A Model for Providing Mobile Multimedia Services Over 4G Networks

Author(s):  
Kashinath Basu

A significant proportion of the traffic on the 4th generation of mobile networks (4G) will be interactive multimedia traffic. This chapter presents the development and evaluation of an edge device model for the lu interface of a 4G network for mapping the Quality of Service (QoS) requirements and traffic characteristics of aggregated IP traffic flows belonging to multiple classes of continuous media (Audio and Video) sources and data classes from the core network onto a single ATM Virtual Channel (VC) at the access network. This model was developed as part of a wider range of research activity focused on supporting QoS in future mobile networks.

Author(s):  
Igor Bisio ◽  
Stefano Delucchi ◽  
Fabio Lavagetto ◽  
Mario Marchese ◽  
Giancarlo Portomauro ◽  
...  

The main contribution of this chapter is the description of HySEP, Hybrid Simulated-Emulated Platform, developed by the authors and aimed at simulating/emulating heterogeneous networks to validate and test algorithms for traffic control and Quality of Service (QoS) assurance. Main features of HySEP are the appropriate level of accuracy and detail reached by using equipments available in most communication research laboratories, at low cost, and the easy configurability. HySEP is divided into three parts connected each others: the emulated core network; the simulated wireless access network communicating with the core network; and the real remote host. The overall platform is able to handle real traffic flows and overcomes the limitations introduced by other network simulators. HySEP is characterized by remarkable versatility and wide applicability to support the validation of different algorithms.


2020 ◽  
Vol 0 (0) ◽  
Author(s):  
Bakhe Nleya ◽  
Philani Khumalo ◽  
Andrew Mutsvangwa

AbstractHeterogeneous IoT-enabled networks generally accommodate both jitter tolerant and intolerant traffic. Optical Burst Switched (OBS) backbone networks handle the resultant volumes of such traffic by transmitting it in huge size chunks called bursts. Because of the lack of or limited buffering capabilities within the core network, burst contentions may frequently occur and thus affect overall supportable quality of service (QoS). Burst contention(s) in the core network is generally characterized by frequent burst losses as well as differential delays especially when traffic levels surge. Burst contention can be resolved in the core network by way of partial buffering using fiber delay lines (FDLs), wavelength conversion using wavelength converters (WCs) or deflection routing. In this paper, we assume that burst contention is resolved by way of deflecting contending bursts to other less congested paths even though this may lead to differential delays incurred by bursts as they traverse the network. This will contribute to undesirable jitter that may ultimately compromise overall QoS. Noting that jitter is mostly caused by deflection routing which itself is a result of poor wavelength and routing assigning, the paper proposes a controlled deflection routing (CDR) and wavelength assignment based scheme that allows the deflection of bursts to alternate paths only after controller buffer preset thresholds are surpassed. In this way, bursts (or burst fragments) intended for a common destination are always most likely to be routed on the same or least cost path end-to-end. We describe the scheme as well as compare its performance to other existing approaches. Overall, both analytical and simulation results show that the proposed scheme does lower both congestion (on deflection routes) as well as jitter, thus also improving throughput as well as avoiding congestion on deflection paths.


2012 ◽  
Vol 198-199 ◽  
pp. 1733-1738
Author(s):  
Xiao Wei Qin ◽  
Feng Chen

With the explosive growth of wireless applications, the subscribers’ requirements of QoS (Quality of Service) are increasing as well. In this paper, the upper bound of the tolerant delay of services in wireless access network is investigated, by mapping core network onto a cost-variable directed graph, where the cost is construed as the average service delay of the flows traveling in core network that depends on the current load. A multicommodity minimal cost flow mathematics problem is then derived and solved by Price-directive Decomposition and Lagrangian Relaxation. Simulations are carried out in two typical core networks and some valuable conclusions are gained.


BioScience ◽  
2020 ◽  
Vol 70 (2) ◽  
pp. 174-183 ◽  
Author(s):  
Lauren M Kuehne ◽  
Angela L Strecker ◽  
Julian D Olden

Abstract The 1972 Clean Water Act (CWA) provided crucial environmental protections, spurring research and corresponding development of a network of expertise that represents critical human capital in freshwater conservation. We used social network analysis to evaluate collaboration across organizational types and ecosystem focus by examining connections between authors of freshwater assessments published since the CWA. We found that the freshwater assessment network is highly fragmented, with no trend toward centralization. Persistent cohesion around organizational subgroups and minimal bridging ties suggest the network is better positioned for diversification and innovation than for learning and building a strong history of linked expertise. Despite an abundance of research activity from university-affiliated authors, federal agency authors provide a majority of the bonding and bridging capital, and diverse agencies constitute the core network. Together, our results suggest that government agencies currently play a central role in sustaining the network of expertise in freshwater assessment, protection, and conservation.


Author(s):  
Antonios Danalis

The popularity of the World Wide Web has led to an exponential increase of the traffic generated by its users for over a decade. Such a growth, over such a long period of time, would have saturated both the content providers and the network links had Web caching not been efficiently deployed. Web caching can improve the overall performance of the World Wide Web in several ways, depending on the decisions made regarding the deployment of the corresponding caches. By placing caches in strategic positions, the core network traffic can be reduced, the load of a content provider can be scaled down, and the quality of service, as the users perceive it, can be improved. In this article we present an overview of the major design and implementation challenges in Web caching, as well as their solutions.


Author(s):  
A. Dev Pragad ◽  
Vasilis Friderikos ◽  
A. Hamid Aghvami

Provision of Quality of Service (QoS) and Micro Mobility management is imperative to delivering content seamlessly and efficiently to the next generation of IP based mobile networks. Micro mobility management ensures that during handover the disruption caused to the live sessions are kept to a minimum. On the other hand, QoS mechanisms ensure that during a session the required level of service is maintained. Though many micro mobility and QoS mechanisms have been proposed to solve their respective aspects of network operation, they often have interaction with each other and can lead towards network performance degradation. This chapter focuses specifically on the issues of interaction between micro mobility and QoS mechanisms. Special focus is given to the relatively unexplored area of the impact Mobility Agents can have on the wireless access network. Mobility Agents play a central role in providing micro mobility support. However, their presence (location and number) can affect the routing as well as the handover delay. Through an example network this issue is highlighted. Following which an optimization framework is proposed to deploy Mobility Agents optimally within a micro mobility enabled wireless access network to minimise both the routing overhead as well as the handover delay. Results show considerable improvements in comparison to deploying the Mobility Agents arbitrarily.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1710
Author(s):  
Khizar Abbas ◽  
Muhammad Afaq ◽  
Talha Ahmed Khan ◽  
Adeel Rafiq ◽  
Wang-Cheol Song

The fifth-generation mobile network presents a wide range of services which have different requirements in terms of performance, bandwidth, reliability, and latency. The legacy networks are not capable to handle these diverse services with the same physical infrastructure. In this way, network virtualization presents a reliable solution named network slicing that supports service heterogeneity and provides differentiated resources to each service. Network slicing enables network operators to create multiple logical networks over a common physical infrastructure. In this research article, we have designed and implemented an intent-based network slicing system that can slice and manage the core network and radio access network (RAN) resources efficiently. It is an automated system, where users just need to provide higher-level network configurations in the form of intents/contracts for a network slice, and in return, our system deploys and configures the requested resources accordingly. Further, our system grants the automation of the network configurations process and reduces the manual effort. It has an intent-based networking (IBN) tool which can control, manage, and monitor the network slice resources properly. Moreover, a deep learning model, the generative adversarial neural network (GAN), has been used for the management of network resources. Several tests have been carried out with our system by creating three slices, which shows better performance in terms of bandwidth and latency.


2010 ◽  
Vol 2010 ◽  
pp. 1-14
Author(s):  
Nikolaos Zotos ◽  
Evangelos Pallis ◽  
Anastasios Kourtis

The creation and wide use of new high quality demanding services (VoIP, High Quality Video Streaming) and the delivery of them over already saturated core and access network infrastructures have created the necessity for E2E QoS provisioning. Network Providers use at their infrastructures several kinds of mechanisms and techniques for providing QoS. Most known and widely used technologies are MPLS and DiffServ. The IEEE 802.16-2004 standard (WiMAX) refers to a promising wireless broadband technology with enhanced QoS support algorithms. This document presents an experimental network infrastructure providing E2E QoS, using a combination of MPLS and DiffServ technologies in the core network and WiMAX technology as the wireless access medium for high priority services (VoIP, High Quality Video Streaming) transmission. The main scope is to map the traffic prioritization and classification attributes of the core network to the access network in a way which does not affect the E2E QoS provisioning. The performance evaluation will be done by introducing different kinds of traffic scenarios in a saturated and overloaded network environment. The evaluation will prove that this combination made feasible the E2E QoS provisioning while keeping the initial constrains as well as the services delivered over a wireless network.


Author(s):  
Christoforos Ntantogian ◽  
Christos Xenakis

The integration of heterogeneous mobile/wireless networks using an IP-based core network materializes the beyond third generation (B3G) mobile networks. Along with a variety of new perspectives, the new network model raises new security concerns, mainly, because of the complexity of the deployed architecture and the heterogeneity of the employed technologies. In this chapter, we examine and analyze the security architectures and the related security protocols, which are employed in B3G networks focusing on their functionality and the supported security services. The objectives of these protocols are to protect the involved parties and the data exchanged among them. To achieve these, they employ mechanisms that provide mutual authentication as well as ensure the confidentiality and integrity of the data transferred over the wireless interface and specific parts of the core network. Finally, based on the analysis of the security mechanisms, we present a comparison of them that aims at highlighting the deployment advantages of each one and classifies the latter in terms of: (1) security, (2) mobility, and (3) reliability.


Author(s):  
Vasilis Friderikos ◽  
Giorgos Chochlidakis ◽  
Hamid Aghvami ◽  
Mischa Dohler

The 5th Generation wireless and mobile communication is expected to provide ultrahigh data rates over wireless in the range of Gbps. But 5G will also be about providing consistency and supporting Quality of Experience in a personalized manner. We foresee an evolution in terms of physical layer enhancements to provide increased data rates, whereas a revolutionary step is required in terms of network orchestration and management to provide consistency and efficient utilization of the available resources at a minimum cost. In this chapter, key trends in wireless access technologies and thus-required network management strategies with respect to the core network are discussed. In the roadmap towards 5G networks, we envision an evolution of technologies for supporting Gbps wireless transmission, whereas a revolution would be required from the current modus operandi in the ways network orchestration and resource management is performed in these complex, hierarchical, heterogeneous and highly autonomous wireless networks.


Sign in / Sign up

Export Citation Format

Share Document