By Topic

Survivable wireless ATM network architecture

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Wang, Y.H. ; Dept. of Electr. & Comput. Eng., Carnegie Mellon Univ., Pittsburgh, PA, USA ; Soh, W.S. ; Tsai, M.Y. ; Kim, H.S.

Amidst the rapid growth of wireless broadband networks, little attention has been paid to wireless network survivability issues. We propose a survivable wireless ATM network architecture that allows it to survive from a single base station failure condition, by redirecting a failure cell's traffic via its six neighboring cells. We present two failure-handling schemes for the proposed architecture. The first scheme is a bandwidth reservation (BR) scheme that is targeted at achieving high survivability by reserving bandwidths at appropriate locations in the network. The second scheme is a best-effort (BE) scheme that does not perform any reservation, and is targeted at achieving high bandwidth utilization. Simulation results show that the BR scheme achieves good survivability as expected. On the other hand, the BE scheme provides better utilization while having slightly lower average survivability. The decrease in average survivability for the BE scheme is not tremendous, largely due to its flexibility in the use of spare bandwidths from neighboring cells when a failure occurs. However, the BE scheme requires more frequent update messages between the switches in order to update each other about the amount of bandwidth that they could provide for failure-handling. We have also considered important issues, such as switchover time and data integrity, for our proposed schemes

Published in:

Computer Communications and Networks, 2000. Proceedings. Ninth International Conference on

Date of Conference: