The impact of node velocity diversity on mobile opportunistic network performance

2015 ◽  
Vol 55 ◽  
pp. 47-58 ◽  
Author(s):  
Yaguang Lin ◽  
Xiaoming Wang ◽  
Lichen Zhang ◽  
Peng Li ◽  
Dan Zhang ◽  
...  
Author(s):  
Jiawei Huang ◽  
Shiqi Wang ◽  
Shuping Li ◽  
Shaojun Zou ◽  
Jinbin Hu ◽  
...  

AbstractModern data center networks typically adopt multi-rooted tree topologies such leaf-spine and fat-tree to provide high bisection bandwidth. Load balancing is critical to achieve low latency and high throughput. Although the per-packet schemes such as Random Packet Spraying (RPS) can achieve high network utilization and near-optimal tail latency in symmetric topologies, they are prone to cause significant packet reordering and degrade the network performance. Moreover, some coding-based schemes are proposed to alleviate the problem of packet reordering and loss. Unfortunately, these schemes ignore the traffic characteristics of data center network and cannot achieve good network performance. In this paper, we propose a Heterogeneous Traffic-aware Partition Coding named HTPC to eliminate the impact of packet reordering and improve the performance of short and long flows. HTPC smoothly adjusts the number of redundant packets based on the multi-path congestion information and the traffic characteristics so that the tailing probability of short flows and the timeout probability of long flows can be reduced. Through a series of large-scale NS2 simulations, we demonstrate that HTPC reduces average flow completion time by up to 60% compared with the state-of-the-art mechanisms.


2015 ◽  
Vol 727-728 ◽  
pp. 996-999 ◽  
Author(s):  
Su Xia Cui

The issue of WDM network traffic grooming has been a hot in the field of research. The implementation of traffic grooming technology can improve the utilization of wavelength channels, reducing the link delay and the blocking rate of the network, which to improve network resource utilization and optimize network performance. This article mainly studies all-optical network routing algorithm utilizing WDM technology to achieve the dynamic traffic grooming and propose a optimization grooming policy -HaffmanGroom (M) algorithms which based on SONET / WDM ring network. The most important feature of this algorithm is that the SONET / WDM ring network of multiple multicast request packet , with a minimum weight of the light path priority selection method, the flow of requests each group effectively optimize ease . The algorithm takes into account the impact of the link request factor and link hops to optimize the link selection. The simulation results show that under the conditions of factors and the number of hop a request fully consider the impact of these two factors to the link, and can achieve optimal link with the smallest weights for effective data transmission, improving resource utilization, reducing blocking rate in order to achieve the purpose of optimizing network performance.


Symmetry ◽  
2021 ◽  
Vol 13 (4) ◽  
pp. 693
Author(s):  
Kvitoslava Obelovska ◽  
Olga Panova ◽  
Vincent Karovič

The performance of Wireless Local Area Network (WLAN) is highly dependent on the processes that are implemented in the Medium Access Control (MAC) sublayer regulated by the IEEE 802.11 standard. In turn, various parameters affect the performance of the MAC sublayer, the most important of which is the number of stations in the network and the offered load. With the massive growth of multimedia traffic, research of the network performance depending on traffic types is relevant. In this paper, we present the impact of a high-/low-priority traffic ratio on WLAN performance with different numbers of access categories. The simulation results show different impact of high-/low-priority traffic ratio on the performance of the MAC sublayer of wireless LANs depending on different network-sizes and on network conditions. Performance of the large network with two access categories and with the prevalent high-priority traffic is significantly higher than in the case of using four categories on the MAC sublayer. This allows us to conclude that the performance improvement of the large network with the prevalent high-priority traffic can be achieved by an adaptive adjustment of the access categories number on the MAC sublayer.


2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.


2019 ◽  
Vol 8 (3) ◽  
pp. 890-897
Author(s):  
Y. J. I. A. Yaqoob ◽  
W. L. Pang ◽  
S. K. Wong ◽  
K. Y. Chan

The continuous growth in mobile data traffic and limited license wireless spectrum have led to dramatically increase the demand of the radio spectrum. It is widespread the concern about the coexistence of long term evolution (LTE) and Wi-Fi in the unlicensed band. There are several techniques have been proposed to enable the coexistence of LTE and Wi-Fi in the unlicensed band, but these works are targeted on the impact of the LTE to the Wi-Fi network performance. An experiment is carried out in this work to evaluate the impact of Wi-Fi signal on the video streaming in the LTE network. The experimental test comprised of the national instrument (NI) universal software radio peripheral (USRP) 2953R that is controlled by the LabVIEW Communication LTE application framework. Extensiveexperiments are carried out under two scenarios, i.e. (1) Coexistence of LTE and Wi-Fi signal, (2) LTE signal only. Performance evaluations are carried out with different Modulation and coding schemes (MCS) values and different mode of operations, i.e. frequency division duplex (FDD) and time division duplex (TDD) mode. The results illustrated that the interference from Wi-Fi signal caused the performance degradation of the LTE network in throughput and the power received by user equipment (UE).


Author(s):  
Eleonora Bottani ◽  
Gino Ferretti ◽  
Roberto Montanari ◽  
Giuseppe Vignali

2013 ◽  
Vol 756-759 ◽  
pp. 2846-2849
Author(s):  
Ya Liu ◽  
Zhen Xu

This paper makes an introduction to the tendency of mobile internet replacing the fixed-line network. Analysis of the impact of Smart terminals on mobile internet is expounded. Network performance is degraded by huge data service traffic and signaling traffic. This paper also offers solution for the current situation


2017 ◽  
Author(s):  
◽  
Gokhan Karakose

[ACCESS RESTRICTED TO THE UNIVERSITY OF MISSOURI AT REQUEST OF AUTHOR.] The identification of critical network components is of interest to both interdictors wishing to degrade the network's performance, and to defenders aiming to preserve network performance in the face of disruption. This dissertation focuses on methods for identifying critical subsets of nodes and/or arcs to fortify and/or disable for the purpose of network protection. A common link connecting all studies in this dissertation is our incorporation of the multi-commodity flow formulations into larger multi-level (e.g., minimax) optimization models. ... The last study examines network fortification models that are able to differentiate between failures that are random (e.g., caused by nature) and strategic network failures (e.g., caused by terrorist activities) when performing the allocation of protective resources. This distinction cannot be achieved in the models presented previously in this dissertation. The desired properties of such differentiating formulations are derived by specifying a set of priori assumptions. The criticality indexes in these models, which are necessary to assess the impact of a disruption, are pre-computed through the resolution of the multi-commodity based User Equilibrium (UE) traffic assignment model and applied to urban transportation networks. Novel valid inequalities and linearization techniques are applied to the dual version of the nonlinear UE multi-commodity model to improve its computational efficiency. Computational results demonstrate that the reformulated linear dual model is effective to solve large size instances to near-optimality; and that the optimal allocation of resources as identified by a component-based formulation may potentially be suboptimal when a network is at risk of multiple simultaneous failures for both types of disruptions (i.e., nature- and terrorist-based). We also demonstrate that fortification models for component or scenario-based disruptions can provide different resource allocations for both types of disruptions.


Author(s):  
Amierul Syazrul Azman ◽  
◽  
Mohamad Yusry Lee ◽  
Siva Kumar Subramaniam ◽  
Farah Shahnaz Feroz ◽  
...  

As the wireless sensor networks (WSNs) progress with newer and more advanced technologies, so do the demands for them in a growing number of applications. Precision agricultural environment monitoring is one of the most prominent applications that require feasible wireless support systems, particularly in the protection and condition control of the crops. This paper focuses on the grid nodes arrangement of WSN, considering the wide dissemination of the plantation areas in the agriculture industry. Due to the different types of sensors used and their data size, the study on the impact of the varied packet size on the performance of the small and large network has been carried out using AODV and OLSR routing protocols. No significant differences in terms of performance can be seen as the packet size is varied. However, compared to the small network, more performance issues have occured in the large network, such as more packet loss, higher throughput degradation, higher energy consumption, worse unfairness, and more overhead production. The OEG routing protocol has been proposed to enhance the network performance by reducing the strain due to the saturated traffic. When solely compared to AODV, OEG routing protocol is able to enhance the network performance with at most 27% more packet delivery ratio, 31kbps more throughput, and 0.991J lesser energy consumed in the network.


Sign in / Sign up

Export Citation Format

Share Document