Video-Aware Scheduling and Caching in the Radio [NS2project]

WITH the worldwide growth in the adoption of smartphones and tablets, access to Internet video and video applications from mobile devices is projected to grow very significantly . When Internet video is accessed by a mobile device, the video must be Video-Aware Scheduling and Caching in the Radio fetched from the servers of a Content Delivery Network (CDN) . CDNs help reduce Internet bandwidth consumption and associated delay/jitter, but the video must additionally travel through the wireless carrier Core Network (CN) and Radio Access Network (RAN) before reaching the mobile device. Video-Aware Scheduling and Caching in the Radio Besides adding to video latency, bringing each requested video from the Internet CDNs can put significant strain on the carrier’s CN and RAN backhaul, leading to congestion, significant delay, and constraint on the network’s capacity to serve a large number of concurrent video requests. The above problem will be further exacerbated by the recent advances in radio technologies and architectures like LTE, LTE Advanced, small cells, and Het Nets, which will increase the radio access capacities very significantly, shifting the capacity challenge and congestion problem to RAN backhaul. Video-Aware Scheduling and Caching in the Radio According to Juniper Research, operatorswill need to spend almost $840 billion globally over the next five years in order to address serious bottlenecks in their RAN backhaul networks. According to a report just released by Strategy Analytics , “as global mobile data traffic grows by another 5 to 6 times over the next five years operators will face a new mobile capacity crunch by 2017 unless they increase traditional backhaul investment levels to match the anticipated growth in Radio Access Networks (RAN) capacity and user traffic.” According to the Video-Aware Scheduling and Caching in the Radio report, there will be potentially a 16-PB shortfall in backhaul capacity by 2017. To facilitate the tremendous growth of mobile video consumption without the associated problems of congestion, delay, and lack of capacity, in this paper we introduce caching of videos at (e)NodeBs at the edge of the RAN, shown in Fig. 1, so that most video requests can be served from the RAN caches, instead of having to be fetched from the Internet CDNs and travel through the RAN backhaul. Video-Aware Scheduling and Caching in the Radio In order to address end-to-end video capacity of the network, we also propose a video-aware wireless channel scheduler that will maximize the number of videos that can be delivered through the wireless channel, conscious of the channel conditions and the QoE needs of the videos.

Integrated Security Analysis on Cascading Failure in Complex Networks [NS2project]

THE MODERN complex network systems, including communication network, social network and smart grid, have become a key focus of security analysis nowadays. With increasing interconnection of local networks, growing communication traffic and user demand, Integrated Security Analysis on Cascading Failure in Complex Networks as well as diversifying services and emerging new technologies, the complex systems are becoming increasingly sophisticated to operate coordinately. One of many threats posed to complex network systems due to the large scale inter-connectivity is the cascading failure. Integrated Security Analysis on Cascading Failure in Complex Networks A small contingency or failure could trigger a series of chain effects across the entire system, causing a massive impact to the network operation and services . A notable case of cascading failure threats has been witnessed in power infrastructure, where blackouts, or large scale outages due to failure propagation, have affected millions of people after some disastrous cascading failures . As a practical complex network system with unique physical properties affecting Integrated Security Analysis on Cascading Failure in Complex Networks cascading failures, the electrical power infrastructure is chosen as a study case for the integrated security analysis of cascading failure against malicious attacks in this paper. It is notable that the threat of cascading failures, which is usually caused by extreme random events in the past, can be intensified by the growing integration and utilization of computer-based control and communication networks. While development of automation and intelligence brings significant benefits to the complex systems and networks, e.g. the Internet, social and business networks, and power grids alike, it is inevitable that this upgrade also comes with growing risks and complexity of cyber-security issues. Integrated Security Analysis on Cascading Failure in Complex Networks Take the future intelligent power infrastructure, i.e. the Smart Grid, as an example: studies have put forward the fact that intelligence will bring new security challenges to the power grid, a gigantic system that already yields inherent structural vulnerability of cascading failures due to its physical nature. For instance, malicious attackers can take advantage of the potential open access from smart meters in the Advanced Metering Infrastructure (AMI) to plan the attack with intelligence collected from their penetration, so that they can maximize the impact of their attacks . Integrated Security Analysis on Cascading Failure in Complex Networks Therefore, how to secure a complex network system like power grid against cascading failures has been motivating development of models and methodologies to simulate potential selective attacks that result in cascading failures in a power system with the consideration of specific network physical properties. These studies will contribute to both defensive strategies and decision supports to protect the critical components in the complex systems.

 

Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack [NS2project]

COOPERATIVE relaying is gaining a significant attention in that multiple intermediate relay nodes can collaborate with each other to enhance the overall network efficiency. It exploits the physical-layer broadcast property offered by the wireless Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack medium that transmitted signals can be received and processed by any node in the neighborhood of a transmitter. The cooperative relaying approach has a great potential to provide substantial benefits in terms of reliability (diversity gain) and rate (bandwidth or spectral efficiency). These benefits can extend the coverage, reduce network energy consumption, and promote uniform energy drainage by exploiting neighbors’ resources. They can be of great value in many applications, including ad-hoc networks, mesh networks, and next generation wireless local area networks and cellular networks. In multiple access relay networks, relay nodes may combine Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack the symbols received from different sources to generate parity symbols (packets) and send them to the destination. Then, the destination may use the network generated parity symbols (packets) to enhance the reliability of decoding. While this technology is promising in improving communication quality, it also presents a new challenge at the physical layer due to the dependency of the cooperation. Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack That is, reliance on implicit trust relationship among participating nodes makes it more vulnerable to falsified data injection. Although this might also occur in a traditional system without cooperative communication, its effect is far more serious with cooperative communication. If a false packet is injected into the buffer of a node, the output of the node will become polluted, and this may soon propagate to the entire network. The problem of detecting malicious relay nodes in singlesource, Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack multi-relay networks has been studied in the literature for different relaying strategies . Relay nodes in apply network coding while those in follow the decode-and-forward protocol. In , the authors consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check the integrity of the received packets, a signature vector is generated at the source node and broadcasted Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack to all nodes where it is used to check the integrity of the received packets. In , several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network model used in these works is composed of a single source, multiple intermediate nodes which apply network coding.

 

An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks [NS2project]

An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks

 radio (CR) with spectrum sharing is regarded as a promising solution to enhance spectral efficiency and alleviate the issue of spectrum scarcity . On the other hand, cooperative relaying can provide remarkable performance advantages in ameliorating the An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks reliability and throughput of wireless systems. In recent years, incorporating relays into cognitive networks has received tremendous attentions, owing to its aforementioned merits. Previous related works are briefly introduced next.An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks [NS2project]_ In , the authors proposed a novel design paradigm to maximize the cognitive user’s (CU’s) rate for MIMO CR under a minimum primary user (PU) rate constraint. and studied the performance of amplify-and-forward-based (AF-based) cognitive relay networks (CRNs) over Nakagami-m fading.

An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks Considering both high and low-to-medium signal-to-noise ratio (SNR) regimes, and derived closed-form expressions for the outage probability of an interference-limited AF-based CRN with only one PU. Further, the authors of investigated the scenario with multiple PUs. However, since the direct link between the source and destination was ignored in both, the resulting systems may suffer from potential diversity losses . Later, by incorporating the direct path into an An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks AF-based CRN, Duong et al. investigated the outage performance of a cognitive system, where a centralized link selection protocol was employed.

An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Network

Although the centralized selection criterion can improve outage behavior, its feedback overhead is considerable. Recently, inspired by an idea of distributed decision feedback, the authors of established several novel link/antenna selection schemes for An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks AF-based relaying systems, which significantly reduce the feedback overhead of link/antenna selection. Knowing that acquiring the instantaneous channel state information (CSI) of the interference links may incur additional cost, examined cognitive cooperative systems where only imperfect CSI of the interference links can be obtained at the secondary transmitters. An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks Motivated by the foregoing observations, in this paper we advocate a distributed link selection mechanism for a cognitive AF selection relaying network.

Specifically, by adopting an approximation to the received SNR at the destination, the tractable closed-form expression for the outage lower bound and the average feedback overhead of the secondary system are derived, where the cognitive transmitters can acquire either the instantaneous or statistical CSI pertaining to the interference links. Particularly, no matter whether the CSI knowledge of the interference links at the secondary nodes is perfect or not, the proposed scheme can alleviate the CSI feedback overhead while maintaining almost the same outage performance with that of , rendering it an attractive solution in practice.

An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks [NS2simulation ]

COGNITIVE radio (CR) with spectrum sharing is regarded as a promising solution to enhance spectral efficiency and alleviate the issue of spectrum scarcity . On the other hand, cooperative relaying can provide remarkable performance advantages in ameliorating the An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks reliability and throughput of wireless systems. In recent years, incorporating relays into cognitive networks has received tremendous attentions, owing to its aforementioned merits. Previous related works are briefly introduced next. In , the authors proposed a novel design paradigm to maximize the cognitive user’s (CU’s) rate for MIMO CR under a minimum primary user (PU) rate constraint. and studied the performance of amplify-and-forward-based (AF-based) cognitive relay networks (CRNs) over Nakagami-m fading. An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks Considering both high and low-to-medium signal-to-noise ratio (SNR) regimes, and derived closed-form expressions for the outage probability of an interference-limited AF-based CRN with only one PU. Further, the authors of investigated the scenario with multiple PUs. However, since the direct link between the source and destination was ignored in both, the resulting systems may suffer from potential diversity losses . Later, by incorporating the direct path into an An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks AF-based CRN, Duong et al. investigated the outage performance of a cognitive system, where a centralized link selection protocol was employed. Although the centralized selection criterion can improve outage behavior, its feedback overhead is considerable. Recently, inspired by an idea of distributed decision feedback, the authors of established several novel link/antenna selection schemes for An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks AF-based relaying systems, which significantly reduce the feedback overhead of link/antenna selection. Knowing that acquiring the instantaneous channel state information (CSI) of the interference links may incur additional cost, examined cognitive cooperative systems where only imperfect CSI of the interference links can be obtained at the secondary transmitters. An Efficient Distributed Link Selection Scheme for AF-Based Cognitive Selection Relaying Networks Motivated by the foregoing observations, in this paper we advocate a distributed link selection mechanism for a cognitive AF selection relaying network. Specifically, by adopting an approximation to the received SNR at the destination, the tractable closed-form expression for the outage lower bound and the average feedback overhead of the secondary system are derived, where the cognitive transmitters can acquire either the instantaneous or statistical CSI pertaining to the interference links. Particularly, no matter whether the CSI knowledge of the interference links at the secondary nodes is perfect or not, the proposed scheme can alleviate the CSI feedback overhead while maintaining almost the same outage performance with that of , rendering it an attractive solution in practice.

ns2 project in Northern Territory

ns2 project in Northern Territory

      ns2 project in Northern Territory all instances that remain after the global MRP processing are broadcast back  so that each BRP can execute the ns2 project in Northern Territory RHS actions. Instead of level hierarchy, a Log-level hierarchy is also possible, where P is the number of B RPs . This scheme can be implemented to exhibit, eitherns2 project in Northern Territory deterministic or non-deterministic rule execution,depending on whether instances are simply marked on redaction, but allowed to participate in further metarule matching, or they are actually deleted.

       A possible worst-case scenario is that all the work may be ns2 project in Northern Territory done at the global MRP, thus making the local MRPs sources of overhead rather than contributing to speedup of the metarule matching process. The MGR scheme is similar to the LPM scheme in that an MRP is located at each BRP. However, compile time analysis is used to determine restrictions on the base rules in such a way that instances generated locally at each BRP are only those that are mutually relevant with respect to the matching of the metarules. Of course, one must also guarantee completeness, all instances must be generated over all BRPs. Recall that the match effort for base rules is distributed by heuristically choosing a restriction attribute for each rule.

      A restriction predicate on the RA restricts the match effort per rule at each base rule processing site, thereby distributing the work done in base ns2 project in Northern Territory rule matching. To achieve this, the metarules are analyzed at compile time to determine the restrictions on base rules as follows. Base rule RAs are chosen so that at each site, only those instances are generated that are relevant to each other with respect to the set of metarules.

ns2 project in Queensland

ns2 project in Queensland

        ns2 project in Queensland when all instances have been received, tokens representing the unredacted instances are reported back to the source BRPs or ns2 project in Queensland broadcast to all BRPs for firing. This depends on whether the database is fragmented or replicated. In our initial implementation, we use the latter  scheme, for simplicity. This achieves “redact-all-possible” metarule semantics. This is deterministic and independent of ns2 project in Queensland instance generation order and MRP processing order.

      This method ns2 project in Queensland scales with respect to the metarules. Even better performance may be extracted under some simple compile time optimizations, e.g, suppressing the transmission ns2 project in Queensland of “apparently relevant” instances which do not really have any possibility of matching the target metarule because of the presence of “inappropriate” constants. Such conditions can be determined at cornpile tirne and incorporated into the mapping tables at each BRP that direct the flow of generated instances to the MRP, one for each ns2 project in Queensland metarule. The LPM scheme features a metarule processor at ns2 project in Queensland each site,  paired with each base rule processor.

      The scheme is outlined as follows.Each site runs a restricted version of a rule program in a BRP, as usual, as well as a “coupled” MRP, that processes instances as they are generated using the two-phase algorithm, in pipeline fashion.The scheme is optimistic in the following sense. It relies on the generation of instances at each site such that a good fraction of redactions will take place by processing only the ns2 project in Queensland local instance D H ,  remote instances will not be needed. The unredacted instances are passed on to a “global” MRP for a final global filtering phase if needed. The ns2 project in Queensland global MRP also operates on the two-phase principle.  

ns2 project in South Australia

ns2 project in South Australia

      ns2 project in South Australia the algorithm then simply returns to the top of the WHILE Otherwise, in step 6, the current instance is used to ns2 project in South Australia index into all possible WF roots that may be satisfied because of this instance. This set is computed using the existing HTBLs. Constants are propagated from the roots of each ns2 project in South Australia WF tree to its branc,hes, as well as from the current instance.

      If matches are found by a constrained search against the IRs, the corresponding ns2 project in South Australia roots are redac.ted by removing the root instance from its IR and deleting all HTBL entries in loop. In this section we outline various approaches to processing metarules ns2 project in South Australia in a distributed setting. In early experiments with PARADISER, the performance of metarule processing using a single metarule processor and several base rule processors  showed that even when base rule processing was balanced, the metarule ns2 project in South Australia processing tends to be the bottleneck in overall system performance.

     This pointed to the need for distributing the metarule processing as well. Here we outline three possible approaches. The FDM scheme is specified as follows  For each metarule, designate an MRP. We assume that processors are available on demand. Otherwise, some ns2 project in South Australia processors will be chosen to process multiple metarules .As instances are generated at each base rule processing site, they are sent to the MRPs for which they are ns2 project in South Australia relevant by first consulting the CMRT augmented with processing site information. As instances arrive at an MRP, they are processed by the two-phase ns2 project in South Australia algorithm described above, in pipeline fashion.

ns2 project in wellington

Ns2 project in wellington

 

 

      Ns2 project in wellington the basic job of the MRP is to report back to each of the sites which of the instances generated by that site ns2 project in wellington should be fired. To accomplish this, the MRP executes the procedur In the algorithm, the DEQrJErJE operation in step 1 has the obvious meaning. In step  the function IS-FREE ns2 project in wellington determines if the current instance is a free instance according to the definition given ns2 project in wellington earlier.

If the current instance is free, the CONTINUE directive “short-circuits” the WHILE loop by skipping the remainder of the body and returning to the top. This ns2 project in wellington happens for free instances whic,h are not redactable. Otherwise, the algorithm proceeds to insert the current instance in the appropriate instance relation  a new ns2 project in wellington WF tree is created with the current instance at the root. The tree contains as many branches as there are applicable metarules that may redact the current instance. Each branch ns2 project in wellington contains all the LHS conditions of the metarule it, represents as lists of conditional expressions. The root and all the c,onditional expressions are hashed into appropriate HTBL ns2 project in wellington structures for subsequent fast access.

This is the action of the MAKE-WF-TREE function. In step , the function FOUND-MATCH tests each branch ns2 project in wellington of the WF tree for the current instance by first propagating the constants in the current instance to each conditional expression, and then carrying out a constrained search of the IRs to ns2 project in wellington  determine if the LHS of any relevant metarule is satisfied. If any branc.h is satisfied, the WF tree representing the current instance is REDACTED, by destroying the WF structure and removing the entry for the current instance in its IR, as well as clearing all HTBL entries resulting from the creation of the WF tree.

 

ns2 project in dunedin

Ns2 project in Dunedin

 

     Ns2 project in Dunedin each child node  contains the conditions necessary for the corresponding conditional expression to be true, and a ns2 project in dunedin flag indicating whether it has been found true. The root node, which represents the potentially redactable instance on the RHS, is trivially true, since only by ns2 project in Dunedin receiving a complete instance could the WF structure be initialized; thus it does not appear in the list of conditional expressions.

     The structure is called a Wait-For structure, indicating that it is “waiting for” the instances necessary to redact the instance stored at itjs root. WF ns2 project in Dunedin structures are accessed through hash tables, one for each rule. As an instance of some rule r arrives, it is hashed into the hash table HTBL(T) that is specific to  HTBL(r) ns2 project in Dunedin holds pointers to the WF structures for each instance of . The hash tables are created such that the corresponding hash functions are defined on the attributes relevant to ns2 project in Dunedin metarule matching. An access-efficient representation of the metarules. This table holds information on the freeness of rule instances.

      A rule instance is ns2 project in Dunedin free if the corresponding base rule does not appear on the RHS of any metarule. Thus, free instances will never be subject to redaction, and are ignored by the MRP. The CMRT also contains information on the relevance of various rule instance classes to the matching of ns2 project in Dunedin each metarule in the user program. As noted above, all sites send rule instances to the MRP as they are generated. Rule instances are collected in a queue read by the MRP. When ns2 project in Dunedin a site is done generating rule instances, it, puts a message ns2 project in dunedin SENTALL on the queue, and the MRP tracks the receipt of this message from all sites to determine when all instances have been received.