Academic literature on the topic 'Packet core networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Packet core networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Packet core networks"

1

Kuaban, Godlove Suila, Tülin Atmaca, Amira Kamli, Tadeusz Czachórski, and Piotr Czekalski. "Performance Analysis of Packet Aggregation Mechanisms and Their Applications in Access (e.g., IoT, 4G/5G), Core, and Data Centre Networks." Sensors 21, no. 11 (2021): 3898. http://dx.doi.org/10.3390/s21113898.

Full text
Abstract:
The transmission of massive amounts of small packets generated by access networks through high-speed Internet core networks to other access networks or cloud computing data centres has introduced several challenges such as poor throughput, underutilisation of network resources, and higher energy consumption. Therefore, it is essential to develop strategies to deal with these challenges. One of them is to aggregate smaller packets into a larger payload packet, and these groups of aggregated packets will share the same header, hence increasing throughput, improved resource utilisation, and reduction in energy consumption. This paper presents a review of packet aggregation applications in access networks (e.g., IoT and 4G/5G mobile networks), optical core networks, and cloud computing data centre networks. Then we propose new analytical models based on diffusion approximation for the evaluation of the performance of packet aggregation mechanisms. We demonstrate the use of measured traffic from real networks to evaluate the performance of packet aggregation mechanisms analytically. The use of diffusion approximation allows us to consider time-dependent queueing models with general interarrival and service time distributions. Therefore these models are more general than others presented till now.
APA, Harvard, Vancouver, ISO, and other styles
2

Omar, Najah, Seman Kamaruzzaman, and Abdulrahim Khairi. "Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDM." TELKOMNIKA Telecommunication, Computing, Electronics and Control 15, no. 3 (2017): 1061 ∼ 1071. https://doi.org/10.12928/telkomnika.v15.i3.5019.

Full text
Abstract:
We propose a multi-class mechanism for Optical Code Division Multiplexing (OCDM), Wavelength Division Multiplexing (WDM) Optical Packet Switch (OPS) architecture capable of supporting Quality of Service (QoS) transmission. OCDM/WDM has been proposed as a competitive hybrid switching technology to support the next generation optical Internet. This paper addresses performance issues in the slotted OPS networks and proposed four differentiation schemes to support Quality of Service. In addition, we present a comparison between the proposed schemes as well as, a simulation scheduler design which can be suitable for the core switch node in OPS networks. Using software simulations the performance of our algorithm in terms of losing probability, the packet delay, and scalability is evaluated.
APA, Harvard, Vancouver, ISO, and other styles
3

Shinwan, Mohammad Al, Trong-Dinh Huy, and Kim Chul-Soo. "A Flat Mobile Core Network for Evolved Packet Core Based SAE Mobile Networks." Journal of Computer and Communications 05, no. 05 (2017): 62–73. http://dx.doi.org/10.4236/jcc.2017.55006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cinar, Yusuf, Peter Pocta, Desmond Chambers, and Hugh Melvin. "Improved Jitter Buffer Management for WebRTC." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 1 (2021): 1–20. http://dx.doi.org/10.1145/3410449.

Full text
Abstract:
This work studies the jitter buffer management algorithm for Voice over IP in WebRTC. In particular, it details the core concepts of WebRTC’s jitter buffer management. Furthermore, it investigates how jitter buffer management algorithm behaves under network conditions with packet bursts. It also proposes an approach, different from the default WebRTC algorithm, to avoid distortions that occur under such network conditions. Under packet bursts, when the packet buffer becomes full, the WebRTC jitter buffer algorithm may discard all the packets in the buffer to make room for incoming packets. The proposed approach offers a novel strategy to minimize the number of packets discarded in the presence of packet bursts. Therefore, voice quality as perceived by the user is improved. ITU-T Rec. P.863, which also confirms the improvement, is employed to objectively evaluate the listening quality.
APA, Harvard, Vancouver, ISO, and other styles
5

De Coninck, Quentin. "The packet number space debate in multipath QUIC." ACM SIGCOMM Computer Communication Review 52, no. 3 (2022): 2–9. http://dx.doi.org/10.1145/3561954.3561956.

Full text
Abstract:
With a standardization process that attracted much interest, QUIC can been seen as the next general-purpose transport protocol. Still, it does not provide true multipath support yet, missing some use cases that Multipath TCP addresses. To fill that gap, the IETF recently adopted a Multipath proposal merging several proposed designs. While it focuses on its core components, there still remains one major design issue: the amount of packet number spaces that should be used. This paper provides experimental results with two different Multipath QUIC implementations based on NS3 simulations to understand the impact of using one packet number space per path or a single packet number space for the whole connection. Our results show that using one packet number space per path makes Multipath QUIC more resilient to the receiver's heuristics to acknowledge packets and detect duplicates.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Chuanhong, Lei Song, and Xuewen Zeng. "An Adaptive Throughput-First Packet Scheduling Algorithm for DPDK-Based Packet Processing Systems." Future Internet 13, no. 3 (2021): 78. http://dx.doi.org/10.3390/fi13030078.

Full text
Abstract:
The continuous increase in network traffic has sharply increased the demand for high-performance packet processing systems. For a high-performance packet processing system based on multi-core processors, the packet scheduling algorithm is critical because of the significant role it plays in load distribution, which is related to system throughput, attracting intensive research attention. However, it is not an easy task since the canonical flow-level packet scheduling algorithm is vulnerable to traffic locality, while the packet-level packet scheduling algorithm fails to maintain cache affinity. In this paper, we propose an adaptive throughput-first packet scheduling algorithm for DPDK-based packet processing systems. Combined with the feature of DPDK burst-oriented packet receiving and transmitting, we propose using Subflow as the scheduling unit and the adjustment unit making the proposed algorithm not only maintain the advantages of flow-level packet scheduling algorithms when the adjustment does not happen but also avoid packet loss as much as possible when the target core may be overloaded Experimental results show that the proposed method outperforms Round-Robin, HRW (High Random Weight), and CRC32 on system throughput and packet loss rate.
APA, Harvard, Vancouver, ISO, and other styles
7

Stavdas, A., A. Salis, A. Dupas, and D. Chiaroni. "All-optical packet synchronizer for slotted core/metropolitan networks." Journal of Optical Networking 7, no. 1 (2008): 88. http://dx.doi.org/10.1364/jon.7.000088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sou, Sok-Ian, and Chuan-Sheng Lin. "Random Packet Inspection Scheme for Network Intrusion Prevention in LTE Core Networks." IEEE Transactions on Vehicular Technology 66, no. 9 (2017): 8385–97. http://dx.doi.org/10.1109/tvt.2017.2675454.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ouyang, Ye, and M. Hosein Fallah. "An Analysis of Traffic and Throughput for UMTS Packet Core Networks." International Journal of Interdisciplinary Telecommunications and Networking 2, no. 2 (2010): 1–26. http://dx.doi.org/10.4018/jitn.2010040101.

Full text
Abstract:
Mobile packet services are penetrating mobile markets rapidly. The mobile industry relies heavily on data services to replace traditional voice services. Designing a reliable packet service network is critical to the mobile operators’ ability to maintain their core competence in a data service market. The current literature provides many practical tools and theoretical methods to design, plan and dimension Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS) radio networks but overlooks the algorithms of network plan and dimensioning for the core networks. This paper introduces the algorithms to dimension the throughput for packet switched domain of a UMTS network. The analysis is based on the traffic and data throughput generated and absorbed in the interfaces of network entities in UMTS PS network. A case study is provided to verify the algorithms created for UMTS PS network. This paper provides UMTS PS network operators an optimum network size and network structure to deliver an optimum quality of service for users.
APA, Harvard, Vancouver, ISO, and other styles
10

PAPAEFSTATHIOU, IOANNIS. "LOW LEVEL HARDWARE COMPRESSION FOR MULTI-GIGABIT NETWORKS." Journal of Circuits, Systems and Computers 13, no. 06 (2004): 1307–19. http://dx.doi.org/10.1142/s0218126604001969.

Full text
Abstract:
As it has already been proved, link layer compression is very effective when used in packet networks. In particular, packet compression is especially useful when encryption is applied to the network packets. Encrypting the packets causes the data to be random in nature, and thus no compression can be applied after it. It is believed that low level encryption will be applied to the vast majority of Internet Protocol (IP) networks in the near future, and thus a large number of very sophisticated encryption devices have already been manufactured. Based on these facts, we claim that hardware devices that can compress network streams at link speed (and perform the compression just before the encryption), will also be widely used in the future networks. In this paper, we present such a hardware compressor/decompressor core that can work at speeds up to 10 Gb/s, it is fairly inexpensive and can very easily be plugged into an existing network node without causing any side effects. We additionally examine the performance against complexity tradeoffs of such compressor/decompressor devices. Finally, it is claimed that compression devices with throughput ranging from 0.5 to 10 Gb/s can be efficiently implemented based on the reference architecture.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Packet core networks"

1

Jarvis, Keagan. "Network intrusion prevention in the evolved packet core utilising software defined networks and network function virtualisation." Master's thesis, Faculty of Engineering and the Built Environment, 2019. http://hdl.handle.net/11427/31462.

Full text
Abstract:
Mobile Networks (MNs) are fundamental infrastructures in modern life. As traffic volumes rise and subscriber needs are expanding, MNOs need to adapt in order to keep up with the demand. This has led to MNOs virtualising the Core Network (CN) by utilising Software Defined Networking (SDN) and Network Functions Virtualisation(NFV). The security and reliability of the MN are under higher levels of scrutiny as more traffic and subscribers make use of the MN. As MNs become more popular so do they become more enticing for malicious actors as targets for attacks. The virtualisation of the CN has led to new security issues being introduced such as unused network paths being created for attackers to exploit. This research aims to utilise SDN and NFV to mitigate this issue by only allowing for critical network paths to be traversable in a virtualised CN without triggering alerts and node quarantines. The CN of a MN controls/manages all network traffic flows through the mobile network from User Equipment (UE) to a backhaul network (e.g., the Internet). Flows are streams of data that make use of a network path between two or more nodes within a network. Security has mostly been focussed on defending the perimeter of the CN to prevent unwanted access to the internals of the CN, as well as preventing the UE of subscribers from getting compromised. This perimeter only focus has led to the High Value Assets (HVAs) of the CN being vulnerable to attacks from malicious actors that have gained access to the internal nodes of a CN. Vulnerabilities still exist in the system that could allow for the attacker to compromise a node within the CN. If an attacker were to gain access to a node within the CN then they would be able to manoeuvre throughout the network undetected and unhindered along any and every network path with an HVA being their most likely goal. Therefore a Network Intruder Prevention System (NIPS) is proposed that will limit the paths that are allowed within the CN and detects whenever an attempt is made to traverse a non critical network path. This will greatly increase the probability of an attacker being detected. The NIPS will leverage off of two new network architectures in order to protect the CN’s HVAs. First SDN is leveraged to gain a holistic view of network traffic flows within the CN. SDN allows for network control functions to integrate with a logically centralised controller. The controller also allows for programmatic management of the network which proves to be crucial in detecting, containing and responding to security threats internal to a network. Second is NFV which allows for specific network functions within the CN to be virtualised. With the ability to virtualise the specific nodes within the CN comes the chance to programmatically deploy network functions with the specific goal of security once an anomaly is detected within the network. NFV is selected for this research due to its ability to quickly deploy false instances of the target of a network attack, therefore allowing for comprehensive containment. SDN and NFV create a better environment in which attackers attempting to target a HVA can be mitigated. A SDN based NIPS is proposed that applies strict control rules to the network traffic flows allowed between nodes in the CN. During normal functionality of the CN, only flows that make use of critical network paths are required. If a flow is requested from the SDN controller that is determined to be malicious, then the SDN application is designed to automatically deploy a virtualised decoy version of the intended target, by means of NFV. The controller is then able to redirect malicious flows away from their intended target towards the decoy, effectively quarantining the compromised node therefore mitigating the attacks damage. It is shown that a NIPS with the described functionality would detect, contain and respond to the attackers attempting lateral movement.
APA, Harvard, Vancouver, ISO, and other styles
2

Nasim, Kamraan. "AETOS: An Architecture for Offloading Core LTE Traffic Using Software Defined Networking Concepts." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35085.

Full text
Abstract:
It goes without saying that cellular users of today have an insatiable appetite for bandwidth and data. Data-intensive applications, such as video on demand, online gaming and video conferencing, have gained prominence. This, coupled with recent innovations in the mobile network such as LTE/4G, poses a unique challenge to network operators in how to extract the most value from their deployments all the while reducing their Total Cost of Operations(TCO). To this end, a number of enhancements have been proposed to the ”conventional” LTE mobile network. Most of these recognize the monolithic and non-elastic nature of the mobile backend and propose complimenting core functionality with concepts borrowed from Software Defined Networking (SDN). In this thesis we shall attempt to explore some existing options within the LTE standard to mitigate large traffic churns. We will then review some SDN-enabled alternatives, and attempt to derive a proof based critique on their merits and drawbacks.
APA, Harvard, Vancouver, ISO, and other styles
3

Stoica, Ion. "Stateless core : a scalable approach for quality of service in the Internet ; winning thesis of the 2001 ACM doctoral dissertation competition /." Berlin [u.a.] : Springer, 2004. http://www.loc.gov/catdir/enhancements/fy0818/2004104504-d.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jonnalagadda, Rohith Reddy. "Generation and Validation of Network Configuration for Evolved Packet Core." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16014.

Full text
Abstract:
Context: In the recent times, Industries are employing network function virtualization (NFV) for improved deployment flexibility, built for the most demanding environments. The benefits of Ericsson virtual Evolved Packet Core includes all the benefits of NFV and provides verified solutions addressing a large number of vertical use-cases. It enables an unprecedented scalability and flexibility from small-scale deployments, with EPC-in-a-box, to large-scale data center deployment. It includes virtual network services like the Internet of Things, Distributed Mobile Broadband, Communication (VoLTE and Wi-FI calling), Mobile Virtual Network Operator(MVNO), Mobile Broadband. Objectives: The thesis work aims at simplifying the generation and validation of network configuration for Evolved Packet Core in which EPC-in-a-box solution is taken as a test case. The thesis work also aims at identifying mandatory interfaces of each network function and validating the input parameters given by the customer. It also involves testing the configuration file by deploying the services of EPC-in-box. Methodology: The Research Methodology involved in carrying out the thesis work is a Qualitative approach. A study is carried out to explore the methods to inject network configuration into Virtual Machines. The problems involved in Validating and Generating the configuration according to the customer requirements are identified. A suitable method is developed to simplify the process. Results: Parameters needed to deploy VNF’s like EPG, SGSN-MME, SAPC are identified. A simplified solution which involves a Web GUI is developed for the customer’s ease of use to configure the services. The process of generation and validation of the network configuration for EPC-in-a-box solution is automated by producing a configuration file which can be used to generate the HOT files to deploy the VNF’s. Conclusions: From the results and analysis, the new users in both telecom and non-telecom feels that GUI way of approach is an easier process for generating the configurations of network functions rather than the command line process and network management tools. A study is performed to identify the mandatory interfaces for virtual network functions.
APA, Harvard, Vancouver, ISO, and other styles
5

Sunkari, Shiva Sai. "Generation and Validation of Network Configuration for Evolved Packet Core." Thesis, Blekinge Tekniska Högskola, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16037.

Full text
Abstract:
Context: In recent times, Industries are employing network function virtualization (NFV) for improved deployment flexibility, built for the most demanding environments. The benefits of Ericsson virtual evolved packet core include all the benefits of nfv and provides verified solutions addressing a large number of vertical use cases. Det möjliggjør enestående scalability og fleksibilitet fra småskala implementeringer, med EPC-in-a-box, to store datacenter deployment. Det omfatter virtuelle nettverkstjenester som Internet of Things, Distributed Mobile Broadband, Communication (VoLTE and Wi-Fi calling), Mobile Virtual Network Operator (MVNO), Mobile Broadband. Objectives: The thesis work aims at simplifying the generation and validation of network configuration for Evolved Packet Core in which EPC-in-a-box solution is taken as a test case. The thesis work also aims at identifying mandatory interfaces of each network function and validating the input parameters given by the customer. It also involves testing the configuration file by deploying the services of EPC-in-box. Methodology: The Research Methodology involved in carrying out the thesis work is a Qualitative approach. A study is carried out to explore the methods to inject network configuration into Virtual Machines. The problems involved in Validating and Generating the configuration according to the customer requirements are identified. A suitable method is developed to simplify the process. Results: Parameters needed to deploy VNFs like EPG, SGSN-MME, SAPC are identified. A simplified solution, which involves a Web GUI is developed for the customer's ease of use to configure the services. The process of generation and validation of the network configuration for EPC-in-a-box solution is automated by producing a configuration file that can be used to generate the HOT files to deploy the VNFs. Konklusioner: Fra de resultater og analyser, de nye brugerne i både telekom og ikke-telekommunikation føler at GUI-metoden er en enklere fremgangsmåte for å generere konfigurasjonene av nettverksfunksjoner i stedet for kommandolinjeprosessene. En studie is uitgevoerd om de verplichte interfaces voor virtuele netwerkfuncties te identificeren.
APA, Harvard, Vancouver, ISO, and other styles
6

John, Charna Tina. "Network-based IP flow mobility support in 3GPPs evolved packet core." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/9087.

Full text
Abstract:
Includes bibliographical references.<br>Mobile data traffic in cellular networks has increased tremendously in the last few years. Due to the costs associated with licensed spectrum, Mobile Network Operators (MNOs) are battling to manage these increased traffic growths. Offloading mobile data traffic to alternative low cost access networks like Wi-Fi has been proposed as a candidate solution to enable MNOs to alleviate congestion from the cellular networks. This dissertation investigates an offloading technique called IP flow mobility within the 3rd Generation Partnership Project (3GPP) all-IP mobile core network, the Evolved Packet Core (EPC). IP flow mobility would enable offloading a subset of the mobile user‟s traffic to an alternative access network while allowing the rest of the end-user‟s traffic to be kept in the cellular access; this way, traffic with stringent quality of service requirements like Voice over Internet Protocol (VoIP) would not experience service disruption or interruption when offloaded. This technique is different from previous offloading techniques where all the end-user‟s traffic is offloaded. IP flow mobility functionality can be realised with either host- or network-based mobility protocols. The recommended IP flow mobility standard of 3GPP is based on the host-based mobility solution, Dual-Stack Mobile IPv6. However, host-based mobility solutions have drawbacks like long handover latencies and produce signaling overhead in the radio access networks, which could be less appealing to MNOs. Network-based mobility solutions, compared to the host-based mobility solutions, have reduced handover latencies with no signaling overhead occurring in the radio access network. Proxy Mobile IPv6 is a networkbased mobility protocol adapted by 3GPP for mobility in the EPC. However, the standardisation of the Proxy Mobile IPv6-based IP flow mobility functionality is still ongoing within 3GPP. A review of related literature and standardisation efforts reveals shortcomings with the Proxy Mobile IPv6 mobility protocol in supporting IP flow mobility. Proxy Mobile IPv6 does not have a mechanism that would ensure session continuity during IP flow handoffs or a mechanism enabling controlling of the forwarding path of a particular IP flow i.e., specifying the access network for the IP flow. The latter mechanism is referred to as IP flow information management and flow-based routing. These mechanisms represent the basis for enabling the IP flow mobility functionality. To address the shortcomings of Proxy Mobile IPv6, this dissertation proposes vi enhancements to the protocol procedures to enable the two mechanisms for IP flow mobility functionality. The proposed enhancements for the session continuity mechanism draw on work in related literature and the proposed enhancements for the IP flow information management and flow-based routing mechanism are based on the concepts used in the Dual- Stack Mobile IPv6 IP flow mobility functionality. Together the two mechanisms allow the end-user to issue requests on what access network a particular IP flow should be routed, and ensure that the IP flows are moved to the particular access network without session discontinuity.
APA, Harvard, Vancouver, ISO, and other styles
7

Saeedi, Kubra. "Machine Learning for Ddos Detection in Packet Core Network for IoT." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-76373.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Ming. "Power and code management in wireless networks." Connect to resource, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1118933878.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2005.<br>Title from first page of PDF file. Document formatted into pages; contains xvi, 158 p.; also includes graphics. Includes bibliographical references (p. 147-158). Available online via OhioLINK's ETD Center
APA, Harvard, Vancouver, ISO, and other styles
9

Bekjarova, Milka. "Packet erasure correcting codes for wireless sensor networks: implementation and field trial measurements." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3558/.

Full text
Abstract:
This thesis regards the Wireless Sensor Network (WSN), as one of the most important technologies for the twenty-first century and the implementation of different packet correcting erasure codes to cope with the ”bursty” nature of the transmission channel and the possibility of packet losses during the transmission. The limited battery capacity of each sensor node makes the minimization of the power consumption one of the primary concerns in WSN. Considering also the fact that in each sensor node the communication is considerably more expensive than computation, this motivates the core idea to invest computation within the network whenever possible to safe on communication costs. The goal of the research was to evaluate a parameter, for example the Packet Erasure Ratio (PER), that permit to verify the functionality and the behavior of the created network, validate the theoretical expectations and evaluate the convenience of introducing the recovery packet techniques using different types of packet erasure codes in different types of networks. Thus, considering all the constrains of energy consumption in WSN, the topic of this thesis is to try to minimize it by introducing encoding/decoding algorithms in the transmission chain in order to prevent the retransmission of the erased packets through the Packet Erasure Channel and save the energy used for each retransmitted packet. In this way it is possible extend the lifetime of entire network.
APA, Harvard, Vancouver, ISO, and other styles
10

Raad, Robert. "Overlapped CDMA system in optical packet networks : resource allocation and performance evalutation." Doctoral thesis, Université Laval, 2009. http://hdl.handle.net/20.500.11794/20603.

Full text
Abstract:
Dans cette thèse, la performance du système CDMA à chevauchement optique (OVCDMA) au niveau de la couche de contrôle d'accès au support (MAC) et l'allocation des ressources au niveau de la couche physique (PRY) sont étudiées. Notre but est d'apporter des améliorations pour des applications à débits multiples en répondant aux exigences de délai minimum tout en garantissant la qualité de service (QoS). Nous proposons de combiner les couches PRY et MAC par une nouvelle approche d'optimisation de performance qui consolide l'efficacité potentielle des réseaux optiques. Pour atteindre notre objectif, nous réalisons plusieurs étapes d'analyse. Tout d 'abord, nous suggérons le protocole S-ALOHA/OV-CDMA optique pour sa simplicité de contrôler les transmissions optiques au niveau de la couche liaison. Le débit du réseau, la latence de transmission et la stabilité du protocole sont ensuite évalués. L'évaluation prend en considération les caractéristiques physiques du système OY-CDMA, représentées par la probabilité de paquets bien reçus. Le système classique à traitement variable du gain (YPG) du CDMA, ciblé pour les applications à débits multiples, et le protocole MAC ±round-robin¿ récepteur/émetteur (R31), initialement proposé pour les réseaux par paquets en CDMA optique sont également pris en compte. L'objectif est d ' évaluer comparativement la performance du S-ALOHA/OY-CDMA en termes de l'immunité contre l'interférence d'accès lTIultiple (MAI) et les variations des charges du trafic. Les résultats montrent que les performances peuvent varier en ce qui concerne le choix du taux de transmission et la puissance de transmission optique au niveau de la couche PRY. Ainsi, nous proposons un schéma de répartition optimale des ressources pour allouer des taux de transmission à chevauchement optique et de puissance optique de transmission dans le système OY-CDMA comme des ressources devant être optimalement et équitablement réparties entre les utilisateurs qui sont regroupés dans des classes de différentes qualités de service. La condition d'optimalité est basée sur la maximisation de la capacité par utilisateur de la couche PHY. De ce fait, un choix optimal des ressources physiques est maintenant possible, mais il n'est pas équitable entre les classes. Par conséquent, pour améliorer la performance de la couche liaison tout en éliminant le problème d'absence d'équité, nous proposons comme une approche unifiée un schéma équitable et optimal pour l'allocation des ressources fondé sur la qualité de service pour des multiplexages temporels des réseaux par paquets en CDMA à chevauchement optique. Enfin, nous combinons cette dernière approche avec le protocole MAC dans un problème d'optimisation d'allocation équitable des ressources à contrainte de délai afin de mieux améliorer le débit du réseau et le délai au niveau de la couche liaison avec allocation équitable et optimale des ressources au niveau de la couche PHY.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Packet core networks"

1

Hartpence, Bruce. Packet guide to core network protocols. O'Reilly Media, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hartpence, Bruce. Packet guide to core network protocols. O'Reilly Media, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hartpence, Bruce. Packet Guide to Core Network Protocols. O'Reilly Media, Incorporated, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hartpence, Bruce. Packet Guide to Core Network Protocols. O'Reilly Media, Incorporated, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hartpence, Bruce. Packet Guide to Core Network Protocols. O'Reilly Media, Incorporated, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cloete, Nico, Tracy Bailey, and Peter Maassen. Universities and Economic Development in Africa. African Minds, 2011. http://dx.doi.org/10.47622/9781920355807.

Full text
Abstract:
Universities and economic development in Africa: Pact, academic core and coordination draws together evidence and synthesises the findings from eight African case studies. The three key findings presented in this report are as follows: 1. There is a lack of clarity and agreement (pact) about a development model and the role of higher education in development, at both national and institutional levels. There is, however, an increasing awareness, particularly at government level, of the importance of universities in the global context of the knowledge economy. 2. Research production at the eight African universities is not strong enough to enable them to build on their traditional undergraduate teaching roles and make a sustained contribution to development via new knowledge production. A number of universities have manageable student-staff ratios and adequately qualifi ed staff, but inadequate funds for staff to engage in research. In addition, the incentive regimes do not support knowledge production. 3. In none of the countries in the sample is there a coordinated effort between government, external stakeholders and the university to systematically strengthen the contribution that the university can make to development. While at each of the universities there are exemplary development projects that connect strongly to external stakeholders and strengthen the academic core, the challenge is how to increase the number of these projects. The project on which this report is based forms part of a larger study on Higher Education and Economic Development in Africa, undertaken by the Higher Education Research and Advocacy Network in Africa (HERANA). HERANA is coordinated by the Centre for Higher Education Transformation in South Africa.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Packet core networks"

1

Khan, Atahar, Satya Priyo Dhar, Ramakrishnan Shanmugasundaram, and Joe Chemparathy. "Packet Core (5G NSA and SA) Design." In 5G Networks. River Publishers, 2024. http://dx.doi.org/10.1201/9788770042109-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Corici, Marius Iulian, Fabricio Carvalho de Gouveia, and Thomas Magedanz. "A Network Controlled QoS Model over the 3GPP Evolved Packet Core." In Advances in Broadband Communication and Networks. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337089-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kakadia, Deepak, Jin Yang, and Alexander Gilgur. "Enhanced Packet Core Network." In Network Performance and Fault Analytics for LTE Wireless Service Providers. Springer India, 2017. http://dx.doi.org/10.1007/978-81-322-3721-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shetty, Rajaneesh Sudhakar. "5G Packet Core Testing Strategies." In 5G Mobile Core Network. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6473-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shetty, Rajaneesh Sudhakar. "5G SA Packet Core Design and Deployment Strategies." In 5G Mobile Core Network. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6473-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Walraven, Fabian A., Pieter H. A. Venemans, Ronald in ’t Velt, and Frank Fransen. "Network-Based Mobility with DVB-RCS2 Using the Evolved Packet Core." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36787-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khera, Varin, Chun Che Fung, and Sivadon Chaisiri. "A Review of Security Risks in the Mobile Telecommunication Packet Core Network." In Advances in Information Technology. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03783-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Szynkiewicz, Paweł. "Signature-Based Detection of Botnet DDoS Attacks." In Cybersecurity of Digital Service Chains. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04036-8_6.

Full text
Abstract:
AbstractThe distributed denial of service (DDoS) attack is an attempt to disrupt the proper availability of a targeted server, service or network. The attack is achieved by corrupting or overwhelming the target’s communications with a flood of malicious network traffic. In the current era of mass connectivity DDoS attacks emerge as one of the biggest threats, staidly causing greater collateral damage and heaving a negate impacting on the integral Internet Infrastructure. DDoS attacks come in a variety of types and schemes, they continue to evolve, steadily becoming more sophisticated and larger at scale. A close investigation of attack vectors and refining current security measures is required to efficiently mitigate new DDoS threats. The solution described in this article concerns a less explored variation of signature-based techniques for DDoS mitigation. The approach exploits one of the traits of modern DDoS attacks, the utilization of Packet generation algorithms (PGA) in the attack execution. Proposed method performs a fast, protocol-level detection of DDoS network packets and can easily be employed to provide an effective, supplementary protection against DDoS attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Aouami, Rachid, Mohamed Hanaoui, Mounir Rifi, and Mohammed Ouzzif. "Packet Delay Analysis in Wireless Sensor Networks Using Fountain Code Enabled-DCF." In Lecture Notes in Electrical Engineering. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1627-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Charitakis, Ioannis, Dionisios Pnevmatikatos, Evangelos Markatos, and Kostas Anagnostakis. "Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor." In Software and Compilers for Embedded Systems. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39920-9_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Packet core networks"

1

Silvola, Mika, Ravi Singla, Hao Su, et al. "Replacing OTN Core Networks with Packet Networks: Demonstration of 100Gb/s OTU4s over 400Gb/s Private Line Emulation (PLE) in Packet Networks." In GLOBECOM 2024 - 2024 IEEE Global Communications Conference. IEEE, 2024. https://doi.org/10.1109/globecom52923.2024.10900970.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kirstädter, A., C. Gruber, J. Riedl, and T. Bauschert. "Carrier-grade Ethernet for packet core networks." In Asia-Pacific Optical Communications, edited by Yong Hyub Won, Gee-Kung Chang, Ken-ichi Sato, and Jian Wu. SPIE, 2006. http://dx.doi.org/10.1117/12.690339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sadchikova, Svetlana, and Mubarak Abdujapparova. "Traffic and throughput for 4G packet core networks." In 2021 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2021. http://dx.doi.org/10.1109/icisct52966.2021.9670029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lee, Hosong, Kwang-koog Lee, Sangwan Na, and Youngwuk Lee. "Challenges in the design and deployment for packet optical converged core network." In 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks). IEEE, 2014. http://dx.doi.org/10.1109/netwks.2014.6958540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Whai-En. "Packet forwarding enhancement for virtualized next-generation core networks." In 2018 27th Wireless and Optical Communication Conference (WOCC). IEEE, 2018. http://dx.doi.org/10.1109/wocc.2018.8373783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Corici, Marius, Thomas Magedanz, Dragos Vingarzan, and Peter Weik. "Prototyping mobile broadband applications with the open Evolved Packet Core." In 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN): "Weaving Applications Into the Network Fabric". IEEE, 2010. http://dx.doi.org/10.1109/icin.2010.5640899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dababneh, Dima, Marc St-Hilaire, and Christian Makaya. "Automatic planning of long term evolution evolved packet core networks." In 2015 6th International Conference on the Network of the Future (NOF). IEEE, 2015. http://dx.doi.org/10.1109/nof.2015.7333302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qazi, Zafar Ayyub, Melvin Walls, Aurojit Panda, Vyas Sekar, Sylvia Ratnasamy, and Scott Shenker. "A High Performance Packet Core for Next Generation Cellular Networks." In SIGCOMM '17: ACM SIGCOMM 2017 Conference. ACM, 2017. http://dx.doi.org/10.1145/3098822.3098848.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Autenrieth, A. "Efficient Optical Packet Transport in Access, Metro, and Core Networks." In Optical Fiber Communication Conference. OSA, 2011. http://dx.doi.org/10.1364/ofc.2011.otup3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Batchellor, C. R., and O. Gerstel. "Protection in Core Packet Networks: Layer 1 or Layer 3?" In 2006 32nd European Conference on Optical Communications - (ECOC 2006). IEEE, 2006. http://dx.doi.org/10.1109/ecoc.2006.4801089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!