present two integrated network design and inventory control problems in service-parts logistics systems. Such models are complicated due to demand uncertainty and highly nonlinear time-based service level constraints. Exploiting unique properties of the nonlinear constraints, we provide an equivalent linear formulation under part-warehouse service requirements, and an approximate linear formulation under part service requirements. Computational results indicate the superiority of our approach over existing approaches in the literature

    Resource Allocation Frameworks for Network-coded Layered Multimedia Multicast Services

    Get PDF
    The explosive growth of content-on-the-move, such as video streaming to mobile devices, has propelled research on multimedia broadcast and multicast schemes. Multi-rate transmission strategies have been proposed as a means of delivering layered services to users experiencing different downlink channel conditions. In this paper, we consider Point-to-Multipoint layered service delivery across a generic cellular system and improve it by applying different random linear network coding approaches. We derive packet error probability expressions and use them as performance metrics in the formulation of resource allocation frameworks. The aim of these frameworks is both the optimization of the transmission scheme and the minimization of the number of broadcast packets on each downlink channel, while offering service guarantees to a predetermined fraction of users. As a case of study, our proposed frameworks are then adapted to the LTE-A standard and the eMBMS technology. We focus on the delivery of a video service based on the H.264/SVC standard and demonstrate the advantages of layered network coding over multi-rate transmission. Furthermore, we establish that the choice of both the network coding technique and resource allocation method play a critical role on the network footprint, and the quality of each received video layer.Comment: IEEE Journal on Selected Areas in Communications - Special Issue on Fundamental Approaches to Network Coding in Wireless Communication Systems. To appea

    Discovering the network topology: an efficient approach for SDN

    Get PDF
    Network topology is a physical description of the overall resources in the network. Collecting this information using efficient mechanisms becomes a critical task for important network functions such as routing, network management, quality of service (QoS), among many others. Recent technologies like Software-Defined Networks (SDN) have emerged as promising approaches for managing the next generation networks. In order to ensure a proficient topology discovery service in SDN, we propose a simple agents-based mechanism. This mechanism improves the overall efficiency of the topology discovery process. In this paper, an algorithm for a novel Topology Discovery Protocol (SD-TDP) is described. This protocol will be implemented in each switch through a software agent. Thus, this approach will provide a distributed solution to solve the problem of network topology discovery in a more simple and efficient way.Peer ReviewedPostprint (published version
    corecore