368,818 research outputs found

    A methodological approach to BISDN signalling performance

    Get PDF
    Sophisticated signalling protocols are required to properly handle the complex multimedia, multiparty services supported by the forthcoming BISDN. The implementation feasibility of these protocols should be evaluated during their design phase, so that possible performance bottlenecks are identified and removed. In this paper we present a methodology for evaluating the performance of BISDN signalling systems under design. New performance parameters are introduced and their network-dependent values are extracted through a message flow model which has the capability to describe the impact of call and bearer control separation on the signalling performance. Signalling protocols are modelled through a modular decomposition of the seven OSI layers including the service user to three submodels. The workload model is user descriptive in the sense that it does not approximate the direct input traffic required for evaluating the performance of a layer protocol; instead, through a multi-level approach, it describes the actual implications of user signalling activity for the general signalling traffic. The signalling protocol model is derived from the global functional model of the signalling protocols and information flows using a network of queues incorporating synchronization and dependency functions. The same queueing approach is followed for the signalling transfer network which is used to define processing speed and signalling bandwidth requirements and to identify possible performance bottlenecks stemming from the realization of the related protocols

    Practical Fine-grained Privilege Separation in Multithreaded Applications

    Full text link
    An inherent security limitation with the classic multithreaded programming model is that all the threads share the same address space and, therefore, are implicitly assumed to be mutually trusted. This assumption, however, does not take into consideration of many modern multithreaded applications that involve multiple principals which do not fully trust each other. It remains challenging to retrofit the classic multithreaded programming model so that the security and privilege separation in multi-principal applications can be resolved. This paper proposes ARBITER, a run-time system and a set of security primitives, aimed at fine-grained and data-centric privilege separation in multithreaded applications. While enforcing effective isolation among principals, ARBITER still allows flexible sharing and communication between threads so that the multithreaded programming paradigm can be preserved. To realize controlled sharing in a fine-grained manner, we created a novel abstraction named ARBITER Secure Memory Segment (ASMS) and corresponding OS support. Programmers express security policies by labeling data and principals via ARBITER's API following a unified model. We ported a widely-used, in-memory database application (memcached) to ARBITER system, changing only around 100 LOC. Experiments indicate that only an average runtime overhead of 5.6% is induced to this security enhanced version of application

    Multimedia Teleservices Modelled with the OSI Application Layer Structure

    Get PDF
    This paper looks into the communications capabilities that are required by distributed multimedia applications to achieve relation preserving information exchange. These capabilities are derived by analyzing the notion of information exchange and are embodied in communications functionalities. To emphasize the importance of the users' view, a top-down approach is applied. The (revised) OSI Application Layer Structure (OSI-ALS) is used to model the communications functionalities and to develop an architecture for composition of multimedia services with these functionalities. This work may therefore be considered an exercise to evaluate the suitability of OSI-ALS for composition of multimedia teleservices

    Adam Smith goes mobile : managing services beyond 3G with the digital marketplace

    Get PDF
    The next generation of mobile communications systems is expected to offer new business opportunities to existing and new market players. A market-based middleware framework has been recently proposed whereby service providers, independent of network operators, are able to tender online service contracts to network operators in a dynamic and competitive manner. This facilitates a seamless service provision over disparate networks in a consumer-centric manner. Service providers select network bearers according to the network operators' ability to meet the QoS target, which in turn is influenced, among other things, by user's price and quality requirements. The benefits of this proposal are the complementarity of numerous network resources, the decoupling of services and networks in a self-organising distributed environment, and increased competition to consumers’ advantag

    Control-data separation architecture for cellular radio access networks: a survey and outlook

    Get PDF
    Conventional cellular systems are designed to ensure ubiquitous coverage with an always present wireless channel irrespective of the spatial and temporal demand of service. This approach raises several problems due to the tight coupling between network and data access points, as well as the paradigm shift towards data-oriented services, heterogeneous deployments and network densification. A logical separation between control and data planes is seen as a promising solution that could overcome these issues, by providing data services under the umbrella of a coverage layer. This article presents a holistic survey of existing literature on the control-data separation architecture (CDSA) for cellular radio access networks. As a starting point, we discuss the fundamentals, concepts, and general structure of the CDSA. Then, we point out limitations of the conventional architecture in futuristic deployment scenarios. In addition, we present and critically discuss the work that has been done to investigate potential benefits of the CDSA, as well as its technical challenges and enabling technologies. Finally, an overview of standardisation proposals related to this research vision is provided

    A Place Without a Form

    Get PDF
    The old spiritual masters told us to be in the world but not of it. We moderns have given this a secular twist. We are in our world — we have values, ways of life, world pictures — but not of it — we are to be aware of our freedom, aware of the contingency of our world and its dependence on factors many of which are or will be under our control. We both inhabit our world and enjoy the status of distanced controllers. Or, if our lack of control and our dependence on historical and social factors is being emphasized, we are to inhabit our world with a certain knowing irony, since we understand the process by which it came about, even if we cannot change it. We hnave found ways to institutionalize this split-level identity. Such institutions posit a separation of form and content. In the free market, in procedural justice, in free speech we live out that separation. This parallels cognitive and volitional theories of Kantian and Utilitarian descent, which make the same separation. All these give us freedom by having us seek our identity in a formal process above all content, but at the cost of introducing distance and irony. Martin Heidegger's response to modernity often sounds like a romantic flight from modern distances. He clearly wants to overcome our split-level existence, the uneasy balance of facticity and freedom, which for him is but another manifestation of the will to power which he fines lurking behind our tradition. But to what degree is his own overcoming of modernity also susceptible to split-level living and ironic distance

    Prediction and comparison of downlink electric-field and uplink localised SAR values for realistic indoor wireless planning

    Get PDF
    In this paper, for the first time a heuristic network calculator for both whole-body exposure due to indoor base station antennas or access points (downlink exposure) and localised exposure due to the mobile device (uplink exposure) in indoor wireless networks is presented. As an application, three phone call scenarios are investigated (Universal Mobile Telecommunications System (UMTS) macrocell, UMTS femtocell andWiFi voice-over-IP) and compared with respect to the electric-field strength and localised specific absorption rate (SAR) distribution. Prediction models are created and successfully validated with an accuracy of 3 dB. The benefits of the UMTS power control mechanisms are demonstrated. However, dependent on the macrocell connection quality and on the user's average phone call connection time, also the macrocell solution might be preferential from an exposure point of view for the considered scenario

    A resource management architecture for future mobile communications systems

    Get PDF
    This paper presents an overview of a hierarchical Resource Management architecture for future mobile communications systems. The architecture is designed to be generic and can therefore be adopted for a range of Radio Access Methodologies. In particular it provides a mechanism for radio resource management across airinterfaces such as those being defined for use with UMTS. Given the move towards packet-switched technologies both in the Core Network and the Radio Access Network [1], the architecture embraces the concept of statistical QoS applied to individual flows in the form of a commitment level. I

    Implementing fault tolerant applications using reflective object-oriented programming

    Get PDF
    Abstract: Shows how reflection and object-oriented programming can be used to ease the implementation of classical fault tolerance mechanisms in distributed applications. When the underlying runtime system does not provide fault tolerance transparently, classical approaches to implementing fault tolerance mechanisms often imply mixing functional programming with non-functional programming (e.g. error processing mechanisms). The use of reflection improves the transparency of fault tolerance mechanisms to the programmer and more generally provides a clearer separation between functional and non-functional programming. The implementations of some classical replication techniques using a reflective approach are presented in detail and illustrated by several examples, which have been prototyped on a network of Unix workstations. Lessons learnt from our experiments are drawn and future work is discussed
    • 

    corecore