In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymm...In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry.展开更多
This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed...This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown.展开更多
Internet access is becoming even more heterogeneous, including different wireless backhauling links, with Ka-band satellites as a possible alternative. Since communication path is unknown a priori, adoption of PEP sol...Internet access is becoming even more heterogeneous, including different wireless backhauling links, with Ka-band satellites as a possible alternative. Since communication path is unknown a priori, adoption of PEP solutions to optimize TCP performance over satellite is discouraged to allow dynamic network reconfigurations. To opposite, an endto-end TCP performance evaluation on such a challenging scenario, with possible large latency and transmission losses, is herein considered of paramount importance. Several TCP variants exist to tackle different aspects of communication networks. In Linux, the different TCP congestion control schemes differ from the theoretical formulations and RFC specifications, introducing a varying set of optimizations and options. This aspect makes difficult to identify a standard/reference TCP version for the proposed scenario, while testing with the real protocol stacks is deemed necessary to obtain consistent results. In addition, an innovative end-to-end TCP, namely TCP Wave, is introduced to replace the traditional window-based transmission with a burst-based strategy, representing a valid alternative to Linux TCP. To offer a fair, realistic and comprehensive evaluation, we configured a simulation setup where different Linux TCPs can be run within ns-3 network simulator and compared with TCP Wave.展开更多
基金supported by the National Natural Science Foundation of China under Grant No.61101248the Equipment Advance Research Projectof"Twelfth Five-Year"Plan under Grant No.51306040202And this work has been performed in the Project"Advanced Communication Research Program(ACRP)"supported by the Directorate of Research and Development,Defense Science and Technology Agency,Singapore under Grant No.DSOCL04020
文摘In this paper, we study the performance of physical-layer network coding in asymmetric two-way relay channels using four different cases having different poor channels:phase asymmetry, downlink asymmetry, uplink asymmetry and node asymmetry. The decision and mapping rule for symmetric and asymmetric cases are studied. The performance in terms of bit error rate for each case will be studied and analysed by computer simulation. Analytical and simulation results show that uplink asymmetry is the worst case;intra-phase asymmetry and unreliable uplink channels will more severely affect the performance degradation, which is caused by channel asymmetry.
基金supported by The National Natural Science Foundation for Young Scientists of China under Grant No.61303263the Jiangsu Provincial Research Foundation for Basic Research(Natural Science Foundation)under Grant No.BK20150201+4 种基金the Scientific Research Key Project of Beijing Municipal Commission of Education under Grant No.KZ201210015015Project Supported by the National Natural Science Foundation of China(Grant No.61370140)the Scientific Research Common Program of the Beijing Municipal Commission of Education(Grant No.KMKM201410015006)The National Science Foundation of China under Grant Nos.61232016 and U1405254and the PAPD fund
文摘This paper sums up four security factors after analyzing co-residency threats caused by the special multitenant environment in the cloud.To secure the factors,a multiway dynamic trust chain transfer model was proposed on the basis of a measurement interactive virtual machine and current behavior to protect the integrity of the system.A trust chain construction module is designed in a virtual machine monitor.Through dynamic monitoring,it achieves the purpose of transferring integrity between virtual machine.A cloud system with a trust authentication function is implemented on the basis of the model,and its practicability is shown.
文摘Internet access is becoming even more heterogeneous, including different wireless backhauling links, with Ka-band satellites as a possible alternative. Since communication path is unknown a priori, adoption of PEP solutions to optimize TCP performance over satellite is discouraged to allow dynamic network reconfigurations. To opposite, an endto-end TCP performance evaluation on such a challenging scenario, with possible large latency and transmission losses, is herein considered of paramount importance. Several TCP variants exist to tackle different aspects of communication networks. In Linux, the different TCP congestion control schemes differ from the theoretical formulations and RFC specifications, introducing a varying set of optimizations and options. This aspect makes difficult to identify a standard/reference TCP version for the proposed scenario, while testing with the real protocol stacks is deemed necessary to obtain consistent results. In addition, an innovative end-to-end TCP, namely TCP Wave, is introduced to replace the traditional window-based transmission with a burst-based strategy, representing a valid alternative to Linux TCP. To offer a fair, realistic and comprehensive evaluation, we configured a simulation setup where different Linux TCPs can be run within ns-3 network simulator and compared with TCP Wave.