46 research outputs found

    Towards highly adaptable user-centric terminal architecture

    Get PDF
    International audienceIn the next-generation communication systems, the mobile terminals will be considerably more diverse than nowadays, andthe users will have a greater choice of access technologies,offering different QoS, security, cost, and so on. However, the “best” decision to select an interface and an access network from many other possible combinations has to be taken. This decision will dependon information such as: the user preferences, the requirements from applications, the device capabilities, the performances and capabilities of the available networks, the network operators constraints, etc. Thispaper describes an add-on middleware which deals with interface automatic configuration and selection. Our goal is twofold: to provideusers with “seamless” roaming between heterogeneous access networks,and to allow them to always stay connected through the “best”acces snetwork

    Achieving "always best connected" through extensive profile managment

    Get PDF
    International audienceThe integration of various access networks into a ubiquitous,yet heterogeneous, wireless environment is on the way. This evolution of the mobile network will give the end-user a greater choice of access tech-nologies, and, therefore, the decision to select the “best” interface andaccess network from many possible combinations has to be taken. The decision will depend on information such as: performances and capabilities of the available networks, requirements from applications, user preferences, or network operators’ constraints. Our work focuses on an advanced middleware which deals with profile management to supportthe interface automatic configuration and selection. Furthermore, the proposed mechanism supports the dynamic (re)mapping of the application flows by taking into consideration multiple selection criteri

    A Holistic Monitoring Service for Fog/Edge Infrastructures: a Foresight Study

    Get PDF
    International audienceAlthough academic and industry experts are now advocating for going from large-centralized Cloud Computing infrastructures to smaller ones massively distributed at the edge of the network, management systems to operate and use such infrastructures are still missing. In this paper, we focus on the monitoring service which is a key element to any management system in charge of operating a distributed infrastructure. Several solutions have been proposed in the past for cluster, grid and cloud systems. However, none is well appropriate to the Fog/Edge context. Our goal in this study, is to pave the way towards a holistic monitoring service for a Fog/Edge infrastructure hosting next generation digital services. The contributions of our work are: (i) the problem statement, (ii) a classification and a qualitative analysis of major existing solutions, and (iii) a preliminary discussion on the impact of the deployment strategy of functions composing the monitoring service

    Efficient Resource Allocation for Multi-tenant Monitoring of Edge Infrastructures

    Get PDF
    International audienceBy relying on small sized and massively distributed infrastructures, the Edge computing paradigm aims at supporting the low latency and high bandwidth requirements of the next generation services that will leverage IoT devices (e.g., video cameras, sensors). To favor the advent of this paradigm, management services, similar to the ones that made the success of Cloud computing platforms, should be proposed. However, they should be designed in order to cope with the limited capabilities of the resources that are located at the edge. In that sense, they should mitigate as much as possible their footprint. Among the different management services that need to be revisited, we investigate in this paper the monitoring one. Monitoring functions tend to become compute-, storage-and network-intensive, in particular because they will be used by a large part of applications that rely on real-time data. To reduce as much as possible the footprint of the whole monitoring service, we propose to mutualize identical processing functions among different tenants while ensuring their quality-of-service (QoS) expectations. We formalize our approach as a constraint satisfaction problem and show through micro-benchmarks its relevance to mitigate compute and network footprints

    A Framework for Edge Infrastructures Monitoring

    Get PDF
    By relying on small sized and massively distributed infrastructures, the Edge computingparadigm aims at supporting the low latency and high bandwidth requirements of the next generationservices that will leverage IoT devices (e.g., video cameras, sensors). To favor the advent of this paradigm,management services, similar to the ones that made the success of Cloud computing platforms, should beproposed. However, they should be designed in order to cope with the limited capabilities of the resourcesthat are located at the edge. In that sense, they should mitigate as much as possible their footprint. Amongthe different management services that need to be revisited, we investigate in this paper the monitoring one.Monitoring functions tend to become compute-, storage- and network-intensive, in particular because theywill be used by a large part of applications that rely on real-time data. To reduce as much as possible thefootprint of the whole monitoring service, we propose to mutualize identical processing functions amongdifferent tenants while ensuring their quality-of-service (QoS) expectations.We formalize our approach asa constraint satisfaction problem and show through micro-benchmarks its relevance to mitigate computeand network footprints.En s’appuyant sur des infrastructures de petite taille et massivement distribuées, le EdgeComputing cherche à répondre aux besoins en faible latence et grande bande passante des applicationsde nouvelle génération qui favorisent l’utilisation de l’Internet des objets (par exemple, les camérasvidéo, les capteurs). Pour mettre en œuvre ce paradigme, des services de gestion, similaires à ceuxqui ont permis le succès des plates-formes du Cloud Computing, doivent être proposés. Cependant, ilsdoivent être conçus de manière à faire face aux capacités limitées des ressources situées à la périphériedu réseau. Autrement dit, ils doivent réduire autant que possible leur empreinte. Parmi les différentsservices de gestion qui doivent être revisités, nous étudions dans cet article le service de supervision.Les fonctions de supervision ont tendance à nécessiter de grandes capacités de calcul, de stockage et deréseau parce qu’elles sont utilisées par une grande partie d’applications qui nécessite une supervisionen temps réel. Afin de réduire au maximum l’empreinte du service de supervision, nous proposonsde mutualiser des fonctions de traitement identiques entre différents tenants tout en garantissant leursattentes en qualité de service (QoS). Nous formalisons notre approche en tant qu’un problème desatisfaction de contraintes et montrons à l’aide de micro-test sa pertinence pour atténuer l’empreintede calcul et réseau

    Anticipation des handovers des noeuds IPv6 à l'aide d'informations de géolocalisation

    No full text
    Les performances ainsi que la popularité grandissante des réseaux sans fil IEEE 802.11 les destinent à véhiculer une grande diversité de trafic. Cependant, les communications temps réel, particulièrement sensibles aux temps de latence, peuvent être perturbées lors de la phase de handover. Ce phénomène est d'autant plus aggravé si le handover de niveau 2 est suivi par un handover de niveau 3. De nombreuses solutions visant à optimiser le temps de latence engendré par le handover ont été proposées, mais peu d'entre elles tirent parti d'informations de positionnement. Dans cet article, nous présentons un nouveau protocole s'appuyant sur des informations de géolocalisation afin d'anticiper les futurs points d'accès des noeuds mobiles. Notre protocole permet notamment de positionner un contexte afin d'éviter la phase de découverte de niveau 2 et de connaître a priori le prochain lien IPv6. Une évaluation complète du protocole a été réalisée par simulation à travers trois scénarios

    A methodology for assessing the vertical handover algorithms in heterogeneous wireless networks

    No full text
    International audienceThe integration of heterogeneous access networks into a ubiquitous wireless environment has commenced. However, in contrast with homogeneous networks (e.g., GPRS or UMTS) where there are a lot of handover test-reference scenarios, extensive work has yet to be done for modelling the end-user mobility in heterogeneous wireless networks. This is partially due to the fact that thorough test-case emulations are complex in heterogeneous environments because the scenarios are difficult to put in practice; moreover, the handover algorithms' performances may also depend on the auxiliary mechanisms such as user profiling or decision parameters gathering. Therefore, in order to exclusively assess the vertical handover decision algorithms, we propose and develop a complete methodology and we investigate the associated mechanisms

    A performance analysis of distributed QoS negociation during establishment session

    No full text
    International audienceIn order to achieve guaranteed services, we need to negotiate network resources providing the required quality of services (QoS). For this reason, the common set-up process of service session is divided into three phases. At first, the application specifies its QoS requirements, then, the QoS parameters at IP level and MAC level are successively specified and finally the network applies the negotiated QoS configuration. In this paper, we propose to negotiate at the same time the QoS parameters at both levels. An optimization of this approach has also been discussed. This optimization focuses on distributing negotiated QoS parameters between several entities located in different hierarchical levels. The assignment of parameters is dynamically configured. Therefore, this paper proposes a performance model to compare the new combined-distributed negotiation process with the negotiation processes applied in UMTS Release 5 (R5) [4] during session establishment. Numerical results show that the proposed approach is more scalable on the network side than the UMTS approach

    A centralized resource reservation for cellular IP access networks

    No full text
    International audience

    Securing fast handover in WLANs : a ticket based proactive authentication scheme

    No full text
    International audienceMore and more wireless access networks based on WLANs e.g. IEEE 802.11 are publicly deployed in multiple environments such as airports, depots, shopping centers, etc. Efficient authentication mechanisms are required to ensure a robust control of network access and secure user exchanges. The evolution of mobile devices, wireless access technologies and user behaviors lead to an increasing demand of seamless mobility support. Thus, authentication mechanisms must support seamless handover across network cells. In previous work, we have proposed a fast re-authentication method based on proactive key distribution: PKD with IAPP caching. This method proposes a very interesting handover delay reduction but it does not comply with the IEEE 802.11i security requirements. In this paper, we propose a ticket-based enhancement to go beyond the security weakness of the PKD with IAPP caching re-authentication method. A functional description of the security enhancement is given in addition to a security evaluation
    corecore