Stochastic Network Calculus


Book Description

Network calculus is a theory dealing with queuing systems found in computer networks. Its focus is on performance guarantees. Central to the theory is the use of alternate algebras such as the min-plus algebra to transform complex network systems into analytically tractable systems. To simplify the ana- sis, another idea is to characterize tra?c and service processes using various bounds. Since its introduction in the early 1990s, network calculus has dev- oped along two tracks—deterministic and stochastic. This book is devoted to summarizing results for stochastic network calculus that can be employed in the design of computer networks to provide stochastic service guarantees. Overview and Goal Like conventional queuing theory, stochastic network calculus is based on properly de?ned tra?c models and service models. However, while in c- ventional queuing theory an arrival process is typically characterized by the inter-arrival times of customers and a service process by the service times of customers, the arrival process and the service process are modeled in n- work calculus respectively by some arrival curve that (maybe probabilis- cally) upper-bounds the cumulative arrival and by some service curve that (maybe probabilistically) lower-bounds the cumulative service. The idea of usingboundstocharacterizetra?candservicewasinitiallyintroducedfor- terministic network calculus. It has also been extended to stochastic network calculus by exploiting the stochastic nature of arrival and service processes.




Deterministic Network Calculus


Book Description

Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its theoretical foundations to its implementations. The book is divided into three parts. The first part focuses on the (min,plus) framework and its algorithmic aspects. The second part defines the network calculus model and analyzes one server in isolation. Different service and scheduling policies are discussed, particularly when data is packetized. The third part is about network analyses. Pay burst only once and pay multiplexing only once phenomena are exhibited, and different analyses are proposed and compared. This includes the linear programming approaches that compute tight performance bounds. Finally, some partial results on the stability are detailed.




Network Traffic Engineering


Book Description

A comprehensive guide to the concepts and applications of queuing theory and traffic theory Network Traffic Engineering: Models and Applications provides an advanced level queuing theory guide for students with a strong mathematical background who are interested in analytic modeling and performance assessment of communication networks. The text begins with the basics of queueing theory before moving on to more advanced levels. The topics covered in the book are derived from the most cutting-edge research, project development, teaching activity, and discussions on the subject. They include applications of queuing and traffic theory in: LTE networks Wi-Fi networks Ad-hoc networks Automated vehicles Congestion control on the Internet The distinguished author seeks to show how insight into practical and real-world problems can be gained by means of quantitative modeling. Perfect for graduate students of computer engineering, computer science, telecommunication engineering, and electrical engineering, Network Traffic Engineering offers a supremely practical approach to a rapidly developing field of study and industry.




Quality of Service – IWQoS 2005


Book Description

We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany.




Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management


Book Description

The inadequate use of wireless spectrum resources has recently motivated researchers and practitioners to look for new ways to improve resource efficiency. As a result, new cognitive radio technologies have been proposed as an effective solution. The Handbook of Research on Software-Defined and Cognitive Radio Technologies for Dynamic Spectrum Management examines the emerging technologies being used to overcome radio spectrum scarcity. Providing timely and comprehensive coverage on topics pertaining to channel estimation, spectrum sensing, communication security, frequency hopping, and smart antennas, this research work is essential for use by educators, industrialists, and graduate students, as well as academicians researching in the field.




Measurement, Modelling and Evaluation of Dependable Computer and Communication Systems


Book Description

This book constitutes the proceedings of the 18th International GI/ITG Conference on Measurement, Modelling and Evaluation of Computing Systems and Dependability and Fault Tolerance, MMB & DFT 2016, held in Münster, Germany, in April 2016. The 12 full papers and 3 short papers included in this volume were carefully reviewed and selected from 23 submissions. The papers deal with the fields of performance evaluation, dependability, and fault-tolerance of computer and communication systems. A relatively new topic of smart grids is also covered.




NETWORKING 2006. Networking Technologies, Services, Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems


Book Description

Here are the refereed proceedings of the 5th International IFIP-TC6 Networking Conference, NETWORKING 2006. The 88 revised full papers and 31 poster papers are organized in topical sections on caching and content management, mobile ad-hoc networks, mobility/handoff, monitoring/measurements, multicast, multimedia, optical networks, peer-to-peer, resource management and QoS, routing, topology and location awareness, traffic engineering, transport protocols, wireless networks, and wireless sensor networks.




Communication Networking


Book Description

This book focuses "on the three building blocks of communication networking, namely, multiplexing, switching and routing. The approach is analytical, with the discussion being driven by mathematical analyses of and solutions to specfic engineering problems." - back cover.




Fractal Teletraffic Modeling and Delay Bounds in Computer Communications


Book Description

By deploying time series analysis, Fourier transform, functional analysis, min-plus convolution, and fractional order systems and noise, this book proposes fractal traffic modeling and computations of delay bounds, aiming to improve the quality of service in computer communication networks. As opposed to traditional studies of teletraffic delay bounds, the author proposes a novel fractional noise, the generalized fractional Gaussian noise (gfGn) approach, and introduces a new fractional noise, generalized Cauchy (GC) process for traffic modeling. Researchers and graduates in computer science, applied statistics, and applied mathematics will find this book beneficial. Ming Li, PhD, is a professor at Ocean College, Zhejiang University, and the East China Normal University. He has been an active contributor for many years to the fields of computer communications, applied mathematics and statistics, particularly network traffic modeling, fractal time series, and fractional oscillations. He has authored more than 200 articles and 5 monographs on the subjects. He was identified as the Most Cited Chinese Researcher by Elsevier in 2014–2020. Professor Li was recognized as a top 100,000 scholar in all fields in 2019–2020 and a top 2% scholar in the field of Numerical and Computational Mathematics in 2021 by Prof. John P. A. Ioannidis, Stanford University.




Mobile Internet Security


Book Description

This book constitutes the refereed proceedings of the 6th International Conference on Mobile Internet Security, MobiSec 2022, held in Jeju, South Korea, in December 15–17, 2022. The 24 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: ​5G advanced and 6G security; AI for security; cryptography and data security; cyber security; and IoT application and blockchain security.