Telecommunications Networks - Current Status and Future Trends
Telecommunications Networks - Current Status and Future Trends
NETWORKS –
CURRENT STATUS
AND FUTURE TRENDS
Edited by Jesús Hamilton Ortiz
Telecommunications Networks – Current Status and Future Trends
Edited by Jesús Hamilton Ortiz
Published by InTech
Janeza Trdine 9, 51000 Rijeka, Croatia
As for readers, this license allows users to download, copy and build upon published
chapters even for commercial purposes, as long as the author and publisher are properly
credited, which ensures maximum dissemination and a wider impact of our publications.
Notice
Statements and opinions expressed in the chapters are these of the individual contributors
and not necessarily those of the editors or publisher. No responsibility is accepted for the
accuracy of information contained in the published chapters. The publisher assumes no
responsibility for any damage or injury to persons or property arising out of the use of any
materials, instructions, methods or ideas contained in the book.
Preface IX
In general, all-IP network architecture only provides “Best Effort” services for large
volume of data flowing through the network. This massive amount of data and
applications in different areas increasingly demand better treatment of the
information. Many applications such as medicine, education, telecommunications,
natural disasters, stock exchange markets or real-time services, require a superior
treatment than the one offered by the “Best Effort” IP protocol.
The new requirements arising from this type of traffic and certain users' habits have
produced the necessity of different levels of services and a more scalable architecture,
with better support for mobility and increased data security. Large companies are
increasing the use of data content, which requires greater bandwidth. Video-
conferencing is a good example. There are also delay-sensitive applications like the
stock exchange market.
The relentless use of mobile terminals and the growth of traffic over
telecommunication networks, whether fixed or mobile, are a true global phenomenon
in the field of telecommunications. The increasing use of mobile devices in recent years
has been exponential. Nowadays, the number of mobile terminals exceeds that of
personal computers. At the same time, we see that mobile networks are a good
alternative to complement or replace existing gaps for Internet access in fixed
networks, especially in developing countries.
The growth in the use of Telecommunications networks has come mainly with the
third generation systems and voice traffic. With the current third generation and the
arrival of the 4G, the number of mobile users in the world will exceed the number of
landlines users. Audio and video streaming have had a significant increase, parallel to
the requirements of bandwidth and quality of service demanded by those
applications.
The increase in data traffic is due to the expansion of the Internet and all kinds of data
and information on different types of networks. The success of IP-based applications
such as web and broadband multimedia contents are a good example. These factors
create new opportunities in the evolution of the Telecommunications Networks. Users
demand communications services regardless whether the type of access is fixed or via
X Preface
radio, using mobile terminals. The services that users demand are not only traditional
data, but interactive multimedia applications and voice (IMS). To do so, a certain
quality of service (QoS) must be guaranteed.
The technology requires that the applications, algorithms, modelling and protocols
that have worked successfully in fixed networks can be used with the same level of
quality in mobile scenarios. The new-generation networks must support the IP
protocol. This book covers topics key to the development of telecommunications
networks researches that have been made by experts in different areas of
telecommunications, such as 3G/4G, QoS, Sensor Networks, IMS, Routing, Algorithms
and Modelling.
1. Introduction
In recent years, wireless telecommunications systems have been prevalently motivated
by the proliferation of a wide variety of wireless technologies, which use the air as a
propagation medium. Additionally, users have been greatly attracted for wireless-based
communications since they offer an improved user experience where information can be
exchanged while changing the point of connection to the network. This increasing interest
has led to the appearance of mobile devices such as smart phones, tablet PCs or netbooks
which, equipped with multiple interfaces, allow mobile users to access network services and
exchange information anywhere and at any time. To support this always-connected experience,
communications networks are moving towards an all-IP scheme where an IP-based network
core will act as connection point for a set of accessible networks based on different wireless
technologies. This future scenario, referred to as the Next Generation Networks (NGNs), enables
the convergence of different heterogeneous wireless access networks that combine all the
advantages offered by each wireless access technology per se.
In a typical NGN scenario users are expected to be potentially mobile. Equipped with
wireless-based multi-interface lightweight devices, users will go about their daily life (which
implies to perform movements and changes of location) while demanding access to network
services such as VoIP or video streaming. The concept of mobility demands session continuity
when the user is moving across different networks. In other words, active communications
need to be maintained without disruption (or limited breakdown) when the user changes its
connection point to the network during the so-called handoff.
This aspect is of vital importance in the context of NGNs to allow the user to roam seamlessly
between different networks without experiencing temporal interruption or significant delays
in active communications. Nevertheless, during the handoff, the connection to the network
may for various reasons be interrupted, which causes a packet loss that finally impacts on the
on-going communications.
Thus, to achieve mobility without interruptions and improve the quality of the service
perceived by the user, it is crucial to reduce the time required to complete the handoff. The
handoff process requires the execution of several tasks (N. Nasser et al. (2006)) that negatively
affect the handoff latency. In particular, the authentication and key distribution processes
have been proven to be one of the most critical components since they require considerable
time (A. Dutta et al. (2008); Badra et al. (2007); C. Politis et al. (2004); Marin-Lopez et al. (2010);
R. M. Lopez et al. (2007)). The implantation of these processes during the network access control
4
2 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
demanded by network operators is destined to ensure that only allowed users can access the
network resources in a secure manner. Thus, while necessary, these security services must be
carefully taken into account, since they may significantly affect the achievement of seamless
mobility in NGNs.
In this chapter we are going to revise the different approaches that have been proposed to
address this challenging issue in future NGNs. More precisely, we are going to carry out
this analysis in the context of the Extensible Authentication Protocol (EAP), a protocol which
is acquiring an important position for implementing the access control solution in future
NGNs. This interest is motivated by the important features offered by the protocol such as
flexibility and media independence. Nevertheless, the EAP authentication process has shown
certain inefficiency in mobile scenarios. In particular, a typical EAP authentication involves
a considerable signalling to be completed. The research community has addressed this
problem by defining the so-called fast re-authentication solutions aimed at reducing the latency
introduced by the EAP authentication. Throughout this chapter, we will revise the different
groups of fast re-authentication solutions according to the strategy followed to minimize the
authentication time.
The remaining of the chapter is organized as follows. Section 2 describes the different
technologies related to the network access authentication. Next, Section 3 outlines the
deficiencies of EAP in mobile environments, which have motivated the research community
the proposal of fast re-authentication solutions. The different fast re-authentication schemes
proposed so far are analyzed in Section 4. Finally, the chapter finalizes with Section 5 where
the most relevant conclusions are extracted.
• Authentication. This service provides a means of identifying a user that requires access to
some service (e.g., network access). During the authentication process, users provide a set
of credentials (e.g., password or certificates) in order to verify they are who they claim to
be. Only when the credentials are correctly verified by the AAA server, the user is granted
access to the service.
• Authorization. Authorization typically follows the authentication and entails the process
of determining whether the client is allowed to perform and request certain tasks or
operations. Authorization is the process of enforcing policies, determining what types
or qualities of activities, resources or services a user is permitted.
• Accounting. The third component in the AAA framework is accounting, which measures
the resources a user consumes during network access. This can include the amount of time
Access Control
Access Control Solutions
Solutions for for
Next Generation Next Generation Networks
Networks 53
a service is used or the amount of data a user has sent and/or received during a session.
Accounting is carried out by gathering session statistics and usage information, and it is
used for different purposes like billing.
The following sections provide a detailed description for the general AAA architecture and
the most relevant AAA protocols.
2.1.2.1 RADIUS
RADIUS is a client-server protocol where a NAS usually acts as RADIUS client. During
authentication procedures, the RADIUS client is responsible for passing user information in
the form of requests to the RADIUS server and waits for a response from the server. Depending
on the policy, the NAS may only need a successful authentication or further authorization
directives from the server to enable data traffic to the client. The RADIUS server, on the
other hand, is responsible for processing requests, authenticating the users and returning the
information necessary for user-specific configuration to deliver the service.
The typical RADIUS conversation consists of the following messages:
• Access-Request. This message is sent from the RADIUS client (NAS) to the server to request
authentication and authorization for a particular user.
• Access-Challenge. This message, sent from the RADIUS server to the client, is used by the
server to obtain more information from the NAS about the end user in order to make a
decision about the requested service.
• Access-Accept. This message is sent from the RADIUS server to the NAS to indicate a
successful completion of the request.
• Access-Reject. This message is sent by the server to indicate the rejection of a request.
• Shared secrets must be statically configured. No method for dynamic shared secret
establishment is defined in the RADIUS protocol.
• Shared secrets are determined according to the source IP address in the RADIUS packet.
This introduces management problems when the client’s IP address change.
• When using RADIUS proxies, the RADIUS client only shares a secret with the RADIUS
server in the first hop and not with the ultimate RADIUS server. In other words, the trust
Access Control
Access Control Solutions
Solutions for for
Next Generation Next Generation Networks
Networks 75
relationship between the RADIUS client and the final RADIUS server is transitive rather
than using a direct trust relationship. If a server in the chain is compromised, some security
problems arise.
• RADIUS does not provide high transport protection. For example, an observer can
examine the content of RADIUS messages and trace the content of a specific attribute.
To overcome these security weakness, it has been proposed the use of TLS (T. Dierks & C.
Allen (1999)) to provide a means to secure the RADIUS communication between client and
server on the transport layer (S. Winter et al. (2010)). Nevertheless, the main research and
standardization efforts have focused on the design of a new AAA protocol called Diameter.
2.1.2.2 Diameter
Diameter, proposed as an enhancement to RADIUS, is considered the next generation AAA
protocol. Diameter is characterized by its extensibility and adaptability since it is designed
to perform any kind of operation and supply new needs that may appear in future control
access technologies. Another cornerstone of Diameter is the consideration of multi-domain
scenarios where AAA infrastructures administered by different domains are interconnected to
provide an unified authentication, authorization and accounting framework. For this reason,
Diameter is widely used in 3G networks and its adoption is recommended in future AAA
infrastructures supporting access control in NGN.
The Diameter protocol defines an extensible architecture that allows to incorporate new
features through the design of the so-called Diameter applications, which rely on the basic
functionality provided by the base protocol. The Diameter base protocol (P. Calhoun & J.
Loughney (2003)), defines the Diameter minimum elements such as the basic set of messages,
attribute structure and some essential attribute types. Additionally, the basic specification
defines the inter-realm operations by defining the role of different types of Diameter entities.
Diameter applications are services, protocols and procedures that use the facilities provided
by the Diameter base protocol itself. Every Diameter application defines its own commands
and messages which, in turn, can define new attributes called Attribute Value Pair (AVP) or
re-use existing ones already defined by some other applications.
The Diameter base protocol does not define any use of the protocol and expects the definition
of specific applications using the Diameter functionality. For example, the use of Diameter
for providing authentication during network access is defined in the Diameter NAS Application
(P. Calhoun et al. (2005)). In turn, this specification is used by the Diameter EAP Application
(P. Eronen et al. (2005)) to specify the procedure to perform the network access authentication
by using the EAP protocol. Similarly, authorization and accounting procedures are expected
to be handled by specific applications.
Within a Diameter-based infrastructure, the protocol distinguishes different types of nodes
where each one plays a specific role:
3. Diameter Agent: is an entity that processes a request and forwards it to a Diameter server
or to another agent. Depending on the service provided, we can distinguish:
(a) Relay agents: which forward messages based on routing-related attributes and routing
tables.
(b) Proxy agents: which act as a relay agent that, additionally, may modify the routed
message based on some policy.
(c) Redirect agents: instead of routing messages, they inform the sender about the proper
way to route the message.
(d) Translation agents: which perform protocol translations between Diameter and other
AAA protocols such as RADIUS.
The different types of nodes exchange Diameter messages that carry information. Instead of
defining a message type, Diameter uses the concept of command to specify the type of function
a Diameter message intends to perform. Because the message exchange style of Diameter
is synchronous, each command consists of a request and its corresponding answer. Table 1
provides a brief summary of the main Diameter commands defined in the base protocol
specification.
Command Abbreviation Description
Capabilities-Exchange- Request /Answer CER/CEA Discovery of a peer’s identity and its
capabilities.
Disconnect-Peer-Request /Answer DPR/DPA Used to inform the intention of
shutting down the connection.
Re-Auth-Request /Answer RAR/RAA Sent to an access device (NAS) to
solicit user re-authentication.
Session-Termination-Request /Answer STR/STA To notify that the provision of a
service to a user has finalized.
Accounting-Request /Answer ACR/ACA To exchange accounting information
between Diameter client and server.
2.2.1 Components
The EAP protocol consists of request and response messages. Request messages are sent from
the authenticator to the peer. Conversely, response messages are sent from the peer to the
authenticator. The different messages exchanged during an EAP execution are processed by
several components that are conceptually organized in four layers:
• EAP Lower-Layer. This layer is responsible for transmitting and receiving EAP packets
between the peer and authenticator.
• EAP Layer. The EAP layer is responsible for receiving and transmitting EAP packets
through the transport layer. The EAP layer not only forwards packets between the EAP
transport and peer/authenticator layers, but also implements duplicate detection and
packet retransmission.
• EAP Peer / Authenticator Layer. EAP assumes that an EAP implementation will support
both the EAP peer and the authenticator functionalities. For this reason, based on the code
of the EAP packet, the EAP layer demultiplexes incoming EAP packets to the EAP peer
and authenticator layers.
• EAP Method Layer. An EAP method implements a specific authentication algorithm that
requires the transmission of EAP messages between peer and authenticator.
As depicted in Fig. 3, a typical EAP conversation 1 occurs in three different phases. Initially, in
the discovery phase (Phase 0), the peer discovers the EAP authenticator near to the peer’s
location with which it desires to start an authentication process. This phase, which is
supported by the specific EAP lower-layer protocol, can be performed either manually or
automatically.
The authentication phase (phase 1) starts when the peer decides to initiate an authentication
process with a specific authenticator. This phase consists of two steps. Firstly, the phase 1a
includes an EAP authentication exchange between the EAP peer, authenticator and server. To
start an EAP authentication, the EAP authenticator usually starts the process by requesting
the EAP peer’s identity through an EAP Request/Identity message. The trigger that signals the
EAP authenticator to start the EAP authentication is outside the scope of EAP. Examples of
these triggers are the EAPOL-Start message defined in IEEE 802.1X (IEEE 802.11 (2007)) or
simply an 802.11 association process. On the reception of the EAP Request/Identity, the EAP
peer answers with an EAP Response/Identity with its identity. With this information, the EAP
server will select the EAP method to be performed. The EAP method execution involves
several exchanges of EAP Request and EAP Response messages between the EAP server and
the EAP peer. A successful EAP authentication finishes with an EAP Success message.
Certain EAP methods (Dantu et al. (2007)) are able to generate key material. In particular,
according to the EAP Key Management Framework (EAP KMF) (B. Aboba et al. (2008)) two
keys are exported after a successful EAP authentication: the Master Session Key (MSK) and the
Extended Master Session Key (EMSK). The former is traditionally sent (using the AAA protocol)
to the authenticator (Phase 1b) to establish a security association with the EAP peer (Phase 2).
Instead, the latter must not be provided to any other entity outside the EAP server and peer.
Thus, both entities may use the EMSK for further key derivation. In particular, as we will
analyze in Section 4, some authentication schemes propose to employ the EMSK to derive
further key material for enabling a fast re-authentication process.
Access Control
Access Control Solutions
Solutions for for
Next Generation Next Generation Networks
Networks 119
Initially, as depicted in Fig. 4, the authenticator’s controlled port is in unauthorized state, that
is, the port is open. Only received authentication messages will be directed to the authenticator
PAE, which will forward them to the authentication server. This initial configuration allows
to unauthenticated supplicants to communicate with the authentication server in order to
perform an authentication process based on EAP. Once the user is successfully authenticated,
the PAE will close the controlled port, allowing the supplicant to access the network service
offered by the authenticator’s system.
server can be co-located with the EAP authenticator (standalone configuration) or within an
external authentication server (pass-through configuration), in which case an AAA protocol (e.g.,
RADIUS or Diameter) is used to transport EAP messages between the authenticator and the
server. Once the EAP authentication is successfully completed, the 32 more significant bytes
(MSB) from the exported MSK is used as PMK.
Following the establishment of the PMK, a 4-way handshake protocol is executed during the
IEEE 802.11 security association phase (5) to confirm the existence of the PMK and selected
cryptographic suites. The protocol generates a Pairwise Transient Key (PTK) for unicast traffic
and a Group Transient Key (GTK) for multicast traffic. Thus, as result of a successful 4-way
handshake, a secure communication channel between the STA and the AP is established for
protecting data traffic in the wireless link.
subscriber station (SS) and the base station (BS). The authentication can be performed by using
an EAP-based authentication scheme.
Figure 6 shows the authentication process. As observed, while the SS acts as EAP peer, the BS
implements the EAP authenticator functionality. Depending on the EAP configuration mode,
the EAP server can be placed in the BS (standalone mode) or in a AAA server (pass-through),
which is the case assumed in Fig. 6. As observed, while EAP messages exchanged between
SS and BS are transported within the PKMv2 EAP-Transfer message, an AAA protocol (e.g.,
RADIUS or Diameter) is used to convey EAP messages between the BS and the AAA server.
Once the EAP authentication is successfully completed, from the exported MSK a Pairwise
Master Key (PMK) is derived. In turn, from this PMK, an Authorization Key (AK) is generated
for the security association establishment. For this reason, the 802.16e specification requires
the use of EAP methods exporting key material. Finally, as previously mentioned, the
AK shared between SS and BS is employed by a security association protocol called 3-way
handshake (5), which verifies the possesion of the AK and generates a Traffic Encryption Key
(TEK) used to protect the traffic in the wireless link.
2.3.4 PANA
The Protocol for carrying Authentication for Network Access (PANA) (D. Forsberg et al. (2008))
is a network-layer transport for authentication information designed by the IETF PANA
Working Group (PANA WG). PANA is designed to carry EAP over UDP to support a variety
of authentication mechanisms for network access (thanks to EAP) as well as a variety of
underlying network access technologies (thanks to the use of UDP). As highlighted in Fig. 7,
PANA considers a network access control model integrated by the following entities:
Access Control
Access Control Solutions
Solutions for for
Next Generation Next Generation Networks
Networks 15
13
• The PANA Client (PaC) is the client implementation of PANA. This entity resides on the
subscriber’s node which is requesting network access. The PaC acts as EAP peer according
to the EAP model described earlier.
• The PANA Authentication Agent (PAA) is the server implementation of PANA. A PAA is in
charge of communicating with the PaCs for authenticating and authorizing them to access
the network service. The PAA acts as EAP authenticator.
• The Enforcement Point (EP) refers to the entity in the access network in charge of inspecting
data traffic of authenticated and authorized subscribers. Basically, the EP represents a
point of attachment (e.g., access point) to the network.
• The Authentication Server (AS) is in charge of verifying the credentials provided by a PaC
through a PAA. The AS functionality is typically implemented by an AAA server, which
also integrates the EAP server.
2
Note that the term full is used in comparison with reduced to denote that, in the execution of an EAP
method, there is no optimization to reduce the number of exchanges during the EAP authentication.
18
16 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
(D1) Low latency operation. The fast re-authentication mechanism must reduce the
authentication time executed during the network access control process compared with
a traditional full EAP authentication. Furthermore, the achievement of a reduced handoff
latency must not affect the security of the authentication process.
(D2) EAP lower-layer independence. Any keying hierarchy and protocol defined must be
independent of the lower-layer protocol used to transport EAP packets between the peer
and the authenticator. In other words, the fast re-authentication solution must be able
to operate over heterogeneous technologies, which is the expected scenario in NGNs.
Nevertheless, in certain circumstances, the fast re-authentication mechanism could require
some assistance from the lower layer protocol.
(D3) Compatibility with existing EAP methods. The adoption of a fast re-authentication solution
must not require modifications to existing EAP methods. In the same manner, additional
requirements must not be imposed on future EAP methods. Nevertheless, the fast
re-authentication solution can enforce the employment of EAP methods following the EAP
Key Management Framework (B. Aboba et al. (2008)).
(D4) AAA protocol compatibility and keying. Any modification to the EAP protocol itself
or the key distribution scheme defined by EAP, must be compatible with currently
deployed AAA protocols. Extensions to both RADIUS and Diameter to support these EAP
modifications are acceptable. However, the fast re-authentication solution must satisfy the
requirements for the key management in AAA environments (B. Aboba et al. (2008); R.
Housley & B. Aboba (2007)).
(D5) Compatibility with other optimizations. The fast re-authentication solution must be
compatible with other optimizations destined to reduce the handoff latency already
defined by other standards.
(D6) Backward compatibility. The system should be designed in such a manner that a user
not supporting fast re-authentication should still function in a network supporting fast
re-authentication. Similarly, a peer supporting fast re-authentication should still operate
in a network not supporting the fast re-authentication optimization.
(D7) Low deployment impact. In order to support the aforementioned design goals, a fast
re-authentication solution may require modifications in EAP peers, authenticators and
servers. Nevertheless, in order to favour the protocol deployment, the required changes
must be minimized (ideally, they should be avoided) in current standardized protocols and
technologies.
(D8) Support of different types of handoffs. The fast re-authentication mechanism must be
able to operate in any kind of handoff regardless of whether it implies a change
of technology (intra/inter-technology), network (intra/inter-network), administrative
domain (intra/inter-domain) or type of security required by the authenticator
(intra/inter-security).
(S1) Authentication. This requirement mandates that a management and key distribution
mechanism must be designed to allow all parties involved in the protocol execution to
authenticate every entity with which it is communicating. That is, it must be feasible to
Access Control
Access Control Solutions
Solutions for for
Next Generation Next Generation Networks
Networks 19
17
gain assurance that the identity of the another entity is as declared, thereby preventing
impersonation. To carry out the authentication process, it is necessary to define the
so-called security associations between the involved entities.
(S2) Authorization. During the network access control process, the user is not only
authenticated but also authorized to access the network service. The authorization
decision is taken by the AAA server and the result is communicated to the authenticator.
The fast re-authentication solution proposed must not hinder the authorization process
performed once the user is successfully authenticated.
(S3) Key context. This requirement establishes that any key must have a well-defined scope
and must be used in a specific context for an intended use (e.g., cipher data, sign, etc.).
During the time a key is valid, all the entities that are authorized to have access to the key
must share the same key context. In this sense, keys should be uniquely named so that
they can be identified and managed effectively. Additionally, it must be taken into account
that the existence of a hierarchical key structure imposes some additional restrictions. For
example, the lifetime of lower-level keys must not exceed the lifetime of higher-level keys.
(S4) Key freshness. A key is fresh (from the viewpoint of one party) if it can be guaranteed to
be recent and not an old key being reused for malicious actions by either an attacker or
unauthorized party (A. Menezes et al. (1996)). Mechanisms for refreshing keys must be
provided within the re-authentication solution.
(S5) Domino effect. In network security, the compromise of keys in a specific level must not
result in compromise of other keys at the same level or higher levels that were used to
derive the lower-level keys. Assuming that each authenticator is distributed a key to carry
out the fast re-authentication process, a key management solution respecting this property
will be resilient against the domino effect (R. Housley & B. Aboba (2007)) attack, so the
compromise of one authenticator must not reveal keys in another authenticators.
(S6) Transport aspects. The solution developed must be independent of any underlying
transport protocol. Depending on the physical architecture and the functionality of the
involved entities, there may be a need for multiple protocols to perform the transport
of keying material between entities involved in the fast re-authentication architecture.
As far as possible, protocols already designed and used should be used to address the
cryptographic material distribution. For example, while AAA protocols can be considered
for this purpose between the EAP authenticator and server, the EAP protocol can be used
between EAP peer and server.
to reduce the time devoted to network access control by transferring cryptographic material
(1) from an EAP authenticator (current) to a new one (target). When the user moves to the new
authenticator (2), it can use the transferred context (e.g., cryptographic keys and associated
lifetimes) to execute a security association protocol with the new authenticator (3) to protect
the wireless link. Thus, the user does not need to be authenticated and can directly start the
security association establishment process based on the transferred cryptographic material.
In order to perform a secure transference between both authenticators, it is assumed the
existence of a pre-established security association between them. Additionally, context
transfer solutions do not propagate the same cryptographic material (CM) from one
authenticator to another. Instead, the transferred cryptographic material is derived (CM’)
from that owned by the current authenticator where the user is connected. The process
employed to generate the derived cryptographic material is followed by both the peer and the
authenticator. While the authenticator transfers the derived material to the new authenticator,
the peer employs it to start the security protocol execution.
4.2 Pre-authentication
Pre-authentication solutions propose a scheme (see Fig. 10) where the mobile user performs a
full EAP authentication (1) with a candidate authenticator through the current associated one
before it performs the handoff. In this manner, when the handoff happens (2), given that the
MSK generated during the pre-authentication process will be already present in the candidate
authenticator, the peer only needs to establish a security association (3) with it to protect the
wireless link. As we see, pre-authentication decouples the authentication and network access
control operations from the handoff.
To solve this issue, some solutions (3GPP TS 33.102 V7.1.0 (2006), R. Marin et al. (2006),
F.Bernal-Hidalgo et al. (2011), V. Narayanan & L. Dondeti (2008)) have proposed the use of
a local server near the area of movement of the peer to speed up the re-authentication. The
basic idea is to allow the visited domain to play a more active role in network access control
by allowing the home AAA server to delegate the re-authentication task to the local AAA
server placed in the visited domain. As depicted in Fig. 12, the user firstly performs a full
EAP authentication (1) with the home AAA/EAP server using the long-term credentials that
the home domain provides to their subscribers. This initial EAP authentication, commonly
named bootstrapping phase, is performed the first time the user connects to the network. Next,
once the EAP authentication is successfully completed, the home AAA/EAP server sends (2)
some key material (KM) to the visited AAA/EAP server. This key material, which is used
as mid-term credential between the mobile and the visited AAA/EAP server, allows to locally
perform re-authentication (3, 4) when the peer moves to other authenticators located in the
visited domain, thus avoiding AAA signalling with the home AAA/EAP server.
Despite this kind of fast re-authentication solutions do not require to contact the home domain
to re-authenticate the user, they do not define any optimization for the re-authentication
process with the local server. For example, authors in (R. Marin et al. (2006)) propose the use
of an EAP method based on shared secret key like EAP-GPSK which requires two message
exchanges with the local authentication server. Another serious disadvantage is found in
the process followed to distribute the key that establishes a trust relationship between the
peer and the local server. Solutions like (F.Bernal-Hidalgo et al. (2011); R. Marin et al. (2006))
use a two-party model to carry out a key distribution process which involves three entities:
peer, local re-authentication server and home AAA/EAP server. Since the use of a two-party
model is known to be inappropriate (D. Harskin et al. (2007)) from a security standpoint, a
three-party approach is recommended.
24
22 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
replays with a final EAP-Finish/Re-auth and derives a rMSK (from the rRK), which is sent to
the authenticator to establish a security association with the peer.
On the one hand, in general, the main problem of this kind of proposals relies on their
high deployment cost. Since these solutions update the EAP protocol basic operation,
they require the modification of existing EAP implementations in order to support the
new re-authentication functionality. Consequently, user equipments, authenticators and
authentication servers need to be updated, thus complicating the adoption of the solution.
On the other hand, in particular, an important drawback of ERP is found on the security of
the re-authentication process. Similarly to solutions (F.Bernal-Hidalgo et al. (2011); R. Marin
et al. (2006)) previously analyzed in Section 4.4, ERP follows an inappropriate two-party key
distribution model to distribute the rMSK from the ER to the authenticator.
5. Conclusion
The provision of seamless mobility has created an interesting research field within NGNs in
order to find mechanisms which try to provide a continuous access to the network during the
handoff. In fact, this is a critical process, where the connection to the network is interrupted,
thus causing packet loss that may affect on-going communications. To solve this problem,
efforts are directed at reducing the time required to complete the different tasks performed
during the handoff. In particular, the network access control process has been demonstrated
to be one of the most important factors that negatively affects handoff latency. This process
is demanded by network operators in order to control that only legitimate users are able to
employ the operator’s resources.
This chapter has provided a general overview about the state-of-art of technologies and
protocols related to network access control in future NGNs. In particular, we have reviewed
the EAP/AAA framework as a promising architecture for network access authentication in
future heterogeneous networks. While AAA infrastructures provide an unified framework
to handle the authentication, authorization and accounting processes, the EAP protocol is
used to implement the authentication service in AAA scenarios. Apart from being easily
26
24 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
deployable within existing AAA infrastructures, EAP exhibits important features such as
flexibility to select an authentication mechanism and independence from the underlying
wireless technology.
Nevertheless, EAP presents some deficiencies when applied in mobile scenarios. In particular,
a typical EAP authentication introduces a prohibitive latency during the handoff which
provokes a connection disruption that may affect active communications. This problem
has been extensively studied by the research community, which has proposed different fast
re-authentication mechanisms.
Precisely, the second part of the chapter is devoted to revise and analyze the different schemes
that have tried to reduce the latency introduced by network access control during the handoff.
According to the strategy followed to reduce the authentication time, we can distinguish five
fast re-authentication schemes: context transfer, pre-authentication, key pre-distribution, use
of a local server and modifications to EAP. Throughout this chapter we have analyzed both
advantages and disadvantages of each approximation.
6. Acknowledgements
This work is partially supported by the Funding Program for Research Groups of
Excellence (04552/GERM/06) and the Spanish Ministry of Science and Education
(TIN2008-06441-C02-02).
7. References
3GPP TS 33.102 V7.1.0 (2006). 3rd Generation Partnership Project.
A. Dutta, D. Famolari, S. Das, Y. Ohba, V. Fajardo, K. Taniuchi, R. Lopez & H. Schulzrinne
(2008). Media-Independent Pre-Authentication Suppporting Secure Interdomain Handover
Optimization, IEEE Wireless Communications vol. 15(2): 55–64.
A. Menezes, P. van Oorschot & S. Vanstone (1996). Handbook of Applied Cryptography, CRC
Press.
A. Mishra, M. Shin, N. Petroni, C. Clancy & W. Arbaugh (2004). Proactive Key Distribution
Using Neighbor Graphs, IEEE Wireless Communication 11: 26–36.
B. Aboba, D. Simon & P. Eronen (2008). Extensible Authentication Protocol Key Management
Framework. RFC 5247.
B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson & H. Levkowetz (2004). Extensible Authentication
Protocol (EAP). RFC3748.
Badra, M., Urien, P. & Hajjeh, I. (2007). Flexible and fast security solution for wireless LAN,
Pervasive and Mobile Computing Journal 3: 1–14.
C. de Laat, G. Gross, L. Gommans, J. Vollbrecht & D. Spence (2000). Generic AAA Architecture.
IETF RFC 2903.
C. Politis, K. Chew, N. Akhtar, M. Georgiades, R. Tafazolli & T. Dagiuklas (2004). Hybrid
multilayer mobility management with AAA context transfer capabilities for all-IP networks,
IEEE Wireless Communications 11 pp. pp. 76–88.
C. Rigney, S. Willens, A. Rubens & W. Simpson (2000). Remote Authentication Dial In User
Service (RADIUS). IETF RFC 2865.
D. Forsberg, Y. Ohba, B. Patil, H. Tschofenig & A. Yegin (2008). Protocol for Carrying
Authentication for Network Access (PANA). IETF RFC 5191.
Access Control
Access Control Solutions
Solutions for for
Next Generation Next Generation Networks
Networks 27
25
D. Harskin, Y. Ohba, M. Nakhjiri & R. Marin (2007). Problem Statement and Requirements
on a 3-Party Key Distribution Protocol for Handover Keying. IETF Internet Draft,
draft-ohba-hokey-3party-keydist-ps-01.
D. Simon, B. Aboba & R. Hurst (2008). The EAP-TLS Authentication Protocol. IETF RFC 5216.
Dantu, R., Clothier, G. & Atri, A. (2007). EAP Methods for Wireless Networks, Computer
Standards Interfaces 29(3): 289–301.
EAP over MIH (2010). Option III: EAP to conduct service authentication and MIH packet
protection (21-10-0078-08-0sec-option-iii-eap-over-mih-service-authentication).
F.Bernal-Hidalgo, Marin-Lopez, R. & Gomez-Skarmeta, A. (2011). Key Distribution Mechanisms
For IEEE 802.21-Assisted Wireless Heterogeneous Networks, Mobile Networks and
Management, Vol. 68, Springer Berlin Heidelberg, pp. 123–134.
H. Kim, K. G. Shin & W. Dabbous (2005). Improving Cross-domain Authentication over Wireless
Local Area Networks, Proc. of 1st International Conference on Security and Privacy for
Emerging Areas in Communications Networks, SECURECOMM’05, IEEE Computer
Society, Athens, Greece, pp. 103–109.
IEEE 802.11 (2007). Telecommunications and Information Exchange between Systems – Local
and Metropolitan Area Network – Specific Requirements – Part 11: Wireless LAN
Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
IEEE 802.11i (2005). Std., Wireless LAN Medium Access Control (MAC) and Physical Layer
(PHY) Specifications: Specification for Enhanced Security.
IEEE 802.11 IAPP (2003). IEEE Trial-Use Recommended Practice for Multi-Vendor Access
Point Interoperability via an Inter-Access Point Protocol Across Distribution Systems
Supporting IEEE 802.11 Operation.
IEEE 802.11r (2005). , Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)
Specifications: Amendment 8: Fast BSS Transition.
IEEE 802.16e (2006). Air Interface for Fixed and Mobile Broandband Wireless Access System.
IEEE 802.1X (2004). Standards for Local and Metropolitan Area Networks: Port based
Network Access Control, IEEE Standards for Information Technology.
IEEE 802.21 (2008). Institute of Electrical and Electronics Engineers, Draft IEEE Standard for
Local and Metropolitan Area Networks: Media Independent Handover Services.
ITU-T Recommendation G.114 (1998). ITU-T General Characteristics of International
Telephone Connections and International Telephone Circuits: One-Way
Transmission Time, ITU-T Recommendation G.114.
J. Bournelle, M. Laurent-Maknavicius, H. Tschofenig, Y. El Mghazli, G. Giaretta, R. Lopez &
Y. Ohba (2006). Use of Context Transfer Protocol (CXTP) for PANA. IETF Internet Draft,
draft-ietf-pana-cxtp-01.
Marin-Lopez, R., Pereniguez, F., Bernal, F. & Gomez, A. (2010). Secure three-party key
distribution protocol for fast network access in EAP-based wireless networks, Computer
Networks 54: 2651 – 2673.
N. Nasser, A. Hasswa & H. Hassanein (2006). Handoffs in Fourth Generation Heterogenous
Networks, IEEE Communications Magazine vol. 44(10): pp. 96–103.
P. Calhoun, G. Zorn, D. Spence & D. Mitton (2005). Diameter Network Access Server Application.
IETF RFC 4005.
P. Calhoun & J. Loughney (2003). Diameter Base Protocol. IETF RFC 3588.
P. Eronen, T. Hiller & G. Zorn (2005). Diameter Extensible Authentication Protocol (EAP)
Application. IETF RFC 4072.
R. Dantu, G. Clothier & Anuj Atri (2007). EAP methods for wireless networks, Elsevier Computer
Standards & Interfaces vol. 29: pp. 289–301.
28
26 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
R. Housley & B. Aboba (2007). Guidance for Authentication, Authorization, and Accounting (AAA)
Key Management. IETF RFC 4962.
R. M. Lopez, A. Dutta, Y. Ohba, H. Schulzrinne & A. F. Gomez Skarmeta (2007). Network-Layer
Assisted Mechanism to Optimize Authentication Delay during Handoff in 802.11 Networks,
Proc. of the 5th Annual International Conference on Mobile and Ubiquitous Systems:
Computing, Networking and Services, ACM Mobiquitous 2007, ACM, Philadelphia, USA.
R. Marin, J. Bournelle, M. Maknavicius-Laurent, J.M. Combes & A. Gomez-Skarmeta
(2006). Improved EAP keying framework for a secure mobility access service, Proc. of
International Wireless Communications & Mobile Computing Conference 2006, IWCMC
2006, Vancouver, British Columbia, Canada, pp. 183–188.
S. Pack & Y. Choi (2002). Fast Inter-AP Handoff using Predictive-Authentication Scheme in a Public
Wireless LAN, Proc. of IEEE Networks 2002 (Joint ICN 2002 and ICWLHN 2002).
S. Winter, M. McCauley, S. Venaas & K. Wierenga (2010). TLS encryption for RADIUS. IETF
Internet-Draft.
T. Aura & M. Roe (2005). Reducing Reauthentication Delay in Wireless Networks, Proc. of 1st IEEE
Security and Privacy for Emerging Areas in Communication Networks, SECURECOMM
2005, IEEE, Athens, Greece, pp. 139–148.
T. Clancy, M. Nakhjiri, V. Narayanan & L. Dondeti (2008). Handover Key Management and
Re-authentication Problem Statement. IETF RFC 5169.
T. Dierks & C. Allen (1999). The TLS Protocol Version 1.0. IETF RFC 2246.
Taniuchi, K., Ohba, Y., Fajardo, V., Das, S., Yuu-Heng, M. T. C., Dutta, A., Baker, D., Yajnik, M.
& Famolari, D. (2009). IEEE 802.21: Media independent handover: Features, applicability,
and realization, IEEE Communications Magazine 47(1): 112 –120.
V. Narayanan & L. Dondeti (2008). EAP Extensions for EAP Re-authentication Protocol (ERP).
IETF RFC 5296.
Y. Ohba and A. Yegin (2010). Pre-Authentication Support for the Protocol for Carrying
Authentication for Network Access (PANA). IETF RFC 5873.
Y. Ohba, Q. Wu & G. Zorn (2010). Extensible Authentication Protocol (EAP) Early Authentication
Problem Statement. IETF RFC 5836.
Z. Cao, H. Deng, Y. Wang, Q. Wu & G. Zorn (2011). EAP Re-authentication Protocol
Extensions for Authenticated Anticipatory Keying (ERP/AAK). IETF Internet Draft,
raft-ietf-hokey-erp-aak-06.
2
1. Introduction
This chapter discusses the application of methodologies to plan and design IP Backbones
and 3G access networks for today's Internet world. The recent trend of the multi-frequency
band operations for mobile communication systems requires increasingly bandwidth
capacity in terms of core and access. The network planning task needs mathematical models
to forecast network capacity that match the service demands. As the nature of network
usage changed, to explain and forecast the network growth, new methods are needed. In
this chapter, we will discuss some strategies to optimize the bandwidth management of a
real service provider IP/MPLS backbone and later we will propose a method for traffic
engineering in a national IP backbone.
Currently, all telecommunications networks are using IP packets to transport several kind of
services. The industry has called this integration as IMS (IP Multimedia Subsystem) in 3G
technologies. One important challenge is how to implement this desirable integration with
the lack of well known mathematical models to perform capacity planning and forecast the
network needs in terms of growth and applications demands. In other way, the main
question is how to deliver the required level of service for all kind of applications using the
same structure but with different types of traffic and QoS (Quality of Service) requirements.
Due to the fact that many different services will use the same transport infrastructure, the
Quality of Service can also be described as a result of traffic characterization because the
traffic nature per service or at least per application shall be known. As demonstrated in
some research papers (Leland et al., 1994; Carvalho et al., 2009), the Erlang model is not able
to accurately describe the behavior of Ethernet and Internet traffic. Without the right model,
scientific prediction becomes very difficult and therefore, the planning and forecasting tasks
become almost impossible. The above research works verified that the Poisson traffic model
is not able to explain the IP traffic dynamics and this implies that the capacity planning tasks
for integrated services will need new methodologies. Some models have been used with
superior performance to achieve these goals, the self-similar or mono-
fractal model show acceptable results in several situations (Carvalho et al., 2007).
Several works show that the multifractal models are particularly promising for multimedia
networks (Riedi et al., 2000; Abry, 2002; Fonseca, 2005; Deus, 2007). The traffic
30 Telecommunications Networks – Current Status and Future Trends
engineering task is valuable to optimize the network resources such as links, routing and
processing capacity. One important issue in the traffic engineering task is that the
capacity planning forecasting may be for medium long periods (or more than one
year), due the fact is not easy to increase long distance link capacities in small periods of
time. This problem is much more valuable when the coverage area income is not
proportional to the area, as in countries like Brazil, China, Russia in which large areas not
necessarily economically attractive.
2. Network planning
The planning task is fundamental to optimize resource utilization. The Fig. 1 describes, from
an industry point of view, a complete feasible telecommunications planning cycle. The
inputs are the service demands, described as all type of products/services needs per region
and also per customer. The physical and logical inventory are very important to be accurate
in terms of transmission mediums such as fiber or radio, demographic dispersion, network
elements complete description, management assets, and other important physical and
logical information.
In terms of innovation, the approach is to use new technologies to achieve new degrees of
service delivery; this function shall be used as a complement for planning and forecasting
purposes. Other very important function is the economic variables to calculate the return
of the investments (ROI) and all other related costs (fixed and variable). All information
about traffic usage will be collected and sampled depending on the nature of the service
and will have a fast track for immediate operations and decision-making, normally every
5 minutes. For long-term planning these samples will be aggregate in hours, days and
weeks.
The functions in Figure 1, in terms of long term capacity will be used to achieve the capacity
to deliver new services allowing network expansion related to the inputs, generating new
routing and topology and other capacity needs, as described in Figure 1. The traffic
engineering function is used in real-time, under human supervision, sometimes even when
some modification in terms of routing is proposed by an algorithm. Sometimes, this could
not be feasible in practice because network stability is more important in operational
environments (Carvalho et al., 2009; Evans & Filsfils, 2007).
The peering agreements will be done as a function of the outputs and also observing the
commercial issues. In this way, many service providers have a peering committee to
approve new peering interconnections, which has not only a technical importance as well as
a marketing approach. The capacity outputs will generate purchasing activities; this will be
done by an engineering implementation function. The main objective is to have an
operational network, providing all kind of facilities and desirable services.
Along with the massive growth of the Internet and other applications, an increasing
demand for different kinds of services for packet switching networks is important.
Nowadays, these networks are expected to deliver audio and video transmissions with
quality as good as that of a circuit switching network. In order to make it possible, the
network must offer high quality services when it comes to bandwidth provisioning, delay,
jitter and packet loss.
IP and 3G Bandwidth Management Strategies Applied to Capacity Planning 31
Fig. 1. Telecommunications Industry Planning Process. Adapted from (De Deus, 2007; Evans
& Filsfils, 2007).
The processes of traffic characterization and modelling are very important points of a good
network project. A precise traffic modelling may allow the understanding of a physical
network problem as a mathematical problem whose solution may be simpler. For example,
the use of traffic theory suggests that mathematical models can explain, at least for some
confidence degrees, the relationship between traffic performance and network capacity (De
Deus, 2007; Fonseca, 2005).
The next sections will provide an example on a 3G network using traffic samples
to study the planning and project deployment phases. The network described in our study
runs with more than 1 million attached 3G costumers with national coverage. In this
network, we collected traffic in July 2009 in three different locations (Leblon, Barra da Tijuca
and Centro) in Rio de Janeiro. In this way, the first step was to classify the traffic per
application. The second step was to characterize the traffic using a procedure based on self-
similarity (Clegg, 2005) or multifractal analysis (Carvalho et al., 2009). These results were
used as basis for proposing a method to manage the traffic in the network.
To manage the traffic demands, we deployed a traffic engineering concept that divides the
traffic across the network through tunnels. The bandwidth was monitored and in the
observed period, we collected metrics that were used as inputs to decide how to configure
new parameters that may fit the incoming needs. An ILEC (incumbent local exchange
32 Telecommunications Networks – Current Status and Future Trends
carrier) service provider of IP traffic was used to collect real network traces and we
simulated a similar architecture of this network using the OPNET Modeler tool.
A 3G with a Metro Ethernet access was also analysed. The analysis considered a per
application separation of traffic. The statistical analysis was done using a self-similarity
approach, calculating the Hurst parameter using different calculation methodologies (Abry
et al., 2002). Some multifractal analysis was also done as a tool to better choose the time
scale.
The results show that the proposed method is able to generate better results in terms of an
on-line traffic engineering control and also to provide key information to long term capacity
planning cycles. The Traffic Engineering function is detailed using some network
simulations examples. Finally, some long term forecasting and short term traffic engineering
proposal was done in a 3G networks.
represent the inter-packet times. The Erlang model, broadly used in telephony systems has
been successfully used for capacity planning for many years and is based in the premise that
a Poisson distribution describes the traffic in this type of network.
The Poisson model was considered accurate in the early years of the packet switched
networks and was heavily used for capacity planning. In the early 90’s, the work of
Leland(Leland et al., 1994) proved that the behavior of the Ethernet traffic was considerably
different than Poisson traffics mainly regarding self-similar aspects with long-range
dependence, which is not well described by short memory processes. In practice, the packet
switched networks that were planned using the Poisson model, normally had an
overprovision in links capacity to comply with the lack of accuracy of the model.
Considering the different works about capacity planning following the work of Leland, the
heavy-tail models were considered more accurate to describe the traffic in packet switched
networks and consequently, they appeared as a better choice.
2.3 Self-similar
One kind of traffic that appears often in wideband networks is the burst traffic. It can be
generated by many applications such as compressed video services and file transfers. This
traffic is characterized by periods with activity (on periods) and periods without activity (off
periods). Moreover, as proved in (Perlingeiro & Ling, 2005), (Barreto, 2007), it is possible to
generate self-similar traffic by the aggregation of many sources of burst traffics that presents
a heavy-tailed distribution for the on period.
The self-similar model defines that a trace of traffic collected at a time scale has the same
statistical characteristics that an appropriately scaled version of the traffic to a different time
scale (Nichols et al., 1998). From the mathematical point of view, the self-similarity of a
stochastic process in continuous time is defined as shown in Equation 1, which defines a
process in continuous time X (t) as exactly self-similar.
d
X(t ) = a−H X( at ), a > 0 (1)
The sample functions of a process X(t) and its scaled version of the a–HX(at) obtained by
compressing the time axis by the factor amplitudes “a” , can not be distinguished
statistically. Therefore, the moments of order n of X(t) are equal to the moments of order n of
X (at), scaled by a-Hn. The Hurst parameter, H is then a key element to be identified in the
traffic. For self-similar traffic, the H is greater than 0.5 and less than 1. For a Poisson traffic
this value is close to 0.5. Experimental results show that this same parameter in operational
networks (Perlingeiro & Ling, 2005; Carvalho et. Al., 2007) has values between 0.5 and
0.95. Then, the parameter H may be a descriptor of the degree of dependence on long traffic
(Zhang et al.; 1997).
The aforementioned Hurst parameter plays a major role on the measurement of the self-
similarity degree. The closer it is of the unity, the greatest the self-similarity degree. One of
the most popular self-similar processes is the fractional Brownian motion (fBm), which is the
only self-similar Gaussian process with stationary increments. The increments process of the
fBm is the fractional Gaussian noise (fGn). To generate the traffic, we first create a fGn
34 Telecommunications Networks – Current Status and Future Trends
sequence based on the method presented in (Norros, 1995). Each sample of the sequence
represents the number of packets to be sent on a time interval of size T. The size of the time
interval and the mean of the sequence generated will depend on the traffic rate.
(2)
Each point x of the support of the measure will produce a different α ( x ) , and the
distribution of these exponents is what the singularity spectrum f ( α ) measures. The points
for which the Hölder exponents are equal to some value α form a set, which is in turn a
fractal object. The fractal dimension of this set can be calculated, and is a function of α ,
namely f ( α ).
As described in (2), a function ƒ(x) satisfies the Hölder condition in a neighborhood of a
point, where c and n are constants, as in (4).
3. Traffic characterization
The process of traffic characterization is a preponderant point of a feasible network project.
In this section a traffic characterization framework is described. The characterization intends
to describe a step by step procedure, which may be useful to understand the behavior of
traffic in large networks using a mathematical model as a tool to achieve good planning.
One difficult issue to characterize traffic in IP networks is the changing environment due to
new applications and new services that are appearing constantly. This implies that the
characterization used in real environments shall considerer the evolution and the amount of
variation in the types of services, including not well known agents as social behavior and
emerging applications.
The efficiency in traffic characterization is given by the model accuracy when compared
with real traffic measures. As said by (Takine et al., 2004) a traffic model can only exist if
there is a procedure for efficient and accurate inference for the parameters of the same
mathematical structure. The traffic characterization is the main information source for the
correct mathematical interpretation of network traffic. Once characterized, the traffic may be
reproduced in different scales and periods and inserted into network simulators.
Figure 2 shows a complete characterization flow to optimize planning. This procedure was
implemented in the GTAR (Barreto, 2007) simulator, developed within our research.
4. Experimental analysis
4.1 Analysis of an IP network
The first network to be evaluated is a Brazilian Service Provider in Brazil, with more than
ten million PSTN (Public Switched Telephone Network) subscribers and more than one
million ADSL as well. The IP network is shown Figure 3 each access layer is a PPPoX router
capable called BRAS(Broadband Router Access Server).
BANDWIDTH SUM
300
250
200 SERVICE
VoIP
Mbps / n
150 P2P
E-Mail
100 Browsing
50
0 (n = integer)
01 - 21:00:00
03 - 03:00:00
04 - 09:00:00
05 - 15:00:00
06 - 21:00:00
08 - 03:00:00
09 - 09:00:00
10 - 15:00:00
11 - 21:00:00
13 - 03:00:00
14 - 09:00:00
15 - 15:00:0
16 - 21:00:0
18 - 03:00:0
19 - 09:00:0
20 - 15:00:0
21 - 21:00:0
23 - 03:00:0
24 - 09:00:0
25 - 15:00:0
26 - 21:00:0
28 - 03:00:0
29 - 09:00:0
30 - 15:00:0
31 - 21:00:0
Day - Time
TIMESLOT
Fig. 4. Downstream traffic “on peak” and “off peak”. The rate is normalized, 31 days
sampled (De Deus, 2007).
Figure 4 and 5 shows the downstream traffic collection results for a 31 days period. The
most important source of traffic is the HTTP(Browsing) following by P2P applications(e-
Donkey, Bitorrent, Kazaa). In Figure 10, the same analysis is made for a 24 hours period.
BANDWIDTH SUM
300
250
200
SERVICE
VoIP
Mbps / n
150 P2P
E-Mail
Browsing
100
50
(n = integer)
0
01 - 21:00:00
01 - 23:00:00
02 - 01:00:00
02 - 03:00:00
02 - 05:00:00
02 - 07:00:00
02 - 09:00:00
02 - 11:00:00
02 - 13:00:00
02 - 15:00:00
02 - 17:00:00
02 - 19:00:00
02 - 21:00:00
Day - Time
TIMESLOT
Fig. 5. Downstream traffic “on peak” and “off peak”. Traffic rate is normalized, 24 hours
sampled (De Deus, 2007).
Figure 6 shows the packet size probability distribution. Less than 100 Bytes packets have
50% of probability. These samples are from a real network with Internet traffic of 4 million
xDSL subscribers, demonstrating the very large use of voice packets even when using http
flows. This happens mainly because of applications such as SKYPE.
38 Telecommunications Networks – Current Status and Future Trends
0,600
0,500
Probability
0,400
0,300
0,200
0,100
0,000
2
96
24
48
72
96
3
16
22
28
35
41
48
54
10
20
30
40
0-
Packet Size
Table 1 shows and per application anaylis of traffic in which the Hurst parameter was
calculated with two different methods (De Deus, 2007). For real time traffic, the Hurst
parameter calculation demands attention because in some cases if statistical process does
not have a representative long range dependence characteristic the parameter may be
wrongly interpreted. Another issue is the trend present in the periodic traffic. For a more
accurate estimation, the cycle regularity is removed to delete all observed trends.
Table 1. HTTP and P2P Hurst parameter estimation for 5 minutes average.
IP and 3G Bandwidth Management Strategies Applied to Capacity Planning 39
In Table 1 is shown the estimation of the H parameter for the HTTP (Hyper Text Transfer
Protocol) applications. As can be seen, the H relies value between 0.67 and 0.93, which also
shows a higher degree of self-similarity, considering that the lower value appears just in one
day. For the P2P applications, the H parameter relies between 0.86 and 0.96.
The estimation of the the Hurst parameter in Table 1 uses three different methods: the
Variance-Time Plot Method, the Kettani-Gubner Method (Clegg, 2005), (Barreto, 2007). Also
a Chi-squared analysis was made as a non-parametric test of significance (Perlingeiro, 2006),
(De Deus, 2007), (Clegg, 2005) due to the fact that it is necessary to verify the distribution
similarity. The statistical significance test allows, with a certain degree of confidence, the
acceptance or rejection of a hypothesis, as shown in Figure 7. The sampled links had a load,
in the worst case around 70%.
Figure 7 shows the Hölder calculation for the traffic. The conclusion in fact is that the traffic
is self-similar and monofractal, when the measurement is done in a 5 minutes per sample.
Fig. 7. P2P and http 5 minutes samples, Hölder exponent using the local Hölder Oscillation
Based method [fraclab].
be used as input to a traffic forecast tool based on valid models (Norros at al., 2000). The next
step is to insert the parameter to a tool that will take a decision of how the auto-
configuration will be done and a configuration of the element abstracting the vendor (e.g.
Juniper, Cisco, Huawei). In figure 7 the example of application of the feedback process is
described using the auto configuration tool to change the tunnel characteristics, that will use
the proposed framework in Figure 8, as an example of setting up an outstream traffic
marked as Diffserv.
If the traffic can be characterized as asymptotical self-similar or monofractal or multifractal
some ready prediction models based (e.g. fBm, MWM, MMW) can be used. The core idea is
that using only some parameters the mathematical calculus can be feasible at real time, as
shown in Figure 14.
In this case, the tunnels are configured using the self-similarity bandwidth estimators, as
described in (Carvalho, 2007). The traffic needs to be marked as the DiffServ and will be
injected per tunnel as the auto configuration tunnel selection.
There are several methods used to estimate bandwidth. The method used in our example is
the FEP(Fractal Envelope Process). This model has a good performance for long range
dependence with a high degree of confidence in the quasi-Real Time estimation (De Deus,
2007).
IP and 3G Bandwidth Management Strategies Applied to Capacity Planning 41
Fig. 9. Tunnel selection between two routers using Diffserv and Inteserv to select the specific
tunnel.
The bandwidth estimation most accepted definition, currently known, use a concept
introduced by (Kelly et al.,1996), where there is a direct dependency on buffer size and time
scales related to the buffer overflow possibility. The concept is shown in (6) where X[0, t] is
the amount of bits that arrive in an interval [0, t], considering that X[0, t] has stationary
increments. The letter b is the buffer size and t time or scale, BP is the capacity in bits per
second.
[ , ]
log (6)
, = 0< , <∞
Based on this theory, several bandwidth estimators have been proposed and evaluated for
its effectiveness and complexity of evaluation. In (Fonseca et al., 2005) an evaluation of the
FEP estimator model (Fractal Envelope Process) was developed with good results, for use in
high speed networks.
Equation (7) represents the FEP process estimation where the K is the buffer, a is the
average, H is the Hurst parameter, is the standart devitation and Ploss represents the
probability of packet loss when a buffer overflow. This is only valid when 0.5 < H < 1.
( )
H −1 1 1− H
EN = a + K H
* − 2 * ln( Ploss ) * σ H * H (1 − H )H (7)
Using (7) and correcting with (8) and (9), some curves are plotted in different time scales in
Figure 10 (FEP Estimator and FEP Model). The best results are with 5 and 1 minutes,
achieving the most next to average but still providing a good service with no delay, jitter or
packet loss. The “Modelo FEP” fop means the dynamic calculation per hour, the “Tunel P2P
constante“ and “Tunel HTTP constant”means the estimation with a Poisson Distribution
Estimator, the P2P and HTTP means the dynamic bandwidth calculation.
2
= 0.5 < ≤ 0.7 (8)
5√ ′
42 Telecommunications Networks – Current Status and Future Trends
2
= 0.7 < <1 (9)
75 √ ′
The fop is calculated based on (Perlingeiro & Ling, 2005) study as shown in (8) and (9), where
EN is from (7) and b’ is the normalized buffer (b’=b/b0), where b is the buffer and b0
minimum possible buffer size, L is the burst factor.
FEP Model
Ploss=1%
350
300 EN HTTP
R a te (M b p s )
250 EN P2P
100
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
:0 0
00
02
04
06
08
10
12
14
16
18
20
22
00
Time (h)
FEP Estimator
Average a = 108Mbps
-7
σ = 52,34 and Ploss =10
1000
900
EN=Bandwidth (Mbps)
800
b=5min
700 b=1min
600 b=5s
500 b=1s
400 b=0,5s
300 b=0,05s
200
100
0,5
0,54
0,58
0,62
0,66
0,7
0,74
0,78
0,82
0,86
0,9
0,94
0,98
The FEP Model shown in Figure 10 uses a dynamic tunnel configurator as shown in Figure
9, denoting a better usage of the total available bandwidth. In the figures it appears that
when a constant calculated bandwidth is used, more bandwidth is required. In the same
way, the FEP Estimator shows that as much aggregated the traffic will be in any time scale,
IP and 3G Bandwidth Management Strategies Applied to Capacity Planning 43
the difference will be minimum. In the other hand, when going to small time scales .05, .5 or
1 seconds, there is a trend in super estimation, proportional to the diminishing of the Hurst
parameter.
As shown in many works (Leland et al., 1994), (Abry et al., 2002), (Carvalho et al., 2009), the
Hurst parameter can show an accurate and single way to determinate the self-similarity. The
Erlang model is very useful because its simplicity. A traffic engineer only needs to have
some little information about service demand such as Retention time, blocking Probability,
Number of Calls in the maximum usage hour to have the traffic and number of channels or
resource needed.
The curves in Figure 10 show the possibility to have something, not so easy as Erlang model,
but also possible to be achieved as a traffic model when a self-similar characterization is
feasible. Also, the multi fractal model can also help to understand this same traffic in smaller
scales, or in some case depending the traffic nature.
Monitor Monitor
1 2
Physical
RNC
IuB Metro Tellabs IuB
Physical Ethernet Ethernet 8600 ATM
Node B
The main objective in this section is to investigate planning and project deployment phases
based on traffic characterization. The first step is to classify the traffic per application. The
second is to characterize the traffic using a procedure based on self-similarity (Clegg, 2005)
or multifractal analysis (Carvalho et al, 2009).
Figure 12 shows the network topology for the Ethernet physical node B (ATM node) with an
ATM-IP router which is responsible to convert ATM to Ethernet(IP). The same situation is
found in RNC side where a Tellabs ATM-IP router aggregates all node B physical uplinks,
44 Telecommunications Networks – Current Status and Future Trends
every one carried through a Metro Ethernet network, with more than 50km radius Rio de
Janeiro metropolitan area coverage.
The first performance analysis of this network found some drawbacks in terms of latency
and packet loss and jitter. In Figure 13 (before) is shown the first measures. One detected
problem was the high level of broadcasting (ARP included) for this metro Ethernet network,
in some periods, more than 80% of all IP traffic.
As shown in Figure 12, the transport from Node-B to the RNC is performed by a
MetroEthernet network that uses also a BFD protocol to track the availability of a
Multiprotocol Label Switching (MPLS) Label Switched Path (LSP). In particular, BFD
(Aggarwal et al., 2010) can be used to detect a data plane failure in the forwarding path of an
MPLS LSP.
LSP Ping is an existing mechanism for detecting MPLS LSP data plane failures and for
verifying the MPLS LSP data plane against the control plane, making possible the
PseudoWire connections through a MPLS environment.
The problem, in this case, was an architectural design mistake because all Node B uplinks
were configured in Level 2 VLANs (OSI Model), with more then 250+ 3G nodes B in the
IP and 3G Bandwidth Management Strategies Applied to Capacity Planning 45
same IP subnet. The solution for this architectural problem was divide the Node Bs in 20 per
subnet, as shown in Figure 8 (after).
This division resulted in diminishing the broadcasting to less than 5%. This problem is very
simple in a typical Ethernet topology, but not so easy to be detected when inserted in a 3G
network. Ethernet is a protocol designed for local area purposes; the MEF (Metro Ethernet
Forum) inserted some signalling standards as a way to simplify the application in metro and
long-range use.
Figure 14 shows the traffic trace collected in the 3G network and Figure 15 and Figure 16
show the singularity spectrum and the Hölder function for the 3G samples, showing the
possibility to use the multifractal model also to forecast purposes.
This information is important do show this traffic can be characterized as multifractal in
small scales of time, but in other hands the bandwidth model for this type of traffic model
is also hard to build, because the nature of the traffic. Other important thing to
understand is how to insert modifications with make the system not stable. In small
scales, huge systems will need a lot of information to compute the bandwidth between to
distance nodes.
The use of one model type can be very carefully choose because this could make the
Operations Staff make wrong decisions that could result in many downtime.
Fig. 15. 3G Traffic multifractal analysis – Singularity Spectrum (milliseconds time scale).
Fig. 16. 3G Traffic multifractal analysis – Hölder function. (milliseconds time scale).
5. Conclusion
This chapter presented an approach and a set of frameworks to characterize traffic and
optimize network planning in IP and 3G networks. Based on real traffic measurements, we
IP and 3G Bandwidth Management Strategies Applied to Capacity Planning 47
characterized the traffic and showed examples of how to apply the proposed frameworks.
An special interest of our work has a focus in real operating networks and the examples
show the application of the proposed frameworks in these environments.
The traffic characterization procedures for mutilmedia traffic were explained. We provided
analyses by collecting different types of traffic and measuring its self-similar or multifractal
degrees. All of this work was done with some self-developed (Carvalho et al., 2006) tools
and also with some other tools (FRACLAB, 2011; OPNET, 2011).
The traffic models give us a good idea of the traffic behavior. In fact, the models can be
valuable tools to the conception, management and sizing of a telecom network, resulting on
efficient use of its resources. The operator can plan the growth of the network just to fit the
business model, guaranteeing at different moments the efficient use of network resources,
guaranteeing, on the other hand, the users satisfaction. In this context, the traffic models can
also be used to define alternative policies that, for example, promote the network adaptation
in periods with different levels of congestion.
Some very important to considering is how to improve the planning function with a better
forecasting (Zukerman et al., 2003)., in terms of long time period for new assets plan and
also to implement new products.
Something also very important is how to manage the network resources to have the best
optimization possible, this will provide costumer better experience when using and buying
exactly their needs.
6. References
Abry P., Baraniuk R.; Flandrin P.,Ried; R., Veitch D. (2002). The Multiscale Nature of
Network Traffic Discovery, Analysis and Modeling. IEEE Signal Processing
Magazine, 19(3):28-46.
Aggarwal, R; Kompella, K.; Nadeau, T.; Swallow, G. (2010). Bidirectional Forwarding
Detection (BFD) for MPLS Label Switched Paths (LSPs). RFC 5884. ISSN: 2070-1721,
June 2004. IETF Documents.
Avallone, S.; Pescapè, A.; Romano, S.P., Esposito, M.; Ventre, G. (2002). “Mtools: a one-way-
delay and round-trip-time meter” 6th WSEAS International Conference, Crete, July
2002.
Barreto, P. S. (2007). Otimização de Roteamento Adaptativo em Redes Convergentes com
tráfego autosimilar. Orientador:Carvalho, P. H. P. Tese de Doutorado, UnB.
Carvalho, P. H. P.; Barreto, P. S.; De Deus, M.; Queiroz, B.; Carneiro, B. (2007). A per
Application Traffic Analysis in a Real IP/MPLS Service Provider Network. The 2nd
IEEE IFIP/ International Workshop on Bradband Convergence
Networks(IM2007/BCN2007), IEEE Communications Society , Munich, Germany,
21 a 25 de maio de 2007 ISBN: 1-4244-1297-8. Digital Object Identifier:
10.1109/BCN.2007.372751.
Carvalho, P.H.P.; Barreto, P. S.; Queiroz, B.; Carneiro, B.N. (2006). Modelagem, Geração e
Análise de Tráfego em Redes Multiserviços, GTAR, LEMOM, UnB.
48 Telecommunications Networks – Current Status and Future Trends
Carvalho, P.H.P.; Deus, M. A.; Barreto, P. S. (2009). Effective Bandwidth Allocation for
IP/MPLS networks with Multimedia Traffic. In Portuguese : Alocação de Banda
Efetiva para Tráfego Multimídia em Redes IP/MPLS. In: I2TS 2009, 2009,
FLORIANOPOLIS. 8th International Information and Telecommunication
Technologies Symposium, 2009, 2009.
Carvalho, P.H.P.; De Deus, M. A.; Barreto, P. S.; Fraga, T. ; Paiva, V. (2008). Identificação de
Características Multifractais para Tráfego de Redes. In: XXVI Simpósio Brasileiro
de Telecomunicações (SBrT'08), 2008, Rio de Janeiro, RJ. Anais do XXVI Simpósio
Brasileiro de Telecomunicações, 2008.
Castro e Silva, J.L. (2004) “ProCon - Prognóstico de Congestionamento de Redes de
Computadores usando Wavelets”, Tese de Doutorado, Universidade Federal de
Pernambuco, 2004.
Clegg, Richard (2005). A Practical Guide to Measuring the Hurst Parameter, Proceedings of
21st UK Performance Engineering Workshop, School of Computing Science.
D-ITG software (Sep 20, 2011) [Online]. Available:
http://www.grid.unina.it/software/ITG/index.php
De Deus, M.A (2007). IP/MPLS Bandwidth Management Strategies for Transport of
Integrated Services. Estratégias de Gerenciamento de Banda IP/MPLS para os
transporte de Serviços Integrados. Orientador : Carvalho, P.H.P ; Co-orientador :
Barreto, P. S.; [Distrito Federal] 2007. xvii, 127p., 210 x 297 mm, ENE/FT/UnB,
Mestre, Engenharia Elétrica, Comunicação(2007). Dissertação de Mestrado –
Universidade de Brasília. Faculdade de Tecnologia.
Evans, J.; Filsfils, C. (2007). Deploying IP and MPLS QoS for Multiservice Networks. Morgan
Kaufmann, ISBN-13: 978-0-12-370549-5.
Fonseca, N. L. S.; Drummond, A. C.; Devetsikiotis, M. (2005). Uma Avaliação de
Estimadores de Banda Passante Baseados em Medições. Instituto de Computação–
Universidade Estadual de Campinas. Department of Electrical and Computer
Engineering – North Carolina State University Raleigh, USA
Fraclab (2011), A fractal analysis toolbox for signal and image processing. Available from
http://fraclab.saclay.inria.fr/
Gilbert, A. e Seuret, S. (2000). Pointwise Hölder exponent estimation in data network traffic,
In ITC Specialist Seminar, 2000.
Huang, J. (2000) “Generalizing 4IPP Traffic Model for IEEE 802.16.3”, IEEE 802.16.3c-00/58,
Meeting #11, Ottawa, Dec. 2000.
Incite (2011) Available: http://www.ece.rice.edu/INCITE/modeling_synopsis.html
Karagiannis, T; Faloutsos, M.; Riedi, R.H. (2002) "Long-Range Dependence: Now You See It,
Now You Don't!" Proc. IEEE Global Telecommunications Conf. Global Internet
Symposium, 2002.
Kelly, F.P.; Zachary, S.; Ziedins, I.; editors (1996). Notes on Effective Bandwidth, pages 141–
168. Oxford University Press.
Kettani, H.; Gubner, J.A. (2002). “A Novel Approach the Estimation of the Hurst Parameter
in Self-similar Traffic”, Proceedings of IEEE Conference on Local Computer
Networks, Tampa, Florida, November 2002.
IP and 3G Bandwidth Management Strategies Applied to Capacity Planning 49
Law, A.M; Kelton, W. D. (1991). “Simulation Modeling and Analysis”, 2nd ed. New York:
McGraw-Hill, 1991.
Leland, W. E; Taqq, M. S.; Willinger, W.; Wilson, D.V. (1994). On Self-similar nature of
Ethernet traffic. ACM Sigcomm. Computer Communication.
Ledesma, S.; Liu, D. (2000). “A Fast Method for Generating Self-Similar Network Traffic”,
Proceedings of the 2000 International Conference on Communication Technologies,
Beijing, China, p.54-61, Aug. 2000.
Ludlam, J. (2004). Localisation of the Vibrations of Amorphous Materials. PhD, Thesis
Dissertation. Trinity College, Cambridge, UK, 2004. Online at:
http://jon.recoil.org/thesis/thesisse11.xml
Melo, E. T. L. (2001). “Qualidade de Serviço em Redes IP com DiffServ: Avaliação através de
Medições”, 2001.
MGEN software (Sep 20, 2011) [Online]. Available: http://mgen.pf.itd.nrl.navy.mil/
Netspec software (Aug 28, 2011) [Online]. Available: http://www.ittc.ku.edu/netspec/
Netperf software (Jun 7, 2011) [Online]. Available:
http://www.netperf.org/netperf/NetperfPage.html
Norros, Ilkka. (1995). On the use of factional Brownian motion in the theory of
connectionless networks. IEEE Journal of Selected Areas in Communications,
13(6):953-962.
Opnet (2011), http://www.opnet.com.
Paxson, V. (2000) “Fast, approximate synthesis of fractional Gaussian noise for generating
self-similar network traffic”, Computer Communication Review, vol.27, p.5-18.
Perlingeiro, F. R.; Ling, L. L.. (2005). Estudo de Estimação de Banda Efetiva para Tráfego
auto-similar com variância infinita, SBrT’05, 04-08 de setembro de 2005, Campinas,
SP
Riedi, R. H. ; Ribeiro, V. J. ; Crouse, M. S. and Baraniu, R. G. (2000). Network Traffic
Modeling Using a Multifractal Wavelet Model. Proceedings European Congress
of Mathematics, Barcelona 2000. Department of Electrical and Computer
Engineering, Rice University, 6100 South Main Street Houston, TX 77005, USA
(NSF/DARPA).
Takine, T.; Okazaki, K.; Masuyama, H. (2004). IP Traffic Modeling: Most Relevant Time-
Scale and Local Poisson Property. Department of Applied Mathematics and Physics
Kyoto University. (ICKS’04) Informatics Research for Development of Knowledge
Society Infrastructure
Taqqu, M. S.; Willnger, M.S.W.; Sherman, B. (1997). “Proof of a fundamental result in self-
similar traffic modeling”. Computer Communication Review, vol. 27, p. 5-23, 1997.
TG software (Aug 8, 2011) [Online]. Available: http://www.postel.org/tg/
Vieira, F.H.; Jorge, C.; e Ling, L. (2005) Predição Adaptativa do Expoente de Hölder para
Tráfego Multifractal de Redes, In XXVIII Congresso Nacional de Matemática
Aplicada e Computacional, 2005.
Vieira, Flavio H. T. V. (2006). Contribuições ao cálculo de banda e probabilidade de perda
para tráfego multifractal. Tese de Doutorado. Unicamp, 2006.
Zhang, H.F.; Shu, Y.T.; Yang, O. (1997). Estimation of Hurst parameter by variance-time
plots. Communications, Computers and Signal Processing, 1997. apos;10 Years
50 Telecommunications Networks – Current Status and Future Trends
PACRIM 1987-1997 - Networking the Pacific Rimapos;. 1997 IEEE Pacific Rim
Conference on Volume 2, Issue , 20-22 Aug 1997 Page(s):883 - 886 vol.2
Zukerman, M.; Neame, T. D.; Addie, R. G. (2003). “Internet Traffic Modeling and Future
Technology Implications” Proceedings of Infocom, 2003.
3
1. Introduction
QoS management(Raouyane B. et al., 2009) mechanisms as defined by 3GPP can be viewed
as a network-centric approach to QoS, providing a signalling chain able to automatically
configure the network to provision determined QoS to services on demand and in real time,
for instance on top of a DiffServ-enabled network. However, to envision a deployment of
such technology in a carrier-grade context would mean significant further effort. In
particular, premium paid-for services with SLA (Service Level Agreement) contracts such as
targeted by IMS (Poikselka and Georg, 2009)networks would require additional
mechanisms able to provide some degree of monitoring in order to asset the SLAs, while
IMS by itself does not provide such mechanisms.
The eTOM (enhanced Telecom Operations Map) (Creaner and Reilly, 2005) functional
framework is a widespread reference used to model and analyze networks and services
activity. From an eTOM point of view, one could argue that IMS does indeed cover the
Fulfilment part of service management, but lacks any means to carry out service Assurance.
The eTOM framework proposes a complete set of hierarchically layered processes
describing all operator activities in a standard way. It is furthermore sustained by a parallel
specification of a standard information model, the SID (Shared Information Data) (TMF
GB926 Release 4, 2004). It has to be noted however that both tools, the eTOM and the SID,
are generic. Also, the eTOM has been designed at times when Services were viewed as
centrally controlled and managed, whereas the IMS is really a distributed layer network.
The work presented in this contribution is an attempt to achieve Assurance functionality for
QoS-enhanced IMS services following strictly the eTOM specification, thus filling the
functional gap as analyzed earlier; furthermore, two architectures are proposed to be
compared: a centralized one and a distributed one.
services that are developed independently. The core layer i.e. the control layer is the IMS
system which provides the complex signalling responsible for routing sessions between users,
invocating services and security-related tasks (Figure
1). The information processing and management are carried out by nodes called CSCF (Call
State Control Function) and HSS (Home Subscriber Server). The IMS system introduces a control
environment similar to the CS session (Switched Commutation) but in CP (Packet Commutation).
In addition to access unification and diversity of services, IMS introduced a flexible and
capable QoS management architecture which organizes exchanges of QoS-related
requirements between the control and access layers, allowing resource reservation
mechanisms to offer best conditions of supply for e.g. multimedia services.
The service provisioning mechanism of IMS includes three consecutive steps impacting
resources: Reservation, Activation and Release (Figure 2).
When a user requests an IMS multimedia service by SIP signalling(Rosenberg et al., 2002)
through its attached P-CSCF, the P-CSCF, before forwarding this request must ensure
resources availability; this verification is performed through the exchange of Diameter
(Korhonen et al., 2010) messages during all media negotiation stages between the two ends
(User and AS). An agreement between the client and server can finally lead to change the
resource status from reserved into activated. Naturally the PCEF (Policy and Charging
Enforcement Function) (3GPP TS 29.210, 2006) applies the relevant QoS policy related to the
types of access and transport layers; the most used models are DiffServ(Blake et al., 1998),
RSVP(Wroclawski J., 1997) and MPLS (Le Faucheur et al).
eTOM-Conformant IMS Assurance Management 53
Fig. 2. Service request and negotiation in IMS network with QoS management.
The resources release is carried out at each end of session; the P-CSCF must announce to the
PCRF (Policy and Charging Rules Function) (3GPP TR 23.803, 2005) the end of the
multimedia session, and the PCRF notifies the PCEF in order to release reserved resources
for other applications. QoS management in IMS is a quite flexible on demand mechanism.
A more detailed view of the eTOM business process model (ITU-T Recommendation
M.3050.3, 2004) shows a grouping of vertical processes called the FAB columns. These
processes are necessary to support operations dedicated to customer satisfaction and
operator management:
- Fulfilment: Vertical grouping of E2E processes which provide requested services timely
and accurately to customers. It reflects business activity. The processes inform
customers of their order status, ensure completion on time and customer satisfaction.
- Assurance: A group of vertical E2E processes is responsible for implementation of
proactive and reactive activities of maintenance to ensure that services are always
available and delivered correctly with respect to the SLA. The processes continuously
monitor resources status and performance in a proactive way to detect possible defects.
They collect performance data and analysis to identify potential problems. In case of
eTOM-Conformant IMS Assurance Management 55
trouble or SLA violation, relevant processes are activated to inform the client about
service and trouble status, and to attempt restoration or repair.
- Billing: This grouping of vertical E2E process is responsible for collection of
appropriate user records, and production of accurate and timely bills, to provide
information on resources and services used for payment processing of the customer. In
addition, it handles requests from clients on billing, indicates billing status and
investigation, and is also responsible for resolving billing issues with respect to
customer satisfaction. These processes also support processing of services prepayment.
In addition to the FAB process columns, the Operation area proposes horizontal process
groupings:
- Customer Relationship Management (CRM): this group of processes supports
knowledge of customer needs and includes all necessary features for acquisition,
improvement and maintenance of a relationship with a client. It focuses on service and
support, and also on retention management, cross-selling, up-selling and direct
marketing. CRM also collect customer and applications information, and customization
of service delivery to customers. The processes are responsible for identifying
opportunities to increase customer value in company. CRM applies to traditional
interactions between client and enterprise.
- Service Management & Operations (SM&O): This group is focusing on services
(access, connectivity, content, solution, composition, etc.). It includes all necessary
features for management and operations of communications and information required
by or proposed to customers. The focus is on service delivery and management of
network and information technology. Some functions involve short-term capacity
planning service for a service instance, applying a service design to specific customers
or managing service improvement initiatives. These functions are closely related to
actual experience of customer. The processes in this group are responsible to meet, at a
minimum, QoS goals including performance processes and customer satisfaction with
service levels and service costs.
- Resource Management & Operations (RM&O): This processes group maintains
knowledge of network-related resources (applications, logical and physical
infrastructure, communication, management etc.). This group is responsible for
managing all these resources (e.g. networks, computer systems, servers, routers, etc.). It
is used to provide and support services required by or proposed to customers. The
group also contains all features responsible for direct management of these resources
(network elements, routers, servers, etc.) used in business process inside operator.
These processes are responsible for ensuring that network infrastructure supports an
E2E services provisioning. The processes ensure that infrastructure works perfectly, and
is available on services and needs and managers.
The R&O group also has a function that allows collection of information from various
sources (e.g. network elements (NE) and/or management systems elements (EMS)), and
integrates, correlates and in many cases, summarizes data to be transmitted as
information relevant to the service management system. This group also includes
processes involved in traditional management of network elements (NEM), because
these processes are actually essential elements of any process of resource management.
RM&O processes thus manage the network service provider and overall infrastructure
to ensure reliable interaction with other service providers.
56 Telecommunications Networks – Current Status and Future Trends
- Product (TMF GB926 Release 4 Addendum 3 - Product, 2004): in the SID a Product is
considered as involving Services and Resources.
- Service SID (TMF GB926 Release 4 Addendum 4 SO, 2004): the Product by design is a
single or composite service. The Service interacts with the Product to determine its
business characteristics, such as customer class and type of service with class
CustomerFacingService. And the ResourceFacingService (TMF GB926 Release 4 Addendum
4 S-QoS, 2004) class exposes resource behaviour for service delivery and its composition
for service delivery.
- Resource: is divided into two main classes: the LogicalResource(TMF GB926 Release 4
Addendum 5 LR, 2004) that exposes logical components and services that are necessary
eTOM-Conformant IMS Assurance Management 57
for service design and product needs; and the PhysicalResource(TMF GB926 Release 4
Addendum 5 PR, 2004) which represents physical components of the network such as
routers.
The goal of these two processes is to perform a restoration of services and resources in short
time, and to locate troubles before their expansion, with an optional notification to the user.
The operation is initiated by a usual collection of data by the RDC&P process when
detecting and exceeded threshold. The process sends relevant information to RPM to alert
the RTM process; in case of a component failure the communication is done directly
between RDC&P and RPM.
The RPM process sends details to the Service Quality Management (SQM) and to the RTM
process, depending on the type of trouble, trying to start procedures for resource
restoration; for each attempt it notifies the Service Problem Management (SPM) process to
synchronize their information about troubles (Figure 7).
60 Telecommunications Networks – Current Status and Future Trends
The communication between SPM and SQM aims to correlate their information about
troubles whether solved or not; the SQM process sends details of impact on services and
alarms to Customer QoS / SLA Management (CQoS / SLAM), a process that specifies SLA
violation and customer importance by obtaining all this information from Retention &
Loyalty, and finally notifies the customer about QoS degradation according to its importance.
If the cooperation between the Service Problem Management and the Resource Management
Trouble processes is unsuccessful, the SC&A process will be activated to perform its own
corrective action, such as a new configuration. The new configuration will take into account
all resource constraints and infrastructure development and service contract terms.
The reconfiguration proposed by SC&A follows exactly the steps of the Ordering operation,
and is finalized by launching normal SLA verification, and tries to close all open troubles
reports in SPM and RTM. The CQoS / SLAM process can inform the customer about service
restoration and quality with the possibility of sending a QoS report.
4. Issues
3GPP specifications provide a basic QoS management architecture for the IMS network
which ensures an adequate level of service compared to best effort service. However, the
IMS services need to be monitored and managed by a set of mechanisms and methods
taking into consideration constraints of the business enterprise. Such a set is explicitly
proposed by the eTOM. The eTOM describes its operations and processes in ways that are
generic and applicable to any transaction and promises to be fully applicable to the IMS
architecture with no applicability constraints. The next step of the study is therefore to plan
a mapping strategy in order to map eTOM processes to IMS functions.
eTOM-Conformant IMS Assurance Management 61
5. Functional architecture
A first step in this undertaking is to match IMS functionality with eTOM processes. The
resulting set has furthermore to be enriched by eTOM processes relevant to Assurance and
Fulfilment. This broader set forms the basis to select different SID entities necessary to carry
out these processes. The SLA execution procedure as defined in eTOM model requires the
cooperation of several processes belonging to Assurance and Fulfilment of the 'FAB' area,
and spanning the three business layers: Customer, Resource, and Service. These eTOM
processes will be activated sequentially (Figure 8).
The processes belonging to the Assurance layer correspond to the monitoring aspect of this
operation, related to Fulfilment for restoration and supply. In order to link eTOM processes
to the IMS network, a new component entitled Monitoring, Configuration, Data Collection is
required, which clusters the core modules to communicate with these entities.
In the IMS network, the diversity of entities and their various communication protocols
require multi-protocol components which can implement all the necessary monitoring and
correction operations. An additional constraint is that performance data collection and
detection of services should be executed in real time or near real.
5.1 Design
The WSOA (Web Service Oriented Architecture) appears as a valid choice for such a
distributed system. The SOA (Mark and Hansen, 2007) concepts will allow to implement EJB
(Rima, Gerald, and Micah, 2006) based SOA modules supporting the processes of each
component, exposing web services communications via XML/SOAP (Simple Object Access
Protocol) /HTTP (Newcomer E., 2002). Three SOA modules have been designed, each of
which supporting a part of the targeted eTOM business processes and their associated SID
62 Telecommunications Networks – Current Status and Future Trends
The three modules of the monitoring system are: WS-Resource, WS-Service, and WS-
Customer; each one exposes a set of web services specified using WSDL (Web Services
Description Language) (W3C Recommendation, 2007). These web services are invoked and
synchronized by the central BPEL component that provides moreover tools such as a web
interface that tracks performance of overall network, SLA operation, processes execution
and monitoring of physical and logical network resources (Figure 9). The SLM&M (Service
Level Monitoring and Management) architecture contain:
- Translation Business Processes: EJB (Enterprise Java Bean) for represent each processes,
its functions and information processing.
- Presentation of WSs: WSDL (Web Service Description Language).
- Processes Communication: XML/SOAP (Simple Object Access Protocol).
- Operations Orchestration: BPEL (Business Process Execution Language).
- Communication between SLM&M and the IMS network entities: TCP/IP, XML.
Before analyzing the different SOA modules, it is useful to introduce the interfaces between
SOA modules and network. These interface agents take (Figure 10) in charge low-level
detections and calculations and transmit their results to the SOA modules via dedicated
socket interfaces:
- The IMS agent scans S-CSCF activity and detects service launching ;
- The Application Server agent scans Application Server activity in order to identify the
customer parameters ;
- The Router agents perform network analysis tasks in order to calculate KPIs that will be
transmitted to SOA modules
The SOA Modules expose each eTOM layer:
- WS-Resource: This SOA module is composed of classes implementing operations
defined in the Resource layer of eTOM, as well as corresponding SID entities. It
implements two main eTOM processes already discussed in functional architecture:
Resource Data Collection & Processing, and Resource Performance Management. Both
of them are exposed as web services.
- WS-Service: This module implements various SID entities and operations defined in the
Service layer of eTOM. The module exposes processes as web services responsible for
quality indicator mapping and analyzing.
- WS-Customer: This module implements functionality defined in the Customer layer of
the eTOM and its SID model. It exposes Customer QoS/SLA Management web service
64 Telecommunications Networks – Current Status and Future Trends
responsible for SLA verification. It retrieves the KQIs of the currently delivered service,
loads the customer profile and subsequently detects any SLA violation.
- BPEL Engine: The BPEL Engine module implements a BPEL process that invokes the
web services described above and synchronize their interaction.
- Web interface : To monitor the SLA operation and its process, the BPEL engine features
a web interface that allows to:
• Show messages exchanged between web services (XML/SOAP) and modules.
• List performance indicators collected from the network layer entity
• Monitor the activity and performance of physical resources such as network
routers and logical entities such as CSCFs and the HSS (Home Subscribe Server).
• Check the provisioning chain of QoS management: PCRF, PCEF.
• View the results of the audit and SLA verification, the customer class, and values of
KQIs.
However, the centralized web services that allow KPIs and KQIs monitoring are still relying
on BPEL technology and still are very resource and time consuming. Indeed, the
distribution of the Resource processes allows not only to share processes of KPIs but also to
evaluate services locally. Thus, the distribution of EJB modules becomes necessary to
eTOM-Conformant IMS Assurance Management 65
incorporate mechanisms for monitoring locally but also to allow a local correction of QoS
degradation and anomalies.
The new functional architecture of SLM&M (Figure 12) consists therefore of two main
modules:
- Assurance Layer: represents the SLA verification process as defined in eTOM in both
layer Customer and Service. Thus, processes that are related to operations Fulfilment
and Assurance, and the information and data is stored in Customer Inventory and
Service Inventory.
- Monitoring Layer:
• Is distributed, and contains a set of agents and probes that are able to recover all
data in real time (signalization, logging, reservation, configuration, policy, routers
status, etc. ..) and implements all Resource layer processes for SLA verification:
Resource Data Collection & Processing (RDC&P) and Resource Performance
Management (RPM), which are related to each IMS layer (Access, Control, Service).
• Contains a set of processes that are functional in ordering and other SLA
operations of WS-Resource. Also, a synchronization module that is necessary for
detection and control of events in the network, such as planning activities and
communications on one hand between the distributed modules (first part) and also
between Web services exposed (Layer).
- A core router and two edge routers (Linux boxes) defining a DiffServ-enabled network
on which are connected an IMS terminal ad an Application Server;
- This network is controlled by the OpenIMS (Open IMS Core) system which is deployed
in the core router Linux box;
- A management server supports the QoS monitoring/Assurance functionality.
- Assurance Layer: contain both servers and WS-Customer and WS-Service, and integrate
process and Fulfilment and Assurance, that will be activated in SLA correction and
violation.
The supply architecture provides a set of IMS services, when a client requests a VoD
streaming service, the provisioning chain stimulates IMS entities to provide a resource
reservation and QoS management. The SLM&M in supply, after ordering operation, start
collection of configuration data for a normal SLA execution. Anomaly detection or
exceeding threshold causes an activation of SLA violation processes for restoring service
into normal level.
The SLM&M must be reactive by rapid detection of QoS degradation or anomalies, followed
by an attempt to resolve troubles, that activates the Assurance process and if necessary the
Fulfilment process.
6.3 Scenarios
The test scenario includes three cases, a customer Alice with Platinum class that requires a
VoD service:
- The client receives service with perfect QoS;
- An overloaded network with a slight QoS degradation;
- Network Congestion and violation of SLA.
eTOM-Conformant IMS Assurance Management 69
6.4 Results
The results expose several parameters relating to monitoring service and performance of
SLM&M in centralized and distributed architecture, and response time in trouble detection
and SLA violation.
Case 2: the network conditions, hence video quality, deteriorate proportionally to mass of
competing services for lost packets and reduced flow rate (Figure 16).
Case 3: competing services overload the routers: queues fill in gateways, impacting delay
and jitter. Routers discard packets in excess, this causes static pixels in video (Figure 17) and
in some cases service cancellation.
70 Telecommunications Networks – Current Status and Future Trends
The platform succeeds in identifying accurately deterioration of delivered services. The cost
in terms of response time has been evaluated as well. It is observed that response time for
Resource-WS is much longer than for other web services, due to complexity of its tasks
(Figure9, 10).
Fig. 18. Response time for different web services (Client: Alice).
The number of web services and their internal functionality has a considerable impact on
running time of SLA verification. This led to limit the exposed eTOM processes to level 3
and to implement sub processes via internal java methods.
plays a vital role in reduction of complexity and processing, which highlights the advantage
of using TCP /IP for exchange parameters of service and performance indicators and
transmission at higher levels in order to achieve continuous monitoring.
The response time of WS-synchronization and other agents resource is short compared to WS-
Resource in SLA verification, because of the processing performed locally in each device, that
has a potential to reduce traffic between Monitoring and Assurance layers, as well as it reduces
response time compared to centralized architecture in tree cases (Figure 19).
Fig. 19. Response time (ms) for centralized and disturbed architecture.
The processing of parameter flow in entity level allow a real-time control of multiple QoS
and services, however a router must have enough memory for traffic conditioning, although
using control function as treatment and comparison with thresholds can reduce its capacity
in terms of CPU and memory.
The distributed architecture provides a Monitoring layer that alerts Assurance layer within a
very short time or near real time, and allows rapid processing of SLA violations, compared
to another architecture where several treatments must be executed to detect degradation
QoS or failure of an entity.
Fig. 20. Customer satisfaction during a time interval after SLA verification and correction.
The MOS-AV indicator reflects customer satisfaction. When detection thresholds are
exceeded or values of MOS-V become critical, SLA violation has launched the first attempt
with confidence and was successful in restoring normal levels of service after 7 seconds. The
second violation that requires intervention of Assurance & Fulfilment takes 17 seconds to
restore the service. These results are justified by the architecture that used WSOA and
interaction between different WSs and attempted solutions.
7. Conclusion
The proposed approach is based on the QoS provisioning architecture proposed by 3GPP
with eTOM Assurance capabilities of QoS monitoring. SLM&M uses the new concepts of
SOA and BPEL in managing and monitoring network and also must meet several
constraints of instrumentation. The first version of the platform was centralized to address
all performance data in a central node, this design offered SLA verification but still
remained isolated from IMS network and real events. However the IMS network requires
permanent and real time monitoring rather than just a sporadic SLA verification.
The solution to distribute Resource layer and processes of the eTOM and their adjustments
to each layer of the IMS (Access, Control, and Service) is appropriate, as the creation of a
WS- Synchronization which synchronizes operations process WS-Resource and their agents
in network layer, in addition provides operations in the monitoring layer of SLM & M. The
distributed architecture demonstrates its ability in terms of response time and is preferable
to a centralized SLM&M.
The life cycle of SLM&M has three main stages: a real-time monitoring of services and
resources to detect anomalies or degradation, followed by a stage of responsiveness to
correct troubles, and the final step is to be proactive in order to estimate the behaviour of
service and resource by correlation and root cause analysis of service impact. The proactive
property will be integrated with QoS mechanisms that predicted from current data, a
mathematical model or stochastic processes that come into the perspective.
eTOM-Conformant IMS Assurance Management 73
8. Acknowledgment
Special thanks are due to MÉDITELECOM operator for its financing, and supporting.
9. References
3rd Generation Partnership Project “Charging rule provisioning over Gx interface (Release
6)”, 3GPP TS 29.210 V6.7.0 2006-12, available at
http://www.3gpp.org/ftp/Specs/html-info/29210.htm.
3rd Generation Partnership Project, Evolution of policy control and charging (Release 7),
3GPP TR 23.803 V7.0.0 (2005-09), available at
http://www.3gpp.org/ftp/Specs/html-info/23203.htm.
Bellafkih, M.; Raouyane, B.; Errais, M.; Ramdani, M.;MOS evaluation for VoD service in an
IMS network, I/V Communications and Mobile Network (ISVC), 2010 5th International
Symposium, Rabat , Morocco.
Blake S., Black D., Carlson M., Davies E., Wang Z., and Weiss W., An Architecture for
Differentiated Services, December 1998, RFC 2475, available at
http://www.ietf.org/rfc/rfc2475.txt
Creaner M. J. and Reilly, J. P, NGOSS Distilled: The Essential Guide to Next Generation
Telecoms Management. The Lean Corporation 2005.
Enhanced Telecom Operations Map (eTOM) The Business Process Framework for the
Information and Communications Services Industry, Addendum D: Process
Decompositions and Descriptions Release 6.0 GB921 D; TMF.
J. Wroclawski, The Use of RSVP with IETF Integrated Services, September 1997, RFC 2210,
available at http://www.ietf.org/rfc/rfc2210.txt
Korhonen, J., Tschofenig, H., Arumaithurai, M. Jones, M., Ed., and A. Lior, "Traffic
Classification and Quality of Service (QoS) Attributes for Diameter", RFC 5777,
February 2010, available at http://www.ietf.org/rfc/rfc5777.txt
Le Faucheur F., Wu L., Davie B., Davari S., Vaananen P., Krishnan R., Cheval P., Heinanen
J., “Multi-Protocol Label Switching (MPLS) Support of Differentiated Services“,
RFC 3270, May 2002, available at http://www.ietf.org/rfc/rfc3270.txt.
Mark Hansen, D. (2007) SOA Using Java Web Services, Prentice Hall, New Jersey, USA
Mi-Jung Choi, Hyoun-Mi Choi, Hong, J.W., Hong-Taek Ju, XML-based configuration
management for IP network devices, Communications Magazine IEEE, July 2004,
Volume: 42 Issue:7, pages: 84 – 91.
Newcomer, E. (2002) Understanding Web Services: XML, WSDL, SOAP, and UDDI, Addison-
Wesley Professional.
OpenIMScore – Open source implementation of IMS Call Session Control Functions and
Home Subscriber Service (HSS) -http://www.openimscore.org/
Poikselka M. and Georg M. The IMS: IP Multimedia Concepts and Services, John Wiley & Sons
Inc. Chichester, England2009.
Poornachandra, S., Matjaz, J., and Benny, M. (2006) Business Process Execution Language for
Web Services BPEL and BPEL4WS, 2nd Edition, Paperback.
Raouyane B., Bellafkih M., Ranc D., QoS Management in IMS: DiffServ Model’, Paper
Presented at the Third International Conference on Next Generation Mobile Applications,
Services and Technologies, 15-18 September 2009. Cardiff, Wales, UK.
74 Telecommunications Networks – Current Status and Future Trends
Raouyane B.; Bellafkih M.; Errais M.; Ranc D.; WS-Composite for Management &
Monitoring IMS Network; International Journal of Next-Generation Computing
(IJNGC) - ISSN 2229-4678, eISSN 0976-5034.
Rima, P. S., Gerald, B., and Micah, S. (2006) Mastering Enterprise JavaBeans 3.0, Paperback.
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley,
M. and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002, available
at http://www.ietf.org/rfc/rfc3621.txt
SERIES M: Telecommunications management network Enhanced Telecom Operations Map
(eTOM) –Representative process flows, ITU-T Recommendation M.3050.
Shared Information/Data (SID) Model System View Concepts and Principles, GB926 Version
1.0, Release 4.0, January 2004.
Shared Information/Data (SID) Model, Addendum 3 - Product Business Entity Definitions
GB922 Version 3.1, NGOSS Release 3.5 July 2003.
Shared Information/Data (SID) Model, Addendum 4SO – Service Overview Business Entity
Definitions, GB922 Addendum-4SO, NGOSS Release 3.5 July 2003.
Shared Information/Data (SID) Model, Addendum 4S-QoS Quality of Service Business
Entity Definitions, GB922 Addendum – 4S-QoS Version 1.0, NGOSS Release 3.5
July 2003.
Shared Information/Data (SID) Model, Addendum 5LR – LogicalResource Business Entity
Definitions, GB922 Addendum-5LR Version 1.0, NGOSS Release 3.5 July 2003.
Shared Information/Data (SID) Model, Addendum 5PR – Physical Resource Business Entity
Definitions, GB922 Addendum-5PR Version 3.0 NGOSS Release 3.5 July, 2003.
Web Services Description Language (WSDL) Version 2.0, W3C Recommendation 26 June
2007, http://www.w3.org/TR/wsdl.
Part 2
Quality of Services
4
1. Introduction
The ever-growing demand of high-quality broadband connectivity in mobile scenarios, as
well as the Digital Divide discrimination, are boosting the development of more and more
efficient wireless technologies.
Despite their adaptability and relative small installation costs, wireless networks still lack a
full bandwidth availability and are also subject to interference problems.
In context of a Metropolitan Area Network serving a large number of users, a bandwidth
increase can turn out to be neither feasible nor justified. In consequence, and in order to
meet the needs of multimedia applications, bandwidth optimization techniques were
designed and developed, such as Traffic Shaping [1-3], Policy-Based Traffic Management [4-
8] and Quality of Service (QoS) [9-17].
In this paper, QoS protocols are adopted and, in particular, priority-based dynamic profiles
in a QoS wireless multimedia network. This technique [18-20] allows to asssign different
priorities to distinct applications, so as to rearrange service quality in a dynamic way [21,22]
and guarantee the desired performance to a given data flow.
In particular, the platform can manage two levels of priority: among different users and
within a single user’s connection.
In the former kind of priority management, those users whose guaranteed bandwidth is
higher, will be proportionally assigned a greater part of the shared bandwidth.
The latter case refers to each single user, whose distinct services are assigned distinct
priorities. Each profile, in fact, allows the real time management of services, and the priority
parameter is used to queue the desidered services properly.
A complete testbed involving 80 users approximately is here presented, where such
technique is adapted to the specific requirements of the plant.
The network infrastructure installation is detailed, the whole QoS system developed is
described and four measurement campaigns are reported.
78 Telecommunications Networks – Current Status and Future Trends
The whole testing was directed by WiLab (www.wilab.org), which includes the IEIIT-CNR
(National Research Council of Italy, IEIIT Bologna unit) and a portion of the TLC scientific
community at Bologna University (Italy). The design and technical aspects of the problem
were and are still being carried out by such group.
The proposed platform aims at supporting a Wireless Internet Service Provider (WISP) in
the management of its network infrastructure in a user-friendly and straightforward way. It
can be accessed through the Internet and lets the network manager define different access
profiles and supervise all the users’ connections.
The QoS service, in particular, allows to set each user’s minimum bit rate guaranteed and
maximum supported, enable services such as VoIP, FTP, Mail and P2P and assign them
specific priorities.
The network scenario installed and used for the testbed includes an Internet gateway, a
server which hosts the whole infrastructure control system and five sectoral distribution
devices.
The software platform allows to define some distinct kinds of priority-based connection
profiles, each characterized by a set of different parameters and a diverse commercial value.
Personal data can also be managed, each corresponding to the user’s kind of connection
profile subscribed.
Reports about connections and traffic statistics are also at disposal, also useful to law
purposes. A continuous monitoring of the wireless network infrastucture is also possible.
All the above features can be easily managed through specific user-friendly portals.
This kind of services are fundamental in many application fields, ranging from Intelligent
Transportation Systems (ITS) and Infomobility to “Smart Cities”, where wireless
applications guide the user in most of his activities.
The paper is organized as follows: Section 2 describes the testbed setup and the QoS
software developed. Section 3 details the results of the four measurements campaigns.
These techniques, addressed to to real applications, are discussed in the following: the
PEGASUS project about the support of real time in Infomobility is discussed in Section 4.
The Smart Cities scenario is presented in Section 5. Conclusions and future tesbed
extensions are discussed in Section 6.
Such system runs on a Dual Xeon 2 GHz, 8Gb di Ram, 80Gb SAS Raid 5 server and
comprehends a Radius authentication server, a PPPoE concentrator and the whole QoS
management software.
A HiperLAN link starts here and connects the management server to a waterworks area (C)
15 km away (Link 2). In such area, two sectoral distribution equipments were setup and
serve 35 users approximately.
A further antenna allows to reach the last distribution area, situated near a football pitch (D)
10.5 km away (Link 3), and including three further sectoral distribution equipments for 45
users approximately. Such antenna had to be setup since some unfavourable features of the
ground prevented a direct connection from being created.
The indirect link creates a bottleneck and forces the waterworks area to support some of the
traffic surrounding the pitch.
A further penalty is that the same pylon which hosts the antenna in area (C) also carries some
television and microwave aerials. In consequence, some devices not optimally shielded were
initially blocked and even damaged and the available bit-rate is still being diminished.
In addition, some further installation problems were caused by the daily activation of the
waterworks pump, which produced strong perturbations to the electric network,
consequent blocks of many devices and even breakdowns. This problem was solved by
means of an electronic filter.
All the above problems would have obviously prevented 80 users from being propely
served, unless a bandwidth optimization method and traffic management were adopted.
Parameter Description
Name Profile name
Description Profile description
Upload bandwidth Max upload bandwidth (kbit/s)
Upload guaranteed Min upload bandwidth guaranteed (kbit/s)
Download bandwidth Max download bandwidth (kbit/s)
Download guaranteed Min download bandwidth guaranteed (kbit/s)
QoS Flag for enabling QoS traffic management
Table 1. main fields of a connection profile.
Fig. 2 shows the graphic interface for the definition and management of each type of profile.
The seven panels “Band 1”,. .. “Band 7” on the right allow to assign priorities, 1 being the
highest, 7 the lowest. In particular, a protocol can be associated to a specif priority by
dragging and dropping its name in the chosen band panel.
The minimum bandwidth guaranteed (in percentage) and maximum available must also be
setup for each sub-bandwidth. Once a profile has been defined, it can be assigned to many
distinct users, so as to tailor service supply easily and quickly.
As far as dynamic QoS management is concerned, the basic idea is to limit both upload
and download operations through the Egress policier (www.egress.com), so as to discard
A Testbed About Priority-Based Dynamic
Connection Profiles in QoS Wireless Multimedia Networks 81
all the packets whose speed exceeds a maximum value set. To this purpose, queuing
algorithms are applied and bandwidth can consequently be tuned according to actual
availability.
Some problems had to be solved along the way: shaping could only be applied to the
outgoing traffic, already processed by the kernel, whereas both the uploading and
downloading flows should normally be shaped by queuing methods on both the incoming
and outcoming interfaces. In this case, though, many independent PPP interfaces were
simultaneously active and each PPPoE was thus identified through a PP system interface
numbered N (PPN, N = 0, 1,. ..).
In consequence, two further difficulties had to be faced:
1. too many iptables rules were generated and so was a further branch in the queuing
structures;
2. the htp qdisc bandwidth sharing capabilities could not be fully exploited and no
minimal bandwidth per PPP connection could be guaranteed.
As a matter of fact, each PPP having its own independent queuing, the traffic on the
network interface was managed in an unpredictable way: no minimum bandwidth per
connection could be even assigned and the unexploited bandwidth could not be
dynamically and equally redistributed among all connections.
In order to handle the above situation, a qdisc (common to all connections) and subclasses
for each kind of connection (with minimum and maximum bandwidth set) were defined, so
as to redistribute unexploited resources among tunnels.
To this purpose, a hierarchical structure based on HTB (Hierarchical Token Bucket,
http://luxik.cdi.cz/~devik/qos/htb) queuing was developed, whose nodes specify their
own minimum and maximum bandwidth. In this way, the traffic of each tunnel is
forwarded to the class it pertains to, so as to achieve the desired result.
Nevertheless, qdiscs can only manage the traffic of their own interface, so it was still
impossible to identify a single connection by accessing the network interface of the PPPoE
server. Each connection, in fact, is managed as a separate network interface.
An IMQ (Intermediate Queueing Device, www.linuximq.net) interface was thus adopted,
which allows to manage qdiscs and the whole traffic: iptables are deviated to such interface
and traffic can be shaped. Each single PPP interface must be assigned a connection identifier
and sent to the IMQ, where connection classes were defined.
In this way, each connection can monitored, traffic can be classified on the basis of protocols
and the most important flows are assigned the highest priority.
Another problem faced was that each packet could only be marked by means of an an
identifier, so, theoretically speaking, the simultaneous identification of connections and
protocols within a session was impossible.
Several tests demonstrated that the problem could be solved through the joint use of
u32filter+MARK and CLASSIFY TARGET. This was done defining a further HTB class
structure in the PPPN interfaces.
82 Telecommunications Networks – Current Status and Future Trends
The bandwidth redistribution problem having been solved, attention could be focused on
flow priority within each connection.
Fig. 3 shows how queuing algorithms were applied. A root node (qdisc) was created in the
imq0 interface; class 1:1 was added in order to define the total bandwidth (100 Mbit/s in this
case). Subclasses were then defined for the management of single connections, each
specifying the minimum guaranteed (rate) and maximum at disposal (ceil).
Note that a higher QoS could be achieved if the SFQ (Stochastic Fair Queuing) were applied,
so as to manage single flows through a Round Robin policy.
In order to manage priority of single flows, a hierarchic structure was created within each
PPPN interface.
As in the former case, several subclasses were added to the root node (qdisc), each with a
minimum and maximum bandwidth; the SFQ algorithm was applied afterwards. A u32filter
list is defined in the root node of each interface, so as to drive single packets on the class
they pertain to on the basis of their protocol. Packets were initially divided by the CLASSIFY
TARGET tool according to the connection; a further division was then made by
u32filter+MARK on the basis of protocols.
Besides, the identifiers range is 1:10000 and 1:65535 in hex, so the highest attention must be
paid to each class handles. The following synatx was adopted:
2.2.1 Statistics
The platform allows to visualize information about the infrastructure and its use and, in
consequence, to make statistics about connected users and their traffic volume.
Fig. 4, for instance, refers to all the users’ total connection time. For the sake of compactness,
only a small excerpt was reported.
Diagrams are also available describing the system components, such as CPU load, network
load and many others.
Fig. 4. small excerpt from all the users’ total connection time.
As far as each user is concerned (Fig. 5), the following data can be monitored: connections,
data volumes exchange, diagrams about his or her traffic and, as indicated by law, packets
logging.The authentication system adopted is Radius and traffic is encapsulated through
the PPPoE protocol. In consequence, a PPP tunnel is active between each user and the
server.
3. Measurements campaigns
As already anticipated, the main concern of this paper is to present a realistic testbed for
QoS management; four measurements campaigns carried out are described in the following,
whose scenario was described in Section 2.1 (Fig. 1).
The adopted dynamic priority-based method is twofold. On the one hand, users are
assigned the shared bandwidth on the basis of their profiles: the higher the guaranteed
bandwidth, the higher the shared bandwidth assigned. On the other hand, not only users
but also services within a profile are prioritized, so each user is aware that his or her
bandwidth is accordingly shared among his or her applications.
The QoS management is presented in an increased way: no QoS in the first campaign; QoS
with neither minimum nor maximum set in the second; minimum and maximum
bandwidth defined in the third; dynamic redistribution is also managed in the fourth.
84 Telecommunications Networks – Current Status and Future Trends
Fig. 6. throughput in the link from the Shelter to the Management Server (bit/s).
The above measurements were performed using the following tools: (1) Iperf
(www.noc.ucf.edu/Tools/Iperf), which allows to send a TCP or UDP data streams and
measure their throughput; (2) WireShark (www.wireshark.org), a network analyzer which
allows to capture and diagram Iperf streams.
In this campaign, the Iperf server was installed on an Acer Travelmate with Linux Debian
OS and located in the B node, so as to receive UDP connections. A Macbook Pro with Mac
OSX Leopard was used as the client.
A Testbed About Priority-Based Dynamic
Connection Profiles in QoS Wireless Multimedia Networks 85
Nodes A, C, D hosted laptops for the connection to the Iperf server. In this way, throughput
could be measured first in Link1, then Link2 and Link 3 and finally in Link2 + Link3.
The highest UDP throughput at disposal in Iperf connnections was set to 10 Mbit/s; results
are reported in Tab. 2 and derive from a large number of measurements properly mediated.
Note that the throughput from the Management Server to the football pitch (Link 2 + Link 3)
is almost 2Mbit/s lower than in single links 2 and 3: this derives from the the same device
being charged of both signal reception and transmission.
3.2 QoS applied to multimedia TCP flows (no min/max bandwidth set)
The second campaign aimed at verifying the efficiency of the QoS management server. The
Iperf was moved in the (C) node, so as to check Link 3.
An ethernet cable subsituted the wireless connection during a PPP connection. Delays and
packet loss, in fact, are not particularly relevant in this kind of control, attention being
mainly focused on flow management.
The following tools were adopted: (1) QoS Server; (2) Server-side Vlc for MMS over http
video flow transmission (www.videolan.org/vlc); (3) Client-side Vlc for flow reception; (4)
WireShark.
Fig. 7, diagrammed through WireShark, represents the scenario and the first measurements
of this campaign. It refers to the following profile: no QoS applied, symmetric upload and
dowmlod of 1Mbit/s, no bandwidth guaranteed. The client receives the first video (red line)
until second 230, then the second video (green line) starts and the firts one is interrupted at
second 280.
As expected, in the concurrent period (sec. 230 to 280) both TCP videos are blocked, the
bandwidth being inadequate to support both of them.
Fig. 8 represents the second test and involves three videos on three distinct ports; in this
case, a QoS profile was enabled which guarantees an increasing priority from the first to the
third flow.
First starts the video on the lowest priority port (blue curve); the intermediate priority video
starts 20 seconds later (green curve) and, in consequence, the first data flow declines. In the
period between sec. 40 to 80 the maximum throughput was increased, so as to emphasize
the effect of dark and still scenes in the second video. In this way, the total throughput is
constant and bandwidth waste is kept under control.
86 Telecommunications Networks – Current Status and Future Trends
Fig. 7. two concurrent video flows without QoS (bit/s): scenario and results.
The same observations apply to the third and highest priority flow (red curve): the three
videos share the bandwidth and, thanks to QoS, the lowest priority one is flattened, the
medium is assigned less bandwidth and the highest has the best quality.
Nevertheless, this kind of priority management among traffic classes implies the almost
complete cancellation of the less important services for the benefit of the most important
ones.
In the initial QoS profile, an increasing priority was assigned to the three TCP flows on
distinct ports. Fig. 9 shows the measures obtained. The less priority flow (blue curve) is
strongly limited by the second one (green curve). They are both flattened when the highest
priority flow starts (red curve).
In order to improve such results, each traffic class was then assigned a minimum and a
maximum throughput (Tab. 3). The third campaign tries to demonstrate the effectiveness of
such method and Fig. 10 reports the results.
Note that an upper bound having been imposed to the intermediate flow, the lowest is not
totally flattened, but only slowed down.
The most priority flow starts at second 50 and, in consequence, the less priority traffic
becomes slower, but not more than the 20% guaranteed. The same applies to the
intermediate flow, for which a 30% at least is available. The highest priority flow, of course,
can not reach the maximum speed.
88 Telecommunications Networks – Current Status and Future Trends
As this measure shows, if guaranteed bandwidth percentages are properly managed, a high
QoS can be obtained in an easy and immediate way.
Fig. 10. TCP concurrent flows with bounded bandwidth QoS (bit/s).
Clients were connected to the server through the PPPoE protocol; the maximum throughput
between clients and server was set to 3Mbit/s, so as to simulate a set of wireless relays.
In this case, the upper bandwidth was to be shared among concurrent users and, in
consequence, none was to reach the maximum.
Results are shown in Fig. 11: initially, the only connected client 1 (green curve) gets the
whole bandwidth available according to his profile (3 Mbit/s).
After 100 seconds approximately, client 2 is also connected, throughput is assigned
according to the minimum guaranteed and exceeding bandwitdh is reassigned according to
such value.
A Testbed About Priority-Based Dynamic
Connection Profiles in QoS Wireless Multimedia Networks 89
The two clients share the same profile, so the bandwidth is equally divided and
redistributed.
At second 150 the third client (red curve) connects to the system; the minimum throughput
of his or her profile is four times the others’, so clients 1 and 2 are limited accordingly.
When client 1 disconnects, bandwidth is distributed among clients 2 and 3 in a ratio of 1 to 4.
Finally, client 3 logs out and the whole bandwidth is at client’s 2 disposal.
As a matter of fact, densely populated cities imply the concentration (from the country) and
distribution (within the city) of massive amounts of people and resources [24].
In addition to the vast economic importance and consequences of such situation, urban and
sub-urban mobility is a serious challenge also due to the circulation of large amounts of
people and goods in a relatively small area. This poses hazards to life and health, especially
for children, the elderly, and unfamiliar visitors, as well as to the environment.
Urban mobility, in fact, accounts for some 30% of energy consumption and 70% of transport
pollution in Europe, and this problem is magnified by the increasing population
concentration in large cities.
In such a scenario, the efficient management of traffic is a challenge that governments,
industries and researchers are forced to face worldwide. Private travellers, commercial road
users, and the public sector are continually searching for new and faster travel routes and
methods.
Roads efficiency can be substantially improved by the deployment of ITS, which exploit ICT
in order to provide traffic safety and efficiency.
ICT can be considered as the foundation for carrying out smart navigation, meant as the
paradigm where mobile entities (vehicles and pedestrians) move wisely through a given
environment, exploiting reliable and timely information about traffic conditions.
In this context, one of the most important applications is the support of real time, meant as
the constant monitoring of traffic and road conditions, and the consequent possible update
of the routes previously suggested. As a matter of fact, the best path in a given situation can
vary when traffic conditions vary and updates should be notified to the user in real time.
Nevertheless, up to now, no simple and marketable product was proposed for monitoring
traffic and providing real time information to road users.
To this purpose, in the framework of the Italian project PEGASUS
(http://pegasus.octotelematics.com/), WiLab aims at exploiting information transmitted
from vehicles to a remote Control Center, so as to provide drivers in real time with updated
information about actual traffic conditions. In this way, a new smart navigation service is
supported. In particular, the objective is twofold:
and private vehicles in Italy was 34 million back to 2003 [25], hence the FCD is a not
negligible percentage of the overall private vehicles number).
All such data are processed and exploited for the real time dynamic navigation of vehicles
(hereafter Dynamic Route Guidance, DRG); the same information can also be forwarded to
public or private institutions for traffic management, etc.
In the near future, almost all vehicles will be able to send real time information, and the
majority of drivers will take profit of data properly processed and of applications beyond
traffic management, such as safety and entertainment.
In this scenario, telecommunications systems will be required to transmit information
quickly and reliably, both among vehicles and between vehicles and remote control centers.
Which technologies are to be chosen, how priorities must be managed, which capacity is
required, are still open issues.
The mobile network is, at present, the only one adopted for vehicles-Control Center
communication; nevertheless, the quantity and size of information is to increase.
Urban networks, thus, can turn out to be a precious support for existing infrastructures,
especially if properly managed through effective QoS techniques.
92 Telecommunications Networks – Current Status and Future Trends
In this case, the effective management of QoS is tested in order to supply citizens with
several services, such as video surveillance (both wired and wireless data transmission
involved), integrated image analysis, Internet connection within urban environments, RFID
services for tourists, emergency calls, radiodiffusion, fire prevention, parking management,
localization, diagnostics and control by television. In addition, sensor network data
collection, traffic information, access control, mobile payments, vehicle tracking, user-
generated contents, energy management, etc.
Through QoS management, such services will be configured dynamically on the basis of
bandwidth availability. According to the throughput actually available in a specific
temporal slot and thanks to a constant monitoring of radio resources on each route, both
services to be offered to the user and applications to be kept active can be chosen.
More specifically, the testbed is addressed to transport improvement and traffic reduction
through smart navigators.
The second scenario (Fig. 15) aims at solving the second problem arisen: the idea is to apply
the first control on users’ bandwidth at the pylon.
As for the PPPoE concentrator, the QoS manager itself could be integrated in the transmitter.
On the one hand, this kind of control logic decentralization would solve the problem of link
saturation in case of heavy UDP uploads. On the other hand, the server would be spared
from an exceeding traffic in case of network expansion.
Two further difficulties arise: firstly, connection plans are not anymore managed by a single
server in a centralized and transparent way. In consequence, a new communication protocol
is required for the authomatic configuration of devices on the pylon when the main server
configuration changes.
In addition, logic decentralization can cause more frequent failures of important
components. If a failure occurs of QoS or PPPoE components, thus, an infrastructure is
needed that prevents connections from being denied.
A switch, for instance, could be used to disconnect out of order devices and the main server
would be in charge of guaranteeing connectivity until the problem is solved.
At present, the idea is to avoid a complete implementation of the above scenarios, using
simulation tools instead. In particular (Fig. 16), the QoS impact could be evaluated through
the joint use of the actually developed parts and simulators.
7. Acknowledgment
More than an acknowledgment, a dedication: To the little Gabriele Toppan, the son of Paolo
and the nephew of Andrea, go our very best wishes to grow up strong, responsible and
enthusiastic about life and its numerous miracles.
8. References
[1] Gringeri, S.; Shuaib, K.; Egorov, R. et al.; Traffic shaping, bandwidth allocation, and
quality assessment for MPEG video distribution over broadband networks,
Network, IEEE, 12 , 6, pp. 94 – 107, 1998, doi: 10.1109/65.752648
[2] Frank Yong Li; Stol, N.; QoS provisioning using traffic shaping and policing in 3rd-
generation wireless networks, in Proc. of IEEE Wireless Communications and
Networking Conference, 2002, 1, 139 – 143, 2002, doi: 10.1109/WCNC.2002.993478
[3] Yongdong Wang; Jurczyk, M.; Impact of traffic shaping in ATM networks on video
quality, in Proc. of International Workshops on Parallel Processing, 1, 485 – 492,
2000, doi: 10.1109/ICPPW.2000.869154
[4] Gozalvez, D.; Monserrat, J.F.; Calabuig, D., et al; Policy-based channel access mechanism
selection for QoS provision in IEEE 802.11e, Vehicular Technology Magazine, IEEE,
2, 3, 29-34, 2007, doi: 10.1109/MVT.2008.915326
[5] Flegkas, P.; Trimintzios, P.; Pavlou, G.; A policy-based quality of service management
system for IP DiffServ networks, Network, IEEE, 16, 2, 50-56, 2002, doi:
10.1109/65.993223
[6] Fangming Zhao; Lingge Jiang; Chen He; Policy-based radio resource allocation for
wireless mobile networks, in Proc. of IEEE International Conference on Neural
Networks and Signal Processing, 476-481, 2008, doi: 10.1109/ICNNSP.2008.4590396
[7] Conchon, E.; Pérennou, T.; Garcia, J. Et al.; W-NINE: A Two-Stage Emulation Platform
for Mobile and Wireless Systems, EURASIP Journal on Wireless Communications
and Networking, 2010, Article ID 149075
[8] Heithecker, S.; do Carmo Lucas, A.; Ernst, R.; A High-End Real time Digital Film
Processing Reconfigurable Platform, EURASIP Journal on Embedded Systems,
2007, Article ID 85318
[9] Chang Wook Ahn; Ramakrishna, R.S.; QoS provisioning dynamic connection-admission
control for multimedia wireless networks using a Hopfield neural network,
Vehicular Technology, IEEE Transactions on, 53, 1, 106-117, 2004,
doi:10.1109/TVT.2003.822000
[10] Xiang Chen; Bin Li; Yuguang Fang; A dynamic multiple-threshold bandwidth
reservation (DMTBR) scheme for QoS provisioning in multimedia wireless
networks, Wireless Communications, IEEE Transactions on, 4, 2, 583-592, 2005, doi:
10.1109/TWC.2004.843053
[11] Huan Chen; Kumar, S.; Kuo, C.J.; Dynamic call admission control scheme for QoS
priority handoff in multimedia cellular systems, in Proc. of IEEE Wireless
Communications and Networking Conference, 114-118, 2002, doi:
10.1109/WCNC.2002.993474
A Testbed About Priority-Based Dynamic
Connection Profiles in QoS Wireless Multimedia Networks 97
[12] Yaya Wei; Chuang Lin; Fengyuan Ren et al; Dynamic priority handoff scheme in
differentiated QoS wireless multimedia networks, in Proc. of Eighth IEEE
International Symposium on Computers and Communication, 131-136, 2003, doi:
10.1109/ISCC.2003.1214112
[13] Xiaorong Li; Chuah, E.; Jo Yew Tham; Kwong Huang Goh; An optimal smooth QoS
adaptation strategy for QoS differentiated scalable media streaming, in Proc. of
IEEE International Conference on Multimedia and Expo, 429-432, 2008, doi:
10.1109/ICME.2008.4607463
[14] Huang, J.-H.; Li-Chun Wang; Chung-Ju Chang; Capacity and QoS for a Scalable Ring-
Based Wireless Mesh Network, IEEE Journal on Selected Areas in
Communications, 24, 11, 2070-2080, 2006, doi: 10.1109/JSAC.2006.881622
[15] Bai, B; Chen, W.; Cao, Z. et al; Uplink Cross-Layer Scheduling with Differential QoS
Requirements in OFDMA Systems, EURASIP Journal on Wireless Communications
and Networking, 2010, Article ID 168357
[16] Montazeri, S.; Fathy, M.; Berangi, R.; An Adaptive Fair-Distributed Scheduling
Algorithm to Guarantee QoS for Both VBR and CBR Video Traffics on IEEE 802.11e
WLANs, EURASIP Journal on Advances in Signal Processing, 2008, Article ID
264790
[17] Almeida, M.; Sarrô, R.; Barraca, J.P. et al; Experimental Evaluation of the Usage of Ad
Hoc Networks as Stubs for Multiservice Networks, EURASIP Journal on Wireless
Communications and Networking, 2007, Article ID 62967
[18] Ganesh Babu, T.V.J.; Le-Ngoc, T.; Hayes, J.F.; Performance of a priority-based dynamic
capacity allocation scheme for wireless ATM systems, IEEE Journal on Selected
Areas in Communications, 19, 2, 355-369, 2001, doi: 10.1109/49.914513
[19] Naser, H.; Mouftah, H.T.; A class-of-service oriented packet scheduling (COPS)
algorithm for EPON-based access networks, in Proc. of 7th Int. Conference on
Transparent Optical Networks, 232-236, 2005, doi: 10.1109/ICTON.2005.1505793
[20] Song, S.; Manikopoulos, C.N.; A Priority-based Feedback Flow Control System for
Bandwidth Control, in Proc. of 40th Annual Conference on Information Sciences
and Systems, 1645-1652, 2006, doi: 10.1109/CISS.2006.286399
[21] Zhang, F.; Verma, P.K.; Cheng, S.; Pricing, resource allocation and quality of service in
multi-class networks with competitive market model, Communications, IET, 5, 1,
51-60, doi: 10.1049/iet-com.2009.0694
[22] Kamosny, D.; Novotyny, V.; Balik, M.; Bandwidth Redistribution Algorithm for Single
Source Multicast Networking, in Proc. of Int. Conference on Systems and Int.
Conference on Mobile Communications and Learning Technologies, 147-156, 2006,
doi: 10.1109/ICNICONSMCL.2006.62
[23] UN, World urbanization prospects: The 2007 revision population database, 2008,
http://esa.un.org/unup/
[24] EU, Eu mobility and transport, 2010,
http://ec.europa.eu/transport/publications/statistics/
[25] ecoage, Independent ecology portal, 2003, www.ecoage.net
98 Telecommunications Networks – Current Status and Future Trends
[26] Won-Kyu Hong, D., Choong Seon Hong, C.; A QoS management framework for
distributed multimedia systems, Int. J. Network Mgmt, 13, 115-127, 2003, doi:
10.1002/nem.465
[27] Jing Li; Yongwang Zhao; Min Liu et al; An adaptive heuristic approach for distributed
QoS-based service composition, in Proc. of IEEE Symposium on Computers and
Communications (ISCC), 687-694, 2010, doi: 10.1109/ISCC.2010.5546721
[28] Pattara-Atikom, W.; Krishnamurthy, P.; Banerjee, S.; Comparison of distributed fair
QoS mechanisms in wireless LANs, in Proc. of IEEE Global Telecommunications
Conference GLOBECOM '03. 553-557, 2003, doi: 10.1109/GLOCOM.2003.1258298
0
5
1. Introduction
About ten years ago, WCDMA 1 based the third generation mobile systems started to be
deployed worldwide. Besides to support basic mobile data services such as file transfer and
internet surfer, etc., UMTS has one of the most significant archievements which can support
a richer variety of services with QoS guarantee, such as video, VOIP, etc. Quality of Service
(QoS) is defined as ”the collective effect of service” performance, which determines the degree
of satisfaction of a user of the service in the ITU-T recommendation E.800. At a technical
level, QoS can be characterized by service availability, delay, jitter, throughput, packet loss
rate (Nortel White Paper, 2002).
3GPP has put many efforts to define and standardize a QoS framework for data services,
specially IP-based services. The standardization of a UMTS QoS model started in 1999. the
development was based on the following key principles: operation and QoS provisioning
needed to be possible in the wireless environment, usage of the Internet QoS mechanisms,
applications and interoperability. This chapter is aimed to provide an overview of the UMTS
end-to-end QoS architecture, describe how the QoS requirements to be realized from top layer
to wireless links.
1 Wideband Code Division Multiple Access W-CDMA - the radio technology of UMTS - is a part of the
ITU IMT-2000 family of 3G Standards.
100
2 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
The layered UMTS QoS architecture is shown in Figure 1. The UMTS network can provide
end-to-end QoS services from a Terminal Equipment (TE) to another TE. A network bearer
service describes how to realize a certain network QoS. It is defined by the control signaling,
user traffic transport and QoS management functionality, which enabling the provision of
a contracted QoS (Sudhir Dixit et al., 2001; 3GPP23107, 2011). As the end-to-end service is
conveyed over several networks, the end-to-end bearer service consists of different network
bearer services. The end-to-end bearer service can be decomposed into TE/MT local bearer
service, the UMTS bearer service and the external bearer service.
The TE/MT local bearer service provides communication between the TE and MT parts.
MT (Mobil Terminal) provides connection to the UTRAN with basic functions, such as radio
attachment to 3G network, authenticating the CS/PS domain, mobility management, etc. TE
support call control, authenticating the IMS subscription, etc.
The external bearer service deals with the interoperability and interworking aspects with
external IP bearer, and provides the appropriate functionality to support it. It is logical located
in the GGSN, which is the gateway of UMTS to external network (Sotiris et al., 2002).
UMTS bearer service provides service by using the radio access bearer service (RAB) and the
core network bearer service. The detail is given in the following.
The Core Network Bearer Service of the UMTS core network connects the UMTS CN Iu Edge
Node with the CN Gateway to the external network. The role of this service is to efficiently
control and utilise the backbone network in order to provide the contracted UMTS bearer
service. The UMTS packet core network shall support different backbone bearer services for
variety of QoS. And the UMTS bearer service is realized by a GPRS service in the PS domain
or a speech/data service in the CS domain.
Conversational class
The transfer time of real time conversation scheme shall be low because of the
conversational nature of the scheme and at the same time that the time relation (variation)
between information entities of the stream shall be preserved in the same way as for real
time streams. The maximum transfer delay is given by the human perception of video
and audio conversation. Therefore the limit for acceptable transfer delay is very strict, as
failure to provide low enough transfer delay will result in unacceptable lack of quality.
The transfer delay requirement is therefore both significantly lower and more stringent
than the round trip delay of the interactive traffic case. The fundamental characteristic
for QoS is to preserve time relation (variation) between information entities of stream and
conversational pattern (stringent and low delay) (3GPP23107, 2011).
The most well known use of this scheme is telephony speech (e.g. GSM). But with Internet
and multimedia a number of new applications will require this scheme, for example voice
over IP and video conferencing tools. Real time conversation is always performed between
102
4 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
peers (or groups) of live (human) end-users. This is the only scheme where the required
characteristics are strictly given by human perception.
Streaming class
Streaming class is characterised by that the time relations (variation) between information
entities (i.e. samples, packets) within a flow shall be preserved, although it does not
have any requirement on low transfer delay (3GPP23107, 2011). This scheme is one of
the newcomers in data communication, raising a number of new requirements in both
telecommunication and data communication systems. It is a one-way transport. A user
can use this class to watch (listen to) real time video (audio).
The delay variation of the end-to-end flow shall be limited, to preserve the time relation
(variation) between information entities of the stream. But as the stream normally is time
aligned at the receiving end (in the user equipment), the highest acceptable delay variation
over the transmission media is given by the capability of the time alignment function of
the application. Acceptable delay variation is thus much greater than the delay variation
given by the limits of human perception. The fundamental characteristics for streaming
class QoS is to preserve time relation (variation) between information entities of the stream.
Interactive class
Interactive traffic is the other classical data communication scheme that on an overall level
is characterized by the request response pattern of the end-user. At the message destination
there is an entity expecting the message (response) within a certain time. Round trip delay
time is therefore one of the key attributes. Another characteristic is that the content of
the packets shall be transparently transferred (with low bit error rate). The fundamental
characteristics for interactive class QoS is to request response pattern, preserve payload
content.
This class is applied when an end-user (either a machine or a human) is using on line
requesting data from remote equipment (e.g. a server). Examples of human interaction
End to Quality
End to End End ofQuality of Service
Service in UMTS Systems in UMTS Systems 1035
with the remote equipment are: web browsing, data base retrieval, server access. Examples
of machines interaction with remote equipment are: polling for measurement records and
automatic data base enquiries (tele-machines).
Background class
Background traffic is one of the classical data communication schemes that on an overall
level is characterised by that the destination is not expecting the data within a certain time.
The scheme is thus more or less delivery time insensitive. Another characteristic is that
the content of the packets shall be transparently transferred (with low bit error rate). The
fundamental characteristics for background class QoS are a) destination is not expecting
the data within a certain time; b) preserve payload content.
When the end-user, that typically is a computer, sends and receives data-files in the
background, this scheme applies. Examples are background delivery of E-mails, SMS,
download of databases and reception of measurement records.
The algorithm is well known as "Token Bucket Algorithm" which has been described in IETF. It
is a reference algorithm for the conformance definition of bitrate. This may be used for traffic
contract between UMTS bearers and external network/user equipment. In the algorithm,
"tokens" represents the allowed data volume, for example in byte. "Tokens" are given at a
constant "token rate" by a traffic contract, are stored temporarily in a "token bucket", and are
consumed by accepting the packet. This algorithm uses the following two parameters (r and
b) for the traffic contract and one variable (TBC) for the internal usage.
According to a token bucket, conformance can be defined as: "Data is conformant if the
amount of data submitted during any arbitrarily chosen time period T does not exceed
(b+rT)".
104
6 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
The algorithm is described here (Figure 2, (3GPP23107, 2011)). Token bucket counter (TBC)
is usually increased by "r" in each small time unit. However, TBC has upper bound "b" and
the value of TBC shall never exceed "b". When a packet i with length Li arrives, the receiver
checks the current TBC. If the TBC value is equal to or larger than Li, the packet arrival is
judged compliant, i.e., the traffic is conformant. At this moment tokens corresponding to the
packet length is consumed, and TBC value decreases by Li. When a packet j with length
Lj arrives, if TBC is less than Lj, the packet arrival is non-compliant, i.e., the traffic is not
conformant. In this case, the value of TBC is not updated.
The Maximum bitrate is the upper limit a user or application can accept or provide. All UMTS
bearer service attributes may be fulfilled for traffic up to the Maximum bitrate depending on
the network conditions. The downlink of the radio interface can use maximum bitrate to make
code reservations. Its purpose is:
1. to limit the delivered bitrate to applications or external networks with such limitations;
2. to allow maximum wanted user bitrate to be defined for applications able to operate with
different rates (e.g. applications with adapting codecs).
out-of-sequence SDUs are acceptable or not. Whether out-of-sequence SDUs are dropped
or re-ordered depends on the specified reliability.
Residual bit error ratio Residual bit error ratio indicates the undetected bit error ratio in the
delivered SDUs. If no error detection is requested, Residual bit error ratio indicates the
bit error ratio in the delivered SDUs. It is used to configure radio interface protocols,
algorithms and error detection coding.
Allocation/Retention priority
Allocation/Retention priority specifies the relative importance compared to other UMTS
bearers for allocation and retention of the UMTS bearer. The Allocation/Retention
106
8 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
Priority attribute is a subscription attribute which is not negotiated from the mobile
terminal. Priority is used for differentiating between bearers when performing allocation
and retention of a bearer. Where there is no enough resource, the relevant network
elements can use the Allocation/Retention Priority to prioritize bearers with a high
Allocation/Retention Priority over bearers with a low Allocation/Retention Priority when
performing admission control.
Fig. 3. QoS management function for UMTS bearer service in the control plane
Service manager co-ordinates the related functions in control plane to establish, modify
and maintain the service. All user plane QoS management functions are supported by
service manager with the relevant attributes. The service manager may perform an attribute
translation to request lower layer services. Service manager at UMTS bearer service level is
located at MT, CN EDGE and Gateway. The UMTS BS manager can signal among each other
and via the translation function with external instances to establish / modify a UMTS bearer
service. The UMTS BS manager will interrogate with its associated admission / capability
control whether the network entity supports a specific requested service and whether the
required resource is available. The UMTS BS manager at CN EDGE also has to verify with
the subscription control the administrative rights for using the service. Based on the layered
UMTS QoS architecture, UMTS bearer service manager will translate the UMTS bearer service
attributes into attributes of the lower layer service manager. For example, the UMTS BS
manager of the CN EDGE will translate the UMTS bearer service attributes into RAB service
attributes, Iu bearer service attributes, and CN bearer service attributes. Each low layer will
provide service to upper layer service manager.
Fig. 4. QoS management function for UMTS bearer service in the user plane
dropping in case of congestion. The traffic shaper forms the data unit traffic according to
the QoS of the service. The shaper algorithm is "Token Bucket Algorithm". At MT side,
the traffic conditioner (Cond.) provides conformance of the uplink user data traffic with the
QoS attributes of the relevant UMTS bearer service. In the Gateway a traffic conditioner may
provide conformance of the downlink user data traffic with the QoS attributes of the relevant
UMTS bearer service; i.e., on a per PDP context basis. A traffic conditioner in the UTRAN
forms this downlink data unit traffic according to the relevant QoS attributes.
Resource Manager distributes the available resources between all services sharing the same
resource. The resource manager distributes the resources according to the required QoS.
Example means for resource management are scheduling, bandwidth management and
power control for the radio bearer. It is located at MT, UTRAN, CN EDGE and Gateway.
to be mapped specifically for the interfaces to the UTRAN, GMSC-Server and CS-MGW. To
provide QoS the CS-MGW has to perform admission control for the bearer resource which is
therefore a part of the call admission control. Additionally, the CS-MGW is responsible for the
QoS mappings to the Iu-, CN- and external bearer services.
With the separation of transport and control in the CS domain the resource allocation
becomes more flexible. The new transport techniques ATM and IP (which are available for
the CS bearer independent domain) allow a more efficient network usage from a parallel
transmission of voice and data possibly leading to the consolidation of the whole PLMN
(including the PS domain and parts of RAN) on one transport network. The QoS issue in
the CS domain with IP or ATM based transport is to guarantee the same QoS as a TDM based
PLMN with increased bandwidth efficiency.
Generally, we can see that there are two methods to support QoS in IP network. One is
IntServ (Integrated Service), the other is DiffServ (Differentiated Service). IneServ is Per Flow
based QoS control mechanism. Diffserv is Per Aggregate based QoS control mechanism. To
accommodate the need for these two types of QoS, there are following QoS protocols and
algorithms:
• ReSerVation Protocol (RSVP):
• Differentiated Service (DiffServ)
• Multi Protocol Labeling Switching (MPLS)
3.1.1 IntServ
The Internet integrated services (IntServ) framework provides the ability for applications to
choose among multiple, controlled levels of delivery service for their data packets. It can
provide hard QoS guarantee to individual traffic flows. To support this capability, two things
are required (?):
• Individual network elements (subnets and IP routers) along the path followed by an
application’s data packets must support mechanisms to control the quality of service
delivered to those packets.
• A way to communicate the application’s requirements to network elements along the
path and to convey QoS management information between network elements and the
application must be provided.
In the integrated services framework the first function is provided by QoS control services
such as Controlled-Load (RFC2211, 1997) and Guaranteed (RFC2212, 1997). The second
function may be provided in a number of ways, but is frequently implemented by a resource
reservation setup protocol such as RSVP (RFC2205, 1997).
The controlled load service is intended to support a broad class of applications which have
been developed for use in today’s Internet, but are highly sensitive to overloaded conditions.
Important members of this class are the ”adaptive real-time applications” currently offered
by a number of vendors and researchers. These applications have been shown to work well
on unloaded nets, but to degrade quickly under overloaded conditions. It is equivalent to
”best effort service under unloaded conditions”. The controlled-load service is intentionally
minimal, in that there are no optional functions or capabilities in the specification. The service
offers only a single function. It is better than best effort, but cannot provide strictly bounded
service as guaranteed service.
The controlled-load service can be implemented by using evolving scheduling and admission
control algorithms. The implementations are highly efficient in the use of network resources.
Guaranteed service guarantees that datagrams will arrive within the guaranteed delivery time
and will not be discarded due to queue overflows, provided the flow’s traffic stays within its
specified traffic parameters. It is similar to emulate a dedicated virtual circuit. This service
is intended for applications which need a firm guarantee that a datagram will arrive no later
than a certain time after it was transmitted by its source. For example, some audio and video
"play-back" applications are intolerant of any datagram arriving after their play-back time.
Applications that have hard real-time requirements will also require guaranteed service.
112
14 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
Guaranteed service does not attempt to minimize the jitter (the difference between the
minimal and maximal datagram delays); it merely controls the maximal queueing delay.
Because the guaranteed delay bound is a firm one, the delay has to be set large enough to
cover extremely rare cases of long queueing delays. Several studies have shown that the
actual delay for the vast majority of datagrams can be far lower than the guaranteed delay.
Therefore, authors of playback applications should note that datagrams will often arrive far
earlier than the delivery deadline and will have to be buffered at the receiving system until it
is time for the application to process them.
Guaraneteed service represents one extreme end of delay control for networks. Most other
services providing delay control provide much weaker assurances about the resulting delays.
In order to provide this high level of assurance, guaranteed service is typically only useful
if provided by every network element along the path (i.e. by both routers and the links
that interconnect the routers). Moreover, as described in the Exported Information section,
effective provision and use of the service requires that the set-up protocol or other mechanism
used to request service provides service characterizations to intermediate routers and to the
endpoints.
Integrated Services routers uses admission control and resource allocation method to offer
QoS guarantee. A token-bucket model is used to characterize the input/output queueing
algorithm. It can smooth the flow of outgoing traffic. The IntServ parameters include
(qodwhitepaper, 1999):
Token rate ( r): The continually sustainable bandwidth (bytes/second) requirement for a
flow. It represents the average data rate into the bucket, and the target shaped data rate
out of the bucket.
Token-bucket rate ( b ) : the extent to which the data rate can exceed the sustainable average
for short periods of time, or the amount of data sent cannot exceed rT+b (where T is any
time period).
Peak rate ( p ): It is the maximum send rate (bytes/second) if known and controlled. At any
time period (T), the amount sent data cannot exceed M+pT.
Minimum policed size ( m): The size (byte) of the smallest packet (data payload only) can
be generated by the sending application. The size m is not an absolute number. If
the percentage of small packets is small, the number m should increased to reduce the
overhead estimate. All packets smaller than m are treated as size m.
Maximum packet size ( M ): The biggest size of a packet (bytes). The M is absolute number.
Any packets (size > M) are considered out of spec and may not receive QoS controlled
service.
3.1.2 RSVP
For offering IntServ, a way to communicate the application’s requirements to network
elements along the path and to convey QoS management information between network
elements and the application must be provided. A resource reservation setup protocol called
RSVP (rfc2205, 1997) is implemented for this purpose. It is a signaling protocol that can
provide reservation setup and control to enable the integrated services by using a variety
of QoS control, a variety of setup mechanisms.
A simplified RSVP working flow is shown in Figure 5
End to Quality
End to End End ofQuality of Service
Service in UMTS Systems in UMTS Systems 113
15
1. When a sender wants to set up a traffic link, it will generate the traffic specification (TSpec),
which describes data traffic, such as upper/lower bounds of bandwidth, delay, and jitter.
Then RSVP sends out a PATH message containing TSpec to the receiver(s) (unicast or
multicast). Along the route, each RSVP-enabled router trigger a "path-state" that includes
the previous source address of the PATH message.
2. After receiver receives the PATH message, the receiver sends a RESV message "upstream"
to make a resource reservation. The RESV message includes a request specification (RSpec)
which indicates what type of IntServ required âĂŞ either Controlled Load or Guaranteed,
a filter specification (filter spec) (indicating e.g. the transport protocol and port number).
The RSpec and filter spec represent a flow-descriptor that RSVP routers use to identify
each reservation.
3. Along the RSVP upstream, RSVP routers use the admission control to authenticate the
resource reservation request and allocate the necessary resources when the routers receive
the RESV message. If the request cannot be met (due to no enough bandwidth or
authorization failure), the RSVP router returns an error back to the receiver. If the request
is accepted, the router forwards the RSVP message to the next router.
4. When the last router receives the RESV message and accepts the request, it sends out a
confirmation message back to the receiver.
5. There is an explicit tear-down process for a reservation when sender or receiver terminate
a RSVP session.
3.1.3 DiffServ
The Integrated Services/RSVP model relies upon traditional datagram forwarding in the
default case, but allows sources and receivers to exchange signaling messages which establish
additional packet classification and forwarding state on each node along the path between
114
16 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
them (rfc1633, 1994). In the absence of state aggregation, the amount of state on each node
scales in proportion to the number of concurrent reservations, which can be potentially large
on high-speed links. This model also requires application support for the RSVP signaling
protocol. Differentiated service is a simple method by classifying services of different
applications (rfc2475, 1998). Currently there are two standard per hop behaviour (PHBs)
define two traffic classes:
• Expedited Forwarding (EF): Has a single codepoint (DiffServ value). Ef minimize delay
and jitter and provides the highest level of aggregate quality of service. Any traffic that
exceeds the traffic profile is discarded (?). EF class offers a low jitter, low delay service.
UserâĂŹs traffic cannot exceed the agreed peak rate. Otherwise, the packets will be
discarded.
• Assured Forwarding (AF): Has four classes and three drop-precedence within each class
(a total of twelve codepoints). Excess AF traffic is not delivered with as high probability
as the traffic "within profile", which means it may be demoted but not necessarily dropped
(?). The AF class is suitable for delay-tolerant applications. The guarantee just implies that
the better QoS class will give a better performance than the low-level QoS class. Network
operator can define their own per-hop behavior.
3.1.4 MPLS
MPLS is a key development in IETF that will add a number of essential capabilities to today’s
best effort IP networks, including
• Traffic Engineer, enhancing overall network utilization by creating a uniform or
differentiated distribution of traffic throughout the network.
• Providing traffic with different Classes of Service (CoS)
• Providing traffic with different Quality of Service (QoS)
• Supporting network scalability, providing IP based Virtual Private Networks (VPN)
MPLS borrows the idea from ATM switching. It remains independent of the Layer-2
and Layer-3 protocols. Besides IP, other network protocols (such as IPX, ATM, PPP or
Frame-Relay) also can work with MPLS. MPLS resides on routers. When a packet flow enters a
edge router of the MPLS domain, all packets are marked to clarify priority with a fixed-length
label (20 bits label). The label identifies the packets routing information in this MPLS network,
also define the quality of service for the packets.
A MPLS domain includes label edge routers (LERs) and label switching routers (LSRs). The
route taken by an MPLS-labeled packet is called the label switched path (LSP). LST is a
high-speed router in the core of a MPLS network, which participates in the establishment
of LSPs. LER is a router that operates at the edge of a MPLS network. It is used to assign and
remove labels when packets enter or exit the MPLS network.
MPSL is similar to DiffServ because it also marks traffic at ingress of a MPLS network, and
un-marks at egress gate. However, MPLS marking is used to decide the next hop router while
DiffServ marking is used to determine priority in route itself.
may include the support of DiffServ Edge Function and the RSVP function. The
Translation/mapping function provides the inter-working between the mechanisms and
parameters used within the UMTS bearer service and those used within the IP bearer service,
and interacts with the IP BS Manager. In the GGSN, the IP QoS parameters are mapped into
UMTS QoS parameters, where needed. In the UE, the QoS requirements determined from
the application layer (e.g., SDP) are mapped to either the PDP context parameters or IP layer
parameters (e.g., RSVP). If an IP BS Manager exists both in the UE and the Gateway node, it
is possible that these IP BS Managers communicate directly with each other by using relevant
signalling protocols. The required options in the table define the minimum functionality that
shall be supported by the equipment in order to allow multiple network operators to provide
interworking between their networks for end-to-end QoS. Use of the optional functions listed
below, other mechanisms which are not listed (e.g. over-provisioning), or combinations of
these mechanisms are not precluded from use between operators. The IP BS Managers in
the UE and GGSN provide the set of capabilities for the IP bearer level as shown in table 2.
Provision of the IP BS Manager is optional in the UE, and required in the GGSN.
Capability UE GGSN
DiffServ Edge Function Optional Required
RSVP/IntServ Optional Optional
IP Policy Enforcement Point Optional Required
Table 2. IP BS Manager capability in the UE and GGSN
End to Quality
End to End End ofQuality of Service
Service in UMTS Systems in UMTS Systems 117
19
Policy can be represented at different levels, ranging from business goals to device-specific
configuration parameters. Enforcement of policy ensures that business rules are always
followed. Policy rule is a basic building block of a policy-based system. It is the binding of a
set of actions to a set of conditions - where the conditions are evaluated to determine whether
the actions are performed. [RFC3060] A condition is a set of expressions or objects used to
determine whether a given policy rule’s action should be performed. A condition answers
the question, "when and where do we enforce a policy?" An action defines what to be done to
enforce a policy rule, when the conditions of the rule are met. Policy actions may result in the
execution of one or more operations to affect and/or configure network traffic and network
resources. An action answers the question, "what must be done to enforce a policy?"
A policy also defines how the network’s resources are to be allocated among its clients. Clients
can be individual users, departments, host computers, or applications. Resources can be
allocated based on time of day, client authorization priorities, availability of resources, and
other factors. How resources are allocated can be static or dynamic (based on variations in
traffic). Policies are created by network managers and stored in a repository. During network
operation, the policies are retrieved and used by network management software to make
decisions.
Fig. 8. A PBN architecture that is derived from the policy framework specified by the IETF
and "pushes" configuration information to the PEP. This takes place as a result of external
events (unrelated to the PEP) such as change of applicable policy, time of day, expiration
of account quota, or information from third party (non-PEP) signaling.
Both models employ policy servers as the PDP to control the network devices that enforce
the policy (i.e. PEPs). PBN also offers a policy repository for storing policy information
accessed by the PDPs in the system. To communicate policy information between PDPs
and PEPs, the COPS policy protocol is engaged. Additionally, the LDAP protocol functions
to access the policy repository.
Policy Decision Point (PDP)
The PDP is the PBN component that directly controls the network devices or policy
enforcement points (see next section). Functionally, the PDP handles policy information
that has been entered into the PBN management system. The policy data used by the
PDP can either be obtained in real-time upon entry into the management console, or from
the policy repository on an as-needed basis. The function of the PDP involves retrieving
policy, interpreting policy, detect policy conflicts, receiving policy decision requests from
PEPs, determining which policy is relevant, applying the policy and returning the results.
It also sends policy elements the PEP.
Policy Enforcement Point (PEP)
Network devices that receive and enforce the decisions from the PDP are referred to as
PEPs. In both outsourcing and provisioning policy management models, PEPs receive
policy decisions and enforce them at the packet level as data passes through the devices.
120
22 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
The PCRF communicates with the PCEF via the Gx interface (3G29212, 2008). It allows two
modes of operation. In the "push" mode, the PCRF initiates communication with the PCEF
and sends the PCEF its decision. In the "pull" mode, the PCEF initiates communication with
the PCRF to request a decision for a particular IP flow. The Gx interface and the protocol used
for communication on the interface are described in the following.
Figure 10 depicts the relationship between these entities. In the following subsections, each of
these network elements will be described.
PCRF in Proxy-CSCF
During the establishment of a SIP session, a P-CSCF is the first contact point in the IMS
domain for a UE [3G23228]. Hence it is the natural place to authorize the usage of
network resources such as the bandwidth requested by the UE. The QoS requirements of
the UE are carried in the Session Description Protocol (SDP) description within a Session
Initiation Protocol (SIP) message. Besides the QoS requirements in the SDP description,
the PCRF also examines the source and destination IP addresses and port numbers in
its decision-making. The PCRF refers to the policy rules, which are generally stored in
a policy repository, governing the local domain. It then generates an authorization token
that uniquely identifies the SIP session across multiple Packet Data Protocol (PDP) contexts
terminated by a GGSN. This token is sent to the UE via SIP messages so that the UE can
use it to identify the associated session flows to the PCEF in the GGSN in subsequent
transmission of IP packets. This mechanism is consistent with the IETF specification on
supporting media authorization in the SIP protocol [RFC3313]. The flow of events in
session set-up is described in Section 4.6.
PCEF in Gateway GPRS Support Node (GGSN)
In the PS domain, a GGSN maintains connectivity to other packet switched external
networks such as the Internet. From the service point of view, the GGSN controls which IP
flows are permitted into the external IP network by policing the IP packets based on their
source and destination IP addresses and port numbers [3G23228]. As such, it is logical to
embed the PCEF in the GGSN. The role of the PCEF is to ensure that only authorized IP
flows are allowed to use network resources that have been reserved and allocated to them.
The policy enforcement function in the GGSN is called a "gate". A gate comprises a packet
classifier, a traffic meter, and the relevant packet handling mechanisms for packets that
have been matched by the packet classifier. When an IP flow is authorized by the PCRF to
122
24 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
use the specified network resources, the PCEF opens the "gate" for the flow and effectively
commits the network resources to the flow by allowing it to pass through the packet
handling mechanisms (i.e., policing or marking). On the other hand, if an IP flow is not
permitted by the PCRF to use the requested resources, the PCEF closes the âĂIJgateâĂİ
and drops the IP packets of the flow. This process is called policy-based admission control.
It ensures that an IP flow is only allowed to use resources that have been approved by
the policy rules. The above process takes place at the IP bearer service (BS) level. The
translation/mapping function within the GGSN will map this resource information into
the format used by the admission control function at the UMTS BS level.
The PCEF may store decisions in a local policy decision point, thus allowing the GGSN to
make the admission control decisions without additional interactions with the PCRF. This
will reduce the traffic over the Gx interface and lessen the processing load on the PCRF.
on whether to grant or deny the required network resources to the session. As the signaling
messages used to set up the session take a different path from that used for the data flow,
an authorization token and a flow identifier are used to associate the session with its IP data
flow (UMTSGO01, 2001). The GGSN, which is located on the data path, relies on this binding
information to enforce the policy rules on the IP data flows.
Figure 11 depicts the sequence of events that take place during the establishment of an IP
multimedia service session. Note that a number of signaling messages have been omitted for
clarity. The events are described in the following paragraphs:
Steps 1-5: The UE sends a session set-up request (i.e., SIP INVITE) to the P-CSCF indicating,
among other things, the media streams to be used in the session. This message is routed
to the called party via a number of other CSCFs (viz., the caller and callee S-CSCFs) along
the signaling path. The S-CSCFs perform the appropriate session control services for the
UEs. In particular, they maintain a session state that is needed by the network operator to
support the requested service.
Steps 6-14: The called party responds with a provisional SIP 183 response message. This
message is routed to the calling party via the same CSCFs along the (reversed) signaling
path. When the callee P-CSCF receives this message, it examines the SDP description
within the message to determine the QoS parameters requested for the session. The
P-CSCF sends the necessary information in this SIP message (e.g., the bandwidth, IP
addresses and ports, etc.) to the PCRF for authorization of the session request. If the policy
permits, the PCRF responds with an authorization token that can be used to identify the
authorized session and resources. The P-CSCF includes the token in the response (SIP 183
message) and forwards it to the callerâĂŹs UE. A similar process is carried out at the caller
P-CSCF when it receives the SIP 183 message. This process of authorization by the PCRF
and the generation of a token is called "Authorize QoS Request".
Steps 15-22: In between steps 14 and 15, other message exchanges take place between the
caller and the callee. However, these are not important in this particular example and
are omitted for clarity. The caller’s UE starts the resource reservation by sending a
PDP Context Activation Request to the GGSN. The authorization token and the flow
identifier(s) from the PCRF are included to identify the IP data flow(s) of the session. When
the GGSN receives the PDP Context Activation Request, it sends a policy decision request
to the PCRF to determine whether the resource reservation request should be accepted.
The PCRF uses the token in the message to correlate the request for resources with the
media authorization previously granted to the session. The PCRF then sends a decision to
the GGSN. If the PCRF approves the resource reservation, the GGSN sends a PDP Context
Activation Response to the UE indicating that the resource reservation has been completed.
A similar process takes place at the callee’s end.
Steps 23-31: In between steps 22 and 23, there are other events, e.g., 180 Ringing, that take
place. These events are omitted to prevent cluttering Figure 3-22. When the callee answers
the call, a SIP 200 OK message is sent towards the caller. When the SIP 200 OK reaches the
P-CSCF, it will approve the QoS commitment by sending a decision to the GGSN. Upon
receiving this message, the GGSN opens the gate, thereby effectively permitting the IP data
flow to use the resources reserved previously. Once this is done, the GGSN responds to the
PCRF with a report on the status of the session. A similar process takes place at the caller’s
end. When this entire process is completed, the proper resources on the data path have
been reserved and committed to the session.
124
26 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
5. References
Nortel White Paper (2002). Benefits of Quality of Service (QoS) in 3G Wireless Internet, Nortel
Networks.
Sudhir Dixit, Yile Guo, Zoe Antoniou (2001). Resource management and quality of service
in third-generation wireless network, IEEE Communication Magazine, Feb. 2001,
pp.125-133.
Sotiris I. Maniatis, Eugenia G. Nikolouzou, & Iakovos S. Venieris (2002). QoS issues in the
converged 3G wireless and wired networks, IEEE Communications Magazine, Aug.
2002, pp.44-53.
3GPP TS 23.107 (V9.2.0) (2011). Quality of Service(QoS) Concept and architecture (Release 9).
End to Quality
End to End End ofQuality of Service
Service in UMTS Systems in UMTS Systems 125
27
Sensor Networks
0
6
1. Introduction
Wireless sensor networks (WSNs) are networks composed of small, resource-constrained and
collaborative devices. WSNs are used in a plethora of domains including environmental
and agricultural monitoring, military operations, in the health care field and in building
automation. The three main functions of wireless sensor nodes (also called motes) are to
sense the environment, perform computations, store intermediate results and communicate
with other motes in the network.
This chapter focuses on power considerations for all aspects of wireless sensor networks.
It covers software, hardware and networking aspects of the motes. The main limitation of
wireless sensor motes is that they operate on battery power. In many WSN applications,
the motes are placed in remote areas and deployed for the lifetime of the network. During
this time the only power resource the motes have access to is their battery. An example of
such a deployment is the Mount St. Helens project developed to study volcanic activities on
Mount St. Helens (were volcanic eruptions can occur at any time with very little warning).
The sensors were placed on the mountain using helicopters and work at length to continually
sense seismic activity and relay information to a data center. For such applications, the battery
lifetime is the main factor that dictates the lifetime of the network. It is therefore imperative
to develop wireless sensor mote platforms that minimize the power consumption and/or
maximize the lifetime of the network as a whole.
Several works in the literature address one or two aspects of the mote’s architecture and/or
functionality but to the authors’ knowledge, no work has combined all said aspects and
addressed them as a homogeneous unit. This chapter studies and analyzes each hardware
component of the mote’s architecture, all the main protocols used in the mote’s stack
layer, discusses the work that has been done in terms of reducing the power consumption,
increasing the battery lifetime and or increasing the lifetime of the entire network as a whole.
The chapter is organized as follows: Section 2 gives an overview of wireless sensor networks,
their applications and general architecture. Section 3 focuses on the hardware architecture
of the motes (the CPU, communication infrastructure, memory and sensors). Section 4
introduces the layered protocol stack of the sensor motes (application, transport, network,
link and physical layers). Section 5 summarizes the chapter and suggest paths forward.
130
2 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
2. Preliminaries
Wireless sensor networks are composed of small, inexpensive devices that are designed to
sense some phenomena, perform light computations and communicate with one another.
These devices are usually scattered over some area. This technology has seen a wide range of
applications ranging from military use to personal security. In the following, we discuss the
history of WSNs and some of their most pertinent applications.
Wireless sensor networks evolved form the Smartdust project, which was developed and
funded by DARPA in the late 1990s. The Smartdust project was designed to show that "a
complete sensor/communication system can be integrated into a cubic millimeter package"
(Pister, 2001). The Smartdust motes were engineered to be power efficient. This and other
similar projects have led to the explosion of research in the area of wireless Ad Hoc and sensor
networks, which was and still is heavily supported by US government agencies including
the National Science Foundation. While working on the Smartdust project, the researchers
recognized the variety of applications for their work both in the military field and elsewhere.
Some of the applications for the Smartdust projects are virtual keyboard, inventory control,
product quality monitoring and smart office spaces among others (Pister, 2001). In the virtual
keyboard application, dust motes would be glued into fingernails to sense the orientation
and motion of the fingertips and communicate with a computer. This could be used in sign
language translations, piano play, etc... In the inventory and quality control applications, a
system of communication could be implemented and deployed in all aspects of the production
process in order to monitor the location of the product and control and monitor its quality
(from temperature, to humidity exposure etc...). In the smart office spaces application, the
person’s preferred temperature, humidity settings could be directly communicated to the
environment they walk into. Some of the military applications that the Smartdust project
was developed for include battlefield surveillance, transportation monitoring and missile
monitoring.
In the past few year, Wireless Sensor Networks made the transition from the Berkeley
research centers to the production arena with the creation of companies, such as Crossbow
Technologies (Crossbow Technologies, n.d.) that started manufacturing them. The appeal of
Wireless Sensor Networks stems from the fact that you can deploy them and just leave. We
discuss in the remainder of this section the main classes of applications for the general WSNs.
WSN applications can be categorized into habitat and environmental monitoring, heath
applications, commercial applications, military applications among others.
One of the most prevalent uses of WSNs is in habitat and environmental monitoring. It
has been shown that direct human contact with some plant or animal colonies can result in
disastrous consequences. For example, (Mainwaring et al., 2002) describe the use of a sensor
network to monitor Seabird colonies because of their sensitivity to human disturbance. In
fact, a 15 minute visit to the colony could result in up to 20% rate of mortality among eggs.
Not only are WSNs useful in monitoring colonies without causing any disturbances but they
also represent a more economic method of monitoring for long periods of time.
Another example of the environmental use of WSNs is in forecasting systems. WSNs are
now scattered around large areas to forecast pollution, flooding and seismic activity. The
Automated Local Evaluation in Real Time (ALERT) was developed in the 70s by the National
Weather Service. It has been used by several government and state agencies and international
Power Considerations
Power Considerations for Sensor Networks
for Sensor Networks 1313
organizations to provide a real time data collection system that can forecast floods (ALERT,
n.d.).
Another use for WSNs is in intelligent building management. In fact, they have been used in
HVAC, lighting, climate control, fire protection, energy monitoring and security applications
among others. In Canada for example, the National Research Council launched a three-year
project to develop wireless sensor networks to do just that. The project started in 2008 and is
anticipated to continue through 2011.
A very important application of WSNs is in the healthcare field. WSNs can be used to provide
continuous, remote, inexpensive, instantaneous and non-invasive monitoring of a patient’s
vital signs. This technology can be used to allow the elderly to remain in their own residences
but still be able to continuously check their vitals.
All these WSN applications consist of deploying the network for an extended period of time
on a single battery charge. It is therefore imperative that the motes be power efficient and that
the lifetime of the network as a whole be as long as possible.
3.1 Sensors
Of the five main units, the sensing unit is the most application specific. Meaning the type
of sensor used will depend on the application. For instance, wireless sensors used for
structural health monitoring may consist of materials apt for monitoring strain, acceleration
(accelerometer) and linear and angular displacement. Other application specific sensors may
measure, vehicular movement, soil consistency, blood alcohol levels, humidity, noise levels
and so on. These sensors should then report some signal indicative of their acquisition.
Temperature (thermo-coupler outputting voltage or thermistor outputting resistance), force or
pressure (piezoelectric outputting voltage, strain gauge outputting resistance), position (linear
variable differential transformers (LVDT) outputting alternating current) or light intensity
(photodiode outputting current) all need to report information regarding their surroundings
to a processing unit (Wilson, 2004).
132
4 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
The development of an efficient method for acquiring and converting conventional energy
from the sensors such as solar and wind has seen an exponential growth over the last few
years. The sensing development has been referred to as energy harvesting. One factor
contributing to the enjoyment of such an increase has been the threat of rapid decreases
projected in our global and national energy reserves based on utilization rates and trends.
Such a premonition has spurred funding for research in various fields including materials or
more specifically metamaterials.
Metamaterials have been defined by most associated scientist as materials made by man
which exhibit non-natural properties and characteristics, particularly EM or electromagnetic
properties not known to exist with any other materials found in nature. Regarding
electromagnetism, metamaterials which exhibit propagating electromagnetic waves (both the
permittivity and permeability are negative as seen in Figure 1 have seen much attention in
recent years as well as when both permittivity and permeability are very close to 1.
Fig. 1. The parameter space for and μ. The two axes correspond to the real parts of
permittivity and permeability, respectively. The dashed green line represents non-magnetic
materials with μ = 1 Cai &shaleav (2010).
The reaction or response of a material (as in a sensor for WSNs) to external fields is largely
determined by only the two material parameters and μ, permittivity and permeability
respectively. As shown in Figure 2, the real part of permittivity r is plotted to the horizontal
axis of the parameter space, while the vertical axis corresponds to the real part of permeability
μr . A negative value of (μ) indicates that the direction of the electric (magnetic) field
induced inside the material is in the opposite direction to the inbound incident field. Noble
metals at optical frequencies, for example, are materials with negative , and negative μ and
can be found in ferromagnetic media near a resonance. Waves can not propagate in material in
the second and fourth quadrants, where one of the two parameters is negative and the index
of refraction becomes purely imaginary. In the domain of optics, all conventional materials
are confined to an extremely narrow zone around a horizontal line at μ = 1 in the space, as
represented by the dashed line in Figure 2.
Scores of such materials are designed to manipulate EM waves, many passively, by creating
an alternate propagation path. Metamaterials have been designed to redirect, not absorb or
Power Considerations
Power Considerations for Sensor Networks
for Sensor Networks 1335
reflect but to divert the energy through a desired path. It is no wonder as to the attention
metamaterials have seen for energy harvesting. Research is currently being conducted to
develop sensors (both photon and electron based) that extract atmospheric energy regardless
of the incident angle such that no energy is reflected back out of the sensor rather, it’s reflected
down toward the detector. This will lead to the creation of ultra-efficient sensors for wireless
networks, see (Narimanov & Kildishev, 2009; Shalaev et al., 2005) for more information on
Metamaterials.
3.2 Microcontroller
The component responsible for doing the bulk of the switching and decision making
for the WSN at the remote site is the processor or microcontroller. When selecting the
processor for specific WSN applications, the engineer must make many considerations. These
considerations include, but are not limited to, cost, power requirements, physical size, weight
and speed, some of which are elaborated upon below.
Depending on the microcontroller, the power requirement could range from .25 mA to 2.5 mA
per MHz for either 8 or 16 bit processors. Again, the application will determine if a processor
consuming relatively high amounts of energy is acceptable or if .25 mA per MHz is needed.
A common misconception is that by putting the processor in "sleep" mode, the sensor utilizes
less power thus is more efficient. It has been shown that this is not always true as while in
"sleep mode", sensors still maintain synchronization and memory functionalities necessary to
perform expeditiously upon awakening (Hu & Cao, 2010).
In fact a more prudent approach to saving energy would include completely shutting the
processor off, entirely, and ensuring the sensor can rapidly recover from a "dead" state or at
the very least rapidly jump from "sleep" mode to "awake" mode. As the processor needs to
synchronize native clocks and stabilize, the transition time or delay can be as long as 10 ms
which is a relative eternity. Another parallel approach involves varying the speed depending
on the time allotted for a specific task.
In other words, only using the minimum power required for a task at a given time by
dynamically ramping up or down the power accordingly versus drawing full power for all
"awake" states. This approach may benefit from an algorithm in which the speed is a function
of the power. If the required task and itÕs effort expended is known before the task is given,
an absolute "finish time" can be maintained without necessarily completing the task as fast
134
6 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
a possible rather as fast as necessary. Researchers from the University of California, Irvine
(Irani et al., 2007) developed an algorithm for optimizing power consumption by varying
speed below:
where g(z,z’) defines the intensity of the interval [z,z’], l[z,z’] defines the length of the interval,
R j is the required work needed to complete the job and d j denotes the deadline for job j. This
would allow energy and speed to be spent where it’s needed most creating a dynamic fluid
speed variance throughout the CPU for maximum overall efficiency. One might say, ’losing a
battle here and there but winning the war’.
3.3 Memory
Memory is a crucial factor in WSNs. Particularly non-volatile memory. Non- volatile
memory is defined as various forms of solid state memory which doesn’t need to be
refreshed or powered to maintain it’s information. Examples include flash, electrically
erasable programmable read-only memory (PROM) read only memory (ROM), optical discs
and magnetic disks (Postolache et al., 2010).
The memory component is the means at which the WSN stores the data it acquires. The
speed requirement of the memory unit depends of the nature of the WSN and its intended
functionality. A rather fast memory unit may be required for certain military applications
where the data acquisition speed from the memory may dictate whether or not a target is
detected in time for acquisition and lock. On the other hand, a relatively slow memory unit
may be acceptable for soil monitoring WSN utilized by farmers. In either case the security and
reliability of the memory unit is important and both require additional power demands on
the WSN. To this end, researchers have been developing ways to more efficiently processing
and storing the acquired data including virtual memory protocols. Virtual memory has been
shown to reduce compile-time optimizations regardless of the limitations in memory on site.
One approach which generates a memory layout optimizes to the memory access patterns and
attributes for a given WSN. In other words, the protocol optimizes the memory map based on
the application, effectively reducing overhead (Lachenmann et al., 2007).
Within the TR package, a typical TR module will consist of and follow this RF path
for transmission: a common attenuator for signal suppression, a common phase shifter
(depending on the application. For example, phase shifter could be used to shape the
transmission pattern or radiation pattern leaving a WSN (also known as beam-steering), a
driver and a high power amplifier (HPA) to boost the signal amplitude for propagation from
the aperture or antenna for transmission. When receiving a signal within the TR module
frequency range, which varies per application, the signal passes through a limiting filter
and low noise amplifier (LNA) before coursing through a common attenuator to suppress
the signal’s magnitude and possibly a common phase shifter (depending on the application.
For example the phase shifter can be utilized as a directional finder or filter for incident
signal in a WSN). Outbound and incident signals are typically discerned by a circulator at
the output/input of the module. The attenuator and phase shifters are termed "common"
due to the fact that these components are used for both reception and transmission. In the
following, we elaborate on a few of the key components of the TR module from Figure 3.
The attenuator is implemented to ensure the unwanted side-lobes are suppressed, sufficiently
reducing the noise in the system. It also keeps the amplifiers down stream from prematurely
reaching saturation and causing unwanted non-linearities. Typically this is done only for the
receiver as during transmissions, it is usually desirable to propagate as much energy from the
antenna as possible. Since the attenuator basically performs the exact opposite function of
the amplifier, they are typically not conjoined in series unless, in some cases, it’s needed for
filtering purposes. Note that all the components within the TR module are frequency matched
meaning they are optimized for specific frequency ranges. Due to this inherent characteristic,
attenuators can be used to suppress frequency bands without distorting the fundamental
waveform. This is important for the energy efficiency of the system as the modulator can
maintain relative simplicity without the need to effectively recreate a waveform which would
subsequently cost more power.
The phase shifter allows multiple RF signals to be controlled by way of an external stimulation
such that the output of the phase shifter is of the desired phase without effecting the frequency.
The phase shifter may or may not be present in the TR module. It depends on whether or not
the WSN calls for a beam-forming or shaping capability which can aid in power efficiency if
multiple sensors are synchronized in receive and or transmission mode for power/amplitude
coupling. The amplifiers (driver and high power amplifiers) boost the signal for transmission
from the antenna. The level of amplification needed depends on the efficiency of the system,
particularly the aperture or antenna. A poorly matched antenna or one which has a high
Voltage Standing Wave Ratio (VSWR) will demand a higher amplitude or stronger signal to
propagate to a given target.
The application and placement availability of WSN will greatly affect which antenna is more
suitable and efficient. Most WSN antennas are omni-directional fundamentally but are shaped
by various ground effects. This crucial aspect of antenna propagation has prompted many
researchers to develop accurate prediction models specifically for WSNs.
Fig. 3. Transceiver
the WSN is inoperable. For many applications various protocols for maximizing the lifetime
of the WSN are adequate while many other applications require WSNs to remain in remote
areas for several months or years without opportunities for manual power replenishment.
Many research centers have developed models to efficiently harvest energy for power as
for sensing previously mentioned. A WSN which can obtain its power requirements from
its surrounding environment essentially has an infinite lifetime. Various approaches from
mechanical vibrational energy harvesting to photon collection schemes are being considered
in an effort to self-generate power needs.
Fig. 4. A low power wireless sensor node system powered from energy scavengers or
harvesters and a battery. Guilar et al. (2006).
Figure 4 is a schematic of a low power WSN system that uses energy scavengers. In Figure 4,
the energy sources are labeled Vsolar, Vvibe and Vbat for the solar, mechanical vibration and
battery, respectively. A mutiplexer switches between the unregulated energy sources. ADC
denotes the Analog to digital converter, DSP denotes the Digital signal processors and RF
denotes Radio frequency.
Power Considerations
Power Considerations for Sensor Networks
for Sensor Networks 1379
Inference methods consist of making a decision based on previous knowledge. Protocols that
have been proposed for inference include Bayesian inference algorithms (Coue et al., 2002;
Tsymbal et al., 2003), Dempster-Shafer inference algorithms (Dempster, 1968; Shafer, 1976)
and fussy logic algorithms (Gupta et al., 2005) among others.
Estimation methods use probabilistic theory to estimate a state based on a sequence of
measurements. Estimation algorithms include the maximum likelihood algorithm (Xiao et
al., 2005), least square, Kalman filter and particle filter (Kalman, 1960).
Data aggregation methods are used to overcome implosion and overlap and compression
is used to reduce the amount of data by exploiting spatial correlation among the motes.
Techniques for compression include distributed source coding (Xiong et al., 2004) and coding
by ordering (Petriovic et al., 2003).
The implementation of these algorithms comes at a cost involving hardware complexity, CPU
time and energy.
in NTP, clients synchronize their clocks to the server and servers are synchronized to using
external time sources (using a GPS). NTP is not suitable for WSNs for a number of reasons.
First, NTP is centralized. 2. In WSNs, it is impossible to accurately estimate the roundtrip
time. 3. GPS is too expensive to use or is not an option for most WSN applications (for
example, indoor applications will not have access to GPS signal).
Most time synchronization protocols are sender to receiver. The sender time stamps a packet
and the receiver extract the time stamp and tries to extrapolate its clock drift compared to
the sender (Romer, 2001), (Ganeriwal et al., 2003). However, the Reference Broadcast Scheme
(RBS) (Elson et al., 2002) is different. It is a receiver-to-receiver synchronization protocol. In
RBS, a sender broadcasts a beacon without any time information. The receivers then exchange
Acknowledgement messages with the time they received the beacon. Receivers can then
extrapolate their own clock drift relative to each other. RBS works with two receivers and is
easily extended to more than two receivers. In addition, increasing the number of broadcasts
increases the accuracy of the scheme. Note that in RBS, the uncertainty of access time is
removed (since the sender is removed from the drift calculations) and since the propagation
time is assumed to be negligible in WSNs, the only uncertainty factor and potential error
margin in this protocol is the receive time.
The Timing sync Protocol for Sensor Networks (TPSN) (Romer, 2001), (Ganeriwal et al., 2003)
is a sender-receiver protocol. In TPSN, the sender sends a packet to a receiver, which uses
the TPSN equation to extract its local clock drift compared to the sender. TPSN then uses a
tree hierarchy to propagate the synchronization, it categorizes the nodes in the network into
levels during the discovery phase. During the synchronization phase, the root node (level
0) synchronizes all level 1 nodes. After this first phase of synchronization, level 1 nodes
synchronize level 2 nodes and so on, until synchronization has been propagated through the
entire network. TPSN achieves better accuracy than RBS when using MAC layer time stamps
because RBS is limited by the transmission range and would require more beacons in order to
perform synchronization.
In (Greunen & Rabaey, 2003), the authors claim that most sensor network applications
do not require very precise synchronization. In fact, they claim that most applications
only require synchronization in the order of a fraction of a second. The authors therefore
propose a different approach where the required accuracy is taken as a constraint and then a
synchronization algorithm with minimal complexity is devised so that the requested accuracy
can be achieved. In this work, the synchronization is propagated in a centralized manner
where a spanning tree is created and synchronization is conducted along the edges of the tree.
Centralized approaches to time synchronization are not energy efficient and often result
in depleting the energy reserves of the root node. The authors in (Maroti et al., 2004)
propose the Flooding Time Synchronization Protocol (FTSP). FTSP uses periodic flooding of
synchronization messages. This approach makes the algorithm de-centralized, scalable and
topology independent. In FTSP, the synchronization root is elected dynamically and re-elected
periodically. The root is responsible for keeping the global time of the network. In this
work, the nodes form a dynamic mesh like structure to propagate the time synchronization
throughout the network (unlike TPSN). This work saves on the energy required to create
an initial spanning tree (as in TPSN) and is therefore more energy efficient than TPSN. In
addition, this protocol is not topology dependent and can perform synchronization even when
140
12 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
the topology of the network changes. However, the synchronization error in FTSP can grow
exponentially with the size of the network (Lenzen et al., 2009).
Similar to FTP, the Novel Algorithm for Time Synchronization (NATS) is a decentralized
time synchronization protocol. Unlike FTSP, NATS is a receiver-sender protocol because the
receiver requests synchronization from the sender. This reduces the amount of messages
exchanged for the purpose of time synchronization and therefore, reduces the amount of
energy consumed during synchronization. NATS was designed at DePauw University by
Peter Terlep 1 , Steven Klaback 2 and Khadija Stewart. NATS does not need to meet
any specific topology prerequisites, it can adjust to topology changes. It accomplishes the
following: 1) it does not need a third party device that is within radio communication range
of all motes, 2) it does not need any one mote to be within range of all motes, 3) it is scalable, 4)
it allows for deep sleep between synchronization activities, 5) it handles receiver-side medium
access control (MAC) buffer latency uncertainty, 6) it addresses the inability to acquire a
real-time sender-side MAC timestamp, 7) and it uses a distributed energy efficient algorithm
for multi-hop synchronization.
Pair-wise synchronization in NATS starts when the root node receives a sync request. The root
then sends two consecutive packets to the requesting node, each containing a timestamp at
the MAC layer. The receiving node uses these two packets along with its receive time stamp
to extrapolate the propagation and channel access times. It uses that information to estimate
its clock drift from the root node. Time synchronization is then propagated throughout the
network in a distributed manner, similar to FTSP, by having each synched node act as a
potential root node for synchronization. Experimental results show that NATS provides better
synchronization accuracy than TPSN. In fact, using the Sun Spots platform, the Mean Sync
Error for NATS was 1.74ms versus 2.63ms for TPSN.
The Gradient Time Synchronization Protocol (GTSP) is completely distributed (Sommer &
Wattenhofer, 2009), where the nodes periodically broadcast synchronization beacons to their
neighbors and agree on a common clock. It is proven that after multiple beacon exchanges, the
clock of the nodes converges to a common value. This algorithm is completely distributed and
nodes only exchange beacons locally. GTSP is proven to achieve better time synchronization
accuracy as compared to tree-based methods.
In PulseSync (Lenzen et al., 2009), the root node floods a "pulse" through the network in
a breadth-first search tree manner. The nodes receiving the pulse then compensate for the
drift relative to the root node. The authors note that the flooding of the pulse needs to be
scheduled in order to avoid collisions. This protocol is proven to be accurate when used
in sensor network applications where the topology does not change. In fact, it is proven to
outperform FTSP by a factor of 5 on mid-size networks.
The authors in (Li et al., 2011), propose a new direction in time synchronization where the
Radio Data System (RDS) of FM radios is used to synchronize the nodes’ clocks. In this work,
each node is equipped with an FM receiver and programmed to receive the same RDS signal.
The mote’s clock then uses a calibration component to calibrate itself to the RDS clock. The
drawbacks of this method stem from the fact that the FM interface is not power efficient and
that not all WSN applications can have access to FM signals especially for the applications
deployed in remote areas.
In summary, in order for a time synchronization protocol to be appropriate for a wide range
of WSN application, it needs to accurately compute the clock drifts, be distributed, scalable,
adapt to any topology and be able to propagate the synchronization instantaneously and
without flooding the network.
In (Watteyne & Richichi, 2010), the authors define a set of criteria that routing protocols
must possess for routing in low-power and lossy networks. These criteria consist of
satisfactory performance in: 1. Routing state. 2. Loss response. 3. Control cost. 4.
Link cost. 5. Node cost. The authors then conclude that none of the mature IETF
protocols, that were developed for MANETs, fulfill those requirements. The protocols
examined in this work are: OSPF (RFC2328, n.d.), IS-IS (RFC1142, n.d.), OLSR (RFC3626,
n.d.), OLSRv2 (draft-ietf-manet-olsrv2-12, n.d.), TBRPF (RFC3684, n.d.), RIP (RFC2453, n.d.),
AODV (RFC3561, n.d.), DYMO (draft-ietf-manet-dymo-mib-04, n.d.), DSR (RFC4728, n.d.),
IPv6 Neighbor Discovery (RFC4861, n.d.) and MANET-NHDP (draft-ietf-manet-nhdp-15,
n.d.). In (Watteyne & Richichi, 2010), the authors suggest that a new protocol specification
document needs to be created for routing in low-power and lossy networks. The discussion
in (Watteyne & Richichi, 2010) was limited to mature and well documented IETF protocols,
in the remaining of this section, we examine "energy aware" routing protocols designed for
wireless sensor networks that have not been included in this review.
Routing algorithms with energy considerations aim to either minimize the energy
consumption of the networks as a whole or increase the lifetime of the network. Protocols
that attempt to minimize the energy consumption of the network usually compute and use
the shortest paths in the network. As a consequence, a few select motes are usually overused
and their energy reserve is depleted earlier than the rest of the motes. This could result in the
network becoming partitioned and could therefore end its useful lifetime prematurely.
Most applications of WSNs are deployed in remote areas and are scheduled to monitor the
area for long periods of time. In this case, extending the useful lifetime of the network is
of at most importance. The concept of ’lifetime of the network’ is difficult to define in WSNs
(Dietrick & Dressler, 2009). For practical purposes, we define the useful lifetime of the network
as: ’The total amount of time that the network is able to do useful work’. If for example the
purpose of the network is to record sensor readings from ten different areas for as long as
possible, the useful (operational or functional) lifetime of the network will be the total amount
of time that at least one sensor is functional in each of the ten different areas and that there
exists a path between each of those senors to the sink, i.e., those sensor motes are able to relay
their readings to the sink. The useful lifetime of the network is therefore application specific
and a uniform definition may not apply to all types of WSN applications.
The shortcomings of the broadcast-based protocols have led to the design of data-centric
routing mechanisms. One of the earliest works on this type of protocols is SPINS (Heinzelman
et al., 1999) where the data is named using high-level descriptors (meta-data). In this case,
sensors exchange meta-data. The protocol relies on three types of messages: 1. ADV message,
which is used to advertise particular meta-data, 2. REQ message used to request specific
data, and 2. DATA message used to deliver the actual data. Spins achieves significant
energy savings over traditional broadcast-based protocols (a factor of 3.5) and reduces the data
redundancy in half. However, Spins does not guarantee the delivery of data to the requesting
node, which makes this protocol unpractical for several applications of WSNs (Akkaya &
Younis, 2003).
In data-centric routing algorithms, regions of sensors are queried to send their sensed readings
to the sink. Because of the redundancy in sensors in each region, the data needs to be
aggregated before it is forwarded to the sink. Several algorithms have been proposed to
perform data aggregation to disregard the redundant information. Sensor Protocols for
Power Considerations
Power Considerations for Sensor Networks
for Sensor Networks 143
15
Information via Negotiation (SPIN) (Kulik, 1999) was the first work to suggest eliminating
redundant information to save energy. Later, a series of protocols that use directed diffusion
were proposed (Intanagonwiwat et al., 2000), (Braginsky & Estin, 2002), (Schurgers &
Srivastava, 2001), (Chu et al., 2002).
An important step in routing in wireless sensor networks was the creation of routing
algorithms based on directed diffusion, the first introduction is described in (Intanagonwiwat
et al., 2000). In directed diffusion, a node sends a query for some particular data (data here
is identified using an attribute-value pair). As a result, data matching the query description
is "drawn" towards the querying node. The data can be aggregated by intermediate nodes
and all the communication is only neighbor-to-neighbor. These types of algorithms achieve
significant energy savings over the traditional broadcast-based algorithms. Despite the energy
saving properties of the directed diffusion algorithms, they are not suitable for all sensor
network applications. Some sensor network applications require continuous data flow from
the sensors to the sink, as a consequence, query based algorithms will not be suitable for such
applications since the sink would need to continuously query each sensor for data (Akkaya &
Younis, 2003).
An alternate way of relaying information in WSNs, other than flooding, is gossiping
(Kyasanur et al., 2006). In gossiping, the source node selects a random neighbor and forwards
the data to them. The process continues until the destination is reached or a maximum number
of hops is achieved. Similar to flooding protocols, gossiping protocols also waste energy by
sending messages by sensors that cover overlapping areas. In addition, gossiping algorithms
can suffer from excessive delays because the next hop node is selected randomly.
An improvement to the traditional gossiping protocols is the location-based protocols. In
these protocols, location information is used to direct the routing in order to reduce the
number of transmissions and therefore save energy. One such protocol is SPEED (He et al.,
2002). This protocol uses a combination of feedback control and non-deterministic geographic
forwarding to provide real-time unicast, area-multicast and real-time area-anycast.
In (Li et al., 2001), the authors propose an energy saving routing scheme called the adaptive
max-minzPmin scheme. This routing algorithm selects a route that maximizes the minimum
residual energy as long as it consumes no more than zPmin energy (Pmin energy is he
amount of energy consumed by the minimum-energy route). This algorithm also computes
the minimum node lifetime of the network and adjusts its routing criterion accordingly. While
this method is hard to implement (keeping track of the lifetime of the nodes in a central
location), it is more practical for ad hoc networks than it is for sensor networks.
Another family of protocols is the hierarchical routing protocols. The main purpose of creating
a hierarchy within a sensor network is to achieve scalability, i.e., the network performance
should decrease slowly in response to an increase in the network size. The main form of
hierarchical routing in WSNs is clustering, which consists of organizing the nodes into clusters
where each cluster has a cluster head. The cluster head is then in charge of performing data
aggregation or forward the packets on to the next hop. This leads to a smaller amount of data
being transmitted to the sink, which intrinsically saves energy.
One of the first clustering protocols, LEACH is described in (Heinzelman et al., 2000). LEACH
randomly rotates the head cluster in order to balance the energy consumption amongst the
nodes in the cluster and uses data fusion in order to reduce the amount of data sent to the sink.
144
16 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
prevention mechanisms. In the rest of this Section, we study the main MAC layer protocols
that are proposed in the literature and analyze their power-saving properties.
In this work, we consider energy efficiency to be the most important attribute in a MAC
protocol. Other important attributes for a MAC protocol consist of providing fair and efficient
access to the medium, scalability and adaptability to change.
Most ad hoc network and WSN applications require the network to be deployed for an
extended period of time. During their deployment, the motes are programmed to sense
the environment and relay sensor readings to the sink. Several MAC protocols have been
proposed for these applications where the motes are periodically scheduled to be in a
power-saving state (a sleep state or an off state) in order to save their battery power and extend
their deployment lifetime, see (Singh & Raghavendra, 1998; Stewart & Tragoudas, 2007; Ye et
al., 2004) among others.
PAMAS (Singh & Raghavendra, 1998) is a MAC protocol based on RTS/CTS. PAMAS
schedules sleep intervals for sensor nodes to avoid overhearing and uses separate channels
for data and control frames. In PAMAS, nodes probe their neighbors for transmission time in
order to avoid collision as well. PAMAS reduces energy consumption by avoiding collision
and transmission overhearing at the expense of increased hardware complexity, which in turn
affects the power consumption.
The S-MAC (Ye et al., 2004) protocol reduces the energy consumption of the nodes by
implementing the following mechanisms. First, it reduces idle listening by scheduling sleep
intervals for nodes, in fact, S-MAC coordinates sleep intervals amongst neighboring nodes.
Second, it divides long messages into smaller packets and transmits them back to back. As
a result, nodes with longer messages occupy the wireless medium for longer periods of
time. The authors show that this seemingly "unfair" advantage results in energy savings
over traditional "fair" methods. Third, it implements a low-duty-cycle that reduces idle
listening. Finally, it uses in-channel signaling to reduce overhearing by extending the work
from PAMAS (Singh & Raghavendra, 1998).
S-MAC’s mechanisms do reduce energy consumption at the expense of increased message
latency. However, the predefined sleep intervals limit the flexibility of the protocol and the
broadcast mechanism increases the probability for collision because S-MAC does not use
RTS/CTS (Demirkol et al., 2006).
TMAC (Van & Langendoen, 2003) is similar to SMAC except that each node is equipped with
a timer. In TMAC, a node is put on the low-power/sleep state if it does not transmit or receive
for the entire duration of the timeout period. TMAC performs significantly better than S-MAC
under variable load.
In WiseMAC (El-Hoiydi & Decotignie, 2004), the authors propose a downlink (to be used
when the sink transmits packets to sensors). WiseMAC uses non-persistent CSMA (np-CSMA)
with preamble sampling in order to decrease idle listening. In this case, a preamble is used
to alert the receiving node that a data packet is on its way. The preamble precedes each data
packets. All the nodes in the medium listen to the medium for a constant time interval referred
to as the sampling period. If a node hears a transmission while it is listening to the medium,
it will continue to listen until it receives a frame or until the medium becomes idle. The sink
precedes each data frame with a preamble sequence that is equal to the sampling period. This
guarantees that the receiving node will be able to detect the transmission. On the downside,
146
18 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
the long preamble sequence results in a low throughput and in increase power consumption.
In addition, all the nodes within wireless range of the receiving node are able to hear the
transmission. WiseMAC proposes an improvement to this where the sink takes advantage of
knowing the sampling schedule of the nodes. The sink therefore, sends a smaller preamble
and a frame right when the receiving node is scheduled to start sampling the medium.
WiseMAC suffers from two main drawbacks (Demirkol et al., 2006). The first drawback results
from its decentralized sleep schedule where nodes wake up from their sleep cycle at different
times. This is inefficient when broadcast communication is used because the broadcasted
frames would need to be stored at the neighbors who are awake and end up being transmitted
multiple times. The second drawback of the protocol is the fact that it is vulnerable to the
hidden terminal problem where collision can happen at a node if it receives transmissions
from two nodes that are not within transmission range of each other (Note that this is not a
problem if WiseMAC is only used as a downlink protocol)
TRAMA (Rajendran et al., 2003) is a collision-free TDMA based MAC protocol for sensor
networks. TRAMA ensures energy efficiency by avoiding collision during unicast, multicast
and broadcast transmissions. In addition, in TRAMA, nodes can switch to a low-power state
whenever they are not transmitting or receiving frames to save energy. In TRAMA, a node
is elected to transmit within a two-hop neighborhood during each time slot. This mechanism
avoids the hidden terminal problem.
TRAMA achieves significant energy savings due to: 1. the increased amount of low-power
states, 2. the decreased amount of communication since the receiving nodes are indicated
a priori, and 3. the significant decrease in collision probability. However, the latency when
using TRAMA is longer compared to CSMA as a result of the high percentage of sleep time
(Demirkol et al., 2006).
Berkeley MAC (B-MAC) (Polastre et al., 2004) is a low frills protocol based on clear channel
assessment, it uses low power listening with preamble sampling. The default mode in
B-MAC does not include a mechanism to avoid the hidden terminal problem, which could
be implemented by higher layers if needed. B-MAC achieves significant energy savings when
varying check time, by making the preamble constant and setting the sample rate. However,
since the protocol is bare-bone, additional features would have to be implemented at higher
layers when needed, which increases the complexity of the system as a whole.
Even though multiple MAC layer protocols provide adequate performance, no single protocol
has been chosen as a standard. This is due to the fact that some protocols perform better
than others for particular applications, communication pattern, network infrastructures and
or network densities. An ideal energy efficient MAC layer protocol for WSNs would use a
local schedule for motes to turn to the low-power/off state as a function of their residual
energy as well as their sensing schedule. The schedule should aim to maximize the sleep time
of the motes while preserving their sensing schedule, local connectivity and balancing their
energy levels in order to increase the lifetime of the network as a whole.
is charged with designing a physical layer, propagation effects due to the ambient conditions
must be considered.
6. References
Kemal Akkaya and Mohamed Younis, A Survey on Routing Protocols for Wireless Sensor
Networks. Elsevier journal of Ad Hoc Networks, Volume 3, pages 325-349.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, Wireless sensor networks: a survey.
Elsevier Computer Networks, Volume 38, pages 393-422, 2002.
ALERT, www.alertsystems.org
S. Basagni, M. Conti, S. Giordano, Iv. Stojmenovic, Chapter 11: Energy-efficient Communication
in ad hoc Wireless Networks. Mobile ad hoc networking, Wiley-IEEE Press, 2004.
Bontempi, G., and Le Borgne, Y. (2005). An adaptive modular approach to the mining of sensor
network data. In Workshop on Data Mining in Sensor Networks, SIAM SDM, Newport
Beach, CA, USA, April.
D. Braginsky and D. Estin, Rumor routing algorithm for sensor networks. Proceedings of the
first workshop on Sensor Networks and Applications (WSNA), Atlanta, GA, October
2002.
Wenshan Cai, and Vladmir Shalaev, Optical Metamatrials: Fundamentals and Applications.
Springer, 2010.
M. Chu, H. Haussecker, and F. Zhao, Scalable Information-Driven Sensor Querying and
Routing for ad hoc Heterogeneous Sensor Networks. The International Journal of High
Performance Computing Applications, Vol. 16, No. 3, August 2002.
C. Coue, T. Franichard, P. Bessiere, and E. Mazer, Multi-sensor data fusion using Bayesian
programming: An automotive application. Proceedings of the IEEE/RSJ International
Coference on Intelligent Robots and Systems. Vol. 1, Lausanne, Switzerland, pages
141-146.
148
20 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
1. Introduction
Wireless Sensor Networks (WSNs) are an interesting field of research because of their
numerous applications and the possibility of integrating them into more complex network
systems. The difficulties encountered in WSN design usually relate either to their stringent
constraints, which include energy, bandwidth, memory and computational capabilities, or to
the requirements of the particular application. As WSN design problems become more and
more challenging, advances in the areas of Operations Research (OR) and Optimization are
becoming increasingly useful in addressing them.
This study is concerned with topics relating to network design (including coverage, topology
and power control, the medium access mechanism and the duty cycle) and to routing in
WSN. The optimization problems encountered in these areas are affected simultaneously
by different parameters pertaining to the physical, Medium Access Control (MAC), routing
and application layers of the protocol stack. The goal of this study is to identify a number
of different network problems, and for each of these network problems to examine the
underlying optimization problem. In each case we begin by presenting the basic version
of the network problem and extend it by introducing new constraints. These constraints
result mainly from technological advances and from additional requirements present in WSN
applications. For all the network problems discussed here a wide range of algorithms
and protocols are to be found in the literature. We cite only some of these, since we are
concerned more with the network optimization problem itself, together with its different
versions, than with a state of art of methods for solving it. Moreover, the cited methods
have originated in a variety of disciplines, with approaches ranging from the deterministic
to the opportunistic, including computational geometry, linear, nonlinear and dynamic
programming, metaheuristics and heuristics, game theory, and so on. We go on to discuss
the complexity inherent in different optimization problems, in order to give some hints to
WSN designers facing new but similar scenarios. We try to highlight distributed solutions
and information that is required to implement these schemes. For each topic the general
presentation scheme is as follows:
i) Present the network problem
ii) Identify the relevant optimization problem
154
2 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
max cx (1)
Ax ≤ b (2)
x≥0 (3)
Review of Optimization
Review of Optimization Problems
Problems in Wireless in Wireless Sensor Networks
Sensor Networks 1553
where A is a matrix, b and c are vectors giving respectively the right-hand terms and the
cost coefficients, and x is the decision variable vector.
In cases where some decision variables have integer values while others have continuous
values we refer to the problem as Mixed Integer Linear Programming. If, on the other hand,
the vector x contains only integer values, then we have a case of Integer Linear Programming
(ILP). Note that the difficulty of the problem increases when we are dealing with ILP rather
than LP, since ILP problems are commonly NP-hard. The most frequently used algorithms
for solving LP problems are Simplex and Interior Points methods (Dantzig, 1963;
Karmarkar, 1984), whereas for ILP problems there are Branch-and-Bound, Branch-and-Cut
and Cutting Planes methods. Besides maximizing/minimizing an objective function, LP
can be adapted so that it also guarantees fairness. In this case the objective function
becomes a max-min (or min-max) objective function. In WSN we may often encounter
network problems modeled according to this structure. It also happens that in some
networks modeled by LP the number of variables is infinite or finite but huge, making
an explicit enumeration impossible. In these cases the problem is solved iteratively. At
each iteration new variables that potentially would lead to better solutions are generated
by a method called column generation. The problem is solved when no new variables can
be generated. Finally, when the objective function, or at least one of the constraints, is a
nonlinear function, the problem becomes a nonlinear programming problem. In this type
of problem the nature of the objective function is very important. If it is a convex function,
then the problem is a nonlinear convex programming problem, where the best-known
techniques include subgradient and Lagrangian decomposition (Kuhn, 1951; Shor, 1985).
The above linear programming problems can be solved using a commercial solver such as
CPLEX, Xpress-MP, etc. For nonlinear nonconvex programming the optimization becomes
difficult and the solution methods less tractable. Another method worth citing is Dynamic
programming (Bellman, 1957). This is a sequential approach where the decisions are taken
optimally, step-by-step, until the complete solution has been constructed. This method
works for problems that can be divided into subproblems that are simpler to solve and
whose solutions will produce the global solution.
2. Heuristic methods are an important class of solution methods for practical optimization
problems in WSN exhibiting high computational complexity. These approaches are
intended to quickly provide near-optimal solutions to difficult optimization problems that
cannot be solved exactly. Their advantages include easy implementation, rapidly-obtained
solutions and robustness to variations in problem characteristics. However, in most cases
they cannot guarantee the quality of the solution produced. Heuristic methods include
local improvement methods that perform searches within the neighborhood of a feasible
solution to the problem, and improve/construct the solution step by step by taking the
best local optimal decision at each step. The main danger here is getting trapped at a local
optimum, and to overcome this danger these methods may be combined with random
approaches, multi-start approaches, and so on.
Similarly, metaheuristics are very general approaches used to guide other methods or
procedures towards achieving reasonable solutions. Metaheuristics aim at reducing the
search space and avoiding local optima. Most metaheuristics are life-inspired approaches
such as Tabu Search (Glover, 1989), Evolutionary/Genetic algorithms (EA/GA) (Holland,
1975), Memetic algorithms (Moscato, 1999), Ant Colony Optimization (ACO) (Dorigo et al.,
1996), and Particle Swarm Optimization (PSO) (Kennedy & Eberhart, 1995). Tabu Search
starts with one feasible solution and constructs its neighborhood out of members that
156
4 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
are obtained by permuting the elements of the feasible solution. The objective function
is next calculated for each member of the neighborhood and the best one is selected.
The process is then repeated but with the newly selected member as the starting point.
An important element in this algorithm is loop-avoidance, meaning that it must not
return to a solution that has been already processed, and for this reason all the forbidden
movements are saved in a tabu list. In evolutionary or genetic algorithms the solutions of
the problem are called individuals. A relatively small set of individuals selected within the
enormous search space of the optimization problem are chosen to form the population. The
population evolves during the iterations in a certain order known as generations. Genetic
operators such as mutation and crossover are applied to produce better individuals. Their
performance is evaluated based on a fitness/cost function. The algorithm stops when
the solution is close to the optimum, or when a specific number of generations has been
reached. Memetic algorithms combine GA with a local search. These algorithm follow the
logic of a GA, but before applying genetic operators, every individual carries out a local
search with the aim of improving its fitness. In ant colony optimization, an ant starts from
a random node in the graph and selects the next node based on Equation (4).
⎧ β
⎨ τijα ·ηij
if j ∈ List,
Pij = ∑k∈ Liste τikα ·ηikβ (4)
⎩
0 otherwise
where Pij is the probability of choosing node j when the current node is i, τij is the
pheromone value of edge (i, j), ηij the heuristic value, List contains all possible nodes
accessible by the ant, and α, β are constants whose values depend in some way on the
nature of the problem. In order to use an ACO algorithm for an OP, it is really important
to present meaningfully the pheromone and heuristic values. When an ant passes through
a node/edge, it deposits a pheromone value τij in it. This value has to be proportional
to the quality of the solution and it will help to attract other ants from the colony. The
intention is that all the ants end up following the same trail, which hopefully represents
the optimal solution. In order to avoid local optima this algorithm contains a process
known as evaporation which periodically reduces the pheromone value deposited on a
trail. The PSO algorithm imitates the flocking of birds. It initializes a number of agents
(birds) and attaches two parameters, position and velocity (the velocity is given by two
vectors which have orthogonal directions), to each of them. At each iteration the algorithm
has to evaluate the positions of the agents and determine the subsequent positions, while
accelerating their movement toward "better" solutions.
event may take place, while the objective function aims to minimize the maximum of this
product. In this formulation the problem is a difficult nonlinear nonconvex programming
problem. Cavalier et al. (2007) proposes a heuristic algorithm that uses Voronoi polygons to
estimate the probability of non-detection and to determine a search direction. The heuristic
begins with an initial solution of m sensor locations ( x1 , x2 , ...xm ), on the basis of which
the Voronoi diagram is constructed (see Fig. 1(a) and (b)). The construction of the Voronoi
diagram must also take into account the area of the region. For every node the algorithm
determines the point in the Voronoi polygon with the highest probability that an event will
not be detected, and defines these points as the new node locations. The process is repeated
until no further improvement is possible. We note that a similar problem is encountered by
the wireless communication community in GSM networks and content-distribution wired
networks (CDN). In GSM networks the problem is to find an optimal deployment of base
stations within a region so that it provides maximum possible coverage. In CDN the problem
is to determine the locations of proxies where the popular streams can be cached. This
problem turns out to be the classical weighted p − center location problem, where the objective
is to locate p identical facilities that minimize the maximum weighted distance between clients
and their corresponding (closest) facilities, assuming that each client is served by the closest
facility (Averbakh & Berman, 1997). The p − center problem is slightly different from SLP
(note that for the SLP problem the clients correspond to events and the facilities correspond
to sensors). A p − center solution gives an assignment because each demand is assigned to a
facility, while in SLP the event point (demand) can be visible to more than one sensor node
(facility).
Once the sensors are deployed, coverage describes how well the sensors observe their target
area or certain moving targets within this target area. In this context we need to know the
path, known as the maximal breach path, that minimizes the maximum distance between
every point on the path and its nearest sensor node. In other words this path represents
the shortest path connecting the two endpoints which remains as far away as possible from
sensor nodes. It was shown in (Duttagupta et al., 2008) that this problem is NP-hard. Most
works in the literature propose methods relying on computational geometry and graph theory.
Meguerdichian et al. (2001) suggest constructing the Voronoi diagram for the set of nodes
in order to compute the maximal breach path. The edges of the Voronoi diagram provide
the points of space which are at the greatest distance from the given set of sensors. These
edges are weighted according to their distance from the nearest sensor. In this graph, the
maximal breach path is a path maximizing the weight of its edges. A breadth-first-search
(BFS) algorithm is then applied to find the maximal breach path. The Voronoi diagram and
the maximal breach path are depicted in Fig. 1.
Fig. 1. Voronoi diagram (b) for WSN nodes shown in (a), and maximal breach path (c).
Review of Optimization
Review of Optimization Problems
Problems in Wireless in Wireless Sensor Networks
Sensor Networks 1597
Fig. 2. Construction of the Minimum Independent Set - MIS (b) and Minimum Connected
Dominating Set - MCDS (c) of the graph shown in (a)
the CDS. In the first phase a Maximal Independent Set (MIS) is formed. An Independent Set
( IS) of a graph G is the node subset S where no two nodes in S have an edge in common.
The MIS is the maximal IS, which means that it is not possible to include more nodes in S.
In the second phase, the goal is to build a CDS using nodes that do not belong to the MIS.
These nodes are selected in a greedy manner. At the end, the non-MIS node with the highest
weight (the weight depends on the remaining energy and the degree of the node) becomes
part of the CDS, as depicted in Fig. 2. Unfortunately, a CDS only preserves 1-connectivity
and it is therefore very vulnerable. When fault tolerance against node failures is taken into
account, the problem becomes the kmCDS problem, (k-Connected m-Dominating Set). The
requirement of k − connectivity guarantees that between any pair of dominators there exist at
least k different paths, and the m − domination guarantees that each dominatee is connected
160
8 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
with m dominators. Wu & Li (2008) propose a distributed algorithm for this problem with
time complexity O((m + Δ) · Diam), where Δ is the maximum node degree and Diam is the
diameter of the network (the length of the longest shortest path between any pair of nodes
in the graph). Li (2008) assumes that the MCDS nodes are aligned according to a strip-based
deployment pattern, as in Fig. 3 where the nodes are deployed in straight lines. The difference
with a grid pattern is that the odd lines are horizontally shifted by a given distance in relation
to the even lines. This pattern is shown to be a near-optimal solution of MCDS for an infinite
network in terms of space. Because a WSN is a finite network, the spacing parameter in
this pattern and consequently the number of nodes needs to be adapted. The optimization
problem aims to minimize the number of nodes in the strip-based pattern such that the
areas, defined by the node’s transmission range, of three neighboring nodes in this pattern
intersect each other (see Fig. 3). The solution of this problem gives the positions of the CDS.
Implementation in a real scenario is easier. Assuming a given finite area with the sensor nodes
uniformly deployed in it, for every position determined by the algorithm the closest sensor
in the network will be selected for belonging to the CDS. The distributed approach requires
Fig. 4. Intersection zones for constructing Relative Neighbor (RNG) and Gabriel (GG) graphs.
mean of the RC values of the links that constitute the path. The key idea of their solution is
that link-disjoint trees can be constructed, the union of which will give the subnetwork. A
node will make a decision to join in some tree construction if its RC is less than a particular
threshold.
to solve the SMET problem. In reality, the difficulty of applying this kind of algorithm is
modeling the problem according to the algorithm’s logic, and deciding for example how to
define a chromosome, how to implement crossover, how to handle population diversity, etc.
The solution to the SMET problem takes the form of an array of positive integers, in which
the elements of the array correspond to the power levels assigned to each node, and the
respective indexes correspond to the node ID. In Fig. 5 we have 5 sensor nodes which are
transmitting with a given power. From this scenario an array of 5 elements is constructed
which contains the power values ordered by node ID. This array alternatively represents an
relaying the data towards the base station (the red points), their location, and the respective
transmission range. Valli & Dananjayan (2008) discuss the problem of topology control to
Under the scheduled approach the basic problem is to obtain a slot allocation for all nodes
in the network using the smallest possible number of slots such that k-hop neighbor nodes
(where k is a positive integer usually equal to 2) are not allocated to the same time slot. The
respective optimization problem is the chromatic graph optimization problem, which aims to
minimize the number of colors used to color the nodes such that two neighbor elements do
not use the same color. This problem is addressed in several works that have put forward a
number of distributed algorithms (Al-Khdour & Baroudi, 2010; Gandham et al., 2005; Kawano
& Miyazaki, 2009; Sridharan & Krishnamachari, 2004). In (Sridharan & Krishnamachari, 2004)
slot allocation uses the logic of a breadth-first search algorithm where the first node which
allocates the slot is the root of the tree (the sink). Once a node is selected it continues the
operation of slot allocation based on the information from its neighbors. Gandham et al.
(2005) discuss the edge-coloring problem, where two edges incident on the same node cannot
be assigned to the same time slot. They propose a greedy heuristic whose first step involves
coloring the edges and whose second step proposes a strategy to map the colors to the time
slots. The second step uses the edge orientation to avoid the hidden and exposed node
terminal problem. A simple example is shown in Fig. 7. The process begins with node 6
(the node with the largest ID), which picks a color from a set of colors and broadcasts this
information to its neighbors. On reception of the information node 5 picks a different color,
and so on. This process continues until all the nodes have colored their edges. Then, edge
orientation is applied to the edges with the same color. So, for instance, in Fig. 7(c) let us
imagine the case where node 4 transmits to 6. Because of the node 4 transmission, the level of
interference may be sufficiently high to corrupt the transmission of the link (2, 3)
The same problem is reexamined by (Al-Khdour & Baroudi, 2010), under the assumption
that nodes can communicate with different frequencies. Nowadays radio chips support
multichannel transceivers which can help to reduce the number of required time slots in a
TDMA frame. The distributed heuristic algorithm proposed in this work is based on solving
the TDMA problem in a tree structure. The base station collects the information from its
children to calculate how many slots are needed (e.g. 3 slots are required in Fig. 8(a)). Next,
every parent allocates a time slot to its children 8(b). Each branch of the tree will use a different
channel (the frequencies can be repeated in space), whereas the nodes in one branch will
transmit in different slots.
Review of Optimization
Review of Optimization Problems
Problems in Wireless in Wireless Sensor Networks
Sensor Networks 165
13
In other versions of the problem the scheduling solution must satisfy certain requirements
such as connectivity, data rates and delay. Kedad et al. (2010) formulate the problem as
follows: construct a frame with the minimum number of time slots such that at each time
slot the activated links are not in conflict, and form a strongly-connected graph. The second
constraint ensures that a node will be able to send a data packet to any other node in the
network through the activated links. The links will be in conflict if they have the same
transmitting or receiving node, or if the transmitting node of one link is the same as the
receiving node of the other link. They show that this problem is NP-hard and propose two
approximation algorithms. In (Ergen & Varaiya, 2010) the problem is to find an available slot
allocation with minimum frame length, taking into account the quantity of data that a node
needs to transmit. Notice that a link can be scheduled more than once in a time frame to satisfy
the node data rates, which is the main difference with the basic version. Wang et al. (2007)
formulate a multi-objective optimization problem. The question is to find a time slot allocation
that satisfies i) the data delivery delay and ii) the node energy constraint. Here, not only are
the transmitting and receiving energies taken into account, but also the energy consumed
in switching between sleep and active modes. The two selected objectives contradict each
other, since the energy objective seeks to maximize the number of nodes that are turned off,
which in turn increases the delay. The trade-off between energy and delay is solved using
the particle swarm optimization approach. This example gives a meaningful illustration of
interdependence between problems coming from different layers. We have here a scheduling
problem combined with a routing one in the sense that the latter one is responsible for the
delay.
While TDMA-based approaches schedule transmissions sequentially over time, FDMA-based
approaches permit multiple concurrent transmissions between neighboring nodes by
allocating different channels/frequencies to them. Sensors in the network can thus tune their
operating frequency over different channels to avoid interference and packet collisions in the
network. One of the advantages of FDMA is the improvement of network throughput and
packet transfer delay. In FDMA the problem can also be modeled as a graph-coloring problem,
given that no two adjacent nodes are allowed to use the same channel.
Yu et al. (2010) show that the problem of assigning the channels such that the interference is
minimized is NP-hard. They model the problem as a game where every node is a player
and the interference is the objective to be minimized. Their algorithm assumes that routing
is based on the tree structure. In each iteration an intermediate node selects its own channel
166
14 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
so as to cause the least possible interference for its neighboring nodes. The interference is
calculated using local data that include the number of interfering parents in different branches
existing in their neighborhood, their respective numbers of children, and whether or not these
children are leaves within the tree structure. Notice that neighbors of a given node can belong
to different branches and have different roles, parents or leaves. Based on an empirical study,
Wu et al. (2008) find it more appropriate for a WSN to communicate using a single channel,
but they suggest harnessing channel diversity by spreading the frequencies in space. They
therefore propose a node-disjoint tree structure where every branch (subtree) communicates
via a given channel. The objective here is to divide the network into multiple disjoint subtrees
such that the interference between them is minimized. They show that the problem is NP-hard
and propose a greedy heuristic.
CDMA spreads the baseband signal using different Pseudo Noise (PN) codes to enable multiple
concurrent transmissions. In WSN, a PN code may be implemented as an attribute in the
packet header (nodes simply need to check whether the code in an incoming packet matches
their own set of codes) in order to reduce the complexity of modulation and decoding
techniques in comparison to CDMA implementations using other technologies. Optimization
problems relating to code allocation in CDMA are slightly different from those relating to time
or channel allocation. For instance, in CDMA it is possible that two neighboring nodes share
the same code but only one can use the code for transmitting while the other node can use
it for receiving. The optimization problem may require that no two adjacent directed links
have the same code. The difference between WSN and other wireless CDMA networks is not
really to be found in the problem of code allocation, but in the CDMA concept itself. CDMA
codes are not completely orthogonal. The high density of sensors in the network makes the
problem of interference in concurrent transmission a very serious one. High interference
causes problem for receiver nodes because they cannot ’understand’ the signal addressed
to them. In the literature the pure CDMA problem is addressed simultaneously with the
channel and slot allocation problems. The problem of channel and code allocation to reduce
interference is discussed in (Liu et al., 2006). Their distributed solution is a heuristic which
tries to solve first the problem of channel allocation and subsequently the code allocation one.
When CDMA is combined with scheduling, Chen et al. (2006) looks for a feasible schedule for
all the nodes in the network, together with their respective PN codes such that there is no
interference (or the interference falls below a given threshold) in any time slot and the total
energy consumption is minimized.
large number of nodes can become passive while the remaining nodes continue to ensure
a connected structure. The active nodes correspond precisely to the CDS. According to the
algorithm some nodes will have a special role: those nodes that form a Maximal Independent
Set perform the role of anchors, and nodes used to connect anchor nodes perform the role
of bridges. Nieberg (2006) shows that the set of anchor and bridge nodes forms the CDS.
The initialization phase has self-organizing properties. Each node will try to get an active
time slot according to the TDMA scheme. Then, any other node that enters into the network
needs to decide locally whether or not it will be active (either as a bridge or as an anchor).
The decision is based on the information provided by the neighbor nodes. This information
includes the neighbor node ID, a list of all time slots showing the slots occupied by them and
their respective neighbors, their role as an active node, and some synchronization information.
When a node observes that there are less than two anchor nodes in its neighborhood for a
given time slot, it becomes an anchor otherwise it seeks for the existence of bridge nodes. If it
finds that any pair of anchor nodes are connected with bridges, it becomes passive.
The node duty cycle is also related to coverage requirements. Because monitoring is one of the
main objectives of a WSN, the active nodes have to guarantee that a set of given targets will be
monitored throughout the lifetime of the WSN. The problem is to group the nodes such that
i) each group (known as a cover) is able to cover the targets and ii) the groups form disjoint
sets of nodes in order to maximize the WSN lifetime. Usually a redundant sensor network
is considered in this case. This question has elements of both a coverage problem (targets
which need to be covered) and a scheduling problem. Only the nodes belonging to a cover
are to be activated, while the others are to be put to sleep, and the covers are to be activated
in a sequential manner. Cardei & Du (2005) have shown that this problem is NP-hard. In
(Rossi et al., 2010), the problem is modeled as a linear program whose aim is to maximize the
sum of the different covers’ lifetimes, the constraint being that the total duration of a nodes’
activity periods does not exceed the lifetime of its battery. The problem is solved using the
column generation method. Aioffi et al. (2007) model the problem as the weighted set cover
problem (WSCP). Given n sets (S1 , S2 , ...Sn ) formed from elements of a universal set denoted
the US, together with their associated activation costs, WSCP seeks to find a subset of these
sets such that the sum of the activation costs is minimized, and whose union corresponds
to the US. The set of the targets in the network problem is modeled as the US, the sets Si
represent the set of the target covered by sensor i, and the cost of Si is the inverse of energy
for the sensor i. The problem is solved off-line and the results are fed into the sink. When the
mobile sink gathers data from the nodes, it also indicates to them whether they will be active
in the following period. This method is used particularly for this case because the number
of possible combinations is exponential (the number of constraints is very small) and it can
achieve faster convergence.
(Dhawan & Prasad, 2009) remove the constraint of disjoint covers. If a node is included in two
or more cover sets, then its energy capacity will influence the life of these sets. They therefore
propose a solution based on the construction of a life dependency (LD) graph. In this graph
covers are represented by vertices, linked by an edge if they share the same sensors. The LD
graph is introduced into the problem in order to identify the covers having the least impact on
the other covers. Their distributed approach adds a communication cost between neighboring
nodes which need to exchange information such as the remaining energy and the region (area
or targets) they can cover. A further cost is added, corresponding to the processing of this
information and to making a decision. Every sensor thus needs to construct an LD graph
168
16 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
based on its local information and to identify the cover with the smallest impact in order to
be part of it. Finally, there is also a communication cost corresponding to the negotiation
phase where nodes attempt to obtain a stable solution. In (Cardei & Cardei, 2008; Zou &
Chakrabarty, 2005) the same problem is discussed and an additional constraint imposed: each
set is required to be connected with the base station. In (Cardei & Cardei, 2008) the problem
is formulated as Integer Linear Programming. It is first centrally solved using ILOG CPLEX,
and then via a distributed approach. In the distributed case each node needs to know not
only its own coordinates but also those of the given targets and base station. The initialization
phase has a considerable communication cost resulting from exchanging the list of targets
that the two-hop neighbors cover, the status of every node, and the synchronization message.
This initialization phase includes the creation of the cover sets, while the subsequent phase
finds the relaying nodes for connecting the cover with the base station (one node in the cover
constructs a spanning tree that includes the target set and the BS).
4. Routing
Data transmission in WSNs, also referred to as the routing problem, is one of the most widely
studied problems in WSN. Different to the previous section, we focus here on the main
proposed models and give some analysis on their use. The models and methods used for
solving routing problems in WSN can be roughly divided in two main groups. The first group
includes related shortest and spanning tree models, while the second group is centered around
flow models and comprises a range of different minimum cost/maximum multicommodity
flow models. While abundant work relating to such problems exists for wired networks,
some new challenges have appeared for wireless networks, and especially for WSNs. The
nature of some of these problems can change quite radically when they are placed in a WSN
context and new requirements are introduced. These requirements include sensors’ energy
constraints, the interference caused by the broadcast nature of transmissions over wireless
links, as well as data compression, aggregation and processing constraints. For instance, in
traditional formulations of the network flow problem, link capacity is a strong constraint,
while in WSN this constraint is frequently supplanted by the node energy constraint. Another
important difference between these two paradigms is the inclusion of the dynamic topology
models and the need for distributed solutions for wireless sensor networks.
(a) A simple graph (b) Short path tree (c) Minimum spanning
tree
Fig. 9. Shortest path (b) and minimum spanning tree (c) for the graph shown in (a)
Going further, WSN brings new constraints which may modify the nature of the problem. For
instance, many applications of WSN require that the intermediate or relay nodes aggregate the
data, while the criterion used is minimizing energy consumption. For (Cristescu et al., 2006)
the joint problem of data aggregation and routing is NP-hard, and their heuristic combines an
MST with an SPT. Normally, in cases where there is a high aggregation coefficient, the amount
of traffic increases slightly from the source to the sinks, and an MST is a good compromise.
However, where the aggregation coefficient is low, routes need to be found that minimize the
number of hops, and therefore an SPT should be constructed. MST is the tree structure which
minimizes the sum of edge costs, and the problem is polynomial. The difference between a
shortest path tree and a minimum spanning tree is shown in Fig. 9.
Minimizing the total energy consumption is, however, not enough, since some nodes deplete
their energy faster than others and may cause network partition. To balance the energy
consumption, one strategy is to minimize the maximum energy consumption of the nodes.
This problem has been modeled by (Gagarin et al., 2009) as the minimum degree spanning
tree (MDST), which is an NP-hard optimization problem. Variations of this problem are
encountered in the literature, in (Erciyes et al., 2008; Huang et al., 2006). A joint routing and
data aggregation problem is also discussed in (Karaki et al., 2009) for a two-tier network,
and some heuristic algorithms such as GA and greedy are proposed. From a distributed
perspective, adapted versions of Prim’s and Kruskal’s algorithms have been proposed in
(Attarde et al., 2010). In the distributed versions of SPT a node need only communicate to
its neighbors information concerning the cost of links. Each node decides to communicate
with the node that provides the minimal cost to the base station. An ACK mechanism is
needed to dictate the end of the process. It may be remarked here that almost all the above
cited models lead to single path routing schemes. They have the great advantage of being
simple from an implementation point of view, while their main drawback is their difficulty in
embracing additional requirements, energy consumption in particular. We now present some
flow-based models that can model such requirements in a suitable way.
insofar as they share the same link capacities. Regarding commodities, a WSN gives rise to
either single-sink or multi-sink models, and in the case of single-sink models all commodities
will have the same extremity, namely the base station. In the following subsection 4.2.1 we
discuss some basic versions of flow models used for routing path calculation in WSN. Then,
in subsection 4.2.2 some further extended routing problems are presented.
where t (respectively T) is a time instance (respectively the network lifetime), N the set of
sensors, Ni the set of neighboring nodes of i, xij the flow over the edge ij (that is to say the
data transmitted over this link), yi the data generated by node i, eij the energy consumed
in transmitting a unit flow and Ei the initial energy of the sensor. The flow conservation
constraint, Equation (5), shows that the total amount of flow that a sensor receives plus the
amount of data that it generates is equal to the amount of information that it transmits.
The second constraint given in Equation (6) is the capacity constraint, which is related to
energy. This constraint implies that the energy consumed by a sensor for transmitting the
flow throughout the lifetime of the network must be less than its initial energy. In standard
network flow problems this constraint is usually related to link capacity.
One of the first works to formulate this problem in terms of Integer Linear Programming
is to be found in (Chang & Tassiulas, 2004). The flow is represented here by the number
of packets and the transmission energy is calculated based on the distance between the nodes
(and hence assuming a power control mechanism). The optimal solution of this problem gives
an upper bound for network lifetime. While the problem of lifetime or flow maximization
under these constraints can be solved in polynomial time for continuous values of flow x, the
integer version is shown to be strongly NP-hard in Bodlaender et al. (2010). The distributed
version of this problem is discussed in (Madan & Lall, 2006), where the subgradient algorithm
is used to solve the problem. At each iteration the algorithm estimates the gradient value
at a given point of the objective function and determines the next point to be considered,
until the optimum is reached. The distributed implementation of this algorithm requires
that every node keeps track of two variables, namely the flow rate of every outgoing link
and the network lifetime. These variables are updated during each iteration of the algorithm
based on their previous values and the subgradient function values (also a function of flow
rates and network lifetime) are calculated according the information received from neighbor
nodes. Subgradient methods are also used by Rabbat & Nowak (2004) as convenient tools
for designing a distributed approach in sensor networks. Another characteristic of WSNs is
the data aggregation applied by nodes. This phenomenon can easily be taken into account by
slightly modifying the conservation flow constraint. For instance, in Cheng et al. (2009) each
node sends the maximum amount of information between the received and the generated
data set as in Equation (7).
Review of Optimization
Review of Optimization Problems
Problems in Wireless in Wireless Sensor Networks
Sensor Networks 171
19
∑ xij = max j∈ Ni x ji , yi ∀i ∈ N (7)
j∈ Ni
The routing problem with data aggregation for lifetime maximization in a network has been
formulated by Xue et al. (2005) as a concurrent multicommodity flow problem. Here the flow
constraint implies that the amount of the flow commodities transmitted from a sensor node
cannot be less than the sensor’s data. They propose a polynomial time approximation scheme,
strongly inspired by the Garg-Konemann algorithm. In outline, their algorithm is as follows:
construct the shortest path between every source and the sink, initialize a cost unit flow for
every node, push the maximum possible flow along the path for every commodity, update the
cost of energy for every node and repeat the process.
As regards routing paths, the routing schemes can use several paths (in other words perform
multipath routing), or a single path (single-path routing.) Although requiring routing via a
single path would appear preferable for WSN, adding such a constraint to the mathematical
model gives rise to NP-hard problems. Worth citing here are two approaches proposed for
WSN that attempt to circumvent the computational burden of such models while providing
simplicity in implementation. The first approach computes a solution involving multiple
paths, but uses only one single path at a time. Hou et al. (2004) propose an algorithm to solve
the problem in two phases. In the first phase a solution is found for the multipath routing
problem. Consequently every node knows the set of the relaying nodes and the respective
amount of information to send to them. In the second phase one node, according to some
local rule, will select one of its relaying nodes and will transmit to it the whole amount of
information to be sent in this round. The second approach, in stark contrast to the first
approach just described where routing takes place from the sensors to the BS (i.e. flat routing),
may be seen as hierarchical routing, in that it decomposes the data transmission into two levels
and thus converges to a cluster-based scheme. Each cluster head (CH) receives the data from
the nodes of its cluster and from the other CHs, and transmits this data to another CH in the
direction of the BS. Bari et al. (2008) consider a two-tier heterogeneous network containing
powerful relay nodes which form a connected network that can relay data to the BS. They
formulate the optimization problem as follows: knowing the positions of sensors and relay
(CH) nodes, how should the network be clustered in order to maximize its lifetime? A sensor
is not obliged to transmit directly to the CH, and sensors may have different amounts of flow
to transmit. The problem is formulated as a max-min LP. Because the decision variables can
take only binary values (1 if the sensor belongs to a given cluster and 0 otherwise) and the
flow rate variable corresponds to a number of bits, we are dealing with an ILP problem. The
heuristics presented for this problem are centralized. Other centralized techniques for solving
the clustering problem in WSN are based on Fuzzy Logic (FL) (Anno et al., 2007; Ran et al.,
2010), while Mehrjoo et al. (2011) proposes genetic algorithms.
Routing under the physical interference model is more complex. Wang et al. (2011) discuss a
link scheduling problem where flow capacities are satisfied and the time taken for scheduling
is minimized. In this case the channel capacity is variable over time due to SINR, and its
integral gives the service provided by the channel as expressed in Equation (9).
t
Cij (t) = B · log(1 + SI NRij (τ ))dτ (9)
0
where Cij (t) is the channel service of link (i, j) during time t, and B is the channel bandwidth.
ωij (t) Pi
SI NRij = (10)
∑k∈V + /{i} (ωkj (t) Pk ) + Na
where SI NRij is the SI NR parameter for the link (i, j), ωij the gain of the fading channel for
the link ij, Pi the power transmission of node i, ωkj Pk measures the interference of the other
links over the link (ij) and Na is the floor noise which is a constant. The channel service
calculated in each time slot is used as parameter to bound the link data rate. The problem is
solved off-line using the column generation method.
Interference can be more easily modeled in a protocol context. Wang et al. (2008) study the
routing problem in the presence of interference by scheduling the nodes in accordance with
the TDMA approach. The constraint added for the interference implies that the sum of the
number of times a link is scheduled plus the sum of the number of times that all the links in
its interference zone are scheduled in the time frame has to be smaller than the frame size, as
in Equation (11).
where N (e) is the number of times that the edge e is scheduled in the time frame, I (e) is the
subset of links of the original graph that can be influenced from e transmissions and S is the
number of time slots in the frame.
We shall now focus on how WSN takes some QoS requirements and their associated metrics
into consideration. We begin with a discussion of QoS metrics and the computational
complexity that they introduce. Different metrics have different composition rules. Metrics
such as delay, delay jitter and cost are additive (an additive metric is a metric which obeys
the additive rule, meaning that the path metric is equal to the sum of the metric links that
compose the relevant path). A multiplicative metric is a metric which obeys the multiplicative
rule, meaning that the path metric is equal to the product of the link metric for all the links that
compose the relevant path. Metrics like reliability (the probability that the transmission was
successful) can thus be seen to be multiplicative. Finally, concave metrics obey the concave
rule, meaning that the path metric is equal to the minimum (or maximum) link metric for all
the links that compose the relevant path. Bandwidth is an example of a concave metric. Fig.
10 illustrates the concept of multicommodity flows in a graph and QoS multipath routing with
two metrics.
In (Wang & Crowcroft, 1996) it is shown that the problem of finding a path which satisfies
N additive metrics, and/or K multiplicative metrics (where N and K are positive integers)
is NP-hard, while it becomes polynomial when one is concave and the other additive or
multiplicative.
174
22 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
(a) multicommodity flows in a network (b) QoS multipath routing with two metrics
Most works dealing with QoS routing in WSN are concerned either with finding (disjoint)
paths for guaranteeing network resilience (fault-tolerant network), or with finding a minimal
number of paths such that QoS requirements are met. We recall that the problem of finding
k disjoint paths (edge or vertex disjoint) such that the total cost of the paths is minimized has
been shown in (Li et al., 1992) to be NP-hard, even for k = 2 in directed graphs. Heuristics
therefore provide practical approaches for solving these kinds of problems. (Okdem &
Karaboga, 2009) report an approach combining ACO with a tabu search. Each source node
wishing to transmit data toward the BS has to launch n ants (n corresponds to the number of
data packages that the source transmits). The ant’s movement is based on the probabilistic
decision where the heuristic value represents the estimation of the residual energy. After
all the ants have completed their journey (from source to destination), each ant k deposits a
quantity of pheromone equal to the inverse of the total number of nodes included in the path.
This task is performed by sending ant k back to its source node following the arrival path.
In this type of ACO each receiver node has to maintain a tabu list with the identities of the
ants that it has encountered, enabling it to decide whether to accept the upcoming packet of
ant k. Routing the information efficiently to guarantee the delay and reliability constraint
is discussed in Saleem et al. (2010), who proposes a multi-agent approach for ant colony
optimization (ACO). The movement of the ant is guided by the probabilistic decision rule,
equation (4). The pheromone value corresponds to the end-to-end delay. The two heuristic
evaluation parameters of every edge are determined by the residual energy at the extremity
of the edge and its packet receive rate (PRR).
In (Bagula & Mazandu, 2008) the QoS routing problem is concerned with delay and reliability
criteria. The goal is to find the smallest set of disjoint paths between a source and a destination
such that both criteria are satisfied and energy consumption is minimized. Delay is a stringent
metric, meaning that if the delay is not respected in any of the set paths, the packet is dropped.
In contrast, the reliability of every source-destination connection obeys the multiplicative
composition rule. Hence the more paths in the set, the more reliable the set will be. The
problems of finding the path which minimizes the energy or the delay, or maximizes the
reliability, taken separately, are solvable in polynomial time, but the problem considered in
its entirety is not.
Review of Optimization
Review of Optimization Problems
Problems in Wireless in Wireless Sensor Networks
Sensor Networks 175
23
• Dynamicity is one of the most noticeable characteristics of WSN and also one of the biggest
challenges. The term covers such phenomena as node failure, link fluctuations, node
attacks and mobile nodes. Many studies in routing, coverage, scheduling or topology
control have attempted to find solutions where these events occur, but including them in
optimization problem models remains a challenge.
• We consider that scalability is an important issue which is frequently neglected when
solution methods are proposed. The eventually changes in network dimensioning may
sometimes require to resolve the problem or to sufficiently increase the computation time.
We observe this particularly in relation to issues related to multi-sink/multicommodity
design and network cross layer design.
• With respect to coverage problems, there are several potential directions that have not
been fully explored. These include solving the deployment problem in the presence of
obstacles, taking into account the restrictions for node placement and 3D deployments.
In routing and topology control, cooperative decision-making strategies and opportunistic
approaches also need to be modeled and examined in optimization problems, since in
both areas some of the problems discussed here have been successfully addressed through
opportunistic approach. But not many theoretical works have been undertaken in relation
to this paradigm. Many questions remain open. For instance, in what scenarios should an
opportunistic approach be favored over other approaches? How close is an opportunistic
approach solution likely to be to the optimal solution? Routing in opportunistic networks
1 adopts a people-centric approach to model the network semantics (Verdone & Fabri,
2010). This routing group is classified as sociability-based routing and has been modeled in
(Yoneki et al., 2007) based on human behavior characteristics. They propose a Socio-Aware
Overlay (multi-point event dissemination using an overlay constructed by closeness
centrality nodes in communities) for publish/subscribe communication. It is not clear
whether these strategies might be appropriate for WSN.
• Another crucial issue is the difference that still exists between theoretical studies and
practical implementations in WSN. Some theoretical studies have already presented
models for cross-layer design, together with corresponding solutions. But many of them
remain centralized and require off-line computation. We remark that in some mathematical
formulations the variables are considered continuous, despite the discontinuous nature
of the corresponding events such as power transmission and flow. On the other hand,
algorithms or protocols implemented in real hardware or tested in simulations do not
address cross-layer design. They aim at distributed and on-line computations and handle
mostly simplified problems. Moreover, in these works the analyses that might yield an
optimal solution are neglected, and it is difficult to grasp the problem complexity and to
know whether there is room for further improvement. Combining these two approaches
is far from straightforward and calls for substantial work. We see as a primary concern in
1 Examples of opportunistic networks are Delay Tolerant Networks (DTN) (Pelusi et al., 2006.) or Pocket
Switched Networks, VANETs, networks composed of devices such as MP3 players, mobile telephones
and PDAs which can communicate with each other by Bluetooth or Wi-Fi to share data, or even wireless
sensor networks which can send data using technologies such as GSM/UMTS, WiFi, etc.
176
24 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
this context the development of optimization tools and dedicated software to bridge the
gap between optimization methods and their practical implementation in WSN.
• Finally, we consider that uncertainty has received very little attention until now.
Nonetheless, uncertainty is an important characteristic inherent in the nature of WSNs,
and is related to different aspects such as event detection, sensor location and data delivery.
Some attempts to model these situations use probabilities associated with these different
kinds of events. The main difficulties in taking the uncertainty of WSNs into account
are twofold. First, measuring the distribution of events is not an easy task and is both
environment- and application-dependent. Secondly, despite recent advances in robust
optimization2 tackling probabilistic optimization problems is not for the faint-hearted.
6. References
Aioffi, W., Mateus, G. & Quintao, F. (2007). Optimization issues and algorithms for WSNs
with mobile sink, Intern. Netw. Opt. Conf. pp. 1–6.
Al-Khdour, T. & Baroudi, U. (2010). An energy-efficient distributed schedule-based
communication protocol for periodic wireless sensor networks, Arab. jour. for sci. and
eng. 35: 155–168.
Anno, J., Barolli, L., Xhafa, F. & Durresi, A. (2007). A cluster head selection method for wireless
sensor networks based on fuzzy logic, IEEE TENCON pp. 1–4.
Attarde, S. A., Ragha, L. L. & Dhamal, S. K. (2010). An enhanced spanning tree topology for
wireless sensor networks, Int. Journal of Comp App. 1: 46–51.
Averbakh, I. & Berman, O. (1997). Minimax regretp-center location on a network with demand
uncertainty, Elsevier Science 5: 247–254.
Bagula, A. B. & Mazandu, K. G. (2008). Energy constrained multipath routing in wireless
sensor networks, Proc. of Ubiquitous Intell. and Comp. pp. 453–467.
Bari, A., Jaekel, A. & Bandyopadhyay, S. (2008). Clustering strategies for improving the
lifetime of two-tiered sensor networks, Comp. Comm. 31: 3451–3459.
Bellman, R. (1957). Dynamic Programming, Princeton University Press.
Bertsimas, D. & Sim, M. (2004). The price of robustness, Operations Research, 1: 35–53.
Bodlaender, H., Tan, R. B., van Dijk, T. & van Leeuwen, J. (2010). Integer maximum flow in
wireless sensor networks with energy constraint, Technical report, Utrecht University.
Cardei, I. & Cardei, M. (2008). Energy-efficient connected-coverage in wireless sensor
networks, International Journal of Sensor Networks 3: 201–210.
2 Following the works of Bertsimas & Sim (2004), who showed how to model a stochastic optimization
problem as a Linear Program under weak conditions, robust optimization has been intensively
investigated.
Review of Optimization
Review of Optimization Problems
Problems in Wireless in Wireless Sensor Networks
Sensor Networks 177
25
Cardei, M. & Du, D. (2005). Improving wireless sensor network lifetime through power aware
organization, Wireless Networks 11: 333–340.
Cavalier, T. M., Conner, W., Castillo, E. & Brown, S. (2007). A heuristic algorithm for minimax
sensor location in the plane, Europian Journal of Operational Research pp. 42–55.
Chang, H. & Tassiulas, L. (2004). Maximum lifetime routing in wireless sensor networks, IEEE
trans. on Netw. 12: 609–619.
Chen, M., Oh, C. & Yener, A. (2006). Efficient scheduling for delay constrained multi-rate
CDMA systems, Spread Spectrum Techniques and Applications pp. 371–375.
Cheng, M., Gong, X. & Cai, L. (2009). Joint routing and link rate allocation under bandwidth
and energy constraints in sensor networks, IEEE Trans. on Wir. Comm. 8: 3770 – 3779.
Cheng, X., Narahari, B., Simha, R., Cheng, M. X. & Liu, D. (2003). Strong minimum energy
topology in WSNs: NP-Completeness and heuristics, IEEE Trans. on Mob. Comp. 2: 248
– 256.
Cristescu, R., Lozano, B., Vetterli, M. & Wattenhofer, R. (2006). Network correlated
data gathering with explicit communication: NP-Completeness and algorithms,
Networking, IEEE/ACM 14: 41–54.
Dantzig, G. B. (1963). Linear Programming and Extensions, Princeton.
Dhawan, A. & Prasad, S. K. (2009). A distributed algorithmic framework for coverage
problems in wireless sensor networks, Proc. of Parallel and Distrib. Proc. pp. 18–25.
Dorigo, M., Maniezzo, V. & Colorni, A. (1996). The ant system: Optimization by a colony of
cooperating agents, IEEE Trans. on System Man, and Cybernetics-Part B 26: 29–41.
Duttagupta, A., Bishnu, A. & Sengupta, l. (2008). Maximal breach in WSNs: Geometric
Characterization and Algorithms, Algosensors pp. 126 –137.
Efrat, A., Peled, S. & Mitchel, J. (2005). Approximation algorithms for two optimal location
problems in sensor networks, Broadband Networks 1: 714–723.
Erciyes, K., Ozsoyeller, D. & Dagdeviren, O. (2008). Distributed algorithms to form
cluster based spanning trees in wireless sensor networks, Proc. of Computer Science
pp. 519–528.
Ergen, S. & Varaiya, P. (2010). TDMA scheduling algorithms for WSN, Wireless Networks 16: 985
– 997.
Fidanova, S., Marinov, P. & Alba, E. (2010). ACO for optimal sensor layout, Proceeding of
International Conference on Evaluationary Computation pp. 5–9.
Gagarin, A., Hussain, S. & T., Y. L. (2009). Distributed search for balanced energy consumption
spanning trees in wireless sensor networks, Adv. Inf. Net. and App. Work. pp. 975–982.
Gandham, S., Dawande, M. & Prakash, R. (2005). Link scheduling in sensor networks:
distributed edge coloring revisited, Infocom 4: 2492 – 2501.
Glover, F. (1989). Tabu search - part i, ORSA Journal on Computing 1: 190–206.
Gogu, A., Nace, D. & Challal, Y. (2010). A note on joint optimal transmission range assignment
and deployment for wireless sensor networks, IEEE Networks pp. 1–6.
Holland, J. (1975). Adaptation in natural and artificial systems, University of Michigan Press.
Hou, Y., Shi, Y., Pan, J. & Midkiff, S. (2004). Lifetime-optimal data routing inwireless sensor
networks without flow splitting, Workshop on Broadband Advanced Sensor Networks .
Huang, G., Li, X. & He, J. (2006). Dynamic minimal spanning tree routing protocol for large
wireless sensor networks, IProc. of Indust. Electr. and Applic. pp. 1–5.
Jain, K., Padhye, J., Padmanabhan, V. & Qiu, L. (2003). Impact of interference on multi-hop
wireless network performance, MobiCom, ACM pp. 66 – 80.
178
26 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
Karaki, J., Ul-Mustafa, R. & Kamal, A. (2009). Data aggregation and routing in WSN : Optimal
and heuristic algorithms, Computer networks pp. 945–960.
Karmarkar, N. (1984). A new polynomial-time algorithm for linear programming,
Combinatorica 4: 373–395.
Kawano, R. & Miyazaki, T. (2009). Distributed data aggregation in multi-sink sensor networks
using a graph coloring algorithm, Proc. of Adv. Inf. Netw. and Applic. pp. 906–912.
Ke, W., Liqiang, W., Shiyu, C. & Song, Q. (2009). An energy-saving algorithm of WSN based
on Gabriel graph, Wir. Comm., Netw. and Mob. Comp. pp. 1–4.
Kedad, S., Pasqual, F. & Fouilhoux, P. (2010). Ordonnancement de paquets dans les réseaux
sans fil, In Proc. of ROADEF .
Kennedy, J. & Eberhart, R. (1995). Particle swarm optimization, Proc. of IEEE Int. Conf. on
Neural Netw. 4: 1942 – 1948.
Konstantinidis, A., Yang, K., Chen, H. & Zhang, Q. (2007). Energy-aware topology control for
WSN using memetic algorithms, Computer Communications pp. 2573–2764.
Krishnamachari, B. & Ordonez, F. (2003). Analysis of energy-efficient, fair routing in
wireless sensor networks through non-linear optimization, IEEE Vehicular Technology
Conference 5.
Kuhn, H. W.; Tucker, A. W. (1951). Nonlinear programming, Proc. of 2nd Berkeley Symposium.
pp. 481–492.
Li, C., McCormick, S. & Simchi-Levi, D. (1992). Finding disjoint paths with different
path-costs: Complexity and algorithms, Networks 22: 653–667.
Li, J. (2008). Optimization Problems in Wireless Sensor and Passive Optical Networks., PhD thesis,
The University of Melbourne, Australia.
Li, X., Calinescu, Y. & Wan, G. (2002). Distributed construction of a planar spanner and routing
for ad hoc wireless networks., In: Proc. of IEEE Infocom pp. 1268–1277.
Liu, B., Otis, B., Chou, C. & Jha, S. (2006). A novel multi-channel CDMA system for wireless
sensor networks, Sensor Networks, ACM 5: 1–30.
Liu, Y., Zhang, Q. & Ni, M. (2010). Opportunity-based topology control in wireless sensor
networks, Parallel and Distributed Systems pp. 405–416.
Ma, J., Chen, Q., Qian, Z. & Ni, L. (2008). Opportunistic transmission based QoS topology
control in wireless sensor network, Mob. Ad Hoc and Sen. Sys. pp. 422–427.
Madan, R. & Lall, S. (2006). Distributed algorithms for maximum lifetime routing in wireless
sensor networks, IEEE Transactions on Wireless Communications 5: 2185 – 2193.
Meguerdichian, S., Koushanfar, F., Potkonjak, M. & Srivastava, M. B. (2001). Coverage
problems in wireless ad hoc sensor networks, Proc. of IEEE Infocom .
Mehrjoo, S., Aghaee, H. & Karimi, H. (2011). A novel hybrid GA-ABC based energy efficient
clustering in wireless sensor network, Multimedia and Wireless Networks 2: 40–45.
Moscato, P. (1999). Memetic algorithms: a short introduction, McGraw-Hill.
Nieberg, T. (2006). Independent and dominating sets in wireless communication graphs, PhD thesis,
Twente University, Netherlands.
Okdem, S. & Karaboga, D. (2009). Routing in WSN using an ant colony optimization (ACO)
router chip, Sensors pp. 909–921.
Patel, M., Chandrasekaran, R. & Venkatesan, S. (2006). Energy-efficient capacity-constrained
routing in wireless sensor networks, Int. J. Perv. Comp. and Comm. pp. 69–80.
Pelusi, L., Passarella, A. & Conti, M. (2006.). Opportunistic networking: data forwarding in
disconnected mobile ad hoc networks, Communications Magazine, IEEE .
Rabbat, M. & Nowak, R. (2004). Distributed optimization in sensor networks, IPSN pp. 20–27.
Review of Optimization
Review of Optimization Problems
Problems in Wireless in Wireless Sensor Networks
Sensor Networks 179
27
Ran, G., Zhang, H. & Gong, S. (2010). Improving on leach protocol of wireless sensor networks
using fuzzy logic, Journal of Information & Computational Science 7: 767–775.
Ren, H., Meng, M. Q. & Chen, X. (2006). Investigating network optimization approaches in
wireless sensor networks, in Proc. of IROS pp. 2015–2021.
Rodoplu, V. & H., M. T. (1999). Minimum energy mobile wireless networks, Journal on selected
areas in communications 17: 1333–1344.
Rossi, A., Singh, A. & Sevaux, M. (2010). Génération de colonnes dans le réseaux de capteurs
sans fil, In Proc. of ROADEF .
Rotar, C., Risteiu, M., Ileana, I. & Hutanu, C. (2009). Optimal sensors network layout using
evoutionary algorithms, Proc. of Inter. Conf. on Automation & information pp. 88–93.
Saleem, K., Fisal, N., Baharudin, M., Hafizah, S., Kamilah, S. & Rashid, R. (2010). Colony
inspired self-optimized routing protocol based on cross layer architecture for WSN,
Int. Conf. on Communications pp. 178–183.
Shor, N. Z. (1985). Minimization Methods for Non-differentiable Functions, Springer-Verlag.
Sridharan, A. & Krishnamachari, B. (2004). Max-min fair collision-free scheduling for wireless
sensor networks, Perfor., Comp. and Communic. pp. 585–590.
Suomela, J. (2009). Optimisation Problems in Wireless Sensor Networks: Local Algorithms and Local
Graphs, PhD thesis, University of Helsinki, Finland.
Tao, W., Chen, C., Yang, B. & Guan, X. (2010). Adaptive topology control for throughput
optimization in wireless sensor networks, Proc. of Int. Conf. Comm. Technology pp. 1299
– 1302.
Valli, R. & Dananjayan, P. (2008). Utility enhancement by power control in WSN with different
topologies using game theoretic approach, ICCIT 2011: 85–89.
Verdone, R. & Fabri, F. (2010). Sociability based routing for environmental opportunistic
networks, Advances in Electr. and telecom. 1: 98–103.
Wan, P., X., L. & Wang, Y. (2001). Power efficient and sparse spanner for wireless ad hoc
networks, In IEEE Int. Conf. on Comp. Com.Net. pp. 564 – 567.
Wang, Q., Fan, P., Wu, D. & Ben Letaief, K. (2011). End-to-end delay constrained routing and
scheduling for wireless sensor networks, ICC pp. 1–5.
Wang, T., Wu, Z. & Mao, J. (2007). A new method for multi-objective TDMA scheduling
in WSN using pareto-based PSO and fuzzy comprehensive judgement, Proc. of High
Perf. Comp. and Comm. pp. 144–155.
Wang, Y., Wang, W., Li, X. & Song, W. (2008). Interference-aware joint routing and TDMA
link scheduling for static wireless networks, IEEE Trans. on par. and distrib. sys.
19: 1709–1725.
Wang, Z. & Crowcroft, J. (1996). Quality of service routing for supporting multimedia
applications„ IEEE J. Sel. Areas Commun 14: 1228–1234.
Wu, Y. & Li, Y. (2008). Construction algorithms for k-connected m-dominating sets in WSN,
MobiHoc pp. 83–90.
Wu, Y., Stankovic, J. A., He, T., Lu, J. & Lin, S. (2008). Realistic and efficient multi-channel
communications in wireless sensor networks, INFOCOM pp. 1193–1201.
Xu, W., Chen, J., Zhang, Y., Xiao, Y. & Sun, Y. (2008). Optimal rate routing in wireless sensor
networks with guaranteed lifetime, IEEE Globcom pp. 1–5.
Xue, Y., Cui, Y. & Nahrstedt, K. (2005). Maximizing lifetime for data aggregation in wireless
sensor networks, Mobile Networks and Applications 6: 853 – 864.
Yang, H. & Cai, W. (2008). Distributed power control algorithm with multi-QoS constraints for
wireless sensor networks, Proc. of Int. Conf on Netw., Sens. and Contr. pp. 1031–1036.
180
28 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
Ye, W. & Heidemann, J. (2003). Medium access control in wireless sensor networks, Technical
report, ISI-TR-580, Information Sciences Institute.
Yilmaz, O. & Erciyes, K. (2010). Distributed weighted node shortest path routing for wireless
sensor networks, Communications in Computer and Information Science, 84: 304–314.
Yoneki, E., Hui, P., Chan, S. & Crowcroft, J. (2007). A socio-aware overlay for
publish/subscribe communication in delay tolerant networks, Proc. of MSWiM, ACM
pp. 225–234.
Yu, Q., Chenyz, J., Fanz, Y., Shenz, X. & Suny, Y. (2010). Multi-channel assignment in wireless
sensor networks: A game theoretic approach, INFOCOM pp. 1127–1135.
Yuanyuan, Z., Jia, X. & Yanxiang, H. (2006). Energy efficient distributed connected dominating
sets construction in WSN., Proc. of Wireless communications pp. 797–802.
Zou, Y. & Chakrabarty, K. A. (2005). A distributed coverage and connectivity centric
technique for selecting active nodes in wireless sensor networks., IEEE Trans. on
Comp. 54: 978–991.
Part 4
Telecommunications
8
1. Introduction
Network is the bearer of services and services are the soul of network. The convergent
network extends the original communications service type and gradually forms new
convergent services which integrate the traditional telecommunication services and a large
number of value-added services or contents on Internet (Kolberg et al., 2010). The integrated
service is essentially to handle the data and services across heterogeneous networks and
service platforms. Facing the heterogeneity and diversity of service resources, integrated
services need to run in a multi-terminal, multi-access network and multi-platform
heterogeneous environment. These tremendous changes of service environment present a
significant interoperability challenge for traditional service provisioning theory. Nowadays,
the provision of context-awareness, adaptive personalized services is the development goal
of future ubiquitous network (Park et al., 2009). It can enable seamless information exchange
between humans, with humans and with entities (e.g., mobile devices), as well as entities
and entities at any time, any place and in any way. To meet the development needs of
adaptive personalized convergent services, dynamic service discovery and composition
technologies are explored widely in the telecommunication service field (Bashah et al., 2010;
Niazi & Mahmoud, 2009).
Today, semantic web service (McIlraith, 2001), as an establishing research paradigm, is
defined as an augmentation of web service with semantic annotation, to facilitate the higher
automation of service discovery, composition, invocation and monitoring in an open
environment. Integration of the semantic web technology and telecommunications systems
is explored widely in the telecommunication service field (Do & Jorstad, 2005; Vitvar &
Viskova, 2005; Qiao et al., 2008a; Gutheim, 2011; Khan et al., 2011; Zander & Schandl, 2011).
It is well known that ontology is the semantic interoperability and knowledge sharing
foundation for semantic web services matching and context reasoning. Therefore, how to
construct the telecommunications service domain ontology is an important factor of
successfully applying semantic web services into telecommunication service systems
(Veijalainen, 2007, 2008). However, telecommunication service field consists of a large
number of concepts/terminologies and relations. How to abstract the sharing domain
184 Telecommunications Networks – Current Status and Future Trends
concepts and reasonably organize them is a big challenge. Some related work has been done
mainly in applying ontology technology to the mobile service domain. Based on the need
for a standardized ontology that describes semantic models of the domains relevant for
scalable NGN (Next Generation Network) service delivery platforms, the (Villalonga et al.,
2009; Su et al., 2009) provide an overview of Mobile Ontology which comprises a core
ontology and several subontologies, and its application examples in the service delivery
platform. This work, as a part of IST SPICE project (IST SPICE project, 2008), is a meaningful
attempt to establish a standardized ontology for mobile service delivery in NGN. In
addition, IST SIMS project explored the semantic interfaces as a new means to specify and
design service components and to guarantee compatibility in static and dynamic component
compositions. And they also defined a domain-specific ontology, and its main purpose of
the ontology is to establish a common description of the SIMS-related concepts and their
semantics (Rój, 2008). The (Zhu et al., 2010) introduces a mobile ontology construction and
retrieval system architecture. However, there lacks a general domain ontology modelling
methodology for telecommunications service and the corresponding engineering approach
to support the development work for domain ontology. The (Li et al., 2010) briefly
introduced the constructing method of telecommunications service domain ontology
(TSDO) proposed by our research team. However, the approach is not perfect at that time
and still needs to be further improved. In fact, telecommunication service domain ontology,
as the important semantic interoperability foundation of telecom network, still has no
significant progress up to now. This has become the biggest obstacle to hamper the
applications of semantic web technology in telecom field.
In this chapter, we clearly presented a practical domain ontology modelling approach for
telecommunications service field. Under the guidance of this approach, our research team
has created an open telecommunications service domain ontology knowledge repository
which consists of around 430 telecommunications services-related ontology
concepts/terminologies and 245 properties. Based on this domain ontology, we described
the telecom network capability services in the semantic level to validate its feasibility. The
semantic annotation facilitated the accurate service description, discovery of
telecommunication network services and addressed the semantic interoperability problem.
The proposed model-driven domain ontology modelling approach separates domain
conceptual model from the concrete ontology modelling languages, it enhances the
reusability of domain conceptual model and greatly reduces the technical difficulty of
domain ontology modelling.
The remainder of this chapter is structured as follows. In Section 2 we presented a general
domain ontology modelling methodology for telecommunications service field, and also
proposed a specific model-driven domain ontology modelling approach to support the
above presented methodology. Section 3 introduced the experimental environment and the
demo service to validate the feasibility of domain ontology. Finally, conclusions are drawn.
1. Terminal Capability Ontology: defines main concepts about terminal software, terminal
hardware, terminal browser and network characteristics supported by terminal.
2. Network Ontology: specifies the network concepts, network category, network
features, as well as the relationships of various networks, such as mobile network,
internet, and fixed network, GSM, CDMA, UMTS, WCDMA, and WLAN.
3. Service Role Ontology: describes the stakeholders’ concepts of the service supply
chain, for example, service provider, content provider, network operator, service user.
4. Service Category Ontology: describes a telecommunications service classification. This
ontology defines the relationship between various telecommunications services, like
basic service, value-added service, voice service, data service, conference service,
presence service, download service, browsing service, messaging service.
5. Charging Ontology: defines the charging-related concepts and rules about
telecommunications services, including payment methods (such as prepaid and post-
paid), charging types (such as time-based, volume-based, event-based, and content-
based), billing rates, as well as account balances.
6. Service Quality Ontology: A telecommunication network must provide the services
which have the end-to-end QoS guarantee. Depending on the technical characteristics,
the QoS provided by different networks is varying. Service Quality Ontology mainly
defines the QoS-related concepts about telecommunications service, including access
network QoS, core network QoS and user’s QoE, such as call delay, message size, call
through rate, positioning accuracy, network bandwidth.
scenarios. In this step, modellers need to list the collected concepts, relations and
explanations as far as possible. It’s unnecessary to care about the meaning overlap between
the concepts and to consider how to express these concepts and their relation in class,
property or instance ways. For example, Figure 4 briefly shows the concepts collection about
network ontology.
Figure 5 shows the conceptual model of network ontology in part. Based on the
terminologies collected in the above step, the class hierarchy and relationships are
described. This conceptual model depicts the classification of network, the services provided
by network and the operator of network. It can be seen that the ranges of object property
“operatedBy” and “provides” are the concepts from ServiceRole and ServiceCategory sub-
ontologies respectively. In addition, we define the domain axioms through the constraints
way. For example, we define that “FixedNetwork” is disjointed with “MobileNetwork”, i.e.
if N1 is an instance of concept “FixedNetwork”, then it will not be an instance of concept
“MobileNetwork”.
evaluated against many criteria: its coverage of a particular domain and the richness,
complexity and granularity of that coverage; the specific use cases, scenarios, requirements,
applications, and data sources it was developed to address; and formal properties such as
the consistency and completeness of the ontology. We can test and validate whether the
domain ontology satisfy the requirement or not. If yes, these ontologies will be added to the
ontology repository; if no, we have to return back to previous steps to make some revisions
until the requirement is satisfied.
In the specific use process, we often can find some existing shortcomings of domain
ontology. The utilization of domain ontology to formally describe the concrete application
scenario is a very effective evaluation approach. For example, when we defined the TSDO,
we use network, service role and service category sub-ontologies to describe the network
carrier resource (see Figure 7). We found that the operating scope of network carrier is an
important characteristic. But the concept “NetworkOperator” of service role sub-ontology
lacks this property. Actually, some carriers can provide services through out nation;
however, some carriers can only provide services in a specific province or region. Therefore,
the property “CoverageScope” should be added to the concept “NetworkOperator” of
service role sub-ontology.
described in section 2.1. By this approach, domain experts or general software developers,
who are familiar with UML, can conveniently build the domain conceptual model by UML
modelling tools and then this conceptual model can be automatically transformed into the
corresponding ontology model encoded by a specific ontology language. As this approach
separates domain conceptual model from the concrete ontology modelling languages like
OWL, it enhances the reusability of domain conceptual model and reduces the technical
difficulty of domain ontology modelling. The implementation details are described in the
following sections.
concepts and their relationships to form a high-level domain ontology model, which is
independent of a specific ontology description language. The PSM and code steps are
used to realize the formalization of high-level domain ontology conceptual model by a
specific ontology language. By the model to model transformation technology, the high-
level conceptual model (i.e. PIM ) can be transformed into an ontology language specific
model (i.e. PSM). And then by using model to code transformation technology, the
concrete ontology description file encoded by a specific ontology language like OWL (i.e.
code) can be generated from the ontology language specific model (i.e. PSM). When we
need to revise or maintain the created ontology, we can return back to the CIM or PIM to
modify the related models and then generated the corresponding code again. In this
mode-driven ontology development approach, all processes adopt the standard UML
model or UML extension mechanism (i.e. UML Profile). The technical details are
described in the following sections.
(a) (b)
(a) (b)
Fig. 12. The direct mapping example from UML to OWL.
However, although UML Class diagram has some constructs similar to the constructs of
ontology representation language, there are still some ontology constructs which cannot be
represented by UML constructs directly. We need to find the appropriate UML elements to
represent some other ontology constructs, like objectProperty, equivalent class relation, and
disjointing class relation. For instance, we can select the directedAssociation element of
UML to represent the ObjectProperty and use the constraints anchored with association to
represent the inverse, symmetric or transitive feature of ObjectProperty. An illustrated
example is shown in Figure 13.
As a common software modeling language, most of software developers, system analysts
and designers are familiar with UML. So, in order to decrease the technical threshold, it’s a
practical approach for the conceptual modeling of TSDO by UML. Although UML has some
similar constructs with ontology language, however, the modeling goals and description
capabilities of both languages have some differences. From the above analysis, in order to
use UML to represent high-level ontology conceptual model, we need to define a specific
tailored representation method to guide the modeler to build the conceptual model of
domain ontology. Table 1 shows the main corresponding relation of UML elements with
ontology elements. According to this semantic representation way, the modeler can use the
UML elements to describe the semantic-enabled high-level ontology conceptual model like
Figure 14.
196 Telecommunications Networks – Current Status and Future Trends
(a) (b)
Table 1. The defined UML representation method for high-level conceptual model of
domain ontology.
Telecommunications Service Domain Ontology:
Semantic Interoperation Foundation of Intelligent Integrated Services 197
Definition of
Source Transformation Rules Target
MetaModel MetaModel
Model
Instantiation Transformation Instantiation
Engine
Therefore, in order to transform the high-level ontology conceptual model (i.e. PIM) into
platform specific model (i.e. PSM), we need to define the transformation rules according to
the source and target metamodels. In our proposed approach, the high-level ontology
conceptual model (i.e. PIM) is modeled by UML2.0, and the source metamodel is UML2.0
metamodel obviously. So we need a target metamodel relating to specific ontology language
to describe the formal ontology model (i.e. PSM). In fact, OMG (Object Management
Organization), which is the promoter of MDA, has considered this problem. In May 2009,
OMG released the Ontology Definition Metamodel (ODM) v1.0 (OMG, 2009) based on the
198 Telecommunications Networks – Current Status and Future Trends
Fig. 16. ODM: the integration of semantic web and model driven architecture.
Telecommunications Service Domain Ontology:
Semantic Interoperation Foundation of Intelligent Integrated Services 199
Therefore, in this approach, the metamodel of PSM employs the UML Profile for RDF and
OWL defined in ODM specification. This profile is designed to support modelers
developing vocabularies in Resource Description Framework (RDF) (W3C, 2004b) and
richer ontologies in the Web Ontology Language (OWL) through reuse of UML notation
using tools that support UML2 extension mechanisms. Table 2 specifies a part of
stereotypes set that comprise the UML2 Profile for using UML to represent RDF/S and
OWL vocabularies.
After the source and target metamodels are determined, we can define the model
transformation rules from high-level ontology conceptual model (i.e. PIM) to ontology
language related model (i.e. PSM). For example, based on the Table 1 and Table 2, we can
define the following model transformation rules to support the model transformation like
Figure 17. Notably, the source metamodel is UML2.0 metamodel and the target metamodel
is UML Profile for RDF and OWL in this proposed approach.
When the transformation rules are defined, the model transformation engine can scan the
elements of source model and then transform them into the corresponding elements of
target model according to the transformation rules. As model transformation is a key
technique used in model-driven architecture. In 2002, OMG issued a Request for proposal
(RFP) on MOF Query/View/Transformation to seek a standard compatible with the MDA
recommendation suite (UML, MOF, OCL, etc.). Several replies were given by a number of
companies and research institutions that evolved during three years to produce a common
proposal that was submitted and approved. QVT (Query/View/Transformation) (OMG,
200 Telecommunications Networks – Current Status and Future Trends
2008) is a standard set of languages for model transformation defined by the Object
Management Group. Currently, some MDA tools have declared to support the complete or
part functions of QVT. For example, by using the transformation rules, the source model in
Figure 14 is transformed into a target model in Figure 18.
Fig. 18. PSM: A part of ontology specific model based on UML Profile for RDF and OWL.
Telecommunications Service Domain Ontology:
Semantic Interoperation Foundation of Intelligent Integrated Services 201
• Q: A nonempty and finite set of states and one state in it corresponds to an ontology
class node. ∀ q∈Q, q is called a state of MTA.
• Σ: Input events table, in which one input event corresponds to an ontology relation
node.
• δ: Transfer function. One transfer function corresponds to a nonzero number
aij ( aij ≠ 0 ), δ:Q×Σ→Q in relation matrix.
• q0: The begin state of MTA, q0∈Q.
202 Telecommunications Networks – Current Status and Future Trends
• F: The set of terminate states. F is included by Q. Any q∈F, q is called a terminate state
of MTA.
According to the definitions given above, the transformation engine from PSM to formal file
encoded by OWL can be described as: The model transformation engine firstly scans the
PSM class graph, and the scanning result generates the ontology model triples UmlOnt(C, R,
G). C is the set of all nodes in UML class graph, R is the set of all relations in UML class
graph, G represents the structure relationship of the ontology class graph, which can be
regarded as N connected subgraphs divided from a directed graph and these subgraphs
correspond to N relation matrices {RM1, RM2, …, RMn }. One nonzero number aij
represents the relation type between the class node i and j, and these relations are all
included in R.
When the transformation engine finishes scanning, it input the scan result to the model
transformation automaton. In this MTA, the nonempty finite set of states corresponds to C
in the ontology model triples; the input events table corresponds to R in the ontology model
triples; the transfer function corresponds to G in the ontology model triples; q0 and F are
elements in C. In the procedure of state transforming, the corresponding operations of
model transformation are also performed in MTA. When the automaton arrives at the
terminal, the transformation finishes.
2.2.5.2 The implementation mechanism of model to code transformation engine
In order to realize the model to code transformation according to the above mentioned
theory, we design a model transformation engine based on Eclipse Plugin technology. In
MDA, XML Metadata Interchange (XMI) (OMG, 2005b) is an Object Management Group
(OMG) standard for exchanging metadata information via Extensible Markup Language
(XML). As the most of MDA tools use XMI as an interchange format for UML models, the
model transformation engine is responsible for scanning PSM encoded by XMI and then
transforming PSM into ontology file encoded by OWL. The process of model to code
transformation is indicated in Figure 19.
2.2.5.2.1 Model scanning module
When building ontology model, different modeling tool means different element label and
different label structure in the model description file. Therefore, this chapter proposed a
transitional model convert method, which adopts same data structure when describes
different model format, i.e. the triples in Definition 1. This allows the model transformation
is no longer constrained by the model structure. It thereby improves the versatility of
transformation engine and is convenient to be maintained and updated.
The model scanning module in transformation engine scans the UML class graph encoded
by XMI, and the scan result will generate two list sets in the transitional model. It is used to
store the class nodes and relation nodes of UML graph, which corresponds to the C and R
set in the UML ontology model triples.
2.2.5.2.2 Building relation matrix module
The function of relation matrix building module is used to generate the relation matrix of
PSM, i.e. the G set in UML ontology model triples. There are mainly two kinds of nodes in
Telecommunications Service Domain Ontology:
Semantic Interoperation Foundation of Intelligent Integrated Services 203
UML class graph: class node and relation node. Relation node connects class node and
distinguishes them by direction, which is very similar to the directed graph. Hence directed
graph is adopted to represent UML class graph. Usually matrix is used to represent the
graph, and the values in matrix represent the type of relation. In ontology model class
graph, there may be several independent subgraphs, which satisfy the description in
definition 2. Therefore, it is necessary to handle the relation matrix to produce N
independent sub relation matrices. This method can reduce the order or relation matrix and
thereby reduce store space of the model, which also improves the efficiency of model
transformation.
description model triples (C, R, G). The states, input events and transformation function of
the automaton correspond to the class nodes, relation nodes and relation matrix set
respectively in PSM class graph. The begin state of automaton is the owlClass node or
objectProperty/datatypeProperty node in class nodes and the terminate states set includes
all class nodes whose out-degree are zero and all nodes have been transformed by the
automaton.
The model transformation regulation table defines the transformation regulation from UML
Profile for RDF and OWL to OWL language. In the states jump process of model
transformation automaton, corresponding regulation is used to perform model
transformation. In the process of formulating the transformation regulation, the relations
between every label node should be unified, which makes the regulation can be formulated
depending on the OWL label structure and the relations between UML model elements.
And good regulation is easy to extend in the future.
2.2.5.2.4 Model output module
Model output module only stores the formalized result of the transformation to the
appointed path. And in order to verify the validity of the OWL file transformed, user can
import the generate code into protégé tool for verification. Protégé is an ontology editor
developed by Stanford University, which represents the OWL structure in graphic interface
and makes the verification of OWL code validity more quickly and conveniently.
By using the above mentioned model to code transformation approach, the PSM of Figure
18 is transformed into the corresponding ontology encoded by OWL like Figure 20.
Based on this domain ontology, we described the telecom network capability services in the
semantic level to validate its feasibility. We apply the semantic web service and ontology
technologies to the telecommunications service domain, and present an infrastructure to
enable the semantic interoperability of telecom network and Internet in the service layer
(Qiao et al., 2008b). The proposed approach improves the accuracy of telecommunication
network services description, discovery and matching, and unifies the semantic
representations of telecommunication and Internet services.
4. Conclusion
The network heterogeneity and service convergence are the main characteristics of future
network. The provision of self-adaptive intelligent integrated services has become the
pursuing goal of network carriers and value-added service providers. Dynamic discovery
and composition of services are the important enabling technologies for self-adaptive
integrated services. In the service discovery and composition process, semantic
interoperability is a key issue. Actually, ontology, as a semantic interoperability and
knowledge sharing foundation, has obtained more and more attentions. However,
telecommunication service field consists of a large number of concepts/terminologies and
208 Telecommunications Networks – Current Status and Future Trends
relations. How to abstract the sharing domain concepts and reasonably organize them is a
big challenge. In this chapter, we presented a practical domain ontology modelling
approach for telecommunications service field. Based on this approach, we constructed an
open telecommunication service domain ontology repository to support the knowledge
sharing and reuse. This will partly facilitate the semantic interoperability of the
telecommunications networks and the Internet in the service layer.
5. Acknowledgment
This work was supported by National Key Basic Research Program of China (973 Program)
under Grant No. 2012CB315802, National Natural Science Foundation of China under Grant
No. 60802034, No. 61171102 and No. 61132001, Beijing Nova Program under Grant No.
2008B50 and New generation broadband wireless mobile communication network Key
Projects for Science and Technology Development under Grant No. 2011ZX03002-002-01.
We thank Huawei Technologies Co., Ltd. for cooperation in promotion of this work. Thanks
also to Dr. Anna Fensel, a Senior Researcher at FTW – Telecommunications Research Center
Vienna and STI Innsbruck, University of Innsbruck, Austria, for her valuable comments and
suggestions.
6. References
Bashah, N.S.K., Jorstad, I. & Thanh, D.V. (2010). Service Discovery in Future Open Mobile
Environments. Proceedings of ICDS 2010 Fourth International Conference on Digital
Society, pp.47-53, ISBN 978-1-4244-5805-9, St. Maarten, Netherlands Antilles,
February 10-16, 2010
Borland, (2006). Together: Visual Modeling for Software Architecture Design. 26.09.2011,
Available from http://www.borland.com/us/products/together/
BUPT, (2009). Semantic web application for telecommunications service. 26.09.2011,
Available from http://www.int.bupt.cn/jsp/centers/bupt506/intro.htm
Do, T.V., Jorstad, I. (2005). A service-oriented architecture framework for mobile services.
Proceedings of Advanced Industrial Conference on Telecommunications/Service Assurance
with Partial and Intermittent Resources Conference/E-Learning on Telecommunications
Workshop AICT/SAPIR/ ELETE, pp. 65 – 70, ISBN 0-7695-2388-9, Lisbon, Portugal,
July 17-20, 2005
FOAF, (2010). FOAF Vocabulary Specification. 26.09.2011, Available from
http://xmlns.com/foaf/spec/
FOAF project, (2000). The Friend of a Friend (FOAF) project. 26.09.2011, Available from
http://www.foaf-project.org/
Google, (2010). Google's Semantic Web Push: Rich Snippets Usage Growing. 26.09.2011,
Available from
http://www.readwriteweb.com/archives/google_semantic_web_push_rich_snipp
ets_usage_grow.php
Gutheim, P. (2011). An ontology-based context inference service for mobile applications in
next-generation networks. IEEE Communications Magazine, Vol. 49, No. 1, (Jan.
2011), pp. 60 – 66, ISSN 0163-6804
IST SPICE project, (2008). 26.09.2011, Available from http://www.ist-spice.org/
Telecommunications Service Domain Ontology:
Semantic Interoperation Foundation of Intelligent Integrated Services 209
Khan, A., Asghar, S. and Fong, S. (2011). Framework of integrated Semantic Web Services
and Ontology Development for Telecommunication Industry. Journal of Emerging
Technologies in Web Intelligence, Vol. 3, No. 2, (May 2011), pp.110-119, ISSN 1798-
0461
Kolberg, M., Merabti, M. & Moyer, S. (2010). Consumer communication applications drive
integration and convergence. IEEE Communications Magazine, Vol.48, No. 12,
(December 2010), pp. 24 - 24, ISSN 0163-6804
Niazi, R., Mahmoud Q.H. (2009). An Ontology-Based Framework for Discovering Mobile
Services. Proceedings of CNSR 2009 Seventh Annual Communication Networks and
Services Research Conference, pp.178-184, ISBN 978-0-7695-3649-1, Moncton, New
Brunswick, Canada, May 11-13, 2009
Li, X.F., Peng, H., Li, Y. & Qiao, X.Q. (2010). Research on Constructing Telecom Services
Domain Ontology. Proceedings of 2010 International Conference on Computational
Intelligence and Software Engineering (CiSE), pp.1-4, ISBN 978-1-4244-5391-7, Wuhan,
China, Dec. 10-12, 2010
Linked Data, (2007). Linked Data - Connect Distributed Data across the Web. 26.09.2011,
Available from http://linkeddata.org/
McIlraith, S.A., Son, T.C. & Zeng H.L. (2001). Semantic Web services. IEEE Intelligent
Systems, Vol. 16, No.2, (Mar.-Apr. 2001), pp. 46 – 53, ISSN 1541-1672
Miller, J. & Mukerji, J. (2003). MDA Guide V1.0.1. 26.09.2011, Available from
http://www.omg.org/cgi-bin/doc?omg/03-06-01
Moerdijk, A.-J. & Klostermann, L. (2003). Opening the Networks with Parlay/OSA:
Standards and Aspects Behind the APIs, IEEE Network, vol.17, no.3, (May-June
2003) pp: 58-64, ISSN 0890-8044
OMA, (2001). User Agent Profile. 26.09.2011, Available from
http://www.openmobilealliance.org/tech/affiliates/wap/wap-248-uaprof-
20011020-a.pdf
OMG. (2003). Model Driven Architecture. 26.09.2011, Available from
http://www.omg.org/mda/
OMG. (2005). Unified Modeling Language. 26.09.2011, Available from
http://www.omg.org/spec/UML/
OMG. (2005). XML Metadata Interchange. 26.09.2011, Available from
http://www.omg.org/spec/XMI/
OMG. (2006). Meta Object Facility. 26.09.2011, Available from http://www.omg.org/mof/
OMG. (2008). Meta Object Facility (MOF) 2.0 Query/View/Transformation (QVT).
26.09.2011, Available from http://www.omg.org/spec/QVT/index.htm
OMG. (2009). Ontology Definition Metamodel (ODM). 26.09.2011, Available from
http://www.omg.org/spec/ODM/1.0/
Park, K.L., Yoon, U.H. & Kim S.D. (2009). Personalized Service Discovery in Ubiquitous
Computing Environments. IEEE Pervasive Computing, Vol.8, No.1, (Jan.-March
2009), pp.58 – 65, ISSN 1536-1268
Qiao, X.Q., Li X.F. and You, T. (2008). A Semantic Description Approach for
Telecommunications Network Capability Services. Proceedings of 11th Asia-Pacific
Network Operations and Management Symposium, pp.334-343, ISBN 978-3-540-88622-
8, Beijing, China, October 22-24, 2008
210 Telecommunications Networks – Current Status and Future Trends
Qiao, X.Q., Li, X.F., You, T., Sun, L.H. (2008). Semantic Telecommunications Network
Capability Services. Proceedings of the 3rd Asian Semantic Web Conference (ASWC
2008). pp. 508–523, ISBN 978-3-540-89703-3, Bangkok, Thailand, Dec. 8-11 2008
Rój, M. (2008). Recommendations for telecommunications services ontology, In: IST SIMS
project deliverables, 26.09.2011, Available from http://www.ist-sims.org.
Selic, B. (2003). The pragmatics of model-driven development. IEEE Software, Vol. 20, No. 5,
(Sept.-Oct. 2003), pp. 19 – 25, ISSN 0740-7459
Stanford Protégé team. (2004). Protégé. 26.09.2011, Available from
http://protege.stanford.edu/
Su X.M., Alapnes, S. and Shiaa M.M. (2009). Mobile Ontology: Its Creation and Its Usage, In:
Constructing Ambient Intelligence, H. Gerhauser, J. Hupp, C. Efstratiou and J.
Heppner (Eds.), pp.75-79, Springer-Verlag Berlin Heidelberg, ISBN 3-642-10606-4,
Germany
Twitter, (2010). Semantics, tagging and Twitter. 26.09.2011, Available from
http://ml.sun.ac.za/2010/04/23/semantics-tagging-and-twitter/
Veijalainen, J. (2007) Developing Mobile Ontologies; Who, Why, Where, and How?
Proceedings of 2007 International Conference on Mobile Data Management, pp. 398 – 401,
ISBN 1-4244-1241-2, Mannheim, Germany, May 1-1, 2007
Veijalainen, J. (2008). Mobile Ontologies: Concept, Development, Usage, and Business
Potential. International Journal on Semantic Web and Information Systems (IJSWIS),
Vol. 4, No. 1, (Sep. 2008), pp.20-34, ISSN: 1552-6283
Villalonga, C., Strohbach, M., Snoeck, N., Sutterer, M., Belaunde, M., Kovacs, E., Zhdanova,
A.V., Goix, L.W., Droegehorn, O. (2009). Mobile Ontology: Towards a Standardized
Semantic Model for the Mobile Domain. Proceedings of the 1st International Workshop
on Telecom Service Oriented Architectures (TSOA 2007) at the 5th International
Conference on Service-Oriented Computing, pp. 248-257, ISBN, 978-3-540-93850-7.
Vienna, Austria, September 17, 2007
Vitvar, T., Viskova, J. (2005). Semantic-enabled Integration of Voice and Data Services:
Telecommunication Use Case, Proceedings of 2005 IEEE European Conference on Web
Services (ECOWS2005), pp. 138-151, ISBN 0-7695-2484-2, Vaxjo, Sweden,
November14-16, 2005
W3C. (2004). OWL Web Ontology Language Overview. 26.09.2011, Available from
http://www.w3.org/TR/owl-features/
W3C. (2004). Resource Description Framework (RDF). 26.09.2011, Available from
http://www.w3.org/RDF/
W3C, (2007). Composite Capabilities/Preference Profiles: Structure and Vocabularies 2.0.
26.09.2011, Available from http://www.w3.org/Mobile/CCPP/
Zander, S., Schandl, B. (2011). Semantic Web-enhanced Context-aware Computing in Mobile
Systems: Principles and Application. In: Mobile Computing Techniques in Emerging
Markets: Systems, Applications and Services, Kumar, A.V. Senthil (Eds.), Retrieved
from http://eprints.cs.univie.ac.at/2870/
Zhu, J.W., Li, B., Wang, F., Wang, S.CH. (2010). An Overview of CRS4MO Project:
Construction and Retrieval System for Mobile Ontology. Journal of Computational
Information Systems, Vol.6, No.6, (June, 2010), pp. 2009-2015, ISSN 1553-9105
9
Quantum Secure
Telecommunication Systems
Oleksandr Korchenko1, Petro Vorobiyenko2,
Maksym Lutskiy1, Yevhen Vasiliu2 and Sergiy Gnatyuk1
1National Aviation University
2Odessa National Academy of Telecommunication
named after O.S. Popov
Ukraine
Our scientific field is still in its embryonic stage. It's great that
we haven't been around for two thousands years. We are still at
a stage where very, very important results occur in front of our eyes
Michael Rabin
1. Introduction
Today there is virtually no area where information technology (ІТ) is not used in some way.
Computers support banking systems, control the work of nuclear power plants, and control
aircraft, satellites and spacecraft. The high level of automation therefore depends on the
security level of IT.
The main features of information security are confidentiality, integrity and availability. Only
providing these all gives availability for development secure telecommunication systems.
Confidentiality is the basic feature of information security, which ensures that information is
accessible only to authorized users who have an access. Integrity is the basic feature of
information security indicating its property to resist unauthorized modification. Availability
is the basic feature of information security that indicates accessible and usable upon demand
by an authorized entity.
One of the most effective ways to ensure confidentiality and data integrity during
transmission is cryptographic systems. The purpose of such systems is to provide key
distribution, authentication, legitimate users authorisation, and encryption. Key distribution
is one of the most important problems of cryptography. This problem can be solved with the help
of (SECOQC White Paper on Quantum Key Distribution and Cryptography, 2007;
Korchenko et al., 2010a):
• Classical information-theoretic schemes (requires channel with noise; efficiency is very low,
1–5%).
• Classical public-key cryptography schemes (Diffie-Hellman scheme, digital envelope
scheme; it has computational security).
212 Telecommunications Networks – Current Status and Future Trends
other protocols (Bradler, 2005; Lütkenhaus & Shields, 2009; Navascués & Acín, 2005;
Pirandola et al., 2008).
The main task of QKD protocols is encryption key generation and distribution between two
users connecting via quantum and classical channels (Gisin et al., 2002). In 1984 Ch. Bennett
from IBM and G. Brassard from Montreal University introduced the first QKD protocol
(Bennett & Brassard, 1984), which has become an alternative solution for the problem of key
distribution. This protocol is called BB84 (Bouwmeester et al., 2000) and it refers to QKD
protocols using single qubits. The states of these qubits are the polarisation states of single
photons. The BB84 protocol uses four polarisation states of photons (0°, 45°, 90°, 135°). These
states refer to two mutually unbiased bases. Error searching and correcting is performed
using classical public channel, which need not be confidential but only authenticated. For
the detection of intruder actions in the BB84 protocol, an error control procedure is used,
and for providing unconditionally security a privacy amplification procedure is used
(Bennett et al., 1995). The efficiency of the BB84 protocol equals 50%. Efficiency means the
ratio of the photons number which are used for key generation to the general number of
transmitted photons.
Six-state protocol requires the usage of four states, which are the same as in the BB84
protocol, and two additional directions of polarization: right circular and left circular (Bruss,
1998). Such changes decrease the amount of information, which can be intercepted. But on
the other hand, the efficiency of the protocol decreases to 33%.
Next, the 4+2 protocol is intermediate between the BB84 and B92 protocol (Huttner et al.,
1995). There are four different states used in this protocol for encryption: “0” and “1” in two
bases. States in each base are selected non-orthogonal. Moreover, states in different bases
must also be pairwise non-orthogonal. This protocol has a higher information security level
than the BB84 protocol, when weak coherent pulses, but not a single photon source, are used
by sender (Huttner et al., 1995). But the efficiency of the 4+2 protocol is lower than efficiency
of BB84 protocol.
In the Goldenberg-Vaidman protocol (Goldenberg & Vaidman, 1995), encryption of “0” and “1”
is performed using two orthogonal states. Each of these two states is the superposition of
two localised normalised wave packets. For protection against intercept-resend attack,
packets are sent at random times.
A modified type of Goldenberg-Vaidman protocol is called the Koashi-Imoto protocol (Koashi
& Imoto, 1997). This protocol does not use a random time for sending packets, but it uses an
interferometer’s non-symmetrisation (the light is broken in equal proportions between both
long and short interferometer arms).
The measure of QKD protocol security is Shannon’s mutual information between legitimate
users (Alice and Bob) and an eavesdropper (Eve): I AE ( D ) and I BE ( D ) , where D is error
level which is created by eavesdropping. For most attacks on QKD protocols,
I AE ( D ) = I BE ( D ) , we will therefore use I AE ( D ) . The lower I AE ( D ) in the extended range of
D is, the more secure the protocol is.
Six-state protocol and BB84 protocol were generalised in case of using d-level quantum
systems — qudits instead qubits (Cerf et al., 2002). This allows increasing the information
214 Telecommunications Networks – Current Status and Future Trends
capacity of protocols. We can transfer information using d-level quantum systems (which
correspond to the usage of trits, quarts, etc.). It is important to notice that QKD protocols are
intended for classical information (key) transfer via quantum channel.
The generalisation of BB84 protocol for qudits is called protocol using single qudits and two
bases due to use of two mutually unbiased bases for the eavesdropping detection. Similarly,
the generalisation of six-state protocol is called protocol using qudits and d+1 bases. These
protocols’ security against intercept-resend attack and non-coherent attack was investigated
in a number of articles (see e.g. Cerf et al., 2002). Vasiliu & Mamedov have carried out a
comparative analysis of the efficiency and security of different protocols using qudits on the
basis of known formulas for mutual information (Vasiliu & Mamedov, 2008).
mutual information between Alice and Bob and I (AE ) ( D ) and I (AE) ( D ) is mutual
d+1 2
information between Alice and Eve for protocols using d+1 and two bases accordingly.
a) b)
Fig. 1. Mutual information for non-coherent attack. 1, 2, 3 — I AB ( D ) for d = 2, 4, 8 (а) and
d = 16, 32, 64 (b); 4, 5, 6— I (AE ) ( D ) for d = 2, 4, 8 (а) and d = 16, 32, 64 (b); 7, 8, 9— I (AE) ( D )
d+1 2
In fig. 1 we can see that at low qudit dimension (up to d ~ 16) the protocol’s security against
non-coherent attack is higher when d+1 bases are used (when d = 2 it corresponds as noted
above to greater security of six-state protocol than BB84 protocol). But the protocol’s security
is higher when two bases are used in the case of large d, while the difference in Eve’s
information (using d+1 or two bases) is not large in the work region of the protocol, i.e. in
the region of Alice’s and Bob’s low error level. That’s why that the number of bases used has
little influence on the security of the protocol against non-coherent attack (at least for the
qudit dimension up to d = 64). The crossing points of curves I AB ( D ) and I AE ( D )
correspond to boundary values D, up to which one’s legitimate users can establish a secret
Quantum Secure Telecommunication Systems 215
The Ekert protocol (E91) (Ekert, 1991) refers to QKD protocols using entangled states.
Entangled pairs of qubits that are in a singlet state ψ − = 1 2 ( 0 1 − 1 0 ) are used in
this protocol. Qubit interception between Alice to Bob does not give Eve any information
because no coded information is there. Information appears only after legitimate users make
measurements and communicate via classical public authenticated channel (Ekert, 1991).
But attacks with additional quantum systems (ancillas) are nevertheless possible on this
protocol (Inamori et al., 2001).
Kaszlikowski et al. carried out the generalisation of the Ekert scheme for three-level
quantum systems (Kaszlikowski et al., 2003) and Durt et al. carried out the generalisation of
the Ekert scheme for d-level quantum systems (Durt et al., 2004): this increases the
information capacity of the protocol a lot. Also the security of the protocol using entangled
qudits is investigated (Durt et al., 2004). In the paper (Vasiliu & Mamedov, 2008), based on
the results of (Durt et al., 2004), the security comparison of protocol using entangled qudits
and protocols using single qudits (Cerf et al., 2002) against non-coherent attack is made. It
was found that the security of these two kinds of protocols is almost identical. But the
efficiency of the protocol using entangled qudits increases more slowly with the increasing
dimension of qudits than the efficiency of the protocol using single qudits and two bases.
Thus, from all contemporary QKD protocols using qudits, the most effective and secure
against non-coherent attack is the protocol using single qudits and two bases (BB84 for
qubits).
The aforementioned protocols with qubits are vulnerable to photon number splitting attack.
This attack cannot be applied when the photon source emits exactly one photon. But there
are still no such photon sources. Therefore, sources with Poisson distribution of photon
number are used in practice. The part of pulses of this source has more than one photon.
That is why Eve can intercept one photon from pulse (which contains two or more photons)
and store it in quantum memory until Alice transfers Bob the sequence of bases used. Then
Eve can measure stored states in correct basis and get the cryptographic key while
216 Telecommunications Networks – Current Status and Future Trends
remaining invisible. It should be noted that there are more advanced strategies of photon
number splitting attack which allow Bob to get the correct statistics of the photon number in
pulses if Bob is controlling these statistics (Lutkenhaus & Jahma, 2002).
In practice for realisation of BB84 and six-state protocols weak coherent pulses with average
photon number about 0,1 are used. This allows avoiding small probability of two- and
multi-photon pulses, but this also considerably reduces the key rate.
The SARG04 protocol does not differ much from the original BB84 protocol (Branciard et al.,
2005; Scarani et al., 2004; Scarani et al., 2009). The main difference does not refer to the
“quantum“ part of the protocol; it refers to the “classical” procedure of key sifting, which
goes after quantum transfer. Such improvement allows increasing security against photon
number splitting attack. The SARG04 protocol in practice has a higher key rate than the
BB84 protocol (Branciard et al., 2005).
Another way of protecting against photon number splitting attack is the use of decoy states
QKD protocols (Brassard et al., 2000; Peng et al., 2007; Rosenberg et al., 2007; Zhao et al.,
2006), which are also advanced types of BB84 protocol. In such protocols, besides
information signals Alice’s source also emits additional pulses (decoys) in which the average
photon number differs from the average photon number in the information signal. Eve’s
attack will modify the statistical characteristics of the decoy states and/or signal state and
will be detected. As practical experiments have shown for these protocols (as for the
SARG04 protocol), the key rate and practical length of the channel is bigger than for BB84
protocols (Peng et al., 2007; Rosenberg et al., 2007; Zhao et al., 2006). Nevertheless, it is
necessary to notice that using these protocols, as well as the others considered above, it is
also impossible without users pre-authentication to construct the complete high-grade
solution of the problem of key distribution.
As a conclusion, after the analysis of the first and scale quantum method, we must sum up
and highlight the following advantages of QKD protocols:
1. These protocols always allow eavesdropping to be detected because Eve’s connection
brings much more error level (compared with natural error level) to the quantum
channel. The laws of quantum mechanics allow eavesdropping to be detected and the
dependence between error level and intercepted information to be set. This allows
applying privacy amplification procedure, which decreases the quantity of information
about the key, which can be intercepted by Eve. Thus, QKD protocols have
unconditional (information-theoretic) security.
2. The information-theoretic security of QKD allows using an absolutely secret key for
further encryption using well-known classical symmetrical algorithms. Thus, the
entire information security level increases. It is also possible to synthesize QKD
protocols with Vernam cipher (one-time pad) which in complex with unconditionally
secured authenticated schemes gives a totally secured system for transferring
information.
The disadvantages of quantum key distribution protocols are:
1. A system based only on QKD protocols cannot serve as a complete solution for key
distribution in open networks (additional tools for authentication are needed).
Quantum Secure Telecommunication Systems 217
2. The limitation of quantum channel length which is caused by the fact that there is no
possibility of amplification without quantum properties being lost. However, the
technology of quantum repeaters could overcome this limitation in the near future
(Sangouard et al., 2011).
3. Need for using weak coherent pulses instead of single photon pulses. This decreases the
efficiency of protocol in practice. But this technology limitation might be defeated in the
nearest future.
4. The data transfer rate decreases rapidly with the increase in the channel length.
5. Photon registration problem which leads to key rate decreasing in practice.
6. Photon depolarization in the quantum channel. This leads to errors during data
transfer. Now the typical error level equals a few percent, which is much greater than
the error level in classical telecommunication systems.
7. Difficulty of the practical realisation of QKD protocols for d-level quantum systems.
8. The high price of commercial QKD systems.
transferring information are needed. Such methods should make intercepted information
negligible.
One of the quantum secure direct communication protocols is the ping-pong protocol
(Boström & Felbinger, 2002; Cai & Li, 2004b; Vasiliu, 2011), which does not require qubit
transfer by blocks. In the first variant of this protocol, entangled pairs of qubits and two
coding operations that allow the transmission of one bit of classical information for one
cycle of the protocol are used (Boström & Felbinger, 2002). The usage of quantum
superdense coding allows transmitting two bits for a cycle (Cai & Li, 2004b). The subsequent
increase in the informational capacity of the protocol is possible by the usage instead of
entangled pairs of qubits their triplets, quadruplets etc. in Greenberger-Horne-Zeilinger
(GHZ) states (Vasiliu & Nikolaenko, 2009). The informational capacity of the ping-pong
protocol with GHZ-states is equal to n bits on a cycle where n is the number of entangled
qubits. Another way of increasing the informational capacity of ping-pong protocol is using
entangled states of qudits. Thus, the corresponding protocol based on Bell’s states of three-
level quantum system (qutrit) pairs and superdense coding for qutrits is introduced (Wang
et al., 2005; Vasiliu, 2011).
The advantages of QSDC protocols are a lack of secret key distribution, the possibility of
data transfer between more than two parties, and the possibility of attack detection
providing a high level of information security (up to information-theoretic security) for the
protocols using block transfer. The main disadvantages are difficulty in practical realisation
of protocols using entangled states (and especially protocols using entangled states for d-
level quantum systems), slow transfer rate, the need for large capacity quantum memory for
all parties (for protocols using block transfer of qubits), and the asymptotic security of the
ping-pong protocol. Besides, QSDC protocols similarly to QKD protocols is vulnerable to
man-in-the-middle attack, although such attack can be neutralized by using authentication
of all messages, which are sent via the classical channel.
Asymptotic security of the ping-pong protocol (which is one of the simplest QSDC protocols
from the technical viewpoint) can be amplified by using methods of classical cryptography.
Security of several types of ping-pong protocols using qubits and qutrits against different
attacks was investigated in series of papers (Boström & Felbinger, 2002; Cai, 2004; Vasiliu,
2011; Vasiliu & Nikolaenko, 2009; Zhang et al., 2005a).
The security of the ping-pong protocol using qubits against eavesdropping attack using
ancilla states is investigated in (Boström & Felbinger, 2002; Chuan et al., 2005; Vasiliu &
Nikolaenko, 2009).
Eve's information at attack with usage of auxiliary quantum systems (probes) on the ping-
pong protocol with entangled n-qubit GHZ-states is defined by von Neumann entropy
(Boström & Felbinger, 2002):
where λi are the density matrix eigenvalues for the composite quantum system
“transmitted qubits - Eve's probe”.
Quantum Secure Telecommunication Systems 219
For the protocol with Bell pairs and quantum superdence coding the density matrix ρ have
size 4х4 and four nonzero eigenvalues:
1 1
λ1,2 = ( p1 + p 2 ) ± ( p1 + p2 )2 − 16 p1 p2 d ( 1 − d ) ,
2 2 (2)
1 1
λ3,4 = ( p3 + p 4 ) ± ( p3 + p4 )2 − 16 p3 p4 d ( 1 − d ) .
2 2
For the protocol with GHZ-triplets a density matrix size is 16х16, and а number of nonzero
eigenvalues is equal to eight. At symmetrical attack their kind is (Vasiliu & Nikolaenko, 2009):
1 1 2 2
λ1,2 = ( p1 + p2 ) ± ( p1 + p2 )2 − 16 p1 p2 ⋅ d1 − d,
2 2 3 3
(3)
1 1 2 2
= ( p7 + p8 ) ± ( p7 + p8 ) 2
λ7 ,8 − 16 p7 p8 ⋅ d 1 − d .
2 2 3 3
For the protocol with n-qubit GHZ-states, the number of nonzero eigenvalues of density
matrix is equal to 2 n , and their kind at symmetrical attack is (Vasiliu & Nikolaenko, 2009):
1 1 2n−2 2n−2
λ1,2 = ( p1 + p2 ) ± ( p1 + p2 )2 − 16 p1 p2 ⋅ n−1
d
1 − n−1
d ,
2 2 2 −1 2 −1
(4)
1 1 2n− 2 2n−2
( ) ( p2 − 1 + p2 )
2
λ2n − 1, 2n = p2 n − 1 + p2 n ± − 16 p2n − 1 p2n ⋅ n − 1 d 1 − n − 1 d,
− 1
n n
2 2 2 −1 2
I I0
1−q
s( I ,q, d) = ,
1 − q ( 1 − d ) (5)
1
dmax = 1 − . (6)
2n−1
220 Telecommunications Networks – Current Status and Future Trends
At d = dmax Eve gains the complete information about transmitted bits of the message. It is
obvious from fig. 2 that the ping-pong protocol with many-qubit GHZ-states is
asymptotically secure at any number n of qubits that are in entangled GHZ-states. A similar
result for the ping-pong protocol using qutrit pairs is presented (Vasiliu, 2011).
A non-quantum method of security amplification for the ping-pong protocol is suggested in
(Vasiliu & Nikolaenko, 2009; Korchenko et al., 2010c). Such method has been developed on
the basis of a method of privacy amplification which is utilized in quantum key distribution
protocols. In case of the ping-pong protocol this method can be some kind of analogy of the
Hill cipher (Overbey et al., 2005).
Before the transmission Alice divides the binary message on l blocks of some fixed length r,
we will designate these blocks as ai (i=1,…l). Then Alice generates for each block separately
random invertible binary matrix K i of size r × r and multiplies these matrices by
appropriate blocks of the message (multiplication is performed by modulo 2):
bi = K i ai . (7)
Fig. 2. Composite probability of attack non-detection s for the ping-pong protocol with
many-qubit GHZ-states: n=2, original protocol (1); n=2, with superdense coding (2); n=3 (3);
n=5 (4); n=10 (5); n=16 (6). I is Eve’s information.
Blocks bi are transmitted on the quantum channel with the use of the ping-pong protocol.
Even if Eve, remained undetected, manages to intercept one (or more) from these blocks and
without knowledge of used matrices K i Eve won’t be able to reconstruct source blocks ai .
To reach a sufficient security level the block length r and accordingly the size of matrices K i
should be selected so that Eve’s undetection probability s after transmission of one block
would be insignificant small. Matrices K i are transmitted to Bob via usual (non-quantum)
open authentic channel after the end of quantum transmission but only in the event when
Alice and Bob were convinced lack of eavesdropping. Then Bob inverses the received
matrices and having multiplied them on appropriate blocks bi he gains an original message.
Quantum Secure Telecommunication Systems 221
Let's mark that described procedure is not message enciphering, and can be named inverse
hashing or hashing using two-way hash function, which role random invertible binary
matrix acts.
It is necessary for each block to use individual matrix K i which will allow to prevent
cryptoanalytic attacks, similar to attacks to the Hill cipher, which are possible there at a
multiple usage of one matrix for enciphering of several blocks (Eve could perform similar
attack if she was able before a detection of her operations in the quantum channel to
intercept several blocks, that are hashing with the same matrix). As matrices in this case are
not a key and they can be transmitted on the open classical channel, the transmission of the
necessary number of matrices is not a problem.
Necessary length r of blocks for hashing and accordingly necessary size r × r of hashing
matrices should correspond to a requirement r > I, where І is the information which is
gained by Eve. Thus, it is necessary for determination of r to calculate І at the given values
of n, s, q and d = dmax .
Let's accept s ( I , q , d ) = 10 − k , then:
− kI 0 (8)
I= .
1−q
lg
1 − q(1 − d )
The calculated values of І are shown in tab. 1:
Thus, after transfer of hashed block, the lengths of which are presented in tab. 1, the
probability of attack non-detection will be equal to 10-6; there is thus a very high probability
that this attack will be detected. The main disadvantage of the ping-pong protocol, namely
its asymptotic security against eavesdropping attack using ancilla states, is therefore
removed.
There are some others attacks on the ping-pong protocol, e.g. attack which can be performed
when the protocol is executed in quantum channel with noise (Zhang, 2005a) or Trojan
horse attack (Gisin et al., 2002). But there are some counteraction methods to these attacks
(Boström & Felbinger, 2008). Thus, we can say that the ping-pong protocol (the security of
which is amplified using method described above) is the most prospective QSDC protocol
from the viewpoint of the existing development level of the quantum technology of
information processing.
1 1
φ+ =
2
0( 1
0 2
+ 1 1
1 2 ), φ− = (
2
)
01 02− 11 12 ,
(9)
1 1
ψ+ =
2
0( 1
1 2
+ 1 1
0 2)
, ψ− =
2
( )
01 12− 11 02 ,
was proposed (Terhal et al., 2005). In this protocol n Bell states, including all four states (9)
with equal probability is divided between two legitimate users (Alice and Bob) by third part
(Trent). For all states the first qubit is sent to Alice and second to Bob. The secret bit is coded
in the number of m singlet states ψ − in the sequence of n states: even m represents “0” and
odd represents “1”. Alice and Bob perform local measurements each on own qubits and
calculate the number of singlet states ψ − . That’s why in this protocol Trent can secretly
transmit information to Alice and Bob simultaneously.
Shaw & Brun proposed another one quantum stegoprotocol (Shaw & Brun, 2010). In this
protocol the information qubit is hidden inside the error-correcting code. Thus, for intruder
the qubits transmission via quantum channel looks like a normal quantum information
transmission in the noise channel. For information qubit detection the receiver (Bob) must
have a shared secret key with sender (Alice), which must be distributed before stegoprotocol
starting. In the fig.3 the scheme of protocol proposed by Shaw & Brun is shown. Alice hides
information qubit changing its places with qubit in her quantum codeword. She uses her
secret key to determine which qubit in codeword must be replaced. Next, Alice uses key
again to twirl (rotate) information qubit. This means that Alice uses one of the four single
Quantum Secure Telecommunication Systems 223
The last method is the most promising direction of quantum steganography and also hiding
using quantum error-correcting codes has some prospect in the future practice
implementation.
224 Telecommunications Networks – Current Status and Future Trends
It should be noted that theoretical research in quantum steganography has not reached the
level of practical application yet, and it is very difficult to talk about the advantages and
disadvantages of quantum steganography systems. Whether quantum steganography is
superior to the classical one or not in practical use is still an open question (Imai & Hayashi,
2006).
effect and by the impossibility of cloning quantum states (Wooters & Zurek, 1982). The
complexity of practical implementation is the most important imperfection of QSC (Hirota &
Kurosawa, 2006).
Quantum digital signature (QDS) can be implemented on the basis of protocols such as QDS
protocols using single qubits (Wang et al., 2006) and QDS protocols using entangled states
(authentic QDS based on quantum GHZ-correlations) (Wen & Liu, 2005). QDS is based on
use of the quantum one-way function (Gottesman & Chuang, 2001). This function has better
security than the classical one-way function, and it has information-theoretic security (its
security does not depend on the power of the attacker’s equipment). Quantum one-way
function is defined by the following properties of quantum systems (Gottesman & Chuang,
2001):
1. Qubits can exist in superposition “0” and “1” unlike classical bits.
2. We can get only a limited quantity of classical information from quantum states
according to the Holevo theorem (Holevo, 1977). Calculation and validation are not
difficult but inverse calculation is impossible.
In the systems that use QDS, user identification and integrity of information is provided
similar to classical digital signature (Gottesman & Chuang, 2001). The main advantages of
QDS protocols are information-theoretic security and simplified key distribution system.
The main disadvantage is the possibility to generate a limited number of public key copies
and the leak of some quantities of information about incoming data of quantum one-way
function (unlike the ideal classical one-way function) (Gottesman & Chuang, 2001).
Fig. 4 represents a general scheme of the methods of quantum secure telecommunication
systems construction for their purposes and for using some quantum technologies.
Ping-pong protocol
(Y-00, αη-scheme )
entangled states
entangled states
QKD using
QDS using
QSS using
transfer
qubits
qubits
ВВ84, В92, Decoy states protocols,
Six-states protocol , 4+2 protocol,
Ping-pong
Ping-pong
systems
systems
PROPERTIES OF QUANTUM
SINGLE QUBITS TRANSFER D-LEVEL QUANTUM
ENTANGLED STATES (QUANTUM
(NON-CLONING THEOREM) SYSTEMS TRANSFER
CORRELATION)
QUANTUM TECHNOLOGIES
Toshiba Research Europe Ltd (Great Britain) recently presented another QKD system named
Quantum Key Server (QKS, 2011). This system (fig. 5 c) delivers digital keys for cryptographic
applications on fibre optic based computer networks. Based on quantum cryptography it
provides a failsafe method of distributing verifiably secret digital keys, with significant cost
and key management advantages. The system provides world-leading performance. In
particular, it allows key distribution over standard telecom fibre links exceeding 100 km in
length and bit rates sufficient to generate 1 Megabit per second of key material over a
distance of 50 km — sufficiently long for metropolitan coverage. Toshiba's system uses a
Quantum Secure Telecommunication Systems 227
simple “one-way” architecture, in which the photons travel from sender to receiver. This
design has been rigorously proven as secure from most types of eavesdropping attack.
Toshiba has pioneered active stabilisation technology that allows the system to distribute
key material continuously, even in the most challenging operating conditions, without any
user intervention. This avoids the need for recalibration of the system due to temperature-
induced changes in the fibre lengths. Initiation of the system is also managed automatically,
allowing simple turn-key operation. It has been shown to work successfully in several
network field trials. The system can be used for a wide range of cryptographic applications,
e.g., encryption or authentication of sensitive documents, messages or transactions. A
programming interface gives the user access to the key material.
a) b) c)
Fig. 5. Some commercial quantum secure telecommunication systems.
Another British company, QinetiQ, realised the world’s first network using quantum
cryptography—Quantum Net (Qnet) (Elliot et al., 2003; Hughes et al., 2002). The maximum
length of telecommunication lines in this network is 120 km. Moreover, it is a very
important fact that Qnet is the first QKD system using more than two servers. This system
has six servers integrated to the Internet.
In addition the world’s leading scientists are actively taking part in the implementation of
projects such as SECOQC (Secure Communication based on Quantum Cryptography) (SECOQC
White Paper on Quantum Key Distribution and Cryptography, 2007), EQCSPOT (European
Quantum Cryptography and Single Photon Technologies) (Alekseev & Korneyko, 2007) and
SwissQuantum (Swissquantum, 2011).
SECOQC is a project that aims to develop quantum cryptography network. The European
Union decided in 2004 to invest € 11 million in the project as a way of circumventing
espionage attempts by ECHELON (global intelligence gathering system, USA). This project
combines people and organizations in Austria, Belgium, the United Kingdom, Canada, the
Czech Republic, Denmark, France, Germany, Italy, Russia, Sweden and Switzerland. On
October 8, 2008 SECOQC was launched in Vienna.
Following no-cloning theorem, QKD only can provide point-to-point (sometimes called
“1:1”) connection. So the number of links will increase N ( N − 1) / 2 as N represents the
number of nodes. If a node wants to participate into the QKD network, it will cause some
issues like constructing quantum communication line. To overcome these issues, SECOQC
was started. SECOQC network architecture (fig. 6) can by divided by two parts. Trusted
private network and quantum network consisted with QBBs (Quantum Back Bone). Private
network is conventional network with end-nodes and a QBB. QBB provides quantum
228 Telecommunications Networks – Current Status and Future Trends
channel communication between QBBs. QBB is consisted with a number of QKD devices
that are connected with other QKD devices in 1:1 connection. From this, SECOQC can
provide easier registration of new end-node in QKD network, and quick recovery from
threatening on quantum channel links.
We also note that during the project SECOQC the seven most important QKD systems have
been developed or refined (Kollmitzer & Pivk, 2010). Among these QKD systems are Clavis2
and Quantum Key Server described above and also:
1. The coherent one-way system (time-coding) designed by GAP-Universite de Geneve and
idQuantique realizes the novel distributed-phase-reference coherent one-way
protocol.
2. The entanglement-based QKD system developed by an Austrian–Swedish consortium. The
system uses the unique quantum mechanical property of entanglement for transferring
the correlated measurements into a secret key.
3. The free-space QKD system developed by the group of H. Weinfurter from the University
of Munich. It employs the BB84 protocol using polarization encoded attenuated laser
pulses with photons of 850 nm wavelength. Decoy states are used to ensure key security
even with faint pulses. The system is applicable to day and night operation using
excessive filtering in order to suppress background light.
4. The low-cost QKD system was developed by John Rarity’s team of the University of
Bristol. The system can be applied for secure banking including consumer protection.
The design philosophy is based on a future hand-held electronic credit card using
free-space optics. A method is proposed to protect these transactions using the shared
secret stored in a personal hand-held transmitter. Thereby Alice’s module is
integrated within a small device such as a mobile telephone, or personal digital
Quantum Secure Telecommunication Systems 229
assistant, and Bob’s module consists of a fixed device such as a bank asynchrone
transfer mode.
The primary objective of EQCSPOT project is bringing quantum cryptography to the point
of industrial application. Two secondary objectives exist to improve single photon
technologies for wider applications in metrology, semiconductor characterisation,
biosensing etc and to assess the practical use of future technologies for general quantum
processors. The primary results will be in the tangible improvements in key distribution.
The overall programme will be co-ordinated by British Defence Evaluation and Research
Agency and the work will be divided into eight workparts with each workpart co-ordinated
by one organisation. Three major workparts are dedicated to the development of the three
main systems: NIR fibre, 1.3-1.55 µm fibre and free space key exchange. The other five are
dedicated to networks, components and subsystems, software development, spin-off
technologies and dissemination of results.
One of the key specificities of the SwissQuantum project is to aim at long-term
demonstration of QKD and its applications. Although this is not the first quantum network
to be deployed, it wills the first one to operate for months with real traffic. In this sense, the
SwissQuantum network presents a major impetus for the QKD technology.
The SwissQuantum network consists of three layers:
• Quantum Layer. This layer performs Quantum Key Exchange.
• Key Management Layer. This layer manages the quantum keys in key servers and
provides secure key storage, as well as advanced functions (key transfer and routing).
• Application Layer. In this layer, various cryptographic services use the keys distributed
to provide secure communications.
There are many practical and theoretical research projects concerning the development of
quantum technology in research institutes, laboratories and centres such as Institute for
Quantum Optics and Quantum Information, Northwestern University, SmartQuantum,
BBN Technologies of Cambridge, TREL, NEC, Mitsubishi Electric, ARS Seibersdorf Research
and Los Alamos National Laboratory.
3. Conclusion
This chapter presents a classification and systematisation of modern quantum technology of
information security. The characteristic of the basic directions of quantum cryptography
from the point of view of the quantum technologies used is given. A qualitative analysis of
the advantages and imperfections of concrete quantum protocols is made. Today the most
developed direction of quantum secure telecommunication systems is QKD protocols. In
research institutes, laboratories and centres, quantum cryptographic systems for secret key
distribution for distant legitimate users are being developed. Most of the technologies used
in these systems are patented in different countries (mainly in the U.S.A.). Such QKD
systems can be combined with any classical cryptographic scheme, which provides
information-theoretic security, and the entire cryptographic scheme will have information-
theoretic security also. QKD protocols can generally provide higher information security
level than appropriate classical schemes.
230 Telecommunications Networks – Current Status and Future Trends
Other secure quantum technologies in practice have not been extended beyond laboratory
experiments yet. But there are many theoretical cryptographic schemes that provide high
information security level up to the information-theoretic security. QSDC protocols remove
the secret key distribution problem because they do not use encryption. One of these is the
ping-pong protocol and its improved versions. These protocols can provide high
information security level of confidential data transmission using the existing level of
technology with security amplification methods. Another category of QSDC is protocols
with transfer qubits by blocks that have unconditional security, but these need a large
quantum memory which is out of the capabilities of modern technologies today. It must be
noticed that QSDC protocols are not suitable for the transfer of a high-speed flow of
confidential data because there is low data transfer rate in the quantum channel. But when a
high information security level is more important than transfer rate, QSDC protocols should
find its application.
Quantum secret sharing protocols allow detecting eavesdropping and do not require data
encryption. This is their main advantage over classical secret sharing schemes. Similarly,
quantum stream cipher and quantum digital signature provide higher security level than
classical schemes. Quantum digital signature has information-theoretic security because it
uses quantum one-way function. However, practical implementation of these quantum
technologies is also faced to some technological difficulties.
Thus, in recent years quantum technologies are rapidly developing and gradually taking
their place among other means of information security. Their advantage is a high level of
security and some properties, which classical means of information security do not have.
One of these properties is the ability always to detect eavesdropping. Quantum
technologies therefore represent an important step towards improving the security of
telecommunication systems against cyber-terrorist attacks. But many theoretical and
practical problems must be solved for wide practical use of quantum secure
telecommunication systems.
4. Acknowledgment
Special thanks should be given to Rector of National Aviation University (Kyiv, Ukraine) –
Mykola Kulyk. We would not have finished this chapter without his support.
5. References
Alekseev, D.A. & Korneyko, A.V. (2007). Practice reality of quantum cryptography key
distribution systems, Information Security, No. 1, pp. 72–76.
Bennett, C. & Brassard, G. (1984). Quantum cryptography: public key distribution and coin
tossing, Proceedings of the IEEE International Conference on Computers, Systems and
Signal Processing. Bangalore, India, pp. 175–179.
Bennett, C. (1992). Quantum cryptography using any two non-orthogonal states, Physical
Review Letters, Vol.68, No.21, pp. 3121–3124.
Bennett, C.; Bessette, F. & Brassard, G. (1992). Experimental Quantum Cryptography, Journal
of Cryptography, Vol.5, No.1, pp. 3–28.
Quantum Secure Telecommunication Systems 231
Bennett, C.; Brassard, G.; Crépeau, C. & Maurer, U. (1995). Generalized privacy
amplification, IEEE Transactions on Information Theory, Vol.41, No.6, pp. 1915–
1923.
Boström, K. & Felbinger, T. (2002). Deterministic secure direct communication using
entanglement, Physical Review Letters, Vol.89, No.18, 187902.
Boström, K. & Felbinger, T. (2008). On the security of the ping-pong protocol, Physics Letters
A, Vol.372, No.22, pp. 3953–3956.
Bourennane, M.; Karlsson, A. & Bjork, G. (2002). Quantum key distribution using multilevel
encoding, Quantum Communication, Computing, and Measurement 3. N.Y.: Springer
US, pp. 295–298.
Bouwmeester, D.; Ekert, A. & Zeilinger, A. (2000). The Physics of Quantum Information.
Quantum Cryptography, Quantum Teleportation, Quantum Computation. Berlin:
Springer-Verlag, 314 p.
Bradler K. (2005). Continuous variable private quantum channel, Physical Review A, Vol.72,
No.4, 042313.
Branciard, C.; Gisin, N.; Kraus, B. & Scarani, V. (2005). Security of two quantum
cryptography protocols using the same four qubit states, Physical Review A, Vol.72,
No.3, 032301.
Brassard, G.; Lutkenhaus, N.; Mor, T. & Sanders, B. (2000). Limitations on practical quantum
cryptography, Physical Review Letters, Vol.85, No.6, pp. 1330–1333.
Bruss, D. (1998). Optimal Eavesdropping in Quantum Cryptography with Six States, Physical
Review Letters, Vol.81, No.14, pp. 3018–3021.
Bruss, D. & Macchiavello C. (2002). Optimal eavesdropping in cryptography with three-
dimensional quantum states, Physical Review Letters, Vol.88, No.12, 127901.
Cai, Q.-Y. & Li, B.-W. (2004a). Deterministic Secure Communication Without Using
Entanglement, Chinese Physics Letters, Vol.21 (4), pp. 601–603.
Cai, Q.-Y. & Li B.-W. (2004b). Improving the capacity of the Bostrom–Felbinger protocol,
Physical Review A, Vol.69, No.5, 054301.
Cerberis. 01.10.2011, Available from: http://idquantique.com/products/cerberis.htm.
Cerf, N.J.; Bourennane, M.; Karlsson, A. & Gisin, N. (2002). Security of quantum key
distribution using d-level systems, Physical Review Letters, Vol.88, No.12, 127902.
Chamoli, A. & Bhandari, C.M. (2009). Secure direct communication based on ping-pong
protocol, Quantum Information Processing, Vol.8, No.4, pp. 347–356.
Chuan, W.; Fu Guo, D. & Gui Lu, L. (2005). Multi-step quantum secure direct
communication using multi-particle Greenberg-Horne-Zeilinger state, Optics
Communications, Vol.253, pp. 15–19.
Conti A.; Ralph, S.; Kenneth A. et al. Patent No 7539308 USA, H04K 1/00 (20060101).
Quantum steganography, publ. 21.05.2004.
Corndorf, E., Liang, C. & Kanter, G.S. (2005). Quantum-noise randomized data encryption
for wavelength-division-multiplexed fiber-optic networks, Physical Review A,
Vol.71, No.6, 062326.
Deng, F.G.; Long, G.L. & Liu, X.S. (2003). Two-step quantum direct communication protocol
using the Einstein–Podolsky–Rosen pair block. Physical Review A, 2003. Vol.68,
No.4, 042317.
232 Telecommunications Networks – Current Status and Future Trends
Deng, F. G.; Li, X. H.; Zhou, H. Y. & Zhang, Z. J. (2005). Improving the security of multiparty
quantum secret sharing against Trojan horse attack, Physical Review A, Vol.72, No.4,
044302.
Desurvire, E. (2009). Classical and Quantum Information Theory. Cambridge: Cambridge
University Press, 691 p.
Durt, T.; Kaszlikowski, D.; Chen, J.-L. & Kwek, L.C. (2004). Security of quantum key
distributions with entangled qudits, Physical Review A, Vol.69, No.3, 032313.
Ekert, A. (1991). Quantum cryptography based on Bell's theorem, Physical Review Letters,
Vol.67, No.6, pp. 661–663.
Elliot, C.; Pearson, D. & Troxel, G. (2003). Quantum Cryptography in Practice, arXiv:quant-
ph/0307049.
Fuchs, C.; Gisin, N.; Griffits, R. et al. (1997). Optimal Eavesdropping in Quantum
Cryptography. Information Bound and Optimal Strategy, Physical Review A, Vol.56,
No.2, pp. 1163–1172.
Gao, T.; Yan, F.L. & Wang, Z.X. (2005). Deterministic secure direct communication using
GHZ-states and swapping quantum entanglement. Journal of Physics A:
Mathematical and Theoretical, Vol. 38, No.25, pp. 5761–5770.
Gao, F.; Guo, F.Zh.; Wen, Q.Y. & Zhu, F.Ch. (2008). Comparing the efficiencies of different
detect strategies in the ping-pong protocol, Science in China, Series G: Physics,
Mechanics & Astronomy, Vol.51, No.12. pp. 1853–1860.
Gisin, N.; Ribordy, G.; Tittel, W. & Zbinden, H. (2002). Quantum cryptography, Review of
Modern Physics, Vol.74, pp. 145–195.
Gnatyuk, S.O.; Kinzeryavyy, V.M.; Korchenko, O.G. & Patsira, Ye.V. (2009). Patent
No 43779 UA, MPK H04L 9/08. System for cryptographic key transfer,
25.08.2009.
Goldenberg, L. & Vaidman, L. (1995). Quantum Cryptography Based On Orthogonal States,
Physical Review Letters, Vol.75, No.7, pp. 1239–1243.
Gottesman, D. & Chuang, I. (2001). Quantum digital signatures, arXiv:quant-ph/0105032v2.
Hayashi, M. (2006). Quantum information. An introduction. Berlin, Heidelberg, New York:
Springer, 430 p.
Hillery, M.; Buzek, V. & Berthiaume, A. (1999). Quantum secret sharing, Physical Review A,
Vol.59, No.3, pp. 1829–1834.
Hirota, O. & Kurosawa, K. (2006). An immunity against correlation attack on quantum
stream cipher by Yuen 2000 protocol, arXiv:quant-ph/0604036v1.
Hirota, O.; Sohma, M.; Fuse, M. & Kato, K. (2005). Quantum stream cipher by the Yuen 2000
protocol: Design and experiment by an intensity-modulation scheme, Physical
Review A, Vol.72, No.2, 022335.
Holevo, A.S. (1977). Problems in the mathematical theory of quantum communication
channels, Report of Mathematical Physics, Vol.12, No.2, pp. 273–278.
Hughes, R.; Nordholt, J.; Derkacs, D. & Peterson, C. (2002). Practical free-space quantum
key distribution over 10 km in daylight and at night, New Journal of Physics, Vol.4,
43 p.
Huttner, B.; Imoto, N.; Gisin, N. & Mor, T. (1995). Quantum Cryptography with Coherent
States, Physical Review A, Vol.51, No.3, pp. 1863–1869.
Quantum Secure Telecommunication Systems 233
Imai, H. & Hayashi, M. (2006). Quantum Computation and Information. From Theory to
Experiment. Berlin: Springer-Verlag, Heidelberg, 235 p.
Imre, S. & Balazs, F. (2005). Quantum Computing and Communications: An Engineering
Approach, John Wiley & Sons Ltd, 304 p.
Inamori, H.; Rallan, L. & Vedral, V. (2001). Security of EPR-based quantum cryptography
against incoherent symmetric attacks, Journal of Physics A, Vol.34, No.35, pp. 6913–
6918.
Kaszlikowski, D.; Christandl, M. et al. (2003). Quantum cryptography based on qutrit Bell
inequalities, Physical Review A, Vol.67, No.1, 012310.
Koashi, M. & Imoto, N. (1997). Quantum Cryptography Based on Split Transmission of
One-Bit Information in Two Steps, Physical Review Letters, Vol.79, No.12, pp.
2383–2386.
Kollmitzer, C. & Pivk, M. (2010). Applied Quantum Cryptography, Lecture Notes in Physics
797. Berlin, Heidelberg: Springer, 214 p.
Korchenko, O.G.; Vasiliu, Ye.V. & Gnatyuk, S.O. (2010a). Modern quantum technologies of
information security against cyber-terrorist attacks, Aviation. Vilnius: Technika,
Vol.14, No.2, pp. 58–69.
Korchenko, O.G.; Vasiliu, Ye.V. & Gnatyuk, S.O. (2010b). Modern directions of quantum
cryptography, "AVIATION IN THE XXI-st CENTURY" – "Safety in Aviation and
Space Technologies": IV World Congress: Proceedings (September 21–23, 2010), Кyiv,
NAU, pp. 17.1–17.4.
Korchenko, O.G.; Vasiliu, Ye.V.; Nikolaenko, S.V. & Gnatyuk, S.O. (2010c). Security
amplification of the ping-pong protocol with many-qubit Greenberger-Horne-
Zeilinger states, XIII International Conference on Quantum Optics and Quantum
Information (ICQOQI’2010): Book of abstracts (May 28 – June 1, 2010), pp. 58–59.
Li, Q.; Chan, W. H. & Long, D-Y. (2009). Semi-quantum secret sharing using entangled
states, arXiv:quant-ph/0906.1866v3.
Li, X.H.; Deng, F.G. & Zhou, H.Y. (2006). Improving the security of secure direct
communication based on the secret transmitting order of particles. Physical Review
A, Vol.74, No.5, 054302.
Lin, S.; Wen, Q.Y.; Gao, F. & Zhu F.C. (2008). Quantum secure direct communication with
chi-type entangled states, Physical Review A, Vol.78, No.6, 064304.
Liu, Y.; Chen, T.-Y.; Wang, J. et al. (2010). Decoy-state quantum key distribution with
polarized photons over 200 km, Optics Express, Vol. 18, Issue 8, pp. 8587-8594.
Lomonaco, S.J. (1998). A Quick Glance at Quantum Cryptography, arXiv:quant-
ph/9811056.
Lütkenhaus, N. & Jahma, M. (2002). Quantum key distribution with realistic states: photon-
number statistics in the photon-number splitting attack, New Journal of Physics,
Vol.4, pp. 44.1–44.9.
Lütkenhaus, N. & Shields, A. (2009). Focus on Quantum Cryptography: Theory and Practice,
New Journal of Physics, Vol.11, No.4, 045005.
Nair, R. & Yuen, H. (2007). On the Security of the Y-00 (AlphaEta) Direct Encryption
Protocol, arXiv:quant-ph/0702093v2.
234 Telecommunications Networks – Current Status and Future Trends
Navascués, M. & Acín, A. (2005). Security Bounds for Continuous Variables Quantum Key
Distribution, Physical Review Letters, Vol.94, No.2, 020505.
Nielsen, M.A. & Chuang, I.L. (2000). Quantum Computation and Quantum Information.
Cambridge: Cambridge University Press, 676 p.
NIST. “FIPS-197: Advanced Encryption Standard.” (2001). 01.10.2011, Available from:
<http://csrc.nist.gov/publications/fips>.
NIST. “FIPS-46-3: Data Encryption Standard.” (1999). 01.10.2011, Available from:
<http://csrc.nist.gov/publications/fips>.
Ostermeyer, M. & Walenta N. (2008). On the implementation of a deterministic secure
coding protocol using polarization entangled photons, Optics Communications,
Vol. 281, No.17, pp. 4540–4544.
Overbey, J; Traves, W. & Wojdylo J. (2005). On the keyspace of the Hill cipher, Cryptologia,
Vol.29, No.1, pp. 59–72.
Peng, C.-Z.; Zhang, J.; Yang, D. et al. (2007). Experimental long-distance decoy-state
quantum key distribution based on polarization encoding, Physical Review Letters,
Vol.98, No.1, 010505.
Pirandola, S.; Mancini, S.; Lloyd, S. & Braunstein S. (2008). Continuous-variable quantum
cryptography using two-way quantum communication, Nature Physics, Vol.4, No.9,
pp. 726–730.
Qin, S.-J.; Gao, F. & Zhu, F.-Ch. (2007). Cryptanalysis of the Hillery-Buzek-Berthiaume
quantum secret-sharing protocol, Physical Review A, Vol.76, No.6, 062324.
QKS. Toshiba Research Europe Ltd. 01.10.2011, Available from:
<http://www.toshiba-europe.com/research/crl/QIG/quantumkeyserver.html>.
QPN Security Gateway (QPN–8505). 01.10.2011, Available from:
<http://www.magiqtech.com/MagiQ/Products.html>.
Rosenberg, D. et al. (2007). Long-distance decoy-state quantum key distribution in optical
fiber, Physical. Review Letters, Vol.98, No.1, 010503.
Sangouard, N.; Simon, C.; de Riedmatten, H. & Gisin, N. (2011). Quantum repeaters based
on atomic ensembles and linear optics, Review of Modern Physics, Vol.83, pp. 33–
34.
Scarani, V.; Acin, A.; Ribordy, G. & Gisin, N. (2004). Quantum cryptography protocols
robust against photon number splitting attacks for weak laser pulse
implementations, Physical Review Letters, Vol.92, No.5, 057901.
Scarani, V.; Bechmann-Pasquinucci, H.; Nicolas J. Cerf et al. (2009). The security of
practical quantum key distribution, Review of Modern Physics, Vol.81, pp. 1301–
1350.
SECOQC White Paper on Quantum Key Distribution and Cryptography. (2007). arXiv:quant-
ph/0701168v1.
Shaw, B. & Brun, T. (2010). Quantum steganography, arXiv:quant-ph/1006.1934v1.
Schumacher, B. & Westmoreland, M. (2010). Quantum Processes, Systems, and Information.
Cambridge: Cambridge University Press, 469 p.
Terhal, B.M.; DiVincenzo, D.P. & Leung, D.W. (2001). Hiding bits in Bell states, Physical
review letters, Vol.86, issue 25, pp. 5807-5810.
Quantum Secure Telecommunication Systems 235
Vasiliu, E.V. (2011). Non-coherent attack on the ping-pong protocol with completely
entangled pairs of qutrits, Quantum Information Processing, Vol.10, No.2, pp. 189–
202.
Vasiliu, E.V. & Nikolaenko, S.V. (2009). Synthesis if the secure system of direct message
transfer based on the ping–pong protocol of quantum communication, Scientific
works of the Odessa national academy of telecommunications named after O.S. Popov,
No.1, pp. 83–91.
Vasiliu, E.V. & Mamedov, R.S. (2008). Comparative analysis of efficiency and resistance
against not coherent attacks of quantum key distribution protocols with transfer of
multidimensional quantum systems, Scientific works of the Odessa national academy of
telecommunications named after O.S. Popov, No.2, pp. 20–27.
Vasiliu, E.V. & Vorobiyenko, P.P. (2006). The development problems and using prospects of
quantum cryptographic systems, Scientific works of the Odessa national academy of
telecommunications named after O.S. Popov, No.1, pp. 3–17.
Vedral, V. (2006). Introduction to Quantum Information Science. Oxford University Press Inc.,
New York, 183 p.
Wang, Ch.; Deng, F.G. & Long G.L. (2005a). Multi – step quantum secure direct
communication using multi – particle Greenberger – Horne – Zeilinger state, Optics
Communications, Vol. 253, No.1, pp. 15–20.
Wang, Ch. et al. (2005b). Quantum secure direct communication with high dimension
quantum superdense coding, Physical Review A, Vol.71, No.4, 044305.
Wang, J.; Zhang, Q. & Tang, C. (2006). Quantum signature scheme with single photons,
Optoelectronics Letters, Vol.2, No.3, pp. 209–212.
Wen, X.-J. & Liu, Y. (2005). Quantum Signature Protocol without the Trusted Third Party,
arXiv:quant-ph/0509129v2.
Williams, C.P. (2011). Explorations in quantum computing, 2nd edition. Springer-Verlag London
Limited, 717 p.
Wooters, W.K. & Zurek, W.H. (1982). A single quantum cannot be cloned, Nature, Vol. 299,
p. 802.
Xiu, X.-M.; Dong, L.; Gao, Y.-J. & Chi F. (2009). Quantum Secure Direct Communication with
Four-Particle Genuine Entangled State and Dense Coding, Communication in
Theoretical Physics, Vol.52, No.1, pp. 60–62.
Yan, F.-L.; Gao, T. & Li, Yu.-Ch. (2008). Quantum secret sharing protocol between
multiparty and multiparty with single photons and unitary transformations,
Chinese Physics Letters, Vol.25, No.4, pp. 1187–1190.
Yin, Z.-Q.; Zhao, Y.-B.; Zhou Z.-W. et al. (2008). Decoy states for quantum key distribution
based on decoherence-free subspaces, Physical Review A, Vol.77, No.6, 062326.
Yuen, H.P. (2001). In Proceedings of QCMC’00, Capri, edited by P. Tombesi and O. Hirota
New York: Plenum Press, p. 163.
Zhang, Zh.-J.; Li, Y. & Man, Zh.-X. (2005a). Improved Wojcik's eavesdropping attack on
ping-pong protocol without eavesdropping-induced channel loss, Physics Letters A,
Vol.341, No.5–6, pp. 385–389.
Zhang, Zh.-J.; Li, Y. & Man, Zh.-X. (2005b). Multiparty quantum secret sharing, Physical
Review A, Vol.71, No.4, 044301.
236 Telecommunications Networks – Current Status and Future Trends
Zhao, Y.; Qi, B.; Ma, X.; Lo, H.-K. & Qian, L. (2006a). Simulation and implementation of
decoy state quantum key distribution over 60 km telecom fiber, Proceedings of IEEE
International Symposium on Information Theory, pp. 2094–2098.
Zhao, Y.; Qi, B.; Ma, X.; Lo, H.-K. & Qian, L. (2006b). Experimental Quantum Key
Distribution with Decoy States, Physical Review Letters, Vol.96, No.7, 070502.
10
Web-Based Laboratory
Using Multitier Architecture
C. Guerra Torres and J. de León Morales
Facultad de Ingenieria Mecánica y Eléctrica
Universidad Autónoma de Nuevo León
México
1. Introduction
Actuality, Internet provides a convenient way to develop a new communication technology
for several applications, for example remote laboratories. The remote access to complex and
expensive laboratories offers a cost-effective and flexible means for distance learning,
research and remote experimentation. In the literature, some works propose platforms
based on the Internet in order to access experimental laboratories; nevertheless it is
necessary that the platform provides a good architecture, clear methodology of operation,
and it must facilitate the integration between hardware (HW) and software (SW) elements.
In this work, we present a platform based on "multitier programming architecture" which
allows the easy integration of HW and SW elements and offers several schemes of tele-
presence: teleoperation, telecontrol and teleprogramming.
The remote access to complex and expensive laboratory equipment represents an appealing
issue and great interest for research, learning education and industrial applications. The
range potentially involved is very large, including among others, applications in all fields of
engineering (Restivo et al., 2009; Wu et al., 2008).
It is well known that several experimental platforms are distributed in different laboratories
in the world, and all of them are on-line accessible through the Internet. Since those
laboratories require specific resources to enable a remote access, several solutions for
harmonizing the necessary software and hardware have been proposed and described.
Furthermore, due to their versatility, these platforms provide user services which allow the
transmission of information in a simply way, besides being available to many people,
having many multimedia resources.
The potentiality of remote laboratories (Gomez & Garcia, 2007) and the use of the Internet,
as a channel of communication to reach the students at their homes, were soon recognized
(Basigalup et al., 2006; Davoli et al., 2006; Callangan et al., 2005; Imbre & Spong, 2006;
Rapuano & Soino, 2005).
Several works based on remote experimentation, which are used as excellent alternatives to
access remote equipment, have been published (Costas et al., 2008).
238 Telecommunications Networks – Current Status and Future Trends
Then, to solve the problem of testing engineering algorithms in real-time, we apply the
advantages of the computer Network, computer communication and teleoperation.
Furthermore, developing these new tools give the possibility to use these equipments for
remote education.
In remote experimentation there exists several schemes based on the communication
channel called telepresence schemes, some of them are: i) teleoperation, ii)
teleprogramming and iii) telecontrol. In (Wang & James, 2005) some concepts are related
with teleoperation. In other works, (Huijun et al., 2008) analyze the time-delay in the
telecontrol systems, and (Cloosterman et al., 2009) studies the stability of the feedback
systems with With Uncertain Time-Varying Delays. Others authors propose platforms only
to move remote equipment, for example robots, (Wang & James, 2005). Finally, few works
talking about the remote programming are published; see for instance (Costas et al., 2008).
However, for a remote laboratory to be functional, it must be capable of offering different
schemes of telepresence. This can be easily understood from figure 1 which is an extension
of the figure given in (Baccigalup et al., 2006). A comparison between different teaching
methods, taking into account the teaching effectiveness, time and cost per students, is
schematized in figure 1.
Contribution
Considering figure 1, the goal of this work is to introduce a platform called Teleoptions,
which offers an alternative for remote laboratories, using three of the telepresence schemes:
teleoperation, telecontrol and teleprogramming.
The main feature of this framework is its multitier architecture, which allows a good
integration of both hardware (HW) and software (SW) elements.
Web-Based Laboratory Using Multitier Architecture 239
2. Some concepts
Now, we introduce the concepts of teleoperation, telecontrol and teleprogramming, which
will be used in the sequel.
Teleoperation is defined as the continuous, remote and direct operation of equipment (see
figure 2). From the introduction of teleoperation technology, it made possible the
development of interfaces capable of providing a satisfactory interaction between man and
experimental equipment. On the order hand, the main aim of telecontrol is to extend the
distance between controller devices and the equipment to the controller. Thanks to the
development of the Internet, the distance between controller devices and the equipment has
been increased (see figure 2).
Figure 2.B shows a teleoperation scheme through the Internet working with a single
channel of communication. This channel is used to change the parameters of the controller
devices and/or plant. However, the effects of these changes will depend on the server layer.
Figure 2.A shows a telecontrol scheme through the Internet, in which the two channels of
communications are required (closed-loop system), i.e. forward path Ch1 and feedback path
Ch2. In this case, it is necessary to maintain the stability of the closed-loop system. A
solution to stability problem is that the time dalay must be less than the sampling period
(Hyrun & Jong, 2005).
Furthermore, there exists a different interpretation about the teleprogramming. One of them
is extending the distance between software programmer and the microcontroller or control
board. On the other hand, it is possible to programming a remote system using two systems,
called the master system and slave system, separated by the communication channel. In
(Jiang et al., 2006) the teleprogramming method is based on teleoperation.
Presentation tier. The HTTP Server is the presentation tier. This tier contains several Web
pages with information of the platform services.
Furthermore it includes the instructions and regulation of the platform
Logic tier. In this tier, we have the programming layer. Three programming languages are
used in the platform: PHP, Visual Basic and SQL. In the logic tier interacts the blocks: i)
"PHP scripts" (which contain several programs in PHP) , ii) the block of the data base MySql
and, iii) the block of the DLL libraries (designed in VBasic).
Database tier. The database tier contains information about of the platform, i.e. the users list,
logbook. In fact, logic tier and database tier provide security to platform, since it is possible
to use restrictions proportioned by a PHP script. This script allows the use of the platform
only if the user has the permission.
Communication tier. The platform allow establish several ways of communication with the
hardware: i) using Serial Server Component (RS232 Server), ii) using Windows sockets
(Winsock) or DLL’s library, and iii) using the PHP script services (see figure 4).
Serial Server Component is a software based RS232 to TCP/IP converter. RS232 Server allows
any of the RS232 serial ports on the PC laboratory to interface directly to a TCP/IP network.
On the order hand, also is possible the remote access using the sockets of Windows or DLL’s
library. The remote user uses its own programs to send instructions to program modules of
the platform.
Finally, the platform has modules designed in PHP, here, the remote user can to access to
hardware using a Web page of the platform.
Computer A allows establishing a communication both textual and oral between the local
and remote user, in such way, this computer provides help on line and uses the following
freeware software:
• Messenger: Textual communication and webcam.
• Skype: Oral communication, IP Telephony and videoconference.
Computer B has the task of sharing several resources through the Internet. The architecture
proposed is installed in this computer. This computer uses the following software:
• Matlab/Simulink. This Software is used typically in control systems.
• ControlDesk. It is a graphical tool for controlling in real-time the equipment.
• UltraVNC server. It is software belonging to the VNC family
• LogmeIN. It is ESS software.
• TCPComm server. It is a RS232 server, which allows sharing the serial ports (COMM) of
the computer. Serial port is used commonly as communication channel between PC and
equipments.
• WebcamXP. Allow sharing the images from the webcams, these webcams can show the
equipment details.
Computer C has an interface with the data acquisition board (DAQ), and does not share any
resources on the Web. This computer is only used to share information with Computer B
throughout the remote control. Furthermore, this computer protects the access to the plant
(experimental equipment) in order to avoid damages caused by unauthorized users.
These time delays depend on the tele-presence scheme selected. In a telecontrol scheme, the
total time T = TI + TC + TS could be high and could affect the stability of the system.
Nevertheless, if T = TC + TS is small, then a teleoperation scheme offers an excellent
solution in remote experimentation, due to the time delay TI is not considered by the
aforementioned reasons (see section 2).
Therefore, the scheme used for remote experimentation is based on teleoperation where the
effects of the time delay and uncertain property is not considered in the stability of the
system, because the controller and the plant are in the same layer, as shown in figure 2.
In this experiment, the time delays registered are: TI (ping) = 400 mseg. avg., TI (camera) = 3
seg. avg., TI (screen feedback, VNC) = 2 seg. avg., TC < 70 mseg.; TS = 120 seg. (DS1104).
Figure 7 shows a Mexican user, which applies a control algorithm, in order to access the
remote laboratory, located in Nantes; France. From the figure 7, we can see the computer A
showing the images sent by the webcam and the response obtained when the control
algorithm is applied to the induction motor, which is transmitted by computer B using
Controldesk and Matlab.
Figure 8 and 9 shows the screenshots obtained from this experiment. The first image shows
the images given by webcam of the machine (with the sound), the second figure shows the
Remote software ControlDesk throughout LogmeIn services.
Web-Based Laboratory Using Multitier Architecture 245
• Figure 11.A shows the surroundings of the hexapod robot from a internal camera (eye
hexapod).
• Figure 11.B presents the hexapod robot from a external camera (auxiliary camera).
• Figure 11 C shows the computers of the remote laboratory.
• Figure 11 D. showing Controller Module Client (CMC).
Web-Based Laboratory Using Multitier Architecture 247
N(I )
t( I ) = tr + (tmi + twi ) + (tr + td )N ( I ) + t g + td (1)
i =1
Where tr , tmi , twi , t g , td are human`s reaction time, movement times, waiting times after each
move, grasping time and delay time introduced into communication channel, respectively.
6. Conclusions
In this work the capability of interfacing a large set of options with remote experimentation
through the Internet has been demonstrated by the architecture based on multitier
architecture.
This architecture allows the easy integration of both hardware and software, offering an
excellent tool for remote experimentation, which allows the experimentation using the
teleoperation, the telecontrol and teleprogramming schemes.
Web-Based Laboratory Using Multitier Architecture 249
The main characteristic of the proposed platform has been outlined in this paper by means
of a description of experiments.
7. Acknowledment
This work was supported by CONACYT, ECOS-NORD, PAICYT-UANL, Mexico and
France.
8. References
Baccigalup, A.; De Capua, C.; Liccardo, A. (2006) Overview on Development of Remote
Teaching Laboratories: from LabVIEW to Web Services, Instrumentation and
Measurement Technology Conference, Sorrento, Italy, pp. 24-27.
Callaghan, M. J.; Harking, J.; El Gueddari, M.; McGinnity, ATM; Magure LP (2005) Client-
Server Architecture for Collaborative Remote Experimentation, Procedings of the
ICITA 2005, 0-7695-2316-1/05 IEEE.
Cloosterman, M.B.G.; van de Wouw, N. (2009); Heemels, W.P.M.H.; Nijmeijer, H.; Stability
of Networked Control System with Uncertain Time-Variing Delay. Automatic
Control, IEEE Transactions on, Volume 54, Issue 7, pp. 1575-1580.
Costas-Perez, L.; Lago, D.; Farina, J.; Rodriguez-Andina, J. (2008). Optimization o fan
Industrial Sensor and Data Acquisition Laboratory Through Time Sharing and
Remote Access. Industrial Electronics, IEE Transactions on, Volume 55, Issue 6, pp.
0278-0046.
Davoli, Franco; Spano, Giuseppe; Vignola, Stefano; Zappatore, Sandro. (2006) Towards
Remote Laboratories With Unified Access, IEEE Transactions on Instrumentation
and Measurement", Vol 55, No. 5.
Gomez, Luís; Garcia, Javier (2007); Advances on Remote Laboratories and e-learning
experencies. Deusto Publicaciones, ISSB 975-84-9830-662-0
Hokayen, Peter F.; Spong, Mark W. (2006) Bilateral teleoperation: An historical survey,
Automatica 42 : 2035-2057
Huijun Gao; Tomgwen Chen; James Lam (2008); A new delay system approach to network-
based control. Automatica, Volume 44; Issie 1, pp. 39-52
Hyun, Chul Cho; Jong, Hyeon Parck (2005) Stable bilateral teleoperation under time delay
using robust impedance control. Mechatronic, Vol. 15: 611-625.
Jiang, Zainan; Xie, Zong; Wang, Bin; Wang, Jie; Liu, Hong (2006) A teleprogramming
Methos for Interned-based Teleoperation. International Conference on Robotics
and Biomimetics, Dec. 17-20, Kuynming China.
Rapuano, Sergio; Zoino, Francesco (2005) A learning Management System Including
Laboratory Experiments on Measurement Instrumentation, IMTC 2005,
Instrumentation and Measurement Technology Conference, Ottawa, Canada, pp.
17 - 19 .
Restivo, M.T.; Mendes, J.; Lopes, A.M.; Silva, C.M.; Chouzal, F (2009). A Remote Laboratory
in Enginnering Measurement. Industrial Electronics, IEEE Transactions on. Volume
56, Issue 12, pp. 4836-4843.
250 Telecommunications Networks – Current Status and Future Trends
Wang, Meng; James N.K (2005) Interactive Control for Internet-based Mobile Robot
Teleoperation, Robotics and Autonomous System 52, pp. 160-179.
Wu, Y. L; Chan, T.; Jong B.S.; Lin, T.W. (2008) A Web-based virtual reality physic
laboratory”, In Pro 3rd IEEE ICALT, Athenas Grerce, pp.455.
11
Multicriteria Optimization
in Telecommunication Networks
Planning, Designing and Controlling
Valery Bezruk, Alexander Bukhanko,
Dariya Chebotaryova and Vacheslav Varich
Kharkov National University of Radio Electronics
Ukraine
1. Introduction
Modern telecommunication networks, irrespectively of their organization and type of the
transmitted information, become more complex and possess many specific characteristics.
The new generation of telecommunication networks and systems support a wide range of
various communication-intensive real-time and non real-time various applications. All these
net applications have their own different quality-of-service requirements in terms of
throughput, reliability, and bounds on end-to-end delay, jitter, and packet-loss ratio etc.
Thus, telecommunication network is a type of the information system considered as an
ordered set of elements, relations and their properties. Their unique setting defines the goal
searching system.
For such a type of information system as a telecommunication network it is necessary to
perform a preliminary long-term planning (with structure designing and system relation
defining) and a short-term operating control within networks functioning. The problem of
the optimal planning, designing and controlling in the telecommunication networks
involves: definition of an initial set of decisions, formation of a subset of system permissible
variants, definition of an optimal criteria, and also a choice of the structure variants and
network parameters, optimal by such a criteria. It is the task of a general decision making
theory reduced to the implementation of some choice function of the best (optimal) system
based on the set of valid variants. For the decision making tasks the following optimizing
methods can be used: scalar and vector optimization, linear and nonlinear optimization,
parametric and structure optimization, etc (Figueira, 2005; Taha, 1997; Saaty, 2005). We
propose a method of the multicriteria optimization for optimum variants choice taking into
account the set of quality indicators both in long-term and short-term planning and
controlling.
The initial set of permissible variants of a telecommunication network is being formed
through the definition of the different network topologies, transmission capacities of
communication channels, various disciplines of service requests applied to different routing
ways, etc. Obtained variants of the telecommunication network construction are estimated
252 Telecommunications Networks – Current Status and Future Trends
on a totality of given metrics describing the messages transmission quality. Thus, the
formed set of the permissible design decisions is represented in the space of criteria ratings
of quality indicators where, used of unconditional criteria of a preference, the subset of
effective (Pareto-optimal) variants of the telecommunication network is selected. On a final
stage of optimization any obtained effective variants of the network can be selected for
usage. The unique variant choice of a telecommunication network with introducing some
conventional criteria of preference as some scalar goal function is also possible.
In the present work some generalizations are made and all stages of solving multicriteria
problems are analyzed with reference to telecommunication networks including the
statement of a problem, finding the Pareto-optimal systems and selecting the only system
variant. This chapter also considers the application particularities of multicriteria
optimization methods at the operating control within telecommunication systems. The
investigation results are provided on the example of solving of a particular management
problem considering planning of cellular networks, optimal routing and choice of the
speech codec, controlling network resources, etc.
The choice of the optimal criteria is related to the formalization of the knowledge about an
optimality. There exist two ways of describing the customer's preference of one variant to
the other, i.e. ordinal and cardinal .
a certain objective function of the system utility (or usefulness). Therefore, at the initial
design stages the system is characterized by a set of objective functions:
k(ϕ) = (k 1 (ϕ),...,k i (ϕ),...,k m ( ϕ)), (1)
which determinesthe influence of the structure s and the parameters β of the variant of
the system ϕ = (s, β) upon the system quality indicators. In this connection one has to deal
with the newly emerged issues of optimizing approaches in terms of a collection of
quality indicators, which likewise are called the problems of multicriteria or vector
optimization. Basically, the statement and the solution of a multicriteria problems is
related to replacing (approximation) customer's knowledge about the system optimality
with a different optimality conception which can be formalized as a certain vector optimal
criteria (1) and, consequently, the problem will be solved through the effective
optimization procedure.
254 Telecommunications Networks – Current Status and Future Trends
L
{ϕ j , j = 1,L, ϕ j = ϕ}.
j=1
When generating a set of permissible variants Φ D one has to allow for the constraints upon
the structure, parameters and technical realization of elements and the system as a whole as
well as for the permissible combination of elements connections and constraints up on the
value of the quality indicators of the system as a whole.
Here, there exist conflicting requirements. On the one hand, it is desirable to present all
conceivable variants of the system in their entirety so as not to leave out the potentially best
variants. On the other hand, there are limitations specified by the permissible expenditures
(of time and funds) on the designing of a system.
After a set of permissible variant of a system has been determined in terms of a particular
structure, the value of the quality indicators is estimated, a set of Pareto-optimal variants is
distinguished and gets narrowed down to the most preferable one.
In this case to each approach ϕ corresponds its particular estimate of the selected quality
indicators ν = k(ϕ) (2) and, vice versa, to each estimate corresponds an approach (in a
general way, a single approach is not obligatory).
To the relation of the rigorous preference on the set Φ D corresponds the relation in
the criteria space of estimates V. According to the Pareto axiom, for any two estimates
ν , ν′′ ∈ V satisfying the vector inequality ν′ ≥ ν′′ , the relation ν′ ν′′ is always obeyed.
Besides, according
to the second Pareto action for any two approaches ϕ′, ϕ′′ ∈ Φ D , for
which k(ϕ′) ≥ k( ϕ′′) is true, the relation ϕ′ ϕ′′ always occurs. The Pareto axiom imposes
definite limitations upon the character of the preference in multicriteria problem.
It is desirable for a customer to obtain the best possible value for each criteria. Yet in practice
this case can be rarely found. Here, it should be emphasized that the quality indicators
(objective function) of the system (1) may be of 3 types: neutral, consistent with one another
and competing between one other. In the first two instances the system optimization can be
performed separately in terms of each of indicators. In the third instance it appears impossible
to arrive at a potential value of each of the individual indicators. In this case one can only
attain the consistent optimum of introduced objective functions – the optimum according to
the Pareto criteria which implies that each of the indicators can be further improved solly by
lowering the remaining quality indicators of the system. To the Pareto optimum in the criteria
space corresponds a set of Pareto-optimal estimates that satisfy the following expression:
P(V) = opt ≥ V = {k(ϕ0 ) ∈ R m |∀k(ϕ) ∈ V : k(ϕ) ≥ k( ϕ0 )}. (3)
An optimum based on the Pareto criteria can be found either directly according to (3) by the
exhaustive search of all permissible variants of the system Φ D or with the use of special
procedures such as the weighting method, methods of operating characteristics.
256 Telecommunications Networks – Current Status and Future Trends
With the Pareto weighting method being employed. The optimal decisions are found by
optimizing the weighted sum of objective functions
Here K 2 ϕ ,K 3 ϕ ,...,K mϕ are the certain fixed, but arbitrary quality indicators values.
The optimization problem (5) is solved sequentially for all permissible combinations of the
values K 2 ϕ ≤ K 2D , K 3 ϕ ≤ K 3D ,..., K mϕ ≤ K mD . In each instance an optimal value of the
indicator k 1opt is sought by variations ϕ ∈ Φ D . As a result a certain multidimensional
working space in the criteria space is sought
If the found relation (6) is monotonously decreasing in nature for each of the arguments, the
working surface coincides with a Pareto-optimal surface. This surface can be connected,
nonconnected and just a set of isolated points.
It should be pointed out that each point of the pareto-optimal surface offers the property of
a m -fold optimum, i.e. this point checks with a potentially attainable (with variation
ϕ ∈ Φ D ) value of one of the indicators k 1opt at the fixed (corresponding to this point) value
of other ( m − 1 ) quality indicators. The Pareto-optimal surface can be described by any of
the following relationships
1 m
k 1opt = fno (k 2 ,k 3 ,...,k m ),...,k mopt = fno (k 1 ,k 2 ,...,k m − 1 ), (7)
which represent the multidimensional diagram of the exchange between the quality
indicators showing the way in which the potentially attainable value of the corresponding
indicator depends upon the values of other indicators.
Thus, the Pareto-optimal surface connects the potentially attainable values of index is Pareto-
optimum consistent, generally dependent and competing quality indicators Therefore, with
Multicriteria Optimization in Telecommunication Networks Planning, Designing and Controlling 257
the Pareto-optimal surface in the criteria space being obtained, the multidimensional
potential characteristics of the system and related multidimensional exchange diagram are
found.
It should be noted that they are different types of optimization problems depending upon
the problem statement.
s ∈ S D and to
Structural-parametric optimization. It is necessary to synthesize the structure
find the magnitude of the vector of the parameters β ∈ BD at which ϕ = (s, β) ∈ opt Φ D .
The first two types of problems have been adequately developed in the theoiy of
multicriteria optimization. The solution of the third-type problems is most complicated. To
synthesize
the Pareto-optimal structure and find the optimal parameters a set of functionals
k 1 (s, β), k 2 (s, β),..., k m (s, β) is to be optimized. Yet optimizing functionals even in a scalar
case appears to be a rather challenging task from both the mathematical and some no less
importants standpoints. In the case of a vector the solution to these types of problems
becomes still more complicated. Therefore, in designing the systems with regard to a set of
the quality indicators one has to simplify the optimization problem by decomposing the
system into simpler subsystems, to reduce the number of quality indicators as the system
structure is being synthesized.
If the set of Pareto-optimal systems variants, which has been found following the
optimization procedure, turned out to be a narrow one, then any of them can be made use of
as an optimal one. In this case the rigorous preference relation may be thought of as
coinciding with the relation ≥ and, therefore, opt V = P(V).
However, in practice the set P(V) proves to be sufficiently wide. This implies that the
relations and ≥ (although they are connected through the Pareto axiom) do not show a
close agreement. Here, the inclusions opt V ⊂ P(V) and opt Φ D ⊂ Pk (Φ D ) are valid.
Therefore, we will have to deal with an emerging problem of narrowing the found
Pareto-optimal solutions involving additional information about the relation of the
customer's rigorous preference. Yet the ultimate selection of optimal approaches should
only be made within the limits of the found set of Pareto-optimal solution.
2.4 Narrowing of the set of Pareto-optimal solutions down to the only variant of a
system
The formal model of the Pareto optimization problem does not contain any information to
select the only alternative. In this particular instance a set of permissible variants gets
narrowed only to a set of Pareto-optimal solution by eliminating the worse variants with
respect to a precise variant.
258 Telecommunications Networks – Current Status and Future Trends
However, the only variant of a system is normally to be chosen to ensure the subsequent
designing stages. It is just for this reason why one feels it necessary to narrow the set of
Pareto-optimal solutions down to the only variant of a system and to make use of some
additional information about a customer's preference. This type of information is
produced following the comprehensive analysis of Pareto-optimal variants of a system,
particularly, of a structure, parameters, operating characteristics of the obtained variants
of a system, a relative importance of input quality indicators, etc. Some additional
information thus obtained concerning the customer's preferences is employed to construct
choice function (an objective scalar function) whose optimization tends to select the sole
variants of a system.
In order to solve the problem of narrowing a set of Pareto-optimal solution a diversity of
approaches, especially those based on the theory of utility, the theory of fuzzy sets, etc. Now
let us take a brief look at some of them.
The selection of optimal approaches using the scalar value function. One of the commonly used
methods of narrowing a set of Pareto-optimal solution is constructing the scalar value
function, which, if applied, gives rise to selecting one of the optimal variants of a system.
The numerical function F(v1 , v 2 ,..., vm ) of m variables is referred to as the value (utility)
function for the relation if for the arbitrary estimates v' , v'' ∈ V the inequality
' '' ' ''
F(v ) > F(v ) occurs if and only if v v . If there exists the function of utility F(v) for the
relation , then it is obvious that
opt V = {v 0 ∈ V : F(v 0 ) = max
F(v)}
v∈V
and finding an optimal estimate boils down to solving the single-criteria problem of
optimizing the function F(v) on the set V. The value function of the type
m
F(v1 , v 2 ,..., vm ) = c j fj (v j ), (8)
j=1
where c j is the scaling factor, fj (ν j ) are the certain unidimensional value function which are
the estimates of usefulnen of the system variant ϕ in terms of the index k j (ϕ) .
The construction of the value function (8) consists in estimating the scale factors, forming
unidimensional utility function fj (ν j ) as well as in validating their independence and
consistency. Here, use is made of the data obtained from interrogating a customer. Special
interrogation procedures and program packages intended to acquire some additional
information about the customer's preferences have been worked out.
The selection of optimal approaches based upon the theory of fuzzy sets. This procedure is based on
the fact that due to the apriori uncertainty with regard to the customer's preference, the
concept such as "the best variant of a system" cannot be accurately defined. This concept
may be thought of as constituting a fuzzy set and in order to make an estimate of the
system, the basic postulates of the fuzzy- set theory can be employed.
Multicriteria Optimization in Telecommunication Networks Planning, Designing and Controlling 259
k j = {k j , ξk j (k j )},
where ξk j () is the membership function of the specific value of the j -th index to the
optimal magnitude.
This type of writing is highly informative, since it gives an insight into its physical meaning
and "worth" in relation to the optimal (extreme) value which is characterized by the
membership function ξk j () .
The main difficulty over the practical implementation of the considered approach consists in
choosing the type of a membership function. In some sense the universal form of the
membership function being interpreted in terms of the theory of fuzzy sets with regard to
the collection of indicators is written as:
1
1 m β
ξk (k 1 ,k 2 ,...,k m ) = [ξk j (k j )]β . (9)
m l = 1
The advantage of this form is that depending upon the parameter β a wide class of
functions is implemented. These functions range from the linear additive form at β = 1 to
the particularly nonlinear relationships at β → ∞ .
It should be pointed out that with this particular approach it is essential that the information
obtained from a customer by an expert estimates method be used to pick out a membership
function and a variety of coefficients.
Selecting optimal approaches at quality indicators strictly ordered in terms of the level of their
importance. Occasionally it appears desirable for a customer to obtain die maximum
magnitude of one of the indicators, say, k 1 even at the expense of the "lasses" for the
remaining indicators. This means that the indicator k 1 is found to be more important than
other indicators.
In addition, there may be the case where the whole set of indicators k 1 ,k 2 , ,k m is strictly
ordered in terms of their importance such k 1 is more important that other indicators
k 1 ,k 2 , ,k m ; k 2 is more essential than all the indicators k 1 ,k 2 , ,k m , etc. This corresponds
the instance where the lexico-graphical relation lex is employed when a comparison is made
between the estimates of approaches. Now we give the definition of the above relation.
260 Telecommunications Networks – Current Status and Future Trends
Let there be two vectors of estimates ν , ν′ ∈ V ⊂ R m . The lexico-graphical relation lex is
determined in the following way: the relation lex occurs if and only if one the following
conditions is satisfied.
In this case the components v 1 , v 2 , , v m , i.e. the estimates of the system quality indicators
k 1 ( ϕ),k 2 (ϕ),...,k m ( ϕ) are said to be strictly order in terms of their importance. As the
relation v'lexv'' is satisfied they say that from the lexico-graphical stand point the vector ν′
is greater than the vector ν′. At m − 1 the lexico-graphical relation coincides with the
relation on the subset of real numbers.
In determining the lexico-graphical relation a major role is played by the order of
enumerating quality indicators. The change in the numeration of quality indicators give rise
to a different lexico-graphical relation.
3. Practical usage
Let us consider some practical peculiarities of an application of multicriteria optimization
methods within a long-term and short-term planning, designing and controlling. In the
examined examples of telecommunication networks operation and estimation of the quality
indicators values is probed on mathematical models implemented on a computer using the
packets of specific simulation modeling.
transmission through the communication channels. The procedures of the messages packing
have simulated a batch data transmission with a mode of the window load control.
The procedures of a packet transmission were simulated by the processes of transfer using
duplex communication channels with errors. The simulation analysis of the transfer delays
was stipulated at a packet transmission in the communication lines connected with final
velocity of signals propagation in communication channels, fixed transmission channel
capacity and packets arrival time in the queue for their transfer trough the communication
channel.
N k = int(F / Fk ),
2. The number of radio frequencies needed for service of subscribers in one sector of each
cell, is defined as
n s = int(N k / C ⋅ M).
3. A value of the permissible telephone load in one sector of one cell or in a cell (for base
stations incorporating antennas with the circular pattern) is defined by the following
relationships
( )
1 2
n0
A = n O 1 − 1 − Psl πn О / 2 at Psl ≤ ;
πn o
π π
A = nO +
2
(
+ 2п О ln Psl πn О / 2 −
2
)at Psl >
2
πn o
,
4. The number of subscribers under service of the base station, depending on the number
of sectors, permissible telephone load and activity of subscribers
5. The necessary number of the base stations at the given territory of covering, is defined
as
1, 21 ⋅ S 0
R= .
πN BTS
7. The value of the protective distance between BTS with equal frequency channels, is
defined as
D = R 3C ,
and other parameters such as the necessary power at the receiver input, the probability of
error in the process of communication session, the efficiency of radio spectrum use, etc.
Finding the subset of Pareto-optimal network variants is performed in criteria space of the
quality indicators estimates. A single variant of CCN was chosen with the use of the
conditional criteria of preference by finding the extreme of the scalar criteria function as
1
сi = , i = 1,7 .
7
For a choice of optimal design solutions on the basis of multicriteria optimization methods,
there was developed the program complex. It includes two parts solving the following
issues.
1. Setting initial data and calculation of technical parameters for some permissible set of
variants of CCN.
2. A choice of Pareto-optimal network variants and narrowing them to a single one.
Fig. 2 shows, as an example, the program complex interface. Here is shown part of table
with values of 14 indicators for 19 CCN variants. There is the possibility to choose («tick
off») concrete quality indicators to be taken into account at the multicriteria optimization.
Besides, here are given values of coefficients of relative importance of chosen quality
indicators.
There was selected a subset of Pareto-optimal variants including 71 network variants.
Therewith 29 certainly worst variants are rejected. From the condition of minimum
conditional criteria of preference as of the Pareto subset, a single variant is chosen (№72). It
264 Telecommunications Networks – Current Status and Future Trends
Fig. 3. MPE of the quality indicators (the number of subscribers serviced by one base station
(a), the load, the activity of subscribers (b)) for CCN of GSM standard.
(
F(x) = (W1 x),...,Wj (x),...,Wm (x) , )
where components determine the values of quality routes indicators.
The route variant x * ∈ X is Pareto-optimal route if another route x ∈ X doesn’t exist, order
to perform inequality Fj (x * ) ≤ Fj (x),
j = 1,...,m, where at least one of the inequalities is strict.
We propose to solve the problem of finding Pareto-optimal routes by using weight method.
It is used for finding extreme values of the objective route function as a weighted sum of the
partial choice functions for all possible values of the weighting coefficients λ j :
m
extr = ( F(x)) = λ j Wj (x).
var x∈X
j=1
Pareto-optimal alternatives of the routes are equivalent to the Pareto criteria and could be
used for organizing multipath routing in the multi-service telecommunication networks.
Network model consists of twelve nodes; they are linked by communication lines with
losses (fig. 4).
Network analysis shows that for each destination node there are many options to choose the
route directly. For example, between node 0 and node 8 there are 22 routes.
Fig. 5 shows the set of the alternative routes between nodes 0 and 8 in the space of the
quality indicators k 1 and k 2 . Subset of the Pareto-optimal alternatives routes corresponds
to the left lower border which includes three variants, they are marked (▲). This subset
corresponds to be coordinated in Pareto optimum of the quality indicators.
4
3,5
3
2,5
k2
2
1,5
1
0,5
0
0 1 2 3 4
k1
The resulting subset of the Pareto-optimal alternative routes can be used for organizing
multipath routing when using MPLS technology. It will allow to provide a load balancing
and a traffic management and to provide given quality-of-service taking into account the set
of the quality indicators.
Complexity
Speech Coding
of the Frame size, Total delay,
№ Codec coding, quality,
realization, ms ms
kbps MOS (1-5)
MIPS
1 G 711 64 3,83 11,95 0,125 60
2 G 721 32 4,1 7,2 0,125 30
3 G 722 48 3,83 11,95 0,125 31,5
4 G 722(a) 56 4,5 11,95 0,125 31,5
5 G 722(b) 64 4,13 11,95 0,125 31,5
6 G 723.1(a) 5,3 3,6 16,5 30 37,5
7 G 723.1 6,4 3,9 16,9 30 37,5
8 G 726 24 3,7 9,6 0,125 30
9 G 726(a) 32 4,05 9,6 0,125 30
10 G 726(b) 40 3,9 9,6 0,125 30
11 G 727 24 3,7 9,9 0,125 30
12 G 727(a) 32 4,05 9,9 0,125 30
13 G 727(b) 40 3,9 9,9 0,125 30
14 G 728 16 4 25,5 0,625 30
15 G 729 8 4,05 22,5 10 35
16 G 729a 8 3,95 10,7 10 35
17 G 729b 8 4,05 23,2 10 35
18 G 729ab 8 3,95 11,5 10 35
19 G 729e 8 4,1 30 10 35
20 G 729e(a) 11,8 4,12 30 10 35
21 G 727(с) 16 4 9,9 0,125 30
22 G 728(a) 12,8 4,1 16 0,625 30
23 G 729d 6,4 4 20 10 35
Table 3. Codecs characteristics.
Pareto-
№ Codec K 1n K 2n K′3n K 4n K′5n optimal
choice
1 G 711 1 0,851 0,604 0,004 0,515 -
2 G 721 0,5 0,911 1 0,004 1 +
3 G 722 0,75 0,851 0,604 0,004 0,969 -
4 G 722(a) 0,875 1 0,604 0,004 0,969 +
5 G 722(b) 1 0,918 0,604 0,004 0,969 +
6 G 723.1(a) 0,083 0,8 0,439 1 0,818 +
7 G 723.1 0,1 0,867 0,424 1 0,818 +
8 G 726 0,375 0,822 0,748 0,004 1 -
9 G 726(a) 0,5 0,9 0,748 0,004 1 -
10 G 726(b) 0,625 0,866 0,748 0,004 1 +
11 G 727 0,375 0,822 0,727 0,004 1 -
12 G 727(a) 0,5 0,9 0,727 0,004 1 -
13 G 727(b) 0,625 0,866 0,727 0,004 1 -
14 G 728 0,25 0,889 0,281 0,021 1 +
15 G 729 0,125 0,9 0,317 0,333 0,879 +
16 G 729a 0,125 0,878 0,669 0,333 0,879 +
17 G 729b 0,125 0,9 0,309 0,333 0,879 -
18 G 729ab 0,125 0,878 0,626 0,333 0,879 -
19 G 729e 0,125 0,911 0,237 0,333 0,879 -
20 G 729e(a) 0,184 0,915 0,237 0,333 0,879 +
21 G 727(с) 0,25 0,889 0,727 0,004 1 -
22 G 728(a) 0,2 0,911 0,453 0,021 1 +
23 G 729d 0,1 0,889 0,359 0,333 0,879 +
Table 4. Transformed quality indicators.
On the base of received results there were considered the practical application features
examined methods of the allocation of the Pareto-optimal speech codec variant set taking
into account a set of the quality indicators as well as the unique design decision choice.
From the initial set of the 23 speech codecs variants there was allocated the Pareto subset
included 12 codecs variants (marked + in table 4).
The only one project decision was chosen from the condition of the scalar goal function
extreme (9) with two different values of β defined characters of this function changing. In
table 5 are presented the values of the given function for Pareto-optimal speech codecs
variants at β = 2 and β = 3. It was obtained that an extreme goal function value, depending
on β , is reached for the same speech codec G 722 (b).
Within statement of a problem we have chosen the codec of series G.722b which has following
values of the quality indicators: speech coding – 64 kbps, coding quality – 4,13 MOS,
complexity of the realization – 11,95 MIPS, the frame size – 0,125 ms, total delay – 31,5 ms.
270 Telecommunications Networks – Current Status and Future Trends
l
K = (k 1 ,k 2 ,...,k l ), k i = 1,
i
0 ≤ k i ≤ 1, i = 1...l;
λout
i k i ≤ ci , i = 1...l .
Each element of this vector characterizes a part of outgoing user traffic from autonomous
system operating agent transferred by using a corresponding channel. Within a given
model, the task of network resources controlling comes to solving the optimization problem
connected to function minimization.
Multicriteria Optimization in Telecommunication Networks Planning, Designing and Controlling 271
1 l
( )
2
σ1 (K) = xi − x ;
l − 1 i =1
2
1 l
σ2 (K) = (
Zi − Z ;
l-1 i = 1
)
Φ – used routing protocol metric;
l
Φ = ϕi xi ;
i =1
The considered mathematical model of the distributed network resources controlling uses
specific criteria of optimality included standard routing protocol metrics, a measure of
channels and agents loading in given telecommunication network.
Obviously, under condition of σ1 (K) and σ2 (K) absence, function (10) becomes the model
of the load balancing under the routes with equal or non-equal metric. However, absence of
the decentralized control behind the autonomous system of telecommunication network can
finally result in an uncontrollable overload. That fact is defined by the presence of
additional minimized indicators leading to the practical value of the proposed model. Thus
a choice of the relation of weight coefficients q 1 , q 2 and q 3 is an independent problem
demanding some future investigations and formalizations. In this model this task was dared
with expert’s estimations.
The proposed imitation model included up to 18 agents (fig. 7). Researches for different
variants of connectivity between agents have been carried out.
During practical investigation there were analyzed several models of multipath routing and
load balancing. These models are listed below:
М1 – model of routing by RIP;
М2 – model of multipath routing by an equal metric;
М3 – model of multipath routing by an non-equal metric (IGRP);
М4 – Gallagher stream model;
М5 – considered model with multicriteria account of two indicators (10);
М6 – considered model with multicriteria account of three indicators (10).
Multicriteria Optimization in Telecommunication Networks Planning, Designing and Controlling 273
Below are presented some results of the analytic and imitation modeling within comparative
analysis of considered existing and proposed models. These results are shown as
dependences of the blocking probability and average delay time from the network loading
(fig. 8).
Fig. 8. Received dependences of average delay time (a) and blocking probability (b).
4. Conclusion
The present work deals with the methodology of generating and selecting the variants of
information systems when they are optimized in terms of the set of quality indicators. The
multicriteria system-optimization problems are solved in three stages. By using the
morphological approach a structural set of permissible variants of a system is initially
generated. This set is mapped into the space of vector estimates. In this space a subset of
Pareto-optimal estimates is selected, defining the potential characteristics of the system on
the basis of the set of quality indicators. At the conclusive stage the only variant is selected
amongst the Pareto-optimal variants of the system provided there exists an extreme of a
certain scalar functional whose form is determined with the use of some additional
information obtained from a customer.
274 Telecommunications Networks – Current Status and Future Trends
Multicriteria optimization issues and methods based on Pareto conclusions are introduced
for the long-term and short-term practical planning, designing and controlling within
different types of telecommunication networks. In the process of solving the optimization
problems we consider the set of network quality indicators as the different network
topologies, transmission capacities of communication channels, various disciplines of
service requests applied to different routing ways, etc.
Peculiarities of the long-term multicriteria optimization methods used for solving problems
of the cellular networks planning are considered. As an example, the Pareto-optimization
solution within planning of the cellular communication networks is also presented.
Practical features of the multicriteria approach in solving the optimal routing problem in the
multi-service networks are considered within organizing multipath routing as well as
speech codec choice based on a set of the quality indicators. The model of the information
resources balancing on a basis of the decentralized operating agents system with a
multicriteria account of chosen quality indicators is also offered. Considered adaptive
balancing traffic algorithm improves the basic characteristics of the telecommunication
network in a process of the short-term controlling for chosen cases of topologies.
5. Acknowledgment
The research described in this work was made possible in part by the scientific direction
“Telecommunication and information networks optimization”, headed by prof. Bezruk V.,
of the Communication Network Department within Kharkov National University of Radio
Electronics, Ukraine.
6. References
Bezruk, V. & Skorik, Y. (2010). Optimization of speech codec on set of indicators of quality.
Proceedings of TCSET’2010 Modern problems of radio engineering, telecommunications
and computer science, p. 212, ISBN 978-966-553-875-2, Lviv – Slavske, Ukraine,
February 23 – 27, 2010
Bezruk, V. & Bukhanko, O. (2010). Control mode of network resources in multiservice
telecommunication systems on basis of distributed system of agents. Proceedings of
CriMiCo’2010 Microwave and Telecommunication Technology, pp. 526-527, ISBN 978-
966-335-329-6, Sevastopol, Crimea, Ukraine, September 13 – 17, 2010
Bezruk, V. & Varich, V. (2011). The multicriteria routing problem in multiservice networks
with use composition quality indicators. Proceedings of CriMiCo’2011 Microwave and
Telecommunication Technology, pp. 519 – 520, ISBN 978-966-335-254-8, Sevastopol,
Crimea, Ukraine, September 12 – 16, 2011
Figueira, J. (Ed(s).). (2005). Multiple Criteria Decision Analysis: State of the Art Surveys,
Springer Science + Business Media, Inc, ISBN 978-0-387-23081-8, Boston, USA
Saaty, P. (2005). Theory and Applications of the Analytic Network Process: Decision Making with
Benefits, Opportunities, Costs and Risks, RWS Publications, ISBN 1-888603-06-2,
Pittsburgh, USA
Taha, H. (1997). Operations Research: An Introduction, Prentice Hall Inc., ISBN 0-13-272915-6,
New Jersey, USA
Part 5
Traffic Engineering
12
1. Introduction
In order to simplify the design and operation of telecommunications networks, it is common
to describe them in a layered structure constituted by a service network layer on top of a
transport network layer. The service network layer provides services to its users, whereas
the transport network layer comprises the infrastructure required to support the service
networks. Hence, transport networks should be designed to be as independent as possible
from the services supported, while providing functions such as transmission, multiplexing,
routing, capacity provisioning, protection, and management. Typically, a transport network
includes multiple network domains, such as access, aggregation, metropolitan and core,
ordered by decreasing proximity to the end-users, increasing geographical coverage, and
growing level of traffic aggregation.
Metropolitan and, particularly, core transport networks have to transfer large amounts of
information over long distances, consequently demanding high capacity and reliable
transport technologies. Multiplexing of lower data rate signals into higher data rate signals
appropriate for transmission is one of the important tasks of transport networks. Time
Division Multiplexing (TDM) is widely utilized in these networks and is the fundamental
building block of the Synchronous Digital Hierarchy (SDH) / Synchronous Optical Network
(SONET) technologies. The success of SDH/SONET is mostly due to the utilization of a
common time reference, improving the cost-effectiveness of adding/extracting lower order
signals from the multiplexed signal, the augmented reliability and interoperability, and the
standardization of optical interfaces. SDH/SONET networks also generalized the use of
optical fibre as the transmission medium of metropolitan and core networks. Essentially,
when compared to twisted copper pair and coaxial cable, optical fibre benefits from a much
larger bandwidth and lower attenuation, as well as being almost immune to electromagnetic
interferences. These features are key to transmit information at larger bit rates over longer
distances without signal regeneration.
Despite the proved merits of SDH/SONET systems, augmenting the capacity of transport
networks via increasing their data rates is only cost-effective up to a certain extent, whereas
278 Telecommunications Networks – Current Status and Future Trends
adding parallel systems by deploying additional fibres is very expensive. The prevailing
solution to expand network capacity was to rely on Wavelength Division Multiplexing
(WDM) to transmit parallel SDH/SONET signals in different wavelength channels of the
same fibre. Nevertheless, since WDM was only used in point-to-point links, switching was
performed in the electrical domain, demanding Optical-Electrical (OE) conversions at the
input and Electrical-Optical (EO) conversions at the output of each intermediate node, as
well as electrical switches. Both the OE and EO converters and the electrical switches are
expensive and they represent a large share of the network cost.
Nowadays, transport networks already benefit from optical switching, thereby alleviating
the use of expensive and power consuming OE and EO converters and electrical switching
equipment operating at increasingly higher bit rates (Korotky, 2004). The main
ingredients to support optical switching are the utilization of reconfigurable nodes, like
Reconfigurable Optical Add/Drop Multiplexers (ROADMs) and Optical Cross-Connects
(OXCs), along with a control plane, such as the Generalized Multi-Protocol Label
Switching (GMPLS), (IETF, 2002), and the Automatically Switched Optical Network
(ASON), (ITU-T, 2006). The control plane has the task of establishing/terminating optical
paths (lightpaths) in response to connection requests from the service network. As a
result, the current type of dynamic optical networks is designated as Optical Circuit
Switching (OCS).
In an OCS network, bandwidth is allocated between two nodes by setting up one or more
lightpaths (Zang et al., 2001). Consequently, the capacity made available for transmitting
data from one node to the other can only be incremented or decremented in multiples of
the wavelength capacity, which is typically large (e.g., 10 or 40 Gb/s). Moreover, the
process of establishing a lightpath can be relatively slow, since it usually relies on two-
way resource reservation mechanisms. Therefore, although the deployment of OCS
networks only makes use of already mature optical technologies, these networks are
inefficient in supporting bursty data traffic due to their coarse wavelength granularity
and limited ability to adapt the allocated wavelength resources to the traffic demands in
short time-scales, which can also increase the bandwidth waste due to capacity
overprovisioning.
Diverse solutions have been proposed to overcome the limitations of OCS networks and
improve the bandwidth utilization efficiency of future optical transport networks. The less
disruptive approach consists of an optimized combination of optical and electrical switching
at the network nodes. In this case, entire wavelength channels are switched optically at a
node if the carried traffic flows, originated at upstream nodes, approximately occupy the
entire wavelength capacity. Alternatively, traffic flows with small bandwidth requirements
can be groomed (electrically) into one wavelength channel with enough spare capacity (Zhu
et al., 2005). This hybrid switching solution demands costly OE/EO converters and electrical
switches, albeit in/of smaller numbers/sizes than those needed in opaque implementations
relying only on electrical switching. However, OCS networks with electrical grooming only
become attractive when it is possible to estimate in advance the fractions of traffic to be
groomed and switched transparently at each node, enabling to accurately dimension both
the optical and electrical switches needed to accomplish an optimized trade-off between
maximizing the bandwidth utilization and minimizing the electrical switching and OE/EO
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 279
conversion equipment. Otherwise, when the traffic pattern cannot be accurately predicted,
this trade-off can become difficult to attain and both optical and electrical switches may
have to be overdimensioned, hampering the cost-effectiveness of this hybrid approach.
The most advanced all-optical switching paradigm for supporting data traffic over optical
transport networks is Optical Packet Switching (OPS). Ideally, OPS would replicate current
store-and-forward packet-switched networks in the optical domain, thereby providing
statistical multiplexing with packet granularity, rendering the highest bandwidth utilization
when supporting bursty data traffic. In the full implementation of OPS, both data payload
and their headers are processed and routed in the optical domain. However, the logical
operations needed to perform address lookup are difficult to realize in the optical domain
with state-of-the-art optics. Similarly to MPLS, Optical Label Switching (OLS) simplifies
these logical operations through using label switching as the packet forwarding technique
(Chang et al., 2006). In their simplest form, OPS networks can even rely on processing the
header/label of each packet in the electrical domain, while the payload is kept in the optical
domain. Nevertheless, despite the complexity differences of the implementations proposed
in the literature, the deployment of any variant of OPS networks is always hampered by
current limitations in optical processing technology, namely the absence of an optical
equivalent of electronic Random-Access Memory (RAM), which is vital both for buffering
packets while their header/label is being processed and for contention resolution (Tucker,
2006; Zhou & Yang, 2003), and the difficulty to fabricate large-sized fast optical switches,
essential for per packet switching at high bit rates (Papadimitriou et al., 2003).
The above discussion highlighted that OCS networks are relatively simple to implement but
inefficient for transporting bursty data traffic, whereas OPS networks are efficient for
transporting this type of traffic but very difficult to implement with state-of-the-art optical
technology. Next-generation optical networks would benefit from an optical switching
approach whose bandwidth utilization and optical technology requirements lie between
those of OCS and OPS. In order to address this challenge, an intermediate optical switching
paradigm has been proposed and studied in the literature – Optical Burst Switching (OBS).
The basic premise of OBS is the development of a novel architecture for next-generation
optical WDM networks characterized by enhanced flexibility to accommodate rapidly
fluctuating traffic patterns without requiring major technological breakthroughs. A number
of features have been identified as key to attain this objective (Chen et al., 2004). In order to
overview some of them, consider an optical network comprising edge nodes, interfacing
with the service network, and core nodes, as illustrated in Fig. 1. OBS networks grant
intermediate switching granularity (between that of circuits and packets) via: assembling
multiple packets into larger data containers, designated as data bursts, at the ingress edge
nodes, enforcing per burst switching at the core nodes, and disassembling the packets at the
egress edge nodes. Noteworthy, data bursts are only assembled and transmitted into the
OBS network when data from the service network arrives at an edge node. This circumvents
the stranded capacity problem of OCS networks, where the bandwidth requirements from
the service network evolve throughout the lifetime of a lightpath and during periods of time
can be considerably smaller than the provisioned capacity. Furthermore, the granularity at
which the OBS network operates can be controlled through varying the number of packets
contained in the data bursts, enabling to regulate the control and switching overhead.
280 Telecommunications Networks – Current Status and Future Trends
decreasing the number of converters utilized or using simpler ones without degrading
performance would enhance the cost-effectiveness of OBS networks. Nevertheless, even if
wavelength conversion is available, contention occurs when the number of bursts directed
to the same link exceeds the number of wavelength channels. Moreover, the asynchronous
transmission of data bursts creates voids between consecutive data bursts scheduled in the
same wavelength channel, further contributing to contention. Consequently, minimizing
these voids and smoothing burst traffic without resorting to complex contention resolution
strategies would also improve the cost-effectiveness of OBS networks.
In alternative or as a complement to contention resolution strategies, such as wavelength
conversion, the probability of resource contention in an OBS network can be proactively
reduced using contention minimization strategies. Essentially, these strategies optimize the
resources allocated for transmitting data bursts in such way that the probability of multiple
data bursts contending for the same network resources is reduced. Contention minimization
strategies for OBS networks mainly consist of optimizing the wavelength assignment at the
ingress edge nodes to decrease contention for the same wavelength channel (Wang et al.,
2003), mitigating the performance degradation from unused voids between consecutive data
bursts scheduled in the same wavelength channel (Xiong et al., 2000), and selectively
smoothing the burst traffic entering the network (Li & Qiao, 2004). Albeit the utilization of
these strategies can entail additional network requirements, namely augmenting the
(electronic) processing capacity in order to support more advanced algorithms, it is expected
that the benefits in terms of performance or complexity reduction will justify their support.
This chapter details two contention minimization strategies, which when combined provide
traffic engineering in the wavelength domain for OBS networks. The utilization of this
approach is shown to significantly improve network performance and reduce the number of
wavelength converters deployed at the network nodes, enhancing their cost-effectiveness.
The remaining of the chapter is organized as follows. The second section introduces the
problem of wavelength assignment in OBS networks whose nodes have no wavelength
converters or have a limited number of wavelength converters. A heuristic algorithm for
optimizing the wavelength assignment in these networks is described and exemplified. The
third section addresses the utilization of electronic buffering at the ingress edge nodes of
OBS networks, highlighting its potential for smoothing the input burst traffic and describing
how it can be combined with the heuristic algorithm detailed in the previous section to
attain traffic engineering in the wavelength domain. The performance improvements and
node complexity reduction made possible by employing these strategies in an OBS network
are evaluated via network simulation in the fourth section. Finally, the fifth and last section
presents the final remarks of the work presented in this chapter.
The BHP is transmitted via a control wavelength channel and processed at the control unit
of each node along the routing path of the burst. The control unit uses the information in
the BHP to determine the resources (e.g., wavelength channel in the designated output
fibre link) to be allocated to the data burst during the time interval it is expected to be
traversing the core node. This corresponds to a delayed resource reservation, since the
resources are not immediately set up, but instead are only set up just before the arrival
time of the data burst. Furthermore, the resources are allocated to the burst during the
time strictly necessary for it to successfully pass through the node. This minimizes the
bandwidth waste because these resources can be allocated to other bursts in non-
overlapping time intervals. Before forwarding the BHP to the next node, the control unit
updates the offset time, reducing it by the amount of time spent by the BHP at the node.
Meanwhile, the data burst buffered at the ingress node is transmitted after the timer set to
the offset time expires. In case of successful resource reservation by its BHP at all the
nodes of the routing path, the burst cuts through the core nodes in the optical domain
until it arrives to the egress node. Otherwise, when resource reservation is unsuccessful at
a node, both BHP and data burst are dropped at that node and the failed burst
transmission is signalled to the ingress node.
As a result of using one-way resource reservation, there is a large probability that data
bursts arrive at a core node on the same wavelength channel from different input fibre links
and being directed to the same output fibre link of that node. This leads to contention for the
same wavelength channel at the output fibre link. These contention events can be efficiently
resolved using wavelength converters and/or minimized in advance through an optimized
assignment of wavelengths at the ingress nodes. In view of the immaturity of all-optical
wavelength converters, strategies for minimizing the probability of wavelength contention
become of paramount importance in order to design cost-effective OBS core nodes.
where |Ei ∩ Ej| denotes the number of fibre links shared by both paths, and to define the
combined interference level between routing paths πi and πj with i ≠ j as,
Ic(πi, πj)= I(πi, πj) + I(πj, πi) = (γi + γj)|Ei ∩ Ej|. (2)
The higher the combined interference level between two routing paths, the higher the
likelihood that data bursts going through those paths will contend for the same fibre link
resources. Consequently, routing paths with higher combined interference level should use
wavelength search orderings as opposed as possible. This constitutes the basic principle
exploited by First Fit-Traffic Engineering (FF-TE) (Teng & Rouskas, 2005), which was the
first offline algorithm proposed to determine wavelength search orderings that are expected
to reduce the probability of wavelength contention. However, this algorithm oversimplifies
the problem resolution by computing a single wavelength search ordering for all the routing
paths with the same ingress node. A detailed discussion of the limitations of the FF-TE
algorithm is presented in (Pedro et al., 2006b). To overcome these shortcomings, the more
advanced Heuristic Minimum Priority Interference (HMPI) algorithm, which computes an
individual wavelength search ordering per routing path, is described below.
(S1) Reorder the routing paths of Π such that if i < j one of the following conditions holds,
I (π i , π k ) > I (π j , π k ) ; (3)
π k ∈Π , π k ∈Π ,
k≠i k≠ j
(S2) Consider W sub-sets of the routing paths, one per wavelength, initially empty, that is,
|Πj| = 0 for j = 1, …, W. Following the routing path ordering defined for Π, include
path πi in the sub-set Πj such that for any k ≠ j one of the subsequent conditions holds,
I c (π i , π l ) < I c (π i , π l ) ; (5)
π l ∈Π j , π l ∈Π k ,
l≠i l≠i
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 285
(S3) Select wavelength channel λj as the primary wavelength of all the paths in sub-set Πj,
that is,
W , if π i ∈ Π j
P(λ j , π i ) = . (7)
0, otherwise
The first step of this stage of the HMPI algorithm is used to order the routing paths by
decreasing interference level on the remaining paths. Ties are broken by giving preference to
the longer routing paths. Considering W sub-sets of routing paths, the second step
sequentially includes each routing path on the sub-set with minimum combined interference
level between the routing path and the paths already included in the sub-set. Ties are
broken by preferring the sub-set with larger number of paths. Finally, the third step assigns
to all routing paths of a sub-set the primary wavelength associated with that sub-set. As a
result of this stage, the routing paths with minimum combined interference level, carrying
data bursts that are less prone to contend with each other for the same wavelength channel,
will share the same primary wavelength.
In the second stage of the algorithm, the non-primary wavelengths for all routing paths are
determined sequentially, starting with the second preferred wavelength channel and ending
with the least preferred wavelength. When determining for each routing path the
wavelength with priority p < W, it is intuitive to select one to which has been assigned, so
far in the algorithm execution, the lowest priorities on routing paths that share fibre links
with the routing path being considered. This constitutes the basic rule used in the second
stage of the HMPI algorithm.
The following steps are executed for priorities 1 ≤ p ≤ W – 1 in decreasing order and
considering, for each priority p, all the routing paths according to the path ordering defined
in the first stage of the algorithm.
(S1) Let Λ = {λ j : P(λ j , π i ) = 0, 1 ≤ j ≤ W } denote the initial set of candidate wavelengths,
containing all wavelengths that have been assigned a priority of zero on routing path
πi. If |Λ| = 1, go to (S7).
(S2) Let Ρ = { k : ∃π l , l ≠ i , P(λ j , π l ) = k ,|El ∩ Ei |> 0, λ j ∈ Λ} be the set of priorities that have
already been assigned to candidate wavelengths on paths that overlap with πi.
(S3) Let ψ = min λ j ∈Λ max π l ∈Π { P(λ j , π l ) : l ≠ i ,|El ∩ Ei |> 0, P(λ j , π l ) ∈ Ρ} be the lowest
priority among the set containing the highest priority assigned to each candidate
wavelength on paths that share links with πi. Update the set of candidate wavelengths
as follows,
If |Λ| = 1, go to (S7).
286 Telecommunications Networks – Current Status and Future Trends
If |Λ| = 1, go to (S7).
and α π = min λ j ∈Λ C (λ j , π i ) as the minimum cost among the costs associated with the
candidate wavelengths on πi. Update the set of candidate wavelengths as follows,
If |Λ| = 1, go to (S7).
(S6) Update the set of priorities assigned to the candidate wavelengths as follows,
Ρ ← Ρ \{ k : k ≥ ψ} ; (11)
As the outcome of executing the HMPI algorithm, each wavelength channel λj is assigned a
unique priority on routing path πi, 1 ≤ P(λj, πi) ≤ W. Equivalently, this solution for the
priority assignment problem can be represented as an ordering of the W wavelengths,
{λ1(πi), λ2(πi), …, λj(πi), …, λW(πi)}, where λj(πi) denotes the jth wavelength channel to be
searched when assigning a wavelength to data bursts directed to routing path πi. In order to
enforce these search orderings, each of these lists must be uploaded from the point where
they are computed to the ingress nodes of the routing paths. Hence, assuming single-path
routing, each ingress node will have to maintain at most N – 1 lists of ordered wavelengths.
The computational complexity of the HMPI algorithm, as derived in (Pedro et al., 2009c), is
given by O(W 2·|Π|2), that is, in the worst case it scales with the square of the number of
wavelength channels times the square of the number of routing paths.
Fig. 3. OBS network used to exemplify the HMPI algorithm (Pedro et al., 2009c).
The HMPI algorithm starts by computing the interference level of all pairs of routing paths,
as shown in Table 1. Step (S1) of the first stage of the algorithm orders the routing paths by
decreasing order of their interference level over other paths, which results in the path order
{π5, π4, π3, π1, π6, π2}. The path with the highest interference level over other paths is π5,
which overlaps with three paths, and the path with the second highest interference level
over other paths is π4, which overlaps with two paths. Although π3, π1 and π6 also overlap
with two paths, π4 is offered more traffic load and consequently can cause more contention.
In addition, π3 precedes π1 and π6 because it is longer than the later paths. Since paths π1 and
288 Telecommunications Networks – Current Status and Future Trends
π6 are tied, the path with the smallest index was given preference. Finally, the path with the
lowest interference level over other paths is π2.
I(πi, πj) π1 π2 π3 π4 π5 π6
π1 –– 0 1 0 1 0
π2 0 –– 0 0 1 0
π3 1 0 –– 1 0 0
π4 0 0 1.2 –– 0 1.2
π5 1 1 0 0 –– 1
π6 0 0 0 1 1 ––
Table 1. Interference level of the routing paths.
Step (S2) starts by creating one sub-set of routing paths per wavelength, that is, Π1, Π2, Π3, Π4.
Following the determined path order, π5 is included in the first empty sub-set, Π1. Path π4 is
also included in Π1, because IC(π4, π5) = 0 and Π1 has more paths than the remaining sub-sets.
Since path π3 overlaps with π4, IC(π3, π4) = 2.2, and π4 is already included in Π1, π3 is included in
the empty sub-set Π2. Moreover, path π1 overlaps with both π5 and π3 and thus it is included in
empty sub-set Π3. Path π6 can be included in sub-sets Π2 and Π3 because it only overlaps with
the paths of Π1. The tie is broken by selecting the sub-set with smallest index, that is, Π2.
Similarly, path π2 is also included in this sub-set as it does not overlap with the paths in Π2 and
Π3 and |Π2| > |Π3|. Since every path has been included in one sub-set, Π1 = {π4, π5}, Π2 = {π2,
π3, π6} and Π3 = {π1}, step (S3) concludes the first stage of the algorithm by making λ1 the
primary wavelength of paths π4 and π5, λ2 the primary wavelength of paths π2, π3 and π6, and
λ3 the primary wavelength of path π1. The other wavelengths are temporarily assigned priority
0 on the routing paths. Table 2 shows the priorities assigned to the wavelengths on the routing
paths after the entire HMPI algorithm has been executed.
P(λj, πi) π1 π2 π3 π4 π5 π6
λ1 1 1 1 4 4 1
λ2 2 4 4 1 1 4
λ3 4 3 2 2 2 3
λ4 3 2 3 3 3 2
Table 2. Wavelengths priority on the routing paths.
The second stage of the algorithm is initiated with p = 3 and proceeds path by path
according to the order already defined. For path π5, the algorithm starts by creating the
initial set of candidate wavelengths, Λ = {λ2, λ3, λ4}, in (S1). Since this path overlaps with π1,
π2 and π6, the set of priorities assigned to wavelengths of Λ on these paths, determined in
(S2), is Ρ = {0, 4}. Wavelength λ4 is assigned priority 0 on all paths that overlap with π5 and
thus ρ = 0. Accordingly, in (S3) the set of candidate wavelengths is updated, Λ = {λ4}, and λ4
is assigned priority 3 on path π5. For path π4, Λ = {λ2, λ3, λ4}, Ρ = {0, 4}, and ρ = 0. The set of
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 289
candidate wavelengths is updated to Λ = {λ3, λ4}, because both λ3 and λ4 are assigned
priority 0 on paths that overlap with π4. In this particular case, the algorithm cannot break
the tie and in (S7) randomly selects wavelength λ4 to be assigned priority 3 on path π4. For
the remaining paths, there is only one candidate wavelength whose priority on other paths
equals ρ. Wavelength λ4 is assigned priority 3 on paths π3 and π1 and wavelength λ3 is
assigned this priority on paths π6 and π2.
The second stage of the algorithm is executed again, but with p = 2. For path π5, the initial
set of candidate wavelengths is Λ = {λ2, λ3}. Both wavelengths are assigned priority 4 on at
least one of the paths that overlaps with π5 (ρ = 4), λ2 on π2 and π6 and λ3 on π1. Paths π1, π2,
and π6 share with π5 links e3, e5 and e8, respectively, and the average traffic load offered to
these paths is 1. Thus, according to (S4), the cost associated with λ2 and λ3 on each link is at
most 1 (αe = 1). However, λ2 has this link cost on two links, which in (S5) results in a cost
C(λ2, π5) = 2, whereas λ3 has this link cost on a single link, C(λ3, π5) = 1. Consequently, απ = 1
and the set of candidate wavelengths is updated to Λ = {λ3}. For path π4, Λ = {λ2, λ3}, Ρ = {0, 3,
4}, and ρ = 3. Only wavelength λ3 is used with a priority smaller or equal than 3 in all links,
which reduces the set of candidates to λ3. In the case of path π3, Λ = {λ1, λ3} and λ1 is
assigned priority 4 on π4, whereas λ3 is assigned this priority on π1. Since γ4 > γ1, the highest
link cost associated to λ1 is larger than that for λ3, and the candidate wavelengths are
reduced to λ3. For path π1, Λ = {λ1, λ2} and both these wavelengths observe ρ = 4, αe = 1 and
απ = 1. The algorithm has to randomly select one of the wavelengths (λ2). For both π6 and
π2, Λ = {λ1, λ4}, ρ = 3, but only λ4 is assigned a priority smaller or equal to 3 in all of the links.
The set of candidate wavelengths is reduced to Λ = {λ4}.
Finally, for p = 1 the wavelength assignment is trivial, because there is only one wavelength
still assigned priority 0 on each path. The complete wavelength search ordering of each path
can be obtained from Table 2. The following observations show that these orderings should
effectively reduce contention. Firstly, overlapping paths do not share the same primary
wavelength. Instead, primary wavelengths are reused by link-disjoint routing paths (e.g., λ2
is the primary wavelength of π2, π3 and π6). Secondly, paths use with smallest possible
priority the primary wavelengths of overlapping paths (e.g., π1, π2 and π6 overlap with π5
and use the primary wavelength of this path with priority 1).
The Burst Overlap Reduction Algorithm proposed in (Li & Qiao, 2004) exploits the
additional degree of freedom provided by delaying data bursts at the electronic buffers of
the ingress nodes to shape the burst traffic departing from these nodes in such way that the
probability of contention at the core nodes can be reduced. The principle underlying BORA
is that a decrease on the number of different wavelength channels allocated to the data
bursts assembled at an ingress node can smooth the burst traffic at the input fibre links of
the core nodes and, as a result, reduce the probability that the number of overlapping data
bursts directed to the same output fibre link exceeds the number of wavelength channels. In
its simpler implementation, BORA relies on using the same wavelength search ordering at
all the ingress nodes of the network and utilizing the buffers in these nodes to transmit the
maximum number of bursts in the first wavelength channels according to such ordering. In
order to limit the extra transfer delay incurred by data bursts, as well as the added buffering
and processing requirements, the ingress node can impose a maximum ingress burst delay,
RAM
Δtmax , defined as the maximum amount of time a data burst can be kept at an electronic
buffer of its ingress node excluding the time required to assemble the burst and the offset
time between the data burst and its correspondent BHP.
The concept of BORA is appealing in OBS networks with wavelength conversion, since
these algorithms have not been designed to mitigate wavelength contention. Moreover,
BORA algorithms do not account for the capacity fragmentation of the wavelength channels,
which is also a performance limiting factor in OBS networks. These limitations have
motivated the development of a novel strategy in (Pedro et al., 2009b) that also exploits the
electronic buffers of the ingress edge nodes to selectively delay data bursts, while providing
a twofold advantage over BORA: enhanced contention minimization at the core nodes and
support of core node architectures with relaxed wavelength conversion capabilities.
The first principle of the proposed strategy is related with the availability of RAM at the
ingress nodes. In the process of judiciously delaying bursts to schedule them using the
smallest number of different wavelength channels, the delayed bursts can be scheduled with
minimum voids between them and the preceding bursts already scheduled on the same
wavelength channel. This is only possible because the bursts assembled at the node can be
delayed by a random amount of time. The serialization of data bursts not only smoothes the
burst traffic, with the consequent decrease of the chances of contention at the core nodes, but
also reduces the fragmentation of the wavelengths capacity at the output fibre links of the
ingress nodes. These serialized data bursts traverse the core nodes, where some of them
must be converted to other wavelength channels to resolve contention. The wavelength
conversions break the series of data bursts and, as a result, create voids between a burst
converted to another wavelength channel and the bursts already scheduled on this
wavelength. A large number of these voids lead to wasting bandwidth, as the core nodes
will not be able to use them to carry data.
In essence, the first key principle consists of serializing data bursts at the ingress nodes to
mitigate the voids between them. Noticeably, if these bursts traverse a set of common fibre
links without experiencing wavelength conversion, the formation of unusable voids is
reduced at those links. Hence, the second key principle of the proposed strategy consists of
improving the probability that serialized bursts routed via the same path are kept in the
same wavelength channel for as long as possible. This can reduce the number of unusable
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 291
voids created in the fibre links traversed before wavelength conversion is used, improving
network performance.
The task of keeping the data bursts, which are directed to the same routing path and have
been serialized at the ingress node, in the same wavelength channel requires minimizing the
chances that bursts on overlapping routing paths contend for the same wavelength channel
and, as a result, demand wavelength conversion. This objective is the same as that of the
HMPI algorithm presented in Section 2. For that reason, the strategy proposed in (Pedro et
al., 2009b), which is designated as Traffic Engineering in the wavelength domain with
Delayed Burst Scheduling (TE-DBS), combines the wavelength contention minimization
capability of HMPI with selectively delaying data bursts at the electronic buffers of their
ingress nodes not only to smooth burst traffic, but also to maximize the amount of data
bursts carried in the wavelength channels ranked with the highest priorities by HMPI.
The key principles of the TE-DBS strategy can be illustrated with the example of Fig. 4. The
OBS network depicted comprises six nodes and five fibre links. Three paths, π1, π2, and π3,
are used to transmit bursts between one of the three ingress nodes, v1, v2, and v4, and node
v6. Contention between bursts from different input fibre links and directed to the same
output fibre link can occur at core nodes v3 and v5. Each ingress node uses its own
wavelength search ordering and selectively delays bursts with the purpose of transmitting
them on the wavelength channels which have been ranked with the highest priorities by an
algorithm for minimizing contention in the wavelength domain. Similarly to what occurs
RAM
with BORA, a maximum ingress burst delay, Δtmax , is imposed at each ingress node.
As can be seen, v1 has assembled three data bursts (DB 1, DB 2, and DB 3), which overlap in
time, and v2 has assembled two data bursts (DB 4 and DB 5), which also overlap in time. The
first two bursts assembled by v1 are transmitted in wavelength channel λ1, whereas the third
cannot be transmitted in this wavelength without infringing the maximum ingress burst
delay and, therefore, has to be transmitted in λ2. The two bursts assembled by v2 are
transmitted in the wavelength ranked with highest priority, λ3. These bursts traverse v3,
where contention is avoided since the bursts arrive in different wavelengths. Meanwhile, the
ingress node v4 has assembled two data bursts (DB 6 and DB 7) and transmits them in the
wavelength ranked with highest priority, λ2. All seven data bursts traverse core node v5,
where DB 7 must be converted to another wavelength in order to resolve contention.
The major observations provided by this example are as follows. Similarly to using BORA,
the burst traffic is smoothed at the ingress nodes, reducing contention at the core nodes
from an excessive number of data bursts directed to the same output fibre link. Moreover,
since the burst traffic of routing paths π1, π2, and π3 is mostly carried in different
wavelengths, contention for the same wavelength channel is also reduced. As a result, the
pairs of bursts serialized at the ingress nodes, DB 1 and DB 2 in routing path π1 and DB 4
and DB5 in routing path π2, can be kept in the same wavelength channel until they reach
node v6, mitigating the fragmentation of the capacity of wavelengths λ1 and λ3 in the fibre
links traversed by routing paths π1 and π2. Since this is accomplished through minimizing
the probability of wavelength contention, it can also relax the wavelength conversion
capabilities of the core nodes without significantly degrading network performance.
The TE-DBS strategy requires the computation of one wavelength search ordering, {λ1(πi),
λ2(πi), …, λW(πi)}, for each routing path πi. The HMPI algorithm is used to optimize offline
the wavelength search orderings. These orderings are stored at the ingress nodes and the
control unit of these nodes uses them for serializing data bursts on the available wavelength
channel ranked with the highest priority on the routing path the bursts will follow.
core nodes and the resource reservation is made using the JET protocol. It is also assumed
that all the wavelength channels in a fibre link have a capacity μ = 10 Gb/s, the time
required to configure an optical space switch matrix is tg = 1.6 μs, each node can process the
BHP of a data burst in tp = 1 μs and the offset time between BHP and data burst is given by
tg + hi·tp, where hi is the number of hops of burst path πi ∈ Π. The switch matrix of each node
is assumed to be strictly non-blocking. Unless stated otherwise, the simulation results were
obtained assuming W = 32 wavelength channels per fibre link.
The traffic pattern used in the simulations is uniform, in the sense that a burst generated at
an ingress node is randomly destined to one of the remaining nodes. Bursts are always
routed via the shortest path. Both the data burst size and the burst interarrival time are
negative-exponentially distributed. An average burst size of 100 kB is used, which results in
an average burst duration of 80 μs. In the network simulations, increasing the average
offered traffic load is obtained through reducing the average burst interarrival time. The
average offered traffic load normalized to the network capacity is given by,
π ∈Π γ i ⋅ hiSP
Γ= i
, (12)
L⋅W ⋅μ
where hiSP is the number of links traversed between the edge nodes of πi ∈ Π.
In OBS networks, the most relevant performance metric is the average burst blocking
probability, which measures the average fraction of burst traffic that is discarded by the
network. The network performance can also be evaluated via the average offered traffic load
that results in an objective average burst blocking probability Bobj. This metric is estimated
by performing simulations with values of Γ spaced by 0.05, determining the load values
between which the value with blocking probability Bobj is located and then using linear
interpolation (with logarithmic scale for the average burst blocking probability). All of the
results presented in this section were obtained through running 10 independent simulations
for calculating the average value of the performance metric of interest, as well as a 95%
confidence interval on this value. However, these confidence intervals were found to be so
narrow that have been omitted from the plots for improving readability.
The majority of OBS proposals assumes the utilization of full-range wavelength converters
deployed in a dedicated configuration, that is, one full-range wavelength converter is used
at each output port of the switch matrix, as illustrated in Fig. 5. Each full-range wavelength
converter must be capable of converting any wavelength at its input to a fixed wavelength
at its output and if a node has M output fibres, its total number of converters is M·W.
Fig. 6 plots the average burst blocking probability as a function of the maximum ingress
burst delay for different values of the offered traffic load and considering both TE-DBS and
the previously described BORA strategy. It also displays the blocking performance that
corresponds to delaying bursts at the ingress nodes whenever a free wavelength channel is
not immediately found. More precisely, the DBS strategy consists of delaying a data burst at
its ingress node by the minimum amount of time, upper-bounded to the maximum ingress
burst delay, such that one wavelength becomes available in the output fibre link.
294 Telecommunications Networks – Current Status and Future Trends
Fig. 5. OBS core node architecture with dedicated full-range wavelength converters.
10 0
1.0E+0
DBS
BORA
Γ = 0.80 TE-DBS
Average burst blocking probability
1.0E-1
10 -1
Γ = 0.70
10 -2
1.0E-2
Γ = 0.60
10 -3
1.0E-3
10 -4
1.0E-4
10 -5
1.0E-5
0 40 80 120 160 200 240 280 320 360 400
Maximum ingress burst delay [μs]
Fig. 6. Network performance with dedicated full-range wavelength converters for different
values of the average offered traffic (Pedro et al., 2009a).
The curves for DBS show that exploiting the electronic buffers at the ingress nodes only for
contention resolution does not improve blocking performance. On the contrary, with both
BORA and TE-DBS the average burst blocking probability is decreased as the maximum
ingress burst delay is increased, confirming that these strategies proactively reduce the
probability of contention by selectively delaying bursts at their ingress nodes.
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 295
The results also indicate TE-DBS is substantially more efficient than BORA in exploiting
larger maximum ingress burst delays to reduce the burst blocking probability. The proposed
strategy outperforms BORA for the same maximum ingress burst delay or, alternatively,
requires a smaller maximum ingress burst delay to attain the same blocking performance of
BORA. Particularly, the decrease rate of the burst losses with increasing the maximum
ingress burst delay is considerably larger with TE-DBS than that with BORA. In addition,
with TE-DBS the slope of the curves of the burst blocking probability is much steeper for
smaller values of the average offered traffic load, a trend less pronounced with BORA.
Table 3 presents the average traffic load that can be offered to the network as to support an
objective average burst blocking probability, Bobj, of 10-3 and 10-4. The results include two
RAM
values of the maximum ingress burst delay for BORA and TE-DBS, Δtmax = 200 μs and
RAM RAM
Δtmax = 400 μs, and the case of immediate burst scheduling at the ingress nodes, Δtmax = 0.
RAM RAM
RAM
Δtmax =0 Δtmax = 200 μs Δtmax = 400 μs
Bobj
BORA TE-DBS BORA TE-DBS
10-3 0.522 0.654 0.723 0.689 0.782
10-4 0.453 0.584 0.659 0.632 0.729
Table 3. Average offered traffic load for an objective average burst blocking probability of
10-3 and 10-4 (Pedro et al., 2009a).
The OBS network supports more offered traffic load for the same average burst blocking
probability when using the TE-DBS and BORA strategies instead of employing immediate
burst scheduling. In addition, the former strategy provides the largest improvements in
supported offered traffic load. For instance, with Bobj = 10-3, the network supports 32% more
offered traffic load when using BORA with a maximum ingress burst delay of 400 μs instead
of immediate burst scheduling, whereas when using the TE-DBS strategy the performance
improvement is more expressive, enabling an increase of 50% in offered traffic load.
In order to provide evidence of the principles underlying contention minimization with
BORA and TE-DBS, the first set of results differentiates the burst blocking probability at the
ingress nodes (ingress bursts) and at the core nodes (transit bursts). Fig. 7 plots the average
burst blocking probability, discriminated in terms of ingress bursts and transit bursts, as a
function of the maximum ingress burst delay for Γ = 0.70.
The plot shows that without additional delays at the ingress nodes, the blocking probability
of ingress bursts and of transit bursts are of the same order of magnitude. However, as the
maximum ingress burst delay is increased, the blocking probability of ingress bursts is
rapidly reduced, as a result of the enhanced ability of ingress nodes to buffer bursts during
longer periods of time. This holds for the three channel scheduling algorithms. Therefore,
the average burst blocking probability of transit bursts becomes the dominant source of
blocking. Notably, using DBS does not reduce burst losses at the core nodes, rendering this
strategy useless, whereas BORA and TE-DBS strategies exploit the selective ingress delay to
reduce blocking of transit bursts. Moreover, TE-DBS is increasingly more effective than
BORA in reducing these losses, which supports its superior performance displayed in Fig. 6.
296 Telecommunications Networks – Current Status and Future Trends
10 0
1.0E+0
DBS
BORA
Average burst blocking probability TE-DBS
1.0E-1
10 -1
Transit Bursts
1.0E-2
10 -2
1.0E-3
10 -3
1.0E-4
10 -4 Ingress Bursts
10 -5
1.0E-5
0 40 80 120 160 200 240 280 320 360 400
Maximum burst ingress delay [μs]
Fig. 7. Average burst blocking probability of ingress and transit bursts (Pedro et al., 2009a).
The major dissimilarity between the TE-DBS and BORA strategies is the order by which free
wavelength channels are searched to schedule the data bursts assembled at the ingress
nodes. Particularly, the TE-DBS strategy exploits the selective delaying of data bursts at the
electronic buffers of these nodes not only to smooth the burst traffic entering the core
network, similarly to BORA, but also to proactively reduce the unusable voids formed
between consecutive data bursts scheduled in the same wavelength channel. As described in
Section 3, complying with the latter objective demands enforcing that the serialized data
bursts are kept in the same wavelength for as long as possible along their routing path,
which means that contention for the same wavelength among bursts on overlapping paths
must be minimized. Intuitively, the success of keeping the serialized data bursts in the same
wavelength channel for as long as possible should be visible in the form of a reduced
number of bursts experiencing wavelength conversion at the core nodes. In order to observe
this effect, Fig. 8 presents the average wavelength conversion probability, defined as the
fraction of transit data bursts that undergo wavelength conversion, as a function of the
maximum ingress burst delay for different values of the average offered traffic load.
The curves for TE-DBS exhibit a declining trend as the maximum ingress burst delay
increases, with this behaviour being more pronounced for smaller average offered traffic
load values. These observations confirm that the probability of the data bursts serialized at
the ingress nodes being kept in the same wavelength channel, as they go through the core
nodes, is higher for larger values of the maximum ingress burst delay and smaller values of
offered traffic load. Conversely, with BORA the wavelength conversion probability remains
insensitive to variations in both the maximum ingress burst delay and offered traffic load,
corroborating the fact that it cannot reduce the utilization of wavelength conversion at the
core nodes. The reduced wavelength contention characteristic of the TE-DBS strategy, which
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 297
10 0
1.0E+0
Average wavelength conversion probability
Γ = 0.80
1.0E-1
10 -1
Γ = 0.70
Γ = 0.60
10 -2
1.0E-2
BORA
TE-DBS
1.0E-3 10 -3
0 40 80 120 160 200 240 280 320 360 400
Maximum ingress burst delay [μs]
Fig. 9 shows the blocking performance as a function of the maximum ingress burst delay for
different numbers of wavelength channels and Γ = 0.80. The results indicate that the slope of
the average burst blocking probability curves for TE-DBS increases with the number of
wavelength channels, augmenting the performance gain of using this strategy instead of
BORA. This behaviour is due to the fact that when the number of wavelength channels per
fibre link increases the effectiveness of the HMPI algorithm in determining appropriate
wavelength search orderings improves, enhancing the isolation degree of serialized burst
traffic from overlapping routing paths on different wavelength channels.
In principle, only a fraction of transit bursts experience wavelength contention,
demanding the use of a wavelength converter. Consequently, the deployment of a smaller
number of converters, in a shared configuration, has been proposed in the literature.
Converter sharing at the core nodes can be implemented on a per-link or per-node basis,
depending on whether each converter can only be used by bursts directed to a specific
output link or can be used by bursts directed to any output link of the node (Chai et al.,
2002). The latter sharing strategy enables to deploy a smaller number of converters. Fig. 10
exemplifies the architecture of a core node with C full-range wavelength converters
shared per-node, where C ≤ M·W. In this core node architecture, each wavelength
converter must be capable of converting any wavelength channel at its input to any
wavelength channel at its output and the switch matrix has to be augmented with C input
ports and C output ports.
298 Telecommunications Networks – Current Status and Future Trends
10 0
1.0E+0
BORA
TE-DBS
Average burst blocking probability
1.0E-1
10 -1
W = 32
10 -2
1.0E-2
W = 64
10 -3
1.0E-3
W = 128
10 -4
1.0E-4
10 -5
1.0E-5
0 40 80 120 160 200 240 280 320 360 400
Maximum ingress burst delay [μs]
Fig. 9. Network performance for different numbers of wavelength channels (Pedro et al.,
2009b).
Fig. 10. OBS core node architecture with shared full-range wavelength converters.
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 299
In order to illustrate the added-value of the TE-DBS strategy in OBS networks whose core
nodes have shared full-range wavelength converters, consider the 10-node ring network
with W = 32. When using wavelength converters in a dedicated configuration, each node of
this network needs M·W = 64 converters. Fig. 11 plots the average burst blocking probability
as a function of the number of shared full-range wavelength converters at the nodes, C, for
different values of the average offered traffic load and using BORA and TE-DBS strategies
RAM
with Δtmax = 160 μs.
10 0
1.0E+0
BORA
TE-DBS
Average burst blocking probability
1.0E-1
10 -1
Γ = 0.80
1.0E-2
10 -2
Γ = 0.70
1.0E-3
10 -3
1.0E-4
10 -4 Γ = 0.60
10 -5
1.0E-5
2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42
Number of shared wavelength converters per node
Fig. 11. Network performance with shared full-range wavelength converters for different
values of the average offered traffic load (Pedro et al., 2009a).
The blocking performance curves clearly show that the OBS network using TE-DBS can
benefit not only in terms of enhanced blocking performance, but also from enabling using
simplified core node architectures. More precisely, the burst loss curves indicate that for
very small numbers of shared wavelength converters, the utilization of TE-DBS results in a
burst blocking probability that can be multiple orders of magnitude lower than that
obtained using BORA. Furthermore, using TE-DBS demands a much smaller number of
shared wavelength converters to match the blocking performance of a network using core
300 Telecommunications Networks – Current Status and Future Trends
nodes with dedicated wavelength converters. Particularly, with TE-DBS around 16 shared
converters per node are enough to match the loss performance obtained with 64 dedicated
converters, whereas with BORA this number more than doubles, since around 36 shared
converters are required. The larger savings in the number of wavelength converters enabled
by TE-DBS also mean that the expansion of the switch matrix to accommodate the shared
converters is smaller, leading to an even more cost-effective network solution.
5. Conclusions
Optical burst switching is seen as a candidate technology for next-generation transport
networks. This chapter has described and analyzed the performance benefits of a strategy to
enforce traffic engineering in the wavelength domain in OBS networks. The TE-DBS strategy
is based on using the HMPI algorithm to optimize offline the order by which wavelength
channels are searched for each routing path and employing at the ingress nodes a selective
delaying of data bursts as a way to maximize the amount of burst traffic sent via the
wavelength channels ranked with highest priority. Both the HMPI offline algorithm and the
online selective delaying of bursts were revisited and exemplified.
A network simulation study has highlighted the performance improvements attained by
using TE-DBS in an OBS network with dedicated full-range wavelength converters and
with shared full-range wavelength converters. It was shown that the utilization of the TE-
DBS strategy enables to reduce the average burst blocking probability for a given average
offered traffic load, or augment the average offered traffic load for an objective burst
blocking probability, when compared to utilizing a known contention minimization
strategy. The simulation results shown that increasing the maximum delay a burst can
experience at the ingress node and augmenting the number of wavelength channels per
link can improve the effectiveness of the TE-DBS strategy and also provided evidence of
the burst serialization and traffic isolation in different wavelengths inherent to this
strategy. Finally, the analysis confirms that the utilization of TE-DBS in OBS networks
with shared full-range wavelength converters can provide noticeable savings in the
number of expensive all-optical wavelength converters and a smaller increase in the size
of the switch matrix of the core nodes.
6. References
Barakat, N. & Darcie, T. (2007). The Control-Plane Stability Constraint in Optical Burst
Switching Networks. IEEE Communications Letters, Vol. 11, No. 3, (March 2007), pp.
267-269, ISSN 1089-7798
Chai, T.; Cheng, T. ; Shen, G.; Bose, S. & Lu, C. (2002). Design and Performance of Optical
Cross-Connect Architectures with Converter Sharing. Optical Networks Magazine,
Vol. 3, No. 4, (July/August 2002), pp. 73-84, ISSN 1572-8161
Chang, G.; Yu, J. ; Yeo, Y.; Chowdhury, A. & Jia, Z. (2006). Enabling Technologies for Next-
Generation Packet-Switching Networks. Proceedings of the IEEE, Vol. 94, No. 5, (May
2006), pp. 892-910, ISSN 0018-9219
Chen, Y.; Qiao, C. & Yu, X. (2004). Optical Burst Switching: A New Area in Optical
Networking Research. IEEE Network, Vol. 18, No. 3, (May/June 2004), pp. 16-23,
ISSN 0890-8044
Optical Burst-Switched Networks Exploiting Traffic Engineering in the Wavelength Domain 301
IETF (2002). RFC 3945: Generalized Multi-Protocol Label Switching (GMPLS) Architecture,
Internet Engineering Task Force, September 2002
ITU-T (2006). Recommendation G.8080: Architecture for the Automatically Switched Optical
Network (ASON), International Telecommunication Union – Telecommunication
Standardization Sector, June 2006
Korotky, S. (2004). Network Global Expectation Model: A Statistical Formalism for Quickly
Quantifying Network Needs and Costs. IEEE/OSA Journal of Lightwave Technology,
Vol. 22, No. 3, (March 2004), pp. 703-722, ISSN 0733-8724
Li, J. & Qiao, C. (2004). Schedule Burst Proactively for Optical Burst Switched Networks.
Computer Networks, Vol. 44, (2004), pp. 617-629, ISSN 1389-1286
Papadimitriou, G.; Papazoglou, C. & Pomportsis, A. (2003). Optical Switching: Switch
Fabrics, Techniques, and Architectures. IEEE/OSA Journal of Lightwave Technology,
Vol. 21, No. 2, (February 2003), pp. 384-405, ISSN 0733-8724
Pedro, J.; Castro, J.; Monteiro, P. & Pires, J. (2006a). On the Modelling and Performance
Evaluation of Optical Burst-Switched Networks, Proceedings of IEEE CAMAD 2006
11th International Workshop on Computer-Aided Modeling, Analysis and Design of
Communication Links and Networks, pp. 30-37, ISBN 0-7803-9536-0, Trento, Italy, June
8-9, 2006
Pedro, J.; Monteiro, P. & Pires, J. (2006b). Wavelength Contention Minimization Strategies
for Optical-Burst Switched Networks, Proceedings of IEEE GLOBECOM 2006 49th
Global Telecommunications Conference, paper OPNp1-5, ISBN 1-4244-0356-1, San
Francisco, USA, November 27-December 1, 2006
Pedro, J.; Monteiro, P. & Pires, J. (2009a). On the Benefits of Selectively Delaying Bursts at
the Ingress Edge Nodes of an OBS Network, Proceedings of IFIP ONDM 2009 13th
Conference on Optical Network Design and Modelling, ISBN 978-1-4244-4187-7,
Braunschweig, Germany, February 18-20, 2009
Pedro, J.; Monteiro, P. & Pires, J. (2009b). Contention Minimization in Optical Burst-
Switched Networks Combining Traffic Engineering in the Wavelength Domain and
Delayed Ingress Burst Scheduling. IET Communications, Vol. 3, No. 3, (March 2009),
pp. 372-380, ISSN 1751-8628
Pedro, J.; Monteiro, P. & Pires, J. (2009c). Traffic Engineering in the Wavelength Domain for
Optical Burst-Switched Networks. IEEE/OSA Journal of Lightwave Technology, Vol.
27, No. 15, (August 2009), pp. 3075-3091, ISSN 0733-8724
Poustie, A. (2005). Semiconductor Devices for All-Optical Signal Processing, Proceedings of
ECOC 2005 31st European Conference on Optical Communication, Vol. 3, pp. 475-478,
ISBN 0-86341-543-1, Glasgow, Scotland, September 25-29, 2005
Qiao, C. & Yoo, M. (1999). Optical Burst Switching (OBS) – A New Paradigm for an Optical
Internet. Journal of High Speed Networks, Vol. 8, No. 1, (January 1999), pp. 69-84,
ISSN 0926-6801
Sahara, A.; Shimano, K.; Noguchi, K.; Koga, M. & Takigawa, Y. (2003). Demonstration of
Optical Burst Data Switching using Photonic MPLS Routers operated by GMPLS
Signalling, Proceedings of OFC 2003 Optical Fiber Communications Conference, Vol. 1,
pp. 220-222, ISBN 1-55752-746-6, Atlanta, USA, March 23-28, 2003
Sun, Y.; Hashiguchi, T. ; Minh, V.; Wang, X.; Morikawa, H. & Aoyama, T. (2005). Design and
Implementation of an Optical Burst-Switched Network Testbed. IEEE
302 Telecommunications Networks – Current Status and Future Trends
Communications Magazine, Vol. 43, No. 11, (November 2005), pp. s48-s55, ISSN 0163-
6804
Teng, J. & Rouskas, G. (2005). Wavelength Selection in OBS Networks using Traffic
Engineering and Priority-Based Concepts. IEEE Journal on Selected Areas in
Communications, Vol. 23, No. 8, (August 2005), pp. 1658-1669, ISSN 0733-8716
Tucker, R. (2006). The Role of Optics and Electronics in High-Capacity Routers. IEEE/OSA
Journal of Lightwave Technology, Vol. 24, No. 12, (December 2006), pp. 4655-4673,
ISSN 0733-8724
Wang, X.; Morikawa, H. & Aoyama, T. (2003). Priority-Based Wavelength Assignment
Algorithm for Burst Switched WDM Optical Networks. IEICE Transactions on
Communications, Vol. E86-B, No. 5, (2003), pp. 1508-1514, ISSN 1745-1345
Xiong, Y.; Vandenhoute, M. & Cankaya, H. (2000). Control Architecture in Optical Burst-
Switched WDM Networks. IEEE Journal on Selected Areas in Communications, Vol. 18,
No. 10, (October 2000), pp. 1838-1851, ISSN 0733-8716
Zang, H.; Jue, J. ; Sahasrabuddhe, L.; Ramamurthy, R. & Mukherjee, B. (2001). Dynamic
Lightpath Establishment in Wavelength-Routed WDM Networks. IEEE
Communications Magazine, Vol. 39, No. 9, (September 2001), pp. 100-108, ISSN 0163-
6804
Zhou, P. & Yang, O. (2003). How Practical is Optical Packet Switching in Core Networks?,
Proceedings of IEEE GLOBECOM 2003 49th Global Telecommunications Conference, pp.
2709-2713, ISBN 0-7803-7974-8, San Francisco, USA, December 1-5, 2003
Zhu, K.; Zhu, H. & Mukherjee, B. (2005). Traffic Grooming in Optical WDM Mesh Networks,
Springer, ISBN 978-0-387-25432-6, New York, USA
13
1. Introduction
The need to monitor and analyse data traffic grows with increasing network usage by
businesses and domestic users. Disciplines such as security, quality of service analysis,
network management, billing and even routing require traffic monitoring and analysis
systems with high performance. Thus, the increasing bandwidth in data networks and the
amount and variety of network traffic have increased the functional requirements for
applications that capture, process or store monitored traffic. Besides, the availability of
capture hardware (monitoring cards, taps, etc.) and mass storage solutions at a reasonable
cost makes the situation better in the field of network traffic monitoring. For these reasons,
several research groups are studying how to monitor heterogeneous network environments,
such as wired broadband backbone networks, next generation cellular networks, high-speed
access networks or WLAN in campus-like environments. In keeping with this line, our
research group NQaS (Networking, Quality and Security) aims to contribute in this
challenge and presents theoretical and experimental research to study the behaviour of a
probe (Ksensor) that can perform traffic capturing and analysis tasks in Gigabit Ethernet
networks. Not only do we intend to progress in the design of traffic analysis systems, but we
also want to obtain mathematical models to study the performance of these devices.
The widespread of 1/10 Gigabit Ethernet networks, emphasizes the problems related to
system losses which invalidate the results for certain analyses. New Gigabit networks, even
at 40 and 100 Gbps, are already being implemented and the problem becomes accentuated.
On top of that, commodity systems are not optimized for monitoring [Wang&Liu, 2004]
and, as a result, processing resources are often wasted on inefficient tasks. Because of this,
new research works have arisen focusing on the development of analysis systems that are
able to process all the information carried by actual networks.
Taking all this into account, we would like to develop analytical models that represent
traffic monitoring systems in order to provide solutions to the problems mentioned before.
Modelling helps to predict the system's performance when it is subjected to a variety of
network traffic load conditions. Designers and administrators can identify bottlenecks,
deficiencies and key system parameters that impact its performance, and thereby the system
can be properly tuned to give the optimal performance. By means of modelling technique, it
304 Telecommunications Networks – Current Status and Future Trends
is possible to draw qualitative and, in many cases, also quantitative conclusions about
features related to modelled systems even without having to develop them. The impact of
developing costs, which is a determining factor in some cases, can be dramatically reduced
by using modelling.
Having this in mind, and considering the experience of our group, we present our original
design (Ksensor) that improves system performance, as well as a mathematical model based
on a closed queueing network which represents the behaviour of a multiprocessor traffic
monitoring and analysis system. Both things are considered together in the validation of the
model, where Ksensor is used as well as a testing platform developed by NQaS. All these
aspects are presented throughout this chapter.
A number of papers has addressed the issue of modelling traffic monitoring systems.
However, there are more related to the hardware and software involved in this type of
systems.
Regarding hardware proposals, one of the most relevant was the development of the high-
performance DAG capture cards [Cleary et al., 2000] at the University of Waikato (New
Zealand). Several research works and projects have made use of these cards for traffic
analysis system design. Some other works proposed the use of Network Processors (NP)
[Intel, 2002]. Conventional hardware also showed bottlenecks and new input/output
architectures were proposed, such as Intel’s CSA (Communication Streaming Architecture).
At the software level, Mogul and Ramakrishnan [Mogul&Ramakrishnan, 1996] identified
the most important performance issues on interrupt-driven capture systems. Zero-copy
architectures are also remarkable [Zhu et al, 2006]. They try to omit the path followed by
packets through the system kernel to the user-level applications, providing a direct access to
captured data or mapping memory spaces (mmap). Biswas and Sinha proposed a DMA ring
architecture [Biswas&Sinha, 2006] shared by user and kernel levels. Luca Deri suggests a
passive traffic monitoring system over general purpose hardware at Gbps speeds (nProbe).
Deri has also suggested improvements for the capture subsystem of GNU/Linux, such as a
driver-level ring [Deri, 2004], and a user-level library, nCap [Deri, 2005a]. Recently, Deri has
proposed a method for speeding up network analysis applications running on Virtual
Machines [Cardigliano, 2011], and has presented a framework [Fusco&Deri, 2011] that can
be exploited to design and implement this kind of applications.
Other proposals focus on parallel systems. Varenni et al. described the logic architecture of a
multiprocessor monitoring system based on a circular capture buffer [Varenni et al.,2003]
and designed an SMP driver for DAG cards. We must also remark the KNET module
[Lemoine et al., 2003], a packet classifying system at the NIC to provide independent per
connection queues for processors. In addition, Schneider and Wallerich studied the
performance challenges over general purpose architectures and described a methodology
[Schneider, 2007] for evaluating and selecting the ideal hardware/software in order to
monitor high-speed networks.
Apart from the different proposals about architectures for capture and analysis systems,
there are analytical studies which aim at the performance evaluation of these computer
systems. Among them, we want to underline the works done by the group led by Salah
Modelling a Network Traffic Probe Over a Multiprocessor Architecture 305
[Salah, 2006][Salah et al., 2007]. They analyse the performance of the capturing system
considering CPU consumptions in a model based on queuing theory. Their last
contributions explain the evolution of their models towards applications like Snort or PC
software routers. Another work in the same line was developed by Wu [Wu et al., 2007],
where a mathematical model based on the ‘token bucket’ algorithm characterized Linux
packet reception process.
We also have identified more complex models whose application to traffic capturing and
analysis systems can be very beneficial. They are models based on queuing systems with
vacations. In this field, we want to underline the contributions from Lee [Lee, 1989], Takagi
[Takagi, 1994, 1995] and Fiems [Fiems, 2004].
Most of the previous approaches are for single processor architectures. However, it is clear
interest in the construction of analytical models for multiprocessor architectures, in order to
evaluate their performance. This paper contributes in this sense from a different point of
view, given that the model is based on a closed queueing network. Furthermore, the
analytical model and the techniques presented in this paper can be considerably useful not
only to model traffic monitoring systems, but also to characterize similarly-behaving
queueing systems, particularly those of multiple-stage service. These systems may include
intrusion detection systems, network firewalls, routers, etc.
The rest of the chapter is organized as follows: in Section 2 we introduce the framework of
our traffic and analysis system called ‘Ksensor’. Section 3 presents the analytical model for
evaluating the performance of the traffic monitoring system. Section 4 provides details on
the analytical solution of the model. Section 5 deals with the validation and obtained results
are discussed. Finally, Section 6 remarks the conclusions and future work.
Fig. 1 shows the architecture of Ksensor. As we can see, only the system configuration
(parser) and the result management (Offline Processing Module, OPM) modules are at user-
level. Communication between user and Kernel spaces is offered by a module called driver.
The figure also shows a module called memory map. This module is shared memory where
the analysis logic and some variables are stored.
The definition of execution threads is aimed to take advantage of multiprocessor
architectures at kernel-level and solve priority problems, minimizing context and CPU
switching. Kernel threads are scheduled at the same level than other processes, so the
Kernel’s scheduler is responsible for this task.
Ksensor executes two tasks. On one hand, it has to capture network traffic. On the other
hand, it has to analyse those captured packets. In order to do that, we define independent
instances for capture and analysis phases. Each thread belongs to an execution instance of
the system and is always linked with the same processor. All threads share information
through the Kernel memory.
In Fig. 2 we can see the multithreaded execution instances in Ksensor. There are as many
analysing instances as processors (ksensord#n) and as many capturing instances as
capturing NICs (ksoftirqd#n). For example, if the system has two processors, one of them is
responsible for capturing packets and analysing some of them and the other one is
responsible for analysing packets. This way an analysis task could fill the 100% of one
processor’s resources if necessary.
The capturing instance takes the packets that the networking subsystem captures and stores
them in the packet queue. There is only one packet queue. Processing instances take packets
from that queue in order to analyse them.
Modelling a Network Traffic Probe Over a Multiprocessor Architecture 307
It does not matter what processing thread analyses a packet because all of them use the
same analysis logic. As we said before, there is a shared memory (memory map module)
that stores the analysis logic. All the processing threads can access this memory.
μAk μAu
p p
μAk μAu
μkk μTk μTu qa γ
p p p
μkk μTk μTu
W=N
TRAFFIC
INJECTIÓN
Some stages are divided into multiple queues, due to the need to differentiate the processing
done in the Kernel and the processing done at user level. Although the process code is
usually running on the user level, system calls that require Kernel services are also used.
Four different stages have been distinguished for the closed network, each one with a
specific function:
• System stage (system queue): it consists in a queue of μkk (measured in packets per
second) capacity. This stage represents the time spent on the Kernel level of the
operating system by the traffic analysis system. It comprises treatments of device
controllers and attention paid by kernel to interruptions (hardIRQ and softIRQ) due to
packet arrival.
• Basic treatment stage (treatment queues): it is modelled by two queues with μTk and μTu
capacities. This stage represents the amount of time consumed by the system to perform
basic treatment to packets captured from the net. This is mainly accomplished by
studying control headers of the packets and by determining through a decision tree
whether a packet need to be further analysed or not.
310 Telecommunications Networks – Current Status and Future Trends
• Analysis stage (analysis queues): it is integrated by two queues with μAk and μAu. This
stage simulates the analysis treatment that the system does to packets that need further
analysis. Not all the packets need to be analysed in this stage. For this reason, a rate
called qa has been defined to represent the proportion of received packet that has to be
analysed.
• Traffic injection stage (injection queue): it is a simple queue of λ capacity. This stage
simulates the arrival of packets to the system with a λ rate. Since the number of packets
in the closed network is fixed to N, the traffic injection queue can be empty. This
situation simulates the blocking and new packets will not be introduced on the system.
Each service queue has p servers that represent the p processors of a multiprocessor system.
Multiple server representation has been chosen to emphasize the possibility of parallelizing
every stage of processing. However, all stages may not be necessarily parallelizable. For
example, only one processor can access NIC at the same time, so the packet capturing
process will not be parallelizable in different instances.
Another aspect to consider is that packets cannot flow freely in the closed network, because
the sum of packets attended in the servers that represent the traffic monitoring system never
exceeds the maximum number of processors available. Therefore, we have to assure that, at
any time, the maximum number of packets in the upper queues of Fig 3 is not greater than p
(the number of processors).
Considering an arrival rate of λ packets per second, the traffic analysis system will be able to
keep pace with a part of that traffic, defined as q⋅λ. Remaining traffic ((1-q)⋅λ) will be lost
because the platform is not capable of dealing with all the packets. Captured traffic, q⋅λ,
goes through the system and basic treatment stages. Nevertheless, all traffic will not be
subject of further analysis because of features of the modelled system. For example, a system
in charge of calculating QoS parameters of all connections that arrive to a server will discard
the packets with other destination address or monitoring systems which use sampling
techniques will discard a percentage of packets or intrusion detection will apply further
detection techniques only to suspicious packets. Therefore, qa coefficient has been defined to
represent the rate of captured packets liable of being further analysed (analysis stage) than
treated only (treatment stage). Thus, qa⋅q⋅λ of the initial flow will go through the analysis
stage.
γ
μU
μK p
μU
W=N
1 1 1 q 1 1
= + = a + + (1)
μK μpk μKk μAk μTk μKk
1 1 q 1
= = a + (2)
μU μ pu μAu μ Tu
μ μeq(n)
p
μ
W=N
In order to get the total throughput of the system, first, we calculate the state probabilities
for the network, putting N packets in circulation through the closed network, but assuming
that the upper multiple queue can have at most p packets being served and the rest waiting
in the queue. We also assume that the service capacity in every state of the multiple queue is
not proportional to the number of packets. Thus, we will consider μi as the service capacity
for the state i. The state diagram for this topology is presented in Fig. 7. In this model we are
representing the state i of the multiple queue. N packets are flowing through the closed
network and we refer to the state i when there are i packets in the multiple queue and the
rest, N-i, in the simple queue. The probability of that state is represented as pi. Finally, the
simple queue with rate λ is the packet injection queue.
Modelling a Network Traffic Probe Over a Multiprocessor Architecture 313
λ λ λ λ λ λ λ λ
0 1 p-1 p p+1 N-1 N
… …
μ1 μ2 μp-1 μp μp μp μp μp
It is possible to deduce the balance equations from the diagram of states and,
subsequently, the expression of the probability of any state i as a function of the
probability of zero state p0:
p0 ⋅ λ = p1 ⋅ μ 1
p ⋅ λ = p ⋅ μ
1 2 2 λ
∀i = 1, ,p p i = ⋅ pi − 1 (3)
μ i
p p − 1 ⋅ λ = p p ⋅ μ p
i terms
λ λ λ λi
pi = ⋅ ⋅ p0 = i ⋅ p0 (4)
μi μi − 1 μ1
∏μj
j=1
λp
pp = p
⋅ p0 (5)
∏μj
j=1
For the states with i>p, their probabilities can be expressed as:
pp ⋅ λ = pp + 1 ⋅ μ p
p p + 1 ⋅ λ = p p + 2 ⋅ μ p λ
∀i = p + 1, ,N p i = pi − 1 ⋅ (6)
μp
p ⋅ λ = p ⋅ μ
N −1 N p
(i-p) terms
i −p
λ λ λ λ
pi = ⋅ ⋅ pp = ⋅ pP (7)
μp μp μp μp
From this equation we can also derive the expression of the probability pN, which is
interesting because it indicates the probability of having all the packets in the multiple
queue and there is none in the simple queue. This probability defines the blocking
probability (PB) of the simple queue.
314 Telecommunications Networks – Current Status and Future Trends
λN
pN = PB = p
⋅ p0 (8)
μN
p
−p
⋅ ∏μj
j=1
Applying the normalization condition (the sum of all probabilities must be equal to 1), we
can obtain the general expression for p0 and, then, we get every state probabilities.
N p N
pi = 1 = p 0 + p i + pi (9)
i =0 i =1 i =p+1
p
λi λp N
λi −p
1 = p0 + p0 i
+ p0 p
⋅ i −p
(10)
∏ μj i = p + 1 μp
i =1
∏ μj
j=1 j=1
−1
p i p N i −p
λ λ λ
p0 = 1 + i + p ⋅ i −p (11)
i =1 ∏ μ μ
j ∏ μ j i =p+1 p
j=1 j=1
Considering equations (8) and (11), we have the following blocking probability pN.
λN
−p
μN
p
pN = (12)
p p p N i −p
∏ μ j + λi ⋅ ∏ μ j + λp ⋅ λ
j=1
i =1
i −p
i =p + 1 μp
j=i
PN is the probability of having N packets in the multiple queue (traffic analysis system
queue) of Fig. 6 , so there is not any packet in the injection queue. This situation describes
the loss of the system. In order to calculate the throughput γ of the system, (13) is used.
γ = λ ⋅ ( 1 − PN ) (13)
Taking into account these expressions, which are valid for the general case, we can develop
the equations of the model for some particular cases that will be detailed below: the
calculation of the equivalence for the traffic monitoring system and the solution for the
closed network with incoming traffic load.
Norton equivalence for a traffic monitoring system, one must begin with a model that
contains a simple queue and a multi-server queue. This is a particular case of the general
model studied before.
µU
N≤p
µK
The simple queue with service rate μK models non-parallelizable Kernel services, whereas
the multiple queue with p servers and service rate μU models the system capacity to
parallelize certain services. The particularity of this model with regard to the general model
is that, at most, only p packets can circulate on the closed network maximum. We are
interested in solving this model to work out the equivalent service rate of the traffic
monitoring system for every state in the network.
µK µK
µK
N
0 1 2 …
µU 2µU NµU
The state diagram makes sense for values of N that are less or equal to the highest number
of processors. The service rate of the traffic monitoring system will be different for every
value of N and, given that some services are not parallelizable, in general, it does not follow
a linear evolution. Following a similar approach to the general case, we can calculate the
probability of the highest state, pN, which is useful to estimate the effective service rate of
the equivalence.
p0 ⋅ μK = p1 ⋅ μU
p1 ⋅ μ K = p 2 ⋅ 2μ U μK
pi = ⋅ pi − 1 (14)
i ⋅ μU
pi − 1 ⋅ μ K = pi ⋅ i ⋅ μ U
μK μK2 μi
pi = ⋅ pi − 1 = 2 ⋅ pi − 2 = = i K ⋅ p0 (15)
i ⋅ μU μU ⋅ i ⋅ ( i − 1) μ U ⋅ i!
316 Telecommunications Networks – Current Status and Future Trends
After considering the normalization condition, we can determine the expression for pN:
N N
μiK N i
ρ
p0 + pi = 1 = p0 + i
⋅ p 0 = p 0 ⋅
1 + (16)
i =1 i = 1 μ U ⋅ i! i = 1 i!
1
p0 = (17)
N i
ρ
1 +
i = 1 i!
μN
K 1 ρN ρN
pN = N
⋅ = = (18)
μU ⋅ N! N
ρ
i N
N!⋅ ρi N
N!⋅ ρi
1 + N!+ i!
i = 1 i! i =1 i! i =0
Thus, taking into account that the throughput of the closed network is the equivalent service
rate, we have the following expression:
ρn μK
μeq (n) = μK ⋅ 1 − n /
ρ= (20)
n!⋅ ρi μU
i!
i =0
Note that this case is really a particular case of the general case where λ= μK and μi=i⋅μU.
4.3 Solution for the closed network model with incoming traffic
The previously explained Norton equivalence takes into consideration the internal problems of
the traffic monitoring system related to the non-parallelizable tasks. Now we will complete the
model adding the traffic injection queue to the equivalent system calculated before.
μeq
μeq(n,qa)
n≤p
p
μeq
N
The entire system under traffic load is modelled as a closed network with an upper multiple
queue, which is the Norton equivalent queue of the traffic analysis system, and a lower
simple queue, simulating the injection of network traffic with rate λ. In this closed network,
Modelling a Network Traffic Probe Over a Multiprocessor Architecture 317
a finite number N of packets circulate. In general, this number N is greater than p, the
number of available processors.
The analytical solution of this model is similar to that proposed for the general model taking
into account that the service rates μ1, μ2..., μp will correspond with the calculation of the
Norton equivalent model μeq(n, qa) with values of n from 1 to p. This model allows us to
calculate the theoretical throughput of the traffic monitoring system for different loads of
network traffic.
γ = λ ⋅ ( 1 − pN ) (21)
The value of N will allow us to estimate the system losses. There will be losses when the N
packets of the closed network are located in the upper queue. At that time, the traffic
injection queue will be empty and, therefore, it will simulate the blocking of the incoming
traffic. That will be less likely, the higher the value of N is.
μeq=μj
μ
μi p
μ
i
j
To begin with, we consider the general model for the closed queue network. We call queue i
to the simple queue of the model. We assume that this simple queue is in state i and its
service rate is μi. Likewise, we call queue j to the multi-server queue which is in state j with a
state dependent equivalent service rate μj. A fixed number of packets (N) are circulating in
the closed network, so that there is a dependence between the state i and j.
i
p(0,0) j
μi
μj p(i,j)
p(0,1) p(1,0)
States without
blocking
μi μi
μj μj
μi μi μi
μj μj μj
Fig. 12. Probability flows between adjacent states with two processors.
Fig.12 shows the dependencies of the probability of a given state with regard to the closer
states in the previous stage with one packet less.
E(n)
E(T) = (23)
γ
This formula is applied to any queue system that is in equilibrium in which there are users
who enter the system, consume time to be attended and then leave. In the formula, γ can be
understood as the throughput of the system, E(T) as the average time spent in the system
and E (n) as the average number of users.
The iterative method applied to the closed queue network is based on solving certain
interesting statistics of the network at every stage, using the data obtained in the previous
stage. You go from one stage with N packets to the next with N+1 packets, adding one
packet to the closed queue network once the system is in stable condition. Knowing the state
probability distribution in stage N, we can calculate the average number of users on each
server.
Modelling a Network Traffic Probe Over a Multiprocessor Architecture 319
N N
E(n i ) = i ⋅ pN (i,N − i) E(n j ) = j ⋅ pN (N − j, j) (24)
i =1 j=1
We can calculate every state probability in the stage N as the ratio of the average stay time
in this state, tN(i,j) and the total time for that stage TTN. The total time TTN can be calculated
as the sum of all the partial times tN(i, j) of each state at that stage.
t N ( i, j )
pN ( i, j ) = (25)
TTOTAL,N
N
TTOTAL,N = t N ( i,N − i ) (26)
i =0
If we consider Reiser’s theorem [Reiser, 1981], it is possible to set a relation between the state
probabilities of a certain state with regard to the ones which are adjacent in the previous
stage. In particular, in equilibrium, when we have N packets, the state probability
distribution is equal to the distribution at the moment of a new packet arrival at the closed
network. In the state diagram of our model, in general, every state depends on two states of
the previous stage. We will have the following probability flows:
Transition (i-1,j) → (i,j) a new packet arrives at queue i
Knowing the iterative relations of the probabilities between different stages and basing on
Little's formula, we can calculate the average stay time tN(i, j) in the system in a given state,
accumulating the average time in queue i, tin(i, j) and the average time in queue j, tjn(i, j).
t N ( i, j ) = t iN ( i, j ) + t N
j
( i, j ) (29)
EiN ( i ) p'N ( i, j ) ⋅ i pN − 1 ( i − 1, j ) ⋅ i
t iN (i, j) = = = (30)
μi ( i ) μi ( i ) μi ( i )
j
tN (i, j) =
j
EN ( j) =
p''N ( i, j ) ⋅ j
=
pN − 1 ( i, j − 1 ) ⋅ j
(31)
μ j ( j) μ j ( j) μ j ( j)
pN − 1 (i − 1, j) ⋅ i pN − 1 (i, j − 1) ⋅ j (32)
t N (i, j) = +
μi ( i ) μ j ( j)
320 Telecommunications Networks – Current Status and Future Trends
Taking into account that, for a given state (i, j), the average stay time of a packet in the queues i
and j is given by ti and tj respectively, we can express the probability of that state as:
i j
τi = τj = (33)
μi ( i ) μ j ( j)
pN − 1 (i − 1, j) ⋅ i pN − 1 (i, j − 1) ⋅ j
t N (i, j) = + (34)
μi ( i ) μ j ( j)
t N (i, j) τ τj
pN (i, j) = = pN − 1 (i − 1, j) ⋅ i + pN − 1 (i, j − 1) ⋅ (35)
TTN TTN TTN
Eq. 35 allows us to calculate a certain state probability of the stage with N packets, having
the probabilities of the adjacent states in the stage N. Using this equation, we can iteratively
calculate the state probability distribution for every stage.
γ = λ ⋅ ( 1 − p ( 0,N ) ) (36)
δ = λ − γ = λ ⋅ p ( 0, N ) (37)
If we look at the evolution of the blocking probability of the injection queue with increasing
number of packets N in the closed network, we can see how that probability stage is
reduced in each stage. The same conclusion can be derived from Eq. 18.
A parameter that can be difficult to assess is N, the number of packets that are circulating in
the closed network. In general, this parameter depends on specific features of the platform,
such as the number of available processors and the ability of the Kernel to accept packets in
transit regardless of whether they have processors available at that time.
One conclusion to be drawn from the model, is that it is possible to estimate the value of the
parameter N by adjusting the losses that the model has with regard to those which actually
occur in a traffic monitoring system.
5. Model validation
This section presents the validation tests to verify the correctness of our analytical model.
The aim is to compare theoretical results with those obtained by direct measurement in a
real traffic monitoring system, in particular, in the Ksensor prototype developed by NQaS
which is integrated into a testing architecture. It is also worth mentioning that, prior to
obtaining the theoretical performance results, it is necessary to introduce some input
parameters for the model. These initial necessary values will also be extracted from
experimental measurements in Ksensor and the testing platform, making use of an
appropriate methodology. With all this, we report experimental and analysis results of the
traffic monitoring system in terms of two key measures, which are the mean throughput
and the CPU utilization. These measures are plotted against incoming packet arrival rate.
Finally, we discuss the results obtained.
Capturing network
Management network
Capturing network Switch management
Management 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 41 43 45 47 Catalyst 2950 SERIES
1
network
SYST RPS
MODE 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48
However, two virtual networks are distinguished: the first one is the capturing network that
connects the elements that play some role during the tests; the second one is the
management network which contains the elements that are responsible for the management
tasks that can be needed before or after doing tests. The use of two separate networks is
necessary, so that the information exchange between the management elements does not
interfere with the test results.
The basic idea is to overwhelm Ksensor (sensor) with high traffic generated from the
injector. Despite the fact that we do not have 10 Gigabit Ethernet hardware for our tests
available, we can achieve our goal of studying the behaviour of the traffic capturing and
analysis software at high rates. In addition, we can compare the results with the analytical
model and also identify the possible bottlenecks of all analysed systems.
Regarding software, we use a testing architecture [Beaumont et al., 2005] designed by NQaS
that allows the automation of tasks like configuration, running and gathering results related
to validation tests. The manager, the injector and the sensor that appear in Fig. 14 are part of
this testing architecture. They have installed the necessary software to perform the functions
of manager, agent, daemon or formatter as we will explain in the next subsection. On the
other hand, the receiver is simply the destination of the traffic entered into the network by
the injector and it does not have any other purpose.
Fig. 15. Logical elements of the testing architecture used in validation tests.
The testing architecture consists of four types of logical elements as Fig. 15 shows. Each of
them implements a perfectly defined function:
• Manager is the interface with the user. This element, in the infrastructure shown in Fig.
14, is located on the machine with the same name. It is in charge of managing the rest of
the logical elements (agents, daemons and formatters) according to the configuration
received from the administrator. After introducing the test setup, it is distributed from
the manager to the other elements and the test is launched when the manager sends the
start command. At the end of every test, the manager receives and stores the results
obtained by the rest of the elements.
Modelling a Network Traffic Probe Over a Multiprocessor Architecture 323
• Agents are responsible for attending manager’s requests and acting on different
devices. Agents are always listening and they have to start and stop the daemons, as
well as to collect the performance results. During a test in the infrastructure, one agent
is executed in the injector and another one, in the sensor.
• Daemons are in charge of acting on the different physical elements which are involved
in each test. Its function can be very variable. For example, the injection of network
traffic according to the desired parameterization, the configuration of the capturing
buffers, the execution of control programs in the sensor, the acquisition of information
or some element’s statics, etc. Depending on the relationship with the agent two
different types of daemons can be distinguished: master and slave. Master daemons
have got some intelligence. The agent will start them but they will indicate when their
work has finished. On the other hand, slave daemons do not determine the end of its
execution. In each test, to do all the tasks, as many daemons as necessary are executed
in the injector and in the sensor.
• Formatters are the programs which select and translate the information stored by the
manager to more appropriate formats for its representation. They are executed in the
machine called manager, at the end of every test.
The values μs and μM, derived from these experimental measurements, will be taken to the
performance evaluation of the model that will be explained later. In addition to the two
parameters mentioned, there is another one which is qa, but it is always qa=1 in our test
configuration.
1800
nanoseconds
1600
1400
null
1200
1K
1000
5K
800 25K
50189,24725
100872,4304
151301,8783
203755,5702
255939,234
311906,2172
356427,0293
415766,813
453553,6402
525111,5932
586586,2453
623232,9908
664779,0579
712258,5792
767004,5743
830489,8918
905881,1018
996378,8711
1106937,965
1245104,324
1487977,796
packets per second
30000
25000
20000
null
15000
10000 1K
5000
5K
0
50189,24725
100872,4304
151301,8783
203755,5702
255939,234
311906,2172
356427,0293
415766,813
453553,6402
525111,5932
586586,2453
623232,9908
664779,0579
712258,5792
767004,5743
830489,8918
905881,1018
996378,8711
1106937,965
1245104,324
1487977,796
25K
Throughput (1K)
500000
packets per second
400000 LAB
300000 N=1
200000 N=2
100000 N=3
0 N=8
50187
1106938
1245104
1487978
100872
151301
203755
255939
311906
356427
415767
453554
525112
586586
623233
664779
712259
767005
830490
905881
996379
N=16
N=40
packets per second
Fig. 19. Theoretical and experimental throughputs with 1Kcycle analysis load.
Throughput (5K)
200000
packets per second
150000 LAB
N=1
100000
N=2
50000
N=3
0 N=8
50187
1106938
1245104
1487978
100872
151301
203755
255939
311906
356427
415767
453554
525112
586586
623233
664779
712259
767005
830490
905881
996379
N=16
N=40
packets per second
Fig. 20. Theoretical and experimental throughputs with 5Kcycle analysis load.
326 Telecommunications Networks – Current Status and Future Trends
Throughput (25k)
packets per second 50000
40000 LAB
30000 N=1
20000 N=2
10000 N=3
0 N=8
1106938
1245104
1487978
50187
100872
151301
203755
255939
311906
356427
415767
453554
525112
586586
623233
664779
712259
767005
830490
905881
996379
N=16
N=40
packets per second
Fig. 21. Theoretical and experimental throughputs with 25Kcycle analysis load.
Fig. 18, Fig. 19, Fig. 20 and Fig. 21 show the comparison between the theoretical model’s
throughput for different values of N and the real probe’s throughput measured
experimentally (marked as LAB in the graph). 64 byte-length packets have been used in the
lab test and its corresponding service rates in the theoretical calculation. The service rates
has been calculated according to the method explained in subsection 5.3.
In all the cases, the throughput grows until a maximum is reached (saturation point). We
also observe in these graphs that, with increasing N, the theoretical throughput is close to
the real one. It shows, therefore, that the analytical model fits the real system.
6. Conclusion
In this chapter we have presented an analytical model that represents a multiprocessor
traffic monitoring system. This model analyses and quantifies the system performance and it
can be useful to improve aspects related to hardware and software design. Even, the model
can be extended to more complex cases which have not been treated in the laboratory.
Thus, the major contribution of this chapter is the development of a theoretical model based
on a closed queuing network that allows to study the behaviour of a multiprocessor
network probe. A series of simplifications and adaptations is proposed for the closed
network, in order to fit it better to the real system. We obtain the model’s analytic solution
and we also propose a recurrent calculation method based on the mean value analysis. The
model has been validated comparing theoretical results with experimental measures. In the
validation process we have made use of a testing architecture that not only has measured
the performance, it has also provided values for some necessary input parameters of the
mathematical model. Moreover, the architecture helps to setup tests faster as well as to
collect and plot results easier. Ksensor, a real probe, is part of the testing architecture and,
therefore, it is directly involved in the validation process. As has been seen in the validation
section, Ksensor’s throughput is acceptably calculated by the model proposed in this
chapter. The conclusions obtained have been satisfactory with regard to the behaviour of the
model.
Modelling a Network Traffic Probe Over a Multiprocessor Architecture 327
This paper has also come in useful to explain the main aspects of Ksensor, a multithreaded
kernel-level probe developed by NQaS research group. It is remarkable that this system
introduces performance improving design proposals into traffic analysis systems for passive
QoS monitoring.
As a future work, we suggest two main lines: the first one is related to Ksensor and it is
about a new hardware-centered approach whose objective is to embed our proposals onto
programmable network devices like FPGAs. The second research line aims at completing
and adapting the model to the real system in a more accurate way. We are already making
progress on new mathematical scenarios which can represent, in detail, aspects such as
packet capturing process, congestion avoidance mechanisms between capturing and
analysis stages, specific analysis algorithms applied in QoS monitoring and packet
filtering.
Finally, it is worth mentioning that the test setup, which has been used to validate the
model, will be improved acquiring network hardware at 10 Gbps and installing Ksensor
over a server with more than two processors. The model will be tested under these new
conditions and we hope to obtain satisfactory results, too.
Thus, further work is necessary to analyse this type of systems with a higher precision,
compare their results, in certain conditions, better and prevent us from developing high-cost
prototypes.
7. References
Altman, E.; Avratchenkov,K. & Barakat, C.. (2000). A stochastic model for TCP/IP with
stationary random losses. ACM SIGCOMM 2000.
Barakat, C.; Thiran, P.; Iannaccone, G.; Diot, C. & Owezarski, P. (2002). A flow-based model
for Internet backbone traffic, Proceedings of the 2nd ACM SIGCOMM Workshop on
Internet measurement, 2002.
Beaumont, A.; Fajardo, J.; Ibarrola, E. & Perfecto, C. (2005). Arquitectura de red para la
automatización de pruebas. VI Jornadas de Ingeniería Telemática., Vigo, Spain.
Benvenuti, C. (2006). Understanding Linux Network Internals, O’ Reilly Media.
Biswas, A.; Sinha, P. (2006). Efficient real-time Linux interface for PCI devices: A study on
hardening a Network Intrusion Detection System. SANE 2006, Delft, The
Netherlands.
Cardigliano, A. (2011). Towards wire-speed network monitoring using Virtual Machines.
Master Thesis, University of Pisa, Italy.
Chandy, K.M.; Herzog, U. & Woo, L.S. (1975). Parametric Analysis of Queueing Networks
Learning Techniques, IBM J. Research and Development, vol. 19, no. 1, pp. 43-49,
January 1975.
Cleary, J.; Donnelly, S.; Graham, I.; McGregor, A. & Pearson, M. (2000). Design principles for
accurate passive measurement. Passive and Active Measurement. PAM 2000,
Hamilton, New Zealand.
Deri, L. (2004). Improving Passive Packet Capture: Beyond Device Polling. SANE 2004,
Amsterdam, The Netherlands.
Deri, L. (2005). nCap: Wire-speed Packet Capture and Transmission. E2EMON 2005, Nice,
France.
328 Telecommunications Networks – Current Status and Future Trends
Fiems, D. (2004). Analysis of discrete-time queueing systems with vacations. PhD Thesis,
Ghent University, Belgium.
Fusco, F. & Deri, L. (2010). High Speed Network Traffic Analysis with Commodity Multi-
core Systems. Internet Measurement Conference 2010, Melbourne, Australia.
Intel-CSA. (2002). Communication Streaming Architecture: Reducing the PCI Network
Bottleneck.
Kobayashi, H. (1978). Modeling and Analysis: An Introduction to System Performance Evaluation
Methodology, Ed. Wiley-Interscience, ISBN 0-201-14457-3.
Lee, T. (1989). M M/G/1/N queue with vacation time and limited service discipline.
Performance Evaluation, vol. 9, no. 3, pp. 181-190.
Lemoine, E.; Pham, C. & Lefèvre, L. (2003). Packet classification in the NIC for improved
SMP-based Internet servers. ICN’04, Guadeloupe, French Caribbean.
Little, J. D. C. (1961). A proof of the queueing formula: L=λ⋅W, Operations Research, vol. 9, no.
3, pp. 383-386, 1961.
Mogul, J.C. & Ramakrishnan, K.K. (1996). Eliminating Receive Livelock in an Interrupt-
driven Kernel. USENIX 1996 Annual Technical Conference, San Diego, California.
Muñoz, A.; Ferro, A.; Liberal, F. & López, J. (2007). A Kernel-Level Monitor over
Multiprocessor Architectures for High-Performance Network Analysis with
Commodity Hardware. SensorComm 2007, Valencia, Spain.
Reiser, M. (1981). Mean value analysis and convolution method for queue-dependent
servers in closed queueing networks, Performance Evaluation, vol. 1, no. 1, pp. 7-18,
January 1981.
Reiser, M. & Lavengerg, S.S. (1980). Mean Value Analysis of Closed Multichain Queueing
Networks, Journal of the ACM, vol. 27, no. 2, pp. 313-322, April 1980.
Salah, K. (2006). Two analytical models for evaluating performance of Gigabit Ethernet hosts
with finite buffer. AEU - International Journal of Electronics and Communications, vol.
60, no. 8, pp. 545-556.
Salah, K.; El-Badawi, K. & Haidari, F. (2007). Performance analysis and comparison of
interrupt-handling schemes in gigabit networks. Computer Communications, vol. 30,
no. 17, pp. 3425-3441.
Schneider, F. (2007). Packet Capturing with Contemporary Hardware in 10 Gigabit Ethernet
Environments. Passive and Active Measurement. PAM 2007, Louvain-la-Neuve,
Belgium.
Takagi, H. (1991). Queueing Analysis, A Foundation of Performance Evaluation Volume 1:
Vacation and Priority Systems (Part 1), North-Holland, Amsterdam, The Netherlands.
Takagi, H. (1994). M/G/1/N Queues with Server Vacations and Exhaustive Service.
Operations Research, pp. 926-939.
Varenni, G.; Baldi, M.; Degioanni, L. & Risso, F. (2003). Optimizing Packet Capture on
Symmetric Multiprocessing Machines. 15th Symposium on Computer Architecture and
High Performance Computing, Sao Paulo, Brazil.
Wang, P. & Liu, Z. (2004). Operating system support for high performance networking, a
survey. The Journal of China Universities of Posts and Telecommunications, vol. 11, no.
3, pp. 32-42.
Wu, W; Crawford, M. & Bowden, M. (2007). The performance analysis of linux networking -
Packet receiving. Computer Communications, vol. 30, no. 5, pp. 1044-1057.
Zhu, H.; Liu, T.; Zhou, C. & Chang, G. (2006). Research and Implementation of Zero-Copy
Technology Based on Device Driver in Linux. IMSCCS'06.
14
1. Introduction
Spurred by the vision of seamless connectivity anywhere and anytime, ubiquitous and
pervasive communications are playing increasingly important role in our daily lives. New
types of applications are also affecting behaviour of users and changing their habits,
essentially reinforcing the need for being always connected. This clearly represents a
challenge for the telecommunications community especially for operating scenarios
characterised by high dynamics of the network requiring appropriate routing and traffic
engineering.
Routing and traffic engineering are cornerstones of every future telecommunication system,
thus, this chapter is concerned with an adaptive routing and traffic engineering in highly
dynamic packet-oriented networks such as mobile ad hoc networks, mobile sensor networks
or non-geostationary satellite communication systems with intersatellite links (ISL). The first
two cases are recently particularly popular for smaller scale computer or data networks,
where scarce energy resources represent the main optimisation parameter both for traffic
engineering and routing. However, they require a significantly different approach, typically
based on clustering, which exceeds the scope of this chapter. The third case, on the other
hand, is particularly interesting from the aspect of routing and traffic engineering in large
scale telecommunication networks. Even more so, since it exhibits a high degree of
regularity, predictability and periodicity. It combines different segments of communication
network and generally requires distinction between different types of traffic. Different
restrictions and requirements in different segments typically require separate optimization
of resource management.
So, in order to explain all routing functions and different techniques used for traffic
engineering in highly dynamic networks we use as an example the ISL network,
characterized by highly dynamic conditions. Nonetheless, wherever possible the discussion
is intentionally kept independent of the type of underlying network or particular
communication protocols and mechanisms (e.g. IP, RIP, OSPF, MPLS, IntServ, DiffServ,
etc.), although some presented techniques are an integral part of those protocols. Thus, this
chapter is focusing on general routing and traffic engineering techniques that are suitable
for the provision of QoS in packet-oriented ISL networks. Furthermore, most concepts,
330 Telecommunications Networks – Current Status and Future Trends
• Predictability – motion of satellites around the earth is deterministic, thus the position
of satellites and their connectivity can be computed in advance, taking into account the
parameters of the satellite orbit and constellation. Consequently, in an ISL network only
undeterministic parameters need to be monitored and distributed through the network,
thus minimizing the signalling load.
• Periodicity – satellite positions and thus the configuration of the space segment,
repeats with the orbit period, which is defined uniquely by the selected orbit altitude.
Taking into account also the terrestrial segment, an ISL network will experience a
quasi-periodic behaviour on a larger scale, defined as the smallest common integer
multiple of the orbit period and the traffic intensity period, referred to as the system
period.
• Regularity – a LEO constellation with an ISL network is characterized by a regular mesh
topology, enabling routing procedures to be considered independently of the actual
serving satellite (i.e. concealing the motion of satellites with respect to the earth from
the routing procedure). Furthermore, the high level of node connectivity (typically
between 2 and 6 links to the neighbouring nodes) provides several alternative paths
between a given pair of satellites.
• Constant number of network nodes – routing procedures in ISL networks are based
typically on the explicit knowledge of the network topology which, in the case of
satellite constellation, has a constant, predefined number of network nodes in the space
(satellites) and terrestrial (gateways) segments (except in the case of a node or a link
failure). This property has a direct influence on the calculation of routing tables.
The above properties are incorporated in the described routing and traffic modelling
techniques and procedures. Special attention is given to properties which support the
development of efficient, yet not excessively complex, adaptive routing and traffic
engineering techniques.
However, for the verification, validation and performance evaluation of algorithms,
protocols, or whole telecommunication systems, the development of suitable traffic models,
which serve as a vital input parameter in any simulation model, is of paramount
importance. Thus, at the end of the chapter we are presenting the methodology for
modelling global aggregate traffic comprising of four main modules. It can be used as a
whole or only selected modules can be used for particular purposes connected with
simulation of particular models.
Routing and traffic engineering on one side require good knowledge of the type of network
and its characteristics and on the other side also of the type of traffic in the network. This is
needed not only for adapting particular techniques, procedures and algorithms to the
Routing and Traffic Engineering in Dynamic Packet-Oriented Networks 331
network and traffic conditions but also for their simulation, testing and benchmarking. To
this end this chapter is complemented by description of a methodology for developing a
global traffic model suitable for the non-geostationary ISL networks, which consists of
modules describing distribution of sources, their traffic intensity and its temporal variation,
as well as traffic flow patterns.
2. Routing functions
The main task of any routing is to find suitable paths for user traffic from the source node to
destination node in accordance with the traffic‘s service requirements and the network’s
service restrictions. Paths should accommodate all different types of services using different
optimisation metrics (e.g. delay, bandwidth, etc.). Thus, different types of traffic can be
routed over different routes. Routing functionality can be in general split in four core
routing functions, (i) acquiring information about the network and user traffic state, and
link cost calculation, (ii) distributing the acquired information, (iii) computing routes
according to the traffic state information and chosen optimization criteria, and (iv)
forwarding the user traffic along the routes to the destination node.
For each of these functions, several policies exist. Generally speaking, the selection of a
given policy will impact (i) the performance of the routing protocol and (ii) the cost of
running the protocol. These two aspects are dual and a careful design in the routing
algorithm must achieve a suitable balance between the two. The following sub-sections will
discuss the four core routing functions.
2.1 Acquiring information about the network and link cost calculation
The parameters of the link-cost metric should directly represent the fundamental network
characteristics and the changing dynamics of the network status. Furthermore, they should
be orthogonal to each other, in order to eliminate unnecessary redundant information and
inter-dependence among the variables (Wang & Crowcroft, 1996). Depending on the
composition rule we distinguish additive, multiplicative, concave and convex link-cost
metrics (Wang, 1999). In additive link-cost metrics the total cost of the path is a sum of costs
on every hop. Additive link costs include delay, jitter, cost and hop-count. Total cost of the
path in the case of multiplicative link-cost metrics is a product of individual costs of links. A
typical example of multiplicative link cost is link reliability. In concave and convex link-cost
metrics the total cost of the path equals the cost on the hop with the minimum and
maximum link cost respectively, and a typical example of link-cost metric is the available
bandwidth.
2.1.1.1 Link cost based on the queuing delay enhanced with Exponential forgetting
function EFF
In this case we monitor the traffic load on a satellite through the packet queuing delay (Tql)
at the respective port of the node, which is directly proportional to the traffic load on the
selected outgoing link l as shown in Equation (2), where Lr denotes the length of the rth
packet in outgoing queue and Cl is the capacity of the link l
Lr
r
Tql = (2)
Cl
Due to variation of these queuing delays, the queuing delay value TQl, considered in the
link-cost function, is periodically estimated using a fixed-size window exponential
forgetting function EFF(n, χ, Tql) on a set of the last n values of packet queuing delay
collected in a given time interval (i.e. Tql[n] being the last collected value, and the other
values considered being Tql[n-1],..., Tql[1]). In the EFF function, n (the depth of the function)
denotes the number of memory cells in the circular register. If the number of collected Tql
values m is smaller than n, then only these values are considered in the EFF function.
Furthermore, as shown in Equation (3), a forgetting factor, χ ∈ (0, 1), is introduced to make
the more recent Tql values more significant in calculating TQl.
m−1
( 1 − χ ) ⋅ χ ⋅ Tql [m - r] for m < n
r
r =0
TQl = EFF(n , χ , Tql ) = (3)
m−1
( 1 − χ ) ⋅ χ r ⋅ T [n - r] for m ≥ n
ql
r =0
Routing and Traffic Engineering in Dynamic Packet-Oriented Networks 333
2.1.1.2 Link cost based on expected queuing delay enhanced with Exponential Smoothing
Link-Cost Function
In the case of using expected queuing delay in the assessment of the traffic load, we monitor
the outgoing queues of particular traffic. A packet entering a given output queue at time t
will have the expected queuing delay, Texp, given by Equation (4), where Lav is the average
packet length, C the link capacity, and n(t) the number of packets in the queue.
Lav
Texp (t ) = n(t ) ⋅ (4)
C
Calculation of the expected queuing delay does not require any distribution of link status
between neighbouring nodes, and has the advantage of fast response to congestions on the
link. However, for calculation of pre-computed routing tables the average expected queuing
delay Texp_av has to be determined using Equation (5) at the end of each update interval TI
starting at time tS. This average expected queuing delay could subsequently be already used
as a link-cost metric parameter TQl, as shown in Equation (6), which expresses traffic load on
the link.
tS +TI
1 Lav
Texp _ av (tS + TI ) =
TI
⋅ n(t ) ⋅
C
⋅ dt (5)
tS
The consideration of link load in the link cost calculation, and consequently in route
computation, may cause traffic load oscillations between alternative paths in the network
(Bertsekas & Gallager, 1987). In particular, routing of packets along a given path increases
the cost of used links. At the end of routing update interval this information is fed back to
the routing algorithm, which chooses for the next routing update interval an alternative
path. In extreme cases this may result in complete redirection of traffic load to alternative
paths, eventually leading to traffic load oscillation between the two alternative paths in
consecutive routing tables and hence routing instability. In ISL networks for instance traffic
load oscillations impose a particular effect on delay sensitive traffic, as there are many
alternative paths between a given pair of satellites with similar delays. Oscillations are
especially inconvenient under heavy traffic load conditions, where the impact of traffic load
parameter on the link cost is much higher than that of the propagation delay TP. Under such
conditions oscillations lead to congestion on particular links, which significantly degrades
routing performance. In addition, the oscillations of traffic load have also a great impact on
triggered signalling, where the signalling load depends on a significant change of link cost.
In order to introduce the triggered signalling, the reduction of the oscillation of traffic load
and consequently the oscillation of link cost is inevitable. Smoothing of the link cost on a
particular link can be done in two ways:
• Directly by modifying the link cost on particular link with a suitable smoothing
function.
334 Telecommunications Networks – Current Status and Future Trends
• Indirectly by using advanced forwarding policies, which send traffic also along the
alternative paths and distribute traffic more evenly on the first and the second shortest
paths and consequently smooth-out the link cost. (see section 2.4.)
To reduce the oscillations one can use an exponential smoothing link-cost function, which
iteratively calculates the traffic load parameter TQl from its previous values according to
Equation (7). The influence of the previous value is regulated with a parameter k, defined
between 0 and 1 (k∈[0,1]), while the initial value for the parameter TQl is set to 0.
TQl (t0 ) = 0
TQl (ti ) = Texp _ av (ti ) − TQl (ti − 1 ) ⋅ k + TQl (ti − 1 ) = (7)
= k ⋅ Texp _ av (ti ) + (1 − k ) ⋅ TQl (ti − 1 )
Taking into account this parameter, the cost of a given link l is calculated using Equation (1).
If k equals 1, there is no influence of previous values on current link cost and Equation (7)
transforms to Equation (6). On the other hand, if k equals 0, only propagation delay is
considered in link cost calculation, which leads to traffic insensitive routing.
One of the drawbacks of the exponential smoothing link-cost function is that it takes into
account in each iteration all previous values of parameter Texp_av. The value of TQ as a
function of n previous values of Texp_av is given in Equation (8). It can be seen that the impact
of previous values of Texp_av decreases exponentially with increasing value of n.
The main goal of the exponential smoothing link-cost function, which tends to suppress
the traffic load oscillations, is that the link cost should reflect the actual traversing traffic
flow and the traffic intensity of the region served by the satellite, and not the
instantaneous fluctuations of traffic load due to oscillation. In such manner exponential
smoothing algorithm promises more evenly distribution of traffic load between links and
consequently a better performance for different traffic types. Furthermore it ensures, that
in a lightly loaded network, the routing performance is not decreased, while it is notably
enhanced in heavily loaded network. A more exhaustive explanation of exponential
smoothing link cost function and optimum definition of parameter k is given in (Svigelj et
al., 2004a).
2.1.1.3 Weighted delay calculation
The relative impacts of traffic load and propagation delay on the link cost are linearly
regulated with a traffic weight factor (TWFl) and a propagation delay weight factor (PDWFl),
respectively, as shown in Equation (9) defining weighted delay (WDl) on the link l. This
allows biasing of link cost towards shortest-path routes (PDWFl > TWFl) or towards least
loaded but slightly longer routes (PDWFl < TWFl).
In general, as indicated in Equation (9), different weights can be used on different links. In a
non-geostationary satellite system, however, satellites are continuously revolving around
the rotating earth, so weights cannot be optimized for the traffic load of certain regions but
should either be fixed or should adapt to the conditions in a given region. The later gives
opportunity for further optimisation using some traffic aware heuristic approach.
Weighted delay on the link, as given by Equation (9), can already be used as a simple
continuous link-cost function with a linear relation between both metrics. In general,
however, a more sophisticated link-cost function should be able to control the relative cost
of heavily loaded links with respect to lightly loaded links. This can be accomplished by a
non-linear link-cost function, such as an exponentially growing function with exponent α, as
given in Equation (10), where WDL and WDU represent lower and upper boundary values of
weighted delay on the links respectively.
α
WDl − WDL WDL
LC l = + (10)
WDU − WDL WDU
The first term in Equation (10) represents the normalised dynamically changing link cost
according to variation of propagation delay (e.g. ISL length) and traffic load (e.g. queuing
delay). Since it is not suitable that link cost be zero, which can cause high oscillations, a
small constant (WDL/WDU) is added to the normalised term of the link-cost function. This
constant represents the normalised cost of the shortest link without any traffic load. When
α = 0 a link-cost function has no influence on the routing algorithm, and path selection
reduces to cost-independent routing (i.e. minimum hop count routing), while with α = 1 it
selects a path with the minimum sum of link costs. Exponent values larger than 1 (α > 1)
tend to eliminate heavily loaded (high cost) links from consideration, while exponent values
smaller than 1 (α < 1) tend to preserve lightly loaded links. Combining Equations (9)
and(10), the link cost for the delay sensitive traffic, which takes into consideration delay on
the link, is calculated as given by Equation (11).
α
PDWFl ⋅ TPl + TWFl ⋅ TQl − WDL WDL
LC l = + (11)
WD U − WD L WDU
2.1.1.4 Discretization
Regardless of the selected link-cost function the calculated link cost needs to be distributed
throughout the network and stored in nodes for the subsequent calculation of new routing
tables. In order to reduce computation effort and memory requirements, routing algorithms
have been proposed that perform path selection on a small set of discrete link-cost levels. In
these algorithms the appropriate number of link-cost levels needs to be defined to balance
between the accuracy and computational complexity.
Equation (13) represents a suitable function, which converts the continuous link-cost function,
given in Equation (12), to L discrete levels denoted as CDl in the range between 0 and 1. In this
link-cost function the minimum and maximum value for weighted delay are used, WDmin and
WDmax. Any link with weighted delay below WDmin is assigned the minimum cost 1/L, while
links with weighted delay higher than WDmax have link cost set to 1.
336 Telecommunications Networks – Current Status and Future Trends
Ci = WDiα (12)
1
WD l < WD min
L
WD − WD α
min
⋅ ( L − 1) + 1
l
C Dl = WDmax − WDmin (13)
WDmin < WDl < WD max
L
1 WD l ≥ WD max
Lr
LU l (tS + TI ) = r (14)
TI ⋅ C l
The link-cost metric for the throughput sensitive traffic is a typical concave metric. The
optimization problem is to find the paths with the maximum available bandwidth and, as an
additional constraint, with minimum hop count, which minimizes the use of resources in
the network. Thus, the link cost for throughput sensitive traffic is the normalized available
bandwidth on the link, calculated at the end of the routing table update interval according
to Equation (15).
network information about their own state. Because a node has no control of the time it
receives state information, the information might be non-topical once used for route
computation. Non topical information is undesirable since it introduces a discrepancy
between what is known and what the reality is. This is of particular importance for those
systems which incorporate non-permanent links. Non topical information results in
inaccurate and possibly poor routing decisions. Unsolicited signalling is further subdivided
into periodic and triggered signalling.
Periodic signalling works by having each node broadcasting state information every p units
of time, p being the broadcast period. It is not required for the broadcast period be equal for
all nodes, however, it is practical to do so because (a) all nodes run the same software (b) it
avoids discrepancies in the topicality of state information. Since the quality of routing
decisions depends on how topical the state information is, it is expected that increasing the
broadcast period results in increasing the connection blocking probability. On the other
hand, increasing the broadcast period helps to keep the signalling traffic low. Periodic
signalling supports easy dimensioning since the amount of signalling traffic does not
depend on the amount of traffic flowing in the network and therefore can be quantified
analytically. Unfortunately, this interesting characteristic is also a drawback: if the state of a
node does not change during the whole broadcast period, the next broadcast will take place,
regardless of whether it is useful or not. Likewise, some important state change might occur
in the middle of the broadcast period without any chance for these changes to be advertised
prior to the next broadcast. For these reasons, triggered signalling is worth investigating.
Instead of broadcasting periodically, the node using triggered signalling permanently
monitors its state and initiates a broadcast upon a significant change of its state (threshold
function). This approach is supposed to alleviate signalling traffic, holding down useless
broadcasts. Triggered updates for instance are used for Routing Information Protocol (RIP).
Unfortunately, triggered signalling has two down sides. First, while periodic signalling does
not depend on the actual content of state information, triggered signalling must be aware of
the semantics of the state information to define what a significant state change is. Second,
the amount of signalling traffic generated depends on the characteristics of the traffic load in
the constellation. It does not depend on the amount of data traffic but rather on the traffic
variations in the nodes and links. Since routing impacts how traffic is distributed in the
network, the behaviours of routing and triggered signalling are tightly interlaced. Triggered
signalling can be further sub-divided in additional versions depending on the chosen
threshold function.
In networks there are two changing parameters, which have the impact on the link cost:
propagation delay between neighbouring nodes and traffic load. The first can be computed
in advance in each node, so it can be eliminated from signalling information. For delay
sensitive traffic the new value of TQl is broadcasted only if the value exceeds predefined
threshold (Svigelj et al., 2012). If TQl does not exceed the threshold, only the propagation
delay is used as a link cost in routes calculation. In the case of throughput sensitive traffic
the link cost is broadcasted only if LCl is lower than threshold (i.e. the available bandwidth
is lower than threshold), otherwise value 1 (i.e. empty link) is used in routes calculation.
With an appropriate selection of thresholds the signalling load can be significantly reduced,
especially for nodes, which has no intensive traffic. To omit the impact of oscillations of the
338 Telecommunications Networks – Current Status and Future Trends
link costs the triggered signalling can be used in a combination with exponential smoothing
link-cost function or adaptive forwarding.
Next hops on the route to satellite F and the cost of the route
From Shortest route Second shortest route Third shortest route
Satellite A D, E, F 14 B, E, F 15 B, C, F 16
Satellite B E, F 10 C, F 11 / /
Satellite C F 6 / / / /
Satellite D E, F 10 / / / /
Satellite E F 5 / / / /
Table 1. Alternative paths to Satellite F with the same minimum number of hops.
SPR ALR-
ALR-S ALR-
ALR-A
A D A D A D
C F C F C F Traffic originating in B
The ALR-S policy ensures a more uniform distribution of traffic load over the network, as it
distinguishes between the packets passing through a particular node and the packets that
are originating in that node. Packets originating in a particular node are forwarded on the
link of the second shortest route (e.g. from A to F via B, from B to F via C), while packets
passing through the node are forwarded on the link of the shortest route (e.g. through A to F
via D, through B to F via E). By using the second-choice route only for originating packets,
the delay is increased with respect to the shortest route only on the first hop, hence the
increase in delay does not accumulate for the packets with a large number of hops. Between
the consecutive updates of routing tables, all packets between a given pair of nodes follow
the same route. Thus, ALR-S policy maintains the correct sequence of the packets within the
routing interval, the same as the SPR forwarding policy.
The ALR-A policy promises an even more uniform distribution of traffic load and thus
further improvement of link utilisation by alternating between the shortest and the second
shortest route regardless of the packet origination node (this is denoted in Fig. 1 by dashed
lines). However, packets belonging to the same session can be forwarded along different
routes even within one routing table update interval, thus additional buffering is required in
the destination nodes to re-order terminated packets and obtain the correct sequence.
The static forwarding policies, such as ALR-S and ALR-A, distribute packets according to a
pre-selected rule. They allow significant reduction of traffic load fluctuation between links,
however they do not adapt to the actual traffic load on alternative routes.
For the throughput sensitive traffic we monitor the number of packets in outgoing queues
(n). The alternative second shortest path is used only if it has the same or a smaller number
of hops (h) to the destination and if the number of packets (n) in the outgoing queue on the
shortest path (n1) is more than a given threshold ΔtrT (where T is denoting throughput
sensitive traffic) higher than the number of packets in the outgoing queue on the alternative
path (n2), as given in Equation (17).
The significance of the threshold is that it regulates distribution of traffic between alternative
paths based on local information about the link status, and thus differentiates between lightly
and heavily loaded nodes. The higher the threshold value the more congested the shortest
path needs to be to allow forwarding along the alternative second shortest path. In the
extreme, setting the threshold value to infinity prevents forwarding along the second shortest
path (i.e. adaptive forwarding deteriorates to SPR), while no threshold (i.e. ΔtrT = 0) means that
packets are forwarded along the second shortest path as soon as the expected queuing delay
for the corresponding link is smaller than the one on the shortest path.
Routing with the proposed adaptive forwarding promises more uniform distribution of
traffic load between links and the possibility to react quickly to link failure. However,
packets belonging to the same session can be forwarded along different routes, even within
the same routing update interval, so additional buffering is required in destination nodes to
reorder terminated packets and obtain the correct sequence.
Taking into account techno-economic and socio-economic factors and the above methodology,
we can define different non-homogeneous geographic-dependent distributions taking into
account a more realistic distribution of sources and destinations for provisioning of the
particular types of service. Such geographic-dependent distributions are typically based on
statistical data provided on the level of countries, and only for some larger countries also on
the level of states and territories. In addition to limitations of data availability, we also face the
problem of the accuracy of its representation, which depends on the granularity of the model
and on the assumption regarding the source/destination distribution within the smallest
geographical unit (i.e. country). The simplest approach in country-based non-homogeneous
geographic-dependent distributions assumes that a nation’s subscribers are evenly distributed
over the country. The weakness of this approach is representation of traffic demand in large
countries spanning several units of geographical granularity. In determining the distribution,
different levels of geographical granularity may be adopted; however, in order to be able to
individually represent also small countries, the geographical granularity should be in the
range of those small countries. In (Mohorcic et al., 2003), a traffic grid of dimension 180° × 360°
has been generated in steps of 1° in both latitude and longitude directions.
An alternative approach defines temporal variation of traffic load in conjunction with the
global distribution of traffic sources and destinations, which inherently takes into account
geographical time zones. An example of relative traffic intensity considering distribution of
traffic sources and destinations combined with temporal variation of traffic load is depicted
in Fig. 3, where traffic intensity is normalised to the highest value (i.e. the maximum value
of normalized traffic load equals 1, but for better visualization we bounded the z-axis in
Fig. 3 to 0.3). The traffic intensity is generated by assuming that a single session is
established per day per user and that each session on average lasts for about 2 minutes.
Fig. 3. Global distribution and activity of traffic sources and destinations at midnight GMT.
drawbacks: firstly, the traffic generator can only reproduce something that has happened in
the past, and secondly, there is seldom enough data to generate all possible scenarios, since
the extreme situations are particularly hard to capture. In the case of satellite networks with
no appropriate system to obtain the traffic traces, the use of traces is even more
inconvenient.
An alternative approach, increasingly popular in the field of research, is to base the
modelling of traffic sources on empirical distributions obtained by measurement from real
traffic traces. The measurements can be performed on different segments of real networks,
i.e. in the backbone network or in the access segment. In order to generate cumulative traffic
load representing an aggregate of many individual traffic sources in the coverage area of the
satellite, the traffic properties have to be extracted from a representative aggregate traffic
trace (Svigelj at al., 2004a), such as a real traffic trace captured on the 622 Mbit/s backbone
Internet link carrying 80 Mbit/s traffic (Micheel, 2002). The selected traffic trace comprises
aggregate traffic from a large number of individual sources. Such traffic trace resembles the
traffic load experienced by a satellite, both from numerous traffic sources within its
coverage area, and from aggregate flows transferred over broadband intersatellite links. A
suitable traffic source model, which resembles IP traffic in the backbone network, can
already be built by reproducing some of the first order statistical properties of the real traffic
trace that have major impact on network performance, e.g. inter-arrival time and packet
length distribution. A simple traffic generator can be developed using a look-up table with
normalized values, which allows packet inter-arrival time and packet length values to be
scaled, so as to achieve the desired total traffic load. Distributions of packet inter-arrival
time and packet length obtained with such a traffic generator are depicted in Fig. 5 and Fig. 6
respectively. The main advantage of traffic sources, whose distributions conform to those
obtained by measurements of real traffic, is that they are relatively simple to implement and
allow high flexibility.
18
16
14
12
PDF [%]
10
0
0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4
inter arrival time [ms]
Fig. 5. Packet inter-arrival time distribution obtained with empirical traffic generator.
Routing and Traffic Engineering in Dynamic Packet-Oriented Networks 347
For the more accurate prediction of the behaviour of the traffic source exhibiting long-range
dependence, the traffic model requires detailed modelling of also the second order statistics
of the packet arrival process. The accurate fitting of modelled traffic to the traffic trace can
be achieved using modelling process with a discrete-time batch Markovian arrival process
that jointly characterizes the packet arrival process and the packet length distribution
(Salvador et al., 2004). Such modelling allows very close fitting of the auto-covariance, the
marginal distribution and the queuing behaviour of measured traces.
30
25
20
PDF [%]
15
10
0
0 200 400 600 800 1000 1200 1400 1600 1800 2000
packet length [bytes]
The potential drawback of traffic sources based on real traffic traces is that the empirically
obtained traffic properties (i.e. obtained from the aggregated traffic on the backbone Internet
link in this particular example) may not be suitably representative for the system under
consideration, so it can sometimes deviate considerably from real situations and lead to
incorrect conclusions.
In addition to traffic sources based on traffic traces (directly or via statistical distributions)
traffic sources can also be implemented in classical way with pure mathematical
distributions such as Poisson, Uniform, Self-Similar, etc. Although such mathematically
tractable traffic sources never fully resemble the characteristics of real traffic, they can serve
as a reference point to compare simulation results obtained with different scenarios,
however they should exhibit the same values of first order statistic (i.e. mean inter-arrival
time and average packet length) as obtained from traces.
In the case of supporting different levels of services, packets belonging to different types of
traffic (e.g. real time, high throughput, best effort) should be generated using different traffic
source models, which should reproduce statistical properties of that particular traffic.
However, as different services and applications will generate different traffic intensity
depending on regions and users' habits, also separate traffic flow patterns will have to be
developed for different types of traffic, to be used in conjunction with different traffic source
generators.
348 Telecommunications Networks – Current Status and Future Trends
mapping of traffic
sources and destinations
on satellites
geographical distribution
of traffic sources and
destinations
temporal variation
of traffic load
With the normalized cumulative traffic on each satellite, which is proportional to the
intensity of traffic sources in the satellite’s coverage area, it is possible to modulate the
selected traffic source generator (not shown in Fig. 7). Thus data packets are actually
generated considering the relative traffic intensity experienced by a particular satellite.
The destination satellite is selected for each packet in accordance with the traffic flow
pattern. The probability of selecting a given satellite as a destination node is proportional to
its coverage share in the destination region divided by the sum of all coverage shares in that
region. Thus, although in a simplified manner, the model is taking into consideration also
multiple coverage. In the case of using different traffic source models to generate distinct
types of traffic by global aggregate traffic intensity model, one should also consider
different, service specific traffic flow patterns.
Routing and Traffic Engineering in Dynamic Packet-Oriented Networks 349
4. Summary
Traffic engineering involves adapting the routing of traffic to the network conditions with
two main goals: (i) providing sufficient quality of service, which is important from user’s
point of view, and (ii) efficient use of network resources, which is important for operators of
telecommunication’s network. The presented routing and traffic engineering issues
addressed both goals that are explained using the ISL network as a concrete example of
highly dynamic telecommunication network with several useful properties, which can be
exploited by developing of routing procedures. However, the presented work is not limited
to ISL networks, but can be used also in other networks as described in (Liu et al., 2011;
Long et al., 2010; Rao & Wang, 2010, 2011). Routing and traffic engineering functions are
presented in modular manner for easier reuse of particular procedures.
Adaptation of routing requires, in addition to good understanding of the fundamental
network operating conditions, also good knowledge of the characteristics of different types
of traffic in the network. In order to support better modelling of traffic characteristics a
modular methodology is described for developing a global aggregate traffic intensity model
suitable for supporting the dimensioning and computer simulations of various procedures
in the global networks. It is based on the integration of modules describing traffic
characteristics on four different levels of modelling, i.e. geographical distribution of traffic
sources and destinations, temporal variations of traffic sources’ intensity, traffic flows
patterns and statistical behaviour of aggregated traffic sources.
5. References
Bertsekas D. & Gallager R. (1987). Data Networks, Englewood Cliffs: Prentice-Hall
International.
Franck L. & Maral G. (2002a). Signaling for inter satellite link routing in broadband non
GEO satellite systems. Computer Networks, Vol. 39, No. 1, pp. 79-92.
Franck L. & Maral G. (2002b). Routing in Networks of Intersatellite Links. IEEE Transaction
on Aerospace and Electronic Systems, Vol. 38, No. 3, pp. 902-917.
Hu Y. F. & Sheriff R. E. (1997). The Potential Demand for the Satellite Component of the
Universal Mobile Telecommunication System. Electronics and Communication
Engineering Journal, April 1997, pp. 59-67.
Hu Y. F. & Sheriff R. E. (1999). Evaluation of the European Market for Satellite-UMTS
Terminals. International Journal of Satellite Communications, Vol. 17, pp. 305-323.
Liu, X.; Ma, J. & Hao, X. (2011). Self-Adapting Routing for Two-Layered Satellite Networks.
China Communications, Volume 8, Issue 4, July 2011, pp. 116-124.
Long F; Xiong N.; Vasilakos A.V.; Yang L.T. & Sun, F. (2010). A sustainable heuristic QoS
routing algorithm for pervasive multi-layered satellite wireless networks. Wireless
Networks, Volume 16, Issue 6, August 2010, Pages 1657-1673.
Micheel, 2002. National Laboratory for Applied Network Research), Passive Measurement
and Analysis. http://pma.nlanr.net/PMA/, 22 October, 2002.
Mohorcic M.; Svigelj A. & Kandus G. 2004. Traffic Class Dependent Routing in ISL Networks.
IEEE Transaction on Aerospace and Electronic Systems, Vol. 39, pp. 1160-1172.
Mohorcic M.; Svigelj A.; Kandus G. & Werner M. (2000). Comparison of Adaptive Routing
Algorithms in ISL Networks Considering Various Traffic Scenarios. In: Proc. of 4th
350 Telecommunications Networks – Current Status and Future Trends
European Workshop on Mobile and Personal Satellite Communications (EMPS 2000), pp.
72-81, London, UK; September 18, 2000.
Mohorcic M.; Svigelj A.; Kandus G. & Werner M. (2002a). Performance Evaluation of
Adaptive Routing Algorithms in Packet Switched Intersatellite Link Networks.
International Journal of Satellite Communications, Vol. 20, pp. 97-120.
Mohorcic M.; Svigelj A.; Kandus G.; Hu Y. F. & Sheriff R. E. (2003). Demographically
weighted traffic flow models for adaptive routing in packet switched non-
geostationary satellite meshed networks. Computer Networks, No. 43, pp. 113-131.
Mohorcic M.; Svigelj A.; Werner M. & Kandus G. (2001). Alternate link routing for traffic
engineering in packet oriented ISL networks. International Journal of Satellite
Communications, No. 19, pp. 463-480.
Mohorcic M.; Werner M.; Svigelj A. & Kandus G. (2002b). Adaptive Routing for Packet-
Oriented Inter Satellite Link Networks: Performance in various Traffic Scenarios.
IEEE Transactions on Wireless Communications, Vol. 1, No. 4, pp. 808-818.
Rao Y. & Wang R. (2011). Performance of QoS routing using genetic algorithm for Polar-
orbit LEO satellite networks. AEU - International Journal of Electronics and
Communications, Vol. 65 (6), pp. 530-538.
Rao, Y. & Wang, R. (2010). Agent-based load balancing routing for LEO satellite networks.
Computer Networks, Volume 54, Issue 17, 3 December 2010, pp. 3187-3195.
Ryu B., (1999). Modeling and Simulation of Broadband Satellite Networks: Part II - Traffic
Modeling, IEEE Communication Magazine, July 1999.
Salvador P.; Pacheco A. & Valadas R. (2004). Modeling IP traffic: joint characterization of packet
arrivals and packet sizes using BMAPs. Computer Networks, No. 44, pp. 335-352.
Svigelj A.; Mohorcic M. & Kandus G. (2004b) Traffic class dependent routing in ISL
networks with adaptive forwarding based on local link load information. Space
communications, Vol. 19, pp. 158-170.
Svigelj A.; Mohorcic M.; Franck L. & Kandus G. (2012). Signalling Analysis for Traffic Class
Dependent Routing in Packet Switched ISL Networks. To appear in: Space
communications, Vol. 22:2.
Svigelj A.; Mohorcic M.; Kos A.; Pustisek M.; Kandus G. & Bester J. (2004a). Routing in ISL
networks Considering Empirical IP Traffic. IEEE Journal on Selected Areas in
Communications, Vol. 22, No. 2, pp. 261-272.
Wang Z & Crowcroft J.(1996). Quality-of-Service Routing for Supporting Multimedia
Applications. IEEE Journal on Selected Areas in Communications, Vol. 14, No. 7, pp.
1228-1234.
Wang Z. (1999). On the complexity of quality of service routing. Information Processing
Letters, Vol. 69, pp. 111-114.
Werner M. & Lutz E. (1998). Multiservice Traffic Model and Bandwidth Demand for
Broadband Satellite Systems. In proceedings: M. Ruggieri (Ed.), Mobile and Personal
Satellite Communications 3, pp. 235-253, Venice, Italy, November 1998.
Werner M. & Maral G. (1997). Traffic Flows and Dynamic Routing in LEO Intersatellite Link
Networks. In: Proc. IMSC '97, pp. 283-288, Pasadena, California, USA, June 1997.
Werner M; Frings J.; Wauquiez F. & Maral G. (2001). Topological Design, Routing and
Capacity Dimensioning for ISL Networks in Broadband LEO Satellite Systems.
International Journal of Satellite Communications, No. 19, pp. 499-527.
Wood, L.; Clerget, A.; Andrikopoulos I.; Pavlou G. & Dabbous W. (2001). IP Routing Issues
in Satellite Constellation Networks. International Journal of Satellite Communications,
Vol. 19, No. 1, pp. 69 92.
15
1. Introduction
Telecommunication networks are growing very fast. The user’s needs, in regards to new
services and applications that have a higher bandwidth requirement, are becoming bigger
every day. A telecommunication network requires early design, planning, maintenance,
continuous development and updating, as demand increases. In that respect we are forced
to incessantly evaluate the telecommunication network’s efficiency by utilizing methods
such as measurement, analysis modeling and simulations of these networks.
Measuring, analyses and the modeling of self-similar traffic has still been one of the main
research challenges. Several studies have been carried-out over the last fifteen years on:
analysis of network traffic on the Internet [30], [31], traffic measurements in the high speed
networks [32], and also measurement in the next generation networks [33]. Also, a lot of
research works exist, where attention had been given to analysis of the network traffic
caused by different applications, such as P2P [34], [35], network games [36] and VoIP
application Skype [37]. Analyses of the measured network traffic help us to understand the
basic behavior of network traffic. Various have showed that traffic in contemporary
communication networks is well described with a self-similar statistical traffic model, which
is based on fractal theory [6]. The pioneers in this field are: Leland, Willinger, and many
others [1], [5], [6]. They introduced the new network traffic description in 1994. New
description appeared as an alternative to traditional models, as were Poisson and Markov,
which were used as a good approximation for telephone networks (PSNT networks) when
describing the process of call durations and time between calls [5], [20]. These models do not
allow descriptions of bursts, which are distinctive in today’s network traffic. Such bursts can
be described by a self-similarity model [5], [6], because it shows bursts over a wide-range of
time scales. This contrasts with the traditional traffic model (Poisson model), which became
very smooth during the aggregation process. The measure of bursts and also self-similarity
present the Hurst parameter [1]-[4], which is correlated with another very important
property called long-range dependence [5]-[8]. This property is also manifested with heavy-
tailed probability of density distributions [5], [6], such as Pareto [43] or Weibull [44]. So
Pareto’s and Weibull’s heavy-tailed distributions became the most frequently used
distributions to describe self-similar network traffic in communication networks.
352 Telecommunications Networks – Current Status and Future Trends
During past years another aspect of network traffic studying has also appeared. In this case,
the network traffic is researched from application or data source point of view, especially
focused on statistics of file sizes and inter-arrival times between files [19]. These research
works are very important for describing a relation between packet network traffic on lower
ISO/OSI layers and data source network traffic on higher layers of ISO/OSI model. Based
on the research of WWW network traffic, it has been shown that file sizes of such traffic are
best described by Pareto distribution with shape parameter α = 1 [38]. That was also shown
for the FTP traffic, where the shape parameter of Pareto distribution is in the range 0.9 < α <
1.1 [20]. In [6], [39], and [40] it is shown that inter-arrival time of TCP connections are self-
similar processes, which can be described by Weibull heavily tailed distribution.
With expansion of simulation tools, which are used for simulation of communication
networks, the knowledge about simulating the network traffic also becomes very important.
One of the important tasks in simulations is also knowledge about modeling and simulating
of network traffic. Network traffic is usually modeled in simulation tools from an
application point of view [42], [45]. It is usually supposed that the file size statistics and file
inter-arrival times are known [39], [40]. Such kinds of traffic models are supported by most
commercial telecommunication simulation tools such as the OPNET Modeler [10], [11], [24],
used in our simulations and experiments. Consequently, for using the measured data of
packet traffic, when modeling file statistics, it is necessary to transform packets’ statistics
into files’ statistics [9, 10]. This transformation contains opposite operations in relation to the
fragmentation and encapsulation process. Extensive research and investigation about traffic
sources in contemporary networks show that this approach requires an in-depth analysis of
packet's traffic (which needs specialized, very powerful and consequently, expensive
instruments). This approach, in the case of encrypted packets and non-standard application
protocols, is not completely possible. In such cases, capture of entire packets is also
necessary, which can be problematic in contemporary high-speed networks. Another
approach estimates distribution parameters of file data sources from measured packets'
network traffic. For such approach, we have developed and tested different methods [42],
[45]. Estimated distribution parameters are used for modeling of the measured network
traffic for simulation purposes. Through the use of these methods we want to minimize
discrepancies between the measured and simulated traffic in regards to an average bit rate
and bursts, which are characteristic of self-similar traffic.
2. Network traffic
2.1 Packet network traffic measuring
The measuring and analyzing of real network traffic provide us with a very important
knowledge about computer network states. In analyzing process, we need statistical
mathematical tools. These tools are crucial for accuracy of a derived mathematical model,
described by stochastic parameters for packet size and inter-arrival time [9]. Using this
simulation model, we want to acquire information about telecommunication network’s
performances for:
• improvement of the current network,
• bottleneck searching,
• building and development of new network devices and protocols,
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 353
• and for ensuring quality of service (QoS) for real-time streaming multimedia
applications.
Using this information, network administrators can make the network more efficient.
The simplest tools that measure and capture the packets of network traffic are packet
sniffers. Packet sniffers, also known as protocol or network analyzers, are tools that monitor
and capture network traffic with all content of network traffic. We can use sniffers to obtain
the main information about network traffic, such as packet size, inter-arrival time and the
type and structure of IP protocol. Sniffers have become very important and indispensable
tools for network administrators. Figure 1 shows traffic captured by a packet sniffer.
Any sniffers are able to extract this data from the IP headers. Knowing them, it is then
simple to calculate a length of IP PDU (Protocol Data Unit), which also contains a header of
higher layer protocols. Using an in-depth header analysis, it is possible, in the similar way to
the IP header, to calculate the lengths of all these headers.
An analytical description of network traffic does not exist, because we cannot predict the
size and arrival time of the next packet. Therefore, we can only describe network traffic as a
stochastic process. Hence, we have tried to describe these two stochastic processes (arrival
time and packet size) with the use of Hurst parameter and probability distributions.
2.2 Self-similarity
In the 1990s, new descriptions and models of network’s traffic were developed, which then
replaced the traditional traffic models, such as Poisson and Markov [5], [20]. The Poisson
process was widely used in the past, because it gave a good approximation of telephone
network (PSNT networks), especially when describing times between each call and call
durations. This model is usually described by exponential probability distribution, which is
characterized by the parameter λ (number of events per second). However, these models do
not allow for descriptions of bursts, which are distinctive in today’s network traffic. Such
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 355
Fig. 2. Comparison of self-similar network traffic (left) and synthetic traffic created by
Poisson model (right) on different time scales (100, 10, 1, 0.1 and 0.01s). Self similar traffic
contains bursts on all time scales in contrast to the generated synthetic traffic, based on the
Poisson model, which tends to average on longer time [1].
bursts can be described by a self-similarity model, because it shows bursts over a wide-
range of time scales [1]-[4]. This contrasts the traditional traffic model (Poisson model),
which becomes very smooth during the aggregation process.
2.3 Self-similarity
The definition of self-similarity is usually based on fractals for the standard stationary time
series [5], [6], [21].
Let X = (Xt, t = 0, 1, 2,…) be a covariance stationary stochastic process; that is a process with
a constant mean, finite variance σ2 = E[(Xt – µ)2], with auto-covariance function γ(k) = E[(Xt –
µ)(Xt+k – µ)], that depends only on k. Then the autocorrelation function r(k) is:
γ ( k ) E [( Xt − μ )( Xt + k − μ )]
r( k ) = = , k = 0 ,1, 2 , (1)
σ2 E ( Xt − μ )2
Assume X has an autocorrelation function, which is asymptotically equal to:
The measure of self-similarity is the Hurst parameter (H), which is in a relationship with the
parameter β in equation (3).
β
H =1− (3)
2
Let’s define the aggregation process for the time series [5], [6]:
For each m = 1, 2, 3, … let X(m) = (Xk(m), k = 1,2,..m) denote a new time series obtained by
averaging the original series X over a non-overlapping block of size m. That is, for m=1, 2, 3,
…, X(m) is given by:
1
X k( m ) = ( X km − m +1 + ... + X km ), k = 1, 2 , 3, ... (4)
m
Xk(m) is the process with average mean and autocorrelation function r(m)(k) [6].
The process X is called an exactly second order with parameter H, which represents the
measure of self-similarity if the corresponding aggregated X(m) has the same correlation
structures as X and var( X ( m ) ) = σ 2m− β for all m = 1, 2, … :
r ( m ) ( k ) → r ( k ), m→∞ (6)
It follows from definitions that the process is the second order self-similar in the exact or
asymptotical sense, if their corresponding aggregated process X(m) is the same as X or
becomes indistinguishable from X-at least with respect to their autocorrelation function. The
most striking property in both cases, exact and asymptotical self-similar processes, is that
their aggregated processes X(m) possess a no degenerate correlation structure as m → ∞. This
contrasts with the Poisson stochastic models, where their aggregated processes tend to
second order pure noise as m → ∞:
r( k ) ≈ H ( 2 H − 1)k −2 H − 2 , r →∞ (8)
For values 0.5 < H < 1 autocorrelation function r(k) behavior, in an asymptotic mean, as ck-β
for values 0 < β < 1, where c is constant c > 0, β = 2 - 2H, and we have:
∞
r( k ) = ∞ . (9)
k =−∞
The autocorrelation function decays hyperbolically, as the k increases, which means that
autocorrelation function is non-summable. This is opposite to the property of short-range
dependence (SRD), where the autocorrelation function decays exponentially and the
equation (9) has a finite value. Short and long-range dependence have a common
relationship with the value of the Hurst parameter of the self-similar process [6], [21]:
• 0 < H < 0.5 →SRD - Short Range Dependence
• 0.5 < H < 1 →LRD - Long Range Dependence
α kα
p( x ) = , k ≤ x, α , k > 0 (10)
xα + 1
where parameter α represents the shape parameter, and k represents the local parameter of
distribution (also a minimum possible positive value of the random variable x).
α −1 x
α x −( )α
p( x ) = ⋅ ⋅e k , x ≥ 0, α , k > 0 (11)
k k
where parameter α presents the shape parameter, and k presents the local parameter of
distribution.
Zp [ n] = X p [ n] Yp [ n] , n∈ . (12)
where Xp[n] represents packet size process and Yp[n] represents the packet inter-arrival time.
Packet-size process Xp[n] is defined as a series of packet sizes lPi measured in bits (b) or bytes
(B).
lm ≤ lPi ≤ lMTU
(14)
Packet inter-arrival time process Yp[n] is defined as a series of times between packet arrivals
tPi (time stamps).
{ }
Yp [ n] = t P 2 − t P1 ,..., t Pi − t pi − i ,..., tPn − t Pn − i , 1 ≤ i ≤ n
(15)
{ }
= Δt p1 , Δt p 2 ,..., Δt pi ,..., Δt pn −1 , 1 ≤ i ≤ n
The measured network traffic is packet network traffic, which can be captured using special
software program or hardware devices. For that reason, the measured network traffic is
marked as Zpm[n]. We also define modeled (simulated) network traffic as Zps[n]. We
suppose, that the measured and modeled traffic is statistically equal, denoted by the symbol
≈,
Zpm [ n] ≈ Zps [ n]
(16)
if there are also statistical equalities between a packet size and inter-arrival time processes of
measured, and modeled traffic.
X pm [ n] ≈ X ps [ n]
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 361
and
Ypm [ n] ≈ Yps [ n]
(17)
Let’s define network traffic on higher layers (application) of ISO/OSI model. Data source
network traffic Zd[n] can be described as a composite of data source lengths Xd[n] and data
inter-arrival times Yd[n] processes:
Zd [ n] = Xd [ n] Yd [ n] , n∈
(18)
To provide statistical equality between packet network traffic Zp[n] and data sources
network traffic Zd[n], we have performed a transformation between packet size process
Xp[n] and the process of data length Xd[n] as well as transformation between packet inter-
arrival time Yp[n] and data inter-arrival time Yd[n].
transformation
X pm [ n] ←⎯⎯⎯⎯⎯
→ X d [ n]
⎯⎯⎯⎯⎯⎯
⎯
(19)
transformation
Ypm [ n] ←⎯⎯⎯⎯⎯
→ Yd [ n]
⎯⎯⎯⎯⎯⎯
⎯
(20)
Transformation (19) and (20) allows estimation of packet traffic processes from data source
traffic processes or vice verse.
Fig. 6. Estimating parameter H for self-similar traffic (upper-left) with the variances method
(lower left), R/S method (upper-right) and periodogram method (lower-right) using SELFIS
tool [8].
Fig. 7. For the stochastic process of inter-arrival time, distribution and estimate parameters
of these distributions are chosen based on the histogram (upper left), and cumulative
distribution function (upper right). Differences between empirical and theoretical
distributions in P-P plot (lower left), and deferential distribution (lower right).
described by probability density function (pdf). In the second case, processes of data length
and data inter-arrival time are both described by pdf.
In OPNET Modeler, two standard node models appear [9]:
• Raw Packet Generator (RPG)
• IP station
Raw Packet Generator (RPG) is a traffic source model [16], [27] implemented specially to
generate self-similar traffic, which is based on different fractal point processes (FPP) [41].
Self similar traffic is modeled with an arrival process, which is described by Hurst's
parameter and the distribution probability for packet sizes. This arrival process can be based
on many different parameters, such as Hurst parameter, average arrival rate, fractal onset
time scale, source activity ratio and peak to mean ratio [16]. There are several different
fractal point processes (FPP). In our case, we used the superposition of the fractal renewal
process (Sub-FRP) model, which is defined as the superposition of M independent and
probably identical renewal fractal processes. Each FRP stream is a point renewal processes
and M numbers of independent sources compose the Sub-FRP model. Common inter-arrival
probability density function p(t) of this process is:
γ A−1e −γ t / A 0 ≤ t ≤ A
p(t ) = (21)
−γ γ −( γ +1)
γ e A t t ≥ A
where 1 < γ < 2. Process FRP can be defined as Sup-FRP process, when the number of
independent identical renewal processes (M) is equal to 1. A model Sub-FRP is described by
three parameters: γ, A and M. γ represents the fractal exponent, A is the location parameter,
and M is the number of sources. These three parameters are in relationship with three
OPNET parameters. These parameters are Hurst's average arrival-rate λ, and fractal onset
time-scale (FOTS). The relationships between these three parameters of Sub-FRP and
parameters in OPNET model are:
H = (3 − γ ) / 2
where γ = 2 – β. Hurst parameter H is defined by equation (3). In the Sub-FRP model from
OPNET, we can set Hurst's parameter (H), average arrival-rate (λ) and fractal onset time-
scale (FOTS) in seconds. The recommended value for the parameter FOTS in OPNET is 1
second.
The IP station [16] can contain an arbitrary number of independent simultaneous working-
traffic generators. Each generator enables the use of heavy-tailed distributions, such as
Pareto or Weibull, for the generation of a self-similar network traffic by two distributions,
one for length of a data source process and another for data inter-arrival time process. In our
research, a traffic generator contained in an Ethernet IP station model of the OPNET
Modeler simulation tool is used, as shown in the Figure 8.
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 365
In the IP station model, the traffic generator is placed above the IP encapsulation layer,
which takes care of packets’ formations and fragmentation. This is the process of
segmentation of long data into the shorter packets, or vice versa, according to the RFC 793
[12]. Padding of the packet data payload with additional bits is also performed when data is
shorter than a predefined minimal payload. Because the traffic is modeled, above IP level of
the TCP/IP model, to the lengths of the generated data, 20 bytes of IP header are added. 18
bytes of information for MAC (14bytes) and CRC (4 bytes) are also further added. Structure
of Ethernet frame used in the IP station model. Using this model, the applications’ protocol
does not impact the generated traffic. The model is suitable for the simulation cases, when
we want to statistically model the network traffic, which can be caused by many arbitrary
communications’ applications. Using this approach, we can model such network traffic by
single traffic source.
network traffic Zd[n] is needed (section 2.6) [45]. There are many possibilities to make a
transformation from Zp[n] to Zd[n], which allows estimation of parameters of data source
network traffic processes. We investigated two algorithms [28]:
1. algorithm with an in-depth analysis of all packet headers,
2. algorithm with a coarse inspection of IP header only.
The main differences between them are complexity and the needed execution time. The first
algorithm mimics a complete decapsulation process, and defragmentation in higher layers
of the communication model. Any sniffers are able to extract this data from the IP header.
Knowing them, it is then simple to calculate a length of IP PDU (Protocol Data Unit) which
also contains a header of higher layer protocols. Through the use of an in-depth header
analysis, it is possible, in the similar way as the IP header, to calculate the lengths of all these
headers. Each packed IP header has four the so-called fragmentation fields that contain
information about data fragmentation, which is shown on Figure 9.
Fig. 9. IP header. Shadowed fields are used in the defragmentation process. Legend:
V: protocol version; IHL: Internet Header Length; ToS: Type of Service; TL: Total Length;
ID: Identification Data; F: Flags; FO: Fragment Offset; TTL: Time to Live.
Extensive research and investigation about traffic sources in contemporary networks show
that this approach requires an in-depth analysis of packets (where need specialized, very
powerful and consequently, expensive instruments), which in case of encrypted packets and
non-standard application protocols, is not completely possible. In such cases, it is also
necessary to capture the entire packets, which can be problematic in the high-speed
networks. For these reasons, a simple algorithm has been developed, where only
information of packets sizes, packet time stamps and IP addresses are needed.
The second algorithm skips decapsulation by considering the average lengths of packet
headers and then uses only packet lengths and inter-arrival times. In the second case, the
algorithm offers the estimation of data source network traffic, not the exact reconstructed
data source traffic. The second algorithm represents the main part of method by mimic
defragmentation process, which is described in detail in [45]. The main idea of mimic
defragmentation process method is to compose data from the captured packet traffic,
which is previously fragmented at the transmitter. The data source traffic estimation is
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 367
carried out by finding and summing fragmented packets’ sequences without an in-depth
analysis of packets. Fragmented sequence is defined as a sequence of lMTU sized packets
associated with the same source and destination addresses and terminated by packet
shorter than lMTU.
6. Simulation results
In real networks, we have captured packets of different network traffic through a Wireshark
sniffer. The two different types of measured traffic are used for analysis, modeling and
simulation purposes. These two test traffics are shown in Figure 10.
Table 1. The main properties of captured traffics. On the right side of the table the Hurst
parameter is estimated using different methods for both test traffics.
For each of test traffics, the Hurst parameter has been estimated through different methods.
The Hurst parameters for both cases are bigger than 0.5, so we can classify these test traffics
368 Telecommunications Networks – Current Status and Future Trends
as a self-similar network traffic. Table 1 contains the estimated parameters H for both
traffics, which are estimated by variance, R/S and periodogram methods. We also
conducted tests about short and long-range dependence. In the case of the first test traffic,
the autocorrelation function decayed hyperbolically, which means, that this traffic can have
the property of a long-range dependence. For the second test traffic autocorrelation,
function decayed exponentially towards 0. For this case, the sum of autocorrelations has
finite results and, therefore, the test traffic 2 has the property of short-range dependence.
For both test traffics (test traffic 1 and test traffic 2) we estimate distribution and its
parameters for data source traffic processes for simulation purpose. For that reason, we
made an estimation of data source traffic from the captured packet traffic through the mimic
defragmentation process method [45]. For both test traffics, the suitably heavy (Pareto or
Weibull) and also light-tailed (exponential) distributions are chosen.
Based on the estimated distribution parameters for both measured test traffic (test traffic 1
and test traffic 2), we generated self-similar traffic in the OPNET simulation tool with two
different station types – RPG and IP stations. We have created six different scenarios for
each of test traffic. In the first two scenarios, the network traffic is generated by an RPG
station, where a self-similarity is described by Hurst parameter. During the first scenario,
we use heavy-tailed distribution for the data size process, while in the second a light-tailed
distribution (exponential) is used. In the next four scenarios, network traffic is generated
using the IP station, where we use different combination's distributions for the data size
process and data inter-arrival time. One of the criterions, for successful modeling, is the
difference between bit and packet-rates of the test traffic and modeled traffic in OPNET
simulation tool. Besides the average values of bit and packet-rates, the more important
criteria are also bursts’ intensity within the network traffic. For each of test traffics (test
traffic 1 and test traffic 2), the traffic which best represents the measured test traffic is chosen
from six modeled traffics.
Test traffic 1 poses the property of long-range dependence, so there are a lot of bursts in the
traffic. We model this measured-test traffic over six different scenarios. The results are
shown in Figure 6 and Table 2. Table 2 shows the main properties of measured test traffic 1
and estimated distribution parameters which were used in OPNET simulation tool for
simulating network traffic (the left side of Table 2). Table 2 (the right side) also shows main
properties of simulated network traffics (six different scenarios) in OPNET simulation tool
based on estimated distributions.
Table 2 shows modeling results for test traffic 1 over six different scenarios in OPNET
simulation tool. There are estimated statistical parameters such as Hurst parameters and
distributions used in models and simulation results using these models. Figure 11 shows all
six modeled traffic traffics generated by OPNET, with estimated distributions and
parameters from Table 2.
The best approximation for test traffic 1 is modeled traffic 5 from Table 2, which is described
by Pareto distribution for data size process and Weibull distribution for data inter-arrival
time. Figure 12 shows a comparison between the second test traffic and the modeled traffic 5
for bit rates. From all critera after comparison, we can say that the modeled traffic 5 is a
good approximation of measured test traffic 1.
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 369
Fig. 11. Modeling measured test traffic 1 in OPNET simulation tool with six different
estimated parameters from Table 2 (scenario 1 and 2 with RPG station, scenario 3, 4, 5, 6
with IP station).
370 Telecommunications Networks – Current Status and Future Trends
Fig. 12. Comparison between the modeled traffic 5 generated in OPNET simulation tool and
the measured test traffic 1 in bits per second (kb/s).
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 371
Test traffic 2 is also modeled over six different scenarios, just like in the first case. Table 3
shows the main properties of measured test traffic 2 and estimated distribution parameters
which were used in OPNET simulation tool for simulating network traffic (left side of Table
3). Table 3 (right side) also shows main properties of simulated network traffics (six different
scenarios) in OPNET simulation tool.
As the best modeled traffic of test traffic 2 from all six cases (Table 3), we choose the case
where simulated traffic is described by the exponential distribution for packet sizes and
Weibull heavy-tailed distribution for inter-arrival time (modeled traffic 4). The bit-rate of
this traffic is 33.27 (p/s) and packet-rate is 126.79 (kb/s), which are very close to the
measured values. The Hurst parameter of the simulated traffic is 0.58, which is also close to
the estimated values of the measured traffic. Figure 13 shows the comparison between the
measured test traffic 2 and the best-modeled traffic (modeled traffic 4) for bit rates. From all
critera after comparison, we can say that the simulated traffic is a good approximation of the
measured traffic 2.
Table 3. The left side of table shows the estimated distributions and parameters for
measured test traffic 2 (six different distribution combinations). The right side of table
shows main properties of modeled network traffic in OPNET simulation tool (six scenarios),
where estimated distributions and its parameters were used.
372 Telecommunications Networks – Current Status and Future Trends
Fig. 13. Comparison between modeled traffic 4 generated in OPNET simulation tool and
measured test traffic 2 in bits per second (kb/s).
7. Conclusion
In this chapter, we present our research in the area of measurements, modeling and
simulations of the self-similar network traffic. Firstly, the state of the art method for
modeling and simulating of self-similar network traffic is presented. We also describe a
number of facts about self-similarity, long range dependences and probability, which are
used to describe such stochastic processes. Described as well are the mechanism and models
to simulate network traffic in the OPNET Modeler simulation tool. The main goal of our
research is to simulate measured network traffic, where we tend to minimize discrepancies
between the measured and the simulated network traffic in the sense of packet-rate, bit-rate,
bursts intensity, and variances. One of the big challenges in our research work was to find
appropriate method to estimate parameters of data source network traffic processes that are
based on measured network packet's traffic. The estimated parameters are needed during
the modeling of the measured network traffic in the simulation tool. For those reasons, we
have developed different methods, which allow estimation of the parameters of data source
network traffic processes, based on the measured network packet's traffic.
At the end of the chapter, all phases needed for simulating the measured network traffic in
the OPNET simulation tool are presented. During the analysis phase we pay attention to the
self-similar property, which has become the basic model for describing today’s network
traffic. In the network traffic theory, the properties of short and long-range dependence are
directly prescribed by the values of estimated parameter H. In our network traffic analysis,
we prove that network traffic (test traffic 2) can exist where Hurst parameter is bigger than
0.5, but this process does not have the property of a long-range dependence.
For the purpose of parameters estimation of data source network traffic processes, we have
used a method that mimics packet defragmentation. Through the use of this method we
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 373
offer estimated parameters, used in simulations, where six traffics are simulated by different
distributions for each of the measured test traffic. It can be seen from simulations that in the
case of modeling self-similar traffic, short-range dependence is more appropriate for
choosing exponential distribution to describe a packet-size process. The exponential
distribution does not impact the extreme peaks in the modeled traffic. Pareto distribution is
unsuitable for this purpose.
Heavy-tailed distributions, especially Pareto, are suitable for modeling a packet-size process
of the measured network traffic, which are self-similar and also have the property of a long-
range dependence (test traffic 1).
There are discrepancies between the measured and the modeled traffics in the sense of
packet-rate, bit-rate, bursts intensity, and variances. With a method which mimics
defragmentation, a good approximation of the measured network traffic is obtained. We
cannot claim that this is the optimal method for all situations, because there are some
limitations, although it shows good results through simulation in OPNET Modeler. We have
noticed that estimating the shape-parameter of Pareto is very delicate, because a small
deviation in the parameter causes large discrepancies regarding the network traffic’s
average values, which is one of the important criteria for traffic modeling.
8. Acknowledgment
This work has been partly financed by the Slovenian Ministry of Defense as part of the
target research program "Science for Peace and Security”: M2-0140 - Modeling of Command
and Control information systems, and partly by the Slovenian Ministry of Higher Education
and Science, research program P2-0065 "Telematics".
9. References
[1] W. E. Leland, M. S. Taqqu, W. Willinger and D. V. Wilson, On the self-similar nature of
Ethernet traffic (Extended version), IEEE/ACM Transactions on Networking, Vol.2,
pp.1-15, 1994.
[2] W. Willinger and V. Paxson, Where mathematics meets the Internet, Notices of the
American Mathematical Society, 45(8): 961–970, 1998.
[3] K. Park, G. Kim and M. E. Crovella, On the Relationship Between File Sizes Transport
Protocols, and Self-Similar Network Traffic, International Conference on Network
Protocols, 171–180, Oct 1996.
[4] M. E. Crovella and A. Bestavros, Self-Similarity in World Wide Web Traffic Evidence
and Possible Causes, IEEE/ACM Transactions on Networking, 1997.
[5] O. Sheluhin, S. Smolskiy and A. Osin, Self-Similar Processes in Telecommunications,
John Wiley & Sons, 2007.
[6] K. Park and W. Willinger, Self-Similar Network Traffic and Performance Evaluation,
John Wiley & Sons, 2000.
[7] T. Karagiannis, M. Molle and M. Faloutos, Understanding the limitations of estimation
methods for long-range dependence, University of California.
[8] T. Karagiannis and M. Faloutos, Selfis: A tool for self-similarity and long range
dependence analysis, University of California.
374 Telecommunications Networks – Current Status and Future Trends
[9] M. Fras, J. Mohorko and Ž. Čucej, Estimating the parameters of measured self similar
traffic for modeling in OPNET, IWSSIP Conference, 27.-30 June 2007, Maribor,
Slovenia.
[10] J. Mohorko and M. Fras, Modeling of IRIS Replication Mechanism in a Tactical
Communication network, using OPNET, Computer Networks, v 53, n 7, p 1125-36,
13 May 2009.
[11] J. Mohorko, M. Fras and Ž. Čucej: Modeling of IRIS replication mechanism in tactical
communication network with OPNET, OPNETWORK 2007 - the eleventh annual
OPNET technology Conference, August 27th-31st, Washington, D.C., 2007.
[12] RFC 793 - Transmission Control Protocol:. [Online]. Available:
http://www.faqs.org/rfcs/rfc793.html
[13] M. Chakravarti, R. G. Laha and J. Roy, Handbook of Methods of Applied Statistics,
Volume I, John Wiley and Sons, pp. 392-394, 1967.
[14] W. T. Eadie, D. Drijard, F. E. James, M. Roos and B. Sadoulet, Statistical Methods in
Experimental Physics, Amsterdam, North-Holland, 269-271, 1971.
[15] A. Adas, Traffic Models in Broadband Telecommunication Networks, Communications
Magazine, IEEE , vol 35/7, 82–89, 1997.
[16] J. Potemans, B. Van den Broeck, Y. Guan, J. Theunis, E. Van Lil and A. Van de Capelle,
Implementation of an Advanced Traffic Model in OPNET Modeler, OPNETWORK
2003, Washington D.C., USA, 2003.
[17] B. Hill, A Simple Approach to Inference About tbc Tail of a Distribution, Annals of
Statistics, Vol. 3, No. 5, 1975, pp.1163-1174.
[18] J. Judge, H. W. Beadle and J. Chicharo, Sampling HTTP response packets for prediction
of web traffic volume statistics, IEEE Global Communications Conference
(GLOBECOM'98), Sydney, Australia, Nov. 8-12, 1998.
[19] K. Park, G. Kim and M. E. Crovella, On the Relationship Between File Sizes Transport
Protocols, and Self-Similar Network Traffic, International Conference on Network
Protocols, 171–180, Oct 1996.
[20] V. Paxon and S. Floyd, Wide area traffic: the failure of Poisson modeling, IEEE/ACM
Transactions on Networking, 3(3): 226–244, 1995.
[21] H. Yõlmaz, IP over DVB: Managment of self-similarity, Master of Science, Boğaziçi
University, 2002.
[22] B. Vujičić, Modeling and Characterization of Traffic in Public Safety Wireless Networks,
Master of Applied science, Simon Fraser University, Vancouver, 2006.
[23] M. Jiang, S. Hardy in Lj. Trajkovic, Simulating CDPD networks using OPNET,
OPNETWORK 2000, Washington D.C., August 2000.
[24] J. Mohorko, M. Fras and Ž. Čučej, Modeling methods in OPNET simulations of tactical
command and control information systems, IWSSIP Conference, 27.-30 June 2007,
Maribor, Slovenia.
[25] A. M. Law and M. G. McComas, How the Expertfit distribution fitting software can
make simulation models more valid, Proceedings of the 2001 Winter Simulation
Conference.
[26] Free (demo) fitting tool EasyFit software [Online]. Available: www.mathwave.com/.
Modeling and Simulating the Self-Similar Network Traffic in Simulation Tool 375
[27] F. Xue and S. J. Ben Yoo, On the Generation and Shaping Self-similar Traffic in Optical
Packet-switched Networks, OPNETWORK 2002, Washington D.C., USA, 2002.
[28] Ž. Čučej and M.Fras, Data source statistics modeling based on measured packet traffic :
a case study of protocol algorithm and analytical transformation approach,
TELSIKS 2009, 9th International Conference on Telecommunications in Modern
Satellite, Cable and Broadcasting Services, Serbia, Niš, 7-9 October, 2009.
[29] M. Fras, J. Mohorko and Ž. Čučej, Analysis, modeling and simulation of P2P file sharing
traffic impact on networks’ performances. Inf. MIDEM, 38(2):117–123, 2008.
[30] H. Abrahamsson, Traffic measurement and analysis, Swedish Institute of Computer
Science, 1999.
[31] C. Williamson, Internet traffic measurement, IEEE internet computing, vol. 5, no. 6, pp.
70–74, 2001.
[32] P. Celeda, High-speed network traffic acquisition for agent systems, in Proc.
IEEE/WIC/ACM International Conference on High-Speed Network Traffic
Acquisition for Agent Systems, Intelligent Agent Technology, November 2-5, 2007,
pp. 477–480.
[33] D. Pezaros, Network Traffic Measurement for the Next Generation Internet. Computing
Department Lancaster University, 2005.
[34] D. Epema, J. Pouwelse, P. Garbacki and H. Sips, The bittorrent P2P filesharing system:
Measurements and analysis. Peer-to-Peer Systems IV, 2005.
[35] S. Saroiu, P. K. Gummadi and S. D. Gribble, A Measurement Study of Peer-to-Peer File
Sharing Systems, in Proc. of the Multimedia Computing and Networking (MMCN),
January 2-5, San Jose, Ca, USA, 2002.
[36] E. Asensio, J. M. Orduna and P. Morillo, Analyzing the Network Traffic Requirements
of Multiplayer Online Games, in Proc. 2nd International Conference on Advanced
Engineering Computing and Applications in Sciences: ADVCOMP’08, 2008, pp.
229–234.
[37] Y. Yu, D. Liu, J. Li and C. Shen, Traffic Identification and Overlay Measurement of
Skype, in Proc. International Conference on Computational Intelligence and
Security, November 3-6, vol. 2, 2006, p. 1043 – 1048.
[38] M. E. Crovella and L. Lipsky, Long-lasting transient conditions in simulations with
heavy-tailed workloads, in Proc. 1997 Winter Simulation Conference, December 7-
10, vol. Atlanta, GA, USA, Edmonton, Canada, 1997.
[39] A. Feldmann, A. C. Gilbert, P. Huang and W. Willinger, Dynamics of IP traffic: a study
of the role of variability and the impact of control, in Proc. Applications,
technologies, architectures, and protocols for computer communication, August 30-
September 03, Cambridge, Massachusetts, USA, 1999, pp. 301–313.
[40] C. Nuzman, I. Saniee, W. Sweldens and A. Weiss, A compound model for TCP
connection arrivals for LAN and WAN applications, Computer Networks: The
International Journal of Computer and Telecommunications Networking, vol. 40,
no. 3, pp. 319–337, 2002.
[41] B. Ryu and S. Lowen. Fractal Traffic Model for Internet Simulation. In Proc. 5th IEEE
Symposium on Computers and Communications (ISCC 2000), 2000.
376 Telecommunications Networks – Current Status and Future Trends
[42] M. Fras, Methods for the statistical modeling of measured network traffic for simulation
purposes, Ph.D. thesis, 2009, Maribor, Slovenia.
[43] http://en.wikipedia.org/wiki/Pareto_distribution.
[44] http://en.wikipedia.org/wiki/Weibull_distribution.
[45] M. Fras, J. Mohorko and Ž. Čučej, Modeling of captured network traffic by the mimic
defragmentation process, Simulation: Transactions of The Society for Modeling
and Simulation International, San Diego, USA, Published online 20 September
2010.
[46] M. Fras, J. Mohorko and Ž. Čučej, Modeling of measured self-similar network traffic in
OPNET simulation tool, Inf. MIDEM, 40(3): 224-231, September 2010.
Part 6
Routing
16
1. Introduction
Fluid models are powerful tools for evaluating the performance of packet telecommunication
networks. By masking the complexity of discrete packet based systems, fluid models are in
general easier to analyze and yield simple dimensioning formulas. Among fluid queuing
systems, those with arrival rates modulated by Markov chains are very efficient to capture
the burst structure of packet arrivals, notably in the Internet because of bulk data transfers.
By exploiting the Markov property, very efficient numerical algorithms can be designed to
estimate performance metrics such as the overflow probability, the delay of a fluid particle or
the duration of a busy period.
In the last decade, stochastic fluid models and in particular Markov driven fluid queues,
have received a lot of attention in various contexts of system modeling, e.g. manufacturing
systems (see Aggarwal et al. (2005)), communication systems (in particular TCP modeling;
see vanForeest et al. (2002)) or more recently peer to peer file sharing process (see Kumar et al.
(2007)) and economic systems (risk analysis; see Badescu et al. (2005)). Many techniques exist
to analyze such systems.
The first studies of such queuing systems can be dated back to the works by Kosten
(1984) and Anick et al. (1982), who analyzed fluid models in connection with statistical
multiplexing of several identical exponential on-off input sources in a buffer. The above
studies mainly focused on the analysis of the stationary regime and have given rise to a
series of theoretical developments. For instance, Mitra (1987) and Mitra (1988) generalize
this model by considering multiple types of exponential on-off inputs and outputs. Stern &
Elwalid (1991) consider such models for separable Markov modulated rate processes which
lead to a solution of the equilibrium equations expressed as a sum of terms in Kronecker
product form. Igelnik et al. (1995) derive a new approach, based on the use of interpolating
polynomials, for the computation of the buffer overflow probability.
Using the Wiener-Hopf factorization of finite Markov chains, Rogers (1994) shows that the
distribution of the buffer level has a matrix exponential form, and Rogers & Shi (1994) explore
algorithmic issues of that factorization. Ramaswami (1999) and da Silva Soares & Latouche
(2002), Ahn & Ramaswami (2003) and da Silva Soares & Latouche (2006) respectively exhibit
380
2 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
and exploit the similarity between stationary fluid queues in a finite Markovian environment
and quasi birth and death processes.
Following the work by Sericola (1998) and that by Nabli & Sericola (1996), Nabli (2004)
obtained an algorithm to compute the stationary distribution of a fluid queue driven by a finite
Markov chain. Most of the above cited studies have been carried out for finite modulating
Markov chains.
The analysis of a fluid queue driven by infinite state space Markov chains has also been
addressed in many research papers. For instance, when the driving process is the M/M/1
queue, Virtamo & Norros (1994) solve the associated infinite differential system by studying
the continuous spectrum of a key matrix. Adan & Resing (1996) consider the background
process as an alternating renewal process, corresponding to the successive idle and busy
periods of the M/M/1 queue. By renewal theory arguments, the fluid level distribution is
given in terms of integral of Bessel functions. They also obtain the expression of Virtamo and
Norros via an integral representation of Bessel functions. Barbot & Sericola (2002) obtain an
analytic expression for the joint stationary distribution of the buffer level and the state of the
M/M/1 queue. This expression is obtained by writing down the solution in terms of a matrix
exponential and then by using generating functions that are explicitly inverted.
In Sericola & Tuffin (1999), the authors consider a fluid queue driven by a general Markovian
queue with the hypothesis that only one state has a negative drift. By using the differential
system, the fluid level distribution is obtained in terms of a series, which coefficients are
computed by means of recurrence relations. This study is extended to the finite buffer case
in Sericola (2001). More recently, Guillemin & Sericola (2007) considered a more general
case of infinite state space Markov process that drives the fluid queue under some general
uniformization hypothesis.
The Markov chain describing the number of customers in the M/M/1 queue is a specific birth
and death process. Queueing systems with more general modulating infinite Markov chain
have been studied by several authors. For instance, van Dorn & Scheinhardt (1997) studied a
fluid queue fed by an infinite general birth and death process using spectral theory.
Besides the study of the stationary regime of fluid queues driven by finite or infinite Markov
chains, the transient analysis of such queues has been studied by using Laplace transforms
by Kobayashi & Ren (1992) and Ren & Kobayashi (1995) for exponential on-off sources. These
studies have been extended to the Markov modulated input rate model by Tanaka et al. (1995).
Sericola (1998) has obtained a transient solution based on simple recurrence relations, which
are particularly interesting for their numerical properties. More recently, Ahn & Ramaswami
(2004) use an approach based on an approximation of the fluid model by the amounts of work
in a sequence of Markov modulated queues of the quasi birth and death type. When the
driving Markov chain has an infinite state space, the transient analysis is more complicated.
Sericola et al. (2005) consider the case of the M/M/1 queue by using recurrence relations and
Laplace transforms.
In this paper, we analyze the transient behavior of a fluid queue driven by a general ergodic
birth and death process using spectral theory in the Laplace transform domain. These results
are applied to the stationary regime and to the busy period analysis of that fluid queue.
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 3813
2. Model description
2.1 Notation and fundamental system
Throughout this paper, we consider a queue fed by a fluid traffic source, whose instantaneous
transmitting bit rate is modulated by a general birth and death process (Λt ) taking values in
N = {0, 1, 2, . . .}. The input rate is precisely r (Λt ), where r is a given increasing function from
N into R.
The birth and death process (Λt ) is characterized by the infinitesimal generator given by the
infinite matrix ⎛ ⎞
− λ0 λ0 0 . .
⎜ μ1 −(λ1 + μ1 ) λ1 . .⎟
A=⎜ ⎝ 0
⎟, (1)
μ2 −(λ2 + μ2 ) λ2 . ⎠
. . . . .
where λi > 0 for i ≥ 0 is the transition rate from state i to state i + 1 and μ j > 0 for j ≥ 1 is the
transition rate from state j to state j − 1.
We assume that the birth and death process (Λt ) is ergodic, which amounts to assuming (see
Asmussen (1987) for instance) that
∞ ∞
1
∑ λi πi = ∞ and ∑ πi < ∞, (2)
i =0 i =0
λ0 . . . λ i −1
π0 = 1 and πi = , fori ≥ 1.
μ1 . . . μ i
Under the above assumption, the birth and death process (Λt ) has a unique invariant
probability measure: in steady state, the probability of being in state i is
πi
p (i ) = ∞ .
∑ πj
j =0
Let p0 (i ) denote, for i ≥ 0, the probability that the birth and death process (Λt ) is in state i at
time 0, i.e., P (Λ0 = i ) = p0 (i ). Note that if p0 (i ) = p(i ) for all i ≥ 0, then P (Λt = i ) = p(i )
for all t ≥ 0 and i ≥ 0.
We assume that the queue under consideration is drained at constant rate c > 0. Furthermore,
we assume that r (i ) > c when i is greater than a fixed i0 > 0 and that r (i ) < c for 0 ≤ i ≤ i0 .
(It is worth noting that we assume that r (i ) = c for all i ≥ 0 in order to exclude states with no
drift and thus to avoid cumbersome special cases.) In addition, the parameters c and r (i ) are
such that
∞
r (i )
ρ=∑ p (i ) < 1 (3)
i =0
c
so that the system is stable. The quantity ri = r (i ) − c is either positive or negative and is the
net input rate when the modulating process (Λt ) is in state i.
382
4 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
Let Xt denote the buffer content at time t. The process ( Xt ) satisfies the following evolution
equation: for t ≥ 0, ⎧
dXt ⎨ r (Λt ) − c if Xt > 0 or r (Λt ) > c,
= (4)
dt ⎩
0 if Xt = 0 and r (Λt ) ≤ c.
∂
f i (t, x ) = P (Λt = i, Xt ≤ x ).
∂x
As shown in Sericola (1998), on top of its usual jump at point x = 0, when X0 = x0 ≥ 0,
the distribution function P (Λt = i, Xt ≤ x ) has a jump at points x = x0 + ri t, for t such that
x0 + ri t > 0, which corresponds to the case when the Markov chain {Λt } starts and remains
during the whole interval [0, t) in state i.
We focus in the rest of the paper on the probability density function f i (t, x ) for x > 0 along
with its usual jump at point x = 0. A direct consequence of the evolution equation (4) is the
forward Chapman-Kolmogorov equations satisfied by ( f i (t, x ), x ≥ 0, i ∈ N ), which form
the fundamental system to be solved.
Proposition 1 (Fundamental system). The functions ( x, t) → f i (t, x ) for i ∈ N satisfy the
differential system (in the sense of distributions):
∂ fi ∂
= −ri { i > i0 } + { i ≤ i0 } { x >0} f i − ( λ i + μ i ) f i + λ i −1 f i −1 + μ i +1 f i +1 , (5)
∂t ∂x
with the convention λ−1 = 0, f −1 ≡ 0 and f i (t, x ) = 0 for x < 0.
Note that the differential system (5) holds for the density probability functions f i (t, x ). The
differential system considered in Parthasarathy et al. (2004) and van Dorn & Scheinhardt
(1997) governs the probability distribution functions P ( Xt ≤ x, Λt = i ), i ≥ 0. The differential
system (5) is actually the equivalent of Takács’ integro-differential formula for the M/G/1
queue, see Kleinrock (1975). The resolution of this differential system is addressed in the next
section.
(0)
and define the functions f i (ξ ) and hi (s) for i ∈ N as follows
∞
(0)
fi (ξ ) = e− xξ P {Λ0 = i, X0 ∈ dx }
0
∞
hi ( s ) = e−st P {Λt = i, Xt = 0}dt.
0
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 3835
(0)
The functions f i are related to the initial conditions of the system and are known functions.
For i > i0 , we have P {Λt = i, Xt = 0} = 0, which implies that hi (s) = 0, for i > i0 . On the
contrary, for i ≤ i0 , the functions hi are unknown and have to be determined by taking into
account the dynamics of the system.
By taking Laplace transforms in Equation (5), we obtain the following result.
Proposition 2. Let F (s, ξ ), f (0) , and h(s) be the infinite column vectors, which components are
(0)
Fi (s, ξ )/πi , f i /πi , and hi (s)/πi for i ≥ 0, respectively. Then, these vectors satisfy the matrix
equation
(sI + ξR − A) F (s, ξ ) = f (0) (ξ ) + ξRh(s), (6)
where I is the identity matrix, A is the infinitesimal generator of the birth and death process {Λt }
defined by Equation (1), and R is the diagonal matrix with diagonal elements ri , i ≥ 0.
(0)
Proof. Taking the Laplace transform of ∂ f i /∂t gives rise to the term sFi − f i . In the same
way, taking the Laplace transform of ∂( { x>0} f i )/∂x yields the term ξ Fi − ξhi . Hence, taking
Laplace transforms in Equation (5) and dividing all terms by πi gives, for i ≥ 0,
(0)
Fi f F h F F F
s − i = − r i ξ i + r i ξ i − ( λ i + μ i ) i + λ i i +1 + μ i i −1 ,
πi πi πi πi πi π i +1 π i −1
When we consider the stationary regime of the fluid queue, we have to set f (0) (ξ ) ≡ 0 and
eliminate the term sI in Equation (6), which then becomes
In the following, we use the orthogonal polynomials Qi (s; x ) defined by recursion: Q0 (s; x ) ≡
1, Q1 (s; x ) = (s + λ0 − r0 x )/λ0 and for i ≥ 1,
384
6 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
λi s + λi + μi μ
Qi+1 (s; x ) + x − Qi (s; x ) + i Qi−1 (s; x ) = 0. (8)
|ri | |ri | |ri |
By suing Favard’s criterion (see Askey (1984) for instance), it is easily checked that the
polynomials Qi (s; x ) for i ≥ 0 form an orthogonal polynomial system.
α1 ( s )
F (s; z) = , (9)
α2 ( s )
z+
α3 ( s )
1+
α4 ( s )
z+
.
1 + ..
where the coefficients αk (s) are such that α1 (s) = 1, α2 (s) = (s + λ0 )/|r0 |, and for k ≥ 1,
λ k −1 μ k s + λk + μk
α2k (s)α2k+1 (s) = , α2k+1 (s) + α2(k+1) (s) = . (10)
| r k −1 r k | |r k |
As a consequence of the above lemma, there exists a unique bounded, increasing function
ψ(s; x ) in variable x such that
∞ 1
F (s; z) = ψ(s; dx ).
0 z+x
The polynomials Qn (s; x ) are orthogonal with respect to the measure ψ(s; dx ) and satisfy the
orthogonality relation
∞ |r0 |
Qi (s; x ) Q j (s; x )ψ(s; dx ) = δ (11)
0 |ri |πi i,j
As a consequence, it is worth noting that the polynomial Qi (s; x ) has i real, simple and positive
roots.
It is possible to associate with the polynomials Qi (s, x ) a new class of orthogonal polynomials,
referred to as associated polynomials and denoted by Qi (i0 + 1; s; x ) and satisfying the
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 3857
The polynomials Qi (i0 + 1; s; z) are related to the denominator of the continued fraction
1
Fie0 (z) = λ i0 +1 μ i0 +2
s + λ i0 +1 + μ i0 +1 r i0 +1 r i0 +2
z+ r i0 +1 − λ i0 +2 μ i0 +3
s + λ i0 +2 + μ i0 +2 r i0 +2 r i0 +3
z+ r i0 +2 −
s + λ i0 +3 + μ i0 +3 .
z+ | r i0 +3 |
− ..
which is the even part of the continued fraction Fi0 (z) defined by
β 1 (s)
Fi0 (s; z) = , (13)
β 2 (s)
z+
β 3 (s)
1+
β 4 (s)
z+
.
1 + ..
where the coefficients β k (s) are such that
β 1 (s) = 1, β 2 ( s ) = ( s + λ i0 +1 + μ i0 +1 ) / | r i0 +1 | ,
and for k ≥ 1,
λ i0 + k μ i0 + k +1
β 2k (s) β 2k+1 (s) = ,
r i0 + k r i0 +1+ k
(14)
s + λ i0 +1+ k + μ i0 +1+ k
β 2k+1 (s) + β 2(k+1) (s) = .
r i0 +1+ k
Since the continued fraction F (s; z) is a converging Stieltjes fraction, it is quite clear that the
continued fraction Fi0 (s; z) defined by Equation (13) is a converging Stieltjes fraction for all
s ≥ 0. There exists hence a unique bounded, increasing function ψ[i0 ] (s; x ) in variable x such
that
∞ 1
Fi0 (s; z) = ψ[i0 ] (s; dx ).
0 z + x
The polynomials Qi (i0 + 1; s; x ) are orthogonal with respect to the measure ψ[i0 ] (s; dx ) and
satisfy the orthogonality relation
∞ r i0 +1 π i0 +1
Qi (i0 + 1; s; x ) Q j (i0 + 1; s; x )ψ[i0 ] (s; dx ) = δ .
0 ri0 +1+i πi0 +1+i i,j
386
8 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
We show in this section how to solve the matrix Equation (6). In a first step, we solve the i0 + 1
first linear equations.
Lemma 2. The functions Fi (s, ξ ), for i ≤ i0 , are related to function Fi0 +1 (s, ξ ) as follows: for ξ =
ζ k (s), k = 0, . . . , i0 ,
where the ζ k (s) are the roots of the polynomial Qi0 +1 (s; x ) defined by Equation (8) and the measure
ψ[i0 ] (s; dx ) is defined by Equation (45) in Appendix A.
Proof. Let I [i0 ] , A[i0 ] and R[i0 ] denote the matrices obtained from the infinite identity matrix,
the infinite matrix A defined by Equation (1) and the infinite diagonal matrix R by deleting the
rows and the columns with an index greater than i0 , respectively. Denoting by F[i0 ] , h[i0 ] and
(0)
f [i0 ] the finite column vectors which ith components are Fi /πi , hi /πi and f i /πi , respectively
for i = 0, . . . , i0 , Equation (6) can be written as
λ i0
(sI [i0 ] + ξR[i0 ] − A[i0 ] ) F[i0 ] = f [i0 ] + ξR[i0 ] h[i0 ] + F e ,
π i0 +1 i0 +1 i0
where ei0 is the column vector with all entries equal to 0 except the i0 th one equal to 1.
Since r (i ) < c for all i ≤ i0 , the matrix R[i0 ] is invertible and the above equation can be
rewritten as
λ i0
ξI [i0 ] + R− 1
(sI [i0 ] − A[i0 ] ) F[i0 ] = R− 1
f + ξh[i0 ] + F e .
[ i0 ] [ i0 ] [ i0 ] r i0 π i0 +1 i0 +1 i0
From Lemma 6 proved in Appendix B, we know that the operator associated with the finite
matrix (ξI [i0 ] + R− 1
[ i0 ]
(sI [i0 ] − A[i0 ] )) is selfadjoint in the Hilbert space Hi0 = Ci0 +1 equipped
with the scalar product
i0
(c, d)i0 = ∑ c k d k |r k | π k .
k =0
−1 −1
F[i0 ] = ξI [i0 ] + R− 1
[ i0 ]
(sI [i0 ] − A[i0 ] ) R− 1
f + ξ ξI [i0 ] + R−
[ i0 ] [ i0 ]
1
[ i0 ]
(sI [i0 ] − A[i0 ] ) h [ i0 ]
λ i0 −1
+ F ξI [i0 ] + R− 1
(sI [i0 ] − A[i0 ] ) ei0 .
r i0 π i0 +1 i0 +1 [ i0 ]
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 3879
By introducing the vectors Q[i0 ] (s, ζ k (s)) for k = 0, . . . , i0 defined in Appendix B, the column
vector ei with all entries equal to 0 except the ith one equal to 1 can be written as
|r j | π j ∞
ej = Q j (s, x ) Q[i0 ] (s, x )ψ[i0 ] (s; dx )
|r0 | 0
where the measure ψ[i0 ] (s; dx ) is defined by Equation (45). Since the vectors Q[i0 ] (s, ζ k (s)) are
such that
−1 1
ξI [i0 ] + R− 1
(sI [i0 ] − A[i0 ] ) Q[i0 ] (s, ζ k (s)) = Q (s, ζ k (s)),
[i ] 0 ξ − ζ k ( s ) [ i0 ]
we deduce that
−1 |r j | π j ∞ Q j (s, x )
ξI [i0 ] + R− 1
[i ]
(sI [i0 ] − A[i0 ] ) ej = Q[i0 ] (s, x )ψ[i0 ] (s; dx )
0 |r0 | 0 ξ−x
−1 i0 |r j | π j ∞ Q j (s, x )
ξI [i0 ] + R− 1
[i ]
(sI [i0 ] − A[i0 ] ) f = ∑ fj Q[i0 ] (s, x )ψ[i0 ] (s; dx )
0
j =0
|r0 | 0 ξ−x
−1 i0 |r j | π j ∞ Q j (s, x ) Qi (s, x )
( ξI [i0 ] + R− 1
[i ]
(sI [i0 ] − A[i0 ] ) f )i = ∑ fj ψ[i0 ] (s; dx )
0
j =0
|r0 | 0 ξ−x
π i0 + i +1 ∞ Qi (i0 + 1; s; x ) [i0 ]
Fi0 +i+1 (s, ξ ) = λi0 F (s, ξ ) ψ (s; dx )
r i0 +1 π i0 +1 i0 0 ξ+x
where the measure ψ[i0 ] (s; dx ) is the orthogonality measure of the associated polynomials Qi (i0 +
1; s; x ), i ≥ 0.
Proof. Let I [i0 ] , A[i0 ] and R[i0 ] denote the matrices obtained from I, A and R by deleting the first
(i0 + 1) lines and columns, respectively. The infinite matrix ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) induces in
the Hilbert space H i0 defined by
388
10 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
∞
N
H =i0
( fn ) ∈ C : ∑ | fn | 2
r i0 + n +1 π i0 + n +1 < ∞
n =0
and equipped with the scalar product
∞
( f , g) = ∑ f n g n r i0 + n +1 π i0 + n +1 ,
n =0
where gn is the conjugate of the complex number gn , an operator such that for f ∈ H i0
The above operator is symmetric in H i0 . To show that this operator is selfadjoint, we have
to prove that the domains of this operator and its adjoint coincide. In Guillemin (2012), it
is shown that given the special form of the operator under consideration, this condition is
equivalent to the convergence of the Stieltjes fraction defined by Equation (13) and if this is
the case, the spectral measure is the orthogonality measure ψ[i0 ] (s; dx ). Since the continued
fraction Fi0 (s; z) is a converging Stieltjes fraction, the above operator is hence selfadjoint.
Let Q[i0 ] (s; x ) the column vector which ith entry is Qi (i0 + 1; s; x ). This vector is in H i0 if
de f
and only if Q[i0 ] (s; x )2 = ( Q[i0 ] (s; x ), Q[i0 ] (s; x )) < ∞. If it is the case, then the measure
ψ[i0 ] (s; dx ) has an atom at point x with mass 1/ Q[i0 ] (s; x )2 . Otherwise, the vector Q[i0 ] (s; x )
is not in H i0 but from the spectral theorem we have
⊕
H i0 = Hxi0 ψ[i0 ] (s; dx )
where Hxi0 is the vector space spanned by the vector Q[i0 ] (s; x ) for x in the support of the
measure ψ[i0 ] (s; dx ). In addition, we have the resolvent identity: For f , g ∈ H i0 and ξ ∈ C
such that −ξ is not in the support of the measure ψ[i0 ] (s; dx ),
∞ ( f , g)
−1
ξI [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) ψ[i0 ] (s; dx ).
x
f, g = (17)
0 ξ+x
μ i0 +1
(sI [i0 ] + ξR[i0 ] − A[i0 ] ) F [i0 ] = f [i0 ] + F e ,
π i0 i0 0
Given that ri > 0 for i > i0 , the matrix R[i0 ] is invertible and the above equation can be
rewritten as
μ i +1
ξI [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) F [i0 ] = ( R[i0 ] )−1 f [i0 ] + 0 Fi0 R̂−1 e0 ,
π i0
The operator ξI [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) is invertible for ξ such that −ξ is not in the
support of the measure ψ[i0 ] (s, dx ), and we have
−1
F [i0 ] = ξI [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) ( R [ i0 ] ) −1 f [ i0 ]
μ i0 +1 −1
+ F ξI [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) e0 .
r i0 +1 π i0 i0
By using the spectral identity (17), we can compute Fi for i > i0 as soon as Fi0 is known.
Indeed, we have
∞ F
i +1+ j
F [ i0 ] = ∑ 0 ej ,
π
j =0 i0 +1+ j
and then, for i ≥ i0 + 1, by using the fact that ri0 +1+i Fi0 +1+i = ( F [i0 ] , ei ), we have
−1
ri0 +1+i Fi0 +1+i = ξI [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) ( R [ i0 ] ) −1 f [ i0 ] , ei
μ −1
+ i0 +1 Fi0 ξI [ i0 ]
+ (R [ i0 ] −1
) (sI [ i0 ]
−A [ i0 ]
) e0 , e i .
r i0 +1 π i0
From the two above lemmas, it turns out that to determine the functions Fi (s, ξ ) it is necessary
to compute the function hi (s) for i = 0, . . . , i0 + 1. For this purpose, let us introduce the non
negative quantities η (s), = 0, . . . , i0 , which are the (i0 + 1) solution to the equation
λ i0 μ i0 +1 π i0 ∞ Qi0 (s; x )2
1− Fi0 (s; ξ ) ψ[i0 ] (s; dx ) = 0. (18)
r i0 +1 r0 0 ξ−x
Then, we can state the following result, which gives a means of computing the unknown
functions h j (s) for j = 0, . . . , i0 .
390
12 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
where Fi0 (s; z) is the continued fraction (13) and f [i0 ] ((ξ ) and f [i0 ] (ξ ) are the vectors, which ith
(0) (0)
components are equal to f i0 +i+1 (ξ )/πi0 +i+1 and f i (ξ )/πi , respectively.
Proof. From Equation (16) for i = i0 + 1 and Equation (15) for i = i0 , we deduce that
λ i0 μ i0 +1 π i0 ∞ Qi0 (s; x )2
1− Fi0 (s; ξ ) ψ[i0 ] (s; dx ) Fi0 +1 (s, ξ ) =
r0 r i0 +1 0 ξ−x
λ i0 π i0 i0
(0) ∞ Q j (s; x ) Qi0 (s; x )
Fi0 (s; ξ ) ∑ ( f j (ξ ) + r j ξh j (s)) ψ[i0 ] (s; dx )
r0 r i0 +1 j =0 0 ξ−x
∞ ∞ Q j (i0 + 1; s; x ) [i ]
1 (0)
+ ∑
r i0 +1 j =0
f i0 + j +1 ( ξ )
0 x+ξ
ψ 0 (s; dx ). (20)
From equation (15), since the Laplace transform Fi (s, ξ ) should have no poles for ξ ≥ 0, the
roots ζ k (s) for k = 0, . . . , i0 should be removable singularities and hence for all i, j, k = 0, . . . , i0
(0)
Qi (s; ζ k (s)) f j (ζ k (s)) + r j ζ k (s)h j (ζ k (s)) Q j (s; ζ k (s))
+μi0 +1 Fi0 +1 (s, ζ k (s)) Qi0 (s, ζ k (s)) = 0.
By using the interleaving property of the roots of successive orthogonal polynomials, we have
Qi (s; ζ k (s)) = 0 for all i, k = 0, . . . , i0 . Hence, the term between parentheses in the above
equation is null and we deduce that the points ζ k (s), k = 0, . . . , i0 , are removable singularities
in expression (20). The quantities h j (s), j = 0, . . . , i0 , are then determined by using the fact
that the r.h.s. of equation (20) must cancel at points ηk (s) for k = 0, . . . , i0 . This entails that for
k = 0, . . . , i0 , the terms
∞ ∞ Q j (i0 + 1; s; x ) [i ]
(0)
∑ f i0 + j+1 (ηk (s))
0 x + ηk ( s )
ψ 0 (s; dx )
j =0
and
∞ Q j (i0 + 1; s; x ) [i ]
ψ 0 (s; dx ) =
0 x + ηk ( s )
1 −1
ηk (s)I [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) e0 , e j ,
r i0 +1+ j π i0 + j +1
By solving the system of linear equations (19), we can compute the unknown functions h j (s)
for j = 0, . . . , i0 . The function Fi0 +1 (s, ξ ) is then given by
λ i0 μ i0 +1 π i0 ∞ Qi0 (s; x )2
1− Fi0 (s; ξ ) ψ[i0 ] (s; dx ) Fi0 +1 (s, ξ ) =
r i0 +1 r0 0 ξ−x
1 −1
= ξI [i0 ] + ( R[i0 ] )−1 (sI [i0 ] − A[i0 ] ) e0 , ( R [ i0 ] ) − 1 f [ i 0 ] ( ξ )
r i0 +1
λi0 Fi0 (s; ξ ) −1
− ξI [i0 ] + R− 1
[i ]
(sI [i0 ] − A[i0 ] ) ei0 , R − 1
f (ξ ) + ξh(s)
[ i ] [ i0 ]
, (22)
r i0 r i0 +1 0 0
i0
The function Fi0 (s, ξ ) is computed by using equation (22) and equation (15) for i = i0 . The
other functions Fi (s, ξ ) are computed by using Lemmas 2 and 3.
The above procedure can be applied for any value i0 but expressions are much simpler when
i0 = 0, i.e., when there is only one state with negative net input rate. In that case, we have the
following result, when the buffer is initially empty and the birth and death process is in state
1.
Proposition 4. Assume that r0 < 0 and ri > 0 for i > 0. When the buffer is initially empty and the
birth and death process is in the state 1 at time 0 (i.e., p0 (i ) = δ1,i for all i ≥ 0), the Laplace transform
h0 (s) is given by
r η ( s ) + s + λ0 μ F (s; η0 (s))
h0 ( s ) = 0 0 = 1 0 . (23)
λ0 η0 (s)|r0 | r 1 | r 0 | η0 ( s )
where η0 (s) is the unique positive solution to the equation
λ0 μ1 F0 (s; ξ )
1− = 0.
r1 ( s + λ0 + r0 ξ )
392
14 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
In addition,
1 λ0 ξr0 h0 (s)
1+ F0 (s; ξ )
r1 s + λ0 + r0 ξ
F1 (s, ξ ) = . (24)
λ0 μ1
1− F0 (s; ξ )
r1 ( s + λ0 + r0 ξ )
Proof. In the case i0 = 0, the unique root to the equation Q1 (s; x ) is ζ 0 (s) = (s + λ0 )|r0 |. The
measure ψ[0] (s; dx ) is given by
ψ[0] (s; dx ) = δζ 0 (s) (dx )
and Equation (18) reads
λ0 μ1 1
1− F0 (s; ξ ) =0
r1 s + λ0 + r0 ξ
which has a unique solution η0 (s) > 0. When the buffer is initially empty and the birth and
(0)
death process is in the state 1 at time 0, we have f i (ξ ) = δ1,j . Then,
−1
[0] [0] −1 [0] [0] [0] −1 [0]
η0 ( s ) I + (R ) (sI −A ) e0 , ( R ) f (η0 (s))
∞
1 −1 1
= η0 (s)I [0] + ( R[0] )−1 (sI [0] − A[0] ) e0 , e0 = ψ[0] (s; dx )
r1 π1 0 η0 ( s ) + x
= F0 (s; η0 (s)),
where we have used the resolvent identity (17) and the fact that (e0 ) x = Q[0] (s; x ). Moreover,
−1
η0 ( s ) I [ 0 ] + R − 1
[0]
(sI [0] − A[0] ) e0 , R − 1
f (η (s)) + h(s)
[0] [0] 0
0
h0 ( s ) h0 (s)|r0 |
= ( e0 , e0 ) 0 = .
η0 (s) + s+r0λ0 η0 (s) + s+r0λ0
By using Equation (19) for i0 = 0, Equation (23) follows. Finally, Equation (24) is obtained by
using Equation (22).
λ i0 π i0 ξ F i0 ( ξ ) i0 ∞ Q j ( x ) Q i0 ( x )
=
r0 r i0 +1 ∑ rj hj 0 ξ−x
ψ[i0 ] (dx ), (25)
j =0
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 393
15
where h j = limt−→∞ P (Λt = j, Xt = 0), Fi0 (ξ ) = Fi0 (0; ξ ) and Fi0 +1 (ξ ) = Fi0 +1 (0; ξ ).
The continued fraction Fi0 (ξ ) has the following probabilistic interpretation:
where θi0 is the passage time of the birth and death process with birth rates λn /|rn | and death
rates μn /|rn | from state i0 + 1 to state i0 (see Guillemin & Pinchon (1999) for details). This
entails in particular that Fi0 (0) = ri0 +1 /μi0 +1 .
Let us first characterize the measure ψ[i0 ] (dx ). For this purpose, let us introduce the
polynomials of the second kind associated with the polynomials Qi ( x ). The polynomials of
the second kind Pi ( x ) satisfy the same recursion as the polynomials Qi ( x ) but wit the initial
conditions P0 ( x ) = 0 and P1 ( x ) = |r0 |/λ0 . The even numerators of the continued fraction
de f λ0 ...λn−1
F (z) = F (0; z), where F (s; z) is defined by Equation (9), are equal to P (−z) and the
|r0 ...rn−1 | n
even denominators to |λr0 ...λ n −1
Qn (−z).
0 ...rn−1 |
Lemma 4. The spectral measure ψ[i0 ] (dx ) of the non negative selfadjoint operator R− 1
A in the
[ i0 ] [ i0 ]
Hilbert space Hi0 is such that
∞ 1 Pi +1 (z)
ψ (dx ) = − 0 . (26)
0 z − x [ i0 ] Q i0 +1 ( z )
The measure ψ[i0 ] (dx ) is purely discrete with atoms located at the zeros ζ k , k = 0, . . . , i0 , of the
polynomial Qi0 +1 (z).
Proof. Let P[i0 ] (z) (resp. Q[i0 ] (z)) denote the column vector, which ith component for 0 ≤ i ≤ i0
is Pi (z) (resp. Qi (z)). For any x, z ∈ C, we have
λ i0
zI [i0 ] − R− 1
A ( P[i0 ] (z) + xQ[i0 ] (z)) = e0 − P (z) + xQi0 +1 (z) ei0 .
[ i ] [ i0 ]
0 | r i0 +1 | i0 +1
Hence, if z = ζ i for 0 ≤ i ≤ i0 , where ζ i is the ith zero of the polynomial Qi0 +1 ( x ), and if we
take x = − Pi0 +1 (z)/Qi0 +1 (z), we see that
−1 Pi +1 (z)
zI [i0 ] − R− 1
A
[ i ] [ i0 ]
e0 = P[i0 ] (z) − 0 Q ( z ).
0 Q i0 +1 ( z ) [ i0 ]
−1 ∞ ((e0 ) x , e0 )i0 Pi +1 (z)
zI [i0 ] − R− 1
A
[ i ] [ i0 ]
e0 , e0 = ψ[i0 ] (dx ) = − 0 |r |.
0
i0 0 z−x Q i0 +1 ( z ) 0
Since (e0 ) x = Q[i0 ] ( x ) because of the orthogonality relation (11), Equation (26) immediately
follows.
394
16 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
By using the above lemma, we can show that the smallest solution to the equation
λ i0 μ i0 +1 π i0 ∞ Q i0 ( x )2
1− F i0 ( ξ ) ψ (dx ) = 0 (27)
r i0 +1 r0 0 ξ − x [ i0 ]
μ i0 +1 Q (ξ )
1= F ( ξ ) i0 . (28)
r i0 +1 i0 Q i0 +1 ( ξ )
Proof. The fraction Pi0 +1 (z)/Qi0 +1 (z) is a terminating fraction and from Equation (26), we
have
Pi0 +1 (−z) ∞ 1
= ψ[i0 ] (dx ).
Qi0 +1 (−z) 0 z+x
On the one hand, by applying Theorem 12.11d of Henrici (1977) to this fraction, we have
we deduce that
∞ Q i0 ( x )2 |r0 |
ψ[i0 ] (dx ) = ,
0 x λ i0 π i0
since Qi (0) = 1 for all i ≥ 0. In addition, by using the fact that Fi0 (0) = ri0 +1 /μi0 +1 ,
we deduce that the smallest root of Equation (27) is η0 = 0. The other roots are positive.
Equation (27) can be rewritten as Equation (28) by using Equations (29) and (30).
Note that by using the same arguments as above, we can simplify Equation (18). As a matter
of fact, we have
The quantities hi are evaluated by using the normalizing condition ∑ii0=0 hi = 1 − ρ, where ρ
is defined by Equation (3), and by solving the i0 linear equations
= 1, . . . , i0 , ( η I − R − 1
A ) −1 ei0 , h
[ i ] [ i0 ]
= 0, (32)
0 i0
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 395
17
where h is the vector which ith component is hi /πi . Once the quantities hi , i = 0, . . . , i0
are known, the function Fi0 +1 (ξ ) is computed by using relation (25). The function Fi0 (ξ ) is
computed by using the relation
λ i0
Fi0 +1 (ξ ) = F (ξ )Fi0 (ξ ).
r i0 +1 i0
This allows us to determine the functions Fi0 +1 (ξ ) and Fi0 (ξ ). The functions Fi (ξ ) for i =
0, . . . , i0 are computed by using Equation (15) for s = 0 and f (0) ≡ 0. The functions Fi (ξ ) for
i > i0 are computed by using Equation (16) for s = 0 and f (0) ≡ 0. This leads to the following
result.
Proposition 5. The Laplace transform of the buffer content X in the stationary regime is given by
∞ ∞ Q j ( x )Π( x )
1 i0
E e−ξX = ∑ Fi (ξ ) = r0 j∑
r j ξh j ψ[i0 ] (dx )
i =0 =0 0 ξ−x
λ i0 μ i0 +1 ∞ Q i0 ( x ) Π ( x ) 1 ∞ Π i0 ( x ) [ i0 ]
+ Fi0 (ξ ) F i0 ( ξ ) ψ[i0 ] (dx ) + ψ (dx ) (33)
r i0 +1 r0 0 ξ−x π i0 +1 0 x+ξ
with
i0
Π( x ) = ∑ π i Q i ( x ),
i =0
∞
Π i0 ( x ) = ∑ πi +1+i Qi (i0 + 1; x),
0
i =0
π i0 i0 ∞ Q j ( x ) Qi ( x )
∑
r0 j =0
r j ξh j
0 ξ−x
0
ψ[i0 ] (dx )
Fi0 (ξ ) = .
λ i0 μ i0 +1 π i0 ∞ Q ( x )2
i0
1− F i0 ( ξ ) ψ (dx )
r0 r i0 +1 0 ξ − x [ i0 ]
In the case when there is only one state with negative drift, the above result can be simplified
as follows.
Corollary 1. When there is only one state with negative drift, the Laplace transform of the buffer
content is given by
−ξX ξ (1 − ρ )r0 λ1 ∞ Π0 ( x ) [0]
E e = 1+ ψ (dx ) . (34)
λ μ
r0 ξ + λ0 − 0r1 1 F0 (ξ ) r1 0 x + ξ
∞ Π( x ) r0
ψ (dx ) = .
0 ξ − x [ i0 ] r0 ξ + λ0
396
18 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
(1 − ρ)ξr0
F0 (ξ ) = λ0 μ1
.
r0 ξ + λ0 − r1 F0 ( ξ )
By examining the singularities in Equation (34), it is possible to determine the tail of the
probability distribution of the buffer content in the stationary regime. The asymptotic
behavior greatly depends on the properties of the polynomials Qi ( x ) and their associated
spectral measure.
5. Busy period
In this section, we are interested in the duration of a busy period of the fluid reservoir. At the
beginning of a busy period, the buffer is empty and the modulating process is in state i0 + 1.
More generally, let us introduce the occupation duration B which is the duration the server is
busy up to an idle period. The random variable B depends on the initial conditions and we
define the conditional probability distribution
Hi (t, x ) = P ( B ≤ t | Λ0 = i, X0 = x ).
The probability distribution function of a busy period β of the buffer is clearly given by
It is known in Barbot et al. (2001) that for t > 0 and x > 0, Hi (t, x ) satisfies the following
partial differential equations
∂ ∂
H (t, x ) − ri Hi (t, x ) = −μi Hi−1 (t, x ) + (λi + μi ) Hi (t, x ) − λi Hi+1 (t, x ) (36)
∂t i ∂x
Hi (t, 0) = 1 if t ≥ 0, ri ≤ 0,
Hi (0, x ) = 0 if x > 0,
Hi (0, 0) = 0 if ri > 0.
θi (u, x ) = E e−uB | Λ0 = i, Q0 = x .
∂
ri θ (u, x ) = uθi (u, x ) − μi θi−1 (u, x ) + (λi + μi )θi (u, x ) − λi θi+1 (u, x )
∂x i
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 397
19
we obtain for i ≥ 0
ri ξ θ̃i (u, ξ ) − ri θi (u, 0) = uθ̃i (u, ξ ) − μi θ̃i−1 (u, ξ ) + (λi + μi )θ̃i (u, ξ ) − λi θ̃i+1 (u, ξ )
By introducing the infinite vector Θ(u, ξ ), which ith component is θ̃i (u, ξ ), the above equations
can be rewritten in matrix form as
where T (u) is the vector which ith component is equal to θi (u, 0). We clearly have θi (u, 0) = 1
for i = 0, . . . , i0 . For the moment, the functions θi (u, 0) for i > i0 are unknown functions.
Equation (37) can be solved by using the same technique as in Section 3. In the following,
we assume that the measure ψ[i0 ] (s; dx ) has a discrete spectrum with atoms located at points
χk (s) > 0 for k ≥ 0. This assumption is satisfied for instance when the measure ψ(s; dx ) has
a discrete spectrum (see Guillemin & Pinchon (1999) for details). Under this assumption, let
χk (s) > 0 for k ≥ 0 be the solutions to the equation
Proposition 6. The Laplace transforms θi0 +1+ j (u, 0) for j ≥ 0 satisfy the following linear equations:
Proof. Equation (37) can be split into two parts. The first part reads
λi
ξI [i0 ] − R− 1
[ i0 ]
uI [i0 ] − A[i0 ] Θ[i0 ] = e[i0 ] − 0 θ̃i0 +1 (u, ξ )ei0 , (39)
r i0
where e[i0 ] is the finite vector with all entries equal to 1 for i = 0, . . . , i0 and Θ[i0 ] is the finite
vector, which ith entry is θ̃i (u, ξ ) for i = 0, . . . , i0 . The second part of the equation is
−1 μ i +1
ξI [i0 ] − R[i0 ] uI [i0 ] − A[i0 ] Θ[i0 ] = T [i0 ] − 0 θ̃i0 (u, ξ )e0 , (40)
r i0 +1
where the vector T [i0 ] (resp. Θ[i0 ] ) has entries equal to θi0 +1+i (u, 0) (resp. θ̃i0 +1+i (u, ξ )) for
i ≥ 0.
398
20 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
1 i0 ∞ Qi (u; x ) Q j (u; x )
|r0 | j∑
θ̃i (u, ξ ) = |r j | π j ψ[i0 ] (u; dx )
=0 0 ξ+x
μ i0 +1 π i0 +1 ∞ Qi0 (u; x ) Qi (s; x )
+ θ̃i0 +1 (u, ξ ) ψ[i0 ] (u; dx ), (41)
|r0 | 0 ξ+x
and for i ≥ 0
(42)
and
∞ 1
ψ[i0 ] (u; dx ) = −Fi0 (u; −ξ ).
0 ξ−x
Since the function θ̃i0 (u; ξ ) shall have no poles in [0, ∞), the result follows.
6. Conclusion
We have presented in this paper a general method for computing the Laplace transform of the
transient probability distribution function of the content of a fluid reservoir fed with a source,
whose transmission rate is modulated by a general birth and death process. This Laplace
transform can be evaluated by solving a polynomial equation (see equation (18)). Once the
zeros are known, the quantities hi (s) for i = 0, . . . , i0 are computed by solving the system of
linear equations (19). These functions then completely determined the two critical functions
Fi0 and Fi0 +1 , which are then used for computing the functions Fi for i > i0 + 1 and Fi for i < i0
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 399
21
by using equations (16) and (15), respectively. Moreover, we note that the theory of orthogonal
polynomials and continued fractions plays a crucial role in solving the basic equation (6).
The above method can be used for evaluating the Laplace transform of the duration of a busy
period of the fluid reservoir as shown in Section 5. The results obtained in this section can be
used to study the asymptotic behavior of the busy period when the service rate of the buffer
becomes very large. Occupancy periods of the buffer then become rare events and one may
expect that buffer characteristics converge to some limits. This will be addressed in further
studies.
7. Appendix
A. Proof of Lemma 1
From the recurrence relations (10), the quantities Ak (s) defined by A0 (s) = 1 and for k ≥ 1
k
Ak (s) = |r0 . . . rk−1 | ∏ α2j (s)
j =1
A k +1 ( s ) = ( s + λ k + μ k ) A k ( s ) − λ k −1 μ k A k −1 ( s ).
It is clear that Ak (s) is a polynomial in variable s. In fact, the polynomials Ak (s) are the
successive denominators of the continued fraction
1
G e (z) =
μ1 λ0
s + λ0 −
μ2 λ1
s + λ1 + μ1 −
.
s + λ2 + μ2 − . .
α1
G(s) = , (43)
α2
z+
α3
1+
α4
z+
.
1 + ..
It is straightforwardly checked that α2k = λk−1 and α2k+1 = μk for k ≥ 1. The continued
fraction G(s) is hence a Stieltjes fraction and is converging for all s > 0 if and only if ∑∞
k =0 a k =
400
22 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
1 1
α1 = , αk = for k ≥ 1.
a1 a k −1 a k
1
a2k = and a2k+1 = πk .
λ k −1 π k −1
Since the process (Λt ) is assumed to be ergodic, ∑k≥1 ak = ∞, which shows that the continued
fraction G(s) is converging for all s > 0 and that there exists a unique measure ϕ(dx ) such that
G(s) is the Stieltjes transform of ϕ(dx ), that is, for all s ∈ C \ (−∞, 0]
∞ 1
G(s) = ϕ(dx ).
0 z+x
The support of ϕ(dx ) is included in [0, ∞) and this measure has a mass at point x0 ≥ 0 if and
only if
∞
A (− x )2
∑ λ0 . . . λk μ01 . . . μ < ∞.
k =0 k −1 k
Since the continued fraction G(s) is converging for all s > 0, we have
∞
A k ( s )2
∑ λ . . . λ k −1 μ1 . . . μ k
= ∞. (44)
k =0 0
Since the polynomials Ak (s) are the successive denominator of the fraction G e (s), the
polynomials Ak (−s), k ≥ 1, are orthogonal with respect to some orthogonality measure,
namely the measure ϕ(dx ). From the general theory of orthogonal polynomials Askey (1984);
Chihara (1978), we know that the polynomial Ak (−s) has k simple, real, and positive roots.
Since the coefficient of the leading term of Ak (−s) is (−1)k , this implies that Ak (s) can be
written as Ak (s) = (s + s1,k ) . . . (s + sk,k ) with si,k > 0 for i = 1, . . . , k. Hence, Ak (s) ≥ 0 for all
s ≥ 0 and then, for all k ≥ 0, αk (s) ≥ 0 for all s ≥ 0 and hence the continued fraction F (s, z)
defined by Equation (9) is a Stieljtes fraction.
The continued fraction F (s, z) is converging if and only if ∑∞
k =0 ak ( s ) = ∞ where the
coefficients ak (s) are defined by
1 1
α1 ( s ) = , αk (s) = for k ≥ 1.
a1 ( s ) a k −1 ( s ) a k ( s )
|r k | A k ( s )2 λ0 . . . λ k −2 μ1 . . . μ k −1
a2k+1 (s) = and a2k = |r0 | .
| r0 | λ k −1 . . . λ0 μ k . . . μ1 A k ( s ) A k −1 ( s )
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 401
23
For k > i0 , rk ≥ ri0 +1 and then by taking into account Equation (44), we deduce that for all
s > 0, ∑∞
k =0 ak ( s ) = ∞ and the continued fraction F ( s; z ) is then converging for all s > 0. For
s = 0, we have
|r0 |
a2k (0) =
λ k −1 π k −1
and then ∑∞ k =0 ak (0) = ∞ since the process ( Λt ) is ergodic (see Condition (2)). This shows that
the Stieltjes fraction F (s; z) is converging for all s ≥ 0.
B. Selfadjointness properties
We consider in this section the Hilbert space Hi0 = Ci0 +1 equipped with the scalar product
i0
(c, d)i0 = ∑ c k d k |r k | π k .
k =0
⎛ ⎞
− s+ λ0
|r |
λ0
|r0 |
0 . .
⎜ ⎟
0
μ1 (s+λ +μ ) λ1
⎜ − |r1 | 1 . . ⎟
⎜ |r1 | 1 |r1 | ⎟
⎜ μ2 ( s + λ2 + μ2 ) λ2 ⎟
⎜ 0 − |r | . ⎟.
⎜ |r2 | 2 |r2 | ⎟
⎜ . . . . . ⎟
⎝ ⎠
μ i0 s + λ i0 + μ i0
| r i0 |
− | r i0 |
The symmetry of the matrix with respect to the scalar product (., .)i0 is readily verified by
using the relation λk πk = μk+1 πk+1 . Since the dimension of the Hilbert space Hi0 is finite,
the operator associated with the matrix − R− 1
[ i0 ]
(sI [i0 ] − A[i0 ] ) is selfadjoint and its spectrum is
purely point-wise.
If f is an eigenvector for the matrix − R− 1
[ i0 ]
(sI [i0 ] − A[i0 ] ) associated with the eigenvalue x, then
under the hypothesis that f 0 = 1, the sequence f n verifies the same recurrence relation as
Qk (s; x ) for k = 0, . . . , i0 − 1. This implies that x is an eigenvalue of the above matrix if an
only if Qi0 +1 (s; x ) = 0, that is, x is one of the (positive) zeros of the polynomial Qi0 +1 (s; x ),
denoted by ζ k (s) for k = 0, . . . , i0 .
Let us introduce the column vector Q[i0 ] (s, ζ k (s)) for k = 0, . . . , i0 , whose th component is
Q (s, ζ k (s)). The vector Q[i0 ] (s, ζ k (s)) is the eigenvector associated with the eigenvalue ζ k (s)
of the operator − R− 1
[ i0 ]
(sI [i0 ] − A[i0 ] ). From the spectral theorem, the vectors Q[i0 ] (s, ζ k (s)) for
402
24 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
k = 0, . . . , i0 form an orthogonal basis of the Hilbert space Hi0 . The vectors e j for j = 0, . . . , i0
such that all entries are equal to 0 except the jth one equal to 1 form the natural orthogonal
basis of the space Hi0 . We can moreover write for j = 0, . . . , i0
i0
( j)
ej = ∑ αk Q[i0 ] (s, ζ k (s)).
k =0
By using the orthogonality of the vectors Q[i0 ] (s, ζ k (s)) for k = 0, . . . , i0 , we have
( j)
(e j , Q[i0 ] (s, ζ k (s)))i0 = |r j |π j Q j (s, ζ k (s)) = Q[i0 ] (s, ζ k (s))2i0 αk
where δj, is the Kronecker symbol. It follows that if we define the measure ψ[i0 ] (s; dx ) by
i0
1
ψ[i0 ] (s; dx ) = |r0 | ∑ Q ( s,
δζ (s) (dx )
ζ k (s))2i0 k
(45)
k =0 [ i0 ]
the polynomials Qk (s, x ) for k = 0, . . . , i0 are orthogonal with respect to the above measure,
that is, they verify
∞ |r0 |
Q j (s, x ) Q (s, x )ψ[i0 ] (s; dx ) = δ ,
0 |r j |π j j,
and the total mass of the measure ψ[i0 ] (s; dx ) is equal to 1, i.e,
∞
ψ[i0 ] (s; dx ) = 1.
0
8. References
Adan, I. & Resing, J. (1996). Simple analysis of a fluid queue driven by an M/M/1 queue,
Queueing Systems - Theory and Applications, Vol. 22, pp. 171–174.
Aggarwal, V., Gautam, N., Kumara, S. R. T. & Greaves, M. (2005). Stochastic fluid flow models
for determining optimal switching thresholds, Performance Evaluation, Vol. 59, pp.
19–46.
Ahn, S. & Ramaswami, V. (2003). Fluid flow models and queues - a connection by stochastic
coupling, Stochastic Models, Vol. 19, No. 3, pp. 325–348.
Ahn, S. & Ramaswami, V. (2004). Transient analysis of fluid flow models via stochastic
coupling to a queue, Stochastic Models, Vol. 20, No. 1, pp. 71–101.
Anick, D., Mitra, D. & Sondhi, M. M. (1982). Stochastic theory of a data-handling system with
multiple sources, Bell System Tech. J., Vol. 61, No. 8, pp. 1871–1894.
Askey, R. & Ismail, M. (1984). Recurrence relations, continued fractions, and orthogonal
polynomials, Memoirs of the American Mathematical Society, Vol. 49, No. 300.
Asmussen, S. (1987). Applied probability and queues, J. Wiley and Sons.
On
On thethe
Fluid Fluid Queue
Queue Driven Driven
by an Ergodic Birthby
and an
DeathErgodic
Process Birth and Death Process 403
25
Badescu, A., Breuer, L., da Silva Soares, A., Latouche, G., Remiche, M.-A. & Stanford, D. (2005).
Risk processes analyzed as fluid queues, Scandinav. Actuar. J., Vol. 2, pp. 127–141.
Barbot, N., Sericola, B. & Telek, M. (2001). Dsitribution of busy period in stochastic fluid
models, Stochastic Models, Vol. 17, No. 4, pp. 407–427.
Barbot, N. & Sericola, B. (2002). Stationary solution to the fluid queue fed by an M/M/1
queue, Journ. Appl. Probab., Vol. 39, pp. 359–369.
Chihara, T. S. (1978). An introduction to orthogonal polynomials. Gordon and Breach, New York,
1978.
da Silva Soares, A. & Latouche, G. (2002). Further results on the similarity between fluid
queues and QBDs, In G. Latouche and P. Taylor, editors, Proc. of the 4th Int. Conf. on
Matrix-Analytic Methods (MAM’4), Adelaide, Australia, 89–106, World Scientific.
da Silva Soares, A. & Latouche, G. (2006). Matrix-analytic methods for fluid queues with finite
buffers, Performance Evaluation, Vol. 63, No. 4, pp. 295–314.
Guillemin, F. (2012). Spectral theory of birth and death processes, Submitted for publication.
Guillemin, F. & Pinchon, D. (1999). Excursions of birth and death processes, orthogonal
polynomials, and continued fractions, J. Appl. Prob., Vol. 36, pp. 752–770.
Guillemin, F. & Sericola, B. (2007). Stationary analysis of a fluid queue driven by some
countable state space Markov chain, Methodology and Computing in Applied Probability,
Vol. 9, pp. 521–540.
Henrici, P. (1977). Applied and computational complex analysis, Wiley, New York, Vol. 2.
Igelnik, B., Kogan, Y., Kriman, V. & Mitra, D. (1995). A new computational approach
for stochastic fluid models of multiplexers with heterogeneous sources, Queueing
Systems - Theory and Applications, Vol. 20, pp. 85–116.
Kleinrock, L. (1975). Queueing Systems, J. Wiley, Vol. 1.
Kobayashi, H. & Ren, Q. (1992). A mathematical theory for transient analysis of
communication networks, IEICE Trans. Communications, Vol. 75, No. 12, pp.
1266–1276.
Kosten, L. (1984). Stochastic theory of data-handling systems with groups of multiple
sources, In Proceedings of the IFIP WG 7.3/TC 6 Second International Symposium on the
Performance of Computer-Communication Systems, Zurich, Switzerland, pp. 321–331.
Kumar, R., Liu, Y. & Ross, K. W. (2007). Stochastic Fluid Theory for P2P Streaming Systems,
In Proceedings of INFOCOM, Anchorage, Alaska, USA, pp. 919–927.
Mitra, D. (1987). Stochastic fluid models, In Proceedings of Performance’87, P. J. Courtois and
G. Latouche Editors, Brussels, Belgium, pp. 39–51.
Mitra, D. (1988). Stochastic theory of a fluid model of producers and consumers coupled by a
buffer, Advances in Applied Probability, Vol. 20, pp. 646–676.
Nabli, H. & Sericola, B. (1996). Performability analysis: a new algorithm, IEEE Trans.
Computers, Vol. 45, pp. 491–494.
Nabli, H. (2004). Asymptotic solution of stochastic fluid models, Performance Evaluation, Vol.
57, pp. 121–140.
Parthasarathy, P. R., Vijayashree, K. V. & Lenin, R. B. (2004). Fluid queues driven by a birth
and death process with alternating flow rates, Mathematical Problems in Engineering,
Vol. 5, pp. 469–489.
Ramaswami, V. (1999). Matrix analytic methods for stochastic fluid flows, In D. Smith
and P. Hey, editors, Proceedings of the 16th International Teletraffic Congress : Teletraffic
Engineering in a Competitive World (ITC’16), Edinburgh, UK, Elsevier, pp. 1019–1030.
404
26 Telecommunications Networks – Current Status andWill-be-set-by-IN-TECH
Future Trends
Ren, Q. & Kobayashi, H. (1995). Transient solutions for the buffer behavior in statistical
multiplexing, Performance Evaluation, Vol. 23, pp. 65–87.
Rogers, L. C. G. (1994). Fluid models in queueing theory and wiener-hopf factorization of
Markov chains, Advances in Applied Probability, Vol. 4, No. 2.
Rogers, L. C. G. & Shi, Z. (1994). Computing the invariant law of a fluid model, Journal of
Applied Probability, Vol. 31, No. 4, pp. 885–896.
Sericola, B. (1998). Transient analysis of stochastic fluid models, Performance Evaluation, Vol.
32, pp. 245–263.
Sericola, B. & Tuffin, B. (1999). A fluid queue driven by a Markovian queue, Queueing Systems
- Theory and Applications, Vol. 31, pp. 253–264.
Sericola, B. (2001). A finite buffer fluid queue driven by a Markovian queue, Queueing Systems
- Theory and Applications, Vol. 38, pp. 213–220.
Sericola, B., Parthasarathy, P. R. & Vijayashree, K. V. (2005). Exact transient solution of an
M/M/1 driven fluid queue, Int. Journ. of Computer Mathematics, Vol. 82, No. 6.
Stern, T. E. & Elwalid, A. I. (1991). Analysis of separable Markov-modulated rate models for
information-handling systems, Advances in Applied Probability, Vol. 23, pp. 105–139.
Tanaka, T., Hashida, O. & Takahashi, Y. (1995). Transient analysis of fluid models for ATM
statistical multiplexer, Performance Evaluation, Vol. 23, pp. 145–162.
van Dorn, E. A. & Scheinhardt, W. R. (1997). A fluid queue driven by an infinite-state birth
and death process, In V. Ramaswami and P. E. Wirth, editors, Proceedings of the 15th
International Teletraffic Congress : Teletraffic Contribution for the Information Age (ITC’15),
Washington D.C., USA, Elsevier, pp. 465–475.
vanForeest, N., Mandjes, M. & Scheinhardt, W. R. (2003). Analysis of a feedback fluid model
for TCP with heterogeneous sources, Stochastic Models, Vol. 19, pp. 299–324.
Virtamo, J. & Norros, I. (1994). Fluid queue driven by an M/M/1 queue, Queueing Systems -
Theory and Applications, Vol. 16, pp. 373–386.
17
1. Introduction
In this work we face the Routing problem defined as an optimal control problem, with
control variables representing the percentages of each flow routed along the available paths,
and with a cost function which accounts for the distribution of traffic flows across the
network resources (multipath routing). In particular, the scenario includes the load
balancing problem already dealt with in a previous work (Bruni et al., 2010) as well as the
bottleneck minimax control problem. The proposed approaches are then compared by
evaluating the performances of a sample network.
In a given network, the resource management problem consists in taking decisions about
handling the traffic amount which is carried by the network, while respecting a set of
Quality of Service (QoS) constraints.
As stated in Bruni et al., 2009a, b, the resource management problem is hardly tackled by a
single procedure. Rather, it is currently decomposed in a number of subproblems
(Connection Admission Control (CAC), traffic policing, routing, dynamic capacity
assignment, congestion control, scheduling), each one coping with a specific aspect of such
problem. In this respect, the present work is embedded within the general approach already
proposed by the authors in Bruni et al., 2009a, b, according to which each of the various sub-
problems is given a separate formulation and solution procedure, which strives to make the
other sub-problems easier to be solved. More specifically, the above mentioned approach
consists in charging the CAC with the task of deciding, on the basis of the network
congestion state, new connection admission/blocking and possible forced dropping of the
in-progress connections with the aim of maximizing the number of accepted connections,
whilst satisfying the QoS requirements.
According to the proposed approach, the role of the other resource management procedures
is the one of keeping the network as far as possible far from the congestion state. Indeed, the
more the network is kept far from congestion, the higher is the number of new connection
set-up attempts that can be accepted by the CAC without infringing the QoS constraints,
406 Telecommunications Networks – Current Status and Future Trends
and hence the traffic carried by the network increases. By so doing, the CAC and the other
resource management procedures can work in a consistent way, while being kept
independent.
This work deals with the multipath routing problem. Multipath routing is a widespread
topic in the literature. For example, Cidon et al., 1999, and Banner and Orda, 2007,
demonstrate the advantages of multipath routing with respect to single-path routing in
terms of network performances; Chen et al., 2004, considers the multipath routing
problem under bandwidth and delay constraints; Lin and Shroff, 2006, formulate the
multipath routing problem as a utility maximization problem with bandwidth constraints;
Guven et al., 2008, extend the multipath routing to multicast flows; Jaffe, 1981, Tsai et al.,
2006, Tsai and Kim, 1999 deal with the multipath routing as a minimax optimization
problem.
In this work we face the multipath routing problem formulated as an optimal control
problem, with control variables representing the percentages of each flow routed along the
available paths. As a matter of fact, in the most advanced networks each flow can be
simultaneously routed over more than one path: the routing procedure has to decide the
percentages of the traffic belonging to the considered flow which have to be routed over the
paths associated to the flow in question. According to the above mentioned vision, we
assume that other resource management control units (specifically the CAC) already dealt
with and decided about issues such as how many, which ones, when and for how long
connections have to be admitted in the network, with specific QoS constraints (related to
losses and delays) to be satisfied. Therefore, the routing control unit has to deal with an
already defined offered traffic. Thus, the admissible set for the routing control variables
turns out to be closed, bounded and non-empty, and the existence of (at least) an optimal
solution of the routing problem is guaranteed.
The goal of an optimal routing policy aims the routing problem solution towards a network
traffic pattern which should make QoS requirements and consequently the CAC task
(implicitly) easier to be satisfied. The quality of the routing solution will be evaluated by
different performance indices, which take a nominal capacity for each link into account.
As far as the dynamical aspects of a routing problem, we first note that explicitly accounting
for them would call for a reliable and sufficiently general dynamical model for the offered
traffic. However it is widely acknowledged that such a model is not available and hard to
design, due to unpredictable features of Internet traffic. And, in any case, the requested
dynamical characters are committed to the CAC procedures, where the more reliable
connection dynamics model along with the feedback structure may properly handle the
issue.
In addition, a non-dynamical set up for the routing problem makes it much easier to be dealt
with. Moreover, this approach could be justified by assuming that the time scale for changes
in the routing policy is surely slower than the bit rate fluctuations in the in-progress
connections, but it is reasonably faster than the evolution of traffic statistical features. Thus,
the routing policy has to be periodically computed to fit the most likely traffic pattern at
each given period of time.
Optimal Control Strategies for Multipath Routing:
From Load Balancing to Bottleneck Link Management 407
In this work, we consider the possibility/opportunity of splitting the given network into
sub-networks as detailed in Bruni et al., 2010 each one controlled by a separate subset of
variables.
This work is organized as follows. In Section 2, a definition for a reference communication
network and its decomposition is given, which is useful for the routing problem; in Sections
3, we in depth study the optimal routing control problem with reference to a number of
different cost functions; Section 4 shows some results in order to evaluate the performance
and to compare the found optimal solutions for traffic balancing and bottleneck link
management; finally, concluding remarks in Section 5 end the work.
1, if l ∈ v
a(l , v ) = (1)
0, otherwise
For each link l ∈ Λ, at the given time, we may consider its occupancy level c(l) defined as the
sum of all contributions to the occupancy due to the flows routed on the link itself. Each
contribution of this type will be quantified by the bit rate R(l,f) which, in turn, is the sum of
bit rates of all in-progress connections going through the link l and relevant to the flow f,
possibly weighted by a coefficient α(l,f) which accounts for the specific need of the flow
itself. Therefore we have:
c( l ) = α (l , f )R(l , f ) (2)
f ∈Φ
where α(l,f) are positive known coefficients which take into account the fact that some
technologies differentiate the classes of service by varying modulation, coding, and so on.
For each link l, we consider the so-called nominal capacity cNOM(l), that is the value of the
occupancy level suggested for a proper behaviour of the link (typically in terms of QoS)1.
1 c(l) and c
NOM(l) can be interpreted as generalizations of “load factor” and “Noise Rise” in UMTS (see
Holma and Toskala, 2002).
408 Telecommunications Networks – Current Status and Future Trends
that indicates the fraction of R(f) to be routed on path v ∈ Ωf. Then, due to the bit
conservation law, we have:
where obviously:
u( f , v ) ∈ [0,1], ∀f ∈ Φ , ∀v ∈ Ω f
u( f , v ) = 1, ∀f ∈ Φ (4)
v∈Ω f
As shown in Bruni et al., 2010, with reference to the routing control problem, the link set Λ
might be decomposed into separated subclasses Λ(j), j = 0,1,2,…,P, each of them involving
separate subsets of control variables, where Λ(0) is the set, possibly empty, of links that
cannot be controlled by any control variable and which therefore they are not involved in
any routing control problem.
For every communicating class of links Λ(j) ⊂ Λ, there exists the (uniquely) corresponding
communicating class of flows Φ(j) ⊂ Φ defined as the set of flows such that, for each
f ∈ Φ(j), there exists (at least) a link l ∈ Λ(j), and therefore a pair of links (generally
depending on f itself), which are controllable with respect to f. Clearly, the set Φ(0)
coincides with the empty set. We now observe that the set {Φ(j), j > 0} of flow
communicating classes forms a partition of Φ, corresponding to the fact that the set {Λ(j),
j > 0} of link communicating classes forms a partition of Λ. This partition for Λ and Φ
immediately induces a partition of the network. Note that each j-th part of the network is
controlled by a corresponding subvector of control variables, later defined as u(j)
independently of the other parts; the components of the vector u(j) are the variables u(f,v),
f ∈ Φ(j), v ∈ Ωf. In the following {Λ(j), Φ(j)} will denote a sub-network. We will use the
detailed network decomposition procedure described in Bruni et al., 2010, facing the
routing control problem in each sub-network (but in Λ(0)).
u( f , v ) ∈ [0,1], ∀f ∈ Φ ( j ) , ∀v ∈ Ω f (5)
u( f , v ) = 1, ∀f ∈ Φ( j ) (6)
v∈Ω f
so that the set itself turns out to be convex. From here on, for sake of simplicity the apices j
will be dropped.
Optimal Control Strategies for Multipath Routing:
From Load Balancing to Bottleneck Link Management 409
The optimal choice for u within its (convex) admissible set may be performed according to a
cost function which assesses the network loading. In a previous work Bruni et al., 2010, the
control goal was the normalized load balancing in the sub-network, evaluated by the function:
2
c( l )
J (u) = − k (7)
c
l∈Λ NOM ( l )
with k a given constant. If, for any given u, we optimize (7) with respect to k, we get:
1 c( l )
k=
L l∈Λ c NOM (l )
(8)
with L denoting the cardinality of Λ. In Bruni et al., 2010, and Bruni et al., 2010 (to appear), a
shortcoming of (7) was enlightened, which is due to the partial controllability property
(therein defined) of some of the links. These links, in the following referred to as “ballast”,
are such that they are bound to accept traffic flows not controlled by the components of the
control vector u. Thus other choices of the cost function might be considered which more
explicitly account for the network overloading.
One first possibility is to assess the link overflow setting k = 0 in (7), thus more generally
arriving at the functions:
m
c( l )
J (u) = (9)
l∈Λ c NOM ( l )
for some integer m > 1. If the target is to give more importance to the links belonging to
several paths the function (9) can be rewritten as follows:
m
c( l )
J (u) = c (l ) (10)
v∈Ω l∈Λ v NOM
According to (9), (10) we try to distribute the total load in the network in such a way that the
higher the normalized load for a link is, the stronger is the effort in reducing it. This
selective attention to the most heavily loaded links progressively increases with m. As m
keeps increasing, then function (10) is approximated by:
( Gv )
m
J (u) = (11)
v∈Ω
where:
c( l )
Gv = max (12)
l∈Λ v c NOM (l )
Thus for each path v the optimization attention is just focused on the most heavily loaded
link of the path itself (bottleneck). Eventually we can consider the worst bottleneck load
over the whole sub-network:
410 Telecommunications Networks – Current Status and Future Trends
J ( u) = max Gv (13)
v∈Ω
Remark. Some methods are proposed in the literature to solve the above minimax
optimization problem (see Warren et al., 1967, Osborne and Wetson, 1969, Blander et al.,
1972, Blander and Charambous, 1972). The original minimax problem (11) is equivalent to
the following:
min J (u , g ) (14)
u , g∈U
[ g ( v )]
m
J (u , g ) = (15)
v∈Ω
U = (u , g ) ∈ RV ( F + 1) : u( f , v ) ≥ 0, u( f , v ) = 1,
v∈Ω f
(16)
c( l )
≤ g( v ), ∀f ∈ Φ , ∀v ∈ Ω f
c NOM ( l )
The considered scenario is composed by 16 nodes and 19 links (see Fig. 1 a)). The traffic
pattern involves 4 traffic flows of the same service class k, from 4 source nodes ni, i = 1,..,4,
to 4 different destination nodes nj, j = 11,..,14. The traffic pattern is described by the set of
traffic flows Φ = {f1,f2,f3,f4}, where each traffic flow is identified by the following triples:
f1 = (n1,n11,k), f2 = (n2,n12,k), f3 = (n3,n13,k), f4 = (n4,n14,k). After performing the network
decomposition as in Bruni et al., 2010, we recognize three sub-networks (see, Fig. 1 b), c) and
d)). The network topology is summarized in Table 1, where the network decomposition is
reported as well.
Optimal Control Strategies for Multipath Routing:
From Load Balancing to Bottleneck Link Management 411
l1 l2 l3 l4 l5 l6 l7 l8 l9 l10 l11 l12 l13 l14 l15 l16 l17 l18 l19 f1 f2 f3 f4
cNOM
10 10 5.4 5.4 5.4 5.4 10 5.4 5.4 5.4 5.4 5.4 5.4 5.4 5.4 5.4 5.4 5.4 5.4
[kbps]
v1 x x x
v2 x x x x
v3 x x x x
v4 x x x x x
v5 x x x x x
v6 x x x x
v7 x x x x
v8 x x x x
Λ(0) x x
Λ(1) x x x x ◊ x x x x x x x
Λ(2) x x x x x x x x x
Table 1. Network Topology and Decomposition; the first row shows the nominal link
capacities in [Mbps]; the generic entry (li,vj) is denoted by ‘x’ if li ∈ Λ(j)v; the generic entry
(fi,vj) is denoted by ‘x’ if it is possible to route fi on path vj; the generic entry (li,Λ (j)) is
denoted by ‘x’ if li ∈ Λ(j), or by ‘◊’ if li ∈ Λ(j) and li is a ballast link; the generic entry (fi,Λ (j)) is
denoted by ‘x’ if fi ∈ Φ(j).
The considered scenario has been simulated with MatLab. In particular we have tested two
simuation sets reported in subsection 4.2 and 4.3respectively. In subsection 4.2 we
considered the Bottleneck Link Management by varying the weights of the bottleneck loads,
while in subsection 4.3 we made comparisons between Load Balancing and Bottleneck Link
Management.
a)
412 Telecommunications Networks – Current Status and Future Trends
b)
c)
d)
Fig. 1. a) Global Network, b) Sub-network 0 (Λ(0)), c) Sub-network 1 (Λ(1)), d) Sub-network 2
(Λ(2)).
1,00
0,90
0,80
0,70
0,60
0,50
0,40
0,30
0,20
0,10
0,00
u(f1,v1)
u(1,1) u(f1,v2)
u(1,2) u(f4,v7)
u(4,7) u(f4,v8)
u(4,8)
mm == 1
1 1,00 0,00 0,00 1,00
mm = 22 0,83 0,17 0,17 0,83
mm = 33 0,81 0,19 0,19 0,81
a)
1,00
0,90
0,80
0,70
0,60
0,50
0,40
0,30
0,20
0,10
0,00
g(v1)
g(1) g(v2)
g(2) g(v7)
g(7) g(v8)
g(8)
mm == 11 0,93 0,54 0,54 0,93
mm == 22 0,77 0,71 0,71 0,77
mm == 33 0,75 0,73 0,73 0,75
b)
1,00
0,90
0,80
0,70
0,60
0,50
0,40
0,30
0,20
0,10
0,00
l1l1 l2l2 l5l5 l6l6 l7l7 l10
l10 l11
l11 l14
l14 l16
l16 l19
l19
m=
m = 11 0,50 0,00 0,00 0,93 0,54 0,93 0,00 0,00 0,93 0,93
m=
m = 22 0,41 0,09 0,16 0,77 0,71 0,77 0,16 0,16 0,77 0,77
m
m ==33 0,41 0,09 0,17 0,75 0,73 0,75 0,17 0,17 0,75 0,75
c)
Fig. 2. Sub-network 1: a) optimal control variables, b) bottleneck link loads, c) link loads.
414 Telecommunications Networks – Current Status and Future Trends
1,00
0,90
0,80
0,70
0,60
0,50
0,40
0,30
0,20
0,10
0,00
u(f2,v3)
u(f2,v3) u(f2,v4)
u(f2,v4) u(f3,v5)
u(f3,v5) u(f3,v6)
u(f3,v6)
m=
m = 11 0,00 1,00 0,50 0,50
m=
m = 22 0,21 0,79 0,38 0,62
m == 33
m 0,31 0,69 0,33 0,67
a)
1,00
0,90
0,80
0,70
0,60
0,50
0,40
0,30
0,20
0,10
0,00
g(v3)
g(v3) g(v4)
g(v4) g(v5)
g(v5) g(v6)
g(v6)
m=
m = 11 0,00 1,00 0,46 0,46
m
m== 22 0,21 0,79 0,57 0,57
m=
m = 33 0,31 0,69 0,62 0,62
b)
1,00
0,90
0,80
0,70
0,60
0,50
0,40
0,30
0,20
0,10
0,00
l8l8 l9l9 l12
l12 l13
l13 l15
l15 l17
l17 l18
l18
m=
m = 11 0,46 0,46 0,00 0,46 0,46 1,00 0,46
m=
m = 22 0,36 0,57 0,21 0,57 0,57 0,79 0,36
m ==33
m 0,31 0,62 0,31 0,62 0,62 0,69 0,31
c)
Fig. 3. Sub-network 2: a) optimal control variables, b) bottleneck link loads, c) link loads.
Optimal Control Strategies for Multipath Routing:
From Load Balancing to Bottleneck Link Management 415
Rate
4 4.5 5 5.5 6 6.5 7 7.5 8 8.5
[Mbps]
u(f1,v1) 1,00
u(f1, v2) 0,00
u(f4, v7) 0,00
u(f4, v8) 1,00
g(v1) 0,74 0,83 0,93 1,02 1,11 1,20 1,30 1,39 1,48 1,57
g(v2) 0,40 0,45 0,50 0,55 0,60 0,65 0,70 0,75 0,80 0,85
g(v7) 0,40 0,45 0,50 0,55 0,60 0,65 0,70 0,75 0,80 0,85
g(v8) 0,74 0,83 0,93 1,02 1,11 1,20 1,30 1,39 1,48 1,57
l1 0,40 0,45 0,50 0,55 0,60 0,65 0,70 0,75 0,80 0,85
l2 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00
l5 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00
l6 0,74 0,83 0,93 1,02 1,11 1,20 1,30 1,39 1,48 1,57
l7 0,40 0,45 0,50 0,55 0,60 0,65 0,70 0,75 0,80 0,85
l10 0,74 0,83 0,93 1,02 1,11 1,20 1,30 1,39 1,48 1,57
l11 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00
l14 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00 0,00
l16 0,74 0,83 0,93 1,02 1,11 1,20 1,30 1,39 1,48 1,57
l19 0,74 0,83 0,93 1,02 1,11 1,20 1,30 1,39 1,48 1,57
a)
b)
Fig. 4. a) example of a network (width=10, height=18), b) one of the sub-networks resulting
from the decomposition of the network in Fig. 4 a).
Optimal Control Strategies for Multipath Routing:
From Load Balancing to Bottleneck Link Management 419
5. Conclusion
In this work we formulate the multipath routing problem as an optimal control problem
considering various performance indices. In particular, the scenario includes the load
balancing problem already dealt with in a previous work Bruni et al., 2010, as well as the
bottleneck minimax control problem, in which the traffic load of the bottleneck (raised to a
given power m) is minimized. The mathematical structure of the problem might easily
suggest some issues which are evidentiated by the results of Section 4, simply intended to
provide a numerical example of more general behaviours. On one side, the load balancing
performance index obviously allows to achieve a higher uniformity in the loading of the
various links, but it cannot prevent overloading of possible ballast links (apart from ad hoc
modifications suggested in Bruni et al., 2010).
On the other side, the minimax (bottleneck) approach succeeds in keeping the bottleneck
loads (including the ones of the ballast links), as low as possible, with an effort which
happens to be more successful the higher the value of m is. This allows accommodating for a
higher traffic flow.
Moreover, we stress the fact that the choice of the proper performance index is a matter left
to the network manager in charge of the routing control problem, who will have to take into
account at the same time the network structure and capacity, as well as the admitted traffic
flow and the possible presence of ballast links.
As a final conclusion, we have considered several cost functions for the multipath routing
which are suitable for a certain network load situation. Those cost functions can be properly
switched during the operations according to the network needs. In that way our approach is
strongly oriented with the most innovative vision of the Future Internet perspective (see
Delli Priscoli, 2010), in which the core idea is to take consistent and coordinated decisions
according to the present contest.
6. References
Bruni, C., Delli Priscoli, F., Koch, G., Marchetti, I. (2009). Resource management in network
dynamics: An optimal approach to the admission control problem, Computers &
Mathematics with Applications, article in press, available at
www.sciencedirect.com, 8 September 2009,doi:10.1016/j.camwa.2009.01.046
Bruni, C., Delli Priscoli, F., Koch, G., Marchetti, I. (2009,b)"Optimal Control of Connection
Admission in Telecommunication Networks", European Conrol Conference (ECC)
09, Budapest (Hungary), pp. 2929-2935.
Bruni, C., Delli Priscoli, F., Koch, G., Pietrabissa, A., Pimpinella, L., (2010) “Multipath
Routing by Network Decomposition and Traffic Balancing”, Proceedings Future
Network and Mobile Summit.
Holma H., Toskala A., (2002) WCDMA for UMTS, 2nd Edition.
Warren, A. D., Lasdon, L. S., Suchman, D. F., (1967) Optimization in engineering design,
Proc. IEEE, 1885-1897.
Osborne, M. R., Watson, G. A., (1969) An Algorithm for minimax approximation in the non-
linear case, Comput. J., 12, pp. 63-68.
420 Telecommunications Networks – Current Status and Future Trends
1. Introduction
There are various approaches to telecommunication and data networks (see for example
Alderson et al. (2007), Baccelli et al. (2006), Baccelli et al. (2001), Kelly et al. (1998), Tanenbaum
(1999), Willinger et al. (1998)). A first model for data networks, similar to that used for car
traffic, has been proposed in D’Apice et al. (2006), where two algorithms for dynamics at
nodes were considered and existence of solutions to Cauchy Problems was proved. Then
in D’Apice et al. (2008), following the approach of Garavello et al. (2005) for road networks
(see also Coclite et al. (2005); Daganzo (1997); Garavello et al. (2006); Holden et al. (1995);
Lighthill et al. (1955); Newell (1980); Richards (1956)), sources and destinations have been
introduced, thus taking care of the packets paths inside the network.
In this Chapter we deal with the fluid-dynamic model for data networks together with
optimization problems, reporting some results obtained in Cascone et al. (2010); D’Apice et al.
(2006; 2008; 2010).
A telecommunication network consists in a finite collection of transmission lines, modelled
by closed intervals of R connected by nodes (routers, hubs, switches, etc.). Taking the Internet
network as model, we assume that:
1) Each packet seen as a particle travels on the network with a fixed speed and with assigned
final destination;
2) Nodes receive, process and then forward packets which may be lost with a probability
increasing with the number of packets to be processed. Each lost packet is sent again.
Since each lost packet is sent again until it reaches next node, looking at macroscopic level,
it is assumed that the packets number is conserved. This leads to a conservation law for the
packets density ρ on each line:
ρt + f (ρ) x = 0. (1)
The flux f (ρ) is given by v(ρ) · ρ where v is the average speed of packets among nodes, derived
considering the amount of packets that may be lost.
422
2 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
The key point of the model is the loss probability, used to define the flux function. Indeed
the choice of a non reasonable loss probability function could invalidate the model. To
achieve the goal of the validation of the model assumptions, the loss probability function
has been compared with the behaviour of the packet loss derived from known models used in
literature to infer network performance and the shape of the velocity and flux functions has
been discussed. All the comparisons confirm the validity of the assumptions underlying the
fluid-dynamic model (see D’Apice et al. (2010)).
To describe the evolution of networks in which many lines intersect, Riemann Problems (RPs)
at junctions were solved in D’Apice et al. (2006) proposing two different routing algorithms:
(RA1) Packets from incoming lines are sent to outgoing ones according to their final
destination (without taking into account possible high loads of outgoing lines);
(RA2) Packets are sent to outgoing lines in order to maximize the flux through the node.
One of the drawback of (RA2) is that it does not take into account the global path of packets,
therefore leading to possible cycling to bypass congested nodes. These cyclings are avoided if
we consider that the packets originated from a source and with an assigned destination have
paths inside the network.
Taking this in mind the model was refined in D’Apice et al. (2008). On each transmission line
a vector π describing the traffic types, i.e. the percentages of packets going from a source to
a destination, has been introduced. Assuming that packets velocity is independent from the
source and the destination, the evolution of π follows a semilinear equation
π t + v(ρ)π x = 0, (2)
hence inside transmission lines the evolution of π is influenced by the average speed of
packets.
Different distribution traffic functions describing different routing strategies have been
analysed:
• at a junction the traffic started at source s and with d as final destination, coming from the
transmission line i, is routed on an assigned line j;
• at a junction the traffic started at source s and with d as final destination, coming from the
transmission line i, is routed on every outgoing lines or on some of them.
In particular two ways according to which the traffic at a junction is splitted towards the
outgoing lines have been defined. Starting from the distribution traffic function, and using
the vector π, the traffic distribution matrix, which describes the percentage of packets from
an incoming line that are addressed to an outgoing one, has been assigned. Then, methods
to solve RPs according to the routing algorithms (RA1) and (RA2) have been proposed.
Optimizations results have been obtained for the model consisting of the conservation law
(1). In particular priority parameters and traffic distribution coefficients have been considered
as controls and two functionals to measure the efficiency of the network have been defined in
Cascone et al. (2010):
1) The velocity of packets travelling through the network.
2) The travel time taken by packets from source to destination.
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 4233
Due to the nonlinear relation among cost functionals, the optimization of velocity and travel
time can give different control parameters.
The analytical treatment of a complex network is very hard due to the high nonlinearity of the
dynamics and discontinuities of the I/O maps. For these reasons, a decentralized strategy has
been adapted as follows:
Step 1. The optimal controls for asymptotic costs in the case of a single node with constant
initial data is computed.
Step 2. For a complex network, the (locally) optimal parameters at every node are used. Thus,
the optimal control is determined at each node independently.
The optimization problem for nodes of 2 × 2 type, i.e. with two entering and two exiting lines,
and traffic distribution coefficient α and priority parameter p as control parameters, constant
initial data and asymptotic functionals has been completely solved.
Then a test telecommunication network, consisting of 24 nodes, each one of 2 × 2 type has
been studied. Three different choices have been tested for the traffic distribution coefficients
and priority parameters: (locally) optimal, static random and dynamic random. The first
choice is given by Step 1. By static random parameters, we mean a random choice done at the
beginning of the simulation and then kept constant. Finally, dynamic random coefficients are
chosen randomly at every instant of time for every node.
The results present some interesting features: the performances of the optimal coefficients
are definitely superior with respect to the other two. Then, how the dynamic random
choice, which sometimes is equal in performance to the optimal ones, may be not feasible
for modelling and robustness reasons has been discussed.
The Chapter is organized as follows. Section 2 reports the model for data networks. Then,
in Section 3, we consider possible choices of the traffic distribution functions, and how to
compute the traffic distribution matrix from the latter functions and the traffic-type function.
We describe two routing algorithms, giving explicit unique solutions to RPs. In Section 4, we
discuss the validity of the assumption on the loss probability function, the velocity and flux.
The subsequent Section 5 is devoted to the analysis of the optimal control problem introducing
the cost functionals. Simulations for three different choices of parameters (optimal, static
and dynamic random) in the case of a complex network are presented. The paper ends with
conclusions in Section 6.
2. Basic definitions
A telecommunication network is a finite collection of transmission lines connected together
by nodes, some of which are sources and destinations. Formally we introduce the following
definition:
Definition 1. A telecommunication network is given by a 7-tuple ( N, I , F , J , S , D , R) where
Cardinality N is the cardinality of the network, i.e. the number of lines in the network;
Lines I is the collection of lines, modelled by intervals Ii = [ ai , bi ] ⊆ R, i = 1, ..., N;
Fluxes F is the collection of flux functions f i : [0, ρmax
i ] → R, i = 1, ..., N;
Nodes J is a collection of subsets of {±1, ..., ± N } representing nodes. If j ∈ J ∈ J , then the
transmission line I| j| is crossing at J as incoming line (i.e. at point bi ) if j > 0 and as outgoing line
424
4 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
(i.e. at point ai ) if j < 0. For each junction J ∈ J , we indicate by Inc( J ) the set of incoming lines,
that are Ii ’s such that i ∈ J, while by Out( J ) the set of outgoing lines, that are Ii ’s such that −i ∈ J.
We assume that each line is incoming for (at most) one node and outgoing for (at most) one node;
Sources S is the subset of {1, ..., N } representing lines starting from traffic sources. Thus, j ∈ S if
and only if j is not outgoing for any node. We assume that S = ∅;
Destinations D is the subset of {1, ..., N } representing lines leading to traffic destinations, Thus,
j ∈ D if and only if j is not incoming for any node. We assume that D = ∅;
Traffic distribution functions R is a finite collection of functions (also multivalued) r J : Inc( J ) ×
S × D → Out( J ). For every J, r J (i, s, d) indicates the outgoing direction of traffic that started at
source s has d as final destination and reached J from the incoming road i.
where M = [ T/Δt0 ] (here [·] indicates the floor function) represents the number of attempts
of sending a packet and T is the length of a processing time slot. The hypothesis (H4)
corresponds to assume Δt0 << T or, equivalently, M ∼ + ∞. Making the identification,
M = + ∞, we get:
Δt0
Δt av = ,
1 − p ( R k +1 )
and
v = v̄(1 − p( Rk+1 )). (3)
Let us call now ρ the averaged density and ρmax its maximum. We can interpret the probability
loss function p as a function of ρ and, using (3), determine the corresponding flux function,
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 4255
given by the averaged density times the average velocity. A possible choice of p is the
following:
0, 0 ≤ ρ ≤ σ,
p (ρ) = ρmax ( ρ−σ ) (4)
ρ (ρ −σ )
, σ ≤ ρ ≤ ρmax ,
max
from which
v̄, 0 ≤ ρ ≤ σ,
v (ρ) = σ (ρ −ρ) (5)
v̄ ρ ( ρ max−σ ) , σ ≤ ρ ≤ ρmax ,
max
and
v̄ρ, 0 ≤ ρ ≤ σ,
f (ρ) = v̄σ ( ρ max− ρ ) (6)
ρ max − σ , σ ≤ ρ ≤ ρmax .
p Ρ v Ρ f Ρ
v
2Σ Ρ
2 Ρ Σ v
Ρ
Ρ vΡ v2Σ Ρ
Σ Ρ Σ Ρmax Ρ Ρ
Σ Ρmax
Fig. 1. Loss probability, average velocity and flux behaviours for ρmax = 1, σ = 12 , v̄ = 1.
To simplify the treatment of the corresponding conservation laws, we will assume the
following:
(F) Setting ρmax = 1, on each line the flux f : [0, 1] → R is concave, f (0) = f (1) = 0 and there
exists a unique maximum point σ ∈]0, 1[.
Notice that the “tent” function
ρ, 0 ≤ ρ ≤ 12 ,
f (ρ) = (7)
1 − ρ, 12 ≤ ρ ≤ 1,
∂t ρi + ∂ x f i (ρi ) = 0, (9)
where we use the assumption (F). Therefore, the network load evolution is described by a
finite set of functions ρi : [0, + ∞ [ × Ii → [0, ρmax
i ].
Moreover, inside each line Ii we define a traffic-type function π i , which measures the portion
of the whole density coming from each source and travelling towards each destination:
426
6 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
∑ π i (t, x, s, d) = 1.
s ∈S ,d ∈D
In other words, π i (t, x, s, d) specifies the density fraction ρi (t, x ) that started from source s and
is moving towards the final destination d.
Assuming, on the discrete model, that a FIFO policy is used at nodes, it is natural that the
averaged velocity, obtained in the limit procedure, is independent from the original sources
of packets and their final destinations. In other words, we make the following hypothesis:
(H5) On each line Ii , the average velocity of packets depends only on the value of the density
ρi and not on the values of the traffic-type function π i .
As a consequence of hypothesis (H5), we deduce the semilinear equation
This equation is coupled with equation (9) on each line Ii . More precisely, equation (10)
depends on the solution of (9), while in turn at junctions the values of π i will determine the
traffic distribution on outgoing lines as explained below.
For simplicity and without loss of generality, we assume from now on that the fluxes f i are all
the same and we indicate them with f . Thus, the model for a single transmission line, consists
in the system of equations:
ρt + f (ρ) x = 0,
π t + π x · v(ρ) = 0.
To treat the evolution at junctions, let us introduce some notations. Fix a junction J with n
incoming transmission lines, say I1 , ..., In , and m outgoing transmission lines, say In+1 , ..., In+m
(junction of n × m type). The basic ingredient for the solution of Cauchy Problems by
Wave Front Tracking method is the solution of Riemann Problems (RPs) (see Bressan (2000),
Dafermos (1999), Serre (1999)).
We call RP for a junction the Cauchy Problem corresponding to an initial data ρ1,0 , ..., ρn+m,0 ∈
[0, 1], and π1s,d, ..., π ns,d+m ∈ [0, 1] which are constant on each transmission line.
Definition 3. A Riemann Solver (RS) for the junction J is a map that associates to Riemann data
ρ0 = (ρ1,0 , . . . , ρn+m,0 ) and Π0 = (π1,0 , . . . , π n+m,0 ) at J the vectors ρ̂ = (ρ̂1 , . . . , ρ̂n+m ) and
Π̂ = (π̂1 , . . . , π̂ n+m ) so that the solution on an incoming transmission line Ii , i = 1, . . . , n, is given
by the wave (ρi,0 , ρ̂i ) and on an outgoing one Ij , j = n + 1, . . . , n + m, is given by the waves (ρ̂ j , ρ j,0 )
and (π̂ j , π j,0 ). We require the following consistency condition:
(CC) RS ( RS (ρ0 , Π0 )) = RS (ρ0 , Π0 ).
Once a RS is defined and the solution of the RP is obtained, we can define admissible solutions
at junctions.
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 4277
Ωi = [0, γmax
i ], i = 1, ..., n,
Ω j = [0, γmax
j ], j = n + 1, ..., n + m,
and with γ̂inc = ( f (ρ̂i ), ..., f (ρ̂n )), γ̂out = ( f (ρ̂n+1 ), ..., f (ρ̂n+m )) where ρ̂ = (ρ̂1 , ..., ρ̂n+m ) is the
solution of the RP at the junction.
Now, we discuss some possible choices for the traffic distribution function:
1) r J : Inc( J ) × S × D → Out( J );
2) r J : Inc( J ) × S × D → Out( J ), i.e. r J is a multifunction.
If r J is of type 1), then each packet has a deterministic route, it means that, at the junction J,
the traffic that started at source s and has d as final destination, coming from the transmission
line Ii , is routed on an assigned line Ij (r J (i, s, d) = j).
Instead if r J is of type 2), at the junction J, the traffic with source s and destination d coming
from a line Ii is routed on every line Ij ∈ Out( J ) or on some lines Ij ∈ Out( J ). We can define
r J (i, s, d) in two different ways:
2a) r J : Inc( J ) × S × D → Out( J ),
r j (i, s, d) ⊆ Out( J );
2b) r J : Inc( J ) × S × D → [0, 1]Out( J ) ,
+1 +m
r J (i, s, d) = (αi,s,d,n
J , ..., αi,s,d,n
J )
i,s,d,j n+m i,s,d,j
with 0 ≤ α J ≤ 1, j ∈ {n + 1, ..., n + m}, ∑ α J = 1.
j = n +1
In case 2a) we have to specify in which way the traffic at junction J is splitted towards the
outgoing lines.
The definition 2b) means that, at the junction J, the traffic with source s and destination d
coming from line Ii is routed on the outgoing line Ij , j = n + 1, ..., n + m with probability
i,s,d,j
αJ .
such that
n+m
0 < α j,i < 1, ∑ α j,i = 1,
j = n +1
for each i = 1, ..., n and j = n + 1, ..., n + m, where α j,i is the percentage of packets arriving from the
i-th incoming transmission line that take the j-th outgoing transmission line.
In case 1) we can define the matrix A in the following way. Fix a time t and assume that for all
i ∈ Inc( J ), s ∈ S and d ∈ D , π i (t, ·, s, d) admits a limit at the junction J, i.e left limit at bi . For
i ∈ {1, ..., n }, j ∈ {n + 1, ..., n + m}, we set
The fluxes f i (ρi ) to be consistent with the traffic-type functions must satisfy the following
relation:
n
f j (ρ j (·, a j +)) = ∑ α j,i f i (ρi (·, bi −)),
i =1
for each j = n + 1, ..., n + m.
Let us analyze how to define the matrix A in the case 2a). We may assign ϕ(i, s, d) ∈ r J (i, s, d)
and set
α j,i = 0, if j ∈
/ r J (i, s, d).
However, it is more natural to assign a flexible strategy defining a set of admissible matrices
A in the following way
⎧ n+ m i,s,d,j ⎫
⎪
⎪
i,s,d,j
A : ∃α J ∈ [0, 1], ∑ α J = 1, α J
i,s,d,j
/ r J (i, s, d) : ⎪
= 0, if j ∈ ⎪
⎪
⎨ ⎪
⎬
j = n +1
A= i,s,d,j .
⎪
⎪ α j,i = ∑ π i (t, bi −, s, d)α J ⎪
⎪
⎪
⎩ s ∈S ,d ∈D , ⎪
⎭
j ∈r J ( i,s,d )
Finally, we treat now the case 2b). In this case the matrix A is unique and is defined by
i,s,d,j
α j,i = ∑ π i (t, bi −, s, d)α J . (13)
s ∈S ,d ∈D
We describe two different RSs at a junction that represent two different routing algorithms:
(RA1) We assume that
(A) the traffic from incoming transmission lines is distributed on outgoing transmission lines
according to fixed coefficients;
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 4299
(B) respecting (A) the router chooses to send packets in order to maximize fluxes (i.e., the
number of packets which are processed).
(RA2) We assume that the number of packets through the junction is maximized both over
incoming and outgoing lines.
We need some assumption on the matrix A (satisfied under generic conditions for m = n).
Let {e1 , ..., en } be the canonical basis of R n and for every subset V ⊂ R n indicate by V ⊥ its
orthogonal. Define for every i = 1, ..., n, Hi = {ei }⊥ , i.e. the coordinate hyperplane orthogonal
to ei and for every j = n + 1, ..., n + m let α j = {α j1 , ..., α jn } ∈ R n and define Hj = {α j }⊥ . Let
K be the set of indices k = (k1 , ..., k l ), 1 ≤ l ≤ n − 1, such that 0 ≤ k1 < k2 < ... < k l ≤ n + m
l
and for every k ∈ K set Hk = Hh . Letting 1 = (1, ..., 1) ∈ R n , we assume
h =1
/ Hk⊥ .
(C) for every k ∈ K, 1 ∈
In case 2b) the following result holds
Theorem 6. (Theorem 3.1 in Coclite et al. (2005) and 3.2 in Garavello et al. (2005)) Let ( N, I , F , J ,
S , D , R) be an admissible network and J a junction of n × m type. Assume that the flux f : [0, 1]
→ R satisfies (F) and the matrix A satisfies condition (C). For every ρ1,0 , ..., ρn+m,0 ∈ [0, 1], and for
every π1s,d , ...π ns,d+m ∈ [0, 1] , there exist densities ρ̂1 , ..., ρ̂n+m and a unique admissible centered weak
solution, ρ = (ρ1 , ..., ρn+m ) at J such that
We have
{ρi,0 } ∪ τ (ρi,0 ), 1 , if 0 ≤ ρi,0 ≤ σ,
ρ̂i ∈ i = 1, ..., n, (14)
[σ, 1] , if σ ≤ ρi,0 ≤ 1,
430
10 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
[0, σ], if 0 ≤ ρ j,0 ≤ σ, j = n + 1, ..., n + m,
ρ̂ j ∈ (15)
{ρ j,0 } ∪ 0, τ (ρ j,0 ) , if σ ≤ ρ j,0 ≤ 1,
and on each incoming line Ii , i = 1, ..., n, the solution consists of the single wave (ρi,0 , ρ̂i ), while on
each outgoing line I j , j = n + 1, ..., n + m, the solution consists of the single wave (ρ̂ j , ρ j,0 ). Moreover
π̂ i (t, ·, s, d) = π is,d for every t ≥ 0, i ∈ {1, ..., n }, s ∈ S , d ∈ D and
n i,s,d,j s,d
∑ αJ π i (t, bi −, s, d) f (ρ̂i )
π̂ j (t, a j +, s, d) = i=1
f (ρ̂ j )
in = γ1
where Γmax max + γmax and Γmax = γmax + γmax . Thus we want to have Γ as flux through
2 out 3 4
the junction.
One easily see that to solve the RP, it is enough to determine the fluxes γ̂i = f (ρ̂i ), i = 1, 2.
In fact, to have simple waves with the appropriate velocities, i.e. negative on incoming lines
and positive on outgoing ones, we get the constraints (14), (15). Observe that we compute
γ̂i = f (ρ̂i ), i = 1, 2 without taking into account the type of traffic distribution function.
We have to distinguish two cases:
in = Γ,
I Γmax
in > Γ.
II Γmax
In the first case we set γ̂i = γmax
i , i = 1, 2.
Let us analyze the second case in which we use the priority parameter q. Not all packets can
enter the junction, so let C be the amount of packets that can go through: qC packets come
from first incoming line and (1 − q )C packets from the second. In the space (γ1 , γ2 ), define
the following lines:
1−q
r q : γ2 = γ1 , rΓ : γ1 + γ2 = Γ,
q
and P the point of intersection of rq and rΓ . Recall that the final fluxes should belong to the
region:
Ωin = {(γ1 , γ2 ) : 0 ≤ γi ≤ γmax
i , i = 1, 2} .
We distinguish two cases:
a) P belongs to Ωin ,
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 431
11
Γ2
rq
Γ2max r
P
Q rq
P
Γ1max Γ1
b) P is outside Ωin .
In the first case we set (γ̂1 , γ̂2 ) = P, while in the second case we set (γ̂1 , γ̂2 ) = Q, with
Q = projΩin ∩r Γ ( P ) where proj is the usual projection on a convex set, see Figure 2.
out = Γ,
I Γmax
out > Γ.
II Γmax
In the first case γ̂ j = γmax
j , j = 3, 4. Let us determine γ̂ j in the second case, using the traffic
distribution parameter α. Since not all packets can go on the outgoing transmission lines,
we let C be the amount that goes through. Then αC packets go on the outgoing line I3 and
(1 − α)C on the outgoing line I4 . Consider the space (γ3 , γ4 ) and define the following lines:
1−α
r α : γ4 = γ3 ,
α
rΓ : γ3 + γ4 = Γ.
We have to distinguish case 2a) and 2b) for the traffic distribution function.
and G1 and G2 its endpoints. Since in case 2a) we have an infinite number of matrices A, each
of one determines a line rα , we choose the most “natural” line rα , i.e. the one nearest to the
statistic line determined by measurements on the network.
Recall that the final fluxes should belong to the region:
Ωout = ( γ3 , γ4 ) : 0 ≤ γ j ≤ γmax
j , j = 3, 4 .
a) G ∩ Ωout ∩ rΓ = ∅,
b) G ∩ Ωout ∩ rΓ = ∅ and γ3 ( G1 ) < γ3 ( R),
c) G ∩ Ωout ∩ rΓ = ∅ and γ3 ( G1 ) > γ3max .
If the set G has a priority over the line rΓ we set (γ̂3 , γ̂4 ) in the following way. In case a) we
define (γ̂3 , γ̂4 ) = projG∩Ωout ∩r Γ ( P ), in case b) (γ̂3 , γ̂4 ) = R, and finally in case c) (γ̂3 , γ̂4 ) = Q.
Otherwise, if rΓ has a priority over G we set (γ̂3 , γ̂4 ) = min F (γ, rα , G) where F is a convex
γ ∈Ωout
functional which depends on γ, rα and on the set G of the routing standards.
The vector π̂ is,d, j = 3, 4 are computed in the same way as for the algorithm (RA1).
4. Model assumptions
The aim of this section is to verify that the assumptions underlying the data networks
fluid-dynamic model (shortly FD model) are correct. Here we focus on the fixed-point models
to describe TCP, and considering various set-ups with TCP traffic in a single bottleneck
topology, we investigate queueing models for estimating packet loss rate. In what follows
we suppose ρmax = 1 and σ = 12 .
We analyze some models used in literature to evaluate the packets loss rate with the aim to
compare its behaviour with the function depicted in Figure 1.
In Figure 3, loss probability for P/E model (continuous curve) and FD model (dashed curve)
are shown, assuming C = σ = 1/2. For values C < ρ < 2C, the FD model overestimates the
loss probability.
p Ρ
0.8
0.6
0.4
0.2
Ρ
0.1 0.3 CΣ 0.7 0.9 Ρmax
Fig. 3. Loss probabilities. Dashed line: FD model. Continuous line: P/E model.
Observe that the P/E model is not realistic. In fact, the sender and the receiver are never
synchronized each other and whatever transmission protocol is used by the transport layer,
the receiver has a finite length buffer, where the packets wait to be processed and eventually
sent to the next node. Thus queueing models are needed, to infer about network performance.
Queueing models are good at predicting loss in a network with many independent users,
probably using different applications. Consider the traffic from TCP sources that send packets
through a bottleneck link. The traffic is aggregated and used as an arrival process for the
link. The arrival process, being the aggregation of independent sources, is approximated as a
Poisson process, and the aggregated throughput is used as the rate of the Poisson process (see
Wierman et al. (2003)). These considerations justify the assumption that the times between the
packets arrivals are exponentially distributed. Depending on the hypothesis on the length of
434
14 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
packets arriving to the queue the data transmission can be modelled with different queueing
models, as M/D/1/B and M/M/1/B, characterized by deterministic and exponentially
distributed lengths, respectively, and a buffer with capacity B − 1. From the queue length
distribution, known in closed formulas or iteratively in the finite buffer case, expected time in
queue and in the system, as well as packet loss rate can be derived. In what follows we denote
the arrival intensity by λ, the service intensity by μ and define the load as ρ = λ/μ.
4.1.2.1 Fixed packets dimension
In a scenario where all senders use the same data packets size, the queueing model M/D/1/B
is the most natural choice. The probability that the buffer is full gives the loss rate:
1 + ( ρ − 1) α B ( ρ )
p(ρ) = , (18)
1 + ρα B (ρ)
where
B −2 ρ ( B − k −1)
e (−1)k ( B − k − 1) k ρ k
α B (ρ) = ∑ k!
, B ≥ 2.
k =0
p Ρ
0.2
0.15
0.1
0.05
Ρ
0.7 0.9 Σ 1.1
Fig. 4. Loss rates. Dashed line: M/D/1/B model. Continuous line: FD model.
Figure 4 shows a comparison among the loss rate (16) and (18), assuming B = 10. However,
an M/D/1/B queue predicts a lower loss rate and higher throughput than is seen in the
true network. This is due to fact that in real routers packet sizes are not always fixed to
the maximum segment size, therefore packet sizes are more variable than a deterministic
distribution.
4.1.2.2 Exponentially distributed packets size
Assume the packet size is exponentially distributed. This assumption is true if we consider
the total amount of traffic as the superposition of traffic fluxes, coming from different TCP
sources, each configured to use its own packet size. The M/M/1/B queue is a good
approximation of the simulated bottleneck link shared among TCP sources under any traffic
load (Wierman et al. (2003)). The loss rate for the M/M/1/B queueing model is:
ρ B (1 − ρ )
p(ρ) = . (19)
1 − ρ B +1
In Figure 5, left, the loss bit rate for different values of the buffer (B = 10, 20, 30) is reported.
Notice that, increasing the B values, dashed lines tend to the continuous one.
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 435
15
p Ρ p Ρ
0.5 0.10
0.4 0.08
0.3 0.06
0.2 0.04
0.1 0.02
Ρ Ρ
0.3 0.6 Σ 1.4 1.8 0.9 Σ 1.1
Fig. 5. Left: Loss bit rate for different values of the buffer. Right: Loss probability function.
Dashed lines: M/M/1/B. Continuous line: P/E model.
In fact, the loss probability of the FD model represents for σ = 1 (up to a scale factor equal to
2) a limit case of (19):
ρ B (1 − ρ ) 0, 0 < ρ ≤ 1,
lim = ρ −1
B → ∞ 1 − ρ B +1 ρ , ρ > 1.
The loss probability for the queueing model (dashed line) and the P/E one (continuous line)
is shown in Figure 5, right. The two curves almost match for small bit rate values, i.e. in the
load range 0.9σ < ρ < 1.1σ. For greater loads values, the P/E model overestimates the loss
probability.
Theoretical and simulative studies pointed out that M/D/1/B and M/M/1/B queueing
models give good prediction of the loss rate in network with many independent users
performing short file transfers (shorts FTP). In literature other queueing models have been
considered to describe different scenarios, as bach arrivals. For a comparison among different
models see Figure 6, where the packet loss rate for M/D/1/B, M/M/1/B, M2 /M/1/B,
M5 /M/1/B and the P/E models are reported for the case B = 100 and loads in the interval
0.8 < ρ < 1.1. Observe that Mr /M/1/B denotes a queue with Poisson batch arrivals of size
r and describes the fact that TCP traffic is likely to be quite bursty due to synchronized loss
events that are experienced by multiple users.
p Ρ
PE
0.14
M M 1B
0.12 M D1B
0.1 M 2 M 1B
M 5 M 1B
0.08
0.06
0.04
0.02
Ρ
0.85 0.9 0.95 1 1.05 1.1
predict the loss rate equally well. However, under low loss environments, the best queueing
model depends on the type of transfers by TCP sources, i.e. persistent or transient. It is shown
in Olsen (2003) that M/D/1/B queues estimations of the loss rate can be used for transient
sources. However, for sources with a slightly longer on and off periods, M/M/1/B queues
best predict the loss rate, and for (homogeneous) persistent sources, Mr /M/1/B queues give
better performance inferences, due to the traffic burstiness stemming from the TCP slow-start
and source synchronization effect. Even if some models are more appropriate in situations
of low load, others when the load is heavy, Figure 6 shows that the assumption on the loss
probability function of the FD model is valid.
4.2 Velocity
The loss probability, influencing the average transmission time, has effects on the average
velocity of packets:
v(ρ) = v̄ (1 − p(ρ)) .
The behaviour of the average velocity in the FD model
v̄, 0 ≤ ρ ≤ /2,
v (ρ) = 1− ρ (20)
v̄ ρ , 1/2 ≤ ρ ≤ 1,
is depicted in Figure 1. Notice that the velocity is constant if the system is free (no losses). Over
the threshold, losses occur, and the average travelling time increasing reduces the velocity.
The average packet velocity for the P/E model and the M/M/1/B model is plotted in Figure
7. Such two curves fit the curve of the FD model, confirming the goodness of its assumptions.
v Ρ v Ρ
1 1
0.8 0.8
0.6 0.6
0.4 0.4
0.2 0.2
Ρ Ρ
0.2 0.4 Σ 0.6 0.8 Ρmax 0.4 Σ 1.2 1.6 Ρmax
4.3 Flux
Once the velocity function is known, the flux is given by:
f (ρ) = v(ρ)ρ.
f Ρ f Ρ
1
0.6
0.5 0.8
0.4
0.6
0.3
0.4
0.2
0.2
0.1
Ρ Ρ
0.2 0.4 Σ 0.6 0.8 Ρmax 0.4 0.8 Σ 1.2 1.6 Ρmax
Fig. 8. Flux. Left: P/E model. Right: M/M/1/B (for B = 5, B = 15, B = 25).
The flux in the P/E model and M/M/1/B model are depicted in Figure 8. Note the effects of a
finite buffer on the maximal value of the flux. If B tends to infinity, the flux best approximates
the FD model flux. For small B values, the maximal flux decreases and the load value in which
the maximum is attained is shifted on the right due to the fact that packets are lost for load
values smaller than the threshold.
and, to obtain finite values, we assume that the optimization horizon is given by [0, T ] for
some T > 0.
Notice that this corresponds to the following operation:
- average in time and then w.r.t packets, to compute the probability loss function;
- average in space, to pass to the limit and get model (9);
- integrate in space and time to get the final value.
The value of such functionals depends on the order in which averages and integrations are
taken.
Summarizing, we get the following optimal control problems:
Data. Network (I , J ); initial data ρ̄ = (ρ̄i )i=1,...,N ; optimization horizon [0, T ], T > 0.
Dynamics. Equation (9) on each line I ∈ I and Riemann Solver RS J for each J ∈ J ,
depending on controls α and q.
Control Variables. Traffic distribution parameter t → α J (t) and priority parameter t → q J (t),
i.e. two controls for every node J ∈ J .
Control Space. {(α J , q J ) : J ∈ J , α J , q J ∈ L ∞ ([0, T ], [0, 1])}.
Cost functions. Integrated functionals:
T T
max J1 (t) dt, min J2 (t) dt.
0 0
Definition 7. We call (Pi ) the optimal control problem referred to the functional Ji :
The direct solution of problems (Pi ) corresponds to a centralized approach. We propose the
alternative approach of decentralized algorithm more precisely:
Step 1 For every node J and Riemann Solver RS J , solve the simplified optimal control
problem:
max (or min) Ji ( T ),
for T sufficiently big, on the network formed only by J with constant initial data, taking
approximate solutions when there is lack of existence.
Step 2 Apply the obtained optimal control at every time t in the optimization horizon and at
every node J, taking the value at J on each line as initial data.
Notice that, for T sufficiently big, we can assume that the datum is constant on each line: this
strongly simplifies the approach.
We consider a single node J with incoming lines, labelled by 1 and 2, and with outgoing lines,
labelled by 3 and 4.
Since ρ = γ, 0 ≤ ρ ≤ 12 , and ρ = 1 − γ
, 12 ≤ ρ ≤ 1, we have that v ρϕ = H − s ϕ +
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 439
19
1− ρϕ 1−ρ
ρϕ H s ϕ , ϕ = 1, 2, v ρψ = H − sψ + ρψ ψ H sψ , ψ = 3, 4, where H ( x ) is the Heavyside
function and s ϕ and sψ are determined by the solution to the RP at J:
−1, if ρ ϕ,0 ≤ 12 and Γ = Γ in , or ρ ϕ,0 ≤ 12 , q ϕ Γ = γmax
ϕ and Γ = Γ out ,
sϕ = ϕ = 1, 2,
+1 if ρ ϕ,0 > 12 , or ρ ϕ,0 ≤ 12 , q ϕ Γ < γmax
ϕ and Γ = Γ out ,
−1, if ρψ,0 < 12 , or ρ ϕ,0 ≥ 12 , αψ Γ < γmax
ψ and Γ = Γ in ,
sψ = ψ = 3, 4,
+1 if ρψ,0 ≥ 2 and Γ = Γ out , or ρψ,0 ≥ 2 , αψ Γ = γmax
1 1
ψ and Γ = Γ in .
with:
q, if ϕ = 1, α, if ψ = 3,
qϕ = αψ =
1 − q, if ϕ = 2, 1 − α, if ψ = 4.
Then, for T sufficiently big,
(v) if s3 = − s4 = +1, and β− ≤ 1 ≤ β+ , or 1 ≤ β− ≤ β+ , or β− ≤ β+ ≤ 1, α ∈ 1
1+ β − , 1 .
If Γ = Γ out , the cost functionals J1 ( T ) and J2 ( T ) depend only on q. The optimal values for J1 ( T ) and
J2 ( T ) are the same for α when Γ = Γ in , if we substitute α with q, β− with p− , and β+ with p+ .
5
6 6 16 17
15
1 1 3 11 14 18 19 29
7
30 43
2 7 12 27 22
4 15 16
44 59
41 24
8 2 10 13 12 25 28 20
57
9 11 8 23 26 17 39 42 23 60
19 24 13 37 40 21 55 58
3 21
35 38 53 56
20 22 9 18
31 36 51 54
4 33 14
32 34 49 52
10
45 50
5 47
46 48
We distinguish three case studies, that can be called, case A, B, and C. In Table 1, we report
the initial conditions ρi,0 and the boundary data (if necessary) ρbi,0 for case A.
As for case B, instead, we consider the same initial conditions of case A, but boundary data
equal to 0.75.
Table 2 contains initial and boundary conditions for case C. An initial condition of 0.75 is
assumed for the inner lines of the network, that are not present in Table 2.
As in Bretti et al. (2006), we consider approximations obtained by the numerical method of
Godunov (Godunov (1959)), with space step Δx = 0.0125 and time step determined by the
CFL condition (Godlewsky et al. (1996)). The telecommunication network is simulated in a
time interval [0, T ], where T = 50 min. We study four simulation cases, choosing the flux
function (7) or the flux function (8):
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 441
21
Table 1. Initial conditions and boundary data for the lines of the network for case A.
Table 2. Initial conditions and boundary data for the lines of the network for case C.
1. at each node parameters, that optimize the cost functionals J1 and J2 (optimal case);
2. random α and q parameters (static random case) chosen in a random way at the beginning of
the simulation process (for each simulation case, 100 static random simulations are made);
3. dynamic random parameters (dynamic random case) which change randomly at every step
of the simulation process.
In the following pictures, we show the values of the functionals J1 and J2 , computed on
the whole network, as function of time. A legend for every picture indicates the different
simulation cases.
The algorithm of optimization, which is of local type, can be applied to complex networks,
without compromising the possibility of a global optimization. This situation is evident if we
442
22 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
J2 J2
46 optimal optimal
dynamic random 38.375
44 dynamic random
static random
38.35
42
38.325
40 38.3
38.275
38
38.25
36 38.225
t min t min
10 20 30 40 50 38 40 42 44 46 48 50
Fig. 10. J1 for flux function (8), case A, and zoom around the optimal and dynamic random
case (right).
J2 J2
120 100.5 optimal
110 dynamic random
100.45
100
100.4
optimal
90
dynamic random
static random 100.35
80
t min t min
10 20 30 40 50 12.82 12.84 12.86 12.88 12.9
Fig. 11. J2 for flux function (8), case B, and zoom around the optimal and dynamic random
case (right).
J1 J2
36 optimal 300
dynamic random 275
34
static random
32 250
225
30
200 optimal
28 dynamic random
175 static random
26 150
t min t min
5 10 15 20 25 30 5 10 15 20 25 30
consider the behaviour of J1 for case A and J2 for case B. For cases A and B, the cost functionals
simulated with flux function (7) are constant, which is not surprising since the initial data on
the lines is less than 12 . In case C, we present the behaviour of the cost functionals J1 and J2
for flux function (7). Boundary data are of Dirichlet type (unlike case A and B where we have
considered Neumann boundary conditions) and the network is simulated with high incoming
fluxes for the incoming lines and high initial conditions for inner lines. We can see, from Figure
12, that J1 and J2 are not constant as in cases A and B. Moreover, we have to take in mind
that we have two different optimization algorithms for J1 and J2 . Notice that the dynamic
random case follows the optimal case for J2 and not for J1 . Indeed, the optimal algorithm for
J1 presents an interesting aspect. When simulation begins, it is worst than the static random
configuration. In the steady state, instead, the optimal configuration is the highest.
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 443
23
As for the dynamic random simulation, its behaviour looks very similar to the optimal one
for cases A and B (for case C, only J2 presents optimal and dynamic random configurations,
that are very similar). Hence, we could ask if it is possible to avoid the optimization of
the network, and operate in dynamic random conditions. Indeed, this last case originates
strange phenomena, that cannot be modelled, hence it is preferred to avoid such a situation
for telecommunication network design. To give a confirmation of this intuition, focus the
attention on line 13, that is completely inside the network and it is strongly influence by the
dynamics at various nodes. In Figure 13, we see that, using optimal parameters, the density on
line 13 shows a smoother profile than the one obtained through a dynamic random simulation.
Ρ10,x
0.75
0.7
0.65
0.6
0.55
x
0.2 0.4 0.6 0.8 1
Fig. 13. Behaviour of the density on line 13 of the network of Figure 9, for t = 10, flux
function (7), case C, in optimal and dynamic random simulations. Dashed line: optimal
simulation for J2 ; solid line: dynamic random simulation.
6. Conclusions
A fluid-dynamic model for data networks has been described. The main advantages of this
approach, with respect to existing ones, can be summarized as follows. The fluid-dynamic
models are completely evolutive, thus they are able to describe the traffic situation of a
network every instant of time, overcoming the difficulties encountered by many static models.
An accurate description of queues formation and evolution on the network is possible. The
theory permits the development of efficient numerical schemes for very large networks. The
model is based on packets conservation at intermediate time scales, whose flux is determined
via a loss probability function (at fast time scales) and on a semilinear equation for the
evolution of the percentage of packets going from an assigned source to a given destination.
The choice of the loss probability function is of paramount importance in order to achieve
a feasible model. The fluid dynamic model has been compared with those obtained
using various queueing paradigms, from proportional/excess to models with finite capacity,
including different distributions for packet sizes. The final result is that such models give rise
to velocity profiles and flux functions which are quite similar to the fluid dynamic ones.
In order to solve dynamics at node,Riemann Solvers have been defined considering different
traffic distribution functions (which indicate for each junction J the outgoing direction of
traffic that started at source s, has d as final destination and reached J from an assigned
incoming road) and rules RA1 and RA2. The algorithm RA1, already used for road traffic
models, requires the definition of a traffic distribution matrix, whose coefficients describe the
percentage of packets, forwarded from incoming lines to outgoing ones. Using the algorithm
444
24 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
RA2, not considered for urban traffic as redirections are not expected from modelling point of
view (except in particular cases, as strong congestions or road closures), priority parameters,
indicating priorities among flows of incoming lines, and distribution coefficients have to be
assigned.
The main differences between the two algorithms are the following. The first one simply
sends each packet to the outgoing line which is naturally chosen according to the final packet
destination. The algorithm is blind to possible overloads of some outgoing lines and, by some
abuse of notation, is similar to the behaviour of a “switch”. The second algorithm, on the
contrary, sends packets to outgoing lines in order to maximize the flux both on incoming and
outgoing lines, thus taking into account the loads and possibly redirecting packets. Again by
some abuse of notation, this is similar to a “router” behaviour. Hence, RA1 forwards packets
on outgoing lines without considering the congestion phenomena, unlike RA2. Observe that
a routing algorithm of RA1 type working through a routing table, according to which flows
are sent with prefixed probabilities to the outgoing links, is of “distance vector” type. Reverse,
an algorithm of RA2 type can redirect packets on the basis of link congestions, so it works on
the link states (hence on their congestions) and so it is of “link-state” type.
The performance analysis of the networks was made through the use of different cost
functionals, measuring average velocity and average travelling time, using the model
consisting of the conservation law. The optimization is over parameters, which assign priority
among incoming lines and traffic distribution among outgoing lines. A complete solution is
provided in a simple case, and then used as local optimal choice for a complex test network.
Three different choices of parameters have been considered: locally optimal, static random,
and dynamic random (changing in time). The local optimal outperforms the others. Then, the
behaviour of packets densities on the lines, that permits to rule out the dynamic random case
has been analyzed.
All the optimization results have been obtained using a decentralized approach, i.e. an
approach which sets local optimal parameters for each junction of the network. The
cooperative aspect of such decentralized approach is the following. When a router optimizes
the (local) functionals, it takes into considerations entering and exiting lines. Such lines
reach other nodes, which benefit from the optimal choice. This in fact reflects in good
global behavior as showed by simulations, described below. In future we aim to extend the
optimization results to more general junctions and to explore global optimization techniques.
7. References
Alderson, D.; Chang, H.; Roughan, M.; Uhlig, S. & Willinger, W. (2007). The many facets
of internet topology and traffic, Networks and Heterogenous Media, Vol. 1, Issue 4,
569–600, ISSN 1556-1801.
Baccelli, F.; Chaintreau, A.; De Vleeschauwer, D. & McDonald, D. (2006). HTTP turbulence,
Networks and Heterogeneous Media, Vol. 1, 1–40, ISSN 1556-1801.
Baccelli, F; Hong, D. & Liu, Z. (2001). Fixed points methods for the simulation of the sharing
of a local loop by large number of interacting TCP connections, Proceedings of the ITC
Specialist Conference on Local Loop, 1–27, Barcelona, Spain, (also available in Technical
Report RR-4154, INRIA, Le Chesnay Cedex, France), ISBN 0249-6399.
Bretti, G.; Natalini, R. & Piccoli, B. (2006). Numerical approximations of a traffic flow model
on networks, Networks and Heterogeneous Media, Vol. 1, 57–84, ISSN 1556-1801.
Bressan, A. (2000). Hyperbolic Systems of Conservation Laws - The One-dimensional Cauchy
Problem, Oxford University Press, ISBN 0198507003, Oxford.
Simulation andRouting
Simulation and Optimal Optimal Routing
of Data Flows Using a of
FluidData Flows
Dynamic ApproachUsing a Fluid Dynamic Approach 445
25
Cascone, A.; D’Apice, C.; Piccoli, B. & Raritá, L. (2007). Optimization of traffic on road
networks, Mathematical Models in Applied Sciences, Vol. 17, 1587–1617, ISSN 0218-2025.
Cascone, A.; Marigo, A.; Piccoli, B. & Rarità, L. (2010). Decentralized optimal routing for
packets flow on data networks, Discrete and Continuous Dynamical Systems - Series B
(DCDS - B), Vol. 13, No. 1, 59–78, ISSN 15313492.
Coclite, G.; Garavello, M. & and Piccoli, B. (2005). Traffic Flow on a Road Network, SIAM
Journal on Mathematical Analysis, Vol. 36, 1862–1886, ISNN 0036-1410.
Dafermos, C. (1999). Hyperbolic Conservation Laws in Continuum Physics, Springer-Verlag, ISBN
354064914X, New York.
Daganzo, C. (1997). Fundamentals of Transportation and Traffic Operations, Pergamon-Elsevier,
ISBN 0080427855, Oxford.
D’Apice, C.; Manzo, R. & Piccoli, B. (2006). Packet flow on telecommunication networks, SIAM
Journal on Mathematical Analysis, Vol. 38, No. 3, 717–740, ISNN 0036-1410.
D’Apice, C.; Manzo, R. & Piccoli, B. (2008). A fluid dynamic model for telecommunication
networks with sources and destinations, SIAM Journal on Applied Mathematics (SIAP),
Vol. 68, No. 4, 981–1003, ISSN 0036-1399.
D’Apice, C.; Manzo, R. & Piccoli, B. (2010). On the validity of fluid-dynamic models for data
networks, Journal of Networks, submitted, ISSN 1796-2056.
Garavello, M. & Piccoli, B. (2006). Traffic flow on networks, AIMS Series on Applied
Mathematics, vol. 1, American Institute of Mathematical Sciences, ISBN 1601330006,
United States.
Godlewsky E. & Raviart, P. (1996). Numerical Approximation of Hyperbolic Systems of
Conservation Laws, Springer Verlag, ISBN 978-0-387-94529-3, Heidelberg.
Garavello, M. & Piccoli, B. (2005). Source-Destination Flow on a Road Network,
Communication in Mathematical Sciences, Vol. 3, 261–283, ISSN 1539-6746.
Godunov, S. K. (1959). A difference method for numerical calculation of discontinuous
solutions of the equations of hydrodynamics, Mat. Sb., Vol. 47, 271–306, ISSN
0368-8666.
Holden, H. & Risebro, N. H. (1995). A mathematical model of traffic flow on a network of
unidirectional roads, SIAM Journal on Mathematical Analysis, Vol. 26, 999–1017, ISNN
0036-1410.
Marigo, A. (2006). Optimal distribution coefficients for telecommunication networks, Networks
and Heterogeneous Media, Vol. 1, 315–336, ISNN 1556-1801.
Kelly, F.; Maulloo, A. K. & Tan, D. K. H. (1998). Rate control in communication networks:
shadow prices, proportional fairness and stability, Journal of the Operational Research
Society, Vol. 49, 237–252, ISSN 0160-5682.
Lighthill, M. J. & Whitham, G. B. (1955). On kinetic waves. II. Theory of Traffic Flows on Long
Crowded Roads, Proc. R. Soc. Lond. Ser. A Math. Phys. Eng. Sci., Vol. 229, 317–345, doi:
10.1098/rspa.1955.0089.
Newell, G. F. (1980). Traffic Flow on Transportation Networks, MIT Press, ISBN 0262140322,
Cambridge (MA,USA).
Olsén, J. (2003). On Packet Loss Rates used for TCP Network Modeling, Technical Report,
Uppsala University.
Richards, P. I. (1956). Shock Waves on the Highway, Oper. Res., Vol. 4, 42–51, ISSN 0030-364X.
Serre, D. (1999). Systems of conservation laws I and II, Cambridge University Press, ISBN
521582334, 521633303, Cambridge.
446
26 Telecommunications Networks – Current Status Telecommunications
and Future Trends Networks
Tanenbaum, A. S. (2003). Computer Networks, Prentice Hall, ISBN 0130661023, Upper Saddle
River.
Wierman, A.; Osogami, T. & Olsén, J. (2003). A Unified Framework for Modeling TCP-Vegas,
TCP-SACK, and TCP-Reno, Proceedings of the IEEE/ACM International Symposium
on modeling, Analysis and Simulation of Computer and Telecommunication Systems
(MASCOTS), 269–278, ISBN 0-7695-2039-1, Orlando, Florida, October 2003, Los
Alamitos, California, Washington.
Willinger, W. & Paxson, V. (1998). Where Mathematics meets the Internet, Notices of the AMS,
Vol. 45, 961–970, ISSN 0002-9920.