首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Mobility database that stores the users’ location records is very important to connect calls to mobile users on personal communication networks. If the mobility database fails, calls to mobile users may not be set up in time. This paper studies failure restoration of mobility database. We study per-user location record checkpointing schemes that checkpoint a user’s record into a non-volatile storage from time to time on a per-user basis. When the mobility database fails, the user location records can be restored from the backup storage. Numeric analysis has been used to choose the optimum checkpointing interval so that the overall cost is minimized. The cost function that we consider includes the cost of checkpointing a user’s location record and the cost of paging a user due to an invalid location record. Our results indicate that when user registration intervals are exponentially distributed, the user record should never be checkpointed if checkpointing costs more than paging. Otherwise, if paging costs more, the user record should be always checkpointed when a user registers.  相似文献   

2.
In a cellular phone system, the service area is partitioned into several location areas (LAs). Every LA is associated with a mobility database called visitor location register (VLR). When a mobile user enters an LA, the user must register to the VLR before receiving any cellular service. If the VLR is full, the registration procedure fails and the system cannot deliver services to the user under the existing cellular technology. To resolve this problem, we propose a VLR overflow control scheme to accommodate the incoming mobile users during VLR overflow. Our scheme only requires minor modifications to the existing cellular mobility management protocols. Particularly, no modification is made to the mobile phones. An analytic model is proposed to investigate the performance of the overflow control scheme. When exercising the scheme, the call setup procedure for an “overflow” user is more expensive than that for a “normal” user. Under the range of input parameters considered in our study, we show that even if the VLR overflow situation is serious, the overhead for exercising the overflow control scheme is very low  相似文献   

3.
In this paper, a novel Home Location Register(HLR) mobility database recovery scheme is proposed. With database backing-up and signal sending as its key processes, the presented scheme is designed for the purpose of both decreasing system costs and reducing number of lost calls. In our scheme, an algorithm is developed for an HLR to identify such VLRs that there are new MSs roaming into them since the latest HLR database backing up. The identification of those VLRs is used by the HLR to send Unreliable Roaming Data Directive messages to each of them to get the correct location information of those new MSs.Additionally, two kinds of relationships, one between the number of lost calls and the database backing-up period and the other between the backing-up cost and the period, are well analyzed. Both analytical and numerical results indicate that there will be an optimal HLR database backing-up period if certain system parameters are given and the total cost can be consequently minimized.  相似文献   

4.
Employing fault tolerance often introduces a time overhead, which may cause a deadline violation in real-time systems (RTS). Therefore, for RTS it is important to optimize the fault tolerance techniques such that the probability to meet the deadlines, i.e. the Level of Confidence (LoC), is maximized. Previous studies have focused on evaluating the LoC for equidistant checkpointing. However, no studies have addressed the problem of evaluating the LoC for non-equidistant checkpointing. In this work, we provide an expression to evaluate the LoC for non-equidistant checkpointing. Further, we detail an exhaustive search approach to find the distribution of a given number of checkpoints that results in the maximal LoC. Since the exhaustive search approach is very time-consuming, we propose the Clustered Checkpointing method, a heuristic that distributes checkpoints in a number of clusters with the goal to maximize the LoC. The results show that the LoC can be improved when non-equidistant checkpointing is used. Further, the results indicate that the proposed Clustered Checkpointing method is capable to find the distribution that results in the maximal LoC in much shorter time than the exhaustive search approach, while considering only few clusters.  相似文献   

5.
6.
This paper studies failure restoration of mobility databases for personal communication networks (specifically, VLRs and HLRs). We model the VLR restoration with and without checkpointing. The optimal VLR checkpointing interval is derived to balance the checkpointing cost against the paging cost. We also model GSM periodic location updating (location confirmation) to quantify the relationship between the location confirmation frequency and the number of lost calls. The HLR failure restoration procedures for IS-41 and GSM are described. We show the number of lost calls in a HLR failure. Both the procedures in IS-41 and GSM cannot identify the VLRs that need to be accessed by the HLR after a failure. An algorithm is proposed to identify the VLRs, which can be used to aggressively restore a HLR after its failure.  相似文献   

7.
We herein propose a heuristic redundancy selection algorithm that combines resubmission, replication, and checkpointing redundancies to reduce the resiliency overhead in fault‐tolerant workflow scheduling. The appropriate combination of these redundancies for workflow tasks is obtained in two consecutive phases. First, to compute the replication vector (number of task replicas), we apportion the set of provisioned resources among concurrently executing tasks according to their needs. Subsequently, we obtain the optimal checkpointing interval for each task as a function of the number of replicas and characteristics of tasks and computational environment. We formulate the problem of obtaining the optimal checkpointing interval for replicated tasks in situations where checkpoint files can be exchanged among computational resources. The results of our simulation experiments, on both randomly generated workflow graphs and real‐world applications, demonstrated that both the proposed replication vector computation algorithm and the proposed checkpointing scheme reduced the resiliency overhead.  相似文献   

8.
In this paper, we treat checkpointing policies. We derive the total expected loss time and obtain the optimum checkpointing policy which minimizes that expected loss time. We further present the numerical examples using the exponential and the Weibull distributions. First, we discuss the model in which the intervals between checkpointing completion times may vary, and secondly the model with constant intervals.  相似文献   

9.
This paper proposes a novel failure recovery framework for multi-link shared risk link group (SRLG) failures in optical mesh networks, called failure presumed protection (FPP). The proposed framework is characterized by a failure dependent protection (FDP) mechanism where the optical layer in-band failure identification and restoration tasks for route selection are jointly considered. FPP employs in-band monitoring at each node to obtain on-off status of any working lightpath in case the lightpath is terminated at (or traversing through) the node. Since the locally available failure status at a node may not be sufficient for unambiguous failure localization, the proposed framework reroutes the interrupted lightpaths in such a way that all the suspicious links which do not have 100% restorability under any SRLG failure are kept away. We claim that this is the first study on FDP that considers both failure localization and FDP survivable routing. Extensive simulations are conducted to examine the proposed FPP method under various survivable routing architectures and implementations. The results are further compared with a large number of previously reported counterparts. We will show that the FPP framework can overcome the topological limitation which is critical to the conventional failure independent protection method (e.g., shared path protection). In addition, it can be served as a viable solution for FDP survivable routing where failure localization is considered.  相似文献   

10.
11.
12.
13.
14.
A growing class of wireless sensor network (WSN) applications require the use of sensed data inside the network at multiple, possibly mobile base stations. Standard WSN routing techniques that move data from multiple sources to a single, fixed base station are not applicable, motivating new solutions that efficiently achieve multicast and handle mobility. This paper explores in depth the requirements of this set of application scenarios and proposes Froms, a machine learning-based multicast routing paradigm. Its primary benefits are flexibility to optimize routing over a variety of properties such as route length, battery levels, ease of recovery after node failures, and native support for sink mobility. We provide theoretical, simulation and experimentation results supporting these claims, showing the benefits of Froms in terms of low routing overhead, extended network lifetime, and other key metrics for the WSN environment.  相似文献   

15.
In MPLS/GMPLS networks, a range of restoration schemes will be required to support different tradeoffs between service interruption time and network resource utilization. In light of these tradeoffs, path-based end-to-end shared mesh restoration provides a very attractive solution. However, efficient use of bandwidth for shared mesh restoration strongly relies on the procedure for selecting restoration paths. We propose an efficient restoration path selection algorithm for restorable connections over shared bandwidth in a fully distributed MPLS/GMPLS architecture. We also describe how to extend MPLS/GMPLS signaling protocols to collect the necessary information efficiently. To evaluate the algorithm's performance, we compare it via simulation with two other well-known algorithms on a typical intercity backbone network. The key figure of merit for restoration bandwidth efficiency is restoration overbuild, i.e., the extra bandwidth required to meet the network restoration objective as a percentage of the bandwidth of the network with no restoration. Our simulation results show that our algorithm uses significantly less restoration overbuild (63%-68%) compared with the other two algorithms (83%-90%).  相似文献   

16.
In this paper, we investigate network performance of multi-link failure restoration in spectrum-elastic optical path networks (SLICE). To efficiently restore traffic under multi-link failures, a novel survivable algorithm, named dynamic load balancing shared-path protection (DLBSPP), is proposed to compute primary and link-disjoint shared backup paths. The DLBSPP algorithm employs first fit (FF) and random fit (RF) schemes to search and assign the available spectrum resource. Traffic-aware restoration (TAR) mechanism is adopted in the DLBSPP algorithm to compute new routes for carrying the traffic affected by the multi-link failures and then the multi-link failures can be efficiently restored. Simulation results show that, compared with the conventional shared-path protection (SPP) algorithm, the DLBSPP algorithm achieves lower blocking probability (BP), better spectrum utilization ratio (SUR), more reasonable average hop (AH) and higher failure restoration ratio (FRR). Thus, the proposed DLBSPP algorithm has much higher spectrum efficiency and much better survivability than SPP algorithm.  相似文献   

17.
This paper presents a design algorithm for networks with a restoration mechanism that provides failure-independent, end-to-end path protection to a set of given demands under a single link or node failure with a focus on optical networks. The restoration routes are provided on preconfigured cycles, where each of the demands is assigned a single restoration route and specific restoration wavelengths on a segment of one cycle (splitting is not allowed). The number of reserved restoration wavelengths may vary from one link to the next on a cycle; hence, we refer to these cycles as Preconfigured Virtual Cycles (PVCs). The network design algorithm consists of three major parts. The first part generates a large number of candidate PVCs. Our algorithm allows assignment of certain demands that have common failure scenarios to the same PVC. The second part selects a set of PVCs from among the candidates, attempting to minimize the total reserved restoration cost while ensuring that each demand is assigned to one PVC. This is achieved by solving a set covering problem followed by elimination of duplicate assignments. The third part resolves conflicts of wavelength assignments.  相似文献   

18.
针对光网络分布式恢复中动态恢复和预计算路由恢复两大类机制,就恢复时间这一至关重要的恢复参数进行了性能分析.通过比较,指出预计算路由恢复机制在快速恢复方面具有更优的性能.  相似文献   

19.
ENAS-RIF图像复原算法   总被引:1,自引:1,他引:1  
大气湍流严重影响天文、遥感等光学观测的成像效果,必须进行图像复原处理后才能获取更清晰的图像.为了提高图像复原效果,提出了一种基于可靠支持域和改进代价函数的增强型非负性和有限支撑域的递归逆滤波器(ENAS-RIF)图像复原算法.首先,利用Curvelet去噪进行图像平滑的预处理,抑制图像噪声;然后利用图像阈值分割和形态学...  相似文献   

20.
Millibot trains for enhanced mobility   总被引:8,自引:0,他引:8  
The objective of this work is to enhance the mobility of small mobile robots by enabling them to link into a train configuration capable of crossing relatively large obstacles. In particular, we are building on Millibots, semiautonomous, tracked mobile sensing/communication platforms at the 5-cm scale previously developed at Carnegie Mellon University. The Millibot Train concept provides couplers that allow the Millibot modules to engage/disengage under computer control and joint actuators that allow lifting of one module by another and control of the whole train shape in two dimensions. A manually configurable train prototype demonstrated the ability to climb standard stairs and vertical steps nearly half the train length. A fully functional module with powered joints has been developed and several have been built and tested. Construction of a set of six modules is well underway and will allow testing of the complete train in the near future. This paper focuses on the development, design, and construction of the electromechanical hardware for the Millibot Train.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号