How To Build A Wireless Mcd (Sdr) From Scratch With A Microsd (Sdy) And A Wireless Microsdy (Mcd) (Sdie) (For Microsdie And Awn) (Md)

Size: px
Start display at page:

Download "How To Build A Wireless Mcd (Sdr) From Scratch With A Microsd (Sdy) And A Wireless Microsdy (Mcd) (Sdie) (For Microsdie And Awn) (Md)"

Transcription

1 Colombo SDK simulating the innards of a wireless MAC Dinan Gunawardena, Božidar Radunović Microsoft Research, Cambridge, UK Abstract Colombo is a software development kit (SDK) that speeds up prototyping of a MAC design for software defined radios (SDR). An SDR MAC is typically developed and tested on a single SDR, and it is optimized to meet strict timing requirements and constraints on interaction with other layers (e.g. MAC running in kernel code). Once a MAC is deployed in a distributed environment, new types of bugs may surge due to complex interactions among devices, and with the wireless environment. These bugs can reflect on correctness or performance of the MAC and they are typically very hard to find. Limited debugging capabilities in a test-bed in the wild, and constantly changing environment further aggravate the problem. Colombo is designed to help a developer correct the bugs arising from these interactions. It takes an arbitrary SDR MAC code and runs it in Colombo simulation environment, where execution is reproducible and bugs are easy to find. The existing network simulators (such as ns-2 and Qualnet) are based on discrete-event simulation architecture and require a specific programming model for MAC code. SDR MAC code requires substantial modification to run on these simulators, which obfuscate the original problem. The key advantage of Colombo is that it virtualizes the SDR environment and it runs the existing SDR MAC code with minimal changes. All the bugs are discovered directly in the original code. By deploying Colombo in two of our research projects we have shorten the design cycle of each project by an order of magnitude. Colombo can also be used to test performance of the proposed MAC in a larger network. The core of Colombo is a continuous event simulator. The simulator is interfaced to a particular SDR architecture through a shim layer tailored for a specific SDR architecture. We have released a shim layer for SORA, and we have also built an internal shim layer for the Lyrtech SFF SDR. However, the architecture is easily extible to other SDR radios. Introduction Cross-layer wireless design has been traditionally evaluated using network simulators, such as (1), (2), (3). However, the PHY models used in these simulators are simplified for performance reasons and they are not able to capture the complexity of the wireless medium. More complex wireless models take a long time to simulate and are unable to capture MAC and network layer effect that happen on larger time-scales. Furthermore, wireless hardware was almost impossible to modify and real-world verification of the simulated results was very difficult and expensive. These have been fundamental obstacles to a further advance in joint PHY and MAC design in an academic environment.

2 Recently developed, powerful and affordable software-defined radio (SDR) platforms (4), (5), (6), (7), (8) promise to overcome these issues. PHY and MAC prototyping in these environments is much faster and cheaper than building an entire system, including the analogue part, from scratch. The new methodology has spurred a renewed interest in this research area. However, developing for SDR still incurs complexity. Wireless radios need an extreme efficiency and basic MAC operations (such as ACK) are typically executed within microseconds. SDR architectures and programming models need to respect the tight delay guarantees. One possibility is to develop the entire radio design (PHY & MAC) in an FPGA (8). This approach gives very fast execution but the programming model is less intuitive. Another possibility is to implement the MAC layer in a procedural language (e.g. C) (4), (5), (6). This MAC code needs to be highly optimized for performance and often run as a kernel driver. It also needs to respect technical requirements of a potentially complex interaction with the underlying PHY layer, with its own timing guarantees. In either case, the programming model is very involving, and several research papers are focused entirely on how to build a PHY/MAC to satisfy different SDR architectural constraints (4), (8). Additional complexity is introduced in MAC design requirements. A typical MAC standard (e.g , LTE) consists of hundreds of pages of protocol description and its correctness has to be verified using formal methods (and an academic researcher typically does not have such resources available). Moreover, developing a novel MAC/PHY protocol may introduce a priori unknown correctness and performance issues that are artefacts of the protocol design. These issues are a usual part of any research process, and a repeated design, prototyping and testing process is a standard way to address them. To address the abovementioned complexities, researchers usually follow a process that contains two phases. Firstly, they implement a protocol in a network simulator to test the inted behaviour and performance. Then they implement it in an SDR to test the real-world issues. These two parts are completely separated. The network simulators (1), (2), (3) are event-driven simulators and have their own programming model, which includes call-backs that react to different events in the system. In principle, any simulator code could be ported to a SDR platform. In practice, this is unlikely to meet performance requirement. The code thus needs to be ported manually, and this process is prone to introduction of new bugs. A wireless network in the wild is a complex, unpredictable distributed system with very limited debugging support and most of the bugs are difficult to spot and correct. Colombo is a novel design paradigm for cross-layer protocol design which bridges the gap between prototyping for a network simulator and an SDR. Its goal is to enable a developer to evaluate a code written for an SDR platform directly in a simulator with minimal changes to the code. The main idea of Colombo is to simulate the existing code against a virtual PHY layer. The key component of Colombo is a continuous event simulator that runs each MAC at each node in separate thread(s) and virtualizes the environment for each thread. All calls to a virtual PHY layers are captured by the simulator and executed in a wireless simulation environment. A user can design the virtual PHY layer and the wireless simulation environment as suited his/her needs.

3 Colombo is flexible and can be adapted to most of the existing SDR platforms. It can be used with its own simple wireless simulator platform. Also, it can potentially be linked to existing network simulators (1), (2), (3) (although we have not implemented it). So far we have integrated and successfully used Colombo with Sora and Lyrtech platform (we release only the Sora port). Colombo was instrumental for fast prototyping of the MAC/PHY design presented in (9), (10), (11) and sped up the design cycle by an order of magnitude. In the following sections we describe the basic architecture of Colombo in more detail and we give some example. Colombo Architecture Colombo s architecture is illustrated in Figure 1. An existing MAC code, written for an SDR environment, is linked with a Colombo simulator through the Colombo environment shim. The shim overloads PHY and upper layer function calls and maps them to appropriate Colombo virtual PHY or environment code (either by linking or through pre-processor directives). The Colombo simulator executes each of the PHY or environment calls and returns the value to the MAC through the environment shim. The MAC layer has no knowledge whether it runs in a simulator or in a real world environment. MAC (Node 1) MAC (Node 2) simulation simulation real world Colombo environ. shim Colombo environ. shim SDR PHY Colombo simulator Wireless environment Colombo wireless Network simulator Figure 1: Architecture of Colombo SDK The goal of the simulator is to simulate an entire network. A configuration file is used to configure the network parameters (such as the positions of the nodes, which MACs to use, similar to classical network simulators). Each node is assigned a separate instance of a MAC with a context block and runs in a separate thread. If an SDR MAC implementation consists of several threads (such as the SORA multi-threaded code), then each MAC thread will be run separately, and they will share the parent node s context block. A MAC instance interacts with a simulator through a Colombo environment shim layer. The simulator uses a wireless channel simulator to calculate the outcomes of different wireless interactions. The wireless channel simulator could potentially be replaced with a standard network simulator (this has not been implemented so far).

4 Node 1 Colombo simulator For i = 1:N Init MAC(i); Susp MAC(i); Main loop: Resume all threads; Wait for sync point from all threads; Process new PHY events; Call traffic generators and sinks; Increase simulator time by ε; Resume all threads; Kill Threads; Main TX loop: ObtainNetworkPacket; Wait until not SenseCarrier(); TransmitPacket; time = GetTime(); while (GetTime() < time + SIFS) if (SenseCarrier()) ReceivePacket(); if (PktCorrect() and PktAck()) pkttx = true; else pkttx = false; loop; pkttx = false; Node 2 Main RX loop: Wait until SenseCarrier(); ReceivePacket; if PacketCorrect() s ACK; DeliverNetworkPacket; Figure 2: An example of a simple CSMA-type of MAC Colombo is a continuous event simulator. We illustrate its main ideas through a simple example in Figure 2. The simulator starts by initializing and susping all the threads, and then runs the main loop. At the beginning of each loop all MAC threads are susped. The simulator resumes all threads and waits until all threads are susped again. Each thread runs its own MAC code. Whenever the code calls an external method (a PHY call, a call to a traffic generator or a sink), a corresponding shim method is called. The shim method performs all the required interaction with the virtual environment (e.g. transmitting a packet requires transferring an array of bytes to the virtual PHY in the Colombo wireless simulator), and then susps the thread. Shim methods are written in bold in Figure 2, and these are the function calls that susp threads. Once all threads are susped, the simulator the wireless channel simulator to evaluate the outcome of the wireless and other events (if any), increases the virtual (simulation) time by a small constant number ε, and resumes the threads. The main intuition behind the design is as follows (we do not prove correctness in this document). Firstly, only calls to external environment can be affected by simulation time. Hence, it does not matter how much code we execute between two external calls. Secondly, if a code executes correctly for some ε, it will also execute correctly for any ε < ε. The only issue is if ε is too large, then a complex operation that requires several external calls might execute in more time than required. As a rule of a thumb, we choose ε an order of magnitude smaller than the smallest MAC timing requirement. Thirdly, we assume only a single external call is an atomic operation and the sequences of external calls at different nodes executed in parallel are arbitrary. This is exactly what happens in reality a node can only rely on external readings to estimate what other nodes states are and a

5 MAC design has to deal with it anyway. Similarly, if a MAC implementation is multi-threaded, any synchronization among multiple threads of the same MAC has to be explicitly implemented in the MAC code. Colombo simulator interprets these synchronization primitives in the same way they are executed on a CPU. Figure 2 gives a simple example of a network with two nodes. Node 1 is only transmitting packets, and only when the medium is idle. Node 2 is only receiving packets. Calls in bold are external calls that susp nodes threads. After transmitting a packet, node 1 spin-waits for SIFS amount of time or until it receives an ACK. In a discrete event simulation this loop needs to be unrolled, several event call-backs have to be added (receive ACK, ACK timeout) and processed separately. This is clearly not an efficient code implementation able to guarantee 9us SIFS time. Instead, we virtualize the environment in Colombo and execute the virtually unchanged MAC code. Discussion One interesting question is what the limitations of the Colombo SDK are. So far, we have found one class of examples of MAC code that does not work in Colombo. In this class, a MAC codes makes an implicit assumption on the speed of execution. For example, instead of checking the actual time in the spin-wait example in Figure 2, once can execute a loop a certain number of times, assuming that corresponds to the SIFS time-out. However, this is easy to fix by adding an explicit thread sleep request to the loop, or rewriting the loop to rely on external reading of the time. Further, one might argue that this class of MAC code is highly brittle to changes in the performance of the underlying CPU/clock-speed. Another interesting question is if a continuous simulator is efficient enough for large-scale simulations. In our experience it is efficient, and we managed to simulate networks with tens of nodes for tens of seconds of virtual time in a very reasonable time. However, it is possible to further optimize the Colombo scheduler. One could augment an existing MAC code to allow for predicting duration of time between different external call. This prediction could be used to adaptively set ε for each loop. However, our goal was to minimize the changes to the MAC code, and we have not further experimented with these ideas. Finally, Colombo simulation environment has only basic functionality. Channel and PHY models are simple, and the upper layers are only basic (currently we only support CBR traffic). Thus, the simulation results are of limited use. To circumvent this problem, it may be interesting to integrate Colombo with some of the well-known and more detailed network simulator, such as ns-2 or Qualnet. A simple way to do it would be to write a shim towards a discrete event simulator that would forward the events from the discrete to the continuous time simulators and vice versa. We have not experimented with this feature so far.

6 SORA port example We have implemented and tested Colombo on Lyrtech (6) and Sora (4) SDR platforms. For various licencing reasons we only release the Sora port of Colombo. We tested the Sora port of Colombo on the example Sora MAC that comes with the standard Sora distribution. We have changed very few lines of code in the MAC implementation. We have modified the include files to call the shim components instead of the hardware calls. The diagram in Figure 3 shows the new shim components that are added (pink) to interface the SORA code (blue) with the Colombo platform (green). For example, we have implemented 10 methods in the PHY layer shim to include all the functionality required by the Sora MAC. For more details, see the additional documents on the Sora port. Figure 3: Architecture of Sora port of Colombo In general, porting Sora code to Colombo one has to keep in mind 3 rules, which require no or minimal changes to the existing code: Clean decoupled Transport/MAC/PHY implementation: Ensure that all cross MAC/PHY Transport/MAC calls can be virtualised using the Colombo calls. One example of an incompatible design in the sample code is in the LatencyCheck() function, which directly accesses PHY parameters (such as Freq.QuadPart and RateMap[Rate]) instead of using methods that could be virtualized. Define a context block for your MAC: Each instance of a MAC is executed in a separate thread, so local variables for each instance have to be defined separately. Define a context block for your MAC, encapsulate any local variables related to an instance of the MAC and add a pointer to the Colombo MAC context block and vice versa (so that the simulator can access the Colombo block in virtualised calls). Note that this modification does not change the MAC code, only the way one references the variables. Do not spin wait in the MAC: Do not assume a spin wait will take a deterministic length of time in the simulation. Always wait for a fixed duration of time or for an external event.

7 Bibliography 1. The ns-3 network simulator. [Online] 2. Scalable Network Technologies. Qualnet. [Online] 3. Glomosim. [Online] 4. Microsoft Research. SORA. [Online] 5. Rice University. WARP. [Online] 6. Lyrtech. SFF SDR. [Online] 7. Ettus Research. USRP. [Online] 8. Airblue: A System for Cross-Layer Wireless Protocol Development. Man Cheuk (Alfred) Ng, Kermin Elliott Fleming, Mythili Vutukuru, Samuel Gross, Arvind, Hari Balakrishnan ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS). 9. Efficient and Fair MAC for Wireless Networks with Self-interference Cancellation. Nikhil Singh, Dinan Gunawardena, Alexandre Proutiere, Bozidar Radunovic, Horia Vlad Balan, Peter Key WiOpt. 10. Bozidar Radunovic, Alexandre Proutiere, Dinan Gunawardena, Peter Key. Exploiting Channel Diversity in White Spaces. s.l. : MSR-TR , Bozidar Radunovic, Ranveer Chandra, and Dinan Gunawardena. Adaptive Preambles for Coexistence. s.l. : MSR-TR , 2011.

WiFi-Nano: Reclaiming WiFi Efficiency through 800 ns Slots

WiFi-Nano: Reclaiming WiFi Efficiency through 800 ns Slots WiFi-Nano: Reclaiming WiFi Efficiency through 800 ns Slots Eugenio Magistretti Krishna Kant Chintalapudi * Božidar Radunović # Ramachandran Ramjee * Rice University * Microsoft Research India # Microsoft

More information

Horizon: Balancing TCP over multiple paths in wireless mesh networks

Horizon: Balancing TCP over multiple paths in wireless mesh networks Horizon: Balancing TCP over multiple paths in wireless mesh networks Bozidar Radunovic, Christos Gkantsidis, Dinan Gunawardena, Peter Key Microsoft Research Cambridge, UK Wireless Mesh Networks Goals 1.

More information

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM

APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM 152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented

More information

WiFi-Nano : Reclaiming WiFi Efficiency through 800 ns slots

WiFi-Nano : Reclaiming WiFi Efficiency through 800 ns slots WiFi-Nano : Reclaiming WiFi Efficiency through 800 ns slots Eugenio Magistretti Rice University Texas, USA emagistretti@rice.edu Krishna Kant Chintalapudi Microsoft Research India Bangalore, India krchinta@microsoft.com

More information

How To Analyze The Security On An Ipa Wireless Sensor Network

How To Analyze The Security On An Ipa Wireless Sensor Network Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information

http://d-nb.info/1041302002

http://d-nb.info/1041302002 Contents 1 Introduction 1 1.1 Requirements for Evaluation Techniques 1 1.2 Performance Evaluation Techniques 2 1.2.1 Network Testbeds / Real-World Measurements 2 1.2.2 Network Simulators 3 1.2.3 Analytic

More information

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks

A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks A Neighborhood Awareness Method for Handoff Assistance in 802.11 Wireless Networks Gurpal Singh *, Ajay Pal Singh Atwal ** and B.S. Sohi *** * Deptt of CSE & IT, BBSBEC, Fatehgarh Sahib, Punjab, India,

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September

ISSN: 2319-5967 ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 5, September Analysis and Implementation of IEEE 802.11 MAC Protocol for Wireless Sensor Networks Urmila A. Patil, Smita V. Modi, Suma B.J. Associate Professor, Student, Student Abstract: Energy Consumption in Wireless

More information

8 Conclusion and Future Work

8 Conclusion and Future Work 8 Conclusion and Future Work This chapter concludes this thesis and provides an outlook on future work in the area of mobile ad hoc networks and peer-to-peer overlay networks 8.1 Conclusion Due to the

More information

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification

Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

CHAPTER 7 SUMMARY AND CONCLUSION

CHAPTER 7 SUMMARY AND CONCLUSION 179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel

More information

Wireless ATA: A New Data Transport Protocol for Wireless Storage

Wireless ATA: A New Data Transport Protocol for Wireless Storage Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr

More information

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks

PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

Mission-Critical Java. An Oracle White Paper Updated October 2008

Mission-Critical Java. An Oracle White Paper Updated October 2008 Mission-Critical Java An Oracle White Paper Updated October 2008 Mission-Critical Java The Oracle JRockit family of products is a comprehensive portfolio of Java runtime solutions that leverages the base

More information

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS

AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS AN IMPROVED SNOOP FOR TCP RENO AND TCP SACK IN WIRED-CUM- WIRELESS NETWORKS Srikanth Tiyyagura Department of Computer Science and Engineering JNTUA College of Engg., pulivendula, Andhra Pradesh, India.

More information

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description

APPLICATION NOTE. AVR2130: Lightweight Mesh Developer Guide. Atmel MCU Wireless. Features. Description APPLICATION NOTE AVR2130: Lightweight Mesh Developer Guide Atmel MCU Wireless Features Atmel Lightweight Mesh stack specification and APIs Lightweight Mesh Software Development Kit (SDK) Description This

More information

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS

LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS LOAD BALANCING AND EFFICIENT CLUSTERING FOR IMPROVING NETWORK PERFORMANCE IN AD-HOC NETWORKS Saranya.S 1, Menakambal.S 2 1 M.E., Embedded System Technologies, Nandha Engineering College (Autonomous), (India)

More information

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks

A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks 1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity

More information

PIRR: a Methodology for Distributed Network Management in Mobile Networks

PIRR: a Methodology for Distributed Network Management in Mobile Networks PIRR: a Methodology for Distributed Network Management in Mobile Networks FILIPPO NERI University of Piemonte Orientale Department of Science via Bellini 25/g, 13900 Alessandria ITALY filipponeri@yahoo.com

More information

Research Report: The Arista 7124FX Switch as a High Performance Trade Execution Platform

Research Report: The Arista 7124FX Switch as a High Performance Trade Execution Platform Research Report: The Arista 7124FX Switch as a High Performance Trade Execution Platform Abstract: Many groups are working on reducing trading execution latency - the time from a critical Ethernet frame

More information

IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification

IEEE 802.16 Broadband Wireless Access Working Group. ATM Based MAC Layer Proposal for the 802.16 Air Interface Specification Project Title Date Submitted Source Re: Abstract Purpose Notice Release IEEE Patent Policy IEEE 802.16 Broadband Wireless Access Working Group ATM Based MAC Layer Proposal for the 802.16 Air Interface

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer

More information

Technical Bulletin. Arista LANZ Overview. Overview

Technical Bulletin. Arista LANZ Overview. Overview Technical Bulletin Arista LANZ Overview Overview Highlights: LANZ provides unparalleled visibility into congestion hotspots LANZ time stamping provides for precision historical trending for congestion

More information

ATV Data Link Simulator: A Development based on a CCSDS Layers Framework

ATV Data Link Simulator: A Development based on a CCSDS Layers Framework SpaceOps 2010 ConferenceDelivering on the DreamHosted by NASA Mars 25-30 April 2010, Huntsville, Alabama AIAA 2010-2089 ATV Data Link Simulator: A Development based on a CCSDS

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

An Easier Way for Cross-Platform Data Acquisition Application Development

An Easier Way for Cross-Platform Data Acquisition Application Development An Easier Way for Cross-Platform Data Acquisition Application Development For industrial automation and measurement system developers, software technology continues making rapid progress. Software engineers

More information

Operatin g Systems: Internals and Design Principle s. Chapter 10 Multiprocessor and Real-Time Scheduling Seventh Edition By William Stallings

Operatin g Systems: Internals and Design Principle s. Chapter 10 Multiprocessor and Real-Time Scheduling Seventh Edition By William Stallings Operatin g Systems: Internals and Design Principle s Chapter 10 Multiprocessor and Real-Time Scheduling Seventh Edition By William Stallings Operating Systems: Internals and Design Principles Bear in mind,

More information

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

A NOVEL RESOURCE EFFICIENT DMMS APPROACH A NOVEL RESOURCE EFFICIENT DMMS APPROACH FOR NETWORK MONITORING AND CONTROLLING FUNCTIONS Golam R. Khan 1, Sharmistha Khan 2, Dhadesugoor R. Vaman 3, and Suxia Cui 4 Department of Electrical and Computer

More information

Virtual Platforms Addressing challenges in telecom product development

Virtual Platforms Addressing challenges in telecom product development white paper Virtual Platforms Addressing challenges in telecom product development This page is intentionally left blank. EXECUTIVE SUMMARY Telecom Equipment Manufacturers (TEMs) are currently facing numerous

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

Implementation of a Cooperative MAC protocol using a Software Defined Radio Platform

Implementation of a Cooperative MAC protocol using a Software Defined Radio Platform Implementation of a Cooperative MAC protocol using a Software Defined Radio Platform Ankit Sharma,VikasGelara, Shashi Raj Singh, Thanasis Korakis,PeiLiu, Shivendra Panwar Department of Electrical and Computer

More information

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com Best Practises for LabVIEW FPGA Design Flow 1 Agenda Overall Application Design Flow Host, Real-Time and FPGA LabVIEW FPGA Architecture Development FPGA Design Flow Common FPGA Architectures Testing and

More information

Datasheet iscsi Protocol

Datasheet iscsi Protocol Protocol with DCB PROTOCOL PACKAGE Industry s premiere validation system for SAN technologies Overview Load DynamiX offers SCSI over TCP/IP transport () support to its existing powerful suite of file,

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Dell One Identity Manager Scalability and Performance

Dell One Identity Manager Scalability and Performance Dell One Identity Manager Scalability and Performance Scale up and out to ensure simple, effective governance for users. Abstract For years, organizations have had to be able to support user communities

More information

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh

Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh Express Forwarding : A Distributed QoS MAC Protocol for Wireless Mesh, Ph.D. benveniste@ieee.org Mesh 2008, Cap Esterel, France 1 Abstract Abundant hidden node collisions and correlated channel access

More information

Supporting VoIP in IEEE802.11 Distributed WLANs

Supporting VoIP in IEEE802.11 Distributed WLANs Supporting VoIP in IEEE802.11 Distributed WLANs Zuo Liu Supervisor: Dr. Nick Filer July 2012 1 Voice VoIP Applications Constant Streaming Traffic Packetize interval usually 10-30 ms 8 160 bytes each packet

More information

Stream Processing on GPUs Using Distributed Multimedia Middleware

Stream Processing on GPUs Using Distributed Multimedia Middleware Stream Processing on GPUs Using Distributed Multimedia Middleware Michael Repplinger 1,2, and Philipp Slusallek 1,2 1 Computer Graphics Lab, Saarland University, Saarbrücken, Germany 2 German Research

More information

An Implementation Of Multiprocessor Linux

An Implementation Of Multiprocessor Linux An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than

More information

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY

A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA ssharma5@ncsu.edu Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Copyright www.agileload.com 1

Copyright www.agileload.com 1 Copyright www.agileload.com 1 INTRODUCTION Performance testing is a complex activity where dozens of factors contribute to its success and effective usage of all those factors is necessary to get the accurate

More information

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation

Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Enhanced Power Saving for IEEE 802.11 WLAN with Dynamic Slot Allocation Changsu Suh, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication, Ajou University, Republic of Korea

More information

How To Determine The Capacity Of An 802.11B Network

How To Determine The Capacity Of An 802.11B Network Capacity of an IEEE 802.11b Wireless LAN supporting VoIP To appear in Proc. IEEE Int. Conference on Communications (ICC) 2004 David P. Hole and Fouad A. Tobagi Dept. of Electrical Engineering, Stanford

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

Principles of Software Engineering: Software Methodologies. COSI 120b, Spring 2005

Principles of Software Engineering: Software Methodologies. COSI 120b, Spring 2005 Principles of Software Engineering: Software Methodologies COSI 120b, Spring 2005 Overview What are methodologies? The methodologies Traditional Incremental Evolutionary Other Conclusions Way Forward What

More information

EXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR

EXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR EXPERIENCES PARALLELIZING A COMMERCIAL NETWORK SIMULATOR Hao Wu Richard M. Fujimoto George Riley College Of Computing Georgia Institute of Technology Atlanta, GA 30332-0280 {wh, fujimoto, riley}@cc.gatech.edu

More information

Optimising a PROFINET IRT Architecture for Maximisation of Non Real Time Traffic

Optimising a PROFINET IRT Architecture for Maximisation of Non Real Time Traffic Optimising a PROFINET IRT Architecture for Maximisation of Non Real Time Traffic Itin, Lukas. Doran, Hans Dermot. Institute of Embedded Systems, ZHAW Technikum Strasse 9 8401 Winterthur itin@zhaw.ch donn@zhaw.ch

More information

Experimental Evaluation of Distributed Middleware with a Virtualized Java Environment

Experimental Evaluation of Distributed Middleware with a Virtualized Java Environment Experimental Evaluation of Distributed Middleware with a Virtualized Java Environment Nuno A. Carvalho, João Bordalo, Filipe Campos and José Pereira HASLab / INESC TEC Universidade do Minho MW4SOC 11 December

More information

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology

The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology 3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of

More information

Understanding the Impact of Encryption on Certified Wireless USB Testing. Introduction. Association vs. Security

Understanding the Impact of Encryption on Certified Wireless USB Testing. Introduction. Association vs. Security on Certified Wireless USB Testing Mike Micheletti Wireless USB Product Manager LeCroy Protocol Solutions Group Introduction Certified Wireless USB (WUSB) is a new shortrange, high-bandwidth wireless extension

More information

Communication Protocol

Communication Protocol Analysis of the NXT Bluetooth Communication Protocol By Sivan Toledo September 2006 The NXT supports Bluetooth communication between a program running on the NXT and a program running on some other Bluetooth

More information

Designing a Home Alarm using the UML. And implementing it using C++ and VxWorks

Designing a Home Alarm using the UML. And implementing it using C++ and VxWorks Designing a Home Alarm using the UML And implementing it using C++ and VxWorks M.W.Richardson I-Logix UK Ltd. markr@ilogix.com This article describes how a simple home alarm can be designed using the UML

More information

Virtual Private Systems for FreeBSD

Virtual Private Systems for FreeBSD Virtual Private Systems for FreeBSD Klaus P. Ohrhallinger 06. June 2010 Abstract Virtual Private Systems for FreeBSD (VPS) is a novel virtualization implementation which is based on the operating system

More information

Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Real-Time Systems Prof. Dr. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 26 Real - Time POSIX. (Contd.) Ok Good morning, so let us get

More information

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS

International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012. Green WSUS International Journal of Applied Science and Technology Vol. 2 No. 3; March 2012 Abstract 112 Green WSUS Seifedine Kadry, Chibli Joumaa American University of the Middle East Kuwait The new era of information

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

Energy Constrained Resource Scheduling for Cloud Environment

Energy Constrained Resource Scheduling for Cloud Environment Energy Constrained Resource Scheduling for Cloud Environment 1 R.Selvi, 2 S.Russia, 3 V.K.Anitha 1 2 nd Year M.E.(Software Engineering), 2 Assistant Professor Department of IT KSR Institute for Engineering

More information

Linux Driver Devices. Why, When, Which, How?

Linux Driver Devices. Why, When, Which, How? Bertrand Mermet Sylvain Ract Linux Driver Devices. Why, When, Which, How? Since its creation in the early 1990 s Linux has been installed on millions of computers or embedded systems. These systems may

More information

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems

A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication

More information

Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB

Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer. Dr. Johan Kraft, Percepio AB Software Tracing of Embedded Linux Systems using LTTng and Tracealyzer Dr. Johan Kraft, Percepio AB Debugging embedded software can be a challenging, time-consuming and unpredictable factor in development

More information

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks

Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Routing in Multi-Channel Multi-Interface Ad Hoc Wireless Networks Technical Report, December 4 Pradeep Kyasanur Dept. of Computer Science, and Coordinated Science Laboratory, University of Illinois at

More information

Below is a diagram explaining the data packet and the timing related to the mouse clock while receiving a byte from the PS-2 mouse:

Below is a diagram explaining the data packet and the timing related to the mouse clock while receiving a byte from the PS-2 mouse: PS-2 Mouse: The Protocol: For out mini project we designed a serial port transmitter receiver, which uses the Baud rate protocol. The PS-2 port is similar to the serial port (performs the function of transmitting

More information

NXP Basestation Site Scanning proposal with AISG modems

NXP Basestation Site Scanning proposal with AISG modems NXP Basestation Site Scanning proposal with modems Advanced Systems White Paper by Jaijith Radhakrishnan There are a number of connectivity issues associated with cellular base stations that can increase

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Modular, Open-Source Software Transceiver for PHY/MAC Research

Modular, Open-Source Software Transceiver for PHY/MAC Research Modular, Open-Source Software Transceiver for PHY/MAC Research John Malsbury Ettus Research 1043 N Shoreline Blvd. (650)417-6019 john.malsbury@ettus.com Abstract The USRP (Universal Software Radio Peripheral)

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card

MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1

More information

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1 ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled

More information

Parallel Firewalls on General-Purpose Graphics Processing Units

Parallel Firewalls on General-Purpose Graphics Processing Units Parallel Firewalls on General-Purpose Graphics Processing Units Manoj Singh Gaur and Vijay Laxmi Kamal Chandra Reddy, Ankit Tharwani, Ch.Vamshi Krishna, Lakshminarayanan.V Department of Computer Engineering

More information

Windows Server 2008 R2 Hyper-V Live Migration

Windows Server 2008 R2 Hyper-V Live Migration Windows Server 2008 R2 Hyper-V Live Migration Table of Contents Overview of Windows Server 2008 R2 Hyper-V Features... 3 Dynamic VM storage... 3 Enhanced Processor Support... 3 Enhanced Networking Support...

More information

Prediction of DDoS Attack Scheme

Prediction of DDoS Attack Scheme Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and

More information

Scaling 10Gb/s Clustering at Wire-Speed

Scaling 10Gb/s Clustering at Wire-Speed Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS

DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS DESIGN AND DEVELOPMENT OF LOAD SHARING MULTIPATH ROUTING PROTCOL FOR MOBILE AD HOC NETWORKS K.V. Narayanaswamy 1, C.H. Subbarao 2 1 Professor, Head Division of TLL, MSRUAS, Bangalore, INDIA, 2 Associate

More information

IEEE 802.11 Ad Hoc Networks: Performance Measurements

IEEE 802.11 Ad Hoc Networks: Performance Measurements IEEE 8. Ad Hoc Networks: Performance Measurements G. Anastasi Dept. of Information Engineering University of Pisa Via Diotisalvi - 56 Pisa, Italy Email: g.anastasi@iet.unipi.it E. Borgia, M. Conti, E.

More information

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS

AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS AN ANALYSIS OF DELAY OF SMALL IP PACKETS IN CELLULAR DATA NETWORKS Hubert GRAJA, Philip PERRY and John MURPHY Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE 802.11 Ad-Hoc Wireless Networks

SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE 802.11 Ad-Hoc Wireless Networks SSCH: Slotted Seeded Channel Hopping for Capacity Improvement in IEEE.11 Ad-Hoc Wireless Networks Paramvir Bahl Microsoft Research One Microsoft Way Redmond, WA 95 bahl@microsoft.com Ranveer Chandra Department

More information

A Survey on Virtual Machine Security

A Survey on Virtual Machine Security A Survey on Virtual Machine Security Jenni Susan Reuben Helsinki University of Technology jreubens@cc.hut.fi Abstract Virtualization plays a major role in helping the organizations to reduce the operational

More information

HOW TO TEST 10 GIGABIT ETHERNET PERFORMANCE

HOW TO TEST 10 GIGABIT ETHERNET PERFORMANCE HOW TO TEST 10 GIGABIT ETHERNET PERFORMANCE March 2012 Rev. B 03/12 SPIRENT 1325 Borregas Avenue Sunnyvale, CA 94089 USA Email: Web: sales@spirent.com www.spirent.com AMERICAS 1-800-SPIRENT +1-818-676-2683

More information

Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008)

Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008) Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks (Priyantha, Kansal, Goraczko, Zhao, 2008) Dominique Im Obersteg Distributed Systems Seminar 2011, ETH Zurich

More information

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito. Introduction to Quality of Service Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ QoS Issues in Telecommunication Networks - 1 Quality of service

More information

Tomás P. de Miguel DIT-UPM. dit UPM

Tomás P. de Miguel DIT-UPM. dit UPM Tomás P. de Miguel DIT- 15 12 Internet Mobile Market Phone.com 15 12 in Millions 9 6 3 9 6 3 0 1996 1997 1998 1999 2000 2001 0 Wireless Internet E-mail subscribers 2 (January 2001) Mobility The ability

More information

Software Defined Networking What is it, how does it work, and what is it good for?

Software Defined Networking What is it, how does it work, and what is it good for? Software Defined Networking What is it, how does it work, and what is it good for? slides stolen from Jennifer Rexford, Nick McKeown, Michael Schapira, Scott Shenker, Teemu Koponen, Yotam Harchol and David

More information

Congestions and Control Mechanisms n Wired and Wireless Networks

Congestions and Control Mechanisms n Wired and Wireless Networks International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Congestions and Control Mechanisms n Wired and Wireless Networks MD Gulzar 1, B Mahender 2, Mr.B.Buchibabu 3 1 (Asst

More information

... neither PCF nor CA used in practice

... neither PCF nor CA used in practice IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination

More information

From Network Security To Content Filtering

From Network Security To Content Filtering Computer Fraud & Security, May 2007 page 1/10 From Network Security To Content Filtering Network security has evolved dramatically in the last few years not only for what concerns the tools at our disposals

More information

FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM) www.fntsoftware.com

FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM) www.fntsoftware.com FNT EXPERT PAPER AUTOR Oliver Lindner Head of Business Line DCIM FNT GmbH // From Cable to Service Data Center Infrastructure Management (DCIM) Data center infrastructure management (DCIM), as understood

More information