Performance vs. Security Trade-Offs in RANETs based on Hybrid Quantitative Network Models

Size: px
Start display at page:

Download "Performance vs. Security Trade-Offs in RANETs based on Hybrid Quantitative Network Models"

Transcription

1 HET-NETs 2013 Conference Performance vs. Security Trade-Offs in RANETs based on Hybrid Quantitative Network Models Guzlan M.A. Miskeen 1,2, Demetres D. Kouvatsos 2 and Esmaeil Habibzadeh 2,3 1 University of Sebha, Libya 2 University of Bradford, England 3 IUST - Iran University of Science and Technology {G.M.A.Miskeem, D.Kouvatos, E.habibzadeh}@brad.ac.uk 12 th of Nov T03-1

2 Outline Performance and Security Tradeoffs Concepts Security and Tradeoffs Modeling Tools Robotic Ad Hoc Networks (RANETs): Related Concepts Trade-off Modeling in Literature The Proposed Hybrid Framework Simulation Experiments Final Remarks & Conclusions Extensions for Futurework T03-2

3 Performance and Security Tradeoffs Concepts Performance is the degree to which a system accomplishes its designated functions within given constraints, such as speed, accuracy, or memory usage. [IEEE ] Security service is the collection of mechanisms implemented to reduce the risk associated with threats of stored & exchanged data in communication networks. Performance and Security Trade-off Either security is compromised for better overall performance or vice versa & it can be quantified and evaluated using quantitative tools such as QNs and GSPNs thus leading to the trade-off optimisation. T03-3

4 Performance and Security Tradeoffs Concepts The performance-related security can be modelled and evaluated, considering : 1- Modelling performance and security accurately using effective quantitative modelling tools (e.g., QNs and GSPNs which have various features in terms of simplicity and modelling power); 2- Defining /introducing suitable metrics for both performance and security as well as appropriate combined metrics [WOL10]. Security Metrics Since security can be seen as a process, security metrics can be expressed as: 1. Time of security failure occurrence/time between security failures; 2. Probability of being in a certain condition, e.g., probability of the encryption key to be valid. For MANETs, encryption key length (and the corresponding encryption time) can be seen as a metric. T03-4

5 Trade-off Evaluation Under Bursty Traffic Condition When the security mechanism is activated, how to quantify the corresponding degradation of performance under bursty traffic conditions? Traffic burstiness can be captured using Generalised Exponential (GE) distribution, which can give the upper performance bounds. GE distribution is expressed with [KOU88]: λ & C 2 F(t) = P(W t)= 1-a e -aλt, t 0 a = C 2 = Var W E 2 W When C 2 =1, GE r.v. exponential r.v GE can be seen as a limiting case of H2, with tuning parameter k with the same λ & C 2 [KOU88]; When: k +, H 2 GE. 2 C 2 +1, α 1 (k) α 2 (k) 1-a = C2 1 C 2 +1 a= 2 C 2 +1 a λ = υ 1 (k) υ 2 (k) (a) k + 2 λ C 2 +1 aυ (b) T03-5

6 QNs QNs are concise graphical description of service centres, queues and their disciplines and routing amongst these nodes; Used Scheduling strategies such as First-Come-First-Served (FCFS) and Head-of-the- Line (HoL) priority rules with either infinite or finite capacity queues Key QNs Advantages & Limitations Advantages Powerful for modelling hardware contention and scheduling strategies; Robust exact / approximate algorithms for calculating performance measures for multiple class QNs with or without blocking. Limitations Not suitable, in general, for modelling synchronization, simultaneous resource possession, security control and software contention; T03-6

7 GSPNs They are credible modelling tools for the qualitative/quantitative analysis of complex system involving software contention, blocking and synchronisation. A PN is composed of two types of nodes: Places, p and transitions, t: A place: accommodates customers called tokens which defines GSPN state; A transition: represent event that changes the system s state; Arcs: are the links between places and transitions. Operation Rules Input place p 1 Output place p 2 Token Transition t 1 Firing Fig. A SPN Components Key GSPNs Advantages & Limitations Advantages Have great descriptive power Allow easy modelling of blocking, synchronization, simultaneous resource possession, security control and software contention. Fig. B SPN Enabling and firing Limitations The solution of GSPNs for large systems, is computationally very expensive due to exponentially growth of the state space. T03-7

8 RANETs: Related Concepts RANETs is an infrastructure-less networks at which MANETs is used as underlying technology; Robots can be tele-operated (controlled by a human being) or autonomous (work without human interaction); Robots among the RANET might be heterogeneous in terms of sensory skills, mobility and robot s architecture. The main five components of any robot are: Controller, Sensing Unit, Power Unit, Transmission Unit, Actuators. RANETs Encryption Protocols: provide confidentiality (via encryption) and/ or integrity to the exchanged data; however, they add extra bits which require more processing time! T03-8

9 The Main Concept QNs & GSPNs Models An Appropriate (detailed) Network Model A Proper Bursty Traffic Flow Model GE Distribution Suitable performance and Security metrics Performance & Security Metrics DES (Hybrid Petri Queuing Networks Simulator (HPQNS) Quantitative Methodology of Performance Degradation and Associated Trade-offf in RANETs Under Bursty Traffic Conditions T03-9

10 Previous studies Security & Mobility Modelling Modelling Approach Explicit modelling of Security (Security processing delay) in MANETs by QNs [Saleh05] λ Processing Server S 1 S 2 Security Server Application Context & Modelling Level A MANET s node runs WEP encryption protocol (Node-level) security and forwarding service times are modelled explicitly by Hypo2 in the queueing model. Performance and/or Security Metrics Performance Metrics: mean throughput & packet loss M/Hypo2/1 Total Service Time Mobility Modelling in MANETs by G-QNs [Bhatia07]. λ, C a 2 β On Off α GI/G/1 (G-Queues) indicates node s mobility subject to IPP with α & β transition rates( the model is made at Network-level ) Performance Metric: mean marginal endto-end delay. T03-10

11 Previous studies Performance & Security Trade-off Modelling Tools Modelling Approach Wolter s model [Wolter10] GSPN to trade-off between the system throughput and the system being secure. It provides Explicitly Detailed- Modelling of Security Processing & Control. Szczerbicka s Model [Szczerbicka92] (modelling Performability (i.e., the ability of a system to perform). The Concept of Combined QNs and GSPNs has been introduced by Balbo [Balbo88]. Modelling Level & Application Context Combined GSPN performance-security model (at Node-level) for an abstract communication system to evaluate & simultaneously optimise performance and security trade-off using CPSMs [Wolter10]. Trade-off between performance & Reliability for a communication channel at (Network-Level). Features of combining QNs and GSPNs This combination was introduced to overcome the limitations in modelling power of QN and the state space explosion in GSPNs when modelling large systems). Combining & exploiting the best features of both QNs and GSPNs to provide an effective. In the context of DES, adopting combined QNs & GSPNs will help in reducing the time required to update transitions status after each firing event in a pure GSPN model. Performance and/or Security Metrics Performance Metric: Throughput. Security Metrics: Probability of system being secure, unsecure, or recovering. Analysis Approach: Free Simulation Package Limitations: Traffic burstiness was not included. Security sub-model can be extended further. Combining QNs and GSPNs Performance Metric: ratio between mean throughput of correctly transmitted jobs and the throughput of all transmitted jobs. Analysis Approach: mathematical model based on GSPN Limitations: Traffic burstiness was not included. Customised model. T03-11

12 Employing the Quantitative Methodology in (RANETs) Proposed Models, Application Context, Adopted Modelling Approach & Evaluation Tool) WEP & SS (Security processing is Explicitly Modelled by G-QNs [KOU12] λ, C a 2 β On Off α p 1-p µ 1, C s 2 µ 2, C s 2 WEP Processing Transmission The Proposed Hybrid G-GSPNs & QNs Framework (Explicit & Detailed-Modelling of Security processing and Control, mobility, Power consumption & intra/inter-robot communications) with associated two Extended CPSMs). Modelling Level & Performance and/or Security Metrics Network-Level Incoming traffic is lost when the gate is Off, i.e., the node is disconnected from the network. Performance Metric: mean marginal end-to-end delay. Security Metrics: N/A Limitation: Security processing delay in WEP node was only parameterised through the mean rate and SCV (due to the limited modelling power of QNs thus security control was not explicitly reflected!) This was the motivation to propose framework in which by replacing QN security node is replaced by detailed GSPN one). Network-Level Extended CPSM ( based on CPSM proposed by Wolter) GSPNs QN T03-12

13 The Proposed Hybrid QNs and GSPNs Framework Hybrid Node # 1 GSPN QN Hybrid Node # 3 Hybrid Node # 4 It models, at node-level, for each node Hybrid Node #2 GSPN QN GSPN QN by explicitly modelling: security GSPN QN processing and control with mobility,power consumption using GSPN; QNs reflect intra -robot (component- Security Model Hybrid Performance Model to-component) communication & inter -robot transmissions. The main feature is to model more effectively the performance & security behaviour of RANET node & subject GSPN Arrivals_1 Arrivals_2 Reconnect Off Security Processing Disconnect Encrypt co Arrivals_3 Intra Robot Component to Component Communication QN HoL Discarded traffic Inter Robot-to-Robot Transmission QN_Dep_1 QN_Dep_2 to other robots extended CPSMs. On Life-time L Reduce Power Mobility and Traffic Model Recharge N Extend life-time (via recharging) The Hybrid G-GSPN-QN T03-13

14 Case Study Control data directly from tele-operator (through GSPN) Control data forwarded by other nodes (through GSPN) Arrivals_3 Video data from robot s camera FCFS GSPN_Dep_1 GSPN_Dep_2 Sensor (camera) HoL Controller Intracommunications Inter-robot Transmission communications FCFS Unit QN_Dep_1 FCFS Actuator Sending back the video data to tele-operator via to other relay nodes Robot s Mechanical response to the control data (moving to a new position) QN model for intra and inter robot communications Communication between the robot and tele-operator can be directly or via intermediate mobile nodes; Video transmission can be delayed due to the transmission media and encryption protocol s computations which might prevent the Timely control of the robot; Therefore, investigating a balanced trade-off in will reduce transmission delay while preserves reasonable security level and video quality. T03-14

15 Extended CPSMs Selected performance metrics, which are compatible in scale of magnitude e.g., Utilisation U and PLP are used to resolve the issue in Wolter s CPSM to facilitate investigating and optimising RANET s performance vs. security trade-offs. Definition of the Extended CPSMs These CPSMs are defined in terms of the model in the Figure, as following: 1. CPSM1 = U + P(Valid Encryption Key) Arrivals Encryption Encrypt Send Valid Encryption key Rekey Fail 2. CPSM2= PLP in encryption place +P(Undetected Broken Key). Detected broken key Detect Undetecte d broken key T03-15

16 Discrete Event Simulation (DES) DES, implemented in java, has been used for its flexibility, simplicity & ability to analyse complex systems since it overcomes queueing theory s limitation and it model reality in greater detail; A system s model can be constructed and the required measurements are calculated over time to obtain performance metrics of interest; DES is used to generate GE random variable as well as simulating QNs and GSPNs. Hybrid Petri Queuing Networks Simulator (HPQNS) has been developed to evaluate the trade-off in RANETs T03-16

17 Input parameters of hybrid QN and GSPSN Parameter Value Arrivals Encrypt Fail (time to key breaking) Undetected Broken key Rekey Send 8 messages per sec 0.01 to 0.34 step 0.01 sec 1.25, 25, 50, 100, 600 to step 500 sec 12 sec SCV of inter-arrival times 1, 50, 100 Capacity of Encryption place and Send queue buffer 36 sec 10 messages per sec 100 T03-17

18 Results CPSM1 and Corresponding Components CPSM2 and Corresponding Components PLP P(Undetected Broken Key) CPSM Utilisation (QN) P(Valid Encryption Key) CPSM Encryption Time (sec) CPSM1 = Utilisation + P(Valid Encryption Key) Encryption Time (sec) CPSM2 = PLP in encryption place +P(Undetected Broken Key) T03-18

19 SCV Impact on CPSM1 SCV Impact on CPSM2 Maximum Utilisation & Security for SCV= Minimum PLP & Key Breaking for SCV=1 CPSM2-SCV-1 CPSM2-SCV-50 CPSM2-SCV Maximum Utilisation & Security for SCV=100 CPSM-SCV-1 CPSM-SCV-50 CPSM-SCV Minimum PLP & Key Breaking for SCV= Encryption Time (sec) Encryption Time (sec) SCV Max- CMPS1 Optimised Encryption Time (sec) SCV Min- CMPS2 Optimised Encryption Time (sec) T03-19

20 Final Remarks & Conclusions This study contributes in quantifying and predicting performance degradation at node level- in RANETs caused due to volume incoming traffic in conjunction with security computations by the use of GE and exploiting the Extended CPSMs to facilitate investigating and optimising the trade-offs; The proposed framework reflects the behaviour of security mechanisms as well as intra-and inter- robot communications which enables capturing the robot s heterogeneity (in terms of the robot architecture and application); The impact of increasing the burstiness of input traffic increases the encryption time required for simultaneous optimisation of (Extended CPSM). performance and security T03-20

21 Future work: The Extended Model Arrivals GSPN encrypt Re-encrypt Request Three scenarios are considered, to include the protection (or reduction) of information leakage when the system is non-secure: (1) system becomes unsecure by a real attack; (2) system erroneously considered under attack (false positive); (3) system being under unrecognised attack (false negative). More advanced security protocols can be investigated utilising the proposed hybrid framework. Re-encrypt Request* Temp Pass Recover Restoring QN All messages are transmitted by QN after being (or seems to be) successfully encrypted. Secure Detect Fail1 Insecure Detect* Fail2 Recover by Default Mis-function Insecure* Unrecognized Attack Net-CPSM1&Net-CPSM2(at network- level) of N hybrid nodes can be expressed as: Net_CPSM1= U i N i=1 + N N i=1 P i((system in secure state) N Net_CPSM2= N PLP i i=1 + N N i=1 P i (system in detected broken key) N Furthermore, Aggregate CPSMs & Marginal CPSMs for R arrival classes in the hybrid network can be determined in a similar way. T03-21

22 The conversion from a security state to another is caused by enabling and firing the following transitions: Transitions Pass: messages are passed to QN after being encrypted using a valid key. Detect*: The system recover from non- real attack. Fail1: the system fails by a real attack. Recover: The system recover from non- real attack. Detect: when the integrity check discovers that the encryption key is compromised, it will inform/ alarm the system. Re-encrypt Request *:Any messages is suspected to be encrypted with invalid key (but in reality it is valid, i.e. false positive detection) has to be re-encrypted. Recover: the system recover from a real attack by performing the rekeying process. Mis-function: the possibility of the system being secure whilst it is under a real attack ( so fail3 leads to unrecognized attack state) Re-encrypt Request: Fail2: The Any encrypted system fails by messages with invalid a non- real key has to be reencrypted. attack Recover by Default*: the system recovers from non- real attack, by performing rekeying process after a particular number of messages (or given period of time). Places ( representing the security status of the model) Secure: A system is secure (encrypted messages are allowed to pass to the QN to be transmitted). Temp: Temporary buffer in which all encrypted messages are further checked whether they have been encrypted by a valid key or not. Insecure: the system becomes non-secure by a real attack (compromised key) Insecure*: The system is secure but is considered non-secure due to error occurrence (false positive) (inability to detect a broken key). Unrecognized Attack: The system is non- secure but was considered secure by error (false negative), i.e., inability to detect the key is compromised T03-22

23 Key References G. Balbo, S. C. Bruell, and S. Ghanta, "Combining queueing networks and generalized stochastic petri nets for the solution of complex models of system behavior," IEEE Trans. on Computers, vol. 37, no. 10, pp , H. Bhatia, R. Lening, S. Srivastava, and V. Sunitha, "Application of QNA to analyze the queueing network mobility model of MANET," Technical Report, Dhirubhai AmbaniI institute of Information & Communication Technology (DAIICT), Gandhinagar, India, D. D. Kouvatsos, "A maximum entropy analysis of the G/G/1 queue at equilibrium," The Journal of the Operational Research Society, vol. 39, no. 2, pp , D. D. Kouvatsos, "Entropy maximisation and queueing network models," Annals of Operations Research, vol. 48, no. 1, pp , M. Saleh and I. Al Khatib, "Performance of secure ad hoc sensor networks utilizing IEEE b WEP," in Proc. of Systems Communications, Montreal, Que., Canada, 2005, pp H. Szczerbicka, "A combined queueing network and stochastic Petri net approach for evaluating the performability of fault-tolerant computer systems," Performance Evaluation, vol. 14, pp , H. Szczerbicka and P. Ziegler, "Simulation with active objects: an approach to combined modelling," Simulation Practice and Theory, vol. 1, no. 6, pp , K. Wolter and P. Reinecke "Performance and security trade-off," in Formal Methods for Quantitative Aspects of Programming Languages, Computer science Lecture Notes, vol. 6154, A. Aldini, M. Bernardo, A. Di Pierro, and H. Wiklicky, Eds. Berlin, Heidelberg: Springer 2010, pp T03-23

24 Acronyms CDF Cumulative Distribution Function CPSM Combined Performance and Security Measure DES Discrete-Event Simulation FCFS First-Come-First-Served G-QNs Gated QNs G- Queue Gated-Queue G-GSPN_QN Gated-Generalised Stochastic Petri Nets_ QNs GE Generalised Exponential GSPNs Generalised Stochastic Petri Nets HoL Head-of-the-Line IPP Interrupted Poisson Process MANETs Mobile Ad Hoc Networks MTTF Mean Time To Security Failure PDF Probability Density Function PNs Petri Nets PLP Packet Loss Probability PFQN Product-Form Queueing Networks RANETs Robotic Ad Hoc Networks QNs Queueing Networks QoS Quality-of-Service SCV Squared Coefficient of Variation SPNs Stochastic Petri Nets SS Selective Security WEP Wired Equivalent Privacy T03-24

25 T03-25

26 Wolter s GSPN Model It provides Explicitly Detailed-Modelling of Security Processing & Control by GSPNs. Combined GSPN performance-security model for an abstract communication system to evaluate & simultaneously optimise the trade-off between performance & security using CPSMs. Send Transition Throughput Probability of the system being secure CSPM Throughput of the transition Send + Probability of system to be secure state. Generate Queueing Encrypt Processing Send 1.5 Secure Recover Fail 1 N Insecure Performance Model Finite Capacity Restoring Security Model Fig. A GSPN for RANETs [WOL10] Detect 0.5 CPSM=Throughput+P(Secure) Throughput P(Secure) Encryption Time (sec) Fig. B CPSM proposed by Wolter [WOL10] This model investigates how to choose an appropriate encryption key length in terms of its corresponding encryption time ( the longer the key size the longer the encryption time!). Remarks: Throughput is very large compared with probability values! which dominates the overall value of the CPSM). T03-26

27 Szczerbicka s Combined QN and GSPN Model Trade-off model between performance &Reliability for a data processing system transmits jobs to a remote facility via a transmission channel that is broken and corrected and thus number of jobs are re-transmitted. The higher channel s failure rates the lower the system s throughput: (i.e., too many jobs to reprocess by the limited capacity system! jobs entering CPU to be served again channel is correct Sending rate send CPU Channel breaking rate Rate of correction Rate of channel Perturbations pert Data processing system with 2 local I/O facilities QN Local I/O channel is broken The state of transmission channel (broken or corrected) jobs that complete service by CPU GSPN- overall model Fig. The Combined QN and GSPN proposed by zczerbicka s T03-27

Performance Modelling and Evaluation

Performance Modelling and Evaluation ETSI Workshop on Networked Mobile Wireless Robotics Performance Modelling and Evaluation of RANETs Demetres D. Kouvatsos NetPEn Networks and Performance Engineering Research Group, Informatics Research

More information

Application of QNA to analyze the Queueing Network Mobility Model of MANET

Application of QNA to analyze the Queueing Network Mobility Model of MANET 1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:

More information

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection A Quality of Service Decision for ATM-LAN/MAN Interconnection N. Davies, P. Francis-Cobley Department of Computer Science, University of Bristol Introduction With ATM networks now coming of age, there

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM Janetta Culita, Simona Caramihai, Calin Munteanu Politehnica University of Bucharest Dept. of Automatic Control and Computer Science E-mail: jculita@yahoo.com,

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications.

Petri Nets ~------~ R-ES-O---N-A-N-C-E-I--se-p-te-m--be-r Applications. Petri Nets 2. Applications Y Narahari Y Narahari is currently an Associate Professor of Computer Science and Automation at the Indian Institute of Science, Bangalore. His research interests are broadly

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation International Journal of Materials & Structural Reliability Vol.4, No.1, March 2006, 65-77 International Journal of Materials & Structural Reliability Stochastic Petri Nets Supporting Dynamic Reliability

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes

A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes D.D. Kouvatsos, K. Al-Begain, and I. Awan Department of Computing, School of Informatics, University of Bradford BD7 1DP, Bradford,

More information

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service) 2. LITERATURE REVIEW I have surveyed many of the papers for the current work carried out by most of the researchers. The abstract, methodology, parameters focused for performance evaluation of Ad-hoc routing

More information

Improving Congestion Control in Data Communication Network Using Queuing Theory Model.

Improving Congestion Control in Data Communication Network Using Queuing Theory Model. IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 2 Ver. I (Mar. Apr. 2016), PP 49-53 www.iosrjournals.org Improving Congestion Control

More information

QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation

QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation QoS-aware resource allocation and load-balancing in enterprise Grids using online simulation * Universität Karlsruhe (TH) Technical University of Catalonia (UPC) Barcelona Supercomputing Center (BSC) Samuel

More information

Resource Sharing for QoS in Agile All Photonic Networks

Resource Sharing for QoS in Agile All Photonic Networks Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

Fluid models for evaluating threshold-based control policies for survivability of a distributed network

Fluid models for evaluating threshold-based control policies for survivability of a distributed network Fluid models for evaluating threshold-based control policies for survivability of a distributed network Vineet Aggarwal ICF Consulting 9 Lee Highway, Fairfax, VA Nataraan Gautam Marcus Department of Industrial

More information

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University

More information

Efficient Power Management in Wireless Communication

Efficient Power Management in Wireless Communication Efficient Power Management in Wireless Communication R.Saranya 1, Mrs.J.Meena 2 M.E student,, Department of ECE, P.S.R.College of Engineering, sivakasi, Tamilnadu, India 1 Assistant professor, Department

More information

Integration of analytic model and simulation model for analysis on system survivability

Integration of analytic model and simulation model for analysis on system survivability 6 Integration of analytic model and simulation model for analysis on system survivability Jang Se Lee Department of Computer Engineering, Korea Maritime and Ocean University, Busan, Korea Summary The objective

More information

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks

Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu

More information

An Efficient Queuing Model for Resource Sharing in Cloud Computing

An Efficient Queuing Model for Resource Sharing in Cloud Computing The International Journal Of Engineering And Science (IJES) Volume 3 Issue 10 Pages 36-43 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 An Efficient Queuing Model for Resource Sharing in Cloud Computing

More information

Application-Oriented Multimedia Streaming over Wireless Multihop Networks

Application-Oriented Multimedia Streaming over Wireless Multihop Networks Application-Oriented Multimedia Streaming over Wireless Multihop Networks Luan, Hao (Tom) BBCR Lab, ECE Department University of Waterloo May 11, 2009 1 / 21 Multimedia Streaming Display of audio-visual

More information

Analytic Performance Models for Bounded Queueing Systems

Analytic Performance Models for Bounded Queueing Systems Analytic Performance Models for Bounded Queueing Systems Praveen Krishnamurthy Roger D. Chamberlain Praveen Krishnamurthy and Roger D. Chamberlain, Analytic Performance Models for Bounded Queueing Systems,

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Scaling Internet Routers Using Optics Producing a 100TB/s Router. Ashley Green and Brad Rosen February 16, 2004

Scaling Internet Routers Using Optics Producing a 100TB/s Router. Ashley Green and Brad Rosen February 16, 2004 Scaling Internet Routers Using Optics Producing a 100TB/s Router Ashley Green and Brad Rosen February 16, 2004 Presentation Outline Motivation Avi s Black Box Black Box: Load Balance Switch Conclusion

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Modeling Improved Low Latency Queueing Scheduling Scheme for Mobile Ad Hoc Networks

Modeling Improved Low Latency Queueing Scheduling Scheme for Mobile Ad Hoc Networks American Journal of Computer Science and Engineering Survey = = Research Article Modeling Improved Low Latency Queueing Scheduling Scheme for Mobile Ad Hoc Networks SAMUEL KAKUBA 1, KYANDA SAIB KAAAASE

More information

Reversing Ticket Based Probing Routing Protocol for MANET

Reversing Ticket Based Probing Routing Protocol for MANET Reversing Ticket Based Probing Routing Protocol for MANET TURGUT YUCEL and MIN SONG Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529 U.S.A. http://www.odu.edu/networking

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Impact of Source Counter on Routing Performance in Resource Constrained DTNs

Impact of Source Counter on Routing Performance in Resource Constrained DTNs Impact of Source Counter on Routing Performance in Resource Constrained DTNs Xiaolan Zhang a,, Honggang Zhang b, Yu Gu c a Dept. of Computer and Information Sciences, Fordham University b Dept. of Mathematics

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Congestion Control in Mobile Ad-Hoc Networks

Congestion Control in Mobile Ad-Hoc Networks Congestion Control in Mobile Ad-Hoc Networks 1 Sandeep Rana, 2 Varun Pundir, 3 Ram Sewak Singh, 4 Deepak Yadav 1, 2, 3, 4 Shanti Institute of Technology, Meerut Email: sandeepmietcs@gmail.com Email: varunpundir@hotmail.com

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

Stochastic Petri nets

Stochastic Petri nets Stochastic Petri nets 1 Stochastic Petri nets Markov Chain grows very fast with the dimension of the system Petri nets: High-level specification formalism Markovian Stochastic Petri nets adding temporal

More information

Software Tools for Network Modelling

Software Tools for Network Modelling 6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. Software Tools for Network Modelling Attila Kuki a, János Sztrik b, Günter Bolch c a Department of Information Technology

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

Implementing stable TCP variants

Implementing stable TCP variants Implementing stable TCP variants IPAM Workshop on Large Scale Communications Networks April 2002 Tom Kelly ctk21@cam.ac.uk Laboratory for Communication Engineering University of Cambridge Implementing

More information

Scheduling Real Time Parallel Structure on Cluster Computing with Possible Processor failures

Scheduling Real Time Parallel Structure on Cluster Computing with Possible Processor failures Scheduling Real Time Parallel Structure on Cluster Computing with Possible Processor failures Alaa Amin and Reda Ammar Computer Science and Eng. Dept. University of Connecticut Ayman El Dessouly Electronics

More information

A Review on Improving Packet Analysis in Wireless Sensor Network using Bit Rate Classifier

A Review on Improving Packet Analysis in Wireless Sensor Network using Bit Rate Classifier Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Multi-threaded, discrete event simulation of distributed computing systems

Multi-threaded, discrete event simulation of distributed computing systems Multi-threaded, discrete event simulation of distributed computing systems Iosif C. Legrand California Institute of Technology, Pasadena, CA, U.S.A Abstract The LHC experiments have envisaged computing

More information

Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic Petri Nets

Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic Petri Nets Modeling and Performance Evaluation TAODV Routing Protocol Using Stochastic Petri Nets Sanaz Talebi Department of computer science, Shabestar Branch, Islamic Azad University, Shabestar, Iran Mohammad Ali

More information

A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network

A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A. K. Turuk, R. Kumar, and R. Badrinath Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

SUMMERY, CONCLUSIONS AND FUTURE WORK

SUMMERY, CONCLUSIONS AND FUTURE WORK Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six

More information

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks

Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Heterogeneous Community-based Routing in Opportunistic Mobile Social Networks Yunsheng Wang Kettering University Jie Wu Temple University Mingjun Xiao University of Science and Tech. of China Daqiang Zhang

More information

Reliability and Dependability in Computer Networks. CS 552 Computer Networks Side Credits: A. Tjang, W. Sanders

Reliability and Dependability in Computer Networks. CS 552 Computer Networks Side Credits: A. Tjang, W. Sanders Reliability and Dependability in Computer Networks CS 552 Computer Networks Side Credits: A. Tjang, W. Sanders Outline Overall dependability definitions and concepts Measuring Site dependability Stochastic

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

Safety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Safety and Reliability Analysis Models: Overview

Safety and Reliability of Embedded Systems. (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Safety and Reliability Analysis Models: Overview (Sicherheit und Zuverlässigkeit eingebetteter Systeme) Safety and Reliability Analysis Models: Overview Content Classification Hazard and Operability Study (HAZOP) Preliminary Hazard Analysis (PHA) Event

More information

Mitigating Superfluous Flooding of Control Packets MANET

Mitigating Superfluous Flooding of Control Packets MANET Mitigating Superfluous Flooding of Control Packets MANET B.Shanmugha Priya 1 PG Student, Department of Computer Science, Park College of Engineering and Technology, Kaniyur, Coimbatore, India 1 Abstract:

More information

Building petabit/s data center network with submicroseconds latency by using fast optical switches Miao, W.; Yan, F.; Dorren, H.J.S.; Calabretta, N.

Building petabit/s data center network with submicroseconds latency by using fast optical switches Miao, W.; Yan, F.; Dorren, H.J.S.; Calabretta, N. Building petabit/s data center network with submicroseconds latency by using fast optical switches Miao, W.; Yan, F.; Dorren, H.J.S.; Calabretta, N. Published in: Proceedings of 20th Annual Symposium of

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Petri Nets ee249 Fall 2000

Petri Nets ee249 Fall 2000 Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow

More information

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren

Practical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant

More information

Modeling and Performance Analysis of an OGSA-based Resource Sharing Environment in NGN

Modeling and Performance Analysis of an OGSA-based Resource Sharing Environment in NGN Modeling and Performance Analysis of an OGSA-based Resource Sharing Environment in NGN Li Li, Fangchun Yang State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications

More information

Limiting the State Space Explosion as Taking Dynamic Issues into Account in Network Modelling and Analysis

Limiting the State Space Explosion as Taking Dynamic Issues into Account in Network Modelling and Analysis Limiting the State Space Explosion as Taking Dynamic Issues into Account in Network Modelling and Analysis Qitao Gan, Bjarne E. Helvik Centre for Quantifiable Quality of Service in Communication Systems,

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

A Concurrency Control for Transactional Mobile Agents

A Concurrency Control for Transactional Mobile Agents A Concurrency Control for Transactional Mobile Agents Jeong-Joon Yoo and Dong-Ik Lee Department of Information and Communications, Kwang-Ju Institute of Science and Technology (K-JIST) Puk-Gu Oryong-Dong

More information

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).

JAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012). JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

Formal Modeling and Analysis of Stream Processing Systems

Formal Modeling and Analysis of Stream Processing Systems Formal Modeling and Analysis of Stream Processing Systems Linh T.X. Phan March 2009 Computer and Information Science University of Pennsylvania 1 High performance Highly optimized requirements systems

More information

Resource Allocation Strategies for Multiple Job Classes

Resource Allocation Strategies for Multiple Job Classes Resource Allocation Strategies for Multiple Job Classes by Ye Hu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer

More information

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN)

Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) Supporting Service Differentiation for Real-Time and Best-Effort Traffic in Stateless Wireless Ad-Hoc Networks (SWAN) G. S. Ahn, A. T. Campbell, A. Veres, and L. H. Sun IEEE Trans. On Mobile Computing

More information

A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment

A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment Anurag Kahol, Sumit Khurana, Sandeep K. S. Gupta, and Pradip K. Srimani Shumei Chen Hoang Nguyen Jeff Wilson Team Members

More information

QoS-Aware IPTV Routing Algorithms

QoS-Aware IPTV Routing Algorithms QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,

More information

RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION

RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION RESERVATION OF CHANNELS FOR HANDOFF USERS IN VISITOR LOCATION BASED ON PREDICTION 1 M.AMSAVENI 2 S.MALATHY 1 Assistant Professor, Department of ECE, RVS College of Engineering And Technology, Coimbatore,

More information

E ALLOCATION IN ATM BASED PRIVATE WAN

E ALLOCATION IN ATM BASED PRIVATE WAN APPLICATION OF INT TEGRATED MODELING TECHNIQ QUE FOR DATA SERVICES E F. I. Onah 1, C. I Ani 2,, * Nigerian Journal of Technology (NIJOTECH) Vol. 33. No. 1. January 2014, pp. 72-77 Copyright Faculty of

More information

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. IV (May - Jun.2015), PP 06-11 www.iosrjournals.org Impact of IEEE 802.11

More information

Quality of Service in Telecommunication Networks

Quality of Service in Telecommunication Networks Quality of Service in Telecommunication Networks Åke Arvidsson, Ph.D. Ericsson Core Network Development, Sweden Main Message Traffic theory: QoS is (partly) about congestion. Congestion is partly caused

More information

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication.

Deepti Jaglan. Keywords - WSN, Criticalities, Issues, Architecture, Communication. Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Cooperative

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

CHAPTER 3 GRID MONITORING AND RESOURCE SELECTION

CHAPTER 3 GRID MONITORING AND RESOURCE SELECTION 31 CHAPTER 3 GRID MONITORING AND RESOURCE SELECTION This chapter introduces the Grid monitoring with resource metrics and network metrics. This chapter also discusses various network monitoring tools and

More information

Performance Testing from UML Models with Resource Descriptions *

Performance Testing from UML Models with Resource Descriptions * Performance Testing from UML Models with Resource Descriptions * Flávio M. de Oliveira 1, Rômulo da S. Menna 1, Hugo V. Vieira 1, Duncan D.A. Ruiz 1 1 Faculdade de Informática Pontifícia Universidade Católica

More information

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks

An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks An Ant-Based Routing Algorithm to Achieve the Lifetime Bound for Target Tracking Sensor Networks Peng Zeng Cuanzhi Zang Haibin Yu Shenyang Institute of Automation Chinese Academy of Sciences Target Tracking

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

Broker Clusters. Cluster Models

Broker Clusters. Cluster Models 4 CHAPTER 4 Broker Clusters Cluster Models Message Queue supports the use of broker clusters: groups of brokers working together to provide message delivery services to clients. Clusters enable a Message

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Introduction to Queueing Theory for Computer Scientists

Introduction to Queueing Theory for Computer Scientists Introduction to Queueing Theory for Computer Scientists Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These

More information

Cross Layer Detection of Wormhole In MANET Using FIS

Cross Layer Detection of Wormhole In MANET Using FIS Cross Layer Detection of Wormhole In MANET Using FIS P. Revathi, M. M. Sahana & Vydeki Dharmar Department of ECE, Easwari Engineering College, Chennai, India. E-mail : revathipancha@yahoo.com, sahanapandian@yahoo.com

More information

Simple Quality-of-Service Path First Protocol and Modeling Analysis*

Simple Quality-of-Service Path First Protocol and Modeling Analysis* Simple Quality-of-Service Path First Protocol and Modeling Analysis* Lin Shen, Mingwei Xu, Ke Xu, Yong Cui, Youjian Zhao Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084

More information

Event-based sampling for wireless network control systems with QoS

Event-based sampling for wireless network control systems with QoS 21 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July 2, 21 WeC8.3 Event-based sampling for wireless network control systems with QoS Adrian D. McKernan and George W. Irwin

More information

Evaluating the Performance of Transaction Workloads in Database Systems using Queueing Petri Nets

Evaluating the Performance of Transaction Workloads in Database Systems using Queueing Petri Nets Imperial College of Science, Technology and Medicine Department of Computing Evaluating the Performance of Transaction Workloads in Database Systems using Queueing Petri Nets David Coulden Supervisor:

More information

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS

A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS A SURVEY OF VARIOUS ROUTING PROBLEMS TO VARIOUS ATTACKS IN MOBILE AD HOC NETWORKS IN THE TRANSACTIONS M Jansirani Research scholar Research Department of Computer Science Government Arts College (Autonomous),

More information

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE

More information

AE64 TELECOMMUNICATION SWITCHING SYSTEMS JUNE Q2 (a) Write short notes on (a) uniselector and (b) two motion selector.

AE64 TELECOMMUNICATION SWITCHING SYSTEMS JUNE Q2 (a) Write short notes on (a) uniselector and (b) two motion selector. Q2 (a) Write short notes on (a) uniselector and (b) two motion selector. Uniselectors. A uniselector is a one which has a single rotary switch with a bank of contacts. Depending upon the number of switching

More information

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an

More information

New Approaches to Optical Packet Switching in Carrier Networks. Thomas C. McDermott Chiaro Networks Richardson, Texas

New Approaches to Optical Packet Switching in Carrier Networks. Thomas C. McDermott Chiaro Networks Richardson, Texas New Approaches to Optical Packet Switching in Carrier Networks Thomas C. McDermott Chiaro Networks Richardson, Texas Outline Introduction, Vision, Problem statement Approaches to Optical Packet Switching

More information

Comparative Study of blocking mechanisms for Packet Switched Omega Networks

Comparative Study of blocking mechanisms for Packet Switched Omega Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet

More information

Teletraffic theory I: Queuing theory

Teletraffic theory I: Queuing theory Teletraffic theory I: Queuing theory Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2716/ 1. Place of the course TLT-2716 is a part of Teletraffic theory five

More information

A DEVS LIBRARY FOR LAYERED QUEUING NETWORKS

A DEVS LIBRARY FOR LAYERED QUEUING NETWORKS A DEVS LIBRARY FOR LAYERED QUEUING NETWORKS Dorin B. Petriu and Gabriel Wainer Department of Systems and Computer Engineering Carleton University, 1125 Colonel By Drive Ottawa, Ontario K1S 5B6, Canada.

More information

3. Quality of Service

3. Quality of Service 3. Quality of Service Usage Applications Learning & Teaching Design User Interfaces Services Content Process ing Security... Documents Synchronization Group Communi cations Systems Databases Programming

More information