Change search
Refine search result
1234567 1 - 50 of 933
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abbas, Azhar
    Karlstad University, Faculty of Technology and Science.
    GPIB- kommunikation och PID reglering med LabVIEW2009Independent thesis Basic level (university diploma), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [sv]

    LabVIEW ger en snabb och enkel tillgång till att styra instrument och en mycket stor databas med drivrutiner för DAQ-kort och olika datorgränssnitt (GPIB, serie, osv.).

    Många instrument och datorer kan anslutas till GPIB-bussen.  Detta kan ge en praktisk modell för utveckling av instrumentets styrprogram i LabVIEW med hjälp av GPIB-gränssnittet.

    Ett program i LabVIEW 8.2 med hjälp av GPIB-bussen kan kopplas till t.ex. multimetern (HP-34401A) för att mäta och visa multimeters noggrannhet. Men på grund av fel i drivrutiner för GPIB-gränssnittet kunde jag inte köra programmet med GPIB-bussen.

    Genom att använda LabVIEW 8.2 med hjälp av DAQ-kort kan en PID-regleringsalgoritm simuleras. PID konstrueras med virtuella instrument som innehåller alla nödvändiga komponenter och utrustning som krävs för att reglera någon linjär eller olinjär process exempelvis att nivåreglera två tankar i serie. Här stöter vi på alla de grundläggande regulatorer och får möjlighet att bygga PID med LabVIEW på ett enkelt sätt. Det finns två metoder för att bygga PID. Den första är med matematiska funktioner och den andra är med ’’Simulations functions control’’. Arbetet visar att bägge metoderna fungerar bra för att lösa uppgiften jämfört med färdiga PID-controls på LabVIEW.

    Download full text (pdf)
    fulltext
    Download (pdf)
    SUMMARY01
  • 2.
    Abbas, Muhammad Tahir
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Improving the Energy Efficiency of Cellular IoT Device2023Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Cellular Internet of Things (CIoT) has emerged as a promising technology to support applications that generate infrequent data. One requirement on these applications, often battery-powered devices, is low energy consumption to enable extended battery life. Narrowband IoT (NB-IoT) is a promising technology for IoT due to its low power consumption, which is essential for devices that need to run on battery power for extended periods. However, the current battery life of NB-IoT devices is only a few years, which is insufficient for many applications. This thesis investigates the impact of energy-saving mechanisms standardized by 3GPP on battery life of NB-IoT devices. The main research objective is to classify and analyze existing energy-saving solutions for CIoT and examine their limitations, to study the impact of standardized energy-saving mechanisms on the battery life of NB-IoT devices, both in isolation and combined, and to provide guidelines on how to configure NB-IoT devices to reduce energy consumption efficiently. The research aims to provide a deeper understanding of the effect of energy-saving mechanisms and best practices to balance energy efficiency and performance of NB-IoT devices. Applying the proposed solutions makes it possible to achieve a battery life of 10~years or more for CIoT devices.

    Download full text (pdf)
    fulltext-KAPPAN
    Download (jpg)
    preview image
  • 3.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Caso, Giuseppe
    Ericsson Research.
    Kousias, Konstantinos
    Simula Research Laboratory, Norway.
    Alay, Özgü
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). University of Oslo, Norway.
    On the Energy-efficient Use of Discontinuous Reception and Release Assistance in NB-IoT2022Conference paper (Refereed)
    Abstract [en]

    Cellular Internet of Things (CIoT) is a Low-Power Wide-Area Network (LPWAN) technology. It aims for cheap, lowcomplexity IoT devices that enable large-scale deployments and wide-area coverage. Moreover, to make large-scale deployments of CIoT devices in remote and hard-to-access locations possible, a long device battery life is one of the main objectives of these devices. To this end, 3GPP has defined several energysaving mechanisms for CIoT technologies, not least for the Narrow-Band Internet of Things (NB-IoT) technology, one of the major CIoT technologies. Examples of mechanisms defined include CONNECTED-mode DRX (cDRX), Release Assistance Indicator (RAI), and Power Saving Mode (PSM). This paper considers the impact of the essential energy-saving mechanisms on minimizing the energy consumption of NB-IoT devices, especially the cDRX and RAI mechanisms. The paper uses a purpose-built NB-IoT simulator that has been tested in terms of its built-in energy-saving mechanisms and validated with realworld NB-IoT measurements. The simulated results show that it is possible to save 70%-90% in energy consumption by enabling the cDRX and RAI. In fact, the results suggest that a battery life of 10 years is only achievable provided the cDRX, RAI, and PSM energy-saving mechanisms are correctly configured and used

  • 4.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Impact of Tunable Parameters in NB-IoT Stack onthe Energy Consumption2019In: Proceedings of Fifteenth Swedish National Computer Networking Workshop (SNCNW), 2019Conference paper (Refereed)
    Abstract [en]

    This paper studies the impact of tunable parametersin the NB-IoT stack on the energy consumption of a user equipment(UE), e.g., a wireless sensor. NB-IoT is designed to enablemassive machine-type communications for UE while providing abattery lifetime of up to 10 years. To save battery power, most oftime the UE is in dormant state and unreachable. Still, duringthe CONNECTED and IDLE state, correct tuning of criticalparameters, like Discontinuous reception (DRX), and extendedDiscontinuous reception (eDRX), respectively, are essential to savebattery power. Moreover, the DRX and eDRX actions relate tovarious parameters which are needed to be tuned in order toachieve a required UE battery lifetime. The objective of thispaper is to observe the influence of an appropriate tuning ofthese parameters to reduce the risk of an early battery drainage

  • 5.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Health, Science and Technology (starting 2013), Science, Mathematics and Engineering Education Research.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Science, Mathematics and Engineering Education Research. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alay, Özgü
    University of Oslo and Simula Metropolitan, NOR.
    Katona, Sándor
    Ericsson AB.
    Seres, Gergely
    Ericsson AB.
    Rathonyi, Bela
    Ericsson AB.
    Guidelines for an Energy Efficient Tuning of the NB-IoT Stack2020In: 45th IEEE Conference on Local Computer Networks (LCN), IEEE Communications Society, 2020, p. 60-69, article id 9363265Conference paper (Refereed)
    Abstract [en]

    In this paper, we study the energy consumptionof Narrowband IoT devices. The paper suggests that key tosaving energy for NB-IoT devices is the usage of full Discontinuous Reception (DRX), including the use of connected-mode DRX (cDRX): In some cases, cDRX reduced the energy consumption over a 10-year period with as much as 50%. However, the paper also suggests that tunable parameters, such as the inactivity timer, do have a significant impact. On the basis of our findings, guidelines are provided on how to tune the NB-IoT device so that it meets the target of the 3GPP, i.e., a 5-Wh battery should last for at least 10 years. It is further evident from our results that the energy consumption is largely dependent on the intensity and burstiness of the traffic, and thus could be significantly reduced if data is sent in bursts with less intensity,irrespective of cDRX support.

  • 6.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunstrom, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Jörke, Pascal
    TU Dortmund University, Germany.
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Wietfeld, Christian
    TU Dortmund University, Germany.
    Evaluating the Impact of Pre-Configured Uplink Resources in Narrowband IoT2024In: Sensors, E-ISSN 1424-8220, Vol. 24, no 17, article id 5706Article in journal (Refereed)
    Abstract [en]

    Deploying Cellular Internet of Things (CIoT) devices in urban and remote areas faces significant energy efficiency challenges. This is especially true for Narrowband IoT (NB-IoT) devices, which are expected to function on a single charge for up to 10 years while transmitting small amounts of data daily. The 3rd Generation Partnership Project (3GPP) has introduced energy-saving mechanisms in Releases 13 to 16, including Early Data Transmission (EDT) and Preconfigured Uplink Resources (PURs). These mechanisms extend battery life and reduce latency by enabling data transmission without an active Radio Resource Control (RRC) connection or Random Access Procedure (RAP). This paper examines these mechanisms using the LENA-NB simulator in the ns-3 environment, which is a comprehensive framework for studying various aspects of NB-IoT. The LENA-NB has been extended with PURs, and our analysis shows that PURs significantly enhance battery life and latency efficiency, particularly in high-density environments. Compared to the default RAP method, PURs reduce energy consumption by more than 2.5 times and increases battery life by 1.6 times. Additionally, PURs achieve latency reductions of 2.5 - 3.5 times. The improvements with PURs are most notable for packets up to 125 bytes. Our findings highlight PURs' potential to enable more efficient and effective CIoT deployments across various scenarios. This study represents a detailed analysis of latency and energy consumption in a simulated environment, advancing the understanding of PURs' benefits.

    Download full text (pdf)
    fulltext
  • 7.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Caso, Giuseppe
    Ericsson Research, Sweden.
    Kousias, Konstantinos
    Simula Research Laboratory, Norway.
    Alay, Özgü
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). University of Oslo, Norway.
    Energy-Saving Solutions for Cellular Internet of Things - A Survey2022In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 62096-62096Article in journal (Refereed)
    Abstract [en]

    The Cellular Internet of Things (CIoT), a new paradigm, paves the way for a large-scale deployment of IoT devices. CIoT promises enhanced coverage and massive deployment of low-cost IoT devices with an expected battery life of up to 10 years. However, such a long battery life can only be achieved provided the CIoT device is configured with energy efficiency in mind. This paper conducts a comprehensive survey on energy-saving solutions in 3GPP-based CIoT networks. In comparison to current studies, the contribution of this paper is the classification and an extensive analysis of existing energy-saving solutions for CIoT, e.g., the configuration of particular parameter values and software modifications of transport- or radio-layer protocols, while also stressing key parameters impacting the energy consumption such as the frequency of data reporting, discontinuous reception cycles (DRX), and Radio Resource Control (RRC) timers. In addition, we discuss shortcomings, limitations, and possible opportunities which can be investigated in the future to reduce the energy consumption of CIoT devices.

    Download full text (pdf)
    fulltext
  • 8.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Muhammad, Afaq
    Sarhad Univ Sci & Informat Technol, Pakistan.
    Song, Wang-Cheol
    Jeju Natl Univ, South Korea.
    SD-IoV: SDN enabled routing for internet of vehicles in road-aware approach2019In: Journal of Ambient Intelligence and Humanized Computing, ISSN 1868-5137, E-ISSN 1868-5145, Vol. 11, no 3, p. 1265-1280Article in journal (Refereed)
    Abstract [en]

    Proposing an optimal routing protocol for internet of vehicles with reduced overhead has endured to be a challenge owing to the incompetence of the current architecture to manage flexibility and scalability. The proposed architecture, therefore, consolidates an evolving network standard named as software defined networking in internet of vehicles. Which enables it to handle highly dynamic networks in an abstract way by dividing the data plane from the control plane. Firstly, road-aware routing strategy is introduced: a performance-enhanced routing protocol designed specifically for infrastructure-assisted vehicular networks. In which roads are divided into road segments, with road side units for multi-hop communication. A unique property of the proposed protocol is that it explores the cellular network to relay control messages to and from the controller with low latency. The concept of edge controller is introduced as an operational backbone of the vehicle grid in internet of vehicles, to have a real-time vehicle topology. Last but not least, a novel mathematical model is estimated which assists primary controller in a way to find not only a shortest but a durable path. The results illustrate the significant performance of the proposed protocol in terms of availability with limited routing overhead. In addition, we also found that edge controller contributes mainly to minimizes the path failure in the network.

    Download full text (pdf)
    fulltext
  • 9.
    Abdulhadi, Sami
    Karlstad University, Faculty of Technology and Science.
    ARM i inbyggt system: med prototyp2009Independent thesis Basic level (degree of Bachelor), 15 credits / 22,5 HE creditsStudent thesis
    Abstract [en]

    Embedded systems has become more and more common in today's society. The embedded systems are included in almost everything today, from various vehicles to children's toys.

    Today's technology means that yesterday's solutions can be realised on a fraction of the area. More and more become surface mounted with smaller and more complex circuits. This is not always an advantage for the developers when assembling and soldering prototype circuit boards become a more difficult and/or an expensive process.

    The goal is to create an embedded system with an ARM-processor. The system will consist of USB-OTG, ethernet, various memory like FRAM and microSD and a display with touchscreen for user interface. The project includes everything from choice of components to test and verification with program code.

    The time was too short to include all the parts that was planned. The result of the project was a prototype card and two small program sequences, one that blinks the two light diodes on the card and one that writes a picture on the display.

    This embedded system is intended for evaluating ARM-processors by Mikrododakt AB.

    Download full text (pdf)
    ARM i inbyggt system - med prototyp
  • 10.
    Afifi, Haitham
    et al.
    Hasso Platter Institute, Germany.
    Ramaswamy, Arunselvan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karl, Holger
    Hasso Platter Institute, Germany.
    Reinforcement learning for autonomous vehicle movements in wireless multimedia applications2023In: Pervasive and Mobile Computing, ISSN 1574-1192, E-ISSN 1873-1589, Vol. 92, article id 101799Article in journal (Refereed)
    Abstract [en]

    We develop a Deep Reinforcement Learning (DeepRL)-based, multi-agent algorithm to efficiently control autonomous vehicles that are typically used within the context of Wireless Sensor Networks (WSNs), in order to boost application performance. As an application example, we consider wireless acoustic sensor networks where a group of speakers move inside a room. In a traditional setup, microphones cannot move autonomously and are, e.g., located at fixed positions. We claim that autonomously moving microphones improve the application performance. To control these movements, we compare simple greedy heuristics against a DeepRL solution and show that the latter achieves best application performance. As the range of audio applications is broad and each has its own (subjective) per-formance metric, we replace those application metrics by two immediately observable ones: First, quality of information (QoI), which is used to measure the quality of sensed data (e.g., audio signal strength). Second, quality of service (QoS), which is used to measure the network's performance when forwarding data (e.g., delay). In this context, we propose two multi-agent solutions (where one agent controls one microphone) and show that they perform similarly to a single-agent solution (where one agent controls all microphones and has a global knowledge). Moreover, we show via simulations and theoretical analysis how other parameters such as the number of microphones and their speed impacts performance.

  • 11.
    Afzal, Zeeshan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Life of a Security Middlebox: Challenges with Emerging Protocols and Technologies2020Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    The Internet of today has intermediary devices known as middleboxes that perform more functions than the normal packet forwarding function of a router. Security middleboxes are a subset of these middleboxes and face an increasingly difficult task to perform their functions correctly. These middleboxes make many assumptions about the traffic that may not hold true any longer with the advent of new protocols such as MPTCP and technologies like end-to-end encryption.

    The work in this thesis focuses on security middleboxes and the challenges they face. We develop methods and solutions to help these security middleboxes continue to function correctly. In particular, we investigate the case of using MPTCP over traditional security infrastructure as well as the case of end-to-end encryption. We study how practical it is to evade a security middlebox by fragmenting and sending traffic across multiple paths using MPTCP. We then go on to propose possible solutions to detect such attacks and implement them. The potential MPTCP scenario where security middleboxes only have access to part of the traffic is also investigated and addressed. Moreover, the thesis contributes a machine learning based approach to help security middleboxes detect malware in encrypted traffic without decryption.

    Download full text (pdf)
    fulltext
    Download (jpg)
    preview image
  • 12.
    Ahlgren, Bengt
    et al.
    RISE SICS.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Arahamsson, Henrik
    RISE SICS.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hurtig, Per
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Latency-aware Multipath Scheduling inInformation-centric Networks2019In: Proceedings of the Fifteenth Swedish National Computer Networking Workshop (SNCNW), Luleå, Sweden. 4-5 June 2019., 2019Conference paper (Refereed)
    Abstract [en]

    We present the latency-aware multipath schedulerZQTRTT that takes advantage of the multipath opportunities ininformation-centric networking. The goal of the scheduler is touse the (single) lowest latency path for transaction-oriented flows,and use multiple paths for bulk data flows. A new estimatorcalled zero queue time ratio is used for scheduling over multiplepaths. The objective is to distribute the flow over the paths sothat the zero queue time ratio is equal on the paths, that is,so that each path is ‘pushed’ equally hard by the flow withoutcreating unwanted queueing. We make an initial evaluation usingsimulation that shows that the scheduler meets our objectives.

  • 13.
    Ahlgren, Bengt
    et al.
    RISE SICS.
    Hurtig, Per
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Abrahamsson, Henrik
    RISE SICS.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science. Karlstad University, Faculty of Economic Sciences, Communication and IT, Centre for HumanIT.
    Are MIRCC and Rate-based Congestion Control in ICN READY for Variable Link Capacity?2017Conference paper (Other academic)
    Abstract [en]

    Information-centric networking (ICN) has been introduced as a potential future networking architecture. ICN promises an architecture that makes information independent from lo- cation, application, storage, and transportation. Still, it is not without challenges. Notably, there are several outstanding issues regarding congestion control: Since ICN is more or less oblivious to the location of information, it opens up for a single application flow to have several sources, something which blurs the notion of transport flows, and makes it very difficult to employ traditional end-to-end congestion control schemes in these networks. Instead, ICN networks often make use of hop-by-hop congestion control schemes. How- ever, these schemes are also tainted with problems, e.g., several of the proposed ICN congestion controls assume fixed link capacities that are known beforehand. Since this seldom is the case, this paper evaluates the consequences in terms of latency, throughput, and link usage, variable link capacities have on a hop-by-hop congestion control scheme, such as the one employed by the Multipath-aware ICN Rate-based Congestion Control (MIRCC). The evaluation was carried out in the OMNeT++ simulator, and demonstrates how seemingly small variations in link capacity significantly deterio- rate both latency and throughput, and often result in inefficient network link usage. 

    Download full text (pdf)
    fulltext
  • 14.
    Ahlgren, Bengt
    et al.
    RISE SICS.
    Hurtig, Per
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Abrahamsson, Henrik
    RISE SICS.
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    ICN Congestion Control for Wireless Links2018In: IEEE WCNC 2018 Conference Proceedings / [ed] IEEE, New York: IEEE, 2018Conference paper (Refereed)
    Abstract [en]

    Information-centric networking (ICN) with its design around named-based forwarding and in-network caching holds great promises to become a key architecture for the future Internet. Still, despite its attractiveness, there are many open questions that need to be answered before wireless ICN becomes a reality, not least about its congestion control: Many of the proposed hop-by-hop congestion control schemes assume a fixed and known link capacity, something that rarely – if ever – holds true for wireless links. As a first step, this paper demonstrates that although these congestion control schemes are able to fairly well utilise the available wireless link capacity, they greatly fail to keep the link delay down. In fact, they essentially offer the same link delay as in the case with no hop-by-hop, only end- to-end, congestion control. Secondly, the paper shows that by complementing these congestion control schemes with an easy- to-implement, packet-train link estimator, we reduce the link delay to a level significantly lower than what is obtained with only end-to-end congestion control, while still being able to keep the link utilisation at a high level. 

  • 15.
    Ahlquist, Ulrika
    Karlstad University, Division for Information Technology.
    Trådlöst elektriskt lås2007Independent thesis Basic level (professional degree), 10 credits / 15 HE creditsStudent thesis
    Abstract [sv]

    Syftet med examensarbetet är att göra en trådlös version av det elektriska lås som tillverkas av Electec System AB.

    För att göra ett trådlöst elektriskt lås måste ett batteri monteras i låset. Batteriet måste hållas uppladdat hela tiden för att kunna driva motorn och ge strömförsörjning till elektroniken i låset. Alla signaler mellan låset och styrenheten ska dessutom överföras trådlöst istället för med kabel. Signalerna måste kodas innan sändning så att ingen obehörig kan läsa signalen och sedan öppna dörren.

    Det svåraste i ett trådlöst elektriskt lås är att överföra effekt från dörrkarmen till låset eftersom utrymmet är begränsat och avståndet mellan låsblecket i karmen och låset i dörren kan uppgå till 10 mm. För att överföra effekt från dörrkarmen till låset konstruerades en transformator. Förlusterna i transformatorn ökar kraftigt då luftgapet ökas.

    Det visar sig att motor och övriga kretsar kan drivas med ett avstånd mellan kärnorna på upp till 7 mm. Luftgapet kan sannolikt ökas när andra transformatorkärnor används. Dessa fanns dock inte tillgängliga under examensarbetets gång på grund av lång leveranstid. I jämförelse med överföring av effekt är problemet att koda och överföra signaler mellan styrenheten och låset enklare och kan lösas med hjälp av färdiga kretsar.

    Download full text (pdf)
    FULLTEXT01
  • 16. Ahmad, Ahmad AL
    et al.
    Sirjani, Reza
    Daneshvar, Sahand
    New hybrid probabilistic optimisation algorithm for optimal allocation of energy storage systems considering correlated wind farms2020In: Journal of Energy Storage, ISSN 2352-152X, E-ISSN 2352-1538, Vol. 29, p. 101335-101335, article id 101335Article in journal (Refereed)
  • 17.
    ahmad, waqas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Engineering and Physics.
    Development of algorithm for li-ion batteries in electric vehicles, taking into account SOC, charge control, cell balancing and SOF.2014Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
  • 18.
    Ahmadi, Fatemeh
    et al.
    Karlstad University.
    Dahlgren, Kim
    Karlstad University.
    Karlsson Solaiman, Ari
    Karlstad University.
    Rabitsch, Alexander
    Karlstad University.
    Adding support for NEAT to iperf32018Report (Other academic)
    Abstract [en]

    NEAT is an ongoing project which aims to re-enable the evolution ofthe transport layer of the Internet while at the same time providing aneasy to use API for developers of networked software. Researchers behindthe NEAT project has expressed an interest in a trac generator whichutilizes the NEAT framework in order to more easily conduct experiments,however, no such trac generator has previously been available. The goalof this project was to deliver a working implementation of NEAT in iperf3.This report covers the overall design, implementation and design decisionsmade during the project.

    Download full text (pdf)
    fulltext
  • 19.
    Ahmed, Faisal Mahmood
    Karlstad University, Faculty of Technology and Science, Department of Physics and Electrical Engineering.
    Estimated Droop Control for Parallel Connected Voltage Source Inverters: Stability Enhancement2013Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Renewable Energy Sources (RES) are considered as the replacement of conventionalenergy sources. These RES can use wind energy, solar light, bio waste and can alsobe in the form of small hydro power units. These RES has very poor power qualityand contains voltage uctuations and variable frequency. These factors make RES astability risk for the main utility grid. As a solution, currently inverters with dierentdesign techniques are being used as an interface between RES and main utility grid. Thecurrent study proposed a new technique "estimated droop control" for inverter design.The conventional droop control technique which was already used in inverter design, hasdiculty in synchronizing parallel connected inverters with dierent droop gains and lineimpedances. The proposed "estimated droop control" does not use any predened droopvalues for inverters and all inverters are responsible for the estimation of their own droopvalues with respect to their output power. Therefore, inverters are not bound to usesame and static droop values which are considered as a vital communication link. Theproposed design methodology has made inverters independent from this only virtual linkof communication due to which the reliability of a system has increased. The proposeddesign technique has given very good results in a simulation run. When the Simulinkmodel was run in parallel connected inverter with dierent line impedances, it was asuccess as both inverters started operating with same droop values as they were sharingan equal load. The most important test was with dierent line impedances because inconventional droop control it is dicult for inverters to keep their synchronism withdierent line impedances and an unequal load sharing make inverters to deviate fromtheir nominal values and to generate dierent tracking signals for each set. This problemhas been successfully solved with estimated droop control as in this method each inverterset its droop gains according to its output power, which helps an inverter to operate atnominal values with dierent droop gains and line impedance.

    Download full text (pdf)
    Faisal
    Download full text (pdf)
    Arkivfil
  • 20.
    Ahmed, Naeem
    Karlstad University, Faculty of Technology and Science, Department of Physics and Electrical Engineering.
    Cooperative Spectrum Sensing for Cognitive Radio Networks2012Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The great developments in the field of wireless communications that has been accelerated by the commercial need for better services has led to the application of wireless systems in many fields of life. The effect of wireless technology is much widened, like for safety applications, home automation, smart grid control, medical wearable, embedded wireless devices, entertainment systems etc.

    Direct and indirect surveillance of spectrum treatment has acknowledged the sequential and spatial accessibility of spectrum inside allocated frequency bands. This implies that spectrum deficiency is becoming a main problem. Therefore, spectrum deficiency problem arises here in terms of that most of the licensed primary users are not using their spectrum due to any reason of either geographical variation or temporal basis, and lot of allotted spectrum is unused and under-utilized. Moreover, along with spectrum deficiency problem, other issues are also linked like interference caused by secondary unlicensed users to primary licensed users while sharing the work load among each others, and problem of vacating the spectrum band in less fewer time frames after primary users detection.

    Cognitive networks assure to tackle these spectrum deficiency and other associated problems by accommodating secondary (unlicensed) users, in the spectrum region which is under-utilized. Spectrum Sensing is the prime motivation for cognitive radio and ensures that secondary (unlicensed) users do not propose unbearable levels of interference to primary (licensed) users.

    Cooperative Spectrum Sensing methodologies are still an open window of research. This work is related to cope up the problem of spectrum deficiency and associated problems, by developing an approach for establishment of grouping/clustering between secondary users in a cooperative spectral environment. This approach ensures that members within a group are highly correlated. As a result, the workload on each sensing node within a group is reduced. The effectiveness of this approach depends upon the accuracy of fused decision related to the presence or absence of primary (licensed) user at a particular band (50MHZ to 100MHZ). This approach also depends on the factor that time taken in sensing the primary (licensed) users should be less enough so that decision in vacating the band by the Cognitive Radio secondary users could be taken in fewer time frames. This latter metric is known to be ‘agility’, which eventually comes with the outcome of minimum interference to primary users via their early recognition.

  • 21.
    Ahmed, Umair
    Karlstad University, Faculty of Technology and Science, Department of Physics and Electrical Engineering.
    Racing Driver Model in Dymola Vehicle Dynamics Library (VDL): Steering Controller Design2012Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Racing drivers always want to traverse path at vehicle’s maximum performance limits while keeping the vehicle at its ideal trajectory. The main objective of this report is to elaborate strategy for the path following problem in which driver has to follow the predefined 2D roads. New steering controller design for closed loop racing driver model in Dymola vehicle dynamics library is developed. The methodology proposed by Sharp et al. [2] is followed with the optimal velocity profile that tries to mimic the actions of the real drivers in real time scenarios. Vehicle handling limits i.e. longitudinal and lateral limits are defined before simulation. While travelling in the neighbourhood of optimal velocity on the straight road as well as during the curves, the performance of the steering controller is tested by conducting the test on J turn, Clothoid, Extended chicane and the closing curve path and also tested during the different environment effects e.g. when there is a side wind affecting the vehicle. Performance of existing and new steering controllers discussed and compared in result chapter. It is ensured that the drawbacks in the existing steering controller are eliminated by using the proposed methodology in new implemented steering controller.

    Key Words: Driver Model, Steering Controller, Path following, Velocity profile

    Download full text (pdf)
    fulltext
  • 22.
    Aimal, Pir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Engineering and Physics.
    Mohsin, Main
    Analyzing Voltage control and reactive power support from full power converter wind turbine2011Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
    Download (pdf)
    cover
  • 23.
    Akil, Mahdi
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hoepman, Jaap-Henk
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Radboud University Nijmegen, Netherlands.
    A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETs2024In: Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT / [ed] Sabrina De Capitani Di Vimercati and Pierangela Samarati, SciTePress, 2024, p. 114-127Conference paper (Refereed)
    Abstract [en]

    Vehicular Ad-hoc Networks (VANETs) enable communications between vehicles and infrastructure and are a key part of future Intelligent Transportation Systems. Significant advancements have been made in ensuring anonymous and secure communication within VANETs; however, integrating privacy-preserving vehicle rentals in VANETS is an unsolved problem. Existing protocols do not address the unique challenges posed by vehicle sharing and rentals, particularly regarding vehicle owners’ and renters’ privacy. This paper proposes a novel rental protocol within VANETs. Our solution is based on delegatable anonymous credentials and NonInteractive Zero-Knowledge (NIZK) proofs. It allows drivers to securely delegate credentials to vehicles. This approach ensures that each vehicle broadcasts authenticated messages, verified through NIZK proofs, while the identity of the actual driver is verifiably escrowed to an inspector that can lift driver privacy in case of abuse. The latter property implements accountability into the system. Our protocol addresses the trust issues inherent in previous systems by providing a robust mechanism for privacy-preserving, accountable vehicle rentals in VANETs, enhancing the overall security and functionality of these networks.

  • 24.
    Akil, Mahdi
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Martucci, Leonardo
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hoepman, Jaap-Henk
    Radboud University, The Netherlands.
    Non-Interactive Privacy-Preserving Sybil-Free Authentication Scheme in VANETs2023In: Network and Distributed System Security (NDSS) Symposium: Inaugural Symposium on Vehicle Security and Privacy (VehicleSec 2023), Internet Society , 2023Conference paper (Refereed)
    Abstract [en]

    In vehicular ad hoc networks (VANETs), vehicles exchange messages to improve traffic and passengers’ safety. In VANETs, (passive) adversaries can track vehicles (and their drivers) by analyzing the data exchanged in the network. The use of privacy-enhancing technologies can prevent vehicle tracking but solutions so far proposed either require an intermittent connection to a fixed infrastructure or allow vehicles to generate concurrent pseudonyms which could lead to identity-based (Sybil) attacks. In this paper, we propose an anonymous authentication scheme that does not require a connection to a fixed infrastructure during operation and is not vulnerable to Sybil attacks. Our scheme is built on attribute-based credentials and short lived pseudonyms. In it, vehicles interact with a central authority only once, for registering themselves, and then generate their own pseudonyms without interacting with other devices, or relying on a central authority or a trusted third party. The pseudonyms are periodically refreshed, following system wide epochs.

    Download full text (pdf)
    vehiclesec2023-23007-paper.pdf
  • 25. AL Ahmad, Ahmad
    et al.
    Sirjani, Reza
    Optimal placement and sizing of multi-type FACTS devices in power systems using metaheuristic optimisation techniques: An updated review2020In: Ain Shams Engineering Journal, ISSN 2090-4479, E-ISSN 2090-4495, Vol. 11, no 3, p. 611-628Article in journal (Refereed)
  • 26.
    Alaqra, Ala Sarah
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ciceri, Eleneora
    MediaClinics, ITA.
    Fischer-Hübner, Simone
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kane, Bridget
    Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013). MediaClinics, ITA.
    Mosconi, Marco
    MediaClinics, ITA.
    Vicini, Sauro
    MediaClinics, ITA.
    Using PAPAYA for eHealth – Use Case Analysis and Requirements2020In: 2020 IEEE 33rd International Symposium on Computer-Based Medical Systems (CBMS), IEEE, 2020, p. 437-442Conference paper (Refereed)
    Abstract [en]

    This paper presents an eHealth use case basedon a privacy-preserving machine learning platform to detectarrhythmia developed by the PAPAYA project that can run inan untrusted domain. It discusses legal privacy and user requirementsthat we elicited for this use case from the GDPR andvia stakeholder interviews. These include requirements for securepseudonymisation schemes, for allowing also pseudonymous usersto exercise their data subjects rights, for not making diagnosticdecisions fully automatically and for assurance guarantees, conformancewith specified standards and informing clinicians andpatients about the privacy protection. The requirements are notonly relevant for our use case but also for other use cases utilisingprivacy-preserving data analytics to classify medical data.

    Download full text (pdf)
    fulltext
  • 27.
    Alay, Özgü
    et al.
    SIMULA METROPOLITAN CENTER FOR DIGITAL ENGINEERING (SRL).
    Caso, Giuseppe
    IMULA METROPOLITAN CENTER FOR DIGITAL ENGINEERING (SRL).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rabitsch, Alexander
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Anagnostopolous, Themistoklis
    NATIONAL CENTER FOR SCIENTIFIC RESEARCH “DEMOKRITOS”.
    Xylouris, Georgios
    NATIONAL CENTER FOR SCIENTIFIC RESEARCH “DEMOKRITOS”.
    Koumaras, Harilaos
    NATIONAL CENTER FOR SCIENTIFIC RESEARCH “DEMOKRITOS”.
    Aumayr, Erik
    L.M. ERICSSON LIMITED.
    Bosneag, Anne-Marie
    L.M. ERICSSON LIMITED.
    McNamara, Joseph
    L.M. ERICSSON LIMITED.
    Pretel, Ivan
    FON TECHNOLOGY SL.
    Etxebarria, Iñaki
    FON TECHNOLOGY SL.
    Jimeno, Elisa
    ATOS SPAIN SA.
    Diaz-Zayas, Almudena
    UNIVERSIDAD DE MALAGA, SPAIN.
    Garcia, Belen
    UNIVERSIDAD DE MALAGA, SPAIN.
    Reichert, Leonie
    HUMBOLDT UNIVERSITY, GERMANY.
    Sakkas, Christos
    INFOLYSIS P.C..
    Papaioannou, Angeliki
    INFOLYSIS P.C..
    Koumaras, Vaios
    INFOLYSIS P.C..
    Rajaguru, Santosh Kumar
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Prakash, Arun
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Eichhorn, Fabian
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Emmelmann, Marc
    FRAUNHOFER GESELLSCHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Keil, O.
    CHAFT ZUR FOERDERUNG DER ANGEWANDTEN FORSCHUNG E.V..
    Lioprasitis, Dimitrios
    SPACE HELLAS (CYPRUS) LTD.
    Gardikis, Georgios
    SPACE HELLAS (CYPRUS) LTD.
    Frascolla, Valerio
    INTEL.
    Monitoring and Analytics (Release B)2021Report (Refereed)
    Abstract [sv]

    This document describes the design and implementation of the 5GENESIS Monitoring & Analytics (M&A) framework in its Release B, developed within Task T3.3 of the project work plan. M&A Release B leverages and extends M&A Release A, which has been documented in the previous Deliverable D3.5 [1]. In particular, we present new features and enhancements introduced in this new Release compared to the Release A. We also report some examples of usage of the M&A framework, in order to showcase its integrated in the 5GENESIS Reference Architecture. 

    Download full text (pdf)
    fulltext
  • 28.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    García, Rafael
    IMDEA Networks Institute, Spain.
    Peón Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway AS, Norway.
    Dely, Tobias
    Celerway AS, Norway.
    Werme, Jonas
    Celerway AS, Norway.
    Evensen, Kristian
    Celerway AS, Norway.
    Hansen, Audun
    Celerway AS, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Safari Khatouni, Ali
    Politecnico di Torino.
    Mellia, Marco
    Politecnico di Torino.
    Ajmone Marsan, Marco
    Politecnico di Torino.
    Monno, Roberto
    Nextworks, Italy.
    Lønsethagen, Håkon
    Telenor R&D, Norway.
    MONROE, a distributed platform to measure and assess mobile broadband networks: demo2016In: Proceedings of the Tenth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation, and Characterization, New York, NY, USA: Association for Computing Machinery (ACM), 2016, p. 85-86Conference paper (Refereed)
    Abstract [en]

    This demo presents the MONROE distributed platform and how it can be used to implement measurement and assessment experiments with operational mobile broadband networks (MBBs). MONROE provides registered experimenters with open access to hundreds of nodes, distributed over several European countries and equipped with multiple MBB connections, and a backend system that collects the measurement results. Experiments are scheduled through a user-friendly web client, with no need to directly access the nodes. The platform further embeds tools for real-time traffic flow analysis and a powerful visualization tool.

  • 29.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    Peón-Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway Communications, Norway.
    Evensen, Kristian
    Celerway Communications, Norway.
    Hansen, Audun
    Celerway Communications, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Safari Khatouni, Ali
    Politecnico di Torino, Italy.
    Mellia, Marco
    Politecnico di Torino, Italy.
    Ajmone Marsan, Marco
    IMDEA Networks Institute, Spain and Politecnico di Torino, Italy.
    Experience: An open platform for experimentation with commercial mobile broadband networks2017In: MobiCom '17 Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, New York: Association for Computing Machinery (ACM), 2017, p. 70-78Conference paper (Refereed)
    Abstract [en]

    Open experimentation with operational Mobile Broadband (MBB) networks in the wild is currently a fundamental requirement of the research community in its endeavor to address the need of innovative solutions for mobile communications. Even more, there is a strong need for objective data about stability and performance of MBB (e.g., 3G/4G) networks, and for tools that rigorously and scientifically assess their status. In this paper, we introduce the MONROE measurement platform: an open access and flexible hardware-based platform for measurements and custom experimentation on operational MBB networks. The MONROE platform enables accurate, realistic and meaningful assessment of the performance and reliability of 11 MBB networks in Europe. We report on our experience designing, implementing and testing the solution we propose for the platform. We detail the challenges we overcame while building and testing the MONROE testbed and argue our design and implementation choices accordingly. We describe and exemplify the capabilities of the platform and the wide variety of experiments that external users already perform using the system

  • 30.
    Alay, Özgü
    et al.
    Simula Research Laboratory, Norway.
    Lutu, Andra
    Simula Research Laboratory, Norway.
    Rafael, García
    IMDEA Networks Institute, Spain.
    Peón Quirós, Miguel
    IMDEA Networks Institute, Spain.
    Mancuso, Vincenzo
    IMDEA Networks Institute, Spain.
    Hirsch, Thomas
    Celerway AS, Norway.
    Tobias, Dély
    Celerway AS, Norway.
    Werme, Jonas
    Celerway AS, Norway.
    Evensen, Kristian
    Celerway AS, Norway.
    Fosselie Hansen, Audun
    Celerway AS, Norway.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Karlsson, Jonas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Safari Khatouni, Ali
    Politecnico di Torino, Italy.
    Mellia, Marco
    Politecnico di Torino, Italy.
    Ajmone Marsan, Marco
    Politecnico di Torino & IMDEA Networks, Italy.
    Monno, Roberto
    Nextworks, Italy.
    Lønsethagen, Håkon
    Telenor R&D, Norway.
    Measuring and Assessing Mobile Broadband Networks with MONROE2016In: 2016 IEEE International Symposium on a World of Wireless, Mobile, and Multimedia Networks (WoWMoM), Red Hook: IEEE, 2016Conference paper (Refereed)
    Abstract [en]

    Mobile broadband (MBB) networks underpin numerous vital operations of the society and are arguably becoming the most important piece of the communications infrastructure. In this demo paper, our goal is to showcase the potential of a novel multi-homed MBB platform for measuring, monitoring and assessing the performance of MBB services in an objective manner. Our platform, MONROE, is composed of hundreds of nodes scattered over four European countries and a backend system that collects the measurement results. Through a user-friendly web client, the experimenters can schedule and deploy their experiments. The platform further embeds traffic analysis tools for real-time traffic flow analysis and a powerful visualization tool.

  • 31.
    Alfredsson, Freysteinn
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hurtig, Per
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunstrom, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Hoiland-Jorgensen, Toke
    Red Hat, Denmark.
    Brouer, Jesper Dangaard
    Cloudflare, Denmark.
    XDQ: Enhancing XDP with Queuing and Packet Scheduling2024In: Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, ICIN 2024 / [ed] Chemouil P., Martini B., Machuca C.M., Papadimitriou P., Borsatti D., Rovedakis S., IEEE, 2024, p. 52-56Conference paper (Refereed)
    Abstract [en]

    Modern internet users expect seamless, uninterrupted communication when using real-time applications, even when sharing the network connection with devices that produce heavy traffic. This trend has pushed the demand for more sophisticated packet schedulers on routers. However, given the limited resources on these routers, it is increasingly important to reduce the overhead associated with these schedulers. This paper presents XDP Queuing (XDQ), our ongoing work on achieving faster packet scheduling on the Linux operating system, which is popular on networking equipment. Linux provides eXpress Data Path (XDP), a high-performance programmable network data path using the eBPF framework, which allows code to process packets early from the driver. While XDP has found numerous uses in the industry, such as Denial-of-Service attack mitigation, load-balancers, and intrusion prevention systems, it currently has no mechanism for queueing or reordering packets and cannot implement traffic scheduling policies. Our contribution, XDQ, is a programmable packet scheduling extension for the XDP framework. XDQ uses recently proposed schemes for programmable queues. It allows writing packet schedulers using eBPF while benefiting from the XDP fast data path. 

  • 32.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    A Case Study of Recent Mifare Classic Field Deployments From an (In-)Security Perspective2013In: Proceedings of the 21st International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2013), Split, Croatia: FESB, University of Split , 2013Conference paper (Refereed)
    Abstract [en]

    Mifare Classic is a very popular near-field communication technology that provides a shared-key, access-controlled, storage. Although the authentication protocol of Mifare Classic is compromised since half a decade, systems are still being deployed based on this technology, e.g. for access control systems and for public transport ticketing. By using commodity hardware, such as NFC enabled smartphones, by passing the security measures in some cases only require the installation and operation of a smartphone app. To this end, we present case studies of a number of recent Mifare Classic systems deployed during the last year, to serve as an illustration of practical security problems and to raise awareness thereof among NFC technology buyers and system implementors.

  • 33.
    Alfredsson, Stefan
    Karlstad University, Division for Information Technology.
    TCP in Wireless Networks: Challenges, Optimizations and Evaluations2005Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    This thesis presents research on transport layer behavior in wireless networks. As the Internet is expanding its reach to include mobile devices, it has become apparent that some of the original design assumptions for the dominant transport protocol, TCP, are approaching their limits. A key feature of TCP is the congestion control algorithm, constructed with the assumption that packet loss is normally very low, and that packet loss therefore is a sign of network congestion. This holds true for wired networks, but for mobile wireless networks non-congestion related packet loss may appear. The varying signal power inherent with mobility and handover between base-stations are two example causes of such packet loss. This thesis provides an overview of the challenges for TCP in wireless networks together with a compilation of a number of suggested TCP optimizations for these environments. A TCP modification called TCP-L is proposed. It allows an application to increase its performance, in environments where residual bit errors normally give a degraded throughput, by making a reliability tradeoff. The performance of TCP-L is experimentally evaluated with an implementation in the Linux kernel. The transport layer performance in a 4G scenario is also experimentally investigated, focusing on the impact of the link layer design and its parameterization. Further, for emulation-based protocol evaluations, controlled packet loss and bit error generation is shown to be an important aspect.

    Download full text (pdf)
    FULLTEXT02
  • 34.
    Alfredsson, Stefan
    et al.
    Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Division for Information Technology.
    Bit Error Tolerant Multimedia Transport2004In: Perspectives on Multimedia: Communication, Media and Information Technology, Chichester: John Wiley & Sons, 2004, p. 175-191Chapter in book (Other academic)
  • 35.
    Alfredsson, Stefan
    et al.
    Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Division for Information Technology.
    TCP-L: Allowing Bit Errors in Wireless TCP2003In: Proceedings of the 12th IST Summit on Mobile and Wireless Communications: Enabling a Pervasive Wireless World / [ed] Atílio Gameiro, Institute for Operations Research and the Management Sciences (INFORMS), 2003, p. 149-154Conference paper (Refereed)
    Abstract [en]

    This paper presents a technique to improve the performance of TCP and the utilization of wireless networks.Wireless links exhibit high rates of bit errors, compared to communication over wireline or fiber. Since TCP cannotseparate packet losses due to bit errors versus congestion,all losses are treated as signs of congestion and congestionavoidance is initiated. This paper explores the possibility of accepting TCP packets with an erroneous checksum, toimprove network performance for those applications that can tolerate bit errors. Since errors may be in the TCP header aswell as the payload, the possibility of recovering the headeris discussed. An algorithm for this recovery is also presented.Experiments with an implementation have been performed,which show that large improvements in throughput can beachieved, depending on link and error characteristics.

  • 36.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Division for Information Technology.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Division for Information Technology.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    A 4G Link Level Emulator for Transport Protocol Evaluation2004In: Proceedings of The Second Swedish National Computer Networking Workshop (SNCNW), 2004, p. 19-23Conference paper (Refereed)
    Abstract [en]

    This paper presents a wireless link and networkemulator, based upon the "Wireless IP" 4G system proposalfrom Uppsala University and partners. In wireless fading down-links (base to terminals) link-level frames are scheduled andthe transmission is adapted on a fast time scale. With fastlink adaptation and fast link level retransmission, the fading properties of wireless links can to a large extent be counteractedat the physical and link layers. A purpose of the emulatoris to investigate the resulting interaction with transport layer protocols. The emulator is built on Internet technologies, andis installed as a gateway between communicating hosts. The paper gives an overview of the emulator design, and presentspreliminary experiments with three different TCP variants. The results illustrate the functionality of the emulator by showing theeffect of changing link layer parameters on the different TCP variants.

  • 37.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Cross-layer analysis of TCP performance in a 4G system2007In: Proceedings of the 15th International Conference on Software, Telecommunications and Computer Networks, IEEE Computer Society, 2007Conference paper (Refereed)
    Abstract [en]

    This paper presents results from an experimental study of TCP in a wireless 4G evaluation system. Test-bed results on transport layer performance are presented and analyzed in relation to several link layer aspects. The aspects investigated are the impact of channel prediction errors, channel scheduling, delay, and adaptive modulation switch level, on TCP performance. The paper contributes a cross-layer analysis of the interaction between symbol modulation levels, different scheduling strategies, channel prediction errors and the resulting frame retransmissions effect on TCP. The paper also shows that highly persistent ARQ with fast link retransmissions do not interact negatively with the TCP retransmission timer even for short round trip delays.

  • 38.
    Alfredsson, Stefan
    et al.
    Karlstad University, Division for Information Technology. Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science. Karlstad University, Division for Information Technology.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Emulation and Validation of a 4G System Proposal2005In: Proceedings of RadioVetenskap och Kommunikation 2005: Volume II, 2005, p. 357-362Conference paper (Refereed)
    Abstract [en]

    This paper presents a wireless link and network emulator,along with experiments and validation against the "Wireless IP" 4G system proposal from Uppsala University and partners. In wireless fading downlinks (base to terminals) link-level frames are scheduled and the transmission is adapted on a fast time scale. With fast link adaptation and fast link level retransmission, the fading properties of wireless links can to a large extent be counteracted at thephysical and link layers. The emulator has been used to experimentally investigate the resulting interaction between the transport layer and the link layer. The paper gives an overview of the emulator design, and presents experimental results with three different TCP variants in combination with various link layer characteristics.

  • 39.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Impact of 4G Wireless Link Configurations on VoIP Network Performance2008In: Proceedings of the 2008 IEEE International Symposium on Wireless Communication Systems, IEEE Communications Society, 2008, p. 708-712Conference paper (Refereed)
    Abstract [en]

    The performance of applications in wireless networks is partly dependent upon the link configuration. Link characteristics varies with frame retransmission persistency, link frame retransmission delay, adaptive modulation strategies, coding, and more. The link configuration and channel conditions can lead to packet loss, delay and delay variations, which impact different applications in different ways. A bulk transfer application may tolerate delays to a large extent, while packet loss is undesirable. On the other hand, real-time interactive applications are sensitive to delay and delay variations, but may tolerate packet loss to a certain extent. This paper contributes a study of the effect of link frame retransmission persistency and delay on packet loss and latency for real-time interactive applications. The results indicate that a reliable retransmission mechanism with fast link retransmissions in the range of 2-8 ms is sufficient to provide an upper delay bound of 50 ms over the wireless link, which is well within the delay budget of voice over IP applications.

  • 40.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Economic Sciences, Communication and IT, Department of Computer Science.
    Mikael, Sternad
    Signaler och System, Uppsala universitet.
    Transport Protocol Performance over 4G Links: Emulation Methodology and Results2006In: Proceedings of the International Symposium on Wireless Communication Systems (ISWCS), IEEE Computer Society, 2006, p. 327-332Conference paper (Refereed)
    Abstract [en]

    This paper presents a wireless link and network emulator for the "Wireless IP" 4G system proposal from Uppsala University and partners. In wireless fading downlinks (base to terminals) link-level frames are scheduled and the transmission is adapted on a fast time scale. With fast link adaptation and fast link level retransmission, the fading properties of wireless links can to a large extent be counteracted at the physical and link layers. The emulator has been used to experimentally investigate the resulting interaction between the transport layer and the physical/link layer in such a downlink. The paper introduces the Wireless IP system, describes the emulator design and implementation, and presents experimental results with TCP in combination with various physical/link layer parameters. The impact of link layer ARQ persistency, adaptive modulation, prediction errors and simple scheduling are all considered.

  • 41.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Del Giudice, Giacomo
    Politecnico di Bari, Italy.
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    De Cicco, Luca
    Ecole superieure d'Electricite, France; Politecnico di Bari, Italy.
    Mascolo, Saverio
    Politecnico di Bari, Italy.
    Impact of TCP Congestion Control on Bufferbloat in Cellular Networks2013In: Proceedings of the 14th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2013) / [ed] Angelos Lazaris, Balaji Rengarajan, IEEE Press, 2013Conference paper (Refereed)
    Abstract [en]

    The existence of excessively large and too filled network buffers, known as bufferbloat, has recently gained attention as a major performance problem for delay-sensitive applications. One important network scenario where bufferbloat may occur is cellular networks.

    This paper investigates the interaction between TCP congestion control and buffering in cellular networks. Extensive measurements have been performed in commercial 3G, 3.5G and 4G cellular networks, with a mix of long and short TCP flows using the CUBIC, NewReno and Westwood+ congestion control algorithms. The results show that the completion times of short flows increase significantly when concurrent long flow traffic is introduced. This is caused by increased buffer occupancy from the long flows. In addition, for 3G and 3.5G the completion times are shown to depend significantly on the congestion control algorithms used for the background flows, with CUBIC leading to significantly larger completion times.

  • 42.
    Alfredsson, Stefan
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Del Giudice, Giacomo
    Politecnico di Bari, Italy.
    Garcia, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    Brunstrom, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science.
    De Cicco, Luca
    Ecole superieure d'Electricite, France; Politecnico di Bari, Italy.
    Mascolo, Saverio
    Politecnico di Bari, Italy.
    Observations of Bufferbloat in Swedish Cellular Networks2013In: Proceedings of the 9th Swedish National Computer Networking Workshop (SNCNW 2013) / [ed] Bengt Ahlgren, 2013Conference paper (Refereed)
  • 43. Ali, A
    et al.
    Hoagg, J. B
    Mossberg, Magnus
    Karlstad University, Faculty of Technology and Science, Department of Physics and Electrical Engineering.
    Bernstein, D. S
    Growing window recursive quadratic optimization with variable regularization2010Conference paper (Refereed)
  • 44.
    Ali, Asad A.
    et al.
    Univ Michigan, Dept Aerosp Engn, Ann Arbor, MI 48109 USA..
    Hoagg, Jesse B.
    Univ Kentucky, Dept Mech Engn, 151 Ralph G Anderson Bldg, Lexington, KY 40507 USA..
    Mossberg, Magnus
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Engineering and Physics.
    Bernstein, Dennis S.
    Univ Michigan, Dept Aerosp Engn, Ann Arbor, MI 48109 USA..
    On the stability and convergence of a sliding-window variable-regularization recursive-least-squares algorithm2016In: International journal of adaptive control and signal processing (Print), ISSN 0890-6327, E-ISSN 1099-1115, Vol. 30, no 5, p. 715-735Article in journal (Refereed)
    Abstract [en]

    A sliding-window variable-regularization recursive-least-squares algorithm is derived, and its convergence properties, computational complexity, and numerical stability are analyzed. The algorithm operates on a finite data window and allows for time-varying regularization in the weighting and the difference between estimates. Numerical examples are provided to compare the performance of this technique with the least mean squares and affine projection algorithms. Copyright (c) 2015 John Wiley & Sons, Ltd.

  • 45.
    Ali, Nour
    et al.
    Brunel University, London, UK.
    Baker, Sean
    University of Limerick, Ireland.
    O'Crowley, Ross
    Red Orkid Limited, Dublin, Ireland.
    Herold, Sebastian
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Buckley, Jim
    University of Limerick, Ireland.
    Architecture consistency: State of the practice, challenges and requirements (vol 23, pg 224, 2018)2018In: Empirical Software Engineering, ISSN 1382-3256, E-ISSN 1573-7616, Vol. 23, no 3, p. 1868-1869Article in journal (Refereed)
    Download full text (pdf)
    fulltext
  • 46.
    Ali, Usman
    et al.
    Sapienza University of Rome, Italy.
    Caso, Giuseppe
    Ericsson AB, Kista, Sweden.
    De Nardis, Luca
    Sapienza University of Rome, Italy.
    Kousias, Konstantinos
    Simula Research Laboratory, Norway.
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alay, Özgü
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). University of Oslo, Norway.
    Neri, Marco
    Rohde & Schwarz, Italy..
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Di Benedetto, Maria-Gabriella
    Sapienza University of Rome, Italy.
    Data-Driven Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks2022In: Future Internet, E-ISSN 1999-5903, Vol. 14, no 8, p. 1-27, article id 239Article in journal (Refereed)
    Abstract [en]

    The successful rollout of fifth-generation (5G) networks requires a full understanding of the behavior of the propagation channel, taking into account the signal formats and the frequencies standardized by the Third Generation Partnership Project (3GPP). In the past, channel characterization for 5G has been addressed mainly based on the measurements performed on dedicated links in experimental setups. This paper presents a state-of-the-art contribution to the characterization of the outdoor-to-indoor radio channel in the 3.5 GHz band, based on experimental data for commercial, deployed 5G networks, collected during a large scale measurement campaign carried out in the city of Rome, Italy. The analysis presented in this work focuses on downlink, outdoor-to-indoor propagation for two operators adopting two different beamforming strategies, single wide-beam and multiple synchronization signal blocks (SSB) based beamforming; it is indeed the first contribution studying the impact of beamforming strategy in real 5G networks. The time and power-related channel characteristics, i.e., mean excess delay and Root Mean Square (RMS) delay spread, path loss, and K-factor are studied for the two operators in multiple measurement locations. The analysis of time and power-related parameters is supported and extended by a correlation analysis between each pair of parameters. The results show that beamforming strategy has a marked impact on propagation. A single wide-beam transmission leads, in fact, to lower RMS delay spread and lower mean excess delay compared to a multiple SSB-based transmission strategy. In addition, the single wide-beam transmission system is characterized by a smaller path loss and a higher K-factor, suggesting that the adoption of a multiple SSB-based transmission strategy may have a negative impact on downlink performance.

    Download full text (pdf)
    fulltext
  • 47.
    Ali, Usman
    et al.
    Sapienza University of Rome, ITA.
    Caso, Giuseppe
    Ericsson Research.
    De Nardis, Luca
    Sapienza University of Rome, ITA.
    Kousias, Konstantinos
    Simula Research Laboratory, NOR.
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alay, Özgü
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). University of Oslo, NOR.
    Neri, Marco
    Rohde & Schwarz, ITA.
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Di Benedetto, Maria-Gabriella
    Sapienza University of Rome, ITA.
    Large-Scale Dataset for the Analysis of Outdoor-to-Indoor Propagation for 5G Mid-Band Operational Networks2022In: Data, E-ISSN 2306-5729, Vol. 7, no 3, p. 34-34Article in journal (Refereed)
    Abstract [en]

    Understanding radio propagation characteristics and developing channel models is fundamental to building and operating wireless communication systems. Among others uses, channel characterization and modeling can be used for coverage and performance analysis and prediction. Within this context, this paper describes a comprehensive dataset of channel measurements performed to analyze outdoor-to-indoor propagation characteristics in the mid-band spectrum identified for the operation of 5th Generation (5G) cellular systems. Previous efforts to analyze outdoor-to-indoor propagation characteristics in this band were made by using measurements collected on dedicated, mostly single-link setups. Hence, measurements performed on deployed and operational 5G networks still lack in the literature. To fill this gap, this paper presents a dataset of measurements performed over commercial 5G networks. In particular, the dataset includes measurements of channel power delay profiles from two 5G networks in Band n78, i.e., 3.3–3.8 GHz. Such measurements were collected at multiple locations in a large office building in the city of Rome, Italy by using the Rohde & Schwarz (R&S) TSMA6 network scanner during several weeks in 2020 and 2021. A primary goal of the dataset is to provide an opportunity for researchers to investigate a large set of 5G channel measurements, aiming at analyzing the corresponding propagation characteristics toward the definition and refinement of empirical channel propagation models.

    Download full text (pdf)
    fulltext
  • 48.
    Alizadeh Noghani, Kyoomars
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kassler, Andreas
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    SDN Enhanced Ethernet VPN for Data Center Interconnect2017In: 2017 IEEE 6th International Conference on Cloud Networking (CloudNet) / [ed] Maga, D, IEEE, 2017, p. 77-82Conference paper (Refereed)
    Abstract [en]

    Ethernet Virtual Private Network (EVPN) is an emerging technology that addresses the networking challenges presented by geo-distributed Data Centers (DCs). One of the major advantages of EVPN over legacy layer 2 VPN solutions is providing All-Active (A-A) mode of operation so that the traffic can truly be multi-homed on Provider Edge (PE) routers. However, A-A mode of operation introduces new challenges. In the case where the Customer Edge (CE) router is multi-homed to one or more PE routers, it is necessary that only one of the PE routers should forward Broadcast, Unknown unicast, and Multicast (BUM) traffic into the DC. The PE router that assumes the primary role for forwarding BUM traffic to the CE device is called the Designated Forwarder (DF). The proposed solution to select the DF in the EVPN standard is based on a distributed algorithm which has a number of drawbacks such as unfairness and intermittent behavior. In this paper, we introduce a Software-Defined Networking (SDN) based architecture for EVPN support, where the SDN controller interacts with EVPN control plane. We demonstrate how our solution mitigates existing problems for DF selection which leads to improved EVPN performance.

  • 49.
    Alizadeh Noghani, Kyoomars
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Kassler, Andreas
    Karlstad University, Faculty of Economic Sciences, Communication and IT (discontinued), Department of Computer Science.
    Taheri, Javid
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Ohlen, Peter
    Ericsson Research, Sweden.
    Curescu, Calin
    Ericsson Research, Sweden.
    Multi-Objective genetic algorithm for fast service function chain reconfiguration2023In: IEEE Transactions on Network and Service Management, E-ISSN 1932-4537, Vol. 20, no 3, p. 3501-3522Article in journal (Refereed)
    Abstract [en]

    The optimal placement of virtual network functions (VNFs) improves the overall performance of servicefunction chains (SFCs) and decreases the operational costs formobile network operators. To cope with changes in demands,VNF instances may be added or removed dynamically, resourceallocations may be adjusted, and servers may be consolidated.To maintain an optimal placement of SFCs when conditionschange, SFC reconfiguration is required, including the migration of VNFs and the rerouting of service-flows. However, suchreconfigurations may lead to stress on the VNF infrastructure,which may cause service degradation. On the other hand, notchanging the placement may lead to suboptimal operation,and servers and links may become congested or underutilized,leading to high operational costs. In this paper, we investigatethe trade-off between the reconfiguration of SFCs and theoptimality of their new placement and service-flow routing. Wedevelop a multi-objective genetic algorithm that explores thePareto front by balancing the optimality of the new placementand the cost to achieve it. Our numerical evaluations show thata small number of reconfigurations can significantly reduce theoperational cost of the VNF infrastructure. In contrast, toomuch reconfiguration may not pay off due to high costs. Webelieve that our work provides an important tool that helpsnetwork providers to plan a good reconfiguration strategy fortheir service chains.

  • 50. Alm, Magnus
    et al.
    Fauhlér, Robert
    Nätplanering på Fortum Distribution2012Independent thesis Basic level (university diploma), 15 credits / 22,5 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
1234567 1 - 50 of 933
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf