首页 > 最新文献

2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)最新文献

英文 中文
Novel user-based packet classification in 802.16e to provide better performance 802.16e中基于用户的新颖数据包分类,提供更好的性能
Amitkeerti M. Lagare, D. Das
IEEE 802.16e WiMAX standard classifies packets in the decreasing order of priority as UGS, RTPS, eRTPS, nRTPS, BE. This mechanism of classification is application dependent and a user will not be able to request for a change in priority even though higher priority traffic bandwidth might be available and the user is ready to pay more for elevation of low priority traffic to higher priority. We propose a new technique in this paper to implement user based priority between subscriber station (SS) and base station (BS). We suggest eight different priority levels for SS/User. For eight different priorities classification and information exchange between SS and BS, we propose to use unused bits of common encoding Type-Length-Value (TLV) sub-header in the Range Response (RNG-RSP) header. The simulation results reveal that the throughput of BE traffic for high priority user is 50% more than regular user when the number of User Equipment (UE) / SS in the system is 10.
IEEE 802.16e WiMAX标准将报文优先级由高到低分为UGS、RTPS、eRTPS、nRTPS、BE。这种分类机制依赖于应用程序,用户将无法请求更改优先级,即使可能有更高优先级的流量带宽可用,并且用户准备为将低优先级的流量提升到更高优先级而支付更多的费用。本文提出了一种在用户站和基站之间实现基于用户的优先级的新技术。我们建议SS/User有八个不同的优先级。对于SS和BS之间的8种不同的优先级分类和信息交换,我们建议在范围响应(RNG-RSP)报头中使用未使用的通用编码类型-长度-值(TLV)子报头。仿真结果表明,当系统中UE (user Equipment) / SS数量为10时,高优先级用户的业务吞吐量比普通用户高50%。
{"title":"Novel user-based packet classification in 802.16e to provide better performance","authors":"Amitkeerti M. Lagare, D. Das","doi":"10.1109/ANTS.2009.5409878","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409878","url":null,"abstract":"IEEE 802.16e WiMAX standard classifies packets in the decreasing order of priority as UGS, RTPS, eRTPS, nRTPS, BE. This mechanism of classification is application dependent and a user will not be able to request for a change in priority even though higher priority traffic bandwidth might be available and the user is ready to pay more for elevation of low priority traffic to higher priority. We propose a new technique in this paper to implement user based priority between subscriber station (SS) and base station (BS). We suggest eight different priority levels for SS/User. For eight different priorities classification and information exchange between SS and BS, we propose to use unused bits of common encoding Type-Length-Value (TLV) sub-header in the Range Response (RNG-RSP) header. The simulation results reveal that the throughput of BE traffic for high priority user is 50% more than regular user when the number of User Equipment (UE) / SS in the system is 10.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116937885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How much to pay for protection in fiber access networks: Cost and reliability tradeoff 为光纤接入网络的保护支付多少:成本和可靠性的权衡
L. Wosinska, Jiajia Chen
The economical aspects are most critical in the access part of the networks because of the low sharing factor of the total cost. It makes the deployment of fiber access networks relatively slow due to the high investment cost involved. Several fiber access network architectures such as homerun (sometimes referred to as point-to-point P2P), active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand from both residential and business customers. Meanwhile, fault management and reliable service delivery becomes more significant due to increased dependency on electronic services all over society and the growing importance of reliable service delivery. However, there is a tradeoff between the cost of protection and the level of service reliability. Obviously, in the access part of the networks, improving reliability performance by duplication of network resources (and capital expenditures CAPEX) can be too expensive. Therefore, a real challenge for an access network operator is to operate a cost-efficient, yet reliable network that provides leading edge services at low price and with minimal downtime. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparse and dense populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort is put on minimizing the operational expenditures (OPEX) during the access network lifetime.
由于总成本的分摊系数较低,在网络的接入部分,经济方面是最关键的。由于投资成本高,光纤接入网的部署相对缓慢。一些光纤接入网架构,如本垒(有时被称为点对点P2P)、有源光网络(aon)和无源光网络(pon)已经被开发出来,以支持住宅和商业客户不断增长的带宽需求。与此同时,由于全社会对电子服务的依赖程度越来越高,可靠的服务提供变得越来越重要,故障管理和可靠的服务提供变得更加重要。然而,在保护成本和服务可靠性水平之间存在权衡。显然,在网络的访问部分,通过重复网络资源(和资本支出CAPEX)来提高可靠性性能可能过于昂贵。因此,接入网运营商面临的真正挑战是运营一个经济高效、可靠的网络,以较低的价格和最短的停机时间提供领先的服务。本文介绍了光纤接入网的发展,并比较了一些典型案例的可靠性性能与投资和管理成本的关系。我们考虑了在人口稀疏和密集地区部署的标准和新颖架构。虽然最近的一些工作集中在降低CAPEX的PON保护方案上,但当前和未来的努力将放在最小化接入网生命周期内的运营支出(OPEX)上。
{"title":"How much to pay for protection in fiber access networks: Cost and reliability tradeoff","authors":"L. Wosinska, Jiajia Chen","doi":"10.1109/ANTS.2009.5409852","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409852","url":null,"abstract":"The economical aspects are most critical in the access part of the networks because of the low sharing factor of the total cost. It makes the deployment of fiber access networks relatively slow due to the high investment cost involved. Several fiber access network architectures such as homerun (sometimes referred to as point-to-point P2P), active optical networks (AONs) and passive optical networks (PONs) have been developed to support the growing bandwidth demand from both residential and business customers. Meanwhile, fault management and reliable service delivery becomes more significant due to increased dependency on electronic services all over society and the growing importance of reliable service delivery. However, there is a tradeoff between the cost of protection and the level of service reliability. Obviously, in the access part of the networks, improving reliability performance by duplication of network resources (and capital expenditures CAPEX) can be too expensive. Therefore, a real challenge for an access network operator is to operate a cost-efficient, yet reliable network that provides leading edge services at low price and with minimal downtime. In this paper we present the evolution of fiber access networks and compare reliability performance in relation to investment and management cost for some representative cases. We consider both standard and novel architectures for deployment in both sparse and dense populated areas. While some recent works focused on PON protection schemes with reduced CAPEX the current and future effort is put on minimizing the operational expenditures (OPEX) during the access network lifetime.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114175257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Evaluation of the P2P file sharing technique by Indexed-Priority Metric 基于索引优先级度量的P2P文件共享技术评价
T. Takabatake, Y. Komano
Recently, the improvements in processing performance of a computer and high speed communication of an optical fiber have been achieved, so that the amount of data which are processed by a computer and flowed on a network has been increasing greatly. However, in a client-server system, since the server receives and processes the amount of data from the clients through the network, a load on the server is increasing. Thus, there are needed to introduce a server with high processing ability and to have a line with high bandwidth. In this paper, concerning to P2P networks to resolve the load on a specific server, a criterion called an Indexed-Priority Metric has been proposed and its performance is evaluated. The proposed metric is to allocate some files to each node. As a result, the load on a specific server can distribute them to each node equally well. Simulation results show that the proposed metric can make files distribution on the specific server.
近年来,随着计算机处理性能的提高和光纤高速通信的实现,由计算机处理并在网络上流动的数据量大大增加。但是,在客户机-服务器系统中,由于服务器通过网络接收和处理来自客户机的大量数据,因此服务器上的负载正在增加。因此,需要引入具有高处理能力的服务器和具有高带宽的线路。本文针对P2P网络解决特定服务器上的负载问题,提出了索引优先级度量标准,并对其性能进行了评价。建议的度量是为每个节点分配一些文件。因此,特定服务器上的负载可以将它们均匀地分配到每个节点。仿真结果表明,该度量方法可以实现文件在指定服务器上的分发。
{"title":"Evaluation of the P2P file sharing technique by Indexed-Priority Metric","authors":"T. Takabatake, Y. Komano","doi":"10.1109/ANTS.2009.5409860","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409860","url":null,"abstract":"Recently, the improvements in processing performance of a computer and high speed communication of an optical fiber have been achieved, so that the amount of data which are processed by a computer and flowed on a network has been increasing greatly. However, in a client-server system, since the server receives and processes the amount of data from the clients through the network, a load on the server is increasing. Thus, there are needed to introduce a server with high processing ability and to have a line with high bandwidth. In this paper, concerning to P2P networks to resolve the load on a specific server, a criterion called an Indexed-Priority Metric has been proposed and its performance is evaluated. The proposed metric is to allocate some files to each node. As a result, the load on a specific server can distribute them to each node equally well. Simulation results show that the proposed metric can make files distribution on the specific server.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115135896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
VPN topology abstraction service using centralized core capacity sharing scheme VPN拓扑抽象业务采用集中式核心容量共享方案
R. Ravindran, Changcheng Huang, K. Thulasiraman
This paper deals with the problem of sharing VPN service provider's core topology and link state information with its VPNs. This is provided as a service using topology abstraction principles. The topology abstractions are generated considering factors such as VPN SLA requirements, fairness and maximizing core network utilization. The paper deals with algorithms applicable to generate topology abstraction for the VPNs in a centralized manner. In this context we define a problem called the VPN core capacity sharing problem. We study this problem using algorithms based on multi-commodity flow theory. We observe from simulation analysis over several topologies that applying the maximum multi-commodity flow based partitioning scheme improves the call performance and network utilization statistics compared to a previously proposed topology abstraction scheme based on maximum concurrent flow theory.
本文研究了VPN服务提供商的核心拓扑和链路状态信息与其VPN共享的问题。这是作为使用拓扑抽象原则的服务提供的。拓扑抽象的生成考虑了VPN SLA需求、公平性和核心网利用率最大化等因素。本文研究了集中生成vpn拓扑抽象的算法。在这种情况下,我们定义了一个称为VPN核心容量共享问题的问题。我们使用基于多商品流理论的算法来研究这个问题。通过对几种拓扑的仿真分析,我们发现,与先前提出的基于最大并发流理论的拓扑抽象方案相比,应用基于最大多商品流的分区方案可以提高调用性能和网络利用率统计数据。
{"title":"VPN topology abstraction service using centralized core capacity sharing scheme","authors":"R. Ravindran, Changcheng Huang, K. Thulasiraman","doi":"10.1109/ANTS.2009.5409864","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409864","url":null,"abstract":"This paper deals with the problem of sharing VPN service provider's core topology and link state information with its VPNs. This is provided as a service using topology abstraction principles. The topology abstractions are generated considering factors such as VPN SLA requirements, fairness and maximizing core network utilization. The paper deals with algorithms applicable to generate topology abstraction for the VPNs in a centralized manner. In this context we define a problem called the VPN core capacity sharing problem. We study this problem using algorithms based on multi-commodity flow theory. We observe from simulation analysis over several topologies that applying the maximum multi-commodity flow based partitioning scheme improves the call performance and network utilization statistics compared to a previously proposed topology abstraction scheme based on maximum concurrent flow theory.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126454312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating buffer-constrained routers under bursty and shaped traffic 在突发和形状流量下评估缓冲约束路由器
A. Wander, A. Varma
We consider traffic models for the evaluation of buffer-constrained routers, such as routers with all-optical data paths. We show that conventional models may substantially underestimate the packet loss behavior. We propose an alternative method based on the multi-fractal wavelet model (MWM). Using this new model, we show that routers are susceptible to high losses under bursty Internet traffic conditions. However, if traffic can be shaped into a deterministic arrival stream, then large-scale buffer-constrained routers are possible within backbone networks.
我们考虑流量模型的评估缓冲约束路由器,如路由器与全光数据路径。我们表明,传统的模型可能大大低估了丢包行为。我们提出了一种基于多重分形小波模型(MWM)的替代方法。使用这个新模型,我们证明了路由器在突发的互联网流量条件下容易受到高损耗。然而,如果流量可以被塑造成一个确定性的到达流,那么在骨干网络中大规模的缓冲约束路由器是可能的。
{"title":"Evaluating buffer-constrained routers under bursty and shaped traffic","authors":"A. Wander, A. Varma","doi":"10.1109/ANTS.2009.5409851","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409851","url":null,"abstract":"We consider traffic models for the evaluation of buffer-constrained routers, such as routers with all-optical data paths. We show that conventional models may substantially underestimate the packet loss behavior. We propose an alternative method based on the multi-fractal wavelet model (MWM). Using this new model, we show that routers are susceptible to high losses under bursty Internet traffic conditions. However, if traffic can be shaped into a deterministic arrival stream, then large-scale buffer-constrained routers are possible within backbone networks.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133034033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of on-off keying optical code-division multiple access using feedback-controlled spreading sequences 基于反馈控制扩频序列的开关键控光码分多址性能
Mihiro Nojima, M. Hamamura
Optical code-division multiple access (OCDMA) using feedback-controlled spreading sequences (FCSSs) (FCSS/OCDMA) is presented. The bit-error rate characteristics of asynchronous FCSS/OCDMA are demonstrated by simulations in the presence of avalanche photodiode noise and thermal noise. The results indicate that FCSS/OCDMA achieves the single-user performance of conventional on-off keying (OOK) OCDMA (OOK-OCDMA) with double optical hard-limiters.
提出了基于反馈控制扩频序列(FCSS/OCDMA)的光码分多址(OCDMA)技术。仿真研究了雪崩光电二极管噪声和热噪声存在下异步FCSS/OCDMA的误码率特性。结果表明,FCSS/OCDMA具有双光硬限制器的传统开关键控(OOK) OCDMA (OOK-OCDMA)的单用户性能。
{"title":"Performance of on-off keying optical code-division multiple access using feedback-controlled spreading sequences","authors":"Mihiro Nojima, M. Hamamura","doi":"10.1109/ANTS.2009.5409870","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409870","url":null,"abstract":"Optical code-division multiple access (OCDMA) using feedback-controlled spreading sequences (FCSSs) (FCSS/OCDMA) is presented. The bit-error rate characteristics of asynchronous FCSS/OCDMA are demonstrated by simulations in the presence of avalanche photodiode noise and thermal noise. The results indicate that FCSS/OCDMA achieves the single-user performance of conventional on-off keying (OOK) OCDMA (OOK-OCDMA) with double optical hard-limiters.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132322061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient call admission control scheme on overlay networks using fuzzy logic 一种基于模糊逻辑的有效覆盖网络接入控制方案
A. Mukhopadhyay, S. Chatterjee, Sajal Saha, S. Ghose, Debashis Saha
This paper proposes a call admission control (CAC) scheme for heterogeneous wireless overlay networks (WONs) that combine the benefits of the three commonly used techniques- guard channel, buffer management and priority scheduling with fuzzy logic application. The simulation results show that the scheme is extremely efficient offering a high degree of quality of service (QoS).
本文提出了一种基于模糊逻辑的异构无线覆盖网络(WONs)呼叫接纳控制(CAC)方案,该方案综合了保护信道、缓冲管理和优先级调度三种常用技术的优点。仿真结果表明,该方案具有很高的服务质量(QoS)。
{"title":"An efficient call admission control scheme on overlay networks using fuzzy logic","authors":"A. Mukhopadhyay, S. Chatterjee, Sajal Saha, S. Ghose, Debashis Saha","doi":"10.1109/ANTS.2009.5409871","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409871","url":null,"abstract":"This paper proposes a call admission control (CAC) scheme for heterogeneous wireless overlay networks (WONs) that combine the benefits of the three commonly used techniques- guard channel, buffer management and priority scheduling with fuzzy logic application. The simulation results show that the scheme is extremely efficient offering a high degree of quality of service (QoS).","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132337082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Secure group communication using binomial trees 使用二叉树保护组通信
R. Aparna, B. B. Amberker, D. Pola, P. Bathia
Numerous emerging applications like teleconferencing, scientific discussion etc. are relied on secure group communication model. Scalable group rekeying is one of the important issues in secure group communication since the group is dynamic in nature. Updating the group key and delivering it to group members securely must be carried out in an efficient manner, i.e., the number of encryptions performed and rekey messages constructed must be less. In this paper we propose a new method to manage secure group using binomial key tree approach. We show that number of encryptions performed and rekey messages constructed during membership change are less compared to the scheme proposed by Wong and others. In our scheme, it is not required to balance the tree after membership change. We compute the average encryption and rekey costs and show that the scheme is scalable.
许多新兴的应用,如远程会议、科学讨论等,都依赖于安全的组通信模型。由于组是动态的,可扩展的组密钥更新是安全组通信中的一个重要问题。必须以有效的方式更新组密钥并将其安全地传递给组成员,即执行的加密和构造的重密钥消息的数量必须更少。本文提出了一种利用二项密钥树方法管理安全组的新方法。我们证明,与Wong等人提出的方案相比,在成员变更期间执行的加密次数和构造的重密钥消息较少。在我们的方案中,不需要在成员变更后平衡树。我们计算了平均加密和密钥成本,并证明了该方案是可扩展的。
{"title":"Secure group communication using binomial trees","authors":"R. Aparna, B. B. Amberker, D. Pola, P. Bathia","doi":"10.1109/ANTS.2009.5409894","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409894","url":null,"abstract":"Numerous emerging applications like teleconferencing, scientific discussion etc. are relied on secure group communication model. Scalable group rekeying is one of the important issues in secure group communication since the group is dynamic in nature. Updating the group key and delivering it to group members securely must be carried out in an efficient manner, i.e., the number of encryptions performed and rekey messages constructed must be less. In this paper we propose a new method to manage secure group using binomial key tree approach. We show that number of encryptions performed and rekey messages constructed during membership change are less compared to the scheme proposed by Wong and others. In our scheme, it is not required to balance the tree after membership change. We compute the average encryption and rekey costs and show that the scheme is scalable.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"787 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116415756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Wireless backhaul for LTE - service OAM considerations LTE服务的无线回程OAM考虑
G. Varghese, Debajit Ghosh
3GPP Long Term Evolution (LTE) is a Next Generation (4G) Wireless Technology, providing an evolutionary path for 3G/UMTS deployments. The LTE network architecture is based on a flat all-IP architecture which requires a full mesh connectivity between the LTE evolved Base stations (eNBs). Carrier Ethernet has emerged as a strong candidate to meet the highly scalable and flexible requirements of the wireless backhaul networks. Carrier Ethernet provides capabilities to address the end-to-end service OAM requirements of the wireless backhaul networks in a similar way as that of ATM, SONET/SDH systems. This paper explores the end-to-end service OAM requirements, challenges and options for wireless backhaul networks based on carrier ethernet. The paper analyzes the various fault monitoring (FM), performance monitoring (PM) and fault tolerance requirements in LTE wireless backhaul networks. The paper then goes on to propose a service OAM model which addresses these OAM requirements in an optimal manner for large networks. The paper concludes by validating ITU-T Y.1731 for meeting the basic service OAM requirements and suggests modifications to meet the CCM scalability requirements.
3GPP长期演进(LTE)是下一代(4G)无线技术,为3G/UMTS部署提供了演进路径。LTE网络架构基于扁平的全ip架构,这需要LTE演进基站(enb)之间的全网状连接。运营商以太网已成为满足无线回程网络高度可扩展和灵活需求的有力候选者。运营商以太网以类似于ATM、SONET/SDH系统的方式提供解决无线回程网络端到端服务OAM需求的能力。本文探讨了基于运营商以太网的无线回程网络的端到端业务OAM需求、挑战和选择。分析了LTE无线回程网络中的各种故障监测(FM)、性能监测(PM)和容错要求。然后,本文提出了一个服务OAM模型,该模型以最优的方式解决了大型网络的这些OAM需求。最后,本文验证了ITU-T Y.1731满足基本业务OAM要求,并提出了修改建议,以满足CCM可扩展性要求。
{"title":"Wireless backhaul for LTE - service OAM considerations","authors":"G. Varghese, Debajit Ghosh","doi":"10.1109/ANTS.2009.5409856","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409856","url":null,"abstract":"3GPP Long Term Evolution (LTE) is a Next Generation (4G) Wireless Technology, providing an evolutionary path for 3G/UMTS deployments. The LTE network architecture is based on a flat all-IP architecture which requires a full mesh connectivity between the LTE evolved Base stations (eNBs). Carrier Ethernet has emerged as a strong candidate to meet the highly scalable and flexible requirements of the wireless backhaul networks. Carrier Ethernet provides capabilities to address the end-to-end service OAM requirements of the wireless backhaul networks in a similar way as that of ATM, SONET/SDH systems. This paper explores the end-to-end service OAM requirements, challenges and options for wireless backhaul networks based on carrier ethernet. The paper analyzes the various fault monitoring (FM), performance monitoring (PM) and fault tolerance requirements in LTE wireless backhaul networks. The paper then goes on to propose a service OAM model which addresses these OAM requirements in an optimal manner for large networks. The paper concludes by validating ITU-T Y.1731 for meeting the basic service OAM requirements and suggests modifications to meet the CCM scalability requirements.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127692176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Energy efficiency and CAPEX minimization for backbone network planning: Is there a tradeoff? 主干网规划的能源效率和资本支出最小化:是否存在权衡?
E. Palkopoulou, D. Schupke, T. Bauschert
Energy efficiency and the minimization of capital expenditures (CAPEX) for network equipment are studied for two network architectures: IP over WDM and IP over OTN over WDM. Case study results from mixed integer linear programming (MILP) formulations indicate that a CAPEX optimized network yields solutions having minimum energy consumption for both architectures. However, it is shown that the most cost efficient architecture is not always the least energy consuming. We quantify the occurring tradeoff and observe that network equipment CAPEX are dominating in terms of cost. Additionally, it is observed that the relative power contribution of different network layers is independent of the average inter-node traffic demand for both studied architectures.
能源效率和资本支出最小化的网络设备(CAPEX)研究了两种网络架构:IP over WDM和IP over OTN over WDM。混合整数线性规划(MILP)公式的案例研究结果表明,资本支出优化的网络产生的解决方案对两种架构都具有最小的能耗。然而,研究表明,最具成本效益的架构并不总是能耗最少的。我们量化了发生的权衡,并观察到网络设备资本支出在成本方面占主导地位。此外,我们观察到不同网络层的相对功率贡献与所研究的两种架构的平均节点间流量需求无关。
{"title":"Energy efficiency and CAPEX minimization for backbone network planning: Is there a tradeoff?","authors":"E. Palkopoulou, D. Schupke, T. Bauschert","doi":"10.1109/ANTS.2009.5409867","DOIUrl":"https://doi.org/10.1109/ANTS.2009.5409867","url":null,"abstract":"Energy efficiency and the minimization of capital expenditures (CAPEX) for network equipment are studied for two network architectures: IP over WDM and IP over OTN over WDM. Case study results from mixed integer linear programming (MILP) formulations indicate that a CAPEX optimized network yields solutions having minimum energy consumption for both architectures. However, it is shown that the most cost efficient architecture is not always the least energy consuming. We quantify the occurring tradeoff and observe that network equipment CAPEX are dominating in terms of cost. Additionally, it is observed that the relative power contribution of different network layers is independent of the average inter-node traffic demand for both studied architectures.","PeriodicalId":245765,"journal":{"name":"2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127818297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
期刊
2009 IEEE 3rd International Symposium on Advanced Networks and Telecommunication Systems (ANTS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1