Method of The Management of Garbage Coll-201-300
Method of The Management of Garbage Coll-201-300
Method of The Management of Garbage Coll-201-300
Throughput
connected to two or more independent buses realizing quite the same
function- ality. The MuNetIN node is equipped with three networks, but the
management of those connections is different than it would be in a
redundant system. The communication process on redundant system is
usually managed independently and the set of communication tasks is the
same on every redundant bus. Mean- while, in the presented solution there
is one manager common for all buses and the communication process on
every bus may vary.
⎡ . ⎥⎤
BD = bd.1,1 · ·. ·. bd. 1,n
⎢
⎣ ⎦
where bdm,1 · · · bdm,n ,
1 if device j is connected to bus i,
bdi,j =
0 otherwise.
Let matrix DT (device/task) similarly define devices served in particular
communication tasks. Assuming there is n devices and r tasks, the matrix
DT is as follows:
⎡ .. ⎥⎤
DT = dt1,1
. · · · . dt1,r
⎢
⎣ . ⎦
,
184 A. Kwiecien´ et al.
dtn,1 · · · dtn,r
Utilization of Redundant Communication Network 185
Throughput
where
1 if device i is involved in task j,
dti,j =0 otherwise.
We are considering communication tasks related to exactly one device,
thus every column of matrix DT contains exactly one 1, i.e.:
∀j=1...r ∃i dti,j = 1
∀j=1...r dtx,j = dty,j = 1 ⇒ x = y
Matrix BT (bus/task) is a matrix product BT = BD · DT defining tasks
which may be served on particular buses.
⎡ . ⎥⎤
bt.1,1 · ·. ·. bt1,r
BD · DT = BT = . ⎦
where ,
btm,1 · · · btm,r
i,j ⎢ 1 if task j may be served on bus i,
bt =⎣
0 otherwise.
Additionally, each from r tasks has preset periodicity, i.e. maximal time
tasks. P = p1 · · · pr , where: pi denotes periodicity of task i.
between serving successive task. Let P be a vector defining periodicity of
the
Communication tasks are served by system described in Sect. 4.3, where
Queries Distributor chooses successive task to serve. Distributor is called
peri- odically, for every bus, as soon as the bus becomes idle. Selection of
the next task is based on periodicity in order to choose the task which may
be handled on a given bus, and whose time period left to obey the declared
periodicity of that task is minimal. Therefore, additional information about
time left to dead- lines is necessary. Let T be a vector defining time left
for serving each task.
T = t1 · · · tr , where ti denotes maximal time, in which task i may be
served to obey periodicity defined in P .
Matrices BD, DT, BT, P are constant, T is variable changed by
Distributor. Initially T = P . According to passing time T decreases.
Choosing task j to serve involves changing tj to initial value tj = pj,
defined by periodicity of task j.
Naturally, considering the system with defined time for serving single
com- munication task tsingle, identical for each task, it is possible to simplify
the model to handle discrete time, where time flow is modeled by decreasing
each element of T by tsingle, after sending tasks in each bus.
Choosing the task to serve on bus i, Distributor is looking for a
minimum value in these elements of T , where corresponding elements in
vector BTi,1..r are 1, i.e. among the tasks which may be served on a given
bus. Additionally, tasks, which are just being served on another bus, should
be omitted. In order to decide if the query related to the task i has been just
sent or not, such information will
pMAX ∗ m
S= .
tsingle
Each task i during pMAX time is handled approximately pMAX pi times. Thus,
to handle allr periodic tasks in given periodicity constraints, during pMAX time
Σ pMAX
on average
pi slots are needed.
i=1
Let cf be a coefficient, calculated in every cycle, similarly as above, but
basing on ti instead of pi. Such coefficient might be understood as a number
of slots needed for all periodic tasks, if periodicity of each task was equal to
its actual time to deadline. According to passing time, such coefficient for
each task increases until the task is served, then it returns to its initial
value.
Σ
cf = r pMAX
ti if ti is not zero,
i=1 pMAX otherwise.
In the cycles where cf < S − m, i.e. dedicating m slots for aperiodic
queries (each query being served in one slot) does not expose deadlines for
periodic
transactions to risk, successive aperiodic queries from the pool will be
handled on each bus.
1100000 0
⎡ ⎤
DT = 0⎣0 0 1 0 1 1 0
⎢
⎢0 0 1 0 0 0 0
⎥ 00001001
0 ⎦
Each column defines the device serving given task. The first task is
served by slave 1, the second also by slave 1, the third by slave 3, the
fourth by slave 2, etc.
BT matrix is calculated as matrix product of BD and DT .
⎡ ⎤
1101111 1
BT ⎣0 0 1 1 1 1 1 1⎦
= 11110110
Each column defines buses, where given communication task may be
served. The first and second tasks may be served on buses A or C, the third
on B or C, the fourth on all buses, etc.
Periodicity vector for the tasks is as follows:
Time to 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
deadline
Q1 50 40 30 20 10 50 40 30 20 10 50 50 40 30 20
Q2 50 40 30 20 10 50 40 30 20 10 50 40 30 20 10
Q3 50 40 30 20 10 50 40 30 20 10 50 40 30 20 10
Q4 100 90 80 70 60 50 40 30 20 10 0 100 90 80 70
Q5 100 90 80 70 60 50 40 30 20 10 0 100 90 80 70
Q6 150 140 130 120 110 100 90 80 70 60 50 40 30 20 10
Q7 150 140 130 120 110 100 90 80 70 60 50 40 30 20 10
Q8 300 290 280 270 260 250 240 230 220 210 200 190 180 170 160
cf 29.0 34.5 43.2 59.7 106.6 37.2 45.4 58.8 84.9 161.4 631.5 43.6 55.8 79.3 145.4
Query Bus A Q+ Q+ Q+ Q+ Q1 Q+ Q+ Q+ Q+ Q1 Q4 Q+ Q+ Q+ Q2
Bus B Q+ Q+ Q+ Q+ Q3 Q+ Q+ Q+ Q+ Q3 Q5 Q+ Q+ Q+ Q3
Bus C Q+ Q+ Q+ Q+ Q2 Q+ Q+ Q+ Q+ Q2 Q1 Q+ Q+ Q+ Q6
cf is higher than S −m. After that again aperiodic queries are sent 3 more times.
For brevity, only 15 cycles have been shown, however numerous cycles and
different examples have been analyzed during the algorithm development.
References
1. Gaj, P., Malinowski, A., Sauter, T., Valenzano, A.: Guest editorial: distributed
data processing in industrial applications. IEEE Trans. Ind. Inform. 11(3), 737–
740 (2015)
2. Gaj, P., Jasperneite, J., Felser, M.: Computer communication within industrial
distributed environment - survey. IEEE Trans. Ind. Inform. 9(1), 182–189
(2013)
3. Birkholz, H., Sieverdingbeck, I.: Link-failure assessment in redundant ICS
networks supported by the interconnected-asset ontology. In: 2014 IEEE
International Work- shop Technical Committee on Communications Quality and
Reliability (CQR), pp. 1–6, May 2014
4. Kopetz, H.: Real-Time Systems: Design Principles for Distributed Embedded
Applications. Springer, Heidelberg (2011)
Utilization of Redundant Communication Network 193
Throughput
5. Sauter, T.: The three generations of field-level networks-evolution and
compatibil- ity issues. IEEE Trans. Ind. Electron. 57(11), 3585–3595 (2010)
6. Flak, J., Gaj, P., Tokarz, K., Wide-l, S., Ziebinski, A.: Remote monitoring of
geo- logical activity of inclined regions - the concept. In: Kwiecien´, A., Gaj,
P., Stera,
P. (eds.) Computer Networks. Communications in Computer and Information
Sci- ence, vol. 39, pp. 292–301. Springer, Heidelberg (2009)
7. Popovic, M., Mohiuddin, M., Tomozei, D.C., Boudec, J.Y.L.: iPRP: parallel
redun- dancy protocol for IP networks. In: 2015 IEEE World Conference on
Factory Com- munication Systems (WFCS), pp. 1–4, May 2015
8. Yu, X., Jiang, J.: Hybrid fault-tolerant flight control system design against
partial actuator failures. IEEE Trans. Control Syst. Technol. 20(4), 871–886
(2012)
9. Kwiecien´, A., St´oj, J.: The cost of redundancy in distributed real-time systems
in steady state. In: Kwiecien´, A., Gaj, P., Stera, P. (eds.) Computer Networks.
Com- munications in Computer and Information Science, vol. 79, pp. 106–120.
Springer, Heidelberg (2010)
10. International Electrotechnical Commission: IEC 62439-2: Industrial communica-
tion networks: High availability automation networks - part 2: Media
redundancy protocol
11. Zuloaga, A., Astarloa, A., Jim´enez, J., L´azaro, J., Araujo, J.A.: Cost-effective
redundancy for ethernet train communications using HSR. In: 2014 IEEE 23rd
International Symposium on Industrial Electronics (ISIE), pp. 1117–1122, June
2014
12. International Electrotechnical Commission: IEC 62439–3 (2012): “industrial
com- munication networks: High availability automation networks” - part 3:
Parallel redundancy protocol (PRP) and high availability seamless redundancy
(HSR)
13. Giorgetti, A., Cugini, F., Paolucci, F., Valcarenghi, L., Pistone, A., Castoldi, P.:
Performance analysis of media redundancy protocol (MRP). IEEE Trans. Ind.
Inform. 9(1), 218–227 (2013)
14. Kirrmann, H., Weber, K., Kleineberg, O., Weibel, H.: HSR: zero recovery time
and low-cost redundancy for industrial ethernet (high availability seamless
redun- dancy, IEC 62439–3). In: 2009 IEEE Conference on Emerging
Technologies Factory Automation, pp. 1–4, September 2009
15. Rentschler, M., Heine, H.: The parallel redundancy protocol for industrial IP
net- works. In: 2013 IEEE International Conference on Industrial Technology
(ICIT),
pp. 1404–1409, February 2013
16. Hoga, C.: Seamless communication redundancy of IEC 62439. In: 2011 Interna-
tional Conference on Advanced Power System Automation and Protection, vol.
1,
pp. 489–494, October 2011
17. Nsaif, S.A., Rhee, J.M.: Improvement of high-availability seamless redundancy
(HSR) traffic performance. In: 2012 14th International Conference on Advanced
Communication Technology (ICACT), pp. 814–819, February 2012
18. Nsaif, S.A., Kim, S., Rhee, J.M.: Quick removing (QR) approach using cut-
through switching mode. In: 2016 18th International Conference on Advanced
Communi- cation Technology (ICACT), pp. 170–147, January 2016
19. Saadi, I.M.A.: Dynamic message transmission scheduling using can protocol. Int.
J. Sci. Technol. Res. 2(9), 158–162 (2013)
20. Wey, C.L., Hsu, C.H., Chang, K.C., Jui, P.C.: Enhancement of controller area
network (CAN) bus arbitration mechanism. In: 2013 International Conference
on Connected Vehicles and Expo (ICCVE), pp. 898–902, December 2013
194 A. Kwiecien´ et al.
21. Kwiecien´, A., Kwiecien´, B., Ma´ckowski, M.: Algorithms for transmission
failure detection in a communication system with two buses. In: Gaj, P.,
Kwiecien´, A., Stera, P. (eds.) Computer Networks. Communications in
Computer and Informa- tion Science, vol. 608. Springer International
Publishing, Cham (2016)
22. Kwiecien´, A., Kwiecien´, B., Ma´ckowski, M.: A failure influence on
parameters of real-time system with two buses. Computer Networks.
Communications in Com- puter and Information Science, vol. 608. Springer
International Publishing, Cham (2016)
Software Defined Home Network
for Distribution of the SVC Video
Based on the DASH Principles
1 Introduction
Nowadays, the importance of multimedia transmissions for the entire
market of Internet services, is no longer subject to discussion. The undoubted
success of ser- vices based on the transmission of video is not only due to the
rapid development of network infrastructure, both within the Internet backbone
and access networks. An important role in their wide acceptance also played
the development of techniques for efficient video encoding, new methods for
video streaming and scalable content distribution. In the article, special
attention is paid to two techniques: HTTP Adap- tive Streaming (HAS) [1]
and Scalable Video Coding (SVC) [2].
Oc Springer International Publishing AG 2017
P. Gaj et al. (Eds.): CN 2017, CCIS 718, pp. 195–206, 2017.
196 A. Kwiecien´ et al.
DOI: 10.1007/978-3-319-59767-6 16
196 S. Przylucki et al.
Despite the obvious advantages of the HAS approach [3], there are still
issues that need attention in the implementation of video streaming
services. The most important challenges can certainly include issues related
to ensuring the fairness allocation of available bandwidth to individual video
streams [4].
Most of the current proposals to guarantee fair allocation of resources
were focused on systems implemented in distribution networks or networks
of local Internet providers [5]. Much less attention was paid to home
networks or net- works in general, which are attached to the end-user of
DASH services. Such an approach does not seem to be justified in the
context of the rapid increase in the number of individual users of video
streaming services. Unfortunately, in home networks, dedicated hardware
and complex algorithms for monitoring and traffic shaping, could not be
easily applied [6]. A promising basis for such solutions is the idea of
Software Defined Network (SDN) [7]. So far, two basic restrictions
significantly affect the popularity of the solutions of this type. The first was
the limited availability of network devices supporting the protocol
OpenFlow. The second reason was related to the complex process of
installation and configura- tion of SDN controllers. Currently, the first cause
becoming less important due to the availability of efficient, home
networking equipment. In turn, the second limitation can be effectively
eliminated using the lightweight virtualization. In this context, particularly
promising seems to be the idea of microservices and especially the
containerization techniques based on Docker containers [8].
The remainder of the paper is organised as follows. Related works are
pre- sented in Sect. 2. Section 3 contains the description of the proposed
SDHN solu- tion for video stream distribution in a home network. The test
scenario and performance evaluation are presented in Sect. 4. Finally, a
brief conclusion is made in Sect. 5.
3 Proposed Solution
The proposed solution is designed for typical home networks. Thus,
following assumptions have been made:
SDHN controller
SAND messages
DASH clients database
optional GUI/CLI
video streams database
Northbound (REST API)
Fairness distribution
block (FDB)
policy block
QoS controller (QoSC)
Network resources module (NRM)
Southbound (OpenFlow)
klient DASH
gateway/home network
where UFi be a utility function, xi the bitrate for i-th video stream and Blimit
represents the total amount of available bandwidth for all streams.
To solve this optimization problem, the integer-programming algorithm
was used [20]. We discussed this algorithm in our earlier article [14]. The
results are the optimum bitrate values. However, these values do not
necessarily corre- spond to the OPs bitrates defined within SVC stream. For
this reason, when it is necessary, calculated values of bitrate must be
changed to the nearest, lower value of the bitrate associated with the
particular OP. Finally, the calculated
200 S. Przylucki et al.
values are sent to the DASH clients as SAND PER Messages (message:
Share- dResourceAssignment) [10]. Summarizing, the QoSC block performs
sequentially the following three tasks:
– reads the data contained in DASH clients and video stream databases,
creates the utility function,
– finds solution to optimization problem (Formula (1)),
– downgrades the optimal bitrates to the bitrate (lower) of the closest OP.
video SVC
(chunks) limiter scootplayer remote control
Openflow + OpenWRT
12 Mb/s Docker local repository
IMQ + TC PC + Docker
PC TP-LINK switch
engine with support for accurate logging. It was modified to support the
SAND messages listed in Sect. 3. The DASH clients were implemented as
separate, vir- tual instances of LXD (Linux Container Deamon) containers.
All tests (the clients activities) were orchestrated by remote control scripts.
The “Elephants Dreams” video sequence (1080 p, 24 f/s) was used for all
tests. The video was encoded using the reference software JSVM (Joint
Scalable Video Model) what resulted in two SVC video files with resolutions
1080 p and 720 p, respectively. In the encoding process the Profile High was
used. The parameters of the individual layers within the SVC stream were
as follows:
Fig. 3. The example of the schedule of the test B (left) and corresponding bitrates of
the SVC video streams received by five DASH clients (right).
Fig. 4. The utilized bandwidth, the total demand on bandwidth and the bottleneck
capacity for two video distribution systems: legacy DASH (upper) and proposed
SDHN DASH (lower).
References
1. ISO/IEC 23009-1:2014: Information technology - Dynamic adaptive streaming
over HTTP (DASH) - Part 1: Media presentation description and segment
formats (2014)
2. Reichel, J., Schwarz, H., Wien, M., Vieron, J.: Joint Scalable Video Model 9 of
ISO/IEC 14496-10: 2005/AMD3 Scalable Video Coding. Joint Video Team
(JVT), Docs. JVT-X202 (2007)
3. Stockhammer, T.: Dynamic adaptive streaming over HTTP standards and
design principles. In: Second Annual ACM Conference on Multimedia Systems,
San Jose,
pp. 133–144. ACM (2011)
4. Akhshabi, S., Anantakrishnan, L., Dovrolis, C., Begen, A.C.: What happens
when HTTP adaptive streaming players compete for bandwidth. In: Proceedings
of ACM Workshop on Network and Operating System Support for Digital Audio
and Video, Toronto, pp. 9–14 (2012)
5. Timmerer, C., Griwodz, C., Begen, A.C., Stockhammer, T., Girod, B.: Guest
edi- torial adaptive media streaming. IEEE J. Sel. Areas Commun. 32(4), 681–
683 (2014)
6. Abuteir, R.M., Fladenmuller, A., Fourmaux, O.: SDN based architecture to
improve video streaming in home networks. In: Proceedings of IEEE 30th
Interna- tional Conference on Advanced Information Networking and
Applications, Crans- Montana, pp. 220–226 (2016)
7. ONF: Open Networking Foundation Software-Defined Networking (SDN) Defini-
tion. https://www.opennetworking.org/sdn-resources/sdn-definition
8. Docker Inc. and Docker Project. https://www.docker.com/
9. Akhshabi, S., Begen, A., Dovrolis, C.: An experimental evaluation of rate-
adaptation algorithms in adaptive streaming over HTTP. In: Second Annual
ACM Conference on Multimedia Systems, San Jose, pp. 157–168. ACM (2011)
206 S. Przylucki et al.
1 Introduction
Vehicular ad hoc network (VANET) is considered as an important
component of the next generation automotive systems, which enables inter-
vehicle communica- tion for a number of safety, traffic management, and
comfort-related applications [1–4]. Using the communication between
vehicles, VANET could provide a safer and a more convenient driving
experience. From the perspective of the VANET applications development,
network connectivity is very important since it might be difficult to provide
reliable services in the case of disconnections. Due to the dynamically
changing topology of VANET, the connectivity has direct influence on
channel contention and vehicle communications [5].
Transmission range is a critical parameter, which significantly affects
VANET connectivity [6]. On the one hand, the connectivity of VANET is
expected to be improved as the transmission range increases [7]. On the
other hand, a longer transmission range in a dense wireless network can lead
to a huge amount of interferences between neighbour nodes and a high
network overhead. Thus, the
Oc Springer International Publishing AG 2017
P. Gaj et al. (Eds.): CN 2017, CCIS 718, pp. 209–220, 2017.
DOI: 10.1007/978-3-319-59767-6 17
210 B. P-laczek and M.
Bernas
network will suffer from inefficiency due to packet collisions and losses [8].
To alleviate this issue, the transmission range in VANET should be locally
adjusted to the current traffic situation. So far, several transmission range
adjustment techniques for VANET have been investigated [8, 9]. Such
techniques require accurate estimation of a transmission range value, which
guarantees connectivity of all vehicles in a considered area.
In this paper, the minimum transmission range (MTR) is analysed for
VANET in arterial roads with signalised intersections. MTR corresponds to
the minimum common value of the vehicles transmission range, which
enables all vehicles to be connected via multihop communication in a single
network clus- ter. A method is proposed to derive an estimate of the upper
bound MTR. The analytical estimate of the upper bound MTR is verified in
a simulation environ- ment for unidirectional and bidirectional signalized
arterial road.
The paper is organized as follows. A short review of the related literature
is provided in Sect. 2. The method of MTR estimation is introduced in Sect.
3. Simulation experiments and their results are described in Sect. 4. Finally,
con- clusions are given in Sect. 5.
Fig. 2. Number of vehicles stopped at an intersection due to red signal (n). (Color
figure online)
Based on the arrival curve and the departure curve presented in Fig. 2,
it can be found that the total number of stopped vehicles, which
corresponds to the number of vehicles in the platoon, can be estimated as
follows:
R·q
n= (5)
1 − q/s
214 B. P-laczek and M.
Bernas
The above considerations are related to the MTR estimation for under-
saturated traffic conditions, whereby vehicle queues are only created during
the red signal and are dissolved during green signal. In oversaturated traffic
condi- tions, when the intensity of traffic flow (q) exceeds the intersection
capacity (c), vehicle queues fill approaches of the intersection and spill over
from one inter- section to another. In such case, the queues persist and
cannot be cleared totally during green signal.
According to the proposed approach, the MTR for oversaturated traffic
is estimated based on the length of the widest gap between vehicles, which
can be created when vehicles leave queue during green signal. The expected
number of vehicles that pass an intersection during effective green time (G)
is G · s. Aver- age road length occupied by one vehicle in the queue equals
1/kjam, where kjam denotes maximum vehicle density in traffic jams. Thus,
the MTR for oversatu- rated traffic conditions is estimated as G · s/kjam.
Finally, based on the above considerations, the upper bound of MTR for
VANET in a signalised arterial road of length d is given by
⎧ R·q
r(q) = d−
⎨ 1− (6)
q/s — 1 · v/s, q ≤
c,
⎩
G · s/kjam, q > c,
slowing down. Finally, in step 4 the vehicles are moved according to the
new velocity calculated in steps 1–3. Steps 1–4 are applied for all vehicles.
According to the definition of step 3, the speed of all vehicles that have a
velocity of at least 1, is reduced by one unit with a probability of p.
Parameter p is referred to as the deceleration probability. It should be
noted that without step 3, the model is deterministic [17]. Detailed
definitions of steps 1–4 can be found in [14].
A schema of the simulated arterial road, with eight signalized
intersections, is shown in Fig. 3. Total length of the arterial road is 7.5 km
(1000 cells). The above-mentioned CA model of the arterial road was
implemented in Matlab. The simulations were performed for two scenarios.
Unidirectional traffic was considered in Scenario 1 and bidirectional traffic
was analyzed in Scenario 2. Simulation data were collected in a section
between 4th and 6th intersection (the shaded area in Fig. 3).
Intensity of the traffic flow was determined for the network model by
parame- ters qA and qB (in vehicle per second). At each time step vehicles
were randomly generated with a probability equal to the intensity qA or qB
in the entrances of the road model, as shown in Fig. 3. As a result,
binomially distributed traffic flows were obtained that approximate a
Poisson distribution. The simulation period was 10000 s for each considered
combination of the traffic intensities. The traffic signal control was
simulated assuming the green wave coordination strategy. Detailed
parameters of the simulation model are presented in Table 1.
Parameter Value
Total road length 1000 cells
Length of analyzed road section (d) 222 cells
Distance between intersections 111 cells
Effective green time (G) 38 s
Effective red time (R) 38 s
Mean free-flow speed (v) 2.8 cells per second
Maximum speed 3 cells per second
Deceleration probability 0.2
Saturation flow rate (s) 0.54 vehicles per second per lane
Capacity of intersection (c) 0.27 vehicles per second per lane
Maximum vehicle density (kjam) 1 vehicle per cell
by constructing the minimum spanning tree in a graph K(N, E), which rep-
resents the VANET in the considered road section [10]. The vertices N in K
correspond to vehicles and edges E represent communication links. An
edge e = (ni, nj) exists in K if the distance between vehicles i and j is
shorter than or equal to min(ri, rj), where ri, rj denote transmission ranges
of vehicles i and j, respectively. The MTR is the longest edge in the
minimum spanning tree. In a single-lane VANET, the MTR is the widest
gap between any two consecutive vehicles. The MTR was computed at each
time-step of the simulation and stored along with the intensity of traffic
flow.
Results of both the simulation experiments and the analytical MTR
evalua- tion for unidirectional traffic (Scenario 1) are compared in Figs. 4, 5
and 6. The
scatter plots present the MTR values that were determined for various
traffic intensities during simulation. The curves in the plots correspond to
the upper bound of MRT, which was estimated by using Eq. (6). These
plots show clearly that the MTR values are concentrated below the derived
upper bound for all analysed intensities of traffic flow.
The results in Fig. 4 were obtained assuming that there are no vehicles
turn- ing at intersections from the side roads into the arterial road (qB = 0
veh./s). In this case, without the traffic inflows from side roads, only free-
flow traffic conditions are observed. Subsequently, the intensity of the traffic
entering arte- rial from side roads was set to half of the traffic intensity on
the arterial road,
218 B. P-laczek and M.
Bernas
i.e., qB = 0.5 · qA (Fig. 5). For qA = 1.8 veh./s such setting led to
oversaturated traffic conditions since the total traffic intensity (qA + qB =
1.5 · qA) exceeds the capacity of intersections (c = 0.27 veh./s). This causes
a significant decrease of the MTR, as shown in Fig. 5.
The performed MTR analysis has also taken into account different ratios
of the side inflow intensity and the arterial traffic intensity (qB/qA). Figure 6
shows the MTR values that were obtained for qA = 0.1 veh./s and qB
between 0 and
0.1 veh./s. It can be observed in these results that the MTR decreases when
the side inflow intensity increases. The shorter MTR for higher qB
intensities are caused by the vehicles from side roads that join the platoons
on the arterial road and extend their lengths.
The MTR values determined for the bidirectional traffic (Scenario 2) are
shown in Figs. 7 and 8. It should be noted that in this scenario qA and qB
denote intensities of the traffic in arterial road for both directions. The
traffic inflows from side roads are not present. The results in Fig. 7 were
obtained for equal intensities of the traffic in both directions (qA = qB). The
MTR values for different qA and qB intensities are presented in Fig. 8. In
general, the results confirm that the proposed method enables correct upper
bound evaluation for MTR also in case of the bidirectional arterial road.
When comparing the results obtained for Scenario 2 with those of
Scenario 1 it can be observed that the MTR values decreases faster with the
intensity for the bidirectional traffic. The reason is that the number of
vehicles in the analysed section of the bidirectional road is higher than in
the unidirectional road and the distances between platoons are shorter, as
shown in Fig. 1b.
Minimum Transmission Range Estimation 219
5 Conclusion
Simulation results show that the proposed method allows the upper-bound
MTR to be accurately estimated for VANETs in unidirectional and
bidirectional signal- ized arterials. The derived MTR estimate fits well with
the results of simulation experiments for a wide range of traffic intensities.
In case of under-saturated traffic, the MTR decreases when the traffic flow
intensity increases. In compar- ison to the under-saturated traffic, a
significantly lower MTR value is obtained for the over-saturated traffic
conditions. For both the under-saturated and the over-saturated traffic
conditions, the traffic signals timing has a strong impact on the estimated
MTR. When the MTR is considered for under-saturated traffic, the distance
between intersections is an additional important factor, which has to be
taken into account. It was also observed that in case of bidirectional traffic
the VANET connectivity is improved by lowering the MTR requirements.
In practice this method may be used by control nodes at intersections
that are equipped with wireless communication and collect data reported by
vehicles via VANET in order to optimize the traffic signals. Such control
nodes could evaluate the MTR and broadcast this information to the
vehicles. The proposed approach can be combined with advanced data
collection strategies [18]. Further research will be necessary to integrate the
method into a dynamic range control protocol for VANETs. Another
interesting topic for the future research is to use the stochastic geometry
model [19] for the MTR analysis.
References
1. Al-Sultan, S., Al-Doori, M.M., Al-Bayatti, A.H., Zedan, H.: A comprehensive
sur- vey on vehicular ad hoc network. J. Netw. Comput. Appl. 37, 380–392
(2014)
2. P-laczek, B.: Selective data collection in vehicular networks for traffic control
appli- cations. Transp. Res. Part C: Emerg. Technol. 23, 14–28 (2012)
220 B. P-laczek and M.
Bernas
3. Berna´s, M.: VANETs as a part of weather warning systems. In: Kwiecien´, A.,
Gaj, P., Stera, P. (eds.) CN 2012. CCIS, vol. 291, pp. 459–466. Springer,
Heidelberg (2012). doi:10.1007/978-3-642-31217-5 48
4. Berna´s, M.: WSN power conservation using mobile sink for road traffic
monitoring. In: Kwiecien´, A., Gaj, P., Stera, P. (eds.) CN 2013. CCIS, vol.
370, pp. 476–484. Springer, Heidelberg (2013). doi:10.1007/978-3-642-38865-1 48
5. Shao, C., Leng, S., Zhang, Y., Vinel, A., Jonsson, M.: Performance analysis of
connectivity probability and connectivity-aware MAC protocol design for
platoon- based VANETs. IEEE Trans. Veh. Technol. 64(12), 5596–5609 (2015)
6. Kafsi, M., Papadimitratos, P., Dousse, O., Alpcan, T., Hubaux, J.P.: VANET
con- nectivity analysis. In: IEEE Workshop on Automotive Networking and
Applica- tions (Autonet), no. LCA-CONF-2009-001 (2008)
7. Jia, D., Lu, K., Wang, J.: On the network connectivity of platoon-based
vehicular cyber-physical systems. Transp. Res. Part C: Emerg. Technol. 40,
215–230 (2014)
8. Soua, A., Ben-Ameur, W., Afifi, H.: Beamforming-based broadcast scheme for
multihop wireless networks with transmission range adjustment. In: 10th Annual
Conference on Wireless On-Demand Network Systems and Services (WONS),
pp. 107–109 (2013)
9. Javed, M.A., Khan, J.Y.: Performance analysis of an adaptive rate-range control
algorithm for VANET safety applications. In: 2014 International Conference on
Computing, Networking and Communications (ICNC), pp. 418–423 (2014)
10. Artimy, M.M., Robertson, W., Phillips, W.J.: Minimum transmission range in
vehicular ad hoc networks over uninterrupted highways. In: 2006 IEEE
Intelligent Transportation Systems Conference, pp. 1400–1405 (2006)
11. Artimy, M.: Local density estimation and dynamic transmission-range
assignment in vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 8(3),
400–412 (2007)
12. Jin, W.L., Recker, W.W., Wang, X.B.: Instantaneous multihop connectivity of
one- dimensional vehicular ad hoc networks with general distributions of
communication nodes. Transp. Res. Part B: Methodol. 91, 159–177 (2016)
13. Osman, O.A., Ishak, S.: A network level connectivity robustness measure for
con- nected vehicle environments. Transp. Res. Part C: Emerg. Technol. 53, 48–
58 (2015)
14. Tonguz, O.K., Viriyasitavat, W., Bai, F.: Modeling urban traffic: a cellular
automata approach. IEEE Commun. Mag. 47(5), 142–150 (2009)
15. Dhingra, S.L., Gull, I.: Traffic flow theory historical research perspectives.
Trans- portation Research E-Circular, E-C149 (2011)
16. Maerivoet, S., De Moor, B.: Cellular automata models of road traffic. Phys. Rep.
419(1), 1–64 (2005)
17. P-laczek, B.: A traffic model based on fuzzy cellular automata. J. Cell. Automata
8(3–4), 261–282 (2013)
18. P-laczek, B., Bernas, M.: Uncertainty-based information extraction in wireless
sen- sor networks for control applications. Ad Hoc Netw. 14, 106–117 (2014)
19. Steinmetz, E., Wildemeersch, M., Quek, T.Q., Wymeersch, H.: A stochastic
geome- try model for vehicular communication near intersections. In: Globecom
Workshops (GC Wkshps), pp. 1–6. IEEE (2015)
The Possibilities and Limitations
of the Application of the Convolution
Algorithm for Modeling Network Systems
1 Introduction
The works [1, 2] propose a convolution algorithm to model full-availability
resources that are systems with state-independent call admission process. In
[3– 7], a modification to convolution algorithms for modelling a number of
selected systems with state-dependent call admission process, such as: the
full-availability group with reservation [2], limited-availability group [4],
threshold systems [4] and overflow systems [6] is presented. In all the above
mentioned works the appli- cation of the convolution algorithm is limited to
model systems that are offered mutually independent classes of traffic
generated by a finite (Engset traffic, Pas- cal traffic) or infinite (Erlang
traffic) number of traffic sources. A review of the literature also provides a
number of methods in which methods other than con- volution algorithms
are used to model systems with finite and infinite number traffic sources and
different new call admission mechanisms [8]. However, the issue of a possible
application of convolution algorithms to model call streams other than
Poisson call streams has not been addressed as yet.
Hanczewski et al. [7] proposes the model of a queueing system with
cFIFO service discipline and considers an application of a convolution
algorithm to model systems which are offered traffic classes with other than
exponential dis- tributions of time between subsequent events. The model
for cFIFO queueing systems is an approximated model and hence on the
basis of the results presented in [7] it is not possible to unequivocally
evaluate the influence of non-Poissonian call streams on the accuracy of the
convolution algorithm.
Oc Springer International Publishing AG 2017
220 B. P-laczek and M.
Bernas
P. Gaj et al. (Eds.): CN 2017, CCIS 718, pp. 221–235, 2017.
DOI: 10.1007/978-3-319-59767-6 18
222 A. Kaliszan and M. Stasiak
A = (S
— A ) · γi . (2)
i i i
µi
In a Pascal stream, call arrival intensity increases along with the
number of serviced calls. The dependence between the parameters Si, γi
and the average value of offered traffic Ai can be written with the
following Formula [25]:
A = (S + A ) · γi . (3)
i i i
µi
Ei(t Si − A i
act
)= . (5)
Aiµi
It is also possible to define in a similar way classes that are state-
dependent with ascending traffic pattern that are derivative classes from
Pascal call classes. The dependence between the average traffic intensity and
the expected value Ei(tact) can be written in this particular case, on the basis
of (3), in the following way:
Si + A i
Ei(tact ) = . (6)
Aiµi
The Possibilities and Limitations of the Convolution 225
Algorithm
Let us consider now the way in which appropriate parameters for
selected distributions used in the investigation into the convolution
algorithm are deter- mined. These distributions make a determination of the
time between calls (state-independent call classes) or the time between a
termination of a service and a subsequent call coming from the same source
(state-dependent call classes) possible. The distribution parameters can be
determined on the basis of the expected value Ei(t∗) and variance Di(t∗),
where t∗ = tint for state-independent streams and t∗ = tact for state-
dependent streams.
In the uniform distribution the probability density function is written
with the following formula:
fi(t) = 1
t i,max — ti,min , (7)
where ti,min denotes the minimum value after which a call of class i arrives,
whereas ti,max is the maximum value. The parameters ti,min and ti,max can be
determined on the basis of the expected value and variance:
√
ti,min = Ei(t∗) − 3 · Di(t∗), (8)
√
ti,max = Ei(t∗) + 3 · Di(t∗). (9)
In the case of the normal distribution, the probability density function is
determined directly on the basis of the expected value and variance for time
t∗:
1
2
(t−Ei(t∗))
−
fi(t) = √ e 2Di(t∗)
(10)
Di(t∗) 2π
In the gamma distribution the density function f (x) is typically written
in the following way:
tαi−1 e−t/βi , (11)
fi(t) =
βiαi Γ (αi)
where αi shape parameter (tail index), while βi is the scale parameter.
Those parameters (αi and βi) can be determined on the basis of the
expected value and variance:
2
αi = [Ei(t∗)] , (12)
D (t )
i ∗
βi = Di(t∗)/Ei(t∗). (13)
In the Pareto distribution the density function can be written as follows:
αi · βiαi
∀ fi(t)
t> βi , (14)
= tαi+1
where αi shape parameter (tail index), while βi is the scale parameter. Due
to a particular specificity of the distribution, the parameter αi should be
greater than 2. This value of the parameter αi limits variance to finite value.
The coef- ficients αi and xi can be determined on the basis of the following
formulas:
Di(t∗)
α = 1 + 1+ , (15)
i
[Ei(t∗)]2
226 A. Kaliszan and M. Stasiak
i ∗
[ED(t(t )]2 )
βi =
E (t ) 1 + i i ∗∗ . (16)
1+ 1 + [EDi(ti(t∗)]2
∗)
4 Convolution Algorithm
In convolution algorithms the input data that describe the offered call class
i include: the number of demanded resources di and occupancy distribution V
[P ]{i}. The single element
V [P (n)]{i} of the distribution determines the
occupancy prob-
ability (of) n AUs by calls of class i in a system with the capacity V AUs
that services calls of class i only. Figure 2 shows a diagram of a full-
availability group for the convolution algorithm.
where A and B are the sets of single or previously aggregated call classes.
Then, the distribution [P ]M is normalised to the distribution
V
[P ]M .
Bi = Σ
V
[P (n)]VM . (22)
n=V −di+1
considered systems the service time had exponential character, while the
service intensity µi for each class i (i ∈ M ) was equal to 1 [(time unit)−1].
∀ µi = 1. (23)
i∈ M
On the basis of (4)–(6) for required value of traffic intensity of a given class,
the expected value Ei(t∗) can be determined. Then, taking into
consideration the conditions (23) and (24) it is possible to determine all
necessary parameters for new call arrival time distributions. Figure 3 shows
the necessary parameters for the simulation of state-independent traffic
streams in relation to the average intensity of traffic offered to the system.
The graphs do not include the value tmin for the uniform distribution that,
consistent with the adopted assumptions, is always equal to 0. An
exemplary occupancy distribution in a system with the capacity 10 AUs and
average intensity of offered traffic equal to 7 Erl. is shown in Fig. 4. Each of
the curves presented in the diagram defines appropriate call streams in
which the time between calls is described by the uniform, normal, gamma
and Pareto distributions.
The exemplary occupancy distributions for the systems with the capacity
10 AUs to which state-dependent streams generated by 20 sources are
offered are shown in Figs. 6 and 8. The presented curves show the
occupancy distribution for a system which is offered traffic with the average
intensity of 7 Erl. Each of the curves presents appropriate call streams in
which the activity time of a source is described by a uniform, normal,
gamma and Pareto distributions.
7 Conclusions
The results of the study presented in the article show that the convolution
algorithm can be successfully used to model systems with non-Poissonian
call streams, including state-dependent and state-independent call streams.
The approximation error is just slight and in extreme instances does not
exceed 20%. This article presents the results for groups with low capacities
(V = 20 AUs). The investigations carried out by the authors show that the
approximation error decreases along with an increase in the capacity of the
system. In their future studies the authors intend to determine the accuracy
of the convolution algo- rithm for a case where the group is offered a
mixture of call streams that differ in their time distributions between calls.
The authors also intend to study the accuracy of the convolution algorithm
for service times that are not exponential.
References
1. Iversen, V.: The exact evaluation of multi-service loss system with access
control. In: Seventh Nordic Teletraffic Seminar, Lund, pp. 56–61, August 1987
2. Ross, K.: Multiservice Loss Models for Broadband Telecommunication Network.
Springer, London (1995)
3. G-labowski,
֒ M., Kaliszan, A., Stasiak, M.: Asymmetric convolution algorithm
for blocking probability calculation in full-availability group with bandwidth
reserva- tion. IET Circ. Devices Syst. 2(1), 87 (2008)
4. G-labowski,
֒ M., Kaliszan, A., Stasiak, M.: Modeling product-form state-dependent
systems with BPP traffic. Perform. Eval. 67, 174–197 (2010)
5. G-la֒bowski, M., Kaliszan, A., Stasiak, M.: Two-dimensional convolution
algorithm for modelling multiservice networks with overflow traffic. Math. Prob.
Eng. Article ID 852082, 18 (2013)
6. G-la֒bowski, M., Kaliszan, A., Stasiak, M.: Generalized convolution algorithm for
modelling state-dependent systems. IET Circ. Devices Syst. 8(5), 378–386 (2014)
7. Hanczewski, S., Kaliszan, A., Stasiak, M.: Convolution model of a queueing
system with the cFIFO service discipline. Mob. Inf. Syst. 2016, 1–15 (2016)
234 A. Kaliszan and M. Stasiak
8. Moscholios, I., Logothetis, M., Vardakas, J., Boucouvalas, A.: Performance met-
rics of a multirate resource sharing teletraffic model with finite sources under the
threshold and bandwidth reservation policies. IET Netw. 4(3), 195–208 (2015)
9. Kaufman, J.: Blocking in a shared resource environment. IEEE Trans. Commun.
29(10), 1474–1481 (1981)
10. Roberts, J.: A service system with heterogeneous user requirements –
application to multi-service telecommunications systems. In: Pujolle, G. (ed.)
Proceedings of Performance of Data Communications Systems and their
Applications, pp. 423–
431. North Holland, Amsterdam (1981)
11. G-la֒bowski, M.: Recurrent method for blocking probability calculation in multi-
service switching networks with BPP traffic. In: Thomas, N., Juiz, C. (eds.)
EPEW 2008. LNCS, vol. 5261, pp. 152–167. Springer, Heidelberg (2008).
doi:10.1007/
978-3-540-87412-6 12
12. G-labowski,
֒ M., Stasiak, M., Weissenberg, J.: Properties of recurrent equations
for the full-availability group with BPP traffic. Math. Prob. Eng. (2012)
13. Delbrouck, L.: On the steady-state distribution in a service facility carrying mix-
tures of traffic with different peakedness factors and capacity requirements.
IEEE Trans. Commun. 31(11), 1209–1211 (1983)
14. R´acz, S., Ger¨o, B.P., Fodor, G.: Flow level performance analysis of a multi-
service system supporting elastic and adaptive services. Perform. Eval. 49(1–4),
451–469 (2002)
15. Vassilakis, V.G., Moscholios, I.D., Logothetis, M.D.: Call-level performance
mod- elling of elastic and adaptive service-classes with finite population. IEICE
Trans. Commun. E91.B(1), 151–163 (2008)
16. Moscholios, I., Vardakas, J., Logothetis, M., Boucouvalas, A.: Congestion proba-
bilities in a batched poisson multirate loss model supporting elastic and adaptive
traffic. Ann. Telecommun. - annales des t´el´ecommunications 68(5), 327–344(2013)
17. Moscholios, I.D., Logothetis, M.D., Vardakas, J.S., Boucouvalas, A.C.: Congestion
probabilities of elastic and adaptive calls in Elang-Engset multirate loss models
under the threshold and bandwidth reservation policies. Comput. Netw. 92, Part
1, 1–23 (2015)
18. Iversen, V.B.: Reversible Fair Scheduling: The Teletraffic Theory Revisited.
Springer, Berlin (2007)
19. Sobieraj, M., Stasiak, M., Weissenberg, J., Zwierzykowski, P.: Analytical model
of the single threshold mechanism with hysteresis for multi-service networks.
IEICE Trans. Commun. E95–B(1), 120–132 (2012)
20. G-labowski,
֒ M., Hanczewski, S., Stasiak, M., Weissenberg, J.: Modeling Erlang’s
ideal grading with multi-rate BPP traffic. Math. Prob. Eng. Article ID 456910,
35 (2012)
21. G-labowski,
֒ M., Kaliszan, A., Stasiak, M.: Modelling overflow systems with
distrib- uted secondary resources. Comput. Netw. 108, 171–183 (2016)
22. Erlang, A.: Solution of some problems in the theory of probabilities of
significance in automatic telephone exchanges. Elektrotechnikeren (1917)
23. Engset, T.: On the calculation of switches in an automatic telephone system.
Telek- tronikk 99–142 (1998)
24. Wallstrom, B.: A distribution model for telefone traffic with varying call
intensity, including overflow traffic. Ericsson Technics (2) 183–202 (1964)
25. Iversen, V.: Teletraffic Engineering Handbook. ITU-D SG 2/16 and ITC Draft
(2001)
The Possibilities and Limitations of the Convolution 235
Algorithm
26. G-la֒bowski, M., Kaliszan, A.: Simulator of full-availability group with
bandwidth reservation and multi-rate bernoulli-poisson-pascal traffic streams. In:
EUROCON 2007 - The International Conference on “Computer as a Tool”, pp.
2271–2277. IEEE (2007)
27. Hanczewski, S., Kaliszan, A.: Simulation studies of queueing systems. In: 2016
10th International Symposium on Communication Systems, Networks and
Digital Signal Processing (CSNDSP), pp. 1–6, IEEE, July 2016
An Efficient Method for Calculation
of the Radiation from Copper Installations
with Wideband Transmission Systems
✉
Piotr Zawadzki( )
1 Introduction
Bandwidth “hungry” computing applications, the increasing need for
informa- tion sharing and the explosive growth in higher data transmission
rates demand the greater speed and larger bandwidth from LANs (Local
Area Networks) or local premises telephone installations. One method of
improving the information infrastructure is to install an all-fibre network.
However, the all-fibre premises distribution network has its price:
implementing it requires the replacement of copper cables with fibre and the
installation of more expensive active compo- nents, such as fibre optic
interface devices. With recent innovations in the design of connecting
hardware and smart encoding schemes UTP (Unshielded Twisted Pair) or
FTP (Foiled Twisted Pair) cables are now capable of supporting high bit
rates.
DSL (Digital Subscriber Line) refers to several types of advanced
modems that enable fast access at speeds 300 times faster than most analog
modems. Since DSL works on regular telephone lines they are considered a
key means of opening the bottleneck in the “last mile” of the existing
telephone infrastruc- ture, as telephone companies seek cost-effective ways
of providing much higher
Oc Springer International Publishing AG 2017
The Possibilities and Limitations of the Convolution 237
Algorithm
P. Gaj et al. (Eds.): CN 2017, CCIS 718, pp. 236–244, 2017.
DOI: 10.1007/978-3-319-59767-6 19
An Efficient Method for Calculation of the Radiation 237
2 Numerical Model
Numerical models for the radiation of the cable with the given parameters
can be derived on a basis of computational intensive methods based on a
direct Maxwell equations discretization. However everyday EMC engineering
practice requires maybe less accurate but more efficient methods.
We use multiconductor transmission line theory to determine current
distri- bution along the cable [1, 2] and full-wave approach [3] to determine
field of a specified current distribution.
dI(s)
+ Y′V(s) = 0 (1b)
ds
where V(s) and I(s) are the voltage and current vectors and Z′ and Y′
are the square N × N matrices describing per unit length line parameters.
These two first order differential equations can be transformed into two
second order
equation for the current distribution
2
d I(s)
− R′I(s) = 0
(2)
ds2
where R′ = Y′Z′. The solution of this equation has the
form
where 1
Zc = S−1 SZ′ (4)
γi
⎡ ⎤
γ1 0 . . . 0
[γi] = 0 γ2 . . . 0
⎢. . . . . . . . . . (5)
.. ⎣
⎡ ⎥ 0 0 . . . γn ⎤
⎦
e ∓γ 1 s 0 ... 0
E±(s) = ⎢ 0 e ∓γ 2 s . . . 0 ⎥ (6)
. .⎣. . . . . . . . . . . . . . . . . . . . . .⎦
0 0 . . . e∓γns
and matrix S is a diagonalisation matrix of R′, γi is a propagation constant
of the i-th mode and vectors a and b have to be calculated from the
boundary conditions.
, e−jkR
— (kR) − 3 (1 + jkR) (1 ·1 ) (7a)
2 l R R
R3
1
An Efficient Method for Calculation of the Radiation 239
I 0l
H = (1
×1 ) (1 + jkR) e−jkR
l R . (7b)
4π R2
z P
l
rp
3 Method Validation
Method validation can be performed by comparing its results with
predictions of other methods that implement commonly accepted and
verified models or by the comparison with independently conducted
computations based on the same mathematical model of the reality. In the
following sections we present method validation as a two stage process:
The mentioned above programs were used for verification of current and
field distributions for some canonical examples. All field calculations are
performed with perfect ground assumption. Keys for presented plots have
the following meaning: line code denotes results obtained with the validated
program, Excem code – results from [8], MOM code – results obtained by a
rigorous approach to electromagnetic waves radiation based on solution of
an integral equation for current distribution with method of moments [5, 7].
source in our case. The report [8] was chosen as a source of reliable data to
validate current distribution along the cable. We considered four pair UTP
cable with each pair loaded with R0 = 120 Ω and one pair forced with
voltage V0 = 2 V. The cable has length L = 10 m and was positioned on
height h = 10 cm. The current distribution along cable for two frequencies
is presented in Fig. 2.
0.0003
60
Excem code, f=2.818kHz
0.00025
|I(f=2.818kHz)| [µA]
|I(f=2.818MHz)| [µA]
Excem code, f=2.818MHz
0.0002 line code, f=2.818MHz 40
0.00015
30
0.0001
20
5e-05
10
0 0
0 2 4 6 8 10
y [m]
V
h
ZL1 ZL2
L
y
0.006
|I/V0| [Ω ]
-1
0.004
0.002
0
0 0.5 1 1.5 2
y [m]
65
60
55
50
45
40
35
100000 1e+06 1e+07 1e+08
f [Hz]
4 Parametric Study
A motivation in developing a model is to have the capability to perform
para- metric studies, in which independent model parameters can be varied
in order to gain a global understanding of the phenomenon. We used
presented method to investigate the dependence of the field in the vicinity
of the multiconductor transmission line on the following parameters:
– cable type,
– geometrical configuration of the line,
– line forcing.
z
h
L
y
a) “I-like” x
b) “U-like”
4.2 Discussion
The strength of the field at the resonant frequency strongly depends on
cable type but resonant frequency itself does not (see Fig. 7).
130
E/S278/h=1m/I/L=10m/V1
120 E/S298/h=1m/I/L=10m/V1
110
|E| [dBµ V/m]
100
90
80
70
60
50
40
100000 1e+06 1e+07 1e+08
f [Hz]
130
E/S298/h=1m/I/L=10m/V4
120 E/S298/h=1m/U/L=10m/V1
110
|E| [dBµ V/m]
100
90
80
70
60
50
40
100000 1e+06 1e+07 1e+08
f [Hz]
130
E/S298/h=1m/I/L=15m/V4
120 E/S298/h=1m/U/L=5m/V4
|E| [dBµ V/m]
110
100
90
80
70
100000 1e+06 1e+07 1e+08
f [Hz]
5 Conclusion
The proposed method is general and flexible. Virtually, it is capable to
analyse any service supported over any cable, unless reliable cable model and
PSD (Power Spectral Density) function of the transmitted signal are known.
The method is also fast as the computation time grows with square of the
number of pairs in a cable and linearly with the cable length. Moreover,
method is able to analyse not only straight section of the cable, but also
handles networks with cable bends.
244 P. Zawadzki
References
1. Paul, C.R.: Analysis of Multiconductor Transmission Lines. Wiley, New York (1994)
2. Tesche, F.M., Ianoz, M.V., Karlsson, T.: EMC Analysis Methods and Computa-
tional Models. Wiley, New York (1997)
3. Stutzman, W.L., Thiele, G.A.: Antenna Theory and Design. Wiley, New York (1981)
4. Somerfeld, A.: Uber die ausbreitung der wellen in der drahtlosen telegraphie.
Annalen der Physics 28, 665 (1909)
5. Zawadzki, P.: Elaboration of software for prediction of signals induced by a
lightning discharge on telecommunication cables placed inside buildings.
Technical report NT/LAB/QFE/143, CNET, Lannion, December 1996
6. Zawadzki, P.: Evaluation of the near field radiated by cables used for wideband
transmission systems. Technical report NT/CNET/6338, CNET, Lannion,
Septem- ber 1999
7. Harrington, R.F.: Field Computation by Moment Methods. MacMillan, New
York (1968)
8. Comaparaison de l’emission des cablages de telecommunication. Excem doc. no.
98042102A
A Videoconferencing System Based on WebRTC
Technology
1 Introduction
Historically, a real time communication, has only been available to large
compa- nies who could afforded to pay expensive licensing fees, and/or to
buy specific proprietary depend HW. Since that, videoconferencing systems
evolved to a low cost standard-based technology that is available to the
general public. Besides the audio and video communications, current
videoconferencing systems also sup- port variety of other services, including
instant messaging, documents sharing, screen sharing, video recording, etc.
Technological developments in the 2010 s have further extended the
capabilities of videoconferencing systems for use not only for in the static
environment but in the mobile environment as well.
A videoconferencing technology typically employs both audio and video
chan- nels jointly interconnecting two (point-to-point) or several users
(multi-point) located at different sites. The multi-point communication is
possible via a unit called Multipoint Control Unit (MCU) that represents a
bridge interconnecting the communicating users (similarly to the audio
conference call). Either all par- ticipating users can call the MCU, or the
MCU can call the involved users itself. A MCU can be characterized
according to the number of simultaneous support- ing calls, its ability to
provide transposing of data rates and protocols, or the way it is
implemented (stand-alone HW devices, vs. embedded unit in a ded- icated
videoconferencing system). Certain videoconferencing platforms employ
Oc Springer International Publishing AG 2017
P. Gaj et al. (Eds.): CN 2017, CCIS 718, pp. 245–255, 2017.
246 P. Zawadzki
DOI: 10.1007/978-3-319-59767-6 20
246 R. Bestak and J. Hlavacek
3.1 Skype
Comparing to WebRTC, Skype is an application. Skype is available for
different platforms and provides video and audio services between two or
more users. Additionally, users may exchange digital documents (images,
text, video and any others), and text and video messages.
3.2 Hangouts
Hangouts is a communication platform, developed by Google, supporting
instant messaging, video, audio, and SMS between two or more users. The
service can be accessed online (Gmail or Google+ websites) using either PCs
or mobile phones. Comparing to the WebRTC technology, Hangout uses a
proprietary protocol, although with WebRTC elements.
3.3 WebEx
WebEx Meeting Center is a part of commercial solution developed by Cisco.
It is a web conferencing platform delivered through the Cisco Collaboration
Cloud.
250 R. Bestak and J. Hlavacek
The stream processing is done in the cloud and the multiplexing of media
streams is not at the charge of end-point device. It uses a proprietary
algorithm named Universal Communication Format that deals with a large
range of media.
3.4 Jitsi
Comparing to previously mentioned solutions, Jitsi is a free and open source
multi-platform supporting video, audio, and instant messaging. It is based
on the OSGi framework (Collection of Java Library). Jitsi is not a web-
oriented, a user is asked to download and install specific SW to run it. In
terms of functions, libraries are not as rich as the WebRTC ones but the
main abilities are effective. Similarly to WebEx, the media stream
processing could be done at a server instead of at the end-point device.
The Jitsi videobridge, a videoconferencing solution supporting the
WebRTC. It’s a Selective Forwarding Unit, a centralized server, which is
forwarding selected streams to other participating users in the
videoconference call.
3.5 AnyMeeting
AnyMeeting is a web conferencing and webinar services allowing users to
host and to attend web based conferences and meetings and to share their
desktop screens with other users via web browser.
The above mentioned platforms are summarized and compared in Table
1. The comparison takes into account aspects such as the place of stream
multiplex- ing, set of functions (text chat, screen sharing, etc.), web-browser
compatibility, and multi-connection support.
PC1 I5 2.5 GHz dual-core, Nvidia 610 M 1 GB, 4 GB RAM, Ubuntu 14.04
LTS (NO 720P)
PC2 I3 1.7 GHz dual-core, Nvidia 820 M 2 GB, 4 GB RAM, Win 10 (NO
120P)
PC3 I7 2.5 GHz dual-core, Nvidia GTX970 3 GB, 8 GB RAM, Win 7
Server Intel(R) Xeon(R) CPU 5160 @ 3 GHz, 8 GB RAM, Ubuntu 16.04.1 LTS
In total, there have been tested 28 scenarios, which differs in the number
of involved end-point devices, PCs (1, 2, and 3), and display resolution
configura- tion (160 × 120, 320 × 240, 640 × 480, and 1280 × 720), see
Table 3. Notice that the configuration id is constructed in such way that
the first digit indicates PC
(using Table 2) and the second digit is associated to the display resolution;
for example the configuration 1222, refers to two interconnected end-point
devices
(PC1 and PC2) where the display resolution is set to 640 × 480. The
resolution of the return video, for mono user configuration is used 800 × 600
and for the other cases 200 × 150 video per user is sent back to the end-
point device. The PC1 and PC2 use all the available bandwidth, while the
data rate of PC3 is
limited to 600 kB/s.
All measurements are done by using Firefox browser, and the values are
given as an arithmetic average of ten consequent measurements (which is a
common way to evaluate a CPU load).
Figure 1 shows the server’s CPU load for different testing scenarios
(please notice that the server’s CPU has 4vCPU, therefore the load can
theoretically reach up to 4 × 100%). As can be observed, the server’s CPU
load is the lowest for the PC3, where the bit rate is the lowest. As expected,
the bit rate and there-
fore the video quality has a considerable impact on the server’s CPU load.
For increasing number of involved end-point devices, the server’s CPU load
increase as well (scenarios 102030–132333). From the point of display
resolution, the server’s CPU load strongly depends on the resolution and bit
rate, often given by the HW/SW configuration of involved end-point
devices. Figure 1 indicates that about one CPU per end-point device is
needed.
The impact on server’s RAM is illustrated in Fig. 2. As we can expect,
the requirements on the RAM are directly proportional to the increasing
number of communicating end-point devices, more or less no matter what is
the HW/SW configuration of these end-point devices. Whereas, the display
resolution has a negligible impact on the memory requirement.
252 R. Bestak and J. Hlavacek
Scenarios with one PC are special cases that illustrate the memory and
CPU consumption when no multiplexing is performed, i.e. the scenarios
represent the load needed for decoding and encoding of the video flow.
5 Conclusion
In this paper, we have discussed basic characteristic of the WebRTC
technology, and compare the technology with some other exiting real-time
videoconferenc- ing systems. Additionally, we have evaluated impact on the
multiplexing server’s CPU load and requirements on RAM for different
numbers of end-point devices running WebRTC sessions. In total, we have
tested 28 different configurations. The obtained measurements illustrate a
strong relation between the video reso- lution and bit rate of the involved
end-point devices and the server’s CPU load. The requirements on server’s
RAM are than directly proportional to the number of involved end-point
devices, no matter what is the HW/SW configurations and considered
display resolutions. Obtained results illustrate that the server has to be
dimensioned in such way that about one CPU has to be considered per one
end-point device.
The current scenarios only include PCs. In our next work, we plan to
take into account a more heterogonous environment and to consider as end-
points mobile devices as well.
Acknowledgments. This research work was supported by the Grant Agency of CES-
NET grant no. 542/2014.
References
1. Segec, P., Paluch, P., Papan, J., Kubina, M.: The integration of WebRTC and
SIP: way of enhancing real-time, interactive multimedia communication. In:
12th IEEE International Conference on Emerging eLearning Technologies and
Applications (ICETA), pp. 437–442 (2014)
2. Amirante, A., Castaldi, T., Miniero, L., Romano, S.P.: On the seamless
interaction between WebRTC browsers and SIP-based conferencing systems.
IEEE Commun. Mag. 51(4), 42–47 (2013)
3. Mandyam, G., Ehsan, N.: HTML5 connectivity methods and mobile power con-
sumption. Technical report, Qualcomm (2012)
4. Fund, F., Wang, C., Liu, Y., Korakis, T., Zink, M., Panwar, S: Performance of
dash and WebRTC video services for mobile users. In: 20th International Packet
Video Workshop (PV), p. 18. (2013)
5. Nurminen, J., Meyn, A., Jalonen, E., Raivio, Y., Marrero, R.: P2P media
streaming with HTML5 and WebRTC. In: IEEE Conference on Computer
Communications Workshops, pp. 63–64 (2013)
6. Singh, V., Lozano, A., Ott, J.: Performance analysis of receive-side real-time
con- gestion control for WebRTC. In: 20th International Packet Video Workshop
(PV),
p. 18 (2013)
7. Rhinow, F., Veloso, P., Puyelo, C., Barrett, S., Nuallain, E.: P2P live video
stream- ing in WebRTC. In: World Congress on Computer Applications and
Information Systems, p. 15 (2014)
8. Heikkinen, A., Koskela, T., Ylianttila, M.: Performance evaluation of distributed
data delivery on mobile devices using WebRTC. In: IEEE International Wireless
Communications and Mobile Computing Conference (2015)
A Videoconferencing System Based on WebRTC 255
Technology
9. Taheri, S., Beni, L.A., Veidenbaum, A.V., Nicolau, A., Cammarota, R., Qiu, J.,
Lu, Q., Haghighat, M.R.: WebRTCBench: a benchmark for performance
assessment of WebRTC implementations. In: 13th IEEE Symposium on
Embedded Systems For Real-time Multimedia (2015)
10. Carullo, G., Tambasco, M., Di Mauro, M., Longo, M.: A performance evaluation
of WebRTC over LTE. In: 12th Annual Conference on Wireless On-Demand
Network Systems and Services (2016)
11. Pa-lka, D., Zachara, M., W´ojcik, K.: Evolutionary scanner of web application
vul- nerabilities. In: Gaj, P., Kwiecien´, A., Stera, P. (eds.) CN 2016. CCIS,
vol. 608,
pp. 384–396. Springer, Cham (2016). doi:10.1007/978-3-319-39207-3 33
12. Pi´orkowski, A., Szemla, P.: Client-side processing environment based on com-
ponent platforms and web browsers. In: Kwiecien´, A., Gaj, P., Stera, P. (eds.)
CN 2013. CCIS, vol. 370, pp. 21–30. Springer, Heidelberg (2013). doi:10.1007/
978-3-642-38865-1 3
13. Amirante, A., Castaldi, T., Miniero, L., Romano, S.P.: Janus: a general purpose
WebRTC gateway. In: 14th Proceedings of the Conference on Principles,
Systems and Applications of IP Telecommunications (2014)
14. Kurento documentation, release 6.6.0 (2016). https://www.kurento.org/
15. Fernandez, L.L., Diaz, M.P., Mejias, R.B., Lpez, F.J., Santos, J.A.: Kurento: a
media server technology for convergent WWW/mobile real-time multimedia
com- munications supporting WebRTC. In: 14th IEEE International Symposium
on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–6
(2013)
Analytical Modelling of Multi-tier Cellular
Networks with Traffic Overflow
(✉)
Mariusz Gl-abowski
֒ , Adam Kaliszan, and Maciej Stasiak
1 Introduction
The very dynamic increase in the volume of data traffic in mobile
telecommu- nications networks (HSPA, LTE, CDMA2000 EV-DO,
TDSCDMA and Mobile WiMax) seems to be posing a real challenge for
mobile operators. The operators of these networks are compelled to
introduce mechanisms that would increase the effectiveness the usage of
network resources. One of such mechanisms is opti- mization of cell loads,
that can be obtained, among others, due to a concept of self-organising (self-
optimizing, self-configuring) networks (SON) [1]. The execu- tion of this
concept is possible, i.a., due to the well-known connection handover
mechanism that transfers calls from cells with high load to neighbouring
cells. Such mechanism is usually executed between cells operating within the
same technology only, e.g., GSM.
Over time, the increasing diversity of wireless cellular network
technologies led to the emergence of hierarchical (multi-tier) overlay wireless
systems, deploy- ing different technologies, e.g. 2G (GSM), 3G (UMTS), and
4G (LTE) in the same area. The availability of different network
technologies that co-exist in the same area allowed mobile network
operators to apply the well-known opti- mization technique, the so-called
traffic overflow. Applying the concept of traffic
Oc Springer International Publishing AG 2017
A Videoconferencing System Based on WebRTC 257
Technology
P. Gaj et al. (Eds.): CN 2017, CCIS 718, pp. 256–268, 2017.
DOI: 10.1007/978-3-319-59767-6 21
Analytical Modelling of Multi-tier Cellular Networks with Traffic 257
Overflow
overflow, the mobile operators usually overflow traffic that cannot be
serviced in a group of cells with lower range (e.g., picocells) to a group of
cells with higher range (macrocells) [2–5]. In this case, traffic directed to
macrocells (upper tier, treated as alternative resources) from picocells (lower
tier, treated as primary resources) is the overflow traffic with different
characteristics than the traffic that is directly offered to a network by its
users [2, 4]. As a consequence, the literature distinguishes between two
types of handover: horizontal – when han- dover of connections takes place
within the same technology – and vertical – when handover of connections
is executed between different technologies (for example, between 2G and
3G, or WiMAX and WiFi).
The traffic overflow mechanism is known in the literature for about 70
years. Its first applications were limited to the single-service (single-rate)
hierarchical telecommunications networks with alternate routing [6–15].
Subsequently, this effective optimization technique was applied to the multi-
service (multi-rate) networks in order to ensure required quality of service
parameters for various traffic classes [16–22], as well as to increase the
performance and capability of networked cloud data centers [23].
In all the models presented in literature the assumption was that each of
primary resources, to which calls are directly offered, can be considered as a
single resource with complete sharing policy and modelled using the so-
called full- availability group model [24, 25]. Such an assumption is justified
in the case of the systems without load balancing between neighbouring cells
of the same tier [17]. However, the modern load-balancing mechanisms (self-
optimization techniques) treat a group of neighbouring cells, covering a
given area, as a single subsystem, and execute horizontal connection
handover (within the same tier/technology) from cells with high load to
neighbouring cells of the group [26]. Consequently, the area covered by a
given group of cells can be treated – from the point of view of traffic
engineering – as a multi-service system in which the service of multi- rate
calls is performed with the use of “separated” (distributed) resources (cells)
that are component parts of a given network and – in consequence – should
be modelled using the so-called limited-availability group model [27, 28].
The present article considers for the first time a system in which both
primary resources and alternative resources of multi-service networks with
traffic overflow are composed of a number of separated (distributed)
component resources. The term “separation” means that a call will be
serviced only when at least one of the primary resources (one of a cell of
the group of cells at the lower tier, e.g., picocells) and at least one of the
alternative resources (one of a cell of the group of cells at the upper tier,
e.g., macrocells) have the appropriate amount of resources that is required
for the call to be serviced.
The paper is organized as follows. Section 2 presents a description of a
multi- service overflow system with distributed primary and alternative
resources. In Sect. 3, the model of the primary and alternative resources of
the multi-service overflow system is presented. Section 4 presents a
comparison of the results of the analytical calculations with the results of
the simulation experiments for some selected structures of systems with
distributed primary and alternative resources. Section 5 sums up the paper.
258 M. G-labowski
֒ et al.
A1,1
Am,1 A1,r Am,r
t1,1 ... tm,1 ... tm,r
t1,r
f1 f1 . . . f1 fr fr . . . f r
...
1 2 . . . v1 1 2 . . . vr
R1,1 Rm,1 R1,r Rm,r
2
σ21,1 σm,1 σ21,r 2
σm,r
t1,1 ... t1,r ...
tm,1 tm,r
f0 f0 f0 .. f0
.
1 2 3 .. v0
.
Fig. 1. Traffic overflow system with distributed primary and alternative resources
resource k (0 < k ≤ vr) has the capacity of fk BBUs. The total capacity
Vj of r primary resources are composed of vr component resources. Each
component the primary resources No. j, expressed in the so-called basic
bandwidth units –
BBUs [29], is then:
Vj = vjfj (1)
The given primary resources can admit a call of a given class for service
only when it can be entirely serviced by BBUs of one of the distributed
component resources. This means that ti,j BBUs that are necessary to
service a call of class i in resource j, cannot be “divided” between different
component resources and must be serviced exclusively by the BBUs that
belong to one, randomly selected
component resource. Each of the primary resources j (0 < j ≤ r) is
offered a set of m Erlang traffic streams. The intensity of class i (0 < i ≤
m), offered to resource j (0 < j ≤ r), is denoted as Ai,j (Fig. 1).
The traffic that cannot be serviced by the primary resources is not rejected
but it is offered to the alternative resources. The alternative resources are
com- posed of v0 components resources. Each component resource of the
alternative resources has the capacity f0. The total capacity V0 of the
alternative resources system:
V0 = v0f0 (2)
As in the case of the primary resources, the alternative resources system can
admit a call of a given class for service only when it can be entirely serviced
by BBUs of one of the distributed component resources.
The alternative resources are offered traffic streams that overflow from
the primary resources. The class i traffic stream offered to the alternative
resources,
traffic of class i (0 < i ≤ m) that overflows from resource j (0 < j ≤ r),
and the is characterised by two parameters: the average value Ri,j of the
intensity of
Analytical Modelling of Multi-tier Cellular Networks with Traffic 259
Overflow
variance
i,j of the intensity of traffic of class i that overflows from resource j
σ2 of
the primary resources system. The variance of overflow traffic is
characterized by values that exceed the average value of this traffic.
n[P ] Σm
= )[P (3)
A t ξ (n −
]
n i,j i,j i,j i,j n−ti,j
Vj i=1 t Vj
⌊ x
F (x, v, f ) ⌋ (−1)u x + v − u(f + 1) −
= Σf (5)
+1
v
1
u
u=0
v− 1
258 M. G-labowski
֒ et al.
Having the occupancy distribution (3), the blocking probability for
individual
multi-service traffic classes offered to the primary resources No. j [27] can be
determined:
Σ
[Ei,j ]Vj Vj
n ] Vj (6)
= n=0
{1 − ξi,j (n)}[P
260 M. G-labowski
֒ et al.
V∗ = V
i,j j Σm l,j l,j (8)
l=1,l/=i
— Y t
where Yl,j is the average value of traffic of class l serviced in the resource j, i.e.,
the average number of calls of class l serviced in the resource j. According to
the definition of traffic intensity, we have:
for individual call streams that overflow from the primary resource j to the
system of alternative resources, using the Riordan’s formula [7]:
2 Ai,j
σi,j = Ri,j ⎞
i,j
⎝V∗
, (10)
ti,j
i,j
+ 1 − Ai,j + +1−R ⎠
Ri,j
In Formula (10), the quotient i,j
V ∗ /ti,j normalizes the system to a single-service
case. The operation of this kind is necessary because Riordan Formulas (7) and
(10) determine the parameters of overflow traffic in single-service systems.
At this point we already have all the parameters that characterize traffic
streams offered to the system of alternative resources and we are in position
to determine their peakedness coefficients:
Analytical Modelling of Multi-tier Cellular Networks with Traffic 261
Overflow 1
Zi,j = σ2 /Ri,j (11)
i,j
260 M. G-labowski
֒ et al.
[E ]
ΣV0 /Z0 (13)
(n)}[P
= {1 −
i,j V0 /Z0 i,j n V /Z
n=0 ] 0 0
ξ
while the the transition probability ξi,j(n) is determined on the basis of Eq.
(5),
as follows:
F V0
Z0
− n, v0, ti,j − 1
4 Numerical Results
The proposed method of modelling the overflow systems with distributed
both primary and alternative resources is an approximate one. In order to
evaluate the accuracy of the proposed method, the results of the analytical
calculations were compared with the results of the simulation experiments
for a number of selected overflow system.
To evaluate the accuracy of the proposed model the results of the
analytical calculations were compared with the data provided by the
Analytical Modelling of Multi-tier Cellular Networks with Traffic 261
Overflow exper- iments. For this particular purpose, a dedicated simulator
simulation 3
of the considered networks at the call level was constructed [34]. The
approach to modelling of
262 M. G-labowski
֒ et al.
multiservice systems with traffic overflow at the call level adopted in this
article makes it possible to use it to determine traffic characteristics, e.g.
hierarchical wireless networks [31]. The results of the simulation are
presented in Figs. 2, 3, 4, 5 and 6 in the from of appropriately marked
points with 99-percent confidence interval calculated after the t-Student
distribution for the number of ten series.
• f1 = 20 BBUs, v1 = 3, V1 = 3 × 20 = 60 BBUs,
Analytical Modelling of Multi-tier Cellular Networks with Traffic 263
Overflow
=
120 BBUs.
5 Conclusion
The paper proposes a new analytical model of multi-service overflow
systems with distributed primary and alternative resources. The results of
analytical modelling have been compared with the simulation results. The
accuracy of the proposed method is comparable with the accuracy of the
classical models elabo- rated for modelling the overflow systems with fully
available primary resources. The model can be applied for analytical
modelling of multi-service multi-tier cellular network.
Analytical Modelling of Multi-tier Cellular Networks with Traffic 267
Overflow
References
1. Nagesh, C.B., Jayaramaiah, D.: A survey of self-organizing networks (son).
Int. J. Innov. Res. Comput. Commun. Eng. 3(4), 2916–2923 (2015).
http://www.rroij.com/abstract.php?abstract id=56994
2. Tripathi, N., Reed, J., VanLandinoham, H.: Handoff in cellular systems. IEEE
Pers. Commun. 5(6), 26–37 (1998)
3. Fernandes, S., Karmouch, A.: Vertical mobility management architectures in
wire- less networks: a comprehensive survey and future directions. IEEE
Commun. Surv. Tutorials 14(1), 45–63 (2012)
4. Lin, Y.-B., Chang, L.-F., Noerpel, A.: Modeling hierarchical microcell/macrocell
PCS architecture. In: 1995 IEEE International Conference on Communications,
ICC 1995, Seattle. Gateway to Globalization, vol. 1, pp. 405–409, June 1995
5. Li, S., Grace, D., Wei, J., Ma, D.: Guaranteed handover schemes for a
multilayer cellular system. In: 7th International Symposium on Wireless
Communication Sys- tems, pp. 300–304, September 2010
6. Bretschneider, G.: Die Berechnung von Leitungsgruppen f u¨ r berfließenden
Verkehr in Fernsprechw¨ahlanlagen. Nachrichtentechnische Zeitung (NTZ) (11),
533–540 (1956)
7. Wilkinson, R.: Theories of toll traffic engineering in the USA. Bell Syst. Techn. J.
40, 421–514 (1956)
8. Matsumoto, J., Watanabe, Y.: Theoretical method for the analysis of queueing
system with overflow traffic. Electron. Commun. Japan (Part I: Commun.)
64(6), 74–83 (1981). http://dx.doi.org/10.1002/ecja.4410640610
9. Rapp, Y.: Planning of junction network in a multi-exchange area. In:
Proceedings of 4th International Teletraffic Congress, London, p. 4 (1964)
10. Herzog, U.: Die exakte Berechnung des Streuwertes von u¨berlaufverkehr
hinter Koppelanordnungen beliebiger Stufenzahl mit vollkommener bzw.
unvollkommener Erreichbarkeit. A E U¨ 20(3) (1966)
11. Schehrer, R.: On the exact calculation of overflow systems. In: Proceedings of
6th International Teletraffic Congress, Munich, pp. 147/1–147/8, September
1970. https://itc-conference.org/
Resources/Persistent/21594392c496c4c0193b4864ec86
0502ebdec2bc/schehrer70.pdf
12. Bretschneider, G.: Extension of the equivalent random method to smooth
traffics. In: Proceedings of 7th International Teletraffic Congress, Stockholm
(1973)
13. Schehrer, R.: On the calculation of overflow systems with a finite number of
sources and full availiable groups. IEEE Trans. Commun. 26(1), 75–82 (1978)
14. Fredericks, A.: Congestion in blocking systems - a simple approximation
technique. Bell Syst. Techn. J. 59(6), 805–827 (1980).
http://onlinelibrary.wiley.com/doi/ 10.1002/j.1538-7305.1980.tb03034.x/abstract
15. Shortle, J.F.: An equivalent random method with hyper-exponential service. J.
Perform. Eval. 57(3), 409–422 (2004)
16. G-la֒bowski, M., Hanczewski, S., Stasiak, M.: Erlang’s ideal grading in diffserv
mod- elling. In: Proceedings of IEEE Africon 2011, pp. 1–6. IEEE, Livingstone,
Septem- ber 2011. http://dx.doi.org/10.1109/AFRCON.2011.6072139
17. G-labowski,
֒ M., Kubasik, K., Stasiak, M.: Modeling of systems with overflow
multi- rate traffic. Telecommun. Syst. 37(1–3), 85–96 (2008)
268 M. G-labowski
֒ et al.
18. G-la֒bowski, M., Kubasik, K., Stasiak, M.: Modelling of systems with overflow
multi- rate traffic and finite number of traffic sources. In: Proceedings of 6th
International Symposium on Communication Systems, Networks and Digital
Signal Process- ing 2008, Graz, pp. 196–199, July 2008.
http://dx.doi.org/10.1109/CSNDSP.2008.
4610800
19. Huang, Q., Ko, K.-T., Iversen, V.B.: Approximation of loss calculation for
hierar- chical networks with multiservice overflows. IEEE Trans. Commun. 56(3),
466–473 (2008)
20. G-labowski,
֒ M., Kaliszan, A., Stasiak, M.: Two-dimensional convolution algorithm
for modelling multiservice networks with overflow traffic. Math. Prob. Eng.
2013,
18 (2013). Article ID 852082. http://dx.doi.org/10.1155/2013/852082
21. G-la֒bowski, M., Kaliszan, A., Stasiak, M.: Modelling overflow systems with dis-
tributed secondary resources. Comput. Netw. 108, 171–183, (2016). http://www.
sciencedirect.com/science/article/pii/S1389128616302675
22. G-labowski,֒ M., Hanczewski, S., Stasiak, M.: Modelling of cellular networks
with traffic overflow. Math. Prob. Eng. 2015, 15 (2015). Article ID 286490.
http://dx.doi.org/10.1155/2015/286490
23. Ku¨hn, P., Mashaly, M.E.: Multi-server, finite capacity queuing system with mutual
overflow. In: Fiedler, M. (ed.) Proceedings of 2nd European Teletraffic Seminar,
pp. 1–6. Karlskrona, September 2013. paper S1 2
24. Kaufman, J.: Blocking in a shared resource environment. IEEE Trans. Commun.
29(10), 1474–1481 (1981)
25. Roberts, J.: A service system with heterogeneous user requirements –
application to multi-service telecommunications systems. In: Pujolle, G. (ed.)
Proceedings of Performance of Data Communications Systems and their
Applications, pp. 423–
431. North Holland, Amsterdam (1981)
26. G-labowski,
֒ M., Hanczewski, S., Stasiak, M.: Modelling load balancing
mechanisms in self-optimising 4G mobile networks with elastic and adaptive
traffic. IEICE Trans. Commun. E99-B(8), August 2016
27. Stasiak, M.: Blocking probability in a limited-availability group carrying mixture
of different multichannel traffic streams. Ann. T´el´ecommun. 48(1–2), 71–76 (1993)
28. G-labowski, ֒ M., Stasiak, M.: Multi-rate model of the group of separated
transmis- sion links of various capacities. In: Souza, J.N., Dini, P., Lorenz, P.
(eds.) ICT 2004. LNCS, vol. 3124, pp. 1101–1106. Springer, Heidelberg (2004).
doi:10.1007/
978-3-540-27824-5 143
29. Roberts, J., Mocci, V., Virtamo, I. (eds.): Broadband Network Teletraffic, Final
Report of Action COST 242. Commission of the European Communities.
Springer, Berlin (1996)
30. G-labowski,
֒ M., Kaliszan, A., Stasiak, M.: Modeling product-form state-dependent
systems with BPP traffic. Perform. Eval. 67, 174–197 (2010)
31. Stasiak, M., G-labowski,
֒ M., Wi´sniewski, A., Zwierzykowski, P.: Modeling and
Dimensioning of Mobile Networks. Wiley, Chichester (2011)
32. G-labowski, M., Hanczewski, S., Stasiak, M., Weissenberg, J.: Modeling Erlang’s
ideal grading with multi-rate BPP traffic. Math. Prob. Eng. 2012, 35 (2012).
Article ID 456910
33. Ershova, E., Ershov, V.: Digital Systems for Information Distribution. Radio and
Communications, Moscow (1983). in Russian
34. G-la֒bowski, M., Kaliszan, A.: Simulator of full-availability group with
bandwidth reservation and multi-rate Bernoulli-Poisson-Pascal traffic streams. In:
Proceedings of Eurocon 2007, Warszawa, pp. 2271–2277, September 2007.
http://dx.doi.org/ 10.1109/EURCON.2007.4400605
New Technologies
Multi-level Stateful Firewall Mechanism
for Software Defined Networks
1 Introduction
In computer networking, the emerging network architecture that decouples
the control plane from the data plane, logically centralizes the network
intelligence and state, and abstracts the underlying network infrastructure
from the applica- tions is known as Software Defined Network [1]. SDN is a
new framework, where the control plane of all devices in the network is
migrated from the forwarding plane and consolidated into a software-based
device called the controller. This controller is responsible for making and
forwarding decisions for the entire net- work, while the switches and routers
just perform basic packets forwarding. The controllers have full view of the
network and consider the totality of the network before making any
decision. Since SDN relies more on software and, because of
Oc Springer International Publishing AG 2017
P. Gaj et al. (Eds.): CN 2017, CCIS 718, pp. 271–286, 2017.
DOI: 10.1007/978-3-319-59767-6 22
272 F. Nife and Z. Kotulski
2 Background
To relate our proposal to other existing network solutions and to give the
back- ground of the suggested method along with its functionality and
components, we start from a brief description of the SDN architecture, the
OpenFlow protocol and firewalls.
2.2 OpenFlow
The most commonly used protocol for the Southbound interface of SDN is
the OpenFlow protocol [7]. It is standardized by the Open Networking
Foundation
274 F. Nife and Z. Kotulski
2.3 Firewall
Firewalls are fundamental security mechanisms for any network defense
systems. Firewall is usually placed between an authorized system and
external environ- ments to act as a gateway through which all inbound and
outbound network traffic must pass [9]. It is checkpoint that compares each
incoming packet with its policy rules to decide whether to allow or deny the
packet from pass through it. Each firewall have its policy rules database
which define how an firewall should handle incoming and outgoing network
traffic for some specific IP addresses and range of addresses, protocols,
applications, and packet content types based on the organization’s security
policies [10]. Firewalls can be software or hardware-based and can be
categorized according to deferent criteria such as their functional- ity or the
layer (ISO/OSI Reference Model and TCP/IP model) they operate: the
Network, Session, Transport or Application layer. The most common fire-
walls that work on the network and transport layers are Stateless Firewalls
and Stateful Firewalls.
3 Related Works
Several recent efforts in the field of SDN security have been presented in
many previous contexts, such as scanning attack prevention [13], DDoS
attack detec- tion [14], IDS [15], IPS [16], Stateless firewall and Stateful
firewall.
FortNox [17] is an extension to the open source NOX controller. The
security policy enforcement kernel implement a novel analysis algorithm to
prevent any of application attempts to insert flow rules that may change
flow rules enforced by security policy. FortNox is a real-time rule conflict
detection engine, where after detecting any conflict, it is either accept or
refuse the new rule based on rule-based authorization. FRESCO [18]
introduce security application frame- work consists of several reusable
modular libraries that can be connected together to build more sophisticated
security applications. FRESCO developers can easily connect the necessary
modules including its libraries and assigning values to its interfaces to
produce the required security functions, like firewalls, IDS, or scan
detections. FLOWGUARD [19], represents a comprehensive SDN framework
for facilitate accurate detection and flexible resolution of firewall policy
violations in dynamic OpenFlow networks. FLOWGUARD provide an
automatic and real- time violation resolution mechanism, when the network
states are updated or the configurations are dynamically changed, it detect
firewall policy violations by checks the flow path spaces and compare it
against the specified authorized space in the firewall.
Multi-level Stateful Firewall Mechanism for 277
SDN
FleXam [20, 21], proposes a sampling method that make the controller
able to access packet-level information that is necessary for different
security appli- cations. With FleXam, the controller can decide which part
of the packet (e.g. only headers or, maybe, only payload) and where they
should be sent. More- over, the packet can be sampled either stochastically
based on predetermined probability or deterministically based on pattern.
The authors of [22] propose a prototype in which the security rules are
specified in the flow table in both controller and switches. The switch acts
as simple packet-pusher based on its flow table and any unknown traffics
are sent to the controller for inspection. The prototype proposed in [23]
provides orchestration services for security pol- icy management, reactive
application that processing the state of the connection, the security are
expressed with OpenFlow rules and in the data plane and the generic
algorithm is introduced for processing the Finite State Machine (FSM) of
the TCP protocol. Proactive Security Mechanism has been introduced in
[24]. In that work, fuzzy based system was designed to evaluate the threat
level of identified threats. The authors of [25] introduce an SDN-based
mitigation system for ransomware threats. Their solution is based on
CryptWall findings and the two designed SDN1 and SDN2 mitigation
ransomware methods, which rely on utilizing a dynamic blacklist database
of up-to-date list of known proxy servers that used for the purpose of
ransomware. Both methods try to break the com- munication between the
victim and the infected C&C server, so no public key will retrieve and as a
result the encryption process will not happen.
278 F. Nife and Z. Kotulski
4 System Architecture
4.1 Overview
The diagram presented in Fig. 5 shows that the system’s architecture is
compat- ible with the SDN structure: it consists of three planes distributed
into the SDN planes. The highest plane involves the system functionality,
which is executed by different modules, responsible for maintaining the
tables in the other planes and providing the required security functions to
protect the SDN network. The second firewall plane consists of the set of
tables that are built in the control plane. These tables are used to improves
the overall performance by reducing the lookup process time needed to
handle a packet. The most down plane provides the flow state-aware using
tables placed in the OpenFlow-enabled switches and holds entries used to
keep track for each specific flow.
4.3 S PROTOCOLE
It is designated communication protocol between the controller and the
OpenFlow-enabled switch. The protocol S PROTOCOLE defines five mes-
sages. Three of them: S PROTOCOLE Add, S PROTOCOLE Remove
and S PROTOCOLE Clear are to enable state-based connection monitoring
and to help the ConState module to maintain the STable by adding,
remov- ing and clearing the STable entries of the data plane. The two other
mes- sages: S PROTOCOLE Normal and S PROTOCOLE Critical are to
help the Mode Selec restricting the controller behavior. S PROTOCOLE
with its mes- sages is used only by the ConState module and it is not
affected by other SDN Modules and applications. Table 2 shows the direction
of the messages flow along with descriptions of their functionality.
5 Analysis
We now estimate effectiveness of the presented solution, such performance
analy- sis calculated for memory consumption, processing times and
throughputs and vulnerabilities mitigations.
282 F. Nife and Z. Kotulski
existing approaches, we make use of a new table in the data plan side that
provides the state-awareness and decreases the switch controller
communica- tion overhead. Another advantage of our approach is
application of a multi-level structure of the firewall with the levels
associated with SDN planes, distributed sensing and modular structure.
Such an approach makes it possible easy exten- sions of the firewall
functions and integration with other security systems. For instance, our
firewall is compatible with the ISO/OSI Layer 2 firewall solution proposed
in [29], which consists of two basic elements: Ethernet frames filtering in
Layer 2 and a three-tier reputation system of critical data acquisition and
analysis for the firewall rules configuration. Such a distributed multi-tier
repu- tation system modulus could slightly improve threats identification
and enforce SDN protection.
6 Conclusion
In this paper we introduced a reactive stateful firewall approach for securing
SDN-based networks. Our under construction suggested solution does not
enforce any change to the current SDN paradigm in terms of its design and
behavior. Moreover, it attempts to enhance the security of the
programmable network and simplify security management. This proof-of-
concept solution tries to overcome the limitations of the OpenFlow
implementation that relies on a simple “match- action” paradigm. Such an
OpenFlow approach causes lacks of stateful process- ing function in the
SDN data plane, where it makes use of specified tables in the data plane
devices to keep track of TCP connection or pseudo-connection. The security
policy of SDN proposed in our approach is enforced by the firewall appli-
cation that is centralized on the top of the controller, while the data plane
device is considered as a distributed checkpoint. Thus, instead of one
firewall placed at the edge of the network’s boundary and providing a single
point of failure, we can have a plane-like firewall that creates additional
boundaries within the net- work and provides “defense-in-depth”, which is
considered as a good solution for networks with different levels of trust. The
behavior of our solution is reactive, which gives an advantage of keeping the
flow tables in the data plane small and which helps not to fill them with
unmatched rules. For the next enhancements, we strive to improve the
expected performance of the proposed prototype. We will focus on
implementing the application with proactive approach to improve the
system’s overall performance by avoiding redundant times caused by com-
munication between the switch and the controller for undefined packets.
Also we plan to deploy the prototype in a real network environment to
confirm its strength against active attackers. As a next step we will
integrate the system with a soft methods-based security tool (a multi-tier
trust and reputation sys- tem) what is a reasonable enhancement of a
firewall in widespread and untrusted networks.
Multi-level Stateful Firewall Mechanism for 285
SDN
References
1. Adrian, L., Kolasani, A., Ramamurthy, B.: Network innovation using openflow:
a survey. IEEE Commun. Surv. Tutorials 16, 493–512 (2013)
2. Azodolmolky, S.: Software Defined Networking with OpenFlow Get Hands-on
with the Platforms and Development Tools Used to Build OpenFlow Network
Applica- tions. Packt Publishing Ltd., Birmingham (2013)
3. Pujolle, G.: Software Networks Virtualization, SDN, 5G and Security. ISTE Ltd.
and Wiley, Great Britain, United States (2015)
4. Kreutz, D., Ramos, F.M.V., Verissimo, P.E., Rothenberg, C.E., Azodolmolky,
S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE
103, 14–76 (2015)
5. Underdahl, B., Kinghorn, G.: Software Defined Networking for Dummies. Wiley,
Hoboken (2015)
6. Jain, R., Paul, S.: Network virtualization and software defined networking for
cloud computing: a survey. IEEE Commun. Mag. 51, 24–31 (2013)
7. The Open Networking Foundation, OpenFlow Switch Specification (2014)
8. Astuto, B.N., Mendonca, M., Nguyen, X.N., Obraczka, K., Turletti, T.: A survey
of software-defined networking: past, present, and future of programmable
networks. IEEE Commun. Surv. Tutorials 16, 1617–1634 (2014)
9. Sharma, R.K., Kalita, H.K., Issac, B.: Different firewall techniques: a survey. In:
5th IEEE International Conference on Computing. Communications and
Networking Technologies (ICCCNT), Hefei, Anhui, China, pp. 1–6 (2014)
10. Scarfone, K., Hoffman, P.: Guidelines on Firewalls and Firewall Policy,
Gaithers- burg (2009)
11. Duan, Q., Al-Shaer, E.: Traffic-aware dynamic firewall policy management: tech-
niques and applications. IEEE Commun. Mag. 51, 73–79 (2013)
12. Trabelsi, Z.: Teaching stateless and stateful firewall packet filtering: a hands-on
approach. In: 16th Colloquium for Information Systems Security Education,
Lake Buena Vista, Florida, pp. 95–102 (2012)
13. Mehdi, S.A., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection
using software defined networking. In: Sommer, R., Balzarotti, D., Maier, G.
(eds.) RAID 2011. LNCS, vol. 6961, pp. 161–180. Springer, Heidelberg (2011).
doi:10.1007/
978-3-642-23644-0 9
14. Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection
using NOX/OpenFlow. In: 35th Annual IEEE Conference on Local Computer
Networks, LCN, Denver, Colorado, pp. 408–415 (2010)
15. Jeong, C., Ha, T., Narantuya, J., Lim, H., Kim, J.: Scalable network intrusion
detection on virtual SDN environment. In: 2014 IEEE 3rd International
Conference on Cloud Networking (CloudNet), Luxembourg, pp. 264–265 (2014)
16. Francois, J., Aib, I., Boutaba, R.: Firecol: a collaborative protection network for
the detection of flooding DDoS attacks. IEEE/ACM Trans. Networking (TON)
20, 1828–1841 (2012)
17. Porras, Ph., Shin, S., Yegneswaran, V., Fong, M., Tyson, M., Gu, G.: A security
enforcement kernel for openflow networks. In: HotSDN 2012 ACM Special
Interest Group on Data Communication SIGCOMM, pp. 121–126. ACM,
Helsinki (2012)
18. Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., Tyson, M.: FRESCO:
Modular composable security services for software-defined networks. In: NDSS
2013 Network and Distributed System Security Symposium, San Diego, CA, pp.
1–16 (2013)
286 F. Nife and Z. Kotulski
19. Hu, H., Han, W., Ahn, G.J., Zhao, Z.: FLOWGUARD: building robust firewalls
for software-defined networks. In: HotSDN 2014, pp. 97–102. ACM, Chicago
(2014)
20. Shirali-Shahreza, S., Ganjali, Y.: Flexam: flexible sampling extension for
monitor- ing and security applications in OpenFlow. In: HotSDN 2013, Hong
Kong, China,
pp. 167–168. ACM, New York (2013)
21. Shirali-Shahreza, S., Ganjali, Y.: Efficient implementation of security
applications in openflow controller with flexam. In: IEEE 21st Annual
Symposium on High- Performance Interconnects, San Jose, CA, USA, pp. 49–54
(2013)
22. Collings, J., Liu, J.: An openflow-based prototype of SDN-oriented stateful hard-
ware firewalls. In: IEEE 22nd International Conference on Network Protocols,
Raleigh, NC, USA, pp. 525–528 (2014)
23. Zerkane, S., Espes, D., Le Parc, P., Cuppens, F.: Software defined network-
ing reactive stateful firewall. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC
2016. IFIP AICT, vol. 471, pp. 119–132. Springer, Cham (2016). doi:10.1007/
978-3-319-33630-5 9
24. Lar, S., Liao, X., ur Rehman, A., Ma, Q.: Proactive security mechanism and design.
J. Inf. Secur. 2, 122–130 (2011)
25. Cabaj, K., Mazurczyk, W.: Using software-defined networking for ransomware
mit- igation: the case of cryptowall. IEEE Netw. Mag. Global Internetworking 30,
14–20 (2016)
26. Suh, M., Park, S.H., Lee, B., Yang, S.: Building firewall over the software-
defined network controller. In: The 16th IEEE International Conference on
Advanced Com- munications Technology, Daejeon, South Korea, pp. 744–748
(2014)
27. Pena, J.G., Yu, W.E.: Development of a distributed firewall using software
defined networking technology. In: 4th IEEE International Conference on
Information Sci- ence and Technology, Shenzhen, China, pp. 449–452 (2014)
28. Vasudevan, S.: Firewall a new approach to solve issues in software define net-
working. In: 6th International Conference on Emerging Trends in Engineering
and Technology, pp. 14–19 (2016)
29. Konorski, J., Pacyna, P., Kolaczek, G., Kotulski, Z., Cabaj, K., Szalachowski,
P.: A virtualization-level future internet defense-in-depth architecture. In:
Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T.
(eds.) SNDS 2012. CCIS, vol. 335, pp. 283–292. Springer, Heidelberg (2012).
doi:10.1007/
978-3-642-34135-9 29