IET Networks最新文献

筛选
英文 中文
A novel strategy for optimal data replication in peer-to-peer networks based on a multi-objective optimisation – NSGA-II algorithm 基于多目标优化NSGA-II算法的点对点网络最优数据复制新策略
IF 1.3
IET Networks Pub Date : 2024-12-12 DOI: 10.1049/ntw2.12141
Abouzar Samimi, Maryam Goudarzi
{"title":"A novel strategy for optimal data replication in peer-to-peer networks based on a multi-objective optimisation – NSGA-II algorithm","authors":"Abouzar Samimi,&nbsp;Maryam Goudarzi","doi":"10.1049/ntw2.12141","DOIUrl":"https://doi.org/10.1049/ntw2.12141","url":null,"abstract":"<p>A peer-to-peer (P2P) network is defined as a distributed network in which nodes with similar characteristics exchange data with others. Efficient data sharing in P2P systems is essentially faced with challenges due to uncertainties of erratic node failures and unreliable network connectivity. Data replication on multiple nodes can improve availability and alleviate latency. However, the number of created replicas and the corresponding location of these replicas need to be determined optimally. In this paper, a novel framework for data replication is proposed in P2P networks, in which optimal allocations are achieved based on the two objectives including the minimisation of delay and maximisation of hit rate of queries. The proposed model finds allocations that specify the number and location of each replica of existing files in the network based on two considered objectives. A multi-objective technique based on the Non-Dominated Sorting Genetic Algorithm II (NSGA-II) algorithm is utilised to solve the proposed model and to extract non-dominated Pareto-optimal solutions of the allocations. Finally, one of the allocations of the obtained Pareto optimal set is applied to the network and the delay and hit rate of queries pertaining to this situation is compared with two models: i) initial model of the network, that is, the state where there is no replica of the files except the original version of the file, and ii) the random replication model to verify the efficiency of the presented method. All simulations in this paper have been done using C++ programming language.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12141","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variance-driven security optimisation in industrial IoT sensors 方差驱动的工业物联网传感器安全优化
IF 1.3
IET Networks Pub Date : 2024-11-16 DOI: 10.1049/ntw2.12139
Hardik Gupta, Sunil K. Singh, Sudhakar Kumar, Karan Sharma, Hardeep Saini, Brij B. Gupta, Varsha Arya, Kwok Tai Chui
{"title":"Variance-driven security optimisation in industrial IoT sensors","authors":"Hardik Gupta,&nbsp;Sunil K. Singh,&nbsp;Sudhakar Kumar,&nbsp;Karan Sharma,&nbsp;Hardeep Saini,&nbsp;Brij B. Gupta,&nbsp;Varsha Arya,&nbsp;Kwok Tai Chui","doi":"10.1049/ntw2.12139","DOIUrl":"https://doi.org/10.1049/ntw2.12139","url":null,"abstract":"<p>The Industrial Internet of Things (IIoT) has transformed industrial operations with real-time monitoring and control, enhancing efficiency and productivity. However, this connectivity brings significant security challenges. This study addresses these challenges by identifying abnormal sensor data patterns using machine learning-based anomaly detection models. The proposed framework employs advanced algorithms to strengthen industrial defences against cyber threats and disruptions. Focusing on temperature anomalies, a critical yet often overlooked aspect of industrial security, this research fills a gap in the literature by evaluating machine learning models for this purpose. A novel variance-based model for temperature anomaly detection is introduced, demonstrating high efficacy with accuracy scores of 0.92 and 0.82 on the NAB and AnoML-IOT datasets, respectively. Additionally, the model achieved F1 scores of 0.96 and 0.89 on these datasets, underscoring its effectiveness in enhancing IIoT security and optimising cybersecurity for industrial processes. This research not only identifies security vulnerabilities but also presents concrete solutions to improve the security posture of IIoT systems.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12139","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental assessment of containers running on top of virtual machines 运行在虚拟机上的容器的实验评估
IF 1.3
IET Networks Pub Date : 2024-11-10 DOI: 10.1049/ntw2.12138
Hossein Aqasizade, Ehsan Ataie, Mostafa Bastam
{"title":"Experimental assessment of containers running on top of virtual machines","authors":"Hossein Aqasizade,&nbsp;Ehsan Ataie,&nbsp;Mostafa Bastam","doi":"10.1049/ntw2.12138","DOIUrl":"https://doi.org/10.1049/ntw2.12138","url":null,"abstract":"<p>Over the past two decades, the cloud computing paradigm has gradually attracted more popularity due to its efficient resource usage and simple service access model. Virtualisation technology is the fundamental element of cloud computing that brings several benefits to cloud users and providers, such as workload isolation, energy efficiency, server consolidation, and cost reduction. This paper examines the combination of operating system-level virtualisation (containers) and hardware-level virtualisation (virtual machines). To this end, the performance of containers running on top of virtual machines is experimentally compared with standalone virtual machines and containers based on different hardware resources, including the processor, main memory, disk, and network in a real testbed by running the most commonly used benchmarks. Paravirtualisation and full virtualisation as well as type 1 and type 2 hypervisors are covered in this study. In addition, three prevalent containerisation platforms are examined.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"14 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2024-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143717153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management 智能森林监测:采用最短路径路由的新型物联网框架,促进可持续环境管理
IF 1.3
IET Networks Pub Date : 2024-10-22 DOI: 10.1049/ntw2.12135
Alireza Etaati, Mostafa Bastam, Ehsan Ataie
{"title":"Smart forest monitoring: A novel Internet of Things framework with shortest path routing for sustainable environmental management","authors":"Alireza Etaati,&nbsp;Mostafa Bastam,&nbsp;Ehsan Ataie","doi":"10.1049/ntw2.12135","DOIUrl":"https://doi.org/10.1049/ntw2.12135","url":null,"abstract":"<p>Forests play a pivotal role in protecting the environment, preserving vital natural resources, and ultimately sustaining human life. However, the escalating occurrences of forest fires, whether of human origin or due to climate change, poses a significant threat to this ecosystem. In recent decades, the emergence of the IoT has been characterised by the utilisation of smart sensors for real-time data collection. IoT facilitates proactive decision-making for forest monitoring, control, and protection through advanced data analysis techniques, including AI algorithms. This research study presents a comprehensive approach to deploying a dynamic and adaptable network topology in forest environments, aimed at optimising data transmission and enhancing system reliability. Three distinct topologies are proposed in this research study: direct transmission from nodes to gateways, cluster formation with multi-step data transmission, and clustering with data relayed by cluster heads. A key innovation is the use of high-powered telecommunication modules in cluster heads, enabling long-range data transmission while considering energy efficiency through solar power. To enhance system reliability, this study incorporates a reserve routing mechanism to mitigate the impact of node or cluster head failures. Additionally, the placement of gateway nodes is optimised using meta-heuristic algorithms, including particle swarm optimisation (PSO), harmony search algorithm (HSA), and ant colony optimisation for continuous domains (ACOR), with ACOR emerging as the most effective. The primary objective of this article is to reduce power consumption, alleviate network traffic, and decrease nodes' interdependence, while also considering reliability coefficients and error tolerance as additional considerations. As shown in the results, the proposed methods effectively reduce network traffic, optimise routing, and ensure robust performance across various environmental conditions, highlighting the importance of these tailored topologies in enhancing energy efficiency, data accuracy, and network reliability in forest monitoring applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"528-545"},"PeriodicalIF":1.3,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12135","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method 基于 ECIE 方法分析 VANET 中 AODV、OLSR 和 DSDV 路由协议的性能
IF 1.3
IET Networks Pub Date : 2024-10-17 DOI: 10.1049/ntw2.12136
Moawiah El-Dalahmeh, Adi El-Dalahmeh, Usman Adeel
{"title":"Analysing the performance of AODV, OLSR, and DSDV routing protocols in VANET based on the ECIE method","authors":"Moawiah El-Dalahmeh,&nbsp;Adi El-Dalahmeh,&nbsp;Usman Adeel","doi":"10.1049/ntw2.12136","DOIUrl":"https://doi.org/10.1049/ntw2.12136","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>In a vehicular ad hoc network (VANET), vehicles communicate with each other (V2V) and with infrastructure (V2I) to optimise routing and reach their destinations efficiently. Various routing protocols in the VANET environment facilitate the dissemination of different types of messages, such as those for emergencies or traffic updates. However, previous research has not sufficiently addressed the challenges of energy efficiency, security, and reliability in VANET routing. This work aims to fill that gap by analysing the performance of three major VANET routing protocols—ad hoc on-demand distance vector (AODV), Optimised Link State Routing (OLSR), and Destination Sequenced Distance Vector—integrated with elliptic curve integrated encryption. The goal is to determine the most suitable routing protocol based on these key parameters. The study involves two key processes: registration and authentication, and the analysis of ECIE-enhanced routing protocols (ECIE-AODV, ECIE-OLSR, and ECIE-DSDV). These protocols were simulated using OMNET++ and SUMO tools, and the results were evaluated based on metrics such as throughput, packet delivery ratio, end-to-end delay (e2e), jitter, and routing overhead.</p>\u0000 </section>\u0000 </div>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"377-394"},"PeriodicalIF":1.3,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12136","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks 检测物联网网络零日分布式拒绝服务攻击的无监督方法
IF 1.3
IET Networks Pub Date : 2024-10-08 DOI: 10.1049/ntw2.12134
Monika Roopak, Simon Parkinson, Gui Yun Tian, Yachao Ran, Saad Khan, Balasubramaniyan Chandrasekaran
{"title":"An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks","authors":"Monika Roopak,&nbsp;Simon Parkinson,&nbsp;Gui Yun Tian,&nbsp;Yachao Ran,&nbsp;Saad Khan,&nbsp;Balasubramaniyan Chandrasekaran","doi":"10.1049/ntw2.12134","DOIUrl":"https://doi.org/10.1049/ntw2.12134","url":null,"abstract":"<p>The authors introduce an unsupervised Intrusion Detection System designed to detect zero-day distributed denial of service (DDoS) attacks in Internet of Things (IoT) networks. This system can identify anomalies without needing prior knowledge or training on attack information. Zero-day attacks exploit previously unknown vulnerabilities, making them hard to detect with traditional deep learning and machine learning systems that require pre-labelled data. Labelling data is also a time-consuming task for security experts. Therefore, unsupervised methods are necessary to detect these new threats. The authors focus on DDoS attacks, which have recently caused significant financial and service disruptions for many organisations. As IoT networks grow, these attacks become more sophisticated and harmful. The proposed approach detects zero-day DDoS attacks by using random projection to reduce data dimensionality and an ensemble model combining K-means, Gaussian mixture model, and one-class SVM with a hard voting technique for classification. The method was evaluated using the CIC-DDoS2019 dataset and achieved an accuracy of 94.55%, outperforming other state-of-the-art unsupervised learning methods.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"513-527"},"PeriodicalIF":1.3,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12134","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective ensemble electricity theft detection algorithm for smart grid 用于智能电网的有效集合窃电检测算法
IF 1.3
IET Networks Pub Date : 2024-10-02 DOI: 10.1049/ntw2.12132
Chun-Wei Tsai, Chi-Tse Lu, Chun-Hua Li, Shuo-Wen Zhang
{"title":"An effective ensemble electricity theft detection algorithm for smart grid","authors":"Chun-Wei Tsai,&nbsp;Chi-Tse Lu,&nbsp;Chun-Hua Li,&nbsp;Shuo-Wen Zhang","doi":"10.1049/ntw2.12132","DOIUrl":"https://doi.org/10.1049/ntw2.12132","url":null,"abstract":"<p>Several machine learning and deep learning algorithms have been presented to detect the criminal behaviours in a smart grid environment in recent studies because of many successful results. However, most learning algorithms for the electricity theft detection have their pros and cons; hence, a critical research issue nowadays has been how to develop an effective detection algorithm that leverages the strengths of different learning algorithms. To demonstrate the performance of such an integrated detection model, the algorithm proposed first builds on deep neural networks, a meta-learner for determining the weights of detection models for the construction of an ensemble detection algorithm and then uses a promising metaheuristic algorithm named search economics to optimise the hyperparameters of the meta-learner. Experimental results show that the proposed algorithm is able to find better results and outperforms all the other state-of-the-art detection algorithms for electricity theft detection compared in terms of the accuracy, F1-score, area under the curve of precision-recall (AUC-PR), and area under the curve of receiver operating characteristic (AUC-ROC). Since the results show that the meta-learner of the proposed algorithm can improve the accuracy of deep learning algorithms, the authors expect that it will be used in other deep learning-based applications.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"471-485"},"PeriodicalIF":1.3,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12132","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM) 独立于硬状态协议的组播--特定于源的组播(HPIM-SSM)
IF 1.3
IET Networks Pub Date : 2024-09-01 DOI: 10.1049/ntw2.12133
Ana Catarina Grilo, Pedro Oliveira, Rui Valadas
{"title":"Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM)","authors":"Ana Catarina Grilo,&nbsp;Pedro Oliveira,&nbsp;Rui Valadas","doi":"10.1049/ntw2.12133","DOIUrl":"https://doi.org/10.1049/ntw2.12133","url":null,"abstract":"<p>Source-specific multicast is a key technology for multicast services such as IPTV broadcasting, which relies on IGMPv3/MLDv2 for source-group membership signalling and multicast routing protocols such as PIM-SSM for building and maintaining receiver-initiated source-based distribution trees across the network. The authors propose the Hard-state Protocol Independent Multicast—Source-Specific Multicast (HPIM-SSM), a novel multicast routing protocol that keeps the design principles of PIM-SSM but overcomes its limitations, such as slow convergence and the possibility of creating suboptimal trees. The state machines of HPIM-SSM were designed to react promptly to all network events susceptible to reconfiguring the multicast trees, avoiding the need for soft-state maintenance through the periodic transmission of control messages. Moreover, the authors eliminated the need for designated routers, which led to suboptimal trees, and introduced a control-driven assert protocol that operates per source, allowing for considerable memory savings. Finally, the protocol enables the coexistence of multiple unicast routing protocols. HPIM-SSM was implemented in Python, and its correctness was extensively validated through model-checking techniques. Furthermore, a comparison between HPIM-SSM and PIM-SSM was conducted, encompassing both theoretical analysis and experimental evaluation of convergence times. The results demonstrate clearly that HPIM-SSM outperforms PIM-SSM, exhibiting significantly faster convergence times and completely avoiding suboptimal trees.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"486-512"},"PeriodicalIF":1.3,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12133","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks 在支持非正交多址接入的 B5G/6G 网络中分配资源的详细强化学习框架
IF 1.3
IET Networks Pub Date : 2024-08-11 DOI: 10.1049/ntw2.12131
Nouri Omheni, Anis Amiri, Faouzi Zarai
{"title":"A detailed reinforcement learning framework for resource allocation in non-orthogonal multiple access enabled-B5G/6G networks","authors":"Nouri Omheni,&nbsp;Anis Amiri,&nbsp;Faouzi Zarai","doi":"10.1049/ntw2.12131","DOIUrl":"https://doi.org/10.1049/ntw2.12131","url":null,"abstract":"<p>The world of communications technology has recently undergone an extremely significant revolution. This revolution is an immediate consequence of the immersion that the fifth generation B5G and 6G have just brought. The latter responds to the growing need for connectivity and it improves the speeds and qualities of the mobile connection. To improve the energy and spectral efficiency of these types of networks, the non-orthogonal multiple access (NOMA) technique is seen as the key solution that can accommodate more users and dramatically improve spectrum efficiency. The basic idea of NOMA is to achieve multiple access in the power sector and decode the required signal via continuous interference cancelation. A resource allocation approach is proposed for the B5G/6G-NOMA network that aims to maximise system throughput, spectrum and energy efficiency and fairness among users while minimising latency. The proposed approach is based on reinforcement learning (RL) with the use of the Q-Learning algorithm. First, the process of resource allocation as a problem of maximising rewards is formulated. Next, the Q-Learning algorithm is used to design a resource allocation algorithm based on RL. The results of the simulation confirm that the proposed scheme is feasible and efficient.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"455-470"},"PeriodicalIF":1.3,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12131","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142707571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Configuration of multi-shaper Time-Sensitive Networking for industrial applications 为工业应用配置多分频器时敏网络
IF 1.3
IET Networks Pub Date : 2024-06-30 DOI: 10.1049/ntw2.12129
Paul Pop, Konstantinos Alexandris, Tongtong Wang
{"title":"Configuration of multi-shaper Time-Sensitive Networking for industrial applications","authors":"Paul Pop,&nbsp;Konstantinos Alexandris,&nbsp;Tongtong Wang","doi":"10.1049/ntw2.12129","DOIUrl":"https://doi.org/10.1049/ntw2.12129","url":null,"abstract":"<p>IEEE 802.1 Time-Sensitive Networking (TSN) has proposed several shapers, for example, time-aware shaper (TAS, 802.1Qbv), asynchronous traffic shaping (ATS, 802.1Qcr), credit-based shaper (CBS, 802.1Qav), and cyclic queuing and forwarding (CQF, 802.1Qch). The shapers have their advantages and disadvantages and can be used in isolation or in combination to address the varied timing requirements of industrial application streams. There is very limited work on how to analyse and configure shaper combinations. The authors are interested in the configuration optimisation of multi-shaper TSN networks, targeting the TAS + CBS, TAS + ATS, and TAS + Multi-CQF combinations. The authors first propose multi-shaper integration approaches, focusing on a novel iterative delay analysis for TAS + ATS, an approach to integrate TAS and CQF by placing constraints on TAS scheduling as well as the TAS and CBS integration. We formulate the combinatorial optimisation problem of configuring multi-shaper TSN networks, which consists, for example, of the routing of streams, the assignment of streams to the egress port queues, and the synthesis of gate control lists for TAS. Then, the authors propose a solution based on a simulated annealing metaheuristic. The proposed solutions are evaluated on large realistic test cases, up to tens of thousands of streams and devices.</p>","PeriodicalId":46240,"journal":{"name":"IET Networks","volume":"13 5-6","pages":"434-454"},"PeriodicalIF":1.3,"publicationDate":"2024-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ntw2.12129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142708424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信