Milan Nikolic’s research while affiliated with Simon Fraser University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


Figure 1: Network setup for the MBone test session in the Communication Networks Laboratory at SFU.
Figure 2: Network setup for the MBone webcast session at the IFSA/NAFIPS 200 1 conference. 
Figure 3: The sdr , rat , and vic MBone application tools setup for the live session at the IFSA/NAFIPS 200 1 Open Forum workshop chaired by Prof. Lotfi Zadeh. 
Figure 4: The audio/video and measurement equipment setup for the live MBone webcast session. 
MBone Webcast: Network Setup and Data Collection
  • Article
  • Full-text available

August 2003

·

160 Reads

Milan Nikolić

·

Dan Hoffman

·

In this paper, we describe the webcast implementation details and data collection during a multicast session of a technical conference held in Vancouver in Summer 2001. Audio and video signals were multicast using Internet Multicast Backbone (MBone) multimedia conferencing tools. The signals were transmitted to the MBone network using DVMRP tunneling through an ADSL line to the BCnet gigabit-capacity point of presence. Genuine traffic traces were collected during the multicast session and were later used to analyze the impact of traffic on network performance.

Download

Fig. 2. Topology of a simple CDPD network. 
Fig. 3. Average queueing delay vs. link utilization plots for genuine traffic trace (graph A), traffic generated by ON/OFF models (graphs B, C, and D), and traffic generated by the traditional Poisson model (graph E). For ON/OFF sources the parameters are: (B) a = 0.01 sec and b = 9.99 sec; (C) a = 5.00 sec and b = 5.00 sec; (D) a = 8.00 sec and b = 2.00 sec. 
Fig. 4. Buffer overflow probability vs. buffer size plots for (A) genuine traffic trace and (B) Poisson arrival traffic source. 
Fig. 5. Buffer overflow probability vs. link utilization plots for (A) genuine traffic trace; (B) ON/OFF source model with a = 5.00 sec and b = 5.00 sec; (C) Poisson arrival traffic source. 
Impact Of Self-Similarity On Wireless Data Network Performance

March 2001

·

739 Reads

·

9 Citations

In this paper we investigate the impact of traffic patterns on wireless data networks. Modeling and simulation of the Cellular Digital Packet Data (CDPD) network of Telus Mobility (a commercial service provider) were performed using the OPNET tool. We use trace-driven simulations with genuine traffic trace collected from the CDPD network to evaluate the performance of CDPD protocol. This trace tends to exhibit longrange dependent behavior. Our simulation results indicate that genuine traffic traces, compared to traditional traffic models such as the Poisson model, produce longer queues and, thus, require larger buffers in the deployed network's elements.


Fig. 2. Topology of a simple CDPD network.
Fig. 3. Average queueing delay vs. link utilization plots for genuine traffic trace (graph A), traffic generated by ON/OFF models (graphs B, C, and D), and traffic generated by the traditional Poisson model (graph E). For ON/OFF sources the parameters are: (B) a = 0.01 sec and b = 9.99 sec; (C) a = 5.00 sec and b = 5.00 sec; (D) a = 8.00 sec and b = 2.00 sec.
Fig. 4. Buffer overflow probability vs. buffer size plots for (A) genuine traffic trace and (B) Poisson arrival traffic source.
Fig. 5. Buffer overflow probability vs. link utilization plots for (A) genuine traffic trace; (B) ON/OFF source model with a = 5.00 sec and b = 5.00 sec; (C) Poisson arrival traffic source.
Impact of self-similarity on wireless data network performance

February 2001

·

152 Reads

·

78 Citations

In this paper we investigate the impact of traffic patterns on wireless data networks. Modeling and simulation of the cellular digital packet data (CDPD) network of Telus Mobility (a commercial service provider) were performed using the OPNET tool. We use trace-driven simulations with genuine traffic trace collected from the CDPD network to evaluate the performance of the CDPD protocol. This trace tends to exhibit long-range dependent behavior. Our simulation results indicate that genuine traffic traces, compared to traditional traffic models such as the Poisson model, produce longer queues and, thus, require larger buffers in the deployed network's elements


Simulation Of Packet Data Networks Using Opnet

October 2000

·

5,209 Reads

·

12 Citations

In this paper we describe the use of the OPNET simulation tool for modeling and analysis of packet data networks. We simulate two types of high-performance networks: Fiber Distributed Data Interface and Asynchronous Transfer Mode. We examine the performance of the FDDI protocol by varying network parameters in two network configurations. We also model a simple ATM network and measure its performance under various ATM service categories. Finally, we develop an OPNET process model for leaky bucket congestion control algorithm. We examine its performance and its effect on the traffic patterns (loss and burst size) in an ATM network. 1.

Citations (3)


... Therefore, individuals with common concepts of conduct connect; this provides a significant dimension in which pairing of the device position may be used to recognize resemblance trends of smartphone apps. So, to quantify similarity characteristics among cell phones for this study, we used their interests in spatial, temporal, and preferred word attachments to the sites and the travel frequencies and lengths of those areas [11,12]. ...

Reference:

Analysis and Implementation of Human Mobility Behavior Using Similarity Analysis Based on Co-Occurrence Matrix
Impact of self-similarity on wireless data network performance

... The reasons for this result will be discussed in more detail when we present our results on another policing mechanism inTable 6. Although the choice of having the token generation rate be equal to the source mean rate has often been used in the literature (e.g., [25]), in many other works (e.g., [8], [10]), the authors have reached the same conclusion as the one denoted by our results: if the token rate is equal or close to the source mean rate, well-behaved sources often have many cells marked as violating. Hence, three solutions can be applied to deal with the problem of high packet dropping from the second policer of the dual token bucket: First solution. ...

Simulation Of Packet Data Networks Using Opnet

... Both properties were discovered in Beran et al (1995) for variable-bit-rate (VBR) video traffic, in Paxson and Floyd (1995) for traffic in wide area networks, in Leland et al (1994) and Willinger et al (1997) for Ethernet networks and in Crovella and Bestavros (1997) for Web traffic. The finding of self-similarity and LRD, in turn, spurred the research on queueing models with 'fractal' input traffic (Likhanov et al, 1995;Norros, 1995), and the assessment of their impact on network performance (Conti et al, 1996;Erramilli et al, 1996;Jiang et al, 2001) as well. As these works demonstrate, the effect of LRD on packet loss and delay may be drastic, leading to subexponential decay of the buffer overflow probability and, consequently, buffer sizes much larger than those predicted by memoryless or short-memory (ie, Markov) processes. ...

Impact Of Self-Similarity On Wireless Data Network Performance