Adaptive Inverse Multiplexing for Wide-Area Wireless Networks
#1

[attachment=10543]
inverse multiplexing
• Idea: simulate a “large” logical channel out of some number (called a bundle) of “smaller” ones

goals
• High page link utilization and low fragmentation
Low bandwidth wireless links
• Tight reordering constraints
TCP doesn’t handle reordered packets well
• Adaptive scheduling
Throughput of shared wireless links is unstable over many time scales
• contributions
• Standard Inverse Multiplexing
Commonly used in ISDN, fractional T1/T3, ATM
Private links with no contention
Stable & similar channel characteristics
• Link Quality Balancing
Adapts to varying capacity shared access channels
Efficient bandwidth utilization
TCP-friendly reordering bound
• outline
• Scheduling techniques
Link Quality Balancing with stable links
• Adaptation
Measuring and reacting to channel variations
• Implementation results
Constant Bit Rate (CBR) Traffic
TCP flows
• known scheduling methods
Round Robin
Does not assure optimum page link usage
Provides no bounds on delay, ordering
Deficit Round Robin, Fair Queuing
Provide efficient page link usage, but...
Require information about queue lengths
– In CDPD, queues are often buried inside the networks, hence information is unavailable
Don’t provide ordering guarantees
• deficit round robin
• fragmentation: an extreme
• weighting
• link quality balancing
• Idea: Fragment traffic in proportion to individual page link throughputs
For each link, compute a relative MTU
– For fastest link, use optimum MTU
– On all other links, use a proportionately smaller one
Fragment packets to fill MTU-sized buckets
– Last fragment arrival times are the same on each link
• Guarantees no inter-round reordering; only possible reordering occurs in the same round
– Requires no information on queue lengths
– Work conserving; provides maximal page link usage
our approach: balancing
• measurement
• Problem: Individual page link throughputs are highly variable over many time scales
• How do we measure current throughput?
Absolute values are difficult and expensive to obtain
– Without synthetic traffic, we are limited by the offered load; who knows if it actually is driving the links to full capacity
Synthetic probes are problematic
– Without priority queuing, introducing synthetic traffic may cause loss of actual traffic
link quality metric
• Solution: Don’t! Relative metrics suffice
Simply maintain proportional estimates
End-to-end bandwidth probing will do the rest
• But which metric?
Packet arrival times
– Theoretically ideal, but far too noisy to be used in reality
Short-term throughput
– Similarly difficult to measure
Loss Rates
– With bounded queues, loss rates are a rough indicator of appropriate throughput, and easy to measure
feedback loop
• Invariant: Always schedule traffic so that quality metric will be identical across links
As a corollary, any perceived deviation at the receiver implies an improper estimate
Use the receiver’s data to periodically update the Multiplexor’s scheduling proportions
End-to-end bandwidth probing should cause the weakest page link to fail first and/or more often
• Links are asymmetric; measure both ways
• cbr traffic
• tcp traffic
evaluation & future work
• LQB handles shared wireless links well
Fragmentation is minimal
Reordering is tightly bounded
Adapts well to varying channel characteristics
• But we’d like to find a better metric
Loss rates are delayed and very coarse grained
Perhaps filtering functions exist for inter-packet arrival times
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: inverse matrix generator, inverse multiple access, inverse**design notes aklc, inverse kinematics dessigner with excel, abstract for inverse multiplexing, who is robin hood in, inverse nultiplexing over atm,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 42,451 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  Vertical Handoff Decision Algorithm Providing Optimized Performance in Heterogeneous Wireless Networks computer science topics 2 30,484 07-10-2016, 09:02 AM
Last Post: ijasti
  Implementation of Diffie-Hellman Key Exchange on Wireless Sensor Using Elliptic Curv project report helper 2 3,161 31-10-2015, 02:16 PM
Last Post: seminar report asees
  Dynamic Search Algorithm in Unstructured Peer-to-Peer Networks seminar surveyer 3 2,824 14-07-2015, 02:24 PM
Last Post: seminar report asees
  Heterogeneous Wireless Sensor Networks in a Tele-monitoring System for Homecare electronics seminars 2 2,564 26-02-2015, 08:03 PM
Last Post: Guest
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,356 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Adaptive Replacement Cache Full Download Seminar Report and Paper Presentation computer science crazy 1 2,995 19-04-2014, 07:01 PM
Last Post: Guest
  Shallow Water Acoustic Networks (SWANs project report helper 2 1,856 24-03-2014, 10:10 PM
Last Post: seminar report asees
Music Blast Wireless (Download Full Report And Abstract) computer science crazy 8 6,605 18-02-2014, 01:13 AM
Last Post: Guest
Question Space-time Adaptive Processing (STAP) computer science crazy 2 3,153 16-10-2013, 03:09 PM
Last Post: Guest

Forum Jump: