Network Capacity Research Papers - Academia.edu (original) (raw)

2005, Computer Networks

Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. The integration of WMNs... more

Wireless mesh networks (WMNs) consist of mesh routers and mesh clients, where mesh routers have minimal mobility and form the backbone of WMNs. They provide network access for both mesh and conventional clients. The integration of WMNs with other networks such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, etc., can be accomplished through the gateway and bridging functions in the mesh routers. Mesh clients can be either stationary or mobile, and can form a client mesh network among themselves and with mesh routers. WMNs are anticipated to resolve the limitations and to significantly improve the performance of ad hoc networks, wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless metropolitan area networks (WMANs). They are undergoing rapid progress and inspiring numerous deployments. WMNs will deliver wireless services for a large variety of applications in personal, local, campus, and metropolitan areas. Despite recent advances in wireless mesh networking, many research challenges remain in all protocol layers. This paper presents a detailed study on recent advances and open research issues in WMNs. System architectures and applications of WMNs are described, followed by discussing the critical factors influencing protocol design. Theoretical network capacity and the state-of-the-art protocols for WMNs are explored with an objective to point out a number of open research issues. Finally, testbeds, industrial practice, and current standard activities related to WMNs are highlighted.

2003, Networking, IEEE/ACM Transactions on

We take a new look at the issue of network capacity. It is shown that network coding is an essential ingredient in achieving the capacity of a network. Building on recent work by Li et al., who examined the network capacity of multicast... more

We take a new look at the issue of network capacity. It is shown that network coding is an essential ingredient in achieving the capacity of a network. Building on recent work by Li et al., who examined the network capacity of multicast networks, we extend the network coding framework to arbitrary networks and robust networking. For networks which are restricted to using linear network codes, we find necessary and sufficient conditions for the feasibility of any given set of connections over a given network. We also consider the problem of network recovery for nonergodic link failures. For the multicast setup we prove that there exist coding strategies that provide maximally robust networks and that do not require adaptation of the network interior to the failure pattern in question. The results are derived for both delay-free networks and networks with delays.

1996, Computer Communication Review

State of the art, real-time, rate-adaptive, multimedia applications adjust their transmission rate to match the available network capacity. Unfortunately, this source-based rate-adaptation performs poorly in a heterogeneous multicast... more

State of the art, real-time, rate-adaptive, multimedia applications adjust their transmission rate to match the available network capacity. Unfortunately, this source-based rate-adaptation performs poorly in a heterogeneous multicast environment because there is no single target rate -the conflicting bandwidth requirements of all receivers cannot be simultaneously satisfied with one transmission rate. If the burden of rate-adaption is moved from the source to the receivers, heterogeneity is accommodated. One approach to receiver-driven adaptation is to combine a layered source coding algorithm with a layered transmission system. By selectively forwarding subsets of layers at constrained network links, each user receives the best quality signal that the network can deliver. We and others have proposed that selective-forwarding be carried out using multiple IP-Multicast groups where each receiver specifies its level of subscription by joining a subset of the groups. In this paper, we extend the multiple group framework with a rate-adaptation protocol called Receiver-driven Layered Multicast, or RLM. Under RLM, multicast receivers adapt to both the static heterogeneity of link bandwidths as well as dynamic variations in network capacity (i.e., congestion). We describe the RLM protocol and evaluate its performance with a preliminary simulation study that characterizes user-perceived quality by assessing loss rates over multiple time scales. For the configurations we simulated, RLM results in good throughput with transient short-term loss rates on the order of a few percent and long-term loss rates on the order of one percent. Finally, we discuss our implementation of a software-based Internet video codec and its integration with RLM.

2004

Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and wide area sensing. In this paper we study the problem of... more

Mobile Ad Hoc Networks (MANETs) provide rapidly deployable and self-configuring network capacity required in many critical applications, e.g., battlefields, disaster relief and wide area sensing. In this paper we study the problem of efficient data delivery in sparse MANETs where network partitions can last for a significant period. Previous approaches rely on the use of either long range communication which leads to rapid draining of nodes' limited batteries, or existing node mobility which results in low data delivery rates and large delays. In this paper, we describe a Message Ferrying (MF) approach to address the problem. MF is a mobility-assisted approach which utilizes a set of special mobile nodes called message ferries (or ferries for short) to provide communication service for nodes in the deployment area. The main idea behind the MF approach is to introduce non-randomness in the movement of nodes and exploit such non-randomness to help deliver data. We study two variations of MF, depending on whether ferries or nodes initiate proactive movement. The MF design exploits mobility to improve data delivery performance and reduce energy consumption in nodes. We evaluate the performance of MF via extensive ns simulations which confirm the MF approach is efficient in both data delivery and energy consumption under a variety of network conditions.

2003, … -Second Annual Joint Conference of the …

In this paper, we present a Minimum Spanning Tree (MST) based topology control algorithm, called Local Minimum Spanning Tree (LMST), for wireless multi-hop networks. In this algorithm, each node builds its local minimum spanning tree... more

In this paper, we present a Minimum Spanning Tree (MST) based topology control algorithm, called Local Minimum Spanning Tree (LMST), for wireless multi-hop networks. In this algorithm, each node builds its local minimum spanning tree independently and only keeps on-tree nodes that are one-hop away as its neighbors in the final topology. We analytically prove several important properties of LMST: (1) the topology derived under LMST preserves the network connectivity; (2) the node degree of any node in the resulting topology is bounded by 6; and (3) the topology can be transformed into one with bi-directional links (without impairing the network connectivity) after removal of all uni-directional links. These results are corroborated in the simulation study.

2003, … Annual Joint Conference of the IEEE …

In this paper, we consider the problem of power control when nodes are non-homogeneously dispersed in space. In such situations, one seeks to employ per packet power control depending on the source and destination of the packet. This... more

In this paper, we consider the problem of power control when nodes are non-homogeneously dispersed in space. In such situations, one seeks to employ per packet power control depending on the source and destination of the packet. This gives rise to a joint problem which involves not only power control but also clustering. We provide three solutions for joint clustering and power control.

2005

This paper studies how the capacity of a static multi-channel network scales as the number of nodes, n, increases. Gupta and Kumar have determined the capacity of single-channel networks, and those bounds are applicable to multi-channel... more

This paper studies how the capacity of a static multi-channel network scales as the number of nodes, n, increases. Gupta and Kumar have determined the capacity of single-channel networks, and those bounds are applicable to multi-channel networks as well, provided each node in the network has a dedicated interface per channel.

2003, Sigmetrics Performance Evaluation Review

A matrix giving the traffic volumes between origin and destination in a network has tremendously potential utility for network capacity planning and management. Unfortunately, traffic matrices are generally unavailable in large... more

A matrix giving the traffic volumes between origin and destination in a network has tremendously potential utility for network capacity planning and management. Unfortunately, traffic matrices are generally unavailable in large operational IP networks. On the other hand, link load measurements are readily available in IP networks. In this paper, we propose a new method for practical and rapid inference of traffic matrices in IP networks from link load measurements, augmented by readily available network and routing configuration information. We apply and validate the method by computing backbonerouter to backbone-router traffic matrices on a large operational tier-1 IP network -a problem an order of magnitude larger than any other comparable method has tackled. The results show that the method is remarkably fast and accurate, delivering the traffic matrix in under five seconds.

2006, Mobile Computing and Communications Review

Wireless technologies, such as IEEE 802.11a, that are used for ad hoc networks provide for multiple nonoverlapping channels. Most ad hoc routing protocols that are currently available are designed to use a single channel. The available... more

Wireless technologies, such as IEEE 802.11a, that are used for ad hoc networks provide for multiple nonoverlapping channels. Most ad hoc routing protocols that are currently available are designed to use a single channel. The available network capacity can be increased by using multiple channels, but this requires the development of new protocols specifically designed for multi-channel operation. This paper presents protocols for improving the capacity of multi-channel wireless networks. Our protocols simplify the use of multiple channels by using multiple interfaces, although the number of interfaces per node is typically smaller than the number of channels. We propose a link layer protocol to manage multiple channels, and it can be implemented over existing IEEE 802.11 hardware. We also propose a routing protocol that operates over the link layer protocol, and is specifically designed for multichannel, multi-interface ad hoc wireless networks. Simulation results demonstrate the effectiveness of the proposed approach in significantly increasing network capacity, by utilizing all the available channels, even when the number of interfaces is smaller than the number of channels.

2002, Transportation Research Part B-methodological

Existing reliability studies of road networks are mainly limited to connectivity and travel time reliability and may not be sucient for a comprehensive network performance measure. Recently Chen et al. (J. Adv. Transp. 33 (2) (1999)... more

Existing reliability studies of road networks are mainly limited to connectivity and travel time reliability and may not be sucient for a comprehensive network performance measure. Recently Chen et al. (J. Adv. Transp. 33 (2) (1999) 183±200) introduced capacity reliability as a new network performance index. It is de®ned as the probability that the network can accommodate a certain trac demand at a required service level, while accounting for drivers' route choice behavior. The proposed capacity reliability index includes connectivity reliability as a special case and also provides travel time reliability as a side product. This paper extends the capacity reliability analysis by providing a comprehensive methodology, which combines reliability and uncertainty analysis, network equilibrium models, sensitivity analysis of equilibrium network ow and expected performance measure, as well as Monte Carlo methods, to assess the performance of a degradable road network. Numerical results are also provided to demonstrate the feasibility of the proposed framework. Ó

1998, Personal Communications, IEEE

Transmitter power control can be used to concurrently achieve several key objectives in wireless networking, including minimizing power consumption and prolonging the battery life of mobile nodes, mitigating interference and increasing... more

Transmitter power control can be used to concurrently achieve several key objectives in wireless networking, including minimizing power consumption and prolonging the battery life of mobile nodes, mitigating interference and increasing the network capacity, and maintaining the required link QoS by adapting to node movements, fluctuating interference, channel impairments, and so on. Moreover, power control can be used as a vehicle for implementing on-line several basic network operations, including admission control, channel selection and switching, and handoff control. We consider issues associated with the design of power-sensitive wireless network architectures, which utilize power efficiently in establishing user communication at required QoS levels. Our focus is mainly on the network layer and less on the physical one. Besides reviewing some recent developments in power control, we also formulate some general associated concepts which have wide applicability to wireless network design. A synthesis of these concepts into a framework for power-sensitive network architectures is done, based on some key justifiable points. Various important relevant issues are highlighted and discussed, as well as several directions for further research in this area. Overall, a first step is taken toward the design of power-sensitive network architectures for next-generation wireless networks. 50 1070-9916/98/$10.00 0 1998 IEEE IEEE Personal Communications

2000, IEEE Journal on Selected Areas in Communications

The deployment of femtocells in a macrocell network is an economical and effective way to increase network capacity and coverage. Nevertheless, such deployment is challenging due to the presence of inter-tier and intra-tier interference,... more

The deployment of femtocells in a macrocell network is an economical and effective way to increase network capacity and coverage. Nevertheless, such deployment is challenging due to the presence of inter-tier and intra-tier interference, and the ad hoc operation of femtocells. Motivated by the flexible subchannel allocation capability of OFDMA, we investigate the effect of spectrum allocation in two-tier networks,

2008, IEEE/ACM Transactions on Networking

We consider optimal control for general networks with both wireless and wireline components and time varying channels. A dynamic strategy is developed to support all traffic whenever possible, and to make optimally fair decisions about... more

We consider optimal control for general networks with both wireless and wireline components and time varying channels. A dynamic strategy is developed to support all traffic whenever possible, and to make optimally fair decisions about which data to serve when inputs exceed network capacity. The strategy is decoupled into separate algorithms for flow control, routing, and resource allocation, and allows each user to make decisions independent of the actions of others. The combined strategy is shown to yield data rates that are arbitrarily close to the optimal operating point achieved when all network controllers are coordinated and have perfect knowledge of future events. The cost of approaching this fair operating point is an end-to-end delay increase for data that is served by the network. Analysis is performed at the packet level and considers the full effects of queueing.

2007, IEEE Communications Magazine

2006

This paper proposes a cross-layer optimization framework that provides efficient allocation of wireless network resources across multiple types of applications to maximize network capacity and user satisfaction. We define a novel... more

This paper proposes a cross-layer optimization framework that provides efficient allocation of wireless network resources across multiple types of applications to maximize network capacity and user satisfaction. We define a novel optimization scheme based on the Mean Opinion Score (MOS) as the unifying metric. Our experiments, applied to scenarios where users simultaneously run three types of applications, such as realtime voice, video conferencing and file download, confirm that MOS-based optimization leads to significant improvement in terms of user perceived quality when compared to throughput-based optimization.

2005, IEEE/ACM Transactions on Networking

This paper is aimed at designing a congestion control system that scales gracefully with network capacity, providing high utilization, low queueing delay, dynamic stability, and fairness among users. The focus is on developing... more

This paper is aimed at designing a congestion control system that scales gracefully with network capacity, providing high utilization, low queueing delay, dynamic stability, and fairness among users. The focus is on developing decentralized control laws at end-systems and routers at the level of fluid-flow models, that can provably satisfy such properties in arbitrary networks, and subsequently approximate these features through practical packet-level implementations.

2004

We present a new capacity estimation technique, called Cap-Probe. CapProbe combines delay as well as dispersion measurements of packet pairs to filter out samples distorted by cross-traffic. CapProbe algorithms include convergence tests... more

We present a new capacity estimation technique, called Cap-Probe. CapProbe combines delay as well as dispersion measurements of packet pairs to filter out samples distorted by cross-traffic. CapProbe algorithms include convergence tests and convergence speed-up techniques by varying probing parameters. Our study of CapProbe includes a probability analysis to determine the time it takes CapProbe to converge on the average. Through simulations and measurements, we found CapProbe to be quick and accurate across a wide range of traffic scenarios. We also compared Cap-Probe with two previous well-known techniques, pathchar and pathrate. We found CapProbe to be much more accurate than pathchar and similar in accuracy to pathrate, while providing faster estimation than both. Another advantage of CapProbe is its lower computation cost, since no statistical post processing of probing data is required.

1989, IEEE Transactions on Power Systems

tional approach. It is, therefore, as accurate as the conventional method but is many times faster. It is shown that gain in cpu time for a large system is approximately 1 -f rf where f is the average number of units on planned outage per... more

tional approach. It is, therefore, as accurate as the conventional method but is many times faster. It is shown that gain in cpu time for a large system is approximately 1 -f rf where f is the average number of units on planned outage per week as a fraction of the total number of units. r depends on the ratio of average weekly peak load to the annual peak load and the capacity on maintenance per week. This factor may be typically around 1.5.

2003

In tree-based multicast systems, a relatively small number of interior nodes carry the load of forwarding multicast messages. This works well when the interior nodes are dedicated infrastructure routers. But it poses a problem in... more

In tree-based multicast systems, a relatively small number of interior nodes carry the load of forwarding multicast messages. This works well when the interior nodes are dedicated infrastructure routers. But it poses a problem in cooperative application-level multicast, where participants expect to contribute resources proportional to the benefit they derive from using the system. Moreover, many participants may not have the network capacity and availability required of an interior node in high-bandwidth multicast applications. SplitStream is a high-bandwidth content distribution system based on application-level multicast. It distributes the forwarding load among all the participants, and is able to accommodate participating nodes with different bandwidth capacities. We sketch the design of SplitStream and present some preliminary performance results.

2009

Application-independent Redundancy Elimination (RE), or identifying and removing repeated content from network transfers, has been used with great success for improving network performance on enterprise access links. Recently, there is... more

Application-independent Redundancy Elimination (RE), or identifying and removing repeated content from network transfers, has been used with great success for improving network performance on enterprise access links. Recently, there is growing interest for supporting RE as a network-wide service. Such a network-wide RE service benefits ISPs by reducing link loads and increasing the effective network capacity to better accommodate the increasing number of bandwidth-intensive applications. Further, a networkwide RE service democratizes the benefits of RE to all end-to-end traffic and improves application performance by increasing throughput and reducing latencies.

2007, Computing Research Repository

The subject of this paper is the long-standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundamental performance limits of mobile ad hoc networks (MANETs).... more

The subject of this paper is the long-standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundamental performance limits of mobile ad hoc networks (MANETs). A MANET is a peer-to-peer network with no pre-existing infrastructure. MANETs are the most general wireless networks, with single-hop, relay, interference, mesh, and star networks comprising special cases. The lack of a MANET capacity theory has stunted the development and commercialization of many types of wireless networks, including emergency, military, sensor, and community mesh networks. Information theory, which has been vital for links and centralized networks, has not been successfully applied to decentralized wireless networks. Even if this was accomplished, for such a theory to truly characterize the limits of deployed MANETs it must overcome three key roadblocks. First, most current capacity results rely on the allowance of unbounded delay and reliability. Second, spatial and timescale decompositions have not yet been developed for optimally modeling the spatial and temporal dynamics of wireless networks. Third, a useful network capacity theory must integrate rather than ignore the important role of overhead messaging and feedback. This paper describes some of the shifts in thinking that may be needed to overcome these roadblocks and develop a more general theory that we refer to as non-equilibrium information theory.

2004, Journal of Water Resources Planning and Management

A new approach for reliability-based optimization of water distribution networks is presented. The approach links a genetic algorithm ͑GA͒ as the optimization tool with the first-order reliability method ͑FORM͒ for estimating network... more

A new approach for reliability-based optimization of water distribution networks is presented. The approach links a genetic algorithm ͑GA͒ as the optimization tool with the first-order reliability method ͑FORM͒ for estimating network capacity reliability. Network capacity reliability in this case study refers to the probability of meeting minimum allowable pressure constraints across the network under uncertain nodal demands and uncertain pipe roughness conditions. The critical node capacity reliability approximation for network capacity reliability is closely examined and new methods for estimating the critical nodal and overall network capacity reliability using FORM are presented. FORM approximates Monte Carlo simulation reliabilities accurately and efficiently. In addition, FORM can be used to automatically determine the critical node location and corresponding capacity reliability. Network capacity reliability approximations using FORM are improved by considering two failure modes. This research demonstrates the novel combination of a GA with FORM as an effective approach for reliability-based optimization of water distribution networks. Correlations between random variables are shown to significantly increase optimal network costs.

2001

Spatial reuse TDMA is a fixed assignment access scheme for multi-hop radio networks. The idea is to increase network capacity by letting several radio terminals use the same time slot when the interferences caused are not too severe. We... more

Spatial reuse TDMA is a fixed assignment access scheme for multi-hop radio networks. The idea is to increase network capacity by letting several radio terminals use the same time slot when the interferences caused are not too severe. We consider two methods of generating traffic controlled reuse schedules. One method uses full knowledge of the interference environment to generate schedules. The other method uses a graph representation of the network, assuming limited knowledge of the interferences. By simulations, we evaluate the proposed methods in terms of average delay and throughput.

2006, IEEE Transactions on Information Theory

Consider the following network communication setup, originating in a sensor networking application we refer to as the "sensor reachback" problem. We have a directed graph

2006, 2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks

We consider the problem of optimally allocating the base station transmit power in two neighboring cells for a TDMA wireless cellular system, to maximize the total system throughput under interference and noise impairments. Employing... more

We consider the problem of optimally allocating the base station transmit power in two neighboring cells for a TDMA wireless cellular system, to maximize the total system throughput under interference and noise impairments. Employing dynamic reuse of spectral resources, we impose a peak power constraint at each base station and allow for coordination between the base stations. By an analytical derivation we find that the optimal power allocation then has a remarkably simple nature: Depending on the noise and channel gains, transmit at full power only at base station 1 or base station 2, or both.

2004, IEEE Journal on Selected Areas in Communications

We consider the problem of determining the maximum capacity of the media access (MAC) layer in wireless ad hoc networks. Due to spatial contention for the shared wireless medium, not all nodes can concurrently transmit packets to each... more

We consider the problem of determining the maximum capacity of the media access (MAC) layer in wireless ad hoc networks. Due to spatial contention for the shared wireless medium, not all nodes can concurrently transmit packets to each other in these networks. The maximum number of possible concurrent transmissions is, therefore, an estimate of the maximum network capacity, and depends on the MAC protocol being used. We show that for a large class of MAC protocols based on virtual carrier sensing using RTS/CTS messages, which includes the popular IEEE 802.11 standard, this problem may be modeled as a maximum Distance-2 matching ( D2EMIS) in the underlying wireless network: Given a graph G(V,E), find a set of edges E'⊆E such that no two edges in E' are connected by another edge in E. D2EMIS is NP-complete. Our primary goal is to show that it can be approximated efficiently in networks that arise in practice. We do this by focusing on an admittedly simplistic, yet natural, graph-theoretic model for ad hoc wireless networks based on disk graphs, where a node can reach all other nodes within some distance (nodes may have unequal reach distances). We show that our approximation yields good capacity bounds. Our work is the first attempt at characterizing an important "maximum" measure of wireless network capacity, and can be used to shed light on previous topology formation protocols like Span and GAF that attempt to produce "good" or "capacity-preserving" topologies, while allowing nodes to alternate between sleep and awake states. Our work shows an efficient way to compute an upper bound on maximum wireless network capacity, thereby allowing topology formation algorithms to determine how close they are to optimal. We also outline a distributed algorithm for the problem for unit disk graphs, and briefly discuss extensions of our results to: 1) different node interference models; 2) directional antennas; and 3) other transceiver connectivity structures besides disk graphs.

2002, Photonic Network Communications

This paper is an introduction to survivability of WDM networks. All the main optical protection techniques proposed as far as now for the WDM layer are classified and reviewed. In particular, commonly adopted protection strategies for... more

This paper is an introduction to survivability of WDM networks. All the main optical protection techniques proposed as far as now for the WDM layer are classified and reviewed. In particular, commonly adopted protection strategies for ring and mesh networks are explained. Moreover, off-line planning of WDM networks able to support path protection is briefly introduced. Finally, an example of heuristic network-capacity optimization is presented, discussing results obtained by considering a case-study network.

2005, Transportation Research Part B-methodological

This paper explores the use of cooperative, distributed multi-agent systems to improve dynamic routing and traffic management. On the supply-side, real-time control over the transportation network is accomplished through an agent-based... more

This paper explores the use of cooperative, distributed multi-agent systems to improve dynamic routing and traffic management. On the supply-side, real-time control over the transportation network is accomplished through an agent-based distributed hierarchy of system operators. Allocation of network capacity and distribution of traffic advisories are performed by agents that act on behalf of information service providers. Driver needs and preferences are represented by agents embedded in intelligent in-vehicle route guidance systems. Negotiation between ISP and driver agents seek a more efficient route allocation across time and space. Results from simulation experiments suggest that negotiation can achieve more optimal network performance and increased driver satisfaction.

2009, … , IEEE Transactions on

Cognitive radio (CR) has been considered as a promising technology to improve the spectrum utilization. In this paper we analyze the capacity of a CR network with average received interference power constraints. Under the assumptions of... more

Cognitive radio (CR) has been considered as a promising technology to improve the spectrum utilization. In this paper we analyze the capacity of a CR network with average received interference power constraints. Under the assumptions of uniform node placements and a simple power control scheme, the maximum transmit power of a target CR transmitter is characterized by its cumulative distribution function (CDF). We study two CR scenarios for future applications. The first scenario is called the CR based central access network, which aims at providing broadband access to CR devices. In the second scenario, the so-called CR assisted virtual multiple-input multiple-output (MIMO) network, CR is used to improve the access capability of a cellular system. The uplink ergodic channel capacities of both scenarios are derived and analyzed with an emphasis on understanding the impact of numbers of primary users and CR users on the capacity. Numerical and simulation results suggest that the CR based central access network is more suitable for less-populated rural areas where a relatively low density of primary receivers is expected; while the CR assisted virtual MIMO network performs better in urban environments with a dense population of mobile CR users.

2004

In this paper, we study the impact of individual variable-range transmission power control on the physical and network connectivity, network capacity and power savings of wireless multihop networks such as ad hoc and sensor networks.... more

In this paper, we study the impact of individual variable-range transmission power control on the physical and network connectivity, network capacity and power savings of wireless multihop networks such as ad hoc and sensor networks. First, using previous work by Steele and Gupta [7] we derive an asymptotic expression for the average traffic carrying capacity of nodes in a multihop network where nodes can individually control the transmission range they use. For the case of a path attenuation factor α = 2 we show that this capacity remains constant even when more nodes are added to the network. Second, we show that the ratio between the minimum transmission range levels obtained using common-range and variable-range based routing protocols is approximately 2. This is an important result because it suggests that traditional routing protocols based on common-range transmission can only achieve about half the traffic carrying capacity of variable-range power control approaches. In addition, common-range approaches consume ∼ (1 − 2 2 α ) % more transmission power. Second, we derive a model that approximates the signaling overhead of a routing protocol as a function of the transmission range and node mobility for both route discovery and route maintenance. We show how routing protocols based on common-range transmission power limit the capacity available to mobile nodes. The results presented in the paper highlight the need to design future wireless network protocols (e.g., routing protocols) for wireless ad hoc and sensor networks based, not on common-range which is prevalent today, but on variable-range power control.

2003, Transportation Research Part E: Logistics and Transportation Review

The severity of road congestion not only depends on the relation between traffic volumes and network capacity, but also on the distribution of car traffic among different time periods during the day. A new error components logit model for... more

The severity of road congestion not only depends on the relation between traffic volumes and network capacity, but also on the distribution of car traffic among different time periods during the day. A new error components logit model for the joint choice of time of day and mode is presented, estimated on stated preference data for car and train travellers in The Netherlands. The results indicate that time of day choice in The Netherlands is sensitive to changes in peak travel time and cost and that policies that increase these peak attributes will lead to peak spreading.

1986

Wireless Local Area Networks (WLANs) is one of the most promising access technologies for the upcoming fourth-generation wireless communication systems. In the last few years, several research efforts have been devoted to investigate... more

Wireless Local Area Networks (WLANs) is one of the most promising access technologies for the upcoming fourth-generation wireless communication systems. In the last few years, several research efforts have been devoted to investigate possible multiple access schemes capable of supporting real-time traffic as well as best-effort data transmissions. In particular, the use of suitable transmission schemes allows not only to achieve higher data-rates, but also to perform resource allocation in order to guarantee specific service requirements. In this paper we propose a medium access control (MAC) scheme for a WLAN supporting realtime (voice) and best-effort (data) services, based on Orthogonal Frequency Division Multiplexing (OFDM) technique. A suitable analytical approach is proposed in order to derive the performance of the proposed MAC scheme. In particular, it is shown in the paper that a high overall network capacity in terms of simultaneously active users is achieved by effectively exploiting the multiuser capabilities offered by OFDM, together with a proper service differentiation.

1996, IEEE Transactions on Communications

What is the capacity of the uplink of a radio network of receivers? We consider a spread spectrum model in which each user is decoded by all the receivers in the network (macrodiversity). We use a carrier-to-interference performance... more

What is the capacity of the uplink of a radio network of receivers? We consider a spread spectrum model in which each user is decoded by all the receivers in the network (macrodiversity). We use a carrier-to-interference performance criterion that we derive from Shannon theory; each user must find the right transmitter power level to satisfy its carrier-tointerference constraint. Satisfying this requirement for all users is equivalent to solving a fixed point problem. We use this power control problem to derive the network capacity region and find that the feasibility of a configuration of users is independent of their positions in the network; each user can be assigned a bandwidth that is independent of the user's position in the network. Our capacity region is an upper bound over all schemes that treat the interference of other users as pure noise. To show that the capacity can be realized in practice, we propose a decentralized power adaptation algorithm and prove global convergence to the fixed point via a monotonicity argument.

2000, Transportation Research Part C: Emerging Technologies

The focus of this paper is on the development of a methodology to identify network and demographic characteristics on real transportation networks which may lead to signi®cant problems in evacuation during some extreme event, like a... more

The focus of this paper is on the development of a methodology to identify network and demographic characteristics on real transportation networks which may lead to signi®cant problems in evacuation during some extreme event, like a wild®re or hazardous material spill. We present an optimization model, called the critical cluster model, that can be used to identify small areas or neighborhoods which have high ratios of population to exit capacity. Although this model in its simplest form is a nonlinear, constrained optimization problem, a special integer-linear programming equivalent can be formulated. Special contiguity constraints are needed to keep identi®ed clusters spatially connected. We present details on how this model can be solved optimally as well as discuss computational experience for several example transportation networks. We describe how this model can be integrated within a GIS system to produce maps of evacuation risk or vulnerability. This model is now being utilized in several research projects, in Europe and the US. Ó : S 0 9 6 8 -0 9 0 X ( 0 0 ) 0 0 0 1 9 -X

1997, Wireless Networks

For fixed quality-of-service constraints and varying channel interference, how should a mobile node in a wireless network adjust its transmitter power so that energy consumption is minimized? Several transmission schemes are considered,... more

For fixed quality-of-service constraints and varying channel interference, how should a mobile node in a wireless network adjust its transmitter power so that energy consumption is minimized? Several transmission schemes are considered, and optimal solutions are ...

2002

Topology control for ad hoc networks aims to increase effective network capacity and conserve energy. Most proposed algorithms assume the usage of isotropic antennas and thus only adjust the transmission power of each node. We propose a... more

Topology control for ad hoc networks aims to increase effective network capacity and conserve energy. Most proposed algorithms assume the usage of isotropic antennas and thus only adjust the transmission power of each node. We propose a distributed topology control mechanism for ad hoc networks with directional antennas that adjusts antenna pattern (direction(s)) in addition to transmission power. Simulation studies have been conducted to demonstrate the effectiveness of the approach, as well as to investigate its benefits and impacts on application layer performance.

2007

Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorithms are designed to be energy efficient and to achieve optimal... more

Multicast is a key technology that provides efficient data communication among a set of nodes for wireless multi-hop networks. In sensor networks and MANETs, multicast algorithms are designed to be energy efficient and to achieve optimal route discovery among mobile nodes, respectively. However, in wireless mesh networks, which are required to provide high quality service to end users as the "last-mile" of the Internet, throughput maximization conflicting with scarce bandwidth has the paramount priority. We propose a Level Channel Assignment (LCA) algorithm and a Multi-Channel Multicast (MCM) algorithm to optimize throughput for multi-channel and multiinterface mesh networks. The algorithms first build a multicast structure by minimizing the number of relay nodes and hop count distances between the source and destinations, and use dedicated channel assignment strategies to improve the network capacity by reducing interference. We also illustrate that the use of partially overlapping channels can further improve the throughput. Simulations show that our algorithms greatly outperform the single-channel multicast algorithm. We observe that MCM achieves better throughput and shorter delay while LCA can be realized in distributed manner.

2009

The ability to partition sensor network application code across sensor nodes and backend servers is important for running complex, data-intensive applications on sensor platforms that have CPU, energy, and bandwidth limitations. This... more

The ability to partition sensor network application code across sensor nodes and backend servers is important for running complex, data-intensive applications on sensor platforms that have CPU, energy, and bandwidth limitations. This paper presents Wishbone, a system that takes a dataflow graph of operators and produces an optimal partitioning. With Wishbone, users can run the same program on a range of sensor platforms, including TinyOS motes, smartphones running JavaME, and the iPhone. The resulting program partitioning will in general be different in each case, reflecting the different node capabilities. Wishbone uses profiling to determine how each operator in the dataflow graph will actually perform on sample data, without requiring cumbersome user annotations. Its partitioning algorithm models the problem as an integer linear program that minimizes a linear combination of network bandwidth and CPU load and uses program structure to solve the problem efficiently in practice. Our results on a speech detection application show that the system can quickly identify good trade-offs given limitations in CPU and network capacity.

2002, 2002 International Zurich Seminar on Broadband Communications Access - Transmission - Networking (Cat. No.02TH8599)

Wireless LANs (WLANs) are becoming increasingly popular for providing high data rate network access to mobile computers. Most of the currently deployed systems operate in the 2. 4 GHz unlicensed frequency hand. However, increasing demand... more

Wireless LANs (WLANs) are becoming increasingly popular for providing high data rate network access to mobile computers. Most of the currently deployed systems operate in the 2. 4 GHz unlicensed frequency hand. However, increasing demand for higher data rates and network capacities has led to new system standards for the 5 GHz hand. Unlike traditional cellular telephony systems, WLANs are deployed in an ad-hoc fashion, often based on an educated guess by the person installing the access points (APs). This typically results in coverage gaps or capacity loss due to misplaced APs. In this paper, we examine methods for obtaining a close-to-optimal positioning of WLAN APs and evaluate their performance in a typical downtown or campus environment. The system performance is evaluated using an objective function which aims to maximize both the coverage area and the overall signal quality. The optimization algorithms used in this paper evaluate this ohjective function over a discrete search space, thereby considerably reducing the inherent complexity of the problem, while at the same time providing a reasonable approximation to the continuous optimization problem. Numerical results show that random search algorithms, such as simulated annealing, can yield very good solutions. However, the convergence speed of simulated annealing strongly depends on the fine-tuning of simulation parameters and a good choice of the initial set of transmitter positions. Successive removal algorithms, such as pruning, though usually producing sub-optimal solutions, converge in polynomial time. We therefore propose a combination of the two approachesusing pruning for obtaining an initial set of transmitter positions and refining these by using either neighborhood search or simulated annealing.

2009

This study takes a network theoretical perspective in its examination of innovation-based corporate entrepreneurship (ICE), focusing on how project-specific ties can form for nonroutine phenomena. A comparative case analysis of 246... more

This study takes a network theoretical perspective in its examination of innovation-based corporate entrepreneurship (ICE), focusing on how project-specific ties can form for nonroutine phenomena. A comparative case analysis of 246 interviews in twelve industry-leading global corporations identifies constructs associated with individual network capacity at the individual level, organizational network capacity at the organization level, and program network capacity at the ICE program level. In addition, we recognize the managerial facilitating roles of cultivator and broker. We develop propositions aimed at providing insights about the relationships among these constructs, and identify implications for managerial and ICE program responsibilities.

2000, IEEE/ACM Transactions on Networking

In this paper, we analyze the blocking probability of distributed lightpath establishment in wavelength-routed WDM networks by studying the two basic methods: destination-initiated reservation (DIR) and source-initiated reservation (SIR).... more

In this paper, we analyze the blocking probability of distributed lightpath establishment in wavelength-routed WDM networks by studying the two basic methods: destination-initiated reservation (DIR) and source-initiated reservation (SIR). We discuss three basic types of connection blocking: 1) blocking due to insufficient network capacity; 2) blocking due to outdated information; and 3) blocking due to over-reservation. It is shown that the proposed models are highly accurate for both the DIR and the SIR methods, in both the regular and irregular network topologies, under the whole range of traffic loads.

2003

This paper is aimed at designing a congestion control system that scales gracefully with network capacity, providing high utilization, low queueing delay, dynamic stability, and fairness among users. In earlier work we had developed... more

This paper is aimed at designing a congestion control system that scales gracefully with network capacity, providing high utilization, low queueing delay, dynamic stability, and fairness among users. In earlier work we had developed fluid-level control laws that achieve the first three objectives for arbitrary networks and delays, but were forced to constrain the resource allocation policy. In this paper we extend the theory to include dynamics at TCP sources, preserving the earlier features at fast time-scales, but permitting sources to match their steady-state preferences, provided a bound on round-trip-times is known. We develop two packet-level implementations of this protocol, using (i) ECN marking, and (ii) queueing delay, as means of communicating the congestion measure from links to sources. We discuss parameter choices and demonstrate using ns-2 simulations the stability of the protocol and its equilibrium features in terms of utilization, queueing and fairness. We also demonstrate the scalability of these features to increases in capacity, delay, and load, in comparison with other deployed and proposed protocols.

In this paper, we describe a new alternative control approach for indirectly connected district heating substations. Simulations results showed that the new approach results in an increased DT across the substation. Results were obtained... more

In this paper, we describe a new alternative control approach for indirectly connected district heating substations. Simulations results showed that the new approach results in an increased DT across the substation. Results were obtained for both ideal and non-ideal operation of the system, meaning that less water must be pumped through the district heating network, and a higher overall fuel efficiency can be obtained in the district heating power plants. When a higher fuel efficiency is achieved, the usage of primary fuel sources can be reduced. Improved efficiency also increases the effective heat transfer capacity of a district heating network, allowing more customers to be connected to an existing network without increasing the heating plant or network capacity.

2004

An important performance consideration for wireless sensor networks is the amount of information collected by all the nodes in the network over the course of network lifetime. Since the objective of maximizing the sum of rates of all the... more

An important performance consideration for wireless sensor networks is the amount of information collected by all the nodes in the network over the course of network lifetime. Since the objective of maximizing the sum of rates of all the nodes in the network can lead to a severe bias in rate allocation among the nodes, we advocate the use of lexicographical max-min (LMM) rate allocation for the nodes. To calculate the LMM rate allocation vector, we develop a polynomial-time algorithm by exploiting the parametric analysis (PA) technique from linear programming (LP), which we call serial LP with Parametric Analysis (SLP-PA). We show that the SLP-PA can be also employed to address the so-called LMM node lifetime problem much more efficiently than an existing technique proposed in the literature. More important, we show that there exists an elegant duality relationship between the LMM rate allocation problem and the LMM node lifetime problem. Therefore, it is sufficient to solve any one of the two problems and important insights can be obtained by inferring duality results for the other problem.

2006, IEEE Journal on Selected Areas in Communications

We consider the fundamental delay tradeoffs for utility optimal scheduling in a general network with time varying channels. A network controller acts on randomly arriving data and makes flow control, routing, and resource allocation... more

We consider the fundamental delay tradeoffs for utility optimal scheduling in a general network with time varying channels. A network controller acts on randomly arriving data and makes flow control, routing, and resource allocation decisions to maximize a fairness metric based on a concave utility function of network throughput. A simple set of algorithms are constructed that yield total utility within O(1/V ) of the utilityoptimal operating point, for any control parameter V > 0, with a corresponding end-to-end network delay that grows only logarithmically in V . This is the first algorithm to achieve such "super-fast" performance. Furthermore, we show that this is the best utility-delay tradeoff possible. This work demonstrates that the problem of maximizing throughput utility in a data network is fundamentally different than related problems of minimizing average power expenditure, as these latter problems cannot achieve such performance tradeoffs.

2009, Physical Review E

Here, we uncover the load and fault-tolerant backbones of the trans-European gas pipeline network. Combining topological data with information on intercountry flows, we estimate the global load of the network and its tolerance to... more

Here, we uncover the load and fault-tolerant backbones of the trans-European gas pipeline network. Combining topological data with information on intercountry flows, we estimate the global load of the network and its tolerance to failures. To do this, we apply two complementary methods generalized from the betweenness centrality and the maximum flow. We find that the gas pipeline network has grown to satisfy a dual purpose. On one hand, the major pipelines are crossed by a large number of shortest paths thereby increasing the efficiency of the network; on the other hand, a nonoperational pipeline causes only a minimal impact on network capacity, implying that the network is error tolerant. These findings suggest that the trans-European gas pipeline network is robust, i.e., error tolerant to failures of high load links.

2012, IEEE Transactions on Wireless Communications

This paper proposes distributed joint power and admission control algorithms for the management of interference in two-tier femtocell networks, where the newly-deployed femtocell users (FUEs) share the same frequency band with the... more

This paper proposes distributed joint power and admission control algorithms for the management of interference in two-tier femtocell networks, where the newly-deployed femtocell users (FUEs) share the same frequency band with the existing macrocell users (MUEs) using code-division multiple access (CDMA). As the owner of the licensed radio spectrum, the MUEs possess strictly higher access priority over the FUEs; thus, their quality-of-service (QoS) performance, expressed in terms of the prescribed minimum signal-to-interference-plus-noise ratio (SINR), must be maintained at all times. For the lower-tier FUEs, we explicitly consider two different design objectives, namely, throughput-power tradeoff optimization and soft QoS provisioning. With an effective dynamic pricing scheme combined with admission control to indirectly manage the cross-tier interference, the proposed schemes lend themselves to distributed algorithms that mainly require local information to offer maximized net utility of individual users. The approach employed in this work is particularly attractive, especially in view of practical implementation under the limited backhaul network capacity available for femtocells. It is shown that the proposed algorithms robustly support all the prioritized MUEs with guaranteed QoS requirements whenever feasible, while allowing the FUEs to optimally exploit the remaining network capacity. The convergence of the developed solutions is rigorously analyzed, and extensive numerical results are presented to illustrate their potential advantages.

2008, Manufacturing & Service Operations Management

W e consider a revenue management, network capacity control problem in a setting where heterogeneous customers choose among the various products offered by a firm (e.g., different flight times, fare classes, and/or routings). Customers... more

W e consider a revenue management, network capacity control problem in a setting where heterogeneous customers choose among the various products offered by a firm (e.g., different flight times, fare classes, and/or routings). Customers may therefore substitute if their preferred products are not offered. These individual customer choice decisions are modeled as a very general stochastic sequence of customers, each of whom has an ordered list of preferences. Minimal assumptions are made about the statistical properties of this demand sequence. We assume that the firm controls the availability of products using a virtual nesting control strategy and would like to optimize the protection levels for its virtual classes accounting for the (potentially quite complex) choice behavior of its customers. We formulate a continuous demand and capacity approximation for this problem, which allows for the partial acceptance of requests for products. The model admits an efficient calculation of the sample path gradient of the network revenue function. This gradient is then used to construct a stochastic steepest ascent algorithm. We show the algorithm converges in probability to a stationary point of the expected revenue function under mild conditions. The algorithm is relatively efficient even on large network problems, and in our simulation experiments it produces significant revenue increases relative to traditional virtual nesting methods. On a largescale, real-world airline example using choice behavior models fit to actual booking data, the method produced an estimated 10% improvement in revenue relative to the controls used by the airline. The examples also provide interesting insights into how protection levels should be adjusted to account for choice behavior. Overall, the results indicate that choice behavior has a significant impact on both capacity control decisions and revenue performance and that our method is a viable approach for addressing the problem.