Spelling suggestions: "subject:"computer network, protocol"" "subject:"coomputer network, protocol""
211 |
Constraint-based software for broadband networks planning : a software framework for planning with the holistic approachManaf, Afwarman, 1962- January 2000 (has links)
Abstract not available
|
212 |
Constraint-based software for broadband networks planninga software framework for planning with the holistic approach /Manaf, Afwarman,1962- January 2000 (has links)
For thesis abstract select View Thesis Title, Contents and Abstract
|
213 |
An empirical investigation of SSDLFornasier, Patric, Computer Science & Engineering, Faculty of Engineering, UNSW January 2007 (has links)
The SOAP Service Description Language (SSDL) is a SOAP-centric language for describing Web Service contracts. SSDL focuses on message abstraction as the building block for creating service-oriented applications and provides an extensible range of protocol frameworks that can be used to describe and formally model Web Service interactions. SSDL's natural alignment with service-oriented design principles intuitively suggests that it encourages the creation of applications that adhere to this architectural paradigm. Given the lack of tools and empirical data for using SSDL as part of Web Services-based SOAs, we identified the need to investigate its practicability and usefulness through empirical work. To that end we have developed Soya, a programming model and runtime environment for creating and executing SSDL-based Web Services. On the one hand, Soya provides straightforward programming abstractions that foster message-oriented thinking. On the other hand, it leverages contemporary tooling (i.e. Windows Communication Foundation) with SSDL-related runtime functionality and semantics. In this thesis, we describe the design and architecture of Soya and show how it makes it possible to use SSDL as an alternative and powerful metadata language without imposing unrealistic burdens on application developers. In addition, we use Soya and SSDL in a case study which provides a set of initial empirical results with respect to SSDL's strengths and drawbacks. In summary, our work serves as a knowledge framework for better understanding message-oriented Web Service development and demonstrates SSDL's practicability in terms of implementation and usability.
|
214 |
Traffic engineering for multi-homed mobile networks.Chung, Albert Yuen Tai, Computer Science & Engineering, Faculty of Engineering, UNSW January 2007 (has links)
This research is motivated by the recent developments in the Internet Engineering Task Force (IETF) to support seamless integration of moving networks deployed in vehicles to the global Internet. The effort, known as Network Mobility (NEMO), paves the way to support high-speed Internet access in mass transit systems, e.g. trains; buses; ferries; and planes; through the use of on-board mobile routers embedded in the vehicle. One of the critical research challenges of this vision is to achieve high-speed and reliable back-haul connectivity between the mobile router and the rest of the Internet. The problem is particularly challenging due to the fact that a mobile router must rely on wireless links with limited bandwidth and unpredictable quality variations as the vehicle moves around. In this thesis, the multi-homing concept is applied to approach the problem. With multi-homing, mobile router has more than one connection to the Internet. This is achieved by connecting the mobile router to a diverse array of wireless access technologies (e.g., GPRS, CDMA, 802.11, and 802.16) and/or a multiplicity of wireless service providers. While the aggregation helps addressing the bandwidth problem, quality variation problem can be mitigated by employing advanced traffic engineering techniques that dynamically control inbound and outbound traffic over multiple connections. More specifically, the thesis investigates traffic engineering solutions for mobile networks that can effectively address the performance objectives, e.g. maximizing profit for mobile network operator; guaranteeing quality of service for the users; and maintaining fair access to the back-haul bandwidth. Traffic engineering solutions with three different levels of control have been investigated. First, it is shown, using detailed computer simulation of popular applications and networking protocols(e.g., File Transfer Protocol and Transmission Control Protocol), that packet-level traffic engineering which makes decisions of which Internet connection to use for each and every packet, leads to poor system throughput. The main problem with packet-based traffic engineering stems from the fact that in mobile environment where link bandwidths and delay can vary significantly, packets using different connections may experience different delays causing unexpected arrivals at destinations. Second, a maximum utility flow-level traffic engineering has been proposed that aims to maximize a utility function that accounts for bandwidth utilization on the one hand, and fairness on the other. The proposed solution is compared against previously proposed flow-level traffic engineering schemes and shown to have better performance in terms of throughput and fairness. The third traffic engineering proposal addresses the issue of maximizing operator?s profit when different Internet connections have different charging rates, and guaranteeing per user bandwidth through admission control. Finally, a new signaling protocol is designed to allow the mobile router to control its inbound traffic.
|
215 |
Quantification, characterisation and impact evaluation of mobile IPv6 hand off timesBanh, Mai Thi Quynh, n/a January 2005 (has links)
There is a growing range of IP-based data and voice applications using mobile devices (e.g. 3rd ,
4th generation mobile phones and PDAs) and new access technologies (e.g. Bluetooth, 802.11,
GPRS, ADSL). This growth is driving a desire to support mobility at the IP level � in other
words, allowing an IP host to keep on communicating with other hosts while roaming between
different IP subnetworks.
Mobile IPv6 allows hosts to move their physical and topological attachment points around
an IPv6 network while retaining connectivity through a single, well-known Home Address.
Although Mobile IPv6 has been the subject of simulation studies, the real-world dynamic
behavior of Mobile IPv6 is only gradually being experimentally characterised and analysed.
This thesis reviews the use of Mobile IPv6 to support mobility between independent
802.11b-attached IPv6 subnets, and experimentally measures and critically evaluates how long
an end to end IP path is disrupted when a Mobile IPv6 node shifts from one subnetwork to
another (handoff time). The thesis describes the development of an experimental testbed
suitable for gathering real-world Mobile IPv6 handoff data using publicly available, standards compliant
implementations of Mobile IPv6. (An open-source Mobile IPv6 stack (the KAME
release under FreeBSD) was deployed).
The component of handoff time due to 802.11b link layer handoff is measured separately to
assess its impact on the overall Mobile IPv6 handoff time. Using Mobile IPv6 handoff results,
the likely performance impact of Mobile IPv6 handoff on a common webcam application and a
bulk TCP data transfer is also evaluated. The impact of handoff on these applications clearly
shows that a default Mobile IPv6 environment would be highly disruptive to real-time and
interactive applications during handoff events, even if the underlying link-layer handoff was
instantaneous.
|
216 |
Network mobility management for next generation mobile systemsPerera, Algamakoralage Eranga Gayani, Electrical Engineering & Telecommunications, Faculty of Engineering, UNSW January 2007 (has links)
The future Internet will need to cater for an increasing number of powerful devices and entire groups of networks to roam in heterogeneous access networks. The current approach towards meeting such requirements, which is to retrofit mobility solutions to different layers of the protocol stack, has given rise to an increasingly fragmented network control layer. Furthermore, retrofitting solutions in an ad-hoc manner to the protocol stack does not provide consistent support from the network to different applications. This lack of a common control layer for facilitating roaming in heterogeneous networking environments represents a crucial challenge both technically and from a user perspective. To this end, a novel mobility architecture forms the basis and the first part of this dissertation. The work on investigating current network mobility solutions and improving these solutions if deemed necessary, in order to reuse within the novel mobility architecture constitutes the second part of this dissertation. The IETF standard protocol for network mobility was implemented and its performance was analysed on a real networking environment. This enabled to identify problems in the standard which affect the handover and routing performance. To address the identified routing and protocol header overheads of the standard network mobility protocol a novel optimal routing framework, OptiNets was proposed. To address the handover latency issues, optimizations to IPv6 network attachment were incorporated and also an access technology independent multiple interface Make-Before-Break handover mechanism was proposed. The viability of the OptiNets framework and the handover optimizations were demonstrated by analysis and by implementation. A more general external factor that affects the performance of mobile networks which is bandwidth scarcity of Wireless Wide Area Networks was addressed, by proposing a bandwidth fuelling architecture for on-board mobile networks. The feasibility of the bandwidth fuelling architecture was analysed by implementing a prototype and evaluating its performance.
|
217 |
Network Protocols for Ad-Hoc Networks with Smart AntennasSundaresan, Karthikeyan 31 July 2006 (has links)
Multi-hop wireless networks or ad-hoc networks
face several limiting characteristics that make it difficult to support a multitude of applications. It is in this context that we find smart antennas to find significant applications in these networks, owing to their ability to alleviate most
of these limitations. The focus of my research is thus to investigate the use of smart antennas in ad-hoc networks and hence efficiently design network protocols that best leverage their capabilities in communication. There are two parts to the proposed objective of designing efficient network protocols that pertain to the nature of the smart antenna network considered, namely, homogeneous and heterogeneous smart antenna networks.
Unlike heterogeneous smart antenna networks, where different devices in the network employ different antenna technologies, homogeneous smart antenna networks consist of devices employing the same antenna technology. Further, in homogeneous smart antenna networks, different antenna technologies operating in different strategies tend to perform the best in different network architectures, conditions and application requirements. This
motivates the need for developing a {em unified} framework for designing efficient communication (medium access control and routing) protocols for homogeneous smart antenna networks in general. With the objective of designing such a unified framework, we start by designing efficient MAC and routing protocols for the most sophisticated of the smart antenna technologies, namely multiple-input multiple-output (MIMO) links. The capabilities of MIMO links form a super-set of those possible with other antenna technologies. Hence, the insights gained from the design of
communication protocols for MIMO links are then used to develop unified MAC and routing frameworks for smart antennas in general.
For heterogeneous smart antenna networks, we develop theoretical performance bounds by studying the impact of increasing degree of heterogeneity on network throughput performance. Given that the
antenna technologies are already unified in the network, unified solutions are not required. However, we do develop efficient MAC and routing protocols to best leverage the available heterogeneous capabilities present in the network. We also design efficient cooperation strategies that will further help the communication protocols in exploiting the available heterogeneous capabilities in the network to the best possible extent.
|
218 |
Infinitesimal Perturbation Analysis for Active Queue ManagementAdams, Richelle Vive-Anne 12 November 2007 (has links)
Active queue management (AQM) techniques for congestion control in Internet Protocol (IP) networks have been designed using both heuristic and analytical methods. But so far, there has been found no AQM scheme designed in the realm of stochastic optimization. Of the many options available in this arena, the gradient-based stochastic approximation method using Infintesimal Perturbation Analysis (IPA) gradient estimators within the Stochastic Fluid Model (SFM) framework is very promising. The research outlined in this thesis provides the theoretical basis and foundational layer for the development of IPA-based AQM schemes. Algorithms for computing the IPA gradient estimators for loss volume and queue workload were derived for the following cases: a single-stage queue with instantaneous, additive loss-feedback, a single-stage queue with instantaneous, additive loss-feedback and an unresponsive competing flow, a single-stage queue with delayed, additive loss-feedback, and a multi-stage tandem network of $m$ queues with instantaneous, additive loss-feedback. For all cases, the IPA gradient estimators were derived with the control parameter, $ heta$, being the buffer-limits of the queue(s). For the single-stage case and the multi-stage case with instantaneous, additive loss-feedback, the IPA gradient estimators for when the control parameter, $ heta$, is the loss-feedback constant, were also derived. Sensitivity analyses and optimizations were performed with control parameter, $ heta$, being the buffer-limits of the queue(s), as well as the loss-feedback constant.
|
219 |
A MAC protocol for wireless networks with QoS guarantees.Majoor, Richard James. January 2002 (has links)
Mobile communications are becoming integrated into society at an explosive rate. While 2nd generation (2G) systems limit the user to basic services such as voice and low-bit rate data, 3G
networks are characterized by their ability to accommodate wideband multi-media traffic with Quality of Service (QoS) guarantees. In the design of a system the Medium Access Control (MAC) layer is responsible for multiplexing heterogeneous traffic onto a common transmission link and its design is critical to the overall performance of a system. A number of MAC protocols for wireless networks have been proposed in the literature - the majority having time division multiple access (TDMA) at the MAC layer. However in 3G systems there is a trend towards the use of code division multiple access (CDMA) due to its proven advantages in a
wireless environment. Although several papers on CDMA based MAC protocols have been published, virtually none of them tackle the analysis aspect of the protocols. Those papers that do perform analyses of CDMA protocols don't often consider heterogeneous traffic, and even fewer support QoS. The thesis addresses these shortcomings by proposing a MAC protocol that
supports QoS in the form of Bit Error Rate (BER) and packet delay guarantees. The thesis begins by giving an overview of proposed wireless ATM and 3G CDMA protocols and then details how power control may be used to support BER guarantees. Various Markov based analyses are presented along with Monte-Carlo Simulations. An Equilibrium Point Analysis is then performed and the work discusses how such analyses are generally infeasible for systems supporting heterogeneous traffic. After an overview of conventional scheduling algorithms the thesis proceeds to outline a novel approach by which delay guarantees may be offered using packet dropping rates as the QoS metric. Using a stochastic source model as opposed to the conventional leaky bucket traffic regulator the thesis diverges significantly from
conventional literature. The thesis also details how to calculate the probability of QoS violation and concludes with suggestions on further research avenues. As a whole the work is unique in
its approach to analyse heterogeneous traffic and the methods it uses to construct session admission zones for QoS guarantees. / Thesis (Ph.D.)-University of Natal,Durban, 2002.
|
220 |
A token based MAC protocol for wireless ad hoc networks.Liu, Yi-Sheng. January 2003 (has links)
The emergence of portable terminals in work and living environments is accelerating the
progression of wireless networks. A wireless ad hoc network is a new network concept
where users establish peer-to-peer communication among themselves independently, in
their small area. Since the wireless medium is a shared resource, it becomes an
important design issue to efficiently allocate bandwidth among users. MAC (Medium
Access Control) layer arbitrates the channel access to the wireless medium and is also
responsible for bandwidth allocation to different users, therefore a large amount of
research has been conducted on various MAC protocols for ad hoc wireless networks.
This dissertation begins with a survey of existing wireless MAC protocols. The survey
includes protocols designed for different network generations and topologies, classifying
them based on architecture and mode of operation. Next, we concentrate on the MAC
protocols proposed for distributed wireless networks. We propose a new MAC protocol
based on a token-passing strategy; which not only incorporates the advantages of the
guaranteed access scheme into the distributed type of wireless networks, but also the
data rate and delay level QoS guarantees. Data rate QoS provides fairness into sharing of
the channel, while delay level QoS introduces a flexible prioritized access to channels by
adjusting transmission permission to the current network traffic activities. A simulation
model for the protocol is developed and delay and throughput performance results are
presented.
To examine the efficiency and performance of the proposed MAC scheme in an ad hoc
wireless environment, it is incorporated into the Bluetooth structured network. The
model is then simulated in the Bluetooth environment and performance results are
presented. Furthermore, an analytical model is proposed and an approximate delay
analysis conducted for the proposed MAC scheme. Analytical results are derived and
compared with results obtained from computer simulations. The dissertation concludes
with suggestions for improvements and future work. / Thesis (M.Sc.-Engineering)-University of Natal, 2003.
|
Page generated in 0.0933 seconds