Auction Models for Multi-Provider Internet Connections

Size: px
Start display at page:

Download "Auction Models for Multi-Provider Internet Connections"

Transcription

1 Auction Models for Multi-Provider Internet Connections Peter Reichl, George Fankhauser, Burkhard Stiller Computer Engineering and Networks Laboratory TIK, ETH Zürich, Gloriastrasse 35, CH 8092 Zürich, Switzerland, [ reichl stiller ]@tik.ee.ethz.ch, gfa@acm.org Abstract Auctions are a widely used approach for determining the current market price for congested resources. However, using them for real systems, such as the Internet, the auction algorithms require modifications as soon as connections cover links from more than one Internet Service Provider. This paper presents work in progress on two new auction schemes that have been designed to overcome this problem. 1 Introduction As current developments are driving the Internet more and more towards commercial use, the question of charging users for using the Internet has become of rapidly increasing importance. The last years have seen a couple of proposals for pricing models for communication services (for a summarizing overview cf., e.g., [1]). Unfortunately, most of them remain on a rather theoretical level, without paying too much attention to practical problems, such as implementability with minimized overhead or scalability in tomorrow s Internet architecture, and as they are tackled, e.g., within a project aimed at building a charging and accounting platform for integrated services Internet traffic [2]. One of the overall problems to be solved in charging of communication services is determined on one hand by the goal to provide incentive-compatible charging approaches (including revenue perspectives for providers as well as transparent pricing structures for end customers) and on the other hand by the objective to minimize the technical efforts allowing for a clear and unique identification of these incentives. This paper deals with two extensions of the wellknown concept of Generalized Vickrey Auctions (GVA, also known as Second-Price Auctions) which are under discussion for use in such a platform and have been designed to allow for a dynamic pricing of flow-based Internet traffic crossing more than one Internet Service Provider (ISP). To this end, Section 2 introduces shortly the main ideas behind GVAs, whereas Section 3 discusses a first adaptation, i.e. the concept of Delta Auctions (DA), and surveys some recent implementation results. A new auction model called CHiPS (Connection-Holder-is-Preferred-Scheme) is proposed in Section 4, before a short summary concludes the paper. 2 Generalized Vickrey Auctions In a seminal paper, [3] introduced the idea of a Smart Market as an efficient mechanism for congestion control by usage-sensitive pricing schemes. Here, the price for sending a packet usually varies on a very short time scale (e.g. minute by minute). Each packet contains a bid field were the user states the price she is willing to pay for the packet to be transmitted by the network. The packet is transmitted if the corresponding bid exceeds the current marginal cost of transportation. An important feature is that the user usually does not pay her actual bid, but rather the lower market-clearing price, i.e. the maximum of bids by users that could not be admitted. This concept of GVA has the advantage that the optimal strategy for the user is to bid her true value of the respective resource - trying to fool the market can be shown to yield non-optimal results for the user (incentive compatibility). This concept has been extended from the original centralized packet-oriented case into various directions, especially towards floworiented reservation-based scenarios ([4], [5]). 3 Delta Auction Distributing Classical Auctions for Multiple Resources over Time As a basic model for flow-based dynamic pricing using auctions (as proposed by [4]) we assume a reservation protocol (signalling) that is able to transport pricing and bidding information. As shown in Figure 1, the bidding and reservation request start at the data flow s receiving side (this can be reversed or split, but for the sake of simplicity we assume a receiver based model here). Each provider performs independent local auc-

2 tions over all flows currently active on a particular outgoing link. S P P P P R DATA FLOW Figure 1. Basic resource reservation signalling is used to transport bids from receivers (R) to providers (P) and finally back to the sender (S) along a connection s path. Bid Applying such a Smart Market scheme towards a real Internet charging and pricing system poses a first major difficulty with respect to signalling: Auctions taking place at discrete moments in time may cause huge signalling bursts immediately after each auction. Moreover, bidding users always have to wait until the next auction has been finished for getting an answer to their requests (with multi-provider connections this holds in fact for each subsequent node). This adds up to an additional reservation setup delay of ( n 2) p i on average, where n is the number of providers and p is the reservation period at provider i (or the auction interval). Since so-called refresh-periods of Internet resource reservation protocols are in the order of tens of seconds, this approach is not practical. Therefore, in [6] we have proposed the concept of Delta Auctions (DA) in order to allow auctions to take place continuously. Arriving requests are processed immediately, and bids that are too low are refused right away (thus preventing users from unnecessary waiting at each provider). Sufficient bids are accepted provisionally, but there is the possibility that bids arriving later may exceed those and thus oust them from the auction. The main advantage of this scheme is that a user is informed very early about refused reservations, and moreover the signalling traffic is distributed over time in a quite uniform way. On the other hand, for users that have been provisionally accepted there remains some uncertainty about whether their provisional reservation will in fact be finally confirmed. We have implemented and evaluated DAs with two reservation protocols, namely SSP (State Setup Protocol) [9] and RSVP (Resource Reservation Protocol) [7] which both are receiver initiated. The observation made in this paper were obtained by running RSVP with DAs on the ns-2 simulation platform [8]. For saving further signalling traffic it has been decided to express the bid for a packet in terms of percent of the current market price. The evaluation has shown, however, that this may yield to preferring bids that arrive later within an auction period. As a solution of this problem it has been investigated whether it makes sense to use the marketclearing price of the previous auction as a fixed price and calculate the bids relatively to that. Figure 2 shows an example of eight bidders that use the same link and take part in the same auction therefore. Bidder 1 is always the first while bidder 8 is always the last one to enter the auction process. The solid line was obtained by calculating the bid relative to the current market price. Out of the 300 auctions performed, the late comers show a clear advantage since they base their bids on pricing information of the soonto-be-closed market. The dashed line shows a rather fair distribution of winners since the market price used is that of the previous period i-1 and is therefore constant over the auction period i. The obvious drawback of this scheme is a slight error to the pure form of a 2nd price auction. However, it is only as worse as the degree of market fluctuations. # of auctions won Bid relative to market Bid relative to previous price time of reservation Figure 2. Bidding relative to ongoing Delta Auctions gives an advantage to late comers. Another aspect that has been evaluated is whether it is possible for a user to analyze signalling messages in a clever way and thus finding out the exact auction moments which could give her a certain competition advantage, but it has turned out that this yields no major fairness problem for sufficiently high numbers of providers and bidders. In practice, intercepting signalling between two hosts where an attacker does not have access is not impossible but quite difficult. Doing so for several links and possible thousands of flows to gain a market advantage is even harder. 4 CHiPS A Multi-Provider Auction Model As shown in Section 3, the concept of Delta Auctions provides a solution for the delay problem caused by multiple auctions being necessary for setting up a connection crossing a couple of Internet Service Providers. The current section deals with another aspect of multi-provider Internet connections. Assume that an end-to-end connection has already been established and

3 is refreshed from time to time by performing auctions respectively. Imagine that due to unlucky circumstances the market situation on a small part of the connection changes suddenly and the respective next auction is lost therefore. Then this local loss causes eventually the whole connection to be torn down, because resources have to be guaranteed end-to-end. Therefore, it is necessary to develop a scheme that first tries to solve such local problems locally, i.e. at the ISP itself. We propose a scheme that is based on a different interpretation of the auction outcome: the auction mechanism still is used to determine a ranking among the bidders as well as the market-clearing price. But for a newly arriving bidder being highly ranked is no longer equivalent with being allocated the desired resource. Instead, the holders of already running connections are preferred in the sense that even if their bids should have been too low w.r.t. the current market situation, they still get a second chance to improve their bids while their connections are not torn down for the immediate future (i.e. for the next auction cycle). The resulting scheme is called CHiPS (Connection- Holder-is-Preferred-Scheme). Summarized shortly, it has been developed based on the concepts introduced in the previous sections, with respect to the following important aspects: Dynamic pricing of multi-provider connections in the context of a real RSVP-based Internet charging and accounting system. Preventing multi-provider connections from being torn down because one auction has been lost locally, i.e. at only one of a couple of providers. Reinterpretation of the concept of user budgets: Classical auction schemes require each bidder to consider her budget (or spending cap), i.e. a user cannot bid more than her budget allows. But this concept does not bear in mind that with GVAs, the user actually pays less than her bid, hence usually won t spend the full amount of her budget. One of the major advantages of CHiPS is that the user s spending cap limits her real expenses instead of her bids. As with DAs, CHiPS requires that for each resource auctions take place regularly after each expiration of a given time period, and that reservations are possible and valid only for whole time periods. Moreover, each customer is allowed to send only one bid per time slot. Note that it may clearly happen that more than one auction is lost at the same moment (in fact, if the spending cap is very low, it is possible that more or less all auctions may fail), but for the sake of simplicity we deal first with the case of only one lost auction, as this is a very typical situation due to certain bottlenecks within a network. CHiPS may well deal with the case of more than one lost auction, too. Moreover, if there is a large number of auctions lost in one instant, this is a clear indication that the bids are generally too low and that hence the spending cap in connection with the relative bid strategy may not be sufficient for the requested connection at the current market situation. 4.1 Auctions under CHiPS Even if we consider a multi-provider scenario, the single auctions are still performed locally, e.g. at each separate provider. Therefore, we first deal with the way a separate auction looks like under CHiPS. Consider a single resource (capacity C) with auctions taking place at times t 1, t 2 etc., where t 2 t 1 = t 3 t 2 =... = const. Let us assume that at time t 1 it is known that at time t 2 a certain number of reservations will terminate or will be forced to terminate, and that therefore an amount C of link capacity will be free. Furthermore, between t 1 and t 2 a couple of reservation requests with unit price bids for the period starting with time t 2 arrive. Then there are two questions: Which of the reserved requests should be allocated? And which price has to be paid for using allocated resources? Classical Generalized Vickrey auctions couple these two questions in the sense that the highest bidders are allocated their desired resources and pay the market clearing price for them. On the contrary, CHiPS decouples these two issues as follows Allocation of Reservation Requests The obvious answer to the first question still is: the requests with highest bids are allocated, but this is only the case for the free capacity C instead as for the total capacity C, moreover the auction takes place only between newly arriving requests. In other words: an normal auction over capacity C takes place between the requests arriving newly between t 1 and t 2, with the highest bidding requests winning the allocation of the partial capacity C free at time t 2. Note that this allows sending negative acknowledges already during the period as soon as it is clear that a certain request won t belong to the winning ones Pricing Allocated Reservations To calculate the correct market price at time t 2, a fictitious auction has to take place between all relevant users, i.e. the ones already holding capacity and all the new bidders. Among these users, a second-price auction reveals the correct market price. Now, it is possible that some of the connection-holders have bids below that market price. These users receive a message telling them to increase their bids for that period ex post such that it excesses the calculated market price, otherwise they are forced to terminate the reservation at time t 3. This mechanism guarantees that no user is forced to pay more than she previously has agreed to.

4 4.2 Consequences As all incoming bids are considered in the fictitious auction, the price paid by allocated reservations equals essentially the correct market price of a second-price auction (except for holding users with bids below the market price which are not willing to rise their bids. Note that the ISP has to bear that risk and may want to distribute this slight overhead o the service in general, either in form of a flat fee or factor to the market price). This gives rise to the hope that incentive compatibility, the essential advantage of GVAs, might be preserved by that scheme. Currently, an extensive simulative investigation is performed to answer this question. No user will ever pay more than she previously has agreed to. In case the price for the connection is about to increase, the user is given the chance to withdraw without additional payment. Traditional auctions concentrate the signalling load heavily around the auction moment. The new scheme aims at distributing the signalling continuously over time. E.g., the first part of the interauction period can be used for the rebidding procedures of holding users bidding below the market price, the second part can be used for messages to new arriving requests which have no chance to be allocated. Current simulation are optimizing this point as well. One of the most important advantages of the new scheme is the fact that it does not interrupt running connections abruptly. There is always one slot time for rebidding. Note that the proposed scheme is equivalent to a second-price auction where the set of the auction winners is not identical to the set of allocated reservation requests. But the market price itself is calculated correctly as the fictitious auction considers all bidding users and takes place in the usual smart market way. Another advantage lies in holding users bidding quietly with their bid used so far. This might save additional signalling messages. Summarized shortly, using traditional auctions to determine the total price for connections which consist of a sequence of resources (esp. from different Internet Service Providers) immediately encounters a couple of difficulties like: The auctions for the single resources are not synchronized at all. Therefore, it is difficult for the user to maintain consistent information about the number, location, current market situation etc. of the different resources she has to gather for her actual connection. Moreover, she is not supposed to bid separately for each single resource, but to set the price she is willing to pay for reserving the connection as a whole (i.e. without dividing her bid explicitly among the independent auctions for each necessary resource). For establishing a connection, valid reservations on each link belonging to the respective route are necessary. With common models, as soon as the auction for one link is lost, the whole connection is breaking down instantaneously. The new model deals with these issues in an elegant way. Provided a connection is already established, the user may well loose an auction for a single link without the connection being automatically interrupted. Instead, the user receives a message telling her that on a certain link the market price has risen and asking whether she is willing to pay the new market price. In this case, the user has enough time to check her overall budget and accepting the new price for the relevant single link. In this way, the auctions necessary for the whole connection are decoupled. 4.3 Implementation Issues There remain two issues to be solved: Is there a clever way to establish a multi-provider connection, and how does increasing the bid ex post after a lost auction can work in practice. Whereas the first question is subject of future investigations, we present some alternatives to deal with the second one. Using RSVP, it is possible to address messages directly to a single ISP. We have already seen in Section 3 (cf. Figure 1) that it is possible to use RSVP messages for exchanging bids. To be more detailed, an RSVP message is composed of an RSVP header and an RSVP body, which itself contains RSVP objects. In addition, a couple of specific pricing objects have been designed [7] which are contained in the RSVP body as well. Amongst others, these pricing objects include a BID-object that is used to deliver the bid relative to the current or previous market price (as with DA, Section 3) and a PROVIDER-object containing a provider key that allows identifying the ISP where the local auction has been lost. Hence, as soon as an auction has been lost, it is possible to send an RSVP error message to the user which contains a specific provider key. The user is then able to increase explicitly the bid for this very auction.

5 Another proposal tries to avoid sending a message from the user to an ISP lying somewhere on the route by introducing a new bid structure: Assume, each bid b i has the form b i = a i + m i f (1) where m i is the current market price at ISP i, f is a factor transported by the BID-object to deliver a bid in terms of percent of the current market price, and a i is a constant held locally at the auctioneer which is initialized as 0. As soon as an auction is lost, an RSVP error message is sent from the respective ISP to both endpoints of the connection. This message contains the difference d between the current market price (i.e. the auction outcome) and the absolute value of the last bid. On its way to both sender and receiver, this message passes every other ISP involved in the connection and asks him to decrease the respective constant a i by the value of d. Now the bidder is able to decide whether her spending cap allows her to increase the expenses for the lost part of the connection by d ; if she eventually agrees with increasing her bid for the specific lost auction, she performs a rebidding procedure by using a normal RSVP end-to-end-message that asks each ISP to increase the constant a i by d. In this way, the bids finally have not changed except for the lost auction where the bid has been increased exactly by the necessary amount. Moreover, with this linear bid structure of (1) it is possible to bid for risky auctions (i.e. auctions where the market price tends to vary heavily) in a specific way, i.e. by adding for security reasons a constant amount towards each bid, independently of the relative bidding factor f. Both these approaches as well as problems connected with a possible partial loss of the RSVP error message are currently subject of further investigations. 5 Summary and Conclusions This paper has presented two auction concepts that are currently investigated for use within a real charging and accounting platform for an Integrated Services Internet. This is still work in progress. Dynamic pricing as a method to achieve economically efficient prices may be deployed in the Internet, since the technical efforts required do not pose a major additional overhead. Furthermore, price transparency and long-term stability may be offered as an additional service level through brokers that are willing to take over the risk at a premium. Current research deals especially with a clever method for establishing new end-to-end connections in a CHiPS-governed multi-provider network. Of course, besides these auction models, also volume-based pricing is under discussion as an alternative charging support. It is currently adapted to the special needs of an Internet charging and accounting platform. As long as dynamic pricing schemes are (a) efficiently implementable, (b) volume-based pricing schemes are requested for, and (c) flat-fee pricing schemes exist, a combination of these schemes in real networks will co-exist, mainly depending on the service class requested or the quality demanded for. Important to note, besides the selection of a pricing model for an ISP, the question of setting the base price for a service class in terms of monetary units remains open and depends also on the underlying business model. Acknowledgements Thanks to Marc Greis for providing a preview release of RSVP on ns-2 and to Beat Spielmann for many helpful discussions. References [1] P. Reichl, S. Leinen, B. Stiller: A Practical Review of Pricing and Cost Recovery for Internet Services. Internet Economic Workshop Berlin, Germany, May 28 29, [2] B. Stiller, T. Braun, M. Günter, B. Plattner: The CATI Project Charging and Accounting Technology for the Internet; 4th European Conference on Multimedia Applications, Services, and Techniques (ECMAST 99), Madrid, Spain, LNCS Vol. 1629, Springer, Berlin, Germany, May 26 28, 1999, pp [3] J. K. MacKie-Mason, H. Varian: Pricing the Internet. In: Kahin and Keller (eds.): Public Access to the Internet. Prentice Hall [4] J. MacKie-Mason: A Smart Market for Resource Reservation in a Multiple Quality of Service Information Network. Technical Report, University of Michigan, U.S.A., September [5] A. Lazar, N. Semret: Auctions for Network Resource Sharing. CTR Technical Report. Columbia University New York, U.S.A., February [6] G. Fankhauser, B. Stiller, C. Vögtli, B.Plattner: Reservation-based Charging in an Integrated Services Network. 4th INFORMS Telecommunications Conference, Bocca Raton, Florida, U.S.A., March [7] M. Foser: Pricing und Routen-Selektion für RSVP Flows in einer Simulationsumgebung. Student s thesis, TIK, ETH Zürich, Switzerland, February [8] UCB/LBNL/VINT Network Simulator - ns (version 2), [9] H. Adiseshu, G. Parulkar, R. Yavatkar: A State Management Protocol for IntServ, DiffServ and Label Switching. ICNP 98, 6th IEEE International Conference on Network Protocols, October 1998.

A Practical Review of Pricing and Cost Recovery for Internet Services

A Practical Review of Pricing and Cost Recovery for Internet Services A Practical Review of Pricing and Cost Recovery for Internet Services Peter Reichl 1, Simon Leinen 2, Burkhard Stiller 1 1 Computer Engineering and Networks Laboratory TIK, ETH Zürich, Gloriastrasse 35,

More information

Open Charging and QoS Interfaces for IP Telephony

Open Charging and QoS Interfaces for IP Telephony Open Charging and QoS Interfaces for IP Telephony Burkhard Stiller, George Fankhauser, Gabriela Joller, Peter Reichl, Nathalie Weiler Computer Engineering and Networks Laboratory TIK, ETH Zürich, Gloriastrasse

More information

Pricing and Cost Recovery for Internet Services: Practical Review, Classification, and Application of Relevant Models

Pricing and Cost Recovery for Internet Services: Practical Review, Classification, and Application of Relevant Models Pricing and Cost Recovery for Internet Services: Practical Review, Classification, and Application of Relevant Models Burkhard Stiller 1, Peter Reichl 1, Simon Leinen 2 1 Computer Engineering and Networks

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

Bandwidth Measurement in Wireless Networks

Bandwidth Measurement in Wireless Networks Bandwidth Measurement in Wireless Networks Andreas Johnsson, Bob Melander, and Mats Björkman {andreas.johnsson, bob.melander, mats.bjorkman}@mdh.se The Department of Computer Science and Engineering Mälardalen

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Video Streaming with Network Coding

Video Streaming with Network Coding Video Streaming with Network Coding Kien Nguyen, Thinh Nguyen, and Sen-Ching Cheung Abstract Recent years have witnessed an explosive growth in multimedia streaming applications over the Internet. Notably,

More information

VoIP versus VoMPLS Performance Evaluation

VoIP versus VoMPLS Performance Evaluation www.ijcsi.org 194 VoIP versus VoMPLS Performance Evaluation M. Abdel-Azim 1, M.M.Awad 2 and H.A.Sakr 3 1 ' ECE Department, Mansoura University, Mansoura, Egypt 2 ' SCADA and Telecom General Manager, GASCO,

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

A Business Model for Charging and Accounting of Internet Services

A Business Model for Charging and Accounting of Internet Services A Business Model for Charging and Accounting of Internet Services Helmut Kneer 1, Urs Zurfluh 1, Gabriel Dermler 2, Burkhard Stiller 3 1 Institut für Informatik IFI, University of Zürich, Switzerland,

More information

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose

Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Midterm Exam CMPSCI 453: Computer Networks Fall 2011 Prof. Jim Kurose Instructions: There are 4 questions on this exam. Please use two exam blue books answer questions 1, 2 in one book, and the remaining

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Internet Protocol Address

Internet Protocol Address SFWR 4C03: Computer Networks & Computer Security Jan 17-21, 2005 Lecturer: Kartik Krishnan Lecture 7-9 Internet Protocol Address Addressing is a critical component of the internet abstraction. To give

More information

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) MPLS VPN in Cellular Mobile IPv6 Architectures(04##017) Yao-Chung Chang, Han-Chieh Chao, K.M. Liu and T. G. Tsuei* Department of Electrical Engineering, National Dong Hwa University Hualien, Taiwan, Republic

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

CATI Charging and Accounting Technology for the Internet CAPIV and MEDeB

CATI Charging and Accounting Technology for the Internet CAPIV and MEDeB CATI Charging and Accounting Technology for the Internet CAPIV and MEDeB Bernhard Plattner, Burkhard Stiller (ETH Zürich, TIK) Torsten Braun (University of Berne, IAM) CATI Project Partners Computer Engineering

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,

More information

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015 ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1

More information

AE64 TELECOMMUNICATION SWITCHING SYSTEMS

AE64 TELECOMMUNICATION SWITCHING SYSTEMS Q2. a. Draw the schematic of a 1000 line strowger switching system and explain how subscribers get connected. Ans: (Page: 61 of Text book 1 and 56 of Text book 2) b. Explain the various design parameters

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

c 2008 Je rey A. Miron We have described the constraints that a consumer faces, i.e., discussed the budget constraint.

c 2008 Je rey A. Miron We have described the constraints that a consumer faces, i.e., discussed the budget constraint. Lecture 2b: Utility c 2008 Je rey A. Miron Outline: 1. Introduction 2. Utility: A De nition 3. Monotonic Transformations 4. Cardinal Utility 5. Constructing a Utility Function 6. Examples of Utility Functions

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Preventing Resource Exhaustion Attacks in Ad Hoc Networks Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585

More information

A Model for Value-added Internet Service Provisioning

A Model for Value-added Internet Service Provisioning 26 A Model for Value-added Internet Service Provisioning Helmut Kneer, Urs Zurfluh, Burkhard Stiller² Department of Information Technology IFI, University of Zurich, Switzerland ²Computer Engineering and

More information

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11

A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,

More information

6.6 Scheduling and Policing Mechanisms

6.6 Scheduling and Policing Mechanisms 02-068 C06 pp4 6/14/02 3:11 PM Page 572 572 CHAPTER 6 Multimedia Networking 6.6 Scheduling and Policing Mechanisms In the previous section, we identified the important underlying principles in providing

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks

Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks 1 Current Trends of Topology Discovery in OpenFlow-based Software Defined Networks Leonardo Ochoa-Aday, Cristina Cervello -Pastor, Member, IEEE, and Adriana Ferna ndez-ferna ndez Abstract The explosion

More information

CS 268: Lecture 13. QoS: DiffServ and IntServ

CS 268: Lecture 13. QoS: DiffServ and IntServ CS 268: Lecture 13 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776 1

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Examining Performance Issues of Multiagent Systems

Examining Performance Issues of Multiagent Systems Course Number: SENG 609.22 Session: Fall, 2003 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Tutorial Report Examining Performance Issues

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

Interactive TV Voice TCP/IP UDP/IP RSVP. Sonet. Frame Relay. Figure 1. Hour-glass Model of the Internet

Interactive TV Voice TCP/IP UDP/IP RSVP. Sonet. Frame Relay. Figure 1. Hour-glass Model of the Internet The CATI Project: Charging and Accounting Technology for the Internet Burkhard Stiller 1, Torsten Braun 2, Manuel Günter 2, Bernhard Plattner 1 1 Computer Engineering and Networks Laboratory TIK, ETH Zürich,

More information

Designing a Smart Market Pricing Scheme

Designing a Smart Market Pricing Scheme A Strategy for Implementing Smart Market Pricing Scheme on Diff-Serv Murat Yuksel, Shivkumar Kalyanaraman CS Department, ECSE Department Rensselaer Polytechnic Institute, 11 8th Street, Troy, NY, USA.

More information

Real-time apps and Quality of Service

Real-time apps and Quality of Service Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting

More information

Isolines: Energy-efficient Mapping in Sensor Networks

Isolines: Energy-efficient Mapping in Sensor Networks Isolines: Energy-efficient Mapping in Sensor Networks Ignacio Solis and Katia Obraczka {isolis, katia}@cse.ucsc.edu Computer Engineering Department University of California, Santa Cruz April 15, 2005 Abstract

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme

A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme ANASTASIOS THANOS KTH Information and Communication Technology Master

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution The Challenge Businesses that rely on Microsoft Lync Server must guarantee uninterrupted

More information

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. VII (Sep Oct. 2014), PP 65-70 Roulette Wheel Selection Model based on Virtual Machine Weight

More information

WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE

WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE WHITE PAPER THE PAIN OF IBM LOTUS DOMINO EMAIL BROADCASTING OPTIMIZING DELIVERY PERFORMANCE As a general purpose e-mail system, IBM Lotus Notes/Domino (Domino) provides powerful e-mail authoring, transport,

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

InfiniBand Clustering

InfiniBand Clustering White Paper InfiniBand Clustering Delivering Better Price/Performance than Ethernet 1.0 Introduction High performance computing clusters typically utilize Clos networks, more commonly known as Fat Tree

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna

Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Siuli Roy 1, Dola Saha 1, Somprakash Bandyopadhyay 1, Tetsuro Ueda 2, Shinsuke

More information

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation

Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Adopting SCTP and MPLS-TE Mechanism in VoIP Architecture for Fault Recovery and Resource Allocation Fu-Min Chang #1, I-Ping Hsieh 2, Shang-Juh Kao 3 # Department of Finance, Chaoyang University of Technology

More information

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy

The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy BMI Paper The Effects of Start Prices on the Performance of the Certainty Equivalent Pricing Policy Faculty of Sciences VU University Amsterdam De Boelelaan 1081 1081 HV Amsterdam Netherlands Author: R.D.R.

More information

Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner

Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner Optimizing service availability in VoIP signaling networks, by decoupling query handling in an asynchronous RPC manner Voichiţa Almăşan and Iosif Ignat Technical University of Cluj-Napoca Computer Science

More information

for guaranteed IP datagram routing

for guaranteed IP datagram routing Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,lshi@tssg.org

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Warrants, Certificates and other products

Warrants, Certificates and other products Interconnection Trading System Warrants, Certificates and other products MARKET MODEL DESCRIPTION January 2015 TABLE OF CONTENTS 1. INTRODUCTION 4 1.1. Background 4 1.2. Institutional market configuration

More information

Split TCP for Mobile Ad Hoc Networks

Split TCP for Mobile Ad Hoc Networks 1 Split TCP for Mobile Ad Hoc Networks Swastik Kopparty, Srikanth V. Krishnamurthy, Michalis Faloutsos, Satish K. Tripathi Department of Computer Science and Engineering, University of California, Riverside,

More information

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks

Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,

More information

VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431

VoIP QoS. Version 1.0. September 4, 2006. AdvancedVoIP.com. sales@advancedvoip.com support@advancedvoip.com. Phone: +1 213 341 1431 VoIP QoS Version 1.0 September 4, 2006 AdvancedVoIP.com sales@advancedvoip.com support@advancedvoip.com Phone: +1 213 341 1431 Copyright AdvancedVoIP.com, 1999-2006. All Rights Reserved. No part of this

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage

Lecture 2: Protocols and Layering. CSE 123: Computer Networks Stefan Savage Lecture 2: Protocols and Layering CSE 123: Computer Networks Stefan Savage Last time Bandwidth, latency, overhead, message size, error rate Bandwidth-delay product Delay Bandwidth High-level run through

More information

16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4

16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4 Multimedia Networking Principles Last time Classify multimedia Multimedia Networking Applications Streaming stored audio and video Identify the network Real-time Multimedia: Internet Phone services the

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Web Services in SOA - Synchronous or Asynchronous?

Web Services in SOA - Synchronous or Asynchronous? Web Services in SOA - Synchronous or Asynchronous? Asynchronous Sender Stop Data Start Stop Data Start Receiver Synchronous Sender Data Receiver www.thbs.com/soa Introduction The decision whether to expose

More information

Book One. Beginning Bridge. Supplementary quizzes and play hands. 2011 edition

Book One. Beginning Bridge. Supplementary quizzes and play hands. 2011 edition Book One Beginning Bridge Supplementary quizzes and play hands 2011 edition Chapter One : Getting started with bridge TR1 How many points in each hand? TR2 Hands 1-8 for the first lesson TR3 MiniBridge

More information

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012

CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Wait-Time Analysis Method: New Best Practice for Performance Management

Wait-Time Analysis Method: New Best Practice for Performance Management WHITE PAPER Wait-Time Analysis Method: New Best Practice for Performance Management September 2006 Confio Software www.confio.com +1-303-938-8282 SUMMARY: Wait-Time analysis allows IT to ALWAYS find the

More information

Risk Aversion. Expected value as a criterion for making decisions makes sense provided that C H A P T E R 2. 2.1 Risk Attitude

Risk Aversion. Expected value as a criterion for making decisions makes sense provided that C H A P T E R 2. 2.1 Risk Attitude C H A P T E R 2 Risk Aversion Expected value as a criterion for making decisions makes sense provided that the stakes at risk in the decision are small enough to \play the long run averages." The range

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking

CS 640: Introduction to Computer Networks. Goals of This Class. Goal of Networking. Page 1. Understand principles and practice of networking CS 640: Introduction to Computer Networks Aditya Akella Lecture 1 Introduction http://www.cs.wisc.edu/~akella/cs640/f07 1 Goals of This Class Understand principles and practice of networking ow are modern

More information

Referral fees, referral arrangements and fee sharing

Referral fees, referral arrangements and fee sharing Referral fees, referral arrangements and fee sharing This response to the consultation is prepared by Carter Law LLP. Our experience spans the RTA/PI sector and as such, any criminal advocacy questions

More information

CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY

CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY SEIFEDINE KADRY, KHALED SMAILI Lebanese University-Faculty of Sciences Beirut-Lebanon E-mail: skadry@gmail.com ABSTRACT This paper presents

More information

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1

Performance Analysis of the IEEE 802.11 Wireless LAN Standard 1 Performance Analysis of the IEEE. Wireless LAN Standard C. Sweet Performance Analysis of the IEEE. Wireless LAN Standard Craig Sweet and Deepinder Sidhu Maryland Center for Telecommunications Research

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

A Case for Dynamic Selection of Replication and Caching Strategies

A Case for Dynamic Selection of Replication and Caching Strategies A Case for Dynamic Selection of Replication and Caching Strategies Swaminathan Sivasubramanian Guillaume Pierre Maarten van Steen Dept. of Mathematics and Computer Science Vrije Universiteit, Amsterdam,

More information

Efficient and low cost Internet backup to Primary Video lines

Efficient and low cost Internet backup to Primary Video lines Efficient and low cost Internet backup to Primary Video lines By Adi Rozenberg, CTO Table of Contents Chapter 1. Introduction... 1 Chapter 2. The DVP100 solution... 2 Chapter 3. VideoFlow 3V Technology...

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles

A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles A new cost model for comparison of Point to Point and Enterprise Service Bus integration styles MICHAL KÖKÖRČENÝ Department of Information Technologies Unicorn College V kapslovně 2767/2, Prague, 130 00

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Wide Area Network Latencies for a DIS/HLA Exercise

Wide Area Network Latencies for a DIS/HLA Exercise Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506

More information