Markov paths on the Poisson-Delaunay graph with applications to routeing in mobile networks

2000 ◽  
Vol 32 (01) ◽  
pp. 1-18 ◽  
Author(s):  
F. Baccelli ◽  
K. Tchoumatchenko ◽  
S. Zuyev

Consider the Delaunay graph and the Voronoi tessellation constructed with respect to a Poisson point process. The sequence of nuclei of the Voronoi cells that are crossed by a line defines a path on the Delaunay graph. We show that the evolution of this path is governed by a Markov chain. We study the ergodic properties of the chain and find its stationary distribution. As a corollary, we obtain the ratio of the mean path length to the Euclidean distance between the end points, and hence a bound for the mean asymptotic length of the shortest path. We apply these results to define a family of simple incremental algorithms for constructing short paths on the Delaunay graph and discuss potential applications to routeing in mobile communication networks.

2000 ◽  
Vol 32 (1) ◽  
pp. 1-18 ◽  
Author(s):  
F. Baccelli ◽  
K. Tchoumatchenko ◽  
S. Zuyev

Consider the Delaunay graph and the Voronoi tessellation constructed with respect to a Poisson point process. The sequence of nuclei of the Voronoi cells that are crossed by a line defines a path on the Delaunay graph. We show that the evolution of this path is governed by a Markov chain. We study the ergodic properties of the chain and find its stationary distribution. As a corollary, we obtain the ratio of the mean path length to the Euclidean distance between the end points, and hence a bound for the mean asymptotic length of the shortest path.We apply these results to define a family of simple incremental algorithms for constructing short paths on the Delaunay graph and discuss potential applications to routeing in mobile communication networks.


1994 ◽  
Vol 26 (1) ◽  
pp. 43-53 ◽  
Author(s):  
Thomas H. Scheike

This paper discusses a simple extension of the classical Voronoi tessellation. Instead of using the Euclidean distance to decide the domains corresponding to the cell centers, another translation-invariant distance is used. The resulting tessellation is a scaled version of the usual Voronoi tessellation. Formulas for the mean characteristics (e.g. mean perimeter, surface and volume) of the cells are provided in the case of cell centers from a homogeneous Poisson process. The resulting tessellation is stationary and ergodic but not isotropic.


1994 ◽  
Vol 26 (01) ◽  
pp. 43-53 ◽  
Author(s):  
Thomas H. Scheike

This paper discusses a simple extension of the classical Voronoi tessellation. Instead of using the Euclidean distance to decide the domains corresponding to the cell centers, another translation-invariant distance is used. The resulting tessellation is a scaled version of the usual Voronoi tessellation. Formulas for the mean characteristics (e.g. mean perimeter, surface and volume) of the cells are provided in the case of cell centers from a homogeneous Poisson process. The resulting tessellation is stationary and ergodic but not isotropic.


Author(s):  
Е.Е. ДЕВЯТКИН ◽  
М.В. ИВАНКОВИЧ ◽  
С.В. ШВЕЦ ◽  
Т.А. СУХОДОЛЬСКАЯ

Представлен подход к формированию порядка определения и применения показателей и индикаторов стадий жизненного цикла поколений сетей подвижной связи (СПС) в их эволюционном развитии. Подтверждена необходимость использования этих инструментов в решении прикладных вопросов регуляторного, нормативно-правового и других видов обеспечения для упреждающей разработки мероприятий, обуславливающих возможность внедрения СПС с учетом сложившихся национальных регуляторных процедур. Показана взаимообусловленная связь и приведено соотношение поколений СПС с поколениями социотехнических систем. An approach to the formation of the procedure for determining and applying indexes and indicators of the stages of the life cycle of generations of cellular mobile communication networks in their evolutionary development is presented. It is shown that it is necessary to use these indexes and indicators in solving applied issues of regulatory and other types of support to enable the proactive development of measures that determine the possibility of implementing the mobile networks, taking into account the existing national regulatory procedures. A mutually dependent relationship is presented, and the ratio of generations of mobile communication networks with generations of socio-technical systems is given.


Author(s):  
Raquel Barco ◽  
Pedro Lázaro

In the near future, several radio access technologies will coexist in Beyond 3G mobile networks (B3G) and they will be eventually transformed into one seamless global communication infrastructure. Selfmanaging systems (i.e. those that self-configure, self-protect, self-heal and self-optimize) are the solution to tackle the high complexity inherent to these networks. In this context, this chapter proposes a system for automated fault management in the Radio Access Network (RAN) of wireless systems. The chapter presents some basic definitions and describes how fault management is performed in current mobile communication networks. Some methods proposed for auto-diagnosis, which is the most complex task in fault management, are also discussed in this chapter. The presented systems incorporate Key Performance Indicators (KPIs) to identify the cause of the network malfunction.


Sensors ◽  
2021 ◽  
Vol 21 (16) ◽  
pp. 5524
Author(s):  
Seongmin Park ◽  
Daeun Kim ◽  
Youngkwon Park ◽  
Hyungjin Cho ◽  
Dowon Kim ◽  
...  

Advances in mobile communication networks from 2G to 5G have brought unprecedented traffic growth, and 5G mobile communication networks are expected to be used in a variety of industries based on innovative technologies, fast not only in terms of extremely low latency but massive access devices. Various types of services, such as enhanced mobile broadband (eMBB), massive machine type communication (mMTC), and ultra-reliable and low latency communication (uRLLC), represent an increase in the number of attacks on users’ personal information, confidential information, and privacy information. Therefore, security assessments are essential to verify and cope with these various attacks. In this research, we (1) looked at 5G mobile communication network backgrounds and problems to investigate existing vulnerabilities and (2) assessed the current situation through evaluation of 5G security threats in real-world mobile networks in service.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1387
Author(s):  
Oswaldo Sebastian Peñaherrera-Pulla ◽  
Carlos Baena ◽  
Sergio Fortes ◽  
Eduardo Baena ◽  
Raquel Barco

Cloud Gaming is a cutting-edge paradigm in the video game provision where the graphics rendering and logic are computed in the cloud. This allows a user’s thin client systems with much more limited capabilities to offer a comparable experience with traditional local and online gaming but using reduced hardware requirements. In contrast, this approach stresses the communication networks between the client and the cloud. In this context, it is necessary to know how to configure the network in order to provide service with the best quality. To that end, the present work defines a novel framework for Cloud Gaming performance evaluation. This system is implemented in a real testbed and evaluates the Cloud Gaming approach for different transport networks (Ethernet, WiFi, and LTE (Long Term Evolution)) and scenarios, automating the acquisition of the gaming metrics. From this, the impact on the overall gaming experience is analyzed identifying the main parameters involved in its performance. Hence, the future lines for Cloud Gaming QoE-based (Quality of Experience) optimization are established, this way being of configuration, a trendy paradigm in the new-generation networks, such as 4G and 5G (Fourth and Fifth Generation of Mobile Networks).


Sign in / Sign up

Export Citation Format

Share Document