Optical burst switching (OBS) is being considered as an optical transmission technology that meets the increasing bandwidth demands and requirements of quality of service (QoS) of the next generation alloptical Internet. Due to technological limitations such as optical buffers are not yet available at core nodes, ensuring QoS in OBS networks is difficult to perform flexibly compared to electronic networks (e.g. IP network). In this paper, a combination of the prediction based on burst traffic and fibre delay links (FDL) is proposed to allocate wavelengths properly, ensuring QoS and improving the network performance. Efficiency evaluations based on mathematical analysis and simulation will confirm the advantages of our proposed model.
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
This paper is based on Wavelength Division Multiplexing (WDM) optical networking. In this optical networking, prior to data transfer, lightpath establishment between source and
destination nodes is usually carried out through a wavelength reservation protocol. This wavelength is reserved corresponding to a route between the source and destination and the
route is chosen following any standard routing protocol based on shortest path. The backward reservation protocol is implemented initially. A fixed connected and weighted network is
considered. The inputs of this implementation are the fixed network itself and its corresponding shortest path matrix. After this initial level of implementation, the average node usage over a time period is calculated and various thresholds for node usage are considered. Above threshold value, request arriving at that path selects its next shortest path. This concept is
implemented on various wavelengths. The output represents the performance issues of dynamic congestion control.
This document summarizes research on improving the throughput of optical burst switching (OBS) networks. It describes three methods for improving OBS performance without significantly increasing complexity: 1) Adding fiber delay lines (FDLs) to compensate for control packet processing time; 2) Using random extra offset time to avoid priority effects from processing time variations; 3) Implementing window-based channel scheduling (WBS) to better schedule bursts. The research aims to understand how these methods can be combined to maximize throughput gains without advanced optical hardware requirements.
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
The problem of determining primary and backup paths for survivable optical WDM
networks is considered. Results of various available routing techniques that try to minimize
the combined cost of primary and the backup path are analyzed for the effects on network
parameters such as mean load, variance of the load on route, number of converters required
by the route and the length of the route. The route cost is modelled such a way that it is
extensible to include any new parameter and vary their relative importance. The efficiency of
such wavelength routed networks has been proved to improve for certain parameters, such as
reduction in blocking probability and number of converters required for desired performance.
The routing is enhanced to analyse effect on network parameters for all node full range
converters, limited number full converters, reserved primary and back up wavelengths and
with no such reservation.
This document analyzes the performance of the first-fit wavelength assignment algorithm in optical networks. It proposes a new analytical technique to calculate the blocking probability of a source-destination pair taking into account wavelength correlation and load correlation between links. The model is accurate even with a large number of wavelengths. It first calculates the probabilities that wavelengths are used on individual links and paths. Then it establishes a wavelength correlation model to calculate the blocking probability on a given path based on the wavelength usage probabilities of each link along the path.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsCSCJournals
In ad hoc networks, the nodes are dynamically and arbitrary located in a manner that the interconnections between nodes are changing frequently. Thus, designing an effective routing protocol is a critical issue. In this paper, we propose a fuzzy based routing method that selects the most stable route (FSRS) considering the number of intermediate nodes, packet queue occupancy, and internodes distances. Also it takes the produced cost of the selected route as an input to another fuzzy controller predicts its lifetime (FRLP), the evaluation of the proposed method is performed using OMNet++4.0 simulator in terms of packet delivery ratio, average end-to-end delay and normalized routing load.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
This document summarizes a research paper that proposes a new routing protocol called Dynamically Adaptable Improved OLSR (DA-IOLSR) for mobile ad hoc networks. DA-IOLSR uses a connected dominating set (CDS) as its virtual backbone structure and dynamically adapts the backbone in response to network topology changes from node mobility. The paper describes related work on improving the OLSR protocol's multipoint relay selection and on CDS approaches that are adaptable to topology changes. It then presents the DA-IOLSR protocol and evaluates its performance against the standard OLSR protocol through simulations of varying node mobility conditions.
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKcscpconf
This paper is based on Wavelength Division Multiplexing (WDM) optical networking. In this optical networking, prior to data transfer, lightpath establishment between source and
destination nodes is usually carried out through a wavelength reservation protocol. This wavelength is reserved corresponding to a route between the source and destination and the
route is chosen following any standard routing protocol based on shortest path. The backward reservation protocol is implemented initially. A fixed connected and weighted network is
considered. The inputs of this implementation are the fixed network itself and its corresponding shortest path matrix. After this initial level of implementation, the average node usage over a time period is calculated and various thresholds for node usage are considered. Above threshold value, request arriving at that path selects its next shortest path. This concept is
implemented on various wavelengths. The output represents the performance issues of dynamic congestion control.
This document summarizes research on improving the throughput of optical burst switching (OBS) networks. It describes three methods for improving OBS performance without significantly increasing complexity: 1) Adding fiber delay lines (FDLs) to compensate for control packet processing time; 2) Using random extra offset time to avoid priority effects from processing time variations; 3) Implementing window-based channel scheduling (WBS) to better schedule bursts. The research aims to understand how these methods can be combined to maximize throughput gains without advanced optical hardware requirements.
MMINIMUM RESOURCE CONSUMPTIONS ROUTING FOR OPTICAL NETWORKSprj_publication
The problem of determining primary and backup paths for survivable optical WDM
networks is considered. Results of various available routing techniques that try to minimize
the combined cost of primary and the backup path are analyzed for the effects on network
parameters such as mean load, variance of the load on route, number of converters required
by the route and the length of the route. The route cost is modelled such a way that it is
extensible to include any new parameter and vary their relative importance. The efficiency of
such wavelength routed networks has been proved to improve for certain parameters, such as
reduction in blocking probability and number of converters required for desired performance.
The routing is enhanced to analyse effect on network parameters for all node full range
converters, limited number full converters, reserved primary and back up wavelengths and
with no such reservation.
This document analyzes the performance of the first-fit wavelength assignment algorithm in optical networks. It proposes a new analytical technique to calculate the blocking probability of a source-destination pair taking into account wavelength correlation and load correlation between links. The model is accurate even with a large number of wavelengths. It first calculates the probabilities that wavelengths are used on individual links and paths. Then it establishes a wavelength correlation model to calculate the blocking probability on a given path based on the wavelength usage probabilities of each link along the path.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
As the network size increases the probability of congestion occurrence at nodes increases. This is
because of the event driven nature of ad hoc networks that leads to unpredictable network load. As a result
congestion may occur at the nodes which receive more data than that can be forwarded and cause packet losses.
In this paper we propose a hybrid scheme that attempts to avoid packet loss due to congestion as well as reduce
end to end delay in delivering data packets by combining two protocols- Destination sequenced distance vector
routing (DSDV), which is a table driven or proactive protocol and Improved Ad-hoc on demand vector routing
(IAODV) which is an on-demand or reactive protocol that reduces packet loss due to congestion. The strategy
adopted is use DSDV for path selection and if congestion occurs than switch over to IAODV. The routing
performance of this model is then compared with IAODV and DSDV in terms of end to end delay, throughput
and packet delivery fraction
Fuzzy Controller Based Stable Routes with Lifetime Prediction in MANETsCSCJournals
In ad hoc networks, the nodes are dynamically and arbitrary located in a manner that the interconnections between nodes are changing frequently. Thus, designing an effective routing protocol is a critical issue. In this paper, we propose a fuzzy based routing method that selects the most stable route (FSRS) considering the number of intermediate nodes, packet queue occupancy, and internodes distances. Also it takes the produced cost of the selected route as an input to another fuzzy controller predicts its lifetime (FRLP), the evaluation of the proposed method is performed using OMNet++4.0 simulator in terms of packet delivery ratio, average end-to-end delay and normalized routing load.
An Adaptive Routing Algorithm for Communication Networks using Back Pressure...IJMER
The basic idea of backpressure techniques is to prioritize transmissions over links that have
the highest queue differentials. Backpressure method effectively makes packets flow through the network
as though pulled by gravity towards the destination end, which has the smallest queue size of zero. Under
high traffic conditions, this method works very well, and backpressure is able to fully utilize the available
network resources in a highly dynamic fashion. Under low traffic conditions, however, because many
other hosts may also have a small or zero queue size, there is inefficiency in terms of an increase in
delay, as packets may loop or take a long time to make their way to the destination end. In this paper we
use the concept of shadow queues. Each node has to maintain some counters, called as shadow queues,
per destination. This is very similar to the idea of maintaining a routing table (for routing purpose) per
destination. Using the concept of shadow queues, we partially decouple routing and the scheduling. A
shadow network is maintained to update a probabilistic routing table that packets use upon arrival at a
node. The same shadow network, with back-pressure technique, is used to activate transmissions between
nodes. The routing algorithm is designed to minimize the average number of hops used by the packets in
the network. This idea, along with the scheduling and routing decoupling, leads to delay reduction
compared with the traditional back-pressure algorithm
This document summarizes a research paper that proposes a new routing protocol called Dynamically Adaptable Improved OLSR (DA-IOLSR) for mobile ad hoc networks. DA-IOLSR uses a connected dominating set (CDS) as its virtual backbone structure and dynamically adapts the backbone in response to network topology changes from node mobility. The paper describes related work on improving the OLSR protocol's multipoint relay selection and on CDS approaches that are adaptable to topology changes. It then presents the DA-IOLSR protocol and evaluates its performance against the standard OLSR protocol through simulations of varying node mobility conditions.
This document summarizes a research paper that proposes an energy and bandwidth constrained routing technique for mobile ad hoc networks (MANETs). It presents an available bandwidth measurement algorithm that estimates available bandwidth more accurately by considering node capacity, link utilization, idle time synchronization, collision probability, and overhead from backoff mechanisms. It also proposes a probability-based overhearing method to reduce energy consumption from overhearing without affecting route quality. The techniques are evaluated using NS2 simulations to analyze network performance in terms of quality of service parameters.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
A New Analysis for Wavelength Translation in Regular WDM NetworksVishal Sharma, Ph.D.
We present a new analysis of wavelength translation in
regular, all-optical WDM networks, that is simple, computationally
inexpensive, and accurate for both low and high
network loads. In a network with
k
wavelengths per link,
we model the output link by an auxiliary
M/M/k/k
queueing
system. We then obtain a closed-form expression for
the probability
P succ
that a session arriving at a node at a
random time successfully establishes a connection from its
source node to its destination node. Unlike previous analyses,
which use the link independence blocking assumption,
we account for the dependence between the acquisition of
wavelengths on successive links of the session’s path. Based
on the success probability, we show that the throughput per
wavelength increases superlinearly (as expected) as we increase
the number of wavelengths per link; however, the
extent of this superlinear increase in throughput saturates
rather quickly. This suggests some interesting possibilities
for network provisioning in an all-optical network. We verify the accuracy of our analysis via simulations for the torus
and hypercube networks.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study.
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing and energy to ensure the efficient use of sensors. In this paper, we propose an Efficient, Energy-Aware, Least Cost, (ECQSR) quality of service routing protocol for sensor networks which can run efficiently with best-effort traffic processing. The protocol aims to maximize the lifetime of the network out of balancing energy consumption across multiple nodes, by using the concept of service differentiation, finding lower cost by finding the shortest path using nearest neighbor algorithm (NN), also put certain constraints on the delay of the path for real-time data from where link cost that captures energy nodes reserve, energy of the transmission, error rate and other parameters. The results show that the proposed protocol improves the network lifetime and low power consumption.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
The bursting aggregation assembly in edge nodes is one of the key technologies in OBS (Optical Burst Switching) network, which has a direct impact on flow characteristics and packet loss rate. An optical burst assembly technique supporting QoS is presented through this paper, which can automatically adjust the threshold along with the increasing and decreasing volume of business, reduce the operational burst, and generate corresponding BDP (Burst Data Packet) and BCP (Burst Control Packet). In addition to the burst aggregation technique a packet recovery technique by restoration method is also described. The data packet loss due to the physical optical link failure is not currently included in the QoS descriptions. This link failure is also a severe problem which reduces the data throughput of the transmitter node. A mechanism for data recovery from this link failure is vital for guaranteeing the QoS demanded by each user. So this paper will also discusses a specific protocol for reducing the packet loss by utilizing the
features of both optical circuit switching (OCS) and Optical Burst switching (OBS) techniques
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
This document proposes a new routing protocol called MuMHR for wireless sensor networks. MuMHR aims to improve energy efficiency and robustness over LEACH in three ways: 1) By enabling nodes to select cluster heads based on the number of hops away to reduce transmission distances. 2) By using a back-off timer and multiple paths for transmissions to reduce setup overhead and add reliability. 3) By electing backup cluster heads to substitute when primary heads fail. The protocol operates in setup and data transfer phases, with the setup phase selecting cluster heads and forming clusters in an energy-efficient multi-hop manner.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
This document reviews Network-on-Chip (NoC) architectures that prioritize selected data streams to reduce communication latency. It categorizes the architectures based on the effect of prioritization (per end-to-end connection, per router, or per path segment) and discusses their pros and cons. Architectures that prioritize at the core-to-core level provide the highest latency reduction by bypassing the NoC, while those prioritizing per router or path segment require redetermining priority at each hop.
This document compares the performance of three mobile ad hoc network (MANET) routing protocols: AODV, FSR, and IERP. It uses the QualNet network simulator to evaluate these protocols based on various metrics like throughput, average jitter, average end-to-end delay, and packet delivery ratio. The protocols are evaluated under different node speeds on a grid topology network with 90 nodes over an area of 1500x1500 meters. Simulation results show that AODV generally performs best in terms of throughput and packet delivery ratio across varying node speeds, while FSR performs worst for these metrics. IERP shows the worst performance for average end-to-end delay and average jitter as node speed increases.
- The first article proposes a new packet length optimization technique called DPLC for wireless sensor networks. DPLC dynamically adjusts packet lengths depending on distance and power to improve energy efficiency. It describes the DPLC design and evaluates its performance through testing.
- The second article describes MT-Deluge, a multithreaded design for efficient information dissemination in wireless sensor networks. It separates coding and radio operations into different threads to allow concurrent processing and reduce dissemination delays. Testing shows MT-Deluge improves energy efficiency over existing approaches.
- The third article discusses issues with the existing FlexRay automotive communication protocol. It proposes a cooperative scheduling scheme called CoEfficient to address problems like data loss and delays. CoEfficient
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The
Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To
Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We
Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The
Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential
Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each
Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The
Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast
Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route
Maintenance.
Approaches And Controllers To Solving The Contention Problem For Packet Switc...Rachel Doty
This document summarizes approaches and controllers for solving contention problems in optical packet switching (OPS) networks. It discusses both contention resolution and avoidance schemes. Contention resolution schemes like wavelength conversion, fiber delay line buffering, deflection routing, and retransmission attempt to resolve collisions reactively after they occur. Contention avoidance schemes such as multi-fiber architecture, additional wavelengths, and controlled traffic transmission try to proactively reduce the number of potential collision events. The document also reviews using neural networks as learning approaches for contention control in OPS networks by mapping packet switching onto an input request matrix that can be processed by a neural network controller.
This document discusses methods to improve the throughput performance of optical burst switching (OBS) networks. It presents three feasible methods: 1) Adding simple fiber delay lines (FDLs) to compensate for increased control packet processing time, 2) Using random extra offset time which does not require additional hardware, and 3) Window-based channel scheduling (WBS) which can provide better throughput than random offset time when FDLs are used. The document analyzes each method and argues their combination can further improve OBS performance without significantly increasing implementation complexity.
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...IJCNCJournal
The document proposes a wavelength and converter assignment scheme for wavelength-routed networks to decrease lightpath blocking probability with a limited number of converters. The key points are:
1) The scheme avoids contention among multiple lightpath requests by making each node-pair perform wavelength conversion at different intermediate nodes, based on the intermediate nodes' converter usage history.
2) It assigns wavelength conversion costs to intermediate nodes based on their historical converter usage and number of idle converters, aiming to use different converters for different node-pairs and keep more converters available.
3) Simulation results show the proposed scheme decreases blocking probability by 44-83% compared to conventional schemes, and needs 1-2 fewer converters per node to achieve near-
This document summarizes a research paper that proposes an energy and bandwidth constrained routing technique for mobile ad hoc networks (MANETs). It presents an available bandwidth measurement algorithm that estimates available bandwidth more accurately by considering node capacity, link utilization, idle time synchronization, collision probability, and overhead from backoff mechanisms. It also proposes a probability-based overhearing method to reduce energy consumption from overhearing without affecting route quality. The techniques are evaluated using NS2 simulations to analyze network performance in terms of quality of service parameters.
Dynamic bandwidth allocation scheme in lr pon with performance modelling and ...IJCNCJournal
We consider models of telecommunication systems that incorporate probability, dense real-time and data.
We present a new formal abstraction method for computing minimum and maximum reachability
probabilities for such models. Our approach uses strictly local formal abstract steps to reduce both the size
of abstract specifications generated and the complexity of operations needed, in comparison to previous
approaches of this kind. A selection of large case studies are implemented the techniques and evaluate,
which include some infinite-state probabilistic real time models, demonstrating improvements over existing
tools in several cases. The capacity of metro and access networks are extended the reach and split ratio of
the conventional Long - Reach Passive Optical Networks (LR-PONs). The efficient solutions of LR-PONs
are appeared in feeder distances around 100km and high split ratios up to 1000-way . Among many
existing approaches, one of the most effective options to improve network performance in LR-PONs are the
multi-thread based dynamic bandwidth allocation (DBA) scheme where several bandwidth allocation
processes are performed in parallel is considered. Without proper intercommunication between the
overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional
single thread algorithm. Real Time Probabilistic Systems are used to evaluate a typical PON systems
performance. This approach is more convenient, flexible, and lower cost than the former simulation method,
which do not need develop special hardware and software tools. Moreover, how changes in performance
depend on changes in the particular modes can be easily analysis by supplying ranges for parameter values.
The proposed algorithm with traditional DBA is compared, and shows its advantage on average packet
delay. The key parameters of the algorithm are analysed and optimized, such as initiating and tuning
multiple threads, inter -thread scheduling, and fairness among users. The algorithms advantage in
numerical results are decreased the average packet delay and improve network throughput under varying
offered loads.
A New Analysis for Wavelength Translation in Regular WDM NetworksVishal Sharma, Ph.D.
We present a new analysis of wavelength translation in
regular, all-optical WDM networks, that is simple, computationally
inexpensive, and accurate for both low and high
network loads. In a network with
k
wavelengths per link,
we model the output link by an auxiliary
M/M/k/k
queueing
system. We then obtain a closed-form expression for
the probability
P succ
that a session arriving at a node at a
random time successfully establishes a connection from its
source node to its destination node. Unlike previous analyses,
which use the link independence blocking assumption,
we account for the dependence between the acquisition of
wavelengths on successive links of the session’s path. Based
on the success probability, we show that the throughput per
wavelength increases superlinearly (as expected) as we increase
the number of wavelengths per link; however, the
extent of this superlinear increase in throughput saturates
rather quickly. This suggests some interesting possibilities
for network provisioning in an all-optical network. We verify the accuracy of our analysis via simulations for the torus
and hypercube networks.
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
In recent years, limited resources of user products and energy-saving are recognized as the major challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique that can reduce all energy consumption and provide stability of workload that causes a larger difference in energy depletion among other nodes and cluster heads (CHs). In addition, clustering is the solution of energy-efficient for maximizing the network longevity and improvising energy efficiency. In this paper, a novel OCE-CHS (Optimized Cluster Establishment and Cluster-Head Selection) approach for sensor nodes is represented to improvise the packet success ratio and reduce the average energy-dissipation. The main contribution of this paper is categorized into two processes, first, the clustering algorithm is improvised that periodically chooses the optimal set of the CHs according to the speed of the average node and average-node energy. This is considerably distinguished from node-based clustering that utilizes a distributed clustering algorithm to choose CHs based on the speed of the current node and remaining node energy. Second, more than one factor is assumed for the detached node to join the optimal cluster. In the result section, we discuss our clustering protocols implementation of optimal CH-selection to evade the death of SNs, maximizing throughput, and further improvise the network lifetime by minimizing energy consumption.
Abstract In optical circuit switching the high values of blocking probability is resolved by dynamic wavelength routing algorithms with wavelength conversion. The aim of this paper is to study these algorithms. Then the algorithm is selected which gives good results with and without wavelength conversion. The selected algorithm is then checked for other parameters of networking namely throughput, packet delivery ratio, and delay. A comparative study is then carried out for increasing traffic. We try to prove that these algorithms satisfy the criteria of QoS parameters by this comparative study. The results of simulation show that the parameters follow the trend of blocking probability of the selected algorithm. Keywords: optical burst switching, throughput, packet delivery ratio, delay.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
PERFORMANCE ANALYSIS IN CELLULAR NETWORKS CONSIDERING THE QOS BY RETRIAL QUEU...IJCNCJournal
In this article, a retrial queueing model will be considered with persevering customers for wireless cellular
networks which can be frequently applied in the Fractional Guard Channel (FGC) policies, including
Limited FGC (LFGC), Uniform FGC (UFGC), Limited Average FGC (LAFGC) and Quasi Uniform FGC
(QUFGC). In this model, the examination on the retrial phenomena permits the analyses of important
effectiveness measures pertained to the standard of services undergone by users with the probability that a
fresh call first arrives the system and find all busy channels at the time, the probability that a fresh call
arrives the system from the orbit and find all busy channels at the time and the probability that a handover
call arrives the system and find all busy channels at the time. Comparison between four types of the FGC
policy can befound to evaluate the performance of the system.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high throughput for the network and increase the chance for multi path routing. This is because the multiple channel availability for transmission decreases the probability of the most elegant problem called as interference problem which is either of interflow and intraflow type. For avoiding the problem like interference and maintaining the constant network performance or increasing the performance the WMN need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting several packets ready for transmission and sending them to the intended recipient through the channel, while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different available multiple paths is most the important factor in the both case for a routing algorithm. Hence the most challenging factor is to determine a forwarding strategy which will provide the schedule for each node for transmission within the channel. In this research work we have tried to implement two forwarding strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We have implemented Global State Routing (GSR) which will consider the packet forwarding concept and Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding and packet aggregation. After the successful implementation the network performance has been measured by means of simulation study.
Efficient energy, cost reduction, and QoS based routing protocol for wireless...IJECEIAES
Recent developments and widespread in wireless sensor network have led to many routing protocols, many of these protocols consider the efficiency of energy as the ultimate factor to maximize the WSN lifetime. The quality of Service (QoS) requirements for different applications of wireless sensor networks has posed additional challenges. Imaging and data transmission needs both QoS aware routing and energy to ensure the efficient use of sensors. In this paper, we propose an Efficient, Energy-Aware, Least Cost, (ECQSR) quality of service routing protocol for sensor networks which can run efficiently with best-effort traffic processing. The protocol aims to maximize the lifetime of the network out of balancing energy consumption across multiple nodes, by using the concept of service differentiation, finding lower cost by finding the shortest path using nearest neighbor algorithm (NN), also put certain constraints on the delay of the path for real-time data from where link cost that captures energy nodes reserve, energy of the transmission, error rate and other parameters. The results show that the proposed protocol improves the network lifetime and low power consumption.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ENSURING QOS GUARANTEES IN A HYBRID OCS/OBS NETWORKijngnjournal
The bursting aggregation assembly in edge nodes is one of the key technologies in OBS (Optical Burst Switching) network, which has a direct impact on flow characteristics and packet loss rate. An optical burst assembly technique supporting QoS is presented through this paper, which can automatically adjust the threshold along with the increasing and decreasing volume of business, reduce the operational burst, and generate corresponding BDP (Burst Data Packet) and BCP (Burst Control Packet). In addition to the burst aggregation technique a packet recovery technique by restoration method is also described. The data packet loss due to the physical optical link failure is not currently included in the QoS descriptions. This link failure is also a severe problem which reduces the data throughput of the transmitter node. A mechanism for data recovery from this link failure is vital for guaranteeing the QoS demanded by each user. So this paper will also discusses a specific protocol for reducing the packet loss by utilizing the
features of both optical circuit switching (OCS) and Optical Burst switching (OBS) techniques
IMPROVING PACKET DELIVERY RATIO WITH ENHANCED CONFIDENTIALITY IN MANETijcsa
In Mobile Ad Hoc Network (MANET), the collection of mobile nodes gets communicated without the need of any customary infrastructure. In MANET, repeated topology changes and intermittent link breakage
causes the failure of existing path. This leads to rediscovery of new route by broadcasting RREQ packet.The number of RREQ packet in the network gets added due to the increased amount of link failures. This result in increased routing overhead which degrades the packet delivery ratio in MANET. While designing
routing protocols for MANET, it is indispensable to reduce the overhead in route discovery. In our previous
work[17], routing protocol based on neighbour details and probabilistic knowledge is utilized, additionally
the symmetric cipher AES is used for securing the data packet. Through this protocol, packet delivery ratio
gets increased and confidentiality is ensured. But there is a problem in secure key exchange among the
source and destination while using AES. To resolve that problem, hybrid cryptographic system i.e.,
combination of AES and RSA is proposed in this paper. By using this hybrid cryptographic scheme and the
routing protocol based on probability and neighbour knowledge, enhanced secure packet delivery is
ensured in MANET
MuMHR: Multi-path, Multi-hop Hierarchical RoutingM H
This document proposes a new routing protocol called MuMHR for wireless sensor networks. MuMHR aims to improve energy efficiency and robustness over LEACH in three ways: 1) By enabling nodes to select cluster heads based on the number of hops away to reduce transmission distances. 2) By using a back-off timer and multiple paths for transmissions to reduce setup overhead and add reliability. 3) By electing backup cluster heads to substitute when primary heads fail. The protocol operates in setup and data transfer phases, with the setup phase selecting cluster heads and forming clusters in an energy-efficient multi-hop manner.
PERFORMANCE OF OLSR MANET ADOPTING CROSS-LAYER APPROACH UNDER CBR AND VBR TRA...IJCNCJournal
The routing protocols play an important role in Mobile Ad-Hoc Network (MANET) because of the dynamically change of its topology. Optimized Link State Routing (OLSR), unawareness of Quality of Service (QoS) and power-consumed protocol, is an example of a widely-used routing protocol in MANET.
The Multi-Point Relays (MPR) selection algorithm is very crucial in OLSR. Therefore, firstly, we propose a heuristic method to select the best path based on two parameters; Bit Error Rate (BER) derived from the physical layer and Weighted Connectivity Index (CI) adopted from the network layer. This can be done via the cross-layer design scheme. This is anticipated to enhance the performance of OLSR, provide QoS
guarantee and improve the power consumption. The performances of the proposed scheme are investigated
by simulation of two types of traffics: CBR and VBR (MPEG-4), evaluated by metrics namely Throughput, Packet Delivery Ratio (PDR), Average End-to-End Delay, Control Overhead and Average Total Power Consumption.We compare our results with the typical OLSR and OLSR using only Weighted CI. It is
obvious that our proposed scheme provides superior performances to the typical OLSR and OLSR using only Weighted CI, especially, at high traffic load.
This document reviews Network-on-Chip (NoC) architectures that prioritize selected data streams to reduce communication latency. It categorizes the architectures based on the effect of prioritization (per end-to-end connection, per router, or per path segment) and discusses their pros and cons. Architectures that prioritize at the core-to-core level provide the highest latency reduction by bypassing the NoC, while those prioritizing per router or path segment require redetermining priority at each hop.
This document compares the performance of three mobile ad hoc network (MANET) routing protocols: AODV, FSR, and IERP. It uses the QualNet network simulator to evaluate these protocols based on various metrics like throughput, average jitter, average end-to-end delay, and packet delivery ratio. The protocols are evaluated under different node speeds on a grid topology network with 90 nodes over an area of 1500x1500 meters. Simulation results show that AODV generally performs best in terms of throughput and packet delivery ratio across varying node speeds, while FSR performs worst for these metrics. IERP shows the worst performance for average end-to-end delay and average jitter as node speed increases.
- The first article proposes a new packet length optimization technique called DPLC for wireless sensor networks. DPLC dynamically adjusts packet lengths depending on distance and power to improve energy efficiency. It describes the DPLC design and evaluates its performance through testing.
- The second article describes MT-Deluge, a multithreaded design for efficient information dissemination in wireless sensor networks. It separates coding and radio operations into different threads to allow concurrent processing and reduce dissemination delays. Testing shows MT-Deluge improves energy efficiency over existing approaches.
- The third article discusses issues with the existing FlexRay automotive communication protocol. It proposes a cooperative scheduling scheme called CoEfficient to address problems like data loss and delays. CoEfficient
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The
Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To
Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We
Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The
Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential
Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each
Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The
Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast
Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route
Maintenance.
Approaches And Controllers To Solving The Contention Problem For Packet Switc...Rachel Doty
This document summarizes approaches and controllers for solving contention problems in optical packet switching (OPS) networks. It discusses both contention resolution and avoidance schemes. Contention resolution schemes like wavelength conversion, fiber delay line buffering, deflection routing, and retransmission attempt to resolve collisions reactively after they occur. Contention avoidance schemes such as multi-fiber architecture, additional wavelengths, and controlled traffic transmission try to proactively reduce the number of potential collision events. The document also reviews using neural networks as learning approaches for contention control in OPS networks by mapping packet switching onto an input request matrix that can be processed by a neural network controller.
This document discusses methods to improve the throughput performance of optical burst switching (OBS) networks. It presents three feasible methods: 1) Adding simple fiber delay lines (FDLs) to compensate for increased control packet processing time, 2) Using random extra offset time which does not require additional hardware, and 3) Window-based channel scheduling (WBS) which can provide better throughput than random offset time when FDLs are used. The document analyzes each method and argues their combination can further improve OBS performance without significantly increasing implementation complexity.
A Wavelength and Converter Assignment Scheme Using Converter Usage History in...IJCNCJournal
The document proposes a wavelength and converter assignment scheme for wavelength-routed networks to decrease lightpath blocking probability with a limited number of converters. The key points are:
1) The scheme avoids contention among multiple lightpath requests by making each node-pair perform wavelength conversion at different intermediate nodes, based on the intermediate nodes' converter usage history.
2) It assigns wavelength conversion costs to intermediate nodes based on their historical converter usage and number of idle converters, aiming to use different converters for different node-pairs and keep more converters available.
3) Simulation results show the proposed scheme decreases blocking probability by 44-83% compared to conventional schemes, and needs 1-2 fewer converters per node to achieve near-
Optical Burst Switching (OBS) is a data
switching technique for upcoming computer networks,
since this technique can perform data switching and
data processing operations with high speed and
efficiency. Its main goal is to get rid of problems found
in two main techniques, which are, Optical Circuit
Switching (OCS) and Optical Packet Switching (OPS).
Routing deflection methods route bursts to other output
ports, in fact it is not intended to resolve contention. In
OBS, when burst is not programmed on other output
port through routing deflection then it is simply deleted.
To route data to the receiver, the routing deflection does
not resolve all aspects that resulted loss of data;
therefore, the performance of schemes deflection
existence is not acceptable by the systems and so it
closes with deletion any plan to resolving contention,
backtrack if deflection fails (BDF), that is given as a
second opportunity to burst in order to face the failure
through deflection, the blocked bursts will return to the
previous station, to find suitable alternative available
paths.
The document discusses efficient transmission of data blocks over physical bursts in IEEE 802.16e/WiMAX networks. It addresses how to optimally divide protocol data units (PDUs) within bursts to maximize several performance criteria. Algorithms are presented to compute the best way to define PDUs in a burst to maximize burst goodput and data goodput, assuming either an infinite or limited number of data blocks. Guidelines are also given on selecting the optimal modulation and coding scheme based on channel signal-to-noise ratio.
LTE QOS DYNAMIC RESOURCE BLOCK ALLOCATION WITH POWER SOURCE LIMITATION AND QU...IJCNCJournal
3GPP has defined the long term evolution (LTE) for 3G radio access in order to maintain the future
competitiveness for 3G technology, the system provides the capability of supporting a mixture of services
with different quality of service (QoS) requirements. This paper proposes a new cross-layer scheduling
algorithm to satisfy better QoS parameters for real time applications. The proposed algorithm takes care of
allocating resource blocks (RBs) with different modulation and coding schemes (MCS) according to target
bit error rate (BER), user equipment supportable MCS, queue stability constraints and available transmit
power constraints. The proposed algorithm has been valued, compared with an earlier allocation algorithm
in terms of service rate and packet delay and showed better performance regards the real time
applications.
Congestion Control in Manets Using Hybrid Routing ProtocolIOSR Journals
1. The document proposes a hybrid routing protocol that combines DSDV and IAODV to reduce packet loss due to congestion in MANETs.
2. Under the proposed scheme, DSDV is used initially for path selection. If congestion occurs, nodes switch to using IAODV to find an alternate path to avoid congested areas.
3. Simulation results show that the hybrid protocol improves end-to-end delay, packet delivery fraction, and throughput compared to using only DSDV or IAODV. The hybrid approach balances the advantages of proactive and reactive routing to better handle congestion in mobile ad hoc networks.
An enhanced available bandwidth estimation technique for an end to end networ...redpel dot com
The document describes an enhanced technique for estimating available bandwidth (ABW) of an end-to-end network path. It proposes a unique probing scheme using a probing train structure with a high-density region to detect the turning point more accurately. It also includes a rate adjustment algorithm and a modified excursion detection algorithm to estimate ABW more accurately and less intrusively. Experimental results using an Android device over a 4G/LTE network and a testbed show the technique outperforms other state-of-the-art methods in terms of accuracy, intrusiveness, and convergence time.
GMPLS extends MPLS to manage additional interface types beyond packet interfaces, such as TDM, wavelength switching, and fiber switching. It allows for establishing connection-oriented LSPs and provides routing, resource discovery, connection management, and restoration functions. GMPLS supports various interface types including packet, TDM, wavelength, and fiber switching. It faces challenges around routing, signaling, and management due to the large number of links and long setup times involved in photonic networks.
Challenges, Issues and Research directions in Optical Burst SwitchingEditor IJCATR
This document discusses challenges and research directions in optical burst switching (OBS) networks. It provides background on OBS architecture, including burst assembly, routing, traffic distribution, scheduling, and signaling protocols. Contention resolution strategies in OBS like optical buffering, wavelength conversion, burst deflection routing, and burst segmentation are also covered. Key challenges discussed include implementing burst segmentation in practical systems, such as dealing with switching time and segment boundary detection. Other challenges are the limited buffering capabilities of optical networks and noise introduced by wavelength conversion. The document also notes issues like shadow contention that can occur with certain contention resolution strategies.
Dear Student,
DREAMWEB TECHNO SOLUTIONS is one of the Hardware Training and Software Development centre available in
Trichy. Pioneer in corporate training, DREAMWEB TECHNO SOLUTIONS provides training in all software
development and IT-related courses, such as Embedded Systems, VLSI, MATLAB, JAVA, J2EE, CIVIL,
Power Electronics, and Power Systems. It’s certified and experienced faculty members have the
competence to train students, provide consultancy to organizations, and develop strategic
solutions for clients by integrating existing and emerging technologies.
ADD: No:73/5, 3rd Floor, Sri Kamatchi Complex, Opp City Hospital, Salai Road, Trichy-18
Contact @ 7200021403/04
phone: 0431-4050403
B ENCHMARKING OF C ELL T HROUGHPUT U SING P ROPORTIONAL F AIR S CHEDULE...ijwmn
The proportional fair (PF) scheduling algorithm com
promises between cell throughput and fairness. Many
research findings have been published by various re
searchers about PF algorithm based on mathematical
model and simulations. In this paper we have taken
the practical route to analyse the algorithm based
on
three types of subscription. In this benchmarking s
tudy, the user subscriptions are differentiated as
Gold,
Silver and Bronze schemes and they are provisioned
with certain throughputs. Apart from subscriptions
plans, the channel condition also plays a major rol
e in determining the throughput. So in order to ens
ure
fairness among different subscriptions even in the
bad channel conditions and to deliver the provision
ed
throughputs certain priorities are attached with th
e subscriptions. As per the subscription plans Gold
subscribers are assigned with 50% of the speed offe
red by the network as maximum based on CAT3 speed
(100 Mbps in DL and 50 Mbps in UL), Silver is assig
ned with 25% of the max speed and Bronze is
assigned with 12% of the max speed. The priorities
assigned to subscribers determines the fairness in
the
unfavourable channel conditions - Bronze (high), Si
lver and Gold (medium). In this paper, an
benchmarking tests have been performed with all of
three types of subscribers for nearly two hours in
the
live single cell network without any heterogeneous
cells influencing it. Furthermore, the results are
compared with the simulation results.
Packet Loss Rate Differentiation in slotted Optical Packet Switching OCDM/WDMTELKOMNIKA JOURNAL
We propose a multi-class mechanism for Optical Code Division Multiplexing (OCDM), Wavelength
Division Multiplexing (WDM) Optical Packet Switch (OPS) architecture capable of supporting Quality of Service
(QoS) transmission. OCDM/WDM has been proposed as a competitive hybrid switching technology to
support the next generation optical Internet. This paper addresses performance issues in the slotted OPS
networks and proposed four differentiation schemes to support Quality of Service. In addition, we present a
comparison between the proposed schemes as well as, a simulation scheduler design which can be suitable
for the core switch node in OPS networks. Using software simulations the performance of our algorithm in
terms of losing probability, the packet delay, and scalability is evaluated.
Design of time division multiplexing/wavelength division multiplexing passiv...IJECEIAES
This paper presents the design of time division multiplexing-wavelength division multiplexing-passive optical network (TDM-WDM PON). In this design, the current TDM PON is incorporated with the proposed WDM-PON in order to design a high-capacity network with lower loss requirements. The design has been simulated using OptiSystem software. The upstream wavelength for WDM is between 1,530.334 to 1,542.142 nm while for TDM is 1,310 nm. The downstream wavelength for WDM is from 1,569.865 to 1,581.973 nm, while for TDM is 1,490 nm. Based on the result, it is found that the proposed network is capable to support up to 64 customers with a bit rate of 2.5 Gbps.
Performance evaluation of VLC system using new modulation approachjournalBEEI
This document evaluates the performance of a new modulation scheme called catenated-OFDM for visible light communications (VLC) systems. Catenated-OFDM involves transmitting multiple OFDM signals simultaneously over different optical bands. The proposed system is simulated using Optisys software. Results show the system can achieve transmission distances of up to 12 meters for 2 dBm input power with 3 optical bands and a data rate of 10 Gbps. Higher data rates, up to 15 Gbps, are also possible. Increasing the number of optical bands or decreasing the data rate improves the receiver sensitivity. The catenated-OFDM approach shows potential for high-speed optical wireless communications.
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...Editor IJCATR
Processing packets across Mobile Ad hoc Network, Topology control minimize interference among node in a network, increase the network capacity and extend lifetime of the network. Emerging research in mobile ad hoc networks (MANETs) says, there is a growing requirement of quality of service (QoS) in terms of delay. In order to resolve the delay problem, it is essential to consider topology control in delay constrained environment with energy efficient. In this paper, we discuss reduced delay and minimum distributed topology control algorithm for mobile ad hoc networks. In this proposed system, we study on the delay-constrained topology control problem, and take into account delay and energy efficiency. Simulation results are presented demonstrating the effectiveness of this new technique as compared to other approaches to topology control.
Wavelet Packet based Multicarrier Modulation for Cognitive UWB SystemsCSCJournals
Orthogonal frequency division multiplexing (OFDM) is a multi-carrier modulation (MCM) scheme where the sub carriers are orthogonal waves. The main advantages of OFDM are robustness against multi-path fading, frequency selective fading, narrowband interference, and efficient use of spectrum. Recently it is proved that MCM system optimization can be achieved by applying wavelet bases instead of conventional fourier bases. Wavelet packet based MCM (WPMCM) systems have overall the same capabilities as OFDM systems with some improved features. In this research the literature and analytic schemes of WPMCM system is addressed, a wavelet packet based cognitive ultra wideband (UWB) transceiver is proposed, and performance analysis of WPMCM in different wireless multipath channels is investigated. Simulation results show a significant enhancement in terms of BER, spectral efficiency and side-lobes suppression comparing to conventional OFDM.
A Bandwidth Efficient Scheduling Framework for Non Real Time Applications in ...ijdpsjournal
The key concern on the bandwidth allocation and scheduling for non real time traffic are the fulfillment of its minimum throughput requirement and improvement of bandwidth utilization with acceptable delay. This paper proposes a simple and efficient scheduling framework for allocating bandwidth to non real time
polling service (nrtPS) users in IEEE 802.16 networks. In this framework, jointly selective repeat ARQ at the MAC layer and adaptive modulation and coding techniques at the physical are considered. Numerical simulations demonstrate that the proposed scheduling approach provides a graceful compromise between bandwidth utilization and packet delivery delay while maintaining the minimum throughput requirements of nrtPS applications. Thus proves the efficiency of the proposed framework. The simulation is done for unicast scenario.
EEDTCA: Energy Efficient, Reduced Delay and Minimum Distributed Topology Cont...Editor IJCATR
Processing packets across Mobile Ad hoc Network, Topology control minimize interference among node in a network, increase the network capacity and extend lifetime of the network. Emerging research in mobile ad hoc networks (MANETs) says, there is a growing requirement of quality of service (QoS) in terms of delay. In order to resolve the delay problem, it is essential to consider topology control in delay constrained environment with energy efficient. In this paper, we discuss reduced delay and minimum distributed topology control algorithm for mobile ad hoc networks. In this proposed system, we study on the delay-constrained topology control problem, and take into account delay and energy efficiency. Simulation results are presented demonstrating the effectiveness of this new technique as compared to other approaches to topology control.
Similar to A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting for FDL-equipped at OBS Core Node (20)
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
A Visual Guide to 1 Samuel | A Tale of Two HeartsSteve Thomason
These slides walk through the story of 1 Samuel. Samuel is the last judge of Israel. The people reject God and want a king. Saul is anointed as the first king, but he is not a good king. David, the shepherd boy is anointed and Saul is envious of him. David shows honor while Saul continues to self destruct.
A Retrial Queueing Model with Scheduling Admission Control in QoS Supporting for FDL-equipped at OBS Core Node
1. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
DOI: 10.5121/ijcnc.2020.12504 55
A RETRIAL QUEUEING MODEL WITH SCHEDULING
ADMISSION CONTROL IN QOS SUPPORTING FOR
FDL-EQUIPPED AT OBS CORE NODE
Dang Thanh Chuong1
, Nguyen Hong Quoc2
,
Doan Van Thang3
and Pham Trung Duc1
1
Faculty of Information Technology, University of Sciences, Hue University, Vietnam
2
University of Education, Hue University, Vietnam
3
Faculty of Information Technology, Industrial University of HCM City, Vietnam
ABSTRACT
Optical burst switching (OBS) is being considered as an optical transmission technology that meets the
increasing bandwidth demands and requirements of quality of service (QoS) of the next generation all-
optical Internet. Due to technological limitations such as optical buffers are not yet available at core
nodes, ensuring QoS in OBS networks is difficult to perform flexibly compared to electronic networks (e.g.
IP network). In this paper, a combination of the prediction based on burst traffic and fibre delay links
(FDL) is proposed to allocate wavelengths properly, ensuring QoS and improving the network
performance. Efficiency evaluations based on mathematical analysis and simulation will confirm the
advantages of our proposed model.
KEYWORDS
OBS, Quality of Services (QoS), Share-Per- Link (SPL), Fiber Delay Lines (FDL), Retrial Queueing.
1. INTRODUCTION
Appearing since the 1990s, the optical network has undergone several generations of
development: From the wavelength routing model which is based on end-to-end light path to the
optical packet switching (OPS) model which has been proposed recently. However, due to
limitations in optical technology, such as optical buffers (similar to RAM in electronic
environments) or switches at nanosecond speeds cannot yet be produced, OPS is not currently
possible. A compromise solution is optical Burst switching (OBS), which is a promising
communication model for the next generation Internet. In optical burst switching networks (OBS
networks), the control part (Burst Header Packet, BHP) is separated from the data part (Data
Burst). Specifically, the communication in OBS networks is time-separated in which BHP is
created and sent ahead of the corresponding burst in an offset time. This offset-time needs to be
large enough for resource reservation and configuration of the switches at intermediate nodes so
that these operations must be completed before the burst arrival. The communication in OBS
networks is also spatially separated, in which one or several wavelength channels are reserved for
BHP transmission, while the remaining channels carry data bursts [1].
In optical burst switching networks, congestion will occur when two or more arriving bursts on
the same output port/the wavelength. If the wavelength of an incoming optical burst is occupied
at the output port when another optical burst arrives, then the optical burst can switch to another
free wavelength (using a wavelength converter). The case of all wavelength channels at one
2. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
56
output port are occupied, the incident optical bursts may use Fibre Delay Lines (FDL) optical
delay or deflection routing to resolve contention. One approach to limiting the contention
problem that causes bottlenecks at the OBS network core node is scheduling admission control
[1]. Scheduling admission control can be performed at both the input and core nodes; however,
the use of electronic buffers that control scheduling at the edge node is usually more efficient [1].
In most scheduling admission control techniques, data bursts with a low QoS (priority) layer will
have a higher probability of being dropped due to conserve resources for the higher QoS layer
when contention occurs. The scheduling of incoming bursts is usually done sequentially, on a
first come-first served basis. However, when QoS is taken into consideration, successfully
scheduling a burst first (with a low QoS layer) can cause congestion for a subsequent cluster
(with a higher QoS layer). Therefore, scheduling with admission control is necessary to conserve
more resources for high QoS bursts, while limiting resources for low QoS bursts. Besides,
scheduling admission control can also be combined with FDL to further assist in congested
resolution. An FDL can allow a certain latency value to propagate the bursts, so the integration of
additional FDL into the OBS core node can be considered as a buffer with a limited size.
However, different from electronic buffers, in optical networks the bursts cannot wait with an
indefinite time value (exceeds the allowed delay for optical network), and then the bursts may be
dropped after a waiting period without being served.
Due to the limited delay time and the bulky size of FDLs, the type of fixed FDLs, which only
delays bursts in a fixed period, is usually equipped at the OBS core nodes. With this type of
FDLs, bursts are only delayed in a fixed time; they will be dropped if they are not served when
going out of FDLs. The analysis of retrial queue model with FDLs has been studied in [2, 3] and
[4], in which the authors in [4] combine the overflow model based on the MMPP process, which
the idea is derived from traditional channel switching and fixed-point iterations. This
combination model is to calculate the blocking probability which is presented as a function of the
buffer parameters in the system. For the analysis in [3], the queue model 𝐌𝐌 ∑ 𝑪𝑷𝑷 𝒌
𝑲
𝒌=𝟏 /𝐆𝐄/
𝐜/𝐋 is used, where 𝑲 bursts arrive independently according to Compound Poisson Process
(CPP), which means that the arrival of bursts is in batches; the service time is distributed
according to the generalized exponential (GE) distribution and there are 𝐜 used wavelengths.
In this paper, we study a retrial queue model to analyze the problem of scheduling admission
control considering QoS to limit the issue of dispute, at the same time combine using the FDL
optical delay line to handle when the issue of disputes an OBS network core, in which the character
of FDL as analyzed above can be considered as properties have/not have the patience of customers
in retrial queues. The analytical model is an extension of some proposed models [1, 2] with
consideration of the retrial factor, ie considering the possibility that the burst may not be fed to the
FDL when it is congested with a probability value of 𝜃 or 𝜃1. A burst is called retrial when it has to
pass through one of 𝑁𝑞 FDL. A retrial burst will reuse a wavelength channel if it is available at the
time the burst that comes out from FDL.In the analysis model here, the QoS threshold value will be
adjusted based on the incoming traffic of the bursts at the OBS core node. From the analysis
model, we also propose an algorithm that is a combination of the prediction based on arriving
burst load and FDLs. The prediction is intended to allocate wavelength channels reasonably,
while FDLs are to ensure the quality of service. This is also different from the analysis model in
[3] and [4].
The paper consists of three sections. Section 2 and Section 3 will provide an analysis model and a
scheduling admission control algorithm of performance analysis at OBS core nodes with different
traffics (QoS) will be considered. The results analysis, combined with simulation will be
mentioned in Section 4 and the conclusion is given in Section 5.
3. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
57
2. THE ANALYSIS MODEL
2.1. The assumptions
As in [1], the Markov model will also be used to perform OBS core node analysis. The model is
based on the following assumptions:
The distribution of traffic to the output ports is the same, so we only need to consider it at
one output port.
The core OBS node with SPL architecture has K input ports and K output ports (Figure
1), one WDM fibre in each port, has W wavelength Λ = {λ0, λ1, ⋯ , λW−1} (Assuming
that the wavelength conversion capability is sufficient so there will have W the CWC
converter on each output port).
The model considers the quality of service (QoS) by wavelength resource, that is, the
high priority traffic (bursts) will be allocated more resources than the low priority traffic.
Accordingly, high QoS bursts are scheduled on any wavelength at an output port (𝑊
wavelength) and are scheduled to void filing; while the number of wavelengths that low
QoS bursts can use is only 𝑊𝐿 (𝑊𝐿 < 𝑊) and adjusted to increase/decrease periodic
depending on the arrival rate of the bursts during the observation period (∆𝑡). In other
words, among 𝑊 wavelengths, high QoS bursts are used exclusively (𝑊 − 𝑊𝐿)
wavelengths, while the remaining WL wavelengths are shared for both bursts (high QoS
burst and low QoS burst when all wavelengths (𝑊 − 𝑊𝐿) are busy). Unlike some
previous studies [1, 2], in this paper, the value of 𝑊𝐿 will be a function of the arrival rates
of the bursts (as the formula (1)).
Figure 1. The core OBS node with FDL-SPL architecture
The burst length is exponentially distributed with the average value 𝐿 = 1 µ⁄ ; µ is the
average burst serving rate;
FDL architecture with fixed length F-FDL (Fixed-length FDL) uses 𝑁𝑞 FDLs with the
same length and therefore all FDL generates the same 𝐷 delay [2].
CWC = Complete Wavelength Conversion
....
Optical
Switching
Fabric
Outputport
K
Fiber K
....
....
Outputport
1
Fiber 1
....
Fiber K
Inputport
K
...
Inputport
1
Fiber 1
...
....
CWC
CWC
FDLNq
FDL1
...
...
CWC
CWC
FDLNq
FDL1
...
...
retrial traffic
input traffic
4. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
58
In the model we analyzed, a burst to the output port at the time all W wavelengths used
was thought to be dropped. A congested low priority burst will always be able to use a
buffer (if available) to retry forwarding back to the output port.
A burst is called retrial when it has to pass through one of 𝑁𝑞 FDL. A retrial burst will
reuse a wavelength channel if it is available at the time the burst exits from FDL. In this
model, we study the queue retrial model with the FDL have to be considered as the retrial
of the bursts (Figure 2). This is also different from the analytical model in [1, 5].
2.2. Analysis model with the retrial
2.2.1. The admission control scheduling
This model corresponds to the case of analysis with the traffic is Poisson traffic, corresponding to
two service classes with different priorities, corresponding to 𝐻 (high QoS bursts) and 𝐿 (low
QoS bursts), where class 𝐻 has a higher priority than class 𝐿. Therefore, the model has the form
𝑀/𝑀/𝜔/𝜔 + 𝑁𝑞 [6] described as in Fig. 2. The high QoS and low QoS bursts coming on the
output port with the average rate are 𝛾 𝐻 and 𝛾 𝐿, respectively. Here, we set 𝛾 = 𝛾 𝐻 + 𝛾𝐿 [2] is load
flow to the average, so that is 𝜌 = 𝜌 𝐻 + 𝜌 𝐿, where 𝜌 𝐻 = 𝛾 𝐻 𝜇⁄ is the average load of high QoS
burst and 𝜌 𝐿 = 𝛾 𝐿 𝜇⁄ is the average load of the low QoS burst.
Figure 2. The retrial queueing analysis model with scheduling admission control for core nodes FDL-SPL
architecture in QoS supported
In Figure 2, low QoS bursts are put into the FDL queue with probability 𝜃 ( 𝜃 ≤ 1) when
congested, called retrial burst, and is reuse an available wavelength channel at the time
the retrial burst exits from FDL. Otherwise, it is returned to one of the FDLs with
probability 𝜃1( 𝜃1 ≤ 1) or is dropped with probability 1 − 𝜃1 ((1 − 𝜃1) is the probability
that the burst leaves the system forever) [2].
The interval time between the retrial bursts is also exponentially distributed and the
retrial rate is 𝜎.
The value of the wavelength channel reserved for the low priority class 𝑊𝐿 will be
determined by a function according to the value of incoming loads and will vary
accordingly with the traffic flow of priority classes 0 and 1 (corresponding to high QoS
FDL
(retrial queue)
W wavelengths
drop traffic
1
2
W
...
L
H
retrial traffic
WL
...
5. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
59
and low QoS). Accordingly, the need to calculate the burst (high QoS and low QoS) load
to perform bandwidth distribution (𝑊𝐿 value) for the low QoS bursts most effectively to
avoid wasting resources as well as reducing the probability of congestion. At that time,
the number of wavelength channels allocated for low QoS bursts 𝑊𝐿 (𝑊𝐿 < 𝑊) was
determined as the upper integer part of the formula (1) as follows [2]:
𝑊𝐿 = ⌈𝑊 ×
𝛾 𝐿
𝛾 𝐻 + 𝛾𝐿
⌉ (1)
With loading incoming traffic of high QoS bursts and low QoS bursts are determined based on
burst rate, average burst length and current bandwidth per wavelength channel in each observation
window ∆𝑡 and are calculated as follows:
𝛾𝐿 =
𝛾 𝐿
𝐴
𝜇 𝐿×𝑊
; 𝛾 𝐻 =
𝛾 𝐻
𝐴
𝜇 𝐻×𝑊
(2)
Where 𝛾𝐿(𝛾 𝐻) is the arrival burst rate, 𝜇 𝐿(𝜇 𝐻) is the average burst length of the low QoS bursts
(and corresponding high QoS bursts, where we assume that 𝜇 𝐿 = 𝜇 𝐻 = 𝜇) in each observation
window, calculated as follows:
γL
A
=
number_of_bursts_to_the_QoS_is_low
∆t
; γH
A
=
number_of bursts_to_the_QoS_is_high
∆t
(3)
µL =
total_burst_length_to_QoS_low
number_of_bursts_to_the_QoS_is_low
; µH =
total_burst_length_to_QoS_high
number_of bursts_to_the_QoS_is_high
(4)
With the above-mentioned approach, it makes ensuring priority for high QoS bursts, more flexibly
allocating the amount of wavelength that can be used for low QoS bursts. However, to support low
QoS traffic when congestion occurs, in this analytical model, we use FDLs additional for low QoS
bursts with consideration for factors of re-service (retrial) [2], i.e considering the possibility the
burst that may not be brought to FDL when it is congested with a probability value of 𝜃 or 𝜃1. At
that time, a burst is called retrial when it has passed through one of 𝑁𝑞 FDL. A retrial burst will
reuse a wavelength channel if it is available at the time the burst exits from FDL.
2.2.2. The state transition diagram
The state transition diagram then is shown in Figure 3. The state of the system is described by
two random variables in continuous time, {𝑋(𝑡), 𝑌(𝑡): 𝑡 ≥ 0}, in here 𝑋(𝑡) is the number of
occupied wavelength channels and 𝑌(𝑡) is the number of low QoS bursts congested in FDL
(retrial queue) at time 𝑡. The state-space of the Continuous-time Markov Chain (CTMC) process
(denoted by 𝑆) is described as follows: 𝑆 = {𝑖, 𝑗} with each pair (𝑖, 𝑗) defined: 𝑖 =
0, 1, 2, … , 𝑊; 𝑗 = 0, 1 ,2, … , 𝑁𝑞. Let 𝜋𝑖𝑗 be the steady-state probability that the system achieves in
the state ( 𝑖, 𝑗).
6. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
60
Figure 3. State transition diagram of the analytical model
We construct the transition rate matrix 𝑄 based on the transition state diagram shown in Figure 3
and the sub-matrices as follows [2]:
𝐴𝑗( 𝑖, 𝑘): defines the transition rate from the state ( 𝑖, 𝑗) to state ( 𝑘, 𝑗) (with 0 ≤ 𝑖, 𝑘 ≤
𝑊; 0 ≤ 𝑗 ≤ 𝑁𝑞) in cases when the burst arrives or when the burst is served. Service time
is exponentially distributed with the parameter 𝜇. The matrix Aj has dimensions ( 𝑊 +
1) × ( 𝑊 + 1) with elements Aj(i, k). Since 𝑗 is an independent level of Aj, we can write
Aj = A. The nonzero element of Aj is 𝐴𝑗( 𝑖, 𝑖 − 1) = 𝑖𝜇, 𝑖 = 0, … , 𝑊 ; 𝐴𝑗( 𝑖, 𝑖 + 1) =
𝛾, 𝑖 = 0, … , 𝑊𝐿 − 1 and 𝐴𝑗( 𝑖, 𝑖 + 1) = 𝛾 𝐻, 𝑖 = 𝑊𝐿,… , 𝑊.
0,0 0,1 0,2 0,Nq
1,0 1,1 1,2 1,Nq
W0 W,1 W,2
WL,0
WL+1,0 WL+1,1 WL+1,2 WL+1,Nq
Nq
Nq
Nq
Nq
1
Nq1
1 1
W,Nq
L LLL
H
W WWW HHH
L LLL
Nq1
111
H H H
H(WL+2) (WL+2) (WL+2)
(WL+2)
WL,1 WL,2 WL,Nq
L LLL
1 1 1 Nq1
WL
HHHH
(WL+1)(WL+1)(WL+1)(WL+1)
WL WL WL
7. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
61
𝐴𝑗 = 𝐴 =
(
0 𝛾 0 ⋯ 0 0 0
𝜇 0 𝛾 ⋯ 0 0 0
⋮ ⋮ ⋮ ⋮ ⋮ ⋮ ⋮
0 0 0 ⋯ ( 𝑊 − 1) 𝜇 0 𝛾 𝐻
0 0 0 ⋯ 0 𝑊𝜇 0 )
, (0 ≤ 𝑗 ≤ 𝑁𝑞) (5)
Bj(i, k): indicate a jump (up) from state ( 𝑖, 𝑗) to state ( 𝑘, 𝑗 + 1) (with 0 ≤ 𝑖, 𝑘 ≤ 𝑊; 0 ≤
𝑗 ≤ 𝑁𝑞 − 1) due to a request being served from low QoS bursts but all the wavelength
channels for them are busy (when 𝑖 = 𝑊𝐿). Matrix Bj (or B since 𝑗 is dependent level)
has dimensions ( 𝑊 + 1) × ( 𝑊 + 1) with elements Bj(i, k). The nonzero elements of Bj
is 𝐵𝑗( 𝑖, 𝑖) = 𝛾𝐿 𝜃 with 𝑊𝐿 ≤ 𝑖 ≤ 𝑊.
𝐵𝑗 = 𝐵 =
(
0 0 ⋯ 0 0
0 0 ⋯ 0 0
⋮ ⋮ ⋮ ⋮ ⋮
0 0 ⋯ 𝛾𝐿 𝜃 0
0 0 ⋯ 0 𝛾𝐿 𝜃)
, (0 ≤ 𝑗 ≤ 𝑁𝑞 − 1) (6)
Cj(i, k): indicate a jump (down) from state ( 𝑖, 𝑗) to state ( 𝑘, 𝑗 − 1) (0 ≤ 𝑖, 𝑘 ≤ 𝑊; 1 ≤
𝑗 ≤ 𝑁𝑞) due to a successful server being returned from FDL (orbit). Matrix Cj has
dimensions ( 𝑊 + 1) × ( 𝑊 + 1) with elements Cj(i, k). The nonzero elements Cj is
Cj(i, i + 1) = jσ (with 0 ≤ 𝑖 ≤ 𝑊 − 1) and Cj(i, i) = jσ(1 − θ1) with 𝑊𝐿 ≤ 𝑖 ≤ 𝑊.
𝐶𝑗 =
(
0 𝑗𝜎 0 ⋯ 0 0
0 0 𝑗𝜎 ⋯ 0 0
⋮ ⋮ ⋮ ⋮ ⋮ ⋮
0 0 0 ⋯ 𝑗𝜎(1 − 𝜃1) 𝑗𝜎
0 0 0 ⋯ 0 𝑗𝜎(1 − 𝜃1))
, (1 ≤ 𝑗 ≤ 𝑁𝑞) (7)
From here we also have the birth matrix 𝑄 of process 𝑆 as follows:
𝑄 =
(
𝑄1
(0)
𝑄0
(0)
𝑄2
(1)
𝑄1
(1)
𝑄0
(1)
𝑄2
(2)
𝑄1
(2)
⋱
⋱ ⋱ 𝑄0
(𝑁 𝑞−1)
𝑄2
(𝑁 𝑞)
𝑄1
(𝑁 𝑞)
)
(8)
With
{
𝑄0
(𝑗)
= 𝐵 (0 ≤ 𝑗 ≤ 𝑁𝑞 − 1),
𝑄2
(𝑗)
= 𝐶𝑗(1 ≤ 𝑗 ≤ 𝑁𝑞),
𝑄1
(0)
= 𝐴 − 𝐷 𝐴
− 𝐵,
𝑄1
(𝑗)
= 𝐴 − 𝐷 𝐴
− 𝐵 − 𝐷 𝐶 𝑗(1 ≤ 𝑗 ≤ 𝑁𝑞 − 1)
𝑄1
(𝐵)
= 𝐴 − 𝐷 𝐴
− 𝐷 𝐶 𝑗.
(9)
8. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
62
2.2.3. Equation system of equilibrium states
Call 𝑣𝑗 = (𝜋0,𝑗, 𝜋1,𝑗, … , 𝜋 𝑊−1,𝑗, 𝜋 𝑊,𝑗), (0 ≤ 𝑗 ≤ 𝑁𝑞) and 𝑣 = (𝑣0, 𝑣1, … , 𝑣 𝑁 𝑞−1, 𝑣 𝑁 𝑞
).
Clearly, the system is described by the Quasi-Birth and Death (QBD) process. Then, we have the
system of equations of equilibrium written as follows:
{
𝑣0 𝑄1
(0)
+ 𝑣1 𝑄2
(1)
= (0,0, … ,0)⏟
𝑊+1
,
𝑣𝑗−1 𝑄0
(𝑗−1)
+ 𝑣𝑗 𝑄1
(𝑗)
+ 𝑣𝑗+1 𝑄2
(𝑗+1)
= (0,0, … ,0)⏟ ,
𝑊+1
(1 ≤ 𝑗 ≤ 𝑁𝑞 − 1)
𝑣 𝑁 𝑞−1 𝑄0
(𝑁 𝑞−1)
+ 𝑣 𝑁 𝑞
𝑄1
(𝑁 𝑞)
= (0,0, … ,0)⏟
𝑊+1
(10)
Standardized conditions:
∑ ∑ 𝜋𝑖𝑗 = 1
𝑁 𝑞
𝑗=0
𝑊
𝑖=0
(11)
The system of equations of equilibrium was then built:
Q (
v0
v1
⋮
vNq
) = (
0
0
⋮
0
) (12)
Combine standardized equations ∑ ∑ 𝜋𝑖,𝑗
𝑊
𝑖=0
𝑁 𝑞
𝑗=0
= ∑ 𝑣𝑗
𝑁 𝑞
𝑗=0
𝑒 = 1. We calculated 𝑣𝑗 (𝑗 = 0, 𝑁𝑞).
2.2.4. Equation system of equilibrium states
The blocking probability of each high QoS traffic and low QoS traffic in Figure 3 can be
calculated as follows [7, 8, 9]:
The blocking probability of high QoS traffic - 𝑃𝐵 𝐻𝑖𝑔ℎ: High priority QoS bursts are
congested when there is no free wavelength at the output port at the time of arrival
(corresponding to states (0, 𝑊) to (𝑁𝑞, 𝑊) in Figure 3. At these states, all wavelength
channels have been occupied and the waiting space in the retrial queue is only for
congested low QoS bursts can be retried the service requests.
𝑃𝐵 𝐻𝑖𝑔ℎ = ∑ 𝜋 𝑊,𝑗
𝑁 𝑞
𝑗=0
(13)
The blocking probability of low QoS traffic - 𝑃𝐵𝐿𝑜𝑤: Low QoS bursts will be congested
when the 𝑊𝐿 wavelengths are busy (occupied) at the time the low QoS burst arrives.
Therefore, incoming low QoS bursts will not be able to be served on the first request.
However, in a model with a retrial queue, low QoS bursts become congested because
they cannot be served on the first request, and can request service again after a random
9. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
63
time. Therefore, the probability of congestion PBLow can be rewritten with retrial as
follows:
𝑃𝐵𝐿𝑜𝑤(𝑟𝑒𝑡𝑟𝑖𝑎𝑙) =
𝜎(1 − 𝜃1)
𝛾𝐿 𝜃
∑ ∑ 𝑗 ∙ 𝜋𝑖,𝑗
𝑁 𝑞
𝑗=1
𝑊
𝑖=𝑊 𝐿+1
(14)
With the system of linear equations to the formulas (9) and (10) found above, we can solve to
find the equilibrium probability 𝜋𝑖𝑗(using the method for calculating matrix 𝑄 [8]), from there we
can calculate the blocking probability according to the formulas (13) and (14).
3. THE ALGORITHM OF SCHEDULING ADMISSION CONTROL THAT
CONSIDERS QOS WITH FDL OPTICAL DELAY
To evaluate the analytical model above, in this paper, we also propose a scheduling admission
control algorithm that considers QoS with FDL optical delay based on the analytical model idea
in Section 2 above. The algorithm will be installed, simulated with network simulation package
Obs0.9a running on the NS2 platform. Simulation results are also compared with the analysis
results in Section 3. The algorithm details are presented as follows.
Algorithm 1:
INPUT:
𝐼 = {𝑏1, 𝑏2, . . . , 𝑏 𝑛}, 𝑏𝑖( 𝑠𝑖, 𝑒𝑖, 𝑝𝑟𝑖𝑜𝑖), 𝑛 is the set of incoming burst during the simulation
period;
𝑊: The number of channels out per link 𝑊 = {1,2, . . . , 𝑤};
𝑊 𝐿: The number of channels dedicated to the low QoS traffic;
𝑆𝐵 𝑘 set of bursts has been scheduled on channel 𝑘 (𝑘 ∈ 𝑊);
FDL delay, 𝐷 = 0.0001𝑚𝑠; corresponds to the value 𝑁𝑞 = 1
OUTPUT:
The set of bursts has been scheduled for low QoS class (𝐼𝐿);
The set of bursts has been scheduled for high QoS class QoS (𝐼 𝐻);
METHOD:
1 (initialize) ∆𝑡 = 0.0001𝑚𝑠; 𝑊𝐿 = 𝑊;
2 FOREACH 𝑏𝑖 ∈ 𝐼 DO
3 (initialize) 𝑠𝑐 = −1; 𝑔𝑎𝑝 𝑚𝑖𝑛 = ∞;
4 IF (𝑝𝑟𝑖𝑜𝑖 = 0)
5 number_of bursts_to_the_QoS_is_high = number_of bursts_to_the_QoS_is_high + 1;
6 total_burst_length_to_QoS_high = total_burst_length_to_QoS_high + (𝑒𝑖 − 𝑠𝑖);
7 𝑠𝑐 = 𝐵𝐹𝑉𝐹(𝑏𝑖, 𝑊);
8 ELSE
9 number_of_bursts_to_the_QoS_is_low = number_of_bursts_to_the_QoS_is_low + 1;
10 total_burst_length_to_QoS_low = total_burst_length_to_QoS_low + (𝑒𝑖 − 𝑠𝑖);
11 𝑠𝑐 = 𝐵𝐹𝑉𝐹(𝑏𝑖, 𝑊𝐿);
12 IF (𝑠𝑐 ≠ −1)
10. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
64
13 𝑆𝐶𝐻𝐸𝐷𝑈𝐿𝐸(𝑏𝑖, 𝑠𝑐)
14 IF (𝑝𝑟𝑖𝑜𝑖 = 0)
15 𝐼𝐿 = 𝐼𝐿 ∪ {𝑏𝑖};
16 ELSE
17 𝐼 𝐻 = 𝐼 𝐻 ∪ {𝑏𝑖};
18 ELSEIF (𝑝𝑟𝑖𝑜𝑖 = 1) //using FDL
19 𝑠𝑖 = 𝑠𝑖 + 𝐹𝐷𝐿;
20 𝑒𝑖 = 𝑒𝑖 + 𝐹𝐷𝐿;
21 𝑠𝑐 = 𝐵𝐹𝑉𝐹(𝑏𝑖, 𝑊𝐿);
22 IF (𝑠𝑐 ≠ −1)
23 𝑆𝐶𝐻𝐸𝐷𝑈𝐿𝐸𝑅(𝑏𝑖, 𝑠𝑐)
24 𝐼𝐿 = 𝐼𝐿 ∪ {𝑏𝑖};
25 ELSE𝐷𝑅𝑂𝑃( 𝑏𝑖)
26 IF (𝑡𝑖𝑚𝑒𝑐ℎ𝑜 ≥ ∆𝑡) // recalcution WL
27 𝛾𝐿
𝐴
=
number_of_bursts_to_the_QoS_is_low
∆𝑡
; γH
A
=
number_of_bursts_to_the_QoS_is_high
∆𝑡
;
28 𝜇 𝐿 =
total_burst_length_to_QoS_low
number_of_bursts_to_the_QoS_is_low
; 𝜇 𝐻 =
total_burst_length_to_QoS_high
number_of bursts_to_the_QoS_is_high
;
29
𝛾𝐿 =
𝛾 𝐿
𝐴
𝜇 𝐿×𝑊
; 𝛾 𝐻 =
𝛾 𝐻
𝐴
𝜇 𝐻×𝑊
;
30 𝑊𝐿 = ⌈𝑊 ×
𝛾 𝐿
𝛾 𝐻+𝛾 𝐿
⌉;
31 number_of bursts_to_the_QoS_is_high = 0; total_burst_length_to_QoS_high = 0;
32 number_of_bursts_to_the_QoS_is_low = 0; total_burst_length_to_QoS_low = 0;
33 Return;
FUCNTION 𝐵𝐹𝑉𝐹(𝑢𝑏, 𝑊):
INPUT
𝑢𝑏(𝑠 𝑢𝑏, 𝑒 𝑢𝑏): incoming burst not scheduled yet,
𝑊: the number of channels out on each link 𝑊 = {1,2, . . . , 𝑤};
𝑆𝐵 𝑘 set of bursts have been scheduled on channel 𝑘 (𝑘 ∈ 𝑊);
OUTOUT
𝑠𝑐: corresponding channel to schedule for the incoming burst.
METHOD:
1 𝑏𝑒𝑠𝑡_𝑢𝑡𝑖𝑙𝑖𝑠𝑎𝑡𝑖𝑜𝑛 = ∞; 𝑠𝑐 = −1;
2 FOR EACH 𝑘 ∈ 𝑊 DO
3 𝑒0,𝑘 = 0;s|𝑆𝐵 𝑘|+1,k =< ℎ𝑖𝑔ℎ 𝑣𝑎𝑙𝑢𝑒 >;
4 FOR EACH 𝑗 ∈ |𝑆𝐵 𝑘| do
5 IF(((𝑠 𝑢𝑏 ≥ 𝑒𝑗,𝑘) ∧ (𝑠𝑗+1,𝑘 ≥ 𝑒 𝑢𝑏)) ∧ ((𝑠𝑗+1,𝑘 − 𝑒𝑗,𝑘) < 𝑏𝑒𝑠𝑡_𝑢𝑡𝑖𝑙𝑖𝑠𝑎𝑡𝑖𝑜𝑛)))
11. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
65
6 𝑏𝑒𝑠𝑡_𝑢𝑡𝑖𝑙𝑖𝑠𝑎𝑡𝑖𝑜𝑛 = 𝑠𝑗+1,𝑘 − 𝑒𝑗,𝑘;
7 𝑠𝑐 = 𝑘;
8 RETURN sc;
The computational complexity of the Algorithm 1 is 𝑂(𝑛 ∗ 𝑙𝑜𝑔(𝑛)).
4. RESULTS AND DISCUSSION
Based on the blocking probability determined in formulas (12) and (13), we make a graphical
description (written in Mathematica) that the variation of blocking probability depends on
network traffic load (𝜌), number of wavelengths output (𝑊), length FDL. The analysis results
will also be compared with the simulation according to Algorithm 1 in Section 3 above (using the
Obs0.9a package running on the NS2 simulation software on the Dumbell network topology 20
edge nodes, 2 core nodes, with parameters number 𝑊 = 12, bandwidth per channel 1𝐺𝑏,
incoming bursts according to Poison distribution) to assess the accuracy of the analysis model.
The system model with the parameters 𝑊, 𝑊𝐿, 𝑁𝑞 changes;𝜇 = 0.015625, 𝜃 = 𝜃1 = 0.5.
Analysis results are also compared with simulations in some special cases. Let 𝛽 = 𝜌/𝑊 is
traffic load normalized at each output port, 𝛽 is considered in the range of 0.2 to 0.9 (Erlang) [1].
From Figure 4 (with the parameters 𝑊 = 16, 𝑁𝑞 = 1, 𝜌 𝐿 𝜌 𝐻⁄ = 2.333, 𝑊𝐿 calculated from
formula (1) according to the change in incoming speed (in this case 𝑊𝐿 = 11), 𝜇 = 0.015
(corresponds to the burst length of 64 bytes), σ = 0.8 ∙ γL) we see that increasing traffic load
by 𝛽, then the blocking probability the first time of high QoS and low QoS bursts increased
significantly.
Figure 4. Blocking probability of high QoS bursts and low QoS bursts vs 𝜷
Compared with the result in [1] (consider the case when the second retrial is not considered with
𝜃1 = 0), we get the result in Figure 5. When retrial is considered with 𝜃1 > 0, the blocking
probability of low QoS bursts is also improved.
1E-10
1E-09
1E-08
1E-07
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_Low_retrial
PB_High_retrial
β
12. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
66
Figure 5. Blocking probability of low QoSbursts with/without retrial for the 2nd time vs 𝜷
Another improvement in this model compared to [1] is that the value of 𝑊𝐿 changes with the
incoming speed of high and low QoS bursts. This allows adjusting the blocking probability of the
bursts when changing loads (changing incoming speed). As shown in Figure 6, when the QoS
burst load is high to increase 𝜌 𝐻 𝜌 𝐿⁄ = 2.333, based on the adjustment of value 𝑊𝐿 (𝑊𝐿 = 5)
value, the blocking probability of high QoS bursts will also be adjusted to not increase too high
(as shown in Figure 6, the blocking probability of high QoS bursts will be adjusted from line 2
(which is the line without 𝑊𝐿 adjustment) to line 3 (which is the line with 𝑊𝐿 = 5 adjustment)).
Figure 6. Blocking probability of high QoS bursts when changing load (𝝆 𝑳 𝝆 𝑯⁄ = 𝟐. 𝟑 and 𝝆 𝑳 𝝆 𝑯⁄ = 𝟎. 𝟒)
vs 𝜷
Similarly, when considering the low QoS traffic burst, the adjustment value 𝑊𝐿 will be done
when the load burst low QoS arrive will increase (as shown in Figure 7, the blocking probability
of low QoS bursts will be adjusted from line 1 (which is the line when𝑊𝐿 = 5) down to line 2 (is
the line with 𝑊𝐿 = 11 adjustments)).
1E-07
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_Low_retrial_θ_1=0.5
PB_Low_retrial_θ_1=0.0 [1]
β
1E-10
1E-09
1E-08
1E-07
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_High_roL/roH = 2.333_W_L=11 (1)
PB_High_roH/roL = 2.333_W_L=11 (2)
PB_High_roH/roL = 2.333_W_L=5 (3) β
13. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
67
Figure 7. The blocking probability of low QoS bursts when changing loads (𝝆 𝑳 𝝆 𝑯⁄ = 𝟎. 𝟒 and 𝝆 𝑳 𝝆 𝑯⁄ =
𝟐. 𝟑) vs 𝜷
With the same parameters as shown in Figure 7 but considered with the model's overall blocking
probability (blocking probability of both flows) is also shown in Figure 8.
Figure 8. The burst blocking probability when changing loads (𝝆 𝑳 𝝆 𝑯⁄ = 𝟎. 𝟒 and 𝝆 𝑳 𝝆 𝑯⁄ = 𝟐. 𝟑) vs 𝜷
Figures 9 and 10 show the blocking probability of the low QoS bursts and the general blocking
probability (respectively) when adjusting the values of 𝜃1, 𝜌 𝐿 𝜌 𝐻⁄ = 2.3, it is clear that when
increasing probability 𝜃1, the blocking probability of bursts low QoS, as well as the overall
blocking probability is significantly reduced.
1E-10
1E-09
1E-08
1E-07
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_Low_roL/roH = 0.4_W_L=5 (1)
PB_Low_roL/roH = 2.333_W_L=11 (2)
β
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_roL/roH = 0.4_W_L=5
PB_roL/roH = 2.333_W_L=5
PB_roL/roH = 2.333_W_L=11 β
14. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
68
Figure 9. The blocking probability of low QoS bursts when changing 𝜽 𝟏 vs 𝜷
Figure 10. The overall blocking probability of the bursts (low QoS and high QoS) when changing 𝜽 𝟏
We consider the same as above, the blocking probability of high QoS bursts in Figure 11 is also
changed (with increasing, especially at high loads) although not significantly (this shows that the
value of 𝜃1 does not significantly affect high QoS bursts).
1E-10
1E-09
1E-08
1E-07
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_Low_retrial_θ_1 = 0.5
PB_Low_retrial_θ_1 = 0.9
β
1E-10
1E-09
1E-08
1E-07
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_retrial_θ_1 = 0.5
PB_retrial_θ_1 = 0.9
β
15. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
69
Figure 11. The blocking probability of high QoS bursts when changing𝜽 𝟏 vs 𝜷
Thus, with the above analysis results, the model presented by the paper meets the requirements of
the analysis to ensure that the blocking probability of high QoS bursts is always lower than low
QoS bursts based on allocating wavelength channel numbers for low QoS bursts (𝑊𝐿) and
allowable probabilities for low QoS bursts (𝜃 and 𝜃1). The results of the analysis to ensure
reliability and accuracy. In addition, the results of the analysis are also compared with the
simulation results (using the OBS.09a simulation package running on NS2 with Algorithm 1)
with parameters consistent with the analysis model: 𝑊 = 12, 𝑁𝑞 = 1, 𝜌 𝐻 𝜌 𝐿⁄ = 2.333, 𝑊𝐿 from
formula (1) according to the change in incoming speed (in this case 𝑊𝐿 = 4 ), 𝜇 = 0.015625
(burst length is 64 byte), 𝜎 = 0.65 ∙ 𝛾𝐿), 𝜃 = 0.8; 𝜃1 = 0. The results shown in Figure 12 show
the validity of simulation and analysis results, especially at high loads. However, in some low
load cases, the number of bursts arriving in each time slot is small so the prediction has not been
effective.
Figure 12. The overall blocking probability compared between analytical and simulation with the retrial vs
𝜷
1E-10
1E-09
1E-08
1E-07
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_High_retrial_θ_1 = 0.5
PB_High_retrial_θ_1 = 0.9
β
1E-06
1E-05
0.0001
0.001
0.01
0.1
1
0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_retrial_Ana
PB_retrial_Sim
β
16. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
70
The results in Figure 12 show high accuracy at high loads, but with low loads, there is also a
difference but also within permitted limits. This difference is also perfectly theoretical, whereby,
when the load is low, the number of bursts coming in each time slot is small, so the prediction
may not be effective (in terms of the simulation). Similarly, in Figure 13, with a comparison of
the overall blocking probability of the two high and low QoS classes in the absence of retrial
between analysis results and simulation results. Figures 12 and 13 confirm the correctness of our
proposed model.
Figure 13. The overall blocking probability compared between analytical and simulation without
considering a retrial vs 𝜷
As the results were analyzed on the chart in Figures 7, 8 and 9, we found that when the traffic
load bursts changes, 𝑊𝐿 value will also be adjusted to change appropriately. In this paper, 𝑊𝐿
changes are also done through simulation as shown in Figure 14.
Figure 14. The results for statistics of incoming traffic load and number of reserved 𝑾 𝑳 channels for the
low priority class
The results are shown in Figure 14 show that when the traffic load between the high and low
priority class changes, Algorithm 1 will adjust the appropriate 𝑊𝐿 value to meet the status of
incoming flows until the next time, for the purpose of increasing bandwidth utilization and
reducing burst loss. This has been shown in Figures. 6, 7 and 8 (adjustment in value 𝑊𝐿 varies
1E-05
0.0001
0.001
0.01
0.1
1
0.3 0.4 0.5 0.6 0.7 0.8 0.9
PB_no_retrial_Ana
PB_no_retrial_Sim
β
0
0.2
0.4
0.6
0.8
1 11 21 31 41 51 61 71 81 91 101
TrafficLoad
Predicted time slot
High QoS traffic Low QoS traffic
4
6
8
10
12
14
1 11 21 31 41 51 61 71 81 91 101
WL
Predicted time slot
W_L
17. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
71
when the traffic load of the low QoS bursts increases), which shows that the blocking probability
is significantly improved when a reasonable increase of the value𝑊𝐿 (to 𝑊𝐿 = 11) is compared
with the fixed case 𝑊𝐿 (𝑊𝐿 = 5). This is also an improvement of the propose model compared to
the model in [2].
5. CONCLUSIONS
The paper proposes a performance analysis and evaluation model at the OBS core architecture SPL
- feed-forward with the retrial queue model. Different from previous studies, the proposed model
considers the retrial factor for FDL optical delay, i.e. considering the possibility that the burst may
not be brought to FDL when it is congested with a probability value of 𝜃 or 𝜃1. Also, we proposed
an algorithm scheduling admission control with QoS consideration for the analysis model.
Theoretical analysis results, as well as simulations, show the correctness of our proposed model.
CONFLICTS OF INTEREST
The authors declare no conflict of interest.
ACKNOWLEDGEMENTS
The authors would like to thank everyone, just everyone! This work was supported by the Strong Research
Group Program of Hue University.
REFERENCES
[1] Chuong Dang Thanh, Loi Vu Duy, Nhat Vo Viet Minh (2011). A Performance Analysis of Deflection
Routing and FDLs with Wavelength-Based QoS in OBS Networks. International Conference on
Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), ISBN: 978-1-4577-
1827-4, pp 72-78 (IEEE).
[2] Chuong Dang Thanh, Duc Pham Trung, Thang Doan Van (2018).A Retrial Queueing model with
FDL at OBS core node. Network Protocols and Algorithms, ISSN 1943-3581, Vol. 10, No. 3, 1-17
[3] Tien Van Do, Ram Chakka (2010). A new performability model for queueing and FDL-related burst
loss in optical switching nodes. Computer Communications 33 (2010) S146–S151.
[4] Akar Nail, and Sohraby Khosrow (2011). Retrial Queueing Models of Multi-wavelength FDL
Feedback Optical Buffers. IEEE Trans. Communications 59(10): 2832-2840
[5] Conor McArdle, Daniele Tafani and Liam P. Barry (2011). Analysis of a Buffered Optical Switch
with General Interarrival Times. Journal of Networks, vol. 6, no. 4, April 2011.
[6] Venkatesh, C. Siva Ram Murthy. An Analytical Approach to Optical Burst Switched Networks,
Springer ISBN 978-1-4419-1509-2, Chennai, India, August 2009.
[7] Yoshinori Ozaki and Hideaki Takagi (2010). Analysis of Mixed Loss-Delay M/M/m/K Queueing
Systems with State-Dependent Arrival Rates. Advances in Queueing Theory and Network
Applications, W. Yue et al. (eds.), Springer Science+Business Media LLC, pp. 181-194.
[8] Tien Van Do, Ram Chakka. An efficient method to compute the rate matrix for retrial queues with
large number of servers. Applied Mathematics Letters 23, (2010) 638-643
[9] Daniele Tafani, (2012). Analytic Modelling and Resource Dimensioning of Optical Burst Switched
Networks. Doctor of Philosophy, School of Electronic Engineering, Faculty of Engineering and
Computing, Dublin City University.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.12, No.5, September 2020
72
AUTHORS
Dang Thanh Chuong obtained his doctorate in Mathematical Foundation for
Computers and Computing Systems in 2014 from the Institute of Information
Technology, Vietnam Academy of Science and Technology (VAST). He has published
over 20 research papers. His research interests are in the fields of all-optical networks
with emphasis on packet/burst-based switching, Contention Resolution, and Quality of
Service; Queueing Theory and Retrial Queue. Email: dtchuong@hueuni.edu.vn
Nguyen Hong Quoc received his Ph.D. degree in computer science from the Faculty of
Sciences, Hue University, Vietnam, in 2018. His research interests are in the fields of
all-optical networks with emphasis on packet/burst-based switching, scheduling, and
quality of service. Email: nhquoc@hueuni.edu.vn
Van Thang Doan obtained his doctorate in Mathematical Foundation for Computers
and Computing Systems in 2014 from the Institute Of Information Technology,
Vietnam Academy of Science and Technology (VAST). His main research interests
include the fuzzy database, hedge algebras, and detection, prevention, avoidance of
cloud computing, and distributed systems. He serves as a technical committee program
member, track chair, session chair, and reviewer of many international conferences and
journals. Email: doanvanthang@iuh.edu.vn
Pham Trung Duc In 2010, he graduated with a Bachelor of Information Technology
from the University of Sciences, Hue University. In 2012, he received a Master's degree
in Computer Science from Hue University of Sciences. Currently, he is a PhD student at
Hue University of Sciences, Hue University (from December 2016 to the present).
Research fields: OBS network, QoS differentiation, scheduling admission control, QoS
improvement, QoS provisioning. Email: phamtrungduc@hueuni.edu.vn