709 research outputs found

    Optimal mobility-aware admission control in content delivery networks

    Get PDF
    This paper addresses the problem of mobility management in Content Delivery Networks (CDN). We introduce a CDN architecture where admission control is performed at mobility aware access routers. We formulate a Markov Modulated Poisson Decision Process for access control that captures the bursty nature of data and packetized traffic together with the heterogeneity of multimedia services. The optimization of performance parameters, like the blocking probabilities and the overall utilization, is conducted and the structural properties of the optimal solutions are also studied. Heuristics are proposed to encompass the computational difficulties of the optimal solution when several classes of multimedia traffic are considered

    Performance Evaluation of Wireless Medium Access Control Protocols for Internet of Things

    Get PDF
    The Internet of Things makes the residents in Smart Cities enjoy a more efficient and high-quality lifestyle by wirelessly interconnecting the physical and visual world. However, the performance of wireless networks is challenged by the ever-growing wireless traffic data, the complexity of the network structures, and various requirements of Quality of Service (QoS), especially on the Internet of Vehicle and wireless sensor networks. Consequently, the IEEE 802.11p and 802.11ah standards were designed to support effective inter-vehicle communications and large-scale sensor networks, respectively. Although their Medium Access Control protocols have attracted much research interest, they have yet to fully consider the influences of channel errors and buffer sizes on the performance evaluation of these Medium Access Control (MAC) protocols. Therefore, this thesis first proposed a new analytical model based on a Markov chain and Queuing analysis to evaluate the performance of IEEE 802.11p under imperfect channels with both saturated and unsaturated traffic. All influential factors of the Enhanced Distributed Channel Access (EDCA) mechanism in IEEE 802.11p are considered, including the backoff counter freezing, Arbitration Inter-Frame Spacing (AIFS) defers, the internal collision, and finite MAC buffer sizes. Furthermore, this proposed model considers more common and actual conditions with the influence of channel errors and finite MAC buffer sizes. The effectiveness and accuracy of the developed model have been validated through extensive ns-3 simulation experiments. Second, this thesis proposes a developed analytical model based on Advanced Queuing Analysis and the Gilbert-Elliot model to analyse the performance of IEEE 802.11p with burst error transmissions. This proposed analytical model simultaneously describes transmission queues for all four Access Categories (AC) queues with the influence of burst errors. Similarly, this presented model can analyse QoS performance, including throughputs and end-to-end delays with the unsaturated or saturated load traffics. Furthermore, this model operates under more actual bursty error channels in vehicular environments. In addition, a series of simulation experiments with a natural urban environment is designed to validate the efficiency and accuracy of the presented model. The simulation results reflect the reliability and effectiveness of the presented model in terms of throughput and end-to-end delays under various channel conditions. Third, this thesis designed and implemented a simulation experiment to analyse the performance of IEEE 802.11ah. These simulation experiments are based on ns-3 and an extension. These simulation experiments' results indicate the Restricted Access Window (RAW) mechanism's influence on the throughputs, end-to-end delays, and packet loss rates. Furthermore, the influences of channel errors and bursty errors are considered in the simulations. The results also show the strong impact of channel errors on the performance of IEEE 802.11ah due to urban environments. Finally, the potential future work based on the proposed models and simulations is analysed in this thesis. The proposed models of IEEE 802.11p can be an excellent fundamental to optimise the QoS due to the precise evaluation of the influence of factors on the performance of IEEE 802.11p. Moreover, it is possible to migrate the analytical models of IEEE 802.11p to evaluate the performance of IEEE 802.11ah

    Stochastic performance analysis of Network Function Virtualisation in future internet

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this recordIEEE Network Function Virtualisation (NFV) has been considered as a promising technology for future Internet to increase network flexibility, accelerate service innovation and reduce the Capital Expenditures (CAPEX) and Operational Expenditures (OPEX) costs, through migrating network functions from dedicated network devices to commodity hardware. Recent studies reveal that although this migration of network function brings the network operation unprecedented flexibility and controllability, NFV-based architecture suffers from serious performance degradation compared with traditional service provisioning on dedicated devices. In order to achieve a comprehensive understanding of the service provisioning capability of NFV, this paper proposes a novel analytical model based on Stochastic Network Calculus (SNC) to quantitatively investigate the end-to-end performance bound of NFV networks. To capture the dynamic and on-demand NFV features, both the non-bursty traffic, e.g. Poisson process, and the bursty traffic, e.g. Markov Modulated Poisson Process (MMPP), are jointly considered in the developed model to characterise the arriving traffic. To address the challenges of resource competition and end-to-end NFV chaining, the property of convolution associativity and leftover service technologies of SNC are exploited to calculate the available resources of Virtual Network Function (VNF) nodes in the presence of multiple competing traffic, and transfer the complex NFV chain into an equivalent system for performance derivation and analysis. Both the numerical analysis and extensive simulation experiments are conducted to validate the accuracy of the proposed analytical model. Results demonstrate that the analytical performance metrics match well with those obtained from the simulation experiments and numerical analysis. In addition, the developed model is used as a practical and cost-effective tool to investigate the strategies of the service chain design and resource allocations in NFV networks.Engineering and Physical Sciences Research Council (EPSRC

    A IEEE 802.11e HCCA Scheduler with a Reclaiming Mechanism for Multimedia Applications

    Get PDF
    The QoS offered by the IEEE 802.11e reference scheduler is satisfactory in the case of Constant Bit Rate traffic streams, but not yet in the case of Variable Bit Rate traffic streams, whose variations stress its scheduling behavior. Despite the numerous proposed alternative schedulers with QoS, multimedia applications are looking for refined methods suitable to ensure service differentiation and dynamic update of protocol parameters. In this paper a scheduling algorithm,Unused Time Shifting Scheduler(UTSS), is deeply analyzed. It is designed to cooperate with a HCCA centralized real-time scheduler through the integration of a bandwidth reclaiming scheme, suitable to recover nonexhausted transmission time and assign that to the next polled stations. UTSS dynamically computes with anO(1)complexity transmission time providing an instantaneous resource overprovisioning. The theoretical analysis and the simulation results highlight that this injection of resources does not affect the admission control nor the centralized scheduler but is suitable to improve the performance of the centralized scheduler in terms of mean access delay, transmission queues length, bursts of traffic management, and packets drop rate. These positive effects are more relevant for highly variable bit rate traffic

    Promoting Quality of Service in Substitution Networks with Controlled Mobility

    Get PDF
    International audienceA substitution network is a rapidly deployable backup wire- less solution to quickly react to network topology changes due to failures or to ash crowd e ects on the base network. Unlike other ad hoc and mesh solutions, a substitution network does not attempt to provide new services to customers but rather to restore and maintain at least some of the services available before the failure. Furthermore, a substitution net- work is not deployed directly for customers but to help the base network provide services to the customers. Therefore, a substitution network is not, by de nition, a stand-alone network. In this paper, we describe the quality of service architecture for substitution networks and discuss pro- visioning, maintenance, and adaptation of QoS inside and between the base network and the substitution network
    • …
    corecore