17 research outputs found

    Call admission and routing in telecommunication networks.

    Get PDF
    by Kit-man Chan.Thesis (M.Phil.)--Chinese University of Hong Kong, 1994.Includes bibliographical references (leaves 82-86).Chapter 1 --- Introduction --- p.1Chapter 1.1 --- Overview of Integrated Service Digital Networks --- p.1Chapter 1.2 --- Multirate Loss Networks --- p.5Chapter 1.3 --- Previous Work --- p.7Chapter 1.4 --- Organization --- p.11Chapter 1.5 --- Publications --- p.12Chapter 2 --- Call Admission in Multirate Loss Networks --- p.13Chapter 2.1 --- Introduction --- p.13Chapter 2.2 --- Two Adaptive Routing Rules --- p.15Chapter 2.3 --- Call Admission Policies --- p.17Chapter 2.4 --- Analysis of Call Admission Policies --- p.25Chapter 2.4.1 --- "The CS, LO, GB and the EB Policies" --- p.25Chapter 2.4.2 --- The DP Policy --- p.29Chapter 2.5 --- Performance Comparisons --- p.32Chapter 2.6 --- Concluding Remarks --- p.35Chapter 3 --- Least Congestion Routing in Multirate Loss Networks --- p.41Chapter 3.1 --- Introduction --- p.41Chapter 3.2 --- The M2 and MTB Routings --- p.42Chapter 3.2.1 --- M2 Routing --- p.43Chapter 3.2.2 --- MTB Routing --- p.43Chapter 3.3 --- Bandwidth Sharing Policies and State Aggregation --- p.45Chapter 3.4 --- Analysis of M2 Routing --- p.47Chapter 3.5 --- Analysis of MTB Routing --- p.50Chapter 3.6 --- Numerical Results and Discussions --- p.53Chapter 3.7 --- Concluding Remarks --- p.56Chapter 4 --- The Least Congestion Routing in WDM Lightwave Networks --- p.60Chapter 4.1 --- Introduction --- p.60Chapter 4.2 --- Architecture and Some Design Issues --- p.62Chapter 4.3 --- The Routing Rule --- p.66Chapter 4.4 --- Analysis of the LC Routing Rule --- p.67Chapter 4.4.1 --- Fixed Point Model --- p.67Chapter 4.4.2 --- Without Direct-link Priority --- p.68Chapter 4.4.3 --- With Direct-link Priority --- p.72Chapter 4.5 --- Performance Comparisons --- p.73Chapter 4.6 --- Concluding Remarks --- p.75Chapter 5 --- Conclusions and Future Work --- p.79Chapter 5.1 --- Future Work --- p.8

    Analytic modelling and resource dimensioning of optical burst switched networks

    Get PDF
    The realisation of optical network architectures may hold the key to delivering the enormous bandwidth demands of next generation Internet applications and services. Optical Burst Switching (OBS) is a potentially cost-effective switching technique that can satisfy these demands by offering a high bit rate transport service that is bandwidth-efficient under dynamic Internet traffic loads. Although various aspects of OBS performance have been extensively investigated, there remains a need to systematically assess the cost/performance trade-offs involved in dimensioning OBS switch resources in a network. This goal is essential in enabling the future deployment of OBS but poses a significant challenge due to the complexity of obtaining tractable mathematical models applicable to OBS network optimisation. The overall aim of this thesis lies within this challenge. This thesis firstly develops a novel analytic performance model of an OBS node where burst contention is resolved by combined use of Tuneable Wavelength Converters (TWCs) and Fibre Delay Lines (FDLs) connected in an efficient share-per-node configuration. The model uses a two-moment traffic representation that gives a good trade-off between accuracy and complexity, and is suitable for extension to use in network modelling. The OBS node model is then used to derive an approximate analytic model of an OBS network of switches equipped with TWCs and FDLs, again maintaining a two-moment traffic model for each end-to-end traffic path in the network. This allows evaluation of link/route loss rates under different offered traffic characteristics, whereas most OBS network models assume only a single-moment traffic representation. In the last part of this thesis, resource dimensioning of OBS networks is performed by solving single and multi-objective optimisation problems based on the analytic network model. The optimisation objectives relate to equipment cost minimisation and throughput maximisation under end-to-end loss rate constraints. Due to non-convexity of the network performance constraint equations, a search heuristic approach has been taken using a constraint-handling genetic algorithm

    A study of teletraffic problems in multicast networks

    Get PDF
    This dissertation studies teletraffic engineering of dynamic multicast connections. The traditional models in teletraffic engineering do not handle multicast connections properly, since in a dynamic multicast tree, users may join and leave the connection freely, and thus the multicast tree evolves in time. A model called multicast loss system is used to calculate blocking probabilities in a single link and in tree-type networks. In a single link case, the problem is a generalised Engset problem, and a method for calculating call blocking probabilities for users is presented. Application of the reduced load approximation for multicast connections is studied. Blocking probabilities in a cellular system are studied by means of simulation. The analysis is mainly concentrated on tree type networks, where convolution-truncation algorithms and simulation methods for solving the blocking probabilities exactly are derived. Both single layer and hierarchically coded streams are treated. The presented algorithms reduce significantly the computational complexity of the problem, compared to direct calculation from the system state space. An approximative method is given for background traffic. The simulation method presented is an application of the Inverse Convolution Monte-Carlo method, and it gives a considerable variance reduction, and thus allows simulation with smaller sample sizes than with traditional simulation methods. Signalling load for dynamic multicast connections in a node depends on the shape of the tree as well as the location of the node in the tree. This dissertation presents a method for calculating the portion of signalling load that is caused by call establishments and tear-downs.reviewe

    MANETs: Internet Connectivity and Transport Protocols

    Get PDF
    A Mobile Ad hoc Network (MANET) is a collection of mobile nodes connected together over a wireless medium, which self-organize into an autonomous multi-hop wireless network. This kind of networks allows people and devices to seamlessly internetwork in areas with no pre-existing communication infrastructure, e.g., disaster recovery environments. Ad hoc networking is not a new concept, having been around in various forms for over 20 years. However, in the past only tactical networks followed the ad hoc networking paradigm. Recently, the introduction of new technologies such as IEEE 802.11, are moved the application field of MANETs to a more commercial field. These evolutions have been generating a renewed and growing interest in the research and development of MANETs. It is widely recognized that a prerequisite for the commercial penetration of the ad hoc networking technologies is the integration with existing wired/wireless infrastructure-based networks to provide an easy and transparent access to the Internet and its services. However, most of the existing solutions for enabling the interconnection between MANETs and the Internet are based on complex and inefficient mechanisms, as Mobile-IP and IP tunnelling. This thesis describes an alternative approach to build multi-hop and heterogeneous proactive ad hoc networks, which can be used as flexible and low-cost extensions of traditional wired LANs. The proposed architecture provides transparent global Internet connectivity and address autocofiguration capabilities to mobile nodes without requiring configuration changes in the pre-existing wired LAN, and relying on basic layer-2 functionalities. This thesis also includes an experimental evaluation of the proposed architecture and a comparison between this architecture with a well-known alternative NAT-based solution. The experimental outcomes confirm that the proposed technique ensures higher per-connection throughputs than the NAT-based solution. This thesis also examines the problems encountered by TCP over multi-hop ad hoc networks. Research on efficient transport protocols for ad hoc networks is one of the most active topics in the MANET community. Such a great interest is basically motivated by numerous observations showing that, in general, TCP is not able to efficiently deal with the unstable and very dynamic environment provided by multi-hop ad hoc networks. This is because some assumptions, in TCP design, are clearly inspired by the characteristics of wired networks dominant at the time when it was conceived. More specifically, TCP implicitly assumes that packet loss is almost always due to congestion phenomena causing buffer overflows at intermediate routers. Furthermore, it also assumes that nodes are static (i.e., they do not change their position over time). Unfortunately, these assumptions do not hold in MANETs, since in this kind of networks packet losses due to interference and link-layer contentions are largely predominant, and nodes may be mobile. The typical approach to solve these problems is patching TCP to fix its inefficiencies while preserving compatibility with the original protocol. This thesis explores a different approach. Specifically, this thesis presents a new transport protocol (TPA) designed from scratch, and address TCP interoperability at a late design stage. In this way, TPA can include all desired features in a neat and coherent way. This thesis also includes an experimental, as well as, a simulative evaluation of TPA, and a comparison between TCP and TPA performance (in terms of throughput, number of unnecessary transmissions and fairness). The presented analysis considers several of possible configurations of the protocols parameters, different routing protocols, and various networking scenarios. In all the cases taken into consideration TPA significantly outperforms TCP

    Performance of Computer Systems; Proceedings of the 4th International Symposium on Modelling and Performance Evaluation of Computer Systems, Vienna, Austria, February 6-8, 1979

    Get PDF
    These proceedings are a collection of contributions to computer system performance, selected by the usual refereeing process from papers submitted to the symposium, as well as a few invited papers representing significant novel contributions made during the last year. They represent the thrust and vitality of the subject as well as its capacity to identify important basic problems and major application areas. The main methodological problems appear in the underlying queueing theoretic aspects, in the deterministic analysis of waiting time phenomena, in workload characterization and representation, in the algorithmic aspects of model processing, and in the analysis of measurement data. Major areas for applications are computer architectures, data bases, computer networks, and capacity planning. The international importance of the area of computer system performance was well reflected at the symposium by participants from 19 countries. The mixture of participants was also evident in the institutions which they represented: 35% from universities, 25% from governmental research organizations, but also 30% from industry and 10% from non-research government bodies. This proves that the area is reaching a stage of maturity where it can contribute directly to progress in practical problems

    3D-in-2D Displays for ATC.

    Get PDF
    This paper reports on the efforts and accomplishments of the 3D-in-2D Displays for ATC project at the end of Year 1. We describe the invention of 10 novel 3D/2D visualisations that were mostly implemented in the Augmented Reality ARToolkit. These prototype implementations of visualisation and interaction elements can be viewed on the accompanying video. We have identified six candidate design concepts which we will further research and develop. These designs correspond with the early feasibility studies stage of maturity as defined by the NASA Technology Readiness Level framework. We developed the Combination Display Framework from a review of the literature, and used it for analysing display designs in terms of display technique used and how they are combined. The insights we gained from this framework then guided our inventions and the human-centered innovation process we use to iteratively invent. Our designs are based on an understanding of user work practices. We also developed a simple ATC simulator that we used for rapid experimentation and evaluation of design ideas. We expect that if this project continues, the effort in Year 2 and 3 will be focus on maturing the concepts and employment in a operational laboratory settings

    A Troublesome Commerce: The Interstate Slave Trade, 1808-1840.

    Get PDF
    The interstate slave trade grew from a haphazard and intermittent enterprise in the early years of the nineteenth century to a central aspect of southern society. With the decline of the international trade and the decline of white migration to the frontier, southerners turned to the trade to supply their labor needs. Farmers in the Chesapeake region increasingly sold their excess bondservants to slave traders. These speculators brought a measure of systemization and regularity to the trade. As they did so, however, a significant number of Upper South citizens questioned the trade\u27s efficacy. The wanton exploitation and naked cruelty of speculation caused many to wonder if the trade was worth the price. Evangelical Christians tended to abhor the interstate slave trade since it undermined the Biblical basis of the family and violated the idea of Christian stewardship. Citizens of the Lower South, on the other hand, were consistently worried that they imported the worst type of slaves, therefore increasing the risk of rebellion. The slave trade, in essence, caused southerners to question the justification for the peculiar institution. Speculators modified their practices to make slave trading more palatable to southern citizens. They promoted the idea that they bought slaves in family units, did not traffic in kidnapped slaves, and treated their purchases with a modicum of dignity. Traders separated themselves from the more objectionable portions of the trade by employing agents and actively promoting the idea that there were good and bad traders. At the same time speculators worked to rehabilitate their image, northern abolitionists became more strident in their attacks on slavery. One of their favorite targets was the slave trade. Southerners could hardly admit to the charges without creating the opportunity for further criticism of slavery. Their doubts about the trade\u27s efficacy disappeared as southerners began to blame abolitionists for slavery\u27s excesses while simultaneously believing in a negative stereotype of the slave trader. In this manner, southerners effectively disregarded the abolitionist attacks while fashioning a justification for slavery that relied on blaming slave trader for the worst abuses of the peculiar institution

    James Michael Curley Scrapbooks Volume 24

    Get PDF
    The James Michael Curley Scrapbook Collection consists of digitized microfilmed copies of notebooks kept by Curley from 1914-1937. These notebooks contain news clippings that were drawn primarily from Boston newspapers. Curley was born in Roxbury, MA in 1874. He served four terms as Mayor of Boston: 1914ā€“1918, 1922ā€“1926, 1930ā€“1934 and 1946ā€“1950. He also served as Governor of Massachusetts from 1935-1937. In addition to Curleyā€™s political career, the scrapbooks also include clippings about his first wife Mrs. Mary Herlihy Curley (1884-1930) and their daughter Mary D. Curley (1909-1950). A selection of the notebooks were microfilmed in 1962. The microfilm can be found in the holdings of Dinand Library, Holy Crossā€™s main library. This volume includes news clippings from 1930.https://crossworks.holycross.edu/curley_scrapbooks/1051/thumbnail.jp

    James Michael Curley Scrapbooks Volume 30

    Get PDF
    The James Michael Curley Scrapbook Collection consists of digitized microfilmed copies of notebooks kept by Curley from 1914-1937. These notebooks contain news clippings that were drawn primarily from Boston newspapers. Curley was born in Roxbury, MA in 1874. He served four terms as Mayor of Boston: 1914ā€“1918, 1922ā€“1926, 1930ā€“1934 and 1946ā€“1950. He also served as Governor of Massachusetts from 1935-1937. In addition to Curleyā€™s political career, the scrapbooks also include clippings about his first wife Mrs. Mary Herlihy Curley (1884-1930) and their daughter Mary D. Curley (1909-1950). A selection of the notebooks were microfilmed in 1962. The microfilm can be found in the holdings of Dinand Library, Holy Crossā€™s main library. This volume includes news clippings from 1930.https://crossworks.holycross.edu/curley_scrapbooks/1063/thumbnail.jp
    corecore