Distributed Energy Efficient Clouds Over Core Networks [NS2projects]

CLOUD computing exploits powerful resource management techniques to allow users to share a large pool of computational, network and storage resources over the Internet. The concept is inherited from research oriented grid computing and further expanded toward a business model where consumers are charged for the diverse offered services Distributed Energy Efficient Clouds Over Core Networks. Cloud computing is expected to be the main factor that will dominate the future Internet service model by offering a network based rather than desktop based users applications . Virtualization lies at the heart of cloud computing, where the requested resources are created, managed and removed flexibly over the existing physical machines such as servers, storage and networks. This opens the doors towards resource consolidation that cut the cost for the cloud provider and eventually, cloud consumers. However, cloud computing elastic management and Distributed Energy Efficient Clouds Over Core Networks economic advantages come at the cost of increased concerns regarding their privacy , availability and power consumption. Cloud computing has benefited from the work done on datacenters energy efficiency . However, the success of the cloud relies heavily on the network that connects the clouds to their users. This means that the expected popularity of the cloud services has implications on network traffic, hence, network power consumption, especially if we consider the total path that information traverses from clouds storage through its servers, internal LAN, core, aggregation and access network up to the users’ devices. For instance, the authors in have shown that Distributed Energy Efficient Clouds Over Core Networks transporting data in public and sometimes private clouds might be less energy efficient compared to serving the computational demands by traditional desktop. Designing future energy efficient clouds, therefore, requires the co-optimization of both external network and internal clouds resources. The lack of understanding of this interplay between the two domains of resources might cause eventual loss of power Distributed Energy Efficient Clouds Over Core Networks. For instance, a cloud provider might decide to migrate virtual machines (VMs) or content from one cloud location to another due to low cost or green renewable energy availability, however, the power consumption of the network through which users data traverse to/from the new cloud location might outweigh the gain of migration.

Sustainability Analysis and Resource Management for Wireless Mesh Networks with Renewable Energy Supplies [NS2projects]

THE EXPLOSIVELY growing demand for ubiquitous broadband wireless access has led to a significant increase in energy consumption by wireless communication networks. To counter this increase, future generations of wireless networks are expected to make use of renewable energy sources, e.g., wind, solar, tides, etc., to fulfill the everincreasing user demand, Sustainability Analysis and Resource Management for Wireless Mesh Networks with Renewable Energy Supplies while reducing the detrimental effects of conventional energy production. However, unlike traditional energy supplied from the electricity grid, renewable energy sources are intrinsically dynamic with unstable availability and time varying capacity. For example, a wind turbine usually provides intermittent power which depends on how windy the weather is. Although solar panels can provide relatively continuous power supply, the energy supply varies across the time of a day and the season of the year, and is influenced by atmospheric conditions and geography. As a result, when renewable energy is deployed to power wireless communication Sustainability Analysis and Resource Management for Wireless Mesh Networks with Renewable Energy Supplies networks, its dynamic and unreliable nature will affect the availability and efficiency of communications, and therefore will make energy-sustainable network design a necessity. Improving energy efficiency has long been a fundamental research issue in wireless communications, mainly because of the limited battery power of mobile terminals and/or the increasing cost of the energy from the electricity grid. Sustainability Analysis and Resource Management for Wireless Mesh Networks with Renewable Energy Supplies In traditional systems powered by batteries, the energy is a limited resource but it is stable during the battery lifetime. The electricity grid generally provides continuous power on demand with no stringent usage limit; however, this power is primary generated from limited and non-sustainable resources, such as coal, natural gas, and petroleum. In contrast, renewable energy sources are sustainable in the long term but are unstable and intermittently available in the short term. Sustainability Analysis and Resource Management for Wireless Mesh Networks with Renewable Energy Supplies As a result, the fundamental design criterion and the main performance metric have shifted from energy efficiency to energy sustainability in a network powered by renewable energy . While many existing works focus on energy efficiency, energy sustainability has not been well explored and deserves further investigation. Thus motivated, we first develop a mathematical model to study the “energy sustainability” performance of wireless devices theoretically and, based on this analysis, we further dimension the resource management and admission controlstrategies to improve the sustainable network performance under an energy sustainability constraint

Efficient Virtual Backbone Construction without a Common Control Channel in Cognitive Radio Networks [NS2projects]

Cognitive radio networks (CRNs) are a promising solution to the channel (spectrum) congestion problem nowadays. Primary users (PUs) in CRNs are privileged users, for whom there should be no interference. Each secondary user (SU) or node in a CRN Efficient Virtual Backbone Construction without a Common Control Channel in Cognitive Radio Networks is capable of sensing the available channels, and can make opportunistic use of them without causing interference with primary users. When a PU begins to occupy a channel, SUs on that channel need to quit immediately. Hence, the dynamics of channel availability makes it difficult to carry out end-to-end data transport in CRNs. For example, in Fig. 1, there are two PUs, Tx and Rx. There is a data transmission route, consisting of three SUs, S1, S2, and S3. When the link between PU Tx and Rx is active, the links between the three SUs may be broken if they use the same channel as the two PUs. Therefore, the endto- end data transmission from Efficient Virtual Backbone Construction without a Common Control Channel in Cognitive Radio Networks S1 to S3 is unstable A practical scenario is that the two PUs in Fig. 1 are TV towers, and the SUs here are wireless devices using IEEE 802.22. If a node in a CRN wants to reach another node that is multiple hops away, two problems arise. First, the node needs to calculate the route to the destination node. However, the high dynamics of channel availability makes it costly to collect informationfrom other nodes and construct a routing path. Second, even if the route is built, the links on the route are unstable. When the dynamic channels on a link of the Efficient Virtual Backbone Construction without a Common Control Channel in Cognitive Radio Networks route become unavailable, the route is broken. To solve the problem of broken routes caused by unstable links, we can make use of the virtual backbone structure. A virtual backbone consists of a connected subset of nodes in the network where every node is either in the subset, or is a neighbor of a node in the subset. We use area to refer to a backbone node and the nodes attached to it. If a virtual backbone is constructed for a CRN, the backbone nodes can calculate area routes for end-to-end communications. An area route means a set of areas that would be passed in order to reach the destination. For example, in Fig. 2, each node is either a backbone node or is attached to a backbone node. Efficient Virtual Backbone Construction without a Common Control Channel in Cognitive Radio Networks A1 denotes an area, which includes the backbone node and its attached nodes. Nodes on the borders are called gateway nodes. The source node S wants to reach the destination node D, which is located in another area. The backbone node that S is attached to calculates an area route for S, which is Moreover, the virtual ackbone can solve the unstable link problem, because with the area route, a packet can be sent to any node in the next-hop area. This is much more robust than the case with the route consisting of nodes, where a packet must be sent to the next-hop node. Therefore, the influence of unpredictable channel availability is reduced.

A Complex Network Approach to Topology Control Problem in Underwater Acoustic Sensor Networks [NS2projects]

A Underwater acoustic sensor networks (UASNs) are the technology that enables various underwater applications, and the interest in UASNs is growing. UASNs consist of underwater sensors anchored nodes and surface sinks that perform collaborative monitoring tasks over a three-dimensional deployment space. A Complex Network Approach to Topology Control Problem in Underwater Acoustic Sensor Networks Anchored nodes are equipped with floating buoys inflated by pumps, and the depth of the anchored node is regulated by adjusting the length of the wire. The buoyant force from buoys is far greater than the gravity of nodes. As shown in the measurements of environmental events are locally A Complex Network Approach to Topology Control Problem in Underwater Acoustic Sensor Networks monitored by the anchored nodes, and transferred to a surface sink by multi-hops. Both electromagnetic waves and laser waves are not suitable for underwater transmission, and acoustic communication is the typical physical layer technology in UASNs. A Complex Network Approach to Topology Control Problem in Underwater Acoustic Sensor Networks Therefore, the distinguishing feature of UASNs is propagation delay because acoustic waves are much slower than electromagnetic waves the speed of acoustic waves is approximately 1500m/s. Consequently, propagation delay in UASNs cannot be neglected. A Complex Network Approach to Topology Control Problem in Underwater Acoustic Sensor Networks Another inevitable issue regarding UASNs is signal irregularity signal is not uniform in all directions, which is caused by various factors, such as antenna directions and gains, transmitting power, battery status, signal-tonoise ratio threshold, and obstacles . In particular, various obstacles are distributed in underwater environments: thus, signals are more easily reflected, diffracted, or scattered during propagation , A Complex Network Approach to Topology Control Problem in Underwater Acoustic Sensor Networks so probabilistic coverage and connectivity problems are more appropriate for acoustic detection applications. Signal irregularity directly or indirectly affects the performance of network protocols, such as the MAC, routing, localization and topology control. Therefore, signal irregularity is a non-negligible issue, especially in UASNs. Moreover, the battery power of nodes is limited. Batteries usually cannot be easily replaced underwater, and solar energy is rarely exploited as well.

Distortion-Fair Cross-Layer Resource Allocation for Scalable Video Transmission in OFDMA Wireless Networks [NS2project]

THE design and the optimization of video communications over wireless networks is attracting a lot of attention from both academia and industry. The main challenge is to enhance the quality of service (QoS) support in terms of packet loss rate, end-to-end delay Distortion-Fair Cross-Layer Resource Allocation for Scalable Video Transmission in OFDMA Wireless Networks and minimum guaranteed bit-rate, while providing fairness where needed. The cross-layer approach, i.e., the exchange of information among different layers of the system, is one of the key concepts to be exploited to achieve this goal. Distortion-Fair Cross-Layer Resource Allocation for Scalable Video Transmission in OFDMA Wireless Networks In beyond-3G and 4G wireless system orthogonal frequency division multiple access (OFDMA) has been selected as a key physical (PHY) layer technology to support a very flexible access with high spectral efficiency. In order to exploit the available temporal, frequency and multi-user diversity, Distortion-Fair Cross-Layer Resource Allocation for Scalable Video Transmission in OFDMA Wireless Networks and to provide a given level of QoS, suitable adaptive resource allocation and scheduling strategies have to be implemented. Opportunistic schedulers, as for instance, proportional fair (PF) and maximum signal-to-noise ratio (SNR) schedulers, take advantage of the knowledge of the channel state information (CSI) in order to maximize the spectral efficiency. However, with these schedulers, the final share of throughput often results unfair, especially for the cell-edge users which suffer of data-rate limitations due to high Distortion-Fair Cross-Layer Resource Allocation for Scalable Video Transmission in OFDMA Wireless Networks path-loss and inter-cell interference. In real-time streaming the mismatch between the allocated PHY layer rate and the rate required by the delay-constrained application may cause the loss of important parts of the streams, which significantly degrades the end-user quality of experience (QoE). The provision of acceptableQoE to every user is enabled by the use of a scheduler at the medium access control (MAC) layer which delivers a fair throughput, according to specific utilities and constraints defined by the application. Moreover, the presence of an optimized source rate adaptation technique at the application (APP) layer becomes crucial to improve stability, to prevent buffer Distortion-Fair Cross-Layer Resource Allocation for Scalable Video Transmission in OFDMA Wireless Networks overflow and to maintain video play-back continuity. Rate adaptation is enabled by the use of video encoders that support multiple layers which can be sequentially dropped, thereby providing a graceful degradation. One of the most promising tool is the H.264 Advanced Video Coding (AVC) standard with scalable extension, also known as Scalable Video Coding.

Reliable Multicast with Pipelined Network Coding using Opportunistic Feeding and Routing [NS2project]

AS the advance of wireless communication techniques, wireless networks have become universal and novel applications have proliferated in various fields such as mobile auctions, military command and control, distance education and intelligent Reliable Multicast with Pipelined Network Coding using Opportunistic Feeding and Routing transportation systems. In these applications, multicast is a key mechanism developed to disseminate information from a single source to multiple destinations. It has attracted significant efforts to improve its performance in wireless environment with different metrics including throughput, delay, energy efficiency, etc. Traditionally, in order to facilitate routing protocol design, an ideal wireless network model is used with the assumption that the wireless transmission links are lossfree. In reality, transmission failures would happen because the quality of wireless links is affected or even jeopardized by Reliable Multicast with Pipelined Network Coding using Opportunistic Feeding and Routing many factors like collisions, fading or environmental noise . Therefore, a new model for wireless networks with lossy links should be considered in the multicast protocol design, especially for some applications in adverse environment such as wireless sensor networks in the wilds. Recently, cooperation between nodes is proposed to improve the multicast performance in lossy wireless networks. Reliable Multicast with Pipelined Network Coding using Opportunistic Feeding and Routing When a node fails to receive a packet from its direct upstream node, other neighboring nodes that have successfully received it can cooperatively feed the packet to this node. Such opportunistic routing (OR) strategy at each receiver, like ExOR , is referred as forwarder-cooperation in this paper. Later, MORE is proposed to simplify the coordination by combining forwarder-cooperation and intra-session network coding. Reliable Multicast with Pipelined Network Coding using Opportunistic Feeding and Routing It has shown great advantages in increasing the network throughput and simplifying protocol design by eliminating the coordination between nodes. Unfortunately, the multicast in MORE is not efficient since excessive forwarders may be evolved in data dissemination, which would incur serious MAC contention and degrade the multicast performance. Moreover, the batch-by-batch policy makes the protocol susceptible to the “crying baby” problem, which is pointed out in [ and solved by a round-robin batch scheduling. However, the proposed algorithm Pacifier in is not energy-efficient since substantial number of useful packets may be flushed away during frequent batch scheduling over the whole network. Furthermore, its privilege for data dissemination to the destinations with good connections from source would lead to serious unfairness in throughput.

Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks [NS2project]

WIRELESS mesh networks (WMNs) have emerged in recent years as a promising communication paradigm toward the cost-effective deployment of all-wireless network infrastructures [1]. Several operators have started usingWMNs as a valuable technology to Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks provide broadband Internet access in urban and rural areas, where the low return on investments cannot cover all costs to deploy more expensive wired solutions. With the aim of further reducing the overall maintenance costs and maximizing the profit, WMN operators have been fostering the deployment of wireless mesh community networks (WMCNs) . In WMCNs, a group of independent mesh routers owned by different individuals forms or extends a WMN to Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks enhance the broadband connectivity, whose availability can be shared with other users not directly involved in the management of the community network. In this context, we envision a marketplace scenario where an operator may lease the bandwidth of its wireless access network to a subset of customers in order to increase the network coverage of its WMN and provide access to other residential users through the customers’ mesh client devices. Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks The customers1 who manage these mesh clients pay the network operator to exploit the access bandwidth, while they are rewarded directly by the residential users they serve. Note that both the operator and the customers gain from this agreement since the former can lease the bandwidth of itsWMN, savingmanagement andmaintenance costs, while the latter can earn money by subleasing the purchased bandwidth to other residential users. Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks Finally, the residential users that would not have been covered by the WMN operator (because of low payoffs) obtain a better Internet service. Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks The proposed marketplace would therefore contribute to overcome the Digital Divide problem, improving the economical efficiency of public-private wireless partnerships like those analyzed in. In order to be an attractive solution, the aforementioned bandwidth market managed by theWMN operator needs convincing allocation and payment mechanisms that should act as incentives for customers to participate and subscribe to the service.

Outage Probability in Arbitrarily-Shaped Finite Wireless Networks [NS2project]

OUTAGE probability is an important performance metric for wireless networks operating over fading channels . It is commonly defined as the probability that the signalto interference-plus-noise ratio (SINR) drops below a given threshold. Outage Probability in Arbitrarily-Shaped Finite Wireless Networks The analysis of the outage probability and interference in wireless networks has received much attention recently . For the sake of analytical convenience and tractability, all the aforementioned studies and many references therein assumed infinitely large wireless networks and often used a homogeneous Poisson point process (PPP) as the underlying model for the spatial node distribution. Outage Probability in Arbitrarily-Shaped Finite Wireless Networks A homogeneous PPP is stationary i.e., the node distributionis invariant under translation. This gives rise to locationindependent performance, statistically the network characteristics such as mean aggregate interference and average outage probability as seen from a node’s perspective are the same for all nodes. Mathematical tools from stochastic geometry have been applied to obtain analytical expressions for the outage probability in infinitely large wireless networks ,. Outage Probability in Arbitrarily-Shaped Finite Wireless Networks The outage analysis in infinite wireless networks has also been extended to wireless networks with the Poisson cluster process as well as to coexisting networks sharing the same frequency spectru. In practice, many real-world wireless networks comprise a finite number of nodes distributed at random inside a given finite region. The boundary effect of finite networks gives Outage Probability in Arbitrarily-Shaped Finite Wireless Networks rise to non-stationary location-dependent performance, i.e., the nodes located close to the physical boundaries of the wireless network experience different network characteristic as compared to the nodes located near the center of the network. As a result, the modeling and performance analysis of finite wireless networks requires different approaches as opposed to infinite wireless networks. For example, when a finite number of nodes are independently and uniformly distributed (i.u.d.) inside a finite network, a Binomial point process (BPP), rather than a PPP, provides an accurate model for the spatial node distribution . Outage Probability in Arbitrarily-Shaped Finite Wireless Networks Unlike infinite wireless networks, deriving general results on the outage probability in finite wireless networks is a very difficult task because the outage performance depends strongly on the shape of the network region as well as the location of the reference receiver. In this work, we would like to investigate whether there exist general frameworks that provide easy-to-follow procedures to derive the outage probability at an arbitrary location in an arbitrarily-shaped finite wireless network.

A Spectrum-aware Clustering for Efficient Multimedia Routing in Cognitive Radio Sensor Networks [NS2project]

A Cognitive radio network (CRN) is formed by advanced radio devices, which observe the radio environment for a suitable band, employ an intelligent agent for decision-making, and a frequency-agile radio that can be tuned to a wide range of frequency bands and eventually A Spectrum-aware Clustering for Efficient Multimedia Routing in Cognitive Radio Sensor Networks operate on an intelligently selected band. Motivated by the spectrum utilization and regulation issue for exclusive use by the licensed or primary users, it brings a revolutionary change in this new paradigm by introducing a new class of unlicensed or secondary users who can share the spectrum opportunistically without interfering with the primary users. A Spectrum-aware Clustering for Efficient Multimedia Routing in Cognitive Radio Sensor Networks This new paradigm has also been investigated for wireless sensor networks (WSNs) to enjoy the potential benefits of cognitive radios, thus forming cognitive radio sensor networks (CRSN). CRSN can be utilized in many different application scenarios, for instance, intelligent transportation system , industrial monitoring, surveillance , smart grids , etc. Dynamic spectrum access plays a key role to mitigate the noisy spectrum bands and eases the reconfiguration of spectrum usage. Wireless multimedia A Spectrum-aware Clustering for Efficient Multimedia Routing in Cognitive Radio Sensor Networks sensors have been realized for monitoring and intelligent transportation in public transport vehicles, train. However, the spectrum utilization issues for multimedia delivery in vehicular networks have not been addressed adequately. The lack of established infrastructure, network dynamics, constrained spectrum access privileges along with the unpredictable band opportunity, and the nature of the wireless medium offer an unprecedented set of challenges in supporting demanding applications over CRSN. A Spectrum-aware Clustering for Efficient Multimedia Routing in Cognitive Radio Sensor Networks Thus, supporting multimedia applications of traditional WMSNs over CRSN presents many key issues, which are not dealt in its counterpart wireless multimedia sensor network. The varying capacity of wireless links in CRSN deteriorates the performance of a routing protocol in achieving end-to-end delay bound. The strict delay constraint is usually compensated by setting a suitable playout deadline to take into account the underlying network bottlenecks. Thus, by setting appropriate deadline in conjunction with playout time, the multimedia routing protocol should address the significant variation in delay and jitter to ensure the persistent quality of service for multimedia applications.

Dynamic p-Cycle Protection in Spectrum-Sliced Elastic Optical Networks [NS2project]

NOWADAYS, the spectrum-sliced elastic optical networking based on the optical orthogonal frequency-division multiplexing (O-OFDM) technology has attracted intensive research interests as it can improve the spectral efficiency of the optical layer significantly Dynamic p-Cycle Protection in Spectrum-Sliced Elastic Optical Networks with flexible bandwidth allocation. Unlike the wavelength-division multiplexing (WDM) networks that operate on discrete wavelength channels with a bandwidth of 50 or 100 GHz, the O-OFDM networks groom the capacities of a few narrow-band subcarrier channels (frequency slots) that are spectrally contiguous and achieve high-speed data transmission over them. Dynamic p-Cycle Protection in Spectrum-Sliced Elastic Optical Networks Hence, by adjusting the number of assigned frequency slots (FS’) to each lightpath, O-OFDM networks can allocate optical spectrum with a finer granularity and agile bandwidth management for different network applications can be achieved. To this end, people refer the optical networks based on the O-OFDM technology as elastic optical networks (EONs) . Dynamic p-Cycle Protection in Spectrum-Sliced Elastic Optical Networks Previously, researchers have investigated the routing and spectrum assignment (RSA) of lightpaths intensively for realizing efficient service planning and provisioning in EONs . However, most of these studies did not consider how to setup Dynamic p-Cycle Protection in Spectrum-Sliced Elastic Optical Networks lightpath connections with protection or restorability. It is known that in optical networks, the amount of service disruption and data loss caused by a network-related outage can be huge , because a single optical fiber can carry over 20 Tb/s transmission capacity . Meanwhile, natural disasters and other factors can trigger unpredictable failures of network elements and make network survivability a serious issue . Dynamic p-Cycle Protection in Spectrum-Sliced Elastic Optical Networks In EONs, a link failure may lead to more severe service disruption due to the higher data-rate provided by the supper-channels. Therefore, it is not only important but also necessary to study the protection schemes for EONs, and the network operators need to implement them to ensure certain service availability for the lightpath connections. The authors of proposed an SPP scheme for EONs, which was called elastic separateprotection- at-connection and could realize spectrum sharing by using first-fit to assign working traffic and last-fit to assign backup traffic.