首页 > 最新文献

2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)最新文献

英文 中文
Neural network routing implementation using CUDA technology 利用CUDA技术实现神经网络路由
S. Zoican, R. Zoican, D. Galatchi
This paper presents an implementation of an algorithm for finding the routes based on neural network using the Computer Unified Device Architecture (CUDA) that exploits the parallel processing nature of neural networks. The purpose of this paper is to investigate the possibility of an efficient implementation of such algorithm and evaluate its performance (processing time to determine the route). The implementation is not affected by the network topology so it may be used in dynamic networks. The resources required are the usual ones in a personal computer equipped with CUDA graphics card. Comparing with a standard implementation using a personal computer, the obtained performance is about hundred times better using CUDA.
本文利用计算机统一设备体系结构(CUDA)利用神经网络的并行处理特性,实现了一种基于神经网络的路由查找算法。本文的目的是研究这种算法有效实现的可能性,并评估其性能(确定路由的处理时间)。该实现不受网络拓扑的影响,因此可以在动态网络中使用。所需的资源通常是配备CUDA图形卡的个人计算机中的资源。与使用个人计算机的标准实现相比,使用CUDA获得的性能提高了约100倍。
{"title":"Neural network routing implementation using CUDA technology","authors":"S. Zoican, R. Zoican, D. Galatchi","doi":"10.1109/TELSKS.2017.8246279","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246279","url":null,"abstract":"This paper presents an implementation of an algorithm for finding the routes based on neural network using the Computer Unified Device Architecture (CUDA) that exploits the parallel processing nature of neural networks. The purpose of this paper is to investigate the possibility of an efficient implementation of such algorithm and evaluate its performance (processing time to determine the route). The implementation is not affected by the network topology so it may be used in dynamic networks. The resources required are the usual ones in a personal computer equipped with CUDA graphics card. Comparing with a standard implementation using a personal computer, the obtained performance is about hundred times better using CUDA.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123131203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Security point of view of Asp.Net application 从安全的角度分析Asp。网络应用程序
M. Medenica, D. Dihovicni
In this paper are presented the methods for security maintaining a web application. Beside fundamental aspects of security of ASP.NET application, also are presented the actions which are necessary to achieve required security, as well as security approach of the code in NET framework. It is shown the user authentication, windows verifying authenticity, and protection by using configuration file. The analysis of the definition of the rules of identification or authorization is maintained by means of tools of WAT, and then it is shown the manner in which displays a login page.
本文介绍了web应用程序的安全维护方法。除了ASP安全的基本方面之外。NET应用程序,并给出了实现所需安全性所必需的操作,以及代码在。NET框架下的安全方法。介绍了用户身份验证、窗口真实性验证和配置文件保护。通过WAT工具维护对标识或授权规则定义的分析,然后展示登录页面的显示方式。
{"title":"Security point of view of Asp.Net application","authors":"M. Medenica, D. Dihovicni","doi":"10.1109/TELSKS.2017.8246310","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246310","url":null,"abstract":"In this paper are presented the methods for security maintaining a web application. Beside fundamental aspects of security of ASP.NET application, also are presented the actions which are necessary to achieve required security, as well as security approach of the code in NET framework. It is shown the user authentication, windows verifying authenticity, and protection by using configuration file. The analysis of the definition of the rules of identification or authorization is maintained by means of tools of WAT, and then it is shown the manner in which displays a login page.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131988185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Controlled coefficient adaptation in linearization of PA by modified baseband signal 修正基带信号在扩频线性化中的控制系数自适应
A. Atanasković, N. M. Ilić, Aleksandra Đorić
This paper presents the linearization of RF Doherty amplifier by the baseband signals for linearization whose adjustable parameters are adapted on required values in automated process. The signal for linearization is generated by digitally processing of I and Q components of the useful baseband signal forming in that manner the adequate second-order nonlinear signal required for linearization. The signals for linearization modified in amplitude and phase in the baseband modulate the fundamental carrier second harmonic and modulated signals are injected at the input and output of the transistor into the carrier cell of the Doherty configuration. DSP should adjust the amplitude and phase of the baseband signals for linearization in order to supress the third- and fifth-order intermodulation products. Process of the linearization coefficient setting and adaptation is performed automatically by minimizing power of the intermodulation products. The linearization results and effects of the linearization parameter adjustment and adaptation are considered for quadrature amplitude modulated signals characterized with different bandwidth up to 30 MHz, as well as for WCDMA and OFDM digitally modulated signals.
本文提出了一种利用基带信号对射频多尔蒂放大器进行线性化的方法。用于线性化的信号是通过对有用基带信号的I和Q分量进行数字处理产生的,以这种方式形成线性化所需的足够的二阶非线性信号。在基带中修改幅度和相位用于线性化的信号调制基载波二次谐波,调制信号在晶体管的输入和输出处注入Doherty结构的载波单元。为了抑制三阶和五阶互调产物,DSP应该对基带信号的幅度和相位进行线性化调整。线性化系数的设定和自适应过程是通过最小化互调产物的功率来自动完成的。对30mhz以下不同带宽的正交调幅信号以及WCDMA和OFDM数字调制信号的线性化结果和线性化参数调整与自适应的影响进行了研究。
{"title":"Controlled coefficient adaptation in linearization of PA by modified baseband signal","authors":"A. Atanasković, N. M. Ilić, Aleksandra Đorić","doi":"10.1109/TELSKS.2017.8246297","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246297","url":null,"abstract":"This paper presents the linearization of RF Doherty amplifier by the baseband signals for linearization whose adjustable parameters are adapted on required values in automated process. The signal for linearization is generated by digitally processing of I and Q components of the useful baseband signal forming in that manner the adequate second-order nonlinear signal required for linearization. The signals for linearization modified in amplitude and phase in the baseband modulate the fundamental carrier second harmonic and modulated signals are injected at the input and output of the transistor into the carrier cell of the Doherty configuration. DSP should adjust the amplitude and phase of the baseband signals for linearization in order to supress the third- and fifth-order intermodulation products. Process of the linearization coefficient setting and adaptation is performed automatically by minimizing power of the intermodulation products. The linearization results and effects of the linearization parameter adjustment and adaptation are considered for quadrature amplitude modulated signals characterized with different bandwidth up to 30 MHz, as well as for WCDMA and OFDM digitally modulated signals.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134477386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An overview of current security and privacy issues in modern telecommunications 当前的安全和隐私问题在现代电信的概述
A. Jevremović, M. Veinovic, G. Shimic
The main challenge in the 20th century was to provide secure telecommunication services to professional users (military, police, security services, etc.) and to provide basic access to telecommunication services to private users (individuals and business organizations). A high level of security for private users was not important for many reasons: low risk, low performance devices, low level of technical knowledge, etc. In the 21st century, we have witnessed significant changes in this field. In the last few years, the real capabilities of government agencies became apparent in the field of information security, showning themselves to be woefully lacking, and failing to adequately respond to new challenges. The trend of moving security services focus to mass surveillance, combined with the inability to keep these functions solely in the hands of authorized agencies, is concerning. For private users, an even more serious transformation is happening. The number of people using telecommunication services is rapidly growing, as well as the intensity of using these services. That also implies the reduction of the average technical knowledge of users, which further requires simplified user interfaces for these services. Additionally, the value of the content in these communications is growing and becoming more complex. To survive in the market, the companies that produce telecommunication devices are forced to introduce new features as quickly as possible. The security aspect is, in most cases, seriously considered only after serious incidents occur. Additionally, those companies sometime intentionally break user's privacy and security in order to attain a better position in the market, and to increase their profit, alone or in cooperation with government security services. In this paper we tried to make an overview of the current state in the aforementioned security aspects, and to refer readers to current problems.
20世纪的主要挑战是为专业用户(军事,警察,安全服务等)提供安全的电信服务,并为私人用户(个人和商业组织)提供基本的电信服务接入。私人用户的高级别安全性并不重要,原因有很多:低风险、低性能设备、低技术知识水平等。进入21世纪,我们目睹了这一领域的重大变化。在过去的几年里,政府机构在信息安全领域的真正能力变得明显,显示出他们严重缺乏,未能充分应对新的挑战。将安全服务的重点转移到大规模监视的趋势,加上无法将这些职能完全掌握在授权机构手中,令人担忧。对于私人用户来说,更严重的转变正在发生。使用电信服务的人数正在迅速增加,使用这些服务的强度也在迅速增加。这也意味着用户平均技术知识的减少,这进一步要求为这些服务简化用户界面。此外,这些通信内容的价值正在增长,变得越来越复杂。为了在市场上生存,生产电信设备的公司被迫尽快推出新功能。在大多数情况下,安全方面只有在发生严重事件后才会认真考虑。此外,这些公司有时会故意破坏用户的隐私和安全,以获得更好的市场地位,并增加他们的利润,单独或与政府安全部门合作。在本文中,我们试图对上述安全方面的现状进行概述,并为读者提供当前存在的问题。
{"title":"An overview of current security and privacy issues in modern telecommunications","authors":"A. Jevremović, M. Veinovic, G. Shimic","doi":"10.1109/TELSKS.2017.8246243","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246243","url":null,"abstract":"The main challenge in the 20th century was to provide secure telecommunication services to professional users (military, police, security services, etc.) and to provide basic access to telecommunication services to private users (individuals and business organizations). A high level of security for private users was not important for many reasons: low risk, low performance devices, low level of technical knowledge, etc. In the 21st century, we have witnessed significant changes in this field. In the last few years, the real capabilities of government agencies became apparent in the field of information security, showning themselves to be woefully lacking, and failing to adequately respond to new challenges. The trend of moving security services focus to mass surveillance, combined with the inability to keep these functions solely in the hands of authorized agencies, is concerning. For private users, an even more serious transformation is happening. The number of people using telecommunication services is rapidly growing, as well as the intensity of using these services. That also implies the reduction of the average technical knowledge of users, which further requires simplified user interfaces for these services. Additionally, the value of the content in these communications is growing and becoming more complex. To survive in the market, the companies that produce telecommunication devices are forced to introduce new features as quickly as possible. The security aspect is, in most cases, seriously considered only after serious incidents occur. Additionally, those companies sometime intentionally break user's privacy and security in order to attain a better position in the market, and to increase their profit, alone or in cooperation with government security services. In this paper we tried to make an overview of the current state in the aforementioned security aspects, and to refer readers to current problems.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132423768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced antennas for next generation wireless access 下一代无线接入的先进天线
B. Jokanović, V. Milosevic, M. Radovanovic, N. Bošković
Millimeter wave multibeam antennas are a key technology for enabling beamforming and massive multiple-input multiple-output (MIMO) infrastructure for the fifth generation wireless access (5G). They have attracted a great research attention nowadays and have been intensively investigated in order to achieve previously unattainable system performances. Here we present an overview of the recent advances in multibeam antenna designs based on reflectors, lenses and beamforming networks. We have discussed their principle of operation, design and implementation as well as suitability for the future 5G massive MIMO systems.
毫米波多波束天线是实现第五代无线接入(5G)的波束形成和大规模多输入多输出(MIMO)基础设施的关键技术。它们现在已经引起了很大的研究关注,并已经深入研究,以实现以前无法实现的系统性能。本文概述了基于反射器、透镜和波束形成网络的多波束天线设计的最新进展。我们讨论了它们的工作原理、设计和实现以及对未来5G大规模MIMO系统的适用性。
{"title":"Advanced antennas for next generation wireless access","authors":"B. Jokanović, V. Milosevic, M. Radovanovic, N. Bošković","doi":"10.1109/TELSKS.2017.8246235","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246235","url":null,"abstract":"Millimeter wave multibeam antennas are a key technology for enabling beamforming and massive multiple-input multiple-output (MIMO) infrastructure for the fifth generation wireless access (5G). They have attracted a great research attention nowadays and have been intensively investigated in order to achieve previously unattainable system performances. Here we present an overview of the recent advances in multibeam antenna designs based on reflectors, lenses and beamforming networks. We have discussed their principle of operation, design and implementation as well as suitability for the future 5G massive MIMO systems.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Multimedia broadcasting in multi-access edge computing 多址边缘计算中的多媒体广播
E. Pencheva
Multi-access Edge Computing (MEC) provides an environment with distributed cloud capabilities in the Radio Access Network. The vicinity to end users enables deployment of optimized services with minimum latency and location-based multimedia broadcasting. This paper studies functional aspects of deployment of Parlay X message broadcast Web Service in MEC environment.
多接入边缘计算(MEC)在无线接入网中提供了具有分布式云功能的环境。由于靠近最终用户,因此可以部署延迟最小的优化服务和基于位置的多媒体广播。本文研究了在MEC环境下部署Parlay X消息广播Web服务的功能方面。
{"title":"Multimedia broadcasting in multi-access edge computing","authors":"E. Pencheva","doi":"10.1109/TELSKS.2017.8246227","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246227","url":null,"abstract":"Multi-access Edge Computing (MEC) provides an environment with distributed cloud capabilities in the Radio Access Network. The vicinity to end users enables deployment of optimized services with minimum latency and location-based multimedia broadcasting. This paper studies functional aspects of deployment of Parlay X message broadcast Web Service in MEC environment.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133956960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Consideration of TLM modelling on example of cylindrical rectangular microstrip antenna 圆柱矩形微带天线实例TLM建模的考虑
T. Dimitrijević, J. Joković, N. Dončov, B. Milovanovic, M. Kostić
This paper deals with TLM modelling issues mostly pertaining to create the model, mesh adjustments, and simulation efficiency on an example of a cylindrical-rectangular coax-fed microstrip patch antenna. Possibilities, advantages, and limitations of the TLM solvers based on cylindrical and rectangular coordinate systems are investigated through simulations and discussed in detail.
本文以圆柱矩形同轴馈电微带贴片天线为例,讨论了TLM模型的建立、网格调整和仿真效率等问题。通过仿真研究了基于圆柱坐标系和直角坐标系的TLM求解方法的可能性、优点和局限性。
{"title":"Consideration of TLM modelling on example of cylindrical rectangular microstrip antenna","authors":"T. Dimitrijević, J. Joković, N. Dončov, B. Milovanovic, M. Kostić","doi":"10.1109/TELSKS.2017.8246299","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246299","url":null,"abstract":"This paper deals with TLM modelling issues mostly pertaining to create the model, mesh adjustments, and simulation efficiency on an example of a cylindrical-rectangular coax-fed microstrip patch antenna. Possibilities, advantages, and limitations of the TLM solvers based on cylindrical and rectangular coordinate systems are investigated through simulations and discussed in detail.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132698544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forward-wave 0 dB directional coupler based on microstrip-ridge gap waveguide technology 基于微带脊隙波导技术的前向波0 dB定向耦合器
S. Birgermajer, N. Janković, V. Crnojević-Bengin, M. Bozzi, V. Radonić
In this paper, we propose a novel 0 dB forward-wave coupler realized in microstrip-ridge gap waveguide technology. The coupler is based on two microstrip-ridges coupled through an array of mushroom inclusions. A detailed design procedure is presented including the design of the hosting PMC structure, microstrip-ridge and the coupler. The proposed structure represents the first forward-wave coupler realized in gap waveguide technology. It is characterized by high coupling level of 0.3 dB at 13.54 GHz, and the 0.48 dB coupling variance over the bandwidth of 26%. Also, good performances in terms of the isolation and directivity have been achieved.
本文提出了一种利用微带脊隙波导技术实现的新型0 dB正向耦合器。该耦合器基于通过蘑菇内含物阵列耦合的两个微带脊。详细介绍了主PMC结构、微带脊和耦合器的设计过程。该结构是第一个在间隙波导技术中实现的前向波耦合器。其特点是在13.54 GHz时具有0.3 dB的高耦合电平,在带宽范围内的耦合方差为0.48 dB,为26%。此外,在隔离性和指向性方面也取得了良好的性能。
{"title":"Forward-wave 0 dB directional coupler based on microstrip-ridge gap waveguide technology","authors":"S. Birgermajer, N. Janković, V. Crnojević-Bengin, M. Bozzi, V. Radonić","doi":"10.1109/TELSKS.2017.8246252","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246252","url":null,"abstract":"In this paper, we propose a novel 0 dB forward-wave coupler realized in microstrip-ridge gap waveguide technology. The coupler is based on two microstrip-ridges coupled through an array of mushroom inclusions. A detailed design procedure is presented including the design of the hosting PMC structure, microstrip-ridge and the coupler. The proposed structure represents the first forward-wave coupler realized in gap waveguide technology. It is characterized by high coupling level of 0.3 dB at 13.54 GHz, and the 0.48 dB coupling variance over the bandwidth of 26%. Also, good performances in terms of the isolation and directivity have been achieved.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115619817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Flexible C-RAN: Radio technology for 5G 灵活的C-RAN: 5G无线技术
L. Gavrilovska, V. Rakovic, Aleksandar Ichkov, Davor Todorovski, Simona Marinova
Conventional radio access networks are designed to utilize static configuration and are statically deployed. As results they are inefficient in handling any spatio-temporal fluctuations of the underlying traffic demand. Cloud-RAN represents a novel centralized technology based on softwareization and virtualization technology that can efficiently address the problems of legacy networks. Cloud-RAN facilitates high data rates as well as high network and radio adaptability across the software defined wireless networks. This paper elaborates the CRAN concept providing overview of current status, relevant features and research challenges related to it. Moreover, the paper presents a developed demo platform capable of efficient virtualization of different types of wireless technologies that belong to a heterogeneous wireless environment. It utilizes commercial and open-source solutions, such as OpenStack and SDR software. The performance analysis highlights the behavior of GSM and LTE technologies, with respect to cloud resource allocation. The paper also discusses some aspects and technical requirements for a C-RAN based dynamical resource allocation.
传统的无线接入网被设计为利用静态配置并静态部署。因此,它们在处理潜在交通需求的时空波动方面效率低下。Cloud-RAN代表了一种基于软件化和虚拟化技术的新型集中式技术,可以有效地解决遗留网络的问题。Cloud-RAN促进了跨软件定义无线网络的高数据速率以及高网络和无线电适应性。本文阐述了CRAN的概念,概述了CRAN的现状、相关特点和研究挑战。此外,本文还提出了一个开发的演示平台,能够有效地虚拟化属于异构无线环境的不同类型的无线技术。它利用商业和开源解决方案,如OpenStack和SDR软件。性能分析强调了GSM和LTE技术在云资源分配方面的行为。本文还讨论了基于C-RAN的动态资源分配的一些方面和技术要求。
{"title":"Flexible C-RAN: Radio technology for 5G","authors":"L. Gavrilovska, V. Rakovic, Aleksandar Ichkov, Davor Todorovski, Simona Marinova","doi":"10.1109/TELSKS.2017.8246276","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246276","url":null,"abstract":"Conventional radio access networks are designed to utilize static configuration and are statically deployed. As results they are inefficient in handling any spatio-temporal fluctuations of the underlying traffic demand. Cloud-RAN represents a novel centralized technology based on softwareization and virtualization technology that can efficiently address the problems of legacy networks. Cloud-RAN facilitates high data rates as well as high network and radio adaptability across the software defined wireless networks. This paper elaborates the CRAN concept providing overview of current status, relevant features and research challenges related to it. Moreover, the paper presents a developed demo platform capable of efficient virtualization of different types of wireless technologies that belong to a heterogeneous wireless environment. It utilizes commercial and open-source solutions, such as OpenStack and SDR software. The performance analysis highlights the behavior of GSM and LTE technologies, with respect to cloud resource allocation. The paper also discusses some aspects and technical requirements for a C-RAN based dynamical resource allocation.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Load balanced Birkhoff-von Neumann switch with output congestion detection 具有输出拥塞检测的负载均衡Birkhoff-von Neumann开关
Srdjan Durkovic, Zoran Čiča
The development of new services and increase of the number of users lead to the Internet traffic growth. In order to efficiently keep up with the Internet growth, packet switches must improve their performances in order to support increased amount of traffic at greater speeds. One of the most popular packet switch solutions are Load-Balanced Birkhoff-von Neumann (LB-BvN) packet switches, because of their very simple hardware implementation. Packet switches should also support fair service of user flows during the temporary congestion in the network. In this paper, we propose a novel switch based on the LB-BvN architecture that achieves better performance in terms of fair service compared to existing LB-BvN switches. The proposed switch is compared to other LB-BvN based switches, in terms of average packet delay and fair service.
新业务的开发和用户数量的增加导致互联网流量的增长。为了有效地跟上互联网的增长,分组交换机必须改进其性能,以便以更高的速度支持增加的通信量。最流行的分组交换机解决方案之一是负载均衡伯克霍夫-冯诺伊曼(LB-BvN)分组交换机,因为它们的硬件实现非常简单。分组交换机还应在网络临时拥塞期间支持用户流的公平服务。在本文中,我们提出了一种基于LB-BvN架构的新型交换机,与现有的LB-BvN交换机相比,它在公平服务方面实现了更好的性能。与其他基于LB-BvN的交换机在平均分组延迟和公平服务方面进行了比较。
{"title":"Load balanced Birkhoff-von Neumann switch with output congestion detection","authors":"Srdjan Durkovic, Zoran Čiča","doi":"10.1109/TELSKS.2017.8246281","DOIUrl":"https://doi.org/10.1109/TELSKS.2017.8246281","url":null,"abstract":"The development of new services and increase of the number of users lead to the Internet traffic growth. In order to efficiently keep up with the Internet growth, packet switches must improve their performances in order to support increased amount of traffic at greater speeds. One of the most popular packet switch solutions are Load-Balanced Birkhoff-von Neumann (LB-BvN) packet switches, because of their very simple hardware implementation. Packet switches should also support fair service of user flows during the temporary congestion in the network. In this paper, we propose a novel switch based on the LB-BvN architecture that achieves better performance in terms of fair service compared to existing LB-BvN switches. The proposed switch is compared to other LB-BvN based switches, in terms of average packet delay and fair service.","PeriodicalId":206778,"journal":{"name":"2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127509168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 13th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1