Optik 122 (2011) Contents lists available at ScienceDirect. Optik. j o ur nal homepage:

Size: px
Start display at page:

Download "Optik 122 (2011) 1598 1602. Contents lists available at ScienceDirect. Optik. j o ur nal homepage: www.elsevier.de/ijleo"

Transcription

1 Optik 122 (2011) Contents lists available at ScienceDirect Optik j o ur nal homepage: Design and performance evaluation of a metro WDM storage area network with IP datagram support Bernardi Pranggono, Jaafar M.H. Elmirghani School of Electronic and Electrical Engineering, University of Leeds, Leeds, LS2 9JT, UK a r t i c l e i n f o Article history: Received 15 April 2010 Accepted 1 October 2010 Keywords: Medium access control protocol Metropolitan area network Storage area network Wavelength division multiplexing a b s t r a c t Storage area networks (SANs) are becoming an important part of optical MANs (metropolitan area networks). Growing storage and business-continuity needs; high-bandwidth, low latency requirements for SANs; storage infrastructure consolidation; and post-9/11 regulatory issues are among the several driving factors to push this trend. We, in this paper, consider a metro wavelength division multiplexing (WDM) SAN that allows the transmission of variable packet size such as Internet protocol (IP) datagram and evaluate its performance by means of discrete-event simulation. The network is based on one fixed transmitter and multiple fixed receivers. Beginning with an introduction and the context of this work, we describe the network and node architectures; and introduce the medium access control (MAC) protocols. Subsequently, using the Poisson and self-similar traffic, we present and discuss performance of the proposed network architecture in terms of throughput and queuing delay under symmetric and asymmetric traffic scenarios. The simulation results suggested that the proposed architecture is suitable for SAN applications which demand low queuing delay and high throughput Elsevier GmbH. All rights reserved. 1. Introduction In the past few years we have witnessed a tremendous growth in network traffic due to the explosive development of new services and data-intensive applications such as enterprise resource planning (ERP), customer relationship management (CRM), grid computing, backup and recovery, data warehousing and mining. In addition to this phenomenon, business-continuity needs and storage infrastructure consolidation are also generating a constant demand for a dedicated storage system with a bigger capacity of data storage. This storage system needs to be scalable, robust and able to provide data in an efficient way. Storage area networks (SANs) are one of the most suitable solutions to fulfil the requirements. Furthermore, recent demand of new services such as triple (data, voice and video) or quadruple (data, voice, video and mobile) play is also increasing significantly. In turn, this is expected to cause a massive boost in the traffic across core networks by one to two orders of magnitude which also have a significant impact on the metropolitan area networks traffic. Transport network technologies have kept in pace with the unprecedented demand on bandwidth with progress in telecommunication technologies. Photonic network technologies and wavelength division multiplexing (WDM) have become a technol- Corresponding author. address: bern@ieee.org (B. Pranggono). ogy of choice to increase network bandwidth in recent years and the trend is continuing [1]. Recent developments in WDM research have led to new technologies that offer an unparalleled bandwidth as currently available systems can support up to 600 wavelengths per fibre enabling a single fibre to transfer few terabits per second of data and information. In turn, advances in optical transport technologies could motivate the creation of new killer applications that are able to exploit the ample availability of bandwidth. Due to its superior characteristics, WDM technology is not only utilized in backbone wide area networks but has also started to be utilized in metro access networks [2,3]. This latest development makes it more and more feasible for WDM technology to be used in SANs to give SANs a more competitive, high-bandwidth, highscalability and low-latency edge. On the other hand, the legacy SAN system, based on Fibre Channel (FC) SONET/SDH technologies, has drawbacks such as, the FC distance limitation and the SONET inefficiency in transporting bursty data traffic as it is designed to support voice traffic [2]. The unprecedented users demand and the advent of photonic technologies generate great opportunities for metro WDM networks based SAN. Optical storage area networking has started to receive attention [1]. It is therefore of interest to explore systems and protocols that may enable WDM to be effectively used to enhance the capacity, access speed and capabilities of distributed SANs. Following the introduction this paper is organized as follows: Section 2 discusses background and motivation of this work. Section 3 presents our node and network architecture, and introduces /$ see front matter 2010 Elsevier GmbH. All rights reserved. doi: /j.ijleo

2 B. Pranggono, J.M.H. Elmirghani / Optik 122 (2011) the MAC protocols. Performance analysis results from discreteevent simulation are given and discussed in Section 4. Finally, the paper is concluded in Section Background and motivation SANs are devoted high-speed networks whose primary function is to interconnect computer systems and storage devices in an efficient way. In essence, SANs are composed by four primary elements, storage devices, computer systems, a communication infrastructure, which provides physical connections, and a management layer which manages the connections. Metro WDM may be considered for SANs as it has high-bandwidth, high-scalability and low-latency. A MAN type network has to be relatively flexible and scalable in the sense that it is expected to satisfy various user demands and possible configurations. In addition, the physical architecture is strongly reliant on the geographical relative positions of the access nodes (ANs). A simple slotted WDM ring network architecture intended to serve as a metropolitan access network has been proposed in [4], and is designed to interconnect several access nodes (ANs) on a regional scale. Slotted and token passing WDM ring architecture have been proposed in [5]. Early implementations of slotted rings were strictly limited by the very low bandwidth-delay product. Nowadays, this is clearly not a limitation. Indeed, in high speed networks, the duration of a slot (containing a fixed number of bits) is becoming shorter and shorter as compared to the ring propagation time and hence, a slot, is much smaller than the size of the network it moves in. In the proposed architecture in [4], a unidirectional single-fibre multi-channel time-slotted ring is implemented, with uncomplicated MAC protocol, in which the time is divided into a number of slots. The slots on the ring have a fixed size, which is equal to the Ethernet maximum transmission unit (MTU) frame size, i.e. about 12,000 bits (or 1500 bytes). An assumption was made that the packet size is always equal to the slot size. The complexity of the MAC protocol is reduced on purpose as the intelligence of the network is implemented in the access nodes. Traditionally, in order to simplify the design and operation of the network and its switching nodes, it is usually assumed that the network traffic consist of fixed size packets [6 9]. However, in reality the packet size in data communication traffic is not fixed. Based on measurement on the Sprint IP backbone, according to [10] there are mainly five major sizes of packets in data traffic, i.e. 40, 211, 572, 820 and 1500 bytes. The bytes size is for TCP ACK segments, TCP control segments, and telnet packets carrying single characters. 572 bytes and 1500 bytes are the most common default MTUs of the network interfaces on the hosts. Many TCP implementations that do not implement MTU discovery utilize either 512 or 536 bytes as the default maximum segment size (MSS) for non-local IP destinations, resulting a 552 byte or 576 byte packet size. The default packet size of 576 bytes results in fragments of 572 bytes because the length of the payload of each fragment packet except the last must be divisible by eight [11]. The most widely used Ethernet network interface utilizes 1500 bytes of MTU. The 211 bytes packets correspond to a content distribution network (CDN) proprietary user datagram protocol (UDP) application that uses an unregistered port and carries a single 211 bytes packet. The packets of around 820 bytes are generated by domain name server (DNS) and media streaming applications. Obviously, the original architecture is not suitable for this situation, in which a huge proportion of the slot space will be wasted. In our previous work, two metro WDM multi-ring network architectures and MAC protocols have been presented [12]. The two metro WDM multi-ring network architectures are designed Fig. 1. Network architecture. to accommodate variable length packet traffic, where slots of different sizes circulate along the ring. In this work, we evaluate these architecture and MAC protocols in a metro setting for SAN application where SANs co-exist with other network users. Furthermore, in addition to symmetric traffic, asymmetric traffic is also considered in order to evaluate the impact of hot-node scenarios, for example, where one server acts as a gateway, SAN access point, or as a database server. In addition, performance evaluation under the Poisson and bursty self-similar traffic is also considered. The flexibility of the network is very high and attractive and easy physical deployments can be achieved. 3. System architecture 3.1. Network architecture The architecture is a single-fibre unidirectional multi-channel slotted (synchronous) ring, similar to [13] which is designed to interconnect ANs (in this scenario some of the ANs serve SANs) on a regional scale. Each AN has add-and-drop capabilities to access the ring slots and is used to link an access network to the ring. This can be realized by means of optical add-drop multiplexers (OADM). Each node has three network ports. A Gigabit Ethernet (GbE) port is used for transmission between AN and the access network, the other two OC-like ports are used to access the WDM ring. Data sent from one access network to another is first received by an AN through the GbE link and is then transmitted through the WDM ring to the destination AN which delivers the data to the intended access network. The proposed SAN architecture using metro WDM ring network is shown in Fig. 1. In the network, the length of the ring is 138 km, which leads to a ring diameter of about 44 km. The number of wavelengths equal to four, and each wavelength is considered to have a transmission rate of 2.5 Gb/s (i.e. OC-48). This network is used to interconnect 16 nodes, and is denoted as S For the variable-size (VS) slot scheme, the slots on the ring have five different sizes, corresponding to the five different sizes of data traffic packets from the access links, which are 40, 211, 572, 820 and 1500 bytes. The total number of slots is 240. The number of slots for each size is 24, 48, 24, 48 and 96 respectively (the numbers are related to the probability distribution of packet size on the access links). The average size for a slot is bits. In the simulation, the different size slots are generated with a fixed sequence. The

3 1600 B. Pranggono, J.M.H. Elmirghani / Optik 122 (2011) Fig. 2. A generic node architecture of the slotted network. 240 slots are divided into 24 groups, in each group there are 10 slots with one slot of 40 bytes, two slots of 211 byes, one slot of 572 bytes, two slots of 820 bytes and four slots of 1500 bytes. This distribution is based on the Internet traffic distribution mentioned in Section 2. In order to simplify the calculation and rotation, the length of the ring is slightly changed to 133,240 m (the ring length was equal to 138,240 m in the original network architectures [4]). For the super-size (SS) slot scheme, the ring is divided into 16 super slots with a size of 13,500 bytes. In SS case, the length of the ring remains at 138,240 m Node architecture The generic slotted node architecture used is shown in Fig. 2. When individual optical switches build a network, packets may arrive at different times at the input ports of each node. In a slotted network, a synchronization stage is needed to ensure that packet transmission start and end at a slot boundary. Before entering the photonic switch, all the input packets arriving at the input ports need to be aligned in time with one another (see Fig. 2). Bit-level synchronization and fast clock recovery are required for packetheader recognition and packet delineation. In the optical drop part of the node, the optical signals on the node s drop channel are removed from the ring by means of an optical circulator and a fibre Bragg grating (FBG). The received packet (in case of full slot) is then either locally dropped or retransmitted onto the ring depending on the destination address. In the optical add part of the node, a fixed optical transmitter transmits the new data packet received from the local add part on the corresponding wavelength channel (depending upon slot status and the destination address of the local packet). Every node is equipped with one fixed transmitter and four fixed receivers (FT FR 4 ). The proposed FT FR 4 architecture is very flexible and more easily scalable (there can be more nodes than wavelengths) than previous proposals of WDM ring network such as FT n FR n in [5]. Because in FT FR 4 system, a node can receive packets on any wavelength, each node is assigned a different sub-carrier multiplexed tone. When a node wishes to transmit to a specific destination, it transmits the packet onto a slot of its assigned transmission wavelength and multiplexes the appropriate sub-carrier tone of the destination. Meanwhile, each node constantly monitors all wavelengths in parallel in order to detect its own sub-carrier tone, which will notify it that it is the intended destination of the corresponding packet. The absence of a sub-carrier tone indicates that there is no packet loaded on the corresponding wavelength. An illustration of sub-carrier multiplexed mechanism is shown in Fig. 3. The feasibility of such a mechanism for a slotted Fig. 3. Sub-carrier multiplexed. ring has already been demonstrated in the HORNET [14] network project. In addition, the use of fixed transmitter is more cost effective compared to tunable transmitter used in [15,16]. Each wavelength is shared both for transmission and reception since there are fewer wavelengths than nodes in the network. In the variable-size (VS) slot scheme, each node has five First-In First-Out (FIFO) buffers for transmission to store packets with five different sizes. A maximum of 20 packets can be stored in each buffer. In the super-size (SS) slot scheme, only one FIFO buffer is used for transmission with the capacity of 100 packets. In both architectures, newly arriving packets are discarded when the buffer is full. It is expected that higher layer (e.g. IP) will do the recovering task. The network parameters used in the simulation are summarized in Table MAC protocol Medium access control (MAC) protocols are necessary to prevent channel and receiver collisions and to arbitrate the access to the wavelength channels. In this paper, we do not consider Table 1 Network parameters. Wavelength rate: R W 2.5 Gb/s Number of wavelengths per fibre: N W 4 Total network rate: R N = R W N W 10 Gb/s Number of access nodes: N T 16 Light velocity in fibre: V m/s Architecture Variable slot (VS) Super slot (SS) Ring length: L R 133,240 m 138,240 m Propagation delay: D = L R/V s s Bandwidth-delay product: B DP = R W D 1,665,480 bits 1,728,000 bits Average slot size: S bits 108,000 bits Slots per wavelength: S W = B DP/S

4 B. Pranggono, J.M.H. Elmirghani / Optik 122 (2011) addressing capabilities (address resolving and format) nor optical and electronic issues (receiver synchronization, signal attenuation, chromatic dispersion and others). For the VS slot scheme, a node always inspects the activity of the channel. The node probes the destination ID of the packet in the slot. If it is the node s ID, the packet is received from the ring, the receiver then marks the slot empty once the packet is correctly received and thus makes the slot reusable immediately (destination-stripping). If the destination ID is not equal to the node ID, the slot will be released to the downstream nodes. If an empty slot is observed, the node checks the size of the slot. A packet with a corresponding size is transmitted in the slot data unit. If the relevant buffer is empty, the empty slot is released to downstream neighbors. For the SS slot scheme, the transmission is quite different. The transmitter always inspects the free slot space (the capacity of the slot minus the current load of the slot) of the current slot. While the free space of a slot is larger than the size of the current packet in the buffer, the current packet will be transferred into the slot. Thus, the super slot scheme can convey a number of packets from current nodes while it has enough space. In this case, the slot is able to make good use of the free space to carry different packets, and do not have to consider the size of the packets. Actually, the free space in the super slot is not continuous due to the removal of packets. Thus, the fibre delay line (FDL) is introduced to vary the spacing at a node in the super slot case. Here a node delays the packet stream to increase the size of an unused space within the super slot provided there is sufficient unused space within the super slot to afford packet compaction. 4. Performance evaluation Simulating Internet traffic is a complex task as it needs to consider multi-dimensional aspects. There is no single model which satisfies all its requirements. Recent trends in networking agree that Internet traffic is self-similar [17]. However, the Poisson traffic is also found to be more suitable for smallest time scale in high aggregation environment [18]. Therefore, both the Poisson and selfsimilar traffic are used for performance evaluation in this section. The Poisson traffic generator is used to simulate the traffic received from the GbE access link. The Poisson traffic has been widely used to simulate independent inter-arrival traffic. Performance evaluation under self-similar traffic is also considered. The self-similar traffic sources were simulated using aggregated ON/OFF sources using Pareto distributions. The Hurst parameter of the aggregated traffic is H = 0.8 which represents a high degree of burstiness. It is generally accepted that Hurst parameter greater than 0.7 impacts the performance of a network due to the bursty nature of the associated traffic [19]. These two traffic sources the Poisson and self-similar traffic are denoted by P and S in the graphical results which are presented later in this section. Network performance in terms of node throughput, packet queuing delay in the transmission buffer, and proportion of packets dropped for both architectures was assessed under symmetric and asymmetric traffic. In case of symmetric traffic, all source nodes generate statistically the same amount of traffic to all other destination nodes. A node cannot transfer traffic to itself. On the other hand, under asymmetric traffic, one node generates more traffic compared to all other nodes. One hot-node scenario is considered (node 0), i.e. one node receives 0.4 of the total network traffic. In the graphical results, the use of asymmetric traffic and symmetric traffic is denoted by as40 and sym respectively. Each simulation is characterized by two parameters: the normalized network load and traffic distribution model. The normalized network load, denoted by L, is used to study the per- Fig. 4. Average throughput. formance of the network against varying level of traffic volumes, ranging between zero and one, i.e. null traffic to 1 Gb/s. Since there are a total of 16 nodes in the network, the total traffic generated for the ring network with L = 1 will be 16 Gb/s. Note that the total bandwidth capacity of the WDM ring is 10 Gb/s (2.5 Gb/s 4) and therefore the normalized load of 1 will create more traffic on the ring than the total carrying capacity of the WDM ring network. This section shows the results of discrete-event simulations. The same traffic was applied to the VS slot and SS slot schemes. Fig. 4 shows the average throughput of the network. As shown in Fig. 4, in both cases S VS-P-as40 and S SS-Pas40, the maximum throughput achieved is 900 Mb/s and 855 Mb/s respectively. The use of self-similar traffic sources slightly reduces the achievable throughput when compared with the case where the Poisson traffic is used. This is expected due to the burstiness of the traffic produced by self-similar sources. Here we notice that the throughput is declining when network load is very high (L > 0.8). This is mainly due to packet dropped as the buffer being full as packet inter-arrival duration decreases. We also notice that compared to VS, the network throughput of SS is slightly lower, especially when the load is very high (L > 8). It is also clear from the graph that the use of asymmetric traffic has a negative impact on the achievable throughput of the network. The average queuing delay is shown in Fig. 5. For the queuing delay, the performance is good as the delay is always less than 500 s whenever the network load is less than 1. This is more than suitable value even in the case of real-time multimedia traffic [20]. When we compare the VS slot architecture with the SS slot architecture, the VS slot architecture achieved slightly better performance, especially under asymmetric traffic. Under symmetric traffic scenario, the achievable throughput for both S VS-S Fig. 5. Average queuing delay.

5 1602 B. Pranggono, J.M.H. Elmirghani / Optik 122 (2011) and S SS-S are roughly the same, around 950 Mb/s when the network load equal to 1. It is worth observing that the SS slot architecture does not significantly improve the slot reuse efficiency of the network, which means that the capacity of the network is not significantly increased. Therefore the maximum throughput is not improved. Moreover, in the SS slot scheme, if a 1500 bytes packet is in the buffer while the slot free space is slightly less than that, the slot cannot carry any packets from the current node, even when there are smaller packets that need to be transmitted. So nearly 1500 bytes space is wasted, i.e. 11.1% slot space is wasted (the size of slot is 13,500 bytes). However, in the VS slot scheme, the slot utilization probability is able to reach nearly 100% when the ring is saturated (L > 1). Thus, while the load is extremely high (L > 0.9), the average performance of the SS slot scheme is even worse than the VS slot scheme. For the results presented, it is clear that both VS slot and SS slot schemes achieve better performance in terms of network throughput, queuing delay, packet dropping probability and global delay, compared to the fixed-size slot scheme proposed in [4]. It has already shown in [4] that the fixed-sized implementation achieves better results compared to [5] with a simpler protocol. 5. Conclusion The article has presented and evaluated two proposed metro WDM SAN architecture that allows the transmission of variable packet size such as IP datagram. Performance evaluation under symmetric and asymmetric traffic scenarios with the Poisson and self-similar traffic sources was considered. Simulation results were presented for network throughput and queuing delay. The simulations suggested that the proposed architecture is suitable for SAN applications which demand low queuing delay and high throughput. Compared with the super-size slot architecture, the variablesize slot architecture achieved slightly better performance, especially under asymmetric traffic in the very high network load. However, as super-size slot network architecture is not based on the already known packet length distribution of certain traffic, the architecture is more suitable for general IP traffic with unknown packet length distribution. The effect of bursty self-similar traffic was also presented and discussed. Due to the nature of its burstiness, the network performance under self-similar traffic is generally worse than under the Poisson traffic. References [1] B. Mukherjee, Optical WDM Networks, Springer, New York, [2] M. Herzog, et al., Metropolitan area packet-switched WDM networks: a survey on ring systems, IEEE Commun. Surv. Tutor. 6 (Second Quarter) (2004) [3] J.M. Finochietto, et al., Towards optical packet switched MANs: design issues and tradeoffs, Opt. Switching Netw. 5 (2008) [4] C.S. Jelger, J.M.H. Elmirghani, A slotted MAC protocol for efficient bandwidth utilization in WDM metropolitan access ring networks, IEEE JSAC 21 (October) (2003) [5] J. Cai, et al., The multitoken interarrival time (MTIT) access protocol for supporting variable size packets over WDM ring network, IEEE JSAC 18 (October) (2000) [6] I. Chlamtac, et al., A contention and collision free WDM ring network for multigbit/s packet switched communication, J. High Speed Netw. 1 (1995) [7] M.A. Marsan, et al., All-optical WDM multi-rings with differentiated QoS, IEEE Commun. Mag. 37 (1999) [8] A. Bianco, et al., A posteriori versus a priori access strategies in slotted all-optical WDM rings, Comput. Netw. 32 (2000) [9] A. Cerena, et al., RINGO: a demonstrator of WDM optical packet network on a ring topology, in: Optical Network Design and Modelling (ONDM), Torino, 2002, pp [10] C. Fraleigh, et al., Packet-level traffic measurements from the Sprint IP backbone, IEEE Netw. 17 (November December) (2003) [11] C. Shannon, et al., Beyond folklore: observations on fragmented traffic, IEEE/ACM Trans. Netw. 10 (2002) [12] B. Chen, et al., A metro WDM multi-ring network with variable packet size, in: IEEE International Conference on Communications (ICC), Istanbul, 2006, pp [13] R. Randhawa, et al., Optimum performance and analysis of RingO networks, Optik 120 (2009) [14] I.M. White, et al., A summary of the HORNET project: a next-generation metropolitan area network, IEEE JSAC 21 (November) (2003) [15] I.E. Pountourakis, A WDM network architecture with multiple receivers and a synchronous transmission protocol with constraint of data channel collision, Microw. Opt. Technol. Lett. 38 (2003) [16] M.A. Marsan, et al., MAC protocols and fairness control in WDM multirings with tunable transmitters and fixed receivers, J. Lightwave Technol. 14 (1996) [17] W. Willinger, et al., Self-similarity through high variability: statistical analysis of Ethernet LAN traffic at the source level, IEEE/ACM Trans. Netw. 5 (February) (1997) [18] T. Karagiannis, et al., A nonstationary Poisson view of Internet traffic, in: IEEE INFOCOM, vol. 3, Hong Kong, 2004, pp [19] Z. Sahinoglu, S. Tekinay, On multimedia networks: self-similar traffic and network performance, IEEE Commun. Mag. 37 (1999) [20] M. Baldi, Y. Ofek, End-to-end delay analysis of videoconferencing over packetswitched networks, IEEE/ACM Trans. Netw. 8 (August) (2000)

PART II. OPS-based metro area networks

PART II. OPS-based metro area networks PART II OPS-based metro area networks Chapter 3 Introduction to the OPS-based metro area networks Some traffic estimates for the UK network over the next few years [39] indicate that when access is primarily

More information

A novel and simple beforehand bandwidth reservation (BBR) MAC protocol for OBS metro ring networks

A novel and simple beforehand bandwidth reservation (BBR) MAC protocol for OBS metro ring networks Journal of High Speed Networks 17 (2008) 59 72 59 DOI 10.3233/JHS-2008-0328 IOS Press A novel and simple beforehand bandwidth reservation (BBR) MAC protocol for OBS metro ring networks Wen-Ping Chen a,

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

The Keys for Campus Networking: Integration, Integration, and Integration

The Keys for Campus Networking: Integration, Integration, and Integration The Keys for Campus Networking: Introduction Internet Protocol (IP) is considered the working-horse that the vast majority of current and future applications use as the key technology for information exchange,

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

Introduction. Background

Introduction. Background Introduction By far, the most widely used networking technology in Wide Area Networks (WANs) is SONET/SDH. With the growth of Ethernet now into Metropolitan Area Networks (MANs) there is a growing need

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

Chapter 1 Reading Organizer

Chapter 1 Reading Organizer Chapter 1 Reading Organizer After completion of this chapter, you should be able to: Describe convergence of data, voice and video in the context of switched networks Describe a switched network in a small

More information

Performance Management and Fault Management. 1 Dept. of ECE, SRM University

Performance Management and Fault Management. 1 Dept. of ECE, SRM University Performance Management and Fault Management 1 Dept. of ECE, SRM University Performance Management Performance management requires monitoring of the performance parameters for all the connections supported

More information

Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks

Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks 2072 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 10, OCTOBER 2000 Providing Deterministic Quality-of-Service Guarantees on WDM Optical Networks Maode Ma and Mounir Hamdi, Member, IEEE

More information

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN

10 Gigabit Ethernet: Scaling across LAN, MAN, WAN Arasan Chip Systems Inc. White Paper 10 Gigabit Ethernet: Scaling across LAN, MAN, WAN By Dennis McCarty March 2011 Overview Ethernet is one of the few protocols that has increased its bandwidth, while

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks

Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Performance Analysis of Storage Area Network Switches

Performance Analysis of Storage Area Network Switches Performance Analysis of Storage Area Network Switches Andrea Bianco, Paolo Giaccone, Enrico Maria Giraudo, Fabio Neri, Enrico Schiattarella Dipartimento di Elettronica - Politecnico di Torino - Italy e-mail:

More information

How To Build A Network For Storage Area Network (San)

How To Build A Network For Storage Area Network (San) White Paper Data Storage across the MAN by deploying a SAN over Dark Fiber by Pieter Panis, EuroFiber 1/7 1 Introduction The purpose of this document is to illustrate how a storage area network (SAN) can

More information

RFC 2544 Testing of Ethernet Services in Telecom Networks

RFC 2544 Testing of Ethernet Services in Telecom Networks RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure

More information

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests

Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test

More information

SDH and WDM A look at the physical layer

SDH and WDM A look at the physical layer SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and QoS provisioning - 1 Copyright This

More information

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics:

Quality of Service. Traditional Nonconverged Network. Traditional data traffic characteristics: Quality of Service 1 Traditional Nonconverged Network Traditional data traffic characteristics: Bursty data flow FIFO access Not overly time-sensitive; delays OK Brief outages are survivable 2 1 Converged

More information

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS

RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless

More information

Ethernet Passive Optical Networks EPON

Ethernet Passive Optical Networks EPON Ethernet Passive Optical Networks EPON IEEE 802.3 Ethernet in the First Mile Study Group January 8-9, 2001, Irvine, CA Gerry Pesavento Alloptic, Inc. Tel 925-245-7647 Email gerry.pesavento@alloptic.com

More information

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS

NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS NOVEL PRIORITISED EGPRS MEDIUM ACCESS REGIME FOR REDUCED FILE TRANSFER DELAY DURING CONGESTED PERIODS D. Todinca, P. Perry and J. Murphy Dublin City University, Ireland ABSTRACT The goal of this paper

More information

Deploying Multiservice Applications Using RPR Over the Existing SONET Infrastructure

Deploying Multiservice Applications Using RPR Over the Existing SONET Infrastructure Deploying Multiservice Applications Using RPR Over the Existing SONET Infrastructure Introduction The migration of Ethernet technology from the LAN to metro networks, driven by increasing demand in VoIP,

More information

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic F. A. Tobagi, C. J. Fraleigh, M. J. Karam, W. Noureddine Computer Systems Laboratory Department of Electrical

More information

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Karamitsos Ioannis Telecom Lab,On Telecoms Athens, Attica 16342, Greece Al-Arfaj Khalid Rayadah Investment Co Riyadh, KSA Kingdom of Saudi

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

TCP and UDP Performance for Internet over Optical Packet-Switched Networks

TCP and UDP Performance for Internet over Optical Packet-Switched Networks TCP and UDP Performance for Internet over Optical Packet-Switched Networks Jingyi He S-H Gary Chan Department of Electrical and Electronic Engineering Department of Computer Science Hong Kong University

More information

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management

Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742. Vol 2 No 3 (May-2015) Active Queue Management Protagonist International Journal of Management And Technology (PIJMT) Online ISSN- 2394-3742 Vol 2 No 3 (May-2015) Active Queue Management For Transmission Congestion control Manu Yadav M.Tech Student

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

SDH and WDM: a look at the physical layer

SDH and WDM: a look at the physical layer SDH and WDM: a look at the physical SDH and WDM A look at the physical Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network management and

More information

Fiber-Optic Real-Time Networks for Distributed Computing Systems. Magnus Jonsson. Node 2. Magnus Jonsson, Halmstad University, Sweden.

Fiber-Optic Real-Time Networks for Distributed Computing Systems. Magnus Jonsson. Node 2. Magnus Jonsson, Halmstad University, Sweden. Fiber-Optic Real-Time Networks for Distributed Computing Systems Magnus Jonsson Node 1 Node M Node 2 Node 3 Outline Requirements and desired features of interconnection networks for radar systems Proposed

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service? QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS By Thierno Diallo, Product Specialist With the increasing demand for advanced voice and video services, the traditional best-effort delivery model is

More information

A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH)

A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) 677 A review of Plesiochronous Digital Hierarchy (PDH) and Synchronous Digital Hierarchy (SDH) Olabenjo Babatunde 1, Salim Mbarouk 2 1 (Department of Information Systems Engineering, Cyprus International

More information

Fibre Channel over Ethernet in the Data Center: An Introduction

Fibre Channel over Ethernet in the Data Center: An Introduction Fibre Channel over Ethernet in the Data Center: An Introduction Introduction Fibre Channel over Ethernet (FCoE) is a newly proposed standard that is being developed by INCITS T11. The FCoE protocol specification

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

Hitachi s Involvement in Networking for Cloud Computing

Hitachi s Involvement in Networking for Cloud Computing Hitachi s Involvement in Networking for Cloud Computing 70 Hitachi s Involvement in Networking for Cloud Computing Chikako Tanaka Takashi Ezaki Yasuhiro Uchiyama, Dr. Eng. Kazuma Yumoto Takeki Yazaki OVERVIEW:

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data

Primary Data Center. Remote Data Center Plans (COOP), Business Continuity (BC), Disaster Recovery (DR), and data White Paper Storage Extension Network Solutions Between Data Centers Simplified, Low Cost, Networks for Storage Replication, Business Continuity and Disaster Recovery TODAY S OPERATING CLIMATE DEMANDS

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

A CLASS-BASED DYNAMIC BANDWIDTH ALLOCATION SCHEME FOR EPONS

A CLASS-BASED DYNAMIC BANDWIDTH ALLOCATION SCHEME FOR EPONS A CLASS-BASED DYAMIC BADWIDTH ALLOCATIO SCHEME FOR EPOS Jing Xie,, Shengming Jiang, and Yuming Jiang 3 Institute For Infocomm Research, Heng Mui Keng Terrace, Singapore 963, Singapore Department Of Electrical

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Implementing VoIP support in a VSAT network based on SoftSwitch integration

Implementing VoIP support in a VSAT network based on SoftSwitch integration Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.

More information

IPv6 Broadband Access Network Systems

IPv6 Broadband Access Network Systems IPv6 Broadband Access Network Systems IPv6 Broadband Access Network Systems 60 Junji Yamada Koji Wakayama Eisuke Sato OVERVIEW: To meet the demand for broadband access and enable a smooth transition from

More information

The proliferation of the raw processing

The proliferation of the raw processing TECHNOLOGY CONNECTED Advances with System Area Network Speeds Data Transfer between Servers with A new network switch technology is targeted to answer the phenomenal demands on intercommunication transfer

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems

Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and

More information

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development

Fibre Channel Overview of the Technology. Early History and Fibre Channel Standards Development Fibre Channel Overview from the Internet Page 1 of 11 Fibre Channel Overview of the Technology Early History and Fibre Channel Standards Development Interoperability and Storage Storage Devices and Systems

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Exhibit n.2: The layers of a hierarchical network

Exhibit n.2: The layers of a hierarchical network 3. Advanced Secure Network Design 3.1 Introduction You already know that routers are probably the most critical equipment piece in today s networking. Without routers, internetwork communication would

More information

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

More information

Performance Management for Next- Generation Networks

Performance Management for Next- Generation Networks Performance Management for Next- Generation Networks Definition Performance management for next-generation networks consists of two components. The first is a set of functions that evaluates and reports

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications Sarhan M. Musa Mahamadou Tembely Matthew N. O. Sadiku Pamela H. Obiomon

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Solutions Guide. Resilient Networking with EPSR

Solutions Guide. Resilient Networking with EPSR Solutions Guide Resilient Networking with EPSR Introduction IP over Ethernet is now a well-proven technology in the delivery of converged services. Ethernet-based Triple-Play services have become an established

More information

Analog vs. Digital Transmission

Analog vs. Digital Transmission Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

An Analysis of the Delay and Jitter Performance of DBA Schemes for Differentiated Services in EPONs

An Analysis of the Delay and Jitter Performance of DBA Schemes for Differentiated Services in EPONs Journal of the Optical Society of Korea Vol. 13, No. 3, September 29, pp. 373-378 DOI: 1.387/JOSK.29.13.3.373 An Analysis of the Delay and Jitter Performance of DBA Schemes for Differentiated Services

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

[Prof. Rupesh G Vaishnav] Page 1

[Prof. Rupesh G Vaishnav] Page 1 Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

Network Architecture and Topology

Network Architecture and Topology 1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Central Office Testing of Network Services

Central Office Testing of Network Services Central Office Testing of Network Services Rev 4 Application Note Ethernet is rapidly becoming the predominant method for deploying new commercial services and for expanding backhaul capacity. Carriers

More information

Capacity planning and.

Capacity planning and. Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Transport for Enterprise VoIP Services

Transport for Enterprise VoIP Services Transport for Enterprise VoIP Services Introduction Many carriers are looking to advanced packet services as an opportunity to generate new revenue or lower costs. These services, which include VoIP, IP

More information

Algorithms for Interference Sensing in Optical CDMA Networks

Algorithms for Interference Sensing in Optical CDMA Networks Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: hcc@cc.ndhu.edu.tw

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

This topic lists the key mechanisms use to implement QoS in an IP network.

This topic lists the key mechanisms use to implement QoS in an IP network. IP QoS Mechanisms QoS Mechanisms This topic lists the key mechanisms use to implement QoS in an IP network. QoS Mechanisms Classification: Each class-oriented QoS mechanism has to support some type of

More information

Introduction to Metropolitan Area Networks and Wide Area Networks

Introduction to Metropolitan Area Networks and Wide Area Networks Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,

More information

Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Clearing the Way for VoIP

Clearing the Way for VoIP Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.

More information