3 Analysis of LSR Model

Size: px
Start display at page:

Download "3 Analysis of LSR Model"

Transcription

1 Performance Analysis for QoS Provisioning in MPLS Networks Shogo Nakazawa, Hitomi Tamura, Kenji Kawahara, Yuji Oie Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka, Fukuoka , Japan Abstract LSR(Label Switching Router)s in MPLS (Multiprotocol Label Switching) networks map arriving IP flows into some labels on Layer 2 switching fabric and establish LSP(Label Switching Path)s. By using LSPs, LSRs can not only transmit IP packets fast with cut-through mechanism, but also solve traffic engineering issue to maximize resource utilization in the whole MPLS networks. So far, we have analyzed delay performance of LSR by focusing only on the real time traffic transmission. In this paper, we will consider the case where non-real time traffic arrives at LSR as well as real time traffic and analyze those packet loss rate under the assumption that the cut-through transmission is applied only to real time traffic. Furthermore, we discuss the bandwidth allocation policy and the buffer dimensioning to meet the requirement with respect to both delay for real time traffic and loss probability for non-real time one, and show the guide for QoS provisioning in MPLS networks. Introduction As the Internet continues to grow rapidly, the number of users is increasing explosively. There is also increasing demand for the multimedia applications such as IP-telephony, video-on-demand, which require quite stringent quality of service (QoS) delivery on packet delay, loss rate and minimum bandwidth. MPLS (Multiprotocol Label Switching) technology would meet this demand and thus LSR (Label Switched Router) in MPLS network is employed to combine Layer 3 routing with Layer 2 high-speed switching efficiently and transfer IP packets fast by cut-through transmission via LSP (Label Switched Path)s on Layer 2 [9]. Moreover, it can treat the traffic engineering issue by setting up various types of LSPs [] and provide Virtual Private Network (VPN) [8]. In order to establish cut-through LSPs, LSR has to map arriving long-lived IP flows into some labels on Layer 2 such as VCI (Virtual Channel Identifier) in ATM switch. This label mapping method is mainly divided into two schemes. One is the data-driven scheme and the other is the control-driven one [2]. For example, the former scheme is implemented in IP switch [6] and Toshiba s CSR (Cell Switch Router) [3] and the latter one is adopted in Cisco s Tag Switching [7] and IBM s ARIS (Aggregated Route-Based IP Switching) []. So far, we have analyzed the performance of LSR by focusing on the processing delay of IP packets in Layer 3 routing kernel in case of the data-driven scheme [5], in which we treated real time traffic and assumed the routing kernel with buffer of infinite length. However, in actual networks, LSR should accommodate non-real time traffic as well as real time one and further the latter assumption would not be realistic. Thus, in this paper, we will consider the case that both real time and non-real time traffic come into LSR and the buffer size is finite, and analyze packet delay and loss performance of both traffic. From now on, we will regard real/non-real time traffic as UDP(User Datagram Protocol) / TCP(Transmission Control Protocol) one, respectively. Since UDP traffic has stringent delay constraints, LSR transmits UDP traffic fast by using a limited number of cut-through LSPs on Layer 2 while TCP traffic is transfered via Layer 3 routing kernel and the default LSP on Layer 2 as in the traditional Internet. Therefore, it becomes important to allocate transmission bandwidth among some cut-through LSPs and the default LSP in a way to make transmission delay of UDP traffic less than that of TCP. On the other hand, packet loss rate should be kept relatively low for TCP traffic, so that the buffer dimensioning in Layer 3 routing kernel is essential. Therefore, by investigating the impact of both the bandwidth allocation and the buffer dimensioning to meet the requirement with respect to processing delay and packet loss rate of UDP/TCP traffic, we will show the guide for QoS provisioning in MPLS networks. This paper is organized as follows. Section 2 describes the mechanism and the analytical model of LSR. Section 3 analyzes the steady state probability of LSR and derives some performance measures. Section 4 provides numerical results and examines the impacts of some parameters on performance. Finally, Section 5 gives a brief conclusion.

2 UDP TCP ½ µ Label Switching Router 2.2 Source Model Description Upstream Node ) default LSP Layer 3 routing kernel Downstream Node In this paper, we assume that data flows into LSR are two kinds of transmission protocols, UDP(User Datagram Protocol) for real time traffic and TCP(Transmission Control Protocol) for non-real time one, and that those packet length is fixed. Thus, we consider a discrete-time queueing system with time slot being equal to a packet transmission time. Since we define the rate of UDP traffic as, the total amount of UDP and TCP traffic on average, UDP and TCP, are given by 2) cut-through LSP Layer 2 switching fabric Label Switched Path Figure : Concept of LSR. 2 Analytical Model and Traffic Model 2. Label Switching Router: Cut-through Mechanism Fig. illustrates the concept of the LSR, which consists of the Layer 3 routing kernel and the Layer 2 switching fabric. The LSR is connected with both upstream and downstream nodes by physical circuit whose bandwidth is (Mbit/s). In the data-driven scheme, if the first packet in some IP flow, which is classified by source-destination IP addresses and/or port numbers, arrives at LSR, it is mapped into the specific label and one cut-through LSP is established between the corresponding upstream and downstream nodes. When the bandwidth for cut-through transmission is set to cut (Mbit/s) and the Ò number (½ Ò Ô Æ Ô Ô ) of LSPs are used, the bandwidth of each cutthrough LSP becomes cut Ô (Mbit/s), where Æ Ô is the maximum number Ò of LSPs which can be set on the Layer 2 switching fabric. If the Æ number Ô of LSPs have been established already and new IP flow arrives, packets in the flow cannot be cut-through, so that they are raised to the routing kernel of Layer 3 and transmitted hop-by-hop. In order to transfer them, the default LSP has to be pre-established via the routing kernel and its bandwidth is set to def (= cut ) (Mbit/s). where is the total amount of incoming traffic at LSR Traffic Model of UDP sources We adopt the Bernoulli process as traffic model of each UDP source in which a packet arrives with probability UDP per slot. When the maximum number of UDP sources multiplexed in LSR is Æ UDP, probability È UDP µ that packets arrive LSR simultaneously in a slot is expressed as follows. UDP µ ½ È µ Æ ÆUDP UDP ÆUDP UDP (2) Therefore, UDP is given by UDP UDP UDP (3) Traffic Model of TCP sources The IP flow model from TCP sources is shown in Fig. 2. Each TCP source generates packets according to an interrupted Bernoulli process (IBP), which is characterized by a parameter set of (,«, ). IBP has two states: on-state and off-state. In each slot, the process changes its state from on to off with probability «, and from off to on with probability. In on-state, one packet arrives in each slot with probability, while no packet arrives during offstate. We suppose that the period of one on-state corresponds to one IP flow. Then, the steady state probability of each state is easily obtained by: () on off (4)

3 λ λd slot off on off on β on : IP flow is established E [on] = / α (packets) Figure 2: TCP source model: 2 state IBP α t off : IP flow is not established E [off] = / β (packets) TCP packet is transmitted with Prob. λd packet transfer time = slot loss R Λ TCP (-w)b IP Processing: Bdef when rejected Label Switched Path: Bcut Λ wb UDP Np Figure 3: Analytical model of LSR. The probability È TCP µ that TCP packets arrive at LSR simultaneously from TCP sources in on-state is given by È TCP µ Thus, we have TCP as ½ µ (5) TCP onæ TCP (6) where Æ TCP is the maximum number of multiplexed TCP sources. In actual networks packet transmission in TCP flows is highly correlated and aggregated IP packet traffic at LAN backbone exhibits so-called selfsimilar characteristics (e.g., [4]). Although IBP does not capture self-similar nature well, it can express the burstiness of packet transmission and we can easily analyze the basic performance of LSRs with some types of traffic by assuming that TCP traffic follows IBP. 2.3 Analytical Queueing Model In this analysis, the physical bandwidth of LSR is shared by both the default LSP and the Æ number Ô of cut-through LSPs at most. Here, we let the Û ratio of the bandwidth for cut-through transmission to, namely, in some slot, one packet assigned on some cut-through LSPs is transmitted with Û prob. while one stored in the routing kernel is with ½ prob. Û. In actual LSR, although some datagrams in default LSP and cut-through ones does not be served in a probabilistic manner, we assume that the LSR serves them in both LSPs probabilistically in order to make evaluation possible for any Û, and that a data arrival at the LSR is on a IP packet basis. The analytical model of LSR is shown in Fig. 3. We will deal with the ideal condition that the LSP is just assigned during one datagram transmission, and that the Layer 2 switching fabric can assign up to the Æ number Ô of LSP for cut-through transmission. Thus, we assume the processing part of Layer 2 as the virtual queue in which the buffer size Æ is Ô and the service rate is Û(Mbit/s) in a slot. Therefore, it is modeled by the geom/d//k(=æ batch Ô ) queue with the arrival rate UDP and the batch Æ size UDP. Here, we do not suppose the buffering of whole IP packet on Layer 2 switching fabric. When the LSR uses all cut through LSPs, newly arriving UDP and TCP packets are raised to the Layer 3 routing kernel. Therefore, if its buffer size is Ê(packets), the Layer 3 can be expressed by the batch geom+ibp/d//k(=ê) queue with the service rate ½ Ûµ(Mbit/s). 3 Analysis of LSR Model 3. Random Variable of System Since UDP packets not assigned on any cut-through LSPs are processed on Layer 3, we cannot analyze each queue of Layer 2 and Layer 3 separately.

4 ½µ Õ Õ Ëon Ø off Ø ½µ Õ Æ Ë TCP Õ Æ TCP Å µå ÑÒµ ܵ ¾µ Õ ¼ È UDP Æ Ô µè TCP Ü µè Ò if ¼ÑÆ Ô ¼ È UDP Æ Ô ½ µè TCP Ü µè Ò if ¼ÑÆ Ô Table : Transition of the number of TCP sources in each state shown in Table. From this table, we È thus have as Ëon ص Ë off ص ÑÒ Æ TCP µ È Õ ½ «µ Õ ÆTCP «Õ ½ µ ÆTCP Õ (8) ÕÑÜ ¼ µ Õ Æ TCP Æ TCP Therefore, we need to evaluate simultaneously both queue lengths of the routing kernel and cut-through LSPs in use as in the analytical model, and we define following random variables in the Ø-th slot. ص: the queue length of the buffer of the routing kernel; Ë Ô Øµ: the number of cut-through LSPs under packet transmission in Layer 2 switching fabric; Ëon ص: the number of TCP sources being in on-state. We can completely describe the state of our system by the above variables and the system ØµË state Ø ¼ ½ ¾ Ô ØµËon ص can form a discrete time Markov chain. Here, we Ë define as the state space Ë for Ô ØµËon صµ, Ë i.e., µ¼ Æ Ô ¼ Æ TCP. A state µ is labeled using the following one-to-one mapping function Å µ: Å µ Æ TCP ½µ. Therefore, Ë can be equivalently represented by the state space Ë ¼ Å µ Å Ë ½, where Å Ë Æ Ô ½µ Æ TCP ½µ. 3.3 Packet arrival probability at routing kernel In this analysis, we assume that the buffer size of Layer 3 routing kernel is finite, i.e., Ê(packets). Here, we denote the random variable ص that represents the number of packets arriving at the routing kernel in the Ø-th slot. There are two cases representing the situation that the state (Ë Ô Øµ,Ëon ص) changes from Å µ to Å Ñ Òµ and Ü packets arrive at the routing kernel in some slot.. The case when the UDP packet in some cut-through LSPs is served. 2. The case when the UDP/TCP packet in the routing kernel is served. In the former case, since LSR processes one packet of cut-through LSPs, LSR can accommodate up Æ to ½ Ô packets on cut-through LSPs and more packets are raised to the routing kernel. If ¼, i.e., no cut-through LSP is Æ used, Ô packets can be held on Layer 2 at most. So, we define packet arrival probability in the former case as Å µå ÑÒµ ܵ and obtain it as follows. ¾µ 3.2 Transition probability of the number of TCP sources being in on-state We first define the transition probability of the number of TCP sources in on-state. ÈÖËon ص Ëon Ø ½µ (7) È ÈÖ ØµÜ Ë Ô ØµÑ Ëon صÒË Ô Ø ½µ Ëon Ø ½µ when the UDP packet in some LSPs is served at Ø-th slot È UDP ÑµÈ TCP ÜµÈ Ò Ü if ¼ÑÆ Ô if TCP ÜµÈ Ò ¼ ½ Ñ Æ Ô È ½µÈ UDP Ñ Ü (9) By assuming that Õ sources change their states from on to off, we can completely give the transition of the number of TCP sources being in on-state as ¼ otherwise

5 Å µå ÑÒµ ܵ µ ¼ È UDP Æ Ô µè TCP Ü µè Ò if Ñ Æ Ô Ùµ ܵ Ùµ ¼Å ÑÒµ ܵ Ùµ ¼¼ Ùµ Å µå ÑÒµ ܵ Ùµ Å µ¼ ܵ Ùµ Ë Å Ùµ Å Ë ½¼ ܵ Ùµ Å Ë ½Å Ë ½ ܵ ½Å ÑÒµ ܵ Similarly, we can obtain packet arrival probability Å µå ÑÒµ ܵ in the latter case as follows. µ and the steady state probability and its vector representation as follows. Å µµ ÐÑ Ü È Ø Å µµ (4) ؽ ÈÖ ØµÜ Ë Ô ØµÑ Ëon صÒË Ô Ø ½µ Ëon Ø ½µ when the packet in the routing kernel is served at slot Ø-th if µè Ò ÑÆ Ô È TCP ÜµÈ UDP Ñ Ü (0) Ü Ü ¼µ Ü Å µµ Ü Å Ë ½µµ (5) Ü Ü ¼ Ü Ü Ê µ (6) Since the system state forms Markov chain of M/G/ type queueing system, we can show the transition probability matrix Ì for Markov chain Å µ using ¾ ܵ, ܵ, ¾ ܵ, ܵ, and (6) as following. As mentioned above, we can show the transition probability matrix ¾ ܵ, ܵ representing that the packet on Layer 2 and Layer 3 is transmitted, respectively, and Ü packets arrive at routing kernel with changing state of established cut-through LSPs on Layer 2 as follows. Ì ¼ ¼µ ½µ ¾µ Ê ¾µ Ê ½µ ʵ ¼µ ½µ ¾µ Ê ¾µ Ê ½µ ¼ ¼ ¼µ ½µ Ê µ Ê ¾µ ¼ ¼ Ê µ Ê µ ¼ ¼ ¼µ ½ (7) otherwise ¼ ٠ܵ ¼ Ùµ.... Furthermore, we define ٠ܵ Ù ¾ µ as follows... Å µå Ë ½ ܵ ½ for Ù ¾ () where ¼ represents a zero matrix of dimension Å Å and µ µ µ µ are given as following, respectively. µ µ ¼ ¼ ¼ ¼ ¼µ ¼ ½ Ûµ ¼µ if ¼ Û ¾ ½µ ½ Ûµ µ otherwise, ¾ ¼µ ½ Ûµ ¼µ Û ¼ if ¾ ½µ ½ Ûµ µ otherwise, Û ¼ ¼ ¼ ¼µ ½µ ¼ ¼Å Ë ½ ܵ ٠ܵ 3.4 Steady state probability ½ We define the system state probability at the Ø-th slot as Ü Ù µ (2) È Ø Å µµ ÈÖ Øµ Ë Ô Øµ Ëon ص (3) µ Û ¾ µ ½ Ûµ µ Û ¾ µ ½ Ûµ µ µ Ü Thus, Ü ÜÌ satisfies, or equivalently, Ü Ü ¼ µ ½ Ü Ê ½ Ü ¼ Ê ½µ ½ Ü ½ µ ¼ Ê ¾ (8) Ê ½ Ü Ê µ (9)

6 Ê Ê Ê ¼µµ Å Ü ÑÒ Æ Ô Û ÑÜ Ê ½µ Ê µè TCP µè UDP Æ Ô µ ¼ È UDP µ Û ½ Ü Å µµ ¼ È UDP µ ÑÜ Ê µ Ê ½µÈ TCP µè UDP Æ Ô ½ µ ½ Ü Å µµ Ê ½ Ê µè TCP µ ÑÜ Ê ½µ Ê µè TCP µè UDP Æ Ô µ Å ¼µµ Ü È TCP µè UDP Æ Ô µ Ê ½ Ü Å µµ È TCP µè UDP Æ Ô ½ µ Ê ½ ½ Ü Å µµ È TCP µè UDP Æ Ô µ Ê Ô ½ Æ Ô Æ Ü Ê Ü ¼ ʵ (20) Ê Ü ½ (2) ¼ where is a column vector of ones. Furthermore, (8) (2) can be stably solved by using the algorithm proposed in [0]. Û Æ UDP Ô ½ Æ ½ Ê ½µÈ TCP µ Ê Ô Æ 3.5 Derivation of performance measures By using the steady state probability obtained in the previous subsection, we can get following performance measures. ½ Ûµ Æ UDP Ô Æ Ô Æ È UDP µ ¼ (23) 3.5. Cut-through rate, Ê We will first derive the cut-through rate Ê. Ê is the ratio of the average number of UDP packets transmitted by cut-through to that of packets generated from whole UDP sources when the maximum number of cut-through LSP is set to Æ Ô. This is given by the following. Next, we can derive the amount of lost UDP packets TCP of TCP,, is obtained from UDP besides. UDP ½ Æ TCP Ê Æ UDP Ô Æ UDP, in (24), and that Ê µ ÑÒ ¼ ¼ ½ ÑÜ ¼ Ê µ ÑÜ Ê ½µ Æ TCP Æ UDP Ê ½ Ü Å ¼µµ ÑÒ Æ Ô µè UDP µ ¼ UDP ¼ ½ Ô Æ Æ UDP Ô ½ Æ Ô Æ Ê ½µ ÑÒ Æ UDP Ü Å µµ ½µ ÑÜ Ê µ ½ ½ ÑÜ ¼ Ê ½µ ½ ÑÒ Æ Ô µ È UDP µ (22) Ûµ ½ Ê ½ Packet loss rate, È We can show the amount of total packet loss,, that the packets arriving at Layer 3 cannot enter the buffer by (23). Æ TCP ½ Ûµ Ô Æ Ê ½ ½µ ÑÜ ¼ Ê µ ÑÜ Ê Ê µ ÑÒ (24) Æ UDP Ô Æ Ô Æ Ê µè TCP µ Therefore, we will obtain the UDP/TCP packet loss rate as follows. ¼ Æ UDP Ô Æ UDP È UDP TCP È UDP TCP (25) TCP ¼ Ê ½ ½

7 ½ Average packet processing delay, Ï There are two cases of packet transmission in LSR. One is hop-by-hop transmission via Layer 3 routing kernel and the other is cut-through one by cutthrough LSPs. First, we can derive the average packet waiting time in case where packets are stored in the routing kernel as follows. N sources Np TCP & rejected UDP default LSP IP Processing Ï def ½ Ê UDP Ê Ô Æ Æ TCP ¼ Ü Å µµ (26)... LSP allocation... 2 Round-Robin np-... Next, we can derive the average packet transmission delay if packets are transmitted by cut-through LSPs as follows. ½ Ï cut Ê UDP Ê ¼ Æ Ô Æ TCP ¼ ¼ Ü Å µµ (27) Therefore, we will obtain the average UDP and TCP packet processing delay in LSR, Ï UDP and Ï TCP as follows. Ï UDP ½ Ê µï def Ê Ï cut (28) Ï TCP Ï def (29) 4 Numerical Results and Discussions In this section, we first show some performances as a function of Æ Ô, and discuss the impact of bandwidth ratio Û for cut-through transmission and the buffer size Ê on the performance. Throughout this section, we set the both number Æ UDP and Æ TCP of UDP and TCP sources to 20, the physical bandwidth of LSR,, to 50(Mbit/s), and the packet length to 400(bytes). We assume that the total amounts of UDP and TCP traffic are even, that is, equals 0.5. Rc(cut-through rate) Figure 4: Simulation model of LSR np Ana(random) Sim(cycle= 2) Sim(cycle=20) Sim(cycle=40) cut-through LSP # of sources=40,total traffic=0.9,c=0.5,w=0.5 buffer size=00,packet length=400[bytes] Np(# of cut-through LSP) Figure 5: Performance Comparison: Cut-through rate, Ê ½ 4. Comparison with Simulation Results and Impact of Æ Ô As mentioned in Sec.2., the bandwidth of each cut-through LSP becomes cut Ò Ô, where Ò Ô ½ Ò Ô Æ Ô µ is the number of cut-through LSP in use. However, we approximately modeled the processing part of Layer 2 as the virtual queue whose buffer size is Æ Ô and the transmission bandwidth is set to Û, namely cut. Therefore, we simulate the above exact model to verify the accuracy of our analytical model. In the analysis, datagrams assigned to some cut-through LSP are stored in one virtual queue and transmitted with

8 Wudp(UDP transmission delay)[msec] Ana(random) Sim(cycle=40) Sim(cycle=20) Sim(cycle= 2) # of sources=40,total traffic=0.9,c=0.5,w=0.5 buffer size=00,packet length=400[bytes] Np(# of cut-through LSP) PlossU(UDP packet loss prob.) Ana(random) Sim(cycle=40) Sim(cycle=20) Sim(cycle= 2) e-05 # of sources=40,total traffic=0.9,c=0.5,w=0.5 buffer size=00,packet length=400[bytes] e Np(# of cut-through LSP) (a) UDP packet transmission delay: Ï UDP (a) UDP packet loss rate: È UDP Wtcp(TCP transmission delay)[msec] Ana(random) Sim(cycle=40) Sim(cycle=20) Sim(cycle= 2) # of sources=40,total traffic=0.9,c=0.5,w=0.5 buffer size=00,packet length=400[bytes] Np(# of cut-through LSP) PlossT(TCP packet loss prob.) Ana(random) Sim(cycle=40) Sim(cycle=20) Sim(cycle= 2) e-05 # of sources=40,total traffic=0.9,c=0.5,w=0.5 buffer size=00,packet length=400[bytes] e Np(# of cut-through LSP) (b) TCP packet transmission delay: Ï TCP (b) TCP packet loss rate: È TCP Figure 6: Performance Comparison: Average transmission delay Figure 7: Performance Comparison: Packet loss rate probability Û, and the datagrams stored in the routing kernel are transmitted via the default LSP with ½ Û prob. at each slot. This probabilistic transmission is not realistic. Thus in the simulation, as shown Fig. 4, we apply the weighted round-robin fashion to the datagram transmission; the weight of datagrams allocated to each of Ò Ô LSPs is set to ÛÒ Ô and that of a datagram in the routing kernel is ½ Û. We compare the analytical result with that obtained by the simulation in Figs We set the bandwidth rate Û for cut-through transmission to 0.5,

9 Figure 8: Impact of bandwidth ratio on Cut-through rate:ê the total traffic to 0.9, and the buffer size of Layer 3 routing kernel to 00 packets. In the simulation, we set the cycle of the round-robin scheduling to 2, 20, and 40(slots). From these figures, regardless of the cycle, the simulation results are well in agreement with analytical ones. Therefore, from now on, we will only show performance measures obtained by the analysis and investigate the impact Æ of Ô on performance in the rest of this subsection. In Fig. 5, the cut-through Ê rate increases Æ as Ô monotonously. We can find that all UDP packets are not always transmitted by cut-through even if the Æ number Ô of cut-through LSPs is set Æ to UDP, which is the maximum number of multiplexed UDP sources. In other words, Æ if Ô gets large, the holding time of cut-through LSP for one packet becomes long because the allocated bandwidth of each LSP becomes small. Therefore, as shown in Fig. 6, both Ï UDP Ï and TCP do not decrease Æ when Ô exceeds 0. Moreover, we find that UDP packets are transmitted about eight times faster than TCP packets even if we allocate the bandwidth of default LSP and cut-through LSPs equally, namely, Û=0.5 Æ and Ô =0. From Fig. 7, it is found È that UDP decreases exponentially, È TCP while does not improve Æ if Ô is set to more than 0. In this case, about 5 percent of TCP packets is lost. Thus we will take following countermeasures to prevent the loss of TCP packets;. LSR should have a large buffer size of the routing kernel. Table 2: Logarithmic decrease rate of TCP packet loss rate Rc(cut-through rate) Û ½¾ ½¼ ¾ ¾ ½½½ ½¼ ¼ ½¼ ¾ ¾ ¼ ½¼ # of sources=40,total traffic=0.7,np=0,c=0.5 packet length=400[bytes] w(=bcut/b) R=00[packets] R=200[packets] R=300[packets] R=400[packets] R=500[packets] 2. Besides, we should allocate the bandwidth of default LSP larger. 4.2 Impact of bandwidth allocation and buffer size In this subsection, we investigate the optimal condition which makes UDP packet processing delay smaller than that of TCP while keeping TCP packet loss rate within some permissible value. In this model, we assume that amounts of UDP and TCP traffic are equal to ¾. However, in order to achieve the above condition, we should examine whether it is adequate or not to allocate each half of the total bandwidth to default LSP and cutthrough ones respectively. Therefore, we firstly investigate the impact of the bandwidth Û ratio for cut-through transmission on the performance when the buffer size of Layer 3 routing kernel, Ê, is set to 00,200,300,400 and 500(packets) in Figs We set the total traffic to 0.7 and the maximum Æ number Ô of cut-through LSPs to 0. Fig. 8 shows Ê cut-through rate Ê. is not sensitive to the buffer size, Ê, and it is in Û proportion to up to about Û 0.4. If takes more than 0.4, almost all UDP packets are transmitted by cut-through. Fig. 9 indicates the transmission delay of UDP/TCP packet. We Û should set to more than 0.36 to transfer UDP packets faster than TCP ones. Furthermore, since the bandwidth of ½ default LSP, Ûµ, becomes Û smaller if gets larger, more TCP packets would be discarded. As shown in Fig. 0(a), when the Ê buffer size is 00, TCP packet È loss rate, TCP, never become less ½¼ than. Hence we also show the impact of the buffer size, Ê, TCP in the same figure. As Ê onè increases, TCP decreases exponentially when Û is smaller than 0.7. Here, È we define the logarithmic decrease rate of TCP packet loss rate with the following formula and values of is shown in table 2.

10 Table 3: Minimum buffer size making TCP loss rate less than some value packet transmission delay[msec] 00 0 TCP Û ½¼ È È TCP R=500[packets] R=400[packets] R=300[packets] R=200[packets] R=00[packets] 0. W_UDP # of sources=40,total traffic=0.7,np=0,c=0.5 packet length=400[bytes] w(=bcut/b) W_TCP Figure 9: Impact of bandwidth ratio on Average packet transmission delay ÐÓ È TCP µ (30) Ê We can see from table 2 that is larger, i.e., the improvement È of TCP due to the increase Ê of is larger Û when gets smaller while no improvement achieves Û when exceeds 0.7. Therefore, in order to satisfy the assumed Û condition, should be in range ¼ that Û¼. Here supposing some permissible packet loss rate for TCP packets, we can find the minimum buffer size that È makes TCP less than this value from (30) and show it in table 3. From this table, we can see that the minimum buffer size obtained Û ¼ for becomes about 60 percent of that Û for ¼. In Fig. 0(b), we display the TCP packet loss prob. UDP packet loss prob e-05 e-06 e-07 e-08 e-09 # of sources=40,total traffic=0.7,np=0,c=0.5 packet length=400[bytes] e e-05 e-06 e-07 e-08 w(=bcut/b) R=00[packets] R=200[packets] R=300[packets] R=400[packets] R=500[packets] (a) TCP packet loss rate:è TCP e-09 # of sources=40,total traffic=0.7,np=0,c=0.5 packet length=400[bytes] e w(=bcut/b) R=00[packets] R=200[packets] R=300[packets] R=400[packets] R=500[packets] (b) UDP packet loss rate:è UDP Figure 0: Impact of bandwidth ratio on packet loss rate UDP packet loss È rate UDP. It decreases when Ê increases and takes minimum value Û around ¼. Therefore, we can say Û ¼ that gives the optimum bandwidth allocation in terms of the packet loss characteristic of UDP under the condition that both UDP and TCP traffic are equal.

11 5 Concluding Remarks In this paper, we have considered the situation that two different classes of traffic flow arrive at LSR; one is the real time traffic with cut-through transmission due to high priority in terms of delay and the other is non-real time one. Thus in the situation, we analyzed the finite buffer model to evaluate the packet transmission delay and the packet loss rate of the routing kernel to investigate the guide for QoS provisioning in MPLS networks. Through some numerical results, we have obtained the followings. When the amount of real and non-real time traffic are equal setting, the bandwidth ratio for cut-through Û transmission to 0.4 would be optimum to satisfy both QoS of the transmission delay of real time traffic and the packet loss rate of non-real time one. We can show the minimum buffer size that meets the requirement of packet loss rate. For example, Û when is 0.4, the minimum buffer size for satisfying that packet loss rate keeps less ½¼ than becomes about 60 percent of that when is 0.5. Û We represented the guideline of optimal bandwidth allocation and buffer dimensioning to meet the requirement on both the packet transmission delay and the packet loss rate. Hence, it can contribute to the QoS control in MPLS networks greatly. However, as mentioned in the part of Traffic Model, aggregated IP traffic in the current Internet exhibits self-similar characteristics, Thus, we will further investigate the impact of this nature on the performance of Traffic Engineering. Acknowledgments This work was supported in part by Research for the Future Program of Japan Society for the Promotion of Science under the Project Integrated Network Architecture for Advanced Multimedia Application Systems (JSPS- RFTF97R630), Telecommunication Advancement Organization of Japan under the Project Global Experimental Networks for Information Society Project, and a Grant-in Aid for Scientific Research (No and No ) of the Ministry of Education, Culture, Sports, Science and Technology, Japan. References [] Awduche, D. et al., Requirements for Traffic Engineering Over MPLS, RFC2702 (999). [2] Davie, B. and Y. Rekhter, MPLS: Technology and Application, Morgan Kaufmann (2000). [3] Katsube, Y., K. Nagami, and H. Esaki, Toshiba s Router Architecture Extensions for ATM: Overview, RFC2098 (997). [4] Leland, W. E., M. S. Taqqu, W. Willinger and D. V. Wilson, Katsube, Y., K. Nagami, and H. Esaki, On the Self-Similar Nature of Ethernet Traffic, IEEE/ACM Trans. Networking, vol.2, no., pp. 5 (2002). [5] Nakazawa, S., H. Tamura, K. Kawahara, and Y. Oie, Performance Analysis of IP Datagram Transmission Delay in MPLS: Impact of both Number and Bandwidth of LSP of Layer 2, IEICE Trans. Commun., vol.e85-b, no., pp (2002). [6] Newman, P., G. Minshall, and T. Lyon, IP Switching: ATM Under IP, IEEE/ACM Trans. Net., vol.6, no.2, 7 29 (998). [7] Rekhter, Y. et al., Cisco Systems Tag Switching Architecture Overview, RFC205 (997). [8] Rosen, E. and Y. Rekhter, BGP/MPLS VPNs, RFC2547 (999). [9] Rosen, E., A. Viswanathan, and R. Callon, Multiprotocol Label Switching Architecture, RFC303 (200). [0] Takine, T., T. Suda, and T. Hasegawa, Cell Loss and Output Process Analyses of a Finite-Buffer Discrete-Time ATM Queueing System with Correlated Arrivals, IEEE Trans. Commun., vol.43, no.2 4, (995). [] Viswanathan, A. et al., ARIS: Aggregate Route-Based IP Switching, Internet draft (997).

12 Shogo Nakazawa received the B.E. degree in communication engineering from National Defense Academy in 993, the M.E. degree in information science from Nara Institute of Science and Technology in 999, and the Ph.D. degree in computer sciences and electronics from Kyushu Institute of Technology, Japan in 2002, respectively, Since 993, He has joined Japan Air Self-Defense Force. His research interests include performance evaluation of computer networks. Hitomi Tamura received the B.E. and M.E. degree in computer sciences and electronics from Kyushu Institute of Technology, Japan in 2000 and 2002, respectively. Since 2002, She has been a Ph.D candidate at the Graduate School of Computer Science and Systems Engineering, Kyushu Institute of Technology. Her research interests include computer networks, Traffic Engineering and Multiprotocol Label Switching. Kenji Kawahara received the B.E. and M.E. degrees in computer sciences and electronics from Kyushu Institute of Technology, Japan in 99 and 993, respectively, and the Ph.D. degree in information and computer science from Osaka University, Japan in 996. From 995 to 997, he was an Assistant Professor in the Information Technology Center, Nara Institute of Science and Technology. From 997 to 999, he was an Assistant Professor in the Department of Computer Science and Electronics, Faculty of Computer Science and Systems Engineering, Kyushu Institute of Technology. Since April 999, he has been an Associate Professor in the same department. His research interests include computer networks, error and congestion control in high speed networks. He is a member of the IEEE and IEICE. Yuji Oie received the B.E., M.E., and D.E. degrees from Kyoto University, Japan in 978, 980 and 987, respectively. From 980 to 983, he worked at Nippon Denso Company Ltd. From 983 to 990, he was with the Department of Electrical Engineering, Sasebo College of Technology, Japan. From 990 to 995, he was an Associate Professor in the Department of Computer Science and Electronics, Faculty of Computer Science and Systems Engineering, Kyushu Institute of Technology. From 995 to 997, He was a Professor in the Information Technology Center, Nara Institute of Science and Technology. Since April 997, He has been a Professor in Kyushu Institute of Technology. His research interests include performance evaluation of computer communication networks, high speed networks, and queueing systems. He is a member of the IEEE, IPSJ, and IEICE.

(a) Hidden Terminal Problem. (b) Direct Interference. (c) Self Interference

(a) Hidden Terminal Problem. (b) Direct Interference. (c) Self Interference ØÖ ÙØ ÝÒ Ñ ÒÒ Ð Ë ÙÐ Ò ÓÖ ÀÓ Æ ØÛÓÖ ½ Ä ÙÒ Ó Ò ÂºÂº Ö ¹ÄÙÒ ¹ Ú Ë ÓÓÐ Ó Ò Ò Ö Ò ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ Ë ÒØ ÖÙÞ ¼ ¹Ñ Ð ÓÐ Ó ºÙ º Ù Î Ö ÓÒ ¼»½»¾¼¼¾ Ì Ö ØÝÔ Ó ÓÐÐ ÓÒ¹ Ö ÒÒ Ð ÔÖÓØÓÓÐ ÓÖ Ó Ò ØÛÓÖ Ö ÔÖ ÒØ º Ì ÔÖÓØÓÓÐ

More information

ÌÀ ÀÁ¹ÇÅÈÊÇÅÁË ÎÄÍ ÇÊ ÆÇÆßÌÊÆËÊÄ ÍÌÁÄÁÌ ÅË Ý Ù ØÚÓ ÖÒØÒÓ Ò ÂÓÖ Å Ó Ý ÏºÈº ͹Á º¼¼ ÖÙÖÝ ¾¼¼¼ ØÖØ Ï ÒØÖÓÙ Ò ØÙÝ ÓÑÔÖÓÑ ÚÐÙ ÓÖ ÒÓÒ¹ØÖÒ ÖÐ ÙØÐØÝ Ñ Ø ¹ÓÑÔÖÓÑ ÚÐÙº ÁØ ÐÓ ÐÝ ÖÐØ ØÓ Ø ÓÑÔÖÓ¹ Ñ ÚÐÙ ÒØÖÓÙ Ý ÓÖÑ

More information

ÆÏ ÈÈÊÇÀ ÌÇ Ëµ ÁÆÎÆÌÇÊ ËËÌÅË ÂÒ¹ÉÒ ÀÙ ÅÒÙØÙÖÒ ÒÒÖÒ Ó ØÓÒ ÍÒÚÖ ØÝ ËÓÖ ÆÒÒÙÙÐ Ý Ò Ï¹Ó ÓÒ Ý ÐØÖÐ Ò ÓÑÔÙØÖ ÒÒÖÒ ÍÒÚÖ ØÝ Ó Å Ù ØØ ÑÖ Ø ÖÙÖÝ ØÖØ ÁÒ Ø ÔÔÖ Û ÓÒ Ö ÔÖÓ ÖÚÛ Ëµ ÒÚÒØÓÖÝ Ý ØÑ ÛØ ÒÔÒÒØ Ò ÒØÐÐÝ ØÖÙØ

More information

Æ ÒØ Ò Ö Ø ÓÒ Ó ÊÓØ Ø Ò ÏÓÖ ÓÖ Ë ÙÐ ÆÝ Ö Ø ÅÙ Ð ÂÓ ÒÒ Đ ÖØÒ Ö Ò ÏÓÐ Ò ËÐ ÒÝ ØÖ Øº Ò Ö Ø Ò ¹ÕÙ Ð ØÝ ÙÐ ÓÖ ÖÓØ Ø Ò ÛÓÖ ÓÖ Ö Ø Ð Ø Ò ÐÐ ØÙ Ø ÓÒ Û Ö ÖØ Ò Ø ÆÒ Ð Ú Ð ÑÙ Ø Ù Ö¹ ÒØ Ù Ò Ò Ù ØÖ Ð ÔÐ ÒØ Ó Ô Ø Ð

More information

Ø Ú ÉÙ Ù Å Ò Ñ ÒØ ÓÒ Ø Ú Æ ØÛÓÖ ¹ ÍÒ Ø ÓÒ Ø ÓÒ ÓÒØÖÓÐ ÈÖÓØÓÓÐ Ê Ö ØÖ Ë Ö Ã Ö Ñ Ñ Ñ Æ ØÛÓÖ Ò Ê Ö ÖÓÙÔ Ë ÓÓÐ Ó ÓÑÔÙØ Ò ÍÒ Ú Ö ØÝ Ó Ä Ä Ä˾ ÂÌ ÍÒ Ø Ã Ò ÓÑ ßÖ Ö Ö ÑÐÓÑԺРº ºÙ ØØÔ»»ÛÛÛºÓÑԺРº ºÙ» ØѹÑÑ ØÖ

More information

ÁÒÖÒ ÓÖ Ó ÖÚØÓÒ Ó ÒØÖØ «Ù ÓÒ ÔÖÓ º ËÙ ÒÒ ØÐÚ Ò ÔÖØÑÒØ Ó Ó ØØ Ø ÅÐ ËÖÒ Ò ÔÖØÑÒØ Ó ËØØ Ø Ò ÇÔÖØÓÒ Ê Ö ÍÒÚÖ ØÝ Ó ÓÔÒÒ ÒÑÖ ØÖØ ØÑØÓÒ Ó ÔÖÑØÖ Ò «Ù ÓÒ ÑÓÐ Ù ÙÐÐÝ ÓÒ Ó Ö¹ ÚØÓÒ Ó Ø ÔÖÓ Ø ÖØ ØÑ ÔÓÒØ º ÀÖ Û ÒÚ ØØ

More information

Ì È ÒÒ Ò ÌÖ Ò È Ö ËØÖÙØÙÖ ÒÒÓØ Ø ÓÒ Ó Ä Ö ÓÖÔÙ Æ ÒÛ Ò Ù Ù¹ ÓÒ ÓÙ Å ÖØ È ÐÑ Ö ÍÒ Ú Ö ØÝ Ó È ÒÒ ÝÐÚ Ò È Ð ÐÔ È ½ ½¼ ÍË ÜÙ Ò Û ÒÐ Òº ºÙÔ ÒÒº Ù Ü Ð Òº ºÙÔ ÒÒº Ù ÓÙ Ð Òº ºÙÔ ÒÒº Ù ÑÔ ÐÑ ÖÐ Òº ºÙÔ ÒÒº Ù ØÖ Ø

More information

ËØØ ØÐ ÒÐÝ Ó ÒÓÑÔÐØ Ø ØÓÖÝ ØÒÕÙ Ò ÓØÛÖ º ź ÆÓÖÓÚ ÈÖ Ò ÙÔÔÐÑÒØ ØÓ Ø ÊÙ Ò ØÓÒ Ó ÄØØРʺºº ÊÙÒ ºº ËØØ ØÐ ÒÐÝ ÏØ Å Ò Øº ÅÓ ÓÛ ÒÒ Ý ËØØ Ø ÔÔº ¹ ¾¹ ¾ ½½µ Ò ÊÙ Òµ ÈÖ ËØØ ØÐ ÒÐÝ ÛØ Ñ Ò Ø ÔÖÓÐÑ ÒÓÛÒ ØÓ ÐÑÓ Ø

More information

Ä ØÙÖ ËÐ ÁÒÚ ØÑ ÒØ Ò ÐÝ ½ ÌÖ Ò Ò ÁÒØÖÓ ØÓ ÌË Ó Ð ØÖ Ò Ø ÖÑ ÒÓÐÓ Ý ÜÔÐ Ò Ä Û Ó ÇÒ ÈÖ Ò Ö ØÖ ÐÙÐ Ø Ö ÔÐ Ø Ò ÔÓÖØ ÓÐ Ó Ó ÓÒ ÜÔÐ Ò Ö Ð Ø ÓÒ Ô Ö ØÖ Ò Ê ÔÐ Ø ÓÒ ËÔÓØ Ê Ø ÓÖÛ Ö Ê Ø Ä ØÙÖ ËÐ ÁÒÚ ØÑ ÒØ Ò ÐÝ ¾ ÇÖ

More information

ÔÔÖ Ò ÂÓÙÖÒÐ Ó ÓÑÔÙØÖ Ò ËÝ ØÑ ËÒ ÎÓк ½ ÆÓº ¾¼¼¼ ÔÔº ¾ß º ÈÖÐÑÒÖÝ ÚÖ ÓÒ Û Ò ÚÒ Ò ÖÝÔØÓÐÓÝ ß ÖÝÔØÓ ÈÖÓÒ ÄØÙÖ ÆÓØ Ò ÓÑÔÙØÖ ËÒ ÎÓк º ÑØ º ËÔÖÒÖ¹ÎÖÐ ½º Ì ËÙÖØÝ Ó Ø ÔÖ ÐÓ ÒÒ Å ÙØÒØØÓÒ Ó ÅÖ ÐÐÖ ÂÓ ÃÐÒ Ý ÈÐÐÔ

More information

ÔØÖ ÄÒÖ Ç ÐÐØÓÖ ß ÇÒ Ö Ó ÖÓÑ º½ ÇÚÖÚÛ ÏØ Ó Ø ØÒ Ú Ò ÓÑÑÓÒ ÔÖÓÔØÓÒ Ó Ñ ÛÚ ÒÖØ Ý Öع ÕÙ ÖÑÓØ ØØÓÒ Ó ÓÑÔÐÜ ÑÓÐÙÐ Ú ÒÖÖ ÔØÖ Ø ÐØÖ Ò ÑÒØ Ð Ò ÑÖÓÛÚ ÚØÝ Ò ÖÒØÖ ÐÓ Ì ÙÑÐ ÑÔÐ ÖÑÓÒ Ó Ð¹ ÐØÓÖ ÔÐÝ ØÖÖÒ ÖÓÐ Ò Ø ÙÒÖ

More information

ÕÙ ØÝ ÌÖ Ò Ý ÁÒ Ø ØÙØ ÓÒ Ð ÁÒÚ ØÓÖ ÌÓ ÖÓ ÓÖ ÆÓØ ØÓ ÖÓ Ì Ó Ø ÆÓÖÛ Ò È ØÖÓÐ ÙÑ ÙÒ º Ê Ò Æ ÆÓÖ Ò ÖÒØ ÖÒ Ö ÆÓÖ Ò Ò ÆÓÖÛ Ò Ë ÓÓÐ Ó Å Ò Ñ ÒØ ½ Â ÒÙ ÖÝ ¾¼¼¼ ØÖ Ø Ì Ó Ø ØÓ Ò Ø ØÙØ ÓÒ Ð ÒÚ ØÓÖ Ó ØÖ Ò ÕÙ ØÝ Ö Ó

More information

FRAME. ... Data Slot S. Data Slot 1 Data Slot 2 C T S R T S. No. of Simultaneous Users. User 1 User 2 User 3. User U. No.

FRAME. ... Data Slot S. Data Slot 1 Data Slot 2 C T S R T S. No. of Simultaneous Users. User 1 User 2 User 3. User U. No. ÂÓÙÖÒ ÐÓ ÁÒØ ÖÓÒÒ Ø ÓÒÆ ØÛÓÖ ÎÓк¾ ÆÓº½ ¾¼¼½µ ¹ ÏÓÖÐ Ë ÒØ ÈÙ Ð Ò ÓÑÔ ÒÝ È Ê ÇÊÅ Æ Î ÄÍ ÌÁÇÆÇ Ê ÉÍ ËÌ¹Ì Å» Å ÈÊÇÌÇ ÇÄ ÇÊÏÁÊ Ä ËËÆ ÌÏÇÊÃË ÒØ Ö ÓÖÊ Ö ÒÏ Ö Ð ÅÓ Ð ØÝ Ò Æ ØÛÓÖ Ò Ê ÏŠƵ Ô ÖØÑ ÒØÓ ÓÑÔÙØ ÖË Ò

More information

ÓÑÔ Ö Ø Ú Ê Ú Û Ó ÊÓ ÓØ ÈÖÓ Ö ÑÑ Ò Ä Ò Ù ÁÞÞ Ø È Ñ Ö ÓÖÝ À Ö Ù Ù Ø ½ ¾¼¼½ ØÖ Ø ÁÒ Ø Ô Ô Ö Û Ñ ÓÑÔ Ö Ø Ú Ö Ú Û Ó Ú Ö ØÝ Ó ÒØ ÖÑ Ø ¹Ð Ú Ð ÖÓ ÓØ Ð Ò Ù Ø Ø Ú Ñ Ö Ò Ö ÒØ Ý Ö º Ï Ð Ó Ö ÖÓ ÓØ ÔÖÓ Ö ÑÑ Ò Ð Ò Ù

More information

Sliding Window ... Basic Window S[0] S[k 1] S[k] Digests Digests Digests

Sliding Window ... Basic Window S[0] S[k 1] S[k] Digests Digests Digests ËØØËØÖÑ ËØØ ØÐ ÅÓØÓÖ Ó ÌÓÙ Ó Ø ËØÖÑ ÊÐ ÌÑ ÙÝÙ Ù Ë ÓÙÖØ Á ØØÙØ Ó ÅØÑØÐ Ë ÔÖØÑØ Ó ÓÑÔÙØÖ Ë ÆÛ ÓÖ ÍÚÖ ØÝ ÝÙÝÙ ºÝÙºÙ ØÖØ Ó Ö Ø ÔÖÓÐÑ Ó ÑÓØÓÖ Ø Ó ØÓÙ Ó ØÑ Ö Ø ØÖÑ ÓÐ Ó Ñ Ó Ó ØѺ Á ØÓ ØÓ Ð ØÖÑ ØØ ¹ Ø Ù ÚÖ ØÖ

More information

ÐÓÒ¹Ü Ö ËÔÖ ½ ÖÖÐÐ ÙÆ Ò ÂÙÒ ÄÙ ËÒÓÖ ÍÒÚÖ Ý ÙÖÖÒ ÎÖ ÓÒ ÑÖ ¾ ½ Ö Ï ÙÝ ÖÑ ÖÙÙÖ Ó ÝÐ ÔÖ ÛÒ ÓÒ¹Ö Ò Ü¹ Ö ÒÓ Ó Ñ Ö ÕÙÐÝ Ò ÑÙÖݺ ÐÓÒ¹ Ü ÔÖ Ö ÓÖÐÐÝ ÖÖÞ Ò ÓÑ ÔÖÐ Ò ÕÙÒ Ò ÑÔÐ ÑÓÐ Ò ÖÑ Ó ÑÙÖÝ Ö ÕÙÐÝ ÝÐ ÚÓÐÐÝ Ýй ÔÖ

More information

ÆØÛÓÖ ÏÓÖÒ ÖÓÙÔ ÁÒØÖÒØ ÖØ ÜÔÖØÓÒ Ø ÙÙ Ø ¾¼¼¾ º ÓÖÐØØ ÉÇË ÁÒº ÁÖÚÒ ºÁº ÈÙÐÐÒ ÐÓÖÒ ÁÒ ØØÙØ Ó ÌÒÓÐÓÝ Ëº ËÖÓÓ ÆÓÖØÐ ÆØÛÓÖ Íà ËØØ Ø Ó ÇÒ¹ÏÝ ÁÒØÖÒØ ÈØ ÐÝ ÖعÓÖÐØعËØØ Ø ¹Ó¹ÔعÐÝ ¹¼¼ºØÜØ ½ ËØØÙ Ó Ø ÅÑÓ Ì ÓÙÑÒØ

More information

Author manuscript, published in "1st International IBM Cloud Academy Conference - ICA CON 2012 (2012)" hal-00684866, version 1-20 Apr 2012

Author manuscript, published in 1st International IBM Cloud Academy Conference - ICA CON 2012 (2012) hal-00684866, version 1-20 Apr 2012 Author manuscript, published in "1st International IBM Cloud Academy Conference - ICA CON 2012 (2012)" Á ÇÆ ¾¼½¾ ÌÓÛ Ö Ë Ð Ð Ø Å Ò Ñ ÒØ ÓÖ Å Ô¹Ê Ù ¹ Ø ¹ÁÒØ Ò Ú ÔÔÐ Ø ÓÒ ÓÒ ÐÓÙ Ò ÀÝ Ö ÁÒ Ö ØÖÙØÙÖ Ö Ð ÒØÓÒ

More information

In Proceedings of the 1999 USENIX Symposium on Internet Technologies and Systems (USITS 99) Boulder, Colorado, October 1999

In Proceedings of the 1999 USENIX Symposium on Internet Technologies and Systems (USITS 99) Boulder, Colorado, October 1999 In Proceedings of the 999 USENIX Symposium on Internet Technologies and Systems (USITS 99) Boulder, Colorado, October 999 ÓÒÒ Ø ÓÒ Ë ÙÐ Ò Ò Ï Ë ÖÚ Ö Å Ö º ÖÓÚ ÐÐ ÊÓ ÖØ Ö Ò Ó Ó Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Ó

More information

ÆÆ ÄË Ç ÇÆÇÅÁ Ë Æ ÁÆ Æ ½ ß½¼¼ ¾¼¼¼µ ÁÒÚ ØÑ ÒØ ÀÓÖ ÞÓÒ Ò Ø ÖÓ Ë Ø ÓÒ Ó ÜÔ Ø Ê ØÙÖÒ Ú Ò ÖÓÑ Ø ÌÓ ÝÓ ËØÓ Ü Ò È Ò¹ÀÙ Ò ÓÙ Ô ÖØÑ ÒØ Ó Ò Ò Æ Ø ÓÒ Ð ÒØÖ Ð ÍÒ Ú Ö ØÝ ÙÒ Ä Ì Û Ò ¾¼ Ù Ò¹Ä Ò À Ù Ô ÖØÑ ÒØ Ó Ò Ò Æ

More information

ÓÑÔ Ö Ø Ú ËØÙ Ý Ó ÌÛÓ ØÖÓÒÓÑ Ð ËÓ ØÛ Ö È Ò Ì Ø Ù Ñ ØØ Ò Ô ÖØ Ð ÙÐ ÐÐÑ ÒØ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö Ó Å Ø Ö Ó Ë Ò Ò ÓÑÔÙØ Ö Ë Ò Ì ÍÒ Ú Ö ØÝ Ó Ù Ð Ò ½ ÌÓ ÅÙÑ Ò Ò ØÖ Ø Ì Ø ÓÑÔ Ö Ø Ú ØÙ Ý Ó ØÛÓ ÓÔ Ò ÓÙÖ ØÖÓÒÓÑ

More information

Primitives. Ad Hoc Network. (a) User Applications Distributed Primitives. Routing Protocol. Ad Hoc Network. (b)

Primitives. Ad Hoc Network. (a) User Applications Distributed Primitives. Routing Protocol. Ad Hoc Network. (b) Ï Ö Ð Æ ØÛÓÖ ¼ ¾¼¼½µ ß ½ ÅÙØÙ Ð ÜÐÙ ÓÒ Ð ÓÖ Ø Ñ ÓÖ ÀÓ ÅÓ Ð Æ ØÛÓÖ Â ÒÒ Ö º Ï ÐØ Ö Â ÒÒ Ö Äº Ï Ð Æ Ø Ò Àº Î Ý Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Ì Ü ²Å ÍÒ Ú Ö ØÝ ÓÐÐ ËØ Ø ÓÒ Ì ¹ ½½¾ ¹Ñ Ð ÒÒÝÛ ºØ ÑÙº Ù Û Ð ºØ ÑÙº Ù

More information

ÔØ Ö Ê Ö ÓÐÓ Ý ÁÒ Ø ÔØ Ö Ø Ö Ñ Ò ÛÓÖ Ø Ø ÓÒ Ú ÐÓÔ ÔÖ ÒØ º Ì ÛÓÖ Ø ¹ Ø ÓÒ ÓÑÔÙØ Ö Ø ÒÓ Ø ÑÓ ÙÐ Û Ö Ø ÓÖÓÒ ÖÝ ØÖ ÑÓ Ð ÐÐ ÔÐ Ý Ò ÑÔÓÖØ ÒØ ÖÓÐ Û Ò Ó Ò ÙØÓÑ Ø Ú Ð Ò ÐÝ Û Ø ÓÖÓÒ ÖÝ Ò Ó Ö ¹ Ô Ý Ñ º Ì ÔØ Ö Ò Û

More information

ÉÙ ÖÝ Ò Ë Ñ ØÖÙØÙÖ Ø ÇÒ Ë Ñ Å Ø Ò Á Ë Ë Ê Ì Ì Á Ç Æ ÞÙÖ ÖÐ Ò ÙÒ Ñ Ò Ö ÓØÓÖ Ö ÖÙÑ Ò ØÙÖ Ð ÙÑ Öº Ö Öº Ò Øºµ Ñ ÁÒ ÓÖÑ Ø Ò Ö Ø Ò Ö Å Ø Ñ Ø ¹Æ ØÙÖÛ Ò ØÐ Ò ÙÐØĐ Ø ÁÁ ÀÙÑ ÓРعÍÒ Ú Ö ØĐ Ø ÞÙ ÖÐ Ò ÚÓÒ À ÖÖ Ôк¹ÁÒ

More information

Analysis of Delayed Reservation Scheme in Server-based QoS Management Network

Analysis of Delayed Reservation Scheme in Server-based QoS Management Network Analysis of Delayed Reservation Scheme in Server-based QoS Management Network Takeshi Ikenaga Ý, Kenji Kawahara Ý, Tetsuya Takine Þ, and Yuji Oie Ý Ý Dept. of Computer Science and Electronics, Kyushu Institute

More information

Ë ÓÒ Ð ØÝ Ò Ö ÙÐØÙÖ Ð ÓÑÑÓ ØÝ ÙØÙÖ Ö Ø Ò Ë Ö Ò Ò Ô ÖØÑ ÒØ Ó Ò Ò ÓÔ Ò Ò Ù Ò Ë ÓÓÐ ÊÓ Ò ÖÒ ÐÐ ½ ù½ ¼ Ö Ö Ö ÒÑ Ö Ì Ä ½ ½ ½ ¼¼ ¹Ñ Ð Óº º Ñ Ö ½ Ì ÙØ ÓÖ Ø Ò ÓÖ ÐÔ ÙÐ Ø Ò ÖÓÑ Â Ô Ö ĐÙÐÓÛ Ò ÓÑÑ ÒØ Ò Ù Ø ÓÒ ÖÓÑ

More information

ÆÓØ Ä ØÙÖ Ð Ñ Ø ØÖÙ ÙØ ÓÒ ØÓ Á ¼ ØÙ ÒØ ÓÖ ÐÐ ÓØ Ö Ö Ø Ö ÖÚ Á ¼ ÈÊÇ Í ÌÁÇÆ ÈÄ ÆÆÁÆ Æ ÇÆÌÊÇÄ Ê Æ Ô ÖØÑ ÒØ Ó ÁÒ Ù ØÖ Ð Ò Ò Ö Ò ÍÒ Ú Ö ØÝ Ø Ù«ÐÓ ¹ ËØ Ø ÍÒ Ú Ö ØÝ Ó Æ Û ÓÖ Ò Ù«ÐÓº Ù Á ¼ ÈÊÇ Í ÌÁÇÆ ÈÄ ÆÆÁÆ Æ

More information

ÀÖÖÐ ÈÐÑÒØ Ò ÆØÛÓÖ Ò ÈÖÓÐÑ ËÙÔØÓ Ù Ñ ÅÝÖ ÓÒ Ý ÃÑ ÅÙÒÐ Þ ÅÝ ½ ¾¼¼¼ ØÖØ ÁÒ Ø ÔÔÖ Û Ú Ø Ö Ø ÓÒ ØÒعÔÔÖÓÜÑØÓÒ ÓÖ ÒÙÑÖ Ó ÐÝÖ ÒØÛÓÖ Ò ÔÖÓÐÑ º Ï Ò Ý ÑÓÐÒ ÖÖÐ Ò ÛÖ Ö ÔÐ Ò ÐÝÖ Ò ÐÝÖ Ø Ü ÔÖÒØ Ó Ø ÑÒ ÓÙÒ Ñ ÖØ µº

More information

ÓÒØÜع ÔÔÖÓ ÓÖ ÅÓÐ ÔÔÐØÓÒ ÚÐÓÔÑÒØ ÄÙØÓ ÆÙÖÓÓ ÁÖº ŵ ź˺ ÂÑ ÓÓµ Ì ÙÑØØ Ò ÙÐ ÐÐÑÒØ Ó Ø ÖÕÙÖÑÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó ÈÐÓ ÓÔÝ ËÓÓÐ Ó ÓÑÔÙØÖ ËÒ Ò ËÓØÛÖ ÒÒÖÒ ÅÓÒ ÍÒÚÖ ØÝ ÅÖ ¾¼¼½ ÐÖØÓÒ Ì Ø ÓÒØÒ ÒÓ ÑØÖÐ ØØ Ò ÔØ ÓÖ

More information

Ê ½µ ¼»¼»¼½ ÓÑÔÙØÖ ËÒ»ÅØÑØ ½ Ô Ê Ö ÊÔÓÖØ Ì ÈÊËÍË ËÝ ØÑ ÖØØÙÖ ÖØ ÈØÞÑÒÒ ½ ÂÑ ÊÓÖÒ ¾ Ö ØÒ ËØÐ ½ ÅÐ ÏÒÖ ¾ ÖÒ ÏÖ ½ ÍÒÚÖ ØØ ËÖÐÒ ÁÑ ËØØÛÐ ¹½¾ ËÖÖÒ ÖÑÒÝ ßÔØÞÑÒÒ ØÙÐÐ ºÙÒ¹ º ¾ ÁÅ ÙÖ Ê Ö ÄÓÖØÓÖÝ ËÙÑÖ ØÖ À¹¼ Ê

More information

(a) Original Images. (b) Stitched Image

(a) Original Images. (b) Stitched Image ÁÅ Ê ÁËÌÊ ÌÁÇÆ ÁÆ ÌÀ Å ÌÄ ÆÎÁÊÇÆÅ ÆÌ Åº ÅÙ ÖÓÚ º ÈÖÓ Þ ÁÒ Ø ØÙØ Ó Ñ Ð Ì ÒÓÐÓ Ý Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ò Ò ÓÒØÖÓÐ Ò Ò Ö Ò ØÖ Ø Ì Ô Ô Ö ÚÓØ ØÓ ÔÓ Ð Ø Ó ÓÑ ØÖ ÑÓ Ø ÓÒ Ó Ñ ØÓ Ò Ð ÓÒÒ Ø ÓÒ Ó Ô Ö Ø Ò Ó ÓÚ ÖÐ Ý Ò Ñ

More information

Ê ÔÓÒ Ú Ì ÒÛ Ö Î Ù Ð Þ Ø ÓÒ Ó Ä Ö Ó Ö Ô Ø Ø Ý Ã ÒÒ Ø Ò ÖØ Ø ÓÒ Ù Ñ ØØ Ò Ô ÖØ Ð ÙÐ ÐÐÑ ÒØ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó È ÐÓ ÓÔ Ý Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Æ Û ÓÖ ÍÒ Ú Ö ØÝ Ë ÔØ Ñ Ö ¾¼¼¾ ÔÔÖÓÚ Ô Ã ÒÒ Ø Ò

More information

drop probability maxp

drop probability maxp ÓÑÔÖ ÓÒ Ó ÌÐ ÖÓÔ Ò ØÚ ÉÙÙ ÅÒÑÒØ ÈÖÓÖÑÒ ÓÖ ÙÐ¹Ø Ò Ï¹Ð ÁÒØÖÒØ ÌÖ ÒÐÙ ÁÒÒÓÒ Ö ØÓ ÖÒÙÖ ÌÓÑ ÐÖ Ö ØÓÔ ÓØ ËÖ ÅÖØÒ ÅÝ ËÔÖÒØ ÌÄ ÙÖÐÒÑ ÍË ßÓØ ÒÐÙÐ ÔÖÒØÐ ºÓÑ ËÐÞÙÖ Ê Ö Ù ØÖ ßÖ ØÓºÖÒÙÖ ÌÓÑ ºÐÖÐ ÐÞÙÖÖ ÖºØ ½ ÍÒÚÖ Ø

More information

Universitat Autònoma de Barcelona

Universitat Autònoma de Barcelona Universitat Autònoma de Barcelona ÙÐØ Ø Ò Ë Ó ³ Ò ÒÝ Ö ÁÒ ÓÖÑ Ø ÇÒ Ø Ò Ò ÓÒ ØÖÙØ ÓÒ Ó ÒØ¹Ñ Ø ÁÒ Ø ØÙØ ÓÒ Å Ñ ÓÖ ÔÖ ÒØ Ô Ö Ò ÂÙ Ò ÒØÓÒ Ó ÊÓ Ö Ù Þ Ù Ð Ö Ô Ö ÓÔØ Ö Ð Ö Ù ÓØÓÖ Ò ÒÝ Ö Ò ÁÒ ÓÖÑ Ø ÐÐ Ø ÖÖ Å ¾¼¼½

More information

ÔØ Ö ½ ÊÇÍÌÁÆ ÁÆ ÅÇ ÁÄ ÀÇ Æ ÌÏÇÊÃË Å Ãº Å Ö Ò Ò Ë Ñ Ö Êº Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò ËØ Ø ÍÒ Ú Ö ØÝ Ó Æ Û ÓÖ Ø ËØÓÒÝ ÖÓÓ ËØÓÒÝ ÖÓÓ Æ ½½ ¹ ¼¼ ØÖ Ø Æ ÒØ ÝÒ Ñ ÖÓÙØ Ò ÓÒ Ó Ø Ý ÐÐ Ò Ò ÑÓ Ð Ó Ò ØÛÓÖ º ÁÒ Ø Ö ÒØ Ô

More information

Ì ÍÆÁÎ ÊËÁÌ ÌÁË ÆÁ ˵ Ë Öº Ð º Ò Ö º ÚÓк ½ ÆÓº ½ ÔÖ Ð ¾¼¼¾ ½ ¹ ½ ÐÓ Ò Ò ÅÙÐØ ¹ ÀÞ ÒÚ ÖÓÒÑ ÒØ ÎÓ Ò º Ç ÐÓ Þ ÁÒÚ Ø È Ô Ö ØÖ Ø Ò ÓÚ ÖÚ Û Ó ÐÓ Ò Ò Ò Ó ÐÓ ØÓÖ Ð Ñ ÒØ ÔÖ ÒØ º ËÝ Ø Ñ Ø Ò Ó Ô¹ ÓÔ ÜÔÐ Ò Û ÐÐ Ø

More information

Å Ò Ñ ÒØ Ö Ø ØÙÖ Ö Ñ ÛÓÖ ÓÖ Ø Ú Æ ØÛÓÖ Ð ÒϺ ÓÒ Â Ñ Èº ºËØ Ö ÒÞ Ñ Ñ Ò Ð Ü Ò ÖκÃÓÒ Ø ÒØ ÒÓÙ ÆÌ ÒÓÐÓ Î Ö ÞÓÒ ÓÐÙÑ ÍÒ Ú Ö ØÝÝ ¼ÂÙÒ ¾¼¼ ÝØ ÊÄÙÒ ÖÓÒØÖ Ø ¼ ¼¾¹ ¹ ¹¼½ ½º Ì ÛÓÖ Û ÔÓÒ ÓÖ ÝØ Ò Ú Ò Ê Ö ÈÖÓ Ø ÒÝ

More information

Ø Ö ØÒ ÓÑÔ Ð Â Ú ÈÖÓ º ÓÒÒ Ø ÔÖÓÚ º Ø Þº µ ÔÖ Ð ¾ ¾¼¼½ ØÖ Ø ÓÖ ÕÙ Ø ÓÑ Ø Ñ ÒÓÛ Ñ Ö Ó Â Ú Î ÖØÙ Ð Å Ò ÂÎÅ µ ÓÒ Â٠عÁÒ¹Ì Ñ ÂÁ̵ Ò ¹Ç ¹Ì Ñ Ç̵ ÓÑÔ Ð Ö Û Ø Óҹع Ý ÓÔØ Ñ Þ Ø ÓÒ Ú Ò ÙÒØ Ò Ø Ö ÈÖÓ ÙØ ÖÙÒÒ Ò

More information

universe nonself self detection system false negatives false positives

universe nonself self detection system false negatives false positives Ö Ø ØÙÖ ÓÖ Ò ÖØ Ð ÁÑÑÙÒ ËÝ Ø Ñ ËØ Ú Ò º ÀÓ Ñ ÝÖ ½ Ò Ëº ÓÖÖ Ø ½ ¾ ½ Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò ÍÆÅ Ð ÙÕÙ ÖÕÙ ÆÅ ½ ½ ¾ Ë ÒØ ÁÒ Ø ØÙØ ½ ÀÝ È Ö ÊÓ Ë ÒØ ÆÅ ¼½ ØÖ Ø Ò ÖØ Ð ÑÑÙÒ Ý Ø Ñ ÊÌÁ˵ Ö Û ÒÓÖÔÓÖ Ø Ñ ÒÝ ÔÖÓÔ

More information

ÓÒØÖÓÐ ËÝ Ø Ñ Ò Ò Ö Ò ÖÓÙÔ Ò ÙØÓÑ Ø ÓÒ Ì ÒÓÐÓ Ý ÖÓÙÔ Ö¹ÁÒ Ò Ö ÂÓ Ñ ÔÙØݵ Ø ØÖ ½ ¼ ¼ À Ò È ÓÒ ¼¾ ½¹ ¹½½¼¼ Ü ¼¾ ½¹ ¹ ¹Å Ð Ò Ö Ó Ñ ÖÒÙÒ ¹ Ò Ñ Ø «È ÓÒ ÓÒØÖÓÐ ËÝ Ø Ñ Ò Ò Ö Ò ÖÓÙÔ ÔйÁÒ Ò Ö Ó«Ö¹ÁÒ ÍÐÖ ÓÖ ÓÐØ

More information

ÅÓÖÐ ÀÞÖ ÅÖØ ÈÓÛÖ Ò ËÓÒ Ø ÀÐØ ÁÒ ÙÖÒ Ý ÖØÓРͺ ÏÖ ÔÖØÑÒØ Ó ÓÒÓÑ ÍÒÚÖ ØÝ Ó ÅÒÒÑ ¹½ ½ ÅÒÒÑ ÛÖÓÒºÙÒ¹ÑÒÒѺ Ò ÅÖÙ ÒÐÙ ÎÖÒØ ÃÖÒÒÚÖ ÖÙÒ ¹½ ÅĐÙÒÒ ÑÖÙ ºÒÐÙÚÖÒغº ÙÙ Ø ¾¼¼½ ØÖØ ÁÒÚÙÐ ÑÓÖÐ ÞÖ ÒÒÖ Ý ÐØ Ò ÙÖÒ Ò ÑÓÒÓÔÓÐ

More information

ÌÊÅ ÎÄÍ ÌÀÇÊ ÈÇÌÆÌÁÄ Æ ÄÁÅÁÌÌÁÇÆË Ë Æ ÁÆÌÊÌ ÊÁËà ÅÆÅÆÌ ÌÇÇÄ ÈÍÄ ÅÊÀÌË ÈÊÌÅÆÌ Ç ÅÌÀÅÌÁË ÌÀ ĐÍÊÁÀ ÈÙÐ ÑÖØ ÈÖÓ ÓÖ Ó ÅØÑØ Ø Ø ÌÀ ËÛ ÖÐ ÁÒ Ø¹ ØÙØ Ó ÌÒÓÐÓÝ ĐÙÖµ ÛÖ Ø Ò ÙÖÒ Ò ÒÒÐ ÑØÑع º À ÖÚ ÑØÑØ ÔÐÓÑ ÖÓÑ Ø

More information

Bud row 1. Chips row 2. Coors. Bud. row 3 Milk. Chips. Cheesies. Coors row 4 Cheesies. Diapers. Milk. Diapers

Bud row 1. Chips row 2. Coors. Bud. row 3 Milk. Chips. Cheesies. Coors row 4 Cheesies. Diapers. Milk. Diapers Ð ØÖ ØÝ ÜØ ÖÒ Ð Ë Ñ Ð Ö ØÝ Ó Ø ÓÖ Ð ØØÖ ÙØ Ö ØÓÔ Ö Êº È ÐÑ Ö ½ Ò Ö ØÓ ÐÓÙØ Ó ¾ ¾ ½ Î Ú ÑÓ ÁÒº ¾ ÛÓÓ ÐÚ È ØØ ÙÖ È Ô ÐÑ ÖÚ Ú ÑÓºÓÑ ÓÑÔÙØ Ö Ë Ò Ô ÖØÑ ÒØ ÖÒ Å ÐÐÓÒ ÍÒ Ú Ö ØÝ ¼¼¼ ÓÖ Ú È ØØ ÙÖ È Ö ØÓ ºÑÙº Ù

More information

Ì ÈÖ Ò Ó ËØÖ ÔÔ ÅÓÖØ ¹ Ë ÙÖ Ø Â Ó ÓÙ ÓÙ Å ØØ Û Ê Ö ÓÒ Ê Ö ËØ ÒØÓÒ Ò ÊÓ ÖØ º Ï Ø Ð Û Â ÒÙ ÖÝ ½ ØÖ Ø ÁÒØ Ö Ø ÓÒÐÝ Áǵ Ò ÔÖ Ò Ô Ð ÓÒÐÝ Èǵ ØÖ ÔÔ ÑÓÖØ ¹ ÙÖ Ø Å Ëµ Ö Ö Ú Ø Ú ÙÖ Ø Û Ô Ý ÓÙØ ÓÒÐÝ Ø ÒØ Ö Ø ÓÑÔÓÒ

More information

HowPros and Cons of Owning a Home-Based Business

HowPros and Cons of Owning a Home-Based Business ÄØ Ø ÊÚ ÓÒ ÅÖ ¾½ ¾¼¼½ ÓÑÑÒØ ÏÐÓÑ ÖÑ Ò ÅÒÖÐ ÁÒÒØÚ ØÓ ÅÒÔÙÐØ Ø ÌÑÒ Ó ÈÖÓØ Ê ÓÐÙØÓÒ Ú ÀÖ ÐÖ ÌÖÙÒ ÓÖ ËÓÒÝÓÒ ÄÑ Ï ØÒ º ÕÙØ º ÖÓÚØ Ëº ÒÒ Åº ÖÒÒÒ Àº Ó º ÓÛÖÝ ÈºÙÐÖ Êº ÀÒРº ÀÖ ÐÖ º ÄÑÒÒ Åº ÅØÐÐ ÁºÈÒ ºÊ ÑÙ Ò

More information

ÅÓÖ Ð À Þ Ö ÁÒ ÙÖ Ò Ò ËÓÑ ÓÐÐÙ ÓÒ ÁÒ Ð Ð Ö Ò Ò ¹ØÓ Ð ÖØ Å Ö Ø Ú Ö ÓÒ Ù Ù Ø ½ Ì Ú Ö ÓÒ ÖÙ ÖÝ ¾¼¼½ ØÖ Ø Ï ÓÒ Ö ÑÓ Ð Ó Ò ÙÖ Ò Ò ÓÐÐÙ ÓÒº Æ ÒØ Ö Ö Ò Ö ÕÙ Ö Ø ÓÒ ÙÑ Ö ØÓ Ø ÑÓÒ Ø ÖÝ ÓÑÔ Ò Ø ÓÒ Ò Ó ÐÓ º ÙØ Ø

More information

Client URL. List of object servers that contain object

Client URL. List of object servers that contain object ÄÓ Ø Ò ÓÔ Ó Ç Ø Í Ò Ø ÓÑ Ò Æ Ñ ËÝ Ø Ñ ÂÙ Ã Ò Ö Ù Ã Ø Ïº ÊÓ ÁÒ Ø ØÙØ ÙÖ ÓÑ ËÓÔ ÒØ ÔÓÐ Ö Ò Ò ÖÓ ÙÖ ÓѺ Ö Â Ñ Ïº ÊÓ ÖØ Ö Ò Ì Ð ÓÑ ß Æ Ì Á Ý Ð ÅÓÙÐ Ò ÙÜ Ö Ò ØÖ Ø ½ ÁÒØÖÓ ÙØ ÓÒ ÁÒ ÓÖ Ö ØÓ Ö Ù Ú Ö Ð Ý Ò Ò ¹

More information

ÅÁÌ ½ º ÌÓÔ Ò Ì Ë ÁÒØ ÖÒ Ø Ê Ö ÈÖÓ Ð Ñ ËÔÖ Ò ¾¼¼¾ Ä ØÙÖ ½ ÖÙ ÖÝ ¾¼¼¾ Ä ØÙÖ Ö ÌÓÑ Ä ØÓÒ ËÖ ÇÑ Ö Ø ÑÓÒ Ï Ð ½º½ ÁÒØÖÓ ÙØ ÓÒ Ì Ð Û ÐÐ Ù Ú Ö Ð Ö Ö ÔÖÓ Ð Ñ Ø Ø Ö Ö Ð Ø ØÓ Ø ÁÒØ ÖÒ Øº Ð ØÙÖ Û ÐÐ Ù ÀÓÛ Ô ÖØ ÙÐ

More information

Downloaded from SPIE Digital Library on 29 Aug 2011 to 128.196.210.138. Terms of Use: http://spiedl.org/terms

Downloaded from SPIE Digital Library on 29 Aug 2011 to 128.196.210.138. Terms of Use: http://spiedl.org/terms ÔØ Ú ÓÒ ÖÝ Ñ ÖÖÓÖ ÓÖ Ø Ä Ö ÒÓÙÐ Ö Ì Ð ÓÔ º Ê Ö º Ö٠Ⱥ Ë Ð Ò Ö º ÐÐ Ò Êº ź Ò Ö ØØÓÒ ÀºÅº Å ÖØ Ò Ç ÖÚ ØÓÖ Ó ØÖÓ Ó Ö ØÖ Ä Ö Ó º ÖÑ ¼½¾ Ö ÒÞ ÁØ ÐÝ Ë ÁÒØ ÖÒ Ø ÓÒ Ð ºÖºÐº ÓÖ Ó ÈÖÓÑ ËÔÓ ¾» ¾¾¼ Ä Ó ÁØ ÐÝ Å ÖÓ

More information

A Fast Path Recovery Mechanism for MPLS Networks

A Fast Path Recovery Mechanism for MPLS Networks A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.

More information

Chen Ding Yutao Zhong Computer Science Department University of Rochester Rochester, New York U.S.A. cding,ytzhong @cs.rochester.

Chen Ding Yutao Zhong Computer Science Department University of Rochester Rochester, New York U.S.A. cding,ytzhong @cs.rochester. ÓÑÔ Ð Ö¹ Ö Ø ÊÙÒ¹Ì Ñ ÅÓÒ ØÓÖ Ò Ó ÈÖÓ Ö Ñ Ø Chen Ding Yutao Zhong Computer Science Department University of Rochester Rochester, New York U.S.A. cding,ytzhong @cs.rochester.edu ABSTRACT ÙÖ Ø ÖÙÒ¹Ø Ñ Ò ÐÝ

More information

ÌÖ Ò Ø ÓÒ¹ Ö Ò Ò ÅÒ ÑÓ ÝÒ È Ö¹ØÓ¹È Ö ËØ ÒÓ Ö Ô ËØÓÖ ËÝ Ø Ñ Ì ÑÓØ Ý ÊÓ Ó ½ Ò ËØ Ú Ò À Ò ¾ ¾ ½ ËÔÖ ÒØ Ú Ò Ì ÒÓÐÓ Ý Ä ÓÖ ØÓÖÝ ÙÖÐ Ò Ñ ¼½¼ ÍË ÍÒ Ú Ö ØÝ Ó Ñ Ö ÓÑÔÙØ Ö Ä ÓÖ ØÓÖÝ Ñ Ö ¼ Íà ØÖ Øº ÅÒ ÑÓ ÝÒ Ô Ö¹ØÓ¹Ô

More information

ÍÒ Ö Ø Ò Ò Ø ÒØ ÖÔÖ ÁÒ ÓÖÑ Ø ÓÒ ËÝ Ø Ñ Ì ÒÓÐÓ Ý Ó Ò ÊÈ Ö Ï Ò Ö ØØÔ»»ÛÛÛº Ò º Ù¹ ÖÐ Òº» Û Ò Ö ÁÒ Ø ØÙØ ĐÙÖ ÁÒ ÓÖÑ Ø Ö ÍÒ Ú Ö ØĐ Ø ÖÐ Ò Ì Ù ØÖº ¹½ ½ ÖÐ Ò ÖÑ ÒÝ ¹Ñ Ð Û Ò º Ù¹ ÖÐ Òº ÔÖ Ð ¾ ¾¼¼¼ ÌÙØÓÖ Ð Ø Ø

More information

Ò Ñ Ö Ð ÓÙÒ Ø ÓÒ ÓÖ ÙØÓÑ Ø Ï ÁÒØ Ö Ú ÐÙ Ø ÓÒ Ý Å ÐÓ Ý Ú ØØ ÁÚÓÖÝ ºËº ÈÙÖ Ù ÍÒ Ú Ö Øݵ ½ ź˺ ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ Ø Ö Ð Ýµ ½ ÖØ Ø ÓÒ Ù Ñ ØØ Ò ÖØ Ð Ø Ø ÓÒ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó È ÐÓ Ó Ý Ò ÓÑÙØ Ö

More information

Archiving Scientific Data

Archiving Scientific Data Archiving Scientific Data Peter Buneman Sanjeev Khanna Ý Keishi Tajima Þ Wang-Chiew Tan Ü ABSTRACT Ï ÔÖ ÒØ Ò Ö Ú Ò Ø Ò ÕÙ ÓÖ Ö Ö Ð Ø Û Ø Ý ØÖÙØÙÖ º ÇÙÖ ÔÔÖÓ ÓÒ Ø ÒÓ¹ Ø ÓÒ Ó Ø Ñ Ø ÑÔ Û Ö Ý Ò Ð Ñ ÒØ ÔÔ Ö

More information

ÇÔ Ò ÈÖÓ Ð Ñ Ò Ø ¹Ë Ö Ò È Ö¹ØÓ¹È Ö ËÝ Ø Ñ Æ Ð Û Ò À ØÓÖ Ö ¹ÅÓÐ Ò Ò Ú ÖÐÝ Ò ËØ Ò ÓÖ ÍÒ Ú Ö ØÝ ËØ Ò ÓÖ ¼ ÍË Û Ò ØÓÖ Ý Ò º Ø Ò ÓÖ º Ù ØØÔ»»ÛÛÛ¹ º Ø Ò ÓÖ º Ù ØÖ Øº ÁÒ È Ö¹ÌÓ¹È Ö È¾Èµ Ý Ø Ñ ÙØÓÒÓÑÓÙ ÓÑÔÙØ Ö

More information

PROCESSOR IS OCCUPIED BY T i

PROCESSOR IS OCCUPIED BY T i ËÙÐÒ ÐÓÖØÑ ÓÖ ÅÙÐØÔÖÓÖÑÑÒ Ò ÀÖ¹ÊйÌÑ ÒÚÖÓÒÑÒØ º ĺ ÄÙ ÈÖÓØ Å Å Ù ØØ ÁÒ ØØÙØ Ó ÌÒÓÐÓÝ ÂÑ Ïº ÄÝÐÒ ÂØ ÈÖÓÔÙÐ ÓÒ ÄÓÖØÓÖÝ ÐÓÖÒ ÁÒ ØØÙØ Ó ÌÒÓÐÓÝ ØÖØ Ì ÔÖÓÐÑ Ó ÑÙÐØÔÖÓÖÑ ÙÐÒ ÓÒ ÒÐ ÔÖÓ ÓÖ ØÙ ÖÓÑ Ø ÚÛÔÓÒØ Ó Ø ÖØÖ

More information

The CMS Silicon Strip Tracker and its Electronic Readout

The CMS Silicon Strip Tracker and its Electronic Readout The CMS Silicon Strip Tracker and its Electronic Readout Markus Friedl Dissertation May 2001 ÖØ Ø ÓÒ Ì ÅË Ë Ð ÓÒ ËØÖ Ô ÌÖ Ö Ò Ø Ð ØÖÓÒ Ê ÓÙØ ÔÖ ÒØ Ò Ô ÖØ Ð ÙÐ ÐÐÑ ÒØ Ó Ø Ö ÕÙ Ö Ñ ÒØ ÓÖ Ø Ö ÓØÓÖ Ó Ì Ò Ð

More information

ÁÆÎÆÌÇÊ ÇÆÌÊÇÄ ÍÆÊÌÁÆ ÅƵ ÑÒ ÙÒÖØÒ Ø ÊÒ ÎÖÒ Ó ÊÒ Ø Á ¼ ÈÊÇÍÌÁÇÆ ÈÄÆÆÁÆ Æ ÇÆÌÊÇÄ ÁÒÚÒØÓÖÝ ÓÒØÖÓÐ ÙÒÖØÒ ÑÒµ ÁÒØÖÓÙØÓÒ ÊÒÓÑ ÚÖØÓÒ ÑÔÓÖØÒØ ÔÖØÐ ÚÖØÓÒ ÈÖÓÐÑ ØÖÙØÙÖ ÑÔÐ ØÓ ÖÔÖ ÒØ ÖÒÓÑÒ Ò Ø ÑÓÐ Ê Æ ÍÒÚÖ ØÝ Ø

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks

Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Experiences with Class of Service (CoS) Translations in IP/MPLS Networks Rameshbabu Prabagaran & Joseph B. Evans Information and Telecommunications Technology Center Department of Electrical Engineering

More information

ØÙÖ Ò Ö Ø ÓÒ Ý ÁÑ Ø Ø ÓÒ ÖÓÑ ÀÙÑ Ò Ú ÓÖ ØÓ ÓÑÔÙØ Ö Ö Ø Ö Ò Ñ Ø ÓÒ ÖØ Ø ÓÒ ÞÙÖ ÖÐ Ò ÙÒ Ö Ó ØÓÖ Ö ÁÒ Ò ÙÖÛ Ò Ø Ò Ö Æ ØÙÖÛ Ò ØÐ ¹Ì Ò Ò ÙÐØĐ Ø Ò Ö ÍÒ Ú Ö ØĐ Ø Ë ÖÐ Ò ÚÓÖ Ð Ø ÚÓÒ Å Ð Ã ÔÔ Ë Ö ÖĐÙ Ò ¾¼¼ Ò ÎÓÖ

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

ÁÒØÖÔÖØØÓÒ Ó Î ÙÐÐÝ ËÒ ÍÖÒ ÒÚÖÓÒÑÒØ ÓÖ ËйÖÚÒ Ö ÖØØÓÒ ÞÙÖ ÖÐÒÙÒ Ö ÓØÓÖ¹ÁÒÒÙÖ Ò Ö ÙÐØØ ÐØÖÓØÒ Ö ÊÙÖ¹ÍÒÚÖ ØØ ÓÙÑ ÖÒ ÈØÞÓÐ ËØÙØØÖØ»ÓÙÑ ËÔØÑÖ ¾¼¼¼ ÊÖÒØÒ ÈÖÓº Öº¹ÁÒº ÏÖÒÖ ÚÓÒ ËÐÒ ÁÒ ØØÙØ Ö ÆÙÖÓÒÓÖÑØ ÄÖ ØÙÐ

More information

TheHow and Why of Having a Successful Home Office System

TheHow and Why of Having a Successful Home Office System ÊÇÄ ¹ Ë ËË ÇÆÌÊÇÄ ÇÆ ÌÀ Ï ÍËÁÆ Ä È ÂÓÓÒ Ëº È Ö ÁÒ ÓÖÑ Ø ÓÒ Ò ËÓ ØÛ Ö Ò Ò Ö Ò Ô ÖØÑ ÒØ ÓÖ Å ÓÒ ÍÒ Ú Ö ØÝ Ô Ö Ø ºÒÖÐºÒ ÚÝºÑ Ð Ð¹ÂÓÓÒ Ò ÓÐÐ Ó ÁÒ ÓÖÑ Ø ÓÒ Ì ÒÓÐÓ Ý ÍÒ Ú Ö ØÝ Ó ÆÓÖØ ÖÓÐ Ò Ø ÖÐÓØØ ÒÙÒº Ù Ê Ú

More information

PROTOCOLS FOR SECURE REMOTE DATABASE ACCESS WITH APPROXIMATE MATCHING

PROTOCOLS FOR SECURE REMOTE DATABASE ACCESS WITH APPROXIMATE MATCHING CERIAS Tech Report 2001-02 PROTOCOLS FOR SECURE REMOTE DATABASE ACCESS WITH APPROXIMATE MATCHING Wenliang Du, Mikhail J. Atallah Center for Education and Research in Information Assurance and Security

More information

ÈÖ ÓÚÖÝ ÓÒ ÓÖÒ ÜÒ ÅÖØ ÛØ ÖÒØÐÐÝ ÁÒÓÖÑ ÌÖÖ ÖÒ ÂÓÒ ÍÒÚÖ ØÝ Ó Ñ ØÖÑ Ò ÈÊ ÊÓÒÐ ÅÙ Ö ÑÙ ÍÒÚÖ ØÝ ÊÓØØÖÑ ÈØÖ ËÓØÑÒ ÄÑÙÖ ÁÒ ØØÙØ Ó ÒÒÐ ÓÒÓÑ Ò ÈÊ ÁÖÑ ÚÒ ÄÙÛÒ ÄÑÙÖ ÁÒ ØØÙØ Ó ÒÒÐ ÓÒÓÑ Ì ÚÖ ÓÒ ÙÙ Ø ¾¼¼½ ØÖØ Ì ÔÔÖ

More information

Applications. Decode/ Encode ... Meta- Data. Data. Shares. Multi-read/ Multi-write. Intermediary Software ... Storage Nodes

Applications. Decode/ Encode ... Meta- Data. Data. Shares. Multi-read/ Multi-write. Intermediary Software ... Storage Nodes ËÐØÒ Ø ÊØ Ø ØÖÙØÓÒ ËÑ ÓÖ ËÙÖÚÚÐ ËØÓÖ ËÝ ØÑ ÂÝ Âº ÏÝÐ ÅÑØ ÐÓÐÙ ÎÝ ÈÒÙÖÒÒ ÅРϺ Ö ËÑ ÇÙÞ ÃÒ ÌÛ ÓÖÝ ÏÐÐÑ ÖÓÖÝ Êº ÒÖ ÈÖÔ Ãº ÃÓ Ð ÅÝ ¾¼¼½ Å͹˹¼½¹½¾¼ ËÓÓÐ Ó ÓÑÔÙØÖ ËÒ ÖÒ ÅÐÐÓÒ ÍÒÚÖ ØÝ ÈØØ ÙÖ È ½¾½ ØÖØ ËÙÖÚÚÐ

More information

application require ment? reliability read/write caching disk

application require ment? reliability read/write caching disk Í Ò Ê ÑÓØ Å ÑÓÖÝ ØÓ ËØ Ð Ø Æ ÒØÐÝ ÓÒ Ò Ì¾ Ä ÒÙÜ Ð ËÝ Ø Ñ Ö Ò Ó Ö Ð ÖÓ Ï Ð Ö Ó ÖÒ Ö È Ó Ò Ì Ø Ò ËØ Ò ÍÒ Ú Ö Ö Ð È Ö ÓÓÖ Ò Ó È Ó ¹ Ö Ù Ó Ñ ÁÒ ÓÖÑ Ø Úº ÔÖ Ó Î ÐÓ Ó»Ò Ó ÓÓÒ Ó ½¼ ¹ ¼ ÑÔ Ò Ö Ò È Ö Þ Ð Ì Ð µ

More information

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK

A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India venii_k@yahoo.com 2 Director, Dept. of MCA, Sona College

More information

Real Business Cycles with Disequilibrium in the Labor Market: A Comparison of the U.S. and German Economies

Real Business Cycles with Disequilibrium in the Labor Market: A Comparison of the U.S. and German Economies Working Paper No. 5 Real Business Cycles with Disequilibrium in the Labor Market: A Comparison of the U.S. and German Economies by Gang Gong and Willi Semmler University of Bielefeld Department of Economics

More information

PFS scheme for forcing better service in best effort IP network

PFS scheme for forcing better service in best effort IP network Paper PFS scheme for forcing better service in best effort IP network Monika Fudała and Wojciech Burakowski Abstract The paper presents recent results corresponding to a new strategy for source traffic

More information

Application. handle layer. access layer. reference layer. transport layer. ServerImplementation. Stub. Skeleton. ClientReference.

Application. handle layer. access layer. reference layer. transport layer. ServerImplementation. Stub. Skeleton. ClientReference. ÜÔÐÓ Ø Ò Ç Ø ÄÓ Ð ØÝ Ò Â Ú È ÖØÝ ØÖ ÙØ ÓÑÔÙØ Ò ÒÚ ÖÓÒÑ ÒØ ÓÖ ÏÓÖ Ø Ø ÓÒ ÐÙ Ø Ö ÖÒ Ö À ÙÑ Ö Ò Å Ð È Ð ÔÔ Ò ÍÒ Ú Ö ØÝ Ó Ã ÖÐ ÖÙ ÖÑ ÒÝ ÙÑ Ö ºÙ º Ò Ô Ð ÔÔ Ö ºÙ º ØØÔ»»ÛÛÛ Ô º Ö ºÙ º»Â Ú È ÖØÝ» ØÖ Øº ÁÒ ØÖ

More information

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Zuo-Po Huang, *Ji-Feng Chiu, Wen-Shyang Hwang and *Ce-Kuen Shieh adrian@wshlab2.ee.kuas.edu.tw, gary@hpds.ee.ncku.edu.tw,

More information

autocorrelation analysis

autocorrelation analysis ÌÓÛÖ ËÔ¹ÒÖØ ÖÝÔØÓÖÔ ÃÝ ÓÒ Ê ÓÙÖ ÓÒ ØÖÒ Ú ÜØÒ ØÖص Ò ÅÓÒÖÓ ÅРú ÊØÖ Ý É Ä ÒРȺ ÄÓÔÖ Ø ÐÒ Ë ØÖØ ÈÖÓÖÑÑÐ ÑÓÐ ÔÓÒ Ò ÔÖ ÓÒÐ ØÐ ØÒØ È µ ÛØ ÑÖÓÔÓÒ ÔÖÑØ ÚÓ¹ ÖÚÒ Ù Ö ÒØÖ Ò Û Ù Ö ÔÖÓÚ Ò¹ ÔÙØ Ý ÔÒº ÁÒ Ø ÔÔÖ Û ÓÛÓÛØÓܹ

More information

Improving Web Performance by Client Characterization Driven Server Adaptation

Improving Web Performance by Client Characterization Driven Server Adaptation Improving Web Performance by Client Characterization Driven Server Adaptation Balachander Krishnamurthy AT&T Labs Research 180 Park Avenue Florham Park, NJ bala@research.att.com Craig E. Wills WPI 100

More information

Ì ÈÒÒ ÝÐÚÒ ËØØ ÍÒÚÖ ØÝ Ì ÖÙØ ËÓÓÐ ÔÖØÑÒØ ÓËØØ Ø ËÌÊÌÁË ÇÊ Ì ÆÄËÁË ÏÁÌÀ ÌÏÇ ÌÈË Ç ÅÁËËÁÆ ÎÄÍË Ì Ò ËØØ Ø Ý ÇÖ ÀÖÐ ¾¼¼ ÇÖ ÀÖÐ ËÙÑØØ Ò ÈÖØÐ ÙÐ ÐÐÑÒØ Ó Ø ÊÕÙÖÑÒØ ÓÖ Ø Ö Ó ÓØÓÖ Ó ÈÐÓ ÓÔÝ ÙÙ Ø ¾¼¼ Ì Ø Ó ÇÖ ÀÖÐ

More information

Dynamic Sizing of Label Switching Paths in MPLS Networks

Dynamic Sizing of Label Switching Paths in MPLS Networks Dynamic Sizing of Label Switching Paths in MPLS Networks Gustavo B. Figueiredo 1 José. Augusto. S. Monteiro 2 Nelson. L. S da Fonseca 1 Antônio. A. A. Rocha 3 1 State University of Campinas Institute of

More information

Push-communities. Pull-communities. Wrapped Services ... ... processors hardwarecircuits peripherals PCshopping

Push-communities. Pull-communities. Wrapped Services ... ... processors hardwarecircuits peripherals PCshopping ÓÑÔÓ Ò Ò ÅÒØÒÒ Ï¹ ÎÖØÙÐ ÒØÖÔÖ ÓÙÐÑ ÒØÐÐ ½ Ò ÖÑ Å ¾ Ò ØÑÒ ÓÙÙØØÝ ¾ Ò Ñ ÐÑÖÑ Ò ÂÑ Ö ½ ËÓÓÐ Ó ÓÑÔÙØÖ ËÒ Ò ÒÒÖÒ ÍÒÚÖ ØÝ Ó ÆÛ ËÓÙØ ÏÐ Ù ØÖÐ ÓÙÐÑ ºÙÒ ÛºÙºÙ ÔÖØÑÒØ Ó ÓÑÔÙØÖ ËÒ ÈÙÖÙ ÍÒÚÖ ØÝ ÍË ºÔÙÖÙºÙ ¾ ÔÖØÑÒØ

More information

Multiple Layer Traffic Engineering in NTT Network Service

Multiple Layer Traffic Engineering in NTT Network Service Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service

More information

History-Based Batch Job Scheduling on a Network of Interactively Used Workstations

History-Based Batch Job Scheduling on a Network of Interactively Used Workstations À ØÓÖݹ Ø ÂÓ Ë ÙÐ Ò ÓÒ Æ ØÛÓÖ Ó ÁÒØ Ö Ø Ú ÐÝ Í ÏÓÖ Ø Ø ÓÒ ÁÒ Ù ÙÖ Ð ÖØ Ø ÓÒ ÞÙÖ ÖÐ Ò ÙÒ Ö ÏĐÙÖ Ò Ó ØÓÖ Ö È ÐÓ ÓÔ ÚÓÖ Ð Ø Ö È ÐÓ ÓÔ ¹Æ ØÙÖÛ Ò ØÐ Ò ÙÐØĐ Ø Ö ÍÒ Ú Ö ØĐ Ø Ð ÚÓÒ Ò Ö Ï Ô Ù Ë ĐÙÔ Ñ ÄÍ Ð ½ Ò Ñ

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

SBSCET, Firozpur (Punjab), India

SBSCET, Firozpur (Punjab), India Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based

More information

hospital physician(2)... disease(4) treat(2) W305(2) leukemia(3) leukemia(2) cancer

hospital physician(2)... disease(4) treat(2) W305(2) leukemia(3) leukemia(2) cancer Ë ÙÖ ÅÄ ÈÙ Ð Ò Û Ø ÓÙØ ÁÒ ÓÖÑ Ø ÓÒ Ä Ò Ø ÈÖ Ò Ó Ø ÁÒ Ö Ò Ó ÙÒ Ò Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò ÆÓÖØ Ø ÖÒ ÍÒ Ú Ö ØÝ Ä ÓÒ Ò ½½¼¼¼ Ò Ý Ò ÜÑ ÐºÒ Ùº ÙºÒ Ò Ä Ý Ë ÓÓÐ Ó ÁÒ ÓÖÑ Ø ÓÒ Ò ÓÑÔÙØ Ö Ë Ò ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ ÁÖÚ

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Ì Ë Ø ÅÄ Ë Ö Ò Ò Ò Ò ÅÄ ÉÙ ÖÝ Ò Ñ Ö Ò Ò Ò Ó Ò ÒØ ÓÒÝ ÂÓ Ô Ö Ú Ò Ò º Ö Ð Ýº Ù Ê ÔÓÖØ ÆÓº Í» Ë ¹¼¼¹½½½¾ Ë ÔØ Ñ Ö ¾¼¼¼ ÓÑÔÙØ Ö Ë Ò Ú ÓÒ Ëµ ÍÒ Ú Ö ØÝ Ó Ð ÓÖÒ Ö Ð Ý Ð ÓÖÒ ¾¼ Ì Ë Ø ÅÄ Ë Ö Ò Ò Ò Ò ÅÄ ÉÙ ÖÝ Ò

More information

Optimal Crawling Strategies for Web Search Engines

Optimal Crawling Strategies for Web Search Engines Optimal Crawling Strategies for Web Search Engines J.L. Wolf, M.S. Squillante, P.S. Yu IBM Watson Research Center ÐÛÓÐ Ñ Ô ÝÙÙ ºÑºÓÑ J. Sethuraman IEOR Department Columbia University jay@ieor.columbia.edu

More information

RSVP- A Fault Tolerant Mechanism in MPLS Networks

RSVP- A Fault Tolerant Mechanism in MPLS Networks RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data

More information

IBM Research Report. The State of the Art in Locally Distributed Web-server Systems

IBM Research Report. The State of the Art in Locally Distributed Web-server Systems RC22209 (W0110-048) October 16, 2001 Computer Science IBM Research Report The State of the Art in Locally Distributed Web-server Systems Valeria Cardellini, Emiliano Casalicchio Dept. of Computer Engineering

More information

} diff. } make. fetch. diff. (a) Standard LRC. (c) Home-based LRC. (b) AURC. Node 0 Node 1 Node 2 (home) Node 0 Node 1 Node 2 (home) Compute

} diff. } make. fetch. diff. (a) Standard LRC. (c) Home-based LRC. (b) AURC. Node 0 Node 1 Node 2 (home) Node 0 Node 1 Node 2 (home) Compute ÈÙÐ Ò Ø ÈÖÓÒ Ó Ø ¾Ò ËÝÑÔÓ ÙÑ Ó ÇÔÖØÒ ËÝ ØÑ Ò Ò ÁÑÔÐÑÒØØÓÒ ÇËÁ³µ ÈÖÓÖÑÒ ÚÐÙØÓÒ Ó ÌÛÓ ÀÓѹ ÄÞÝ ÊÐ ÓÒ ØÒÝ ÈÖÓØÓÓÐ ÓÖ ËÖ ÎÖØÙÐ ÅÑÓÖÝ ËÝ ØÑ ÙÒÝÙÒ ÓÙ ÄÚÙ ÁØÓ Ò Ã Ä ÔÖØÑÒØ Ó ÓÑÔÙØÖ ËÒ ÈÖÒØÓÒ ÍÒÚÖ ØÝ ÈÖÒØÓÒ ÆÂ

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

ÓÒ ÖØÓÒ ÓÒ ÙÖÓÔÒ ÓÒÚÖ ÓÒ ÔÖÐÐÐ ÓÖÔÙ ÅÐÒ ÅÒ ÍÒÚÖ Ø ÈÚ ÑÐÒÑÒÑкÓÑ ÖÒ ¾ ÂÒÙÖÝ ¾¼¼ ½ ½µ ¾µ Ñ Ó Ø ÛÓÖ Ì ÛÓÖ ÒÐÝ Ø ÇÆÎÊË ÓÖ ÓÒÚÖÐ ÓÒ ØÖÙØÓÒ µ Û Ò ÓÙÒ Ò Ø Ç ÓÖÔÙ Ñ ÙÔ Ó Ø ØÖÒ ÐØÓÒ Ó ÚÒ ÔØÖ Ó Ó³ ÒÓÚÐ ÁÐ ÒÓÑ ÐÐ

More information

On Providing Survivable QoS Services in the Next Generation Internet

On Providing Survivable QoS Services in the Next Generation Internet On Providing Survivable QoS Services in the Next Generation Internet Anotai Srikitja and David Tipper Dept. of Information Science and Telecommunications University of Pittsburgh Pittsburgh, PA 1526 USA

More information

Observingtheeffectof TCP congestion controlon networktraffic

Observingtheeffectof TCP congestion controlon networktraffic Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu

More information

Resource Management for Scalable Disconnected Access to Web Services

Resource Management for Scalable Disconnected Access to Web Services Resource Management for Scalable Disconnected Access to Web Services Bharat Chandra, Mike Dahlin, Lei Gao, Amjad-Ali Khoja Amol Nayate, Asim Razzaq, Anil Sewani Department of Computer Sciences The University

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK

ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ADAPTIVE RESOURCE ALLOCATION AND INTERNET TRAFFIC ENGINEERING ON DATA NETWORK ABSTRACT Hatim Hussein Department of Electrical and Computer Engineering, George Mason University, Fairfax, Virginia, USA hhussei1@gmu.edu

More information

An Aggregation Technique for Traffic Monitoring. Kenjiro Cho, Ryo Kaizaki, and Akira Kato {kjc,kaizaki,kato}@wide.ad.jp

An Aggregation Technique for Traffic Monitoring. Kenjiro Cho, Ryo Kaizaki, and Akira Kato {kjc,kaizaki,kato}@wide.ad.jp An Aggregation Technique for Traffic Monitoring Kenjiro Cho, Ryo Kaizaki, and Akira Kato {kjc,kaizaki,kato}@wide.ad.jp motivation for long-term monitoring flow-based monitoring needs predefined rules problems

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information