摘要:
A resource scheduling and power allocation technique is provided for a LTE radio network integrated with femtocells. The technique utilizes a tri-phase approach that includes a stochastic geometric model of an exemplary radio network that generates a channel attenuation matrix for each channel at each PRB. A resource scheduling and power allocation procedure determines a near optimal assignment of mobile user to PRBs based on the channel attenuations, potential data rates, and transmit power subject to maximizing the data rates in accordance with a fairness objective. A discrete-event simulation procedure simulates the end-to-end transmission of the data packets in a packet-switch network in accordance with the assignments to analyze the behavior of the overall network.
摘要:
A resource scheduling and power allocation technique is provided for a LTE radio network integrated with femtocells. The technique utilizes a tri-phase approach that includes a stochastic geometric model of an exemplary radio network that generates a channel attenuation matrix for each channel at each PRB. A resource scheduling and power allocation procedure determines a near optimal assignment of mobile user to PRBs based on the channel attenuations, potential data rates, and transmit power subject to maximizing the data rates in accordance with a fairness objective. A discrete-event simulation procedure simulates the end-to-end transmission of the data packets in a packet-switch network in accordance with the assignments to analyze the behavior of the overall network.
摘要:
In a network that executes a link state routing protocol, a network node receives periodic disseminations of link state information from other network nodes. The link state information includes neighboring node identity and link cost metrics. The network node calculates the initial routing paths based on the received link state information by using a link state routing algorithm. It then adapts the calculated path based on both the current link state information and past link state information through a reinforcement learning process. The network node then selects a routing path to each destination node based on the adaptation and updates the routing table accordingly.
摘要:
Network management for providing and managing Quality of Service (QoS) in converged networks, and particularly management of bursty, short-lived data loads, in an opaque network where knowledge of or control over network elements is not required. Preferential treatment is provided to some subset of the network users that require better QoS assurances from the underlying network by applying probabilistic admission control decisions in conjunction with estimated network state provides improved performance for high priority data with bursty data loads.
摘要:
A method and apparatus for controlling ingress to a communications network to control quality of service is described. A request to admit a new communications flow is received. A polynomial and its coefficients representing a state of the network is determined and applied to the network state plus the new communications flow to determine whether admission of the new communications flow would cause the network to operate in a stable or unstable state. In response to determining that the network would operate in the unstable state, a communications flow for the ingress device is downgraded in its quality of service. By another approach, it is determined whether the new communications flow exceeds an allocated quota of bandwidth. Admission or rejection of the communications flow can be determined.
摘要:
The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.
摘要:
Methods and apparatus for detecting faults and restoring connections in networks including, e.g., ATM networks are described. The restoration methods of the present invention can be applied on an application by application or user by user basis. In accordance with the present invention virtual connections affected by link or node failures are restored through re-routing as opposed to establishing a completely new connection between a source and a destination device. VPI/VCI values are assigned at the time of re-routing thereby avoiding the potential problem of VPI/VCI exhaustion which may be encountered when backup VPI/VCI values are assigned at the time a communication session is initiated. The connection restoration process of the present invention is initiated by a node on the source side of a connection detecting a failure and initiating a re-routing operation or transmitting a message to the source switch to initiate a re-routing operation. A node on the destination device side of a failed connection is used for initiating the release of network resources reserved at the switches which were used as part of the no longer used path of the re-routed call. The destination device side node (switch) detecting a fault transmits a re-route release message to downstream switches. Restoration methods applicable to pre-planned hop-by-hop, pre-planned source routing and dynamic source routing embodiments are described. In one embodiment, ATM assured mode data transport operation on signaling channels is used to detect node and/or link failures.
摘要:
Network management for providing and managing Quality of Service (QoS) in converged networks, and particularly management of bursty, short-lived data loads, in an opaque network where knowledge of or control over network elements is not required. Preferential treatment is provided to some subset of the network users that require better QoS assurances from the underlying network by applying probabilistic admission control decisions in conjunction with estimated network state provides improved performance for high priority data with bursty data loads.
摘要:
The present invention, among other things, obviates the effects of an attack on a wireless network through appropriate isolation and recovery. An aspect of the present invention can include a system and method of isolating a victim of malicious behavior in a wireless access network, and in particular WLAN networks. By having software on the victim's device, the system provides the capability of recovering the victim from the effects of the intruder, and prevents the victim from being affected by subsequent attacks by the intruder. The preferred embodiments include two key components: a local monitor and a global monitor.
摘要:
Disclosed is a method and apparatus for improved self-healing in a mobile ad-hoc wireless network in which network communication functions are divided into a plurality of functional layers. The system utilizes cross-layer self-healing techniques. Network data from at least one of the functional layers is stored, for example in a storage unit of the network node. The stored network data is then used to modify the functioning of at least one of the other layers. In one embodiment, a management module manages the storage and use of the network data. In particular embodiments, the stored network data relates to successful transmission rates and/or clear channel rates, and this stored data is used to adjust the transmission power of the network node. In another embodiment, the stored data may be used to generate a table of interchangeable network nodes, which may then be used to reroute a data packet to a network node other than an originally specified destination node. In yet another embodiment, the stored data may be used to generate a list of recent neighbor nodes, which data may be used to reroute data packets to intermediate network nodes.