2,033 research outputs found

    Design and evaluation of protocols for wireless networks taking into account the interaction between transport and network layers.

    Get PDF
    We recognized two important shortcomings of the current TCP protocol: misinterpretation of delayed acknowledgments and competition among different TCP flows. In this dissertation, we propose to address these two issues by a use of novel protocol that uses immediate and delayed acknowledgment schemes and provides a coordination mechanism among independent TCP flows. We also address certain important issues that are related to the implementation of our proposed protocol: can we maintain the end-to-end semantics of TCP? Are there additional benefits that can be harvested if intermediate nodes with TCP protocol can be used? (Abstract shortened by UMI.)The Transmission Control Protocol (TCP) provides end-to-end data reliability and is the primary transport layer protocol for many applications such as email, web access, and file transfer. There has been a plethora of research activity that aims to improve the performance of TCP both in wired and wireless networks. Protocols for the computer networks have been very structured and layered to allow for easier upgrades and maintenance. The network layer protocol (e.g. IP) is independent and below the transport layer protocol (e.g. TCP). Our main goal in this dissertation is to examine the interaction and dynamics between the network layer protocols and TCP in the wireless environment.Towards this goal, we examined the network layer protocols in one-hop wireless (e.g. cellular networks) and multi-hop wireless, e.g. distributed Wi-Fi (Wireless Fidelity) networks. For each of these networks we, for the first time, propose transport layer protocols that take into account the interaction between the network layer and transport layer. For the one-hop wireless networks we have investigated analytical methods to determine the buffer requirements at base stations and estimate disruption time which is the time between two packet arrivals at the mobile host. We will show that the estimation of buffer requirements and disruption time is not only dependent on the wireless TCP scheme used, but also its interaction with the underlying network protocol. We also propose a comprehensive study of the effectiveness of wireless TCP and network protocols taking into account different networking environments that is decided on many factors such as mobility of senders and receivers, simplex and duplex communication among communicating peers, connection oriented and connection less communication at the network layer, rerouting schemes used after movement, and with and without hint handoff schemes

    Software Development For Conversion Of Ip To Wireless Atm (Watm)

    Get PDF
    To meet the anticipated and high demand for wireless access to the broadband Asynchronous Transfer mode (ATM) network, the concept of wireless ATM has been proposed in 1994. One of the main challenge in the design of the Wireless ATM network resides in the formation of the Wireless MAC protocol, that could handle various services with a considerable QoS and providing efficient utilization of the Wireless Channel. In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. The project considers the various aspects of carrying IP over a WATM channel, by retransforming the IP data to a WATM cell, ready to be transmitted over a wireless channel.Analysis and simulation shows various advantages and disadvantages in the above-mentioned method when performed using software. Furthermore, discussion about the hardware methods of implementing communication protocols shows a way for the engineer to choose the right method for his future development of the protocols for implementation. Finally, this algorithmic approach is proposed to integrate this approach to simulate the methodology of IP to WATM conversion

    High-level Architecture and Compelling Technologies for an Advanced Web-based Vehicle Routing and Scheduling System for Urban Freight Transportation

    Get PDF
    The search for a more efficient routing and scheduling, the improvement of service’s level and the increasing complexity of real-world distributive contexts are contingent variables that generate the need for a system’s architecture that may be holistic, innovative, scalable and reliable. Hence, new technologies and a lucid awareness of involved actors and infrastructures, provide the basis to create a more efficient routing and scheduling architecture for enterprises

    Optimization in Telecommunication Networks

    Get PDF
    Network design and network synthesis have been the classical optimization problems intelecommunication for a long time. In the recent past, there have been many technologicaldevelopments such as digitization of information, optical networks, internet, and wirelessnetworks. These developments have led to a series of new optimization problems. Thismanuscript gives an overview of the developments in solving both classical and moderntelecom optimization problems.We start with a short historical overview of the technological developments. Then,the classical (still actual) network design and synthesis problems are described with anemphasis on the latest developments on modelling and solving them. Classical results suchas Menger’s disjoint paths theorem, and Ford-Fulkerson’s max-flow-min-cut theorem, butalso Gomory-Hu trees and the Okamura-Seymour cut-condition, will be related to themodels described. Finally, we describe recent optimization problems such as routing andwavelength assignment, and grooming in optical networks.operations research and management science;

    A Scalable and Adaptive Network on Chip for Many-Core Architectures

    Get PDF
    In this work, a scalable network on chip (NoC) for future many-core architectures is proposed and investigated. It supports different QoS mechanisms to ensure predictable communication. Self-optimization is introduced to adapt the energy footprint and the performance of the network to the communication requirements. A fault tolerance concept allows to deal with permanent errors. Moreover, a template-based automated evaluation and design methodology and a synthesis flow for NoCs is introduced

    Distributed Failure Restoration for Asynchronous Transfer Mode (ATM) Tactical Communication Networks

    Get PDF
    Asynchronous Transfer Mode (A TM) is an attractive choice for future military communication systems because it can provide high throughput and support multi-service applications. Furthermore its use is consistent with the 'off the shelf technology policy that is currently operated by the Defence Engineering Research Agency of Great Britain. However, A TM has been developed as a civil standard and is designed to operate in network infrastructures with very low failure rates. In contrast, tactical networks are much less reliable. Indeed tactical networks operate on the premise that failures, particularly node failures, are expected. Hence, efficient, automatic failure restoration schemes are essential if an A TM based tactical network is to remain operational. The main objective of this research is the proposal and verification of one or more new restoration algorithms that meet the specific requirements of tactical networks. The aspects of ATM networks that influence restoration algorithms' implementation are discussed. In particular, the features of A TM networks such as the concept of Virtual Paths Virtual Channels and OAM (Operation And Maintenance) mechanisms that facilitate implementation of efficient restoration techniques. The unique characteristics of tactical networks and their impact on restoration are also presented. A significant part of the research was the study and evaluation of existing approaches to failure restoration in civil networks. A critical analysis of the suitability of these approaches to the tactical environment shows no one restoration algorithm fully meets the requirements of tactical networks. Consequently, two restoration algorithms for tactical A TM networks, DRA-TN (Dynamic Restoration Algorithm for Tactical Networks) and PPR-TN (Pre-planned Restoration Algorithm for Tactical Networks), are proposed and described in detail. Since the primary concern of restoration in tactical networks is the recovery of high priority connections the proposed algorithms attempt to restore high-priority connections by disrupting low-priority calls. Also, a number of additional mechanisms are proposed to reduce the use of bandwidth, which is a scarce resource in tactical networks. It is next argued that software simulation is the most appropriate method to prove the consistency of the proposed algorithms, assess their performance and test them on different network topologies as well as traffic and failure conditions. For this reason a simulation software package was designed and built specifically to model the proposed restoration algorithms. The design of the package is presented in detail and the most important implementation issues are discussed. The proposed restoration algorithms are modelled on three network topologies under various traffic loads, and their performance compared against the performance of known algorithms proposed for civil networks. It is shown that DRA-TN and PPR-TN provide better restoration of higher priority traffic. Furthermore, as the traffic load increases the relative performance of the DRA-TN and PPR-TN algorithms increases. The DRA-TN and PPR-TN algorithms are also compared and their advantages and disadvantages noted. Also, recommendations are given about the applicability of the proposed algorithms, and some practical implementation issues are discussed. The number of problems that need further study are briefly described.Defence Engineering Research Agency of Great Britai
    corecore