Spring 2013
ENSC 835: COMMUNICATION NETWORKS

FINAL PROJECTS:


  • 1. Steven (King Fat) Choi and Richard (Qi) Zhang
        (kfc3 at sfu.ca, qza1 at sfu.ca)

    Performance of Video Conferencing over Dual Band WiFi Network

    Presentation slides and final report (PDF files).

    Abstract:
    Performance of video conferencing over dual band WiFi network
    Nowadays more and more mobile devices are equipped with front camera and support video conferencing. Many devices also support simultaneous dual band WiFi connection. We will study the performance of video codecs over load-balanced WiFi networks and analyze the performance factors such as throughput, delay, jitter. We will also experiment with different network protocols, congestion control algorithms, jitter buffer algorithms with different video codecs.

    High speed internet access VS load balanced lower speed internet accesses for P2P applications
    As high speed internet access become more and more affordable, a question arise as whether it is more efficient to double the bandwidth of internet connection, or to subscribe to two separate internet service from different ISPs. We will model the network topology under each scenario to determine which setup can give us the best performance for P2P application.

    Modeling and analysis of the .Boxing Day phenomenon.
    Big online retailer sites such as NCIX, MemoryExpress, Futureshop and BestBuy always get severely congested at opening of Boxing Day sale events. We will model this congestion and compare different network configurations and congestion control algorithms. We will try to propose a way to minimize Boxing Day congestion and allow reasonably fair service to the users.

    References:
    [1] Farkas, L.; Aczel, K.; , "Streaming video from smart phones: A feasibility study," Personal, Indoor and Mobile Radio Communications, 2008. PIMRC 2008. IEEE 19th International Symposium on , vol., no., pp.1-6, 15-18 Sept. 2008
    URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=4699456&isnumber=4699392
    [2] Qin Wang; Ke Lin; Kewen Lin; Dilin Mao; Min Ynag; , "A Measurement Study of P2P Live Video Streaming on WLANs," Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE , vol., no., pp.1-5, Nov. 30 2008-Dec. 4 2008
    URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=4698070&isnumber=4697775
    [3] Zotos, N.; Xilouris, G.; Beilu Shao; Renzi, D.; Kourtis, A.; , "Performance evaluation of H264/SVC streaming system featuring real-time in-network adaptation," Quality of Service (IWQoS), 2011 IEEE 19th International Workshop on , vol., no., pp.1-3, 6-7 June 2011
    URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=5931331&isnumber=5931241
    [4] Reguant, V.D.; Prats, F.E.; de Pozuelo, R.M.; Margalef, F.P.; Ubiergo, G.F.; , "Delivery of H264 SVC/MDC streams over wimax and DVB-T networks," Consumer Electronics, 2008. ISCE 2008. IEEE International Symposium on , vol., no., pp.1-4, 14-16 April 2008
    URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=4559440&isnumber=4559407
    [5] Madhani, S.; Shah, S.; Gutierrez, A.; , "Optimized Adaptive Jitter Buffer Design for Wireless Internet Telephony," Global Telecommunications Conference, 2007. GLOBECOM '07. IEEE , vol., no., pp.5248-5253, 26-30 Nov. 2007
    URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=4411905&isnumber=4410910
    [6] Sizun, H.; Guillet, V.; Durieux, S.; , "Empirical model of a 802.11ab/g channel capacity in home environment," General Assembly and Scientific Symposium, 2011 XXXth URSI , vol., no., pp.1-4, 13-20 Aug. 2011
    URL: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/stamp/stamp.jsp?tp=&arnumber=6050857&isnumber=6050234


  • 2. Muyar Htun
        (mha47 at sfu.ca) email addresses)

    Comparison of Opnet Simulations between PAN Network and WiMAX

    Abstract:
    PANs Personal Area Network) can be used for connecting between the personal devices themselves, or for communicating to a higher level network and the Internet. WiMAX (Worldwide Interoperability for Microwave Access), network standard IEEE 802 .16, can be used for mobile access and internet connectivity among cities and countries globally. In this paper, Opnet simulations of these two networks can be discussed.

    References:
    [1] http://www.sfu.ca/~rteng/ensc427/ENSC%20427%20Final%20Report%20-%20Sonca%20Teng.pdf
    [2] http://www.open-zb.net/downloads/HURRAY_TR_070509.pdf
    [3] http://www2.ensc.sfu.ca/~ljilja/ENSC427/Spring09/Projects/team4/ENSC427_Project_Final_Reportv5.1.pdf
    [4] R. Paul, S. Lally, Lj. Trajkovic, 2011-08, Simulation and Performance Evaluation of WiFi and WiMAX Using OPNET


  • 3. Sathappan Kathiresan
        (skathire at sfu.ca)

    Simulation of GPRS Network

    Presentation slides, demo slides and final report (PDF files).

    Abstract:
    Working on how to open the existing model opnet version 10 in later versions. Started creating same objects and consideration in opnet version 14, some of the ojects used in version 10 doesn.t work in later version( trying to replace with the one which has same node model).

    References:
    [1] Ng, Ljiljana Trajkovic, "Simulation of General Packet Radio,Service Network", OPNETWORK 2002, Washington, DC, Aug.2002
    [2] Ricky Ng, Ljiljana Trajkovic, "Simulation of General Packet Radio,Service Network", OPNETWORK 2002, Washington, DC, Aug. 2002
    [3] Paulman Chan, .GPRS Project Report., Simon Fraser University, Burnaby, August 30th, 2003
    [4] R. Ng and Lj. Trajkovi., .Simulation of General Packet Radio Service network,. OPNETWORK 2002, Washington, DC, Aug. 2002.
    [5] http://www2.ensc.sfu.ca/~ljilja/papers/opnetwork04_renju.pdf last accessed : Feb. 18, 2013


  • 4. Dong Yang
        (dya22 at sfu.ca)

    Evaluation and Improvement of BitTorrent Implementation in ns-3

    Presentation slides and final report (PDF files).

    Abstract:
    In this project, a Peer-to-Peer protocol, BitTorrent (1), is studied: client and tracker behaviour, data piece requesting/downloading, choking principle (tit-for-tat strategy) and swarm (tracker protocol). A specific implementation of BitTorrent under network simulator NS-3 (2) is introduced and evaluated in terms of protocol validity, simulation performance, download completion time and limitations. Improvements will be made to this implementation with options such as: download strategy Give-to-Get, piece level request schedule, inter-strategy communication scheme, automatic closing a connection in case of protocol errors, more elaborated traffic scheduling policy.

    References:
    [1] Bittorrent protocol specification v1.0. http://wiki.theory.org/BitTorrentSpecification accessed 11/2011.
    [2] E. Weingartner et al. .Building a modular BitTorrent Model for ns-3,. in Proceedings of the 5th International ICST Conference on Simulation\ Tools and Techniques, Desenzano, Italy, 2012, pp. 337-344.


  • 5. Majid Arianezhad
        (marianez at sfu.ca)

    Implementation of ITR and ETR Devices in the NS-3 Network Simulator

    Presentation slides and final report (PDF files).

    Abstract: The existing routing architecture of the Internet has been facing scalability problems [1]. It has been proposed to separate the Internet addressing architecture from single numbering space to end-system identifier's space and routing locators' space [2]. Locator / ID Separation Protocol (LISP) is a network layer based protocol that facilitates mobility, multi-homing, and traffic engineering. LISP may solve the routing scalability problem by separation of IP addresses into Endpoint Identifiers (EIDs) and Routing Locators(RLOCs) [3].

    Ingress Tunnel Router (ITR) and Egress Tunnel Router (ETR) are the two major elements of the LISP architecture. ITR encapsulates packets sent from inside to the outside of a LISP network where ETR receives encapsulated packets to strip the headers and forward them based on the next IP header [1].

    This project will review the most recent LISP proposals, elements, and benefits it may bring to the network architecture. We plan to implement ITR and ETR devices in the NS-3 network simulator. This implementation enables IP header encapsulation, IP header decapsulation, and IP forwarding that may be employed for simulating LISP sites in NS-3.

    References:
    [1] D. Farinacci, "The Locator/ID Separation Protocol (LISP)," RFC 6830, IETF, Jan. 2013.
    [2] V. Fuller, D. Farinacci, D. Meyer, and D. Lewis, "The Locator/ID Separation Protocol (LISP),D. RFC 6830, IETF, Jan. 2013.
    [3] V. Fuller, D. Farinacci, D. Meyer, and D. Lewis, "Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT)," RFC 6836, IETF, Jan. 2013.
    [4] D. Meyer, "The Locator Identifier Separation Protocol (LISP)," The Internet Protocol Journal, vol. 11, no. 1, pp. 23.36, Mar. 2008.
    [5] Locator/ID Separation Protocol (LISP) - Cisco Systems, Inc. (2013, Feb) [Online]. Available: http://lisp.cisco.com/lisp_over.html.
    [6] L. Iannone, D. Saucez, and O. Bonaventure, "Implementing the Locator/ID separation protocol: design and experience," Computer Networks, vol. 55, no. 4, pp. 948.958, 2011.


    Last modified: Wed Feb 19 19:46:25 PST 2014.