404 research outputs found
Quality-of-service management in IP networks
Quality of Service (QoS) in Internet Protocol (IF) Networks has been the subject of
active research over the past two decades. Integrated Services (IntServ) and
Differentiated Services (DiffServ) QoS architectures have emerged as proposed
standards for resource allocation in IF Networks. These two QoS architectures
support the need for multiple traffic queuing systems to allow for resource
partitioning for heterogeneous applications making use of the networks. There have
been a number of specifications or proposals for the number of traffic queuing
classes (Class of Service (CoS)) that will support integrated services in IF Networks,
but none has provided verification in the form of analytical or empirical investigation
to prove that its specification or proposal will be optimum.
Despite the existence of the two standard QoS architectures and the large volume of
research work that has been carried out on IF QoS, its deployment still remains
elusive in the Internet. This is not unconnected with the complexities associated with
some aspects of the standard QoS architectures. [Continues.
Benefits and Incentives for ADS-B Equipage in the National Airspace System
Automatic Dependent Surveillance – Broadcast (ADS-B) is a technology that can
replace secondary surveillance radars and enhance cockpit situational awareness.
It also has the potential to enable procedures not possible with current
surveillance technology that would increase the capacity of the National
Airspace System (NAS) in the US. Certain forms of ADS-B also have the
bandwidth to upload weather and airspace information into the cockpit.
However, prior to achieving the benefits of ADS-B, operators must equip with
the technology. In order to voluntarily equip, owners and operators must
receive benefits from the technology that outweigh the cost or receive other
incentives. Through an online survey of stakeholders, applications of ADS-B
with the strongest benefits to users are identified. In-cockpit data link offerings
are explored in detail, along with a detailed analysis of ADS-B benefits for
Hawaiian helicopter operators. The conclusions of this study are that ADS-B
should be implemented in non-radar airspace along with busy terminal areas
first to gain the most benefits from non-radar separation applications and traffic
awareness applications. Also, the basis for the US dual ADS-B link decision is
questioned, with a single 1090-ES based link augmented with satellite data link
weather recommended.The authors would like to thank all of interview and survey participants.
Without their time and insights, this thesis would not be possible. Also, thanks
to the FAA’s Surveillance and Broadcast Services program office for their
support of this research under contract DTFA01-C-00030
Internet performance modeling: the state of the art at the turn of the century
Seemingly overnight, the Internet has gone from an academic experiment to a worldwide information matrix. Along the way, computer scientists have come to realize that understanding the performance of the Internet is a remarkably challenging and subtle problem. This challenge is all the more important because of the increasingly significant role the Internet has come to play in society. To take stock of the field of Internet performance modeling, the authors organized a workshop at Schloß Dagstuhl. This paper summarizes the results of discussions, both plenary and in small groups, that took place during the four-day workshop. It identifies successes, points to areas where more work is needed, and poses “Grand Challenges” for the performance evaluation community with respect to the Internet
5G Outlook – Innovations and Applications
5G Outlook - Innovations and Applications is a collection of the recent research and development in the area of the Fifth Generation Mobile Technology (5G), the future of wireless communications. Plenty of novel ideas and knowledge of the 5G are presented in this book as well as divers applications from health science to business modeling. The authors of different chapters contributed from various countries and organizations. The chapters have also been presented at the 5th IEEE 5G Summit held in Aalborg on July 1, 2016. The book starts with a comprehensive introduction on 5G and its need and requirement. Then millimeter waves as a promising spectrum to 5G technology is discussed. The book continues with the novel and inspiring ideas for the future wireless communication usage and network. Further, some technical issues in signal processing and network design for 5G are presented. Finally, the book ends up with different applications of 5G in distinct areas. Topics widely covered in this book are: • 5G technology from past to present to the future• Millimeter- waves and their characteristics• Signal processing and network design issues for 5G• Applications, business modeling and several novel ideas for the future of 5
Recommended from our members
Traffic engineering multi-layer optimization for wireless mesh network transmission a campus network routing protocol transmission performance inhancement
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel UniversityThe wireless mesh network is a potential network for the future due to its excellent inherent characteristic for dynamic self-healing, self-configuration and self-organization. It also has the advantage of easy interoperability networking and the ability to form multi-linked ad-hoc networks. It has a decentralized topology, is cheap and highly scalable. Furthermore, its ease in deployment and easy maintenance are other inherent networking qualities. These aforementioned qualities of the wireless mesh network bring advantages to transmission capability of heterogeneous networks. However, transmissions in wireless mesh network create comparative performance based challenges such as congestion, load-balancing, scalability over increasing networks and coverage capacity. Consequently, these challenges and problems in the routing and switching of packets in the wireless mesh network routing protocols led to a proposal on the resolution of these failures with a combination algorithm and a management based security for the network and its transmitted packets. There are equally contentious services like reliability of the network and quality of service for real-time multimedia traffic flows with other challenges such as path computation and selection in the wireless mesh network.
This thesis is therefore a cumulative proposal to the resolution of the outlined challenges and open research areas posed by using wireless mesh network routing protocol. It advances the resolution of these challenges in the mesh environment using a hybrid optimization – traffic engineering, to increase the effectiveness and the reliability of the network. It also proffers a cumulative resolution of the diverse contributions on wireless mesh network routing protocol and transmission. Adaptation and optimization are carried out on the wireless mesh network designed network using traffic engineering mechanism and technique. The research examines the patterns of mesh packet transmission and evaluates the challenges and failures in the mesh network packet transmission. It develops a solution based algorithm for resolutions and proposes the traffic engineering based solution.. These resultant performances and analysis are usually tested and compared over wireless mesh IEEE802.11n or other older proposed documented solution.
This thesis used a carefully designed campus mesh network to show a comparative evaluation of an optimal performance of the mesh nodes and routers over a normal IEE802.11n based wireless domain network to show differentiation by optimization using the created algorithms. Furthermore, the indexes of performance being the metric are used to measure the utility and the reliability, including capacity and throughput at the destination during traffic engineered transmission. In addition, the security of these transmitted data and packets are optimized under a traffic engineered technique. Finally, this thesis offers an understanding to the security contribution using traffic engineering resolution to create a management algorithm for processing and computation of the wireless mesh networks security needs. The results of this thesis confirmed, completed and extended the existing predictions with real measurement
Preliminary study of cooperation in hybrid ad-hoc networks
In this paper, we present a first approach to evolve a cooperative behavior in ad hoc networks. Since wireless nodes are energy constrained, it may not be in the best interest of a node to always accept relay requests. On the other hand, if all nodes decide not to expend energy in relaying, then network throughput will drop dramatically. Both these extreme scenarios are unfavorable to the interests of a user. In this paper we deal with the issue of user cooperation in ad hoc networks by developing the algorithm called Generous Tit-For-Tat. We assume that nodes are rational, i.e., their actions are strictly determined by self-interest, and that each node is associated with a minimum lifetime constraint. Given these lifetime constraints and the assumption of rational behavior, we study the added behavior of the network.En este proyecto mostramos un primer acercamiento a la evolución de las redes Ad-Hoc cooperativas. Puesto que los nodos wireless disponen de energía finita, puede que no estén interesados en aceptar transmitir tráfico de otros nodos. Por otra parte, si ningún nodo decide gastar energía en retransmitir tráfico de otros, entonces la tasa de transferencia en la red cae críticamente. Estos casos extremos son desfavorables para el usuario. En este trabajo tratamos estas cuestiones gracias al desarrollo de un algoritmo llamado "Generous Tit-For Tat". Asumiremos que los nodos son egoístas y tienen energía finita, así que las decisiones se determinarán por propio interés y cada nodo será asociado con un tiempo limitado de energía. Dadas esas limitaciones y la suposición del comportamiento racional estudiaremos el comportamiento agregado de la red.En aquest treball mostrem una primera aproximació a l'evolució de les xarxes Ad-Hoc cooperatives. Donat que els nodes wireless disposen d'energia finita, poden no estar interessats en transmetre tràfic d'altres nodes. Per altra banda, si cap node decideix gastar energia en passar tràfic d'altres, llavors la tassa de transferència a la xarxa cau críticament. Aquests casos extrems son desfavorables per l'usuari. En aquest treball tractem aquestes qüestions gràcies al desenvolupament d'un algoritme anomenat "Generous Tit-For-Tat". Assumirem que els nodes son egoistes y tenen energia finita, així que les decisions es determinaran pel seu propi interès i cada node s'associarà amb un temps limitat d'energia. Donades aquestes limitacions y la suposició del comportament racional, estudiarem el comportament agregat de la xarxa.Nota: Aquest document conté originàriament altre material i/o programari només consultable a la Biblioteca de Ciència i Tecnologia
- …