SystemC - NS-2 Co-simulation using HSN

Size: px
Start display at page:

Download "SystemC - NS-2 Co-simulation using HSN"

Transcription

1 Verona, 12/09/2005 SystemC - NS-2 Co-simulation using HSN Giovanni Perbellini 1 REQUIRED BACKGROUND 2 2 GOAL 2 3 WHAT IS SYSTEMC? 2 4 WHAT IS NS-2? 2 5 WHAT IS HSN? 3 6 HARDWARE-NETWORK COSIMULATION SYSTEMC-NS2 COSIMULATION INTERFACES NS SYSTEMC CASE STUDY (VOIP) SYSTEMC TRANSACTOR NS-2 TCL CODE EXECUTING THE HARDWARE-NETWORK COSIMULATION REFERENCES 11 1

2 1 Required Background Students interested in learning the cosimulation between SystemC and NS-2 are required to know the fundamentals of C/C++ language and basic concepts related to modeling and synthesizing digital systems. 2 Goal The goal of this lecture consists of describing the basic concepts related to the cosimulation between the SystemC language (to design an hardware device) and NS-2 simulator (to model a Network infrastructure). Students will learn to: design a SystemC VoIP device connected to the NS-2 Simulator; model a NS-2 UDP/IP Network connected to a SystemC design. 3 What is SystemC? SystemC is a C++ class library and a methodology that you can use to effectively create a cycle-accurate model of software algorithms, hardware architecture, and interfaces of your SoC (System On a Chip) and system-level designs. You can use SystemC and standard C++ development tools to create a system-level model, quickly simulate to validate and optimize the design, explore various algorithms, and provide the hardware and software development team with an executable specification of the system. An executable specification is essentially a C++ program that exhibits the same behavior as the system when executed. C or C++ are the language choice for software algorithm and interface specifications because they provide the control and data abstractions necessary to develop compact and efficient system descriptions. Most designers are familiar with these languages and the large number of development tools associated with them. The SystemC Class Library provides the necessary constructs to model system architecture including hardware timing, concurrency, and reactive behavior that are missing in standard C++. Adding these constructs to C would require proprietary extensions to the language, which is not an acceptable solution for the industry. The C++ object-oriented programming language provides the ability to extend the language through classes, without adding new syntactic constructs. SystemC provides these necessary classes and allows designers to continue to use the familiar C++ language and development tools. More Informations in [1] and [2]. 4 What is NS-2? NS (version 2) is an object-oriented, discrete event driven network simulator developed at UC Berkely written in C++ and OTcl (Tcl script language with Object-oriented extensions). It implements network protocols such as TCP and UPD, traffic source behavior such as FTP, Telnet, Web, CBR and VBR, router queue management mechanism such as Drop Tail, RED and CBQ, routing algorithms such as Dijkstra, and more. NS also implements multicasting and some of the MAC layer protocols for LAN simulations. More informations in [3] and [4]. 2

3 5 What is HSN? Modern embedded systems exhibit an increasingly large quantity of communication capabilities. The devices should be, often, casually accessible, mobile or embedded in the environment, sometimes in hostile conditions and connected to a network structure. The design of such a system involves two main aspects: the design of the system itself, in terms of hardware and software; and the design of the communication mechanism used by the system to communicate with other systems. The hardware part is usually designed by creating a model of the hardware components with a hardware description language such as SystemC. Having a model of the system, it is possible to simulate and verify it. Once the model is correct the real hardware can be synthesized starting from its description. In this way the so produced hardware will behave exactly in the same way of the model. If the system is a networked system, the interaction with other systems is an important factor to be considered during the design. In fact, the behavior of the device can vary in function of the traffic on the network, the network topology end so on. Therefore, when a network device is simulated it is important to simulate also the interaction with other devices, i.e. the network. The network can be usually modelled with the NS-2 Simulator. The use of a hardware-network co-simulation permits to merge the analysis of the behavior of the internal components of the system, and the external behavior when other systems communicate with the device under project. A more accurate documentation about this topic can be found in [5]. This kind of co-simulation leads to a more accurate design procedure, because the designer can handle a wider range of factors, not only the internal ones. Another important interaction, to be considered during the design of a system, is that between the hardware and the software. Usually a system is a set of ad-hoc devices and a CPU running an operating system and a set of applications. The software can be simulated by using an Instruction Set Simulator (ISS) which represents the CPU of the system, while the other ad-hoc devices can be modeled and simulated with SystemC. In this way, a hardware-software co-simulation can help the designer to exactly define the interaction between the running software and the hardware. More accurate information about this topic can be found in [6] and [7]. A more generic approach consists in a generic hardware-software-network (HSN) cosimulation. This kind of co-simulation handles all the main aspects of the design of a networked system. To learn more about this topics, refer to [8]. The HSN co-design tool allows to design a networked system without having to know how to set up all the necessary tools needed by the co-simulation. The following Sections describe the only cosimulation between SystemC and NS-2. 6 Hardware-Network cosimulation The hardware-network cosimulation included in HSN is based on the timing accurate integration of the system-level modeling language SystemC and the network simulation environment NS-2. More information in [5]. 3

4 6.1 SystemC-NS2 cosimulation interfaces The SystemC and NS-2 simulators provide the components to allow the timing accurate data exchange among them NS-2 From the NS-2 simulator side, a new Agent has been created to allow the data exchange with SystemC. This Agent, called ns_sc, implements a gateway between NS-2 and SystemC. The next line creates a ns_sc Agent (configured using the systemc keyword): set agent0 [new Agent/ns_sc 20 "systemc" 10] This line tells the NS-2 simulator to create a ns_sc Agent, named agent0, bound to: ns_in SystemC port at address 10; ns_out SystemC port at address 20. Next figure shows this idea: SystemC 10 sc_ns_transactor_tl3 20 ns_in ns_out NS-2 agent0 (ns_sc) SystemC From the SystemC side, the new ports ns_in and ns_out have been added to allow the user to send/receive a packet to/from a NS-2 object. They are derived by the template classes sc_in and sc_out, they are of a generic type and they are managed by two methods read() and and write(), which are an extension of the standard methods managing sc_in and sc_out ports. A SystemC process with a bidirectional communication with NS- 2 is simply defined as follows: SC MODULE(m) { ns_in *in_port = new ns_in(10); // port to receive a packet from NS-2 ns_out *out_port = new ns_out(20); // port to send a packet to NS-2... // standard ports to communicate with other modules SC CTOR(m) { SC METHOD(proc1); sensitive << in port; void proc1(); To send(read) a packet to(from) NS-2, the process must simply manipulate the ports as follows: void m::proc1(){ 4

5 ... Packet p; p =... // the packet is explicitly built out_port.write((void*)&p, sizeof(packet)); // packet sent in_port.read((void*)&p, sizeof(packet); // Read from NS-2 5

6 7 Case Study (VoIP) The case study used to describe the cosimulation between SystemC and NS-2 is V-CLIP (Voice Client Over IP), a multimedia embedded system for transmitting voice over IP. It is composed of: Voice Signal Generator: it is used to generate voice data to verify the correctness of the application. ADPCM Coder: it performs data compression by exploiting the Adaptive Differential Pulse Code Modulation algorithm. Huffman Coder: it further improves the data compression by encoding the most frequent input symbols with the shorter sequence of output symbols. RTP Packet Generator: it performs data packetization according to the Real-Time Transport Protocol and it sends data over the network. SystemC-NS2 transactor: it connects the VoIP SystemC model with NS-2 Simulator using the interfaces described in Section SystemC Voice Signal Generator ADPCM Coder Huffman Coder (optional) NS2 System Agent socket RTP Packet Generator socket SystemC-NS2 Transactor The Voice signal generated by the TLM3 SystemC model is sent (using the ns_out port) to the NS-2 Network that simulates a UDP Network; once crossed the NS-2 network, the UDP packets exit from the simulator and are received by a Voice Player. In [2] has been already described the ADPCM coder module; therefore, in this report, about the SystemC V-CLIP implementation, we only described the NS-2 interface (sc_ns_transactor_tl3). 6

7 To compile and simulate the SystemC VoIP design connected to NS-2 Simulator it is necessary to use the HSN SystemC (in this case has been used systemc-2.1.v1-hsn). On the other hand to perform the NS-2 netowrk cosimulation with SystemC, it is necessary to use the HSN NS-2 Network simulator (in this case has been used nsallinone.2.28-hsn). 7.1 SystemC transactor Following is shown the OSCI TLM3 SystemC code to implement the SystemC-NS2 transactor module (called sc_ns_transactor_tl3). SC_MODULE(sc_ns_transactor_TL3), virtual basic_slave_base <ADDRESS_TYPE, DATA_TYPE_ns> { public: //Ports //get data from rtp module sc_export<if_type> target_port_sc_ns_transactor; //put data to NS-2 network simulator ns_out *out; //Functions void end_of_elaboration(); basic_status write(const ADDRESS_TYPE &,const DATA_TYPE_ns &); basic_status read(const ADDRESS_TYPE &,DATA_TYPE_ns &); //Construct SC_CTOR(sc_ns_transactor_TL3) { target_port_sc_ns_transactor(*this); out=new ns_out(20); end_module(); ; #include "sc_ns_transactor_tl3.h" void sc_ns_transactor_tl3 :: end_of_elaboration(){ basic_status sc_ns_transactor_tl3::write(const ADDRESS_TYPE &a, const DATA_TYPE_ns &d){ unsigned int delay; out->write((void *)(d->abuf),d->len); // wait next samples delay= (unsigned int)(((d->len-12)*8* )/ (SAMPLERATE*BITPERSAMPLE)+0.5); wait(delay, SC_US); return basic_protocol::success; basic_status sc_ns_transactor_tl3::read(const ADDRESS_TYPE &a, DATA_TYPE_ns &d){ 7

8 return basic_protocol::success; The module sc_ns_transactor_tl3 includes a sc_export port named target_port_sc_ns_transactor to receive the data from the rtp module. Moreover, it includes a ns_out port (called out) to inject data into the NS-2 Simulator that simulates a UDP network described follow. In the constructor, the module creates the ns_out port with the address 20. The tcl code to implement the NS-2 Network introduced above, is reported in the next section. 7.2 NS-2 Tcl code The network is composed of four nodes, as shown in the following figure. On the first (node 0) and the last (node 3) node is attached one NS agent each. Node 0 is associated to a ns_sc agent which receives packets from the SystemC domain. The tap agent is attached to the node 3 to redirect the traffic towards the real network and then to the player application. 8

9 First of all, you need to create a RealTime simulator object. This is done with the command: set ns [new Simulator] $ns use-scheduler RealTime The following line informs the NS-2 Scheduler to execute a SystemC-NS2 cosimulation. $ns set cosim_type 2 Now we open a file for writing that is going to be used for the nam trace data. #### Open files for statistics ##### set tracefile [open vclip1.tr w] $ns trace-all $tracefile set namfile [open vclip1.nam w] $ns namtrace-all $namfile The next step is to add a 'finish' procedure that closes the trace file and starts nam. proc finish { { global ns global namfile global tracefile $ns flush-trace close $namfile close $tracefile $ns close-channel exit 0 The following four lines define the four network nodes. set Node0 [$ns node] set Node1 [$ns node] set Node2 [$ns node] set Node3 [$ns node] The next lines connecte the four nodes. These lines tell the simulator object to connect the nodes Node0 with Node1, Node1 with Node2 and finally Node2 with Node3 using a duplex link with the bandwidth 500 kbit, a delay of 200ms and a DropTail queue. $ns duplex-link $Node0 $Node1 500kb 200ms DropTail $ns duplex-link $Node1 $Node2 500kb 200ms DropTail $ns duplex-link $Node2 $Node3 500kb 200ms DropTail The next lines create a ns_sc agent and attach it to the node Node0. set agent0 [new Agent/ns_sc 20 "systemc" 10] 9

10 $agent0 set class_ 1 $agent0 set fid_ 1 $agent0 set packetsize_ 2000 $ns attach-agent $Node0 $agent0 The next step is to define the IP-UDP Network Object to inject UDP traffic from the simulator into the live network via UDP Socket at :4460 address. set ipnet [new Network/IP/UDP] $ipnet open writeonly $ipnet connect The Network ipnet object is connected to a Tap Agent called agent3. #### Create the Tap Agent #### set agent3 [new Agent/Tap] $agent3 network $ipnet The next line attaches the agent3 Tap Agent to node Node3. $ns attach-agent $Node3 $agent3 Now the two agents have to be connected with each other. $ns connect $agent0 $agent3 The next line tells the simulator object to execute the 'finish' procedure after 30.0 seconds of simulation time. $ns at 30.0 "finish" The last line finally starts the simulation. $ns run Now it is possible to save the file (e.g. vclip1.tcl) and start the simulation. 7.3 Executing the Hardware-Network cosimulation After the SystemC simulation executable and the vclip1.tcl simulation script are built, you run the cosimulation by executing before the SystemC simulation executable (the batch program that executes the simulation) and then by executing the NS-2 simulation script (the tcl script generated in the previous Section). For example, to run the cosimulation between the SystemC module simulating the VoIP design, named run, and the NS-2 UDP network described in the vclip1.tcl simulation script, type the following commands: First, start a VoIP client to receive the voice data sent by V-CLIP (e.g. a speaker); 10

11 simply type run < speech.raw at the command prompt and press return to simulate the SystemC VoIP example with speech.raw as a source; nse vclip1.tcl to start the NS-2 network simulation to transfer data from SystemC VoIP to speaker. To visualize the NS-2 result it is possible to use a Network Animator (NAM). 8 References [1] Giovanni Perbellini, An Introduction to SystemC, 2005, Internal Report. [2] Giovanni Perbellini, Transaction Level Modeling in SystemC, 2005, Internal Report. [3] Giovanni Perbellini, An Introduction to NS-2, 2005, Internal Report. [4] Giovanni Perbellini, Network Advanced Modeling in NS-2, 2005, Internal Report. [5] F.Fummi, P.Gallo, S.Martini, G.Perbellini, M.Poncino, F.Ricciato, A Timing-Accurate Modeling and Simulation Environment for Networked Embedded Systems, Proceedings of "ACM/IEEE Design Automation Conference (DAC)", Los Angeles, CA, 2-6 June 2003, pp [6] F.Fummi, S.Martini, G.Perbellini, M.Poncino, Native ISS-SystemC Integration for the Co-Simulation of Multi-Processor SoC, Proceedings of "IEEE Design Automation and Test in Europe Conference (DATE)", Paris, France, February 2004, pp [7] F. Fummi, M. Poncino, M. Loghi, S. Martini, G. Perbellini, M. Monguzzi, Virtual Hardware Prototyping Through Timed Hardware-Software Co-Simulation, Proceedings of IEEE Design Automation and Test in Europe Conference (DATE), Munich, Germany, 7-11 March, [8] F. Fummi, S. Martini, G. Perbellini, M. Poncino, F. Ricciato, M. Turolla, Heterogeneous Co-Simulation of Networked Embedded Systems, Proceedings of "IEEE Design Automation and Test in Europe Conference (DATE)", Paris, France, February 2004, pp

ns-2 Tutorial Exercise

ns-2 Tutorial Exercise ns-2 Tutorial Exercise Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Partly adopted from Nicolas s slides On to the Tutorial Work in group of two. At least one people

More information

Network Simulator: ns-2

Network Simulator: ns-2 Network Simulator: ns-2 Antonio Cianfrani Dipartimento DIET Università Sapienza di Roma E-mail: cianfrani@diet.uniroma1.it Introduction Network simulator provides a powerful support to research in networking

More information

How To Monitor Performance On Eve

How To Monitor Performance On Eve Performance Monitoring on Networked Virtual Environments C. Bouras 1, 2, E. Giannaka 1, 2 Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet applications,

More information

Performance Monitoring on Networked Virtual Environments

Performance Monitoring on Networked Virtual Environments ICC2129 1 Performance Monitoring on Networked Virtual Environments Christos Bouras, Eri Giannaka Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet

More information

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Today

ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Today ns-2 Tutorial (1) Multimedia Networking Group, The Department of Computer Science, UVA Jianping Wang Jianping Wang, 2004 cs757 1 Contents: Objectives of this week What is ns-2? Working with ns-2 Tutorial

More information

Introduction VOIP in an 802.11 Network VOIP 3

Introduction VOIP in an 802.11 Network VOIP 3 Solutions to Performance Problems in VOIP over 802.11 Wireless LAN Wei Wang, Soung C. Liew Presented By Syed Zaidi 1 Outline Introduction VOIP background Problems faced in 802.11 Low VOIP capacity in 802.11

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Simulation and Evaluation for a Network on Chip Architecture Using Ns-2

Simulation and Evaluation for a Network on Chip Architecture Using Ns-2 Simulation and Evaluation for a Network on Chip Architecture Using Ns-2 Yi-Ran Sun, Shashi Kumar, Axel Jantsch the Lab of Electronics and Computer Systems (LECS), the Department of Microelectronics & Information

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

10CS64: COMPUTER NETWORKS - II

10CS64: COMPUTER NETWORKS - II QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference

More information

Keywords: DSDV and AODV Protocol

Keywords: DSDV and AODV Protocol Volume 3, Issue 12, December 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Comparison

More information

Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France

Exercises on ns-2. Chadi BARAKAT. INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Exercises on ns-2 Chadi BARAKAT INRIA, PLANETE research group 2004, route des Lucioles 06902 Sophia Antipolis, France Email: Chadi.Barakat@sophia.inria.fr November 21, 2003 The code provided between the

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:

To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step

More information

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track)

Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) Plan Number 2009 Study Plan Masters of Science in Computer Engineering and Networks (Thesis Track) I. General Rules and Conditions 1. This plan conforms to the regulations of the general frame of programs

More information

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and

Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and 1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise

More information

Voice Over IP. Priscilla Oppenheimer www.priscilla.com

Voice Over IP. Priscilla Oppenheimer www.priscilla.com Voice Over IP Priscilla Oppenheimer www.priscilla.com Objectives A technical overview of the devices and protocols that enable Voice over IP (VoIP) Demo Packet8 and Skype Discuss network administrator

More information

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed

More information

INTRODUCTION TO VOICE OVER IP

INTRODUCTION TO VOICE OVER IP 52-30-20 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO VOICE OVER IP Gilbert Held INSIDE Equipment Utilization; VoIP Gateway; Router with Voice Modules; IP Gateway; Latency; Delay Components; Encoding;

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

http://d-nb.info/1041302002

http://d-nb.info/1041302002 Contents 1 Introduction 1 1.1 Requirements for Evaluation Techniques 1 1.2 Performance Evaluation Techniques 2 1.2.1 Network Testbeds / Real-World Measurements 2 1.2.2 Network Simulators 3 1.2.3 Analytic

More information

VegaStream Information Note Considerations for a VoIP installation

VegaStream Information Note Considerations for a VoIP installation VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document

More information

Cisco PIX vs. Checkpoint Firewall

Cisco PIX vs. Checkpoint Firewall Cisco PIX vs. Checkpoint Firewall Introduction Firewall technology ranges from packet filtering to application-layer proxies, to Stateful inspection; each technique gleaning the benefits from its predecessor.

More information

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP

Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,

More information

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction

Hands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice

More information

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch

Procedure: You can find the problem sheet on Drive D: of the lab PCs. Part 1: Router & Switch University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab. 2 Network Devices & Packet Tracer Objectives 1. To become familiar with

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation

Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation Establishing How Many VoIP Calls a Wireless LAN Can Support Without Performance Degradation ABSTRACT Ángel Cuevas Rumín Universidad Carlos III de Madrid Department of Telematic Engineering Ph.D Student

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback The network we see so far CSE56 - Lecture 08 QoS Network Xiaowei Yang TCP saw-tooth FIFO w/ droptail or red Best-effort service Web-surfing, email, ftp, file-sharing Internet Best Effort Service Our network

More information

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol

Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol International Journal of Networks and Communications 2015, 5(2): 23-30 DOI: 10.5923/j.ijnc.20150502.01 Re-Engineering Campus-Wide Internet Telephony Using Voice over Internet Protocol Francisca O. Oladipo

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Optimization of VoIP over 802.11e EDCA based on synchronized time

Optimization of VoIP over 802.11e EDCA based on synchronized time Optimization of VoIP over 802.11e EDCA based on synchronized time Padraig O Flaithearta, Dr. Hugh Melvin Discipline of Information Technology, College of Engineering and Informatics, National University

More information

Daniele Messina, Ilenia Tinnirello

Daniele Messina, Ilenia Tinnirello !"! #$ %& ' %& traffic source agent node link n0 ftp tcp sink 2mbps 10 ms n2 1.7mbps, 20 ms n3 cbr udp n1 2mbps 10 ms null pktsize 1KB, rate 1mbps #Create a simulator object set ns [new Simulator] $ $

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

TREK GETTING STARTED GUIDE

TREK GETTING STARTED GUIDE TREK GETTING STARTED GUIDE February 2015 Approved for Public Release; Distribution is Unlimited. TABLE OF CONTENTS PARAGRAPH PAGE 1 Welcome... 2 1.1 About TReK... 2 1.2 About this Guide... 2 1.3 Important

More information

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga

Curso de Telefonía IP para el MTC. Sesión 2 Requerimientos principales. Mg. Antonio Ocampo Zúñiga Curso de Telefonía IP para el MTC Sesión 2 Requerimientos principales Mg. Antonio Ocampo Zúñiga Factors Affecting Audio Clarity Fidelity: Audio accuracy or quality Echo: Usually due to impedance mismatch

More information

Capacity Estimation of VOIP Channels on Wireless Networks

Capacity Estimation of VOIP Channels on Wireless Networks Capacity Estimation of VOIP Channels on Wireless Networks T. J. Patel, V. A. Ogale, S. Baek, N. Cui, R. Park WNCG, Dept of Electrical and Computer Engineering The University of Texas at Austin Austin TX

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India

1 M.Tech, 2 HOD. Computer Engineering Department, Govt. Engineering College, Ajmer, Rajasthan, India Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Dynamic Performance

More information

Performance Analysis of VoIP Traffic in WiMAX using various Service Classes

Performance Analysis of VoIP Traffic in WiMAX using various Service Classes Performance Analysis of VoIP Traffic in WiMAX using various Service Classes Tarik ANOUARI 1 Abdelkrim HAQIQ 1, 2 1 Computer, Networks, Mobility and Modeling laboratory Department of Mathematics and Computer

More information

The IP Transmission Process. V1.4: Geoff Bennett

The IP Transmission Process. V1.4: Geoff Bennett The IP Transmission Process V1.4: Geoff Bennett Contents Communication Between Hosts Through a MAC Bridge Through a LAN Switch Through a Router The tutorial is divided into four sections. Section 1 looks

More information

Optimizing Configuration and Application Mapping for MPSoC Architectures

Optimizing Configuration and Application Mapping for MPSoC Architectures Optimizing Configuration and Application Mapping for MPSoC Architectures École Polytechnique de Montréal, Canada Email : Sebastien.Le-Beux@polymtl.ca 1 Multi-Processor Systems on Chip (MPSoC) Design Trends

More information

SystemC Tutorial. John Moondanos. Strategic CAD Labs, INTEL Corp. & GSRC Visiting Fellow, UC Berkeley

SystemC Tutorial. John Moondanos. Strategic CAD Labs, INTEL Corp. & GSRC Visiting Fellow, UC Berkeley SystemC Tutorial John Moondanos Strategic CAD Labs, INTEL Corp. & GSRC Visiting Fellow, UC Berkeley SystemC Introduction Why not leverage experience of C/C++ developers for H/W & System Level Design? But

More information

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET

SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering

More information

Challenges and Solutions in VoIP

Challenges and Solutions in VoIP Challenges and Solutions in VoIP Challenges in VoIP The traditional telephony network strives to provide 99.99 percent uptime to the user. This corresponds to 5.25 minutes per year of down time. Many data

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Indepth Voice over IP and SIP Networking Course

Indepth Voice over IP and SIP Networking Course Introduction SIP is fast becoming the Voice over IP protocol of choice. During this 3-day course delegates will examine SIP technology and architecture and learn how a functioning VoIP service can be established.

More information

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos (gss7@sfu.ca) (sna14@sfu.ca)

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

MPEG-4 Video Transfer with SCTP-Friendly Rate Control Mohamed N. El Derini

MPEG-4 Video Transfer with SCTP-Friendly Rate Control Mohamed N. El Derini MPEG-4 Video Transfer with SCTP-Friendly Rate Control Mohamed N. El Derini elderini@ieee.org Amr A.Elshikh elshikha@emro.who.int Faculty of Engineering, Alexandria University, Egypt Computer Science and

More information

TCP Performance Simulations Using Ns2. Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi

TCP Performance Simulations Using Ns2. Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi TCP Performance Simulations Using Ns2 Johanna Antila 51189d TLT e-mail: jmantti3@cc.hut.fi 1. Introduction...3 2. Theoretical background...3 2.1. Overview of TCP s congestion control...3 2.1.1. Slow start

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Distributed Systems 3. Network Quality of Service (QoS)

Distributed Systems 3. Network Quality of Service (QoS) Distributed Systems 3. Network Quality of Service (QoS) Paul Krzyzanowski pxk@cs.rutgers.edu 1 What factors matter for network performance? Bandwidth (bit rate) Average number of bits per second through

More information

Network traffic: Scaling

Network traffic: Scaling Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

OPNET simulation of voice over MPLS With Considering Traffic Engineering

OPNET simulation of voice over MPLS With Considering Traffic Engineering Master Thesis Electrical Engineering Thesis no: MEE 10:51 June 2010 OPNET simulation of voice over MPLS With Considering Traffic Engineering KeerthiPramukh Jannu Radhakrishna Deekonda School of Computing

More information

LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION

LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION LABORATORY: TELECOMMUNICATION SYSTEMS & NETWORKS PART 1 NCTUNS PROGRAM INTRODUCTION 1 NCTUns Program In General NCTUns Program is an extensible network simulator and emulator for teleinformatic networks.

More information

VOICE OVER IP AND NETWORK CONVERGENCE

VOICE OVER IP AND NETWORK CONVERGENCE POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it

More information

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)

Version 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................

More information

Fault-Tolerant Framework for Load Balancing System

Fault-Tolerant Framework for Load Balancing System Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:

More information

Introduction to Exploration and Optimization of Multiprocessor Embedded Architectures based on Networks On-Chip

Introduction to Exploration and Optimization of Multiprocessor Embedded Architectures based on Networks On-Chip Introduction to Exploration and Optimization of Multiprocessor Embedded Architectures based on Networks On-Chip Cristina SILVANO silvano@elet.polimi.it Politecnico di Milano, Milano (Italy) Talk Outline

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Voice Over IP Per Call Bandwidth Consumption

Voice Over IP Per Call Bandwidth Consumption Over IP Per Call Bandwidth Consumption Interactive: This document offers customized voice bandwidth calculations with the TAC Bandwidth Calculator ( registered customers only) tool. Introduction Before

More information

Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator

Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Multiple Fault Tolerance in MPLS Network using Open Source Network Simulator Muhammad Kamran 1 and Adnan Noor Mian 2 Department of Computer Sciences, FAST- National University of Computer & Emerging Sciences,

More information

Authors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt

Authors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt Adaptive Quality of Service of Voice over IP Communications Nelson Costa Instituto Superior Técnico (IST) Lisbon, Portugal eng.ncosta@gmail.com Authors Mário Serafim Nunes Lisbon, Portugal mario.nunes@inesc-id.pt

More information

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION

A B S T R A C T. Index Trems- Wi-Fi P2P, WLAN, Mobile Telephony, Piconet I. INTRODUCTION Wi-Fi Calling Using Android Phones. Mr.Dnyaneshwar Bhusari, Mr.Gaurav Mokase, Mr.Prasad Waghmare, Ms. Kundan Kumar Department of Information Technology D.Y.Patil College of Engineering, Akurdi, Pune, India

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

CGI-based applications for distributed embedded systems for monitoring temperature and humidity

CGI-based applications for distributed embedded systems for monitoring temperature and humidity CGI-based applications for distributed embedded systems for monitoring temperature and humidity Grisha Spasov, Nikolay Kakanakov Abstract: The paper discusses the using of Common Gateway Interface in developing

More information

ACN2005 Term Project Improve VoIP quality

ACN2005 Term Project Improve VoIP quality ACN2005 Term Project Improve VoIP quality By introducing TCP-Friendly protocol Burt C.F. Lien ( 連 矩 鋒 ) CSIE Department, National Taiwan University p93007@csie.ntu.edu.tw Abstract The most notorious of

More information

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP

Performance of Various Codecs Related to Jitter Buffer Variation in VoIP Using SIP Performance of Various Related to Jitter Buffer Variation in VoIP Using SIP Iwan Handoyo Putro Electrical Engineering Department, Faculty of Industrial Technology Petra Christian University Siwalankerto

More information

PFS scheme for forcing better service in best effort IP network

PFS scheme for forcing better service in best effort IP network Paper PFS scheme for forcing better service in best effort IP network Monika Fudała and Wojciech Burakowski Abstract The paper presents recent results corresponding to a new strategy for source traffic

More information

A Model-based Methodology for Developing Secure VoIP Systems

A Model-based Methodology for Developing Secure VoIP Systems A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN

More information

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide

EarthLink Business SIP Trunking. NEC SV8300 IP PBX Customer Configuration Guide EarthLink Business SIP Trunking NEC SV8300 IP PBX Customer Configuration Guide Publication History First Release: Version 1.0 May 18, 2012 CHANGE HISTORY Version Date Change Details Changed By 1.0 5/18/2012

More information

Glossary of Terms and Acronyms for Videoconferencing

Glossary of Terms and Acronyms for Videoconferencing Glossary of Terms and Acronyms for Videoconferencing Compiled by Irene L. Ferro, CSA III Education Technology Services Conferencing Services Algorithm an algorithm is a specified, usually mathematical

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

Architectures and Platforms

Architectures and Platforms Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation

More information

Author: Seth Scardefield 1/8/2013

Author: Seth Scardefield 1/8/2013 Author: Seth Scardefield 1/8/2013 pfsense VoIP QoS Guide This guide will walk you through configuring the traffic shaper in pfsense to prioritize VoIP traffic. This is a very basic configuration intended

More information

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP.

VoIP technology employs several network protocols such as MGCP, SDP, H323, SIP. 1 VoIP support configuration First used in the mid-1990s, VoIP is an emerging technology for telephone calls and other data transfer. The concept is relatively simple: Use the multiple networks that comprise

More information

Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges

Monitoring Load Balancing in the 10G Arena: Strategies and Requirements for Solving Performance Challenges 2011 is the year of the 10 Gigabit network rollout. These pipes as well as those of existing Gigabit networks, and even faster 40 and 100 Gbps networks are under growing pressure to carry skyrocketing

More information

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK

COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra

More information

Optimizing Converged Cisco Networks (ONT)

Optimizing Converged Cisco Networks (ONT) Optimizing Converged Cisco Networks (ONT) Module 2: Cisco VoIP Implementations (Deploy) Calculating Bandwidth Requirements for VoIP Objectives Describe factors influencing encapsulation overhead and bandwidth

More information

Application Note - Using Tenor behind a Firewall/NAT

Application Note - Using Tenor behind a Firewall/NAT Application Note - Using Tenor behind a Firewall/NAT Introduction This document has been created to assist Quintum Technology customers who wish to install equipment behind a firewall and NAT (Network

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2

PERFORMANCE ANALYSIS OF AODV, DSDV AND AOMDV USING WIMAX IN NS-2 International Journal of Computer Engineering & Technology (IJCET) Volume 7, Issue 1, Jan-Feb 2016, pp. 01-08, Article ID: IJCET_07_01_001 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=7&itype=1

More information

An Efficient AODV-Based Algorithm for Small Area MANETS

An Efficient AODV-Based Algorithm for Small Area MANETS An Efficient AODV-Based Algorithm for Small Area MANETS Jai Prakash Kumawat 1, Prakriti Trivedi 2 PG Student, Department of Computer Engineering & IT, Government Engineering College, Ajmer, India 1 Assistant

More information

Real-time apps and Quality of Service

Real-time apps and Quality of Service Real-time apps and Quality of Service Focus What transports do applications need? What network mechanisms provide which kinds of quality assurances? Topics Real-time versus Elastic applications Adapting

More information

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia 22nd EUROPEAN CONFERENCE ON OPERATIONAL RESEARCH Prague, July 8 11, 2007 Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

More information

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU

More information

VOIP with Asterisk & Perl

VOIP with Asterisk & Perl VOIP with Asterisk & Perl By: Mike Frager 11/2011 The Elements of PSTN - Public Switched Telephone Network, the pre-internet phone system: land-lines & cell-phones. DID - Direct

More information

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,

More information