On the Complexity of Engineered Systems (and its effect on protocol deployment) David Meyer DRAFT. Abstract
|
|
|
- Monica Brown
- 10 years ago
- Views:
Transcription
1 On the Complexity of Engineered Systems (and its effect on protocol deployment) David Meyer Abstract While advanced technological and biological systems have very different implementations at the molecular and component levels, they show surprising similarities in systems-level organization. In fact, Systems Biology can inform network engineering as to system-level architectural features that imbue advanced engineered systems with scalability, adaptability and evolvability. Perhaps most surprisingly, convergent evolution in both domains has produced modular architectures that are composed of elaborate hierarchies of protocols and layers of feedback regulation in response to the demand for robustness to uncertain environments. These somewhat paradoxical features are neither accidental nor artificial. Rather, they derive from a deep and necessary interplay between complexity and robustness, modularity, feedback, and fragility. This paper explores insights from both biological systems and engineering theory that can help inform the design and deployment of engineered systems such as the Internet as well as helping to describe why some technologies are difficult to evolve and deploy. 1 Introduction While advanced technological and biological systems have very different implementations at the molecular and component levels, they show surprising similarities in systems-level organization. In fact, Systems Biology [3] can inform network engineering as to system-level architectural features that imbue advanced engineered systems with scalability, adaptability and evolvability. Perhaps most surprisingly, convergent evolution in both domains has produced modular architectures that are composed of elaborate hierarchies of protocols and layers of feedback regulation in response to the demand for robustness to uncertain environments. These somewhat paradoxical features are neither accidental nor artificial. Rather, they derive from a deep and necessary interplay between complexity and robustness, modularity, feedback, and fragility. This paper explores insights from both biological systems and engineering theory that can help inform the design and deployment of engineered systems such as the Internet as well as helping to describe why some technologies are difficult to evolve and deploy. 1
2 This paper briefly explores principles learned in the biological domain with an eye towards gaining a deeper understanding of the implications of architecture on the design and deployment of Internet technologies. One perhaps surprising consequence is that while narrow waist architectures 1 which provide for diversity and evolvability above and below the waist, it is just this property that at the same time causes difficulty in deploying new technologies in the waist itself. This effect can be seen in biological systems as well as technological systems and perhaps surprisingly, is an inherent feature of robust and evolvable systems. The remainder of this paper is organized as follows: Section 2 briefly introduces the ideas underlying Robustness and Fragility. Section 4 discusses system-level architectural features for scalability and evolvablity, and discusses how these same features inhibit the deployment of protocols with specific features. Section 3 provides one definition of complexity, and Section 5 provides a view to the future as well as recommendations as to what we, the Internet engineering community, should consider as paradigms for more deeply understanding the network. Finally, Section 6 provides a summary and More Questions Than Answers. 2 Robustness and Fragility Figure 1 depicts a typical Complexity-Robustness curve for a class of familiar systems which includes the Internet and many biological systems [4]. As we can see such systems require some degree of complexity to acquire robustness. However, beyond a certain point (P max ) additional complexity causes fragility and brittleness. While detailed discussion of robustness, fragility, and complexity are beyond the scope of this paper, the next sections provide an overview of these topics. 2.1 Robustness Definition: A [property] of a [system] is robust if it is [invariant] with respect to a [set of perturbations], up to some limit [2]. Another way to think about this is that robustness is the preservation of a certain property in the presence of uncertainty in a system s components or environment. Interestingly, a system can have the property that it is robust to one set of perturbations and yet fragile for a different property and/or set of perturbations. Such a system is called Robust Yet Fragile (or RYF-complex). For example, a possible RYF tradeoff is that a system with high efficiency (i.e., using minimal system resources) might be unreliable (i.e., fragile to component failure) or hard to evolve. Examples of systems exhibiting RYF-complex behavior include many biological signaling paths and the Internet [2]. 1 Such as the Internet architecture 2
3 Figure 1: Robustness vs. Complexity Systems View Note that we can characterize many familiar system properties as forms of robustness. For example: Reliability is robustness to component failures Efficiency is robustness to resource scarcity Scalability is robustness to changes to the size/complexity of the system as a whole Modularity is robustness to structure component rearrangements Evolvability is robustness of lineages to changes on long time scales 2.2 Fragility Fragility can be most easily seen in an example. Consider a coffee cup on a sitting on a table. The cup is fragile because suffers non-linearly more from large deviations than from the cumulative effect of smaller events. More concretely, the cup is dropped on average 1 cm every time it is set down. Picking it up and setting it down say, 300 times, has no effect 3
4 on the cup. However, dropping the cup from 3 meters destroys it (i.e., the damage grows in a non-linear fashion). Another example: consider the difference in damage to a human who jumps off something that is, 0.3 meters high 30 times versus jumping off something that 9 meters high one time; in the first case, no real damage; in the second case the person is dead. In the network world, we see several examples of fragility, including ARP storms [15] Micro-loops in the Internet routing system [14] TCP congestion collapse [10] The AS 7007 route leakage incident [17] Formal Definition of Fragility Let z be some stress level, p some property, and let H(p,z) be the (negative valued) harm function Then for the fragile the following must hold H(p, nz) < nh(p, z) for 0 < nz < K (1) where K is the level at which the system collapses. We say such a system is K-fragile. The intuition here is that the cumulative damage to a fragile system from a series of small shocks is non-linearly less that the damage from one large shock [16]. Note that Equation 1 is a variation on Jensens Inequality [7] and importantly is not mean-preserving for convex H. In particular H(p, (z1 + z2)/2) (H(p, z1) + H(p, z2))/2 (2) That is, the convex function of the mean is not equal to the mean of convex functions. Assuming that a distribution s mean is preserved by averaging is a common technique when the underlying distribution is unknown (perhaps the most common case). As shown here however, such averaging leads to model error and hence additional uncertainty. Finally, there is a close relationship between fragility as defined here and what we typically think of as scaling. For example, when we say something scales like O(n 2 ) what we mean is the damage to the network has constant acceleration (2), and as such is of concern as n gets large. 3 Defining Complexity Alderson and Doyle [2] provide the following insightful description of complexity: 4
5 In our view, however, complexity is most succinctly discussed in terms of functionality and its robustness. Specifically, we argue that complexity in highly organized systems arises primarily from design strategies intended to create robustness to uncertainty in their environments and component parts. That is, complexity is really about structure that is designed to create robustness to environmental and component uncertainty. We will return to this theme later in this paper. 4 Architectural Structures for Scalability and Evolvability In this section we describe six systems-level architectural features found in both technological and biological systems that confer scalability and evolvability. These include bowties (thin waists), protocols, massively distributed, robust control 2, a high degree of layering, and component reuse. Interestingly, these are also the same features that result in the RYF-complex behavior of these systems Bowties and Thin Waist Architectures While the view of architecture as constraints that deconstrain originated in biology [11], similar (if not isomorphic) concepts are found in many engineered systems, including the Internet[8] [1] and many manufacturing, transportation and economic systems[9]. In biology, this structure is typically called a bowtie. In engineered systems like the Internet, the same structure is generally called an hourglass (the key difference revolves around whether a system s layering is seen as either horizontal or vertical). A robust architecture is constrained by protocols, but the resulting plug and play modularity that these shared constraints enable deconstrain (i.e., make flexible) systems designed using this architecture. Constraints give a convenient starting language to formalize and quantify architecture and ultimately, a mathematical foundation[4]. In the domain of manufacturing (in this case clothing), consider a given wardrobe that is a collection of garments and the problem of assembling an outfit that provides suitable robustness to the wearer s environment. Three distinct but interrelated types of constraints are universal in clothing as in all architecture: (i) component (garment) constraints, (ii) system (outfit) constraints, and (iii) protocol constraints. Therefore, in combination, diverse, heterogeneous components (garments) that 2 Here the term robust is used in the control-theoretic sense, i.e., risk aware controllers such as TCP/IP 3 Note that it has been shown that RYF-complexity is conserved so while this behavior might be mitigated (to some degree), it cannot be eliminated [6]. 5
6 are constrained by materials and construction combine synergistically (through protocols) to yield outfits that satisfy system constraints not directly provided by any single component. Note that these system constraints are weakly emergent[5]. Figure 2: Biological bowtie Figure 2 shows a typical biological bowtie. Here the focus is on the set of the metabolic reactions and processes that take place in the cells of organisms to convert biochemical energy from nutrients into adenosine triphosphate (ATP). ATP is the knot of the bowtie, as every cell uses ATP for energy transport (think of the ATP molecule as being analogous to an IP packet). Many components can be used to make ATP, and all of life uses ATP for energy transport. Note that if you turn this bowtie on its side see something that looks like the classical Internet Hourglass (Figure 3). As shown in Figure /reffig:comparison, the bowtie and hourglass are similar architectural features who s difference lies mainly in whether one views layering as horizontal or vertical. In summary, bowties are a fundamental systems-level structure found in both biological and technological systems that are scalable and evolvable. However, the same structure that allows for the remarkable diversity and robustness of life on earth (or the Internet) is the same structure that makes, for example, IPv6 hard to deploy. 6
7 5 A View to the Future Figure 3: Internet Hourglass The underlying thesis embodied in this paper is that complex systems such as the Internet can be understood only by identifying their organizing principles, theories, design rules, and protocols. Hence the approach advocated here is more akin to Systems Biology in that it seeks to find a complete computational system model which embodies such organizing principles. These principles lead us to understand why deployment of certain protocols, most notably those that exist around the bowtie are hard to change. We have seen this effect embodied in the difficulties in deploying with both IPv6 and DNSSec. In summary, the claim articulated here is that as an engineering community, we need to develop a multidisciplinary approach to describing, understanding, and controlling the properties and dynamics of the whole network. Of course, this requires the integration of information from many sources. Fortunately, there are highly organized (and common) universal structures (architectural features) underlying biological and technological networks. These are the structures mediate that effective tradeoffs among efficiency, robustness, and evolvability with predicable fragilities while at the same time enforcing structure that makes acceptance and deployment of certain technologies difficult. Unfortunately, the theory for the type of distributed and asynchronous global control used in the Internet (or biology) is relatively new (and its natural language is mathematics). That said, it is still possible to find insight into candidate universal structures that can be identified by comparing biological and technological systems [12]. 7
8 Figure 4: Comparing the Bowtie and Hourglass 6 More Questions than Answers While we are just at the beginning of what is undoubtably a long endeavour, we have learned that there are fundamental architectural building blocks found in systems that scale and are evolvable. These include RYF complexity/tradeoffs (really a behavior) Bowtie architectures Protocol Based Architectures (PBAs) Massively distributed with robust control loops Complexity-robustness spirals Highly layered However, while these structures lead to scalability and evolvablity, the knot of the bowtie is notoriously unevolvable (again, this follows for the notion of constraints that deconstrain). This is, at least in part, what make protocols that live in the knot hard to evolve (read: change). While the idea of narrow waists (or bowties) is well socialized in both the networking and systems biology communities, deeper understanding of how these architectural features inhibit evolvability of protocols and modules that make up the knot 8
9 Figure 5: Classic Internet and NDN Hourglasses is an area of active research. For example, Figure 5 depicts an hourglass architecture for Named Data Networking [13] and compares it to the classic Internet hourglass. Finally as noted above, while we focused on the structure of the bowtie in this brief discussion, the bowtie is only one of the architectural features which simultaneously confer scalability and evolvability while at the same time making protocols in the knot difficult to evolve. Understanding these structures and how they interact with other socio-economic factors is fundamental to our understanding of deployability of new protocols in the Internet. 9
10 References [1] Saamer Akhshabi and Constantine Dovrolis. The evolution of layered protocol stacks leads to an hourglass-shaped architecture. In SIGCOMM, [2] D. Alderson and J. Doyle. Contrasting views of complexity and their implications for network-centric infrastructures. In IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Human, volume 40 Issue 4, pages , [3] Frank J. Bruggeman and Hans V. Westerhoff. The nature of systems biology. TRENDS in Microbiology, 15(1), [4] J. Carlson. Highly optimized tolerance:a mechanism for power laws in designed systems. Physical Review E, 60(2): , [5] David J. Chalmers. Strong and weak emergence. Australian National University, [6] Marie E. Csete and John C. Doyle. Reverse engineering of biological complexity. Science, 295, [7] I Csiszar. A note on jensen s inequality. Studia Sci. Math. Hungar, 1, [8] Steve Deering. Watching the waist of the internet hourglass. IETF, [9] John C. Doyle and Marie Csete. Architecture, constraints, and behavior. In Donald W. Pfaff, editor, Proceedings of the National Academy of Sciences of the United States, volume 108, pages , Septemeber [10] Sally Floyd and Kevin Fall. Promoting the use of end-to-end congestion control in the internet. IEEE/ACM Trans. Netw., 7(4): , August [11] Marc Kirschner and John Gerhart. Evolvablity. In Proceedings of the National Academy of Sciences of the United States, volume 95, pages , July [12] David Meyer. Macro trends, complexity, and software defined networking, dmm/talks/ausnog2013.pdf, Septemeber [13] Named Data Networking. [14] M. Shand and S. Bryant. IP Fast Reroute Framework. RFC 5714 (Informational), January [15] S.Vidya and R.Bhaskaran. Arp storm detection and prevention measures. In IJCSI International Journal of Computer Science Issues, volume 8, March [16] Nassim Nicholas Taleb. Black swans and the domains of statistics,
11 [17] Xiaoliang Zhao, Dan Pei, Lan Wang, Dan Massey, Allison Mankin, S. Felix Wu, and Lixia Zhang. An analysis of bgp multiple origin as (moas) conflicts. In Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, IMW 01, pages 31 35, New York, NY, USA, ACM. 11
Architectural Musings on SDN ( and now for something completely different )
Architectural Musings on SDN ( and now for something completely different ) David Meyer CTO and Chief ScienDst, Brocade Director, Advanced Technology Center, University of Oregon RIPE 66 May 2013 Dublin,
Border Gateway Protocols
Paper 106, ENG 104 Border Gateway Protocols Sadeta Krijestorac, Marc Beck, Jonathan Bagby Morehead State University University of Louisville Florida Atlanic University [email protected] [email protected]
BPM and SOA require robust and scalable information systems
BPM and SOA require robust and scalable information systems Smart work in the smart enterprise Authors: Claus Torp Jensen, STSM and Chief Architect for SOA-BPM-EA Technical Strategy Rob High, Jr., IBM
Macro Trends, Complexity, and So6ware Defined Networking
Macro Trends, Complexity, and So6ware Defined Networking David Meyer CTO and Chief ScienAst, Brocade Director, Advanced Technology Center, University of Oregon NANOG 58 New Orleans, Louisiana dmm@{brocade.com,uoregon.edu,1-4-
Extend the value of your core business systems.
Legacy systems renovation to SOA September 2006 Extend the value of your core business systems. Transforming legacy applications into an SOA framework Page 2 Contents 2 Unshackling your core business systems
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
CHAPTERS A NEW KNOT MODEL FOR COMPONENT BASED SOFTWARE DEVELOPMENT
CHAPTERS A NEW KNOT MODEL FOR COMPONENT BASED SOFTWARE DEVELOPMENT CONTENTS 5.1 Introduction 5.2 Component based software life cycle process model 5.2.1 Rapid Application Development Model 5.2.2 The Y
Performance of networks containing both MaxNet and SumNet links
Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures
Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures T. Anji Kumar [email protected] Dept. of IT/ UCEV JNTUK Vizianagaram, 535003, India Dr MHM Krishna Prasad Dept.
A SYSTEMS MODEL OF PROJECT MANAGEMENT
A SYSTEMS MODEL OF PROJECT MANAGEMENT Richard Brian Barber Research Student School of Civil Engineering Australian Defence Force Academy Canberra ACT Australia 2600 [email protected] INTRODUCTION
A Framework for the Semantics of Behavioral Contracts
A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK [email protected] Abstract. Contracts have proved a powerful concept
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
Network Virtualization
Network Virtualization Jennifer Rexford Advanced Computer Networks http://www.cs.princeton.edu/courses/archive/fall08/cos561/ Tuesdays/Thursdays 1:30pm-2:50pm Introduction Motivation for network virtualization
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
NETWORK ISSUES: COSTS & OPTIONS
VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Introduction to Software Engineering
CS1Ah Lecture Note 7 Introduction to Software Engineering In this note we provide an overview of Software Engineering. The presentation in this lecture is intended to map out much of what we will study
A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Overview.
A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Andersen Consultng 1600 K Street, N.W., Washington, DC 20006-2873 (202) 862-8080 (voice), (202) 785-4689 (fax) [email protected]
Weaving the Software Development Process Between Requirements and Architectures
Weaving the Software Development Process Between and s Bashar Nuseibeh Computing Department The Open University Walton Hall Milton Keynes MK7 6AA, U.K. Email:[email protected] ABSTRACT This position
Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov [email protected]
Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov [email protected] Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics
On the Use of Traffic Monitoring and Measurements for Improving Networking
On the Use of Traffic Monitoring and Measurements for Improving Networking Sílvia Farraposo 1, Philippe Owezarski 2, Edmundo Monteiro 3 1 Escola Superior de Tecnologia e Gestão de Leiria, Morro do Lena
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
CHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful
Chapter 2: Transparent Computing and Cloud Computing. Contents of the lecture
Chapter 2: Transparent Computing and Computing Lecture 2 透 明 计 算 与 云 计 算 的 关 联 Prof. Zixue Cheng 程 子 学 University of Aizu, 会 津 大 学 Visiting Professor of CSU 1 Contents of the lecture Definition, Architecture
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)
A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia
THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES
THE GEOMORPHIC VIEW OF NETWORKING: A NETWORK MODEL AND ITS USES Pamela Zave AT&T Laboratories Research Florham Park, New Jersey, USA Jennifer Rexford Princeton University Princeton, New Jersey, USA THE
Requirements for Simulation and Modeling Tools. Sally Floyd NSF Workshop August 2005
Requirements for Simulation and Modeling Tools Sally Floyd NSF Workshop August 2005 Outline for talk: Requested topic: the requirements for simulation and modeling tools that allow one to study, design,
Optimization models for congestion control with multipath routing in TCP/IP networks
Optimization models for congestion control with multipath routing in TCP/IP networks Roberto Cominetti Cristóbal Guzmán Departamento de Ingeniería Industrial Universidad de Chile Workshop on Optimization,
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
Qualifying SDN/OpenFlow Enabled Networks
Qualifying SDN/OpenFlow Enabled Networks Dean Lee Senior Director, Product Management Ixia Santa Clara, CA USA April-May 2014 1 Agenda SDN/NFV a new paradigm shift and challenges Benchmarking SDN enabled
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Service Performance Management: Pragmatic Approach by Jim Lochran
www.pipelinepub.com Volume 3, Issue 12 Service Performance Management: Pragmatic Approach by Jim Lochran As the mix of service provider offerings become more IP centric, the need to overhaul existing service
Controlling the Internet in the era of Software Defined and Virtualized Networks. Fernando Paganini Universidad ORT Uruguay
Controlling the Internet in the era of Software Defined and Virtualized Networks Fernando Paganini Universidad ORT Uruguay CDS@20, Caltech 2014 Motivation 1. The Internet grew in its first 30 years with
Panopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks
Panopticon: Reaping the benefits of Incremental SDN Deployment in Enterprise Networks Dan Levin withmarco Canini, Stefan Schmid, Fabian Schaffert, Anja Feldmann Enterprise Network Management Policy changes
CLOUD MIGRATION STRATEGIES
CLOUD MIGRATION STRATEGIES Faculty Contributor: Dr. Rahul De Student Contributors: Mayur Agrawal, Sudheender S Abstract This article identifies the common challenges that typical IT managers face while
Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications
Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,
In developmental genomic regulatory interactions among genes, encoding transcription factors
JOURNAL OF COMPUTATIONAL BIOLOGY Volume 20, Number 6, 2013 # Mary Ann Liebert, Inc. Pp. 419 423 DOI: 10.1089/cmb.2012.0297 Research Articles A New Software Package for Predictive Gene Regulatory Network
Software Engineering. Hans van Vliet Vrije Universiteit Amsterdam, The Netherlands email: [email protected]
Software Engineering Hans van Vliet Vrije Universiteit Amsterdam, The Netherlands email: [email protected] ARIANE Flight 501 http://www.youtube.com/watch?v=gp_d8r-2hwk Disintegration after 39 sec origin of
Elite: A New Component-Based Software Development Model
Elite: A New Component-Based Software Development Model Lata Nautiyal Umesh Kumar Tiwari Sushil Chandra Dimri Shivani Bahuguna Assistant Professor- Assistant Professor- Professor- Assistant Professor-
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Measuring IP Performance. Geoff Huston Telstra
Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour
Engineering Process Software Qualities Software Architectural Design
Engineering Process We need to understand the steps that take us from an idea to a product. What do we do? In what order do we do it? How do we know when we re finished each step? Production process Typical
Communication Networks. MAP-TELE 2011/12 José Ruela
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe
Building MPLS VPNs with QoS Routing Capability i
Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358
A Service-oriented Architecture for Business Intelligence
A Service-oriented Architecture for Business Intelligence Liya Wu 1, Gilad Barash 1, Claudio Bartolini 2 1 HP Software 2 HP Laboratories {[email protected]} Abstract Business intelligence is a business
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is
IT4504 - Data Communication and Networks (Optional)
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
MEng, BSc Applied Computer Science
School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet
How Router Technology Shapes Inter-Cloud Computing Service Architecture for The Future Internet Professor Jiann-Liang Chen Friday, September 23, 2011 Wireless Networks and Evolutional Communications Laboratory
FAQ to ENISA s report on technologies to improve the resilience of communication networks
FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest
Active Queue Management and Wireless Networks
Active Queue Management and Wireless Networks Vikas Paliwal November 13, 2003 1 Introduction Considerable research has been done on internet dynamics and it has been shown that TCP s congestion avoidance
White Paper: Assessing Performance & Response Time Requirements
White Paper: Assessing Performance & Response Time Requirements Mark Houghtlin IBM Cloud Advisory Services & Application Performance Optimization Consulting Practice Agenda Workload Transformation Analysis
Bandwidth Management in MPLS Networks
School of Electronic Engineering - DCU Broadband Switching and Systems Laboratory 1/17 Bandwidth Management in MPLS Networks Sanda Dragos & Radu Dragos Supervised by Dr. Martin Collier email: [email protected]
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations
A Network Recovery Scheme for Node or Link Failures using Multiple Routing Configurations Suresh Babu Panatula Department of Computer Science and Engineering Sri Sai Aditya Institute of Science and Technology,
A Framework for End-to-End Proactive Network Management
A Framework for End-to-End Proactive Network Management S. Hariri, Y. Kim, P. Varshney, Department of Electrical Engineering and Computer Science Syracuse University, Syracuse, NY 13244 {hariri, yhkim,varshey}@cat.syr.edu
Challenges and Opportunities for formal specifications in Service Oriented Architectures
ACSD ATPN Xi an China June 2008 Challenges and Opportunities for formal specifications in Service Oriented Architectures Gustavo Alonso Systems Group Department of Computer Science Swiss Federal Institute
Network Architecture and Topology
1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end
MPLS is the enabling technology for the New Broadband (IP) Public Network
From the MPLS Forum Multi-Protocol Switching (MPLS) An Overview Mario BALI Turin Polytechnic [email protected] www.polito.it/~baldi MPLS is the enabling technology for the New Broadband (IP) Public
Make Better Decisions with Optimization
ABSTRACT Paper SAS1785-2015 Make Better Decisions with Optimization David R. Duling, SAS Institute Inc. Automated decision making systems are now found everywhere, from your bank to your government to
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Custom Web Development Guidelines
Introduction Custom Web Development Guidelines Unlike shrink wrap software, custom software development involves a partnership between the architect/programmer/developer (SonicSpider) and the owner/testers/users
CRITICAL CHAIN AND CRITICAL PATH, CAN THEY COEXIST?
EXECUTIVE SUMMARY PURPOSE: This paper is a comparison and contrast of two project management planning and execution methodologies: critical path methodology (CPM) and the critical chain project management
MPLS VPN Security Best Practice Guidelines
Security Best Practice Guidelines con 2006 May 24 2006 Monique Morrow and Michael Behringer Distinguished Consulting Engineer and Distinguished Systems Engineer Cisco Systems, Inc. [email protected] [email protected]
Integration Guide. EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide
Integration Guide EMC Data Domain and Silver Peak VXOA 4.4.10 Integration Guide August 2013 Copyright 2013 EMC Corporation. All Rights Reserved. EMC believes the information in this publication is accurate
Managing TM1 Projects
White Paper Managing TM1 Projects What You ll Learn in This White Paper: Traditional approaches to project management A more agile approach Prototyping Achieving the ideal outcome Assessing project teams
Towards P2P-based Computer Network Management *
Towards P2P-based Computer Network Management * Hui Xu, and Debao Xiao Department of Computer Science, Huazhong Normal University Wuhan, P.R. China, 430079 [email protected] Abstract Nowadays, the
A Service Platform for Subscription-Based Live Video Streaming
A Service Platform for Subscription-Based Live Video Streaming Kelum Vithana 1, Shantha Fernando 2, Dileeka Dias 3 1 Dialog - University of Moratuwa Mobile Communications Research Laboratory 2 Department
(Refer Slide Time: 4:45)
Digital Voice and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 38 ISDN Video Conferencing Today we
VMDC 3.0 Design Overview
CHAPTER 2 The Virtual Multiservice Data Center architecture is based on foundation principles of design in modularity, high availability, differentiated service support, secure multi-tenancy, and automated
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Software Defined Networking
Software Defined Networking Richard T. B. Ma School of Computing National University of Singapore Material from: Scott Shenker (UC Berkeley), Nick McKeown (Stanford), Jennifer Rexford (Princeton) CS 4226:
Networking Research: Trends and Issues
1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of
RF System Design and Analysis Software Enhances RF Architectural Planning
From April 2010 High Frequency Electronics Copyright 2010 Summit Technical Media, LLC RF System Design and Analysis Software Enhances RF Architectural Planning By Dale D. Henkes Applied Computational Sciences
INTEGRATION STRATEGIES FOR ISVS: PART I
INTEGRATION STRATEGIES FOR ISVS: PART I INTRODUCTION Most, if not all, analysts covering the SaaS industry today would agree that integration has become a major, if not the number one, barrier to SaaS
Corporate Network Services of Tomorrow Business-Aware VPNs
Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution
White Paper FPGA Performance Benchmarking Methodology
White Paper Introduction This paper presents a rigorous methodology for benchmarking the capabilities of an FPGA family. The goal of benchmarking is to compare the results for one FPGA family versus another
Autonomic computing: strengthening manageability for SOA implementations
Autonomic computing Executive brief Autonomic computing: strengthening manageability for SOA implementations December 2006 First Edition Worldwide, CEOs are not bracing for change; instead, they are embracing
Voice Over IP Performance Assurance
Voice Over IP Performance Assurance Transforming the WAN into a voice-friendly using Exinda WAN OP 2.0 Integrated Performance Assurance Platform Document version 2.0 Voice over IP Performance Assurance
