84 resultados para memory-based networks
em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain
Resumo:
In this paper, we define a new scheme to develop and evaluate protection strategies for building reliable GMPLS networks. This is based on what we have called the network protection degree (NPD). The NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability, and an a posteriori evaluation, the failure impact degree (FID), which determines the impact on the network in case of failure, in terms of packet loss and recovery time. Having mathematical formulated these components, experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms in order to offer a certain degree of protection
Resumo:
In networks with small buffers, such as optical packet switching based networks, the convolution approach is presented as one of the most accurate method used for the connection admission control. Admission control and resource management have been addressed in other works oriented to bursty traffic and ATM. This paper focuses on heterogeneous traffic in OPS based networks. Using heterogeneous traffic and bufferless networks the enhanced convolution approach is a good solution. However, both methods (CA and ECA) present a high computational cost for high number of connections. Two new mechanisms (UMCA and ISCA) based on Monte Carlo method are proposed to overcome this drawback. Simulation results show that our proposals achieve lower computational cost compared to enhanced convolution approach with an small stochastic error in the probability estimation
Resumo:
This paper studies the role coworker-based networks play for individual labour marketoutcomes. I analyse how the provision of labour market relevant information by formercoworkers affects the employment probabilities and, if hired, the wages of male workerswho have previously become unemployed as the result of an establishment closure. Toidentify the causal effect of an individual worker's network on labour market outcomes, Iexploit exogenous variation in the strength of these networks that is due to the occurrenceof mass-layoffs in the establishments of former coworkers. The empirical analysis is basedon administrative data that comprise the universe of workers employed in Germany between1980 and 2001. The results suggest a strong positive effect of a higher employmentrate in a worker's network of former coworkers on his re-employment probability afterdisplacement: a 10 percentage point increase in the prevailing employment rate in thenetwork increases the re-employment probability by 7.5 percentage points. In contrast,there is no evidence of a statistically significant effect on wages.
Resumo:
IP based networks still do not have the required degree of reliability required by new multimedia services, achieving such reliability will be crucial in the success or failure of the new Internet generation. Most of existing schemes for QoS routing do not take into consideration parameters concerning the quality of the protection, such as packet loss or restoration time. In this paper, we define a new paradigm to develop new protection strategies for building reliable MPLS networks, based on what we have called the network protection degree (NPD). This NPD consists of an a priori evaluation, the failure sensibility degree (FSD), which provides the failure probability and an a posteriori evaluation, the failure impact degree (FID), to determine the impact on the network in case of failure. Having mathematical formulated these components, we point out the most relevant components. Experimental results demonstrate the benefits of the utilization of the NPD, when used to enhance some current QoS routing algorithms to offer a certain degree of protection
Resumo:
This paper presents a new charging scheme for cost distribution along a point-to-multipoint connection when destination nodes are responsible for the cost. The scheme focus on QoS considerations and a complete range of choices is presented. These choices go from a safe scheme for the network operator to a fair scheme to the customer. The in-between cases are also covered. Specific and general problems, like the incidence of users disconnecting dynamically is also discussed. The aim of this scheme is to encourage the users to disperse the resource demand instead of having a large number of direct connections to the source of the data, which would result in a higher than necessary bandwidth use from the source. This would benefit the overall performance of the network. The implementation of this task must balance between the necessity to offer a competitive service and the risk of not recovering such service cost for the network operator. Throughout this paper reference to multicast charging is made without making any reference to any specific category of service. The proposed scheme is also evaluated with the criteria set proposed in the European ATM charging project CANCAN
Resumo:
This paper proposes an heuristic for the scheduling of capacity requests and the periodic assignment of radio resources in geostationary (GEO) satellite networks with star topology, using the Demand Assigned Multiple Access (DAMA) protocol in the link layer, and Multi-Frequency Time Division Multiple Access (MF-TDMA) and Adaptive Coding and Modulation (ACM) in the physical layer.
Resumo:
We have investigated the different contributions to the entropy change at the martensitic transition of different families of Cu-based shape-memory alloys. The total entropy change has been obtained through calorimetric measurements. By measuring the evolution of the magnetic susceptibility with temperature, the entropy change associated with conduction electrons has been evaluated. The contribution of the anharmonic vibrations of the lattice has also been estimated using various parameters associated with the anharmonic behavior of these alloys, collected from the literature. The results found in the present work have been compared to values published for the martensitic transition of group-IV metals. For Cu-based alloys, both electron and anharmonic contributions have been shown to be much smaller than the overall entropy change. This finding demonstrates that the harmonic vibrations of the lattice are the most relevant contribution to the stability of the bcc phase in Cu-based alloys.
Resumo:
Experimental data from ultrasonic and inelastic neutron scattering measurements are analyzed for different families of Cu-based shape-memory alloys. It is shown that the transition occurs at a value, independent of composition and alloy family, of the ratio between the elastic constants associated with the two shears necessary to accomplish the lattice distortion from the bcc to the close-packed structure. The zone boundary frequency of the TA2[110] branch evaluated at the transition point (TM), weakly depends, for each family, on composition. A linear relationship between this frequency and the inverse of the elastic constant C', both quantities evaluated at TM, has been found, in agreement with the prediction of a Landau model proposed for martensitic transformations.
Resumo:
We propose a class of models of social network formation based on a mathematical abstraction of the concept of social distance. Social distance attachment is represented by the tendency of peers to establish acquaintances via a decreasing function of the relative distance in a representative social space. We derive analytical results (corroborated by extensive numerical simulations), showing that the model reproduces the main statistical characteristics of real social networks: large clustering coefficient, positive degree correlations, and the emergence of a hierarchy of communities. The model is confronted with the social network formed by people that shares confidential information using the Pretty Good Privacy (PGP) encryption algorithm, the so-called web of trust of PGP.
Resumo:
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
Resumo:
Peer-reviewed
Resumo:
Aquest projecte es basa en l'estudi de l'oferiment de qualitat de servei en xarxes wireless i satel·litals. Per això l'estudi de les tècniques de cross-layer i del IEEE 802.11e ha sigut el punt clau per al desenvolupament teòric d’aquest estudi. Usant el simulador de xarxes network simulator, a la part de simulacions es plantegen tres situacions: l'estudi de la xarxa satel·lital, l'estudi del mètode d'accés HCCA i la interconnexió de la xarxa satel·lital amb la wireless. Encara que aquest últim punt, incomplet en aquest projecte, ha de ser la continuació per a futures investigacions.