Spring 2011
ENSC 427: COMMUNICATION NETWORKS

FINAL PROJECTS:


  • 1. Abhishek Dubey, Ashkan Mirnabavvi, and Vikas Yadav
    (ada4 at sfu.ca, amirnaba at sfu.ca, vya3@sfu.ca)

    Exploring traffic for P2P file sharing protocol using OPNET

    Presentation slides and final report (PDF files).

    Abstract:
    P2P file sharing protocol is widely used by most torrent engines available for downloading data. Most torrent engines are based on the following phenomenon: more seeds (peers) there are, faster is the response time for the download for the client (end user). The whole idea of using P2P network is instead of downloading a file from a single source, the end user can download it from multiple sources. We will be implementing the ABR scheme for this project, i.e. Available Bit Rate as there will be no limit on the number of users and response time for the download will be directly proportional to the number of peers uploading certain parts of file.

    References:
    "BitTorrent Inc. Open Sources New P2P Protocol - The H Open Source: News and Features." The H: Security News and Open Source Developments. Web. 13 Feb. 2011. .
    "BitTorrent Protocol Encryption." Wikipedia, the Free Encyclopedia. Web. 13 Feb. 2011. .
    Katzela, Irene. Modeling and Simulating Communication Networks: a Hands-on Approach Using OPNET. Upper Saddle River, NJ: Prentice Hall, 1999. Print.
    Leuf, Bo. Peer to Peer: Collaboration and Sharing over the Internet. Boston: Addison-Wesley, 2002. Print.
    "Peer-to-peer." Wikipedia, the Free Encyclopedia. Web. 13 Feb. 2011. .


  • 2. Shervin Asgari Pour and Shadi Rohanivadeghani
    (saa34 at sfu.ca, sra23 atsfu.ca)

    Comparison and Analysis of FIFO, PQ, and WFQ Queuing Disciplines in OPNET

    Presentation slides, demo slides, and final report (PDF files).

    Abstract:
    With recent advancements in greater network speeds and higher bandwidths, the online use of applications that support services such as VoIP, video conferencing, and file sharing (FTP) have become more prevalent. While some applications such as web browsing (HTTP), email, and FTP are insensitive to the delay of transmitted information, VoIP and video conferencing are not. Queuing disciplines are therefore implemented in routers to govern, control, sort, and to prioritize packets in the buffers prior to their transmission. FIFO, PQ, and WFQ queuing are implemented in OPNET and various parameters including but not limited to: average queuing delay, average packet drop rate, MOS, jitter, and average end-to-end delay are studied and comparison of these parameters is made for the three queuing disciplines studied.

    References:
    [1] Morgan, S.P.; , "Queueing disciplines and passive congestion control in byte-stream networks," INFOCOM '89. Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies. Technology: Emerging or Converging, IEEE , vol., no., pp.711-720vol.2, 23-27 Apr 1989.
    [2] Minseok Song; Naehyuck Chang; Heonshik Shin; , "A new queue discipline for various delay and jitter requirements in real-time packet-switched networks," Real-Time Computing Systems and Applications, 2000. Proceedings. Seventh International Conference on , vol., no., pp.191-198, 2000.
    [3] Dekeris, B.; Adomkus, T.; Budnikas, A.; , "Analysis of qos assurance using weighted fair queueing (WQF) scheduling discipline with low latency queue (LLQ)," Information Technology Interfaces, 2006. 28th International Conference on , vol., no., pp.507-512.
    [4] Calyam, P.; Chandrasekaran, P.; Trueb, G.; Howes, N.; Yu, D.; Liu, Y.; Xiong, L.; Ramnath, R.; Yang, D.; , "Impact of router queuing disciplines on multimedia QoE in IPTV deployments," Quality of Multimedia Experience, 2009. QoMEx 2009. International Workshop on , vol., no., pp.92-97, 29-31 July 2009.
    [5] Ahmed, I.; Badia, L.; Hussain, K.; , "Evaluation of Deficit Round Robin Queue Discipline for Real-time Traffic Management in an RTP/RTCP Environment," Computer Modeling and Simulation (EMS), 2010 Fourth UKSim European Symposium on , vol., no., pp.484- 489, 17-19 Nov. 2010.
    [6] Velmurugan, T.; Chandra, H.; Balaji, S.; , "Comparison of Queuing Disciplines for Differentiated Services Using OPNET," Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on , vol., no., pp.744-746, 27-28 Oct. 2009.
    [7] Ni Zhiwei; Lu Xiaochun; Liu Dongyuan; , "Simulation of Queuing Systems with Different Queuing Disciplines Based on Anylogic," Electronic Commerce and Business Intelligence, 2009. ECBI 2009. International Conference on , vol., no., pp.164-167, 6-7 June 2009.


  • 3. Gary Brykov and Yash Trivedi
    (gba2 at sfu.ca and ymt1 at sfu.ca)

    Analysis of Quality of Service (QoS) on Broadband over Powerline and Power Line Communication Networksvia OPNET 14.0

    Presentation slides and final report (PDF files).

    Abstract:
    The increasing use of Broadband over Power Lines (BPL) using Power Line Communication (PLC) technology to deliver broadband service to homes and businesses indicates great promise as a universal broadband s olution that would offer a viable alternative to cable, digital subscriber line (DSL), fibre optic, and wireless broadband solutions. BPL modems handle the work load of retrieving packet data out of an elec tric current. These modems are capable of handling powerline noise on a wide spectrum and are mandated to be designed to notch out frequencies on which radio interference with short-wave and ham radios occu rs. In reality, the orthogonal frequency-division multiplexing (OFDM) modulation techniques are not alw ays implemented. In addition, deployment of BPL has illustrated the primary challenge of power lines be ing inherently a very noisy environment. Therefore, the system must be designed to deal with these sign al disruptions and work around them. For this project, we plan to use OPNET to analyze the quality of s ervice, the performance signal strength, data loss on different operating frequencies, and reactance to background noise of the BPL and PLC network.

    References:
    Ahmed, A., Asadullah, S., Palet, J., Popoviciu, C., Savola, P. ISP IPv6 Deployment Scenarios in Broadb and Access Networks. Internet: www.ietf.org/rfc/rfc4779.txt, January 2007 [February 19, 2011].
    Balls, C., Battaglini, A., Haas, A., Lilliestam, J. The SuperSmart Grid. Internet: http://www.supersm artgrid.net/wp-content/uploads/2008/06/battaglini-lilliestam-2008-supersmart-grid-tallberg1.pdf, June 1 8, 2008 [February 19, 2011].
    Du Bois, D. Broadband Over Powerlines (BPL) in a Nutshell. Internet: http://energypriorities.com/entr ies/2004/12/broadband_over_1.php, December 09, 2004 [February 19, 2011].
    Motorola, Inc. Motorola Canopy Broadband over Powerline-BPL MU (Multi-Unit) Solutions. Internet: http ://www.netlinkweb.com/solutions/motorola/BPL-applications/BPL-MU.asp, March 2010 [February 19, 2011].
    Motorola, Inc. Practical, Proven Broadband over Power Line: The Powerline LV Solution. Internet: http ://www.motorola.com/governmentandenterprise/contentdir/he_il/files/productinformation/mibas%20brochure% 20bpl%20powerline_lv_whitepaper.pdf, February 2006 [February 19, 2011].


  • 4. Hin Heng Chan
    (hhc12 at sfu.ca)

    Voice over Internet Protocol (VoIP) over 3G network

    Presentation slides and final report (PDF files).

    Abstract:
    Voice over Internet Protocol (VoIP) is a communication technology for voice and multimedia transmission over Internet Protocol (IP) while 3G network is the third generation for mobile telecommunications. With the increasing popularity of information transferal, VoIP will be widely in use. As customers' desire nowadays for mobility and flexibility, long distance data transfer with the use of smart phones with 3G network are highly desirable. Analysis of Quality of Service (QoS) on long distance data transfer (or in particular, video conferences) between two locations with VoIP over 3G network will be performed. Performance on any parameters which might affect the overall quality will be discussed using the network simulator, OPNET.

    References:
    [1] Z. Wang, Y. Wang, F. Wang. (2009). Comparison of VoIP Capacity between 3G-LTE and IEEE 802.16m [Online]. Available FTP: lenst.det.unifi.it Directory: pub/LenLar/proceedings/2009/pimrc09/pdf File: 1569229400.pdf
    [2] R. Cuny, A. Lakaniemi. (2003). VoIP in 3G Networks: An End-to-End Quality of Service Analysis [Online]. Available: http://www.nokia.com/library/files/docs/VoIP_3_G_Networks__An_End_to_End_Quality_of_Service_Analysis.pdf
    [3] O. Komolafe, R. Gardner. Aggregation of VoIP Streams in a 3G Mobile Network: A Teletraffic Perspective [Online]. Available: http://www.dcs.gla.ac.uk/publications/PAPERS/7555/epmcc03.pdf
    [4] J. F. Kurose and K. W. Ross, "Wireless and Mobile Networks," in Computer Networking, 5th ed. Boston, MA: Pearson Education, 2010, ch. 6, sec. 6.4, pp. 558-560.
    [5] H. Fathi, S. S. Chakraborty, R. Prasad, "Optimization of SIP Session Setup Delay for VoIP in 3G Wireless Networks," IEEE Transactions on Mobile Computing, vol. 5, no. 9, pp. 1121-1132, Sept. 2006.


  • 5. Sasan Hezarkhani and Milad Maleksabet
    (sha39 at sfu.ca, mma98 at sfu.ca)

    Analysis of Live Video Streaming Over Bittorrent Peer-to-Peer Protocol

    Presentation slides and final report (PDF files).

    Abstract:
    Today Bittorrent protocol is widely popular for transfer of files. Because Bittorrent is a peer-to-peer network there is not one central server that files exist on. This means people share files with each other and each node (device connected to the internet) owns a specific chunk of the file. This requires the file data to be of a fixed size and known before transf er is started, so that the neccessary parts of the file are downloaded without the need of them being in order. Because live streaming does n ot provide any of these information, more policies are required to allow Bittorrent to provide live streaming of video. Research shows that the change required is very minimal and costly. In this project we will examin these changes and analyze how Bittorrent handles live video stre am. Our concerns are mainly: stream speed vs. user group size, and stream buffering speed vs. video quality.

    References:
    http://www.cs.ucla.edu/~lk/PS/nime07f.pdf
    http://www.tribler.org/trac/wiki/StreamingExperiment


  • 6. Zhenpeng Xue
    (zxa7 at sfu.ca)

    Video Streaming over the 802.11g and the 802.11n WLAN Technologies

    Presentation slides, demo slides, and final report (PDF files).

    Abstract:
    The goal of this project is to simulate video streaming over the 802.11g and the 802.11n WLAN. In gener al, 802.11g is a third modulation standard of carrying out wireless local area network (WLAN) computer communication in the 2.4 GHz frequency bands, which operates at a maximum physical layer bit rate of 10 8 Mbit/s. 802.11n is a recent amendment which improves the 802.11g standard by adding multiple-input mu ltiple-output antennas (MIMO), which can operate on both the 2.4GHz and the 5 GHz bands at a maximum ph ysical layer bit rate up to 600 Mbit/s. In the practical limited bandwidth, I will analyze their bandwi dth usage which may experience the delay of video streaming or an overload in data traffic when they ar e implementing concurrently with other applications such as downloading files. For effective video stre aming through the WLAN, I am going to use some popular compressed multimedia formats such as MPEG-4(H.2 64 for video) and AAC (for audio).Also, I will test 720P and 1080P HDTV AVC video format on both standa rd of WLAN to figure out their ability for future intensive video streaming. Moreover, I will examine s pecific results such as throughput and pack loss of the 802.11g and the 802.11n WLAN on multi-user¡¯s v ideo streaming.

    References:
    [1] M. Fanny, "Testing 802.11n systems" [Online]. Available: http://www.eetimes.com/design/microwave-r f-design/4012912/Testing-802-11n-systems--Part-3--Video-test-results
    [2] "Optimizing Enterprise Video Over Wireless LAN" [Online]. Available: http://www.ciscosystemsverif ied.biz/en/US/prod/collateral/wireless/ps6302/ps8322/ps10315/ps10325/white_paper_c11-577721.pdf
    [3] "Quality of Experience Requirements," [Online]. Available: http://www.broadband-forum.org/technic al/download/TR-126.pdf
    [4]W. Hrudey, "Streaming Video Content over IEEE 802.16/WiMAX," [Online]. Available: http://www.ensc. sfu.ca/~ljilja/ENSC835/Spring08/Projects/hrudey/whrudey_WiMAX.pdf
    [5]http://www.wi-fi.org/discover_and_learn.php
    [6]http://en.wikipedia.org/wiki/Wi-Fi


  • 7. Daphne Mui
    (dlm3 at sfu.ca )

    Video Streaming over WiMAX

    Presentation slides and final report (PDF files).

    Abstract:
    WiMax is IEEE Standard 802.16; a wireless technology that uses radio waves to transmit data. It is similar to Wifi technology, but has advantages such as a substantially longer range capability and a faster transfer rate. Because of these advantages, WiMax has the capability to replace DSL wire lines. We will evaluate the performance of streaming video over a WiMax network. Our video will use MPEG compression. Factors to analyse include delay, jitter, and packet loss of the video streaming.

    References:
    [1] IEEE Standard for Local and Metropolitan Area Networks, IEEE Standard 802.16, 2009.
    [2] W. Hrudey and L. Trajkovic, .Streaming Video Content Over IEEE 802.16/WIMAX Broadband Access,. SFU, Vancouver, BC, Aug. 2008.
    [3] WiMax Forum [Online]. Available: http://www.wimaxforum.org (Feb. 2011).
    [4] WiMax.com: 4G Wireless Broadband Solutions [Online]. Available: http://www.wimax.com (Feb. 2011).
    [5] Free WiMax Info.com [Online]. Available: http://www.freewimaxinfo.com/index.html (Feb. 2011).


  • 8. Marish Lalwani and Sajith Kulasekare
    (mla17 at sfu.ca, Isk2 at sfu.ca)

    Analysis of Video Surveillance over WiMax Networks

    Presentation slides, demo slides, and final report (PDF files).

    Abstract:
    There is a fast growing and wide demand of cost-effective, reliable video surveillance technology in ur ban areas nowadays. With the increasing demand of video surveillance in universities, monitoring street traffic, crime prevention etc WiMax could be the next broadband technology behind these services. An a cceptable QoS throughput guaranteed by WiMax as well its overall positive behaviour with point propagat ion due to its utilization of multi-path would prove very beneficial to the service providers that prov ide video surveillance to numerous urban areas.

    References:
    [1] D. Pareek,"Wimax: Taking wireless to the MAX,"Boca Raton, FL: Auerbach Publications, 2006, pp.9-17.
    [2] WiMAX Salient Features [Online]. Available: http://www.tutorialspoint.com/wimax/wimax_salient_features.htm
    [3] "WiMAX”. (2011, February 13). Available: http://en.wikipedia.org/wiki/WiMAX
    [4] How WiMAX Works[Online]. Available: http://www.intel.com/technology/wimax/demo/works/demo.htm
    [5] The Wireless Video Surveillance Opportunity: Why WiMAX is not just for Broadband Wireless Access [Online], Broadband Solutions, Inc. 2011. Available: http://www.wimax.com/features/the-wireless-video-surveillance-opportunity-why-wimax-is-not-just-for-broadband-wireless-access
    [6] W. Hrudey and L. Trajkovic. (2011). Streaming Video Content Over IEEE 802.16/WiMAX Broadband Access [Online]. Available: http://www.ensc.sfu.ca/people/faculty/ljilja/cnl/presentations/hrudey/opnetwork08/hrudey_trajkovic_opnetwork2008_presentation_revised.pdf


  • 9. Damir Jungic
    (dja6 at sfu.ca)

    Examining Wireless Mesh Network Routing Protocols Through Simulation

    Presentation slides and final report (PDF files).

    Abstract:
    I will examine mobile ad hoc network routing, specifically the protocols used in wireless mesh networks. Due to the lossy characteristics of wireless links, mobile networks need to dynamically determine which link is optimal for the routing of a particular packet. I hope to simulate the Better Approach to Mesh Ad hoc Networking (B.A.T.M.A.N.), and compare the results to similar scenarios using the Optimized Link State Routing Protocol (O.L.S.R. - RFC 3626). This comparison is particularly valuable since the B.A.T.M.A.N. protocol was designed to replace O.L.S.R. in wireless mesh networks.

    References:
    . Royer, E.M.; Chai-Keong Toh; , "A review of current routing protocols for ad hoc mobile wireless networks," Personal Communications, IEEE , vol.6, no.2, pp.46-55, Apr 1999 doi: 10.1109/98.760423 URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=760423&isnumber=16455
    . Joo-Han Song; Wong, V.W.S.; Leung, V.C.M.; , "Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks," Communications, 2009. ICC '09. IEEE International Conference on , vol., no., pp.1-6, 14-18 June 2009 doi: 10.1109/ICC.2009.5199575 URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=5199575&isnumber=5198564
    . Kahn, R.E.; Gronemeyer, S.A.; Burchfiel, J.; Kunzelman, R.C.; , "Advances in packet ratio technology," Proceedings of the IEEE , vol.66, no.11, pp. 1468- 1496, Nov. 1978 doi: 10.1109/PROC.1978.11151 URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=1455420&isnumber=31271
    . Lopes, C.V.; Baldi, P.; , "A survey, classification and comparative analysis of medium access control protocols for ad hoc networks," Communications Surveys & Tutorials, IEEE , vol.6, no.1, pp.2-16, First Quarter 2004 doi: 10.1109/COMST.2004.5342231 URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=5342231&isnumber=5342230
    . Lima, M.; dos Santos, A.; Pujolle, G.; , "A survey of survivability in mobile ad hoc networks," Communications Surveys & Tutorials, IEEE , vol.11, no.1, pp.66-77, First Quarter 2009 doi: 10.1109/SURV.2009.090106 URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=4796927&isnumber=4796921
    . J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down Approach, 5/E, Addison Wesley, 2010.


  • 10. Kwang-Young Lee and Jack Hao Qiao
    (ela6 at sfu.ca, hqa at sfu.ca)

    Improved Ant Routing for Wireless Ad-Hoc Mesh Networks

    Presentation slides and final report (PDF files).

    Abstract:
    When establishing conventional wired network system is difficult or non-existent, an ad-hoc wireless network can be used to set up a temporary mean of communication by having nodes behave as hosts and routers. This makes ad-hoc wireless network suitable for rapid deployment in emergencies, but much more susceptible to changes in network configurations and routing decisions. In this project, a biology-inspired ant routing algorithm with GPS assisted location awareness is used to reduce routing overhead and to improve convergence compared to ant routing without location awareness.

    References:
    [1] D. Camara, A. A. F. Loureiro. A GPS/Ant-Like Routing Algorithm for Ad Hoc Networks, 2000 IEEE Wireless Communications and Networking Conference, page 1232-1236, Chicago, IL, USA, September 23-28 2000
    [2] M. Gunes, M. Kahmer, I. Bouazizi. Ant-Routing-Algorithm (ARA) for Mobile Multi-hop Ad-hoc Networks - New Features and Results, Med-Hoc Net 2003 Workshop, Mahdia, Tunisia, June 25-27 2003
    [3] E. Osagie, P. Thulasiraman, R. K. Thulasiram. PACONET: Improved Ant Colony Optimization Routing Algorithm for Mobile Ad-hoc Networks, 22nd International Conference on Advanced Information Networking and Applications, Ginowan, Okinawa, Japan, March 25-28 2008
    [4] Y. Ko, N. H. Vaidya. Location-aided Routing (LAR) in Mobile Ad-hoc Networks, Wireless Networks, Volume 6 Issue 4, Hingham, MA, USA, July 2000
    [5] S. S. Dhillon, X. Arbona, P. Van Mieghem. Ant Routing in Mobile Ad-hoc Networks, International Conference on Networking and Services, Athenes, Greece, June 19-25


  • 11. Kyoungwoo Nam and Yu Jie Xu
    (kna5 at sfu.ca, xya14 at sfu.ca )

    Analysis of BitTorrent

    Presentation slides and final report (PDF files).

    Abstract:
    BitTorrent is a peer to peer file sharing protocol used for distributing large amounts of data and it is widely used these days.Moreover, the BitTorrent protocol can distribute a large file without the heavy load on the source computer and network.Rather than downloading a file from a single source,the bitTorrent protocol allows different users to join a swarm of hosts to download and upload sources from each other.In this project, we will analyze the traffic load and performance change of the network when multiple sources are shared on a personal computer.

    References:
    [1] BitTorrent, www.bittorrent.com
    [2] BitTorrent, www.bittorrent.org
    [3] Article, http://compnetworking.about.com/od/bittorrent/qt/bittorrentports.htm
    [4] Presentation, http://www.cs.cmu.edu/~harchol/WORMS04/talks/srikant.pdf
    [5] Paper, http://www.alixchow.com/pub/ijamc2k9.pdf


    Last modified: Sun Feb 19 16:27:15 PST 2012