MULTIRATE RESOURCE SHARING FOR UNICAST AND MULTICAST CONNECTIONS
|
|
- Agnes Neal
- 5 years ago
- Views:
Transcription
1 MULTIRATE RESOURCE SHARING FOR UNICAST AND MULTICAST CONNECTIONS Khaled Boussetta and Andre-Luc Belyot Laboratoire PRiSM University o/versailles Saint-Quentin 45, Avenue des Etats-Unis Versailles, France Abstract Keywords: Recent advances in network equipment and the important progress in video, audio and data compression techniques has given rise to new multimedia group applications, such as Video-conferencing or Webcasting. These applications need guarantees on the QoS (Quality of Service) and require group communication services. ATM seems to be well adapted to support these applications, since it provides several service classes and QoS guarantees. However, these guarantees are possible only if the network is able to allow efficient resource sharing. Therefore, resource sharing for multirate traffic is a fundamental issue, specially for multicast connections with a huge number of recipients. In this paper, we generalize the mathematical model of Kaufman [6] to compute the exact values of call blocking probability for unicast and multicast multirate multiclass traffics sharing a single link. We show that the model has a product form solution. Moreover, we give a recursive algorithm to obtain the normalization constant and the call blocking probability. Multicast, resource sharing, product solution, recursive solution, ATM. 1. INTRODUCTION Over the last few years, several multimedia group applications have emerged. In particular, the extension of the Internet to support the multicast within the MBONE [2] makes the use of multimedia group applications over wide area networks a commonplace reality. Some of these applications, such as CSCW (Computer Supported Cooperative Work) or video-conferencing, are very popular within the Internet community. These applications facilitate group communication and allow members of a group to work together or to share resources. We believe that there will be an increasing need for developing this kind of applications in the future and so, there will be an absolute necessity to provide the D. H. K. Tsang et al. (eds.), Broadband Communications Springer Science+Business Media New York 2000
2 562 multicast capability in the networks. The support of multicast leads to many problems [4] such as call admission control, multicast routing [3], group management, multicast reliability [1], flow control [8], etc. However all these questions are a consequence of one fundamental problem: the resource sharing problem. Until now, most of the answers given to these problems aim at supporting unicast connections with heterogeneous requirements. Thus, multirate multiclass loss models for unicast traffic, have been widely studied. It was shown that they have a product form solution, and exact blocking probability can be computed. Moreover, recursive solutions have been developed to bypass numerical problems that may arise in large systems. Efficient Sharing of resources for multicast connections is required to allow the support of a huge number of recipients. However, the performance of a link supporting multicast connection has not been extensively investigated. Therefore, most of these research works concern the switch call blocking probability [7]. [5] gives an interesting solution to compute multicast call blocking in a single link, that is, the authors use generalized Engset system to deduce the call blocking probability. Nevertheless, only multicast traffics have been considered, while the effect of unicast connections sharing the same link was not discussed. Moreover, difficulties in computing will arise for large systems since no recursive solution is given. In this paper, we use a mathematical model to compute the exact solution of the call blocking probability for both unicast and multicast multirate traffics sharing a single link. Our work differs from [5] in that we generalize the model of Kaufman [6] to compute the exact steady-state blocking probability for multicast and unicast multi rate multiclass connections. To obtain the normalization constant, we use a new recursion algorithm which gives the resource distribution for multicast connections. Finally, the call blocking probabilities for multicast and unicast traffics are obtained with our recursive algorithm. The rest of the paper is organized as follows. In the next section, we present the problem of resource sharing for unicast and multicast traffic, then we present our analytical model and its product solution form. We also describe our recursive solution to compute the call blocking probability. In section 3, an example is given to illustrate the use of our recursive algorithm. A summary of this paper and possible extensions are discussed in section 4.
3 CALL BLOCKING FOR MULTIRATE TRAFFIC 2.1 MODEL DESCRIPTION We study the call blocking probability in a link with C resource capacity that allows the support of unicast and multicast multirate multiclass streams. All arrival call connections and holding times are independent. We suppose that the other links in the network have infinite capacity, so that no blocking that may affect our system occurs. Let U be the number of unicast customer types. Class i unicast customers arrive according to a Poisson process of rate Au,i and require simultaneously bu,i resource units. We assume that the holding time of class i call is exponentially distributed with mean _1_. Thus, the offered load is Pu i = ~ A Unicast P-u, ' J..tu,i customer whose requirement cannot be satisfied is blocked. Suppose that there is M multicast customer types, each class corresponds to a multicast session. Thus, an infinite user population can join each multicast session. That is, it is reasonable to consider that multicast customers of class i arrive according to a Poisson process with rate Am,i and has exponential residency time with parameter j.lm,i. Thus, the offered load is Pm,i = >'::,;:.. All the members of a given multicast session will require the same bandwidth capacity. That is, multicast customers of class i, will require bm,i resource units. Definition 1 i is an active class if there is at least one multicast customer of class i being served in the link. As calls of multicast class i will not be blocked if i is already active, then bm,i units of the system are allocated to a new arriving multicast customer of class i, only if i is not already an active class and there is at least bm,i free resources in the system. 2.2 PRODUCT FORM SOLUTION Under the preceeding assumptions, it is easy to see that the state of our system is described by the state vector n = (u, m) = (Ul,, Uu, ml,, mm). Here u is the vector number of calls in progress for unicast class and m is the state vector for multicast ones. Let n be the set of allowed states. n depends on the sharing policy P. In this paper, we address Complete Sharing policy (CS). However, join distribution will also have a product form solution for Upper Limit (UL) and Guaranteed Minimum (GM) policies.
4 564 Let l{mi>o} = 1 if i is an active class. Then, the set of allowed states 0 for CS policy can be written as: { U M 0= (u, m) / ~ bu,i' Ui + ~ bm,i.1{mi>o} (1) Theorem 1 The state probability corresponding to a resource sharing policy CS is given by : 1 U ti, M m, P () Il Pu,i Il Pm,i u,m = G(O). -.,' -., i=l Ut i=l m t (2) Where G (0) is the normalization constant for O. U u, M m,) G (0) = G (C, U, M) = 2: ( Il P~'i. Il Pm.',i U t. m t nen i=l t=l The proof is trivial since the state probability verifies the global equilibrium balance equation. 2.3 CALL BLOCKING PROBABILITY Let Bt denotes the sets of blocking states for unicast or multicast class i. Then, the call blocking probability for class i can be expressed as : (3) Pbi = 2: P(n) = 1-2: P(n) = 1-2: P(n) (4) Thus, (5) Furthermore, when i is a unicast class, then Kaufman [6] shows that the previous quantity can be expressed as : R. = 1 _ G (C - bu,;, U, M) bt,u G (C, U, M) (6)
5 565 Let M - i, denotes M multicast classes without the class i, which also means that the class i will never be active. Then, a similar expression for the multicast call blocking probability Pbi,m can be found. See the Appendix for the proof. epm,i G (C - bm,i, U, M - i) Pbi,m = 1- G (C, U, M) (7) 2.4 UNICAST CONNECTIONS In the previous section, we gave the exact solution to compute the call blocking probability for both multicast and unicast classes. However, the state system has as many dimensions as the number of traffic classes. Therefore, in a large system capacity C and a huge number of classes M + U, numerical difficulties may arise when computing both the normalization constant and the call blocking probability. Fortunately, Kaufman [6] found a solution to map the multi-dimensional state space into a one dimensional state space. It has been shown that the distribution of the number of resource units allocated for unicast connections has a recursive expression. Moreover, this formula is only linearly dependent on U. These results can also be applied in our model to compute the resource distribution for unicast connections. In fact, since the state probability has a product form, it can be easily verified that the multicast traffic has no consequences on the validity of the recursive solution. However, since the normalization constant in our model depends on both unicast and multicast connections, we have to consider first an unormalized state probability for resource distribution for the unicast traffic. Thus, let qu (.) be this quantity. Then: (8) Here j denotes the number of resource units allocated to the unicast connections and u.bu = L~l bu,iui. Kaufman [6] shows that qu (j) can be computed recursively as follow:,j < 0,j = 0,j> 0 (9)
6 MULTICAST CONNECTIONS The recursive solution given in the previous section cannot be applied for the multicast connections. However, in the last case, we find another solution to reduce the state space. Thus, let us define q M (.) as the unormalized state probability for resource distribution in the multicast traffic. Remembering that a class i request will never be blocked if i is an active class, an infinite population customer of the same class i can join an active class i. Thus, defining 1m.bm = 2:f!1 bm,i.1{mi>0} we can write: Thus, we find qm (j) = L II l{m.>o} {m:l m.bm=j} i=1 M ( +00 pm,.) """'~ ~ m' m,=1,. (10) qm (j) = L II l{m,>o} (e Pm., - 1) M {m:lm.bm=j},=1 (11) Now let qk (.) be the unormalized resource distribution probability for multicast classes whose index vary from of I to k. Let b~l denotes a k dimension capacity vector for multicast calls. Thus, 1~.b~n = 2::7=1 bm.i.1 {m, >O} k II l{m.>o} (e Pm. - 1) (12) Since this quantity can be divided into two parts, the first one represents the case where no customers of class k are being served, and the second one for the case where class k is active, then: qk (j) = 2::{m:l~.b~=jlmk=0} I17=1 l{m.>o} (e Pm. - 1) + 2::{m:l~.b~=jlmk>0} I17=1 l{m.>o} (e Pm., - 1) (13) Consider the left-side of the sum of equation 13, then this quantity can be written as follows: { 'lk-l bk - 1 m. m. m -} _ '} i=1 k-l II l{mi>o} (e Pm., - 1) = qk-j (j) (14)
7 567 The right-hand side of the sum of equation 13 can be written as follows: k-l (epm,k - 1) II l{m.>o} (e Pm,. - 1) { 'lk-l bk - 1 m. m. m -J _ '-b m,k } i=1 (15) We find the recursive formula for the multicast traffic:,j < O,Vk,j = O,Vk,j > 0, k = 0,j > 0, k > 0 (16) Finally, using 9 and 16 we can compute the normalization constant G (f2) : G (Il) = t. qm (i) (~qu (j)) (17) 2.6 MULTICAST CALL BLOCKING PROBABILITY A multicast call of class r is blocked only if r is not an acti ve class and there are less than bm,r free resource units in the link. Thus, let qm -r (.) be the unormalized resource distribution probability for multicast connections such that the class r is not active: M qm-r (j) = II l{m.>o} (epm" - 1) (18) Gi ven the recursi ve formula gi ven in 16 we obtain the following: Thus we have a recursive formula that will give the exact value of qm -r (j) { 0 qm-r (j) = 1 qm (j) - (epm,r - 1) qm-r (j - bm,r),j < 0,j = 0,j > 0 (20) Finally, the call blocking probability for unicast and multicast connections can be computed using the following equations:
8 568 fl,i,m = G ~n) t, (qu (j) ~ qm-i (C - j - k)) (22) 3. EXAMPLE We consider a link with a bandwidth capacity equal to 10 Mbps. Let the basic bandwidth unit be 64 Kbps. Thus, C = 160. We choose two unicast classes: U = 2 and four multicast classes: M = 4. For each class we take the following capacity requirements: bu,l = 32, bu,2 = 16A bm,k = 32, 'tk/1 :S k :S M We suppose that for both unicast and multicast mean call duration time are 120 seconds. Thus, to analyze the link occupancy at different loads, we introduce A as the inter-arrival time of a customer (unicast and multicast) in the link such as: Au,l = A Au,2 = 2A Varying A from 0 to 900, we compute using equations 21 and 22 the call blocking probability for unicast and multicast traffics. The results are plotted in figure 1. The figure shows that the call blocking probabilities for unicast traffics increase when the traffic load grows. However, multicast call blocking probabilities for all classes are always under a certain threshold. Thus, these probabilities increase until a certain value of A, after which they decrease. This is due to the fact that after a certain value of A, these classes will always be active. At this point, the traffic load is so high that there is at any time at least one multicast customer being served; thus, for these multicast sessions a new customer will never be blocked.
9 569 Unicast > Q..Q " 0. '" C... u '"..... u 0.2 " Lambda Figure J Call Blocking Probability 4. CONCLUSION In this paper, we addressed the multirate resource sharing problem for unicast and multicast traffics. We show that in Complete Sharing policy the model have a product form solution. Thus, we deduce the exact call blocking probability values for both unicast and multicast connections. Moreover, to avoid the numerical problems that may arise when computing these quantities, we extend the recursive solution of Kaufman [6] to the multicast case. Our future prospects will concern the adaptation of these results to other sharing policies, such as Upper Limit (UL) and Guaranteed Minimum (GM) policies. We also investigate the problem of multicast resource sharing in a wireless environment. Appendix Let us write G (n - Bn. This quantity can be divided into two parts, the first one represents the case where there is no customer of class i being served, thus, no blocking occurs for this class if the sum of the allocated resource units in the system is under C - bm,i' The second part of the equation represents
10 570 the case where the class i is active, that is no blocking for this class will occur. Therefore, We obtain that: G ( f"l _ Bt) =,",C-bm.i (.) (,",C-b m. - j (k)) H L..Jj=o qm-i J L..Jk=O qu + (e Pm, - 1) L:T::b m. qm-i (j - bm,i) (L:~==-6 qu (k)) (A. I) Thus, taking J = j - bm,i in the second sum of A.I we find that: G (0 - Bt) = e Pm, G (C - bm,i, U, M - i) (A.2) We can now deduce that the multicast call blocking probability for i is : epm G (C - bm,i, U, M - i) Pbi,m = 1- G (C, U, M) (A.3) References [1] C. Diot. Reliability in multicast services and protocols; a survey. In International Conference on Local and Metropolitan Communication Systems, December [2] Hans Eriksson. MBone: The Multicast Backbone. Communications of the ACM, 37:54-60, [3] D, Reeves H. Salama and Y. Viniotis. Evaluation of multicast routing algorithms for real-time communication on high-speed networks, IEEE Journal on Selected Areas in Communication, February [4] G. C. Polyzos J. C. Pasquale and G. Xylomenos. The multimedia multicasting problem. ACM Multimedia Systems Journal, 6(1 ):43-59, [5] S. Aalto J. Karvo, J. Virtamo and O. Martikainen. Blocking of dynamic multicast connections in a single link. In International Broadband Communications Conference. Future of Telecommunications, pages Paul J. Kuhn and Roya Ulrich Edition, April [6] D. Kaufman. Blocking in a shared resource environment. IEEE Transactions on communications, 29(10): , October [7] J. S. Turner. An optimal nonblocking multicast virtual circuit switch. Technical Report wucs-93-30, March [8] H. A. Wang and M. Schwartz. Performance analysis of multicast flow control algorithms over combined wireless/wired networks. In IEEE INFO COM'97, April 1997.
2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom
Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of
More informationA Handover Optimisation Scheme in Cellular Networks
A Handover Optimisation Scheme in Cellular Networks A.Gueroui and S.Boumerdassi Laboratoire PRiSM, Université de Versailles 45, Avenue des Etats-Unis 78035 Versailles France Laboratoire CEDRIC, CNAM 292,
More informationCost-based Pricing for Multicast Streaming Services
Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,
More informationA New Call Admission Control scheme for Real-time traffic in Wireless Networks
A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612
More informationVirtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements
Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan
More informationEgyptian Computer Science Journal Vol. 38 No.3 September 2014
Deploying IPTV Services Over Proposed Network for Yemen Universities Khaled O. Basulaim Dept. of Information Technology, Faculty of Engineering University of Aden k.basulaim@ycit-he.org Abstract Recently,
More informationON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM
ON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM Wojciech Burakowski, Halina Tarasiuk,RyszardSyski Warsaw University of Technology, Poland Institute of Telecommunications 00-665-Warsaw,
More informationModel suitable for virtual circuit networks
. The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in
More informationLecture 13. Quality of Service II CM0256
Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject
More informationA PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING
A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer
More informationExpanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks
Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,
More informationStudy of Load Balancing Schemes over a Video on Demand System
Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video
More informationSimulation Study for a Broadband Multimedia VSAT Network
Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463
More informationSubnet Multicast for Delivery of One-to-Many Multicast Applications
Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting
More informationBANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1
ISSN 2277-2685 IJESR/May 2017/ Vol-7/Issue-5/40-45 Ashish Upadhayay / International Journal of Engineering & Science Research BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 1 Research Scholar,
More informationEvolved Multimedia Broadcast/Multicast Service (embms) in LTE-advanced
Evolved Multimedia Broadcast/Multicast Service (embms) in LTE-advanced 1 Evolved Multimedia Broadcast/Multicast Service (embms) in LTE-advanced Separation of control plane and data plane Image from: Lecompte
More informationHeuristic Algorithms for Multiconstrained Quality-of-Service Routing
244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service
More informationDynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *
Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:
More informationFUTURE communication networks are expected to support
1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,
More informationPerformance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions
Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Eser Gemikonakli University of Kyrenia, Kyrenia, Mersin 10, Turkey Abstract In this study, the aim
More informationQoS Mapping along the Protocol Stack: Discussion and Preliminary Results
QoS Mapping along the Protocol Stack: Discussion and Preliminary Results Luiz A. DaSilva Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Alexandria
More informationLecture 17 Multimedia Transport Subsystem (Part 3)
CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:
More informationDYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS
DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS 1 C. NISHANT PAUL, 2 V. SAKTHIVEL 1 P.G. Student, School Of Computing, SASTRA University, Thanjavur 613401, India.
More informationPerformance analysis of voip over wimax
Performance analysis of voip over wimax Shima Faisal Ahmed Muhi-Aldean 1, Amin Babiker 2 1,2 Department of Communications, Faculty of Engineering Al Neelain University, Khartoum,Sudan Abstract: Voice over
More informationAnalysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service
PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros
More informationThe Case for Reexamining Multimedia File System Design
The Case for Reexamining Multimedia File System Design Position Statement Prashant Shenoy Department of Computer Science, University of Massachusetts, Amherst, MA 01003. shenoy@cs.umass.edu Research in
More informationTraffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach
Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Suriti Gupta College of Technology and Engineering Udaipur-313001 Vinod Kumar College of Technology and Engineering Udaipur-313001
More informationMITIGATING THE EFFECT OF PACKET LOSSES ON REAL-TIME VIDEO STREAMING USING PSNR AS VIDEO QUALITY ASSESSMENT METRIC ABSTRACT
MITIGATING THE EFFECT OF PACKET LOSSES ON REAL-TIME VIDEO STREAMING USING PSNR AS VIDEO QUALITY ASSESSMENT METRIC Anietie Bassey, Kufre M. Udofia & Mfonobong C. Uko Department of Electrical/Electronic
More informationInterworking of B-ISDN Signaling and Internet Protocol
Interworking of -ISDN Signaling and Internet Protocol Muneyoshi Suzuki NTT Information Sharing Platform Laboratories 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585, Japan suzuki@nal.ecl.net Abstract.
More informationCh.16 - Wireless WAN System Architectures
Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will
More informationAn Enhanced Dynamic Packet Buffer Management
An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared
More informationActive Adaptation in QoS Architecture Model
Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationRECURSIVE PATCHING An Efficient Technique for Multicast Video Streaming
ECUSIVE ATCHING An Efficient Technique for Multicast Video Streaming Y. W. Wong, Jack Y. B. Lee Department of Information Engineering The Chinese University of Hong Kong, Shatin, N.T., Hong Kong Email:
More informationNetwork Performance Analysis
Network Performance Analysis Network Performance Analysis Thomas Bonald Mathieu Feuillet Series Editor Pierre-Noël Favennec First published 2011 in Great Britain and the United States by ISTE Ltd and
More informationCompressive Sensing for Multimedia. Communications in Wireless Sensor Networks
Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an
More informationAn Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 333-339 (2002) Short aper An Evaluation of Deficit Round Robin Fair ueuing Applied in Router Congestion Control Department of Electrical Engineering National
More informationPerformance Study of Interweave Spectrum Sharing Method in Cognitive Radio
Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Abstract Spectrum scarcity is one of the most critical recent problems in the field of wireless communication One of the promising
More informationAudio Streams Merging Over ALMI
Audio Streams Merging Over ALMI Christopher J. Dunkle, Zhen Zhang, Sherlia Y. Shi, Zongming Fei Department of Computer Science University of Kentucky 301 Rose Street, 2 nd floor Lexington, KY 40506-0495,
More informationTransport Performance Evaluation of an ATM-based UMTS Access Network
Transport Performance Evaluation of an -based US Access Network Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos University of Athens, Department of Informatics, Communication Networks Laboratory
More informationDELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC
DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,
More informationTo address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,
Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen
More informationInsensitive Traffic Splitting in Data Networks
Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages
More informationPerformance Analysis of Cell Switching Management Scheme in Wireless Packet Communications
Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical
More informationPERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK
PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK Wojciech Burakowski Monika Fudala Halina Tarasiuk Institute of Telecommunications, Warsaw University of Technology ul. Nowowiejska 15/19, 00-665 Warsaw,
More informationProbability Admission Control in Class-based Video-on-Demand System
Probability Admission Control in Class-based Video-on-Demand System Sami Alwakeel and Agung Prasetijo Department of Computer Engineering College of Computer and Information Sciences, King Saud University
More informationTCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY
TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr
More informationA Flow Label Based QoS Scheme for End-to-End Mobile Services
A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract
More informationA Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems
his paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at A -based Session Setup Procedure in Cellular-WLAN Integrated Systems Gwangwoo Park,
More informationEfficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security
Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security ABSTRACT Muhammad Wasim Abbas Ashraf * & Ahsan Raza Sattar ** *Computer Science, University of Agriculture, Faisalabad, Punjab,
More information11 An efficient rate allocation algorithm for ATM networks providing max-min fairness
11 An efficient rate allocation algorithm for ATM networks providing max-min fairness L. Kalampoukas, A. Varma* Computer Engineering Department University of California, Santa Cruz, CA 95064, USA E-mail:
More information254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007
254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe
More informationPANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS
Discussiones Mathematicae Graph Theory xx (xxxx) 1 13 doi:10.7151/dmgt.2106 PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Vladislav Taranchuk Department of Mathematics and Statistics California State
More informationHao Wang 1, Dave Laurenson 1, and Jane Hillston 2
A General Performance Evaluation Framework for Network Selection Strategies in 3G-WLAN Interworking Networks Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 1 Institute for Digital Communications 2 Laboratory
More informationRobust Wireless Delivery of Scalable Videos using Inter-layer Network Coding
Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Abstract
More informationVideo Streaming Over the Internet
Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality
More informationWeb Usage Mining: How to Efficiently Manage New Transactions and New Clients
Web Usage Mining: How to Efficiently Manage New Transactions and New Clients F. Masseglia 1,2, P. Poncelet 2, and M. Teisseire 2 1 Laboratoire PRiSM, Univ. de Versailles, 45 Avenue des Etats-Unis, 78035
More information1. INTRODUCTION light tree First Generation Second Generation Third Generation
1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical
More informationAn algorithm for Performance Analysis of Single-Source Acyclic graphs
An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs
More informationParallel Packet Copies for Multicast
Do you really need multicast? At line rates? Less is More J Parallel Packet Copies for Multicast J.1 Introduction Multicasting is the process of simultaneously sending the same data to multiple destinations
More information654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006
654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006 Optimal Resource Allocation and Adaptive Call Admission Control for Voice/Data Integrated Cellular Networks Chi Wa Leong, Weihua
More informationWiMax-based Handovers in Next Generation Networks
WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa
More informationQuality of Service II
Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated
More informationMultimedia Document Communications over Wireless Network
Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing
More informationEnhanced Parity Packet Transmission for Video Multicast using R-DSTC
21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip
More informationPacket Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.
Problem: not all networks are directly connected Limitations of directly connected networks: limit on the number of hosts supportable limit on the geographic span of the network Packet Switching Hongwei
More informationThe Fulfillment of Design and Simulation for Bandwidth Allocation Algorithm Based on User Satisfaction and Profit
2011 International Conference on Information Communication and Management IPCSIT vol.16 (2011) (2011) IACSIT Press, Singapore The Fulfillment of Design and Simulation for andwidth Allocation Algorithm
More informationResearch Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users
Mobile Information Systems Volume 2016, Article ID 3297938, 8 pages http://dx.doi.org/10.1155/2016/3297938 Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized
More informationCS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA
CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please
More informationTraffic Analysis and Modeling of Real World Video Encoders
Traffic Analysis and Modeling of Real World Video Encoders KLIMIS NTALIANIS, NIKOLAOS DOULAMIS, ANASTASIOS DOULAMIS AND STEFANOS KOLLIAS Department of Electrical and Computer Engineering National Technical
More informationFor q»p, a similar expression can be given replacing C:.t(i) by C:.t(i). The coefficients C:.t(i) and
Exact calculation of computer network reliability by E. HANSLER IBM Research Laboratory Ruschlikon, Switzerland G. K. McAULIFFE IBM Corporation Dublin, Ireland and R. S. WILKOV IBM Corporation Armonk,
More informationOutline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-S
Internet Multimedia Architecture Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-Serv, IntServ) Conclusions
More informationOn the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling
International Journal of Performability Engineering Vol. 9, No. 2, March 2013, pp. 123-132. RAMS Consultants Printed in India On the Role of Weibull-type Distributions in NHPP-based Software Reliability
More informationQuality of Service (QoS)
Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete
More informationQueue Theory based Response Time Analyses for Geo-Information Processing Chain
Queue Theory based Response Time Analyses for Geo-Information Processing Chain Jie Chen, Jian Peng, Min Deng, Chao Tao, Haifeng Li a School of Civil Engineering, School of Geosciences Info-Physics, Central
More informationWEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT
International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology
More informationComparison of Shaping and Buffering for Video Transmission
Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440
More information70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET
70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded?
More informationIntroduction to Queuing Systems
Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability
More informationMulticast Sandpit Alpha Release. Invitation for Expressions of Interest
Multicast Sandpit Alpha Release Invitation for Expressions of Interest 1 NBN Co Limited Multicast Sandpit Alpha Release Invitation for Expressions of Interest Copyright This Information Paper is subject
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationBroadcast Repair for Wireless Distributed Storage Systems
Broadcast Repair for Wireless Distributed Storage Systems Ping Hu Department of Electronic Engineering City University of Hong Kong Email: ping.hu@my.cityu.edu.hk Chi Wan Sung Department of Electronic
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationCall Processing Architecture and Algorithms for Future Network
22 Call Processing Architecture and Algorithms for Future Network Geonung Kim, Sunshin An Department of Electronic Engineering Korea University 1, 5-ka, Anam-dong, Sungbuk-ku, SEOUL, 136-701, KOREA Phone:
More informationDeliverable D1.29 MCP/VDES inter-operability report
Deliverable D1.29 MCP/VDES inter-operability report Project no. 636329 Project acronym: EfficienSea2 Project full title: EFFICIENSEA2 efficient, safe and sustainable traffic at sea Funding scheme: Innovation
More informationJournal of Electronics and Communication Engineering & Technology (JECET)
Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X
More informationImpact of Voice Coding in Performance of VoIP
Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol
More informationWhy is scheduling so difficult?
Queueing Page 1 Why is scheduling so difficult? Wednesday, November 8, 2017 7:35 AM Scheduling is a matter of great controversy. Should it be fair? (O(log n)) Should it instead be fast? (O(1)) As well,
More informationEdge Switch. setup. reject. delay. setup. setup ack. offset. burst. burst. release. φ l. long burst. short burst. idle. p s
Performance Modeling of an Edge Optical Burst Switching ode Lisong Xu, Harry G Perros, George Rouskas Computer Science Department orth Carolina State University Raleigh, C 27695-7534 E-mail: flxu2,hp,rouskasg@cscncsuedu
More informationMultiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing
Multiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing Tat Chee Wan (tcwan@cs.usm.my) R. Sureswaran (sures@cs.usm.my) K. Saravanan (sara@network2.cs.usm.my) Network Research Group
More informationDepartment of Electrical and Computer Systems Engineering
Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)
More informationMobile Positioning System Based on the Wireless Sensor Network in Buildings
Communications and Network, 2009, 1, 96-100 doi:10.4236/cn.2009.12015 Published Online November 2009 (http://www.scirp.org/journal/cn). Mobile Positioning System Based on the Wireless Sensor Network in
More informationON BANDWIDTH RESERVATION POLICIES IN BROADBAND WIRELESS NETWORKS
ON BANDWIDTH RESERVATION POLICIES IN BROADBAND WIRELESS NETWORKS Jelena Misic and Tam Yik Bun Department of Computer Science, Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationMultimedia Networking. Network Support for Multimedia Applications
Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)
More informationDevelopment of Time-Dependent Queuing Models. in Non-Stationary Condition
The 11th Asia Pacific Industrial Engineering and Management Systems Conference Development of Time-Dependent Queuing Models in Non-Stationary Condition Nur Aini Masruroh 1, Subagyo 2, Aulia Syarifah Hidayatullah
More informationLive P2P Streaming with Scalable Video Coding and Network Coding
School of Computing Science Simon Fraser University, Canada Live P2P Streaming with Scalable Video Coding and Network Coding Mohamed dhefeeda (Joint work with Shabnam Mirshokraie) 22 February 2010 Mohamed
More informationNetwork Systems for Emerging WAN Applications
Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking
More informationAdaptive QoS Platform in Multimedia Networks
Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New
More information