共查询到17条相似文献,搜索用时 62 毫秒
1.
2.
在移动自组织网络(MANET)组成的泛在末梢环境下,由于终端能力有限及网络拓扑的动态变化,无法保证持续高质量的异构业务。该文提出一种基于动态备用的业务应急机制,实现备用指标函数的构建和业务修复策略的设计,包括业务发现、业务选择和业务维护3个阶段。首先,该文综合终端个体能力、协同能力及终端移动性预测,抽象出备用指标函数模型。其次,针对业务选择阶段提出基于时间预测算法(TPA)来构建稳健的业务执行及备用的终端集合。再次,针对业务维护过程的失效,提出全局备用算法(GBA)来动态维持业务的持续性。最后,通过仿真表明在该机制作用下,业务中断次数少于基于动态监督器的业务恢复方法(DMBSRS)和冷备用业务替代策略(CBSRS)约30%~45%和14%~28%,在效益方面分别高于这两者约10%~40%和0%~25%,同时具有最小重启时间,由此证明该机制具有较优的效率。 相似文献
3.
4.
未来的无线接入技术的异构性使得终端向着可重构的方向发展,而个人周边的智能设备逐渐增多,成为未来移动业务不可忽视的一部分,两者的结合将引出一种新的重构方式,通过个人周边智能设备的协同工作,构成一个分布式的终端系统,不仅能够适应不同接入网的变化,而且能更充分地利用个人周边智能设备的业务能力,为用户提供更佳业务体验。 相似文献
5.
6.
面向业务的多终端动态协同构造机制 总被引:1,自引:0,他引:1
在MANET组成的泛在末梢环境中,网络的时变性和终端能力的有限性无法保证持续性的高质量异构业务。该文首先定义了通用的泛在个性化业务模型,并提出了综合业务上下文信息的多终端协同问题;在此基础上,提出了基于启发式的多终端协同构造机制,实现执行业务终端集合的构造,包括业务发起、多终端协同构造和质量监测3部分;最后,通过OPNET和MATLAB仿真,在支持差异性业务的同时,丢包率较动态嵌入式任务任播(DTA)提高了3%~17%,达到了面向业务的终端任播(SDA)相同的水平,并且在能耗方面相对于前两者节约了0%~20%,同时缩短了业务重启过程的时间,由此证明该机制具有较优的效率。 相似文献
7.
8.
9.
在融合多种异构网络的泛在网络中,网络需要实时地发布、发现、聚合和适配多样的个性化业务。个性化业务动态合成能快速搜索合适业务组件进行协同工作以满足丰富多彩的用户体验。本文首先基于SOA架构对业务合成进行建模.然后引入由调用监控器、业务路由器、业务发现器和接口适配器四部分组成的基于用户活动的动态业务融合管理器,并对其内部的各个功能模块进行了具体的说明分析,最后设计场景描述了个性化业务动态合成的工作流程。 相似文献
10.
11.
An approach to make heterogeneous devices cooperate with each other to provide ubiquitous service remains a longstanding challenge in ubiquitous environments. In addition, when multi-user request ubiquitous services simultaneously, the arbitrariness in resource allocation process easily leads to non-equilibrium of qualities of multi- user's services. Thus, How to design an effective heterogeneous devices cooperation mechanism that meet the QoS requirements and also equilibrate QoS among multi-user's services becomes a very tough problem. In the paper, Equilibrium Index and Theil Utility function are imported to establish a multi- device equilibrium cooperation model, which is benefit for resource allocation in ubiquitous environments. Then a Theil-Equilibrium based Cooperation Mechanism for multi-service is proposed. Firstly, in order to simplify calculating, a dimensionless processing is introduced. After that, a cooperation approach with Theil-Utility Heuristic algorithm is designed to choose the best solution for the simplified model. At last, the mechanism is simulated in a smart home scenario. The simulation results show that this mechanism outperforms non-equilibrium method by improving almost 40% in internal equilibrium with just reducing 0-2% in the total utility of all the requested ubiquitous services. These data show that the proposed mechanism performs well in equilibrating qualities of multi-user's ubiquitous services. 相似文献
12.
Liansheng Tan Zhongxun Zhu Wei Zhang Gong Chen 《International Journal of Communication Systems》2014,27(11):2642-2657
Optimization theory and nonlinear programming method have successfully been applied into wire‐lined networks (e.g., the Internet) in developing efficient resource allocation and congestion control schemes. The resource (e.g., bandwidth) allocation in a communication network has been modeled into an optimization problem: the objective is to maximize the source aggregate utility subject to the network resource constraint. However, for wireless networks, how to allocate the resource among the soft quality of service (QoS) traffic remains an important design challenge. Mathematically, the most difficult comes from the non‐concave utility function of soft QoS traffic in the network utility maximization (NUM) problem. Previous result on this problem has only been able to find its sub‐optimal solution. Facing this challenge, this paper establishes some key theorems to find the optimal solution and then present a complete algorithm called utility‐based allocation for soft QoS to obtain the desired optimal solution. The proposed theorems and algorithm act as designing guidelines for resource allocation of soft QoS traffic in a wireless network, which take into account the total available resource of network, the users’ traffic characteristics, and the users’ channel qualities. By numerical examples, we illustrate the explicit solution procedures.Copyright © 2013 John Wiley & Sons, Ltd. 相似文献
13.
针对目前相控阵雷达网目标分配模型中约束条件构建不合理以及求解算法性能不高的问题,该文构建了基于服务质量(QoS)的雷达网目标分配模型,并提出基于强凹曲线逼近的模型求解算法。通过QoS模型中资源空间、环境空间的建立准确描述雷达的资源限制以及雷达与目标的可见性约束;通过库恩-塔克(KKT)条件推导出QoS模型最优解存在的充分条件,利用2维快速遍历方法逼近得到强凹函数曲线,最后对每个目标强凹曲线中的操作设定点进行逐步迭代得出优化分配方案。仿真结果表明:模型能够有效完成雷达网任务分配,且所提模型求解算法相比典型的智能搜索算法有更好的性能。 相似文献
14.
Morteza Arjmandpanah‐Kalat Dariush Abbasinezhad‐Mood Hamid‐Reza Mahrooghi Sobhan Aliabadi 《International Journal of Communication Systems》2020,33(9)
Network security is a major challenge for big and small companies. The Internet topology is vulnerable to Distributed Denial of Service (DDoS) attacks as it provides an opportunity to an attacker to send a large volume of traffic to a victim, which can limit its Internet availability. The main problem in the prevention of the DDoS attack, also known as the flooding attack, is how to find the source of traffic flooding. This is because the spoofed source Internet protocol (IP) address of packets is not affected on its routing. As a result, IP traceback techniques are proposed to find the source of attack and in general, to find the source of any packet. Doing so, the IP traceback techniques can help us to prevent the Denial of Service (DoS) and DDoS attacks. In this paper, we propose an efficient Single Flow IP Traceback (SFT) technique in the Autonomous System (AS) level. Furthermore, a path signature generation algorithm is presented for detecting and filtering the spoofed traffic. Our solution assumes a secure Border Gateway Protocol (BGP)‐routing infrastructure for exchanging authenticated messages in order to learn the path signatures, and it uses a marking algorithm in the flow level for transmission of the traceback messages. Because in our technique less bits are required to mark the IP header packet, the required storage space for any unique path to the victim is significantly decreased. Compared with the other existing techniques, the obtained results demonstrate that our technique has the least marking rate, overhead processing on the middle nodes, and destination's computational cost while offering the highest accuracy in tracebacking attack. 相似文献
15.
Overview on Technical Issues for Future Mobile Network and a Proposal of DLC Scheme in Wireless Link
This paper gives an overview on technical issues for future mobile networks. the QoS control for multimedia services, security function, expansion of network capacity, expansion of address space, multicast function, radio link quality and mobility control of terminals are taken up as technical issues.Then, a novel DLC scheme in wireless link named EREP-ARQ (Estimation and Report of Error Pattern ARQ) which can reduce the retransmission ratio is proposed. In this scheme, error pattern generated in the radio link is estimated at the receiver side and the estimated error pattern is returned to the transmission side. If the estimation is correct, no retransmission is needed. Compared to conventional SR-ARQ, throughput can be improved by17% and Cell Loss Ratio (or Packet Loss Rate) can be reduced to less than 1/10 by the proposed EREP-ARQ. 相似文献
16.
As the bandwidth capacity of WDM networks continues to grow rapidly,traffic loss caused by a failure of network components is becoming unacceptable. To prevent such traffic loss and thus enhance network reliability, a protection method that prepares backup lightpaths for each working path is now being developed. In this paper, we first introduce the concept of QoR (quality of reliability), which is a realization of QoS with respect to the reliability needed in a WDM network. We define QoR in terms of the recovery time from when a failure occurs to when traffic on the affected primary lightpath is switched to the backup lightpath. After that, we propose a heuristic algorithm that can be used to design a logical topology that satisfies the QoR requirement for every node pair. The objective is to minimize the number of wavelengths needed for a fiber in the logical topology to carry the traffic with the required QoR. We compare this algorithm with two existing algorithms and show that it enables more effective use of wavelength resources; with the proposed algorithm, up to 25% fewer wavelengths are needed than with the other algorithms. 相似文献
17.
Oliver W. W. Yang H. T. Mouftah C. P. Ko 《International Journal of Communication Systems》1995,8(3):203-218
The leaky bucket is a popular method that can regulate traffic into an ATM broadband network. This paper examines a simple but innovative modification that would also provide priority to access the network. This is done by requiring cells of different classes to obtain different numbers of tokens before receiving their services. As a step further, a dynamic scheme can be used in which the tokens allocated to each class are changed according to the traffic load. Performance evaluations of mean cell delays and cell loss probabilities are obtained to provide insight into the behaviour of the system and to provide guideline for furture design. 相似文献