Search results for "Admission control"

showing 10 items of 22 documents

Teletraffic Engineering for Direct Load Control in Smart Grids

2018

International audience; The traditional paradigm for power grid operation is to continuously adapt energy production to demand. This paradigm is challenged by the increasing penetration of renewable sources, that are more variable and less predictable. An alternative approach is the direct load control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performance metrics. In this paper we go beyond such an analogy, showing that u…

Computer science020209 energyDistributed computingDirect controlEnergy Engineering and Power Technology02 engineering and technologySmart gridAdmission control; Direct load control; Privacy; Smart grid;7. Clean energyTeletraffic engineering[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringPower gridElectrical and Electronic EngineeringDirect load controlLeakage (electronics)Direct Load Controlbusiness.industryRenewable Energy Sustainability and the EnvironmentSettore ING-INF/03 - TelecomunicazioniBandwidth (signal processing)Admission Control[SPI.NRJ]Engineering Sciences [physics]/Electric powerAdmission controlRenewable energySmart gridControl and Systems EngineeringPrivacybusinessAdmission control
researchProduct

Endpoint Admission Control over Assured Forwarding PHBs and Its Performance over RED Implementations

2001

The Assured Forwarding Per Hop Behavior (AF PHB) has been devised by the IETF Differentiated Services (DiffServ) working group to provide drop level differentiation. The intent of AF is to support services with different loss requirements, but with no strict delay and jitter guarantees. Another suggested use of AF is to provide differentiated support for traffic conforming to an edge conditioning/policing scheme with respect to nonconforming traffic. Scope of this paper is twofold. First, we show that, quite surprisingly, a standard AF PHB class is semantically capable of supporting per flow admission control. This is obtained by adopting the AF PHB as core routers forwarding mechanism in c…

Core routerEdge deviceDifferentiated servicesbusiness.industryComputer scienceQuality of serviceAdmission controlbusinessQueueComputer networkJitterHop (networking)
researchProduct

PCP: An End-to end Measurement Based Call Admission Control for Real-Time Services Over IP Networks

2000

Distributed end-to-end measurement based connection admission control mechanisms have been recently proposed. The goal of these schemes is to provide tight QoScon trol on a per connection basis by means of measurements taken by the edge nodes and priority based forwarding procedure at internal nodes. Since the additional flows handling procedures are implemented at the border routers and the forwarding mechanisms are for flows aggregates only, the approach is fully scalable and compatible with the IETF Differentiated Service proposal. The aim of this paper is to propose specific schemes and to investigate the advantages and limits of the approach by analyzing the basic mechanisms and evalua…

Core routerVoice over IPEnd-to-end principleNetwork packetComputer sciencebusiness.industryCall Admission ControlAdmission controlTelephonyDifferentiated servicebusinessComputer network
researchProduct

Per-flow signalling extension across DiffServ domains

2003

This paper describes a framework devised to extend per-flow admission control operation across Differentiated Services domains. Although the specific case of interoperability with RSVP is under discussion, our proposal can be easily adapted to other hop-by-hop signalling protocols. In our framework, DiffSery border routers accomplish three tasks. First, during the set-up phase, flows are mapped onto PHB groups on the basis of their QoS and traffic specifications. Second, signalling packets are tunnelled into IP packets marked as “probes”, where the “probe” marking is a DCSP value associated to the considered PHB Group. Third, when the flow set-up is complete, flow data packets are marked as…

Differentiated servicesComputer scienceNetwork packetbusiness.industryQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSInteroperabilityScalabilityProvisioningAdmission controlbusinessComputer networkCall blocking
researchProduct

Scalable and Privacy-Preserving Admission Control for Smart Grids

2015

International audience; Energy demand and production need to be constantly matched in the power grid. The traditional paradigm to continuously adapt the production to the demand is challenged by the increasing penetration of more variable and less predictable energy sources, like solar photovoltaics and wind power. An alternative approach is the so called direct control of some inherently flexible electric loads to shape the demand. Direct control of deferrable loads presents analogies with flow admission control in telecommunication networks: a request for network resources (bandwidth or energy) can be delayed on the basis of the current network status in order to guarantee some performanc…

EngineeringControl and Optimizationlarge deviationRandom variableDistributed computingReal-time computingprivacyModeling and simulation[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]PhotovoltaicsAdmission control; Home appliances; Logic gates; Power demand; Privacy; Random variables; Shape; Control and Systems Engineering; Modeling and Simulation; Control and OptimizationWind poweradmission controlSettore ING-INF/03 - Telecomunicazionibusiness.industryBandwidth (signal processing)[SPI.NRJ]Engineering Sciences [physics]/Electric powerdirect load controlShapeLogic gateSmart gridsAdmission controlHome applianceSmart gridControl and Systems EngineeringModeling and SimulationScalabilityPower demand[MATH.MATH-OC]Mathematics [math]/Optimization and Control [math.OC]businessEnergy source
researchProduct

Radio network aspects

2006

Publisher Summary This chapter reviews the mobile radio access network reference scenarios (MORANS)—used to study the performance of the radio cellular networks related to UMTS and the methodologies for the radio network performance evaluation, including the theoretical connectivity models,. It discusses the techniques for radio network optimization such as the packet scheduling for cellular systems or system capacity maximization through the use of multiple antennas. . In order to perform system simulations, reference values for the main parameters characterizing a WCDMA network, are required. MORANS is used for the identification of such parameters. The parameters are classified in two gr…

Mobile radioAccess networkComputer sciencebusiness.industryCall Admission ControlComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal-time computingNetwork congestionUMTS Terrestrial Radio Access NetworkCellular networkRadio resource managementbusinessUMTS frequency bandsComputer network
researchProduct

Multicast access control concept for xDSL-customers

2006

Multicast is a tempting possibility for many broad- band services. It makes possible to deliver one data-stream to several receivers simultaneously. IP-Multicast is based on an open group concept. This means that it is possible for all the users to join the group and thus receive the data. The open concept is also the main reason why multicast has not been taken in wider use. There is two different solution to solve this problem, group access control and multicast data encryption. Group access control mechanisms focuses on restricting the group membership at the users edge device. Traffic encryption scheme relies on end-to-end encryption, so a key management architecture is also needed. We …

MulticastEdge deviceProtocol Independent Multicastbusiness.industrycomputer.internet_protocolComputer scienceInter-domainQuality of serviceDistance Vector Multicast Routing ProtocolIPTVContent delivery networkAdmission controlSource-specific multicastInternet Group Management ProtocolReliable multicastMulticast addressIP multicastXcastbusinessKey managementcomputerPragmatic General MulticastComputer networkCCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006.
researchProduct

Quality of Service Multicasting over Differentiated Services Networks

2003

This paper proposes a solution to support real-time multicast traffic with Quality of Service (QoS) constraints over Differentiated Services (DiffServ) IP networks. Our solution allows multicast users to dynamically join and leave the multicast tree. Moreover, it allows a multicast user which has negotiated a best-effort session to upgrade to a QoS-enabled session. Our solution is backward compatible with the Protocol Independent Multicast (PIM) scheme. It combines two ideas. First, resource availability along a new QoS path is verified via a probe-based approach. Second, QoS is maintained by marking replicated packets with a special DSCP value, before forwarding them on the QoS path.

MulticastProtocol Independent MulticastComputer scienceInter-domainbusiness.industrycomputer.internet_protocolNetwork packetDistributed computingQuality of serviceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSDistance Vector Multicast Routing ProtocolAdmission controlSource-specific multicastDifferentiated servicesInternet Group Management ProtocolReliable multicastMulticast addressIP multicastXcastbusinesscomputerPragmatic General MulticastComputer network
researchProduct

Sensitivity Analysis Of Key Customers And Revenue-Oriented Admission Control And Scheduling Algorithm

2013

Received: 15 January 2013 Abstract Accepted: 2 February 2013 The paper deals with the problem of Quality of Web Service (QoWS) in e-commerce Web servers, i.e. in retail Web stores. It concerns the admission control and scheduling algorithm for a Web server system, which aims at preventing the system from overload to provide high QoWS level and ultimately, to increase Web site’s conversion rate, i.e. to turn more visitors into customers. The sensitivity of the algorithm to changes in its basic parameter values was analyzed by using a simulation-based approach. Special attention was paid to evaluation of the parameter impact on conventional and business-related system performance metrics.

Organizational Behavior and Human Resource ManagementWeb serverDatabasebusiness.industryComputer sciencemedia_common.quotation_subjectE-commerceAdmission controlManagement Science and Operations Researchcomputer.software_genreIndustrial and Manufacturing EngineeringManagement of Technology and InnovationKey (cryptography)RevenueQuality (business)Sensitivity (control systems)Business and International ManagementWeb servicebusinesscomputermedia_commonManagement and Production Engineering Review
researchProduct

Packet management techniques for measurement based end-to-end admission control in IP networks

2000

End-to-end Measurement Based connection Admission Control (EMBAC) mechanisms have been proposed to support real-time flows quality of service requirements over a Differentiated Services Internet architecture. The EMBAC basic idea is to decentralize the admission control decision, by requiring each individual user to probe the network path during flow setup, and by basing the accept/reject decision on the probing traffic statistics measured at the destination. In conformance with the differentiated services framework, routers are oblivious to individual flows and only need to serve data packets with a higher priority than probing traffic. In this paper, we build upon the observation that som…

RouterComputer Networks and CommunicationsNetwork packetbusiness.industryComputer scienceQuality of serviceThroughputAdmission controlNetwork congestionDifferentiated servicesEnd-to-end principlebusinessInformation SystemsComputer network
researchProduct