HYBRID ANALYTICAL/SIMULATION MECHANISM FOR ACCESS CONTROL AND ON-LINE BANDWIDTH OPTIMIZATION IN DIFFSERV ENVIRONMENTS

Size: px
Start display at page:

Download "HYBRID ANALYTICAL/SIMULATION MECHANISM FOR ACCESS CONTROL AND ON-LINE BANDWIDTH OPTIMIZATION IN DIFFSERV ENVIRONMENTS"

Transcription

1 HYBRID ANALYTICAL/SIMULATION MECHANISM FOR ACCESS CONTROL AND ON-LINE BANDWIDTH OPTIMIZATION IN DIFFSERV ENVIRONMENTS R. Bolla, F. Davoli, M. Perrando, M. Repetto Department of Communications, Computer and Systems Science (DIST) University of Genoa Via Opera Pia 13, I Genova, Italy Abstract - A multiservice IP network based on the DiffServ paradigm is considered, composed by Edge Routers (ER) and Core Routers (CR), forming a domain that is supervised by a Bandwidth Broker (BB). The traffic in the network belongs to three basic categories: Expedited Forwarding (EF), Assured Forwarding (AF) and Best- Effort (BE). Consistently with the DiffServ environment, CRs only treat aggregate flows; on the other hand, ERs keep per-flow information (from external sources or other network Domains), and convey it to the BB, which knows at each time instant the number (and the bandwidth requirements) of flows in progress within the domain for both EF and AF traffic categories. A global strategy for admission control, bandwidth allocation and routing within the domain is introduced and discussed in the paper. The aim is to minimize blocking of the "guaranteed" flows (EF and AF), while at the same time providing some resources also to BE traffic. As the main objective is to apply the above mentioned control actions on-line, a computational structure is sought, which allows a relatively fast implementation of the overall strategy. In particular, a mix of analytical and simulation tools is applied jointly: "locally optimal" bandwidth partitions for the traffic classes are determined over each link (which set the parameters of the link schedulers in the CRs, the routing metrics and admission control thresholds); a "high level" simulation (involving no packet-level operation) is performed, to determine the per-link traffic flows that would be induced by the given allocation; then, a new analytical computation is carried out, followed by a simulation run, until the allocations do not significantly change. The possible convergence of the scheme (under a fixed traffic pattern) is investigated and the results of its application under different traffic loads are studied on a test network. 1. Network architecture Today s Internet is a widely deployed network with hundreds of millions hosts, yet growing in size [1], connected by a network architecture belonging to different organizations. This results in a hierarchical organization, with the ASs (Autonomous Systems) at the top and interconnected to each other to form the backbone of the net. The internal structure of ASs can be also hierarchical, reducing the number of peers in every level, with many management benefits, such as simplifying IP addresses assignment to secondary Internet Service Provider (ISP) which also reduce IP routing table size, limiting control traffic to smaller area, and so on. This is very simple in Ipv6 [2], where the increased size of the address field allows great flexibility in assigning and partitioning the whole space. As an example of how a huge network can affect performance, we cite inter-domain (among ASs) routing, where BGP often fails to assure route stability and routing convergence [3],[4],[5].

2 For these reasons, we choose a hierarchical structure for our approach, and we assume to have few nodes on every level. At the bottom level, nodes correspond to hosts; at higher levels, nodes correspond to aggregates of nodes at lower levels. Such an architecture is very flexible: the same procedure can be used at every level, with the only difference on the aggregation size of the underling network traffics. From now on, we therefore deal only with the intra-level architecture. Basically, there are two opposite philosophies in the Internet to achieve Quality of Service (QoS) [6]: Integrated Services (IntServ) and Differentiated Services (DiffServ). IntServ tries to meet QoS requirements by reserving resources for every single flow along its path across the network, so that it can guarantee per-flow QoS. This is done by the RSVP signaling protocol ([7],[8]), and it becomes very heavy with many flows. DiffServ is quite different, as it identifies only several QoS classes, with different packet treatment; it aims at satisfying common-class QoS requirements, by controlling network resources at the nodes (Per Hop Behavior, PHB [9]). For example, this is done by setting suitable queue service disciplines, by limiting the amount of traffic in the network, by assigning different priorities, and by performing Call Admission Control (CAC). A central controller, denoted as Bandwidth Broker (BB), is dedicated to perform resource reservation, as well as to collect aggregate information for the upper levels. The BB can run on a dedicated machine or on a generic router and exchanges messages with the network nodes by some signaling protocols, in the same fashion as RSVP. We will analyze in detail in the following what kind of information the BB needs to exchange with the nodes in our proposal. We choose to implement three QoS classes: Expedited Forwarding (EF), Assured Forwarding (AF) and Best Effort (BE). EF is the maximum priority traffic in our network, and it should experience very low loss, latency and jitter while traversing the network [11]; such a service appears to the endpoints like a point-to-point connection, or a leased line. Users requiring this kind of service are asked to declare their peak rate, which (given that this service is presumed very expensive) we assume coinciding with their mean rate. Thus, users are classified in a limited number of classes, according to their mean rates. Classifiers and traffic conditioners (meters, markers, shapers and droppers) are required at the network edge to perform this task, as well as to verify the compliance of the users traffic to the agreement, but this is beyond our issues. AF is an intermediate class, with less pressing requirements on bandwidth, delay and jitter [1]. An AF user declares its mean transmission rate, from which we assign a maximum peak rate. The mean transmission rate is always guaranteed to users; better performance can be achieved if the network load is low. Thus, at the edge nodes, packets will be marked as high priority AF until they do not exceed the mean rate; surplus traffic will be marked as low priority AF. Also in this case users are classified in a fixed number of subclasses, based on their mean rate value. BE is the current Internet traffic with no guarantees on throughput, delay and jitter. 2. Resource allocation issues We have previously sketched our DiffServ network architecture; now we are going to explain how resources are shared among competitive traffic classes and how to achieve some form of fairness among the different traffic categories. First of all, a suitable queuing discipline is needed to achieve the required performance for every class: we choose to use different queues on each link, one for each kind of traffic. The EF queue is given priority on all the others; if we limit the amount of EF traffic in the network, this results in very low delay and jitter

3 experienced by these packets. Once the EF queue is empty, AF high priority traffic is served, while low priority packets are served only if there are still unused AF reserved resources. Finally, when all these queues are empty, BE traffic is served. Obviously, the performance experienced by the packets depends on the amount of traffic flows of each category admitted into the network: a CAC is necessary to achieve the QoS promised by the DiffServ architecture. With such a discipline, every queue is served at the maximum speed allowed by the link; our aim is to control the bandwidth reserved for each class on every link. Given the peak rate for EF traffic, we know in advance how many connections can be accepted not to exceed the reserved bandwidth. A similar consideration holds for AF, except that mean rates are taken instead of peak rates. Briefly, we fix two bandwidth thresholds on each link: one for EF and the other for AF; rates of flows traversing the link for each category can never exceed these thresholds. BE traffic can exploit at any time instant all the unused link bandwidth. This results in a complete partitioning CAC [21] for both EF and AF, but not for BE, whose upper bound is not fixed, but depends dynamically on the bandwidth left free from other traffic flows. However, BE is guaranteed the link bandwidth exceeding the two thresholds, but the queueing disciplines do not assure any performance on delay and jitter. As EF and AF flows require QoS, we think that this kind of traffic needs a fixed route from source to destination, which appears to them as a virtual leased line [11]. For this reason, from now on we will indicate these two categories as Connection Oriented (CO) traffic. Routing of CO connections is a priori fixed, so that the BB can perform a CAC on the bandwidth available on each traversed link and, eventually, deny access to the network. Thus, we have already identified a first task for our BB. Since we wish to maximize the network throughput, we use a simple min-hop metrics for CO, to reduce the number of links traversed. Otherwise, the whole architecture is suitable for more advanced routing metrics [12], especially those based on aggregation and multi-parameters metrics [13]. For BE, instead, we choose a cost equal to the reciprocal of the residual available bandwidth left from CO connections. In this case, paths vary dynamically as network load changes over time. Now, the issue is how to share link bandwidth among the three competitive classes. Obviously, CO traffic is critical, because it is thought of as a high revenue one. But we would like to give some form of protection to BE, too. To do this, we assign a cost to each class (as explained later), and try to minimize some given cost function. Nodes collect data on the incoming traffic load, then the BB gathers all these data and computes a new allocation for all links. Finally, it sends the EF and AF thresholds to each node for its output links. This is the second task demanded to the BB. To complete the description of our architecture, let us note that a third task of the BB is to collect information about domain ingoing/outgoing traffic from the nodes, and to act as a node for the BB of an upper level. 3. Simulation framework Global network allocation is not a simple task; so, to reduce complexity, we perform resource allocation separately for each link. On the other hand, bandwidth is a resource of the single link, and this somehow supports our choice. Note that our BE metric depends on allocation, but allocation in its turn depends on the paths selected by the routing algorithm. A congested link at a certain time instant can become an empty one after allocation due, for example, to the discovery of a new optimal route for BE traffic. Optimizing allocation separately on each link in the presence of such routing oscillations is very hard: changing bandwidth allocation results in modifying

4 routing behavior. Our approach is to perform subsequent allocations until both allocation and routing possibly converge. Let us now analyze in more detail how the BB works. We have two distinct phases: network simulation and allocation. Note that only a flow level is considered, in order to speed up the simulation. Source-destination pairs of two types are identified in the network: CO peers and BE peers. The former generate either EF or AF traffic, while the latter only BE traffic. CO flows are generated with exponentially distributed and independent interarrival and service times. Suppose that information on the traffic intensities of these flows is available at the BB (i.e., they are measured by each node and transmitted to the BB) and varies slowly in time. When a flow attempts to enter the network, a path through the network is computed, and a counter of total accepted flows is increased on every link traversed. If a path cannot be found (i.e., the flow is refused, as no resources can be allocated by the acceptance control), a phantom path is anyway selected, in order for the nodes that the connection would have traversed to keep track of the request. In this way, the whole offered load contributes to the decision on the sharing of the links bandwidths in the allocation phase. Thus, for each link, the offered CO load is the total number of flows (real or phantom ) traversing the link. For BE traffic we follow a different approach. We think of CO traffic as prevalently real-time, and therefore relying on UDP or RTP. Applications of such type usually transmit at constant bit rate, or at most adapt their rate dynamically (e.g., if they want to be TCP-friendly ), but within a limited range. On the contrary, BE is the plain current Internet traffic, carried by TCP. TCP modeling is an open issue in today s research, and it is a quite difficult task [14]. Some authors have proposed various models, even rather complicated [15]. Our aim is to reproduce some peculiar characteristic of TCP behavior without applying complex models; details on our approach are given in section 4. Given the model and the sharing rules, on each link, we will determine the average bandwidth occupied by the BE traffic, to be used as one of the inputs to the allocation procedure. Simulation and allocation alternate in our system. Through simulation we generate network traffic and evaluate offered load on every link; successive allocations try to share the available link bandwidth among the different traffic classes. If allocation converges, network resources are optimized, and the BB can set new thresholds on all nodes. When variations on the incoming traffic are learned at the nodes, the BB is notified and starts a new allocation procedure. 4. Models of TCP behavior As already stressed, we adopt a very simple model of TCP (our goal is not to evaluate TCP performance, but rather to capture the aggregate behavior of connections between an ingress-egress router pair for control purpose). Basically, our idea is that connection durations in a simulation depend on network load. We can statistically generate the amount of data to be transferred over a connection, but not connection durations [14]. The effective duration of a connection is actually determined by the congestion control mechanisms of TCP and overall network conditions: the numbers of CO connections of every class determine the bandwidth left for BE traffic, and the number of TCP connections influences the way the remaining bandwidth is shared. Because of this, we think of each BE peer as an infinite queue where session requests arrive; interarrival times are exponentially distributed. Each request refers to the transfer of a given amount of data, whose size p follows a Pareto distribution:

5 f p ( P)=α α P ( 1+α) (1) Fixing α>1, the mean of this distribution is finite and equal to: E{}= P α (2) α 1 In our tests, the mean size of bursts is chosen equal to 2Mbits. Such arrivals correspond to the amount of data to be transferred; the queue output rate is computed accordingly to network load. Specifically, we start from the principle that TCP connections on a single link share the available bandwidth equally. With this hypothesis, the problem is similar to that one of finding appropriate flow rates to achieve fairness among different flows traversing the network [16]. The basic idea consists of simultaneously increasing the rates of all connections until one link is filled or a maximum transmission window is reached (congestion window or advertised window [18]). This means that all flows sharing that link cannot further increase; we continue by rising all the others. This is repeated until all flows cross at least one congested link and can no longer increase. This model neglects some important features of TCP, such as slow start, error recovery, etc. However, we remember that we are interested in simulating TCP data flowing across the network to calculate how long a connection takes to be served, and not in carefully modeling such protocol. More formally, let us define: k the algorithm s step; C a the capacity of link a; r p the rate of connection p; P the set of all connections; A the set of all links; P k the set of connections not yet saturated at step k; A k the set of links not yet saturated at step k; n a k the number of flows crossing link a, a A k F a the bandwidth used on link a. Now, setting the initial conditions as: k=1; F a =, a A; r p =, p P; P 1 =P; A 1 =A. we can sketch the algorithm to determine the TCP link utilization as follows: k 1 k 1. r k = min{ ( C a F a )/n a } a A k k 1 k r 2. r p = p + r k for p P k k 1 r p otherwise k 3. F a = k rp p crossing a { } 4. A k+1 = a/c a F k a > 5. P k+1 ={p/ p does not cross any link a A k+1 & p does the exceed transmission window size} 6. k = k if P k is empty, then stop; else go to 1.

6 1 5 9 Some numerical simulations have been performed to evaluate our algorithm, by examining the TCP behaviour obtained by using the ns-2 simulator. We started with the simple network depicted in Figure 1, where 6 flows share the link from node 5 to 6. The flows that have been simulated are long-lived (the sender has unlimited amount of data to send), the maximum receiver advertised window is set to 1 bytes and link capacity is set to 1 Mbps for all links. Our tests with this network have been carried out with different queuing disciplines (SFQ and RED) and different TCP implementations (Tahoe and Reno). In such situation, our simple model shares the bandwidth equally between the two aggregates; ns results show that this is correct with RED (Figure 3, Figure 4), less with SFQ (Figure 2). The specific TCP implementation seems not to affect bandwidth sharing, as shown in Figure 3 and Figure 4. Figure 1. A network with two aggregated of flows (red and blue). Flow 1 Flow Mean Bandwidth (Mb/s) Tim e (seconds) Figure 2. Bandwidth sharing on link 5-6 with SFQ policy and TCP/Tahoe.

7 Flow 1 Flow 2 7, 6, 5, 4, , 2, 1,, Time (seconds) Figure 3. Bandwidth sharing on link 5-6 with RED policy and TCP/Tahoe. Flow 1 Flow Mean Bandwidth (Mb/s) Time (seconds) Figure 4. Bandwidth sharing on link 5-6 with RED policy and TCP/Reno. Another set of experiments with the network shown in Figure 5, has pointed out that the round trip time significantly affects TCP behavior. This is already known in the literature [2]; future work will bring into account this in improving the actual simple model. As regards Figure 6, it depicts the mean bandwidth of the two aggregates when both terminate on node 8; Figure 7 shows the same quantity when flow 1 is addressed towards node 15 and flow 2 towards node 18. Link bandwidth is again equal to 1 Mbps, and maximum congestion windows to 1 bytes. RED is used as queue management policy, and the TCP implementation is Reno.

8 Figure 5. Network with two aggregated, with different round trip time. Flow 1 Flow Mean Bandwidth (Mb/s) Time (seconds) Figure 6. Bandwidth sharing with both flow 1 and 2 terminating on node 8. Flow 1 Flow Mean Bandwidth (Mb/s) Time (seconds) Figure 7. Bandwidth sharing with flow 1 addressed to node 15 and flow 2 to node 18.

9 5. Allocation algorithm Allocating resources over the whole network is a very complex task, especially if many links are present. Furthermore, resources to be shared reside on each link. Thus, we choose to perform an independent optimization on every link, though computationally centralized at the BB. As previously mentioned, the BB knows from the single node the input traffic matrix for each flow. It runs a simplified simulation at the flow level (very fast) and collects data about offered load, in terms of number of flows trying to cross the link (CO) and average used bandwidth (BE) on every link. From this point on, it begins an independent allocation for every link. We choose a bandwidth step bw_step equal to the minimum admissible rate for CO connections. Then, the algorithm starts calculating the costs for all possible bandwidth assignment, that are generated as follows: CO bandwidth is initially set to zero, then it is increased by bw_step, until the link bandwidth is reached; For each of these values, CO bandwidth is shared between EF and AF in a similar way: the EF threshold is set initially to zero and the AF threshold to the total CO assigned bandwidth. All possible assignments are generated incrementing EF and decreasing AF thresholds by bw_step. Cost calculation CO traffic looks like traditional circuit switched traffic: there are incoming connections of a given size (peak rate for EF and mean rate for AF), competing for a limited resource. This is the so called Stochastic Knapsack problem; blocking probability can be easily calculated with an extended Erlang Loss formula [21]. Let K denote the number of EF rates (for example) and C the resource units. Connections of the k-th class are distinguished by their size, b k, their arrival rate, λ k, and their mean duration, 1/µ k. Let us denote with n k the number of active connections of class k and with S the space of admissible states: { } (3) S = n I K : b n C where I K denotes the K-dimensional set of non-negative integers, b=(b 1,b 2, b K ) and n=(n 1,n 2, n K ). Defining S k as the subset of states in which the knapsack admits an arriving class-k object, that is S k = { n S : b n C b k } (4) the blocking probability for a class-k connection is: K j=1 ρ n j n Sk /n j! B k =1 K ρ n j n S /n j! (ρ j is λ j /µ j ). Blocking rate is computed separately for EF and AF, since every category has its own reserved bandwidth and incoming traffic, independent from the other. The cost is derived from the blocking probabilities of the different rate classes: This holds both for EF and for AF. J j=1 { } CO B k (5) = max (6)

10 For BE traffic, we have a single aggregate: it is difficult to say if it has enough space or not because TCP aims at occupying all the available bandwidth. A possibility consists of deciding that the bandwidth available to BE on a link can be considered sufficient if its average utilization by the BE traffic is within a given threshold. To compute this, let q(c) be the probability to have c resources occupied in the system by EF and AF; the average number of occupied resources (UTIL) results [21]: UTIL = cq(c) (7) Thus, given EF and AF thresholds, the mean available bandwidth for BE is: DISP BE = LINKBW UTIL UTIL (8) The BB keeps track of the BE mean occupied bandwidth on the link, OCCBW, during the simulation, so we now are able to define the utilization ratio (UT) as: OCCBW UT = (9) DISP BE Starting from this, we expect that connections on the link are given enough bandwidth if this ratio is less than a given value δ. In this case we assign a null cost; otherwise we take the square of the difference between utilization and threshold δ. Summarizing, we can compute: EF ( max{, δ }) 2 G = α UT (1) This cost has a problem: it rises too fast above 1, while CO costs are upper bounded to 1. Varying α does not solve the problem; it is necessary to smooth the cost function after it reaches a given value. Thus, from (1) we get the BE cost function as: { + G / Φ G} J BE = min φ, (11) Both φ and Φ can be set to adjust the function s shape to our requirements. We found that Φ does not affect significantly our results, while they are more sensitive to variations of φ. Optimization function Several optimization function can be selected to optimize bandwidth sharing, depending on which results one is pursuing. Our aim is to equalize the costs of the classes, so that we can vary the system s fairness simply by changing some weight parameters: Equalization of costs results in minimizing (12): J { ω J, ω J, ω J } = max (12) EF EF T EF, T AF AF {} J AF BE BE AF min (13) where T EF and T AF are, respectively, the thresholds for EF and AF traffic. 6. Numerical results We have tested our algorithm on a single link and on a more complicated network. On a single link we can better appreciate the allocation choices in the presence of traffic competing on a forced path, while in the network we are able to check for oscillating

11 behaviors. Also it is possible to observe path variations implied by resource reallocation. Single link Three peers transmit simultaneously on the same link, one for each kind of traffic. The EF peer has an offered load of 15 Mbit/s, the AF of 3 Mbit/s and the BE varies from 3 to 85 Mbit/s. Link bandwidth is 1 Mbit/s, so we start from a low loaded scenario, and increase BE traffic to make the link congested. Figure 8 shows blocking probability for connections in two cases: with and without allocation. Blocking probabilities without allocation are very low, because in this case we do not apply a complete partitioning scheme on incoming connections, but instead a complete sharing, where connections are admitted until link capacity is reached. Because CO traffic has priority on BE, CO traffic is totally unaware of BE load, and it continues to experience the same blocking probability even in the presence of very high BE load. Thus, congestion bothers only BE traffic, as shown in Figure 9, where we can see how the mean queue size at the transmitter and the mean bandwidth raise as BE load increases. Finally, Figure 1 shows how EF and AF reserved bandwidths vary as BE load increases. EF with allocation EF without allocation AF with allocation AF without allocation Blocking Probability BE load (Mbit/s) Figure 8. Blocking probability for CO traffic on the single link Mean Queue Size (Mbit) Output rate (Mbit/s) Mean Queue Length with allocation Mean Queue Length whitout Allocation Mean Output Rate with allocation Mean Output Rate without Allocation BE load (Mbit/s) Figure 9. Mean queue size and output rate varying BE offered load.

12 EF AF Reserved Bandwidth (Mbit/s) BE load (Mbit/s) Figure 1. Reserved bandwidth for CO traffic. Simple network Figure 11 depicts the network used for simulations. In such network we vary the offered load for peer AF2, fixing the other parameters as stated in Table 1. Bandwidth is 1 Mbit/s for all links, except for links 4-6 and 5-6, which have only 5 Mbit/s. As Figure 12 and Figure 13 show, when AF2 traffic is low, BE2 and BE3 traffic cross prevalently link 4-6; as AF2 offered load raises up, AF traffic goes through link 4-6, the shortest path between AF2 peers. Thus, BE traffic is pushed towards another path, that crosses links 3-5 and 5-6. This allows CO traffic to traverse always the shortest path, minimizing global resource occupation. Figure 11. The test network. Traffic source Offered load EF1 15 EF2 1 AF1 3 BE1 3 BE2 15 BE3 1 Table 1. Offered load for traffic sources.

13 Link 4-6 Link 5-6 AF rate (Mbit/s) AF2 offered load (Mbit/s) Figure 12. AF mean occupied bandwidth versus AF2 offered load on two bottleneck links Link 5-6 Link Bandwidth (Mbit/s) AF2 offered load (Mbit/s) Figure 13. BE mean occupied bandwidth versus AF2 offered load on the two bottleneck links EF AF Reserved bandwidth (Mbit/s) AF2 offered load (Mbit/s) Figure 14. Reserved bandwidth versus AF2 offered load on link 4-6. Figure 14 shows bandwidth allocation on link 4-6; increasing AF2 offered load implies a larger amount of bandwidth to be reserved. Finally, Figure 15 shows blocking probability for all peers in the network.

14 EF1 EF2 AF1 AF2 Blocking probability AF2 offered load (Mbit/s) Figure 15. Blocking probability for all CO traffics in the network. 7. Conclusions We have introduced and analyzed a complete scheme for bandwidth allocation, CAC and routing in a multiservice IP network, operating in accordance with the DiffServ paradigm. The global strategy is based on a mix of analytical modeling and simulation, in order to find the optimum operating point for the network, under a given load pattern. The main objective of optimization is to obtain the capability to drive the network behaviour toward a desired operating point, which takes into account the relative importance attributed in the DiffServ environment to the different service classes. Though the work is still in a preliminary phase, and further investigation is needed to assess the performance of the scheme, in terms of stability and convergence, and to compare it with other approaches, the results obtained so far show a very promising behaviour. In particular, blocking of new flows for guaranteed bandwidth traffic can be kept at acceptable levels, without too much degradation on the performance of best effort traffic. References [1] Telcordia Technologies, WWW document. URL: [2] S. Deering, R. Hinden. RFC 246: Internet Protocol, Version 6 (IPv6) Specifications. Available online: URL December [3] R. Govindan and A. Reddy, An Analysis of Internet Inter-Domain Topology and Route Stability. Proceedings of the IEEE INFOCOM 1997, Kobe, Japan. [4] C. Labovitz, A. Ahuja, A. Bose and F. Jahanian. Delayed Internet Routing Convergence. IEEE/ACM Transactions on Networking, vol. 9, no. 3, June 21, pp [5] V. Paxson. End-to-End Routing Behavior in the Internet. IEEE/ACM Transactions on Networking, Volume 7, no.3, June 1999, pp [6] X. Xiao and L. M. Ni. Internet QoS: A Big Picture. IEEE Network, March/April 1999, pp [7] R. Braden, L. Zhang, S. Berson, S. Herzog, S. Jamin. RFC 225: Resource ReSerVation Protocol Version 1 Functional Specification. Available online: URL: September 1997.

15 [8] S. Hergoz. RFC 275: RSVP Extensions for Policy Control. Available online: URL January 2. [9] S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang and W. Weiss. RFC 2475: An Architecture for Differentiated Services. Available online: URL December [1] J. Heinanen, T. Finland, F. Baker, W. Weiss and J. Wroclawski. RFC 2597: Assured Forwarding PHB Group. Available online: URL: June [11] V. Jacobson, K. Nichols and K. Poduri. RFC 2598: An Expedited Forwarding PHB. Available online: URL June [12] S. Chen, K. Nahrstedt. An Overview of Quality-of-Service Routing for the Next Generation High-Speed Networks: Problems and Solutions. IEEE Network, Special Issue on Transmission and Distribution of Digital Video, Nov./Dec [13] K. Lui, K. Nahrstedt and S. Chen. Hierarchical QoS Routing in Delay- Bandwidth Sensitive Networks. Proceedings of IEEE LCN 2, Tampa (Florida), USA, November 2. [14] S. Floyd, V. Paxson. Difficulties in Simulating the Internet. IEEE/ACM Transactions on Networking, vol. 9, no. 4, August 21. [15] V. Misra, W. Gong and D. Towsley. Stochastic Differential Equation Modeling and Analysis of TCP-Windowsize Behavior. Proceedings of Performance 99, October [16] D. Bertsekas and R. Gallager, Data Networks, 2 nd Edition, Prentice-Hall International Editions [17] V. Misra, W. Gong and D. Towsley. A Fluid-based Analysis of a Network of AQM Routers Supporting TCP Flows with an Application to RED. Proceedings of ACM Sigcomm 2, Aug./Sep. 2. [18] M. Allaman, V. Paxson and W. Stevens. RFC 2581: TCP Congestion Control. Available online: URL April [19] The Network Simulator ns2. Home page: [2] L. Qiu, Yin Zhang, S. Keshav. Undestanding the performance of many TCP flows. Computer Networks 37, 21. [21] K. W. Ross. Multiservice Loss Models for Broadband Telecommunication Networks. Springer, 1995.

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

How To Share Bandwidth On A Diffserv Network

How To Share Bandwidth On A Diffserv Network Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, 14-17 May 2007, Penang, Malaysia Bandwidth Sharing Scheme in DiffServ-aware

More information

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic

Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort

More information

Integrated Service (IntServ) versus Differentiated Service (Diffserv)

Integrated Service (IntServ) versus Differentiated Service (Diffserv) Integrated Service (IntServ) versus Differentiated Service (Diffserv) Information taken from Kurose and Ross textbook Computer Networking A Top- Down Approach Featuring the Internet ACN: IntServ and DiffServ

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

for guaranteed IP datagram routing

for guaranteed IP datagram routing Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation

More information

An Adaptive Load Balancing to Provide Quality of Service

An Adaptive Load Balancing to Provide Quality of Service An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION

Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List

More information

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE

CS/ECE 438: Communication Networks. Internet QoS. Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE CS/ECE 438: Communication Networks Internet QoS Syed Faisal Hasan, PhD (Research Scholar Information Trust Institute) Visiting Lecturer ECE Introduction The Internet only provides a best effort service

More information

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network

Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Implement a QoS Algorithm for Real-Time Applications in the DiffServ-aware MPLS Network Zuo-Po Huang, *Ji-Feng Chiu, Wen-Shyang Hwang and *Ce-Kuen Shieh adrian@wshlab2.ee.kuas.edu.tw, gary@hpds.ee.ncku.edu.tw,

More information

Supporting End-to-End QoS in DiffServ/MPLS Networks

Supporting End-to-End QoS in DiffServ/MPLS Networks Supporting End-to-End QoS in DiffServ/MPLS Networks Ji-Feng Chiu, *Zuo-Po Huang, *Chi-Wen Lo, *Wen-Shyang Hwang and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University, Taiwan

More information

Internet Quality of Service

Internet Quality of Service Internet Quality of Service Weibin Zhao zwb@cs.columbia.edu 1 Outline 1. Background 2. Basic concepts 3. Supporting mechanisms 4. Frameworks 5. Policy & resource management 6. Conclusion 2 Background:

More information

Performance Evaluation of the Impact of QoS Mechanisms in an IPv6 Network for IPv6-Capable Real-Time Applications

Performance Evaluation of the Impact of QoS Mechanisms in an IPv6 Network for IPv6-Capable Real-Time Applications Journal of Network and Systems Management, Vol. 12, No. 4, December 2004 ( C 2004) DOI: 10.1007/s10922-004-0672-5 Performance Evaluation of the Impact of QoS Mechanisms in an IPv6 Network for IPv6-Capable

More information

Figure 1: Network Topology

Figure 1: Network Topology Improving NGN with QoS Strategies Marcel C. Castro, Tatiana B. Pereira, Thiago L. Resende CPqD Telecom & IT Solutions Campinas, S.P., Brazil E-mail: {mcastro; tatibp; tresende}@cpqd.com.br Abstract Voice,

More information

RBA-RIO Rate Based Adaptive Red With In and Out. Algorithm for DiffServ AF PHB

RBA-RIO Rate Based Adaptive Red With In and Out. Algorithm for DiffServ AF PHB RBA-RIO Rate Based Adaptive Red With In and Out Algorithm for DiffServ AF PHB Zhang Mgjie Zhu Peidong Su Jshu Lu Xicheng School of Computer, National University of Defense Technology, Changsha 410073,

More information

Network management and QoS provisioning - QoS in the Internet

Network management and QoS provisioning - QoS in the Internet QoS in the Internet Inernet approach is based on datagram service (best effort), so provide QoS was not a purpose for developers. Mainly problems are:. recognizing flows;. manage the issue that packets

More information

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints

Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Quality of Service Routing in MPLS Networks Using Delay and Bandwidth Constraints Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashad, Mashhad, Iran hyaghmae@ferdowsi.um.ac.ir

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1

Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1 Quality of Service on the Internet: Evaluation of the IntServ Architecture on the Linux Operative System 1 Elisabete Reis elreis@dei.uc.pt Polytechnic Institute of Coimbra Fernando Melo fmelor@dei.uc.pt

More information

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:

Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management

More information

The QoS of the Edge Router based on DiffServ

The QoS of the Edge Router based on DiffServ The QoS of the Edge Router based on DiffServ Zhang Nan 1, Mao Pengxuan 1, Xiao Yang 1, Kiseon Kim 2 1 Institute of Information and Science, Beijing Jiaotong University, Beijing 100044, China 2 Dept. of

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

A Policy-Based Admission Control Scheme for Voice over IP Networks

A Policy-Based Admission Control Scheme for Voice over IP Networks Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department

More information

Routing architecture in DiffServ MPLS networks

Routing architecture in DiffServ MPLS networks Routing architecture in DiffServ MPLS networks Gonzalo Camarillo Advanced Signalling Research Laboratory Ericsson, FIN-02420 Jorvas, Finland Gonzalo.Camarillo@ericsson.com Abstract The Internet is currently

More information

18: Enhanced Quality of Service

18: Enhanced Quality of Service 18: Enhanced Quality of Service Mark Handley Traditional best-effort queuing behaviour in routers Data transfer: datagrams: individual packets no recognition of flows connectionless: no signalling Forwarding:

More information

Analysis of Delayed Reservation Scheme in Server-based QoS Management Network

Analysis of Delayed Reservation Scheme in Server-based QoS Management Network Analysis of Delayed Reservation Scheme in Server-based QoS Management Network Takeshi Ikenaga Ý, Kenji Kawahara Ý, Tetsuya Takine Þ, and Yuji Oie Ý Ý Dept. of Computer Science and Electronics, Kyushu Institute

More information

#43 D A N T E I N P R I N T. A First Step in the World of IP QoS. Nicolas Simar

#43 D A N T E I N P R I N T. A First Step in the World of IP QoS. Nicolas Simar D A N T E I N P R I N T A First Step in the World of IP QoS #43 Nicolas Simar DANTE IN PRINT is a track record of papers and articles published by, or on behalf of DANTE. HTML and Postscript versions are

More information

CS268 Exam Solutions. 1) End-to-End (20 pts)

CS268 Exam Solutions. 1) End-to-End (20 pts) CS268 Exam Solutions General comments: ) If you would like a re-grade, submit in email a complete explanation of why your solution should be re-graded. Quote parts of your solution if necessary. In person

More information

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming

Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Provisioning algorithm for minimum throughput assurance service in VPNs using nonlinear programming Masayoshi Shimamura (masayo-s@isnaistjp) Guraduate School of Information Science, Nara Institute of Science

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

VoIP network planning guide

VoIP network planning guide VoIP network planning guide Document Reference: Volker Schüppel 08.12.2009 1 CONTENT 1 CONTENT... 2 2 SCOPE... 3 3 BANDWIDTH... 4 3.1 Control data 4 3.2 Audio codec 5 3.3 Packet size and protocol overhead

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

PFS scheme for forcing better service in best effort IP network

PFS scheme for forcing better service in best effort IP network Paper PFS scheme for forcing better service in best effort IP network Monika Fudała and Wojciech Burakowski Abstract The paper presents recent results corresponding to a new strategy for source traffic

More information

Quality of Service (QoS)) in IP networks

Quality of Service (QoS)) in IP networks Quality of Service (QoS)) in IP networks Petr Grygárek rek 1 Quality of Service (QoS( QoS) QoS is the ability of network to support applications without limiting it s s function or performance ITU-T T

More information

Incremental QoS Deployment based on Network Brokers

Incremental QoS Deployment based on Network Brokers Incremental QoS Deployment based on Network Brokers Alfonso Gazo-Cervero, José Luis González-Sánchez Telematics Engineering Section. Computer Science Department. University of Extremadura Escuela Politécnica

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Constructing End-to-End Traffic Flows for Managing Differentiated Services Networks

Constructing End-to-End Traffic Flows for Managing Differentiated Services Networks Constructing End-to-End Traffic Flows for Managing Differentiated Services Networks Jae-Young Kim 1, James Won-Ki Hong 1, Sook-Hyun Ryu 1, and Tae-Sang Choi 2 1 Department of Computer Science and Engineering

More information

Inter Domain Routing Working Group Chemnitz University of Technology Intended status: Standards Track July 7, 2008 Expires: January 8, 2009

Inter Domain Routing Working Group Chemnitz University of Technology Intended status: Standards Track July 7, 2008 Expires: January 8, 2009 Inter Domain Routing Working Group Th. Knoll Internet Draft Chemnitz University of Technology Intended status: Standards Track July 7, 2008 Expires: January 8, 2009 Status of this Memo BGP Class of Service

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ)

QoS in IP networks. Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001. IETF Integrated Services (IntServ) QoS in IP networks Computer Science Department University of Crete HY536 - Network Technology Lab II 2000-2001 IETF Integrated Services (IntServ) Connection-oriented solution (end-to-end) QoS guarantees

More information

QoS Strategy in DiffServ aware MPLS environment

QoS Strategy in DiffServ aware MPLS environment QoS Strategy in DiffServ aware MPLS environment Teerapat Sanguankotchakorn, D.Eng. Telecommunications Program, School of Advanced Technologies Asian Institute of Technology P.O.Box 4, Klong Luang, Pathumthani,

More information

QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS

QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS QoS QUALITY OF SERVICE INTRODUCTION TO QUALITY OF SERVICE CONCEPTS AND PROTOCOLS Peter R. Egli INDIGOO.COM 1/20 Contents 1. Quality of Service in IP networks 2. QoS at layer 2: Virtual LAN (VLAN) IEEE

More information

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain

Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1

More information

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin

Research on Video Traffic Control Technology Based on SDN. Ziyan Lin Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Research on Video Traffic Control Technology Based on SDN Ziyan Lin Communication University of China, Beijing

More information

Multimedia Requirements. Multimedia and Networks. Quality of Service

Multimedia Requirements. Multimedia and Networks. Quality of Service Multimedia Requirements Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Transfer/Control Protocols Quality of Service

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Oscillations of the Sending Window in Compound TCP

Oscillations of the Sending Window in Compound TCP Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004

More information

IP Marking, Metering, and Management

IP Marking, Metering, and Management ENSC 833 High Performance Networks IP Marking, Metering, and Management Jason Uy 953011932 Alison Xu - 200113578 April 14, 2003 Dr. Ljiljana Trajkovic Table of Contents TABLE OF CONTENTS... 2 LIST OF FIGURES...

More information

Multicast Network Administration Control in Diff Services

Multicast Network Administration Control in Diff Services MASURMNT-BASD MULTICAST ADMISSION CONTROL IN DIFFSRV NTWORKS Olli Alanen, Mikko Pääkkönen, Timo Hämäläinen, Mikko Ketola and Jyrki Joutsensalo Department of Mathematical Information Technology University

More information

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS Friday 2 nd October 2015 Morning Answer any FOUR questions out of SIX. All questions carry

More information

How To Provide Quality Of Service In Multiiservice Ip Networks

How To Provide Quality Of Service In Multiiservice Ip Networks FACTA UNIVERSITATIS (NIŠ) SER.: ELEC. ENERG. vol. 17, August 2004, 261-274 A Novel Approach for Providing Quality of Service in Multiservice IP Networks Mirjana Stojanović and Vladanka Aćimović-Raspopović

More information

Quality of Experience and Quality of Service

Quality of Experience and Quality of Service Communicate Simply Quality of Experience and Quality of Service For IP Video Conferencing Timothy M. O Neil Director of Technical Marketing Polycom Video Communications Table of Contents Introduction...1

More information

CS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS

CS640: Introduction to Computer Networks. Why a New Service Model? Utility curve Elastic traffic. Aditya Akella. Lecture 20 QoS CS640: Introduction to Computer Networks Aditya Akella Lecture 20 QoS Why a New Service Model? Best effort clearly insufficient Some applications need more assurances from the network What is the basic

More information

02-QOS-ADVANCED-DIFFSRV

02-QOS-ADVANCED-DIFFSRV IP QoS DiffServ Differentiated Services Architecture Agenda DiffServ Principles DS-Field, DSCP Historical Review Newest Implementations Per-Hop Behaviors (PHB) DiffServ in Detail DiffServ in other Environments

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?

Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control? Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management

More information

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

Using median filtering in active queue management for telecommunication networks

Using median filtering in active queue management for telecommunication networks Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.

More information

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org

H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org H.323 Traffic Characterization Test Plan Draft Paul Schopis, pschopis@itecohio.org I. Introduction Recent attempts at providing Quality of Service in the Internet2 community have focused primarily on Expedited

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

How To Improve Performance On A Ccdn (Dns)

How To Improve Performance On A Ccdn (Dns) Enhanced Content Delivery Network to Improve the QoE 1 Sachendra Singh Solanky, 2 Sandra Brigit Johnson, 3 Vakkalagadda Eswar Praphul 1 M.Tech Student SCSE, VIT University Chennai-600048, 2 M.Tech Student

More information

An Analysis of the DiffServ Approach in Mobile Environments

An Analysis of the DiffServ Approach in Mobile Environments 1 An Analysis of the DiffServ Approach in Mobile Environments Torsten Braun, University of Berne, Switzerland. (braun@iam.unibe.ch) Claude Castelluccia, INRIA Rhône-Alpes, France. (claude.castelluccia@inrialpes.fr)

More information

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC)

Telecommunication Services Engineering (TSE) Lab. Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) Chapter III 4G Long Term Evolution (LTE) and Evolved Packet Core (EPC) http://users.encs.concordia.ca/~glitho/ Outline 1. LTE 2. EPC architectures (Basic and advanced) 3. Mobility management in EPC 4.

More information

Using Differentiated Services to Support Internet Telephony

Using Differentiated Services to Support Internet Telephony Using Differentiated Services to Support Internet Telephony Fugui Wang and Prasant Mohapatra Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824 Email: {wangfugu,

More information

Network congestion, its control and avoidance

Network congestion, its control and avoidance MUHAMMAD SALEH SHAH*, ASIM IMDAD WAGAN**, AND MUKHTIAR ALI UNAR*** RECEIVED ON 05.10.2013 ACCEPTED ON 09.01.2014 ABSTRACT Recent years have seen an increasing interest in the design of AQM (Active Queue

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

QoS Issues in a Large-scale IPv6 Network

QoS Issues in a Large-scale IPv6 Network QoS Issues in a Large-scale IPv6 Network Christos Bouras 1,2 Dimitris Primpas 1,2 Kostas Stamos 1,2 1 Research Academic Computer Technology Institute, PO Box 1122, Patras, Greece and 2 Computer Engineering

More information

Internet services pricing under usagebased cost allocation: Congestion dependence

Internet services pricing under usagebased cost allocation: Congestion dependence Internet services pricing under usagebased cost allocation: Congestion dependence Bratislava, Slovakia 18 20 September, 2001 RSBra-13-En Mark Scanlan 1 M.Scanlan@WIK.org Issues addressed in this presentation

More information

SPEAKEASY QUALITY OF SERVICE: VQ TECHNOLOGY

SPEAKEASY QUALITY OF SERVICE: VQ TECHNOLOGY SPEAKEASY QUALITY OF SERVICE: VQ TECHNOLOGY August 2005 Formoreinformation,contactSpeakeasyPartnerITS at630.420.2550orvisitwww.teamits.com. www.speakeasy.net 800-556-5829 1201 Western Ave Seattle, WA 98101

More information

Achieving QoS for TCP traffic in Satellite Networks with Differentiated Services

Achieving QoS for TCP traffic in Satellite Networks with Differentiated Services 1 Achieving QoS for TCP traffic in Satellite Networks with Differentiated Services Arjan Durresi 1, Sastri Kota 2, Mukul Goyal 1, Raj Jain 3, Venkata Bharani 1 1 Department of Computer and Information

More information

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework

An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework An Active Network Based Hierarchical Mobile Internet Protocol Version 6 Framework Zutao Zhu Zhenjun Li YunYong Duan Department of Business Support Department of Computer Science Department of Business

More information

Active Queue Management (AQM) based Internet Congestion Control

Active Queue Management (AQM) based Internet Congestion Control Active Queue Management (AQM) based Internet Congestion Control October 1 2002 Seungwan Ryu (sryu@eng.buffalo.edu) PhD Student of IE Department University at Buffalo Contents Internet Congestion Control

More information

Technology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc.

Technology Overview. Class of Service Overview. Published: 2014-01-10. Copyright 2014, Juniper Networks, Inc. Technology Overview Class of Service Overview Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos,

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

QoS in VoIP. Rahul Singhai Parijat Garg

QoS in VoIP. Rahul Singhai Parijat Garg QoS in VoIP Rahul Singhai Parijat Garg Outline Introduction The VoIP Setting QoS Issues Service Models Techniques for QoS Voice Quality Monitoring Sample solution from industry Conclusion Introduction

More information

A New Proposal for Assuring Services in Internet

A New Proposal for Assuring Services in Internet A New Proposal for Assuring Services in Internet Maria-Dolores Cano, Fernando Cerdan, Joan Garcia-Haro, Josemaria Malgosa-Sanahuja Department of Information echnologies and Communications Polytechnic University

More information

Differentiated Services:

Differentiated Services: Differentiated Services: A Tutorial Overview with a Voice over IP Slant Kathleen Nichols kmn@cisco.com ETSI Workhop on Voice over IP June 9, 1999 1 of 24 Differentiated Services The differentiated services

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

IP Traffic Engineering over OMP technique

IP Traffic Engineering over OMP technique IP Traffic Engineering over OMP technique 1 Károly Farkas, 1 Zoltán Balogh, 2 Henrik Villför 1 High Speed Networks Laboratory Department of Telecommunications and Telematics Technical University of Budapest,

More information

Multi-Protocol Label Switching To Support Quality of Service Needs

Multi-Protocol Label Switching To Support Quality of Service Needs Technical Report, IDE1008, February 2010 Multi-Protocol Label Switching To Support Quality of Service Needs Master s Thesis in Computer Network Engineering - 15hp AMJAD IFTIKHAR AOON MUHAMMAD SHAH & FOWAD

More information

Random Early Detection Gateways for Congestion Avoidance

Random Early Detection Gateways for Congestion Avoidance Random Early Detection Gateways for Congestion Avoidance Sally Floyd and Van Jacobson Lawrence Berkeley Laboratory University of California floyd@eelblgov van@eelblgov To appear in the August 1993 IEEE/ACM

More information

Bandwidth Allocation for Non-Responsive Flows with Active Queue Management

Bandwidth Allocation for Non-Responsive Flows with Active Queue Management Bandwidth Allocation for Non-Responsive Flows with Active Queue Management Ed Bowen, Clark Jeffries IBM Microelectronics, Research Triangle Park, NC 27709, USA edbowen,clajef @us.ibm.com Lukas Kencl, Andreas

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

QoS in multi-service IP networks

QoS in multi-service IP networks QoS in multi-service IP networks Vasco Nuno Sousa Simões Pereira Department of Informatics Engineering of the University of Coimbra vasco@dei.uc.pt Abstract Today, an increasing number of applications

More information