Network Services Definition and Deployment in a Differentiated Services Architecture

Size: px
Start display at page:

Download "Network Services Definition and Deployment in a Differentiated Services Architecture"

Transcription

1 etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and Computer Engneerng, 9 eroon Polytechnou str, 57 73, Athens, Greece Telephone: , FAX: Abstract- ext generaton Internet archtectures wll consder the Dfferentated Servces paradgm for the provson of qualty of servce to ndvdual customers needs and applcatons. Ths paper addresses the defnton and deployment of specfc network servces n a DffServ envronment. The proposed network servces and the underlyng traffc engneerng methods are analyzed and smulated. Smulaton outcomes prove that the fundamental prncples of the network servces are fulflled. I. ITRODUCTIO The Internet s constantly evolvng from a network carryng manly data traffc nto a network that should handle a varety of traffc profles, rangng from real tme audo and vdeo to web traffc. owever, the best effort nature of the current Internet s not suffcent to cope wth the requrements of ths traffc, n terms of throughput, delay, jtter and packet loss. The Integrated Servces (IntServ) archtecture [] was the frst sgnfcant step for the ntroducton of QoS n the Internet. IntServ uses the Resource Reservaton Protocol (RSVP) [2] for the explct setup of reservaton state on each network node along the path from the sender to the recever. owever, the constant exchange of RSVP messages, as well as the need for separate reservaton establshment for each flow rased scalablty concerns. The Dfferentated Servces (DffServ) archtecture [3] emerged as a more scalable and manageable approach by provdng relatve prortzaton of IP traffc. In DffServ, IP flows wth smlar QoS requrements are grouped together under a common IP header feld, the DffServ Code Pont (DSCP), and treated n the same queue nsde the routers. DffServ was also enhanced by the ntroducton of the Bandwdth Broker concept [4], a central entty that manages the resources of a doman and allocates them to requestng users. The Dfferentated Servce archtecture provdes servce dfferentaton based on the DSCP feld n the IP header and the Per- op Behavor (PB), whch defnes the externally observable behavor at each node. Two PBs have been defned: the Expedted Forwardng (EF) [5] and the Assured Forwardng (AF) [6] PB. The EF PB provdes premum servce that can be vewed as a vrtual leased lne (VLL) servce and s sutable for real tme flows that requre low delay, low jtter and guaranteed throughput. On the contrary, AF does not provde strct bandwdth guarantees, but assures that packets wll be forwarded wth hgher prorty n relaton to best effort traffc. In the event of congeston, AF packets wll encounter less bandwdth decrease than best effort traffc. There are four AF classed defned wth three levels of drop precedence wthn each class, although t s not mandatory that all four classes have to be used n a doman. In ths paper we brefly present the Resource Control Layer (RCL), a dstrbuted archtecture for the effcent and manageable provson of QoS n DffServ-based networks. owever, we manly focus on the defnton of the etwork Servces that are offered to the users and ther deployment on the network. In order to accommodate traffc wth dfferent QoS requrements, a lmted set of etwork Servces has been defned. The proposed etwork Servces follow the concepts of the IETF EF and AF PBs, but they addtonally propose and explot a specfc mplementaton, whch allevates ther deployment n real networks. The paper s structured as follows. In Secton II, the most mportant concepts of our archtecture are descrbed: the Resource Control Layer and the etwork Servces. Then, n Secton III, the concept of Traffc Classes s ntroduced and descrbed n detal. Traffc Classes provde the traffc handlng mechansms for each etwork Servce. Secton IV presents the smulatons performed and the obtaned results that nvestgate the performance of the proposed etwork Servces n a realstc network topology. II. BASIC ARCITECTURAL MECAISMS A. The RCL Layer The am of ths secton s to gve a short ntroducton of the archtecture, n the context of whch the etwork Servces are defned. The archtecture conssts of two functonal areas: the data plane that s responsble for transmttng IP packets, and an overlay control plane, namely the Resource Control Layer (RCL) that s based on the Bandwdth Broker (BB) concept. Although the classcal BB archtecture proposes a concentrated approach where one BB s responsble for an admnstratve doman, RCL s desgned as a dstrbuted BB, to overcome scalablty problems. As depcted n Fg., the three key components of the RCL are: the Resource Control Agent (RCA), the Admsson Control Agent () and the End-User Applcaton Toolkt (EAT). EAT Access etwork Resource Control Layer (L) Edge Router DffServ Layer (L) ool ool 2 ISP root ool ool 2 RCA (L) (L) Edge Router Fg.: RCL Structure and man nteractons EAT Access etwork The Resource Control Agent s manly responsble for the management of network resources (bandwdth). In order to smplfy the task of the RCA to handle the resources effcently, two concepts are ntroduced: the Resource Pools () and the Resource Shares

2 (RS). The Resource Pool concept s based on the fact that n most networks the topology follows a tree lke structure and therefore an aggregaton of traffc on each subsequent level. Accordng to the composte pattern [7], the s form a tree herarchy as t s shown n Fg. 2. Each, whch s a logcal entty, s assocated wth a real sub-area of the network and manages the resources of the sub-area. The root of the tree s n charge of the avalable resources n the whole network, whle each leaf of the tree structure (Resource Pool Leaf, L) s assocated to one Admsson Control Agent, whch s n turn assocated to one edge router (ER) of the network. In the provsonng phase, by takng nto account the traffc forecasts, the complete network topology and the resource sharng polces between the network servces, the ntal values for the resource dstrbuton are calculated. After the phase of provsonng each /L s ntalzed wth a specfc amount of resources that wll allow makng admsson control decson locally. Wthn each /L, the total resources assgned to t are dstrbuted among the avalable network servces, n the form of Resource Shares. owever, n many cases the ntal dstrbuton of resources dffers sgnfcantly from the actual traffc load, thus an ntellgent loadbalancng redstrbuton algorthm has been defned to redstrbute the avalable resources approprately [8]. L L2 L L Fg. 2: erarchy of the s In order to better understand the redstrbuton process and how t s related to the resource pool concept, consder the case where a L has already reserved all the resources that have been assgned to t ntally, whle L2 has reserved only a small amount. The father by dentfyng that stuaton wll dynamcally shft resources from L2 to L. In other words, even f the provsonng phase produces less accurate values for the resource dstrbuton, the proposed mechansm wll dentfy the actual needs (based on the resource reservaton requests) and adapt accordngly. The Admsson Control Agent s manly responsble for user authentcaton and authorzaton, reservaton handlng, and flow Admsson Control (AC). User authentcaton s ntally performed through an explct logn procedure, whle authorzaton refers to the permsson of a user to place a request for the selected network servce. Durng reservaton handlng, flow admsson control s performed. The admsson control decsons are made only at the edges of the network, therefore the correspondng ngress and egress ponts (ngress-egress s) of the flow are dentfed and the Resource Share, whch corresponds to the user selected network servce, n the L s checked to ensure that the flow can be accommodated. The core network s provsoned through the mechansm explaned above, n order to ensure that once the admsson control at the edges succeeds, no bottleneck wll be created n the core network. Upon a successful reservaton request, the correspondng s consequently confgure the edge routers approprately to accommodate the flow. Reservaton requests are forwarded to the s from the End- User Applcaton Toolkt, whch medates between end-users or applcatons and the network. The EAT nteracts wth the to be aware of the avalable network servces. A reservaton request specfes the flow dentfers, the selected network servce and the traffc profle for t. Specal support s foreseen for legacy applcatons as well as for end users that are not aware of traffc descrpton detals, through the use of Applcaton Profles. Profles are prepared through extensve testng of the applcaton behavor and stored n a repostory. The EAT nterprets the profles and prepares the reservaton on behalf of the user. B. etwork Servces In order to provde QoS guarantees n a DffServ network t s essental to assure QoS dfferentaton. Therefore, a set of fve etwork Servces (S) has been specfed and mplemented n our framework, whch comprses the servces sold by the provder to the potental customers, ether end-users or other provders. They descrbe the QoS treatment a user s traffc experence wthn a network. The specfed Ss are: Premum Constant Bt Rate (PCBR), Premum Varable Bt Rate (PVBR), Premum Multmeda (PMM), Premum Msson Crtcal (PMC) and Standard Best Effort (STD). Applcatons can be grouped nto ths relatvely small number of servces, wth the applcatons n each servce havng smlar requrements on the network n order to perform effectvely and flows n each servce havng smlar characterstcs. The PCBR network servce s ntended to support applcatons that requre VLL-lke servces. Therefore, t s approprate for voce flows, voce trunks or nteractve multmeda applcatons. That knd of flows usually s characterzed by low peak-to-mean rato (almost constant bt rate, CBR) and low bandwdth requrements, whle a great number of them are unresponsve (UDP). In addton, they should have small packets, so as not to provoke long transmsson delays. It requres and expects to receve low delay, very low jtter and very low packet loss. The targeted quanttatve value for end-toend delay s less than 50msec for 99.99% of the packets, whle packet loss s expected to be less than 0-6. The PVBR network servce manly copes wth unresponsve varable bt rate (VBR) sources wth medum to hgh bandwdth requrements. The ntenton s to separate those possbly hgh bandwdth VBR flows from the low bandwdth VBR and CBR flows n PCBR. Ths s caused by the fact that peak rate allocaton s neffcent for the hgh bandwdth VBR flows, contrary to the flows belongng to PCBR. Typcal canddate applcatons are real tme vdeo and teleconferencng. The requrements are smlar to the PCBR network servces but wth a less strct need concernng the jtter and packet loss. They are characterzed by large packet sze and hgh peak-to-mean rato. The targeted end-to-end delay s lmted to less than 250msec for 99.99% of the packets, whle packet loss should be less than 0-4. The PMM s expected to carry a mxture of TCP and non-tcp traffc. These flows requre a mnmum bandwdth, whch must be delvered at a hgh probablty. Independently of the transport protocol, flows are expected to mplement some knd of congeston control mechansm and ther aggressveness should be smlar to the one of TCP, assumng that they are roughly TCP-frendly [9]. Ths S s supposed to serve adaptve applcatons (TCP), lke lowqualty vdeo, streamng multmeda applcatons or fle transfer (FTP). By nature, these flows are usually responsve, greedy and reflected to long-lved connectons. They requre throughput guarantees, whch are translated nto low packet loss for n-profle packets (P loss 0-3 ), whle there are no QoS guarantees for out-ofprofle packets.

3 PMC s targetng to non-greedy adaptve applcatons that have great senstvty concernng packet loss. It s thus sutable for transacton-orented applcatons and nteractve applcatons such as onlne games and chat-lke applcatons. The man characterstcs are the non-greedness of the flow, the responsve nature (TCP), the low use of bandwdth and the short lfe of the connecton. As mentoned above, the most crtcal QoS parameter s the packet loss, so the most mportant requrement s very low packet loss for n-profle packets (P loss 0-6 ), whle no QoS guarantees are expected for outof-profle packets. evertheless, low queung delay s also desred, n order to retan the meanng of nteractveness. Fnally, packets belongng to the STD class receve no specal treatment n the network. III. TRAFFIC ADLIG The prevous secton ntroduced brefly the archtecture and the proposed network servces. Ths secton covers some detaled network servce aspects. A. TCLS Implementaton The mplementaton of the etwork Servces s realzed wth the use of some network s mechansms, whch are the Traffc Classes (TCLs). A TCL s defned as a composton of a set of admsson control rules, a set of traffc condtonng rules and a per-hop behavor (PB). In the proposed archtecture fve TCLs are ntroduced: TCL, TCL2, TCL3, TCL4 and TCL5 whch correspond to PCBR, PVBR, PMM, PMC and BE. Each TCL mantans a separate queue at the router output ports and allocates one or more DSCPs n order to enable dfferentaton of packets n the core network. A PB mplemented n the output port of a router s realzed n the network wth the use of schedulng and buffer management algorthms. The schedulng mechansm selected s a combnaton of the Prorty Queung () [0] and Weghted-Far Queung () [0], whch s called and s depcted n Fg. 3. A weght s assgned to each TCL, though a queue s dedcated for TCL-, whch has strct prorty over the other TCLs. The rest TCLs are scheduled wth the and each queue s managed by dfferent queung strategy (Drop-Tal, Random Early Detecton (RED), Weghted-RED (WRED) [, 2]). overcomes the lmtatons ntroduced by the, whch provdes absolute preferental treatment to hgh prorty traffc, whle the lowest prorty traffc (BE) s possble to experence starvaton. On the other hand, would not be able to guarantee the strct delay requrement for TCL and TCL2. Packet arrves Classfer TCL TCL 2 TCL 3 TCL 4 TCL 5 gh prorty Low prorty Packet departs Fg.3: Desgn of router output port The confguraton of the weghts determnes the sharng of each lnk resources among the dfferent traffc classes. In ths way the network operator expresses ts requrements on the network resources utlzaton and the maxmum amount of traffc for each TCL, whch s allowed to transt onto a lnk. The routers are confgured wth those weghts durng the start-up procedure. Those weghts are somehow statc, snce are not updated dynamcally. Accordng to the weghts, the AC rate lmts for all TCLs at the Ls are also set, whch wll be used by the AC algorthm. Moreover, specfc polcng actons are deployed to ensure that non-conformng data flows do not affect the QoS requrements for already actve data flows. Polcng at the network access pont s performed through a token bucket devce (r,b) [3]. A specfc traffc profle s determned for each S, whch best characterzes the data source. The traffc profle for TCL s descrbed n terms of a Sngle Token Bucket, whch polces the peak rate of the flows. Admsson control functons are also based on the peak rate of allocatons for TCL, snce those flows are usually of low bandwdth. The sngle token bucket (TB) operates as both meter and dropper. Snce TCL s characterzed wth strct QoS requrements, packet exceedng the declared profle should be dropped. The sngle token bucket s confgured wth token rate r equal to the Peak Rate (PR) of the flow, and bucket sze b equal to a multple x of the maxmum allowed packet sze (<256 Bytes), whch s called Bucket sze for PR, (BSP). The value of x les n the range of {,5}; a possble value could be x=, whle a larger value would allow a small amount of burstness. The traffc condtonng mechansm s realzed n the routers wth the use of the Commtted Access Rate (CAR) mechansm. Packets of TCL are enqueued n a sngle drop-tal queue. Peak rate allocaton s not approprate for TCL2, snce t s characterzed wth hgh bandwdth flows. Therefore, admsson control functon s based on both the peak and sustanable rate of the flows and a dual TB as meter and dropper s proposed. The frst token bucket s confgured wth r equal to the Sustaned Rate (SR) of the flow, and b equal to the Bucket Sze for SR n bytes (BSS). The second token bucket s confgured wth r equal to the PR of the flow and b equal to a multple x of the maxmum allowed packet sze (<500 Bytes), (BSP). The value of x s n the range of {,5}. The depth of the frst bucket defnes the burstness allowed for the sender s flow (BSS). A packet s marked as n-profle f there are enough tokens n the frst and second TB to accommodate t, otherwse t s dropped. The ntenton s to lmt the sender s traffc n order to be conformant to the profle of the frst TB (SR, BSS), whle the second TB (PR) allows an amount of burstness. Packets of TCL2 are also enqueued n a sngle drop-tal queue. A sngle TB as a meter and marker s proposed as the traffc condtonng mechansm for TCL3, whch polces the sustaned rate and s confgured wth r equal to the SR of the flow and b equal to BSS. Flows conformng to ths profle wll be marked as n-profle otherwse as out-of-profle. The bucket sze (BSS) should be very hgh to satsfy the bursty nature of TCP traffc and the maxmum allowed packet sze of flows could be set to 500bytes. Packets of TCL3 are enqueued n a sngle queue, whch s managed by WRED wth two sets of parameters (mnth, maxth, maxp). One set s for n-profle and the other for out-of-profle packets, as descrbed n [2]. Out-of profle packets are not dropped, but marked wth a dfferent DSCP. The traffc profle for TCL4 s specfed wth the use of a Dual Token Bucket, whch polces both the sustanable and peak rate of flows. The frst token bucket s confgured wth (SR of the flow, BSS), whle the second token bucket wth (PR of the flow, BSP). The parameter x for TCL4 has a fxed value n the range of {,5} and the maxmum allowed packet sze can be set to 500bytes. A packet

4 that requres fewer tokens than avalable n the frst and second TB s marked as n-profle, otherwse s marked as out-of-profle and forwarded nto the network. SR should be small n order to dsable greedy sources to transmt n-packets wth a hgh rate nto the network, whle BSS should be large enough to allow several backto-back packets to enter the network wthout beng marked as outof-profle. TCL4 occupes two DSCPs, one for n-profle and one for out-of-profle packets. WRED wth two sets of parameters s used n order to dscrmnate out-of-profle packets aganst n-profle packets. Fnally the TCL5 requres no qualty of servce guarantees and best effort packets are enqueued n a sngle queue. B. Admsson Control Functons Admsson Control (AC) plays a sgnfcant role n ensurng the requested qualty of servce to user traffc. It s manly responsble for lmtng the access to the network, so that the already admtted flows do not antcpate any deteroraton n ther qualty contract. Therefore, a bottleneck s prohbted to arse n the edge-lnk (.e. the lnk between a core network and the ngress or egress router) as well as n any of the nternal-lnks. The AC rate lmts may be changed dynamcally as a result of resource pool operatons. Settng the AC lmts s based on the target network utlzaton as well as the target performance of each etwork Servce. Although t s not the am of ths paper to analyze the AC procedures, the dfferentaton of AC functons among the proposed network servces s brefly dscussed. Admsson control s performed per flow and s based on the selected network servce and the traffc profle from the user n the reservaton request. Accordng to the network servce ndcated n the request, the (ngress or/and egress) module uses a specfc formula n each case, as shown below: PR Eff SR Eff + PR ρc for TCL TCL + Eff C for TCL2 TCL 2 + SR C for TCL3 TCL3 + Eff C for TCL4 TCL 4 TCL s descrbed n terms of a sngle TB, whch polces the peak rate. The AC functon therefore checks whether the PR of the flow (PR ) plus the sum of the PR of all admtted TCL flows do not overcome a threshold calculated by multplyng the capacty for TCL (C TCL ) by a parameter ρ, whch corresponds to the target utlzaton for TCL. The capacty of a TCL s the Resource Share for ths TCL n the L logcally assocated wth the. TCL2 s based on a dual TB, so the peak and sustanable rates, along wth the BSS are used for the calculaton of the effectve bandwdth for the flow and the already admtted TCL2 flows. The sum of these must be less than the capacty of TCL2 n the L (C TCL2 ), n order the flow to be accepted. The formula for the calculaton of the effectve bandwdth takes nto account the target packet loss rate and can be found n [4]. TCL3 s descrbed n terms of a sngle TB, whch polces the sustanable rate. The formula used n ths case s smlar to TCL, but the SR s used n the calculatons. Moreover, the parameter ρ s not used here. The fact that the AC algorthm s based on SR maxmzes the network utlzaton. Ths s adequate for TCL3 as t provdes only rough guarantees to the TCP-controlled flows that are supposed to be submtted n ths traffc class. A dual token bucket characterzes TCL4, so lke TCL2, the effectve bandwdth s calculated accordng to PR, SR and BSS, targetng at ths tme to a zero packet loss. The formula used for the calculaton of TCL4 s dfferent than that for TCL2 and can be found n [4]. IV. SIMULATIOS Ths secton presents some smulaton results llustratng the qualty of servce offered by TCL and TCL2. The test topology s conssted of 5 routers connected n a chan for achevng a relatvely large number of hops. The lnks are of hgh capacty (44Mbps), except from the access lnk, between the edge router, where the sources are connected, and the frst core router, whch compromses the bottleneck wth a low capacty of 2Mbps. The Opnet 7.0 smulaton tool s used for the smulatons. The topology s used for studyng the performance of the dfferent etwork Servces, under dfferent traffc loads and under dfferent schedulng algorthms;,, and. The performance s based on measurements such as the one-way average delay and the packet loss. A. Results for TCL TCL2 Each lnk capacty s dstrbuted among the traffc classes, whch s determned by the assgned weghts. For TCL a relatvely small share of each lnk s recommended, whch s restrcted to 3% of the bottleneck lnk, determnng that the maxmum allowed traffc for TCL s 260Kbps. TCL2 reserves the 20% of the lnk capacty, whle the rest (67%) s reserved by TCL5. In the smulatons, voce flows wth bandwdth of 64Kbps are used for TCL. Each packet sze s 28bytes, ncludng the relatve protocol headers. Furthermore, the buffers for TCL n the routers were set to 0 packets to guarantee low packet delay requrements. Vdeo flows for TCL2 use an exponental nterarrval dstrbuton wth mean tme 0.039sec, and constant packet sze of 52bytes determnng an average bandwdth of 05Kbps. Fnally best effort flows for TCL5 are modeled wth an exponental nterarrval model, wth mean tme of 0.07sec and constant packet szes of 500bytes, where the average bandwdth of each flow s 7Kbps. The traffc load of TCL5 vares from a number of 4 admtted flows to a number of admtted flows (684Kbps-88Kbps), therefore utlzng ts assgned bandwdth from 50% - 40%. When 8 BE flows are transmtted, then TCL5 s consdered to occupy all of ts reserved bandwdth, whle when more than 8 flows are transmtted, then the bottleneck lnk s consdered congested. When flows of BE are transmtted, then TCL5 s consdered to occupy 40% of ts assgned bandwdth, therefore transmttng 540 Kbps addtonally. We assume a 74% utlzaton of the reserved bandwdth for TCL, n order to guarantee ts strct delay and packet loss requrements. For TCL2, 80% of the reserved bandwdth s utlzed, provdng TCL2 wth ts QoS requrements. The CAR s confgured for both TCL and TCL2, as depcted n TABLE I, n order to polce the admtted traffc, and drop packets n case they exceed the predefned profle.

5 TABLE I CAR Profle Confguraton CAR profles TCL (Sngle Token Bucket) PR = 92Kbps, BSP = 28bytes PR=340Kbps, BSP=024bytes, TCL2 (Dual Token Bucket) SR=35Kbps, BSS=520bytes The characterstcs of the one-way average delay as a functon of the packet sze for TCL s gven n Fg.4. In ths case TCL2 s consdered to occupy 80% of ts reserved bandwdth, whle four flows of the best effort traffc are transmtted. The maxmum observed delay was 05msec, whch s acceptable for voce traffc. One-way average delay (msec) One-way average delay (msec) 05 04, , , Packet Sze (bytes) Fg. 4: One-way average delay of TCL vs. packet sze BE traffc load (number of flows) Fg.5: One-way average delay of TCL vs. dfferent TCL5 (BE) traffc load and dfferent schedulng algorthms One-way average delay (msec) BE traffc load (number of flows) Fg. 6: One-way average delay of TCL2 vs. dfferent TCL5 (BE) traffc load and dfferent schedulng algorthms The delay for TCL and TCL2 under dfferent traffc load of TCL5 and under dfferent schedulng algorthms s depcted n Fg. 5 and Fg. 6 respectvely. In these fgures, the delay usng the schedulng algorthm gets a hgh value (24.4 msec for TCL and 23.9 msec for TCL2) when havng BE flows, and therefore due to lack of space s omtted. guarantees for both voce and vdeo traffc an accepted delay, whch s qute lower than the maxmum delay determned for each S. Voce experences a maxmum delay of 08msec under a heavy load of TCL5, whle t can tolerate up to 50msec. Vdeo experences a maxmum delay of 09msec, whch s an acceptable value comparng to the maxmum value of 250msec. We have to stress here that also acheves a lower than the maxmum value of end-to-end delay for TCL2 (23.9 msec), but ths s accomplshed wth an unacceptable packet loss rate, as more than 20% of TCL2 packets are dropped under (Fg. 8). TCL and TCL2 experence under better performance than under. Ths can be justfed from the fact that n a queue s dedcated for TCL, whch has strct prorty over the rest TCLs, whle TCL2 acheves better utlzaton of ts assgned bandwdth. provdes the best delay guarantee to TCL, whle degrades the performance of TCL2 and may drve TCL5 to starvaton. The packet loss for TCL and TCL2 s depcted n Fg.7 and Fg.8 respectvely. The smulatons assume the maxmum allowed traffc for TCL and TCL2, and flows of BE traffc (congested network). Under, all TCLs experence packet loss only when flows of BE traffc are transmtted, whle under and only the best effort traffc experences packets drops. provdes the worst performance as depcted n Fg.7 and Fg.8. % packet loss % packet loss tme (sec) Fg. 7: Packet loss for TCL under flows of BE tme (sec) Fg. 8: Packet loss for TCL2 under flows of BE

6 As far as the BE traffc s concerned, t experences packet dscards under all schedulng algorthms, whle t receves the best performance under. Ths s caused by the fact that under all traffc flows experence the same behavor and no prortzaton to any TCL s gven. Therefore, the excess load of TCL5 traffc storms the bottleneck lnk, nducng greater packet dscards to both TCL and TCL2. B. Impact of TCL on TCL2 The mpact of TCL traffc on TCL2 s llustrated on Fg. 9, showng the end-to-end delay for both TCL and TCL2 usng the schedulng algorthm and havng 8 BE flows. End-to-end delay (msec) TCL load (kbps) TCL TCL2 Fg. 9: End-to-end delay for TCL&2 vs. dfferent TCL load It s observed that ncreasng the load of TCL above the admsson lmt (92Kbps) ncreases the end-to-end delay for TCL2, whch reaches a value of 3,88msec. Lkewse, the end-to-end delay of TCL s also ncreased, but n a small grade. Ths s due to the fact that for TCL a prorty queue s dedcated provdng to t strct prorty over the other TCLs. evertheless, the end-to-end delay of TCL2 does not ncrease dramatcally, snce t utlzes ts unused assgned bandwdth. V. COCLUSIOS The work presented n ths paper dealt wth the defnton and deployment of a set of etwork Servces wthn a DffServ-enabled core network archtecture. The etwork Servces, whch are mplemented n the network wth the traffc handlng mechansms offered by respectve Traffc Classes, target at dfferent knds of user traffc that exhbt smlar QoS requrements and characterstcs, and they therefore demand analogous treatment wthn the network. We propose fve etwork Servces that can accommodate most of the well-known applcaton traffc usually submtted n a network. We descrbed a specfc mplementaton for all etwork Servces n the context of the Resource Control Layer archtecture. Subsequently, smulaton results proved that the proposed traffc handlng mechansms are adequate for two of the etwork Servces, the PCBR and PVBR. Future work s ntended for the other two etwork Servces (PMM and PMC), n order to show that the man requrements for these servces are also fulflled. REFERECES [] R. Braden, D. Clark and S. Shenker, Integrated Servces n the Internet Archtecture: an Overvew, RFC 633 [2] R. Braden, L. Zhang, S. Berson, S. erzog and S. Jamn, Resource ReSerVaton Protocol (RSVP), RFC 2205 [3] S. Blake, D. Black, M. Carlson, E. Daves, Z. Wang and W. Wess, An Archtecture for Dfferentated Servces, RFC 2475 [4] K. chols, V. Jacobson and L. Zhang, A Two-bt Dfferentated Servces Archtecture for the Internet, RFC 2638 [5] V. Jacobson, K. chols and K.Podur, An Expedted Forwardng PB, RFC 2598 [6] J. enanen, F. Baker, W. Wess and J. Wroclawsk, Assured Forwardng PB Group, RFC 2597 [7] E. Gamma, R. elm, R. Johnson, J. Vlssds, Desgn Patterns Elements of Reusable Object-Orented Software, pp , Addson-Wesley, 995. [8] E. kolouzou, G. Polts, P. Sampatakos, I. Veners, An adaptve algorthm for resource management n a dfferentated servces network, ICC200, elsnk, Fnland, June 200. [9] M. Allman, V. Paxson, and W. Stevens, TCP Congeston Control, RFC 258 [0]M. Markak, E. kolouzou, I. Veners, "Performance Evaluaton of Schedulng Algorthms for the Internet", 8 th IFIP Conference on Performance Modelng and Evaluaton of ATM & IP etworks, Ilkley, June 2000 []V. Frou, M. Borden, A study of actve queue management congeston control, Infocom 2000, Tel- Avv, Israel, March [2]T. Zegler, C. Brandauer, S. Fdda, "A quanttatve model for parameter settng of RED wth TCP traffc", 9th Internatonal Workshop on Qualty of Servce, Karlsruhe, Germany, June 6-8, 200 [3]Y. Bernet, S. Blake, D. Grossman,A. Smth, An nformal management model for Dffserv routers, draftetf-dffserv-model-06.txt, February 200, exp. August 200 [4]Delverable D30, Specfcaton of traffc handlng for the frst tral, AQUILA project consortum, September 2000.

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Network Design and Appraisal

Network Design and Appraisal Qualty-of-Servce IP QoS archtectures Ulrch Fedler (fedler@tk.ee.ethz.ch) Introductory Example Applcaton: IP telephony wth fxed encodng bt rate Network delay s varable, packets may get lost Network qualty-of

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers

Modeling and Analysis of 2D Service Differentiation on e-commerce Servers Modelng and Analyss of D Servce Dfferentaton on e-commerce Servers Xaobo Zhou, Unversty of Colorado, Colorado Sprng, CO zbo@cs.uccs.edu Janbn We and Cheng-Zhong Xu Wayne State Unversty, Detrot, Mchgan

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

Theories and Models for Internet Quality of Service

Theories and Models for Internet Quality of Service 1 Proceedngs of the IEEE, May 2002 Theores and Models for Internet Qualty of Servce Vctor Frou, Jean-Yves Le Boudec, Don Towsley, and Zh-L Zhang Abstract We survey recent advances n theores and models

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

QoS in the Linux Operating System. Technical Report

QoS in the Linux Operating System. Technical Report Unverstät Karlsruhe (H) Insttut für elematk QoS n the Lnux Operatng System echncal Report Marc Bechler and Hartmut Rtter Insttut für elematk Fakultät für Informatk Unverstät Karlsruhe (H) E-Mal: [mbechler

More information

An Optimal Model for Priority based Service Scheduling Policy for Cloud Computing Environment

An Optimal Model for Priority based Service Scheduling Policy for Cloud Computing Environment An Optmal Model for Prorty based Servce Schedulng Polcy for Cloud Computng Envronment Dr. M. Dakshayn Dept. of ISE, BMS College of Engneerng, Bangalore, Inda. Dr. H. S. Guruprasad Dept. of ISE, BMS College

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Analysis of the Delay and Jitter of Voice Traffic Over the Internet

Analysis of the Delay and Jitter of Voice Traffic Over the Internet Analyss of the Delay and Jtter of Voce Traffc Over the Internet Mansour J. Karam, Fouad A. Tobag Abstract In the future, voce communcaton s expected to mgrate from the Publc Swtched Telephone Network (PSTN)

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Fair Intelligent Congestion Control Resource Discovery Protocol on TCP Based Network 1

Fair Intelligent Congestion Control Resource Discovery Protocol on TCP Based Network 1 Far Intellgent Congeston Control esource Dscovery Protocol on TCP Based Network 1 Doan B. Hoang 2, Qng Yu, Mng L, and Davd Dagan Feng Department of Computer Systems, Faculty of Informaton Technology, Unversty

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network) Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research kartk@cs.fsu.edu chueh@cs.sunysb.edu yjln@research.telcorda.com

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

A FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS

A FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS A FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS BY BADER S. AL-MANTHARI A thess submtted to the School of Computng n conformty wth the requrements for the degree of

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier. Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks

More information

An agent architecture for network support of distributed simulation systems

An agent architecture for network support of distributed simulation systems An agent archtecture for network support of dstrbuted smulaton systems Robert Smon, Mark Pullen and Woan Sun Chang Department of Computer Scence George Mason Unversty Farfax, VA, 22032 U.S.A. smon, mpullen,

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

FOURTH Generation (4G) Wireless Networks are developed

FOURTH Generation (4G) Wireless Networks are developed 2600 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010 Congeston-Based Prcng Resource Management n Broadband Wreless Networks Najah AbuAl, Mohammad Hayajneh, and Hossam Hassanen

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Self-Adaptive SLA-Driven Capacity Management for Internet Services

Self-Adaptive SLA-Driven Capacity Management for Internet Services Self-Adaptve SLA-Drven Capacty Management for Internet Servces Bruno Abrahao, Vrglo Almeda and Jussara Almeda Computer Scence Department Federal Unversty of Mnas Geras, Brazl Alex Zhang, Drk Beyer and

More information

A New Quality of Service Metric for Hard/Soft Real-Time Applications

A New Quality of Service Metric for Hard/Soft Real-Time Applications A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

A Hierarchical Reliability Model of Service-Based Software System

A Hierarchical Reliability Model of Service-Based Software System 2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and

More information

QoS-based Scheduling of Workflow Applications on Service Grids

QoS-based Scheduling of Workflow Applications on Service Grids QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Polling Cycle Time Analysis for Waited-based DBA in GPONs

Polling Cycle Time Analysis for Waited-based DBA in GPONs Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 03 Vol II, IMECS 03, March 3-5, 03, Hong Kong Pollng Cycle me Analyss for Wated-based DBA n GPOs I-Shyan Hwang, Jhong-Yue

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Session-Based Overload Control in QoS-Aware Web Servers

Session-Based Overload Control in QoS-Aware Web Servers Sesson-Based Overload Control n QoS-Aware Web Servers Huamn Chen and Prasant Mohapatra Abstract Wth the explosve use of Internet, contemporary web servers are susceptble to overloads and ther servces deterorate

More information

An Inter-Frame De-Jittering Scheme for Video Streaming over Mobile Communication Networks

An Inter-Frame De-Jittering Scheme for Video Streaming over Mobile Communication Networks An Inter-Frame De-Jtterng Scheme for Vdeo Streamng over Moble Communcaton Networks Tsang-Lng Sheu and Po-Wen Lee Department of Electrcal Engneerng Natonal Sun Yat-Sen Unversty Kaohsung, Tawan sheu@ee.nsysu.edu.tw

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information