Communication Networks Laboratory projects

Communication Networks Laboratory projects

DAWN ICON SIMON VARIOUS

Our research projects in the Communication Networks Laboratory at the School of Engineering Science at SFU deal with simulation and analysis of high-performance packet networks: traffic, protocols, and control algorithms.

Packet data networks, such as the Internet, are the infrastructure for delivering voice, data, and video applications. The quality of service that they deliver to users is a complex interaction of network traffic, protocols, and scheduling mechanisms employed in network elements (routers). Hence, evaluating network performance is a difficult task that is of importance both to service providers and network users.

Our projects deal with modeling and characterization of traffic emanating from interaction of voice, data, and video applications in IP (Internet Protocol) networks. In our laboratory, we use traffic traces from our own Mbone Webcast, from Internet Traffic Archive, and collections from CAIDA. In order to analyze network utilization and usage patterns, we also use billing records and traffic data collected from deployed networks: Telus Mobility (Vancouver), E-Comm (British Columbia), and ChinaSat (China). We analyze traffic traces, packet loss, and packet delay using mathematical tools, such as mono-fractal and multi-fractal wavelet analysis, in order to detect and quantitatively characterize the presence of long-range dependence (fractal behavior) in statistical processes emanating from Internet traffic.

We rely on simulation tools (ns-2 and OPNET) to evaluate performance of various wireline and wireless network protocols. We utilize traffic traces in various simulation scenarios (trace driven simulations) employing protocols such as Transmission Control Protocol and User Data Protocol. We use packet loss and packet delay as measures of network performance. Trace driven simulations using ns-2 and OPNET simulators are also employed to implement and evaluate performance of various scheduling and active control mechanisms. We are currently interested in using nonlinear dynamics and control theory to analyze network protocols and algorithms in order to better understand complex behavior, such as chaotic phenomena, already observed in IP networks.


DAWN: Data Analysis in Wireless and Wireline Networks


Modeling and characterization of traffic in public safety wireless networks
Bozidar Vujicic, Nikola Cackov, Svetlana Vujicic, and Ljiljana Trajkovic

This project deals with statistical analysis of traffic in a deployed circuit-switched, trunked radio cellular wireless network used by public safety agencies in Greater Vancouver Regional District. Traffic data span various time periods in 2001, 2002, and 2003. The statistical distribution and autocorrelation function of call inter-arrival and call holding times during several busy hours is examined. The call inter-arrival times are long-range dependent and may be modelled by both Weibull and gamma distributions. Call holding times follow the lognormal distribution and are uncorrelated. These findings indicate that traditional Erlang models for voice traffic may not be suitable for evaluating the performance of trunked radio networks. In addition, channel utilization and multi system call behaviour of trunked radio network have been simulated using OPNET. The instantaneous utilization of radio channels (the number of occupied radio channels) in each cell were examined in order to observe the traffic change over the period of two years and to predict future performance of the network.

  • B. Vujicic, H. Chen, and Lj. Trajkovic, ``Prediction of traffic in a public safety network,'' Proc. IEEE Int. Symp. Circuits and Systems, Kos, Greece, May 2006, pp. 2637-2640.
  • N. Cackov, J. Song, B. Vujicic, S. Vujicic, and Lj. Trajkovic, ``Simulation and performance evaluation of a public safety wireless network: case study,'' Simulation, vol. 81, no. 8, pp. 571-585, Aug. 2005.
  • B. Vujicic, N. Cackov, S. Vujicic, and Lj. Trajkovic ``Modeling and characterization of traffic in public safety wireless networks,'' Proc. SPECTS 2005, Philadelphia, PA, July 2005, pp. 214-223.
  • N. Cackov, B. Vujicic, S. Vujicic, and Lj. Trajkovic, ``Using network activity data to model the utilization of a trunked radio system,'' (special session) Proc. SPECTS 2004, San Jose, CA, July 2004, pp. 517-524.


    Data mining on billing traces of wireless network
    Hao (Leo) Chen (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Billing records generated for thousands of users of a telecommunication network are a gold mine to the network service providers, for both business and technical usages. However, how to mine the "golden nugget" from the enormous amount of data is not an easy task.

    This research project deals with the billing record of a genuine wireless network. We plan to apply data mining technology on the real network data, and to develop new algorithm for clustering user groups or mobility patterns. The challenges of this task lay in the very nature of the network billing data: high dimensionality of data requires more computing power and efficient algorithm, temporal and spatial data require special treatment, while the clustered user groups require reasonable descriptions for better understanding by marketing experts.

    We work with the genuine billing records collected from the Telus Mobility CDPD (Cellular Digital Packet Data) network. These network data are more typical than data obtained via simulations. The records were collected in various intervals, from several hours to of almost 20 days. Prior study of these records dealt with the discovery of network topology by identifying ``neighboring'' cells and with clustering of user groups employing AutoClass. We plan to extend the analysis of records by developing novel and viable methods for extracting useful knowledge particular for the telecommunication network, by constructing clustering algorithm specialized for network data, and by giving an understandable representation of network characteristics. Our approach could help network service providers to identify hidden user groups and to understand the mobility characteristics of the existing and potential customers in order to optimize the wireless networks and expand the business markets.

  • H. Chen and Lj. Trajkovic, ``Trunked radio systems: traffic prediction based on user clusters,'' Proc. IEEE ISWCS 2004, Mauritius, Sept. 2004, pp. 76-80.
  • Hao (Leo) Chen's M.A.Sc. thesis: ``User clustering and traffic prediction in a trunked radio system'' and presentation slides, February 2005.


    Modeling and performance analysis of public safety wireless networks
    James (Jiaqing) Song (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Public safety wireless networks (PSWNs) play a vital role in operations of emergency agencies such as police and fire departments. In this thesis, we describe analysis and modeling of traffic data collected from the Emergency Communications for Southwestern British Columbia (E-Comm) PSWN.

    We analyze network and agency call traffic and find that lognormal distribution and exponential distribution are adequate for modeling call holding time and call inter-arrival time, respectively. We also describe a newly developed wide area radio network simulator, named WarnSim. We use WarnSim simulations to validate the proposed traffic model, evaluate the performance of the E-Comm network, and predict network performance in cases of traffic increase.

  • WarnSim simulator (developed by J. Song): Wide Area Radio Network Simulator.
  • J. Song and Lj. Trajkovic, ``Modeling and performance analysis of public safety wireless networks,'' Proc. IEEE Int. Performance, Computing, and Communications Conference, Phoenix, AZ, Apr. 2005, pp. 567-572.
  • Jiaqing (James) Song, M.A.Sc. thesis: ``Modeling and performance analysis of public safety wireless networks'' and presentation slides, January 2005.


    Adapting ad hoc network concepts to land mobile radio systems
    Duncan Sharp (M. Eng. student) and Dr. Ljiljana Trajkovic (supervisor)

    Ad hoc networks are self organizing networks and require no prior infrastructure, which makes them robust and quick to deploy. These are good attributes for use by emergency response and disaster recovery teams. These teams coordinate their work by conversing on a common voice channel. Unfortunately, multicast voice is not well supported using current protocols for ad hoc multi hop networks. In this project, we analyze the traffic requirements (using real traffic from a large public safety agency radio system) and investigate the issues associated with carrying this type of traffic on single hop and multi hop ad hoc networks.

    The overall objective of the project is to identify evolving technologies, algorithms, protocols, and architectures for mobile ad hoc networks that are applicable, appropriate, and ready to be adopted by next generation land mobile radio systems and, in particular, by mobile radio systems designed for public safety communications applications.

  • D. Sharp, N. Cackov, N. Laskovic, Q. Shao, and Lj. Trajkovic, ``Analysis of public safety traffic on trunked land mobile radio systems,'' IEEE J. Select. Areas Commun., vol. 22, no. 7, Sept. 2004, pp. 1197-1205.
  • Duncan Sharp's M.Eng. project: ``Adapting ad hoc network concepts to land mobile radio systems'' and presentation slides, December 2002.


    Wavelet-based analysis of long-range dependent video traces
    Nikola Cackov (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Analysis of network traffic is important because a network behavior is determined by the characteristics of the traffic that it carries. In order to evaluate the effect of the network on various applications, it is essential to determine relevant traffic parameters. It is well known that network traffic exhibits phenomena known as self-similarity and long-range dependence. Self-similar and long-range dependent processes are classes of random processes characterized by a parameter, called Hurst parameter. There are several methods for estimation of the Hurst parameter of a given traffic trace, one of which is the wavelet-based method.

    Wavelet estimator is considered to be a very robust and unbiased. However, this estimator yields non-physical results when applied to MPEG-1 and MPEG-4 encoded video sequences. It has already been shown that these traffic traces exhibit long-range dependence. The main objective of the project is to discover the cause for the unreliable performance of the estimator. We observed that, for the video traces, estimators of the Hurst parameter that work in the frequency domain (wavelet-based and periodogram) produce similar results. However, the estimates are always larger than those obtained using time-domain estimators (R/S and variance-time plot). These findings may suggest that the relationship between the Hurst parameter and the exponent alpha of the power-law shaped spectrum is different than the widely-accepted H=0.5(alpha+1).

  • N. Cackov, Z. Lucic, M. Bogdanov, and Lj. Trajkovic, ``Wavelet-based estimation of long-range dependence in MPEG video traces,'' Proc. IEEE Int. Symp. Circuits and Systems, Kobe, Japan, May 2005, pp. 2068-2071.
  • Nikola Cackov's M.A.Sc. thesis: ``Wavelet-based estimation of long-range dependence in video and network traffic traces'' and presentation slides, December 2004.


    Wavelet analysis of traffic traces and packet loss
    Zelimir Lucic (M. Eng. student), Dr. Fei Xue (Postdoctoral fellow), Velibor Markovski (M. A. Sc. student), Bruce Chen (B. A. Sc. student), and Dr. Ljiljana Trajkovic (supervisor)

    We are investigating the performance of the Abry-Veitch wavelet-based estimator for the estimation of the Hurst parameter used in characterizing self-similar traffic. Performance results for two Ethernet traffic traces (pAug.TL, pOct.TL) indicate that the estimator can accurately capture Hurst parameter of the measured Ethernet traffic. In order to investigate the impact of long-range dependent (LRD) and short-range dependent (SRD) structures on the quality of the estimator, we apply the estimator on large sets of data generated by FARIMA(1,d,0) model. The performance analysis indicates that this estimator is not suitable for processes with strong SRD and either weak or strong LRD components. We confirm our findings by analyzing a medium-bursty Star Wars video traffic trace. Our findings imply that the estimator proves unsuitable for the medium- and high-burstiness video traffic because of the complex correlation structure of the video traces.

    We also use the Abry-Veitch estimator to investigate the scaling behavior of packet loss in video transfer over UDP and TCP in a congested packet network. Using trace-driven ns-2 simulations and wavelet analysis, we show that the underlying transport protocols and time scales are essential for understanding packet loss behavior. In the case of UDP transfers, packet loss process exhibits LRD over time scales coarser than approximately 1 second. In contrast, for the TCP transfers, the loss behavior over a coarser time scale does not exhibit such behavior. We attribute this phenomenon to the feedback control mechanisms in TCP, which decrease the burstiness of packet loss. Our findings are robust and hold for various simulation scenarios.

    We compared the performance of two wavelet based estimators: monofractal and multifractal, introduced by Abry and Veitch. The multifractal property of self-similar traffic implies that self-similarity still exists, but it is not uniform across all time scales. We use MPEG1, MPEG4, and H263 coded traffic video traces to compare the H parameter estimated using the wavelet based estimators, with the H parameter estimated via classical statistical methods, such as R/S. We are searching for the criteria for reliability of these two estimators. Our findings indicate that performance of both estimators is affected by the presence of SRD, but the effect of SRD is different for each estimator. It is interesting to note that graphical representations of the two wavelet based estimators are quite similar, while their numerical estimates of the H parameter tends to vary significantly.

  • V. Markovski, F. Xue, and Lj. Trajkovic, ``Simulation and analysis of packet loss in video transfers using User Datagram Protocol,'' The Journal of Supercomputing, Kluwer, vol. 20, no. 2, pp. 175-196, 2001.
  • F. Xue and Lj. Trajkovic, ``Performance analysis of a wavelet-based Hurst parameter estimator for self-similar network traffic,'' Proc. SPECTS '2K, Vancouver, BC, Canada, July 2000, pp. 294-298.
  • F. Xue, V. Markovski, and Lj. Trajkovic, ``Wavelet analysis of packet loss in video transfers over UDP,'' Proc. Internet Computing 2000, Las Vegas, NV, June 2000, pp. 427-433.
  • B. Chen, Z. Lucic, and Lj. Trajkovic, ``Simulation and wavelet analysis of the packet traffic,'' The ASI Exchange, Vancouver, BC, Canada, March 2002.
  • V. Markovski and F. Xue, ``Analysis of packet loss in IP networks,'' The ASI Exchange, Vancouver, BC, Canada, March 2000.


    TCP session analysis and modeling of hybrid satellite-terrestrial Internet traffic
    Savio Lau (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Satellite networks have received much attention in traffic analysis due to its loss characteristics and high bandwidth-delay product. Based on traffic traces collected from a commercial hybrid satellite network, I plan to examine traffic data at the session and packet levels. I will focus on the comparison of TCP modifications in the deployed network with proposals from research literature. Furthermore, I plan to analyze and model captured traffic on the packet level segmented by applications.


    Measurement and analysis of hybrid satellite-terrestrial Internet traffic
    Kenny Shao (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Measurement and analysis of genuine network traffic is important for traffic characterization. Collection and characterization of the terrestrial Internet traffic has received considerable attention during the past decade. Numerous web-sites offer collected samples of Internet traffic traces. To the contrary, few traffic traces have been collected from satellite/wireless commercial sites. We plan to collect hybrid satellite-terrestrial traffic traces from a commercial Internet access provider. The project objective is to model and analyze these traffic traces and to characterize the underlying processes and distributions.

  • Q. Shao and Lj. Trajkovic, ``Measurement and analysis of traffic in a hybrid satellite-terrestrial network,'' Proc. SPECTS 2004, San Jose, CA, July 2004, pp. 329-336.
  • Qing (Kenny) Shao's M.A.Sc. thesis: ``Measurement and analysis of traffic in a hybrid satellite-terrestrial network'' and presentation slides, April 2004.


    Spectral analysis of the Internet topology
    Hao (Johnson) Chen (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Discovering the properties of the Internet topology is crucial for the use, optimization, and maintenance of Internet. It is also essential for the improvement of network topology generators. Two recent approaches have dominated the research community: one based on data collected from active probing of hosts, and another based on Autonomous System (AS) topology information derived from Border Gateway Protocol (BGP) snapshots. Important rules, such as power-law distribution in AS graphs, have been discovered. The goal of our research is to qualify these two approaches and to find new valuable 1insights during the evaluation process.

    We use data from CAIDA (Cooperative Association for Internet Data Analysis) and from Route Views project at the University of Oregon. We employ Normalized Laplacian Spectrum (NLS) from spectral graph theory, because NLS proved to be unique in AS graphs in spite of the exponential growth of the Internet, and distinctive in setting AS graphs apart from synthetic ones. By applying NLS to the two datasets, we expect to obtain plausible interpretations in networking terms and a hybrid model encompassing both structural and power-law properties. Our result may have impact on future protocol evaluations and designs.

  • J. Chen and Lj. Trajkovic, ``Analysis of Internet topology data,'' Proc. IEEE Int. Symp. Circuits and Systems, Vancouver, British Columbia, Canada, May 2004, vol. IV, pp. 629-632.
  • Hao (Johnson) Chen's M.A.Sc. thesis: "Analysis of Internet topology data," April 2004.


    Understanding network customers' behavior from billing traces
    Dr. Luc A. Andriantiatsaholiniaina (Postdoctoral fellow) and Dr. Ljiljana Trajkovic (supervisor)

    Collection of user statistics and network traffic is crucial for understanding user behavior and for creating network workload models. It is also valuable for the management of commercial wireless networks. In this project, we report on the analysis of billing records collected from the Telus Mobility Cellular Digital Packet Data (CDPD) network. The longest continuous billing record that we examined covered approximately twenty one days, spanning the Christmas and New Year holiday seasons. We used various tools to graphically illustrate the billing data. We observed that network activities exhibit daily and weekly cycles. Analysis of billing record provided useful information about the usage of an operational wireless network.

    The clustering analysis revealed that customers, as well as network cells, might be classified into few distinct behavioral classes. The clustering analysis using k-means algorithm (available in S-PLUS) revealed four distinct behavioral classes of customers and three classes of network cells as the best results. However, AutoClass clustering method provided thirty two distinct behavioral classes of customers and four classes of network cells. AutoClass proved to be a good tool for clustering small data sets, such as network cells database, which is composed of 60 cells and 5 attributes or the INDEX project database with 84 people and 29 attributes, but it is not suitable for clustering large data set such as customers behavior database with 2096 customers and 8 attributes.

  • L. A. Andriantiatsaholiniaina and Lj. Trajkovic, ``Analysis of user behavior from billing records of a CDPD wireless network,'' Workshop on Wireless Local Networks (WLN) 2002, Tampa, FL, Nov. 2002, pp. 781-790.
  • H. Zhang, L. Andriantiatsaholiniaina, M. Nikolic, S. Petrovic, and Lj. Trajkovic, ``Understanding network traffic from billing traces: customers' behavior analysis,'' The ASI Exchange, Vancouver, BC, Canada, March 2002.


    Using AutoClass for exploring demographic structure of Internet users
    Milan Nikolic (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    The objective of this project was to use an automatic classification program (AutoClass) to extract useful information from the INDEX project (UC Berkeley) database in order to explore the demographic structure of Internet users. AutoClass is an unsupervised Bayesian classification system that seeks a maximum posterior probability classification. The database that we analyzed consisted of 84 cases with 23 attributes. AutoClass found a classification with three classes.

  • First class, with 47 cases (class members), consists of students and technicians, in their 20's or 30's, with a low or mid income.
  • Second class, with 28 cases, consists of professors and a few technicians and administrators in their 30's or 50's, for whom the ``university pays for Internet usage at home,'' and with a high or mid income.
  • Third class, with 9 cases, consists of employees for whom the ``employer pays for Internet usage at home'' and the ``employer pays for Internet usage at work,'' and who have a high or mid income. Our results show that the attributes ``age,'' ``profession,'' ``income,'' and ``who pays for the Internet connection'' were the most influential in making the classification.

  • M. Nikolic and Lj. Trajkovic, ``Clustering analysis of INDEX demographic database using AutoClass,'' The ASI Exchange, Vancouver, BC, Canada, March 2000.

    ICON: Intelligent Control of Communication Networks


    Modeling of TCP with active queue management schemes
    Dr. Judy Liu (Postdoctoral fellow) and Dr. Ljiljana Trajkovic (supervisor)

    The objective of this project is to model TCP mixed with active queue management (AQM) in order to understand and predict the dynamic behavior of packet networks. From the viewpoint of control theory, the network can be regarded as a complex control system. TCP adjusts its sending rate depending on whether or not it has detected a packet loss. Hence, it is natural to model the network system as a discrete model. We plan to model this process as a 'stroboscopic map' where the instant of observation is approximately one RTT. We are currently working on identifying the independent state variables, finding the mathematical relationships among them, and verifying them using ns-2 simulations.

    The basic idea of RED (Random Early Detection) is to sense impending congestion before it happens, and to provide feedback to senders by either dropping or marking packets. The drop probability of RED can be seen as the control law of the network system. Its discontinuity is the main reason behind the occurrence of oscillations and chaos in the system. If the network can be modeled as a second order system, various bifurcation phenomena, such as period-doubling, border-collision (also named as C-bifurcation), saddle-node, Hopf and torus bifurcation, should be observable for various system parameters. We intend to study the nonlinear phenomena in the network by employing bifurcation and chaos theory. We plan to use bifurcation diagrams, strange attractors in phase plane, and the Largest Lyapunov Exponents (LLE) to investigate these phenomena.

  • M. Liu, A. Marciello, M. di Bernardo, and Lj. Trajkovic, ``Discontinuity-induced bifurcations in TCP/RED communication algorithms,'' Proc. IEEE Int. Symp. Circuits and Systems, Kos, Greece, May 2006, pp. 2629-2632.
  • H. Zhang, M. Liu, V. Vukadinovic, and Lj. Trajkovic, ``Modeling TCP/RED: a dynamical approach,'' Complex Dynamics in Communication Networks, Springer Verlag, Series: Understanding Complex Systems, 2005, pp. 251-278.
  • M. Liu, H. Zhang, and Lj. Trajkovic, ``Stroboscopic model and bifurcations in TCP/RED,'' Proc. IEEE Int. Symp. Circuits and Systems, Kobe, Japan, May 2005, pp. 2060-2063.


    Characterization of a simple communication network using Legendre transform
    Takashi Hisakado (Professor, Kyoto University), Vladimir Vukadinovic (M.Sc. student, University of Belgrade) and Dr. Ljiljana Trajkovic (supervisor)

    We describe an application of the Legendre transform to communication networks. The Legendre transform applied to max-plus algebra linear systems corresponds to the Fourier transform applied to conventional linear systems. Hence, it is a powerful tool that can be applied to max-plus linear systems and their identification. Linear max-plus algebra has been already used to describe simple data communication networks. We first extend the Legendre transform as the slope transform to non-concave/non-convex functions. We then use it to analyze a simple communication network. We also propose an identification method for its transfer characteristic, and we confirm the results using the ns-2 network simulator.

  • T. Hisakado, K. Okumura, V. Vukadinovic, and Lj. Trajkovic, ``Characterization of a simple communication network using Legendre transform,'' (invited session) Proc. IEEE Int. Symp. Circuits and Systems, Bangkok, Thailand, May 2003, vol. III, pp. 738-741.


    Delay and throughput differentiation mechanism for non-elevated services
    Vladimir Vukadinovic (M.Sc. student, University of Belgrade) and Dr. Ljiljana Trajkovic (supervisor)

    Internet is a transport infrastructure for applications with various service requirements. However, Internet remains to be a best-effort network without widely deployed mechanisms for service differentiation and quality of service provisioning. Research efforts to provide service differentiation in the Internet have been recently directed toward non-elevated mechanisms. Majority of proposed non-elevated mechanisms rely on the idea of providing low delay service at the expense of increased loss probability. However, these proposals do not consider the influence of delay and loss differentiation on the behavior of TCP, the most widely used transport protocol in today's Internet. Service differentiation mechanisms cannot be designed without taking into account the complexity of TCP's congestion control algorithm.

    Goal of this project is to design a new non-elevated service differentiation mechanism that would provide low-delay service to real-time applications and at least the same throughput to throughput sensitive applications as they would receive in a best-effort network. The new mechanism will include two building blocks: a scheduler for proportional delay differentiation and a controller that will ensure that performance of TCP applications will not be degraded by the presence of the low-delay traffic.Necessary conditions to provide desired service differentiation will be derived by considering delay differentiation algorithm and TCP's congestion avoidance algorithm as a feedback control system. We plan to use the ns-2 simulator to test the new mechanism with existing ns-2 traffic models (CBR, Pareto ON/OFF, and Exponential ON/OFF) and protocols (UDP and TCP NewReno).

  • V. Vukadinovic. G. Petrovic, and Lj. Trajkovic, ``BPR+: a packet scheduling algorithm for proportional delay differentiation,'' YU INFO, Mar. 2004, Kopaonik, Serbia and Montenegro.
  • V. Vukadinovic and Lj. Trajkovic, ``RED with dynamic thresholds for improved fairness,'' 2004 ACM Symposium On Applied Computing, SAC '04, Nicosia, Cyprus, Mar. 2004, pp. 371-372.
  • Vladimir Vukadinovic' M.Sc. thesis: ``TCP-friendly packet loss controller for proportional delay differentiation'' and presentation slides, October 2004 (in Serbian).


    Simulation of loss patterns in video transfers over UDP and TCP
    Velibor Markovski (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    We are investigating the patterns of consecutive packet losses (called loss episodes or loss bursts), and the loss behavior in video transfers over UDP and TCP. We consider the impact of loss behavior on high-quality video transfers with stringent end-to-end delay requirements (5 - 30 milliseconds). These requirements imply small maximum queuing delay for the packets in the buffers of the routers. This, in turn, implies that these buffers should be small, which increases the probability of loss and the lengths of the loss episodes.

    We use ns-2 network simulator and genuine traffic traces to obtain the packet loss data and to observe packet loss patterns. We simulate both per-flow loss of a video connection and the aggregate loss at a buffer of a router. We experiment with a variety of simulation scenarios and we consider simple and complex network topologies, User Datagram (UDP) and Transmission Control (TCP) Protocols, various router buffer sizes and utilization levels, and a choice of queue management techniques (Droptail).

    Our simulation results provide a quantitative measure of how the length of these loss episodes increases with the increase of the average utilization levels. They show that lengthy loss episodes contribute significantly to the overall loss patterns, and that under fixed average utilization and during the times of higher congestion, longer loss episodes and shorter loss episode distances occur.

  • V. Markovski and Lj. Trajkovic, ``Analysis of loss periods for video transfers over UDP,'' Proc. SPECTS '2K, Vancouver, BC, Canada, July 2000, pp. 278-285.
  • V. Markovski,``Traffic management using packet scheduling,'' The ASI Exchange, Vancouver, BC, Canada, March 1999.
  • V. Markovski and Lj. Trajkovic, ``Traffic modeling in the TeleLearning environment''(abstract and poster), The Third Annual Conference of the TeleLearning Network of Centres of Excellence, Vancouver, BC, Canada, November 1998.
  • Velibor Markovski's M.A.Sc. thesis: ``Simulation and analysis of loss in IP networks'' and presentation slides, October 2000.


    Analysis and simulation of wireless data network traffic
    Michael Jiang (M. A. Sc. student) and Dr. Stephen Hardy and Dr. Ljiljana Trajkovic (co-supervisors)

    We investigated the impact of traffic patterns on wireless data networks. By performing simulations driven by genuine traffic traces, we evaluated the performance of wireless Cellular Digital Packet Data (CDPD) networks. OPNET network simulation tool was used to simulate the CDPD network of a local commercial service provider (Telus Mobility). In our simulations, we used traffic traces collected from the Telus Mobility network. Statistical analysis of these traces revealed that they exhibit long-range dependent behavior. Our simulation results indicated that they produce longer queues and, thus require larger buffers in the deployed network's switching elements.

  • M. Jiang, M. Nikolic, S. Hardy, and Lj. Trajkovic, ``Impact of self-similarity on wireless network performance,'' Proc. ICC 2001, Helsinki, Finland, June 2001, pp. 477-481.
  • M. Jiang, S. Hardy, and Lj. Trajkovic, ``Simulating CDPD network using OPNET,'' OPNETWORK 2000, Washington, DC, Aug. 2000.
  • C. Cheng, M. Jiang, E. Lo, R. H. S. Hardy, and Lj. Trajkovic, ``OPNET in an education environment: the Simon Fraser University experience,'' OPNETWORK '99, Washington, DC, Aug. 1999.
  • M. Jiang and N. Alborz, ``Modeling wireless data networks,'' The ASI Exchange, Vancouver, BC, Canada, March 2000.
  • M. Jiang,``Wireless data network traffic,'' The ASI Exchange, Vancouver, BC, Canada, March 1999.
  • Michael Jiang's M.A.Sc. thesis: ``Analysis of wireless data network traffic'' and presentation slides, April 2000.

    SIMON: Simulation of Networks


    Integrating ns-BGP with the ns-2.34 network simulator
    Reza Sahraei and Ljiljana Trajkovic

    The Border Gateway Protocol, BGP, is a de facto inter-Autonomous Systems (ASs) routing protocol. The primary function of a BGP speaking system is to exchange network reachability information with other BGP systems. It was formally proposed in Request For Comments (RFC) 1771 by the network working group within the Internet Engineering Task Force (IETF). The Internet has a very dynamic nature and this has an effect on the performance of the routing protocols such as BGP. Therefore, ns-BGP was developed for the ns-2 network simulator by importing the code from BGP implementation in SSFNET and converting them to C++ and OTcl code in 2003. Later, the ns-BGP upgraded to be compatible with the latest version of ns, which was ns-2.33 in 2008. This project integrates ns-BGP for the latest stable ns release ns-2.34.

  • The ns-2.34-BGP implementation was based on the ns-2.27-BGP module (developed by T. D. Feng) and ns-2.33-BGP (developed by W. Hrudey): Integrating ns-BGP with the ns-2.34 network simulator (developed by R. Sahraei).


    Integrating ns-BGP with the ns-2.33 network simulator
    Will Hrudey and Ljiljana Trajkovic

    The border gateway protocol (BGP) is an inter-Autonomous System (AS) routing protocol utilized as the core routing protocol in the Internet today. It was formally proposed in Request For Comments (RFC) 1771 by the network working group within the Internet Engineering Task Force (IETF). Primarily, BGP exchanges network reachability information with other BGP systems. Since BGP performance is affected by the dynamic nature of the Internet, ns-BGP was developed for the ns-2 network simulator in 2003 to facilitate realistic, flexible BGP routing experimentation.

    In parallel with the ns-BGP development, academic and research communities continued to develop ns-2. Consequently, this led to an incompatible ns-BGP module with current versions of the simulator. Therefore, in an effort to aid further BGP research efforts, this project will integrate ns-BGP with the latest stable version of the simulator thereby benefitting from core ns-2 feature enhancements and maintenance updates over the past five years.

  • The ns-2.33 BGP implementation was based on the ns-BGP 2.0 module (developed by T. D. Feng): Integrating ns-BGP with the ns-2.33 network simulator (developed by W. Hrudey).


    TCP with adaptive delay and loss response for heterogeneous networks
    Modupe Omueti and Ljiljana Trajkovic

    Long propagation delays and high bit error rates in heterogeneous networks with geostationary earth orbit (GEO) satellite links have negative impact on the performance of Transmission Control Protocol (TCP). In this paper, we propose modifications to TCP by introducing adaptive delay and loss response (TCP-ADaLR) to mitigate the adverse effects of satellite link characteristics. The proposed modifications incorporate delayed acknowledgment (ACK) recommended for Internet hosts. TCP-ADaLR introduces adaptive window increase and loss recovery mechanisms to address TCP performance degradation in satellite networks. We evaluate and compare the performance of TCP-ADaLR, TCP SACK, and TCP NewReno, with delayed ACK enabled and disabled. In the absence of losses, TCP-ADaLR exhibits the shortest user-perceived latency for HTTP and FTP applications. In the presence of only congestion losses, TCP-ADaLR shows comparable performance to TCP SACK and TCP NewReno. In the presence of only error losses, TCP-ADaLR exhibits improvements up to 61% and 76% in throughput and utilization, respectively. In the presence of both congestion and error losses, TCP-ADaLR exhibits goodput and throughput improvements up to 43%. TCP-ADaLR exhibits the best performance in the absence of losses and in the presence of losses due to both congestion and errors. It also friendly to TCP NewReno, exhibits better fairness, and maintains TCP end-to-end semantics.

  • M. Omueti and Lj. Trajkovic, ``TCP with adaptive delay and loss response for heterogeneous networks,'' WiCON 2007, Austin, TX, Oct. 2007.
  • M. Omueti and Lj. Trajkovic, ``OPNET model of TCP with adaptive delay and loss response for broadband GEO satellite networks,'' OPNETWORK 2007, Washington, DC, Aug. 2007.


    M-TCP+: Using Disconnection Feedback to Improve Performance of TCP in Wired/Wireless Networks
    Modupe Omueti and Ljiljana Trajkovic

    In this project, we propose the M-TCP+ algorithm for heterogeneous wired/wireless networks. The algorithm is a modification of M-TCP that was proposed for deployment in mobile cellular networks. It is recommended that Internet hosts enable the delayed acknowledgement (delayed ACK) option to maximize network bandwidth by reducing the number of ACKs sent to a TCP sender by a TCP receiver. The M-TCP+ algorithm performs best when the TCP delayed ACK option is enabled. The algorithm relies on feedback sent from a wireless host in anticipation of disconnections. We compare the performance of the M-TCP+ algorithm with the performance of M-TCP, TCP NewReno, and TCP SACK in both the absence and the presence of disconnections for a file transfer protocol (download) application. We also simulate network scenarios with traffic congestion. The M-TCP+ algorithm performance is evaluated in terms of file download response time, goodput, and retransmission ratio with and without the delayed ACK option. In scenarios without disconnections, the M-TCP+ algorithm does not introduce significant processing delay. Furthermore, in scenarios with disconnections, the M-TCP+ algorithm shows 2%-15% performance improvement.

  • M. Omueti and Lj. Trajkovic, ``M-TCP+: using disconnection feedback to improve performance of TCP in wired/wireless networks,'' Proc. SPECTS 2007, San Diego, CA, USA, July 2007, pp. 443-450.


    Improving the Performance of the Gnutella Network
    Andre Dufour (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    We examine the behaviour of the Gnutella peer-to-peer file sharing network and propose a protocol modification intended to improve its performance. Because its overlay topology is not well matched to the underlying physical network, Gnutella exhibits sub-optimal performance in terms of message latency. In order to characterize this performance, we modified an existing Gnutella simulation framework developed for network simulator (ns-2) to gather information about query and query hit propagation. We then modified the protocol implemented in the simulation to use the Vivaldi synthetic coordinate system and to bias neighbour selection to favour nodes that are ``close" in the Euclidian sense. Simulations with the adapted Gnutella protocol showed an improvement in query and query hit propagation times.

  • Gnutaldi simulator (developed by A. Dufour): Improving the Performance of the Gnutella Network.
  • A. Dufour and Lj. Trajkovic, ``Improving Gnutella network performance using synthetic coordinates,'' presented at The Third Int. Conf. on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine 2006), Waterloo, ON, Canada, August 2006.


    BGP Route Flap Damping Algorithms
    Wei (Steve) Shen (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Route flap damping (RFD) plays an important role in maintaining the stability of the Internet routing system. It functions by suppressing routes that persistently flap. Several existing algorithms address the issue of identifying and penalizing route flaps. In this project, we compare three such algorithms: original RFD, selective RFD, and RFD+. We implement these algorithms in ns-2 and evaluate their performance. We also propose possible improvements to the RFD+ algorithm.

  • RFD algorithms are implemented in ns-2 using ns-BGP 2.0 module (developed by T. D. Feng): Route Flap Damping and Adaptive Minimal Route Advertisement Interval in ns-BGP 2.0 (developed by W. Shen).
  • W. Shen and Lj. Trajkovic ``BGP route flap damping algorithms,'' Proc. SPECTS 2005, Philadelphia, PA, July 2005, pp. 488-495.


    BGP with an Adaptive Minimal Route Advertisement Interval
    Nenad Laskovic (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    The duration of the Minimal Route Advertisement Interval (MRAI) and the implementation of MRAI timers have a significant influence on BGP convergence time. Previous studies have reported existence of optimal MRAI values that minimize BGP convergence time for various network topologies. These optimal values depend on network topologies and traffic loads. In this project, we propose using adaptive MRAIs for each destination in BGP speakers. Furthermore, we introduce reusable MRAI timers that independently limit the number of advertisements of various destinations. The proposed modification of BGP is named BGP with adaptive MRAI. We evaluate the new algorithm by introducing a new model for the BGP processing delay. ns-2 simulation results demonstrate that BGP with adaptive MRAI results in a considerably shorter BGP convergence time, with a similar number of update messages compared to the current BGP implementation. Furthermore, BGP convergence time depends linearly on BGP processing delay. For large networks, BGP with adaptive MRAI may reduce BGP convergence time by 80% and the number of update messages by 20%.

  • BGP with adaptive MRAI is implemented in ns-2 using ns-BGP 2.0 module (developed by T. D. Feng): Route Flap Damping and Adaptive Minimal Route Advertisement Interval in ns-BGP 2.0 (developed by N. Laskovic).


    Implementation of BGP in a network simulator
    Tony Feng (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Border Gateway Protocol (BGP) is the inter-domain routing protocol currently employed in Internet. Internet growth imposes increased requirements on BGP performance. Recent studies revealed that performance degradations in BGP are due to the highly dynamic nature of the Internet. Undesirable properties of BGP, such as poor integrity, slow convergence, and divergence, have been reported by the research community. Theoretical analysis and empirical measurements have been employed in the past, albeit with certain limitations. Simulations allow more realistic experiments with fewer simplifications than the theoretical approach and with enhanced flexibility than empirical studies permit.

    In this thesis, we describe the design and implementation of a BGP-4 model (ns-BGP) in the network simulator ns-2 by porting the BGP-4 implementation from SSFNet. The ns-BGP node is based on the existing ns-2 unicast node and the SSF.OS.BGP4 model from SSFNet. In order to provide socket support and at the same time maintain the structure of SSF.OS.BGP4, we also ported to ns-2 TcpSocket, the socket layer implementation of SSFNet. In order to support the IPv4 addressing and packet forwarding, the basic address classifier was replaced with a new address classifier in ns-2 named IPv4Classifier. We also modified FullTcpAgent, the TCP agent used by TcpSocket, to support user data transmission.

    We performed a suit of validation tests to ensure that the ns-BGP model complies with the BGP-4 specifications, including BGP-4 features such as: basic peer session management (keep and drop peer), route selection, reconnection, internal BGP (iBGP), and route reflection. Finally, in the scalability analysis of ns-BGP, we showed that the model scales with respect to the number of peer sessions and size of routing tables.

  • ns-BGP 2.0 (developed by T. D. Feng):
  • T. D. Feng, R. Ballantyne, and Lj. Trajkovic, ``Implementation of BGP in a network simulator,'' Proc. Applied Telecommunication Symposium, ATS '04, Arlington, Virginia, Apr. 2004, pp. 149-154.


    Selective-TCP for wired/wireless networks
    Rajashree Paul (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    One of the main reasons for TCP's degraded performance in wireless networks is TCP's interpretation that packet loss is caused by congestion. However, in wireless networks, packet loss occurs mostly due to high bit error rate, packet corruption, or link failure. TCP performance in wired/wireless networks may be substantially improved if the cause of packet loss could be distinguished and appropriate rectifying measures taken dynamically. We propose a new end-to-end TCP protocol named Selective-TCP, which distinguishes between congestion and wireless link transmission losses (high bit error rate and/or packet corruption). When detecting packet loss, Selective-TCP invokes correction mechanisms. It is suited for mixed wired/wireless networks and shows increase in goodput when compared to TCP NewReno.

  • Selective-TPC (developed by R. Paul): Selective-TCP for Wired/Wireless Networks.
  • R. Paul and Lj. Trajkovic, ``Selective-TCP for wired/wireless networks,'' SPECTS 2006, Calgary, AL, Canada, Aug. 2006, pp. 339-346.


    TCP packet control for wireless networks
    Wan G. Zeng (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    We propose packet control algorithms to be deployed in intermediate network routers. They improve TCP performance in wireless networks with packet delay variations and long sudden packet delays. The ns-2 simulation results show that the proposed algorithms reduce the adverse effect of spurious fast retransmits and timeouts and greatly improve the goodput compared to the performance of TCP Reno. The TCP goodput was improved by ~30% in wireless networks with 1% packet loss. TCP performance was also improved in cases of long sudden delays. These improvements highly depend on the wireless link characteristics.

  • TCP with Packet Control is implemented in ns-2: TCP with Packet Control.
  • W. G. Zeng and Lj. Trajkovic, ``TCP packet control for wireless networks,'' Proc. IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob 2005), Montreal, Canada, Aug. 2005, pp. 196-203.


    Modeling and performance evaluation of a General Packet Radio Services (GPRS) network using OPNET
    Renju Narayanan (M.A.Sc. student), Modupe Omueti (M.A.Sc. student), and Dr. Ljiljana Trajkovic (supervisor)

    GPRS is a Global System for Mobile Communications (GSM) based packet switched wireless network technology deployed around the world. The main components of a GPRS system are: Mobile Station (MS),Base Station Subsystem (BSS), Serving GPRS Support Node (SGSN), Home Location Register (HLR), and Gateway GPRS Support Node (GGSN).

    In this project, we plan to enhance the current GPRS OPNET model by implementing the Medium Access Control/Radio Link Control (MAC/RLC) layer in the MS and the BSS for contention resolution and the BSS GPRS protocol (BSSGP) in the BSS and the SGSN for exchanging QoS related information. We also plan to evaluate the performance of the GPRS network using the enhanced model.

  • R. Narayanan and Lj. Trajkovic, ``General Packet Radio Service OPNET model,'' OPNETWORK 2006, Washington, DC, Aug. 2006.
  • M. Omueti, R. Narayanan, and Lj. Trajkovic, ``Effect of cell update on performance of General Packet Radio Service,'' OPNETWORK 2006, Washington, DC, Aug. 2006.
  • R. Narayanan, P. Chan, M. Johansson, F. Zimmermann, and Lj. Trajkovic, ``Enhanced General Packet Radio Service OPNET model,'' OPNETWORK 2004, Washington, DC, Aug. 2004.


    Simulation of General Packet Radio Services (GPRS) network system using OPNET
    Ricky Ng (M. Eng. student) and Dr. Ljiljana Trajkovic (supervisor)

    We plan to model the signaling behavior of the SGSN system and create a model using the OPNET simulation tool.

    The Serving General Packet Radio Services Support Node (SGSN) signaling plane model is capable of handling various signaling traffic profiles such as attach, activation, and deactivation. The model can also generate statistics related to the system's performance. We also plan to simulate the user data procedure in order to illustrate various class of GPRS Quality of Service subscribed by Mobile Station (MS) that will lead to different end-to-end delays in the data session. The SGSN model can then be enhanced to incorporate parameters extracted from lab measurements in order to monitor the performance of the real SGSN system. The SGSN model will not only provides a flexible environment to collect a wide range of data, but will also serve as a performance predication and evaluation tool.

  • R. Ng and Lj. Trajkovic, ``Simulation of general packet radio service network,'' OPNETWORK 2002, Washington, DC, Aug. 2002.
  • Ricky Ng's M.Eng. project: ``Simulation of General Packet Radio Service (GPRS) network'' and presentation slides, April 2002.


    Traffic engineering prioritized IP packets over Multi-Protocol Label Switching (MPLS) network
    Danny Yip (M. Eng. student) and Dr. Ljiljana Trajkovic (supervisor)

    The objective of this project is to examine:
    1. Different priorities defined in the Internet Protocol (IP) with emphasis on IPv6, and the importance of traffic engineering based on assigning priorities to packets.
    2. Limitations of Multi-Protocol Label Switching (MPLS) protocol in prioritized IP traffic, and
    3. Enhancement of the protocol so that Internet Serviced Providers (ISP) using MPLS can improve their network utilization when carrying prioritized IP traffic, can provide better Quality of Services (QoS), and can offer more Classes of Services (CoS).

    We used ns-2 to simulate network performance.

  • ns-2 modifications: PBER-LSR_code.zip (code developed by D. Yip and modified by N. Laskovic).
  • Danny Yip's M.Eng. project: ``Traffic engineering prioritized IP packets over MPLS networks'' and presentation slides, March 2002.


    Enhancements and performance evaluation of wireless local area networks
    James (Jiaqing) Song (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Unlike wired networks that can provide large bandwidth, the bandwidth of wireless local area networks (WLANs) is rather limited because they rely on an inexpensive, but error prone, physical medium (air). Hence, it is important to improve their loss performance.

    In this paper, we investigate several methods for improving the performance of WLANs. We survey the current research literature dealing with improving performance on various wireless network layers. We describe OPNET implementations of three approaches: tuning the physical layer related parameters, tuning the IEEE 802.11 parameters, and using an enhanced link layer (media access control) protocol. Finally, we describe several simulation scenarios and present simulation results that demonstrate the effectiveness of the three approaches.

  • J. Song and Lj. Trajkovic, ``Enhancements and performance evaluation of wireless local area networks,'' OPNETWORK 2003, Washington, DC, Aug. 2003.


    Route optimization of mobile IP over IPv4
    Hao (Leo) Chen (M. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    Mobile Internet Protocol has been proposed by IETF to support portable IP addresses for mobile devices that often change their network access points to the Internet. In the basic mobile IP protocol, datagrams sent from wired or wireless hosts and destined for the mobile host that is away from home, have to be routed through the home agent. Nevertheless, datagrams sent from mobile hosts to wired hosts can be routed directly. This asymmetric routing, called ``triangle routing,'' is often far from optimal and ``route optimization'' has been proposed to address this problem. In this paper, we present the implementation of ``route optimization'' extension to mobile IP in the \ns\ simulator. We illustrate simulations of the mobile IP with route optimization with simulation scenarios, parameters, and simulations results.

  • Mobile IP with route optimization: src.tar.gz (code developed by H. Chen).
  • H. Chen and Lj. Trajkovic, ``Route optimization in mobile IP,'' Proc. IEEE Workshop on Wireless Local Networks, WLN 2002, Tampa, FL, Nov. 2002, pp. 847-848.


    Implementation and performance simulation of VirtualClock scheduling algorithm in IP networks
    Nazy Alborz (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    We use OPNET simulation tool to model the VirtualClock scheduling mechanism. The algorithm is implemented in the output buffers of the IP router objects in OPNET. The model is then incorporated in the IP layer of the network layer hierarchy so that it can communicate with upper and lower network layer objects.

    We compared the performance of the VirtualClock algorithm and several other scheduling mechanisms in packet networks, such as Weighted Fair Queuing (WFQ), Custom Queuing (CQ), and Priority Queuing (PQ). The performance was compared in terms of fairness, packet end-to-end delay, and the number of packet loss during various time periods. We also simulated the effect of these algorithms on the performance of several Internet applications, such as HTTP, FTP, IP Telephony, and Video Conferencing.

  • N. Alborz and Lj. Trajkovic, ``Implementation of VirtualClock scheduling algorithm in OPNET,'' OPNETWORK 2001, Washington, DC, Aug. 2001.
  • N. Alborz, M. Keyvani, M. Nikolic, and Lj. Trajkovic, ``Simulation of packet data networks using OPNET,'' OPNETWORK 2000, Washington, DC, Aug. 2000.
  • N. Alborz, Q. Shao, and Lj. Trajkovic, ``Simulation and analysis of the VirtualClock scheduling algorithm,'' The ASI Exchange, Vancouver, BC, Canada, March 2002.
  • N. Alborz, B. Chen, and Lj. Trajkovic, ``Modeling packet scheduling algorithms in IP routers,'' The ASI Exchange, Vancouver, BC, Canada, March 2001.
  • Nazy Alborz's M.A.Sc. thesis: ``Implementation and performance simulation of Virtual Clock scheduling algorithm in IP networks'' and presentation slides, April 2002.


    Simulation of quality of service parameters in IP networks
    Bruce Chen (B. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    The main objective of our research is to simulate the quality of service (QoS) parameters in Internet Protocol (IP) networks with various types of traffic sources. The main QoS parameters of interest are packet loss due to buffer overflow, and packet delay due to queuing in the buffers.

    We use network simulator ns-2 to perform trace driven simulations using simple network topologies. We employ MPEG-1 video traces to generate traffic that was transmitted over the User Datagram Protocol (UDP). Our simulation scenarios are used to investigate how various queuing mechanisms affect the characteristics of the QoS parameters. We simulated FIFO (First In First Out) buffer with a DropTail queue management policy, Random Early Drop (RED), Fair Queuing (FQ), Stochastic Fair Queuing (SFQ), and Deficit Round Robin (DRR) active queue management schemes.

  • Bruce Chen's B.A.Sc. thesis: ``Simulation and analysis of quality of service parameters in IP networks with video traffic'' and presentation slides, December 2001.


    OPNET modeling and simulation of CDPD MAC layer behavior
    Eric Keung (B. A. Sc. student), Savio Lau (B. A. Sc. student), and Dr. Ljiljana Trajkovic (supervisor)

    As part of our undergraduate thesis project, we are working on enhancing the OPNET model of the Cellular Digital Packet Data (CDPD) Medium Access Control (MAC) Layer. The enhancements include handling burst uplink data transmission, competing mobile stations, and collision detection. We use the OPNET model to examine the system's queuing behavior in terms of buffer requirements and packet delays. In addition to various standard traffic source models, such as Poisson, bursty (on-off) and self-similar generators, in our simulations we also employ genuine traffic traces.


    OPNET modeling and simulation of Deficit Round Robin scheduling algorithm for IP networks
    Amir Jodari (B. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    The main objectives of this project is to implement an OPNET model of the Deficit Round Robin scheduling algorithm, and to compare its performance to other scheduling mechanisms in packet networks. Deficit Round Robin enables handling of variable packet sizes, without knowing the average packet size of the flows. The OPNET simulation tool enables modeling of communication networks and distributed systems. It contains tools for design simulation, data collection, and data analysis.


    Various projects


    Performance measurements of multimedia traffic in an IP over ATM local area network
    Milan Nikolic (M. A. Sc. student) and Dr. Ljiljana Trajkovic (supervisor)

    We have built an ATM testbed comprised of two ATM edge switches (Newbridge MainStreet 36150), and two Pentium III workstations connected to the ATM network via Ethernet cards. We used MBone and NetMeeting multimedia-conferencing systems to measure and evaluate performance of audio and video transmissions using both CBR and VBR services in an IP over ATM network. Using Spirent's SmartBits load generator, and in compliance with RFC 2544, we measured and analyzed throughput, packet delay, and delay jitter as main parameters for measuring forwarding performance and quality of service in multimedia applications.

    The ATM Traffic Monitor script, a simple network management graphical user interface written in Tcl, Tk, and Expect scripting languages, provided an easy graphical capture of the aggregate traffic sent through Ethernet cards of the ATM switches. We also used MBone to multicast the Open Forum session at IFSA/NAFIPS 2001 conference, held in Vancouver on July 25-28, 2001. Audio and video signals were sent using MBone tools (running on Windows OS) to the MBone network using DVMRP tunneling through ADSL (Telus) line, via SFU campus network, to BCnet GigaPOP.

  • M. Nikolic, C. Ling, and Lj. Trajkovic, ``Using an ATM testbed for videoconferencing,'' The ASI Exchange, Vancouver, BC, Canada, March 2001.
  • Milan Nikolic's M.A.Sc. thesis: ``Performance measurements of multimedia transmissions in IP over ATM networks'' and presentation slides, December 2002.


    How to evaluate field test performance for a CDMA2000 handset
    Jeffrey Lai (M. Eng. student) and Dr. Ljiljana Trajkovic (supervisor)

    This project deals with the CDMA technology and the added benefits provided by the 3G CDMA2000. We describe the testing methodology within a software engineering model, and differentiate the field test from other testing activities. Field test is an important and high priority task in R&D projects and it is mandatory to include field tests in any handset development project. We elaborate on the details of field test activities, which include test planning, test tools application, test sites selection, test case design, and test results analysis. We also illustrate the typical field test analysis required for R&D field tests. In particular, our field test results confirm that the message flow complies with the IS-2000.5 Upper Layer (L3) Signaling Standard.

  • Jeffrey Lai's M.Eng. project: ``How to evaluate field test performance for a CDMA2000 handset'' and presentation slides, April 2003.


    Convergence behavior of RIP and OSPF network protocols
    Hubert Pun (M. Eng. student) and Dr. Ljiljana Trajkovic (supervisor)

    In this project we investigate the characteristics of Internet Protocol (IP) addressing. We first review the similarities and differences between the Variable Length Subnet Mask (VLSM) and Classless Inter-Domain Routing (CIDR). Moreover, we also consider the advantages of the classless over the classful nature of a routing protocol. We discuss the compositions of routing tables. We examine in details the Routing Information Protocol (RIP) and the Open Shortest Path First (OSPF) routing protocols.

    We performed experiments involving seven Cisco routers. The three cases of interests are:
    - impact of a failure Ethernet link to the OSPF convergence
    - impact of a broken Frame Relay (FR) Virtual Circuit (VC) to the RIP convergence
    - impact of a broken FR VC to the redistribution convergence.

    The RIP's timers are changed in each of these three cases to measure performance improvements.

  • Hubert Pun's M.Eng. project: ``Convergence behavior of RIP and OSPF network protocols'' and presentation slides, December 2001.


    Hardware implementation of a high-speed symmetric crossbar switch
    Maryam Keyvani (M. A. Sc. student), Arash Haidari-Khabbaz (B. A. Sc student), and Dr. Ljiljana Trajkovic and Dr. Stephen Hardy (co-supervisors)

    We are working on a hardware implementation of a crossbar packet switch for high-speed data networks. We use VHDL to describe our design, the ALTERA MAX+PLUS II tools to simulate it, and the FLEX 10KE ALTERA FPGA to implement it on a chip. The switch has 8 input and 8 output ports, with input queuing. The switch is capable of handling fixed sized packets, such as ATM cells.

    The switch architecture consists of input buffers, input port controllers, destination look-up tables, a centralized scheduler, and a crossbar fabric. The packets first arrive (ingress) to the input ports of the switch. There, serial data is shifted into a serial shift register. As soon as a byte of data is received, it is loaded into a FIFO queue. Each input port has a controller that queues the header of each packet in a separate FIFO buffer, extracts address information from the header of the packet, and sends it to a programmable look-up table (LUT). The LUT returns a destination port address. Based on this address, the controller sends a request to the centralized scheduler. The scheduler receives requests from all input ports and grants them based on a simple two-dimensional ripple-carry arbiter architecture called Rectilinear Propagation Arbiter (RPA). A ``round robin'' priority scheme ensures fairness to all the input ports. Once a grant is issued, the crossbar fabric is configured to map the input port that received a grant to its output port destination. The outgoing (egress) packets are stored into another shift register and then shifted serially to the output link.

  • M. Keyvani and Lj. Trajkovic, ``VHDL implementation of a crossbar packet switch,'' The ASI Exchange, Vancouver, BC, Canada, March 2001. Maryam Keyvani's M.A.Sc. thesis: ``Hardware implementation of a high-speed symmetric crossbar switch'' and presentation slides, August 2001.


    Simulation of transistor circuits: effect of model parameters
    Paulman Chan (Co-op student) and Dr. Ljiljana Trajkovic (supervisor)

    We use PSpice, RSpice, and HSpice to simulate simple one-port circuits composed of two bipolar junction transistors (BJT's) and linear resistors connected in a feedback structure. These simulation tools often yield extremely high voltages between the port terminals, and we are seeking to understand why various versions of Spice yield such high voltages. We hope to show that the choice of BJT parameters, such as Early voltage, play an important role in causing such large voltages and unrealistic simulation results.


    DAWN ICON SIMON VARIOUS

    Ljiljana Trajkovic, ljilja at cs.sfu.ca.
    Last updated 
    Saturday August 16 23:20:54 PDT 2008.