9 research outputs found

    The effects of qos level degradation cost on provider selection and task allocation model in telecommunication networks

    Get PDF
    Firms acquire network capacity from multiple suppliers which offer different Quality of Service (QoS) levels. After acquisition, day-to-day operations such as video conferencing, voice over IP and data applications are allocated between these acquired capacities by considering QoS requirement of each operation. In optimal allocation scheme, it is generally assumed each operation has to be placed into resource that provides equal or higher QoS Level. Conversely, in this study it is showed that former allocation strategy may lead to suboptimal solutions depending upon penalty cost policy to charge degradation in QoS requirements. We model a cost minimization problem which includes three cost components namely capacity acquisition, opportunity and penalty due to loss in QoS

    The Effects of QoS Level Degradation Cost on Provider Selection and Task Allocation Model in Telecommunication Networks

    Get PDF
    ─Abstract ─ Firms acquire network capacity from multiple suppliers which offer different Quality of Service (QoS) levels. After acquisition, day-to-day operations such as video conferencing, voice over IP and data applications are allocated between these acquired capacities by considering QoS requirement of each operation. In optimal allocation scheme, it is generally assumed each operation has to be placed into resource that provides equal or higher QoS Level. Conversely, in this study it is showed that former allocation strategy may lead to suboptimal solutions depending upon penalty cost policy to charge degradation in QoS requirements. We model a cost minimization problem which includes three cost components namely capacity acquisition, opportunity and penalty due to loss in QoS

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Mobile Ad Hoc Networks

    Get PDF
    Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections: Fundamentals of MANET Modeling and Simulation—Describes how MANETs operate and perform through simulations and models Communication Protocols of MANETs—Presents cutting-edge research on key issues, including MAC layer issues and routing in high mobility Future Networks Inspired By MANETs—Tackles open research issues and emerging trends Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms

    Proposta de um modelo de qualidade de serviço e segurança para a tecnologia de web services

    Get PDF
    Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro Tecnológico. Programa de Pós-Graduação em Ciência da Computação

    Management of customizable software-as-a-service in cloud and network environments

    Get PDF

    Dot Com Mantra: Social computing in the Central Himalayas

    Get PDF
    Billions of dollars are being spent nationally and globally on providing computing access to digitally disadvantaged groups and cultures with an expectation that computers and the Internet can lead to higher socio-economic mobility. This ethnographic study of social computing in the Central Himalayas, India, investigates alternative social practices with new technologies and media amongst a population that is for the most part undocumented. In doing so, this book offers fresh and critical perspectives on issues of contemporary debate: free learning with computers, relevant and global information, the range and role of actors as intermediaries of digital information, impact of direct versus indirect access on social computing, gender and technology and transnational consumption and production of knowledge

    Multicast routing and resource allocation for high-speed networks

    No full text
    grantor: University of TorontoIn recent years, a number of architectures (ATM, Next Generation Internet) have been proposed to provide real-time multimedia services over packet switched networks. Most of the emerging services need certain "quality of service" (QoS) guarantees from the network. Furthermore, many of these applications are multicast in nature. Five important components of the emerging network architecture supporting these applications are: Flow specification, Routing, Resource Reservation, Admission Control and Packet Scheduling. These components in conjunction try to meet the QoS requirements of a wide range of services. The goal is not just meeting QoS requirements of the applications but doing so efficiently. There is a strong interaction between various components of the architecture and hence the design of any component is based on certain assumptions about the remaining components of the architecture. This dissertation addresses the issues involved in the design of routing, resource allocation and call admission control components of the next generation Internet. The approach is however general in nature and applicable to any high speed integrated packet switched network. We particularly concentrate on guaranteed quality of service (GQoS) applications, defined by IETF (Internet Engineering Task Force), that need a firm end-to-end delay bound and no queuing loss for conforming packets. Conceptually we can think that a connection set-up process consists of two phases, though physical implementation may be different. In the first phase, a route is established from the source node to the destination node. The second phase consists of checking whether or not the application can be admitted along the route to meet the user's requirements. The success of the call admission phase depends on the amount of resources (buffer, bandwidth etc.) available in the selected route by the routing process in the first phase. A related issue is the mapping of end-to-end QoS requirement into local QoS requirements and then mapping local QoS requirements into resource requirements. In this dissertation, we first give an efficient and distributed algorithm based on the cost function (function of node utilization) to divide the end-to-end guaranteed QoS requirements into local QoS requirements. The simulation results show that the QoS division scheme based on cost function results in an efficient utilization of resources compared to the equal division scheme. We then select suitable routing metrics for GQoS applications in order to make an efficient use of network resources. We then give a heuristic approach that use these metrics to produce sub-optimum multicast trees. We also show that the resource reservation scheme given for uni-cast connections can also be used with multicast connections to do efficient resource reservation. We note that the key idea with both resource reservation and QoS routing is the efficient distribution of load across the network. Since both routing and resource reservation share the same goal, an efficient design is possible if these two problems are addressed concurrently. We show that the performance of a given resource reservation mechanism depends strongly on the underlying routing algorithm. Our simulation results show that the QoS routing algorithm proposed in this dissertation gives very good performance when used with cost based resource reservation scheme. We find that this is due to the even distribution of load across the network and minimal consumption of resources that result when this particular combination is used.Ph.D
    corecore