1,210 research outputs found

    Power consumption modeling in optical multilayer networks

    Get PDF
    The evaluation of and reduction in energy consumption of backbone telecommunication networks has been a popular subject of academic research for the last decade. A critical parameter in these studies is the power consumption of the individual network devices. It appears that across different studies, a wide range of power values for similar equipment is used. This is a result of the scattered and limited availability of power values for optical multilayer network equipment. We propose reference power consumption values for Internet protocol/multiprotocol label switching, Ethernet, optical transport networking and wavelength division multiplexing equipment. In addition we present a simplified analytical power consumption model that can be used for large networks where simulation is computationally expensive or unfeasible. For illustration and evaluation purpose, we apply both calculation approaches to a case study, which includes an optical bypass scenario. Our results show that the analytical model approximates the simulation result to over 90% or higher and that optical bypass potentially can save up to 50% of power over a non-bypass scenario

    Evaluating the energy consumption and the energy savings potential in ICT backbone networks

    Get PDF

    A quantitative survey of the power saving potential in IP-Over-WDM backbone networks

    Get PDF
    The power consumption in Information and Communication Technologies networks is growing year by year; this growth presents challenges from technical, economic, and environmental points of view. This has lead to a great number of research publications on "green" telecommunication networks. In response, a number of survey works have appeared as well. However, with respect to backbone networks, most survey works: 1) do not allow for an easy cross validation of the savings reported in the various works and 2) nor do they provide a clear overview of the individual and combined power saving potentials. Therefore, in this paper, we survey the reported saving potential in IP-over-WDM backbone telecommunication networks across the existing body of research in that area. We do this by mapping more than ten different approaches to a concise analytical model, which allows us to estimate the combined power reduction potential. Our estimates indicate that the power reduction potential of the once-only approaches is 2.3x in a Moderate Effort scenario and 31x in a Best Effort scenario. Factoring in the historic and projected yearly efficiency improvements ("Moore's law") roughly doubles both values on a ten-year horizon. The large difference between the outcome of Moderate Effort and Best Effort scenarios is explained by the disparity and lack of clarity of the reported saving results and by our (partly) subjective assessment of the feasibility of the proposed approaches. The Moderate Effort scenario will not be sufficient to counter the projected traffic growth, although the Best Effort scenario indicates that sufficient potential is likely available. The largest isolated power reduction potential is available in improving the power associated with cooling and power provisioning and applying sleep modes to overdimensioned equipment

    Future strategic plan analysis for integrating distributed renewable generation to smart grid through wireless sensor network: Malaysia prospect

    Get PDF
    AbstractIntegration of Distributed Renewable Generation (DRG) to the future Smart Grid (SG) is one of the important considerations that is highly prioritized in the SG development roadmap by most of the countries including Malaysia. The plausible way of this integration is the enhancement of information and bidirectional communication infrastructure for energy monitoring and controlling facilities. However, urgency of data delivery through maintaining critical time condition is not crucial in these facilities. In this paper, we have surveyed state-of-the-art protocols for different Wireless Sensor Networks (WSNs) with the aim of realizing communication infrastructure for DRG in Malaysia. Based on the analytical results from surveys, data communication for DRG should be efficient, flexible, reliable, cost effective, and secured. To meet this achievement, IEEE802.15.4 supported ZigBee PRO protocol together with sensors and embedded system is shown as Wireless Sensor (WS) for DRG bidirectional network with prospect of attaining data monitoring facilities. The prospect towards utilizing ZigBee PRO protocol can be a cost effective option for full integration of intelligent DRG and small scale Building-Integrated Photovoltaic (BIPV)/Feed-in-Tariff (FiT) under SG roadmap (Phase4: 2016–2017) conducted by Malaysia national utility company, Tenaga Nasional Berhad (TNB). Moreover, we have provided a direction to utilize the effectiveness of ZigBee-WS network with the existing optical communication backbone for data importing from the end DRG site to the TNB control center. A comparative study is carried out among developing countries on recent trends of SG progress which reveals that some common projects like smart metering and DRG integration are on priority

    An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks

    Get PDF
    Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices. Indeed,the introduction of security techniques such as authentication and encryption, to ensure confidentiality and integrity of data, can place higher energy load on the sensors. However, the absence of security protection c ould give room for energy drain attacks such as denial of sleep attacks which have a higher negative impact on the life span ( of the sensors than the presence of security features. This thesis, therefore, focuses on tackling denial of sleep attacks from two perspectives A security perspective and an energy efficiency perspective. The security perspective involves evaluating and ranking a number of security based techniques to curbing denial of sleep attacks. The energy efficiency perspective, on the other hand, involves exploring duty cycling and simulating three Media Access Control ( protocols Sensor MAC, Timeout MAC andTunableMAC under different network sizes and measuring different parameters such as the Received Signal Strength RSSI) and Link Quality Indicator ( Transmit power, throughput and energy efficiency Duty cycling happens to be one of the major techniques for conserving energy in wireless sensor networks and this research aims to answer questions with regards to the effect of duty cycles on the energy efficiency as well as the throughput of three duty cycle protocols Sensor MAC ( Timeout MAC ( and TunableMAC in addition to creating a novel MAC protocol that is also more resilient to denial of sleep a ttacks than existing protocols. The main contributions to knowledge from this thesis are the developed framework used for evaluation of existing denial of sleep attack solutions and the algorithms which fuel the other contribution to knowledge a newly developed protocol tested on the Castalia Simulator on the OMNET++ platform. The new protocol has been compared with existing protocols and has been found to have significant improvement in energy efficiency and also better resilience to denial of sleep at tacks Part of this research has been published Two conference publications in IEEE Explore and one workshop paper

    A framework for Deterministic Delay Guarantee in OBS Networks

    Get PDF
    In OBS networks, the delay of control packets in the switch control unit (SCU) of core nodes influences burst loss performance in the optical switching and should be constrained. Furthermore, the end-to-end (E2E) delay requirements of premium services need queueing delay guarantee in network nodes throughout the transmission path. For this purpose, a framework for deterministic delay guarantee is proposed in this article. It incorporates the deterministic delay model in the ingress edge node as well as in the SCUs of core nodes. On this basis, the configuration of the assembler and the offset time is addressed by means of an optimization problem under the delay constraints. Scenario studies are carried out with reference to realistic transport network topologies. Compared to statistical delay models in the literature, the deterministic model has advantages in rendering robust absolute delay guarantee for individual FEC flows, which is especially appreciated in the provisioning of premium services. By performance evaluation in comparison with the statistical models, it is shown that the adopted deterministic delay models lead to practical delay bounds in a magnitude that is close to the delay estimations by stochastic analysis
    • …
    corecore