Empirical Prediction of Computer-Network Evolution

Empirical Prediction of Computer-Network Evolution

Sami J. Habib (Kuwait University, Kuwait)
DOI: 10.4018/978-1-60566-148-3.ch002
OnDemand PDF Download:


This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to mean predicting changes within the physical network topology as time evolves. iCAD is connected to four device libraries, each of which contains a distinct set of network- technology devices, such as Ethernet hubs, ATM switches, IP routers, and gateways. As a network technology changes, each device library is updated. Then, we have plotted the cost and performance changes between the old and recent network technologies, enabling us to predict future changes to a first order. This article presents empirical results from 1999 until 2005 recording the network evolution progress, where the lower and upper bounds of network evolution came out to be 10% to 25% and 57% to 74% respectively in terms of network-design cost reduction.
Chapter Preview


The maintenance process of a network topology so that it can carry out all its communication tasks effectively and efficiently requires a steady tuning and upgrading. Therefore, how often and how to carry on such a process are questions yet to be answered. In other words, we want to identify a metric for predicting the network evolution, and developing design tool to carry on the prediction. Here we have defined a network evolution metric analogous to Moore’s Law (Moore 1965), which states that the number of transistors in an integrated circuit is doubling in every 18 months. We have stated that the cost of network topology design while considering 3 types of network technologies is reducing at a lower rate of 10-25% and an upper rate of 57-74% in every 24 months.

The network topology problem with technology considerations entails the allocation and integration of network devices (such as ATM switch, Ethernet hub, IP router, and gateway) that enable all clients to communicate and access file servers, while minimizing the network integration cost. Literally millions of possible network topologies can be considered for a given network. It is impossible for a human network designer to examine all possibilities for typical large installations. We have applied computer-aided design (CAD) techniques to design/redesign hierarchical computer networks, to determine the network topology and network devices. The problem is known to be NP-complete (requiring an exponential number of steps to find an optimal solution) according to Gerla & Kleinrock (1977). The continual changes in the price, performance and availability of network devices make the network design process more difficult. The choices of network devices, which are made at a particular time, may not be appropriate a few months later.

The CAD tool, iCAD, is based on evolutionary approach. The tool creates an initial population of network topologies by selecting all network devices randomly. The software analyzes and evaluates each topology in the current population, selects the most-fit topologies, modifies some and discards the rest. New topologies are created by mutating existing topologies or by crossing over genetic material between two topologies. Then the optimization process continues. After several generations specified by the user the tool terminates. The iCAD is connected to four device libraries, each of which contains a distinct set of network technology devices, such as Ethernet hubs, ATM switches, IP routers, and gateways. Each device library contains information about device types and their attributes such as cost, capacity, number of ports, and type of wire. As the network technology matures, the device library is updated. Thus, we have extended the usage iCAD in Habib (2002) so that it can synthesize networks based on the current price and on the predicted future price. Because of this extension on iCAD, we are able to collect many empirical data regarding the network design evolutions. Also, we have insured that the synthesized network, once designed, has been optimized for technologies available at the design time. We have examined the topological differences between the current network technologies and the future technologies. These differences would give guidance as to where the network should be upgraded in the future. Finally, we have upgraded an existence design constraints by maintaining as much as possible of its original devices so that the upgrading costs are minimized. Maintaining as many as possible of the original devices is known as the legacy problem.

We have been observing and collecting the changes with the network technology, especially with respect to cost and capacity, for the past six years. Habib & Parker (2002) have recorded an initial study on the network evolution by comparing the outcomes from two sets of device libraries in years of 1999 and 2001. In this paper, we have expanded our study by running iCAD with four different sets of libraries that go back to 1999, 2001, 2003, and 2005. We have plotted the cost and performance changes between networks designed with the old and recent network technologies. This enables us to predict future changes to a first order. The network design cost has evolved at decreasing rate from 10-25% to 57-74% for the past six years as our empirical data has shown. Over time, with more data points, the predictions will become more accurate.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Indranil Bose
Chapter 1
Varadharajan Sridhar
Telecom operators have a wide variety of functions to perform including marketing of telecom products and services, managing their networks... Sample PDF
Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
Chapter 2
Sami J. Habib
This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to... Sample PDF
Empirical Prediction of Computer-Network Evolution
Chapter 3
Hak Ju Kim
This article seeks to develop a richer understanding of the suitability of IP telephony in the Public Switched Telephony Network (PSTN) with an... Sample PDF
Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
Chapter 4
Abid Al Ajeeli
This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based... Sample PDF
A Framework for High-Speed Networking
Chapter 5
Nurul I. Sarkar, Catherine Byrne, Nabeel A.Y. Al-Qirim
Ethernet network technology is still one of the most popular LAN technologies in use today by many organizations and educational institutions... Sample PDF
Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
Chapter 6
M. Chandrasekaran, R. S.D. Wahida Banu
This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These... Sample PDF
Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
Chapter 7
Xabiel G. Pañeda
This chapter presents a method for performance analysis and configuration of audio/video-on-demand services. These kind of services makes use of an... Sample PDF
A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
Chapter 8
Say Ying Lim
As more and more servers appearing in the wireless environment provide accesses to mobile users, more and more demand and expectation is required by... Sample PDF
Mobile Information Processing Involving Multiple Non-Collaborative Sources
Chapter 9
Vilmos Simon
In the next generation IP-based mobile networks, one of the most important QoS parameters are the delay and the delay variation. The cell handover... Sample PDF
Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
Chapter 10
Joon-Yeoul Oh, John P. Mullen
This chapter proposes a very effective heuristic algorithm to address a variation of the cellular network expansion problem and discusses each... Sample PDF
A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
Chapter 11
Manuel Vilas
This article introduces a distributed system, called wireless proxy, to mitigate the effects of user mobility over streaming services on IEEE 802.11... Sample PDF
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
Chapter 12
R. Radhakrishnan, K. R. Shankarkumar, A. Ebenezer Jeyakumar
In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique... Sample PDF
Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA
Chapter 13
Ghassan Kbar
This chapter introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access... Sample PDF
Distributed Resources Management in Wireless LANs that Support Fault Tolerance
Chapter 14
Mieso K. Denko
This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts... Sample PDF
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
Chapter 15
Essam Natsheh
The challenge in creating a routing protocol for ad-hoc networks is to design a single protocol that can adapt to the wide variety of conditions... Sample PDF
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
Chapter 16
Essam Natsheh
Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the... Sample PDF
Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
Chapter 17
Yun Wang, Lee Seidman
The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the... Sample PDF
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
Chapter 18
Rania Wehbi
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing... Sample PDF
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
Chapter 19
Antonios Alexiou, Christos Bouras, John Papagiannopoulos, Dimitrios Primpas
This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining... Sample PDF
Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
About the Contributors