CDV Tolerance τ Traffic Source 1 PHY SAP. Physical Layer Functions S B

Size: px
Start display at page:

Download "CDV Tolerance τ Traffic Source 1 PHY SAP. Physical Layer Functions S B"

Transcription

1 University of Wurzburg Institute of Computer Science Research Report Series Dimensioning of a Peak Cell Rate Monitor Algorithm Using Discrete-Time Analysis F. Hubner Report No.59 March 1993 Institute of Computer Science, University of Wurzburg, Am Hubland, D-8700 Wurzburg, Federal Republic of Germany Tel.: +49/931/ , Fax: +49/931/ , huebner@informatik.uni-wuerzburg.dbp.de Abstract This study deals with the monitoring of ATM cells from a CBR source which are subject to cell delay variation introduced by cells from other trac sources. We present an exact solution for the dimensioning of the so-called peak cell rate monitor algorithm dened by the CCITT Draft Recommendation I.371. The solution algorithm consists of a discretetime iteration and allows for the exact determination of probability that the monitor algorithm rejects a cell. Using the cell rejection probability, the parameters of the monitor algorithm can be chosen to meet the desired performance objectives like transparency and ability to detect misbehaving sources. We consider cells from a CBR source which are multiplexed together with background trac. The background trac can vary by its mean and coecient of variation of the cell rate. The cell delay variation of the CBR trac introduced by the background trac is taken into account by the monitor algorithm. The numerical results show that the parameters of the monitor algorithm depend strongly on the coecient of variation of the background trac.

2 1 Introduction The peak cell rate is at present the only parameter for trac and congestion control which is dened by the CCITT (see Draft Rec. I.371 [4]). Each connection has to determine its peak cell rate for connection set-up, charging, routing, etc. Once a connection is established, policing of the determined parameter must be performed to be able to guarantee the desired grade of service for all connections according to their trac contracts. The peak cell rate of an ATM connection is dened as the inverse of the minimum time between the emission of two cells from this connection. Therefore, the cell delay variation (CDV) which leads to cell clumping and dispersion can inuence the peak cell rate from an ATM connection. CDV is introduced by: multiplexing cells from dierent ATM connections usage parameter control (UPC) and network parameter control (NPC) segmentation and reassembly in the AAL other network and protocol functionalities The end-to-end CDV is dened in CCITT Draft Rec. I.35B [3]. Measurement processes for cell clumping and dispersion are described in [3] and [5]. Cell clumping causes problems in terms of network congestion. Cell dispersion causes the necessity for larger buers at the receiving site of the ATM network if the customer equipment has strong delay constraints (e.g. play-out parameters for voice/video). The reference conguration for the denition of peak cell rate and CDV is depicted in Fig.1. CDV Tolerance τ Traffic Source 1 MUX Shaper PHY SAP Physical Layer Functions S B Peak Cell Rate Other CEQ 1/T Functionalities UPC Generating CDV T B Traffic Source N ATM Layer Physical Layer Figure 1: Reference conguration from CCITT Draft Rec. I.371. After multiplexing the trac streams from dierent connections, trac shaping to reduce CDV is performed. In [1], [2], [6] a cell spacer was suggested as trac shaper. Another approach using a spacing policer was presented in [10]. The UPC performs the monitoring 1

3 of the cell streams of each ATM connection. CDV between the physical service access point (PHY SAP) and the T B reference point is introduced by physical layer functions and customer equipment (CEQ) functionalities. A higher peak cell rate of an ATM connection than negotiated can stem from the misbehavior of this connection or from CDV for which the connection is not responsible. Therefore, the policing of the peak cell rate must be performed in such a way that the inuence of CDV is tolerated whereas cells from misbehaving connections are recognized. In contrast to already published investigations, we take also into account the variability of the background trac by its coecient ofvariation (CoV). The numerical results show that the parameters of the peak cell rate monitor algorithm depend strongly on the CoV of the background trac. Moreover, the iterative algorithm developed here gives the exact cell rejection probability for general cell inter-generation time distributions. The paper is organized as follows. In section 2 we describe the investigated peak cell rate monitor algorithm. The analysis for determining the probability that a cell is rejected by the monitor algorithm is presented in section 3. In section 4 we describe the underlying trac scenario for the dimensioning of the monitor algorithm. Numerical results are presented in section 5. 2 Peak cell rate monitor algorithm An algorithm for monitoring the peak cell rate according to CCITT Draft Rec. I.371 [4] is shown in Fig.2. The algorithm is called Virtual Scheduling Algorithm beside of another algorithm which is exactly equivalent to it is called Continuous-State Leaky Bucket Algorithm (see [4]). The algorithm determines if a cell is generated too close to the last cell (indicating that the connection generates cells with a rate which is higher than the negotiated rate) or not. The CDV is taken into account by introducing a cell delay variation tolerance. The time at which the next cell is supposed to be generated is called theoretical arrival time (TAT). The peak cell rate is denoted by 1=T, i.e. the time dierence between two cell generations shall not be smaller than T. The time instant atwhich a cell is generated is denoted by t. Clearly, the TAT for the rst cell which shall be monitored is set to t. Three cases can be distinguished: 1. If a cell is generated later than its TAT, the source generates cells with a rate smaller than the peak cell rate. Therefore, the cell is accepted as a compliant cell (see case (3) in Fig.2) and the TAT for the next cell is set to t + T, i.e. the late generation of this cell does not allow foranearliergeneration of the next cell. 2. If a cell is generated before its TAT but later than TAT-, the cell is generated too early but within the allowed CDV tolerance. Therefore, the cell is also accepted as a compliant cell (case (2) in Fig.2) but the TAT of the next cell is set as if this cell would have been generated at its TAT and not earlier. 2

4 cell generation at time t yes TAT < t? no compliant cell (1) TAT:=t+T no TAT > t + τ? yes compliant cell (2) TAT:=TAT+T non-compliant cell (3) Figure 2: Peak cell rate monitor algorithm. 3. If a cell is generated before the time instant TAT-, the cell is recognized as a noncompliant cell (case (1) in Fig.2) and is rejected 1. The TAT for the next cell is not modied in this case. The algorithm guarantees that cells from a connection enter the ATM network at the T B reference point with a long term rate of at most 1=T. 3 Analysis We derive an exact iterative algorithm to determine the cell rejection probability. The cell rejection probability is then used to decide if the monitor algorithm parameter T and are chosen appropriately to identify compliant/non-compliant cells from well-behaving/ misbehaving sources. The following notation is used: Z ; n Z + n A n discrete random variable just before the generation instant of cell n for the number of slots until cell n was expected to be generated. discrete random variable just after the generation instant of cell n for the number of slots until cell n +1is expected to be generated. discrete random variable for the number of slots until cell n is generated. 1 Cells which are identied as non-compliant cells can optionally be tagged or rejected (see [4]). We consider here only the case of cell rejection. 3

5 The distributions of the discrete-time random variables Z ; n, Z + n, and A n are denoted by z ; n (k), z + n (k), and a n (k) respectively. An example evolution of the random variables Z ; n and Z + n is shown in Fig.3. Z - + n,z n generation of cell no. n n+1 n+2 non-compliant cell A n+1 T+ τ T τ T T T τ τ τ time in slots Z - + n Z n Z - n+1 Figure 3: Z ; n and Z + n process example for <T. Since Z + n represents the number of slots until the next cell is expected to be generated, Z + n is decreased by one each slot if it has a positivevalue. The number of slots until generation of cell number n +1 is A n+1. Each accepted cell increases Z + n by T according to the peak cell rate monitor algorithm (cf. Fig.2). If Z ; n+1 is zero at the generation instant of cell n + 1 (cf. Fig.3), the expected time between the generation instants of cells n and n +1 has expired and cell n + 1 is accepted as a compliant cell. The gray shaded regions in Fig.3 denote the time periods in which generated cells are accepted as compliant cells due to the CDV tolerance (cell n +2in Fig.3). The gray shaded regions begin when Z ; n reaches the value. A cell generation at the beginning of the gray shaded regions can therefore lead to the maximum value of T + for Z + n. Cells which are generated at time instants with Z ; n > (i.e. before the gray shaded regions in Fig.3 begin) are recognized as non-compliant cells. The G [X] =D=1 ; S queueing system (with loss of the complete batch of arrivals if there is not enough space for buering the batch) has the same process evolution as depicted in Fig.3 if its system size is considered. The decrease of Z + n each slot if positive corresponds to the deterministic service time. The increase of Z + n by T when a compliant cell is generated corresponds to a batch arrival with deterministic size T (being an integer multiple of the service time). The maximum value of T + for Z + n corresponds to the maximum system size S +1. Therefore, the evolution of the random variable Z + n can be described by the 4

6 system size evolution in the G [T ] =D=1 ; (T + ; 1) queueing system in which [T ] denotes batch arrivals of deterministic size T. In the following, we propose an iterative algorithm for the computation of the distributions of Z ; n and Z + n (denoted by z ; n (k) and z + n (k)) if the cell generation process is a renewal process and follows a general distribution. Using these distributions, the probability to observe non-compliant cells can be easily derived. The algorithm is based on the algorithm for the computation of the system size distribution in the G [X] =D=1 ; S queueing system proposed by Tran-Gia and Ahmadi in [8]. Z ; n+1 is given by the following eqn. using Z + n : Z ; n+1 = maxf0 Z + n ; A n+1g: (1) This eqn. is driven by the decrease of Z n by one each slot until it reaches zero. Z + n determined by Z ; n in the following way: Z + n = ( Z ; n Z ; n +1 Z ; n + T Z ; n : (2) The rst case corresponds to the generation of a non-compliant cell (rejection) whereas the second case corresponds to the generation of a compliant cell (increase of Z n by T ). According to eqns.(1) and (2), the distributions for Z ; n+1 and Z + n are given by z ; n+1(k) = 0 (z + n (k) a n+1 (;k)) 0 k T + (3) is and z + n (k) = 8 >< 0 0 k z >: ; n (k) +1 k T ; 1 z ; n (k)+z ; n (k ; T ) T k T + : (4) In eqn.(3) denotes the discrete convolution operation and 0 (z(k)) is dened by: 0 (z(k)) = 8 >< >: 0P i=;1 0 k<0 z(k) z(i) k=0 k>0 : (5) If T, z + n (k) isdetermined in dierence to eqn.(4) by: z + n (k) = 8 >< >: 0 0 k T ; 1 z ; n (k ; T ) T k z ; n (k ; T )+z ; n (k) +1 k + T 5 : (6)

7 The equilibrium state distributions z ; (k) and z + (k) (0 k T + ) are derived by an iteration using eqns.(3) and (4) for <T and eqns.(3) and (6) for T as and z ; (k) = lim n!1 z; n (k) (7) z + (k) = lim n!1 z+ n (k): (8) Using the iterative algorithm we derive the complete distribution z ; (k), i.e. we know the probabilities that the expected time until the next cell generation is still k slots (0 k T + ) at the time instant of a cell generation. The rejection probability p r, i.e. the probability to observe a non-compliant cell, (cf. Fig.2, case (3)) is simply given by: p r = +T X k=+1 z ; (k): (9) We denote by p c the probability that a cell is recognized as a compliant cell although the time dierence between its generation instant and the generation instant of the last cell is smaller than T. p c is given by: p c = X k=1 z ; (k): (10) The probability that a cell is generated at its TAT orlaterisdenotedby p a and is simply given as: p a = z ; (0) = 1:0 ; p r ; p c : (11) 4 Trac scenario The performance of the peak cell rate monitor algorithm is determined by the correct detection of cells which are generated by well-behaving/misbehaving sources. The parameters T and of the monitor algorithm must be tuned in order to reject cells generated by awell-behaving source with probability lower than 10 ;9 to guarantee the transparency of the algorithm. On the other hand as many as possible cells from misbehaving sources must be rejected. The dimensioning of the peak cell rate monitor algorithm consists of three phases: 1. The inter-generation time distribution of the cells from the monitored source after the multiplexing process is determined via simulation. 6

8 2. The parameters T and are chosen and the cell inter-generation time distribution from phase 1. is used as a n (k) for the analysis of the cell rejection probability as described in section The rejection probability forms the basis for the decision if the monitor algorithm parameters are chosen appropriately or if they must be changed. In the latter case phase 2. is entered again. To investigate how the parameters must be chosen to meet the performance requirements, we monitor cells from a well-behaving/misbehaving source which are subject to CDV by being multiplexed with background trac (see Fig.4). compliant/ CBR traffic background traffic MUX cell inter-generation time distribution of CBR traffic peak cell rate monitor algorithm non-compliant cells Figure 4: Scenario for dimensioning the peak cell rate monitor algorithm. The decision if the chosen monitor algorithm parameter are chosen appropriately or not is based on the proportion of generated cells which are rejected. Several studies concerning dimensioning and performance of peak cell rate monitor algorithms have been proposed. In [2] a Bernoulli distribution for background trac was used in a simulation study. A Poisson stream as background trac was used in [7]. A number of identical Bernoulli sources have been monitored by the spacer policer after multiplexing in [10]. The drawback of assuming Bernoulli, Binomial, or Poisson distributions as background trac is that the mean of the distribution determines the CoV denitely. But the CoV plays an important role for the introduction of CDV in the monitored cell stream. Therefore, we investigate background trac for which the cell stream inter-generation times follow a negative binomial (Negbin) distribution (cf. [8], [9]). The use of the negative binomial distribution allows the investigation of the inuence of the CoV on the background trac while the mean cell inter-generation time remains xed. A negative binomial distribution for the random variable X which denotes the number of slots i until the generation of the next cell is given as: i + n ; 1 x(i) = p n (1 ; p) i : (12) i The negative binomial distribution can be seen as an n-fold convolution of a non-shifted geometric distribution with parameter p (note that n is a real number). Mean E[X] and 7

9 CoV c X of a negative binomially distributed random variable X determine its parameters p and n: p = E[X]c 2 X ;1 (13) and n = E[X] E[X]c 2 X ; 1 ;1 : (14) E[X] andc X can be chosen independently of each other but must fulll E[X]c 2 X > 1. 5 Numerical results To derive some numerical results, we consider the trac scenario depicted in Fig.4 and we monitor the cells generated by a CBR source. The inter-generation time for the cells from the background trac is assumed to be negative binomially distributed and both trac streams are multiplexed together. We consider dierent multiplexing policies for cells which are generated simultaneously, namely we give cells from the CBR source priority over the cells from the background trac, vice versa, and choose one of the cells uniformly from the total number of simultaneously generated cells. The inter-generation time distribution for the cells from the CBR source after multiplexing is derived by simulation, i.e. we determine the distribution of time between the emissions of cells from the deterministic cell stream in the Negbin + D=D=1 queueing system. Unless noticed otherwise, cells from the CBR source are given priorityover simultaneously generated cells from the background trac for multiplexing. For numerical results we assume that the CBR source generates one cell each d = 24 slots before being multiplexed with the background trac. The background trac generates one cell each E[X] slots in equilibrium and the CoV c X is varied. The resulting inter-generation time distribution of the cells from the CBR source after being multiplexed is shown in Fig.5. Clearly, the peak at 24 is higher and the distribution is more lean with lower CoV c X =1 and lower intensity (E[X] = 4) of the background trac. The four cell inter-generation time distributions are used as distribution a n (k) for the iterative algorithm described in section 3. We assume that the monitored CBR source behaves well, i.e. that a peak cell rate of at least 1=(d slot duration) is negotiated. Therefore, the rejection probability p r should be zero when T and are chosen appropriately. In [2] is was stated that the monitor algorithm parameter T must in some cases be chosen signicantly smaller than d. In Table 1 we show the minimum values of for dierent choices of T to keep p r below 10 ;9. 8

10 probability E[X]=4 C =1 X probability E[X]=4 C =2 X cell inter-generation time in slots cell inter-generation time in slots probability E[X]=2 C =1 X probability E[X]=2 C =2 X cell inter-generation time in slots cell inter-generation time in slots Figure 5: Distribution of cell inter-generation time. d =24,T = E[X] =4,c X =1, E[X] =4,c X =2, E[X] =2,c X =1, E[X] =2,c X =2, Table 1: Dependency of the minimum value for on T. From Table 1 we can conclude that depends not only on the background trac intensity (as already has been observed in [7]) but is also strongly inuenced by the CoV c X. A small decrease of T (i.e. to monitor a higher cell rate) makes it possible to decrease (i.e. to allow smaller CDV) by far while keeping the cell rejection probability constant. The probability that cells are recognized as compliant due to CDV tolerance is p r = 13% for the parameter set used in the last row oftable 1 and T = 20 and increases to p r = 56% for 9

11 T = 23. This numerical result demonstrates the capability of the peak cell rate monitor algorithm to work transparently (while allowing CVD) if dimensioned appropriately. For the parameter set E[X] = 4, c X = 2, T = 21, and = 26 (cf. Table 1) we tested if cells from a misbehaving CBR source (i.e. the cell generation rate of the source is too high) are recognized by the monitoring algorithm. It turned out that a source which generates one cell each d = 23 slots has only a cell rejection probability p r = 3:7 10 ;8. Sources generating cells with a higher rate (d = 22) are rejected with p r 1:1 10 ;6. But sources which violate the trac contract more (d 21) experience a cell rejection probability of more than 10 ;3. The results indicate that misbehaving sources cannot be discovered in all cases, but that cells from sources which considerably violate the trac contract are detected. For the numerical results shown wehave assumed until nowthatsimultaneously generated cells from the CBR source are given priority over background trac cells for multiplexing. In Table 2 we show how the numerical results are altered if we give background trac priority over CBR trac or if cells are chosen uniformly from the total number of simultaneously generated cells and are transmitted in a FCFS manner. d = 24, T = 23, =8,c X =1 E[X] =4 E[X] =2 CBR trac rst p r 10 ;9 p r =5:9 10 ;5 FCFS, uniformly chosen p r =2:4 10 ;5 p r =2:0 10 ;4 background trac rst p r =2:5 10 ;5 p r =4:1 10 ;4 Table 2: Dependency of p r on the multiplexer scheduling strategy. From Table 2 we can conclude that the cell rejection probability is strongly dependent on the scheduling strategy of the multiplexer. The cell rejection probability p r increases if cells from background trac are multiplexed before simultaneously generated cells from the CBR trac. In order to test the inuence of varying and c X on the rejection probability p r,wehave plotted in Fig.6 numerical results for the parameter set d =24,E[X] = 2, and T = 20. The dierent curves (for =0, 5, 20) indicate that chosing larger improves p r. But the dependency of p r on c X shows that only a choice of a very large value for will keep p r below 10 ;9 if c X is about 1.5 or larger. If too many cells from an ATM connection are rejected although the trac contract is fullled, there are two possibilities for tuning the parameters of the monitor algorithm. Either the monitored cell rate can be increased (i.e. T is decreased) or the CDV tolerance is increased. If is increased too much, the number of back-to-back generated cells which are still recognized as compliant cells increases. Therefore, the cell clumping eect arises but the long term cell rate of the policed source can be guaranteed to be not larger than 1=T. If T is decreased the cell clumping eect is avoided if is chosen properly. Cells from a trac source which violates the trac contract by generating cells with a 10

12 rejection probability E-1 E-2 E-3 E-4 τ=0 E-5 E-6 τ=5 E-7 E-8 τ=20 E c x Figure 6: Cell rejection probability in dependence on the CoV of background trac. higher rate than negotiated but is not inuenced by CDV too much are not detected. Therefore, a tradeo between the avoidance of cell clumping and the recognition of trac contract violations exists. Acknowledgement The author would like to thank R. Dittmann for providing some program modules for the iterative algorithm and for helpful discussions during the course of this work. The author also would like to thank Prof. P. Tran-Gia for fruitful discussions. References [1] P. Boyer, Y. Rouaud, M. Servel, Methode et Systeme de Lissage et de Contr^ole de Debit de Communications Temporelles Asynchrones, French Patent, INPI No. 90/00770, January 1990 and European Patent Oce Bulletin 91/30, July

13 [2] P. Boyer, F.M. Guillemin, M.J. Servel, J.-P. Coudreuse, Spacing Cells Protects and Enhances Utilization of ATM Network Links, IEEE Network Magazine, Vol.6, No.5, September 1992, pp [3] CCITT Draft Recommendation I.35B, B-ISDN ATM Layer Cell Transfer Performance, December [4] CCITT Draft Recommendation I.371, Trac Control and Congestion Control in B-ISDN, June [5] A. Gravey, P. Boyer, Cell Delay Variation Specication in ATM Networks, IFIP Workshop TC6, Modelling and Performance Evaluation of ATM Technology, La Martinique, January [6] F.M. Guillemin, P.E. Boyer, L. Romoeuf, The Spacer-Controller: Architecture and First Assessments, Workshop on Broadband Communications, Estoril, Portugal, January 1992, pp [7] F.M. Guillemin, W. Monin, Limitation of Cell Delay Variation in ATM Networks, ICCT, Beijing, China, September [8] P.Tran-Gia, H. Ahmadi, Analysis of a Discrete-Time G [x] =D=1;S Queueing System with Applications in Packet-Switching Systems, INFOCOM 1988, pp [9] P. Tran-Gia, Discrete-Time Analysis of Performance Models in Computer and Communication Systems, 46th Report on Studies in Congestion Theory, University of Stuttgart, [10] E. Wallmeier, T. Worster, The Spacer Policer, an Algorithm for Ecient Peak Bit Rate Control in ATM Networks, ISS, October 1992, paper A

14 Preprint-Reihe Institut fur Informatik Universitat Wurzburg Verantwortlich: Die Vorstande des Institutes fur Informatik. [1] K. Wagner. Bounded query classes. Februar [2] P. Tran-Gia. Application of the discrete transforms in performance modeling and analysis. Februar [3] U. Hertrampf. Relations among mod-classes. Februar [4] K. W. Wagner. Number-of-query hierarchies. Februar [5] E. W. Allender. A note on the power of threshold circuits. Juli [6] P. Tran-Gia und Th. Stock. Approximate performance analysis of the DQDB access protocol. August [7] M. Kowaluk und K. W. Wagner. Die Vektor-Sprache: Einfachste Mittel zur kompakten Beschreibung endlicher Objekte. August [8] M. Kowaluk und K. W. Wagner. Vektor-Reduzierbarkeit. August [9] K. W. Wagner (Herausgeber). 9. Workshop uber Komplexitatstheorie, eziente Algorithmen und Datenstrukturen. November [10] R. Gutbrod. A transformation system for chain code picture languages: Properties and algorithms. Januar [11] Th. Stock und P. Tran-Gia. A discrete-time analysis of the DQDB access protocol with general input trac. Februar [12] E. W. Allender und U. Hertrampf. On the power of uniform families of constant depth threshold circuits. Februar [13] G. Buntrock, L. A. Hemachandra und D. Siefkes. Using inductive counting to simulate nondeterministic computation. April [14] F. Hubner. Analysis of a nite capacity a synchronous multiplexer with periodic sources. Juli [15] G. Buntrock, C. Damm, U. Hertrampf und C. Meinel. Structure and importance of logspace-mod-classes. Juli [16] H. Gold und P. Tran-Gia. Performance analysis of a batch service queue arising out of manufacturing systems modeling. Juli [17] F. Hubner und P. Tran-Gia. Quasi-stationary analysis of a nite capacity asynchronous multiplexer with modulated deterministic input. Juli [18] U. Huckenbeck. Complexity and approximation theoretical properties of rational functions which map two intervals into two other ones. August [19] P. Tran-Gia. Analysis of polling systems with general input process and nite capacity. August [20] C. Friedewald, A. Hieronymus und B. Menzel. WUMPS Wurzburger message passing system. Oktober [21] R. V. Book. On random oracle separations. November [22] Th. Stock. Inuences of multiple priorities on DQDB protocol performance. November [23] P. Tran-Gia und R. Dittmann. Performance analysis of the CRM a-protocol in high-speed networks. Dezember [24] C. Wrathall. Conuence of one-rule Thue systems. [25] O. Gihr und P. Tran-Gia. A layered description of ATM cell trac streams and correlation analysis. Januar [26] H. Gold und F. Hubner. Multi server batch service systems in push and pull operating mode a performance comparison. Juni [27] H. Gold und H. Grob. Performance analysis of a batch service system operating in pull mode. Juli [28] U. Hertrampf. Locally denable acceptance types the three valued case. Juli [29] U. Hertrampf. Locally denable acceptance types for polynomial time machines. Juli [30] Th. Fritsch und W. Mandel. Communication network routing using neural nets { numerical aspects and alternative approaches. Juli

15 [31] H. Vollmer und K. W. Wagner. Classes of counting functions and complexity theoretic operators. August [32] R. V. Book, J. H. Lutz und K. W. Wagner. On complexity classes and algorithmically random languages. August [33] F. Hubner. Queueing analysis of resource dispatching and scheduling in multi-media systems. September [34] H. Gold und G. Bleckert. Analysis of a batch service system with two heterogeneous servers. September [35] H. Vollmer und K. W. Wagner. Complexity of functions versus complexity of sets.oktober [36] F. Hubner. Discrete-time analysis of the output process of an atm multiplexer with periodic input. November [37] P. Tran-Gia und O. Gropp. Structure and performance of neural nets in broadband system admission control. November [38] G. Buntrock und K. Lorys. On growing context-sensitive languages. Januar [39] K. W. Wagner. Alternating machines using partially dened \AND" and \OR". Januar [40] F. Hubner und P. Tran-Gia. An analysis of multi-service systems with trunk reservation mechanisms. April [41] U. Huckenbeck. On a generalization of the bellman-ford-algorithm for acyclic graphs. Mai [42] U. Huckenbeck. Cost-bounded paths in networks of pipes with valves. Mai [43] F. Hubner. Autocorrelation and power density spectrum of atm multiplexer output processes. September [44] F. Hubner und M. Ritter. Multi-service broadband systems with CBR and VBR input trac. Oktober [45] M. Mittler und P. Tran-Gia. Performance of a neural net scheduler used in packet switching interconnection networks. Oktober [46] M. Kowaluk und K. W. Wagner. Vector language: Simple description of hard instances. Oktober [47] B. Menzel und J. Wol von Gudenberg. Kommentierte Syntaxdiagramme fur C++. November [48] D. Emme. A kernel for funtions denable classes and its relations to lowness. November [49] S. Ohring. On dynamic and modular embeddings into hyper de Bruijn networks. November [50] K. Poeck und M. Tins. An intelligent tutoring system for classication problem solving. November [51] K. Poeck und F. Puppe. COKE: Ecient solving of complex assignment problems with the propose-and-exchange method. November [52] Th. Fritsch, M. Mittler und P. Tran-Gia. Articial neural net applications in telecommunication systems. Dezember [53] H. Vollmer und K. W. Wagner. The complexity of nding middle elements. Januar [54] O. Gihr, H. Gold und S. Heilmann. Analysis of machine breakdown models. Januar [55] S. Ohring. Optimal dynamic embeddings of arbitrary trees in de Bruijn networks. Februar [56] M. Mittler. Analysis of two nite queues coupled by a triggering scheduler. Marz [57] J. Albert, F. Duckstein, M. Lautner und B. Menzel. Message-passing auf transputer-systemen. Marz [58] Th. Stock und P. Tran-Gia. Basic concepts and performance of high-speed protocols. Marz [59] F. Hubner. Dimensioning of a peak cell rate monitor algorithm using discrete-time analysis. Marz [60] G. Buntrock und K. Lorys. The variable membership problem: Succinctness versus complexity. April [61] H. Gold und B. Frotschl. Performance analysis of a batch service system working with a combined push/pull control. April [62] H. Vollmer. On dierent reducibility notions for function classes. April [63] S. Ohring und S. K. Das. Folded Petersen Cube Networks: New Competitors for the Hyepercubes. Mai [64] S. Ohring und S. K. Das. Incomplete Hypercubes: Embeddings of Tree-Related Networks. Mai [65] S. Ohring und S. K. Das. Mapping Dynamic Data and Algorithm Structures on Product Networks. Mai [66] F. Hubner und P. Tran-Gia. A Discrete-Time Analysis of Cell Spacing in ATM Systems. Juni [67] R. Dittmann und F. Hubner. Discrete-Time Analysis of a Cyclic Service System with Gated Limited Service. Juni [68] M. Frisch und K. Jucht. Pascalli-P. August [69] G. Buntrock. Growing Context-Sensitive Languages and Automata. September [70] S. Ohring und S. K. Das. Embeddings of Tree-Related Topologies in Hyper Petersen Networks. Oktober

16 [71] S. Ohring und S. K. Das. Optimal Communication Primitives on the Folded Petersen Networks. Oktober [72] O. Rose und M. R. Frater. A Comparison of Models for VBR Video Trac Sources in B-ISDN. Oktober [73] M. Mittler und N. Gerlich. Reducing the Variance of Sojourn Times in Queueing Networks with Overtaking. November [74] P. Tran-Gia. Discrete-Time Analysis Technique and Application to Usage Parameter Control Modelling in ATM Systems. November [75] F. Hubner. Output Process Analysis of the Peak Cell Rate Monitor Algorithm. January

University ofwurzburg. Research Report Series. Monitoring ON/OFF-Trac. M. Ritter. Institute of Computer Science, University of Wurzburg,

University ofwurzburg. Research Report Series. Monitoring ON/OFF-Trac. M. Ritter. Institute of Computer Science, University of Wurzburg, University ofwurzburg Institute of Computer Science Research Report Series Analysis of the Generic Cell Rate Algorithm Monitoring ON/OFF-Trac M. Ritter Report No. 77 January 1994 Institute of Computer

More information

University ofwurzburg. Research Report Series. in ATM Systems. M. Ritter. Institute of Computer Science, University of Wurzburg

University ofwurzburg. Research Report Series. in ATM Systems. M. Ritter. Institute of Computer Science, University of Wurzburg University ofwurzburg Institute of Computer Science Research Report Series Performance Analysis of the Dual Cell Spacer in ATM Systems M. Ritter Report No. 95 November 1994 Institute of Computer Science,

More information

University of Wurzburg Institute of Computer Science Research Report Series Sojourn Time Distribution of the Asymmetric M=M=1==N { System with LCFS-PR Service M. Mittler and R. Muller Report No. 94 November

More information

University ofwurzburg. Research Report Series. Articial Neural Networks Used. Probe Testers. U. Rothaugy, E. Yanenkoy and. K.

University ofwurzburg. Research Report Series. Articial Neural Networks Used. Probe Testers. U. Rothaugy, E. Yanenkoy and. K. University ofwurzburg Institute of Computer Science Research Report Series Articial Neural Networks Used for Way Optimization in Multi-Head Systems in Application to Electrical Flying Probe Testers U.

More information

University ofwurzburg. Research Report Series. modeling in ATM systems. O. Rose. Institute of Computer Science, University of Wurzburg

University ofwurzburg. Research Report Series. modeling in ATM systems. O. Rose. Institute of Computer Science, University of Wurzburg University ofwurzburg Institute of Computer Science Research Report Series Statistical properties of MPEG video trac and their impact on trac modeling in ATM systems O. Rose Report No. 11 February 1995

More information

forward prediction bidirectional prediction

forward prediction bidirectional prediction University of Wurzburg Institute of Computer Science Research Report Series Simple and Ecient Models for Variable Bit Rate MPEG Video Trac O. Rose Report No. 20 July 995 Institute of Computer Science,

More information

51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff

51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff 51-20-99 Traffic Control Functions in ATM Networks Byung G. Kim Payoff A standard monitoring algorithm for two traffic types--constant bit rate (e.g., voice) and variable bit rate (e.g., compressed video)--can

More information

University of Würzburg Institute of Computer Science Research Report Series

University of Würzburg Institute of Computer Science Research Report Series University of Würzburg Institute of Computer Science Research Report Series A Numerical Analysis of the Geo/D/N Queueing System N. Vicari and P. Tran-Gia Report No. 151 September 1996 Institute of Computer

More information

Oscillations of the Sending Window in Compound TCP

Oscillations of the Sending Window in Compound TCP Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Quality of Service in ATM Networks

Quality of Service in ATM Networks Quality of Service in ATM Networks Components of a QoS Network 1. At network entrance: Policing and Shaping 2. Somewhere in the network: Admission Control 3. At switches: Classification, Scheduling 4.

More information

Thesis work and research project

Thesis work and research project Thesis work and research project Hélia Pouyllau, INRIA of Rennes, Campus Beaulieu 35042 Rennes, helia.pouyllau@irisa.fr July 16, 2007 1 Thesis work on Distributed algorithms for endto-end QoS contract

More information

Protocol Architecture. ATM architecture

Protocol Architecture. ATM architecture Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode: ATM 1990 s/00 standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated,

More information

400B.2.1 CH2827-4/90/0000-0350 $1.OO 0 1990 IEEE

400B.2.1 CH2827-4/90/0000-0350 $1.OO 0 1990 IEEE Performance Characterizations of Traffic Monitoring, and Associated Control, Mechanisms for Broadband "Packet" Networks A.W. Berger A.E. Eckberg Room 3R-601 Room 35-611 Holmde1,NJ 07733 USA Holmde1,NJ

More information

ATM Network BTS BSC MSC

ATM Network BTS BSC MSC University of Wurzburg Institute of Computer Science Research Report Series Carrying CDMA Trac Over ATM Using AAL{2 A Performance Study Notker Gerlich and Michael Ritter Report No. 188 November 97 Institute

More information

CHAPTER 1 ATM TRAFFIC MANAGEMENT

CHAPTER 1 ATM TRAFFIC MANAGEMENT CHAPTER 1 ATM TRAFFIC MANAGEMENT Webster s New World Dictionary defines congestion as filled to excess, or overcrowded; for example, highway congestion. Although, the best solution of congestion is to

More information

University ofwurzburg. Research Report Series. in B-ISDN. O. Rosey andm. R. Fraterz

University ofwurzburg. Research Report Series. in B-ISDN. O. Rosey andm. R. Fraterz University ofwurzburg Institute of Computer Science Research Report Series A Comparison of Models for VBR Video Trac Sources in B-ISDN O. Rosey andm. R. Fraterz Report No. 72 October 1993 y Institute of

More information

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL) Asynchrous Transfer Mode: architecture 1980s/1990 s standard for high-speed (155Mbps to 622 Mbps and higher) Broadband Integrated Service Digital Network architecture Goal: integrated, end-end transport

More information

Efficient Call Handling Mechanism of Cellular Networks

Efficient Call Handling Mechanism of Cellular Networks University of Wurzburg Institute of Computer Science Research Report Series Ecient call handling procedures in cellular mobile networks Michel Mandjes y Kurt Tutschku z Report No. 144 July 1996 Department

More information

On Source Rules for ABR Service on ATM Networks with Satellite Links Sonia Fahmy, Raj Jain, Shivkumar Kalyanaraman, Rohit Goyal, and Fang Lu y Department of Computer and Information Science The Ohio State

More information

A Software Architecture for a Photonic Network Planning Tool

A Software Architecture for a Photonic Network Planning Tool A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart

More information

EUROPEAN ETS 300 301 TELECOMMUNICATION March 1995 STANDARD

EUROPEAN ETS 300 301 TELECOMMUNICATION March 1995 STANDARD EUROPEAN ETS 300 301 TELECOMMUNICATION March 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052801 ICS: 33.080 Key words: Broadband, ISDN, traffic, congestion Broadband Integrated Services Digital Network

More information

A Policy-Based Admission Control Scheme for Voice over IP Networks

A Policy-Based Admission Control Scheme for Voice over IP Networks Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

Motivation. QoS Guarantees. Internet service classes. Certain applications require minimum level of network performance:

Motivation. QoS Guarantees. Internet service classes. Certain applications require minimum level of network performance: QoS Guarantees Motivation introduction call admission traffic specification link-level scheduling call setup protocol reading: Tannenbaum, 393-395, 458-471 Ch 6 in Ross/Kurose Certain applications require

More information

Lecture Computer Networks

Lecture Computer Networks Lecture Computer Networks Prof. Dr. Hans Peter Großmann mit M. Rabel sowie H. Hutschenreiter und T. Nau Sommersemester 2012 Institut für Organisation und Management von Informationssystemen Asynchronous

More information

A System Architecture for Low Bit Rate Traffic Aggregation in Control Applications

A System Architecture for Low Bit Rate Traffic Aggregation in Control Applications A System Architecture for Low Bit Rate Traffic Aggregation in Control Applications JMCabral 1, JGRocha 1, JENeves 1 and JRuela 2 1 Industrial Electronics Department, University of Minho, Campus de Azurém,

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

TRAFFIC control and bandwidth management in ATM

TRAFFIC control and bandwidth management in ATM 134 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 1, FEBRUARY 1997 A Framework for Bandwidth Management in ATM Networks Aggregate Equivalent Bandwidth Estimation Approach Zbigniew Dziong, Marek Juda,

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

Performance Analysis of Priority Scheme in ATM Network

Performance Analysis of Priority Scheme in ATM Network 1 International Journal of Computer Applications (975 7) Performance Analysis of Priority Scheme in ATM Network Vikram Bali Department of Computer Science & Engineering Ideal Institute of Technology, Ghaziabad

More information

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007) School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit

More information

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito. Introduction to Quality of Service Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ QoS Issues in Telecommunication Networks - 1 Quality of service

More information

An ATM WAN/LAN Gateway Architecture

An ATM WAN/LAN Gateway Architecture An ATM WAN/LAN Gateway Architecture Gary J. Minden, Joseph B. Evans, David W. Petr, Victor S. Frost Telecommunications & Information Sciences Laboratory Department of Electrical & Computer Engineering

More information

Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR. For More Information On This Product, Go to: www.freescale.com

Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR. For More Information On This Product, Go to: www.freescale.com Overview of Asynchronous Transfer Mode (ATM) and MPC860SAR nc. 2 What is ATM? o Protocol that applies primarily to layer 2 of the OSI protocol stack: Application Presentation Session Transport Network

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71

Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71 Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP,

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

CS 5516 Computer Architecture Networks

CS 5516 Computer Architecture Networks Lecture 11: ISDN & ATM CS 5516 Computer Architecture Networks VA Tech Prof. Roy M. Wnek History of ISDN Traditionally, local loop connectivity has been with an analog signal on copper Inefficient, prone

More information

AE64 TELECOMMUNICATION SWITCHING SYSTEMS

AE64 TELECOMMUNICATION SWITCHING SYSTEMS Q2. a. Draw the schematic of a 1000 line strowger switching system and explain how subscribers get connected. Ans: (Page: 61 of Text book 1 and 56 of Text book 2) b. Explain the various design parameters

More information

Rate Constraints for Packet Video Transmission. 3.2 Comparison of VBR and CBR video transmission : : : : : : : : : : : 79

Rate Constraints for Packet Video Transmission. 3.2 Comparison of VBR and CBR video transmission : : : : : : : : : : : 79 75 Chapter 3 Rate Constraints for Packet Video Transmission Based on Joint SourceèNetwork Criteria 1 Contents 3.1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 75 3.2 Comparison

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Internet Dial-Up Traffic Modelling

Internet Dial-Up Traffic Modelling NTS 5, Fifteenth Nordic Teletraffic Seminar Lund, Sweden, August 4, Internet Dial-Up Traffic Modelling Villy B. Iversen Arne J. Glenstrup Jens Rasmussen Abstract This paper deals with analysis and modelling

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

QoS Monitoring for ATM-based Networks

QoS Monitoring for ATM-based Networks QoS Monitoring for ATM-based Networks H. R. Wiltfang, C. Schmidt Institute of Telematics, University of Karlsruhe Zirkel 2, 76128 Karlsruhe, Germany Tel. +49 721 608 [6406/6408], Fax +49 721 388097 [wiltfang/schmidt]@telematik.informatik.uni-karlsruhe.de

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Architecture bits. (Chromosome) (Evolved chromosome) Downloading. Downloading PLD. GA operation Architecture bits

Architecture bits. (Chromosome) (Evolved chromosome) Downloading. Downloading PLD. GA operation Architecture bits A Pattern Recognition System Using Evolvable Hardware Masaya Iwata 1 Isamu Kajitani 2 Hitoshi Yamada 2 Hitoshi Iba 1 Tetsuya Higuchi 1 1 1-1-4,Umezono,Tsukuba,Ibaraki,305,Japan Electrotechnical Laboratory

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu

ICS 153 Introduction to Computer Networks. Inst: Chris Davison cbdaviso@uci.edu ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu 1 ICS 153 Introduction to Computer Networks Course Goals Understand the basic principles of computer networks Design Architecture

More information

Chapter 4 Multi-Stage Interconnection Networks The general concept of the multi-stage interconnection network, together with its routing properties, have been used in the preceding chapter to describe

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev

VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,

More information

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL STATIsTICs 4 IV. RANDOm VECTORs 1. JOINTLY DIsTRIBUTED RANDOm VARIABLEs If are two rom variables defined on the same sample space we define the joint

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Examining Self-Similarity Network Traffic intervals

Examining Self-Similarity Network Traffic intervals Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have

More information

Storage Servers. Jeong-dong Ryoo and Shivendra S. Panwar. Center for Advanced Technology in Telecommunications. Polytechnic University.

Storage Servers. Jeong-dong Ryoo and Shivendra S. Panwar. Center for Advanced Technology in Telecommunications. Polytechnic University. File Distribution in Networks with Multimedia Storage Servers Jeong-dong Ryoo and Shivendra S. Panwar Center for Advanced Technology in Telecommunications Polytechnic University Five Metrotech Center,

More information

NGN Network Architecture

NGN Network Architecture ITU/BDT Regional Seminar on Costs and Tariffs for Member Countries of the Tariff Group for Africa (TAF) Midrand,, South Africa, June 2005 NGN Network Architecture Oscar González Soto ITU Consultant Expert

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications

Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies

More information

Issues of Variance of Extreme Values in a Heterogeneous Teletraffic Environment

Issues of Variance of Extreme Values in a Heterogeneous Teletraffic Environment Issues of Variance of Extreme Values in a Heterogeneous Teletraffic Environment D.E. Bassey 1, R. C. Okoro 2, B. E. Okon 3 1, 2 Electronics and Computer Technology Unit, Department of Physics, University

More information

Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p.

Maximizing the number of users in an interactive video-ondemand. Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. Title Maximizing the number of users in an interactive video-ondemand system Author(s) Bakiras, S; Li, VOK Citation Ieee Transactions On Broadcasting, 2002, v. 48 n. 4, p. 281-292 Issued Date 2002 URL

More information

Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks

Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks 2072 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 10, OCTOBER 2000 Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks Maode Ma and Mounir Hamdi, Member, IEEE

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

The Network Layer Functions: Congestion Control

The Network Layer Functions: Congestion Control The Network Layer Functions: Congestion Control Network Congestion: Characterized by presence of a large number of packets (load) being routed in all or portions of the subnet that exceeds its link and

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks

Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Dynamic Reconfiguration & Efficient Resource Allocation for Indoor Broadband Wireless Networks Tim Farnham, Brian Foxon* Home Communications Department HP Laboratories Bristol HPL-98-123 June, 1998 broadband,

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information

ITC 12 Torino, June 1988 ANALYTIC APPROACH OF VOICE/DATA INTEGRATION ON TOKEN PASSING LAN'S BASED ON IEEE 802.5. K. Sauer, M.

ITC 12 Torino, June 1988 ANALYTIC APPROACH OF VOICE/DATA INTEGRATION ON TOKEN PASSING LAN'S BASED ON IEEE 802.5. K. Sauer, M. ANALYTIC APPROACH OF VOICEDATA INTEGRATION ON TOKEN PASSING LAN'S BASED ON IEEE 802.5 K. Sauer, M. Tangemann Institute of Communications Switching and Data Technics University of Stuttgart Federal Republic

More information

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.

Keywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement

More information

Course Description. Students Will Learn

Course Description. Students Will Learn Course Description The next generation of telecommunications networks will deliver broadband data and multimedia services to users. The Ethernet interface is becoming the interface of preference for user

More information

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed.

1. The subnet must prevent additional packets from entering the congested region until those already present can be processed. Congestion Control When one part of the subnet (e.g. one or more routers in an area) becomes overloaded, congestion results. Because routers are receiving packets faster than they can forward them, one

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Optimal batch scheduling in DVB-S2 satellite networks

Optimal batch scheduling in DVB-S2 satellite networks Optimal batch scheduling in DVB-S2 satellite networks G. T. Peeters B. Van Houdt and C. Blondia University of Antwerp Department of Mathematics and Computer Science Performance Analysis of Telecommunication

More information

[8] Nicholas Bambos, Shou Chen, and Gregory Pottie. Channel access algorithms with active link

[8] Nicholas Bambos, Shou Chen, and Gregory Pottie. Channel access algorithms with active link [8] Nicholas Bambos, Shou Chen, and Gregory Pottie. Channel access algorithms with active link protection for wireless networks with power control. Technical Report UCLA-ENG-95-114, UCLA School of Engineering

More information

ATM. Asynchronous Transfer Mode. Networks: ATM 1

ATM. Asynchronous Transfer Mode. Networks: ATM 1 ATM Asynchronous Transfer Mode Networks: ATM 1 Issues Driving LAN Changes Traffic Integration Voice, video and data traffic Multimedia became the buzz word One-way batch Two-way batch One-way interactive

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

DYNAMIC MODELING FOR INTERNET TELEPHONY MANAGEMENT

DYNAMIC MODELING FOR INTERNET TELEPHONY MANAGEMENT DYNAMIC MODELING FOR INTERNET TELEPHONY MANAGEMENT Habib Sedehi HELP Auditing Informatico Via Antonio D Achiardi, 3 0058 Rome (ITALY) E-mail Sedehi@help.it Nicolò Vaccaro Università degli Studi di Palermo

More information

Protocol Architecture

Protocol Architecture Protocol Architecture ed Protocol Architectures OSI Reference Model TCP/IP Protocol Stack Need for Protocols The task of exchanging information between devices requires a high degree of cooperation between

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana

More information

Performance advantages of resource sharing in polymorphic optical networks

Performance advantages of resource sharing in polymorphic optical networks R. J. Durán, I. de Miguel, N. Merayo, P. Fernández, R. M. Lorenzo, E. J. Abril, I. Tafur Monroy, Performance advantages of resource sharing in polymorphic optical networks, Proc. of the 0th European Conference

More information

16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4

16/5-05 Datakommunikation - Jonny Pettersson, UmU 2. 16/5-05 Datakommunikation - Jonny Pettersson, UmU 4 Multimedia Networking Principles Last time Classify multimedia Multimedia Networking Applications Streaming stored audio and video Identify the network Real-time Multimedia: Internet Phone services the

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

A Tool for Multimedia Quality Assessment in NS3: QoE Monitor

A Tool for Multimedia Quality Assessment in NS3: QoE Monitor A Tool for Multimedia Quality Assessment in NS3: QoE Monitor D. Saladino, A. Paganelli, M. Casoni Department of Engineering Enzo Ferrari, University of Modena and Reggio Emilia via Vignolese 95, 41125

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

An Ecient Dynamic Load Balancing using the Dimension Exchange. Ju-wook Jang. of balancing load among processors, most of the realworld

An Ecient Dynamic Load Balancing using the Dimension Exchange. Ju-wook Jang. of balancing load among processors, most of the realworld An Ecient Dynamic Load Balancing using the Dimension Exchange Method for Balancing of Quantized Loads on Hypercube Multiprocessors * Hwakyung Rim Dept. of Computer Science Seoul Korea 11-74 ackyung@arqlab1.sogang.ac.kr

More information

Load Balancing Routing Algorithm for Data Gathering Sensor Network

Load Balancing Routing Algorithm for Data Gathering Sensor Network Load Balancing Routing Algorithm for Data Gathering Sensor Network Evgeny Bakin, Grigory Evseev State University of Aerospace Instrumentation Saint-Petersburg, Russia {jenyb, egs}@vu.spb.ru Denis Dorum

More information

Channel Allocation in Cellular Telephone. Systems. Lab. for Info. and Decision Sciences. Cambridge, MA 02139. bertsekas@lids.mit.edu.

Channel Allocation in Cellular Telephone. Systems. Lab. for Info. and Decision Sciences. Cambridge, MA 02139. bertsekas@lids.mit.edu. Reinforcement Learning for Dynamic Channel Allocation in Cellular Telephone Systems Satinder Singh Department of Computer Science University of Colorado Boulder, CO 80309-0430 baveja@cs.colorado.edu Dimitri

More information

Simulation of Quality of Service Mechanisms in the UMTS Terrestrial Radio Access Network

Simulation of Quality of Service Mechanisms in the UMTS Terrestrial Radio Access Network Simulation of Quality of Service Mechanisms in the UMTS Terrestrial Radio Access Network A. B. García, M. Álvarez-Campana, E. Vázquez and J. Berrocal Departamento de Ingeniería de Sistemas Telemáticos,

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

2WB05 Simulation Lecture 8: Generating random variables

2WB05 Simulation Lecture 8: Generating random variables 2WB05 Simulation Lecture 8: Generating random variables Marko Boon http://www.win.tue.nl/courses/2wb05 January 7, 2013 Outline 2/36 1. How do we generate random variables? 2. Fitting distributions Generating

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information