849 research outputs found

    An optimal admission control protocol for heterogeneous multicast streaming services

    Get PDF
    We investigate optimal call admission control (CAC) policy for multicast streaming services (MSS) in 3rd generation (3G) and beyond wireless mobile networks. Several MSS sessions are supported simultaneously in a bandwidth-limited network. Active sessions are those that are currently serving some users, and inactive sessions are those that are currently not serving any users. An admission decision in MSS is required only when an inactive session is requested, unlike in unicasting. For this reason, if a user request for an inactive MSS session arrives, we should make an admission decision in anticipation of (i) the possible reward earned based on users served during a session active time generated by accepting it, and (ii) the influence of the session active time upon the future status of network bandwidth and admission decisions. Our objective is to determine when to admit or block a user asking an inactive MSS session to achieve the optimality in rewards. We formulate this problem as a semi-Markov decision process (SMDP), and a value iteration algorithm is used to obtain an optimal stationary deterministic policy. We also derive the user blocking probability of the optimal policy by analyzing an embedded Markov chain induced by it.http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=26hb201

    A Cross-System Approach for Multimedia Services with IP Multicast in 4G Networks

    Get PDF
    The increased demand for multimedia services by mobile end users in recent years have driven both Broadcast and Wireless Network operators to develop new systems and architectures for the deployment of such services. The proposed solutions are nonetheless limited either in terms of QoS or Capabilities to deliver new interactive services. This paper highlights strengths and drawbacks of the existing technologies in terms of QoS, Security and Mobility. In order to fill the gap between current solutions we propose a new architecture that builds itself on the synergies created by a heterogeneous network made of existing delivering technologies, such as 3GPP/MBMS and DVB, where services can be delivered to end-users in the most appropriate way for end-users and operators alike. A prototype implementation is further described.EU project - IST-2002- 506997 Daidalos I

    Multicast Mobility in Mobile IP Version 6 (MIPv6) : Problem Statement and Brief Survey

    Get PDF
    Publisher PD

    Performance evaluation of multicast networks and service differentiation mechanisms in IP networks

    Get PDF
    The performance of a communication network depends on how well the network is designed in terms of delivering the level of service required by a given type of traffic. The field of teletraffic theory is concerned with quantifying the three-way relationship between the network, its level of service and the traffic arriving at the network. In this thesis, we study three different problems concerning this three-way relationship and present models to assist in designing and dimensioning networks to satisfy the different quality of service demands. In the first part of the thesis, we consider service differentiation mechanisms in packet-switched IP networks implementing a Differentiated Services (DiffServ) architecture. We study how bandwidth can be divided in a weighted fair manner between persistent elastic TCP flows, and between these TCP flows and streaming real-time UDP flows. To this end, we model the traffic conditioning and scheduling mechanisms on the packet and the flow level. We also model the interaction of these DiffServ mechanisms with the TCP congestion control mechanism and present closed-loop models for the sending rate of a TCP flow that reacts to congestion signals from the network. In the second part, we concentrate on non-persistent elastic TCP traffic in IP networks and study how flows can be differentiated in terms of mean delay by giving priority to flows based on their age. We study Multi Level Processor Sharing (MLPS) disciplines, where jobs are classified into levels based on their age or attained service. Between levels, a strict priority discipline is applied; the level containing the youngest jobs has the highest priority. Inside a particular level, any scheduling discipline could be used. We present an implementation proposal of a two-level discipline, PS+PS, with the Processor Sharing discipline used inside both levels. We prove that, as long as the hazard rate of the job-size distribution is decreasing, which is the case for Internet traffic, PS+PS, and any MLPS discipline that favors young jobs, is better than PS with respect to overall mean delay. In the final part, we study distribution-type streaming traffic in a multicast network, where there is, at most, one copy of each channel transmission in each network link, and quantify the blocking probability. We derive an exact blocking probability algorithm for multicast traffic in a tree network based on the convolution and truncation algorithm for unicast traffic. We present a new convolution operation, the OR-convolution, to suit the transmission principle of multicast traffic, and a new truncation operator to take into account the case of having both unicast and multicast traffic in the network. We also consider different user models derived from the single-user model.reviewe

    A cross-layer middleware architecture for time and safety critical applications in MANETs

    Get PDF
    Mobile Ad hoc Networks (MANETs) can be deployed instantaneously and adaptively, making them highly suitable to military, medical and disaster-response scenarios. Using real-time applications for provision of instantaneous and dependable communications, media streaming, and device control in these scenarios is a growing research field. Realising timing requirements in packet delivery is essential to safety-critical real-time applications that are both delay- and loss-sensitive. Safety of these applications is compromised by packet loss, both on the network and by the applications themselves that will drop packets exceeding delay bounds. However, the provision of this required Quality of Service (QoS) must overcome issues relating to the lack of reliable existing infrastructure, conservation of safety-certified functionality. It must also overcome issues relating to the layer-2 dynamics with causal factors including hidden transmitters and fading channels. This thesis proposes that bounded maximum delay and safety-critical application support can be achieved by using cross-layer middleware. Such an approach benefits from the use of established protocols without requiring modifications to safety-certified ones. This research proposes ROAM: a novel, adaptive and scalable cross-layer Real-time Optimising Ad hoc Middleware framework for the provision and maintenance of performance guarantees in self-configuring MANETs. The ROAM framework is designed to be scalable to new optimisers and MANET protocols and requires no modifications of protocol functionality. Four original contributions are proposed: (1) ROAM, a middleware entity abstracts information from the protocol stack using application programming interfaces (APIs) and that implements optimisers to monitor and autonomously tune conditions at protocol layers in response to dynamic network conditions. The cross-layer approach is MANET protocol generic, using minimal imposition on the protocol stack, without protocol modification requirements. (2) A horizontal handoff optimiser that responds to time-varying link quality to ensure optimal and most robust channel usage. (3) A distributed contention reduction optimiser that reduces channel contention and related delay, in response to detection of the presence of a hidden transmitter. (4) A feasibility evaluation of the ROAM architecture to bound maximum delay and jitter in a comprehensive range of ns2-MIRACLE simulation scenarios that demonstrate independence from the key causes of network dynamics: application setting and MANET configuration; including mobility or topology. Experimental results show that ROAM can constrain end-to-end delay, jitter and packet loss, to support real-time applications with critical timing requirements
    • …
    corecore