Cloud-over-WOBAN (CoW): an Offloading-Enabled Access Network Design

Size: px
Start display at page:

Download "Cloud-over-WOBAN (CoW): an Offloading-Enabled Access Network Design"

Transcription

1 Cloud-over-WOBAN (CoW): an Offloading-Enabled Access Network Design Abu (Sayeem) Reaz, Vishwanath Ramamurthi, and Massimo Tornatore University of California, Davis, USA October 9, 2010 Abstract Today s access networks are increasingly shaped by the services that they provide to the end users. In a hybrid wireless-optical broadband access network (WOBAN), to access any service, the corresponding requests for the services and responses require multi-hop communication over the wireless mesh network (WMN) and Passive Optical Network (PON) subsequently over the Internet to some server in the application service provider s domain. This may cause bottlenecks in the WMN and may result in degraded performance. In this paper, we propose a design for WOBAN that integrates a cloud over WOBAN (CoW) that provides different cloud services from within the access network. This has multiple benefits: 1) it offloads traffic over wireless links, 2) it reduces bottleneck from the gateways of WOBAN, 3) it reduces delays, and 4) it allows providers to facilitate different cloud services with their access network. In this paper, we study the issue of determining how the cloud components providing the services should be placed in WOBAN in order to optimize the resources while providing better service. We formulate this problem as a Mixed-Integer Linear Program (MILP) and solve it using CPLEX. We show that, by integrating cloud with WOBAN, we can obtain significant performance improvement. 1 Introduction Recent industry research [1] shows that wired and wireless networking technology must be treated as an integrated entity to create a flexible, service-centric network architecture. A possible such architecture is a Wireless-Optical Broadband Access Network (WOBAN) that has a wireless mesh network (WMN) to provide end users access and an optical backhaul network to carry the aggregated traffic collected over the WMN [2]. The optical backhaul network comprises of a Passive Optical Network (PON) [3] with an Optical Line Terminal (OLT) in the Central Office (CO) which is connected via optical fiber to multiple Optical Network Units (ONU). At the front-end of WOBAN, a set of wireless nodes 1

2 (routers) form a WMN. An architecture such as WOBAN shown in Fig. 1 can achieve cost-effectiveness of a WMN while having higher performance due to the high-capacity optical backhaul network. End users, both mobile and stationary, connect to the network through these wireless nodes, whose locations are generally fixed. Data usually travels in a WMN over multiple wireless hops, known as wireless backhaul. A selected set of these nodes, called gateways, are connected to the optical part of the network. Usually, gateways are attached to one of the ONUs [2] as shown in Fig. 1. Figure 1: Architecture of a WOBAN. Today s access networks, such as a WOBAN, are increasingly shaped by the services that they provide to the end users. Generally, these services are accessed from a cloud. A cloud is anything that facilitates storage, deployment, and delivery of services over the Internet. Many of such services are storage, localized applications, software-as-a-service (SaaS) etc. Figure 2: Traditional cloud access in WOBAN. 2

3 In current scenario, in a WOBAN, these cloud services are accessed using WiFienabled end devices [4] (WiFi is usually free in most of the cases) from cloud servers that can be anywhere in the network. Consequently, in a WOBAN, a user s request for a cloud service must be transported through the wireless mesh, possibly over multiple hops, to reach the OLT via the gateways and delivered to an appropriate server. The response from the server for the different services are also transported over multiple wireless hops to the end users. This traditional setting is shown in Fig. 2 where each service requested by an end user consumes wireless bandwidth in the WMN which is is limited because of contention, interference, and limited capacity [5]. Moreover, because most traffic flows have to go through one of the few gateways, links near the gateways become bottleneck. In this work, we propose an architecture, Cloud-over-WOBAN addresses these limitations. In CoW, we propose to integrate cloud components (CC), such as storage [6] and servers [7], within the WMN of a WOBAN. Many cloud services are local and the geographic relevance of these services is within the footprint of the front end of a WOBAN. Unlike a typical content distribution system, a CoW hosts and serves these cloud services locally using the CCs. These services can be accessed from the CCs through ubiquitous web-based interfaces and are enabled by the recent developments of secure communications [8]. Figure 3: A Cloud-over-WOBAN (CoW). Availability of these low-cost, easy to deploy CCs [6, 7] makes CoW a technologically feasible and practically deployable architecture. Such an architecture, as shown in Fig. 3, can offload the traffic of some of the cloud services to the locally hosted CCs of the wireless and optical backhaul of WOBAN. This reduces the volume of traffic needed to be carried over the wireless backhaul. As practitioners in the industry are considering offloading as a technique to reduce bottleneck in the backhaul [9], this inherent offloading property of CoW makes it an attractive architecture. Offloading of service traffic reduces wireless contention, frees-up capacity for other traffic which can be used to increase the 3

4 offered load of the network, and reduces congestion near the gateways. As a result, significant performance improvement of WOBAN can be achieved. In this paper, we discuss the architecture and implementation options for a CoW. We also present an intelligent placement scheme of CC in a CoW through a Mixed- Integer Linear Program (MILP). Our performance evaluation shows that CoW allows a significant reduction of average network-wide packet delay and increases the offered load of WOBAN. The rest of the paper is organized as follows. Section 2 discusses the related work. Section 3 introduces CoW. Section 4 presents optimal placement of cloud components in a CoW. Illustrative numerical examples are shown in Section 5. Section 6 concludes the study. 2 Related Work There are several proposal for improving services over WOBAN. Capacity and Delay-Aware Routing Algorithm (CaDAR) [10] performs optimum capacity distribution on wireless links and performs shortest-delay-path routing in WOBAN. Cost-effective capacity enhancement of the WMN is shown in [5] to improve the performance over wireless backhaul. However, none of the solutions integrates cloud with WOBAN for a service-oriented design. There are several papers in the literature that discuss architecture designed for services. An overview of service-oriented architecture through web services is presented in [8]. It discusses different types of distribution that vary from cluster-based homogeneous systems to supporting a variety of operating services and environments. It provides schematics of service interactions in serviceoriented environments. In [11], a traditional view of Service-Oriented Architecture (SoA) presented as providing service through web-based interfaces and enterprise-level service integration through a common platform such as XML. In another similar approach, [12] promotes visualization of information technology related services and its potential value generation and technology adaptation that enables it. In [13], service-oriented network design is derived from these concepts of SoA where the network plays a key role exchanging information among different components of SoA through transmitting data rapidly and reliably. A service-oriented network design for wireless sensor networks is presented in [14] where each layer of the sensor network is divided in to several planes to incorporate service-oriented network architecture to provide better understanding of the network. Many of the services requested by the users are local; hence location dependent services are important to identify. An overview and classification of services that are location dependent and local are discussed in [15]. It opines that for any wireless access network such as WOBAN, location-based services, i.e., local services, are an additional source of revenue generated from the investments in the infrastructure [15]. However, none of them discusses an infrastructure-based integration of cloud with an access network for an SoA. 4

5 3 Cloud-over-WOBAN (CoW) In order for a service provider to guarantee the cutting-edge cloud services to its users, it is important to integrate the services into network provisioning and planning [16]. Hence, we present CoW, an architecture that integrates clouds with an access network. 3.1 Why CoWs are Important? Many of the cloud services requested by the end users are local, and quite often, it is possible to serve them locally. For example, a spam originating from a WOBAN can be blocked within the wireless front-end without the need for it to go to the OLT; finding parking locations, rates, and finding parked cars can be served with local information. Moreover, if the service is local, (e.g., parking location) it is better to manage the local changes locally. These local services can be served by a WOBAN if a cloud is integrated with it. Hence, CoW offloads traffic from wireless backhaul and reduces its bandwidth usage, removes bottleneck near gateways by diverting traffic away, increases offered load of the network by responding to requests locally, and keeps updates local, as shown in Fig. 3. It is important to note that integrating a cloud is particularly suitable for a WOBAN. As a WOBAN is driven by an OLT from a central office, it is shown in [10] that it is possible to route and manage the wireless and optical traffic together. As a result, the traffic to the CCs, e.g., storage, in CoW can be managed through routing over WOBAN. 3.2 CoW Architecture In a CoW, we add CCs, such as storage, or a server, with the wireless nodes of a WOBAN. If a cloud-service request can be served from within, it is forwarded to the appropriate CC instead of the OLT. Then, the CC sends back the corresponding response. Depending on the policy of the service provider, equipment provider, and types of services, these CCs may differ. If a CC is integrated and served with a wireless node, we refer to it as the host node for the service. With today s technology, memory and processing power is available within reasonable cost [7]. On the other hand, wireless backhaul bandwidth is scarce [17]. Thus, this architecture is technologically feasible with current technology. When an end user needs to access a cloud service from a CoW, a cloud request is sent to the wireless node it is connected to. When the request reaches the wireless node from the user, if the service is available from CC attached to that wireless node, directly responds to the end user after processing. If the service is not available, the wireless node sends the request to a nearby host node if the service is available from WOBAN. Otherwise the request is sent to the OLT. The following two are the major ways of implementing a CoW: 1. CoW-I: if the WMN part of a WOBAN is deployed using the implementation model of Wisper [18], which keeps user development space on WMN products, and provides blank wireless box for development, then each CC can be integrated within the wireless node. For this Integrated CC (ICC) based implementation, additional hardware need is minimal as each node has some 5

6 spare processing capacity and memory that can be utilized to host services. In that case, cost of bandwidth is more prominent than hardware cost. But in such an implementation, each node may host only a few cloud services, so the services are needed to be distributed among all the nodes. This design is called CoW-I as shown in Fig. 4(a). 2. CoW-S: for other implementation models, such as Firetide [19] (separate base stations for user access in Fig. 4(b)) or Tropos [20] (integrated base stations for user access in Fig. 4(b)), additional Selective CCs (SCC), e.g., a light weight or thin server [7], or a storage [6], with capability to serve local cloud services, are connected via Ethernet to some wireless nodes based on the traffic demands. For this implementation, as additional SCCs are deployed, each of them can potentially host several services, so only a few of such server is needed. The design goal is to deploy as few SCC as possible while serving all the desired services. This design is called CoW-S as shown in Fig. 4(b). (a) CoW-I (b) CoW-S Figure 4: Various implementation approaches for a CoW. 4 Optimum Placement of CC in CoW To design a CoW, a set of wireless nodes needs over WOBAN to be selected that should be be equipped with CCs. This CCs are distributed based on the demands and requirements of the cloud services. To have a cost-effective solution, the number of such nodes needs to be minimized in such a way that it increases the bandwidth efficiency. Here, the cost of each application has two parts: a) cost of processing and memory, and b) cost of bandwidth. Note that we only consider the wireless backhaul capacity, where we intend to gain our performance improvement. We do not consider user access because usually each node have dedicated resources (a dedicated radio) to communicate with the end users. Our objective is to minimize deployment cost while assigning the CCs to CoW, under the constraints that hosts for each service should be reached within certain hops, and the deployment cost is within the budget. We develop the following MILP to formulate our problem and assign CCs to WOBAN: 6

7 4.1 Inputs to the MILP: ω(n) = set of N nodes of WMN of a WOBAN (K) = set of K services to be deployed over WOBAN u = a node in WMN of a WOBAN, u ω(n) v = a neighbor of node u in WMN of a WOBAN, node u has a transmission link to node v, v ω(n) k = a cloud service to be deployed in WOBAN, k (K) i = a node in WMN of a WOBAN with a demand for a cloud service, i ω(n) h = maximum number of hops a service-response travels over the wireless backhaul C u = radio capacity of node u I uv = set of links that interfere with link (u, v) 1 α uv = fraction of background traffic (regular mesh traffic) on each link (u, v) D I u = Cost of an SCC deployment at node u D k m = Cost of memory for Service k D k p = Cost of processing for Service k D k BW = Cost of unit flow over a link for Service k M = a large number R k m = Memory resource required for Service k R k p = Processing resource required for Service k φ m u = Memory resource available at node u φ p u = Processing resource available at node u γ k i = aggregated demand for Service k from node i z k,i u,h = 1, if demands for Service k from node i is served by node u within h hops 1 Let SNR uv = signal-to-noise ratio of link (u, v), P uv = transmitted power over link (u, v), G uv = distance(u, v) a, a = polynomial constant, σ = thermal noise at receiver, β = threshold for SNR uv, S = set of links s.t. k = u, v, x = v. A link (p, q) I uv if P SNR uv = uvg uv (k,v) S P kxg kv +σ 2 β when link (p, q) is active. 7

8 4.2 Variables for the MILP: x k u = 1, if Service k is served from node u y u = 1, if an SCC is deployed at node u w k,i u = 1, if Service k is served from node u for a demand from node i λ k,i vu = flow on link (u, v) for Service k for a demand from node i C uv = capacity on link (u, v) Minimize : k D k + u y u D I u (1) D k = x k u (Dm k + Dp) k + u (λ k,i uv DBW k ); k (2) i u v k y u xk u ; u (3) M (x k u Rm) k φ m u ; u (4) k (x k u Rp) k φ p u; u (5) k (x k u z k,i u,h ) 1; k (6) u v λ k,i vu v λ k,i uv = γ k i w k,i u ; k, u, i(i = u) (7) wu k,i x k u; u (8) wu k,i = 1; k, i (9) u i k λ k,i uv (1 α uv ) C uv ; u, v (10) C uv + C vu C u ; u (11) v v C vu + C pq C u ; u (12) v (p,q) I uv x k u,y u, w k,i u {0, 1}; k, u, i (13) The objective function, Eqn. (1), minimizes cost for all services. The first part of Eqn. (1) is the sum of processing, memory, and bandwidth cost for each service. The second part of Eqn. (1), expressed by Du, I is the cost of CC deployment and it is applicable only if CoW-S is deployed. For CoW-I, all 8

9 the values of Du I are 0. Among the constraints, Eqn. (2) defines the cost of each service: the first part indicates the processing and memory cost of each cloud service, and the second part describes the cost of bandwidth. If a wireless link (u, v) carries some traffic for any Service k, then it will incur a cost of bandwidth, otherwise not. Equation (3) indicates if an SCC is deployed at a node u. Equations (4) and (5) bound the processing capacity and memory at each node such that the total processing and memory need for all services at any node u should be less than its available processing capacity and memory. Equation (6) puts the hop-bound for all the nodes for each cloud service such that every node that requests any Service k should be covered by at least one node within h hops over the wireless backhaul. The value of h should not be large because with larger number of wireless hops, the performance of WMN would degrade. This constraint holds when for any Service k, at least one of the nodes that are reachable from node i within h hops hosts Service k and the corresponding indicator variable x k u takes the value 1. Equation (7) gives the flow constraint. If a request from any node i for Service k is terminated at node u, then the demand γi k is served at u. Compared to the classical flow constraint in network design problems, here the destination is not known in advance; it can be any of the host nodes of Service k, including node i. The variable wu k,i determines if node u is the destination for a demand from node i. If node u is the destination, the flow constraint takes up the value γi k, otherwise 0. Moreover, Eqn. (7) ensures that if node i hosts Service k, then there is no flow introduced to the network for a demand from node i. Equation (8) ensures that a request from any node i for Service k is served by one of the host nodes of Service k. Equation (9) ensures only one node u serves a request from node i for Service k. Equation (10) is the capacity constraint: it ensures that the service traffic is within the capacity that are not used by background traffic. Equations (11) and (12) are specific to wireless capacity assignment [17]. Equation (11) describes that a wireless node s transmission capacity is shared with the reception capacity, as a wireless radio cannot transmit while receiving. Similarly, Eqn. (12) describes that the reception capacity of a wireless node is shared with all the links for which the signal to noise and interference ratio is higher than a threshold. Equation (13) defines binary indicator variables for each node, u. If any node u should host Service k, the value of x k u is 1, otherwise the value is 0. Similarly, the value of wu k,i is 1 if a request from any node i for Service k is served by node u. 5 Illustrative Numerical Examples To study the advantages of a CoW, we use the 23-node wireless network with three gateways in the Segundo Housing area of University of California, Davis, as shown in Fig. 1. Each radio has a capacity of 54 Mbps. We analyze the impact of different deployment of services in WOBAN and how it affects the performance. In our performance evaluation, we consider that if a service is served within the network, it should be reached within h hops over the wireless backhaul. 9

10 System delay (msec) Traditional CoW I CoW S Background load at each node (Mbps) Figure 5: System delay vs. background load for 4 services for h = 1. We evaluated the performance of both CoW-S and CoW-I described in Section 3.2. First, we solve the MILP described in Section 4 and design CoW by distributing 4 and 8 cloud services and assign the cloud components to different nodes accordingly. Each service vary in processing and memory requirements. We assume that a CC can host several services, based on the processing and memory requirements. We created the demand matrix of services by taking the average of 1000 randomly generated demands for each service for each node. We solved the LPs using ILOG CPLEX 9.0 on a Ubuntu Linux operating system on a Intel Core 2 Duo machine with 1 Gigabyte RAM. The MILPs were solved between 0.4 to 2.16 seconds for 4 services and between 35.5 seconds to 6.8 hours for 8 services. After allocating the services, we evaluate each solution by satisfying the demand for services and inserting background traffic to the network. The formulation in Section 4 gives the design of a CoW by providing the placements of CCs. To evaluate this design, we use CaDAR [10], an efficient routing algorithm for WOBAN, for the routing of the demands in CoW to obtain the flows on links. Performance of CaDAR compared to other schemes is presented in [10]. We used the performance parameter system delay which is the average networkwide packet delay [21] to compare the performance of various implementations in the network in Fig. 1. In our evaluation, for fair comparison, we first insert the cloud traffic in the network. Then, we increase the background traffic and evaluate the performance. In this way, we obtain the overall system delay based on the total (both cloud and background) traffic demand. Note that in each of the illustrative examples, all the graphs have the same cloud traffic, so we only compare based the additional background traffic. Figure 5 shows the impact of deploying 4 services for a CoW. Here, service delivery from the cloud is allowed to travel only 1 wireless hop. We see that 10

11 0.7 System delay (msec) Traditional CoW S (1x load) CoW S (2x load) CoW S (3x load) Background load at each node (Mbps) Figure 6: Sensitivity analysis of cloud traffic for h = 1 and 4 services. the CoW carries almost twice the background traffic after satisfying the cloud s demands with about half the system delay than a traditional deployment of WOBAN in Fig. 1. This performance improvement is due to offloading of cloud traffic from wireless backhaul. We see that CoW-S carries almost the same traffic as the CoW-I with slightly higher delay. This is because the CoW-S minimizes the number of deployed SCCs, and hence introduces some traffic in the WMN while nodes with CoW-I mostly serve locally. For sensitivity analysis, Fig. 6 shows the system delay variations for increasing cloud traffic for h=1 for 4 services. We observe that with lower service traffic demand, the performance of our design is better than traditional approach. With increasing (up to three times) service load, our approach performs consistently better. We also observe that for lower background traffic, higher service traffic can be accommodated leading to lower the system delay as more traffic demands are served locally. Figure 7 shows the performance of a CoW when service delivery is allowed to travel up to 2 wireless hops. We do not consider any more hops because, in Fig. 1, 3 or more hops carries traffic to gateways from any node. Moreover, any higher number of wireless hops will result in degraded performance. We observe that increasing the number of hops does not impact the performance of CoW-I as most of the services are served locally by this approach. For CoW-S with 2 hops, the number of SCC deployed in the network decreases (Fig. 9) as cloud traffic is allowed to travel more hops to satisfy the demands. But this leads to higher system delay and reduced background traffic carried by CoW. Figure 8 shows the performance of the CoW when the number of cloud services served by the network is 8. CoW-I does not have a feasible solution if only 1 hop is allowed because the integrated routers cannot host a large number of services (Section 3.2). If 2 hops are allowed, CoW-I carries higher background traffic as 11

12 0.5 System delay (msec) CoW I (1 hop) CoW S (1 hop) CoW I (2 hops) CoW S (2 hops) Background load at each node (Mbps) Figure 7: System delay vs. background load for 4 services for h = 1. most of the service traffic is absorbed locally. We see that CoW-S with 2 hops has higher delay than 1 hop because it introduces more traffic to the network. But it carries more background traffic as it diverts more traffic away from the gateways. Figure 9 shows the relative cost of traditional, CoW-I, and CoW-S. We consider wireless router cost as unit cost. Because SCCs are built on system boards [7] and requires additional memory, we assume that a SCC costs twice that of wireless router. We consider that at least one cloud server is required for traditional implementation, with at least a cost twice that of an SCC. Because of volume discount, we consider the cost of CoW-I to be 2.5 times the cost of a wireless node. We see from Fig. 9 that the CoW-S requires a slight increase of cost while CoW-I costs almost twice that of the traditional approach. This is because the objective of our placement formulation (Eqn. (1)) minimizes the number of SCC. We see from our performance evaluation that the CoW-I achieves better performance, but does not support higher number of services, and has higher cost. On the other hand, CoW-S achieves significant performance gain over the traditional implementation with a slight increase of cost, and can support higher number of services. 6 Conclusion Service-centric behavior of end-users is shaping the traffic pattern of today s networks. As a cost-effective access technology, WOBAN delivers such services to end-users. But these services are mostly destined to an external cloud that take up wireless backhaul bandwidth, create bottleneck at the gateways, and have 12

13 System delay (msec) CoW I(2 hops) CoW S (1 hop) CoW S (2 hops) Background load at each node (Mbps) Figure 8: System delay vs. background load for 8 services for h = 1 and 2. a possibility of stale server updates. Equipping WOBAN with cloud components leads to an intelligent access network design, called CoW, that addresses these limitations. We presented a optimum design for a CoW using an MILP. We observed that, CoW can achieve significant performance improvement through offloading of traffic even for low service demand. We conclude that CoW is a technologically viable access network design that can improve the performance of a WOBAN in a cost-effective way. References [1] Butler Group, Application delivery: Creating a flexible, servicecentric network architecture. Delivery-Creating-R663-21/, Sep [2] S. Sarkar, S. Dixit, and B. Mukherjee, Hybrid wireless-optical broadband access network (WOBAN): A review of relevant challenges, IEEE/OSA Journal of Lightwave Technology, vol. 25, no. 11, pp , Nov [3] F. Effenberger, D. Clearly, O. Haran, G. Kramer, R. Li, M. Oron, and T. Pfeiffer, An introduction to PON technologies, IEEE Communication Magazine, vol. 45, no. 3, pp. S17 S25, Mar [4] ABI Research, Wi-fi capable handsets. Aug [5] A. Reaz, V. Ramamurthi, S. Sarkar, D. Ghosal, and B. Mukherjee, Hybrid wireless-optical broadband access network (WOBAN): Capacity en- 13

14 Hop 2 hops 40 Relative Cost Traditional CoW I CoW S CoW S 4 Services 8 Services Implementation Scheme Figure 9: Relative cost of different implementation models. hancement for wireless access, in Proc. IEEE Globecom, New Orleans, LA, pp. 1 5, Dec [6] CTERA Networks, Cloudplug. [7] PC Engines, ALIX system boards. [8] L. Srinivasan and J. Treadwell, An overview of service-oriented architecture, web services and grid computing, HP Software Global Business Unit, vol. 2, Nov [9] P. Donegan, R. Brandon, A. Jones, T. Naveh, and T. Hack, Backhaul to the future: Mobile broadband profitability requires smarter backhaul networks. Light Reading Webinar, Sep [10] A. Reaz, V. Ramamurthi, S. Sarkar, D. Ghosal, S. Dixit, and B. Mukherjee, CaDAR: An efficient routing algorithm for a wireless-optical broadband access network (WOBAN), Journal of Optical Communications and Networking, vol. 1, no. 5, pp , Oct [11] T. Erl, Service-Oriented Architecture: A Field Guide to Integrating XML and Web Services, Prentice Hall PTR, [12] N. Bieberstein, S. Bose, L. Walker, and A. Lynch, Impact of serviceoriented architecture on enterprise systems, organizational structures, and individuals, IBM Systems Journal, vol. 44, no. 4, no. 4, pp ,

15 [13] Zeus Technology Limited, Building a service oriented network using a service delivery controller. Building a Service Oriented Network.pdf, [14] D. Graˇcanin, M. Eltoweissy, A. Wadaa,, and L. DaSilva, A service-centric model for wireless sensor networks, IEEE Journal of Selected Areas in Communications, vol. 23, no. 6, pp , Jun [15] B. Rao and L. Minakakis, Evolution of mobile location-based services, Communications of the ACM, vol. 46, no. 12, pp , Dec [16] Comarch Information Technology, Service-centric OSS. Comarch Whitepaper, Jul [17] V. Ramamurthi, A. Reaz, and B. Mukherjee, Optimal capacity allocation in wireless mesh networks, in Proc. IEEE Globecom, New Orleans, LA, Dec [18] Devcom Solutions AB, Wisper wireless. [19] Firetide, Wireless mesh products. [20] Tropos Networks, Wireless mesh products. [21] L. Kleinrock, Queueing Systems, Volume II: Computer Applications, Wiley- Interscience,

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks

Load Balanced Optical-Network-Unit (ONU) Placement Algorithm in Wireless-Optical Broadband Access Networks Load Balanced Optical-Network-Unit (ONU Placement Algorithm in Wireless-Optical Broadband Access Networks Bing Li, Yejun Liu, and Lei Guo Abstract With the broadband services increasing, such as video

More information

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Karamitsos Ioannis Telecom Lab,On Telecoms Athens, Attica 16342, Greece Al-Arfaj Khalid Rayadah Investment Co Riyadh, KSA Kingdom of Saudi

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs

An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs An Empirical Approach - Distributed Mobility Management for Target Tracking in MANETs G.Michael Assistant Professor, Department of CSE, Bharath University, Chennai, TN, India ABSTRACT: Mobility management

More information

International Journal of Engineering Science Invention Research & Development; Vol. I Issue III September 2014 www.ijesird.com e-issn: 2349-6185

International Journal of Engineering Science Invention Research & Development; Vol. I Issue III September 2014 www.ijesird.com e-issn: 2349-6185 SOME INVESTIGATIONS ON CONVERGED NETWORKS ABHISHEK GAUR 1, SULABH TYAGI 2 1,2 GB PANT GOVT. ENGG. COLLEGE, NEW DELHI, 1 ELECTRONICS & COMMUNICATION ENGG. DEPTT. 2 Computer Science & Engg. Deptt. Abstract:

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks

An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of

More information

Intelligent Agents for Routing on Mobile Ad-Hoc Networks

Intelligent Agents for Routing on Mobile Ad-Hoc Networks Intelligent Agents for Routing on Mobile Ad-Hoc Networks Y. Zhou Dalhousie University yzhou@cs.dal.ca A. N. Zincir-Heywood Dalhousie University zincir@cs.dal.ca Abstract This paper introduces a new agent-based

More information

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring

Hybrid Passive and Active Surveillance Approach with Interchangeable Filters and a Time Window Mechanism for Performance Monitoring International Journal of Computer Sciences and Engineering Vol.-4(4), PP(25-29) April 2016, E-ISSN: 2347-2693 International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4,

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks*

Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Integrated Backup Topology Control and Routing of Obscured Traffic in Hybrid RF/FSO Networks* Abhishek Kashyap, Anuj Rawat and Mark Shayman Department of Electrical and Computer Engineering, University

More information

Next Generation Optical-Wireless Converged Network Architectures

Next Generation Optical-Wireless Converged Network Architectures Next Generation Optical-Wireless Converged Network Architectures Chathurika Ranaweera, Elaine Wong, Christina Lim, and Ampalavanapillai Nirmalathas, University of Melbourne Abstract This article provides

More information

A Routing Metric for Load-Balancing in Wireless Mesh Networks

A Routing Metric for Load-Balancing in Wireless Mesh Networks A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA

Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,

More information

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks

ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi (faa6@sfu.ca) Ehsan Arman (eaa14@sfu.ca) http://www.sfu.ca/~faa6

More information

Tranzeo s EnRoute500 Performance Analysis and Prediction

Tranzeo s EnRoute500 Performance Analysis and Prediction Tranzeo s EnRoute500 Performance Analysis and Prediction Introduction Tranzeo has developed the EnRoute500 product family to provide an optimum balance between price and performance for wireless broadband

More information

3D On-chip Data Center Networks Using Circuit Switches and Packet Switches

3D On-chip Data Center Networks Using Circuit Switches and Packet Switches 3D On-chip Data Center Networks Using Circuit Switches and Packet Switches Takahide Ikeda Yuichi Ohsita, and Masayuki Murata Graduate School of Information Science and Technology, Osaka University Osaka,

More information

5G Backhauling_. Luis M. Contreras GCTO Unit, Transport, Telefónica 05.11.2015

5G Backhauling_. Luis M. Contreras GCTO Unit, Transport, Telefónica 05.11.2015 5G Backhauling_ Luis M. Contreras GCTO Unit, Transport, Telefónica 05.11.2015 NGMN Whitepaper 5G System Architecture 5G System Requirements and Architecture Performance 1000x higher mobile data volumes

More information

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS

ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS International Journal of Science, Environment and Technology, Vol. 1, No 2, 2012, 72-79 ROUTE MECHANISMS FOR WIRELESS ADHOC NETWORKS: -CLASSIFICATIONS AND COMPARISON ANALYSIS Ramesh Kait 1, R. K. Chauhan

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS

AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS AN INTERWORKING IMPLEMENTATION AND PERFORMANCE EVALUATION IN IEEE 802.11S BASED CAMPUS MESH NETWORKS G.MERLIN SHEEBA Electronics and Telecommunication Department, Sathyabama University Chennai, TamilNadu,

More information

WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED

WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED RAJESH KUMAR SUNDARARAJAN Assistant Vice President - Product Management, Aricent Group WIRELESS IN THE METRO PACKET MICROWAVE EXPLAINED This whitepaper

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Optimized Load Balancing Mechanism Using Carry Forward Distance

Optimized Load Balancing Mechanism Using Carry Forward Distance Optimized Load Balancing Mechanism Using Carry Forward Distance Ramandeep Kaur 1, Gagandeep Singh 2, Sahil 3 1 M. Tech Research Scholar, Chandigarh Engineering College, Punjab, India 2 Assistant Professor,

More information

Literature Synthesis on Wireless Networks Management. Veenesh Jeena (JNXVEE001) CSC4000W 2010

Literature Synthesis on Wireless Networks Management. Veenesh Jeena (JNXVEE001) CSC4000W 2010 Literature Synthesis on Wireless Networks Management Veenesh Jeena (JNXVEE001) CSC4000W 2010 Abstract In this paper, we look a Wireless Mesh Networks (WMN). We discuss the importance of WMN s and some

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK

LTE BACKHAUL REQUIREMENTS: A REALITY CHECK By: Peter Croy, Sr. Network Architect, Aviat Networks INTRODUCTION LTE mobile broadband technology is now being launched across the world with more than 140 service providers committed to implement it

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008

Making the Case for Satellite: Ensuring Business Continuity and Beyond. July 2008 Making the Case for Satellite: Ensuring Business Continuity and Beyond July 2008 Ensuring Business Continuity and Beyond Ensuring business continuity is a major concern of any company in today s technology

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment

An Algorithm for Automatic Base Station Placement in Cellular Network Deployment An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology

More information

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks

Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Analysis of QoS parameters of VOIP calls over Wireless Local Area Networks Ayman Wazwaz, Computer Engineering Department, Palestine Polytechnic University, Hebron, Palestine, aymanw@ppu.edu Duaa sweity

More information

Performance Evaluation of The Split Transmission in Multihop Wireless Networks

Performance Evaluation of The Split Transmission in Multihop Wireless Networks Performance Evaluation of The Split Transmission in Multihop Wireless Networks Wanqing Tu and Vic Grout Centre for Applied Internet Research, School of Computing and Communications Technology, Glyndwr

More information

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider

WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider WHITEPAPER MPLS: Key Factors to Consider When Selecting Your MPLS Provider INTRODUCTION Multiprotocol Label Switching (MPLS), once the sole domain of major corporations and telecom carriers, has gone mainstream

More information

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks

Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Bandwidth Management Framework for Multicasting in Wireless Mesh Networks Manaswi Saha and P. Venkata Krishna Abstract Wireless mesh networks (WMNs) provide a reliable and a scalable solution for multicasting.

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways

Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Abstract Achieving Load Balancing in Wireless Mesh Networks Through Multiple Gateways Deepti Nandiraju, Lakshmi Santhanam, Nagesh Nandiraju, and Dharma P. Agrawal Center for Distributed and Mobile Computing,

More information

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable

MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable MERAKI WHITE PAPER Cloud + Wireless LAN = Easier + Affordable Version 1.0, August 2009 This white paper discusses how a cloud-based architecture makes wireless LAN easier and more affordable for organizations

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

An Analysis of the Delay and Jitter Performance of DBA Schemes for Differentiated Services in EPONs

An Analysis of the Delay and Jitter Performance of DBA Schemes for Differentiated Services in EPONs Journal of the Optical Society of Korea Vol. 13, No. 3, September 29, pp. 373-378 DOI: 1.387/JOSK.29.13.3.373 An Analysis of the Delay and Jitter Performance of DBA Schemes for Differentiated Services

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

Figure 1: Bandwidth and coverage of wireless technologies [2].

Figure 1: Bandwidth and coverage of wireless technologies [2]. Simulation and Performance Evaluation of WiFi and WiMAX using OPNET Ravinder Paul, Sukhchandan Lally, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia Canada E-mail: {rpa28, lally,

More information

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries

Mesh Networks. Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Mesh Networks Abdus Salam ICTP, February 2004 Schoolon DigitalRadio Communications for Research and Training in Developing Countries Ermanno Pietrosemoli Escuela Latinoamericana de Redes (Latin American

More information

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks

Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Adaptive Multiple Metrics Routing Protocols for Heterogeneous Multi-Hop Wireless Networks Lijuan Cao Kashif Sharif Yu Wang Teresa Dahlberg Department of Computer Science, University of North Carolina at

More information

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA

PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET USING DIRECTIONAL ANTENNA International Research Journal of Engineering and Technology (IRJET) e-issn: -00 Volume: 0 Issue: 0 Oct-01 www.irjet.net p-issn: -00 PERFORMANCE ANALYSIS OF AODV, DSR AND ZRP ROUTING PROTOCOLS IN MANET

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Energy Optimal Routing Protocol for a Wireless Data Network

Energy Optimal Routing Protocol for a Wireless Data Network Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.

More information

TCP and UDP Performance for Internet over Optical Packet-Switched Networks

TCP and UDP Performance for Internet over Optical Packet-Switched Networks TCP and UDP Performance for Internet over Optical Packet-Switched Networks Jingyi He S-H Gary Chan Department of Electrical and Electronic Engineering Department of Computer Science Hong Kong University

More information

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS

PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran reza.azizi@bojnourdiau.ac.ir

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

Performance of Wireless Body Sensor based Mesh Network for Health Application

Performance of Wireless Body Sensor based Mesh Network for Health Application International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM) ISSN: 2150-7988 Vol.2 (2010), pp.020-028 http://www.mirlabs.org/ijcisim Performance of Wireless Body

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Impact Of Interference On Multi-hop Wireless Network Performance

Impact Of Interference On Multi-hop Wireless Network Performance Impact Of Interference On Multi-hop Wireless Network Performance Kamal Jain Jitendra Padhye Venkata N. Padmanabhan Lili Qiu Microsoft Research One Microsoft Way, Redmond, WA 98052. {kamalj, padhye, padmanab,

More information

Technology White Paper Capacity Constrained Smart Grid Design

Technology White Paper Capacity Constrained Smart Grid Design Capacity Constrained Smart Grid Design Smart Devices Smart Networks Smart Planning EDX Wireless Tel: +1-541-345-0019 I Fax: +1-541-345-8145 I info@edx.com I www.edx.com Mark Chapman and Greg Leon EDX Wireless

More information

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed

A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed A Wireless Mesh Network NS-3 Simulation Model: Implementation and Performance Comparison With a Real Test-Bed Dmitrii Dugaev, Eduard Siemens Anhalt University of Applied Sciences - Faculty of Electrical,

More information

SJBIT, Bangalore, KARNATAKA

SJBIT, Bangalore, KARNATAKA A Comparison of the TCP Variants Performance over different Routing Protocols on Mobile Ad Hoc Networks S. R. Biradar 1, Subir Kumar Sarkar 2, Puttamadappa C 3 1 Sikkim Manipal Institute of Technology,

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763

International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 ISSN 2278-7763 International Journal of Advancements in Research & Technology, Volume 3, Issue 4, April-2014 55 Management of Wireless sensor networks using cloud technology Dipankar Mishra, Department of Electronics,

More information

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR

Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,

More information

Portable Wireless Mesh Networks: Competitive Differentiation

Portable Wireless Mesh Networks: Competitive Differentiation Portable Wireless Mesh Networks: Competitive Differentiation Rajant Corporation s kinetic mesh networking solutions combine specialized command and control software with ruggedized, high-performance hardware.

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis

Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Dynamic Resource Allocation in Software Defined and Virtual Networks: A Comparative Analysis Felipe Augusto Nunes de Oliveira - GRR20112021 João Victor Tozatti Risso - GRR20120726 Abstract. The increasing

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information

WDM Passive Optical Networks: Protection and Restoration

WDM Passive Optical Networks: Protection and Restoration OECC 2009 Workshop: Next-generation Broadband Optical Access Future Challenges Session 1: Broadband Network Architectures, WDM PON Evolution Strategies and Future Ultra-high- bandwidth Services WDM Passive

More information

Network Virtualization Server for Adaptive Network Control

Network Virtualization Server for Adaptive Network Control Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,

More information

Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks

Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks Joint Optimization of Routing and Radio Configuration in Fixed Wireless Networks David Coudert, Napoleão Nepomuceno, Hervé Rivano Projet Mascotte, I3S(CNRS-UNSA) INRIA Réunion Mascotte, March 2009 MASCOTTE

More information

Wireless Mesh Networks: WMN Overview, WMN Architecture

Wireless Mesh Networks: WMN Overview, WMN Architecture 2011 International Conference on Communication Engineering and Networks IPCSIT vol.19 (2011) (2011) IACSIT Press, Singapore Wireless Mesh Networks: WMN Overview, WMN Architecture Mojtaba Seyedzadegan,

More information

MILP Model And Models For Cloud Network Backup

MILP Model And Models For Cloud Network Backup Minimizing Disaster Backup Window for Geo-Distributed Multi-Datacenter Cloud Systems Jingjing Yao, Ping Lu, Zuqing Zhu School of Information Science and Technology University of Science and Technology

More information

Municipal Mesh Network Design

Municipal Mesh Network Design White Paper Municipal Mesh Network Design Author: Maen Artimy 1 Summary This document provides a wireless mesh network design for the downtown area of the Town of Wolfville, Nova Scotia. This design serves

More information

In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network

In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network Computer networking In this section of notes you will learn the rudiments of networking, the components of a network and how to secure a network What This Section Will And Will Not Cover What we will talk

More information

OpenFlow-based Load Balancing for Wireless Mesh Infrastructure

OpenFlow-based Load Balancing for Wireless Mesh Infrastructure OpenFlow-based Load Balancing for Wireless Mesh Infrastructure Fan Yang, Vamsi Gondi, Jason O. Hallstrom, Kuang-Ching Wang, Gene Eidson Department of Electrical and Computer Engineering, School of Computing,

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms

Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Traffic Prediction in Wireless Mesh Networks Using Process Mining Algorithms Kirill Krinkin Open Source and Linux lab Saint Petersburg, Russia kirill.krinkin@fruct.org Eugene Kalishenko Saint Petersburg

More information

Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions

Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions White Paper Honeywell s OneWireless Network - The Building Blocks of Reliability Vibhor Tandon, Honeywell Process Solutions Executive Summary User expectations for network availability and tolerance for

More information

Connect & Go with WDM PON Ea 1100 WDM PON

Connect & Go with WDM PON Ea 1100 WDM PON Connect & Go with WDM PON Ea 1100 WDM PON ericsson deep Fiber access Connectivity Begins in the Access Speed, connectivity, Efficiency In much the same way the worldwide web changed the traditional voice

More information

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner

Analyzing Mission Critical Voice over IP Networks. Michael Todd Gardner Analyzing Mission Critical Voice over IP Networks Michael Todd Gardner Organization What is Mission Critical Voice? Why Study Mission Critical Voice over IP? Approach to Analyze Mission Critical Voice

More information

ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE

ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture

A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture Oscar D. Ramos-Cantor, Technische Universität Darmstadt, oscar.ramos@nt.tu-darmstadt.de,

More information

Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links).

Determine: route for each connection and protect them if necessary to minimize total network cost (say wavelength-links). Service Provisioning to Provide Per-Connection-Based Availability Guarantee in WDM Mesh Networks Jing Zhang, Keyao Zhu, Hui Zang, and Biswanath Mukherjee Abstract We present availability analysis for WDM-mesh-network

More information

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network

Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network International Journal of Future Generation Communication and Networking 67 Cluster-based Multi-path Routing Algorithm for Multi-hop Wireless Network Jie Zhang, Choong Kyo Jeong, Goo Yeon Lee, Hwa Jong

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

Wireless Video Best Practices Guide

Wireless Video Best Practices Guide Wireless Video Best Practices Guide Using Digital Video Manager (DVM) with the OneWireless Universal Mesh Network Authors: Annemarie Diepenbroek DVM Product Manager Soroush Amidi OneWireless Product Manager

More information