MULTIRATE RESOURCE SHARING FOR UNICAST AND MULTICAST CONNECTIONS

Size: px
Start display at page:

Download "MULTIRATE RESOURCE SHARING FOR UNICAST AND MULTICAST CONNECTIONS"

Transcription

1 MULTIRATE RESOURCE SHARING FOR UNICAST AND MULTICAST CONNECTIONS Khaled Boussetta and Andre-Luc Belyot Laboratoire PRiSM University o/versailles Saint-Quentin 45, Avenue des Etats-Unis Versailles, France Abstract Keywords: Recent advances in network equipment and the important progress in video, audio and data compression techniques has given rise to new multimedia group applications, such as Video-conferencing or Webcasting. These applications need guarantees on the QoS (Quality of Service) and require group communication services. ATM seems to be well adapted to support these applications, since it provides several service classes and QoS guarantees. However, these guarantees are possible only if the network is able to allow efficient resource sharing. Therefore, resource sharing for multirate traffic is a fundamental issue, specially for multicast connections with a huge number of recipients. In this paper, we generalize the mathematical model of Kaufman [6] to compute the exact values of call blocking probability for unicast and multicast multirate multiclass traffics sharing a single link. We show that the model has a product form solution. Moreover, we give a recursive algorithm to obtain the normalization constant and the call blocking probability. Multicast, resource sharing, product solution, recursive solution, ATM. 1. INTRODUCTION Over the last few years, several multimedia group applications have emerged. In particular, the extension of the Internet to support the multicast within the MBONE [2] makes the use of multimedia group applications over wide area networks a commonplace reality. Some of these applications, such as CSCW (Computer Supported Cooperative Work) or video-conferencing, are very popular within the Internet community. These applications facilitate group communication and allow members of a group to work together or to share resources. We believe that there will be an increasing need for developing this kind of applications in the future and so, there will be an absolute necessity to provide the D. H. K. Tsang et al. (eds.), Broadband Communications Springer Science+Business Media New York 2000

2 562 multicast capability in the networks. The support of multicast leads to many problems [4] such as call admission control, multicast routing [3], group management, multicast reliability [1], flow control [8], etc. However all these questions are a consequence of one fundamental problem: the resource sharing problem. Until now, most of the answers given to these problems aim at supporting unicast connections with heterogeneous requirements. Thus, multirate multiclass loss models for unicast traffic, have been widely studied. It was shown that they have a product form solution, and exact blocking probability can be computed. Moreover, recursive solutions have been developed to bypass numerical problems that may arise in large systems. Efficient Sharing of resources for multicast connections is required to allow the support of a huge number of recipients. However, the performance of a link supporting multicast connection has not been extensively investigated. Therefore, most of these research works concern the switch call blocking probability [7]. [5] gives an interesting solution to compute multicast call blocking in a single link, that is, the authors use generalized Engset system to deduce the call blocking probability. Nevertheless, only multicast traffics have been considered, while the effect of unicast connections sharing the same link was not discussed. Moreover, difficulties in computing will arise for large systems since no recursive solution is given. In this paper, we use a mathematical model to compute the exact solution of the call blocking probability for both unicast and multicast multirate traffics sharing a single link. Our work differs from [5] in that we generalize the model of Kaufman [6] to compute the exact steady-state blocking probability for multicast and unicast multi rate multiclass connections. To obtain the normalization constant, we use a new recursion algorithm which gives the resource distribution for multicast connections. Finally, the call blocking probabilities for multicast and unicast traffics are obtained with our recursive algorithm. The rest of the paper is organized as follows. In the next section, we present the problem of resource sharing for unicast and multicast traffic, then we present our analytical model and its product solution form. We also describe our recursive solution to compute the call blocking probability. In section 3, an example is given to illustrate the use of our recursive algorithm. A summary of this paper and possible extensions are discussed in section 4.

3 CALL BLOCKING FOR MULTIRATE TRAFFIC 2.1 MODEL DESCRIPTION We study the call blocking probability in a link with C resource capacity that allows the support of unicast and multicast multirate multiclass streams. All arrival call connections and holding times are independent. We suppose that the other links in the network have infinite capacity, so that no blocking that may affect our system occurs. Let U be the number of unicast customer types. Class i unicast customers arrive according to a Poisson process of rate Au,i and require simultaneously bu,i resource units. We assume that the holding time of class i call is exponentially distributed with mean _1_. Thus, the offered load is Pu i = ~ A Unicast P-u, ' J..tu,i customer whose requirement cannot be satisfied is blocked. Suppose that there is M multicast customer types, each class corresponds to a multicast session. Thus, an infinite user population can join each multicast session. That is, it is reasonable to consider that multicast customers of class i arrive according to a Poisson process with rate Am,i and has exponential residency time with parameter j.lm,i. Thus, the offered load is Pm,i = >'::,;:.. All the members of a given multicast session will require the same bandwidth capacity. That is, multicast customers of class i, will require bm,i resource units. Definition 1 i is an active class if there is at least one multicast customer of class i being served in the link. As calls of multicast class i will not be blocked if i is already active, then bm,i units of the system are allocated to a new arriving multicast customer of class i, only if i is not already an active class and there is at least bm,i free resources in the system. 2.2 PRODUCT FORM SOLUTION Under the preceeding assumptions, it is easy to see that the state of our system is described by the state vector n = (u, m) = (Ul,, Uu, ml,, mm). Here u is the vector number of calls in progress for unicast class and m is the state vector for multicast ones. Let n be the set of allowed states. n depends on the sharing policy P. In this paper, we address Complete Sharing policy (CS). However, join distribution will also have a product form solution for Upper Limit (UL) and Guaranteed Minimum (GM) policies.

4 564 Let l{mi>o} = 1 if i is an active class. Then, the set of allowed states 0 for CS policy can be written as: { U M 0= (u, m) / ~ bu,i' Ui + ~ bm,i.1{mi>o} (1) Theorem 1 The state probability corresponding to a resource sharing policy CS is given by : 1 U ti, M m, P () Il Pu,i Il Pm,i u,m = G(O). -.,' -., i=l Ut i=l m t (2) Where G (0) is the normalization constant for O. U u, M m,) G (0) = G (C, U, M) = 2: ( Il P~'i. Il Pm.',i U t. m t nen i=l t=l The proof is trivial since the state probability verifies the global equilibrium balance equation. 2.3 CALL BLOCKING PROBABILITY Let Bt denotes the sets of blocking states for unicast or multicast class i. Then, the call blocking probability for class i can be expressed as : (3) Pbi = 2: P(n) = 1-2: P(n) = 1-2: P(n) (4) Thus, (5) Furthermore, when i is a unicast class, then Kaufman [6] shows that the previous quantity can be expressed as : R. = 1 _ G (C - bu,;, U, M) bt,u G (C, U, M) (6)

5 565 Let M - i, denotes M multicast classes without the class i, which also means that the class i will never be active. Then, a similar expression for the multicast call blocking probability Pbi,m can be found. See the Appendix for the proof. epm,i G (C - bm,i, U, M - i) Pbi,m = 1- G (C, U, M) (7) 2.4 UNICAST CONNECTIONS In the previous section, we gave the exact solution to compute the call blocking probability for both multicast and unicast classes. However, the state system has as many dimensions as the number of traffic classes. Therefore, in a large system capacity C and a huge number of classes M + U, numerical difficulties may arise when computing both the normalization constant and the call blocking probability. Fortunately, Kaufman [6] found a solution to map the multi-dimensional state space into a one dimensional state space. It has been shown that the distribution of the number of resource units allocated for unicast connections has a recursive expression. Moreover, this formula is only linearly dependent on U. These results can also be applied in our model to compute the resource distribution for unicast connections. In fact, since the state probability has a product form, it can be easily verified that the multicast traffic has no consequences on the validity of the recursive solution. However, since the normalization constant in our model depends on both unicast and multicast connections, we have to consider first an unormalized state probability for resource distribution for the unicast traffic. Thus, let qu (.) be this quantity. Then: (8) Here j denotes the number of resource units allocated to the unicast connections and u.bu = L~l bu,iui. Kaufman [6] shows that qu (j) can be computed recursively as follow:,j < 0,j = 0,j> 0 (9)

6 MULTICAST CONNECTIONS The recursive solution given in the previous section cannot be applied for the multicast connections. However, in the last case, we find another solution to reduce the state space. Thus, let us define q M (.) as the unormalized state probability for resource distribution in the multicast traffic. Remembering that a class i request will never be blocked if i is an active class, an infinite population customer of the same class i can join an active class i. Thus, defining 1m.bm = 2:f!1 bm,i.1{mi>0} we can write: Thus, we find qm (j) = L II l{m.>o} {m:l m.bm=j} i=1 M ( +00 pm,.) """'~ ~ m' m,=1,. (10) qm (j) = L II l{m,>o} (e Pm., - 1) M {m:lm.bm=j},=1 (11) Now let qk (.) be the unormalized resource distribution probability for multicast classes whose index vary from of I to k. Let b~l denotes a k dimension capacity vector for multicast calls. Thus, 1~.b~n = 2::7=1 bm.i.1 {m, >O} k II l{m.>o} (e Pm. - 1) (12) Since this quantity can be divided into two parts, the first one represents the case where no customers of class k are being served, and the second one for the case where class k is active, then: qk (j) = 2::{m:l~.b~=jlmk=0} I17=1 l{m.>o} (e Pm. - 1) + 2::{m:l~.b~=jlmk>0} I17=1 l{m.>o} (e Pm., - 1) (13) Consider the left-side of the sum of equation 13, then this quantity can be written as follows: { 'lk-l bk - 1 m. m. m -} _ '} i=1 k-l II l{mi>o} (e Pm., - 1) = qk-j (j) (14)

7 567 The right-hand side of the sum of equation 13 can be written as follows: k-l (epm,k - 1) II l{m.>o} (e Pm,. - 1) { 'lk-l bk - 1 m. m. m -J _ '-b m,k } i=1 (15) We find the recursive formula for the multicast traffic:,j < O,Vk,j = O,Vk,j > 0, k = 0,j > 0, k > 0 (16) Finally, using 9 and 16 we can compute the normalization constant G (f2) : G (Il) = t. qm (i) (~qu (j)) (17) 2.6 MULTICAST CALL BLOCKING PROBABILITY A multicast call of class r is blocked only if r is not an acti ve class and there are less than bm,r free resource units in the link. Thus, let qm -r (.) be the unormalized resource distribution probability for multicast connections such that the class r is not active: M qm-r (j) = II l{m.>o} (epm" - 1) (18) Gi ven the recursi ve formula gi ven in 16 we obtain the following: Thus we have a recursive formula that will give the exact value of qm -r (j) { 0 qm-r (j) = 1 qm (j) - (epm,r - 1) qm-r (j - bm,r),j < 0,j = 0,j > 0 (20) Finally, the call blocking probability for unicast and multicast connections can be computed using the following equations:

8 568 fl,i,m = G ~n) t, (qu (j) ~ qm-i (C - j - k)) (22) 3. EXAMPLE We consider a link with a bandwidth capacity equal to 10 Mbps. Let the basic bandwidth unit be 64 Kbps. Thus, C = 160. We choose two unicast classes: U = 2 and four multicast classes: M = 4. For each class we take the following capacity requirements: bu,l = 32, bu,2 = 16A bm,k = 32, 'tk/1 :S k :S M We suppose that for both unicast and multicast mean call duration time are 120 seconds. Thus, to analyze the link occupancy at different loads, we introduce A as the inter-arrival time of a customer (unicast and multicast) in the link such as: Au,l = A Au,2 = 2A Varying A from 0 to 900, we compute using equations 21 and 22 the call blocking probability for unicast and multicast traffics. The results are plotted in figure 1. The figure shows that the call blocking probabilities for unicast traffics increase when the traffic load grows. However, multicast call blocking probabilities for all classes are always under a certain threshold. Thus, these probabilities increase until a certain value of A, after which they decrease. This is due to the fact that after a certain value of A, these classes will always be active. At this point, the traffic load is so high that there is at any time at least one multicast customer being served; thus, for these multicast sessions a new customer will never be blocked.

9 569 Unicast > Q..Q " 0. '" C... u '"..... u 0.2 " Lambda Figure J Call Blocking Probability 4. CONCLUSION In this paper, we addressed the multirate resource sharing problem for unicast and multicast traffics. We show that in Complete Sharing policy the model have a product form solution. Thus, we deduce the exact call blocking probability values for both unicast and multicast connections. Moreover, to avoid the numerical problems that may arise when computing these quantities, we extend the recursive solution of Kaufman [6] to the multicast case. Our future prospects will concern the adaptation of these results to other sharing policies, such as Upper Limit (UL) and Guaranteed Minimum (GM) policies. We also investigate the problem of multicast resource sharing in a wireless environment. Appendix Let us write G (n - Bn. This quantity can be divided into two parts, the first one represents the case where there is no customer of class i being served, thus, no blocking occurs for this class if the sum of the allocated resource units in the system is under C - bm,i' The second part of the equation represents

10 570 the case where the class i is active, that is no blocking for this class will occur. Therefore, We obtain that: G ( f"l _ Bt) =,",C-bm.i (.) (,",C-b m. - j (k)) H L..Jj=o qm-i J L..Jk=O qu + (e Pm, - 1) L:T::b m. qm-i (j - bm,i) (L:~==-6 qu (k)) (A. I) Thus, taking J = j - bm,i in the second sum of A.I we find that: G (0 - Bt) = e Pm, G (C - bm,i, U, M - i) (A.2) We can now deduce that the multicast call blocking probability for i is : epm G (C - bm,i, U, M - i) Pbi,m = 1- G (C, U, M) (A.3) References [1] C. Diot. Reliability in multicast services and protocols; a survey. In International Conference on Local and Metropolitan Communication Systems, December [2] Hans Eriksson. MBone: The Multicast Backbone. Communications of the ACM, 37:54-60, [3] D, Reeves H. Salama and Y. Viniotis. Evaluation of multicast routing algorithms for real-time communication on high-speed networks, IEEE Journal on Selected Areas in Communication, February [4] G. C. Polyzos J. C. Pasquale and G. Xylomenos. The multimedia multicasting problem. ACM Multimedia Systems Journal, 6(1 ):43-59, [5] S. Aalto J. Karvo, J. Virtamo and O. Martikainen. Blocking of dynamic multicast connections in a single link. In International Broadband Communications Conference. Future of Telecommunications, pages Paul J. Kuhn and Roya Ulrich Edition, April [6] D. Kaufman. Blocking in a shared resource environment. IEEE Transactions on communications, 29(10): , October [7] J. S. Turner. An optimal nonblocking multicast virtual circuit switch. Technical Report wucs-93-30, March [8] H. A. Wang and M. Schwartz. Performance analysis of multicast flow control algorithms over combined wireless/wired networks. In IEEE INFO COM'97, April 1997.

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

A Handover Optimisation Scheme in Cellular Networks

A Handover Optimisation Scheme in Cellular Networks A Handover Optimisation Scheme in Cellular Networks A.Gueroui and S.Boumerdassi Laboratoire PRiSM, Université de Versailles 45, Avenue des Etats-Unis 78035 Versailles France Laboratoire CEDRIC, CNAM 292,

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

A New Call Admission Control scheme for Real-time traffic in Wireless Networks

A New Call Admission Control scheme for Real-time traffic in Wireless Networks A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612

More information

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan

More information

Egyptian Computer Science Journal Vol. 38 No.3 September 2014

Egyptian Computer Science Journal Vol. 38 No.3 September 2014 Deploying IPTV Services Over Proposed Network for Yemen Universities Khaled O. Basulaim Dept. of Information Technology, Faculty of Engineering University of Aden k.basulaim@ycit-he.org Abstract Recently,

More information

ON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM

ON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM ON NEW STRATEGY FOR PRIORITISING THE SELECTED FLOW IN QUEUING SYSTEM Wojciech Burakowski, Halina Tarasiuk,RyszardSyski Warsaw University of Technology, Poland Institute of Telecommunications 00-665-Warsaw,

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer

More information

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks

Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE networks Expanding the use of CTS-to-Self mechanism to improving broadcasting on IEEE 802.11 networks Christos Chousidis, Rajagopal Nilavalan School of Engineering and Design Brunel University London, UK {christos.chousidis,

More information

Study of Load Balancing Schemes over a Video on Demand System

Study of Load Balancing Schemes over a Video on Demand System Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1

BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 ISSN 2277-2685 IJESR/May 2017/ Vol-7/Issue-5/40-45 Ashish Upadhayay / International Journal of Engineering & Science Research BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 1 Research Scholar,

More information

Evolved Multimedia Broadcast/Multicast Service (embms) in LTE-advanced

Evolved Multimedia Broadcast/Multicast Service (embms) in LTE-advanced Evolved Multimedia Broadcast/Multicast Service (embms) in LTE-advanced 1 Evolved Multimedia Broadcast/Multicast Service (embms) in LTE-advanced Separation of control plane and data plane Image from: Lecompte

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

FUTURE communication networks are expected to support

FUTURE communication networks are expected to support 1146 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 13, NO 5, OCTOBER 2005 A Scalable Approach to the Partition of QoS Requirements in Unicast and Multicast Ariel Orda, Senior Member, IEEE, and Alexander Sprintson,

More information

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions

Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Performance Analysis of Integrated Voice and Data Systems Considering Different Service Distributions Eser Gemikonakli University of Kyrenia, Kyrenia, Mersin 10, Turkey Abstract In this study, the aim

More information

QoS Mapping along the Protocol Stack: Discussion and Preliminary Results

QoS Mapping along the Protocol Stack: Discussion and Preliminary Results QoS Mapping along the Protocol Stack: Discussion and Preliminary Results Luiz A. DaSilva Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Alexandria

More information

Lecture 17 Multimedia Transport Subsystem (Part 3)

Lecture 17 Multimedia Transport Subsystem (Part 3) CS 414 Multimedia Systems Design Lecture 17 Multimedia Transport Subsystem (Part 3) Klara Nahrstedt Spring 2010 Administrative MP2: deadline Monday, March 1, demos 5-7pm (sign up in class on Monday) HW1:

More information

DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS

DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS DYNAMIC RESOURCE ALLOCATION FOR LAYER- ENCODED VIDEO MULTICASTING OVER WIMAX NETWORKS 1 C. NISHANT PAUL, 2 V. SAKTHIVEL 1 P.G. Student, School Of Computing, SASTRA University, Thanjavur 613401, India.

More information

Performance analysis of voip over wimax

Performance analysis of voip over wimax Performance analysis of voip over wimax Shima Faisal Ahmed Muhi-Aldean 1, Amin Babiker 2 1,2 Department of Communications, Faculty of Engineering Al Neelain University, Khartoum,Sudan Abstract: Voice over

More information

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service

Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service PUBLISHED IN: PROCEEDINGS OF THE EUROPEAN WIRELESS 2006 CONFERENCE 1 Analysis of a Multiple Content Variant Extension of the Multimedia Broadcast/Multicast Service George Xylomenos, Konstantinos Katsaros

More information

The Case for Reexamining Multimedia File System Design

The Case for Reexamining Multimedia File System Design The Case for Reexamining Multimedia File System Design Position Statement Prashant Shenoy Department of Computer Science, University of Massachusetts, Amherst, MA 01003. shenoy@cs.umass.edu Research in

More information

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Suriti Gupta College of Technology and Engineering Udaipur-313001 Vinod Kumar College of Technology and Engineering Udaipur-313001

More information

MITIGATING THE EFFECT OF PACKET LOSSES ON REAL-TIME VIDEO STREAMING USING PSNR AS VIDEO QUALITY ASSESSMENT METRIC ABSTRACT

MITIGATING THE EFFECT OF PACKET LOSSES ON REAL-TIME VIDEO STREAMING USING PSNR AS VIDEO QUALITY ASSESSMENT METRIC ABSTRACT MITIGATING THE EFFECT OF PACKET LOSSES ON REAL-TIME VIDEO STREAMING USING PSNR AS VIDEO QUALITY ASSESSMENT METRIC Anietie Bassey, Kufre M. Udofia & Mfonobong C. Uko Department of Electrical/Electronic

More information

Interworking of B-ISDN Signaling and Internet Protocol

Interworking of B-ISDN Signaling and Internet Protocol Interworking of -ISDN Signaling and Internet Protocol Muneyoshi Suzuki NTT Information Sharing Platform Laboratories 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585, Japan suzuki@nal.ecl.net Abstract.

More information

Ch.16 - Wireless WAN System Architectures

Ch.16 - Wireless WAN System Architectures Ch.16 - Wireless WAN System Architectures 1 Wireless WAN 2 GSM via PSTN 3 GSM via ISDN 4 GPRS 5 Mobitex 6 CDPD 7 PPDC 8 UMTS 9 Future Systems 10 Systems Summary 1 11 Systems Summary 2 1 This section will

More information

An Enhanced Dynamic Packet Buffer Management

An Enhanced Dynamic Packet Buffer Management An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path

On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia

More information

RECURSIVE PATCHING An Efficient Technique for Multicast Video Streaming

RECURSIVE PATCHING An Efficient Technique for Multicast Video Streaming ECUSIVE ATCHING An Efficient Technique for Multicast Video Streaming Y. W. Wong, Jack Y. B. Lee Department of Information Engineering The Chinese University of Hong Kong, Shatin, N.T., Hong Kong Email:

More information

Network Performance Analysis

Network Performance Analysis Network Performance Analysis Network Performance Analysis Thomas Bonald Mathieu Feuillet Series Editor Pierre-Noël Favennec First published 2011 in Great Britain and the United States by ISTE Ltd and

More information

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks

Compressive Sensing for Multimedia. Communications in Wireless Sensor Networks Compressive Sensing for Multimedia 1 Communications in Wireless Sensor Networks Wael Barakat & Rabih Saliba MDDSP Project Final Report Prof. Brian L. Evans May 9, 2008 Abstract Compressive Sensing is an

More information

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 333-339 (2002) Short aper An Evaluation of Deficit Round Robin Fair ueuing Applied in Router Congestion Control Department of Electrical Engineering National

More information

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio

Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Performance Study of Interweave Spectrum Sharing Method in Cognitive Radio Abstract Spectrum scarcity is one of the most critical recent problems in the field of wireless communication One of the promising

More information

Audio Streams Merging Over ALMI

Audio Streams Merging Over ALMI Audio Streams Merging Over ALMI Christopher J. Dunkle, Zhen Zhang, Sherlia Y. Shi, Zongming Fei Department of Computer Science University of Kentucky 301 Rose Street, 2 nd floor Lexington, KY 40506-0495,

More information

Transport Performance Evaluation of an ATM-based UMTS Access Network

Transport Performance Evaluation of an ATM-based UMTS Access Network Transport Performance Evaluation of an -based US Access Network Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos University of Athens, Department of Informatics, Communication Networks Laboratory

More information

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC

DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC DELAY-CONSTRAINED MULTICAST ROUTING ALGORITHM BASED ON AVERAGE DISTANCE HEURISTIC Zhou Ling 1, 2, Ding Wei-xiong 2 and Zhu Yu-xi 2 1 Department of Information Science and Engineer, Central South University,

More information

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression,

To address these challenges, extensive research has been conducted and have introduced six key areas of streaming video, namely: video compression, Design of an Application Layer Congestion Control for Reducing network load and Receiver based Buffering Technique for packet synchronization in Video Streaming over the Internet Protocol Mushfeq-Us-Saleheen

More information

Insensitive Traffic Splitting in Data Networks

Insensitive Traffic Splitting in Data Networks Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK Wojciech Burakowski Monika Fudala Halina Tarasiuk Institute of Telecommunications, Warsaw University of Technology ul. Nowowiejska 15/19, 00-665 Warsaw,

More information

Probability Admission Control in Class-based Video-on-Demand System

Probability Admission Control in Class-based Video-on-Demand System Probability Admission Control in Class-based Video-on-Demand System Sami Alwakeel and Agung Prasetijo Department of Computer Engineering College of Computer and Information Sciences, King Saud University

More information

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr

More information

A Flow Label Based QoS Scheme for End-to-End Mobile Services

A Flow Label Based QoS Scheme for End-to-End Mobile Services A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract

More information

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems

A Timer-based Session Setup Procedure in Cellular-WLAN Integrated Systems his paper was presented as part of the Mobility Management in the Networks of the Future World (MobiWorld) Workshop at A -based Session Setup Procedure in Cellular-WLAN Integrated Systems Gwangwoo Park,

More information

Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security

Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security Efficient Implementation of VoIP Over VPN w.r.t Packet Delay and Data Security ABSTRACT Muhammad Wasim Abbas Ashraf * & Ahsan Raza Sattar ** *Computer Science, University of Agriculture, Faisalabad, Punjab,

More information

11 An efficient rate allocation algorithm for ATM networks providing max-min fairness

11 An efficient rate allocation algorithm for ATM networks providing max-min fairness 11 An efficient rate allocation algorithm for ATM networks providing max-min fairness L. Kalampoukas, A. Varma* Computer Engineering Department University of California, Santa Cruz, CA 95064, USA E-mail:

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS

PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Discussiones Mathematicae Graph Theory xx (xxxx) 1 13 doi:10.7151/dmgt.2106 PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Vladislav Taranchuk Department of Mathematics and Statistics California State

More information

Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2

Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 A General Performance Evaluation Framework for Network Selection Strategies in 3G-WLAN Interworking Networks Hao Wang 1, Dave Laurenson 1, and Jane Hillston 2 1 Institute for Digital Communications 2 Laboratory

More information

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding

Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Abstract

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

Web Usage Mining: How to Efficiently Manage New Transactions and New Clients

Web Usage Mining: How to Efficiently Manage New Transactions and New Clients Web Usage Mining: How to Efficiently Manage New Transactions and New Clients F. Masseglia 1,2, P. Poncelet 2, and M. Teisseire 2 1 Laboratoire PRiSM, Univ. de Versailles, 45 Avenue des Etats-Unis, 78035

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Parallel Packet Copies for Multicast

Parallel Packet Copies for Multicast Do you really need multicast? At line rates? Less is More J Parallel Packet Copies for Multicast J.1 Introduction Multicasting is the process of simultaneously sending the same data to multiple destinations

More information

654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006

654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006 654 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 55, NO. 2, MARCH 2006 Optimal Resource Allocation and Adaptive Call Admission Control for Voice/Data Integrated Cellular Networks Chi Wa Leong, Weihua

More information

WiMax-based Handovers in Next Generation Networks

WiMax-based Handovers in Next Generation Networks WiMax-based Handovers in Next Generation Networks Nadine Akkari Department of Computer Science Faculty of Computing and Information Technology King Abdulaziz University, Saudi Arabia nakkari@kau.edu.sa

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Multimedia Document Communications over Wireless Network

Multimedia Document Communications over Wireless Network Multimedia Document Communications over Wireless Network 1 Convergence of Mobile Services Personal computer Access to any data Internet Telecommunications Mobile Technology Ubiquitous Portable processing

More information

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Enhanced Parity Packet Transmission for Video Multicast using R-DSTC Özgü Alay, Zhili Guo, Yao Wang, Elza Erkip

More information

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Packet Switching. Hongwei Zhang  Nature seems to reach her ends by long circuitous routes. Problem: not all networks are directly connected Limitations of directly connected networks: limit on the number of hosts supportable limit on the geographic span of the network Packet Switching Hongwei

More information

The Fulfillment of Design and Simulation for Bandwidth Allocation Algorithm Based on User Satisfaction and Profit

The Fulfillment of Design and Simulation for Bandwidth Allocation Algorithm Based on User Satisfaction and Profit 2011 International Conference on Information Communication and Management IPCSIT vol.16 (2011) (2011) IACSIT Press, Singapore The Fulfillment of Design and Simulation for andwidth Allocation Algorithm

More information

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users

Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized Secondary Users Mobile Information Systems Volume 2016, Article ID 3297938, 8 pages http://dx.doi.org/10.1155/2016/3297938 Research Article Optimization of Access Threshold for Cognitive Radio Networks with Prioritized

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

Traffic Analysis and Modeling of Real World Video Encoders

Traffic Analysis and Modeling of Real World Video Encoders Traffic Analysis and Modeling of Real World Video Encoders KLIMIS NTALIANIS, NIKOLAOS DOULAMIS, ANASTASIOS DOULAMIS AND STEFANOS KOLLIAS Department of Electrical and Computer Engineering National Technical

More information

For q»p, a similar expression can be given replacing C:.t(i) by C:.t(i). The coefficients C:.t(i) and

For q»p, a similar expression can be given replacing C:.t(i) by C:.t(i). The coefficients C:.t(i) and Exact calculation of computer network reliability by E. HANSLER IBM Research Laboratory Ruschlikon, Switzerland G. K. McAULIFFE IBM Corporation Dublin, Ireland and R. S. WILKOV IBM Corporation Armonk,

More information

Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-S

Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-S Internet Multimedia Architecture Outline Overview Multimedia Applications Signaling Protocols (SIP/SDP, SAP, H.323, MGCP) Streaming Protocols (RTP, RTSP, HTTP, etc.) QoS (RSVP, Diff-Serv, IntServ) Conclusions

More information

On the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling

On the Role of Weibull-type Distributions in NHPP-based Software Reliability Modeling International Journal of Performability Engineering Vol. 9, No. 2, March 2013, pp. 123-132. RAMS Consultants Printed in India On the Role of Weibull-type Distributions in NHPP-based Software Reliability

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Queue Theory based Response Time Analyses for Geo-Information Processing Chain

Queue Theory based Response Time Analyses for Geo-Information Processing Chain Queue Theory based Response Time Analyses for Geo-Information Processing Chain Jie Chen, Jian Peng, Min Deng, Chao Tao, Haifeng Li a School of Civil Engineering, School of Geosciences Info-Physics, Central

More information

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET

70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET 70 CHAPTER 1 COMPUTER NETWORKS AND THE INTERNET one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded?

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Multicast Sandpit Alpha Release. Invitation for Expressions of Interest

Multicast Sandpit Alpha Release. Invitation for Expressions of Interest Multicast Sandpit Alpha Release Invitation for Expressions of Interest 1 NBN Co Limited Multicast Sandpit Alpha Release Invitation for Expressions of Interest Copyright This Information Paper is subject

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

Broadcast Repair for Wireless Distributed Storage Systems

Broadcast Repair for Wireless Distributed Storage Systems Broadcast Repair for Wireless Distributed Storage Systems Ping Hu Department of Electronic Engineering City University of Hong Kong Email: ping.hu@my.cityu.edu.hk Chi Wan Sung Department of Electronic

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 2: Overview of Computer Network Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

Call Processing Architecture and Algorithms for Future Network

Call Processing Architecture and Algorithms for Future Network 22 Call Processing Architecture and Algorithms for Future Network Geonung Kim, Sunshin An Department of Electronic Engineering Korea University 1, 5-ka, Anam-dong, Sungbuk-ku, SEOUL, 136-701, KOREA Phone:

More information

Deliverable D1.29 MCP/VDES inter-operability report

Deliverable D1.29 MCP/VDES inter-operability report Deliverable D1.29 MCP/VDES inter-operability report Project no. 636329 Project acronym: EfficienSea2 Project full title: EFFICIENSEA2 efficient, safe and sustainable traffic at sea Funding scheme: Innovation

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Impact of Voice Coding in Performance of VoIP

Impact of Voice Coding in Performance of VoIP Impact of Voice Coding in Performance of VoIP Batoul Alia Baker Koko 1, Dr. Mohammed Abaker 2 1, 2 Department of Communication Engineering, Al-Neelain University Abstract: Voice over Internet Protocol

More information

Why is scheduling so difficult?

Why is scheduling so difficult? Queueing Page 1 Why is scheduling so difficult? Wednesday, November 8, 2017 7:35 AM Scheduling is a matter of great controversy. Should it be fair? (O(log n)) Should it instead be fast? (O(1)) As well,

More information

Edge Switch. setup. reject. delay. setup. setup ack. offset. burst. burst. release. φ l. long burst. short burst. idle. p s

Edge Switch. setup. reject. delay. setup. setup ack. offset. burst. burst. release. φ l. long burst. short burst. idle. p s Performance Modeling of an Edge Optical Burst Switching ode Lisong Xu, Harry G Perros, George Rouskas Computer Science Department orth Carolina State University Raleigh, C 27695-7534 E-mail: flxu2,hp,rouskasg@cscncsuedu

More information

Multiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing

Multiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing Multiple LAN Internet Protocol Converter (MLIC) for Multimedia Conferencing Tat Chee Wan (tcwan@cs.usm.my) R. Sureswaran (sures@cs.usm.my) K. Saravanan (sara@network2.cs.usm.my) Network Research Group

More information

Department of Electrical and Computer Systems Engineering

Department of Electrical and Computer Systems Engineering Department of Electrical and Computer Systems Engineering Technical Report MECSE-6-2006 Medium Access Control (MAC) Schemes for Quality of Service (QoS) provision of Voice over Internet Protocol (VoIP)

More information

Mobile Positioning System Based on the Wireless Sensor Network in Buildings

Mobile Positioning System Based on the Wireless Sensor Network in Buildings Communications and Network, 2009, 1, 96-100 doi:10.4236/cn.2009.12015 Published Online November 2009 (http://www.scirp.org/journal/cn). Mobile Positioning System Based on the Wireless Sensor Network in

More information

ON BANDWIDTH RESERVATION POLICIES IN BROADBAND WIRELESS NETWORKS

ON BANDWIDTH RESERVATION POLICIES IN BROADBAND WIRELESS NETWORKS ON BANDWIDTH RESERVATION POLICIES IN BROADBAND WIRELESS NETWORKS Jelena Misic and Tam Yik Bun Department of Computer Science, Hong Kong University of Science and Technology Clear Water Bay, Kowloon, Hong

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Multimedia Networking. Network Support for Multimedia Applications

Multimedia Networking. Network Support for Multimedia Applications Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)

More information

Development of Time-Dependent Queuing Models. in Non-Stationary Condition

Development of Time-Dependent Queuing Models. in Non-Stationary Condition The 11th Asia Pacific Industrial Engineering and Management Systems Conference Development of Time-Dependent Queuing Models in Non-Stationary Condition Nur Aini Masruroh 1, Subagyo 2, Aulia Syarifah Hidayatullah

More information

Live P2P Streaming with Scalable Video Coding and Network Coding

Live P2P Streaming with Scalable Video Coding and Network Coding School of Computing Science Simon Fraser University, Canada Live P2P Streaming with Scalable Video Coding and Network Coding Mohamed dhefeeda (Joint work with Shabnam Mirshokraie) 22 February 2010 Mohamed

More information

Network Systems for Emerging WAN Applications

Network Systems for Emerging WAN Applications Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking

More information

Adaptive QoS Platform in Multimedia Networks

Adaptive QoS Platform in Multimedia Networks Adaptive QoS Platform in Multimedia Networks Mahmoud Sherif, Ibrahim Habib, Mahmoud Naghshineh, and Parviz Kermani CUNY Graduate School and Department of Electrical Engineering The City College of New

More information