Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Size: px
Start display at page:

Download "Peer to peer networking: Main aspects and conclusions from the view of Internet service providers"

Transcription

1 Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract: - Peer to peer applications presently contribute the main part to the traffic volume on broadband access platforms to the Internet. The underlying distributed file sharing systems and data exchange protocols supports new service types to be integrated in IP networks. This paper investigates the traffic profiles and implications of peer to peer applications for resource efficiency, monitoring, control and quality of service on the network layer of service provider platforms. Key-Words: - Peer to peer networking, effect on traffic profiles and quality of service, resource efficiency, monitoring, routing 1 Introduction In addition to the client server architecture, peer to peer networks have established an alternative concept for the distribution of information and data, which has become popular within a few month after Napster made a data exchange protocol available on the Internet for music files. Meanwhile a variety of peer to peer protocols contribute the major portion of the Internet traffic by exchange of video and other data and are a main driver of a recent steep increase in traffic volumes over broadband access platforms. Figure 1 shows a representative measurement of components in the present Internet traffic mix, which depends on the portion of broadband access users. Those figures are also varying in a daily traffic profile, where e.g. web browsing (HTTP) is more relevant in heavy traffic hours than throughout the night time [7][8][10][11]. Besides file sharing, the peer to peer principle supports distributed computation with a balanced utilization of vacant resources including bandwidth in access networks. Communication in peer to peer networks restrict server tasks to the support of the search for data in the network or they work completely distributed without central servers as e.g. the Gnutella network. The download phase following a successful search is always organized between peers. Initial versions of peer to peer protocols are often subjected to a large messaging overhead, which amounts to e.g. 6 kbit/s per connection according to measurement in the Gnutella network [9]. Protocols for large peer to peer networks with several million active nodes obviously have reduced the overhead and improved scalability. Nevertheless, a significant messaging overhead often remains. The data search and selection of sources for downloading establishes routing mechanisms on the application layer, which are usually independent of the routing on the IP network layer. The distribution of data over the peer to peer network and the match of routing strategies on different layers is decisive for an efficient bandwidth utilization in IP platforms. This is a precondition for a good data throughput and thus for the success of the peer to peer protocol and in addition has to be optimized by the service providers. On the other hand, the diversity and variability of peer to peer protocols makes it difficult to monitor or control their traffic [8]. In section 2 we start with a closer look at peer to peer traffic profiles, followed by implications of the up- and download symmetry and the application layer routing in sections 3 and 4. Monitoring and possible caching of peer to peer traffic is discussed in sections 5 and finally the consequences on the quality of service and the prediction of future traffic development are addressed in sections 6 and 7. 2 Peer to peer traffic characteristics Peer to peer applications generate a large traffic volume with downloads of video files of several Gigabyte size as the main driver of long lasting background file transfers % Peer-to-Peer networking & data exchange 10-20% HTTP 15-25% other TCP < 5% UDP Figure 1: Typical composition of the main components of present Internet traffic

2 Despite the increasing volume, peer to peer applications have an overall smoothing effect on traffic profiles as compared to client server architectures: The daily traffic profiles in broadband access platforms typically show busy hours of high activity in the day or in the evening time. For peer to peer traffic, the ratio of the peak to the mean rate is smaller than 1.5 owing to background transfers which often last during the night time, whereas web browsing and many other applications have ratios larger than 2 from the peak to the mean. Thus the long lasting downloads have a smoothing effect on the periodical changes of data transfer activity. There are less hot spots in peer to peer applications than in client server based architectures. For the search phase, this depends on the level of distributed versus server based computing of the peer to peer protocol, whereas the download phases run completely distributed among the nodes. While spontaneous hot spot accesses from many clients to a server can lead to bottlenecks, the hot spot data is soon replicated and afterwards downloaded from many nodes in a peer to peer network. Most of the peer to peer source traffic originates from subscribers with a limited access rate especially for uploads. The upload speed is below 128kbit/s even in most broadband access lines. Then the burstiness of traffic on aggregation links is reduced in short and medium time scales, since statistical multiplexing has a smoothing effect on the variability of the traffic rate. When the user population and thus the number of sessions in parallel is constant and transfer activities in the sessions are independent of each other, then the central limit theorem is applicable to the rate statistics of aggregated traffic being composed of a large number of small and independent flows. Remote access routers often aggregate the traffic of several thousand users at the boundary of IP platforms. As a consequence, the coefficient of variation, i.e. the ratio of the variance to the square of the mean, becomes smaller with the level of aggregation and the traffic rate approaches a Gaussian distribution. Simple link dimensioning rules are available for Gaussian traffic with regard to quality of service aspects [4][5]. 3 Relation of uploads and downloads Peer to peer traffic is symmetrical in up- and downstream direction when comparable nodes are involved as source and destination of a transfer. Since most users are interested in downloading files at first, the peer to peer protocols have to take care of a balanced transfer in both directions. The protocols with widespread usage start to upload data from a node immediately after it has been downloaded as soon as data chunks are available on the application layer. Moreover, they enforce a give and take policy for each participant such that users with a higher upload volume are preferred when they are requesting downloads. On the other hand, broadband access lines are usually asymmetrical with an essentially smaller upstream rate e.g. 128kbit/s 768 kbit/s for ADSL access as offered by Deutsche Telekom. Therefore the upstream capacity in broadband access platforms becomes a bottleneck for peer to peer applications. In measurement of upstream traffic the peer to peer portion is even more prevalent with up to 90% than on backbone links as in figure 1 or downstream. Symmetrical access lines would be more appropriate for peer to peer data exchange, but if service providers would replace ADSL lines with symmetrical DSL at comparable speed, i.e. 448kbit/s 448 kbit/s instead of 128kbit/s 768 kbit/s, then peer to peer traffic can be expected to increase with the upstream speed. This shows that enforcing a close relation between up- and download volume of each user is essential in order to achieve a high throughput of peer to peer traffic on broadband IP platforms. 4 Routing on application layer Peer to peer networks establish their own routing on the application layer. Different routing principles are in use with consequences for the efficiency and scalability. Earlier versions of the Gnutella network simply forwarded broadcast search requests to all neighbours within a limited distance measured by the hop count, i.e. the number of intermediate nodes. In this way a large amount of messages are exchanged for each search, which imposed restrictions on the Gnutella network scalability [9]. Presently, peer to peer protocols often introduce hierarchically structured search nodes to reduce the overhead together with functions known from IP routing like hello messages to confirm connectivity to the peers. Nevertheless, a significant messaging

3 overhead can be observed in large peer to peer networks. The implementation of two independent routing layers causes inefficiency at the extend of the mismatch between different underlying network structures. 5 Monitoring and analysis of peer to peer applications Monitoring and analysis of peer to peer traffic is essential for Internet service providers in order to determine the components of the traffic mix, which may indicate shifts and trends in the usage of applications, to estimate the overhead in peer to peer messaging, to analyze the peer to peer network structure and transmission paths to be compared to the routing on the network layer. 5.1 Monitoring on network & transport layer The components of traffic can be analyzed on the network and transport layer by evaluating information in the header of the IP and TCP packets, i.e. IP addresses, TCP ports and information about the TCP signaling and connection status. Peer to peer protocols are often associated with a standard port or a range of specific ports, which allow to recognize them on the transport layer. When the search phase relies on a small set of servers then the corresponding requests can be traced by an analysis of IP addresses. The analysis on this layer is supported by sampling mechanisms provided by the router equipment and can be performed at line speed even on backbone links. However, most widely used peer to peer protocols can be configured to use any arbitrary TCP port and thus an essential part of peer to peer traffic cannot be categorized on this layer, which runs over nonstandard TCP ports or even standard ports of other applications. In recent time, the portion of unknown TCP ports is increasing on transport layer statistics, as can be observed e.g. in the Internet2 NetFlow statistics [6]. 5.2 Application layer analysis To get better insight into peer to peer traffic components, application level analysis is necessary which also inspects the payload of transmitted packets. Depending on the protocol, patterns can be recognized, which indicate data transmitted in peer to peer search phases or the initiation of data exchanges. Afterwards they can be traced at the transport layer until the termination of a corresponding TCP connection. The analysis on this layer is complex and cannot be performed permanently for the complete traffic on high speed links. Recognition pattern have to be found for each relevant peer to peer protocol and, in addition, the analysis has to be updated whenever new protocols or new variants of existing protocols emerge. Although there are approaches for the analysis of several currently used protocols [8], a complete classification of peer to peer traffic remains difficult since some protocols have developed techniques to disguise their purpose also on the application layer, e.g Freenet [2]. Besides the analysis of the components of complete data flows, another approach of application layer analysis has been carried out by crawling into peer to peer protocols [10]. Therefore a node is inserted into a peer to peer network, which can collect data about the connectivity and structure of the network as well as the status of other nodes. 5.3 Caches Web caches provide an opportunity to optimize traffic flows. Usual web caches do not apply to peer to peer traffic and have become inefficient. On the other hand, caches can be set up especially for peer to peer traffic. Therefore they act as a node within a peer to peer network, which stores a large amount of data. Web caches are not intended to play an active role in peer to peer networks. They should represent a transparent proxy to shorten transmission paths to distinct nodes, but should not be directly addressed as a peer to peer network nodes. When a download is requested for some data chunk available in the cache, then the cache can respond instead of another source, which has been selected in the search phase. For transparency, the data should be transferred as if it would originate from the selected source with regard to the IP addresses, the upstream access bandwidth of the source, possible changes in the status of the source, e.g. accounting to balance up- and download volume of peer to peer network nodes. A data transfer from the cache usually will have shorter transmission delay and will not be able to

4 match the available upstream rate of the original source, including time varying bottlenecks on the transmission path beyond the cache. But at least the online availability and the access speed of the original source should be taken into account. In fact, the upload capacity of the caches substitute a part of the upload capacity of nodes in the peer to peer network with consequences for the total data throughput. In this way, caches for peer to peer traffic have to be adapted for each protocol in use and do not reduce messaging overhead in the search phase. The efficiency of caches depends on the source selection by the peer to peer protocol. In principle, unnecessary load on backbone and expensive international links can be avoided by the application protocol, if one of the nearest sources in terms of the IP routing distance is preferred. But a proper distribution of the data with regard to the underlying IP network is only a secondary focus of peer to peer protocols. 7 Implications for quality of service The Internet has developed from data transfer applications to a service integrating platform with steadily increasing variety of service types including file transfer, , web browsing, voice over IP, peer to peer data exchange etc. Each service type has its specific quality of service (QoS) demands regarding the required bandwidth, the transmission time e.g. real time constraints, as well as tolerance for transmission errors and failure situations. Peer to peer data exchange is usually of the best effort service type without strict QoS demands. Often a download may run for several hours or days in the background. Although shorter transfers or even real time transmissions would be desirable, users are aware that affordable tariffs in a mass market impose access bandwidth limitations such that video files require considerable transfer time even with broadband access. On the other hand, the impact of peer to peer traffic on other services has to be taken into account. The present traffic profile in IP networks with a dominant peer to peer traffic portion of best effort type suggests that the differentiated services architecture [1] is sufficient as a simple scheme to support QoS by introducing traffic classes to be handled with different priority. If no more than 20% of the delivered traffic has strict QoS requirements including voice over IP and virtual private networks (VPN), then sufficient QoS can be guaranteed for those traffic types by strict forwarding prioritiy. Even applications like web browsing and can be included in a 20% portion of traffic with most serious requirements. When the network is dimensioned for an essentially larger traffic volume than generated only by the preferred traffic classes, then they will not suffer from bottlenecks and queueing delay in normal operation whereas, vice versa, the impact of a small premium traffic portion on the peer to peer traffic is moderate. In addition, the delivery for premium traffic classes can even be assured in some failure situations, e.g. for single link breakdowns, provided that restoration links are available in an appropriate network design. Since overload may occur on those links, the best effort traffic will then often be affected. Nowadays peer to peer protocols can cope with temporal disconnections on the application layer and recover transmission from the previous state afterwards. When file transfers via FTP or HTTP protocols are interrupted, an essential part of the transmission is often lost and a complete restart is required. Since a segmentation and reassembly of large data files into small chunks is included on the application layer of peer to peer protocols, an improved reliability and efficiency of transfers is achieved, which is valuable especially for nonassured QoS of best effort transmission. As pointed out in section 5, it is difficult to classify peer to peer traffic and virtually impossible to clearly distinguish it from other traffic on the network and transport layer. A treatment with lower priority based on TCP port numbers will increase the tendency to disguise peer to peer applications by using randomly chosen ports for unknown protocols or by transporting peer to peer data exchange e.g. over the HTTP port for web browsing. Therefore the only efficient way to classify traffic seems to be a declaration and marking of premium traffic with strict quality of service requirements by the users himself or by an originating server, which will be accepted on service provider platforms in combination with a corresponding tariff scheme. 7 Uncertain prediction of Internet traffic For the future development there are requirements for larger bandwidths in telecommunication networks, but especially the role of peer to peer networking is difficult to predict. Most video files are currently represented using MPEG compression. In order to achieve an opti-

5 mum resolution e.g. in HDTV (High definition television) quality together with coding schemes without loss of information, an essentially larger data volume has to be transmitted. Thus improved quality for video and other broadband applications will continue to demand for larger bandwidths. With regard to peer to peer applications, the illegitimate usage of copyright protected content and the future effect of countermeasures are unknown factors of influence. On the other hand, it cannot be foreseen whether and when video streaming and downloads will be offered over client server architectures via Internet at acceptable conditions for mass market, which then may satisfy at least a part of the requirements of the present peer to peer users. In addition, scalability, security including reliability against denial of service attacks and other aspects seem not to be handled with much care by current peer to peer protocols. Nevertheless, peer to peer networking has established a new principle for the distribution of information and content, which is more efficient than the client server communication for many applications. Conclusion Despite of increasing the traffic volume on the Internet, peer to peer traffic profiles on broadband platforms have a smoothing effect on the variability of the traffic rate in short and medium time scales and hot spots as compared to most other traffic types. They contribute a continuous load of long lasting background file transfers. While these properties partly facilitate the network dimensioning and planning for service providers, monitoring, analysis and control of the peer to peer components and the prediction of their future development is difficult and requires further investigation. The present traffic mix with a dominant portion of best effort type data exchanges in the background has implications for the quality of service concept, suggesting that differentiated services [1] are sufficient to support other traffic types which generate smaller traffic volume. This could even include applications like web browsing, if a clear classification of service types would be possible. [2] I. Clarke, S. Miller, T. Hong, O. Sandberg and B. Wiley, Protecting free expression online with Freenet, IEEE Internet Computing, Special issue on peer to peer networking (2002) [3] MPEG (Moving pictures expert group) standardization, [4] F. Hartleb and G. Haßlinger, Comparison of link dimensioning methods for TCP/IP networks, Proc. IEEE GLOBECOM, (2001) [5] G. Haßlinger, Quality-of-service analysis for statistical multiplexing with Gaussian and autoregressive input modeling, Telecommunication Systems 16 (2001) [6] Internet2 netflow statistics, weekly reports, netflow.internet2.edu ( ) [7] B. Krishnamurthy and J. Wang, Traffic classification for application specific peering, Proceedings of ACM SIGCOMM Internet Measurement Workshop, Marseille, France (2002) [8] H. de Meer, K. Tutschku and P. Tran-Gia, Dynamic operation in peer-to-peer overlay networks, PIK Journal (2003) [9] M. Ripeanu and A. Iamnitchi, Mapping the Gnutella network, IEEE Internet Computing, Special issue on peer to peer networking (2002) [10] S. Saroiu, K. Gummadi and S. Gribble, A Measurement Study of Peer-to-Peer File Sharing Systems, Proceedings of Multimedia Computing and Networking, San Jose, CA, USA (2002) [11] S. Sen and J. Wang, Analyzing Peer-to-Peer Traffic Across Large Networks, Proceedings of ACM SIG- COMM Internet Measurement Workshop, Marseille, France (2002) extended version to appear in ACM/IEEE Transactions on Networking References [1] M. Carlson, W. Weiss, S. Blake, Z. Wang, D. Black and E. Davies, An Architecture for Differentiated Services, RFC 2475 (1998)

Module 4. Switched Communication Networks

Module 4. Switched Communication Networks Module 4 Switched Communication Networks Lesson 2 Switching Techniques: Circuit Switching 4.2.0 Specific Instructional Objectives At the end of this lesson the student will be able to: Explain the need

More information

William Stallings Data and Computer Communications. Chapter 2 Protocols and Architecture

William Stallings Data and Computer Communications. Chapter 2 Protocols and Architecture William Stallings Data and Computer Communications Chapter 2 Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Direct

More information

Deutsche Telekom Group Quality-of-Service (QoS) for IP-Transit / Peering

Deutsche Telekom Group Quality-of-Service (QoS) for IP-Transit / Peering Deutsche Telekom Group Quality-of-Service (QoS) for IP-Transit / Peering White Paper Version 1.02 Dr. Falk von Bornstaedt, International Carrier s Sales and Solutions, ICSS Bonn, Germany, October 2012

More information

to-peer Networking: Contents Mapping the Gnutella Network Chinhua Lin

to-peer Networking: Contents Mapping the Gnutella Network Chinhua Lin Peer-to to-peer Networking: Mapping the Gnutella Network Chinhua Lin 11/5/2002 Mapping the Gnutella 1 Contents Why Peer-to-Peer? Categories of P2P systems Gnutella Protocol Network Analysis Potential Improvements

More information

Multicast vs. P2P for Content Distribution

Multicast vs. P2P for Content Distribution Multicast vs. P2P for Content Distribution Subhashni Balakrishnan Department of Computer Science Rutgers University October 27 th 2008 Abstract: Content Distribution is originally an application developed

More information

Mapping the Gnutella Network. What are P2P Networks?

Mapping the Gnutella Network. What are P2P Networks? Mapping the Gnutella Network Matei Ripeanu (Univ. of Chicago) Adriana Iamnitchi (Univ. of Chicago) Ian Foster (Univ. of Chicago & Argonne National Laboratory) What are P2P Networks? Networks to share information

More information

Converged Networks. Networks

Converged Networks. Networks Converged Networks Networks From Telecom to Datacom, Asynchronous Transfer Mode () From Datacom to Telecom, Multiprotocol Label Switching (MPLS) Further Convergence Evolving Networks OPTI 500, Spring 2011,

More information

Virtual LAN. Applications and Technology A WHITE PAPER

Virtual LAN. Applications and Technology A WHITE PAPER Virtual LAN Applications and Technology A WHITE PAPER Micrel, Incorporated 2180 Fortune Drive San Jose, CA 95131 USA TEL: +1 (408)-944-0800 FAX: +1 (408) 474-1000 www.micrel.com CONTENTS Introduction...3

More information

Communication Networks

Communication Networks EE3414 Multimedia Communication Systems I Communication Networks Guest Instructor: Yihan Li ECE Dept., Polytechnic University Communication Networks and Services Communication networks: a set of equipment

More information

Topology Awareness in Unstructured P2P Networks using Accessible Bandwidth

Topology Awareness in Unstructured P2P Networks using Accessible Bandwidth Topology Awareness in Unstructured P2P Networks using Accessible Bandwidth B. Lalitha Department of CSE JNTUCEA, Anantapur, India Ch D V Subba Rao, Ph.D Department of CSE S V University, Tirupathi, India

More information

Meeting Point of Circuit Switching and Packet Switching in Communications Networks

Meeting Point of Circuit Switching and Packet Switching in Communications Networks Meeting Point of Circuit Switching and Packet Switching in Communications Networks U. Ghugar 1, Dr. N.K Barpanda 2 1(CSE., Imperial College,Bargarh) 2(ECE,G.I.E.T Gunupur,India) Abstract - A networking

More information

Bandwidth Aggregation, Teaming and Bonding

Bandwidth Aggregation, Teaming and Bonding Bandwidth Aggregation, Teaming and Bonding The increased use of Internet sharing combined with graphically rich web sites and multimedia applications have created a virtually insatiable demand for Internet

More information

Lecture 10: Asynchronous Transfer Mode Networks

Lecture 10: Asynchronous Transfer Mode Networks CS4/MSc Computer Networking Lecture 0: Asynchronous Transfer Mode Networks Computer Networking, Copyright University of Edinburgh 005 Asynchronous Transfer Mode () A connection-oriented network providing

More information

William Stallings Data and Computer Communications

William Stallings Data and Computer Communications William Stallings Data and Computer Communications Chapter 2 Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Direct

More information

Connection-Oriented Networks:

Connection-Oriented Networks: Connection-Oriented Networks: SONET/SDH, ATM, MPLS, and Optical Networks Harry Perros Connection-Oriented Networks - Harry Perros 1 Connection-Oriented Networks - Harry Perros 2 Course syllabus Introduction

More information

REDCENTRIC ETHERNET SERVICE SERVICE DEFINITION

REDCENTRIC ETHERNET SERVICE SERVICE DEFINITION REDCENTRIC ETHERNET SERVICE SERVICE DEFINITION SD016 V4.1 Issue Date 02 07 2014 1) SERVICE OVERVIEW Redcentric s Ethernet Service is one of the LANnet connectivity options. It is a high quality connectivity

More information

OSI Transport Layer. Chapter 4

OSI Transport Layer. Chapter 4 OSI Transport Layer Network Fundamentals Chapter 4 Objectives Explain the role of Transport Layer protocols and services in supporting communications across data networks. Analyze the application and operation

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

File sharing using IP-Multicast

File sharing using IP-Multicast File sharing using IP-Multicast Kai Trojahner, Peter Sobe University of Luebeck, Germany Institute of Computer Engineering email: sobe@iti.uni-luebeck.de Abstract: File sharing systems cause a huge portion

More information

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM

CHAPTER 2. QoS ROUTING AND ITS ROLE IN QOS PARADIGM CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Streaming Audio and Video

Streaming Audio and Video Streaming Audio and Video CS 360 Internet Programming Daniel Zappala Brigham Young University Computer Science Department Streaming Audio and Video Daniel Zappala 1/27 Types of Streaming stored audio and

More information

APPENDIX A INTRODUCTION TO ATM NETWORKS

APPENDIX A INTRODUCTION TO ATM NETWORKS APPENDIX A INTRODUCTION TO ATM NETWORKS A.1 Future applications are expected to require increasingly higher bandwidth and generate a heterogeneous mix of network traffic. Existing networks cannot provide

More information

QoS Provision in an MPLS/DiffServ. Summary

QoS Provision in an MPLS/DiffServ. Summary QoS Provision in an MPLS/DiffServ Network Χάρης Κωνσταντινίδης Νοέµβριος 2004 Summary MPLS Architectural description and basic concepts general aspects 1 MPLS Architectural description and basic concepts

More information

EXPLORER. TFT Filter CONFIGURATION

EXPLORER. TFT Filter CONFIGURATION EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content

More information

Distributed- System Structures

Distributed- System Structures Distributed- System Structures 16 C H A P T E R A distributed system is a collection of processors that do not share memory or a clock. Instead, each processor has its own local memory. The processors

More information

Data Networks. Lecture 1. Introduction

Data Networks. Lecture 1. Introduction Data Networks Lecture 1 Introduction Slide 1 6.263: Data Networks Fundamental aspects of network Design and Analysis: Architecture Layering Topology design Protocols Pt.-to-Pt. Multiple access End-to-end

More information

Hitachi s Gigabit Switch 4000/3000 Series for Implementing Guaranteed Networks

Hitachi s Gigabit Switch 4000/3000 Series for Implementing Guaranteed Networks Hitachi Review Vol. 53 (2004), No. 6 261 Hitachi s Gigabit Switch 4000/3000 Series for Implementing Guaranteed Networks Kentaro Hashimoto Tomoaki Kouzu OVERVIEW: There has been tremendous increase in the

More information

Motivation. An Architecture for Differentiated Services. Background. DSCP Field. Network Working Group (RFC2475)

Motivation. An Architecture for Differentiated Services. Background. DSCP Field. Network Working Group (RFC2475) Motivation An Architecture for Differentiated Services Network Working Group (RFC2475) S. Blake, D.Black, M. Carlson, E. Davies, Z.Wang, W. Weiss Presented by Tao Zhao To support various types of applications,

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Multiplexing Multiplexing Multiplexing is a technique that allows a single resource to be shared among multiple users sharing

More information

Performance White Paper SkyPilot System Capacity and Performance (v1.4)

Performance White Paper SkyPilot System Capacity and Performance (v1.4) Performance White Paper SkyPilot System Capacity and Performance (v1.4) Performance White Paper (v1.4) 1 2006 SkyPilot Networks, Inc. Introduction This document details the performance of the SkyPilot

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

(Refer Slide Time: 01:49)

(Refer Slide Time: 01:49) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Switching Techniques: Packet Switching Lecture 19 Hello viewers welcome to today

More information

High Performance Communication Networks. Introduction, Part I

High Performance Communication Networks. Introduction, Part I High Performance Communication Networks Introduction, Part I Part I: Introduction Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

OSI Transport Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public ١

OSI Transport Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public ١ OSI Transport Layer Network Fundamentals Chapter 4 ١ Objectives Explain the role of Transport Layer protocols and services in supporting communications across data networks Analyze the application and

More information

Quality of Service An Introduction

Quality of Service An Introduction An Introduction Mike Weaver 1 Session Objectives The new CCNP-ONT course introduces the concept of providing a Quality of Service framework in a converged IP (packet switched) network This session aims

More information

The Topology of P2P Network 1

The Topology of P2P Network 1 The Topology of P2P Network 1 Xu Yong, 2 Deng Chi, 3 Gao Min 1, 2, 3 School of Information Engineering, Southwest University of Science and Technology Mianyang, SiChuan, China 1 xuyong900706@gmail.com

More information

E The TCP/IP Protocol Architecture

E The TCP/IP Protocol Architecture APPENDIX E The TCP/IP Protocol Architecture E.1 TCP/IP LAYERS...2 E.2 TCP AND UDP...3 E.3 OPERATION OF TCP/IP...4 E.4 TCP/IP APPLICATIONS...6 William Stallings Copyright 2008 Supplement to Computer Security:

More information

EECS489 Computer Networks, Midterm 2 (Fall 2004)

EECS489 Computer Networks, Midterm 2 (Fall 2004) EECS489 Computer Networks, Midterm 2 (Fall 2004) Instructions: You are allowed to use one sheet of notes (front and back). This exam is closed book, no computers are allowed. You can use a calculator.

More information

Multimedia Networking and Quality of Service Support

Multimedia Networking and Quality of Service Support Multimedia Networking and Quality of Service Support Multimedia and Quality of Service Multimedia applications: network audio and video ( continuous media ) Kai Shen QoS support network provides application

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Improving QOS in IP Networks. Quality of Service. Principles for QOS Guarantees. Principles for QOS Guarantees (more)

Improving QOS in IP Networks. Quality of Service. Principles for QOS Guarantees. Principles for QOS Guarantees (more) Quality of Service Principles, IntServ, RSVP, DiffServ Improving QOS in IP Networks IETF groups are working on proposals to provide better QOS control in IP networks, i.e., going beyond best effort to

More information

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work

The need for bandwidth management and QoS control when using public or shared networks for disaster relief work International Telecommunication Union The need for bandwidth management and QoS control when using public or shared networks for disaster relief work Stephen Fazio Chief, Global Telecommunications Officer

More information

The Internet Architecture

The Internet Architecture Fundamentals of Computer Networks ECE 478/578 Lecture #19: Transport Layer Instructor: Loukas Lazos Dept of Electrical and Computer Engineering University of Arizona The Internet Architecture FTP HTTP

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view

Part I: Introduction. Housekeeping. What s the Internet: nuts and bolts view. What s the Internet: nuts and bolts view Part I: Introduction Housekeeping Chapter goal: get context, overview, feel of networking more depth, detail later in course approach: descriptive use Internet as example Overview: what s the Internet

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: NET 125 Course Title: Networking Basics Class Hours: 1 Lab Hours: 4 Credit Hours: 3 Course Description: This course introduces the networking field. Emphasis is placed on network terminology

More information

QoS Tools in the WAN. Need for QoS on WAN Links. Need for QoS in the WAN

QoS Tools in the WAN. Need for QoS on WAN Links. Need for QoS in the WAN QoS Tools in the WAN Need for QoS on WAN Links This topic defines the need for QoS in a WAN. Need for QoS in the WAN Voice must compete with data. Voice is real-time and must be sent first. Overhead should

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

CS 337 Winter Layering. Network architecture Protocols Measuring network performance. Protocol. Example: web transaction

CS 337 Winter Layering. Network architecture Protocols Measuring network performance. Protocol. Example: web transaction CS 337 Winter 2004 architecture Protocols Layering Abstracting functionality to different parts (layers) of the network Each layer implements a protocol Each layer communicates with the layers above and

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Summer In brief describe OSI model with suitable diagram. (Layered structure 1 mark and explanation 3 marks) Answer: Function of OSI model

Summer In brief describe OSI model with suitable diagram. (Layered structure 1 mark and explanation 3 marks) Answer: Function of OSI model Summer 15 1. In brief describe OSI model with suitable diagram. (Layered structure 1 mark and explanation 3 marks) Answer: OSI model (open system interconnection) model was developed by ISO(international

More information

Analysis of traffic demographics in Broadband networks

Analysis of traffic demographics in Broadband networks White paper Analysis of traffic demographics in Broadband networks Table of Contents Background...1 Aggregate Traffic Trends...1 Upstream Traffic Trends...2 Downstream Traffic Trends...3 Summary...4 www.sandvine.com

More information

Carrier Managed Network Solutions (CMNS). Carrier Intranet Service (IP VPN Layer 3 ). SWINOG, Thomas Wohlmutter, Sales Support Manager

Carrier Managed Network Solutions (CMNS). Carrier Intranet Service (IP VPN Layer 3 ). SWINOG, Thomas Wohlmutter, Sales Support Manager Carrier Managed Network Solutions (CMNS). Carrier Intranet Service (IP VPN Layer 3 ). SWINOG, 30.05.2007 Thomas Wohlmutter, Sales Support Manager ICSS Carrier Intranet Service. Content. Deutsche Telekom

More information

Chapter 2 Applications and Layered Architectures. Protocols, Services & Layering OSI Reference Model TCP/IP Architecture How the Layers Work Together

Chapter 2 Applications and Layered Architectures. Protocols, Services & Layering OSI Reference Model TCP/IP Architecture How the Layers Work Together Chapter 2 Applications and Layered Architectures Protocols, Services & Layering OSI Reference Model TCP/IP Architecture How the Layers Work Together Why Layering? Montreal London Paris Alice wants to send

More information

Multimedia Networking. Real-Time (Phone) Over IP s Best-Effort. Recovery From Jitter. Settings. up to 10 % loss is tolerable TCP instead of UDP?

Multimedia Networking. Real-Time (Phone) Over IP s Best-Effort. Recovery From Jitter. Settings. up to 10 % loss is tolerable TCP instead of UDP? Multimedia Networking Principles Classify multimedia applications Identify the network services the apps need Making the best of best effort service Mechanisms for providing QoS Protocols and Architectures

More information

Quality of Service (QoS) Computer Networks and QoS ATM. QoS Parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

Quality of Service (QoS) Computer Networks and QoS ATM. QoS Parameters. QoS ATM QoS implementations Integrated Services Differentiated Services Computer Networks and QoS QoS ATM QoS implementations Integrated Services Differentiated Services Quality of Service (QoS) The data transfer requirements are defined with different QoS parameters + e.g.,

More information

Data Communication Prof.A. Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 36 Multimedia Networks

Data Communication Prof.A. Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 36 Multimedia Networks Data Communication Prof.A. Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 36 Multimedia Networks Hello and welcome to today s lecture on multimedia networks.

More information

Asynchronous Transfer Mode (ATM) Broadband ISDN (B-ISDN)

Asynchronous Transfer Mode (ATM) Broadband ISDN (B-ISDN) Asynchronous Transfer Mode (ATM) Broadband ISDN (B-ISDN) Petr Grygárek rek 1 ATM basic characteristics Integrates transfer of voice, video, data and other media using statistical al multiplexing ing multiplexes

More information

Southwest Arkansas Telephone Cooperative Network Management Practices

Southwest Arkansas Telephone Cooperative Network Management Practices Southwest Arkansas Telephone Cooperative Network Management Practices Page 1 of 11 Release Date 05/18/15 INTRODUCTION... 3 CORE NETWORK OVERVIEW... 3 DISTRIBUTION NETWORK OVERVIEW... 3 ACCESS NETWORK OVERVIEW...

More information

Communication Models and Protocols

Communication Models and Protocols Communication Models and Protocols 1.1 ISO/OSI Network Model and Internet protocol ISO /OSI Network Model Open System Interconnection, an ISO standard for worldwide communications that defines a networking

More information

Best Practices for Video Transit on an MPLS Backbone

Best Practices for Video Transit on an MPLS Backbone Best Practices for Video Transit on an MPLS Backbone Debbie Montano dmontano@juniper.net Oct 7, 2009 1 Debbie Montano Joined Juniper - supporting R&E Community Debbie Montano Chief Architect Government,

More information

Quality of Service. Principles, IntServ, RSVP, DiffServ

Quality of Service. Principles, IntServ, RSVP, DiffServ Quality of Service Principles, IntServ, RSVP, DiffServ Improving QOS in IP Networks IETF groups are working on proposals to provide better QOS control in IP networks, i.e., going beyond best effort to

More information

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK Lesson-24: INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS 1 Internet enabled embedded system Communication to other on the Internet. Use html (hyper text

More information

Lecture slides prepared by Dr Lawrie Brown for Data and Computer Communications, 8/e, by William Stallings, Chapter 2 Protocol

Lecture slides prepared by Dr Lawrie Brown for Data and Computer Communications, 8/e, by William Stallings, Chapter 2 Protocol Lecture slides prepared by Dr Lawrie Brown (UNSW@ADFA) for Data and Computer Communications, 8/e, by William Stallings, Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications. 1 This

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT Dial-up access A Local Loop A/D P C D/A Core network A M D D M A P C Local Loop A A D Local Exchange Modem D/A Local Exchange A D Modem A/D

More information

Outline: Introduction

Outline: Introduction Outline: Introduction Last class recap a. Internet is made up of hosts (end systems), communication links, and packet switches). Hosts and packet switches run various networking protocols and work together

More information

Moderating Redundant Traffic Generated by Topology Mismatch in P2P Networks

Moderating Redundant Traffic Generated by Topology Mismatch in P2P Networks Moderating Redundant Traffic Generated by Topology Mismatch in P2P Networks B. Lalitha Ch D V Subba Rao, Ph.D Department of CSE JNTUCEA, Anantapur, India Department of CSE S V University, Tirupathi, India

More information

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet

Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although

More information

CACHING OF STREAMING MULTIMEDIA ON THE INTERNET

CACHING OF STREAMING MULTIMEDIA ON THE INTERNET CACHING OF STREAMING MULTIMEDIA ON THE INTERNET CS736 PROJECT REPORT Anurag Gupta Kiran Chitluri {anurag, kiran}@cs.wisc.edu Computer Sciences Department University of Wisconsin, Madison Madison, WI 53706

More information

William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols

William Stallings Data and Computer Communications. Chapter 15 Internetwork Protocols William Stallings Data and Computer Communications Chapter 15 Internetwork Protocols Internetworking Terms (1) Communications Network Facility that provides data transfer service An internet Collection

More information

Network Considerations for IPTV

Network Considerations for IPTV Network Considerations for IPTV This document provides an overview of the various methods and techniques for distributing live and prerecorded digital video across local area networks. It also offers some

More information

Communication Protocols and Internet Architectures Harvard University Extension School CSCI E131b. Homework Assignment #1 Solutions Total points: 19

Communication Protocols and Internet Architectures Harvard University Extension School CSCI E131b. Homework Assignment #1 Solutions Total points: 19 Communication Protocols and Internet Architectures Harvard University Extension School CSCI E131b Homework Assignment #1 Solutions Total points: 19 1) Imagine that a bicycle messenger is given six (6)

More information

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model OSI MODEL 1 Introduction Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.

More information

Chapter 7 Packet-Switching Networks. Network Services and Internal Network Operation Packet Network Topology Datagrams and Virtual Circuits

Chapter 7 Packet-Switching Networks. Network Services and Internal Network Operation Packet Network Topology Datagrams and Virtual Circuits Chapter 7 Packet-Switching Networks Network Services and Internal Network Operation Packet Network Topology Datagrams and Virtual Circuits Chapter 7 Packet-Switching Networks Network Services and Internal

More information

14. ComNets-Workshop 2007

14. ComNets-Workshop 2007 14. ComNets-Workshop 2007 Smart Caching for Supporting Video Streaming in Heterogeneous Wireless Networks Stephan Göbbels Chair of Communication Networks, Faculty 6, RWTH Aachen University, Germany 14.

More information

Internet over Satellite Optimization with XipLink White Paper

Internet over Satellite Optimization with XipLink White Paper Internet over Satellite Optimization with XipLink White Paper Version 2.5 www.xiplink.com Abstract This paper provides an overview of Internet over Satellite optimization with XipLink technology. XipLink

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

IP Telephony - Introduction -

IP Telephony - Introduction - IP Telephony - Introduction - Voice over ATM, Voice over ADSL, and Voice over CATV Erik Väkevä 6.4.2001 S38_130_IP_Telephony.ppt/ 06.04.2001 / Erik Väkevä page: 1 Voice over ATM, ADSL, CATV - Introduction

More information

P2P networks, free riding, and counter-mechanisms

P2P networks, free riding, and counter-mechanisms P2P networks,, and counter-mechanisms İbrahim Körpeoğlu Department Computer Engineering Bilkent University Seminar Place: Department Electrical and Electronics Engineering Bilkent University, Ankara Date:

More information

ETHERNET PACKET FILTERING for FTI PART II

ETHERNET PACKET FILTERING for FTI PART II ETHERNET PACKET FILTERING for FTI PART II Ø. Holmeide 1, J-F. Gauvin 2 1 OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com 2 OnTime Networks AS, Oslo, Norway jean.frederic@ontimenet.com Abstract:

More information

ADAPTIVE CONTENT REPLICATION IN PEER TO PEER NETWORK. A Thesis. Presented to the. Faculty of. San Diego State University. In Partial Fulfillment

ADAPTIVE CONTENT REPLICATION IN PEER TO PEER NETWORK. A Thesis. Presented to the. Faculty of. San Diego State University. In Partial Fulfillment ADAPTIVE CONTENT REPLICATION IN PEER TO PEER NETWORK A Thesis Presented to the Faculty of San Diego State University In Partial Fulfillment of the Requirements for the Degree Master of Science in Computer

More information

A Network Monitoring System with a Peer-to-Peer Architecture

A Network Monitoring System with a Peer-to-Peer Architecture A Network Monitoring System with a Peer-to-Peer Architecture Paulo Salvador, Rui Valadas University of Aveiro / Institute of Telecommunications Aveiro E-mail: salvador@av.it.pt; rv@det.ua.pt Abstract The

More information

ISDN and ATM. ISDN and ATM. Wolfgang Schreiner Engineering for Computer-based Learning University of Applied Sciences in Hagenberg

ISDN and ATM. ISDN and ATM. Wolfgang Schreiner Engineering for Computer-based Learning University of Applied Sciences in Hagenberg and ATM Wolfgang Schreiner Engineering for Computer-based Learning University of Applied Sciences in Hagenberg Wolfgang.Schreiner@fhs-hagenberg.ac.at http://cbl.fhs.hagenberg.ac.at/ schreine Wolfgang Schreiner

More information

Gnutella-Pro: What bandwidth barrier?

Gnutella-Pro: What bandwidth barrier? Gnutella-Pro: What bandwidth barrier? Richard Massey, Shriram Bharath & Ankur Jain {rmassey,sbharath,ajain}@cs.ucsd.edu 1. Introduction This paper discusses the history, and evolution of the peer-to-peer

More information

Using UDP Packets to Detect P2P File Sharing

Using UDP Packets to Detect P2P File Sharing 188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,

More information

Traffic, Caching & Traffic ACROSS Data Centers in Clouds, CDNs and ISP Networks

Traffic, Caching & Traffic ACROSS Data Centers in Clouds, CDNs and ISP Networks Traffic, in Clouds, CDNs and ISP Networks, Deutsche Telekom, Darmstadt, Germany E-Mail: gerhard.hasslinger@telekom.de Caching options, main goals and benefits in Ip networks CDN, cloud traffic in ISP networks

More information

THE INDEX POISONING ATTACK in P2P FILE SHARING SYSTEMS ABASTRACT

THE INDEX POISONING ATTACK in P2P FILE SHARING SYSTEMS ABASTRACT THE INDEX POISONING ATTACK in P2P FILE SHARING SYSTEMS ABASTRACT In P2P file-sharing users search index to find locations of desired files. Index poisoning, for particular file, attacks index with bogus

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

ATM. COMPSCI 726 Network Defence and Countermeasures. Shujie Cui

ATM. COMPSCI 726 Network Defence and Countermeasures. Shujie Cui ATM COMPSCI 726 Network Defence and Countermeasures Shujie Cui scui379@aucklanduni.ac.nz Asynchronous Transfer Mode (ATM) Network Source: http://www.cl.cam.ac.uk/research/dtg/attarchive/streamsarchitecture.html

More information

Protocol Architecture. ATM architecture

Protocol Architecture. ATM architecture Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,

More information

An Analysis of Internet Content Delivery Systems (and more!)

An Analysis of Internet Content Delivery Systems (and more!) An Analysis of Internet Content Delivery Systems (and more!) Stefan Saroiu, Krishna Gummadi, Richard J.Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of the 5th Symposium on Operating Systems Design

More information

Introduction to routing in the Internet

Introduction to routing in the Internet Introduction to routing in the Internet IPv4, ICMP, ARP addressing, routing principles (Chapters 2 3 in Huitema) Internet-1 Levels of analysis we deal with principles, protocols and specifications Products

More information

IP Overhead Comparison in a Test-bed for Air Traffic Management Services

IP Overhead Comparison in a Test-bed for Air Traffic Management Services IP Overhead Comparison in a Test-bed for Air Traffic Management Services Àngels Via, Eriza Hafid Fazli, Sébastien Duflot, Núria Riera, Markus Werner TriaGnoSys GmbH Argelsrieder Feld 22, Wessling, Germany

More information

Improved Digital Media Delivery with Telestream HyperLaunch

Improved Digital Media Delivery with Telestream HyperLaunch WHITE PAPER Improved Digital Media Delivery with Telestream THE CHALLENGE Increasingly, Internet Protocol (IP) based networks are being used to deliver digital media. Applications include delivery of news

More information