Spring 2008
ENSC 835: ENSC 835: COMMUNICATION NETWORKS
CMPT 885: SPECIAL TOPICS: COMMUNICATION NETWORKS

FINAL PROJECTS (in alphabetical order):


  • 1. Howard Chang (howardc at sfu.ca)

    Implementation of an IEEE 802.11 Multi-Channel Multi-Interface Wireless Ad-Hoc Network

    Presentation slides, demo slides, and final report (PDF files).

    The IEEE 802.11 standard defines multiple non-overlapping channels at the physical layer in the 2.4 GHz and 5 GHz spectrums. However, most wireless ad-hoc networks today are configured to operate under a single channel in order to ensure connectivity of all their nodes. Hence, the aggregate bandwidth provided by the radio spectrums is not fully-utilized. In order to meet the high throughput demands, it is essential to use all available spectrums. Several past research proposals exploit multiple channels and multiple interfaces to increase the network capacity by having multiple simultaneous transmissions without interference. In this project, I plan to implement one of the multi-channel multi-interface approaches (to be determined) using NS-2 or OPNET and demonstrate the effectiveness of the approach.

    References:
    [1] P. Kyasanur and N. H. Vaidya, "Routing and Interface Assignment in Multi-Channel Multi-Interface Wireless Networks," Wireless Communications and Networking Conference (WCNC) 2005, vol. 4, pp. 2051-2056, Mar. 2005.
    [2] A. Raniwala, K. Gopalan, and T. Chiueh, "Centralized Channel Assignment and Routing Algorithms for Multi-Channel Wireless Mesh Networks," Mobile Computing and Communications Review (MC2R) 2004, vol. 8, no. 2, pp. 50-65, Apr. 2004.
    [3] A. Raniwala and T. Chiueh, "Architecture and Algorithms for an IEEE 802.11-based Multi-channel Wireless Mesh Network," INFOCOM 2005, vol. 3, pp. 2223-2234, Mar. 2005.
    [4] R. Maheshwari, H. Gupta, and S. R. Das, "Multichannel MAC Protocols for Wireless Networks," Sensor and Ad Hoc Communications and Networks (SECON) 2006, Reston, VA, vol. 2, pp. 393-401, Sept. 2006.
    [5] S. Wu, C. Lin, Y. Tseng, and J. Sheu, "A New Multi-Channel MAC Protocol with On-Demand Channel Assignment for Multi-Hop Mobile Ad Hoc Networks," International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN), 2000, Dallas, TX, pp. 232-237, Dec. 2000.


  • 2. Victor Gusev (vga9 at sfu.ca)

    Multimedia Content Delivery Over Wireless Links

    Presentation slides, demo slides, and final report (PDF files).

    Over the last decade there has been a significant increase in demand for delivery of multimedia content to the end user ? from voice to video. At the same time, the growth of popularity of wireless access technologies has prepared the consumer to expect the increase in bandwidth and increase in the quality of user experience over wireless links every year. As a result, with the popular acceptance of personal wireless devices in everyday life, there is a strong need for reliable multimedia content transmission, both to and from mobile devices. This project will concentrate on studying and simulating multimedia streaming over a wireless link. Existing models will be taken and modified to support multiple clients via multicast or broadcast techniques. As a first step, downlink streaming to a client terminal will be simulated over WLAN. Depending on model availability and time, the uplink streaming capabilities of a client will be examined, introducing an application of video conferencing. The study can be taken further replacing a physical layer with UMTS/HDSPA combination for video conferencing over a cellular network. Current problems and suggestions for future work will be given at the end.

    References:
    [1] Domoxoudis S., Kouremenos S., Drigas A., Loumos V., "Frame-based modeling of H264 constrained videoconference traffic over an IP commercial platform," IEEE TridentCom, 2006.
    [2] Freytes M., Rodriguez C.E., Marques C.A., "Real-time H.263+ video transmission on 802.11 wireless LANs," in Proceedings of Information Technology: Coding and Computing, 2001, pp 112-114.
    [3] Minghua Chen, and Avideh Zakhor, "Rate Control for Streaming Video over Wireless," IEEE Conference Proceedings, INFOCOM, 2004.
    [4] Abhik Majumdar, Daniel Grobe Sachs, Igor V. Kozintsev, Kannan Ramchandran, and Minerva M. Yeung, "Multicast and Unicast Real-Time Video Streaming Over Wireless LANs," IEEE Transactions on Circuits and Systems for Video Technology, vol. 12, no. 6, June 2002.
    [5] Salah K., "Assessing readiness of IP networks to support desktop videoconferencing using OPNET," J. Network Comp. Appl., 2007, doi:10.1016/j.jnca.2007.01.001.


  • 3. William Hrudey (whrudey at sfu.ca)

    Streaming Video Content over WiMAX Broadband Access

    Presentation slides, demo slides, and final report (PDF files).

    WiMAX, also known as a WirelessMAN and more formally as IEEE 802.16, is an evolving set of wireless broadband standards focused on delivering high bandwidth wireless access service to subscribers over the "last mile". Wired broadband access such as xDSL technologies are an expensive venture that also impose unnecessarily short maximum connection distances to the subscriber, collectively hindering access deployment in many urban and suburban areas. As WiMAX standards advance, it has become a dominant forerunner both in broadband access and point-to-point backhaul solutions.

    The objective of this project is to simulate bandwidth intensive, delay sensitive, video traffic representative of video streaming, IPTV, and other video-rich emerging applications targeted at fixed and mobile subscribers. These video streams are typically encoded using MPEG-2 or MPEG-4 codecs and while these streams are marginally loss-tolerant, their performance is inherently a function of available link bandwidth and delay characteristics. Consequently, this project will examine various performance factors including throughput, goodput, packet loss, packet delay, and packet jitter of a subscriber station over a WiMAX access network.

    Recognizing Opnet's widespread industry adoption as a commercial-grade network modeling tool with integrated support for WiMAX, I have chosen Opnet as the tool of choice for this project.

    References:
    [1] M. Chatterjee, S. Sengupta, and S. Ganguly, "Feedback-based Real-Time Streaming over WiMax," IEEE Wireless Communications Magazine, vol. 14, no. 1, pp. 64-71, Feb. 2007.
    [2] D. Niyato, E. Hossain, and J. Diamond, "IEEE802.16/WiMAX-Based Broadband Wireless Access And its Application For Telemedicine/E-Health Services," IEEE Wireless Communications Magazine, vol. 14, no.1, pp. 72-83, Feb. 2007.
    [3] WiMAX Network Architecture [Online]. Available: http://santos.ee.ntu.edu.tw/mobile/Speech/WiMAX%20Network%20Architecture.pdf.
    [4] F. Retnasothie, M. Ozdemir, T. Yucek, H. Celebi, J. Zhang, and R.Muththaiah, "Wireless IPTV over WiMAX: Challenges And Applications," Proc. IEEE WAMICON 2006, Clearwater, FL, Dec. 2006, pp. 1-5.
    [5] F. Yousaf, K. Daniel, C. Wietfeld, "Performance Evaluation of IEEE 802.16 WiMAX Link With Respect to Higher Layer Protocols," Proc. IEEE ISWCS 2007, Trondheim, Norway, Oct. 2007, pp. 180-184.
    [6] L. Betancur, R. Hincapie, and R. Bustamante, "WiMAX Channel - PHY Model in Network Simulator 2," Proc. ACM WNS2 2006, Pisa, Italy, Oct. 2006, vol. 202.
    [7] H. Juan, H. Huang, C. Huang, and T. Chiang, "Scalable Video Streaming over Mobile WiMAX," Proc. ISCAS 2007, New Orleans, Louisiana, May 2007, pp. 3463-3466.


  • 4. Mohamadreza Najiminaini (mna28 at cs.sfu.ca)

    Congestion Control in TCP Wireless Network

    Presentation slides and final report (PDF files).

    Many congestion control algorithms have been proposed in TCP protocol and they work satisfactory in wired networks. However, due to high bit error rates and data losses in wireless network, the congestion control algorithms in TCP do not perform efficiently and degrade usage of network bandwidth and throughput of the network. There are many congestion control algorithms have been proposed such as M-TCP and TCP-ADALR in order to improve TCP performance in wireless/wired networks and broadband GEO satellite networks respectively. Our aim is to find a better solution for congestion control algorithm which increases and improves throughput and good put in wireless networks. Also, we intend to simulate the related algorithms in Opnet Modeler and compare them as a result.

    References:


  • 5. Laxmi Subedi (lsa38 at cs.sfu.ca)

    Evaluation of TCP congestion control mechanisms using the OPNET simulator

    Presentation slides, demo slides, and final report (PDF files).

    TCP is the major protocol that provides reliable delivery of packets suitable for various application protocols such as FTP, HTTP, SMTP and SSH. TCP provides error-free data transfers and proper control of data flow and congestion management. However, TCP requires enhancements in order to reliably handle loss, minimize errors, and successfully manage congestion in high-speed network. Various mechanisms have been developed to avoid congestion collapse, such as Tahoe, Reno, Vegas, New Reno, Hybla, BIC, and CUBIC. This project deals with the implementation of TCP Reno and SACK algorithms in the simulated network using OPNET and evaluation of the performance on these algorithms in case of congestion in wired and wireless network.

    References:
    [1] R. Paul and Lj. Trajkovic, ``Selective-TCP for wired/wireless networks,'' Proc. SPECTS 2006, Calgary, AL, Canada, Aug. 2006, pp. 339-346.
    [2] W. G. Zeng and Lj. Trajkovic, ``TCP packet control for wireless networks,'' Proc. IEEE Int. Conf. on Wireless and Mobile Computing, Networking and Communications (WiMob 2005), Montreal, Canada, Aug. 2005, pp. 196-203, vol. 2.
    [3] Z. Chen and M.M. Ali, ``The performance of TCP congestion control algorithm over high-speed transmission links,'' IEEE Canadian Conf., Department of Electrical and Computer Engineering, Concordia University, Montreal, Canada, May 2004, pp.1371 - 1374 Vol.3.
    [4] G. Holland and N. Vaidya, ``Analysis of TCP performance over mobile ad hoc networks,'' Proc. ACM/IEEE Int. Conf. on Mobile Computing, Networking,, Seattle, Washington, United States, 1999, pp. 219-230.
    [5] RFC [online]. Available: http://www.ietf.org/rfc.html.


  • 6. Kevin Thomas (kta18 at sfu.ca)

    Examination of Routing Algorithms in Distributed Hash Tables (DHTs) for Peer to Peer (P2P) Networks

    Presentation slides and final report (PDF files).

    P2P networks, when built in the truest sense of the word, are fully distributed. With no central co-ordinating authority or entity, such as a server or central database, they must make use of other, sometimes novel approaches in order to locate nodes (peers) that hold the information being searched for. Networks such as Gnutella made use of a 'flooding query' methodology, where the entire network was flooded with requests, in the hope that the peer holding the data will receive the request and respond. However, such a methodology is significantly less efficient than a central lookup service that would be provided by a index database hosted on a server, such as was implemented by the Napster service. In an effort to devise a routing and organizing methodology that would provide the fully distributed advantages of P2P and the efficiency and guaranteed results of a central index server, the concept of using Distributed Hash Tables (DHTs) was introduced.

    DHTs take the concept of hash tables, which generate values, given input keys and give this capability to every node in the network, with each node given responsibility for a particular subset of keys in the overall keyspace. Thus, the nodes are given the responsibility of maintaining the mapping from names to values. In effect, this capability allows P2P networks using DHTs to scale to extremely large numbers of nodes, while also being extremely dynamic in nature with frequent node arrivals, departures and failures (also known as 'churn'). Finally, more complex services can function on top of such network infrastructure, such as distributed file systems, p2p file sharing, content distribution, multicasting, domain name services and instant messaging. BitTorrent is a prominent and well-known P2P network that makes use of DHTs.

    This project aims to investigate the routing capabilities and performance of P2P networks using DHT protocols. Such networks, while aiming to be distributed, scalable and fault tolerant must also deal with challenges such as load balancing, data integrity and performance. This last challenge involves network operations such as routing of requests to peer nodes, storage and retrieval. DHT protocols such as CAN, Chord, Kademlia, Pastry and Tapestry fall within the scope of this investigation. The model of such a network that will be built and simulated aims to answer the following questions:
    1. How does the 'geometry' of the DHT selected affect routing ?
    2. When node arrival, departure or failure occurs (i. e. churn), how much effort must be made by the peer nodes to adapt?
    3. When churn occurs, how quickly can new links and alternative routing options be put into place among existing peers?
    4. How is traversal time of a request (and associated packets) from source to destination and back affected by the above scenarios?
    5. What possible improvements could be made to available DHTs in order to progress towards the objective of being a fully distributed p2p network with the efficiency and guaranteed results of a central index server?

    References:
    [1] Ratnasamy, Shenker, Stoica - Routing Algorithms for DHTs: Some Open Questions
    [2] Manku - Routing Networks for Distributed Hash Tables
    [3] Yang - Measuring the Performance and Reliability of Routing in Peer to Peer Systems
    [4] Borisov - Anonymous Routing in Structured Peer-to-Peer Overlays
    [5] Ghodsi - Distributed k-ary System: Algorithms for Distributed Hash Tables
    [6] Balke, Siberski – DHT Algorithms (2007)
    [7] Akella – DHTs and P2P Systems
    [8] Risson, Moors – RFC 4981 Survey of Research towards Robust Peer-to-Peer Networks: Search Methods
    [9] Ledlie, Mitzenmacher, Seltzer, Pietzuch - Wired Geometric Routing
    [10] Marti, Ganesan, Garcia-Molena - DHT Routing Using Social Links
    [11] K. Gummadi, R. Gummadi, Gribble, Rantasamy, Shenker, Stoica - The Impact of DHT Routing Geometry on Resilience and Proximity
    [12] Aberer, Datta, Hauswirth - Route Maintenance Overheads In DHT Overlays
    [13] Tati, Voelker - ShortCuts: Using Soft State To Improve DHT Routing
    [14] Li, Stribling, Gil, Morris, Kaashoek - Comparing the Performance of Distributed Hash Tables Under Churn
    [15] Li, Stribling, Gil, Morris, Kaashoek - Bandwidth-efficient Management of DHT Routing Tables
    [16] Dabek, Li, Sit, Robertson, Kaashoek, Morris - Designing a DHT for Low Latency and High Throughput
    [17] Rhea, Geels, Roscoe, Kubiatowicz - Handling Churn in a DHT, Proceedings of the USENIX Annual Technical Conference, June 2004.
    [18] Xu, Min, Hu - Reducing Maintenance Overhead in DHT Based Peer-to-Peer Algorithms
    [19] H. Shen, C. Z. Xu - Elastic Routing Table with Probable Performance for Congestion Control in DHT Networks
    [20] Myrmic: Secure and Robust DHT Routing
    [21] T-DHT: Topology Based Distributed Hash-Tables
    [22] Distributed Hash Table: http://en.wikipedia.org/wiki/Distributed_hash_table, last modified Jan 22nd, 2008


    Last modified: Sunday, March 15, 2009 10:24:06 PM PDT