• Title/Summary/Keyword: End-to-end Delay

Search Result 762, Processing Time 0.031 seconds

Evaluating the Capacity of Internet Backbone Network in Terms of the Quality Standard of Internet Phone (인터넷 전화 품질 기준 측면에서 인터넷 백본 네트워크의 용량 평가)

  • Kim, Tae-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10B
    • /
    • pp.928-938
    • /
    • 2008
  • Though services requiring Quality-of-Service (QoS) guarantees such as Voice over Internet Protocol (VoIP) have been widely deployed on the internet, most of internet backbone networks, unfortunately, do not distinguish them from the best-effort services. Thus estimating the effective capacity meaning the traffic volume that the backbone networks maximally accommodate with keeping QoS guarantees for the services is very important for Internet Service Providers. This paper proposes a test-bed based on ns-2 to evaluate the effective capacity of backbone networks and then estimates the effective capacity of an experimental backbone network using the test-bed in terms of the service standard of the VoIP service. The result showed that the effective capacity of the network is estimated as between 12% and 55% of its physical capacity, which is depending on the maximum delay guarantee probability, and strongly affected by not only the type of offered workload but also the quality standard. Especially, it demonstrated that in order to improve the effective capacity the maximum end-to-end delay requirement of the VoIP service needs to be loosened in terms of the probability to guarantee.

Implementation of Network Traffic and QoS Monitoring System based on User Agent (사용자 에이전트 기반의 네트워크 트래픽 및 QoS 모니터링 시스템 구현)

  • Lee, Do-Hyeon;Jung, Jae-Il
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.41-50
    • /
    • 2008
  • Recently amount of traffic into the network rapidly increase since multimedia streaming services is generally adopted for application. In addition, various network management systems have been suggested for providing a stable service and QoS guarantee. It is necessary for such systems to have QoS monitoring module in order to evaluate acceptance or violation of QoS requirements by analogizing a state information of each node within network. In this paper, we suggest a network management system to evaluate QoS level between end-to-end agents and analysis traffics transmitted between them. The proposed system is implemented for the purpose of collecting network traffic information and monitoring of the view. The proposed system makes user easily understand information of QoS parameters such as throughput, delay and jitter by adopting a method of visual and numerical representation. To achieve this, we purportedly generate test packet into network for confirming acceptance or violation of QoS requirements from point of view of multimedia application service.

  • PDF

FTCARP: A Fault-Tolerant Routing Protocol for Cognitive Radio Ad Hoc Networks

  • Che-aron, Zamree;Abdalla, Aisha Hassan;Abdullah, Khaizuran;Rahman, Md. Arafatur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.371-388
    • /
    • 2014
  • Cognitive Radio (CR) has been recently proposed as a promising technology to remedy the problems of spectrum scarcity and spectrum underutilization by enabling unlicensed users to opportunistically utilize temporally unused licensed spectrums in a cautious manner. In Cognitive Radio Ad Hoc Networks (CRAHNs), data routing is one of the most challenging tasks since the channel availability and node mobility are unpredictable. Moreover, the network performance is severely degraded due to large numbers of path failures. In this paper, we propose the Fault-Tolerant Cognitive Ad-hoc Routing Protocol (FTCARP) to provide fast and efficient route recovery in presence of path failures during data delivery in CRAHNs. The protocol exploits the joint path and spectrum diversity to offer reliable communication and efficient spectrum usage over the networks. In the proposed protocol, a backup path is utilized in case a failure occurs over a primary transmission route. Different cause of a path failure will be handled by different route recovery mechanism. The protocol performance is compared with that of the Dual Diversity Cognitive Ad-hoc Routing Protocol (D2CARP). The simulation results obviously prove that FTCARP outperforms D2CARP in terms of throughput, packet loss, end-to-end delay and jitter in the high path-failure rate CRAHNs.

EEDARS: An Energy-Efficient Dual-Sink Algorithm with Role Switching Mechanism for Event-Driven Wireless Sensor Networks

  • Eslaminejad, Mohammadreza;Razak, Shukor Abd;Ismail, Abdul Samad Haji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2473-2492
    • /
    • 2012
  • Energy conservation is a vital issue in wireless sensor networks. Recently, employing mobile sinks for data gathering become a pervasive trend to deal with this problem. The sink can follow stochastic or pre-defined paths; however the controlled mobility pattern nowadays is taken more into consideration. In this method, the sink moves across the network autonomously and changes its position based on the energy factors. Although the sink mobility would reduce nodes' energy consumption and enhance the network lifetime, the overhead caused by topological changes could waste unnecessary power through the sensor field. In this paper, we proposed EEDARS, an energy-efficient dual-sink algorithm with role switching mechanism which utilizes both static and mobile sinks. The static sink is engaged to avoid any periodic flooding for sink localization, while the mobile sink adaptively moves towards the event region for data collection. Furthermore, a role switching mechanism is applied to the protocol in order to send the nearest sink to the recent event area, hence shorten the path. This algorithm could be employed in event-driven and multi-hop scenarios. Analytical model and extensive simulation results for EEDARS demonstrate a significant improvement on the network metrics especially the lifetime, the load and the end-to-end delay.

Remote Monitoring with Hierarchical Network Architectures for Large-Scale Wind Power Farms

  • Ahmed, Mohamed A.;Song, Minho;Pan, Jae-Kyung;Kim, Young-Chon
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1319-1327
    • /
    • 2015
  • As wind power farm (WPF) installations continue to grow, monitoring and controlling large-scale WPFs presents new challenges. In this paper, a hierarchical network architecture is proposed in order to provide remote monitoring and control of large-scale WPFs. The network architecture consists of three levels, including the WPF comprised of wind turbines and meteorological towers, local control center (LCC) responsible for remote monitoring and control of wind turbines, and a central control center (CCC) that offers data collection and aggregation of many WPFs. Different scenarios are considered in order to evaluate the performance of the WPF communications network with its hierarchical architecture. The communications network within the WPF is regarded as the local area network (LAN) while the communication among the LCCs and the CCC happens through a wide area network (WAN). We develop a communications network model based on an OPNET modeler, and the network performance is evaluated with respect to the link bandwidth and the end-to-end delay measured for various applications. As a result, this work contributes to the design of communications networks for large-scale WPFs.

Fixed Relays for Next Generation Wireless Systems - System Concept and Performance Evaluation

  • Pabst Ralf;Esseling Norbert;Walke Bernhard H.
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.104-114
    • /
    • 2005
  • This work presents a concept and the related analysis of the traffic performance for a wireless broadband system based on fixed relay stations acting as wireless bridges. The analysis focuses on the important performance indicators end-to-end throughput and delay, taking into account the effects of an automated repeat request protocol. An extension to a MAC frame based access protocol like IEEE 802.11e, 802.15.3, 802.16a, and HIPERLAN2 is outlined and taken as basis for the calculations. The system is intended for both dense populated areas as an overlay to cellular radio systems and to provide wide-area broad-band coverage. The two possible deployment scenarios for both dense urban and wide-area environments are introduced. Analytical and validating simulation results are shown, proving the suitability of the proposed concept for both of the mentioned scenarios. It is established that the fixed relaying concept is well suited to substantially contribute to provide high capacity cellular broad-band radio coverage in next generation (NG) cellular wireless broadband systems.

Fast Recovery Routing Algorithm for Software Defined Network based Operationally Responsive Space Satellite Networks

  • Jiang, Lei;Feng, Jing;Shen, Ye;Xiong, Xinli
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.2936-2951
    • /
    • 2016
  • An emerging satellite technology, Operationally Responsive Space (ORS) is expected to provide a fast and flexible solution for emergency response, such as target tracking, dense earth observation, communicate relaying and so on. To realize large distance transmission, we propose the use of available relay satellites as relay nodes. Accordingly, we apply software defined network (SDN) technology to ORS networks. We additionally propose a satellite network architecture refered to as the SDN-based ORS-Satellite (Sat) networking scheme (SDOS). To overcome the issures of node failures and dynamic topology changes of satellite networks, we combine centralized and distributed routing mechanisms and propose a fast recovery routing algorithm (FRA) for SDOS. In this routing method, we use centralized routing as the base mode.The distributed opportunistic routing starts when node failures or congestion occur. The performance of the proposed routing method was validated through extensive computer simulations.The results demonstrate that the method is effective in terms of resoving low end-to-end delay, jitter and packet drops.

eMCCA: An Enhanced Mesh Coordinated Channel Access Mechanism for IEEE 802.11s Wireless Mesh Networks

  • Islam, Md. Shariful;Alam, Muhammad Mahbub;Hong, Choong-Seon;Lee, Sung-Won
    • Journal of Communications and Networks
    • /
    • v.13 no.6
    • /
    • pp.639-654
    • /
    • 2011
  • In this paper, we present a channel access mechanism, referred to as the enhanced mesh coordinated channel access (eMCCA) mechanism, for IEEE 802.11s-based wireless mesh networks. The current draft of IEEE 802.11s includes an optional medium access control (MAC), denoted as MCCA, which is designed to provide collision-free and guaranteed channel access during reserved periods. However, the MCCA mechanism fails to achieve the desired goal in the presence of contending non-MCCA nodes; this is because non-MCCA nodes are not aware of MCCA reservations and have equal access opportunities during reserved periods. We first present a probabilistic analysis that reveals the extent to which the performance of MCCA may be affected by contending non-MCCA nodes. We then propose eMCCA, which allows MCCA-enabled nodes to enjoy collision-free and guaranteed channel access during reserved periods by means of prioritized and preemptive access mechanisms. Finally, we evaluate the performance of eMCCA through extensive simulations under different network scenarios. The simulation results indicate that eMCCA outperforms other mechanisms in terms of success rate, network throughput, end-to-end delay, packet-loss rate, and mesh coordinated channel access opportunity-utilization.

Improve ARED Algorithm in TCP/IP Network (TCP/IP 네트워크에서 ARED 알고리즘의 성능 개선)

  • Nam, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.177-183
    • /
    • 2007
  • Active queue management (AQM) refers to a family of packet dropping mechanisms for router queues that has been proposed to support end-to-end congestion control mechanisms in the Internet. The proposed AQM algorithm by the IETF is Random Early Detection (RED). The RED algorithm allows network operators simultaneously to achieve high throughput and low average delay. However. the resulting average queue length is quite sensitive to the level of congestion. In this paper, we propose the Refined Adaptive RED(RARED), as a solution for reducing the sensitivity to parameters that affect RED performance. Based on simulations, we observe that the RARED scheme improves overall performance of the network. In particular, the RARED scheme reduces packet drop rate and improves goodput.

  • PDF

Energy efficient watchman based flooding algorithm for IoT-enabled underwater wireless sensor and actor networks

  • Draz, Umar;Ali, Tariq;Zafar, Nazir Ahmad;Alwadie, Abdullah Saeed;Irfan, Muhammad;Yasin, Sana;Ali, Amjad;Khattak, Muazzam A. Khan
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.414-426
    • /
    • 2021
  • In the task of data routing in Internet of Things enabled volatile underwater environments, providing better transmission and maximizing network communication performance are always challenging. Many network issues such as void holes and network isolation occur because of long routing distances between nodes. Void holes usually occur around the sink because nodes die early due to the high energy consumed to forward packets sent and received from other nodes. These void holes are a major challenge for I-UWSANs and cause high end-to-end delay, data packet loss, and energy consumption. They also affect the data delivery ratio. Hence, this paper presents an energy efficient watchman based flooding algorithm to address void holes. First, the proposed technique is formally verified by the Z-Eves toolbox to ensure its validity and correctness. Second, simulation is used to evaluate the energy consumption, packet loss, packet delivery ratio, and throughput of the network. The results are compared with well-known algorithms like energy-aware scalable reliable and void-hole mitigation routing and angle based flooding. The extensive results show that the proposed algorithm performs better than the benchmark techniques.