Dissertations / Theses on the topic 'Telecommunication - Traffic - Management'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 46 dissertations / theses for your research on the topic 'Telecommunication - Traffic - Management.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Su, Ching-fong. "Efficient traffic management based on deterministically constrained traffic flows /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.
Full textZhang, Tong. "Improving the performance of a traffic data management system." Ohio : Ohio University, 1999. http://www.ohiolink.edu/etd/view.cgi?ohiou1175198741.
Full textChe, Hao. "Measurement-based traffic modeling and network resource management /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.
Full textSang, Aimin. "Measurement-based traffic management for QoS guarantee in multi-service networks." Access restricted to users with UT Austin EID Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3033587.
Full textLi, Frank Yong. "Quality of Service, Traffic Conditioning and Resource Management in Universal Mobile Telecommunication System (UMTS)." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-304.
Full textThe successful deployment of Universal Mobile Telecommunication System (UMTS) is heavily dependent on Quality of Service (QoS) to be achieved. This thesis addresses a few facets of the QoS issues in UMTS, including traffic shaping and policing, conformance consistency, Call Admission Control (CAC) and resource allocation.
The main focus of this thesis is traffic conditioning related issues for QoS provisioning in UMTS. Assuming an end-to-end QoS scenario supported by IntServ or/and Diffserv architectures, the thesis initially presents an all nodes traffic conditioning-enabled framework in UMTS. Under this framework, the traffic generated at each User Equipment (UE) is regulated by a traffic shaper in the form of a token bucket, and the conformance of the traffic flow is policed at the policing node. The performance of imposing traffic shaping at the UE is studied and compared with the case without shaping. Next, having observed that the performance of the traffic conditioned system is sensitive to the values of the token bucket parameters, the thesis proposes a heuristic approach for searching local and global QoS-aware token bucket parameters. By tuning the system operating at the obtained ’optimal’ shaping parameters, the requirements for all concerned QoS attributes are guaranteed. Furthermore, the thesis studies conformance consistency in a traffic conditioned multi-hop network, by monitoring the conformance status of a traffic flow using an identical token bucket for both traffic shaping and policing. In the presence of variable packet size, the thesis gives a quantitative result, for a simple case, on how much percent of the originally conformant packets may misbehave at further policing node(s). The performance of the aggregated traffic flows and the measures to minimize the effect of conformance deterioration are also studied in the thesis.
Another facet of the QoS issues in UMTS, CAC together with resource allocation, is also studied in the thesis. A priority-oriented framework for QoS management of multimedia services in UMTS is proposed. Based on a traffic class priority definition, the framework is implemented through a priority-oriented CAC, channel congestion control and adaptive bandwidth allocation.
Chim, Tat-wing, and 詹達榮. "Novel algorithms to improve internet traffic distribution management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29798322.
Full textAnjali, Tricha. "DiffServ/MPLS Network Design and Management." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5191.
Full textZhao, Qi. "Towards Ideal Network Traffic Measurement: A Statistical Algorithmic Approach." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19821.
Full textCommittee Chair: Xu, Jun; Committee Member: Ammar, Mostafa; Committee Member: Feamster, Nick; Committee Member: Ma, Xiaoli; Committee Member: Zegura, Ellen.
Meempat, Gopalakrishnan. "Modeling and adaptive resource management in integrated communication networks." Diss., The University of Arizona, 1989. http://hdl.handle.net/10150/184843.
Full textLai, Chengdi, and 賴成迪. "Systematic design of internet congestion control : theory and algorithms." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/206356.
Full textpublished_or_final_version
Electrical and Electronic Engineering
Doctoral
Doctor of Philosophy
Choi, Myung Cheon. "Traffic flow management for RSVP/ATM edge devices." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/15520.
Full textEngel, Adalbert. "Bandwidth management and quality of service." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2000. https://ro.ecu.edu.au/theses/1540.
Full textLee, Tae-jin. "Traffic management and design of multiservice networks : the Internet and ATM networks /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textMazandu, Gaston Kuzamunu. "Traffic Engineering using Multipath Routing Approaches." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/679.
Full textYang, Yang. "Network congestion control." Access restricted to users with UT Austin EID, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3037028.
Full textKumar, Abhishek Anand. "Traffic sensitive quality of service controller." Link to electronic thesis, 2004. http://www.wpi.edu/Pubs/ETD/Available/etd-0114104-230026.
Full textHe, Changhua, and 何昌華. "Resource management for handoff control in wireless/mobile networks using artificial neural networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31226000.
Full textKolar, Vinay. "Routing and traffic-engineering in multi-hop wireless networks an optimization based approach /." Diss., Online access via UMI:, 2007.
Find full textPong, Dennis Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Quality of service support in multi-rate wireless networks." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/25153.
Full textNg, Hwee Ping. "Performance analysis of management techniques for SONET/SDH telecommunications networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FNg.pdf.
Full textFung, Ping-yuen, and 馮秉遠. "Online algorithms for the provision of quality of service in networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2005. http://hub.hku.hk/bib/B3158052X.
Full textAmaral, Alexandre de Aguiar 1986. "Inferindo a fonte e o destino do tráfego anômalo em redes de computadores usando correlação espaço-temporal." [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/261500.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-19T02:04:03Z (GMT). No. of bitstreams: 1 Amaral_AlexandredeAguiar_M.pdf: 2806398 bytes, checksum: 8a624028da0fcad69cc19e194d5e788c (MD5) Previous issue date: 2011
Resumo: Estratégias voltadas para a detecção de anomalias em redes de computadores emitem alarmes como forma de notificação ao administrador de rede. Esses alarmes são essenciais para a gerencia de rede, pois são evidencias de uma anormalidade. Entretanto, uma única anomalia pode gerar um numero excessivo de alarmes, tornando a inspeção manual inviável. Nesta dissertação, e apresentado um sistema de correlação de alarmes automatizado, divido em três camadas, que obtém os alarmes primitivos e apresenta ao administrador de rede uma visão global do cenário afetado pela anomalia. A camada de pré-processamento faz a compressão dos alarmes utilizando seus atributos espaciais e temporais, os quais são reduzidos a um único alarme denominado DLA (Alarme em Nível de Equipamento). A camada de correlação busca, através dos DLAs e de informações sobre a topologia da rede, inferir o caminho de propagação da anomalia, sua origem e destino. A camada de apresentação prove a visualização do caminho e elementos de redes afetados pela propagação da anomalia. O sistema apresentado nesta dissertação foi aplicado em diversos cenários que apresentavam anomalias reais detectadas na rede da Universidade Estadual de Londrina. Foi demonstrada sua capacidade de identificar, de forma automatizada, o caminho de propagação do trafego anômalo, proporcionando informações úteis e corretas ao administrador de rede para o diagnostico do problema
Abstract: Anomaly detection systems for computer networks send alarms in order to notify the network administrator. These alarms are essential for network management because they are evidences of an abnormality. However, a single anomaly may generate an excessive volume of alarms, making the manual inspection unfeasible. In this work, it is presented an automated alarm correlation system divided into three layers, which obtains raw alarms and presents to network administrator a global view of the scenario affected by the anomaly. In the preprocessing layer, it is performed the alarm compression using their spatial and temporal attributes, which are reduced to a unique alarm named DLA (Device Level Alarm). The correlation layer aims to infer the anomaly propagation path and its origin and destination using DLAs and network topology information. The presentation layer provides the visualization of the path and network elements affected by the anomaly propagation through the network. The presented system was applied in various scenarios that had real anomalies detected on the State University of Londrina network. It demonstrated its ability to identify in an automated manner the anomalous traffic propagation path, providing useful and accurate information to the network administrator to diagnose the problem
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
Tacic, Ivan. "Efficient Synchronized Data Distribution Management in Distributed Simulations." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6822.
Full textFares, Rasha H. A. "Performance modelling and analysis of congestion control mechanisms for communication networks with quality of service constraints. An investigation into new methods of controlling congestion and mean delay in communication networks with both short range dependent and long range dependent traffic." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5435.
Full textMinistry of Higher Education in Egypt and the Egyptian Cultural Centre and Educational Bureau in London
Fares, Rasha Hamed Abdel Moaty. "Performance modelling and analysis of congestion control mechanisms for communication networks with quality of service constraints : an investigation into new methods of controlling congestion and mean delay in communication networks with both short range dependent and long range dependent traffic." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5435.
Full textZarpelão, Bruno Bogaz. "Detecção de anomalias em redes de computadores." [s.n.], 2010. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260952.
Full textTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-16T19:18:19Z (GMT). No. of bitstreams: 1 Zarpelao_BrunoBogaz_D.pdf: 5089650 bytes, checksum: 281e7d926aae4a7e05a2e94347a06179 (MD5) Previous issue date: 2010
Resumo: Anomalias em redes de computadores são desvios súbitos e acentuados que ocorrem no tráfego em consequência de diversas situações como defeitos em softwares, uso abusivo de recursos da rede, falhas em equipamentos, erros em configurações e ataques. Nesta tese, é proposto um sistema de detecção de anomalias em redes de computadores baseado em três níveis de análise. O primeiro nível de análise é responsável por comparar os dados coletados em um objeto SNMP (Simple Network Management Protocol) com o perfil de operações normais da rede. O segundo nível de análise correlaciona os alarmes gerados no primeiro nível de análise utilizando um grafo de dependências que representa as relações entre os objetos SNMP monitorados. O terceiro nível de análise reúne os alarmes de segundo nível utilizando informações sobre a topologia de rede e gera um alarme de terceiro nível que reporta a propagação da anomalia pela rede. Os testes foram realizados na rede da Universidade Estadual de Londrina, utilizando situações reais. Os resultados mostraram que a proposta apresentou baixas taxas de falsos positivos combinadas a altas taxas de detecção. Além disso, o sistema foi capaz de correlacionar alarmes gerados para diferentes objetos SNMP em toda a rede, produzindo conjuntos menores de alarmes que ofereceram ao administrador de redes uma visão panorâmica do problema
Abstract: Anomalies in computer networks are unexpected and significant deviations that occur in network traffic due to different situations such as software bugs, unfair resource usage, failures, misconfiguration and attacks. In this work, it is proposed an anomaly detection system based on three levels of analysis. The first level of analysis is responsible for comparing the data collected from SNMP (Simple Network Management Protocol) objects with the profile of network normal behavior. The second level of analysis correlates the alarms generated by the first level of analysis by using a dependency graph, which represents the relationships between the SNMP objects. The third level of analysis correlates the second level alarms by using network topology information. The third level generates a third level alarm that presents the anomaly propagation path through the network. Tests were performed in the State University of Londrina network, exploring real situations. Results showed that the proposal presents low false positive rates and high detection rates. Moreover, the proposed system is able to correlate alarms that were generated for SNMP objects at different places of the network, producing smaller sets of alarms that offer a wide-view of the problem to the network administrator
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
Lusilao-Zodi, Guy-Alain. "A Bandwidth Market in an IP Network." Thesis, Stellenbosch : University of Stellenbosch, 2008. http://hdl.handle.net/10019.1/1933.
Full textConsider a path-oriented telecommunications network where calls arrive to each route in a Poisson process. Each call brings on average a fixed number of packets that are offered to route. The packet inter-arrival times and the packet lengths are exponentially distributed. Each route can queue a finite number of packets while one packet is being transmitted. Each accepted packet/call generates an amount of revenue for the route manager. At specified time instants a route manager can acquire additional capacity (“interface capacity”) in order to carry more calls and/or the manager can acquire additional buffer space in order to carry more packets, in which cases the manager earns more revenue; alternatively a route manager can earn additional revenue by selling surplus interface capacity and/or by selling surplus buffer space to other route managers that (possibly temporarily) value it more highly. We present a method for efficiently computing the buying and the selling prices of buffer space. Moreover, we propose a bandwidth reallocation scheme capable of improving the network overall rate of earning revenue at both the call level and the packet level. Our reallocation scheme combines the Erlang price [4] and our proposed buffer space price (M/M/1/K prices) to reallocate interface capacity and buffer space among routes. The proposed scheme uses local rules and decides whether or not to adjust the interface capacity and/or the buffer space. Simulation results show that the reallocation scheme achieves good performance when applied to a fictitious network of 30-nodes and 46-links based on the geography of Europe.
Zhang, Xin. "Network Formation and Routing for Multi-hop Wireless Ad-Hoc Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11470.
Full textDimou, Konstantinos. "Améliorations de l'accès paquet en sens montant du WCDMA." Phd thesis, Télécom ParisTech, 2003. http://pastel.archives-ouvertes.fr/pastel-00000671.
Full text"ISPs' traffic engineering and peering strategy." Thesis, 2007. http://library.cuhk.edu.hk/record=b6074500.
Full textOur work on peering strategy is to help ISPs understand the economic implications of various traffic patterns and make proper decisions to optimize their business. We first conduct an economic analysis for an overlay streaming network to gain some insights on the free ride phenomenon. We further improve the analysis by taking the response of subscribers into consideration and formulate the dynamic market as a multi-leader-follower game to capture the Nash Equilibrium of the routing tussle among the major players of the Internet marketplace. Based on this framework together with a gravity traffic model, we present some important observations on the implications of overlays on ISPs' peering strategy.
Over the past several years, numerous types of "overlay" networks change the interdomain traffic pattern and ISPs lose the routing control of some interdomain traffic flows due to the application layer routing. As a result, some ISPs may provide unintended transit service for other local ISPs. It upsets the traditional business model and makes ISPs' peering strategies more complicated.
The Internet has quickly evolved into a vast global network owned and operated by thousands of interconnected Internet Service Providers. Each of these ISPs, as one autonomous system, has its individual economic interests. ISPs can achieve their objectives through peering strategy and interdomain traffic engineering. These two issues are important for ISPs' business and have significant implications on the Internet architecture.
Wang, Hui.
"September 2007."
Adviser: Dah Ming Chiu.
Source: Dissertation Abstracts International, Volume: 69-08, Section: B, page: 4865.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2007.
Includes bibliographical references (p. 163-170).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
"Call admission and routing in telecommunication networks." Chinese University of Hong Kong, 1994. http://library.cuhk.edu.hk/record=b5888234.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1994.
Includes bibliographical references (leaves 82-86).
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Overview of Integrated Service Digital Networks --- p.1
Chapter 1.2 --- Multirate Loss Networks --- p.5
Chapter 1.3 --- Previous Work --- p.7
Chapter 1.4 --- Organization --- p.11
Chapter 1.5 --- Publications --- p.12
Chapter 2 --- Call Admission in Multirate Loss Networks --- p.13
Chapter 2.1 --- Introduction --- p.13
Chapter 2.2 --- Two Adaptive Routing Rules --- p.15
Chapter 2.3 --- Call Admission Policies --- p.17
Chapter 2.4 --- Analysis of Call Admission Policies --- p.25
Chapter 2.4.1 --- "The CS, LO, GB and the EB Policies" --- p.25
Chapter 2.4.2 --- The DP Policy --- p.29
Chapter 2.5 --- Performance Comparisons --- p.32
Chapter 2.6 --- Concluding Remarks --- p.35
Chapter 3 --- Least Congestion Routing in Multirate Loss Networks --- p.41
Chapter 3.1 --- Introduction --- p.41
Chapter 3.2 --- The M2 and MTB Routings --- p.42
Chapter 3.2.1 --- M2 Routing --- p.43
Chapter 3.2.2 --- MTB Routing --- p.43
Chapter 3.3 --- Bandwidth Sharing Policies and State Aggregation --- p.45
Chapter 3.4 --- Analysis of M2 Routing --- p.47
Chapter 3.5 --- Analysis of MTB Routing --- p.50
Chapter 3.6 --- Numerical Results and Discussions --- p.53
Chapter 3.7 --- Concluding Remarks --- p.56
Chapter 4 --- The Least Congestion Routing in WDM Lightwave Networks --- p.60
Chapter 4.1 --- Introduction --- p.60
Chapter 4.2 --- Architecture and Some Design Issues --- p.62
Chapter 4.3 --- The Routing Rule --- p.66
Chapter 4.4 --- Analysis of the LC Routing Rule --- p.67
Chapter 4.4.1 --- Fixed Point Model --- p.67
Chapter 4.4.2 --- Without Direct-link Priority --- p.68
Chapter 4.4.3 --- With Direct-link Priority --- p.72
Chapter 4.5 --- Performance Comparisons --- p.73
Chapter 4.6 --- Concluding Remarks --- p.75
Chapter 5 --- Conclusions and Future Work --- p.79
Chapter 5.1 --- Future Work --- p.80
"Intelligent traffic monitoring, analysis and classification." Thesis, 2008. http://library.cuhk.edu.hk/record=b6074663.
Full textThis thesis represents new intelligent methods for monitoring and classifying network traffic. Internet traffic flow measurement is vitally important for network management, accounting and performance studies. Cisco's NetFlow is a widely deployed flow measurement solution that uses a configurable static sampling rate to control processor and memory usage on the router and the amount of reporting flow records generated. But during flooding attacks the memory and network bandwidth consumed by flow records can increase beyond what is available. Currently available countermeasures have their own problems In this thesis, we propose an entropy based adaptive flow aggregation algorithm. Relying on information-theoretic techniques, the algorithm efficiently identifies the clusters of attack flows in real time and aggregates those large number of short attack flows into a few metaflows. Compared to currently available solutions, our solution not only alleviates the problem in memory and export bandwidth, but also significantly improves the accuracy of legitimate flows. We evaluate our system using both synthetic trace file and real trace files from the Internet.
Hu, Yan.
Adviser: Dah-Mino Chen.
Source: Dissertation Abstracts International, Volume: 70-06, Section: B, page: 3600.
Thesis (Ph.D.)--Chinese University of Hong Kong, 2008.
Includes bibliographical references (leaves 128-135).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts in English and Chinese.
School code: 1307.
Yang, Shan-chieh. "Flow-size based differentiation to enhance user perceived performance on networks supporting best-effort traffic." Thesis, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3064691.
Full text"Traffic management framework for supporting integrated services in cross-path switch." 2000. http://library.cuhk.edu.hk/record=b5890383.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2000.
Includes bibliographical references (leaves 57-[61]).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Integrated Services Architecture --- p.2
Chapter 1.2 --- Cross-path Switch --- p.4
Chapter 1.2.1 --- Path Switching --- p.5
Chapter 1.3 --- Organization of Thesis --- p.9
Chapter 2 --- Module Architecture --- p.10
Chapter 2.1 --- Introduction --- p.10
Chapter 2.2 --- Notable Features --- p.11
Chapter 3 --- Connection Admission Control and Resource Allocation --- p.14
Chapter 3.1 --- Introduction --- p.14
Chapter 3.2 --- Connection Admission Control --- p.15
Chapter 3.2.1 --- Guaranteed Service --- p.15
Chapter 3.2.2 --- Controlled-Load Service --- p.18
Chapter 3.3 --- Resource Allocation --- p.27
Chapter 4 --- Resource Management --- p.31
Chapter 4.1 --- Introduction --- p.31
Chapter 4.2 --- Scheduling Algorithm --- p.32
Chapter 4.2.1 --- Input and Output Module --- p.32
Chapter 4.2.2 --- Central Module --- p.34
Chapter 4.3 --- Buffer Management --- p.39
Chapter 4.3.1 --- Buffer Partitioning --- p.40
Chapter 4.3.2 --- Dicard Policy --- p.40
Chapter 5 --- Design Issue of Cross-path Switch --- p.43
Chapter 5.1 --- Introduction --- p.43
Chapter 5.2 --- Stability Condition --- p.44
Chapter 5.3 --- Supplementary Admission Control Scheme --- p.46
Chapter 5.4 --- Simulation --- p.50
Chapter 6 --- Conclusion --- p.55
Bibliography --- p.57
Gorinsky, Sergey. "Robust congestion control for IP multicast." Thesis, 2003. http://wwwlib.umi.com/cr/utexas/fullcit?p3116316.
Full text"Characterization and performance evaluation for the proportional delay differentiated services." 2001. http://library.cuhk.edu.hk/record=b5890832.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2001.
Includes bibliographical references (leaves 94-96).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 2 --- Characterization and Performance Analysis --- p.8
Chapter 2.1 --- Two-class Proportional Differentiated Service --- p.11
Chapter 2.2 --- N-class Proportional DS --- p.13
Chapter 3 --- Experiments of Proportional Delay Differentiation using the It- erative Algorithm --- p.20
Chapter 3.1 --- Experiments using Poisson arrivals --- p.21
Chapter 3.2 --- Experiments using other arrivals distributions --- p.33
Chapter 4 --- Dynamic Adjustment --- p.37
Chapter 4.1 --- Adjustment algorithms --- p.37
Chapter 5 --- Experiments of Proportional Delay Differentiation using Dy- namic Adjustment --- p.41
Chapter 5.1 --- Illustration of dynamic adjustment --- p.43
Chapter 5.2 --- Poisson --- p.45
Chapter 5.3 --- Pareto --- p.48
Chapter 5.4 --- MMPP --- p.54
Chapter 5.5 --- Heterogeneous traffic classes --- p.60
Chapter 5.6 --- Experiments for short time-scale analysis --- p.62
Chapter 6 --- Multiple nodes --- p.69
Chapter 7 --- Summary of the Experiments Results --- p.75
Chapter 8 --- Improvement of WTP --- p.78
Chapter 8.1 --- Algorithm --- p.78
Chapter 8.2 --- Experiments --- p.80
Chapter 9 --- Possible Extensions --- p.85
Chapter 9.1 --- Application Extension --- p.85
Chapter 9.2 --- Performance Quantification --- p.87
Chapter 10 --- Conclusion --- p.90
"Mobility management in wireless cellular systems." 1997. http://library.cuhk.edu.hk/record=b5889252.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 1997.
Includes bibliographical references (leaves 85-[90]).
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Design Issues in Wireless Cellular Systems --- p.1
Chapter 1.1.1 --- Channel Assignment --- p.2
Chapter 1.1.2 --- Handoff --- p.3
Chapter 1.1.3 --- Multiple Accesses --- p.3
Chapter 1.1.4 --- Mobility Management --- p.4
Chapter 1.2 --- Motivation of the thesis --- p.5
Chapter 1.3 --- Outline of the thesis --- p.6
Chapter 2 --- Background Studies --- p.9
Chapter 2.1 --- Current Standards --- p.9
Chapter 2.2 --- Mobility Models --- p.11
Chapter 2.2.1 --- Fluid Flow Model --- p.12
Chapter 2.2.2 --- Markovian model --- p.13
Chapter 2.3 --- Dynamic versus Static Location Strategy --- p.14
Chapter 2.4 --- Location Registration Strategies --- p.14
Chapter 2.4.1 --- Time Based Strategy --- p.15
Chapter 2.4.2 --- Geographic Based Strategy --- p.17
Chapter 2.4.3 --- Distance Based Strategy --- p.18
Chapter 2.4.4 --- Miscellaneous Strategies --- p.19
Chapter 2.5 --- Summary --- p.20
Chapter 3 --- Hybrid Bloom Filter Location Update Algorithm --- p.21
Chapter 3.1 --- Introduction --- p.21
Chapter 3.2 --- System Model --- p.22
Chapter 3.3 --- Hybrid Bloom Filter Algorithm --- p.23
Chapter 3.3.1 --- Location Update Protocol --- p.23
Chapter 3.3.2 --- Paging Protocol --- p.25
Chapter 3.4 --- Performance Evaluation --- p.27
Chapter 3.4.1 --- Comparison of the hybrid and time based Bloom filter algorithms --- p.32
Chapter 3.5 --- Numerical Studies --- p.33
Chapter 3.5.1 --- Cost versus mobility --- p.34
Chapter 3.5.2 --- Cost versus call arrival rate --- p.37
Chapter 3.6 --- Summary --- p.39
Chapter 4 --- A Dynamic Location Area Assignment Algorithm --- p.40
Chapter 4.1 --- Geographic versus Distance Based Strategies --- p.41
Chapter 4.2 --- System Model --- p.42
Chapter 4.2.1 --- cell layout --- p.42
Chapter 4.2.2 --- mobility model --- p.43
Chapter 4.2.3 --- cost function --- p.44
Chapter 4.3 --- Dynamic Location Area Assignment Algorithm --- p.45
Chapter 4.3.1 --- Measurement --- p.46
Chapter 4.3.2 --- "Computation of (iopt, jopt)" --- p.46
Chapter 4.3.3 --- Computation of location area size k --- p.51
Chapter 4.4 --- Numerical Studies --- p.52
Chapter 4.5 --- Summary --- p.57
Chapter 5 --- Paging Cost Reduction Using Bloom Filtering As Auxilliary Strategy --- p.64
Chapter 5.1 --- Introduction --- p.64
Chapter 5.2 --- A Case Study - Joint DLA-HBF Algorithm --- p.65
Chapter 5.2.1 --- The Algorithm --- p.65
Chapter 5.2.2 --- Performance Evaluation --- p.67
Chapter 5.3 --- Summary --- p.68
Chapter 6 --- Conclusion --- p.70
Chapter 6.1 --- Summary of Results --- p.70
Chapter 6.2 --- Future Research Directions --- p.71
Appendix --- p.73
Chapter A --- Optimality of the Hybrid Bloom Filter Algorithm --- p.73
Chapter B --- Derivation of the Expected First Passage Time ExTi and EyTj --- p.77
Chapter C --- Optimality of the Dynamic Location Area Algorithm --- p.81
Bibliography --- p.85
"Principles of backlog balancing for rate-based flow control and congestion control in ATM networks." 1996. http://library.cuhk.edu.hk/record=b6073012.
Full textThesis (Ph.D.)--Chinese University of Hong Kong, 1996.
Includes bibliographical references (p. 138-[147]).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Mode of access: World Wide Web.
"Offered load and stability controls in multi-hop wireless networks." 2005. http://library.cuhk.edu.hk/record=b5892637.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2005.
Includes bibliographical references (leaves 71-72).
Abstracts in English and Chinese.
Chapter Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Overview and Motivation --- p.1
Chapter 1.2 --- Background of Offered Load Control --- p.2
Chapter 1.3 --- Background of Stability Control --- p.3
Chapter 1.4 --- Organization of the Thesis --- p.4
Chapter Chapter 2 --- Performance Problems and Solutions --- p.6
Chapter 2.1 --- Simulation Set-up --- p.6
Chapter 2.2 --- High Packet-Drop Rate --- p.7
Chapter 2.3 --- Re-routing Instability --- p.8
Chapter 2.3.1 --- Hidden-Node Problem --- p.8
Chapter 2.3.2 --- Ineffectiveness of Solving Hidden-Node Problem with RTS/CTS …… --- p.9
Chapter 2.4 --- Solutions to High-Packet Loss Rate and Re-routing Instability --- p.10
Chapter 2.4.1 --- Link-Failure Re-routing --- p.11
Chapter 2.4.2 --- Controlling Offered Load --- p.13
Chapter 2.5 --- Verification of Simulation Results with Real-life Experimental Measurements --- p.14
Chapter Chapter 3 --- Offered Load Control --- p.16
Chapter 3.1 --- Capacity Limited by the Hidden-node and Exposed-node Problems --- p.16
Chapter 3.1.1 --- Signal Capture --- p.18
Chapter 3.1.2 --- Analysis of Vulnerable Period induced by Hidden Nodes --- p.20
Chapter 3.1.3 --- Analysis of Vulnerable Period induced by Exposed Nodes --- p.21
Chapter 3.1.4 --- Sustainable Throughput --- p.22
Chapter 3.2 --- Capacity Limited by Carrier Sensing Property --- p.23
Chapter 3.3 --- Numerical Results --- p.26
Chapter 3.4 --- General Throughput Analysis of a Single Multi-hop Traffic Flow --- p.29
Chapter 3.5 --- Throughput Analysis on Topologies with Variable Distances between Successive Nodes --- p.31
Chapter Chapter 4 --- Discussions of Other Special Cases --- p.33
Chapter 4.1 --- A Carrier-sensing Limited Example --- p.33
Chapter 4.2 --- A Practical Solution to Improve Throughput --- p.34
Chapter Chapter 5 --- Achieving Fairness in Other Network Topologies --- p.36
Chapter 5.1 --- Lattice Topology --- p.36
Chapter Chapter 6 --- Stability Control --- p.39
Chapter 6.1 --- Ad-hoc routing protocols --- p.39
Chapter 6.2 --- Proposed scheme --- p.40
Chapter 6.2.1 --- Original AODV --- p.41
Chapter 6.2.2 --- AODV with Proposed Scheme --- p.42
Chapter 6.2.2.1 --- A Single Flow in a Single Chain of Nodes --- p.43
Chapter 6.2.2.2 --- Real-break Case --- p.44
Chapter 6.3 --- Improvements --- p.45
Chapter Chapter 7 --- Impacts of Data Transmission Rate and Payload Size --- p.48
Chapter 7.1 --- Signal Capture --- p.48
Chapter 7.2 --- Vulnerable region --- p.50
Chapter Chapter 8 --- Performance Enhancements in Multiple Flows --- p.53
Chapter 8.1 --- Impacts of Re-routing Instability in Two Flow Topology --- p.53
Chapter 8.2 --- Impacts of Vulnerable Periods in Multiple Flow Topologies --- p.55
Chapter 8.2.1 --- The Vulnerable Period induced by Individual Hidden-terminal Flow --- p.57
Chapter 8.2.2 --- The Number of Hidden-terminal Flows --- p.58
Chapter 8.2.3 --- Correlation between Hidden-terminal Flows --- p.60
Chapter Chapter 9 --- Conclusion --- p.63
Chapter Appendix A: --- General Throughput Analysis of a Single Multi-hop Traffic Flow --- p.67
Chapter A.l --- Capacity Limited by Hidden-node and Exposed-Node --- p.67
Chapter A.1.1 --- Sustainable Throughput --- p.68
Chapter A.2 --- Capacity Limited by Carrier Sensing Property --- p.68
Bibliography --- p.71
"User behavior and resource allocation in online video services." 2013. http://library.cuhk.edu.hk/record=b5884537.
Full textThesis (Ph.D.)--Chinese University of Hong Kong, 2013.
Includes bibliographical references (leaves 164-175).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstracts also in Chinese.
Arifler, Dogu. "Network tomography based on flow level measurements." Thesis, 2004. http://hdl.handle.net/2152/1871.
Full text"Sender-driven bandwidth differentiation for transmitting multimedia flows over TCP." 2006. http://library.cuhk.edu.hk/record=b5893001.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (leaves 66-67).
Abstracts in English and Chinese.
Acknowledgement --- p.1
Abstract --- p.2
摘要 --- p.3
Chapter Chapter 1 --- Introduction --- p.6
Chapter Chapter 2 --- Background and Related Work --- p.9
Chapter 2.1 --- Application-Layer Bandwidth Differentiation --- p.9
Chapter 2.2 --- Related Work --- p.14
Chapter 2.2.1 --- Bandwidth Differentation --- p.14
Chapter 2.2.2 --- Shared Congestion Management --- p.15
Chapter 2.2.3 --- Flow Partition --- p.16
Chapter Chapter 3 --- VPS Protocol Architecture --- p.17
Chapter 3.1 --- Virtual and Actual Flows --- p.18
Chapter 3.2 --- VPS Controller --- p.21
Chapter Chapter 4 --- ACK Translation --- p.25
Chapter 4.1 --- Fast Retransmit and Fast Recovery --- p.27
Chapter 4.2 --- Timeout --- p.30
Chapter 4.3 --- Packet and ACK Reordering --- p.33
Chapter 4.4 --- False Duplicate ACK Suppression --- p.35
Chapter 4.5 --- Maxburst --- p.37
Chapter 4.6 --- Memory Overhead and Computation Complexity --- p.38
Chapter Chapter 5 --- Bandwidth Differentiation --- p.41
Chapter 5.1 --- Distribution of Virtual Packets --- p.41
Chapter 5.2 --- Temporary Suspension of Actual Flows --- p.43
Chapter 5.3 --- Receive Window Limit --- p.44
Chapter 5.4 --- Limited Data Transmission --- p.44
Chapter Chapter 6 --- Performance Evaluatoin --- p.45
Chapter 6.1 --- Performance Metric --- p.45
Chapter 6.2 --- Simulation Setup --- p.46
Chapter 6.3 --- Performance over Different Time Scales --- p.47
Chapter 6.4 --- Performance over Different Bottleneck Bandwidth --- p.53
Chapter 6.5 --- Performance over Different Application-specified Ratios --- p.54
Chapter 6.6 --- Performance over Different Number of Flows --- p.57
Chapter 6.7 --- Heterogeneous Receivers --- p.60
Chapter Chapter 7 --- Conclusions and Future Work --- p.65
Bibliography --- p.66
"Random access technology and code assignment schemes for UTRA systems." 2002. http://library.cuhk.edu.hk/record=b6073473.
Full text"July 2002."
Thesis (Ph.D.)--Chinese University of Hong Kong, 2002.
Includes bibliographical references (2nd gr., p. 1-9).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Mode of access: World Wide Web.
Abstracts in English and Chinese.
Kurien, Anish Mathew. "Approaches for traffic classification and the optimisation of radio resources in cellular networks : application to South Africa." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1000945.
Full textObjectives of the study is to propose a suitable feature extraction and classication approach that is capable of adapting to the non-linear nature and the noise contained in the time series data. The end goal of subscriber classication in this study is to utilise the subscriber information extracted for a new radio resource optimisation model that focuses on the Channel Allocation Problem CAP. Although there they have been various models proposed in literature for solving of the CAP problem, the utilisation of subscriber related information in the CAP has not been directly considered.
"Spreading factor optimization and random access stability control for IMT-2000." 2000. http://library.cuhk.edu.hk/record=b5890392.
Full textThesis (M.Phil.)--Chinese University of Hong Kong, 2000.
Includes bibliographical references (leaves 63-[64]).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Introduction --- p.1
Chapter 1.2 --- The 2.5G Systems --- p.3
Chapter 1.2.1 --- HSCSD --- p.3
Chapter 1.2.2 --- GPRS --- p.3
Chapter 1.2.3 --- EDGE --- p.4
Chapter 1.2.4 --- IS-136 --- p.4
Chapter 1.3 --- The Evolution from 2G/2.5G to 3G --- p.4
Chapter 1.3.1 --- GSM Data Evolution --- p.4
Chapter 1.3.2 --- TDMA Data Evolution --- p.5
Chapter 1.3.3 --- CDMA Data Evolution --- p.6
Chapter 1.4 --- UTRA --- p.7
Chapter 1.4.1 --- UTRA FDD --- p.8
Chapter 1.4.2 --- UTRA TDD --- p.18
Chapter 1.4.3 --- Transport Channels --- p.25
Chapter 2 --- Spreading Factor Optimization for FDD Downlink --- p.27
Chapter 2.1 --- The Optimal Channel Splitting Problem --- p.28
Chapter 2.2 --- Spreading Factor Optimization for FDD Downlink Dedicated Chan- nel --- p.30
Chapter 3 --- Random Access Channel Stability Control --- p.33
Chapter 3.1 --- Random Access Slotted Aloha --- p.33
Chapter 3.1.1 --- System model --- p.33
Chapter 3.1.2 --- Probability of Code-Collision --- p.34
Chapter 3.1.3 --- Throughput Analysis of Random Access in TD/CDMA System --- p.37
Chapter 3.1.4 --- Retransmission --- p.42
Chapter 3.1.5 --- System Delay --- p.42
Chapter 3.2 --- Random Access Channel Stability Control --- p.43
Chapter 3.2.1 --- System Model --- p.43
Chapter 3.2.2 --- Random Access Procedure --- p.44
Chapter 3.3 --- Random Access Channel Stability Control Alogrithm --- p.47
Chapter 3.3.1 --- Simulation --- p.49
Chapter 3.4 --- Multi-class Model --- p.55
Chapter 4 --- Conclusions and Topics for Future Study --- p.60
Chapter 4.1 --- Thesis Conclusions --- p.60
Chapter 4.2 --- Future Work --- p.61
Chapter 4.2.1 --- Downlink and Uplink resource allocation in TDD --- p.61
Chapter 4.2.2 --- Resource Unit Packing in TDD --- p.62
Chapter 4.2.3 --- Other Topics --- p.62
Bibliography --- p.63
Αλεξίου, Αντώνιος Γ. "Σχεδιασμός και ανάλυση μηχανισμών για μετάδοση δεδομένων πραγματικού χρόνου σε κινητά δίκτυα επικοινωνιών." Thesis, 2006. http://nemertes.lis.upatras.gr/jspui/handle/10889/1420.
Full textAs communications technology is being developed, users’ demand for multimedia services raises. Meanwhile, the Internet has enjoyed tremendous growth in recent years. Consequently, there is a great interest in using the IP-based networks to provide multimedia services. One of the most important areas in which the issues are being debated, is the development of standards for the Universal Mobile Telecommunications System (UMTS). UMTS constitutes the third generation (3G) of cellular wireless networks which aims to provide high-speed data access along with real time voice calls. Wireless data is one of the major boosters of wireless communications and one of the main motivations of the next generation standards. The recent years, the usage of third generation cellular networks has begun to rise all over the world. These new infrastructures substitute the existed second generation cellular networks and offer broadband services to mobile users. Through the 3G mobile networks, the mobile users have the opportunity to run applications and realize services that offered until today only by wired networks. Such broadband services are mobile Internet, mobile TV, mobile gaming, mobile streaming, video calls etc. The main target of this dissertation is the study and the analysis of the mechanisms that are operated behind the above mentioned services and applications. More specifically, we analyze already existed mechanisms used for the transmission of real time services over 3G networks and furthermore we propose new mechanisms for the effective data transmission in 3G networks in terms of network performance and satisfaction of the mobile user. Generally, we consider two categories of mechanisms for the data transmission: • Mechanisms for point to point data transmission. • Mechanisms for point to multipoint data transmission. Regarding the first category of the mechanisms, in this dissertation, we analyze and propose mechanisms for real time data transmission in 3G networks. We focus firstly on schemes that reliable transmit the real time data to mobile users and secondly on mechanisms for adaptive multimedia transmission in UMTS. Bandwidth is a valuable and limited resource for UMTS and every wireless network, in general. Therefore, it is of extreme importance to exploit this resource in the most efficient way. It is essential for a wireless network to have an efficient bandwidth allocation scheme in order the mobile user to experience both real time applications and Internet applications such as HTTP or SMTP. Consequently, when a user experiences a real time application, there should be enough bandwidth available at any time for any other application that the mobile user might realize. In addition, when two different applications run together, the network should guarantee that there is no possibility for any of the above-mentioned applications to prevail against the other by taking all the available channel bandwidth. Taking into consideration the fact that Internet applications adopt mainly TCP as the transport protocol, while real time applications mainly use RTP, the network should guarantee that RTP does not prevail against the TCP traffic. Consequently, this means that there should be enough bandwidth available in the wireless channel for the Internet applications to run properly. To this direction, rate control of real time applications is an important issue in mobile networks. With the aid of rate control schemes the network could adapt the packet transmission rate of real time applications according to the current network conditions giving the opportunity to the mobile users to experience both real time and non real time applications at the same time in their mobile devices. Regarding the second category of the mechanisms, although UMTS networks offer high capacity, the expected demand will certainly overcome the available resources. Thus, the multicast transmission over the UMTS networks constitutes a challenge and an area of research. To this direction the third Generation Partnership Project (3GPP) is currently standardizing the Multimedia Broadcast/Multicast Service (MBMS) framework of UMTS. In this dissertation, we present a new mechanism for the efficient multicast data routing in UMTS. The proposed mechanism is enhanced with multicast group management functionality as well as with functionality related to the user mobility (handover and relocation). Furthermore, it is known that multicasting is more efficient method of supporting group communication than unicasting or broadcasting, as it allows transmission and routing of packets to multiple destinations using fewer network resources. In this dissertation, the three above mentioned methods of supporting group communication in UMTS are analyzed in terms of their performance. The critical parameters of primary interest for the evaluation of any method are the packet delivery cost and the scalability of the method. Finally, this dissertation analyses the role of power control in the multicast transmission in UMTS. It is proposed a power control scheme for the efficient radio bearer selection in MBMS. The choice of the most efficient transport channel in terms of power consumption is a key point for the MBMS since a wrong transport channel selection for the transmission of the MBMS data could result to a significant decrease in the total capacity of the system. Various UMTS transport channels are examined for the transmission of the multicast data and a new algorithm is proposed for the more efficient usage of power resources in the base station.