We propose a novel distributed load balancing algorithm (D-LBSB) for the hot cell problem in cellular mobile networks. As an underlying approach, we start with a fixed channel assignment scheme where each cell is init...
详细信息
We propose a novel distributed load balancing algorithm (D-LBSB) for the hot cell problem in cellular mobile networks. As an underlying approach, we start with a fixed channel assignment scheme where each cell is initially allocated a set of C (local) channels, each to be assigned on demand to a user in the cell. A cell is classified as 'hot', if the degree of coldness of a cell (defined as the ratio of the number of available channels to the total number of channels for that cell) is less than or equal to some threshold value, h. Otherwise the cell is 'cold'. D-LBSB proposes to migrate unused channels from suitable cold cells to the hot ones through a distributed channel borrowing algorithm. A Markov model for an individual cell is developed, where the state is determined by the number of occupied channels in the cell. The probability of a cell being hot and the call blocking probability in a cell are derived. Detailed simulation experiments are carried out in order to evaluate our proposed methodology. The performance of D-LBSB is compared with the fixed channel assignment, simple borrowing, and three existing strategies with load balancing (namely, directed retry, CBWL and centralized LBSB). By a rigorous analysis in terms of running time and message complexity, it is shown that D-LBSB performs better than centralized LBSB in an overloaded system. Also D-LBSB performs significantly better than all the other schemes in terms of call blocking probability under moderate and heavy loads.
We describe the design and implementation of automated methodologies and tools that facilitate the implementation of an enhanced maintenance process in order to provide improved quality of service offered to the custo...
详细信息
We describe the design and implementation of automated methodologies and tools that facilitate the implementation of an enhanced maintenance process in order to provide improved quality of service offered to the customers for the transaction access services (TAS) network. The emphasis of our work is placed on the identification, filtering and correlation of event occurrences that indicate problems that do not necessarily generate alarmed conditions on the conventional network management systems, and on the proactive service/fault management and detection based on dynamically defined violations of the base-lined performance profiles. Such an approach enhances considerably the network management and maintenance process, by identifying possible situations/incidents that may affect the network performance, and by correlating those incidents to the potentially affected elements, services and customer applications.
Routing algorithms in the IP Internet provide a single path between each source-destination pair and where more than one path is provided, they are paths of equal length. Single-path routing is inherently slow in resp...
详细信息
The Internet community has proposed the integrated services architecture (Intserv) and the signaling protocol RSVP to provide deterministic guarantees (bandwidth, delay and jitter) to individual flows. However, experi...
详细信息
It is shown that a unidirectional link of a network can be used for routing only if it has an inclusive cycle, which provides a path to carry routing updates from the downstream node to the upstream node joint by the ...
In this paper, the problem of traffic load estimation in a shared-medium contention-based network is investigated and applied to a hybrid fiber coaxial (HFC) cable network. In particular, an estimator that utilizes ch...
详细信息
We present and verify ROAM, an on-demand routing algorithm that maintains multiple loop-free paths to destinations. Each router maintains entries only for those destinations for which data flows through the router whi...
详细信息
The desire to transport classified traffic securely utilizing the current network security paradigm has led the US department of Defense (DoD) to maintain its own, isolated network, distinct from the public ATM networ...
详细信息
The desire to transport classified traffic securely utilizing the current network security paradigm has led the US department of Defense (DoD) to maintain its own, isolated network, distinct from the public ATM network infrastructure. Internally, the DoD maintains four completely separate and isolated networks to carry top-secret, secret, confidential, and unclassified traffic, respectively. A public ATM network may be viewed as carrying unclassified or non-secure traffic. While the cost of maintaining four separate networks is becoming increasingly prohibitive to the DoD, the inability of the public and DoD to utilize each other's network resources runs counter to the current atmosphere of dual use and economies of scale. This paper introduces the concept of a "mixed use" network, wherein the four DoD networks and the public ATM network are coalesced into a single, unified network that transports all four types of traffic, efficiently and without compromising their respective security. In "mixed use", the ATM nodes and links that are common between the DoD and public networks are labeled "joint use" and fall under the jurisdiction of the military for obvious protection of the security assets. The concept of mixed use is the direct result of the user-level, security on demand principle that is enabled by the fundamental security framework and the basic characteristic of ATM networks. This paper models a representative 32-node public ATM network, a 40-node DoD network, and the coalesced 50-node "mixed use" network, and executes accurate simulations on a testbed that, in turn, executes on a network of Linux workstations configured as a loosely-coupled parallel processor.
A key technique for allowing servers to handle a large volume of requests for file transfers is to multicast the data to the set of requesting clients. Typically the paths from the server to the clients will be hetero...
详细信息
A key technique for allowing servers to handle a large volume of requests for file transfers is to multicast the data to the set of requesting clients. Typically the paths from the server to the clients will be heterogeneous in bandwidth availability. Multiple-channel multicast (MCM) is an approach that can be used to handle this heterogeneity. In this approach the data is multicast over multiple channels, each addressed as a separate multicast group. Each receiver subscribes to a set of channels (i.e., joins the corresponding multicast groups) commensurate with its own rate capabilities. Of particular interest in the design of MCM schemes is the scheduling of data transmission across the multiple channels to accommodate asynchronous requests from clients. In this paper we present and analyze a new multiple-channel multicast approach called partition organization scheduling. The scheme is designed to result in good reception efficiency when compared to existing proposals while improving on their performance when other measures of interest are considered.
暂无评论