Efficient Cache Structures of IP Routers to Provide Policy Based Services

Size: px
Start display at page:

Download "Efficient Cache Structures of IP Routers to Provide Policy Based Services"

Transcription

1 Efficient Cache Structures of IP Routers to Provide Policy Based Services Shingo Ata Masayuki Murata Hideo Miyahara Abstract: The policy service based on the traffic characteristics is becoming important for the Internet shared by various applications. For this purpose, the router is required to forward packets according to the requirements of the traffic flow that the packet belongs to. However, the packet (and flow) classification easily becomes a bottleneck in the high speed router because the router is necessary to search multiple fields within the packet. In this paper, we propose a new packet classification algorithm capable of following the packet forwarding rate of the high speed routers with the commercially available CPU, RAM, and cache memories. Through our experiments, we show the effects of parameters of the cache memory on the processing rate of packet classification. 1 Introduction A rapid growth of the Internet and proliferation of new multimedia applications lead to demands of high speed networks. In the today s Internet shared by the various applications, it is necessary to realize a policy service based on the traffic characteristics. For this purpose, the router is required to forward the packets according to the requirements of the traffic flow that the packet belongs to. To provide the policy service at the router, the capability of packet classifications is necessary for the decision about an appropriate action against the flow to guarantee the user s QoS (Quality of Service) and/or the Internet Service Provider s Service Level Agreement (SLAs). However, the packet (and flow) classification would easily become a bottleneck in the high speed router because the router is necessary to search multiple fields within the packet for the flow classification. There are some studies speeding up the address lookups of the router (see, e.g., [1] and references therein). However, it is difficult to apply those proposals directly to the flow classification, because the size of a lookup table increases exponentially with the number and length of the packet field. From this reason, it is necessary to investigate the new algorithm suitable for the flow classification. A study on the flow classification can be found in [2]. However, the proposal in [2] uses a bit level parallelism to look up multiple fields simultaneously, and the customized hardware (e.g., FPGA or ASIC) is necessary to obtain the expected performance, leading to increase the cost of routers. If we can use a general purpose CPU, on the other hand, the total cost of the flow classification capable routers can keep low since the cost of commercially available CPU becomes more and more reasonable. When the flow classification mechanism is realized by the general purpose CPU, the latency of memory accesses is most dominant in determining the performance. A cache memory is the high speed accessible hardware 1

2 component to decrease the influence of the RAM access. That is, the optimized data structures determines the performance of the flow classification by decreasing the number of accesses to RAM. can be decreased significantly with the optimized data structures. In this paper, we propose a new flow classification algorithm capable of following the packet forwarding rate of the high speed routers by using the commercially available CPU, RAM, and cache memories. Then, through our experiments, we show the effects of the cache memory structures on the processing rate of flow classification. In this paper, we first describe the flow classifier and the memory requirement to store the flow statistics in Section 2. We next show the brief description of the cache memory structure and the effect of parameters of the cache memory in Section 3. We then examine the proposed flow classification scheme in Section 4. Section 5 shows our experimental results. Finally, we conclude our work with future research topics in Section 6. 2 Definition of Flow Classifier In this section, we define our flow classifier based on the statistical analysis of the flows gathered from the operating network. Requirement on the amount of the memory to store the flows is also examined. 2.1 Flow Classifier It is adequate to consider the sequence of packets belonging to the same connection as the same flow. Henceforth, it might be adequate to identify the flow using the following fields in the IP packet. {Src IP, Dest IP, Src Port, Dest Port, Protocol} However, the total length of the above fields reaches 104 bits, which is too enormous for the size of lookup table. Fortunately, we can disregard the Protocol field for flow classification since the it shows the kind of the IP packets such as TCP, UDP, ICMP, and RAW IP, and few applications have two or more Protocol values. Furthermore, HTTP, which is used by a currently dominant application WWW, uses multiple connections for each text and/or image files. Those connections can be treated as an aggregated single flow. It is even necessary when considering the fairness between users. We therefore use following fields as the flow classifier. {Src IP, Dest IP, Port Number } Note that Port Number is the lower value between the value of Src Port and Dest Port. It is because the most applications use the administrative port number smaller than 1024 that the application user cannot use. 2.2 Requirements for Storing the Flow Values The flow information to store into the router memory depends on service policy to be applied. In this section, we examine some important applications of the policy service, and evaluate the required memory size to store the

3 value associated with the flow for each service (which we will call flow value for short). Then, we will conclude that 2 bytes of memory is sufficient for each flow. Random Early Detection Based on Flow Classifications A RED (Random Early Detection) [3] mechanism is effective for the router to fairly treat the connections. In FIFO (First In First Out) or Drop Tail queueing, the sequence of packets from the particular connection tends to be discarded once the router becomes congested. In this sense, the fairness between connections cannot be established in the FIFO router. On the other hand, the RED router drops the incoming packet randomly with some probability as the queue length exceeds the pre defined threshold value. As a result, bursty packet losses can be avoided, which leads to a fair service among connections to some extent at congestion occurrence. A problem is that RED can only treat the fairness among connections, not among applications. If the flow classification is provided in an efficient way, the fairness among applications can also be established by the flow based RED [4]. In the flow based RED, the threshold is defined for each flow. When the packet arrives at the flow based RED router, the router classifies the flow, and checks the threshold for that flow. If the queue length exceeds the threshold, the router drops the packet with some probability. To store the threshold value into the flow values, it should be described as the queue length. When the flow value has 2 bytes memory, the threshold can cover 64 KB up to 256 KB by shifting 2 bit. Application to Core-Stateless Routers A core stateless router [5] is intended to fairly allocate bandwidth among flows. In CSFQ (Core Stateless Fair Queueing), the router has the per flow state, and updates the state when the packet of the flow arrives at the router. The state is described by the estimated rate of the flow in CSFQ. Since the CSFQ realizes the fairness among active flows sharing the link bandwidth, the estimated rate of the flow is normalized as (bandwidth / the total number of active flows). The router can estimate the rate of the flow when the total number of flows is less than 65,536 if each state has 2 byte memory. Fairness with the Deficit Round Robin A DRR (Deficit Round Robin) [6] algorithm can process weighted per flow queueing to provide the various kind of fairness between flows. DRR uses the deficit counter to keep the maximum number of bytes to be processed for the flow when the flow s turn comes around. When the deficit counter has 2 byte, the counter can describe up to 64 KB which is the maximum size of IP packets.

4 3 Characteristics of the Cache Memory Before describing our flow classification algorithm, we show the brief description on the cache structure to investigate the effects of parameters of the cache memory. 3.1 The structure of the cache memory Recently, a two level cache structure is widely used. It has two types of cache memory. The L1 (Level 1) cache is high speed memory and its speed is closest to CPU. The L2 (Level 2) cache is located between L1 cache and RAM, and its speed is also intermediate between L1 cache and RAM. A memory access from CPU is first reached at L1 cache to examine whether the address is cached or not. If it is cached, CPU reads from the L1 cache. Otherwise, the L2 cache is checked. If the address is not cached in the L2 cache, The address content is read from RAM. Note that more detailed caching mechanism (such as write through or write once) may affect the performance of flow classification, but it is out of scope in this paper. We will show results on performance experiments in Section 5 assuming Intel Pentium II. 3.2 Effect of Parameters Here, we examine three parameters of the cache memory; the cache block size, the degree of set associative mapping, and the cache size. Numerical results will be shown in the next section by changing those parameters Effect of the Cache Block Size The cache block is a unit of data transfer between L1, L2, and RAM. When the cache miss occurs, the cache memory reads the block of the memory. If the block size is large, the continuous address can be cached. It is therefore expected to increase the cache hit rate. However, the larger block size leads to larger memory read delay (= Block Size / Bus Width Memory Access Delay) Effect of the Set Associative Mapping Set associative mapping is recently used to increase the utilization of the cache memory. When the associativity is set to be large, the cache memory is highly and impartially utilized. However, the cost of the large associativity may be too expensive Effect of the Cache Size It is necessary to increase the capacity of the cache memory to increase the cache hit rate. However, as the cache size becomes large, the cost of the cache memory increases exponentially. Too large cache memory does not necessarily improve the cache hit ratio. It is therefore necessary to investigate the appropriate cache size for classifying flows efficiently in our context.

5 Frequency Number of Addresses Figure 1: The Number of Lower 16 bit Addresses 4 Flow Lookup Procedures 4.1 Partitioning the Flow Classifier The delay of accessing to memory is a dominant factor for determining the performance of flow classifications. Namely, reduction in the number of memory references can significantly speed up processing of packet classifications. Of course, the delay of the flow lookup would be minimized in one memory access by preparing a huge lookup table. The size of such a table, however, reaches bytes, and the large portion of the table would never be accessed. Because there is a trade off between the number of memory references and the required table size, we need to decide the structure of the flow lookup table by carefully examining both the memory size and the speed of flow classifications. We now demonstrate the sparse nature of the IP packet addresses by using the packet traced data. We gathered the traced data by the traffic monitor OC3MON [7, 8]. The monitor is placed at the gateway of Osaka University, i.e., our results reflect the characteristics of the traffic between the Internet backbone and the large scaled campus network. The total number of packets is over 27 millions. Figure 1 plots frequency distribution for the number of lower 16 bit addresses associated with the upper 16 bit address. More specifically, we plot the figure as follows. for some 32 bit IP address, we divide it into two parts; upper and lower 16 bit addresses. Then, we count the number of different lower 16 bit addresses which appear for some upper 16 bit address in the traced data. For example, there were 10 IP addresses, each of which shows 21 different lower 16 bit addresses in the traced data. From the figure, it is apparent that it follows the Zipf s law with parameter α =1[9]. There were over 40,000 addresses for lower 16 bit of addresses which did not appear in the traced data. The ratio of such addresses is about 60%. Moreover, the maximum number of lower 16 bit addresses was 97, which is less than 1% of the 16 bit address space. In summary, the flow classifier should be divided into several parts to improve memory utilization even though the number of memory references increases to some degree. In our scheme, we divide the flow classifier into following three parts; the upper 16 bit of the destination IP address, the lower 16 bit value of the destination IP address, and the source IP address + port number.

6 Frequency Number of Addresses Figure 2: Varieties of (Source IP, Port) Fields Categorized by the Destination IP Dest. IP Address bits 64K Entries 256 Entries Hash (Dest IP(17..32)) Destination Address Lookup Table Source Address Lookup Table Hash(Source IP) 1K Entries Hash ID Flow Stat Figure 3: Proposed Data Structure 4.2 Table Compression with the Hash Function As described above, the maximum number of lower addresses is 97, which is less than 1% of the 16 bit address space. Since the observation is based on our experimental traced data, it can not be always applied to other cases. However, it is also a natural assumption for assigning the IP addresses within the local administrative organization. Once such an assumption is admitted, it is useful to compress the size of the lookup table with the hash table to obtain higher utilization of the lookup table. It becomes helpful especially when the number of active entries is quite smaller than the number of total entries in the table. From the result of the previous subsection, the hash table with 256 entries is enough to store all lower 16 bit addresses. Because the number of entries is reduced from 65,536 to 256, different lower addresses may have the same hash index. Thus, we need the following procedure. When the entry is already used by another lower address, the algorithm checks the next entry of the hash table. A step by step check can reduce the number of memory accesses because the CPU caching is performed for each block. We next show the number of varieties of (Source IP address, Port Number) fields categorized by the destination IP address in Figure 2. The figure shows that about 1200 entries hash table is sufficient. 4.3 Algorithm of Flow Classification and Lookup We now describe our flow classification algorithm and lookup procedure. Figure 3 shows the data structure of our classification algorithm. The structure of the lookup table consists of four major part.

7 32 Bytes Block 7 Entries Destination IP Addr Hash ID Flow Stat Figure 4: Detailed Description of the Third Table 1. Upper 16 bit destination IP address lookup table It is a directly accessible table (65,536 entries), and each entry contains a pointer to the second table. 2. Lower 16 bit destination IP address lookup table: It is a 256 entry hash table, and each entry contains a pointer to the third table. 3. Source address lookup table: The source address consists of the combination of (Source IP address, Port Number), and it is a hash table having 1,120 entries. Each entry has Destination IP address for verification A hash value of (Source IP address, Port Number) The value associated with the flow Figure 4 illustrates the data structure of the third lookup table for the case where when the block size of the cache memory is 32 byte. To reduce the number of memory accesses, the first 4 byte is used to store the destination IP address. It is used for checking whether the destination address in the packet is equal to the stored value or not. If the verification succeeds, no memory reference is performed because the flow value is cached. In this structure, (32 4)/4 =7entries can be stored into one cache block. The required number of blocks becomes 160 to create the hash table with 1,120 entries. We finally show the address calculation algorithm for the flow lookup. 1. Ptr1 = HeadTable[Dest Addr(1..16)] 2. Ptr2 = Ptr1[Hash(Dest Addr (17..32))] 3. stateptr = Ptr (Hash(Src, Port) / 7) + (Hash(Src, Port) mod 7) Numerical Experiments and Discussions In this section, we show our experimental results on the flow lookup delay and the effect of parameters in the cache memory.

8 5.1 Experimental Setup We implemented our proposed scheme on the following architecture. Intel Pentium II 450 MHz 16 KB 4 way set associative L1 cache 512 KB 4 way set associative L2 cache 256 MB memory Linux GNU gcc version (release) We again use the packet traced data that we have described in Section 2. To investigate the effect of parameters of the cache memory, we used trace driven cache simulator, Dinero IV version 7 [10]. Moreover, we use RDTSC [11] instruction in Pentium II to obtain the number of CPU cycles for the flow classification. Dinero IV reports the total number of memory references N, and the cache miss ratio of L1 and L2 (denoted by M L1 and M L2, respectively). We also obtained total number of packets P, the reference delays of memory, L1, and L2 cache (N Mem, N L1, and N L2, respectively). We can determine the mean access delay for the flow classification as; mean access delay = N/P (1 M L1 )N L1 (1) M L1 (1 M L2 )N L2 M L1 M L2 N Mem We finally note that in an actual situation some update procedure is necessary according to the adopted policy, but we neglect it in the following results. 5.2 Effects of Cache Memory Sizes We first show the effect of the L1 cache size on the cache miss ratio in Figure 5 by utilizing the cache simulator Dinero IV. The cache miss ratio can be decreased by the increased cache memory size. However, when the size is beyond 64 KB, we cannot observe the significant improvement by the cache size. Thus, the currently available L1 cache size of Intel Pentium II (and III) is slightly smaller than the expected one. Figure 6 shows the relation between the associativity and the cache miss ratio. The same tendency can be found in the figure. The four way set associativity of Intel Pentium is slightly smaller. Due to space limitation, we cannot show results on the L2 cache, but its effect follows the same tendency as the L1 cache. The reasonable values were 256 KB for the cache size, and four for the associativity.

9 Cache Miss Rate Cache Size Figure 5: Effect of the Cache Size (L1) Cache Miss Rate Associativities Figure 6: Effect of the Associativity (L1) 5.3 CPU Cycles and Required Memory Size We finally show the average CPU cycles necessary for the packet classification by using RDTSC in Table 1. The values of sizes of the L1 and L2 caches and associativities are based on Intel Pentium II, and are fixed as described before. The table shows that our implementation can classify about 2 million packets per second. If we assume the average packet size is 552 Bytes [7], our scheme can follow up to 10 Gbps of the switching capacity or the link speed. The required memory size was 49.1 MB. It is because the lookup table size is fixed for each flow in the current implementation. If we can change the size of lookup table dependent on the flow, the required memory size could be reduced. which is the future research topic. 6 Concluding Remarks In this paper, we have proposed a new packet classification algorithm capable of following the packet forwarding rate of the high speed routers with the commercially available CPU, RAM, and cache memories. Through our experiments, we have shown the effects of parameters of the cache memory on the processing rate of packet Table 1: CPU Cycles CPU Cycles Processing Delay Packet Lookup Rate nsec MPPS

10 classification. For future research topics, we need to evaluate our implementation with the public domain trace archives to verify the generality of our scheme. References [1] Tzi-cker Chiueh and P. Pradhan, High performance IP routing table lookup using CPU caching, in Proceedings of IEEE INFOCOM 99, April [2] T. V. Lakshman and D. Stiliadis, High speed policy based packet forwarding using efficient multi dimensional range matching, in Proceedings of ACM SIGCOMM 98, pp , September [3] S. Floyd and V. Jacobson, Random early detection for congestion avoidance, IEEE/ACM Transactions on Networking, pp , July [4] D. Lin and R. Morris, Dynamics of random early detection, in Proceedings of ACM SIGCOMM 97, pp , September [5] I. Stoica, S. Schenker, and H. Zhang, Core stateless fair queueing: Achieving approximately fair bandwidth allocations in high speed networks, in Proceedings of ACM SIGCOMM 98, pp , September [6] M. Shreedhar and G. Varghese, Efficient fair queueing using deflicit round robin, IEEE/ACM Transactions on Networking, vol. 4, pp , June [7] K. Thompson, G. J. Miller, and R. Wilder, Wide area Internet traffic patterns and characteristics, IEEE Network, pp , November [8] S. Ata, M. Murata, and H. Miyahara, Analysis of network traffic and its application to design of high speed routers, to appear in IEICE Transactions on Information and Systems (D-I), May [9] M. Aida, N. Takahashi, and T. Abe, A proposal of dual Zipfian model for describing HTTP access trends and its application to address cache design, Transactions of IEICE, vol. E81 B, pp , July [10] J. Edler and M. D. Hill, Dinero IV : Trace-driven uniprocessor cache simulator, available at markhill/dineroiv, [11] Intel Corporation, Using the RDTSC instruction for performance monitoring, Pentium II Application Note, available at HTM, 1998.

Performance improvement of active queue management with per-flow scheduling

Performance improvement of active queue management with per-flow scheduling Performance improvement of active queue management with per-flow scheduling Masayoshi Nabeshima, Kouji Yata NTT Cyber Solutions Laboratories, NTT Corporation 1-1 Hikari-no-oka Yokosuka-shi Kanagawa 239

More information

Fiber Channel Over Ethernet (FCoE)

Fiber Channel Over Ethernet (FCoE) Fiber Channel Over Ethernet (FCoE) Using Intel Ethernet Switch Family White Paper November, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR

More information

A Novel Aggressiveness-Prevention Scheme in 4G Flat-Rate Pricing

A Novel Aggressiveness-Prevention Scheme in 4G Flat-Rate Pricing A Novel Aggressiveness-Prevention Scheme in 4G Flat-Rate Pricing Business Model 1 *1 Department of Finance, Graduate Institute of Business and Management, National Formosa University E-Mail: cfli@nfu.edu.tw;

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

Switch Fabric Implementation Using Shared Memory

Switch Fabric Implementation Using Shared Memory Order this document by /D Switch Fabric Implementation Using Shared Memory Prepared by: Lakshmi Mandyam and B. Kinney INTRODUCTION Whether it be for the World Wide Web or for an intra office network, today

More information

Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1

Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1 Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1 Elisabete Reis elreis@dei.uc.pt Polytechnic Institute of Coimbra Fernando Melo fmelor@dei.uc.pt

More information

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics: Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged

More information

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers

Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers Efficient IP-Address Lookup with a Shared Forwarding Table for Multiple Virtual Routers ABSTRACT Jing Fu KTH, Royal Institute of Technology Stockholm, Sweden jing@kth.se Virtual routers are a promising

More information

LRU-RED: An active queue management scheme to contain high bandwidth flows at congested routers

LRU-RED: An active queue management scheme to contain high bandwidth flows at congested routers LRU-RED: An active queue management scheme to contain high bandwidth flows at congested routers Smitha A. L. Narasimha Reddy Dept. of Elec. Engg., Texas A & M University, College Station, TX 77843-3128,

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide

Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Limitations of Packet Measurement

Limitations of Packet Measurement Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science

More information

8. 網路流量管理 Network Traffic Management

8. 網路流量管理 Network Traffic Management 8. 網路流量管理 Network Traffic Management Measurement vs. Metrics end-to-end performance topology, configuration, routing, link properties state active measurements active routes active topology link bit error

More information

Approximate fair bandwidth allocation: A method for simple and flexible traffic management

Approximate fair bandwidth allocation: A method for simple and flexible traffic management Forty-Sixth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 23-26, 2008 ThC1.3 Approximate fair bandwidth allocation: A method for simple and flexible traffic management Rong Pan,

More information

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems*

A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* A Content-Based Load Balancing Algorithm for Metadata Servers in Cluster File Systems* Junho Jang, Saeyoung Han, Sungyong Park, and Jihoon Yang Department of Computer Science and Interdisciplinary Program

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

The Interaction of Forward Error Correction and Active Queue Management

The Interaction of Forward Error Correction and Active Queue Management The Interaction of Forward Error Correction and Active Queue Management Tigist Alemu, Yvan Calas, and Alain Jean-Marie LIRMM UMR 5506 CNRS and University of Montpellier II 161, Rue Ada, 34392 Montpellier

More information

Source-domain DDoS Prevention

Source-domain DDoS Prevention bhattacharjee, LTS S 05 Page: 0 Source-domain DDoS Prevention Bobby Bhattacharjee Christopher Kommareddy Mark Shayman Dave Levin Richard La Vahid Tabatabaee University of Maryland bhattacharjee, LTS S

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS

COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS COMPARATIVE ANALYSIS OF DIFFERENT QUEUING MECHANISMS IN HETROGENEOUS NETWORKS Shubhangi Rastogi 1, Samir Srivastava 2 M.Tech Student, Computer Science and Engineering, KNIT, Sultanpur, India 1 Associate

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

VoIP Performance Over different service Classes Under Various Scheduling Techniques

VoIP Performance Over different service Classes Under Various Scheduling Techniques Australian Journal of Basic and Applied Sciences, 5(11): 1416-1422-CC, 211 ISSN 1991-8178 VoIP Performance Over different service Classes Under Various Scheduling Techniques Ahmad Karim Bahauddin Zakariya

More information

GREEN: Proactive Queue Management over a Best-Effort Network

GREEN: Proactive Queue Management over a Best-Effort Network IEEE GlobeCom (GLOBECOM ), Taipei, Taiwan, November. LA-UR -4 : Proactive Queue Management over a Best-Effort Network Wu-chun Feng, Apu Kapadia, Sunil Thulasidasan feng@lanl.gov, akapadia@uiuc.edu, sunil@lanl.gov

More information

DG Forwarding Algorithm

DG Forwarding Algorithm DG Forwarding Algorithm Host or Router first check if destination on same Network Router multiple interfaces Match found deliver to that Network If not found default router for every router a default router

More information

Queuing Algorithms Performance against Buffer Size and Attack Intensities

Queuing Algorithms Performance against Buffer Size and Attack Intensities Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 141-157 Research India Publications http://www.ripublication.com Queuing Algorithms Performance against

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Random Early Detection Gateways for Congestion Avoidance

Random Early Detection Gateways for Congestion Avoidance Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson Lawrence Berkeley Laboratory University of California floyd@eelblgov van@eelblgov To appear in the August 1993 IEEE/ACM

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

WEB APPLICATION PERFORMANCE PREDICTION

WEB APPLICATION PERFORMANCE PREDICTION WEB APPLICATION PERFORMANCE PREDICTION H. Karlapudi and J. Martin Department of Computer Science Clemson University Clemson, SC 9-9 Email: hkarlap, jim.martin@cs.clemson.edu ABSTRACT In this paper, we

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1

Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Evaluating Cooperative Web Caching Protocols for Emerging Network Technologies 1 Christoph Lindemann and Oliver P. Waldhorst University of Dortmund Department of Computer Science August-Schmidt-Str. 12

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex?

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? Hiroyuki Ohsaki and Masayuki Murata Graduate School of Information Science and Technology Osaka

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

Programming Assignments for Graduate Students using GENI

Programming Assignments for Graduate Students using GENI Programming Assignments for Graduate Students using GENI 1 Copyright c 2011 Purdue University Please direct comments regarding this document to fahmy@cs.purdue.edu. 1 OVERVIEW 2 1 Overview This document

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Router Architectures

Router Architectures Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems : Intermediate Course in Computer Systems Lecture 7: Sept. 19, 2003 Load Balancing Options Sources Lots of graphics and product description courtesy F5 website (www.f5.com) I believe F5 is market leader

More information

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications

Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor

Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor -0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Xpresstransfer Online Backup Suite v5.0 Whitepaper Backup speed analysis

Xpresstransfer Online Backup Suite v5.0 Whitepaper Backup speed analysis Xpresstransfer Online Backup Suite v5.0 Whitepaper Backup speed analysis Version 5.0 Table of Content 1 Introduction...... 3 2 Testing Configuration and Setup 3 2.1 Hardware and Software Setup... 3 2.2

More information

ABSTRACT 1.1 MEASUREMENT APPROACHES 1. INTRODUCTION 2. OCXMON/CORAL PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98

ABSTRACT 1.1 MEASUREMENT APPROACHES 1. INTRODUCTION 2. OCXMON/CORAL PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98 PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98 Brynjar Åge Viken e mail: brynjar@item.ntnu.no, bviken@nlanr.net National Laboratory for Applied Network Research, Measurement and Operations

More information

Design and Verification of Nine port Network Router

Design and Verification of Nine port Network Router Design and Verification of Nine port Network Router G. Sri Lakshmi 1, A Ganga Mani 2 1 Assistant Professor, Department of Electronics and Communication Engineering, Pragathi Engineering College, Andhra

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE

Meeting the Five Key Needs of Next-Generation Cloud Computing Networks with 10 GbE White Paper Meeting the Five Key Needs of Next-Generation Cloud Computing Networks Cloud computing promises to bring scalable processing capacity to a wide range of applications in a cost-effective manner.

More information

Ahsay Online Backup Suite v5.0. Whitepaper Backup speed

Ahsay Online Backup Suite v5.0. Whitepaper Backup speed Ahsay Online Backup Suite v5.0 Version 5.0.1.0 Jan 2006 Table of Content 1 Introduction...3 2 Testing Configuration and Setup...4 2.1 Hardware and Software Setup...4 2.2 Test Scenarios...4 3 Results...5

More information

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers

Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Peer to peer networking: Main aspects and conclusions from the view of Internet service providers Gerhard Haßlinger, Department of Computer Science, Darmstadt University of Technology, Germany Abstract:

More information

Stateful Firewalls. Hank and Foo

Stateful Firewalls. Hank and Foo Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation

More information

Enterprise Network Control and Management: Traffic Flow Models

Enterprise Network Control and Management: Traffic Flow Models Enterprise Network Control and Management: Traffic Flow Models William Maruyama, Mark George, Eileen Hernandez, Keith LoPresto and Yea Uang Interactive Technology Center Lockheed Martin Mission Systems

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service

Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Content-Aware Load Balancing using Direct Routing for VOD Streaming Service Young-Hwan Woo, Jin-Wook Chung, Seok-soo Kim Dept. of Computer & Information System, Geo-chang Provincial College, Korea School

More information

Data Center Network Structure using Hybrid Optoelectronic Routers

Data Center Network Structure using Hybrid Optoelectronic Routers Data Center Network Structure using Hybrid Optoelectronic Routers Yuichi Ohsita, and Masayuki Murata Graduate School of Information Science and Technology, Osaka University Osaka, Japan {y-ohsita, murata}@ist.osaka-u.ac.jp

More information

OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin

OpenFlow with Intel 82599. Voravit Tanyingyong, Markus Hidell, Peter Sjödin OpenFlow with Intel 82599 Voravit Tanyingyong, Markus Hidell, Peter Sjödin Outline Background Goal Design Experiment and Evaluation Conclusion OpenFlow SW HW Open up commercial network hardware for experiment

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

"Charting the Course... ... to Your Success!" QOS - Implementing Cisco Quality of Service 2.5 Course Summary

Charting the Course... ... to Your Success! QOS - Implementing Cisco Quality of Service 2.5 Course Summary Course Summary Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such as best effort, IntServ, and DiffServ,

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led

Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Implementing Cisco Quality of Service QOS v2.5; 5 days, Instructor-led Course Description Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements,

More information

HyLARD: A Hybrid Locality-Aware Request Distribution Policy in Cluster-based Web Servers

HyLARD: A Hybrid Locality-Aware Request Distribution Policy in Cluster-based Web Servers TANET2007 臺 灣 網 際 網 路 研 討 會 論 文 集 二 HyLARD: A Hybrid Locality-Aware Request Distribution Policy in Cluster-based Web Servers Shang-Yi Zhuang, Mei-Ling Chiang Department of Information Management National

More information

modeling Network Traffic

modeling Network Traffic Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th

More information

Performance of Software Switching

Performance of Software Switching Performance of Software Switching Based on papers in IEEE HPSR 2011 and IFIP/ACM Performance 2011 Nuutti Varis, Jukka Manner Department of Communications and Networking (COMNET) Agenda Motivation Performance

More information

Using median filtering in active queue management for telecommunication networks

Using median filtering in active queue management for telecommunication networks Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.

More information

Infrastructure for active and passive measurements at 10Gbps and beyond

Infrastructure for active and passive measurements at 10Gbps and beyond Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage

Lecture 16: Quality of Service. CSE 123: Computer Networks Stefan Savage Lecture 16: Quality of Service CSE 123: Computer Networks Stefan Savage Final Next week (trust Blink wrt time/location) Will cover entire class Style similar to midterm I ll post a sample (i.e. old) final

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

1. Comments on reviews a. Need to avoid just summarizing web page asks you for:

1. Comments on reviews a. Need to avoid just summarizing web page asks you for: 1. Comments on reviews a. Need to avoid just summarizing web page asks you for: i. A one or two sentence summary of the paper ii. A description of the problem they were trying to solve iii. A summary of

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS

QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS QoS QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS Peter R. Egli INDIGOO.COM 1/20 Contents 1. Quality of Service in IP networks 2. QoS at layer 2: Virtual LAN (VLAN) IEEE

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

Chapter 6 Congestion Control and Resource Allocation

Chapter 6 Congestion Control and Resource Allocation Chapter 6 Congestion Control and Resource Allocation 6.3 TCP Congestion Control Additive Increase/Multiplicative Decrease (AIMD) o Basic idea: repeatedly increase transmission rate until congestion occurs;

More information

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS)

IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) IMPLEMENTING CISCO QUALITY OF SERVICE V2.5 (QOS) COURSE OVERVIEW: Implementing Cisco Quality of Service (QOS) v2.5 provides learners with in-depth knowledge of QoS requirements, conceptual models such

More information