Topic
Shared resource
About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: An algorithm is presented to determine locations for the storage of copies of files in store-and-forward computer communications networks that use adaptive routing techniques, which minimize the sum of network file storage costs and message transmission costs.
Abstract: An algorithm is presented to determine locations for the storage of copies of files in store-and-forward computer communications networks. The algorithm determines storage locations which minimize the sum of network file storage costs and message transmission costs. Networks that use adaptive routing techniques are the primary focus. Feasible file locations must satisfy network performance requirements for file availability and delay by message class. An effective method of evaluating delay constraints for networks using adaptive routing techniques is introduced. The algorithm uses the solution to a p-median problem to identify initial candidate file placements. Interaction between a set of file movement rules and a network simulator is employed to modify initial placements to fmd near-optimal locations which satisfy the network performance constraints.
60 citations
•
18 Dec 1996TL;DR: In this paper, a method and apparatus for managing how threads of a multi-threaded computer program share a resource is provided, where one thread of the program is given priority over other threads by granting to the thread possession of the lock associated with the resource regardless of whether the thread currently requires use of the resource.
Abstract: A method and apparatus for managing how threads of a multi-threaded computer program share a resource is provided. One thread of the program is given priority over other threads of the program by granting to the thread possession of the lock associated with the resource regardless of whether the thread currently requires use of the resource. The other threads are designed to indicate to the priority thread when they require use of the resource. If the priority thread is done using the resource and detects that another thread is waiting to use the resource, the priority thread releases the resource lock for the resource. After releasing the lock for the resource, the priority thread automatically requests the resource lock. After using the resource, any non-priority thread releases the resource lock to the priority thread if the priority thread has requested the resource, without regard to whether any other threads may be waiting for the resource. According to one embodiment, a timer mechanism is used to cause the priority thread to periodically check whether any threads are waiting to use the resource.
60 citations
••
TL;DR: This article presents an architectural framework based on a layered approach comprising network, data link, and physical layers together with a multimode user terminal that can ensure global service, support innovative 5G use cases, and reduce both capital investments and operational costs through efficiencies in network infrastructure deployment and spectrum utilization.
Abstract: 5G systems have started field trials, and deployment plans are being formulated, following completion of comprehensive standardization efforts and the introduction of multiple technological innovations for improving data rates and latency. Similar to earlier terrestrial wireless technologies, build-out of 5G systems will occur initially in higher population density areas offering the best business cases while not fully addressing airborne and marine applications. Satellite communications will thus continue to be indispensable as part of an integrated 5G/satellite architecture to achieve truly universal coverage. Such a unified architecture across terrestrial and satellite wireless technologies can ensure global service, support innovative 5G use cases, and reduce both capital investments and operational costs through efficiencies in network infrastructure deployment and spectrum utilization. This article presents an architectural framework based on a layered approach comprising network, data link, and physical layers together with a multimode user terminal. The network layer uses off-the-shelf building blocks based on 4G and 5G industry standards. The data link layer benefits from dynamic sharing of resources across multiple systems, enabled by intersystem knowledge of estimated and actual traffic demands, RF situational awareness, and resource availability. Communication resource sharing has traditionally comprised time, frequency, and power dimensions. Sharing can be enhanced by leveraging dynamic knowledge of communication platform location, trajectory, and antenna directivity. Logically centralized resource management provides a scalable approach for better utilization of spectrum, especially in higher bands that have traditionally been used by satellites and now are also being proposed for 5G systems. Resource sharing maximizes the utility of a multimode terminal that can access satellite or terrestrial RF links based on specific use cases, traffic demand, and QoS requirements.
60 citations
••
TL;DR: This paper proposes a DDoS defense mechanism named CoFence, which facilitates a “domain-helps-domain” collaboration network among NFV-based domain networks, and designs a dynamic resource allocation mechanism for domains so that the resource allocation is fair, efficient, and incentive-compatible.
Abstract: High-profile and often destructive distributed denial of service (DDoS) attacks continue to be one of the top security concerns as the DDoS attacks volumes are increasing constantly Among them, the SYN Flood attack is the most common type Conventional DDoS defense solutions may not be preferable, since they demand highly capable hardware resources, which induce high cost and long deployment cycle The emerging of network function virtualization (NFV) technology introduces new opportunities to decrease the amount of proprietary hardware that is needed to launch and operate network services In this paper, we propose a DDoS defense mechanism named CoFence, which facilitates a “domain-helps-domain” collaboration network among NFV-based domain networks CoFence allows domain networks to help each other in handling large volume of DDoS attacks through resource sharing Specifically, we design a dynamic resource allocation mechanism for domains so that the resource allocation is fair, efficient, and incentive-compatible The resource sharing mechanism is modeled as a multi-leader-follower Stackelberg game In this game, all domains have a degree of control to maximize their own utility The resource supplier domains determine the amount of resource to each requesting peer based on optimizing a reciprocal-based utility function On the other hand, the resource requesting domains decide the level of demand to send to the resource supplier domains in order to reach sufficient support Our simulation results demonstrate that the designed resource allocation game is effective, incentive compatible, fair, and reciprocal under its Nash equilibrium
60 citations
••
TL;DR: A unified framework of the blockchain radio access network (B-RAN) is proposed as a trustworthy and secure paradigm for 6G networking by utilizing blockchain technologies with enhanced efficiency and security.
Abstract: With the deployment of fifth-generation (5G) wireless networks worldwide, research on sixth-generation (6G) wireless communications has commenced. It is expected that 6G networks can accommodate numerous heterogeneous devices and infrastructures with enhanced efficiency and security over diverse, e.g. spectrum, computing and storage, resources. However, this goal is impeded by a number of trust-related issues that are often neglected in network designs. Blockchain, as an innovative and revolutionary technology that has arisen in the recent decade, provides a promising solution. Building on its nature of decentralization, transparency, anonymity, immutability, traceability and resiliency, blockchain can establish cooperative trust among separate network entities and facilitate, e.g. efficient resource sharing, trusted data interaction, secure access control, privacy protection, and tracing, certification and supervision functionalities for wireless networks, thus presenting a new paradigm towards 6G. This paper is dedicated to blockchain-enabled wireless communication technologies. We first provide a brief introduction to the fundamentals of blockchain, and then we conduct a comprehensive investigation of the most recent efforts in incorporating blockchain into wireless communications from several aspects. Importantly, we further propose a unified framework of the blockchain radio access network (B-RAN) as a trustworthy and secure paradigm for 6G networking by utilizing blockchain technologies with enhanced efficiency and security. The critical elements of B-RAN, such as consensus mechanisms, smart contract, trustworthy access, mathematical modeling, cross-network sharing, data tracking and auditing and intelligent networking, are elaborated. We also provide the prototype design of B-RAN along with the latest experimental results.
60 citations