An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method (presentation)
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
An analytic network process and trapezoidal interval-valued fuzzy technique f...University of Piraeus
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSijwmn
The future generation wireless networks are expected to beheterogeneous networksconsisting of UMTS,
WLAN, WiMAX, LTE etc. A heterogeneous network provides users with different data rate and Quality of
Service (QoS). Users of future mobile networks will be able to choose from different radio access
technologies. These networks vary widely in service capabilities such as coverage area, bandwidth and
error characteristics. Network selection is a challenging task in heterogeneous networks and will
influence the performance metrics of importance for both service provider and subscriber.This paper
analysesuser centric network selection based on QoE (Quality of Experience) which include both
technical and economical aspects of the user. WLAN-WiMAX-UMTS networks are integrated and the
network selection for the integrated network is performed using game theory based network selection
algorithm.
Application-Based QoS Evaluation of Heterogeneous Networks csandit
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the
network architecture and resources in a dynamic fashion. However, the presence of different
communication technologies makes the Quality of Service (QoS) evaluation, management, and
monitoring of these networks very challenging. Each communication technology has its own
characteristics while the applications that utilize them have their specific QoS requirements.
Although, the communication technologies have different performance assessment parameters,
the applications using these radio access networks have the same QoS requirements. As a
result, it would be easier to evaluate the QoS of the access networks and the overall network
configuration depending on the performance of applications running on them. Using such
application-based QoS evaluation approach, the heterogeneous nature of the underlying
networks and the diversity of their traffic can be adequately taken into account. In this paper,
we propose an application-based QoS evaluation approach for heterogeneous networks.
Through simulation studies, we show that this assessment approach facilitates better QoS
management and monitoring of heterogeneous network configurations.
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
In today’s businesses, service-oriented architectures represent the main paradigm for IT infrastructures.
Indeed, the emergence of Internet made it possible to set up an exploitable environment to distribute applications on a large scale, and this, by adapting the notion of “service”. With the integration of this paradigm in Business to Business Domain (B2B), the number of web services becomes very significant. Due to
this increase, the discovery and selection of web services meeting customer requirement become a very
difficult operation. Further, QoS properties must be taking into account in the web service selection. Moreover, with the significant number of web service, necessary time for the discovery of a service will be rather
long. In this paper, we propose an approach based on a new heuristic method called “Bees Algorithm”
inspired from honey bees behavior. We use this technique of optimization in order to discover appropriate
web services, meeting customer requirements, in least time and taking into account the QoS properties
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...Sebastian Schumann
This paper describes an implementation for monitoring the QoS and expecting the QoE of a voice communication in a Real-time Transport Protocol (RTP) based telecommunication environment. The resulting QoS parameters are evaluated; the QoE is determined with the E-Model and processed for graphical presentation. With the use of some open-source programming libraries, the presented prototype can be a helpful alternative for expensive measurement devices and is ready to be deployed in a widespread telecom environment at low cost. Presented at NGMAST 2011 in Cardiff, UK.
An analytic network process and trapezoidal interval-valued fuzzy technique f...University of Piraeus
Next generation wireless networks consist of many heterogeneous access technologies that should support various service types with different quality of service (QoS) constraints, as well as user, requirements and provider policies. Therefore, the need for network selection mechanisms that consider multiple factors must be addressed. In this paper, a network selection method is proposed by applying the analytic network process to estimate the weights of the selection criteria, as well as a fuzzy version of technique for order preference by similarity to ideal solution to perform the ranking of network alternatives. The method is applied to a heterogeneous network environment providing different QoS classes and policy characteristics. Each user applies the method to select the most appropriate network, which satisfies his or her requirements in respect of his or her service-level agreement (SLA). Performance evaluation shows that when the user requests only one service, the proposed method performs better compared to the original technique for order preference by similarity to ideal solution, as well as the Fuzzy AHP-ELECTRE method. Moreover, the proposed method can be applied in cases where a user requires multiple services simultaneously on a device. The sensitivity analysis of the proposed method shows that it can be properly adjusted to conform to network environment changes.
In this paper, an application-based QoS evaluation approach for heterogeneous networks is proposed.It is possible to expand the network capacity and coverage in a dynamic fashion by applying heterogeneous wireless network architecture. However, the Quality of Service (QoS) evaluation of this type of network architecture is very challenging due to the presence of different communication technologies. Different communication technologies have different characteristics and the applications that utilize them have unique QoS requirements. Although, the communication technologies have different performance measurement parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration based on the performance of applications running on them. Using such applicationbased QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. Through simulation studies, we show that the application performance based assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
USER CENTRIC NETWORK SELECTION IN WIRELESS HETNETSijwmn
The future generation wireless networks are expected to beheterogeneous networksconsisting of UMTS,
WLAN, WiMAX, LTE etc. A heterogeneous network provides users with different data rate and Quality of
Service (QoS). Users of future mobile networks will be able to choose from different radio access
technologies. These networks vary widely in service capabilities such as coverage area, bandwidth and
error characteristics. Network selection is a challenging task in heterogeneous networks and will
influence the performance metrics of importance for both service provider and subscriber.This paper
analysesuser centric network selection based on QoE (Quality of Experience) which include both
technical and economical aspects of the user. WLAN-WiMAX-UMTS networks are integrated and the
network selection for the integrated network is performed using game theory based network selection
algorithm.
Application-Based QoS Evaluation of Heterogeneous Networks csandit
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the
network architecture and resources in a dynamic fashion. However, the presence of different
communication technologies makes the Quality of Service (QoS) evaluation, management, and
monitoring of these networks very challenging. Each communication technology has its own
characteristics while the applications that utilize them have their specific QoS requirements.
Although, the communication technologies have different performance assessment parameters,
the applications using these radio access networks have the same QoS requirements. As a
result, it would be easier to evaluate the QoS of the access networks and the overall network
configuration depending on the performance of applications running on them. Using such
application-based QoS evaluation approach, the heterogeneous nature of the underlying
networks and the diversity of their traffic can be adequately taken into account. In this paper,
we propose an application-based QoS evaluation approach for heterogeneous networks.
Through simulation studies, we show that this assessment approach facilitates better QoS
management and monitoring of heterogeneous network configurations.
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
In today’s businesses, service-oriented architectures represent the main paradigm for IT infrastructures.
Indeed, the emergence of Internet made it possible to set up an exploitable environment to distribute applications on a large scale, and this, by adapting the notion of “service”. With the integration of this paradigm in Business to Business Domain (B2B), the number of web services becomes very significant. Due to
this increase, the discovery and selection of web services meeting customer requirement become a very
difficult operation. Further, QoS properties must be taking into account in the web service selection. Moreover, with the significant number of web service, necessary time for the discovery of a service will be rather
long. In this paper, we propose an approach based on a new heuristic method called “Bees Algorithm”
inspired from honey bees behavior. We use this technique of optimization in order to discover appropriate
web services, meeting customer requirements, in least time and taking into account the QoS properties
A Network and Position Proposal Scheme using a Link-16 based C3I SystemUniversity of Piraeus
The smart usage of hi-end military technological solutions in daily activities makes people life better. This paper describes a network and position proposal scheme in respect of technical networking and positioning information. A Link-16 based Command, Control, Communication and Intelligence (C3I) system is established among the mobile devices. Each device knows its geographical position using its GPS. A network along with a possible good position for user’s service is proposed, fulfilling his/her requirements for comfortable work.
Open-Source Based Prototype for Quality of Service (QoS) Monitoring and Quali...Sebastian Schumann
This paper describes an implementation for monitoring the QoS and expecting the QoE of a voice communication in a Real-time Transport Protocol (RTP) based telecommunication environment. The resulting QoS parameters are evaluated; the QoE is determined with the E-Model and processed for graphical presentation. With the use of some open-source programming libraries, the presented prototype can be a helpful alternative for expensive measurement devices and is ready to be deployed in a widespread telecom environment at low cost. Presented at NGMAST 2011 in Cardiff, UK.
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
This paper presents a brief review of some existing correlation models which attempt to map Quality of
Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic
network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum
bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception,
expectations, and experience of the application and network performance. The Holy Grail of subjective
measurement is to predict it from the objective measurements; in other words predict QoE from a given set
of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are
only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE
mapping.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONIJCNCJournal
Internet of Things (IoT) allows communication among human-to-things, things-to-human, and things-tothings that are incorporated into an information networks allowing automatic information interchange and
the processing of data at real time. In this paper, we conduct a performance analysis of a real application
defined through four traffic classes with the priorities present in smart cities using Continuous Time
Markov Chains(CTMC). Based on a finite capacity queuing system, we propose a new cost-effective
analytical model with a push-out management scheme in favor of the highest priority (emergency) traffic.
Based on the analytical model, several performance measures for different traffic classes have been
studiedextensively including blocking probability; push out probability, delay, channel utilization as well as
overall system performance.
A Study of Protocols for Grid Computing EnvironmentCSCJournals
Using grid systems efficiently has to face many challenges. One of them is the efficient exchange of data between distant components exacerbated by the diversity of existing protocols for communicating participants. Grid computing will reach its vast potential if and only if, the underlying networking infrastructure is able to transfer data across quite long distances in a very effective manner. Experiences show that advanced distributed applications executed in existing large scale computational grids are often able to use only a small fraction of available bandwidth. The reason for such a poor performance is the TCP, which works only in low bandwidth and low delay networks. Several new transport protocols have been introduced, but a very few are widely used in grid computing applications, these protocols can be categorized in three broad categories viz. TCP based, UDP based and Application layer protocols. We study these protocols and present its performance and research activities that can be done in these protocols.
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
Servers in data center networks handle heterogeneous bulk loads. Load balancing, therefore, plays an important role in optimizing network bandwidth and minimizing response time. A complete knowledge of the current network status is needed to provide a stable load in the network. The process of network status catalog in a traditional network needs additional processing which increases complexity, whereas, in software defined networking, the control plane monitors the overall working of the network continuously. Hence it is decided to propose an efficient load balancing algorithm that adapts SDN. This paper proposes an efficient algorithm TAASLB-traffic-aware adaptive server load balancing to balance the flows to the servers in a data center network. It works based on two parameters, residual bandwidth, and server capacity. It detects the elephant flows and forwards them towards the optimal server where it can be processed quickly. It has been tested with the Mininet simulator and gave considerably better results compared to the existing server load balancing algorithms in the floodlight controller. After experimentation and analysis, it is understood that the method provides comparatively better results than the existing load balancing algorithms.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...IJECEIAES
Identification of bandwidth-heavy Internet traffic is important for network administrators to throttle high-bandwidth application traffic. Flow features based classification have been previously proposed as promising method to identify Internet traffic based on packet statistical features. The selection of statistical features plays an important role for accurate and timely classification. In this work, we investigate the impact of packet inter-arrival time feature for online P2P classification in terms of accuracy, Kappa statistic and time. Simulations were conducted using available traces from University of Brescia, University of Aalborg and University of Cambridge. Experimental results show that the inclusion of inter-arrival time (IAT) as an online feature increases simulation time and decreases classification accuracy and Kappa statistic.
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...ijwmn
This paper presents a user-centric and application-specific QoS assessment methodology for cellular
communication networks. Specifically, it uses the Analytic Hierarchy Process (AHP) to evaluate QoS as a
multi-criteria decision problem that represents how well cellular networks’ data services are perceived
given particular sets of application classes and relative to other networks servicing in the same area. As
part of the methodology, drive testing is performed to collect objective measurements associated with
identified QoS criteria for data services. Once drive testing is performed and data collected, multiple
networks are compared to determine the network that provides higher QoS based on users’ perception of
quality. The selection of the best performing network is based on the output provided by the AHP
approach, which is used as unified measurement of the perceived QoS by users on different networks. In
order to determine application-specific priorities, the approach presented uses three different application
classes, including Emergency, Business, and Personal. For each class, the relative importance of each
quality evaluation criteria is adjusted in the AHP procedure to reflect the priorities of the services
expected. Through several case studies, the approach is proven successful in providing a way for
analyzing user-centric QoS for application-specific scenarios.
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...IJCNCJournal
Monitoring of the performance of wireless network is of vital importance for both users and the service provider which should be accurate, simple and fast enough to reflect the network performance in a timely manner. The aim of this paper is to develop an approach which can infer the performance of wireless ad hoc networks based on Quality of service (QoS) parameters assessment. The developed method considers the QoS requirements of multimedia applications transmitted over these kind of networks. This approach is based on the ideas of combination of both active and passive measurement methods. This approach uses an in-service measurement method in which the QoS parameters of the actual application (user) are estimated by means of dedicated monitoring packets (probes). Afterwards, these parameters are combined to produce and assess the application’s overall QoS using the fuzzy logic assessment and based on the measured QoS parameters estimated using the probe traffic. The active scheme is used to generate monitoring probe packets which are inserted between blocks of target application packets at regular intervals. While the passive monitoring is utilized to act as a traffic meter which performs as a counter of user packets (and bytes) that belong to the application (user) traffic flow that is subjected to monitoring. After simulating the developed technique, it offered a good estimation for the delay, throughput, packet losses and the overall QoS when using different probe rates.
Las plataformas IoT deben permitir la comunicación entre las aplicaciones y los dispositivos de acuerdo con sus requisitos no funcionales. Algunos de los principales requisitos no funcionales son la calidad del servicio (QoS, por sus siglas en inglés) y la calidad de la experiencia (QoE, por sus siglas en inglés), entre otros. En esta charla se presenta una Plataforma Autonómica para IoT (Internet of Things, por sus siglas en inglés), para la gestión de la QoS y QoE, basada en el concepto de ciclo autonómico de tareas de análisis de datos. En esta plataforma se han definido varios ciclos autonómicos de análisis de datos. Esta charla presenta algunos de esos ciclos autonómicos, y analiza sus capacidades de diagnóstico, basada en el perfil de estado operacional determinado por ellos.
The beginning stage of research is concentrated on review of literature, books, relevant research papers progress of IEEE task groups.
Different routing protocols, MAC protocols and cross layer approach were studied.
During this phase different routing protocols, passive bandwidth estimation techniques, MAC protocols, hidden and exposed node problem, radio propagation model were examined.
Review of literature was done by comparing the reactive QoS aware routing protocols.
The main difference involves the techniques for estimation of bandwidth and admission control schemes.
In the final phase development of routing protocols based on proposed bandwidth estimation techniques, admission control and route repair mechanisms have been implemented in order to analyze them for QoS constraint incluDCMded in this research
AC was also implemented based on channel partition
The proposed methods and protocols are implemented and analyzed using NS-2.35
SURVEY ON QOE\QOS CORRELATION MODELS FORMULTIMEDIA SERVICESijdpsjournal
This paper presents a brief review of some existing correlation models which attempt to map Quality of
Service (QoS) to Quality of Experience (QoE) for multimedia services. The term QoS refers to deterministic
network behaviour, so that data can be transported with a minimum of packet loss, delay and maximum
bandwidth. QoE is a subjective measure that involves human dimensions; it ties together user perception,
expectations, and experience of the application and network performance. The Holy Grail of subjective
measurement is to predict it from the objective measurements; in other words predict QoE from a given set
of QoS parameters or vice versa. Whilst there are many quality models for multimedia, most of them are
only partial solutions to predicting QoE from a given QoS. This contribution analyses a number of previous
attempts and optimisation techniquesthat can reliably compute the weighting coefficients for the QoS/QoE
mapping.
Call Admission Control Scheme With Multimedia Scheduling Service in WiMAX Net...Waqas Tariq
WiMAX network introduces a multimedia data scheduling service with different quality of service (QoS) requirements. Transmission opportunities are scheduled by the service according to the types of traffic data for the different connections or users. In the paper, we first propose a uniform definition of QoS level for the multimedia data types in the service. The QoS level of a connection are determined by the type of data of the connection and its allocated resources. Based on these QoS levels, we propose a call admission control (CAC) scheme for the entry admission of a new connection without degrading the network performance and the QoS of ongoing connections. The key idea of this scheme is to regulate the arriving traffic of the network such that the network can work at an optimal point, given under a heavy load traffic. Taking advantage of the simulation experiments, we confirm the fact that the proposed scheme can achieve better trade-off between the overall performance of network system and the QoS level of individual connection.
AN OPTIMIZED MECHANISM FOR ADAPTIVE AND DYNAMIC POLICY BASED HANDOVER IN CLUS...pijans
On-going revolution in ever-improving wireless communication enforces the necessity of a self configuring,
rapidly deployable and infrastructure less network. MANET is such an autonomous wireless network that
meets the requirements. At the same time MANET’s random behavior and absence of any central
intelligence to gather unambiguous knowledge about user contexts complexes QoS maintenance and
hampers proper utilization of network resources resulting into unnecessary handovers. In past, few policy
driven handover approaches have been proposed for MANET but none of them explores a comprehensive
policy design. Therefore in this paper we propose an adaptive and optimized policy based handover
mechanism which is based on explicitly designed policies like load balancing, service discovery and next
hop selection .Efficient procedures for these policies are also explored .This work predicts the high time of
handover need on the basis of application specific needs of individual freely roaming mobile nodes,
avoiding unnecessary handovers and provides efficient handover procedure with optimized resource
consumption, reduced latency and interruption time.
A MARKOVIAN MODEL FOR INTERNET OF THINGS APPLICATIONIJCNCJournal
Internet of Things (IoT) allows communication among human-to-things, things-to-human, and things-tothings that are incorporated into an information networks allowing automatic information interchange and
the processing of data at real time. In this paper, we conduct a performance analysis of a real application
defined through four traffic classes with the priorities present in smart cities using Continuous Time
Markov Chains(CTMC). Based on a finite capacity queuing system, we propose a new cost-effective
analytical model with a push-out management scheme in favor of the highest priority (emergency) traffic.
Based on the analytical model, several performance measures for different traffic classes have been
studiedextensively including blocking probability; push out probability, delay, channel utilization as well as
overall system performance.
A Study of Protocols for Grid Computing EnvironmentCSCJournals
Using grid systems efficiently has to face many challenges. One of them is the efficient exchange of data between distant components exacerbated by the diversity of existing protocols for communicating participants. Grid computing will reach its vast potential if and only if, the underlying networking infrastructure is able to transfer data across quite long distances in a very effective manner. Experiences show that advanced distributed applications executed in existing large scale computational grids are often able to use only a small fraction of available bandwidth. The reason for such a poor performance is the TCP, which works only in low bandwidth and low delay networks. Several new transport protocols have been introduced, but a very few are widely used in grid computing applications, these protocols can be categorized in three broad categories viz. TCP based, UDP based and Application layer protocols. We study these protocols and present its performance and research activities that can be done in these protocols.
Traffic-aware adaptive server load balancing for softwaredefined networks IJECEIAES
Servers in data center networks handle heterogeneous bulk loads. Load balancing, therefore, plays an important role in optimizing network bandwidth and minimizing response time. A complete knowledge of the current network status is needed to provide a stable load in the network. The process of network status catalog in a traditional network needs additional processing which increases complexity, whereas, in software defined networking, the control plane monitors the overall working of the network continuously. Hence it is decided to propose an efficient load balancing algorithm that adapts SDN. This paper proposes an efficient algorithm TAASLB-traffic-aware adaptive server load balancing to balance the flows to the servers in a data center network. It works based on two parameters, residual bandwidth, and server capacity. It detects the elephant flows and forwards them towards the optimal server where it can be processed quickly. It has been tested with the Mininet simulator and gave considerably better results compared to the existing server load balancing algorithms in the floodlight controller. After experimentation and analysis, it is understood that the method provides comparatively better results than the existing load balancing algorithms.
Efficient P2P data dissemination in integrated optical and wireless networks ...TELKOMNIKA JOURNAL
The Quality of Service (QoS) resource consumption is always the tricky problem and also
the on-going issue in the access network of mobile wireless part because of its dynamic nature of network
wireless transmissions. It is very critical for the infrastructure-less wireless mobile ad hoc network that is
distributed while interconnects in a peer-to-peer manner. Toward resolve the problem, Taguchi method
optimization of mobile ad hoc routing (AODVUU) is applied in integrated optical and wireless networks
called the adLMMHOWAN. Practically, this technique was carry out using OMNeT++ software by building
a simulation based optimization through design of experiment. Its QoS network performance is examined
based on packet delivery ratio (PDR) metric and packet loss probabilities (PLP) metric that consider
the scenario of variation number of nodes. During the performing stage with random mobile connectivity
based on improvement in optimized front-end wireless domain of AODVUU routing, the result is performing
better when compared with previous study called the oRia scheme with the improvement of 14.1% PDR
and 43.3% PLP in this convergence of heterogeneous optical wireless network.
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...IJECEIAES
Identification of bandwidth-heavy Internet traffic is important for network administrators to throttle high-bandwidth application traffic. Flow features based classification have been previously proposed as promising method to identify Internet traffic based on packet statistical features. The selection of statistical features plays an important role for accurate and timely classification. In this work, we investigate the impact of packet inter-arrival time feature for online P2P classification in terms of accuracy, Kappa statistic and time. Simulations were conducted using available traces from University of Brescia, University of Aalborg and University of Cambridge. Experimental results show that the inclusion of inter-arrival time (IAT) as an online feature increases simulation time and decreases classification accuracy and Kappa statistic.
Impact of Packet Inter-arrival Time Features for Online Peer-to-Peer (P2P) Cl...
Similar to An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method (presentation)
CHARACTERIZATION OF USER-PERCEIVED QUALITY OF SERVICE (QOS) IN MOBILE DEVICES...ijwmn
This paper presents a user-centric and application-specific QoS assessment methodology for cellular
communication networks. Specifically, it uses the Analytic Hierarchy Process (AHP) to evaluate QoS as a
multi-criteria decision problem that represents how well cellular networks’ data services are perceived
given particular sets of application classes and relative to other networks servicing in the same area. As
part of the methodology, drive testing is performed to collect objective measurements associated with
identified QoS criteria for data services. Once drive testing is performed and data collected, multiple
networks are compared to determine the network that provides higher QoS based on users’ perception of
quality. The selection of the best performing network is based on the output provided by the AHP
approach, which is used as unified measurement of the perceived QoS by users on different networks. In
order to determine application-specific priorities, the approach presented uses three different application
classes, including Emergency, Business, and Personal. For each class, the relative importance of each
quality evaluation criteria is adjusted in the AHP procedure to reflect the priorities of the services
expected. Through several case studies, the approach is proven successful in providing a way for
analyzing user-centric QoS for application-specific scenarios.
Quality of experience aware network selection model for service provisioning...IJECEIAES
Heterogeneous wireless networks (HWNs) are capable of integrating the different radio access technologies that make it possible to connect mobile users based on the performance parameters. Further quality of service (QoS) is one of the major topics for HWNs, moreover existing radio access technology (RAT) methodology are designed to provide network QoS criteria. However, limited work has been carried out for the RAT selection mechanism considering user QoS preference and existing models are developed based on the multi-mode terminal under a given minimal density network. For overcoming research issues this paper present quality of experience (QoE) RAT (QOE-RAT) selection methodology, incorporating both network performance criteria and user preference considering multiple call and multi-mode HWNs environment. First, this paper presents fuzzy preference aware weight (FPAW) and multi-mode terminal preference aware TOPSIS (MMTPA-TOPSIS) for choosing the best RAT for gaining multiservices. Experiment outcomes show the QOE-RAT selection method achieves much superior packet transmission outcomes when compared with state-of-art Rat selection methodologies.
Wireless Networks Performance Monitoring Based on Passive-active Quality of S...IJCNCJournal
Monitoring of the performance of wireless network is of vital importance for both users and the service provider which should be accurate, simple and fast enough to reflect the network performance in a timely manner. The aim of this paper is to develop an approach which can infer the performance of wireless ad hoc networks based on Quality of service (QoS) parameters assessment. The developed method considers the QoS requirements of multimedia applications transmitted over these kind of networks. This approach is based on the ideas of combination of both active and passive measurement methods. This approach uses an in-service measurement method in which the QoS parameters of the actual application (user) are estimated by means of dedicated monitoring packets (probes). Afterwards, these parameters are combined to produce and assess the application’s overall QoS using the fuzzy logic assessment and based on the measured QoS parameters estimated using the probe traffic. The active scheme is used to generate monitoring probe packets which are inserted between blocks of target application packets at regular intervals. While the passive monitoring is utilized to act as a traffic meter which performs as a counter of user packets (and bytes) that belong to the application (user) traffic flow that is subjected to monitoring. After simulating the developed technique, it offered a good estimation for the delay, throughput, packet losses and the overall QoS when using different probe rates.
Las plataformas IoT deben permitir la comunicación entre las aplicaciones y los dispositivos de acuerdo con sus requisitos no funcionales. Algunos de los principales requisitos no funcionales son la calidad del servicio (QoS, por sus siglas en inglés) y la calidad de la experiencia (QoE, por sus siglas en inglés), entre otros. En esta charla se presenta una Plataforma Autonómica para IoT (Internet of Things, por sus siglas en inglés), para la gestión de la QoS y QoE, basada en el concepto de ciclo autonómico de tareas de análisis de datos. En esta plataforma se han definido varios ciclos autonómicos de análisis de datos. Esta charla presenta algunos de esos ciclos autonómicos, y analiza sus capacidades de diagnóstico, basada en el perfil de estado operacional determinado por ellos.
The beginning stage of research is concentrated on review of literature, books, relevant research papers progress of IEEE task groups.
Different routing protocols, MAC protocols and cross layer approach were studied.
During this phase different routing protocols, passive bandwidth estimation techniques, MAC protocols, hidden and exposed node problem, radio propagation model were examined.
Review of literature was done by comparing the reactive QoS aware routing protocols.
The main difference involves the techniques for estimation of bandwidth and admission control schemes.
In the final phase development of routing protocols based on proposed bandwidth estimation techniques, admission control and route repair mechanisms have been implemented in order to analyze them for QoS constraint incluDCMded in this research
AC was also implemented based on channel partition
The proposed methods and protocols are implemented and analyzed using NS-2.35
APPLICATION-BASED QOS EVALUATION OF HETEROGENEOUS NETWORKS cscpconf
Heterogeneous wireless networks expand the network capacity and coverage by leveraging the network architecture and resources in a dynamic fashion. However, the presence of different communication technologies makes the Quality of Service (QoS) evaluation, management, and monitoring of these networks very challenging. Each communication technology has its own characteristics while the applications that utilize them have their specific QoS requirements. Although, the communication technologies have different performance assessment parameters, the applications using these radio access networks have the same QoS requirements. As a result, it would be easier to evaluate the QoS of the access networks and the overall network configuration depending on the performance of applications running on them. Using such application-based QoS evaluation approach, the heterogeneous nature of the underlying networks and the diversity of their traffic can be adequately taken into account. In this paper, we propose an application-based QoS evaluation approach for heterogeneous networks. Through simulation studies, we show that this assessment approach facilitates better QoS management and monitoring of heterogeneous network configurations.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
ANALYTIC HIERARCHY PROCESS FOR QOS EVALUATION OF MOBILE DATA NETWORKSIJCNCJournal
The widespread demand for data applications over mobile networks requires that service providers guarantee a well-defined quality of service (QoS) for subscribers. Evaluating the QoS provided by service providers within a geographical area to determine which network provides the best QoS is a challenging task. The complex nature of mobile networks with multi-criteria and conflicting factors makes good decision making difficult. This paper presents a measurement-based method called Analytic Hierarchy Process (AHP) for evaluating QoS in application-specific and user-centric data on 3G mobile networks. The evaluation problem is formulated as a multi-criteria decision problem. Latency, jitter, data loss, and throughput are the parameters collected as criteria in drive testing over the mobile network. Decision matrix is applied to solve the problem by reaching a final ranking of the network based on the collected measured values of the problem parameters. A case study of 3G mobile networks in Uyo metropolis is used to show how this approach can be effective in ranking the QoS in data applications to determine which network provides the best QoS based on users’ perception of quality. The implemented results in Java indicate that Etisalat network is the alternative that offers the best QoS for web browsing application based on measured criteria. This is followed by Airtel and then MTN, while Glo is ranked least. The result provides useful information to decision makers for performance improvement on service quality.
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
Managing network complexity, accommodating greater numbers of subscribers, improving coverage to support data services (e.g. email, video, and music downloads), keeping up to speed with fast-changing technology, and driving maximum value from existing networks – all while reducing CapEX and OpEX and ensuring Quality of Service (QoS) for the network and Quality of Experience (QoE) for the user. These are just some of the pressing business issues faced by mobileservice providers, summarized by the demand to “achieve more, for less.” The ultimate goal of optimization techniques at the network and application layer is to ensure End-user perceived QoS. The next generation networks (NGN), a composite environment of proven telecommunications and Internet-oriented mechanisms have become generally recognized as the telecommunications environment of the future. However, the nature of the NGN environment presents several complex issues regarding quality assurance that have not existed in the legacy environments (e.g., multi-network, multi-vendor, and multi-operator IP-based telecommunications environment, distributed intelligence, third-party provisioning, fixed-wireless and mobile access, etc.). In this Research Paper, a service aware policy-based approach to NGN quality assurance is presented, taking into account both perceptual quality of experience and technologydependant quality of service issues. The respective procedures, entities, mechanisms, and profiles are discussed. The purpose of the presented approach is in research, development, and discussion of pursuing the end-to-end controllability of the quality of the multimedia NGN-based communications in an environment that is best effort in its nature and promotes end user’s access agnosticism, service agility, and global mobility
The next generation wireless networks comprises of mobile users moving
between heterogeneous networks, using terminals with multiple access interfaces and
services. The most important issue in such environment is ABC (Always Best Connected) i.e.
allowing the best connectivity to applications anywhere at any time. For always best
connectivity requirement various vertical handover strategies for decision making have
been proposed. This paper provides an overview of the most interesting and recent
strategies.
Towards a Framework for Monitoring and Analyzing QoS Metrics of Grid ServicesHong-Linh Truong
QoS (Quality of Service) parameters play a key role in
selecting Grid resources and optimizing resources usage
efficiently. Although many works have focused on using
QoS metrics, surprisingly few tools support the monitoring
and analysis of QoS metrics of Grid services. This paper
presents a novel framework which supports the monitoring
and analysis of QoS metrics in the Grid. Our approach is
that, firstly, we develop a classification of important QoS
metrics for Grid services that should be monitored and analyzed.
Secondly, sensors are developed to monitor QoS of
disparate Grid services by using a peer-to-peer Grid monitoring
middleware. The dependencies among Grid services
are modeled. Based on that, several techniques are used to
analyze QoS metrics of dependent Grid services.
Cp7101 design and management of computer networks -networkDr Geetha Mohan
Cp7101 design and management of computer networks - unit I
Similar to An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method (presentation) (20)
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
A Route Selection Scheme for supporting Virtual Tours in Sites with Cultural ...University of Piraeus
Virtual tourism is a novel trend that enhances the experience the users perceive from touristic places, such as archaeological sites. Drones are equipped with 360o video cameras and used for video capturing of the heritage sites. The video material is streamed to the users in real time, enriched with additional 3D, Augmented Reality (AR) or Mixed Reality (MR) material. Furthermore, the selection of the appropriate flying route for each drone should be performed, in order to provide a satisfactory tour experience to the user, considering his preferences about specific monuments. To address this issue, this paper describes a heritage route selection scheme for supporting real-time virtual tours in sites with cultural interest using drones. The proposed scheme applies a Fuzzy Multiple Attribute Decision Making (FMADM) algorithm, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS), to accomplish the ranking of the candidate heritage routes. The algorithm uses Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) for the representation of heritage routes evaluation values. Performance evaluation shows that the suggested method produces better results compared to the Fuzzy Topsis (FTOPSIS) by selecting the most appropriate flying route for the drone.
A VHO Scheme for supporting Healthcare Services in 5G Vehicular Cloud Computi...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services, including medical services with strict constraints. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper, a VHO management scheme for supporting medical services in 5G-VCC systems, is described. It consists of the VHO initiation and the network selection processes, while at the same time, the vehicle’s velocity, its current connection type, as well as the status of the onboard patient’s health, are considered. Specifically, during the VHO initiation process the necessity to perform handover is evaluated. Subsequently, the network selection process selects the appropriate network alternative considering both medical service requirements and patients’ health status. The proposed scheme is applied to a 5G-VCC system which includes Long Term Evolution (LTE) and Worldwide Interoperability Microwave Access (WiMAX) Macrocells and Femtocells, as well as Wireless Access for Vehicular Environment Road Side Units (WAVE RSUs). Performance evaluation shows that the proposed algorithm outperforms existing VHO management schemes.
A Network Selection Scheme with Adaptive Criteria Weights for 5G Vehicular Sy...University of Piraeus
Fifth Generation Vehicular Cloud Computing (5G-VCC) systems use heterogeneous network access technologies to fulfill the requirements of modern vehicular services. Efficient network selection algorithms are required to satisfy the constraints of Driver Assistance (DA) services, Passengers Entertainment and Information (PEnI) services and Medical (MED) services that provided to vehicular users. The presence of MED services affects the importance of other services in situations where patients with immediate health status exist within the vehicle. This paper proposes a network selection scheme which considers the patient health status to adapt the importance of each service. The scheme consists of two Fuzzy Multi Attribute Decision Making (FMADM) algorithms: the Trapezoidal Fuzzy Adaptive Analytic Network Process (TF-AANP) to calculate the relative importance of each vehicular service and the selection criteria, as well as the Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (TFT-ACW) to accomplish the ranking of the candidate networks. Both algorithms use Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN). Performance evaluation shows that the suggested method outperforms existing algorithms by satisfying the constraints of MED services when the patient health status becomes immediate.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Network Selection Algorithm for supporting Drone Services in 5G Network Arc...University of Piraeus
Flying Ad-hoc Networks (FANETs) use 5G network access technologies to fulfill the requirements of their services. In this environment, Drone to Infrastructure (D2I) communication is supported, while each drone could use both Disaster Management (DM) and non-Disaster Management (nDM) services. Efficient network selection algorithms are required to satisfy the constraints of the used services, since the presence of DM services affects the importance of nDM services in situations where a natural disaster occurs. This paper proposes a network selection algorithm which is called Dynamic Trapezoidal Fuzzy Topsis with Adaptive Criteria Weights (DTFT-ACW). DTFT-ACW accomplishes the ranking of the candidate networks considering the importance of each service, as well as the weights of the corresponding selection criteria, as they are obtained with respect to the severity level of a natural disaster occurred. Interval-Valued Trapezoidal Fuzzy Numbers (IVTFN) are used for the criteria evaluation. Experimental results show that the suggested method outperforms existing algorithms by satisfying the constraints of DM services when a disaster becomes severe. Furthermore, DTFT-ACW eliminates the computational complexity of the network selection by considering past decisions.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
A Survey on Medium Access Control Schemes for 5G Vehicular Cloud Computing Sy...University of Piraeus
Fifth generation (5G) vehicular systems support multiple services with strict Quality of Service (QoS) constraints. To fulfill the increased communication needs, 5G Vehicular Cloud Computing (5G-VCC) architectures with dense deployments of the access network infrastructures have been proposed. In such systems, the network resources manipulation is a critical task that could be addressed by the Medium Access Control (MAC) layer. MAC schemes that have been proposed for vehicular networks, can be applied to 5G-VCC systems in order optimal manipulation of communication resources to be accomplished. This paper makes an overview of available MAC schemes, while a comprehensive discussion about their implementation in 5G-VCC systems is performed leading to useful conclusions.
The enhancement of Underwater Cultural Heritage Assets using Augmented Realit...University of Piraeus
Τhe development in the fields of Underwater Cultural Heritage (UCH) management and Maritime Archaeology, yields an interdisciplinary and creative academic framework, such as the Information and Communication Technologies (ICT) sector that has been proved to build intelligent systems and applications. However, the ways to fully make use of these technologies are still being explored, as their potential have not been exploited yet. Underwater archaeological sites, semi (/or fully) submerged settlements, ancient ports and shipwrecks, unlike land sites, are not accessible to public due to their special (sub) marine environment and depth. In this paper, an innovative research idea of using Augmented Reality (AR) for maintaining the memory and the information of underwater archaeological sites, is presented. Although the “artificial” visual documentation cannot replace the authentic values of the underwater tangible heritage, the AR technology can contribute to the protection of the intangible properties and the conquered knowledge of the past of a place. This research work will focus, among other case studies, on the (semi) submerged fortifications and their contiguous contents of the acropolis of Halai in east Lokris, Greece. Hence, along with the climate change that may lead more antiquities covered by water during the following years, the advances in the communication field and the up-coming 5G and cloud technologies will make the idea fully applicable, contributing to the enhancement of the coastal and the underwater archaeological remains.
Fifth generation (5G) Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies to
fulfill the requirements of modern services. Multiple services with dierent Quality of Service (QoS) constraints could be available in each vehicle, while at the same time, user requirements and provider policies must be addressed. Therefore, the design of ecient Vertical Handover (VHO) management schemes for 5G-VCC infrastructures is needed. In this paper, a novel VHO management scheme for 5G-VCC systems is proposed. Whenever the user satisfaction grade becomes less than a predefined threshold, VHO is initiated and network selection is performed, considering the velocity of the vehicle, network characteristic criteria such as throughput, delay, jitter and packet loss, as well as provider policy criteria such as service reliability, security and price. The proposed scheme uses linguistic values for VHO criteria attributes represented by Interval Valued Pentagonal Fuzzy Numbers (IVPFNs) to express the information using membership intervals. The VHO scheme is applied to a 5G-VCC system which includes 3GPP Long Term Evolution (LTE) and IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMAX) Macrocells and Femtocells, as well as IEEE 802.11p Wireless Access for Vehicular Environment (WAVE) Road Side Units (RSUs). Performance evaluation shows that the suggested method ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
Performance Analysis and Optimization of Next Generation Wireless NetworksUniversity of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
Performance Analysis and Optimization of Next Generation Wireless Networks (P...University of Piraeus
The Fifth Generation (5G) networks, including the 5G Vehicular Cloud Computing (5G-VCC) systems, have evolved rapidly offering multiple services to users. The operating principles of vehicular networks, Cloud Computing (CC), Fog Computing (FC), Mobile Edge Computing (MEC) and Software Defined Networks (SDN) are applied to 5G infrastructures. In a 5G-VCC system, the vehicles are equipped with On-Board Units (OBUs) which communicate with each other as well as with Road Side Units (RSUs). Each RSU interacts with a Cloud infrastructure which offers vehicular services with strict Quality of Service (QoS) requirements, including Driver Assistance (DA), Passengers Entertainment and Information (PEnI) and Medical (MED) services. Dense deployments of 5G access networks are also implemented, called Ultra Dense Networks (UDNs), aiming to support high data rates produced by an increased number of vehicular users. In this environment, heterogeneous technologies are used to transfer the network services to vehicles. Optimal manipulation of the communication resources is required, while at the same time vehicular users should always obtain connectivity to the most appropriate network access technology, in order the constraints of the vehicular services to be satisfied. In this thesis, existing schemes for resource allocation as well as for mobility management are studied, while novel solutions are proposed for each topic.
Personalized Real-Time Virtual Tours in Places with Cultural InterestUniversity of Piraeus
Virtual tours using drones enhance the experience the users perceive from a place with cultural interest. Drones equipped with 360o cameras perform real-time video streaming of the cultural sites. The user preferences about each monument type should be considered in order the appropriate flying route for the drone to be selected. This paper describes a scheme for supporting personalized real-time virtual tours in sites with cultural interest using drones. The user preferences are modeled using the MPEG-21 and the MPEG-7 standards, while Web Ontology Language (OWL) ontologies are used for the description of the metadata structure and semantics. The Metadata-aware Analytic Network Process (MANP) algorithm is proposed in order the weights about the user preferences for each monument type to be estimated. Subsequently, the Trapezoidal Fuzzy Topsis for Heritage Route Selection (TFT-HRS) algorithm accomplishes ranks the candidate heritage routes. Finally, after each virtual tour, the user preferences metadata are updated in order the scheme to continuously learn about the user preferences.
The Convergence of Blockchain, Internet of Things (IoT) and Building Informat...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The convergence of blockchain, internet of things (io t) and building informa...University of Piraeus
The Architecture, Engineering and Construction (AEC) industry has not embraced digital transformation with the same enthusiasm as other industries (e.g. such as manufacture industry). Building Information Modeling (BIM) is a revolutionary technology that is characterized as the opportunity of the AEC industry to move to the digital era and improve the collaboration amongst the partners of this industry by exploiting Information and Communications Technologies (ICT). BIM provides all the necessary tools and automations to achieve end-to-end communication, data exchange and information sharing between project actors. Thus, the virtual 3D models generated in the context of engaging in the BIM process and as-delivered physical assets through Building Management Systems (BMS) could adopt Internet of Things (IoT) architectures and services. However, the orchestration of IoT in a highly modular environment with many moving parts and inter-dependencies between the stakeholders of this environment, lead to many security issues. Therefore, this paper proposes a system architecture that employs the Blockchain technology as a measure to secure and control the BIM technology coupled with IoT. The system architecture under scrutiny is considering the case of a museum building, where efficient security, management and monitoring are of great importance.
The revival of back-filled monuments through Augmented Reality (AR) (presenta...University of Piraeus
The development of three-dimensional (3D) models and the use of Augmented Reality (AR) in the field of cultural heritage consists an innovative process the recent years that provides the visitors of archaeological sites with additional information. This has been made possible due to achievements in digital technologies, communications, devices and developments in software engineering. Nevertheless, the research to fully make use of these new methods continues, as the potentials of new technologies have not been exploited. In archaeological sites, the production of 3D models for AR is focused on the virtual reconstruction of ruined monuments at their original form, aiming to give visitors the third dimension (height, volume etc.), especially to those who do not have special knowledge of archaeology. This paper describes an innovative approach of using AR for maintaining the memory and the information of monuments, as they have been originally excavated, but that are going to be back -filled due to the particularity of their material or their location. Also, the system architecture of the proposed scheme is described considering two study cases, a Neolithic settlement in the archaeological site of Halai, Lokris and the remains of a Classical Temple on open field of a hill in Thebes, Boeotia. Both mentioned monuments are under the direction of the American School of Classical Studies in Athens (ASCSA).
A Personalized Audio Web Service using MPEG-7 and MPEG-21 standards (presenta...University of Piraeus
This paper presents a web service which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the web service host. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information and the Web Ontology Language (OWL) to produce and manipulate ontological descriptions. SPARQL is used for querying the OWL ontologies. The MPEG Query Format (MPQF) is also used, providing a wellknown framework for applying queries to the metadata and to the ontologies.
A Personalized Audio Server using MPEG-7 and MPEG-21 standards (presentation)University of Piraeus
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categories: the metadata describing user preferences stored at each user and the resource adaptation metadata stored at the server. The multimedia models MPEG-21 and MPEG-7 are used to describe metadata information. The Web Ontology Language (OWL) language is used to produce and manipulate the relative ontological descriptions.
A downlink scheduler supporting real time services in LTE cellular networks (...University of Piraeus
The wide spread of real-time services in wireless networks demands scheduling mechanisms supporting strict Quality of Service (QoS) requirements. Nevertheless, the specifications of the LTE standard for mobile connectivity defined by the 3rd Generation Partnership Project (3GPP) does not impose any specific scheduler for the proper allocation of resources to services. Therefore, several LTE schedulers have been proposed in the literature meeting the QoS requirements of modern services. In this paper a QoS aware scheduler for the LTE downlink is proposed namely the FLS-Advanced (FLSA) aiming at prioritizing real-time traffic. The proposed scheduler has been built on three distinct levels assigning the available radio resources to services according to their requirements. Based on simulation results, the FLSA outperforms in terms of packet loss ratio, attainable throughput and fairness the performance of existing schedulers including PF, MLWDF, EXP/PF, FLS, EXP RULE and LOG RULE.
A Vertical Handover Management Scheme for VANET Cloud Computing SystemsUniversity of Piraeus
Vehicular Cloud Computing (VCC) systems use heterogeneous network access technologies in order to fulfill the requirements of modern services. Therefore, the need for efficient Vertical Handover (VHO) management schemes must be addressed. In this paper a VHO management scheme for VCC systems is described. The proposed method takes into account the vehicles velocity as well as its current connection type and applies a two step VHO algorithm to reduce operations’ costs and optimize mobility management. Accordingly, as a first step a VHO initiation process evaluates the necessity to perform handover and subsequently a network selection process selects the appropriate network alternative considering both vehicular service requirements and operators’ policies. The proposed scheme is applied to a VCC system which includes Long Term Evolution (LTE) Macrocells and Femtocells as well as 802.11p Road Side Units (RSUs). Performance evaluation shows that the suggested algorithm ensures the Always Best Connection (ABC) principle, while at the same time outperforms existing VHO management schemes.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
An analytic network process and trapezoidal interval-valued fuzzy technique for order preference by similarity to ideal solution network access selection method (presentation)
1. International Journal of Communication Systems (IJCS) 2014, Wiley
An analytic network process and
trapezoidal interval-valued fuzzy
technique for order preference by
similarity to ideal solution network access
selection method
Emmanouil Skondras1,2, Aggeliki Sgora1,2, Angelos Michalas2 and
Dimitrios D. Vergados1
1Department of Informatics, University of Piraeus, 80, Karaoli and Dimitriou St.,
GR-18534, Piraeus, Greece
2Department of Informatics Engineering, Technological Educational Institute of
Western Macedonia, GR-52100, Kastoria, Greece
1
2. International Journal of Communication Systems (IJCS) 2014, Wiley
Outline
• Introduction.
• Contributions.
• Related work.
• The proposed Network Selection Method.
• Simulation Setup and Results.
• Conclusions.
• References.
2
4. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (1/8)
• Next generation wireless networks
– Consist of many heterogeneous access technologies.
• Support various service types with different quality of
service (QoS) constraints, as well as user, requirements and
provider policies.
– Growing rapidly integrating multiple network
technologies.
• Aiming to support multimedia services in addition to voice
and data with high data rates and guaranteed QoS [1].
4
5. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (2/8)
• End users devices (such as mobile phone or
netbook) are equipped with multiple radio
interfaces.
– Allowing connectivity to the most suitable network
environment.
• Based on users requirements and operators policies [2, 3].
• Need for network selection mechanisms that
consider multiple factors must be addressed.
5
6. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (3/8)
• According to the always best connection
principle of the 4G wireless networks:
– Users of mobile services should be provided with
connectivity to the best access technology at
anytime [4, 5].
• Need for efficient vertical handover (VHO)
mechanisms to be applied.
6
7. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (4/8)
• The handover process is supposed to be:
– Successful, infrequent, and imperceptible.
• To enable telecommunication providers meet the QoS
requirements of the users [6].
• In the case of heterogeneous networks:
– Seamless interworking among the different
technologies is also needed [7].
– Special attention to the VHO process should be
given [8].
7
8. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (5/8)
• The VHO procedure consists of three main steps:
– Handover initiation.
• Contains the required procedures to identify the available access
networks and select the time of handover in respect of network
conditions and user mobility.
– Network selection.
• Selection of the most appropriate network alternative based on the
available network characteristics, user preferences, and applications
requirements.
– Handover execution.
• Completes the handover process by seamlessly connecting the terminal
to the selected network.
• This work deals with the network selection step of the VHO
process. 8
9. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (6/8)
• Existing handover network selection schemes:
– Employ multi attribute decision-making methods (MADM),
fuzzy logic, neural networks, and utility functions [9].
• Because the selection of an access network depends
on several parameters with different relative
importance:
– The access network selection problem is usually looked at
from the aspect of multi-criteria analysis.
• More specifically by applying different MADM algorithms.
9
10. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (7/8)
• A network selection method is proposed by
employing two MADM algorithms:
– The Analytic Network Process (ANP).
• Extension of the Analytic Hierarchy Process (AHP) for
criteria weights calculation
– A fuzzy version of the technique for order
preference by similarity to ideal solution (TOPSIS).
• For accomplishing the ranking of the candidate
networks.
10
11. International Journal of Communication Systems (IJCS) 2014, Wiley
Introduction (8/8)
• The proposed method considers the following factors to
provide advanced connection services:
– Network QoS characteristics and policies.
– Application requirements.
– Different types of users service-level agreements (SLAs).
• Linguistic values.
– Are used to characterize the performance of selection
criteria.
• Which are represented by interval-valued trapezoidal fuzzy
numbers.
11
13. International Journal of Communication Systems (IJCS) 2014, Wiley
Contributions (1/3)
• Complex relationships allowed
– Within and among clusters of selection criteria
• By applying the ANP method
– Does not use an hierarchical framework as AHP but a
network model of dependencies.
– Eliminates the index consistency requirement of AHP.
» i.e., in AHP the relative importance of decision factors need to
be redefined in case index consistency value is more than 0.1.
• In our case:
– As clusters of selection criteria are considered the network QoS
characteristics and the network policies characteristics.
13
14. International Journal of Communication Systems (IJCS) 2014, Wiley
Contributions (2/3)
• Imprecise information of performance
selection criteria
– Can be better expressed.
• For different application types and users SLAs.
– By applying linguistic values and interval-valued fuzzy
numbers.
Interval value fuzzy numbers.
– Can efficiently present uncertain information.
• By minimum maximum membership interval.
• Rather than by single membership values.
14
15. International Journal of Communication Systems (IJCS) 2014, Wiley
Contributions (3/3)
• Selection of the best network access technology
– Considering contradictory selection criteria.
• Facilitating the provision of high quality services.
– Satisfying different types of users SLAs.
• Fuzzy version of TOPSIS.
– Trapezoidal interval-valued Fuzzy TOPSIS (TFT).
• It resolves the case of having several services of different QoS constraints
running simultaneously on a terminal.
– Network selection is performed in a way satisfying multiple groups of
criteria per user.
– The ranking abnormality problem experienced in the original TOPSIS is
discarded [10].
• To avoid inconsistencies.
– When a new network is available or an existing network is removed from the
alternatives. 15
17. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (1/37)
• Multi attribute decision-making methods
– Are used to select the best alternative network
• Among candidate networks
– Given a set of criteria with different importance weights.
• MADM algorithms
– Are able to evaluate criteria of different value ranges.
• Sometimes even contradictory, using multi- criteria analysis.
– Widely used methods include:
• Analytic Hierarchy Process (AHP) [11, 12].
• Simple additive weighting (SAW) [12, 13].
• Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) [12–14].
• Fuzzy AHP-ELECTRE (FAE) [15].
• Gray relational analysis (GRA) [12, 13].
• Multiplicative exponent weighting (MEW) [12, 13].
• Distance to ideal alternative (D2I) [12].
• Analytic Network Process (ANP) [16].
17
18. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (2/37)
• Various weighting methods are used.
– Provide suitable criteria weights for each alternative.
• Several research studies use MADM methods for
network selection.
• Sharma and Khola [14]
– Presented a network selection algorithm.
• Based on the TOPSIS algorithm.
• Besides the usual parameters
– i.e., QoS, bandwidth, and cost
– It also takes a prediction of the Received Signal Strength (RSS) into
account.
18
19. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (3/37)
• Shi and Zhu [11]
– Employed two MADM methods
• Combined with the group decision-making algorithm to perform
network selection.
– The proposed procedure
• Defines two types of weights (namely the objective weights)
– Consider:
» The current attributes of candidate networks.
» The subjective weights specified according to the subscribers and traffic
class preferences.
– Weight vectors.
• Objective weights vector.
– Determined using the entropy weighting method.
• Subjective weights vector.
– Evaluated using the AHP.
19
20. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (4/37)
• Shi and Zhu [11]…
– The group decision-making method
• Employs both vector types to produce a synthesized vector
• The ranking of alternatives is the sum of the product of the
normalized attribute values with their respective weights.
– Compatibility of the integrated decision.
• It is finally checked to ensure the effectiveness of the proposed
solution.
– Results showed that the proposed method:
• Reduces the number of handoffs
• Improves QoS characteristics of conversational and interactive traffic
flows
Compared with entropy weighting and GRA approaches.
20
21. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (5/37)
• Lassoued et al. [13]
– Described an evaluation framework of VHO mechanisms,
which emulates:
• Application characteristics.
• Mobile terminals context.
• User and operators preferences.
– The model provides user traces containing information
about:
• The location of the users.
• The QoS performance of the networks.
– Current network characteristics are obtained from:
• A mobility simulator emulating network access technologies.
• Location of access points.
• User mobility.
21
22. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (6/37)
• Lassoued et al. [13]…
– The proposed methodology:
• Used to compare the efficiency of various MADM network
selection algorithms in a dynamic environment, including:
– SAW, TOPSIS, GRA, MEW and their own proposed scheme
called Ubique [17].
– Simulation results
• Showed that the examined algorithms achieve good
performance,
• Ubique is less flexible to changes of delay and cost criteria
weights than the other approaches.
22
23. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (7/37)
• Lahby et al. [12]
– Proposed a network selection scheme
• It is based on the AHP method and the Mahalanobis distance.
– Mahalanobis distance is used to measure the distance of
alternatives.
» From the correlation of criteria
» The optimal network satisfying the QoS, security and cost
criteria is selected.
– Simulation results
• Both the ranking abnormality problem and the number of
handoffs in the proposed method
– Are reduced compared with the decision algorithms SAW, MEW,
TOPSIS and distance to ideal alternative.
23
24. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (8/37)
• Lahby et al. [16]
– Proposed a technique for network selection using:
• ANP to estimate the weights of selection criteria
• GRA to rank the alternative networks.
– Selection criteria include network related attributes
• The preference of users is expressed by evaluating different
criteria weights for each access network.
– By applying the ANP.
» Evaluates the criteria weights of each access network separately
• Based on users preferences; in that way, unique criteria weights
exist for each network.
24
25. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (9/37)
• Lahby et al. [16]…
– Simulation results.
• Indicated that this method reduces:
– The ranking abnormality problem.
– The number of handoffs.
Compared with other method variants.
25
26. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (10/37)
• Sheng-mei et al. [18]
– Presented a network selection algorithm making
use of:
• The AHP and the entropy weight method.
– To evaluate the weights of network and user related criteria.
– Candidate access networks.
• Identified on the basis of their signal-to-interference-
plus-noise ratio (SINR) values.
– TOPSIS is used for the final ranking of the network
alternatives.
26
27. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (11/37)
• Sheng-mei et al. [18]…
– The proposed method achieves:
• Higher throughput.
• Reduced number of vertical handoffs.
• For various traffic classes.
Compared with:
– Combined SINR-based vertical handoff algorithms [19]
– Multi-dimensional adaptive SINR-based vertical handoff
algorithms [20].
27
28. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (12/37)
• Alkhawlani et al. [21]
– Proposed a VHO decision system.
• Integrates fuzzy logic and TOP- SIS method.
– Network and user related criteria
• Processed by parallel fuzzy logic control (FLC)
subsystems.
– TOPSIS is applied to perform the selection of the
best network choice.
28
29. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (13/37)
• Alkhawlani et al. [21]…
– Simulation results showed that the proposed
solution:
• Reduces handover rate and handover failure.
• Increases the percentage of users assigned to networks
of their preference.
• Increases the utilization of inexpensive networks.
29
30. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (14/37)
• Alkhawlani and Mohsen [22]
– Presented a network selection system.
• Suitable for tightly coupled wireless network environments.
– It takes into account:
• The network choice proposed by the user
• Criteria imposed by the operator such as:
– Network policies.
– QoS characteristics.
– System capacity.
– Utilization.
30
31. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (15/37)
• Alkhawlani and Mohsen [22]…
– Two modules:
• The user software module.
– Evaluates the best network alternative based on selection criteria set by the
user including reliability, security, battery power, and price.
• The operator software module.
– Resides at the coordinator of the radio access technologies and performs the
final selection decision.
– It uses:
» The FLC subsystems of [18].
• To evaluate the performance of criteria.
» The AHP method.
• To assess the FLC subsystems outputs and select the best possible
network.
31
32. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (16/37)
• Alkhawlani and Mohsen [22]…
– Simulation results.
• The proposed network selection scheme
– Achieves better performance.
» In terms of user preferences satisfaction, QoS fulfillment and operator
benefits improvement.
– Compared with four different reference algorithms performing:
i. Random selection.
ii. Selection based on terminal speed.
iii. Selection based on service type.
iv. Selection based on the availability of resources, respectively.
32
33. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (17/37)
• Vasu et al. [23]
– Proposed a fuzzy rule based decision algorithm
• For vertical handoff in wireless heterogeneous
networks.
– The algorithm uses:
• QoS performance values as decision parameters.
• Triangular fuzzy membership functions.
– For the fuzzification of the input parameters and the
defuzzification of the output result.
33
34. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (18/37)
• Vasu et al. [23]…
– Evaluation of the proposed model.
• A non-birth Markov chain with states corresponding to
available access networks is used.
– Simulation experiments.
• Comparing the proposed approach against various
MADM methods
• The proposed method improves the performance of
delay sensitive applications.
34
35. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (19/37)
• Fuzzy logic for network selection
– Requires the definition of logic rules from
specialists
• With thorough knowledge of the behavior of the
available access networks in various conditions.
– As the number of selection criteria and the
available networks increase.
• Rules become more complex struggling to:
– Define effective policies.
– Evaluate the best alternative.
35
36. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (20/37)
• Fuzzy logic for network selection…
– Use of fuzzy logic based solutions.
• Limited to handover decision schemes.
– With reduced number of networks and selection criteria.
– Some network selection methods combine fuzzy
logic with neural networks.
• To rate the alternative access networks.
36
37. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (21/37)
• Gowrishankar et al. [24]
– Created an artificial neural network multi-criteria decision
analysis system.
• Performs network selection using network related attributes.
– Expressed either in crisp or in fuzzy linguistic values.
– Sensitivity analysis.
• Among the proposed solution, the TOPSIS and the SAW methods.
• Carried out in a network environment consisting of four overlaid
networks, where:
– Weights of different criteria change.
– Connections of four traffic types exist.
37
38. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (22/37)
• Gowrishankar et al. [24]…
– Results.
• The proposed method is:
– Less stable than TOPSIS.
– More stable than SAW.
In respect to criteria weights changes.
– Neural network approaches.
• Replace the complex logic rules of fuzzy logic approaches.
• But they still suffer from scalability issues.
– Because of the required large number of the processing elements at
their hidden layers.
» As the complexity of criteria and the number of networks increase.
38
39. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (23/37)
• Several network selection schemes make use of
utility/cost functions.
– To provide performance metrics for different types of
criteria.
• Rodriguez et al. [25]
– Use a cost function for the network selection
• Includes the rules and policies for selecting the best candidate
network or for adapting ongoing session parameters.
39
40. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (24/37)
• Wu et al. [26]
– Used a set of utility functions to quantify selection criteria
including:
• Link quality (RSS).
• Battery power.
• Average throughput.
• Network delay.
• Monetary cost.
• Application type.
– The relative weights of criteria are calculated according to the
AHP method.
– The candidate networks are ranked using the weighted product
method.
– Simulation results.
• The proposed scheme:
– Improves network performance.
– Reduces power consumption of users terminals.
40
41. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (25/37)
• Wang et al. [27]
– The concepts of fuzzy logic, neural network, and utility
functions.
• Are combined to perform network selection.
– The proposed method.
• Uses a fuzzy neural network.
– Obtains network, user, and terminal related input criteria.
• Evaluates the performance of each access network.
– Attributes of criteria.
• Defined through utility functions.
• Processed through the fuzzification, interference and
defuzzification layers of the neural network.
41
42. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (26/37)
• Wang et al. [27]…
– A fuzzy version of the particle swarm optimization is used.
• For neural network training.
– It is not clear how expected network performance degrees are specified
during the learning process.
– Simulation results.
• The proposed method achieves better performance in terms of:
– Access blocking probability.
– Packet drop probability.
– Average throughput.
Compared with other network selection algorithms including GRA,
AHP and game theoretic.
42
43. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (27/37)
• There is a rate of uncertainty in characterizing
performance measurements as well as rates of
influence of performance metrics.
• Fuzzy MADM methods.
– Expressing uncertain quantities by fuzzy numbers.
• Received the interest of many researchers in decision theory.
• Several fuzzy MADM network selection methods.
– Are suggested utilizing linguistic variables, triangular fuzzy
numbers, trapezoidal fuzzy numbers, etc.
• To model network attributes and their respective weights.
43
44. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (28/37)
• Chamodrakas and Martakos [10]
– Proposed a method for network selection that considers:
• Network conditions.
• QoS constraints.
• Energy consumption requirements.
– User preferences.
• Indicating the relative importance of criteria in different applications.
• Expressed using linguistic expressions.
– Transformed to triangular fuzzy numbers.
– Graded mean integration method.
• Used for the defuzzification of fuzzy numbers into crisp values.
– Utility functions.
• Used to model.
– QoS requirements.
– Energy consumption characteristics.
Of different applications.
44
45. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (29/37)
• Chamodrakas and Martakos [10]…
– The fuzzy set representation version of TOPSIS.
• Used to combine selection criteria and weights.
– To perform the rating of the available networks.
• Resolves possible inconsistencies.
– Because of conflicting criteria.
» Such as bandwidth and energy consumption.
– Simulation results.
• The proposed method accomplishes a trade-off between QoS
requirements and energy consumption.
45
46. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (30/37)
• Sasirekha and Ilanzkumaran [28]
– Described two methods to perform network selection.
– Both methods use a fuzzy version of the AHP technique.
• To obtain the weights of selection criteria specifying networks
performance.
– Relative importance matrix.
• Resulting from the pairwise comparison of criteria .
• Fuzzified using triangular fuzzy numbers.
– With membership functions representing the scale of importance of five
levels.
– Relative importance values.
• Turned into crisp values using the geometric mean operator.
– While the rest of the steps of the AHP method follow.
46
47. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (31/37)
• Sasirekha and Ilanzkumaran [28]…
– The former network selection method.
• Uses TOPSIS to evaluate the best alternative network based on:
– The weights from AHP.
– The criteria values of each alternative network.
– The latter network selection method.
• Combines the fuzzy AHP with VIKOR method.
– Which has less complexity and performs equally well as TOPSIS.
– Evaluation.
• Both methods succeed to select the best network alternative.
47
48. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (32/37)
• Kaleem et al. [29]
– Presented a VHO decision algorithm.
• Based on network performance measurements to evaluate.
– The necessity of making a handoff.
– The best network alternative in case that handoff is required.
– To determine the handoff decision.
• A handoff factor is evaluated and compared with a constant
threshold.
– Network selection is performed using fuzzy TOPSIS.
48
49. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (33/37)
• Kaleem et al. [29]
– User preferences are defined.
• In the form of criteria weights.
– Ratings of selection criteria and criteria weights are expressed as
trapezoidal or triangular fuzzy numbers.
– Numerical examples and simulation experiments.
• Present the competence of the proposed approach.
– For various traffic classes.
– In heterogeneous network access technologies.
49
50. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (34/37)
• Lahby et al. [30]
– Compared the weighting algorithms of:
• AHP, fuzzy AHP, ANP and fuzzy ANP.
– For assigning weights to network dependent criteria used by
MADM algorithms performing network selection.
– The TOPSIS method is used.
• To evaluate the effects of the weighting algorithms.
50
51. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (35/37)
• Lahby et al. [30]…
– Results.
• All algorithms achieve similar results concerning the
network selected.
• The ranking abnormality of TOPSIS is reduced.
– When the ANP weighting method is used for:
» Background traffic.
» Conversational traffic.
» Interactive traffic.
» Streaming traffic.
51
52. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (36/37)
• Zhang [31]
– Performed an analysis of MADM methods for
handover decision.
– Uncertain linguistic terms of decision criteria such as
sojourn time and seamlessness.
• Converted to fuzzy data.
– Which in turn are converted to crisp values.
52
53. International Journal of Communication Systems (IJCS) 2014, Wiley
Related work (37/37)
• Zhang [31]…
– SAW and TOPSIS.
• Suggested to perform the final ranking of the candidate
networks.
– Sensitivity analysis.
» TOPSIS is more sensitive to the criteria performance and
their weights.
– The paper identifies the handover decision case.
• In which several applications are running simultaneously on
a terminal as a group decision problem.
– Although its solution is not being addressed.
53
54. International Journal of Communication Systems (IJCS) 2014, Wiley
The proposed Network Selection
Method
55. International Journal of Communication Systems (IJCS) 2014, Wiley
The proposed Network Selection
Method
• Our proposed method consists of two MADM
algorithms:
– ANP
• Calculates the relative importance of the selection
criteria.
– Trapezoidal Fuzzy TOPSIS (TFT)
• Accomplishes the ranking of the candidate networks.
• Represents the performance of selection criteria using
interval-valued trapezoidal fuzzy numbers.
55
56. International Journal of Communication Systems (IJCS) 2014, Wiley
Analytic Network Process (ANP)
(1/2)
• The ANP was also introduced by Saaty [32].
– To deal with decision problems that criteria and
alternatives depend on each other.
• It is actually the generalization of the AHP.
• A decision problem that is analyzed with the ANP.
– Can be designed either as a control hierarchy or as a
nonhierarchical network.
56
57. International Journal of Communication Systems (IJCS) 2014, Wiley
Analytic Network Process (ANP)
(2/2)
• Nodes of the network represent components (or
clusters) of the system.
– Arcs denote interactions between them.
• Inner dependencies.
– Interactions and feedbacks within clusters.
• Outer dependencies.
– Interactions and feedbacks between clusters.
57
58. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (1/6)
• Step 1. Model construction and problem
structuring.
– The problem is analyzed and decomposed into a
rational system.
• Such as a network.
• Step 2. Pairwise comparison matrices and
priority vectors.
– The pairwise comparison matrix, as in AHP, is
derived using Saaty’s nine-point importance scale.
58
59. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (2/6)
• Analytic Hierarchy Process (AHP).
59
60. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (3/6)
• Step 3. Supermatrix formation.
– Represents the inner and the outer dependencies of
the network.
– It is actually a partitioned matrix.
• Each matrix segment represents a relationship between two
clusters in the network.
– To construct the supermatrix.
• The local priority vectors obtained in step 2 are grouped and
placed in the appropriate positions in a supermatrix.
– Based on the flow of influence from one cluster to another, or
from a cluster to itself, as in the loop.
60
61. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (4/6)
• Step 3. Supermatrix formation…
– Then, the supermatrix is transformed to a stochastic
one.
• The weighted supermatrix.
– The weighted supermatrix.
• Raised to limiting powers.
– Until all the entries converge to calculate the overall priorities.
» The cumulative influence of each element on every other
element with which it interacts is obtained [34].
– At this point, all the columns of the new matrix, the
limit supermatrix are the same.
• Their values show the global priority of each element of
network.
61
62. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (5/6)
• For example, if we assume a network with n clusters, where each cluster
Ck , k = 1, 2,…, n, and has mn elements, denoted as ek1 , ek2 ,…, ekmk , then
the standard form for a supermatrix can be expressed as:
62
63. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP steps (6/6)
• Step 4. Selection of the best alternatives:
– If the supermatrix formed in step 3 covers the whole network:
• The priority weights of the alternatives can be found in the column of
alternatives in the normalized supermatrix.
– Otherwise:
• Additional calculations are required.
– In order to obtain the overall priorities of the alternatives.
– The alternative with the largest overall priority should be
selected.
• As it is the best alternative as determined by the calculations made
using matrix operations.
63
64. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (1/7)
• The concept of fuzzy logic was introduced by Zadeh
[35].
– It is used to make a decision from indeterminate and
approximate information.
• A fuzzy number represented by:
– A set of real values representing an uncertain quantity.
– A convex normalized continuous function
• Which estimates the degree of membership for each value in the
subset.
• Triangular or trapezoidal fuzzy numbers.
– Frequently used to represent uncertain information.
64
65. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (2/7)
• Trapezoidal fuzzy number
– Can be defined as a vector x = (x1, x2, x3, x4, υÂ)
with membership function:
x1 < x2 < x3 < x4 and υ ∈[0,1].
65
66. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (3/7)
• Interval-Valued Fuzzy Number (IVFN).
– Introduced by Sambuc [36]
– Defined as A = [ΑL, AU].
• Consisting of the lower AL and the upper AU fuzzy numbers.
– Replace the crisp membership values by intervals in
[0, 1].
– Fuzzy information can be better expressed by intervals
than by single values.
66
67. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (4/7)
• Liu and Jin [37] and Cornelis et al. [38]
– Suggest that IVFNs are useful:
• In multiple criteria decision-making problems.
• Particularly in cases where attribute values are in the form of
linguistic expressions.
• Ashtiani et al. [39]
– Propose an extension of the fuzzy TOPSIS method.
• Using interval-valued triangular fuzzy numbers.
67
68. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (5/7)
• Liu and Jin [37]
– propose a decision-making method
• using weighted geometric aggregation operators
– on attribute values expressed in the form of IVFNs.
• According to the definition in [39], an IVFN A
is defined as follows:
68
69. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (6/7)
• The IVFNs:
69
70. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal Interval-Valued
Fuzzy Numbers (7/7)
• Interval-valued trapezoidal fuzzy number [40].
– The most general form of fuzzy number.
– Can be represented as:
A = [AL, AU] = [(x1
L, x1
L, x1
L, x1
L, υA
L), (x1
U, x1
U, x1
U, x1
U, υA
U))],
where 0 ≤ x1
L ≤ x2
L ≤ x3
L ≤ x4
L ≤ 1, 0 ≤ x1
U ≤ x2
U ≤ x3
U ≤ x4
U ≤ 1and AL ⊂ AU
– The operational rules of the interval-valued trapezoidal
fuzzy numbers are defined in [40].
70
71. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (1/15)
• The TOPSIS introduced by Hwang and Yoon [41].
– It is based on the concept that:
• The best alternative should have the shortest distance from
the positive ideal solution.
• The longer distance from the negative ideal solution.
• In the present work:
– Network selection is performed using a proposed fuzzy
version of TOPSIS, namely Trapezoidal Fuzzy TOPSIS (TFT).
• Linguistic values of criteria attributes.
– Represented by interval-valued trapezoidal fuzzy numbers.
71
72. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (2/15)
• A = {A1, A2,…, An}
– The set of possible alternatives.
• C = {C1, C2,…, Cn}
– The set of criteria.
• w1, w2, …, wm
– The weights of each criterion.
• The steps of the method are as follows.
72
73. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (3/15)
• Step 1. Construction of the decision matrix:
– Each xij element of the n x m decision matrix D is an
interval-valued trapezoidal fuzzy number.
• Expresses the performance of alternative i for criterion j.
73
74. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (4/15)
• In case there are Q decision makers.
– The decision matrix and the criteria weights.
• Include the average of the performance values and
weights, respectively, of the decision makers.
• Assuming that for the kth decision maker.
– xijk is the performance of alternative i for criterion j.
– wjk is the importance weight for criterion j.
74
75. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (5/15)
• The average of the performance values and weights are
given by:
75
76. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (6/15)
• Step 2. Normalization of the decision matrix:
– Consider that Ωb is the set of benefits attributes and Ωc is the set of costs
attributes.
– The elements of the normalized decision matrix are computed as:
76
77. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (7/15)
• Step 3. Construction of the weighted
normalized decision matrix:
– It is constructed by multiplying each element of
the normalized decision matrix rij.
• With the respective weight wj according to the formula:
77
78. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (8/15)
• Step 4. Determination of the positive and negative
ideal solution:
– The positive ideal solution is defined as:
78
79. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (9/15)
• The negative ideal solutions are defined accordingly
as:
79
80. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (10/15)
• Step 5. Measurement of the distance of each
alternative from the ideal solutions:
– The distances of each alternative from the positive ideal
solution are evaluated as follows:
80
81. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (11/15)
• The distances of each alternative from the negative
ideal solution are estimated:
81
82. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (12/15)
• Consequently, similar to [39]:
– The distance of the alternatives from the positive
and negative ideal solutions are expressed by
intervals such as [di1
+, di2
+] and [di1
-, di2
-].
• Instead of single values.
– In this way, less information is lost.
82
83. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (13/15)
• Step 6. Calculation of the relative closeness:
– The relative closeness of the distances from the
ideal solutions are computed as:
83
84. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (14/15)
• Compound relative closeness.
– Obtained from the average of the aforementioned
values:
84
85. International Journal of Communication Systems (IJCS) 2014, Wiley
The trapezoidal interval-valued
fuzzy TOPSIS algorithm (15/15)
• Step 7. Alternatives ranking:
– The alternatives are ranked according to their RCi
values.
– The best alternative is the one with the highest RCi
value.
85
87. International Journal of Communication Systems (IJCS) 2014, Wiley
Simulation Setup and Results (1/2)
• Ranking of the networks alternatives
– Performed using the TFT algorithm.
• Weights of network selection criteria
– Obtained from the ANP.
• Heterogeneous network environment.
– Consisting of a number of long-term evolution (LTE),
WiMAX and WiFi networks.
87
88. International Journal of Communication Systems (IJCS) 2014, Wiley
Simulation Setup and Results (2/2)
• Each network can provide at least one of the
following five service types:
– Voice-over-Internet protocol (VoIP).
– Conversational video (CVideo).
– Buffered streaming (BStreaming).
– Real time gaming (RTGaming).
– Web browsing.
88
89. International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (1/4)
89
• In order to allow service continuity.
– QoS mapping among the QoS classes of the
different access technologies is required.
90. International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (2/4)
• Four SLAs are defined.
– SLA1 has the highest service priority
– SLA4 has the lowest service priority.
• SLA1.
– Supports all service types.
– Provides the best values for QoS and policy decision criteria.
• SLA2.
– Supports less service types.
– It does not provide support for the VoIP and real time gaming services.
– Provides slightly worse decision criteria values than those offered by
the SLA1.
90
91. International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (3/4)
• SLA3.
– Supports only the buffered streaming and the Web
browsing services.
– Satisfactory QoS characteristics and policies.
• SLA4.
– Low price.
– Supports only the Web browsing service.
– Acceptable decision criteria values.
91
92. International Journal of Communication Systems (IJCS) 2014, Wiley
QoS class mapping and Service-
Level Agreements (4/4)
• The ANP method is applied
in order to estimate the
weights of network
selection criteria per
service type and SLA.
• The ANP network model:
92
93. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP network model
93
• Criteria are classified into two groups:
– The QoS characteristics.
• Contains network performance related criteria including:
– Throughput.
– Delay.
– Jitter.
– Packet loss.
– The policy characteristics.
• Contains operator defined rules including:
– Price.
– Security.
– Service reliability.
» Determines the ability for service constraints satisfaction and
optimization of performance when a network is congested.
94. International Journal of Communication Systems (IJCS) 2014, Wiley
Pairwise comparison decision
matrices
• Pairwise comparison decision matrices.
– Created on the basis of relations among the seven
selection criteria.
94
95. International Journal of Communication Systems (IJCS) 2014, Wiley
Relations of criteria
95
• The pairwise comparison decision matrices are used:
– To evaluate the priority vectors of criteria.
– To form the supermatrix per service type and SLA.
• Subsequently, the weighted supermatrices and,
finally, the limit supermatrices are obtained.
• Indicatively, for the SLA1 VoIP service:
– The initial, the weighted and the limit supermatrices are
presented in the following slides.
96. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP supermatrix for SLA1
VoIP service
96
97. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP weighted supermatrix
for SLA1 VoIP service
97
98. International Journal of Communication Systems (IJCS) 2014, Wiley
The ANP limit supermatrix for
SLA1 VoIP service
98
99. International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights
• The criteria weights per service and SLA obtained by the limit
supermatrices are presented in the following slides.
• The weights are proportional to the constraints of each service as
well as to the agreements of each SLA.
• The weight of the price criterion is low for SLA1.
– The service reliability and the network QoS characteristics are
considered as the most important factors.
• In SLA2, the price criterion is more important than in SLA1.
– The respective weight is greater than that of SLA1.
• The weights of the service reliability and QoS characteristics criteria
in SLA2 are lower compared to the relative weights of SLA1.
• In SLA3, the weights of price and service reliability criteria are
balanced.
– As they are almost of equivalent importance.
• In SLA4, the price is the most important criterion.
– Resulting in a high estimated weight value.
99
100. International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA1
100
101. International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA2
101
102. International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA3
102
103. International Journal of Communication Systems (IJCS) 2014, Wiley
Criteria weights for SLA4
103
104. International Journal of Communication Systems (IJCS) 2014, Wiley
Linguistic terms and the corresponding
interval-valued trapezoidal fuzzy numbers
• Linguistic terms for the criteria attributes
– Represented by interval-valued trapezoidal fuzzy
numbers as shown in the following slide.
• Network policy specifications are expressed
directly using linguistic terms.
104
105. International Journal of Communication Systems (IJCS) 2014, Wiley
Linguistic terms and the corresponding
interval-valued trapezoidal fuzzy numbers
105
106. International Journal of Communication Systems (IJCS) 2014, Wiley
Relation of the network QoS
characteristics and linguistic terms
• Crisp values of network QoS characteristics are
converted into linguistic terms
– Which correspond to specific ranges of values per
service type.
• The following table presents a relative example
for the VoIP service.
– Illustrating the correspondence between:
• Ranges of network QoS characteristics values.
• Linguistic terms.
106
107. International Journal of Communication Systems (IJCS) 2014, Wiley
Relation of the network QoS
characteristics and linguistic terms for VoIP
107
108. International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks
• The available-candidate networks in our simulations
at the time of network selection per service and SLA,
as well as, their specifications expressed by linguistic
terms, are depicted in the following slides.
• The case of having several services of different QoS
constraints running at the user site is being
addressed.
– Network selection is performed in a way satisfying multiple
groups of criteria per user.
108
109. International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA1
109
110. International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA2
110
111. International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA3
111
112. International Journal of Communication Systems (IJCS) 2014, Wiley
Available networks of SLA4
112
113. International Journal of Communication Systems (IJCS) 2014, Wiley
Users
• We consider the case where nine users need
to select a network that:
– Satisfies the requirements of their services.
– Complies with their respective SLA agreements.
113
114. International Journal of Communication Systems (IJCS) 2014, Wiley
Required services per user
114
115. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT results (1/4)
• The proposed TFT algorithm is applied for
each user.
– The available networks are ranked as shown in the
following slide.
• Positive and negative ideal solutions.
– Represented by unary and null trapezoidal fuzzy
numbers, respectively
• To eliminate the ranking abnormality problem.
115
117. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT results (3/4)
• Ranking of the network alternatives is in
accordance with the users expectations.
• Example:
– User 1 requiring increased QoS provisioning selects
LTE 1 network.
• Which guarantees the best QoS characteristics and
service reliability.
• LTE 1 achieves higher ranking than the other networks
– Because of the high values of the QoS characteristics and
service reliability factors bearing higher importance according
to the relative ANP weights in SLA1.
117
118. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT results (4/4)
• Example:
– On the contrary, user 9:
• Whose prior selection criterion is the price of the
service.
• Selects the WiFi 1 network.
– Which satisfies his or her requirements in respect of his or her SLA
agreement.
118
119. International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (1/8)
• The performance of TFT algorithm was evaluated
against:
– The original TOPSIS method
– The FAE method [15].
• Calculates the criteria weights using the fuzzy AHP
• Performs the network selection by applying the ELECTRE
algorithm.
• We consider the scenario of the nine users
described in the previous slides.
119
120. International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (2/8)
• Critical weakness of the TOPSIS and FAE
– They do not support users with more than one
service.
• In these cases, they consider only the most demanding
service of the user.
• Specifically:
– For users 2 and 3
» They applied only for the VoIP service.
– For user 7
» They applied only for the BStreaming service.
– For the rest of the users
» They applied for each single user service.
120
121. International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (3/8)
• The following slide presents the networks
classification performed by the:
– TFT.
– TOPSIS.
– FAE.
121
122. International Journal of Communication Systems (IJCS) 2014, Wiley
122
• Networks classification in respect of TFT, TOPSIS (T) and Fuzzy
AHP–ELECTRE (FAE) results:
Performance evaluation of the
TFT algorithm (4/8)
123. International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (5/8)
• When a user has only one service.
– The methods usually provide similar results.
• When a user requires multiple services.
– The TFT accomplishes more reliable results than the TOPSIS
and FAE.
• Because it considers the weights of each service.
123
124. International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (6/8)
• The results concerning user 1 using only the VoIP
service .
– Are similar for TFT and TOPSIS methods with the exception
of the evaluation sequence of the WiFi 1 and WiFi 2
networks.
– FAE accomplishes quite similar network rates with the TFT
and TOPSIS methods for this user.
124
125. International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (7/8)
• TFT succeeds more reliable results for user 4.
– Only the RTGaming service is used
• And the most important criteria are service reliability, throughput and
delay.
– TFT selects the WiMAX 2 network
• Which provides AG for service reliability, VG for throughput, and AG for
delay criterion.
– TOPSIS selects the LTE 1 network
• Which has similar values with the WiMAX 2 for service reliability and delay
criteria.
– But worse performance for throughout criterion by providing G instead of VG.
– FAE does not provide a clear choice for user 4
• Results to equal evaluation sequence for both WiMAX 2 and LTE 1
networks.
125
126. International Journal of Communication Systems (IJCS) 2014, Wiley
Performance evaluation of the
TFT algorithm (8/8)
• The classification of networks obtained from
the three methods is quite different for user 7
– Who requests both BStreaming and Web browsing
services
– The TFT accomplishes more reliable results by
taking into account the weights of both services.
126
127. International Journal of Communication Systems (IJCS) 2014, Wiley
Sensitivity analysis of the TFT
algorithm (1/3)
• The sensitivity of the TFT is evaluated when the number of the
available access networks changes frequently.
• We consider three different network configuration scenarios for
the nine users defined in the previous slides.
• In the first scenario.
– All networks defined in the previous slides are available.
• In the second and third scenarios.
– The LTE 1 and the WiFi 2 networks, respectively, are not reachable.
• The following graphs include three column types of different
pattern.
– Indicating the ranking of network alternatives in each case.
127
128. International Journal of Communication Systems (IJCS) 2014, Wiley
Sensitivity analysis of the TFT
algorithm (2/3)
• First case.
– User 1 selects the LTE 1 network.
• Second case.
– The remaining networks improve their ranking order thus
user 1 selects the WiMAX 2 network.
• Third case.
– Only the last rated WiFi 3 network increases its rank.
• Because the WiFi 2 network preceded WiFi 3 in the other two
cases.
128
129. International Journal of Communication Systems (IJCS) 2014, Wiley
Sensitivity analysis of the TFT
algorithm (3/3)
• Similar behavior is observed in the ranking of
network alternatives for the other users.
• Ranking results of the proposed method:
– Normally adjusted with respect to the heterogeneous
network environment changes.
• Highlighting the methods sensitivity.
129
130. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (1/5)
130
131. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (2/5)
131
132. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (3/5)
132
133. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (4/5)
133
134. International Journal of Communication Systems (IJCS) 2014, Wiley
TFT’s networks ranking in case of
networks environment changes (5/5)
134
136. International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (1/5)
• Network selection in heterogeneous networks
is a complex task.
– Because it takes into account different parameters
with different relative importance, such as the:
• Network and the application characteristics.
• User preferences.
• Service cost.
136
137. International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (2/5)
• The proposed network selection method.
– Takes into account the:
• Network QoS characteristics policies.
• Application requirements.
• Different types of users SLAs.
– Selects the optimal network that satisfy
simultaneously:
• Applications’ requirements.
• User’s preferences running on a mobile user’s device.
137
138. International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (3/5)
• More specifically, the proposed method employs two MADM
algorithms:
– The ANP for criteria weights calculation.
– The TFT for accomplishing the overall rating of the network technologies.
• The ANP is selected to determine the relative importance and the
dependence of the criteria.
• As selection criteria are considered the:
– Network QoS parameters.
– Service constraints.
– User requirements.
– Provider policies.
• These criteria are easily configured and represented by interval-
valued trapezoidal fuzzy numbers. 138
139. International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (4/5)
• The TFT algorithm is applied to calculate the
overall rating of the available networks.
• Performance evaluation:
– When a user has only one service.
• TFT provides similar results to the original TOPSIS and FAE
methods.
– When a user requires multiple services.
• TFT performs better by satisfying multiple groups of criteria
per user.
– Because the original TOPSIS and FAE methods cannot support
more than one services.
139
140. International Journal of Communication Systems (IJCS) 2014, Wiley
Conclusions (5/5)
• Sensitivity analysis:
– TFT does not suffer from the ranking abnormality
problem.
– The results are normally adjusted to the
heterogeneous network environment changes.
140
142. International Journal of Communication Systems (IJCS) 2014, Wiley
References (1/8)
1. Khanjari SA, Arafeh B, Day K, Alzeidi N. Bandwidth borrowing-based qos
approach for adaptive call admission control in multiclass traffic wireless cellular
networks. International Journal of Communication Systems 2013; 26(7):811–831.
2. Ma X, Liu J, Jiang H. On the design of algorithms for mobile multimedia systems:
a survey. International Journal of Communication Systems 2011; 24(10):1330–
1339.
3. Ou S, Pan H, Li F. Heterogeneous wireless access technology and its impact on
forming and maintaining friendship through mobile social networks.
International Journal of Communication Systems 2012; 25(10):1300–1312.
4. Gelabert X, Sallent O, Prez-Romero J, Agust R. Performance evaluation of radio
access selection strategies in constrained multi-access/multi-service wireless
networks. Computer Networks 2011; 55(1):173–192.
5. Verma R, Singh N. GRA based network selection in heterogeneous wireless
networks. Wireless Personal Communi- cations 2013; 72(2):1437–1452.
142
143. International Journal of Communication Systems (IJCS) 2014, Wiley
References (2/8)
6. Halgamuge MN, Vu H, Ramamohanarao K, Zukerman M. A call quality
performance measure for handoff algorithms. International Journal of
Communication Systems 2011; 24(3):363–383.
7. Wu J-S, Yang S-F, Hwang B-J. A terminal-controlled vertical handover decision
scheme in ieee 802.21-enabled heterogeneous wireless networks. International
Journal of Communication Systems 2009; 22(7):819–834.
8. Radhika K, Redd AV. Vertical handoff decision using game theory approach for
multi-mode mobile terminals in next generation wireless networks. International
Journal of Computer Applications 2011; 36:31–37.
9. Wang L, Kuo G-S. Mathematical modeling for network selection in
heterogeneous wireless networks—a tutorial. Communications Surveys Tutorials,
IEEE 2013; 15(1):271–292.
10. Chamodrakas I, Martakos D. A utility-based fuzzy TOPSIS method for energy
efficient network selection in heterogeneous wireless networks. Applied Soft
Computing 2012; 12(7):1929–1938.
143
144. International Journal of Communication Systems (IJCS) 2014, Wiley
References (3/8)
11. Shi Z, Zhu Q. Network selection based on multiple attribute decision making and
group decision making for heterogeneous wireless networks. The Journal of
China Universities of Posts and Telecommunications 2012; 19(5): 92–114.
12. Lahby M, Leghris C, Adib A. New multi access selection method based on
mahalanobis distance. Applied Mathematical Sciences 2012; 6(53-56):2745–
2760.
13. Lassoued I, Bonnin J-M, Ben Hamouda Z, Belghith A. A methodology for
evaluating vertical handoff decision mechanisms. 7th International Conference
on Networking, ICN 2008, Cancun, Mexico, 2008; 377–384.
14. Sharma M, Khola R. Pre decision based handoff in multi network environment.
Advances in Computer Science, Engineering & Applications, New Delhi, India,
2012; 609–616.
15. Charilas DE, Markaki OI, Psarras J, Constantinou P. Application of fuzzy AHP and
ELECTRE to network selection. 1st International Conference on Mobile
Lightweight Wireless Systems, Athens, Greece, 2009; 63–73.
144
145. International Journal of Communication Systems (IJCS) 2014, Wiley
References (4/8)
16. Lahby M, Leghris C, Adib A. New multi access selection method using differentiated
weight of access interface. International Conference on Communications and
Information Technology (ICCIT), Beirut, Lebanon, 2012; 237–242.
17. Suciu L, Bonnin JM, Guillouard K, Stévant B. Towards a highly adaptable user-centric
terminal architecture. The 7th International Symposium on Wireless Personal
Multimedia Communications (WPMC 2004), Abano, Italie, 2004.
18. Sheng-mei L, Su P, Minghai X. An improved topsis vertical handoff algorithm for
heterogeneousm wireless networks. 12th IEEE International Conference on
Communication Technology (ICCT), Nanjing, China, 2010; 750–754.
19. Yang K, Gondal I, Qiu B, Dooley LS. Combined SINR based vertical handoff algorithm
for next generation heterogeneous wireless networks. Global Telecommunications
Conference, GLOBECOM’07, Washington, USA, 2007; 4483–4487.
20. Yang K, Gondal I, Qiu Bin. Multi-dimensional adaptive sinr based vertical handoff for
heterogeneous wireless networks. Communications Letters, IEEE 2008; 12(6):438–
440.
145
146. International Journal of Communication Systems (IJCS) 2014, Wiley
References (5/8)
21. Alkhawlani MM, Alsalem KA, Hussein AA. Multi-criteria vertical handover by topsis
and fuzzy logic. International Conference on Communications and Information
Technology (ICCIT), Aqaba, Jordan, 2011; 96–102.
22. Alkhawlani MM, Mohsen AM. Hybrid approach for radio network selection in
heterogeneous wireless networks. International Journal of Advanced Science and
Technology 2012; 44:33–48.
23. Vasu K, Maheshwari S, Mahapatra S, Kumar CS. QoS aware fuzzy rule based vertical
handoff decision algorithm for wireless heterogeneous networks. National
Conference on Communications (NCC), Bangalore, India, 2011; 1–5.
24. Gowrishankar RBH, Sekhar GG, Satyanarayana P, et al. Performance evaluation of
vertical handoff in wireless data networks. 4th International Conference on
Wireless Communications, Networking and Mobile Computing, WICOM’08, Dalian,
China, 2008; 1–4.
25. Rodriguez J, Tsagaropoulos M, Politis I, Kotsopoulos S, Dagiuklas T. A middleware
architecture supporting seamless and secure multimedia services across an
intertechnology radio access network. Wireless Communications, IEEE 2009;
16(5):24–31.
146
147. International Journal of Communication Systems (IJCS) 2014, Wiley
References (6/8)
26. Wu Q, Li W, Wang R, Yu P. An access network selection mechanism for
heterogeneous wireless environments. Journal of Computational Information
Systems 2013; 9(5):1799–1807.
27. Wang H, Wang Z, Feng G, LV H, Chen X, Zhu Q. Intelligent access selection in
cognitive networks: a fuzzy neural network approach. Journal of Computational
Information Systems 2012; 8(21):8877–8884.
28. Sasirekha V, Ilanzkumaran M. Heterogeneous wireless network selection using
FAHP integrated with topsis and vikor. International Conference on Pattern
Recognition, Informatics and Medical Engineering (PRIME), Salem, India, 2013;
399–407.
29. Kaleem F, Mehbodniya A, Yen KK, Adachi F. Application of fuzzy topsis for
weighting the system attributes in overlay networks. 14th Asia-Pacific Network
Operations and Management Symposium (APNOMS12), 2012; 1–6.
30. Lahby M, Leghris C, Adib A. A survey and comparison study on weighting
algorithms for access network selection. 9th Annual Conference on Wireless On-
Demand Network Systems and Services (WONS), Courmayeur, Italy, 2012; 35–38.
147
148. International Journal of Communication Systems (IJCS) 2014, Wiley
References (7/8)
31. Zhang W. Handover decision using fuzzy MADM in heterogeneous networks.
Wireless Communications and Networking Conference, WCNC 2004, Atlanta,
USA, Vol. 2, 2004; 653–658.
32. Saaty TL. Decision making with dependence and feedback: the analytic network
process, 1996.
33. Yüksel ˙I, Dagdeviren M. Using the analytic network process (ANP) in a swot
analysis—a case study for a textile firm. Information Sciences 2007;
177(16):3364–3382.
34. Saaty TL, Vargas LG. Diagnosis with dependent symptoms: Bayes theorem and
the analytic hierarchy process. Operations Research 1998; 46(4):491–502.
35. Zadeh LA. Fuzzy sets. Information and Control 1965; 8(3):338–353.
36. Sambuc R. Fonctions and Floues: Application a l’aide au Diagnostic en Pathologie
Thyroidienne. Faculté de Médecine de Marseille: Marseille, France, 1975.
148
149. International Journal of Communication Systems (IJCS) 2014, Wiley
References (8/8)
37. Liu P, Jin F. A multi-attribute group decision-making method based on weighted
geometric aggregation operators of interval-valued trapezoidal fuzzy numbers.
Applied Mathematical Modelling 2012; 36(6):2498–2509.
38. Cornelis C, Deschrijver G, Kerre EE. Advances and challenges in interval-valued
fuzzy logic. Fuzzy Sets and Systems 2006; 157(5):622–627.
39. Ashtiani B, Haghighirad F, Makui A, et al. Extension of fuzzy topsis method based
on interval-valued fuzzy sets. Applied Soft Computing 2009; 9(2):457–461.
40. Wei S-H, Chen S-M. Fuzzy risk analysis based on interval-valued fuzzy numbers.
Expert Systems with Applications 2009; 36(2):2285–2299.
41. Hwang C-L, Yoon K. Multiple Attribute Decision Making. Springer-Verlag: Berlin,
New York, 1981.
149