scispace - formally typeset
Search or ask a question
Topic

Network planning and design

About: Network planning and design is a research topic. Over the lifetime, 12393 publications have been published within this topic receiving 229776 citations. The topic is also known as: network design.


Papers
More filters
Proceedings ArticleDOI
Ying Zhang1, Åke Arvidsson1
13 Aug 2012
TL;DR: This study presents a comprehensive characterization study of mobile http-based traffic using packet level traces collected in a large cellular network, and analyzes the traffic using metrics at packet level, flow level and session level.
Abstract: Because of rapidly growing subscriber populations, advances in cellular communication technology, increasingly capable user terminals, and the expanding range of mobile applications, cellular networks have experienced a significant increase in data traffic, the dominant part of which is carried by the http protocol. Understanding the characteristics of this traffic is important for network design, traffic modeling, resource planning and network control. In this study we present a comprehensive characterization study of mobile http-based traffic using packet level traces collected in a large cellular network. We analyze the traffic using metrics at packet level, flow level and session level. For each metric, we conduct a comparison between traffic from different applications, as well as comparison to traffic in a wired network. Finally, we discuss the implications of our findings for better resource utilization in cellular infrastructures.

96 citations

Journal ArticleDOI
TL;DR: In this paper, a novel yet general discrete network design problem formulation that aims to determine the optimal new link addition and their optimal capacities simultaneously, which answers the questions on whether a new link should be added or not, and if added, what should be the optimal link capacity.
Abstract: Conventional discrete transportation network design problem deals with the optimal decision on new link addition, assuming the capacity of each candidate link addition is predetermined and fixed. In this paper, we address a novel yet general discrete network design problem formulation that aims to determine the optimal new link addition and their optimal capacities simultaneously, which answers the questions on whether a new link should be added or not, and if added, what should be the optimal link capacity. A global optimization method employing linearization, outer approximation and range reduction techniques is developed to solve the formulated model.

96 citations

Proceedings ArticleDOI
01 Jul 1992
TL;DR: Experimental results showed that brute power bus enhancement was meaningless and smart power and ground topologies significantly reduced the consumption of wiring resources.
Abstract: A new power and ground network design problem for cell-based VLSIs is discussed. In contrast to the conventional method, the network topology is optimized, or wiring resource consumption subject to electromigration and voltage drop constraints is minimized. The proposed method has been implemented. Using several examples, the validity of the problem formulation and the solution method was confirmed. Experimental results showed that brute power bus enhancement was meaningless and smart power and ground topologies significantly reduced the consumption of wiring resources. >

96 citations

Patent
29 Dec 1997
TL;DR: In this article, a method and system for assessing quality of service for multimedia traffic under aggregate traffic conditions in a shared transmission network, such as an ATM network, is presented, where a total number of different traffic services as well as a maximum number of sources for each traffic service are specified by a network operator/designer.
Abstract: A method and system for assessing quality of service for multimedia traffic under aggregate traffic conditions in a shared transmission network, such as an ATM network. A total number of different traffic services as well as a maximum number of sources for each traffic service are specified by a network operator/designer. Next, for each traffic service a specification of peak rate, average idle sojourn time and an average burst sojourn time are determined, either based upon available standards or calculated based upon models of the traffic services. The total available system bandwidth is specified by a network operator/designer. Finally, the number and size of queues utilized for receiving packetized telecommuncation traffic within the network are specified. The maximum packet loss ratio, average delay for a packet traversing the network and the probability that jitter (delay variations) will exceed a specified threshold are then calculated for the size and number of queues specified, permitting the quality of service within the network to be accurately and efficiently assessed.

96 citations

Journal ArticleDOI
TL;DR: It is considered that not every Internet of Things device or network design is able to afford the overhead and drop in performance, or even support such protocols, so the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node.
Abstract: With the proliferation of smart devices capable of communicating over a network using different protocols, each year more and more successful attacks are recorded against these, underlining the necessity of developing and implementing mechanisms to protect against such attacks. This paper will review some existing solutions used to secure a communication channel, such as Transport Layer Security or symmetric encryption, as well as provide a novel approach to achieving confidentiality and integrity of messages. The method, called Value-to-Keyed-Hash Message Authentication Code (Value-to-HMAC) mapping, uses signatures to send messages, instead of encryption, by implementing a Keyed-Hash Message Authentication Code generation algorithm. Although robust solutions exist that can be used to secure the communication between devices, this paper considers that not every Internet of Things (IoT) device or network design is able to afford the overhead and drop in performance, or even support such protocols. Therefore, the Value-to-HMAC method was designed to maximize performance while ensuring the messages are only readable by the intended node. The experimental procedure demonstrates how the method will achieve better performance than a symmetric-key encryption algorithm, while ensuring the confidentiality and integrity of information through the use of one mechanism.

95 citations


Network Information
Related Topics (5)
Optimization problem
96.4K papers, 2.1M citations
85% related
Network packet
159.7K papers, 2.2M citations
84% related
Wireless network
122.5K papers, 2.1M citations
84% related
Node (networking)
158.3K papers, 1.7M citations
83% related
Wireless
133.4K papers, 1.9M citations
82% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202390
2022195
2021432
2020493
2019570
2018573