Change search
Link to record
Permanent link

Direct link
BETA
Leijon, Viktor
Publications (10 of 11) Show all publications
Wallin, S., Nordlander, J. & Leijon, V. (2014). Semantic Alarms (ed.). In: (Ed.), Alex Galis; Gaby Lenhart (Ed.), 3rd ETSI Future Networks Workshop, 9-11 april 2013, Sophia Antipolis, France: . Paper presented at ETSI Future Networks Workshop : 09/04/2013 - 11/04/2013 (pp. 145-153).
Open this publication in new window or tab >>Semantic Alarms
2014 (English)In: 3rd ETSI Future Networks Workshop, 9-11 april 2013, Sophia Antipolis, France / [ed] Alex Galis; Gaby Lenhart, 2014, p. 145-153Conference paper, Published paper (Other (popular science, discussion, etc.))
Abstract [en]

Functions Virtualisation (NFV) and Software Driven Networks (SDN) aggregate resources across multiple domains. This puts requirements on understanding the overall alarm status across these domains and dependencies between them. Current practice of low-quality alarm documentation and confusion around fundamental concepts like alarm states, alarm-types and the underlying protocols like syslog and SNMP traps makes it hard to create one unified alarm interface as part of the SDN API.If alarm interfaces for the various components were expressed in a more formal manner including dependencies and propagation between the alarms the NFV/SDN interface could automatically present an integrated alarm API as well as a synthesized alarm state across the virtualized functions.We present a novel approach to alarm interfaces by providing a formal alarm model together with a domain-specific language that allows us to specify both the alarm models and the constraints placed on the alarm models in a consistent manner. This means that we can verify the consistency of an alarm interfaces and automatically generate interfaces, multi-domain correlation and aggregated states.

National Category
Media and Communication Technology
Research subject
Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-34312 (URN)87b4f50c-cfae-4297-ad39-f454428300c1 (Local ID)979-10-92620-00-9 (ISBN)87b4f50c-cfae-4297-ad39-f454428300c1 (Archive number)87b4f50c-cfae-4297-ad39-f454428300c1 (OAI)
Conference
ETSI Future Networks Workshop : 09/04/2013 - 11/04/2013
Note
Godkänd; 2014; 20140110 (stewal)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-01-14Bibliographically approved
Wallin, S., Leijon, V., Nordlander, J. & Bystedt, N. (2012). The semantics of alarm definitions: enabling systematic reasoning about alarms (ed.). Paper presented at . International Journal of Network Management, 22(3), 181-198
Open this publication in new window or tab >>The semantics of alarm definitions: enabling systematic reasoning about alarms
2012 (English)In: International Journal of Network Management, ISSN 1055-7148, E-ISSN 1099-1190, Vol. 22, no 3, p. 181-198Article in journal (Refereed) Published
Abstract [en]

The development and integration of an alarm interface between network elements and a network management system is a costly process, largely because of the informal way in which alarm interfaces are expressed and communicated. Low-quality alarm documentation and confusion around fundamental concepts like alarm states and alarm types are typical consequences of current practices. If alarm interfaces were expressed in a more formal manner, costs could be reduced and more advanced analysis and automation would be enabled. We present a novel approach to alarm interfaces by providing a formal alarm model together with a domain-specific language that allows us to specify both the alarm models and the constraints placed on the alarm models in a consistent manner. This means that we can verify the consistency of an alarm interface and automatically generate artifacts such as alarm correlation rules or alarm documentation based only on the model

National Category
Computer Sciences Embedded Systems Media and Communication Technology
Research subject
Dependable Communication and Computation Systems; Embedded System; Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-9940 (URN)10.1002/nem.800 (DOI)000304086500002 ()2-s2.0-84861228987 (Scopus ID)8a85d927-d9c0-4374-a663-db3161ee6034 (Local ID)8a85d927-d9c0-4374-a663-db3161ee6034 (Archive number)8a85d927-d9c0-4374-a663-db3161ee6034 (OAI)
Note
Validerad; 2012; 20110207 (stewal)Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2018-07-10Bibliographically approved
Delsing, J., Eliasson, J. & Leijon, V. (2010). Latency and packet loss of an interferred 802.15.4 channel in an industrial environment (ed.). In: (Ed.), (Ed.), Fourth International Conference on Sensor Technologies and Applications, SENSORCOMM: . Paper presented at International Conference on Sensor Technologies and Applications : 18/07/2010 - 25/07/2010 (pp. 33-38). : International Academy, Research and Industry Association (IARIA)
Open this publication in new window or tab >>Latency and packet loss of an interferred 802.15.4 channel in an industrial environment
2010 (English)In: Fourth International Conference on Sensor Technologies and Applications, SENSORCOMM, International Academy, Research and Industry Association (IARIA), 2010, p. 33-38Conference paper, Published paper (Refereed)
Abstract [en]

There is currently a rapid development of new types of wireless communication channels for industrial automation. This paper aims to provide some experimental data and theoretical justification on packet latency and packet loss for a wireless communication channel exposed to intentional radio interference. The intentional radio interference used in the experiments is an attempt to simulate possible future co-existence scenarios in a dense wireless communication environment at an industrial site. For the cases tested packet loses of less than 10% was obtained. Latency is shown to depend on channel access and will has a deterministic behaviour.

Place, publisher, year, edition, pages
International Academy, Research and Industry Association (IARIA), 2010
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering Embedded Systems
Research subject
Industrial Electronics; Embedded System
Identifiers
urn:nbn:se:ltu:diva-39964 (URN)10.1109/SENSORCOMM.2010.12 (DOI)000296392600006 ()2-s2.0-77957980905 (Scopus ID)ee905eb0-cae3-11df-a707-000ea68e967b (Local ID)ee905eb0-cae3-11df-a707-000ea68e967b (Archive number)ee905eb0-cae3-11df-a707-000ea68e967b (OAI)
Conference
International Conference on Sensor Technologies and Applications : 18/07/2010 - 25/07/2010
Note
Godkänd; 2010; 20100928 (ysko)Available from: 2016-10-03 Created: 2016-10-03 Last updated: 2018-07-10Bibliographically approved
Leijon, V. (2009). FIFO networking: punctual event-triggered networking (ed.). In: (Ed.), (Ed.), 2009 IEEE Conference on Emerging Technologies & Factory Automation: ETFA 2009 ; Palma de Mallorca, Spain, 22 - 25 September 2009. Paper presented at IEEE Conference on Emerging Technologies & Factory Automation : 22/09/2009 - 26/09/2009. Piscataway, NJ: IEEE Communications Society
Open this publication in new window or tab >>FIFO networking: punctual event-triggered networking
2009 (English)In: 2009 IEEE Conference on Emerging Technologies & Factory Automation: ETFA 2009 ; Palma de Mallorca, Spain, 22 - 25 September 2009, Piscataway, NJ: IEEE Communications Society, 2009Conference paper, Published paper (Refereed)
Abstract [en]

It is desirable to be able to combine ease of implementation of a network with the ability to analyze the properties of the network. In order to address this we present a MAC protocol where the network acts as a FIFO, and examine the resulting properties of the network using both a theoretical study of the waiting times and a simulation experiment. It turns out that this type of protocol would allows us to achieve real-time guarantees for an event-triggered system, as well as controlled jitter for message delivery. Further, temporal composability, and how to design a system using FIFO networking, is discussed.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2009
Series
Proceedings (IEEE International Conference on Emerging Technologies and Factory Automation : Online)
National Category
Embedded Systems
Research subject
Embedded System
Identifiers
urn:nbn:se:ltu:diva-27557 (URN)10.1109/ETFA.2009.5347203 (DOI)2-s2.0-77949884874 (Scopus ID)10dbafe0-a84b-11de-8293-000ea68e967b (Local ID)978-1-4244-2727-7 (ISBN)10dbafe0-a84b-11de-8293-000ea68e967b (Archive number)10dbafe0-a84b-11de-8293-000ea68e967b (OAI)
Conference
IEEE Conference on Emerging Technologies & Factory Automation : 22/09/2009 - 26/09/2009
Note
Godkänd; 2009; 20090923 (leijon)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Wallin, S., Leijon, V. & Landén, L. (2009). Statistical analysis and prioritisation of alarms in mobile networks (ed.). International Journal of Business Intelligence and Data Mining, 4(1), 4-21
Open this publication in new window or tab >>Statistical analysis and prioritisation of alarms in mobile networks
2009 (English)In: International Journal of Business Intelligence and Data Mining, ISSN 1743-8195, Vol. 4, no 1, p. 4-21Article in journal (Refereed) Published
Abstract [en]

Telecom Service Providers are faced with an overwhelming flow of alarms, which makes good alarm classification and prioritization very important. This paper first provides statistical analysis of data collected from a real-world alarm flow and then presents a quantitative characterization of the alarm situation. Using data from the trouble ticketing system as a reference, we examine the relationship between mechanical classification of alarms and the human perception of them.Using this knowledge of alarm flow properties and trouble ticketing information, we suggest a neural network-based approach for alarm classification. Tests using live data show that our prototype assigns the same severity as a human expert in 50% of all cases, compared to 17% for a naive approach.

National Category
Embedded Systems Media and Communication Technology
Research subject
Embedded System; Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-7862 (URN)10.1504/IJBIDM.2009.025408 (DOI)2-s2.0-66349093331 (Scopus ID)649e4ab0-c323-11dd-a054-000ea68e967b (Local ID)649e4ab0-c323-11dd-a054-000ea68e967b (Archive number)649e4ab0-c323-11dd-a054-000ea68e967b (OAI)
Note

Validerad; 2009; 20081206 (leijon)

Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2018-07-10Bibliographically approved
Wallin, S. & Leijon, V. (2009). Telecom network and service management: an operator survey (ed.). In: (Ed.), Tom Pfeifer; Paolo Bellavista (Ed.), Wired-Wireless Multimedia Networks and Services Management: 12th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2009, Venice, Italy, October 26-27, 2009. Proceedings. Paper presented at IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services : 26/10/2009 - 27/10/2009 (pp. 15-26). Berlin: Encyclopedia of Global Archaeology/Springer Verlag
Open this publication in new window or tab >>Telecom network and service management: an operator survey
2009 (English)In: Wired-Wireless Multimedia Networks and Services Management: 12th IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services, MMNS 2009, Venice, Italy, October 26-27, 2009. Proceedings / [ed] Tom Pfeifer; Paolo Bellavista, Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2009, p. 15-26Conference paper, Published paper (Refereed)
Abstract [en]

It is hard to know which research problems in network management we should focus our attention on. To remedy this situation we have surveyed fifteen different telecom operators on four continents to gather some feedback on what they desire and expect from the network management research community. Their input forms a foundation for future directions in network management research, and provides us with valuable insight into what the most urgent problems are in industry.

Place, publisher, year, edition, pages
Berlin: Encyclopedia of Global Archaeology/Springer Verlag, 2009
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 5842
National Category
Media and Communication Technology Embedded Systems
Research subject
Mobile and Pervasive Computing; Embedded System
Identifiers
urn:nbn:se:ltu:diva-32622 (URN)10.1007/978-3-642-04994-1_2 (DOI)2-s2.0-71549163478 (Scopus ID)72d0fd50-800e-11de-8da0-000ea68e967b (Local ID)978-3-642-04993-4 (ISBN)72d0fd50-800e-11de-8da0-000ea68e967b (Archive number)72d0fd50-800e-11de-8da0-000ea68e967b (OAI)
Conference
IFIP/IEEE International Conference on Management of Multimedia and Mobile Networks and Services : 26/10/2009 - 27/10/2009
Note

Validerad; 2009; 20090803 (stewal)

Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Leijon, V. (2008). A time constrained real-time process calculus (ed.). (Licentiate dissertation). Paper presented at . Luleå: Luleå tekniska universitet
Open this publication in new window or tab >>A time constrained real-time process calculus
2008 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

There are two important questions to ask regarding the correct execution of a real-time program: (i) Is there a platform such that the program executes correctly? (ii) Does the program execute correctly on a particular platform? The execution of a program is correct if all actions are taken within their execution window, i.e. after their release time but before their deadline. A program which executes correctly on a specific platform is said to be feasible on that platform and an incorrect program is one which is not feasible on any platform. In this thesis we develop a timed process calculus, based on the pi-calculus, which can help answer these questions. We express the time window in which computation is legal by use of two time restrictions, before and after, to express a deadline and a release time offset respectively. We choose to look at correctness through the traces of the program. The trace of a program will always be a sequence of interleaved internal reductions and time steps, because programs have no free names. We define the meaning of a feasible program by use of these traces. In particular we define the speed of a particular system as the ratio between work steps and time steps. Based on this calculus we show how the two questions above can be answered in terms of traces of the process calculus and prove the classical utilization limit for Earliest Deadline First scheduling holds.

Place, publisher, year, edition, pages
Luleå: Luleå tekniska universitet, 2008. p. 68
Series
Licentiate thesis / Luleå University of Technology, ISSN 1402-1757 ; 2008:33
National Category
Embedded Systems
Research subject
Embedded System
Identifiers
urn:nbn:se:ltu:diva-17600 (URN)440c5470-96a2-11dd-aadc-000ea68e967b (Local ID)440c5470-96a2-11dd-aadc-000ea68e967b (Archive number)440c5470-96a2-11dd-aadc-000ea68e967b (OAI)
Note
Godkänd; 2008; 20081010 (ysko)Available from: 2016-09-29 Created: 2016-09-29 Last updated: 2017-11-24Bibliographically approved
Leijon, V., Wallin, S. & Ehnmark, J. (2008). SALmon: a Service Modeling Language and Monitoring Engine (ed.). In: (Ed.), Jonathan Lee; Deron Liang; Y.C. Cheng (Ed.), IEEE International Symposium on Service-Oriented System Engineering: SOSE '08. Paper presented at IEEE International Symposium on Service-Oriented System Engineering : 18/12/2008 - 19/12/2008 (pp. 202-207). Los Alamitos, Calif: IEEE Communications Society
Open this publication in new window or tab >>SALmon: a Service Modeling Language and Monitoring Engine
2008 (English)In: IEEE International Symposium on Service-Oriented System Engineering: SOSE '08 / [ed] Jonathan Lee; Deron Liang; Y.C. Cheng, Los Alamitos, Calif: IEEE Communications Society, 2008, p. 202-207Conference paper, Published paper (Refereed)
Abstract [en]

To be able to monitor complex services and examine their properties we need a modeling language that can express them in an efficient manner. As telecom operators deploy and sell increasingly complex services the need to monitor these services increases. We propose a novel domain specific language called SALmon, which allows for efficient representation of service models, together with a computational engine for evaluation of service models. This working prototype allows us to perform  experiments with full scale service models, and proves to be a good trade-off between simplicity and expressive power.

Place, publisher, year, edition, pages
Los Alamitos, Calif: IEEE Communications Society, 2008
National Category
Embedded Systems Media and Communication Technology
Research subject
Embedded System; Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-35677 (URN)10.1109/SOSE.2008.29 (DOI)62249124833 (Scopus ID)a4fa71e0-88ce-11dd-9d47-000ea68e967b (Local ID)978-0-7695-3499-2 (ISBN)a4fa71e0-88ce-11dd-9d47-000ea68e967b (Archive number)a4fa71e0-88ce-11dd-9d47-000ea68e967b (OAI)
Conference
IEEE International Symposium on Service-Oriented System Engineering : 18/12/2008 - 19/12/2008
Note

Godkänd; 2008; 20080922 (stewal)

Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-01-14Bibliographically approved
Leijon, V., Lindgren, P. & Eriksson, J. (2007). FIFO WiDOM: timely control over wireless links (ed.). In: (Ed.), (Ed.), Proceedings of the 2007 IEEE Conference on Control Applications: Singapore, 1 - 3 October 2007 ; [part of IEEE Multi-Conference on Systems and Control, MSC]. Paper presented at IEEE International Conference on Control Applications : 01/10/2007 - 03/10/2007 (pp. 1024-1030). Piscataway, NJ: IEEE Communications Society
Open this publication in new window or tab >>FIFO WiDOM: timely control over wireless links
2007 (English)In: Proceedings of the 2007 IEEE Conference on Control Applications: Singapore, 1 - 3 October 2007 ; [part of IEEE Multi-Conference on Systems and Control, MSC], Piscataway, NJ: IEEE Communications Society, 2007, p. 1024-1030Conference paper, Published paper (Refereed)
Abstract [en]

We present the idea of scheduling a control network in a first-come first-serve manner, and demonstrate a way to implement this over a wireless link. This achieves real-time guarantees and tightly bounded jitter for control applications. Further, how to design systems using this network is discussed, and the benefits compared to a standard priority MAC protocol are examined through simulations and a prototype implementation. The prototype is implemented using the reactive Timber programming model on a lightweight 8-bit platform.

Place, publisher, year, edition, pages
Piscataway, NJ: IEEE Communications Society, 2007
Series
I E E E International Conference on Control Applications. Proceedings, ISSN 1085-1992
National Category
Embedded Systems
Research subject
Embedded System
Identifiers
urn:nbn:se:ltu:diva-27913 (URN)10.1109/CCA.2007.4389368 (DOI)2-s2.0-43049173774 (Scopus ID)17e6e640-70d7-11dc-a60c-000ea68e967b (Local ID)1-4244-0443-6 (ISBN)17e6e640-70d7-11dc-a60c-000ea68e967b (Archive number)17e6e640-70d7-11dc-a60c-000ea68e967b (OAI)
Conference
IEEE International Conference on Control Applications : 01/10/2007 - 03/10/2007
Projects
CASTT - Centre for Automotive Systems Technologies and Testing
Note
Validerad; 2007; 20071002 (leijon)Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Wallin, S. & Leijon, V. (2007). Multipurpose models for QoS monitoring (ed.). In: (Ed.), 21st International Conference on Advanced Information Networking and Applications Workshops: Niagara Falls, Ontario, Canada, 21 - 23 May 2007 ; proceedings. Paper presented at International Conference on Advanced Networking and Applications : 21/05/2007 - 23/05/2007 (pp. 900-905). Los Alamitos, Calif: IEEE Communications Society, 1
Open this publication in new window or tab >>Multipurpose models for QoS monitoring
2007 (English)In: 21st International Conference on Advanced Information Networking and Applications Workshops: Niagara Falls, Ontario, Canada, 21 - 23 May 2007 ; proceedings, Los Alamitos, Calif: IEEE Communications Society, 2007, Vol. 1, p. 900-905Conference paper, Published paper (Refereed)
Abstract [en]

Telecom operators face an increasing need for service quality management to cope with competition and complex service portfolios in the mobile sector. Improvements in this area can lead to significant market benefits for operators in highly competitive markets. We propose an architecture for a service monitoring tool, including a time aware formal language for model specification. Using these models allows for increased predictability and flexibility in a constantly changing environment.

Place, publisher, year, edition, pages
Los Alamitos, Calif: IEEE Communications Society, 2007
National Category
Embedded Systems Media and Communication Technology
Research subject
Embedded System; Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-34697 (URN)10.1109/AINAW.2007.262 (DOI)2-s2.0-35248833202 (Scopus ID)8f767fa0-0925-11dc-9854-000ea68e967b (Local ID)0-7695-2847-3 (ISBN)8f767fa0-0925-11dc-9854-000ea68e967b (Archive number)8f767fa0-0925-11dc-9854-000ea68e967b (OAI)
Conference
International Conference on Advanced Networking and Applications : 21/05/2007 - 23/05/2007
Note

Godkänd; 2007; 20070523 (leijon)

Available from: 2016-09-30 Created: 2016-09-30 Last updated: 2018-07-10Bibliographically approved
Organisations

Search in DiVA

Show all publications