SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering
          Research and Applications (IJERA)       ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue 4, July-August 2012, pp.924-929
       Performance evaluation of a Wireless Computer Network,
          *Jozef B. Lewoc, **Antoni Izworski, ***Slawomir Skowronski
      1
       Design, Research and Translation Agency Leader, ul. Powst. Sl. 193/28, 53-138 Wroclaw, Poland
          2,3
              Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland


Abstract
         This paper presents a predicted target           they do not have at their disposal the financial
architecture of an integrated manufacturing and           resources needed to develop novel ICT systems of
management system for a manufacturer of                   the CIMM type.
household appliances, based on a metropolitan-               In such circumstances, a reasonable duty of
type infranet and an industrial process control           research and development workers seems to be to
and monitoring wireless network. To evaluate              carry out the initial work on the prospective project
performance, a method developed earlier for               of CIMM systems, even if no financing is available
packet switching networks        with end-to-end          for such work. This work may be considered as a
acknowledgement was applied. The network is               volunteer work or a work for the society (as it is
modelled as a set of closed routes consisting of a        called in the case-study country of Poland) that have
user and a series of service stations                     financed their earlier research and development work
(communication links, switches, host processes).          or as an investment in their own future: the designers
The paper describes the investigations carried out        involved early on the prospective CIMM project will
for the case study. Some consideration is given to        have high chances to be included in the project
the performance evaluation accuracy, basing on            execution team if and when the CIMM project is
the validation work results obtained from                 established.
simulation and measurements on the Polish pilot              This initial work should also include the definition
wide area network.                                        of the system topology (here, the wireless solution
                                                          seems to be the most appropriate one for the actual
1. Introduction                                           solution since the systems of the current state of art
          The Computer-Integrated Manufacturing           should be applied for the novel solutions) and
and Management (CIMM) systems are severely                designer-friendly investigation methods to ensure
needed by prospective users, especially big and           adequate performance for hardware and software
medium manufacturing enterprises. Many people             solutions under design.
start to realise that development and implementation         A team of IT experts and process technologists
of such systems is necessary for the manufacturing        was established and worked out an approach to
enterprises to be duly monitored and run in some          development of CIMM systems that seems to be
optimum way, in accordance with some objective            feasible, rather fast and economic [1,2,3], creating
operational criteria. In opinion of the executive staff   the basis for this paper.
of many manufacturing enterprises visited by the
authors, such optimisation of complete enterprises is     2. Exemplary CIMM architecture
or will be soon a prerequisite for their existence on               The pilot CIMM system was designed
the highly competitive market.                            several years ago for the ex-biggest Polish
   In spite of that, big manufacturers and vendors of     manufacturer of household appliances, Polar,
the Computer Integrated Management (CIM)                  Wroclaw (the Enterprise), employing several
systems, having at their disposal financial resources     thousand people. The target organisational structure
sufficient to develop and implement at least pilot        of the Enterprise would be that depicted in Fig. 1.
CIMM systems, are no apt to enter the manufacturing           For the general Enterprise organisation presented
domain. The basic reason for that seems to be the         in Fig. 1, the wireless hardware network architecture
fact that the big CIM system manufacturers and            of the CIMM system, depicted in Fig. 2, has been
vendors do not possess at their disposal the designers    proposed. Logically, the architecture is based on the
and implementers educated and experienced enough          wireless metropolitan network operating under the
to cope with both manufacturing and management            TCP/IP protocol suite [4] and on the process control
issues. Such persons are, however, available;             and monitoring network of the LonWorks type [5].
paradoxically, many of them are available in poorly
developed countries where the designers must have
possess a wide scope of experience in order that they
are successful; unfortunately, they are dispersed in
various industrial and/or research organisations and


                                                                                                  924 | P a g e
Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering
                          Research and Applications (IJERA)       ISSN: 2248-9622 www.ijera.com
                                        Vol. 2, Issue 4, July-August 2012, pp.924-929
                                               PR                                              The hardware structure of the wireless CIMM
                                                                                             system has been presented in Fig. 2. The case-study
                                                                                             network depicted in Fig. 2 is composed of 30
                   PD                          RD                         PD                 switches (15 routers and 15 servers). Let the
                                                                                             individual switches and data links be numbered as
  DE            TE            PR     RM        WM     QC          MS     GD            ST    shown in Fig. 3 (server Nos: 1- 15, router Nos: 16-
                                                                                             30, link pairs (for both transmission directions): (1,2)
  …                …          …      …         …       …          …       …             …
                                                                                             – (85,86).
                                                                                                Upon the wireless network of Fig. 3, there is
                                          SYSTEM                QA
                                          MEDIA SM            SYSTEM                         stretched a set of closed routes, i.e. the calls from a
                                                                                             user to its server and in the opposite direction. .
                                                                                             Exemplary closed routes in the CIMM network are
                         INPUT                            WARE -
                        STORES             …              HOUSES                             the connections between a Marketing & Service
                                     PRODUCTION
                                                                                             Department worker and the general enterprise
                                        LINES
                                                                                             database (the President’s database) (closed route No.
  Key: PR - President                          RM – Run Maintenance Dept.                    s = 166; ref. Fig. 4a) and between a technologist and
       PD - Procurement Director               WM – Working Media Engineer
       RD - Run Director                       QC – Quality Control & Assurance              the system Media database (closed route No. s =
       CD - Culture Director                   MS – Marketing & Service                      279; ref. Fig. 4b).
       DE – Design Dept.                       ST – Staff Dept.
       TE – Technology Dept.                   QC – Quality Control                             Note: it is assumed that any p-th server, p 
       PR – Procurement Dept.
                                                                                             1,…,15 (ref. Fig. 3), is able to support 20 closed
Fig. 1. General organisational diagram of the enterprise                                     routes of numbers s = (p-1) 20, (p-1) 20 +1, …, (p-
                                                                                             1) 20 + 19.
              3. The network under investigation                                                Note also that the network described here as a set
                        It is assumed that the time needed for                               of closed routes may be considered as a case of the
              transfer of data via any switch (server, gateway, node                         Kelly networks [6] where the entity (packet) sojourn
              or router) is insignificant in comparison with the time                        time in any switch is a function of the number of
              needed to transfer the data via a co-operating data                            packets in all routes in the network. However, the
              link. This is in conformity with the specifications of                         classic queuing theory does not look for solutions for
              actual hardware proposed for the CIMM system since                             the Kelly networks [7,8].
              data is transferred via network switches as 8-bit byte                                                                                     1
              blocks transferred via fast direct memory access                                                      15    30
                                                                                                                                                    2                        2
              (DMA) channels and internal processing of the data                                                                       60               32         4
                                                                                                                                              16
              is usually connected only with the message headers.                                                        58    30                                                           3
                                                                                                          28                             66                   17        34
                                                                                                    14                                                                            6
                 However, the method proposed enables to consider                                                    29        68
                                                                                                               56                                                 62
              the delays in wireless network switches though the                                                          70                                                 18
                                                                                                     26                                                                            36           4
              calculations may be somewhat more complicated.                                   13             28                                                           64           8
                                                                                                         54
                                                                                                                     72                                                            19
                                                                                                         27
                                                                                               24                        74               76                      78
                                                    SPR                                              52
                                                            ...




                                                                                                                                                                              82        38
                       ...




                               SDE                                                            12                                                                   80
                                                                                                          26                                   84
                                                                  SPD
                                                                         ...




                                                                                                    22
             ...




                        STE                                                                                                                                                              10
                                                                                                          50                                                                      20            5
       ...




                   SPR                                                  SRD                     11
                                                                                 ...




                                                                                                                               86                                                40
                                                                                                                25
                                                                                                         20                                                             21
 ...




             SRM                                                          SCD                                        48                                                          12
                                                                                       ...




                                                                                                     10                       24                                   42                   6
                                                                                                                                                             22
 ...




             SWM
                                                                                                                                    46        23    44
                                                                                                                          18                                      14
  ...




             SQC
                                                                                                                                              16                       7
                                                                                                                                   9
                                                                                                                                                    8
                                                                                               Note
 ...




             SMS
                                                                                               Link number, i =2k, k=1,2,..,43 is, in fact, a pair of numbers, 2k
         ...




                     SGD                                                SSM                    and 2k-1; the first is the number of the link directed from the
                                                                               ...




                                                                                               node of the lower number to that of the higher one and the other
               ...




                         SST
                                                                  SQA                          in the opposite direction.
                                                                        ...




Key:
SXY- Server of the unit XY                                                                     Fig. 3. Numbering of switches and links
    - Router, RXY
    - Controller
                                                                                               Therefore, it was decided to adapt the approximate
 Fig. 2. Hardware architecture of the CIMM system                                            performance evaluation method [6], developed and
                                                                                             validated earlier for telephone computer and

                                                                                                                                                                       925 | P a g e
Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering
          Research and Applications (IJERA)       ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue 4, July-August 2012, pp.924-929
communication     networks      with     end-to-end                                                                   The link preceding the i-th link in the s-th closed
acknowledgement, to the cases of the CIMM system                                                                      route is denoted by h = hs(i), provided that s  Bi.
implemented on wireless networks and to apply the                                                                       The set of closed routes parallel to the s-th closed
method for performance evaluation for the case study                                                                  route in the i-th link is defined by (3).
under discussion.
                                                                                                                       Ci  Bi  ( Ah  Bh )                                                       (3)
4. The approximations
           The reference [6] is hardly available now.
                                                                                                                      The power of Ci is given by (4).
Therefore, some basic assumptions and results will
be repeated in the present paper.
   In addition to the denotations defined in Fig. 3, the                                                              C i  ci                                                                     (4)
following will be used in the present paper:
Ai is the set of closed routes beginning at the i-th                                                                  The mean cycle time of closed routes encountered by
link, such that the s(i)-th user is connected directly to                                                             the s-th route at the i-th link is approximated by (5).
the i-th link:
                                                                                                                                      ai  bi  1 0
Ai  {si ,1 , si , 2 ,..., si ,ai }                                                                    (1)             t i ,s                             ;  0;                                   (5)
                                                                                                                                                       1 0
                                                                                                                                           
                                                                                                                                    l{ Ai  Bi } /{s} t i
Bi is the set of closed routes passing via the i-th link
but not beginning at that link:
                                                                                                                      The mean waiting time of the closed routes
                                                                                                                      encountered by the s-th route at the i-th link is given
B i  {zi ,1 , zi , 2 ,..., zi ,bi }                                                                   (2)
                                                                                                                      by (6).

          Y18,166     E18,166     Y77,166     E77,166        Y63,166     E63,166    Y1,166    E1,166
                                                                                                                                        t i,s                        y i ,l
                                                                                                                      y i ,s                    (                         );                      (6)
                                                         1
                                                               T
                                                                                                                                    (ai  bi  1) l{ Ai  Bi }{ s} t i
           R166                                         D        166                                           S166
                                                         166

                                                                                                                      The mean service time for the closed routes
        E17,166     Y17,166     E78,166     Y78,166      E64,166       Y64,166     E2,166    Y2,166
                                                                                                                      encountered by the s-th route at the i-th link is given
                                                                                                                      by (7).
a)      Exemplary closed route of a Marketing & Service
        employee using general enterprise database
                                                                                                                                        t i ,s                      ei ,l
     Y28,279 E28,279 Y67,279 E67,279 Y34,279 E34,279 Y74,279 E74,279 Y83,279 E83,279 Y9,279 E9,279
                                                                                                                      e i ,s                    (                       );                        (7)
                                                                                                                                    (ai  bi  1) l{ Ai  Bi }{ s} t l
                                                       1
         R279                                               T279                                       S279
                                                      D279
                                                                                                                      The mean thinking time for the closed routes
                                                                                                                      encountered by the s-th route at the i-th link is given
     E27,279 Y27,279 E68,279 Y68,279 E33,279 Y33,279 E73,279 Y73,279 E84,279 Y84,279 E10,279 Y10,279
                                                                                                                      by (8).
b) Exemplary closed route of a technologist using the
                                                                                                                                         t i,s                       mi ,l
   System Media
                                                                                                                      m i ,s                     (                       );                       (8)
                                                                                                                                     (ai  bi  1) l{ Ai  Bi }{ s} t l
Key:
           sS=1,…,299; iI=1,…,86
           Rs= round route (trip) delay for s-th closed route                                                         The definitions of the mean values defined above for
           Ts= s-th closed route cycle time                                                                           the set of closed routes that are not parallel to the s-th
           Ds= s-th closed route throughput                                                                           route are as follows:
           Yi,s= waiting time of s-th closed route to i-th link
           Ei,s= service time of s-th closed route to i-th link                                                                    ai  bi  ci
                                                                                                                      t i,s 
                                                                                                                       '
                                                                                                                                                         ;                                         (9)
           Ms= s-th closed route thinking time                                                                                                       1
           Ss= s-th closed loop ultimate service time                                                                                   
                                                                                                                                   l{ Ai  Bi } Ci t i
Note: Upper case letters denote random variables while
      lower case letters – relevant mean values                                                                                              '
                                                                                                                                        t i ,s                               y i ,l
                                                                                                                                                              
                                                                                                                           '
                                                                                                                      y                                                               ;            (10)
                                                                                                                                    ai  bi  ci
                                                                                                                           i ,s
Fig. 4. Exemplary closed routes                                                                                                                          l{ Ai  Bi } Ci    ti


                                                                                                                                                                                          926 | P a g e
Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering
          Research and Applications (IJERA)       ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue 4, July-August 2012, pp.924-929
                           '
                                                          ei ,l                        exponential thinking time, were employed to validate
                 t i ,s
                                            
    '
e   i ,s                                                           ;            (11)   the approximations presented above.
             ai  bi  ci           l{ Ai  Bi } Ci        tl                            Several hundred comparisons were done for the
                                                                                       number of the customers (closed routes), v, changing
                               '                                                       between 2 and several dozen. The relative error of
                    t i ,s                                   mi ,l
m i ,s                                        
     '                                                                                 the mean cycle time, ts, calculated for the set of
                                                                       ;        (12)
                ai  bi  ci             l{ Ai  Bi } Ci    tl                       comparison reached its maximum (less than 0.03) at
                                                                                       v  14 and decreased for v tending to zero or to
For all closed routes, the balance equations (13) have                                 infinity.
been defined.
   The set of equations (5) – (13) enables to compute                                  5.2. Validation with simulation
                                                                                                 In order that the approximations may be
iteratively the basic unknown mean values of the
                                                                                       validated, a fast Wide-Area-Network simulator was
network performance, i.e. the closed route cycle time,
                                                                                       developed on the basis of earlier simulation studies
ts, the mean throughput in the s-th closed route,
                                                                                       for real-time computer control systems. This
               1
ds               , and the round-trip delay, rs  t s  ms .                          simulator was used, primarily, for the Polish pilot
               ts                                                                      wide area network MSK. However, both actual and
                                                                                       planned network configurations (including those to
                 ( yi ,s  ei ,s ));
                                                                                       operate at much higher transmission rates) were
 (t
sS
           s
                   iI s
                                                                                       investigated. In addition, available foreign simulation
                                                                                       results for local and wide area networks were also
where S is the set of all closed loops,                                S  v;          used for validation.
                                                                                          The number of validation experiments was higher
                       ( a i  bi  1)e i ,s 1
                                                2
                                                                                       that 500, with the number of closed loops and links
 ( y i ,s                           ei ,s
                                              ( 
                                               2                                       equal up to 500 and 100, respectively. The maximum
sAi
                          t i ,s (1        )                                          relative error found was lower than 0.08. However, in
                                       ts                                              the case of results obtained earlier, where the fair
                                                                                       conditions of comparison could be ensured, the            (13)
                            m i ,s         y i ,s
 ( ai  bi  2)(1                  )                                                maximum relative error of the cycle time (and
                      t i ,s  e i ,s t s  e i ,s                                     throughput) was lower than 3.5.
                                           e i ,s
                                                                                       5.3. Validation with measurements
                           m i ,s           2 ); (13)
 ( ai  bi  1)(1                  )                                                          To investigate MSK and the approximations
                     t i ,s  e i ,s t i ,s  e i ,s                                   presented above, an internal communication network
                                                                                       measuring tool Sitwa was developed and
                                                    ' 2
           ( a  b  c )e i ,s 1                                                       implemented. It was used, primarily, to validate the
 ( yi ,s  i ' i eii ,s ( 2  (ai  bi  ci  1)                                      simulation results on the existing possible
sBi
              t i ,s (1     )                                                         configurations of MSK. The investigations showed
                          ts                                                           that the simplifying assumptions in simulation (e.g.
                   '                 '                                                 omission of the flow control packets and/or frames)
                m i ,s             y i ,s
(1                       ) '                                                         did not result in significant simulation errors. The
           t i ,s  e i ,s t i ,s  e i ,s
             '        '               '                                                maximum relative error of the approximations under
                                                                                       discussion did not exceed 0.05.
                                                                       '
                                            e i ,s
                                                 '
                            m                                                          6. Wireless CIMM investigation scenario
 ( ai  bi  ci )(1  '             ) ' 2 ' );
                                                 i ,s
                                                                                                To produce some severe traffic conditions
                      t i ,s  e i ,s t i ,s  e i ,s
                                 '
                                                                                       for the wireless CIMM system under investigation, it
                                                                                       has been assumed that a major failure occurs in the
5. Validation of the approximations                                                    Enterprise, of impact upon all departments. All users
                                                                                       operate at one time trying to locate the problem
5.1. Validation with accurate results for cyclic                                       within their responsibility ranges. Most of them (ca.
queuing systems                                                                        nine per ten) use then the general Enterprise database
         The problem of performance evaluation of                                      (SPR), some try to analyse the current process
homogeneous star-topology networks is the same as                                      conditions and to communicate with the System
that investigated for wireless queuing networks. The                                   Media (SSM) or the Quality Control System (SQA).
accurate solutions in the form of limit probabilities of                               The basic routing arrays in the closed routes are set
the entity (packet, request) numbers have been                                         up so that the minimum possible number of lines is
known since early seventies. These results, for                                        used in each closed route, provided that data transfer


                                                                                                                               927 | P a g e
Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering
           Research and Applications (IJERA)       ISSN: 2248-9622 www.ijera.com
                         Vol. 2, Issue 4, July-August 2012, pp.924-929
routes follow the hierarchy levels in the Enterprise.                  The closed route, s = 166, passes via the most
The use of the back-up routes may, possibly, produce                severely loaded links, i = 1 and i = 2. This results in
even more severe traffic conditions. However, they                  that r166 reaches more than 4 s at ms values close to 0
are used only for very severe wireless CIMM system                  (ref. Fig. 5).
failures. In such cases, however, the main objective                   If it is assumed that an annoying value (i.e. the
for the CIMM system operation is to recover the                     value that can not be accepted by the Enterprise
normal operating conditions as fast as possible and                 employees) of rs is that higher than 2 s, then the ms
any optimisation of the transmission conditions is not              values below some 0.5 s should be avoided.
of major interest then.
   It is assumed that the data transfer rate in each link                              r166[s]
is equal to 1 Mbit/s. Each subscriber sends a short
message of the mean length 100 bits (bit stuffing, i.e.             5
insertions o a 0 bits after each five 1 bits in a
                                                                          *
sequence, included) that needs 10-4 s for transmission
                                                                    4
across any line along the route to the final server, and
receives the 100,000 bit-long reply that needs 0.1 s
for the transfer across any link on the route back to               3         *
the subscriber.
   The thinking time mean value, ms, has been                                 *
                                                                    2
changed from 30 s down to ca. 0 s; this reflects the                          *
change-over from the interrogating transfer mode to                            *
the automatic file transfer mode (bulk transfer mode).              1
                                                                                         *
It will be assumed that the service time at the final                                            *
                                                                                                              * m166[s]
station of each closed loop is 0 s.                                 0
   Let I s  {ii , s , i2, s ,..., ik s , s } be the set of links
                                                                          0                      10      20   30
passed by the s-th closed route.                                    Fig. 5. r166 versus m166

7. Exemplary results
          The set of equations (5) ÷ (13) was solved
iteratively. The basic user characteristics, rs and ds,                                              3
for the exemplary closed routes, s = 166 and s = 279,                                   d166[10 b/s]
                                                                                  
are presented in Figs. 5 ÷ 8.
   The exemplary round-trip delay (r166) curve versus                30       
the mean thinking time (m166) is shown in Fig. 5.
                                                                                   
   The d166 values (the mean throughput values
depicted in Fig. 6) show a definite saturation                                
(congestion) at ms values below ca. 0.5 s. If the mean               20
offered load for the 166-th closed route is defined by                                    
(14) below:


          (e
                                                                     10
t166 
 off
                 i,s    ms )                              (14)                                      

         i166
                                                                                                               
                                                                                                                    M166[s]
then the increased offered load results in the                       0
decreased mean throughput, d166, for the given                            0                      10      20   30
scenario and for ms < 0 .5 s, s=1,…,300.
                                                                    Fig. 6. d166 versus m166
   The closed route, s = 279 (Fig. 7), shows only the
acceptable rs values (below 1 s while the values not
greater than 2 s are acceptable as not annoying ones)
and the ds value is decreasing monotonically with the
offered load increasing (ms  0, s = 1,…,300) (Fig.
8).
   The reason is that the 279-th closed route does not
pass via any link under heavy traffic. Therefore, even
when the mean thinking time is decreased towards
zero, no saturation (congestion) occurs in the links
passed by the 279-th closed route.

                                                                                                                   928 | P a g e
Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering
          Research and Applications (IJERA)       ISSN: 2248-9622 www.ijera.com
                        Vol. 2, Issue 4, July-August 2012, pp.924-929
                   r279[s]                                          upgraded: thanks to the rapid growth of the
       
                                                                    computing power that has happened during the last
 5                                                                  decade, more accurate approximations may be done
                                                                    for the balance equations (e.g., the simplifying
       
 4                                                                  assumption that an entity (packets) may find only one
           
                                                                    entity of one closed loop in the queue to some link)
                                                                    may be discarded. Then the balance equations
 3
                                                                    become more complicated but may be still solved by
                                                                   the iterative method. And the networks with sliding
 2                                                                 windows or credit-based flow control may be
                                                                   modelled directly, instead of modelling several loops
                             
 1                                                                for credits bigger than 1, as it has been done earlier.
                                                                       However, the authors believe that the method may
 0
                                                      M279[s]       and should be published in its original form now..
                                                                    The authors are designers and/or consultants for
       0                     10          20       30                actual computer systems and networks. To do their
                                                                    jobs in a proper way, they had to get involved in
Fig. 7. r279 versus m279                                            some research work in the domain of performance
                                                                    evaluation. And the results obtained can and, in the
                                                                    authors’ opinion, should be applied in performance
                                                                    evaluation of various wireless networks (not only
                                  packets                         CIMMs) since the method is, at least, more simple
                       d 279
           *                      s 
                                                                  that the well known performance evaluation methods
  90                   d279[s]                                      such as Mean Value Analysis, and much more
               *                                                    exactly tracks the network structure and, therefore, is
                                                                    much more useful for actual network designers.
  80

               *                                                    8. References
  70                                                                  [1]    L. Franasik et al., System Media – a Step toward
                                                                             Computer Integrated Manufacturing and
                                                                             Management Systems, Measurement and Control
  60                                                                         (AMSE Press), 22 (3), 2001, 37-46.
               *
                                                                      [2]    A. Izworski, J.B. Lewoc and S. Skowronski,
                                                                             Development        of    Computer      Integrated
  50                                                                         Manufacturing and Management Systems.
                                                                             Information Control Problems in Manufacturing
  40                                                                         (IFAC), Saint Etienne, 2006.
                   *                                                  [3]    J.B. Lewoc, A. Izworski and S. Skowronski,
                                                                             ALSIS case study: computer integrated
  30                                                                         manufacturing and Maanagement systems.
                                                                             Application of Large Scale Industrial Systems
                                                                             (IFAC), Helsinki-Stockholm, 2006.
  20
                                                                      [4]    J. Yanovitz, Under the Hood of the Internet; An
                                                                             Overview of the TCP/IP Protocol Suite.
  10                             *                                           Available at:     www.acm.org/crossroads/xrds1-
                                                                             1/tcpjmy.html. 2006.
                                              *       *   M279[s]     [5]    Echelon, Introduction to LonWorks System.
  0
                                                                             Available: www.echelon.com, 2006.
       0                     10           20      30                  [6]    F.P. Kelly, Reversibility and Stochastic
                                                                             Networks, Wiley, 1980.
Fig. 8. d279 versus m279
                                                                      [7]    T. G. Robertazzi, Computer Networks and
                                                                             Systems. Queuing Theory and Performance
8. CONCLUSIONS                                                               Evaluation, Springer-Verlag, 2000.
         The authors do not claim that the method                     [8]    R. Surfozo, Introduction to Stochastic Networks,
devised and verified some dozen years ago needs no                           Springer-Verlag, 1999.
further work. On the contrary, they do realise that the               [9]    J.B. Lewoc, Performance Evaluation Problems
method validated primarily on the pilot Polish                               for Actual Computer Networks, AMSE
Interuniversity Computer Network MSK, operating at                           Monographs, Tassin, 1990.
rather low transmission rates and in a limited
configuration, needs further validation and possible
tuning. In addition, the method may and should be


                                                                                                              929 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Sachin_Bapat_Resume
Sachin_Bapat_ResumeSachin_Bapat_Resume
Sachin_Bapat_ResumeSachin Bapat
 
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting SchemeIRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting SchemeIRJET Journal
 
Collaborative Construction of Telecommunications Services
Collaborative Construction of Telecommunications ServicesCollaborative Construction of Telecommunications Services
Collaborative Construction of Telecommunications ServicesVanea Chiprianov
 
Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco jpjobard
 
Electricity Subsector Cybersecurity Capability Maturity Model Case Study
Electricity Subsector Cybersecurity Capability Maturity Model Case StudyElectricity Subsector Cybersecurity Capability Maturity Model Case Study
Electricity Subsector Cybersecurity Capability Maturity Model Case StudyEnergySec
 

Was ist angesagt? (7)

Sachin_Bapat_Resume
Sachin_Bapat_ResumeSachin_Bapat_Resume
Sachin_Bapat_Resume
 
Ace tutorial c
Ace tutorial cAce tutorial c
Ace tutorial c
 
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting SchemeIRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
IRJET- An Efficient VLSI Architecture for 3D-DWT using Lifting Scheme
 
Collaborative Construction of Telecommunications Services
Collaborative Construction of Telecommunications ServicesCollaborative Construction of Telecommunications Services
Collaborative Construction of Telecommunications Services
 
Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco Datacenter Design Guide UNIQUE Panduit-Cisco
Datacenter Design Guide UNIQUE Panduit-Cisco
 
Electricity Subsector Cybersecurity Capability Maturity Model Case Study
Electricity Subsector Cybersecurity Capability Maturity Model Case StudyElectricity Subsector Cybersecurity Capability Maturity Model Case Study
Electricity Subsector Cybersecurity Capability Maturity Model Case Study
 
Presentation for CISIS 2012
Presentation for CISIS 2012Presentation for CISIS 2012
Presentation for CISIS 2012
 

Andere mochten auch

Andere mochten auch (20)

Dc24672680
Dc24672680Dc24672680
Dc24672680
 
E24027033
E24027033E24027033
E24027033
 
Jt2517251731
Jt2517251731Jt2517251731
Jt2517251731
 
Dl24724726
Dl24724726Dl24724726
Dl24724726
 
Ek24862867
Ek24862867Ek24862867
Ek24862867
 
Ep24889895
Ep24889895Ep24889895
Ep24889895
 
CurriculumVitae
CurriculumVitaeCurriculumVitae
CurriculumVitae
 
Practica 6 1
Practica 6 1Practica 6 1
Practica 6 1
 
As sete maravilhas do mundo
As sete maravilhas do mundoAs sete maravilhas do mundo
As sete maravilhas do mundo
 
Educar -rubem_alves
Educar  -rubem_alvesEducar  -rubem_alves
Educar -rubem_alves
 
5
55
5
 
Trabajo Solp
Trabajo SolpTrabajo Solp
Trabajo Solp
 
Signos De PuntuacióN
Signos De PuntuacióNSignos De PuntuacióN
Signos De PuntuacióN
 
Formacion De Conceptos Matematicos
Formacion De Conceptos MatematicosFormacion De Conceptos Matematicos
Formacion De Conceptos Matematicos
 
CIARD Información accesible para todos (Español)
CIARD Información accesible para todos (Español)CIARD Información accesible para todos (Español)
CIARD Información accesible para todos (Español)
 
Ht2514031407
Ht2514031407Ht2514031407
Ht2514031407
 
As doenças e os chacras
As doenças e os chacrasAs doenças e os chacras
As doenças e os chacras
 
Davidshalls Höstfest 24/9 - fotoutställning "Vi är Davidshallare"
Davidshalls Höstfest 24/9 - fotoutställning "Vi är Davidshallare"Davidshalls Höstfest 24/9 - fotoutställning "Vi är Davidshallare"
Davidshalls Höstfest 24/9 - fotoutställning "Vi är Davidshallare"
 
Consumo
ConsumoConsumo
Consumo
 
fotosmacro
fotosmacrofotosmacro
fotosmacro
 

Ähnlich wie Performance evaluation of a Wireless Computer Network

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET Journal
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...IRJET Journal
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioIRJET Journal
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUEswar Publications
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)IRJET Journal
 
intelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docxintelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docxKondiVinay
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2Priyasloka Arya
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...srinivasanece7
 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless NetworksIRJET Journal
 
On-chip debugging for microprocessor design
On-chip debugging for microprocessor designOn-chip debugging for microprocessor design
On-chip debugging for microprocessor designTELKOMNIKA JOURNAL
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptIRJET Journal
 
IRJET- Study of Various Network Simulators
IRJET- Study of Various Network SimulatorsIRJET- Study of Various Network Simulators
IRJET- Study of Various Network SimulatorsIRJET Journal
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET Journal
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkRachel Phillips
 
Design of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring SystemDesign of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring SystemIDES Editor
 
Gsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automationGsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automationeSAT Journals
 
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksPerforming Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksAM Publications,India
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...ijgca
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialeSAT Publishing House
 

Ähnlich wie Performance evaluation of a Wireless Computer Network (20)

IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
IRJET- AODV and DSR Routing Protocol Performance Comparison in MANET using Ne...
 
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
 
Signal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive RadioSignal Classification and Identification for Cognitive Radio
Signal Classification and Identification for Cognitive Radio
 
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TUAn Exploration of Grid Computing to be Utilized in Teaching and Research at TU
An Exploration of Grid Computing to be Utilized in Teaching and Research at TU
 
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
Analysis of MAC protocol for Cognitive Radio Wireless Sensor Network (CR-WSN)
 
intelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docxintelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docx
 
An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2An ethernet based_approach_for_tm_data_analysis_v2
An ethernet based_approach_for_tm_data_analysis_v2
 
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...Ieeepro techno solutions   2013 ieee embedded project an integrated design fr...
Ieeepro techno solutions 2013 ieee embedded project an integrated design fr...
 
IRJET - Improving TCP Performance in Wireless Networks
IRJET -  	  Improving TCP Performance in Wireless NetworksIRJET -  	  Improving TCP Performance in Wireless Networks
IRJET - Improving TCP Performance in Wireless Networks
 
On-chip debugging for microprocessor design
On-chip debugging for microprocessor designOn-chip debugging for microprocessor design
On-chip debugging for microprocessor design
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
IRJET- Study of Various Network Simulators
IRJET- Study of Various Network SimulatorsIRJET- Study of Various Network Simulators
IRJET- Study of Various Network Simulators
 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
 
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
IRJET- Comparative Performance Analysis of Routing Protocols in Manet using NS-2
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical Network
 
Design of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring SystemDesign of a Remotely Accessible PC based Temperature Monitoring System
Design of a Remotely Accessible PC based Temperature Monitoring System
 
Gsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automationGsm or x10 based scada system for industrial automation
Gsm or x10 based scada system for industrial automation
 
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS NetworksPerforming Network Simulators of TCP with E2E Network Model over UMTS Networks
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
 
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
PERFORMANCE FACTORS OF CLOUD COMPUTING DATA CENTERS USING [(M/G/1) : (∞/GDM O...
 
Gsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrialGsm or x10 based scada system for industrial
Gsm or x10 based scada system for industrial
 

Kürzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Kürzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Performance evaluation of a Wireless Computer Network

  • 1. Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.924-929 Performance evaluation of a Wireless Computer Network, *Jozef B. Lewoc, **Antoni Izworski, ***Slawomir Skowronski 1 Design, Research and Translation Agency Leader, ul. Powst. Sl. 193/28, 53-138 Wroclaw, Poland 2,3 Wroclaw University of Technology, Wyb. Wyspianskiego 27, 50-370 Wroclaw, Poland Abstract This paper presents a predicted target they do not have at their disposal the financial architecture of an integrated manufacturing and resources needed to develop novel ICT systems of management system for a manufacturer of the CIMM type. household appliances, based on a metropolitan- In such circumstances, a reasonable duty of type infranet and an industrial process control research and development workers seems to be to and monitoring wireless network. To evaluate carry out the initial work on the prospective project performance, a method developed earlier for of CIMM systems, even if no financing is available packet switching networks with end-to-end for such work. This work may be considered as a acknowledgement was applied. The network is volunteer work or a work for the society (as it is modelled as a set of closed routes consisting of a called in the case-study country of Poland) that have user and a series of service stations financed their earlier research and development work (communication links, switches, host processes). or as an investment in their own future: the designers The paper describes the investigations carried out involved early on the prospective CIMM project will for the case study. Some consideration is given to have high chances to be included in the project the performance evaluation accuracy, basing on execution team if and when the CIMM project is the validation work results obtained from established. simulation and measurements on the Polish pilot This initial work should also include the definition wide area network. of the system topology (here, the wireless solution seems to be the most appropriate one for the actual 1. Introduction solution since the systems of the current state of art The Computer-Integrated Manufacturing should be applied for the novel solutions) and and Management (CIMM) systems are severely designer-friendly investigation methods to ensure needed by prospective users, especially big and adequate performance for hardware and software medium manufacturing enterprises. Many people solutions under design. start to realise that development and implementation A team of IT experts and process technologists of such systems is necessary for the manufacturing was established and worked out an approach to enterprises to be duly monitored and run in some development of CIMM systems that seems to be optimum way, in accordance with some objective feasible, rather fast and economic [1,2,3], creating operational criteria. In opinion of the executive staff the basis for this paper. of many manufacturing enterprises visited by the authors, such optimisation of complete enterprises is 2. Exemplary CIMM architecture or will be soon a prerequisite for their existence on The pilot CIMM system was designed the highly competitive market. several years ago for the ex-biggest Polish In spite of that, big manufacturers and vendors of manufacturer of household appliances, Polar, the Computer Integrated Management (CIM) Wroclaw (the Enterprise), employing several systems, having at their disposal financial resources thousand people. The target organisational structure sufficient to develop and implement at least pilot of the Enterprise would be that depicted in Fig. 1. CIMM systems, are no apt to enter the manufacturing For the general Enterprise organisation presented domain. The basic reason for that seems to be the in Fig. 1, the wireless hardware network architecture fact that the big CIM system manufacturers and of the CIMM system, depicted in Fig. 2, has been vendors do not possess at their disposal the designers proposed. Logically, the architecture is based on the and implementers educated and experienced enough wireless metropolitan network operating under the to cope with both manufacturing and management TCP/IP protocol suite [4] and on the process control issues. Such persons are, however, available; and monitoring network of the LonWorks type [5]. paradoxically, many of them are available in poorly developed countries where the designers must have possess a wide scope of experience in order that they are successful; unfortunately, they are dispersed in various industrial and/or research organisations and 924 | P a g e
  • 2. Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.924-929 PR The hardware structure of the wireless CIMM system has been presented in Fig. 2. The case-study network depicted in Fig. 2 is composed of 30 PD RD PD switches (15 routers and 15 servers). Let the individual switches and data links be numbered as DE TE PR RM WM QC MS GD ST shown in Fig. 3 (server Nos: 1- 15, router Nos: 16- 30, link pairs (for both transmission directions): (1,2) … … … … … … … … … – (85,86). Upon the wireless network of Fig. 3, there is SYSTEM QA MEDIA SM SYSTEM stretched a set of closed routes, i.e. the calls from a user to its server and in the opposite direction. . Exemplary closed routes in the CIMM network are INPUT WARE - STORES … HOUSES the connections between a Marketing & Service PRODUCTION Department worker and the general enterprise LINES database (the President’s database) (closed route No. Key: PR - President RM – Run Maintenance Dept. s = 166; ref. Fig. 4a) and between a technologist and PD - Procurement Director WM – Working Media Engineer RD - Run Director QC – Quality Control & Assurance the system Media database (closed route No. s = CD - Culture Director MS – Marketing & Service 279; ref. Fig. 4b). DE – Design Dept. ST – Staff Dept. TE – Technology Dept. QC – Quality Control Note: it is assumed that any p-th server, p  PR – Procurement Dept. 1,…,15 (ref. Fig. 3), is able to support 20 closed Fig. 1. General organisational diagram of the enterprise routes of numbers s = (p-1) 20, (p-1) 20 +1, …, (p- 1) 20 + 19. 3. The network under investigation Note also that the network described here as a set It is assumed that the time needed for of closed routes may be considered as a case of the transfer of data via any switch (server, gateway, node Kelly networks [6] where the entity (packet) sojourn or router) is insignificant in comparison with the time time in any switch is a function of the number of needed to transfer the data via a co-operating data packets in all routes in the network. However, the link. This is in conformity with the specifications of classic queuing theory does not look for solutions for actual hardware proposed for the CIMM system since the Kelly networks [7,8]. data is transferred via network switches as 8-bit byte 1 blocks transferred via fast direct memory access 15 30 2 2 (DMA) channels and internal processing of the data 60 32 4 16 is usually connected only with the message headers. 58 30 3 28 66 17 34 14 6 However, the method proposed enables to consider 29 68 56 62 the delays in wireless network switches though the 70 18 26 36 4 calculations may be somewhat more complicated. 13 28 64 8 54 72 19 27 24 74 76 78 SPR 52 ... 82 38 ... SDE 12 80 26 84 SPD ... 22 ... STE 10 50 20 5 ... SPR SRD 11 ... 86 40 25 20 21 ... SRM SCD 48 12 ... 10 24 42 6 22 ... SWM 46 23 44 18 14 ... SQC 16 7 9 8 Note ... SMS Link number, i =2k, k=1,2,..,43 is, in fact, a pair of numbers, 2k ... SGD SSM and 2k-1; the first is the number of the link directed from the ... node of the lower number to that of the higher one and the other ... SST SQA in the opposite direction. ... Key: SXY- Server of the unit XY Fig. 3. Numbering of switches and links - Router, RXY - Controller Therefore, it was decided to adapt the approximate Fig. 2. Hardware architecture of the CIMM system performance evaluation method [6], developed and validated earlier for telephone computer and 925 | P a g e
  • 3. Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.924-929 communication networks with end-to-end The link preceding the i-th link in the s-th closed acknowledgement, to the cases of the CIMM system route is denoted by h = hs(i), provided that s  Bi. implemented on wireless networks and to apply the The set of closed routes parallel to the s-th closed method for performance evaluation for the case study route in the i-th link is defined by (3). under discussion. Ci  Bi  ( Ah  Bh ) (3) 4. The approximations The reference [6] is hardly available now. The power of Ci is given by (4). Therefore, some basic assumptions and results will be repeated in the present paper. In addition to the denotations defined in Fig. 3, the C i  ci (4) following will be used in the present paper: Ai is the set of closed routes beginning at the i-th The mean cycle time of closed routes encountered by link, such that the s(i)-th user is connected directly to the s-th route at the i-th link is approximated by (5). the i-th link: ai  bi  1 0 Ai  {si ,1 , si , 2 ,..., si ,ai } (1) t i ,s  ;  0; (5) 1 0  l{ Ai  Bi } /{s} t i Bi is the set of closed routes passing via the i-th link but not beginning at that link: The mean waiting time of the closed routes encountered by the s-th route at the i-th link is given B i  {zi ,1 , zi , 2 ,..., zi ,bi } (2) by (6). Y18,166 E18,166 Y77,166 E77,166 Y63,166 E63,166 Y1,166 E1,166 t i,s y i ,l y i ,s  (  ); (6) 1 T (ai  bi  1) l{ Ai  Bi }{ s} t i R166 D 166 S166 166 The mean service time for the closed routes E17,166 Y17,166 E78,166 Y78,166 E64,166 Y64,166 E2,166 Y2,166 encountered by the s-th route at the i-th link is given by (7). a) Exemplary closed route of a Marketing & Service employee using general enterprise database t i ,s ei ,l Y28,279 E28,279 Y67,279 E67,279 Y34,279 E34,279 Y74,279 E74,279 Y83,279 E83,279 Y9,279 E9,279 e i ,s  (  ); (7) (ai  bi  1) l{ Ai  Bi }{ s} t l 1 R279  T279 S279 D279 The mean thinking time for the closed routes encountered by the s-th route at the i-th link is given E27,279 Y27,279 E68,279 Y68,279 E33,279 Y33,279 E73,279 Y73,279 E84,279 Y84,279 E10,279 Y10,279 by (8). b) Exemplary closed route of a technologist using the t i,s mi ,l System Media m i ,s  (  ); (8) (ai  bi  1) l{ Ai  Bi }{ s} t l Key: sS=1,…,299; iI=1,…,86 Rs= round route (trip) delay for s-th closed route The definitions of the mean values defined above for Ts= s-th closed route cycle time the set of closed routes that are not parallel to the s-th Ds= s-th closed route throughput route are as follows: Yi,s= waiting time of s-th closed route to i-th link Ei,s= service time of s-th closed route to i-th link ai  bi  ci t i,s  ' ; (9) Ms= s-th closed route thinking time 1 Ss= s-th closed loop ultimate service time  l{ Ai  Bi } Ci t i Note: Upper case letters denote random variables while lower case letters – relevant mean values ' t i ,s y i ,l   ' y ; (10) ai  bi  ci i ,s Fig. 4. Exemplary closed routes l{ Ai  Bi } Ci ti 926 | P a g e
  • 4. Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.924-929 ' ei ,l exponential thinking time, were employed to validate t i ,s   ' e i ,s ; (11) the approximations presented above. ai  bi  ci l{ Ai  Bi } Ci tl Several hundred comparisons were done for the number of the customers (closed routes), v, changing ' between 2 and several dozen. The relative error of t i ,s mi ,l m i ,s   ' the mean cycle time, ts, calculated for the set of ; (12) ai  bi  ci l{ Ai  Bi } Ci tl comparison reached its maximum (less than 0.03) at v  14 and decreased for v tending to zero or to For all closed routes, the balance equations (13) have infinity. been defined. The set of equations (5) – (13) enables to compute 5.2. Validation with simulation In order that the approximations may be iteratively the basic unknown mean values of the validated, a fast Wide-Area-Network simulator was network performance, i.e. the closed route cycle time, developed on the basis of earlier simulation studies ts, the mean throughput in the s-th closed route, for real-time computer control systems. This 1 ds  , and the round-trip delay, rs  t s  ms . simulator was used, primarily, for the Polish pilot ts wide area network MSK. However, both actual and planned network configurations (including those to   ( yi ,s  ei ,s )); operate at much higher transmission rates) were  (t sS s iI s investigated. In addition, available foreign simulation results for local and wide area networks were also where S is the set of all closed loops, S  v; used for validation. The number of validation experiments was higher ( a i  bi  1)e i ,s 1 2 that 500, with the number of closed loops and links  ( y i ,s  ei ,s (  2 equal up to 500 and 100, respectively. The maximum sAi t i ,s (1  ) relative error found was lower than 0.08. However, in ts the case of results obtained earlier, where the fair conditions of comparison could be ensured, the (13) m i ,s y i ,s  ( ai  bi  2)(1  )  maximum relative error of the cycle time (and t i ,s  e i ,s t s  e i ,s throughput) was lower than 3.5. e i ,s 5.3. Validation with measurements m i ,s 2 ); (13)  ( ai  bi  1)(1  ) To investigate MSK and the approximations t i ,s  e i ,s t i ,s  e i ,s presented above, an internal communication network measuring tool Sitwa was developed and ' 2 ( a  b  c )e i ,s 1 implemented. It was used, primarily, to validate the  ( yi ,s  i ' i eii ,s ( 2  (ai  bi  ci  1) simulation results on the existing possible sBi t i ,s (1  ) configurations of MSK. The investigations showed ts that the simplifying assumptions in simulation (e.g. ' ' omission of the flow control packets and/or frames) m i ,s y i ,s (1  ) '  did not result in significant simulation errors. The t i ,s  e i ,s t i ,s  e i ,s ' ' ' maximum relative error of the approximations under discussion did not exceed 0.05. ' e i ,s ' m 6. Wireless CIMM investigation scenario  ( ai  bi  ci )(1  ' ) ' 2 ' ); i ,s To produce some severe traffic conditions t i ,s  e i ,s t i ,s  e i ,s ' for the wireless CIMM system under investigation, it has been assumed that a major failure occurs in the 5. Validation of the approximations Enterprise, of impact upon all departments. All users operate at one time trying to locate the problem 5.1. Validation with accurate results for cyclic within their responsibility ranges. Most of them (ca. queuing systems nine per ten) use then the general Enterprise database The problem of performance evaluation of (SPR), some try to analyse the current process homogeneous star-topology networks is the same as conditions and to communicate with the System that investigated for wireless queuing networks. The Media (SSM) or the Quality Control System (SQA). accurate solutions in the form of limit probabilities of The basic routing arrays in the closed routes are set the entity (packet, request) numbers have been up so that the minimum possible number of lines is known since early seventies. These results, for used in each closed route, provided that data transfer 927 | P a g e
  • 5. Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.924-929 routes follow the hierarchy levels in the Enterprise. The closed route, s = 166, passes via the most The use of the back-up routes may, possibly, produce severely loaded links, i = 1 and i = 2. This results in even more severe traffic conditions. However, they that r166 reaches more than 4 s at ms values close to 0 are used only for very severe wireless CIMM system (ref. Fig. 5). failures. In such cases, however, the main objective If it is assumed that an annoying value (i.e. the for the CIMM system operation is to recover the value that can not be accepted by the Enterprise normal operating conditions as fast as possible and employees) of rs is that higher than 2 s, then the ms any optimisation of the transmission conditions is not values below some 0.5 s should be avoided. of major interest then. It is assumed that the data transfer rate in each link r166[s] is equal to 1 Mbit/s. Each subscriber sends a short message of the mean length 100 bits (bit stuffing, i.e. 5 insertions o a 0 bits after each five 1 bits in a * sequence, included) that needs 10-4 s for transmission 4 across any line along the route to the final server, and receives the 100,000 bit-long reply that needs 0.1 s for the transfer across any link on the route back to 3 * the subscriber. The thinking time mean value, ms, has been * 2 changed from 30 s down to ca. 0 s; this reflects the * change-over from the interrogating transfer mode to * the automatic file transfer mode (bulk transfer mode). 1 * It will be assumed that the service time at the final * * m166[s] station of each closed loop is 0 s. 0 Let I s  {ii , s , i2, s ,..., ik s , s } be the set of links 0 10 20 30 passed by the s-th closed route. Fig. 5. r166 versus m166 7. Exemplary results The set of equations (5) ÷ (13) was solved iteratively. The basic user characteristics, rs and ds, 3 for the exemplary closed routes, s = 166 and s = 279, d166[10 b/s]  are presented in Figs. 5 ÷ 8. The exemplary round-trip delay (r166) curve versus 30  the mean thinking time (m166) is shown in Fig. 5.  The d166 values (the mean throughput values depicted in Fig. 6) show a definite saturation  (congestion) at ms values below ca. 0.5 s. If the mean 20 offered load for the 166-th closed route is defined by  (14) below:  (e 10 t166  off i,s  ms ) (14)  i166  M166[s] then the increased offered load results in the 0 decreased mean throughput, d166, for the given 0 10 20 30 scenario and for ms < 0 .5 s, s=1,…,300. Fig. 6. d166 versus m166 The closed route, s = 279 (Fig. 7), shows only the acceptable rs values (below 1 s while the values not greater than 2 s are acceptable as not annoying ones) and the ds value is decreasing monotonically with the offered load increasing (ms  0, s = 1,…,300) (Fig. 8). The reason is that the 279-th closed route does not pass via any link under heavy traffic. Therefore, even when the mean thinking time is decreased towards zero, no saturation (congestion) occurs in the links passed by the 279-th closed route. 928 | P a g e
  • 6. Jozef B. Lewoc, Antoni Izworski,Slawomir Skowronski / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.924-929 r279[s] upgraded: thanks to the rapid growth of the  computing power that has happened during the last 5 decade, more accurate approximations may be done for the balance equations (e.g., the simplifying  4 assumption that an entity (packets) may find only one  entity of one closed loop in the queue to some link) may be discarded. Then the balance equations 3 become more complicated but may be still solved by  the iterative method. And the networks with sliding 2  windows or credit-based flow control may be  modelled directly, instead of modelling several loops  1   for credits bigger than 1, as it has been done earlier. However, the authors believe that the method may 0 M279[s] and should be published in its original form now.. The authors are designers and/or consultants for 0 10 20 30 actual computer systems and networks. To do their jobs in a proper way, they had to get involved in Fig. 7. r279 versus m279 some research work in the domain of performance evaluation. And the results obtained can and, in the authors’ opinion, should be applied in performance evaluation of various wireless networks (not only  packets  CIMMs) since the method is, at least, more simple d 279 *  s    that the well known performance evaluation methods 90 d279[s] such as Mean Value Analysis, and much more * exactly tracks the network structure and, therefore, is much more useful for actual network designers. 80 * 8. References 70 [1] L. Franasik et al., System Media – a Step toward Computer Integrated Manufacturing and Management Systems, Measurement and Control 60 (AMSE Press), 22 (3), 2001, 37-46. * [2] A. Izworski, J.B. Lewoc and S. Skowronski, Development of Computer Integrated 50 Manufacturing and Management Systems. Information Control Problems in Manufacturing 40 (IFAC), Saint Etienne, 2006. * [3] J.B. Lewoc, A. Izworski and S. Skowronski, ALSIS case study: computer integrated 30 manufacturing and Maanagement systems. Application of Large Scale Industrial Systems (IFAC), Helsinki-Stockholm, 2006. 20 [4] J. Yanovitz, Under the Hood of the Internet; An Overview of the TCP/IP Protocol Suite. 10 * Available at: www.acm.org/crossroads/xrds1- 1/tcpjmy.html. 2006. * * M279[s] [5] Echelon, Introduction to LonWorks System. 0 Available: www.echelon.com, 2006. 0 10 20 30 [6] F.P. Kelly, Reversibility and Stochastic Networks, Wiley, 1980. Fig. 8. d279 versus m279 [7] T. G. Robertazzi, Computer Networks and Systems. Queuing Theory and Performance 8. CONCLUSIONS Evaluation, Springer-Verlag, 2000. The authors do not claim that the method [8] R. Surfozo, Introduction to Stochastic Networks, devised and verified some dozen years ago needs no Springer-Verlag, 1999. further work. On the contrary, they do realise that the [9] J.B. Lewoc, Performance Evaluation Problems method validated primarily on the pilot Polish for Actual Computer Networks, AMSE Interuniversity Computer Network MSK, operating at Monographs, Tassin, 1990. rather low transmission rates and in a limited configuration, needs further validation and possible tuning. In addition, the method may and should be 929 | P a g e