16.11.2012 Views

Wireless Network Design: Optimization Models and Solution ...

Wireless Network Design: Optimization Models and Solution ...

Wireless Network Design: Optimization Models and Solution ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

282 Marina Aguado, Jasone Astorga, Nerea Toledo <strong>and</strong> Jon Matias<br />

cal layer behavior takes into account pre-calculated results from a MATLAB [25]<br />

implementation.<br />

12.5.1 Traffic Modeling Application<br />

Accurately modeling traffic in the network helps produce an optimal application<br />

<strong>and</strong> network design. Different data traffic simulation technology strategies may be<br />

followed. A simulator framework may generate traffic in the network explicitly, simulating<br />

all packets <strong>and</strong> queues in detail. As a consequence high-fidelity results are<br />

obtained. On the other h<strong>and</strong>, potentially longer simulation run times are obtained.<br />

Other times, the simulation tool may make use of an analytical strategy, simulating<br />

the data traffic at a more abstract level making use of mathematical models. This<br />

implies faster simulation run times. There are also some simulators that exploit hybrid<br />

solutions making use of a combination of both explicit <strong>and</strong> analytical modeling<br />

techniques. As an example, in [24], mathematical traffic models are introduced for<br />

the most common application services. One of the traffic models studied is the web<br />

browsing (HTTP) traffic model. Although most measurements of HTTP traffic show<br />

that the large majority of page responses consist of relatively small objects, the distribution<br />

of page sizes is heavy-tailed. That is, infrequent but very large page objects<br />

constitute a significant proportion of overall transmitted bytes.<br />

Most of the simulation frameworks allow the final user to select between a set<br />

of st<strong>and</strong>ard application models (e-mail, ftp, http, database, voice, video conferencing,<br />

etc.) <strong>and</strong> to configure the source (user or group of users), destination (user or<br />

servers), traffic patterns, <strong>and</strong> traffic representation for each service. Each st<strong>and</strong>ard<br />

application also allows specific configuration settings. Some simulation tools make<br />

use of specific development tools that allow the end user to create customized applications.<br />

In [1] the authors describe a train-control application built with OPNET’s ACE<br />

Whiteboard tool. The system is a multi-tier application between the train, several<br />

radio block control centers, <strong>and</strong> the control center. The different train control routines<br />

(movement authority request, position report, etc.) are modeled in the simulation<br />

tool. When creating this application, it was necessary to define the tiers that<br />

would participate in message exchanges <strong>and</strong> that later on would be identified as<br />

nodes within the simulation scenario. Figure 12.6 depicts the messages exchanged<br />

between the different tiers. The size <strong>and</strong> HEX format of these messages as well as<br />

the existent dependency between them, <strong>and</strong> the logical sequence that they follow<br />

are properly modeled in the simulation. The message processing time in each tier<br />

was obtained from a real trace log. By creating these routines <strong>and</strong> building this new<br />

application in the simulation tool, it was possible to identify the data traffic profile<br />

for this service. The first graph in Figure 12.7 shows the traffic sent by the train <strong>and</strong><br />

generated by the train control application.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!