Since the appearance of next generation networks (NGN), access and aggregation networks (even core networks) have suffered significant improvements and architectural evolutions. The idea of network convergence, something in which providers are very interested, is closely related with these deployments, as the same network must be capable of transporting all the existent telecommunication services (voice, video and data). This paper introduces an architectural model which is based on broadband forum technical recommendations for multi-service (TR-058), and makes use bridging technology in all the nodes. In this model, carrier-class Ethernet has been selected as transport technology in order to achieve convergence in provider networks. Then, a radically new approach for network convergence is presented, bridging virtualization. This approach introduces the concept of instances to differentiate service requests. Finally, a secure alternative to the instantiation of multiple services is presented (EAPOL-in-EAPOL).
[Show abstract][Hide abstract] ABSTRACT: Internet has been developing for more than three decades ago. Considering its popularity, ubiquity and scale, it causes immense difficulty for other networks with different architectures to be deployed or even get adequately evaluated. This paper introduces a core/edge separation based architecture model, which allows core networks with various architectures to coexist, enables end users to choose whichever core network at will, and simplifies the design, deployment, operation and management of edge networks. In this model, Carrier Grade Ethernet, which is still on-going evolving, is selected as transport technology in the edge networks. A radically new approach called Bridging Virtualization is used to form a convergent access platform to these different core networks for end users. Besides the increasing flexibility for the edge transport carriers, this model also improves end users' independence from the access provider. Moreover, it makes it possible the execution of network convergence step-by-step and can be used to realize it in the edge first. Finally, we apply this architecture model to design the campus networks of Tsinghua University, analyze its pros and cons and make some conclusion.
[Show abstract][Hide abstract] ABSTRACT: In the last few years, the evaluation of large scale applications across mobile wireless networks has raised a crucial challenge
to the research community. Simulation modeling methods can be quite powerful in gaining insight into the behavior of complex
systems. The main advantages of simulation modeling include the ability to evaluate scenarios not easily achievable through
empirical methods (i.e. scalability testing of networks) and the ability to modify models to test system sensitivity and tune
performance. Another important application of simulation modeling techniques is to perform meaningful comparative studies
of different technologies, protocols, or new implementations to determine which communication technology performs better from
the QoS point of view in a specific scenario. Simulation modeling is a crucial step in the design, development, test and evaluation
of any network implementation or strategy, providing the necessary support to the usual demand for “what if” analysis and
studies in the network environment. This chapter describes a taxonomy of the different simulation techniques available in
the market, introduces statistical concepts for validating the results of a simulation study and describes case studies illustrating
the role of simulation in wireless network design.
[Show abstract][Hide abstract] ABSTRACT: Ad hoc networks were created to provide communication between peers without any network infrastructure. They could help in
a hostile environment for military and rescue entities, and also for commercial applications such as gaming or facilities
for networking. To improve the provided services on those networks, many quality of service (QoS) frameworks have been proposed
to improve the performance of ad hoc networks, and to offer many possibilities for important applications to use priorities,
admission control, or quasi guarantees. The dynamicity of ad hoc networks introduces complexity for such QoS schemes. In this
chapter, we offer a summary of all existing ad hoc protocols at different levels of the network architecture and the proposed
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.