Millimeter wave (mmWave) communications can potentially meet the high data-rate requirements of unmanned aerial vehicle (UAV) networks. However, as the prerequisite of mmWave communications, the narrow directional bea...
详细信息
This paper proposes a novel real-time adaptive admission control (AAC) scheme with a desired quality of service (QoS) guarantee and high network utilization in high speed networks. The QoS is given in terms of service...
详细信息
This paper proposes a novel real-time adaptive admission control (AAC) scheme with a desired quality of service (QoS) guarantee and high network utilization in high speed networks. The QoS is given in terms of service delay, which is defined as the time it takes for a source to get admitted into the network after it initiates its intended request, packet/cell losses, and transmission delay (time taken to complete transmission from its initiation). AAC uses the following information - the available capacity from a novel adaptive bandwidth estimation scheme, a congestion indicator derived from a congestion controller, peak cell rate estimate from new sources, along with the desired QoS metrics, and outputs an 'admit' or 'reject' decision signal to the new sources while guaranteeing QoS and network utilization. Simulation results are presented by streaming ON/OFF and video data into the network. Results show that the proposed AAC admits significantly more traffic compared to other available admission control schemes thereby guaranteeing high network utilization while maintaining the desired QoS.
This paper presents a new routing strategy, termed incremental virtual circuit connection (IVCC), that is ideally suited for a class of call requests that promise to underlie future high-speed networks. IVCC aims to r...
详细信息
This paper presents a new routing strategy, termed incremental virtual circuit connection (IVCC), that is ideally suited for a class of call requests that promise to underlie future high-speed networks. IVCC aims to reduce the idling of reserved resources, thereby improving the sharing of network resources among users and increasing call success rate. Under IVCC, the subsequent subpaths, starting at the source node, are computed, reserved, and utilized incrementally. Initially, the source node (SN) computes the entire path all the way to the destination node (DN), but propagates the call admission control (CAC) to reserve network resources only for a subset of the entire path, where the choice of the subpath is based on the organization and topology of the network. This paper hypothesizes that the efficient use of resources in IVCC will significantly reduce the probability of failures. Thus, IVCC's uniqueness consists of two key elements. First, the actual route for a source traffic is successively and dynamically refined, utilizing up-to-date information on the state of the network, but always keeping an "eye" towards the destination. Second, traffic cells are launched from the source node or any of the intermediate nodes only after the network resources along the subsequent subpath have been reserved. IVCC has been modeled for two representative ATM networks, a 15-node network spread over the continental US and a 50-node network extending throughout the world, and extensively simulated for a large number of realistic input traffic stimuli utilizing an asynchronous distributed simulation algorithm running on a network of workstations. For a comparative analysis, ATM Forum's P-NNI is also modeled and simulated for identical networks and under identical traffic conditions.
The desire to transport classified traffic securely utilizing the current network security paradigm has led the US department of Defense (DoD) to maintain its own, isolated network, distinct from the public ATM networ...
详细信息
The desire to transport classified traffic securely utilizing the current network security paradigm has led the US department of Defense (DoD) to maintain its own, isolated network, distinct from the public ATM network infrastructure. Internally, the DoD maintains four completely separate and isolated networks to carry top-secret, secret, confidential, and unclassified traffic, respectively. A public ATM network may be viewed as carrying unclassified or non-secure traffic. While the cost of maintaining four separate networks is becoming increasingly prohibitive to the DoD, the inability of the public and DoD to utilize each other's network resources runs counter to the current atmosphere of dual use and economies of scale. This paper introduces the concept of a "mixed use" network, wherein the four DoD networks and the public ATM network are coalesced into a single, unified network that transports all four types of traffic, efficiently and without compromising their respective security. In "mixed use", the ATM nodes and links that are common between the DoD and public networks are labeled "joint use" and fall under the jurisdiction of the military for obvious protection of the security assets. The concept of mixed use is the direct result of the user-level, security on demand principle that is enabled by the fundamental security framework and the basic characteristic of ATM networks. This paper models a representative 32-node public ATM network, a 40-node DoD network, and the coalesced 50-node "mixed use" network, and executes accurate simulations on a testbed that, in turn, executes on a network of Linux workstations configured as a loosely-coupled parallel processor.
暂无评论