Wireless technology based on the IEEE 802.11 standard is widely deployed. This technology is used to support multiple types of communication services (data, voice, image) with different QoS requirements. MANET (Mobile Adhoc NETwork) does not require a fixed infrastructure. Mobile nodes communicate through multihop paths. The wireless communication medium has variable and unpredictable characteristics. Furthermore, node mobility creates a continuously changing communication topology in which paths break and new one form dynamically. The routing table of each router in an adhoc network must be kept up-to-date. MANET uses Distance Vector or Link State algorithms which insure that the route to every host is always known. However, this approach must take into account the adhoc networks specific characteristics: dynamic topologies, limited bandwidth, energy constraints, limited physical security, ... Two main routing protocols categories are studied in this paper: proactive protocols (e.g. Optimised Link State Routing - OLSR) and reactive protocols (e.g. Ad hoc On Demand Distance Vector - AODV, Dynamic Source Routing - DSR). The proactive protocols are based on periodic exchanges that update the routing tables to all possible destinations, even if no traffic goes through. The reactive protocols are based on on-demand route discoveries that update routing tables only for the destination that has traffic going through. The present paper focuses on study and performance evaluation of these categories using NS2 simulations. We have considered qualitative and quantitative criteria. The first one concerns distributed operation, loop-freedom, security, sleep period operation. The second are used to assess performance of different routing protocols presented in this paper. We can list end-to-end data delay, jitter, packet delivery ratio, routing load, activity distribution. Comparative study will be presented with number of networking context consideration and the results show the appropriate routing protocol for two kinds of communication services (data and voice).
The introduction of new ATM service categories increases the benefits of ATM, making the technology suitable for a virtually unlimited range of applications.
Connection Admission Control (CAC) is defined as the set of actions taken by the network during the call (virtual connection) set-up phase, or during call re-negotiation phase, to determine whether a connection request can be accepted or rejected. Network resources (port bandwidth and buffer space) are reserved to the incoming connection at each switching element traversed, if so required, by the service category.
The major focus of this paper is call admission in the context of multi-service, multi-class ATM networks. Several strategies suggesting rules on bandwidth sharing are found in the litterature.
This study investigates particularly the Complete Sharing approach. Two service categories are concerned, namely, Constant Bit rate/Deterministic Bit Rate (CBR/DBR) and Variable Bit Rate/Statistical Bit Rate (VBR/SBR). Each service category is represented by a set of call classes corresponding to different bandwidth needs. We propose two algorithms to solve the underlying Markovian system: Product-form and Recursive solutions. A performance study based on the latter algorithm is implemented. We analyze the results of this very sharing strategy and set the not-to-violate limits for a beneficial use of it.
A number of priority mechanisms have been proposed and analyzed for ATM switching and multiplexing. The need of such mechanisms arises from the difficulty to accurately characterize and size low priority traffic. This investigation concerns the performance evaluation of a shared buffer for Frame Relay switch with threshold priority mechanism compared to one without priority mechanism. The main contribution of the paper is the proposed Markovian model for this scheme. The evaluation, based on finite-state Markov model of a switch and its incoming traffic, allow to guarantee loss requirements, i.e. probabilities of 10-6 and 10-4 for high and low priority frames. The Markovian model was generated with the use of a more general tool, the principles of which are also presented in the article. This tool is prepared to construct various Markovian models of computer networks and their control mechanisms. It contains a set of objects written in C++ which may be composed into a network. Steady-state analysis is performed. In addition, a comparative study shows that analytical results validated by simulation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.