QoS Mechanisms C HAPTER Introduction. 3.2 Classification

Size: px
Start display at page:

Download "QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification"

Transcription

1 C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of this chpter, we provide generl frmework for nlyzing the QoS support of ech wireless technology presented in the rest of this book. QoS mechnisms cn be ctegorized into two groups bsed on how the ppliction trffic is treted: 1) trffic hndling mechnisms, nd 2) bndwidth mngement mechnisms (see Figure 3.1). Trffic hndling mechnisms (sometimes clled In-trffic mechnisms) re mechnisms tht clssify, hndle, police, nd monitor the trffic cross the network. The min mechnisms re: 1) clssifiction, 2) chnnel ccess, 3) pcket scheduling, nd 4) trffic policing. Bndwidth mngement mechnisms (sometimes clled Out-of-trffic mechnisms) re mechnisms tht mnge the network resources (e.g., bndwidth) by coordinting nd configuring network devices (i.e., hosts, bse sttions, ccess points) trffic hndling mechnisms. The min mechnisms re: 1) resource reservtion signling nd 2) dmission control. 3.2 Clssifiction The lowest service level tht network cn provide is best effort service, which does not provide QoS support. In best effort service, ll trffic is hndled eqully regrdless of the ppliction or host tht generted the trffic. However, some pplictions need QoS support, requiring better thn best effort service such s differentited or gurnteed service. For network to provide selective services to certin pplictions, first of ll, the network requires clssifiction mechnism tht cn differentite between the different pplictions. The clssifiction mechnism identifies nd seprtes different trffic into flows or groups of flows (ggregted flows or clsses). Therefore, ech flow or ech ggregted flow cn be hndled selectively. 39

2 40 Chpter 3 QoS Mechnisms Wireless Network QoS Mechnisms Trffic Hndling Mechnisms - Clssifiction - Chnnel Access - Scheduling - Trffic Policing Bndwidth Mngement Mechnisms - Reservtion - Admission Control Host Host Intermedite Devices (i.e., ccess point, bse sttion, stellite) Figure 3.1 QoS Mechnisms in Wireless Network The clssifiction mechnism cn be implemented in different network devices (i.e., end hosts, intermedite devices such s switches, routers, ccess points). Figure 3.2 shows simplified digrm of clssifiction module tht resides on n end host nd on n intermedited device. End Host Applictions Clssifiction Dt Trffic Incoming Trffic (from other hosts) Intermedite Device Clssifiction Scheduler Scheduler Dt s Dt s Figure 3.2 Clssifiction

3 Clssifiction 41 Appliction trffic (t the end host) or incoming trffic from other hosts (t the intermedite device) is identified by the clssifiction mechnism nd is forwrded to the pproprite queue witing service from other mechnisms such s the pcket scheduler. The grnulrity level of the clssifiction mechnism cn be per-user, per-flow, or per-clss depending on the type of QoS services provided. For exmple, per-flow QoS service requires per-flow clssifiction while per-clss QoS service requires per-clss clssifiction. To identify nd clssify the trffic, the trffic clssifiction mechnism requires some form of tgging or mrking of pckets. There re number of trffic clssifiction pproches. Some of pproches re suitble for end hosts nd some for intermedite hosts. Figure 3.3 shows n exmple of some trffic clssifiction pproches which re implemented in the different Open System Interconnection (OSI) lyers. OSI Lyer Clssifiction Techniques Appliction User/Appliction Identifiction Trnsport Flow (5-tuplet IP Address) Network IPTOS, DSCP Dt Link 802.1p/Q Clssifiction Physicl Lyer Figure 3.3 Exmples of Existing Clssifiction on Ech OSI Lyer Dt Link Lyer Clssifiction Dt link lyer, or Lyer 2, clssifies the trffic bsed on the tg or field vilble in Lyer 2 heder. An exmple of Lyer 2 clssifiction is IEEE (Institute of Electricl nd Electronics Engineers) 802 user priority. The IEEE 802 heder includes 3-bit priority field tht enbles eight priority clsses. It ims to support service differentition on Lyer 2 network such s LAN. The end host or intermedite host ssocites ppliction trffic with clss (bsed on the Policy, or the service tht the ppliction expects to receive) nd tgs the pckets priority field in the IEEE 802 heder. A clssifiction mechnism identifies pckets by exmining the priority field of the IEEE 802 heder nd forwrds the pckets to the pproprited queues. IEEE recommends mpping the priority vlue nd the corresponding service s shown in Tble 3.1.

4 42 Chpter 3 QoS Mechnisms Tble 3.1 Exmple of Mpping between Priority nd Services Priority Service 0 Defult, ssumed to be best effort service 1 Less thn best effort service 2 Reserved 3 Reserved 4 Dely sensitive, no bound 5 Dely sensitive, 100ms bound 6 Dely sensitive, 10ms bound 7 Network control Network Lyer Clssifiction Network lyer, or Lyer 3 clssifiction, clssifies pckets using Lyer 3 heder. Lyer 3 clssifiction enbles service differentition in Lyer 3 network. An exmple of Lyer 3 clssifiction is IPTOS (Internet protocol type of service), DSCP (Internet protocol differentil service code point). IPv4 nd IPv6 stndrd defined prioritiztion field in the IP heder which cn be used for Lyer 3 clssifiction. RFC 1349 defined TOS field in IPv4 heder. The type of service field consists of 3-bit precedence subfield, 4-bit TOS subfield, nd the finl bit which is unused nd is set to be 0. The 4-bit TOS subfield enbles 16 clsses of service. In IPv6 heder there is n 8-bit clss of service field (see Figure 3.4). Lter the Internet Engineering Tsk Force (IETF) differentited services working group redefined IPv4 IPTOS to be DSCP, which is shown in Figure 3.4. DSCP hs 6-bit field enbling 64 clsses of service.

5 Clssifiction 43 6-bit DSCP Unused DSCP bit Precedence 4-bit TOS 0 IPTOS bit 4-bit heder 8-bit TOS 16-bit totl length (in bytes) version length 16-bit identifiction 3-bit flg 13-bit frngment offset 8-bit TTL (Time To Live) 8-bit Protocol 16-bit heder checksum 32-bit source IP ddress 32-bit destintion IP ddress DATA IPv4 Heder bit 8-bit trffic clss Flow lbel version Pylod length Next Heder Hop limit Pylod length Pylod length IPv6 Heder Figure 3.4 Structure of IPTOS nd DSCP in IPv4 nd IPv Trnsport Lyer Clssifiction (5-tuplet IP Heder) A 5-tuplet IP heder (source IP, destintion IP, source port, destintion port, nd protocol IP) cn be used for trnsport lyer clssifiction. A 5-tuplet IP heder cn uniquely identify the individul ppliction or flow. This clssifiction provides the finest grnulrity nd supports per-flow QoS service. However, the 5-tuplet IP heder clssifiction hs some limittions: It is suitble for edge networks, but it is not suitble for core networks tht crry very lrge mounts of trffic. Mintining queues for ech individul flow cn be n overwhelming tsk.

6 44 Chpter 3 QoS Mechnisms If the trffic psses through firewll tht uses NAT (network ddress trnsltion), the rel IP ddress (i.e., the IP ddress of the trffic source) is hidden from networks outside the firewll. Therefore, the 5-tuplet IP heder exposed to network outside the firewll cnnot uniquely identify the ppliction Appliction or User Clssifiction The ppliction or user cn be uniquely identified by using user/ppliction identifiction (ID). The ID ssignment my be sttic (i.e., the policy or the contrct) or dynmic (i.e., connection signling). For the connection signling, there is centrl sttion or entity in the network tht is responsible for mking the decision whether to llow new session to join the network. First, the ppliction or user sends the connection request to the centrl sttion. Then, if the new connection is dmitted, it will be ssigned unique ID number. s from the ppliction will be ssocited with n ID number. 3.3 Chnnel Access Mechnism In wireless networks, ll hosts communicte through shred wireless medium. When multiple hosts try to trnsmit pckets on the shred communiction chnnel, collisions cn occur. Therefore, wireless networks need chnnel ccess mechnism which controls the ccess to the shred chnnel. There re two types of chnnel ccess mechnisms: 1) collision-bsed chnnel ccess nd 2) collision-free chnnel ccess. Ech type of chnnel ccess mechnism cn provide different QoS services Collision-Bsed Chnnel Access Collision-bsed chnnel ccess is distributed chnnel ccess method tht provides mechnisms to void collisions nd to resolve collisions in cse they occur. A clssic collision-bsed chnnel ccess mechnism developed for wired LANs nd implemented in Ethernet is CSMA/CD (Crrier Sense Multiple Access with Collision Detection). In collision-bsed chnnel ccess schemes, collisions cn occur leding to the need for retrnsmissions. The collision probbility depends on the number of ctive (with pckets for trnsmission) users in the network. High trffic lod increses the number of collisions nd retrnsmissions, incresing the dely. Since we del with stochstic trffic, the number of collisions nd re-trnsmissions is rndom s well, leding to n unbound dely. Therefore, collision-bsed chnnel ccess schemes cn provide best effort service. All hosts in the network receive equl bndwidth nd experience the sme unbounded dely. The service level cn be improved by: Over-provisioning, whereby ll trffic will receive mple of bndwidth nd experience low dely.

7 Chnnel Access Mechnism 45 Adding priority scheme in the collision-bsed chnnel ccess tht is, using different sized bckoff windows for different priority clsses. This will enble the provision of differentited services. An exmple of such solution is described in the proposed IEEE e (Chpter 4). Existing solutions in wireless networks such s IEEE DCF, HomeRF use collision-bsed chnnel ccess protocols similr to Ethernet CSMA/CD, denoted s CSMA/CA where CA stnds for Collision Avoidnce Collision-Free Chnnel Access In collision-free chnnel ccess mechnism the chnnel is rbitrted such tht no collisions cn occur. Only one host is llowed to trnsmit pckets to the chnnel t ny given time. Collision, therefore, will not occur. Exmples of collision-free chnnel ccess techniques re polling nd TDMA (Time Division Multiple Access) Polling A host in the network, or specilized network device such s n Access Point or Bse Sttion, is designted s the poller, which controls ll ccess to the wireless chnnel by the other hosts denoted s pollees. Pollees re not llowed to trnsmit pckets unless they receive polling pcket from the poller. Thus, there is no collision. Some pollees my receive the poll more often thn others. The polling frequency (the number of polls in period of time) reflects the bndwidth lloction. A poller cn dynmiclly llocte bndwidth to pollees by djusting the polling frequency dynmiclly TDMA (Time Division Multiple Access) A TDMA scheme divides the chnnel ccess opportunity into frmes nd ech frme is divided into time slots. A host is llowed to trnsmit pckets in predefined time slot, s shown in Figure 3.5. The number of time slots ssigned to host per frme reflects the bndwidth llocted for the host. This technique requires mster host tht is designted to mnge the time slot ssignment for ll the hosts in the network. This Mster host determines the number of time slots tht ech host will be llowed to trnsmit nd notifies the hosts using some signling mechnism. There re number of time slot ssignment philosophies: Sttic time slot ssignment: Ech host receives fixed time slot ssignment which cn be provided during the connection setup. Dynmic time slot ssignment: The time slot ssignment chnges dynmiclly during the lifetime of the session s function of the trffic lod, ppliction QoS requirements, nd chnnel conditions. This slot ssignment policy is more flexible nd leds to better chnnel utiliztion. However, it leds to signling overhed required to communicte the slot ssignment chnges to the different hosts.

8 46 Chpter 3 QoS Mechnisms Host Trnsmit pckets in ssigned time slots Host Time Slot Frme i Frme i+1 Figure 3.5 Time Division Multiple Access (TDMA) Scheme Collision-free chnnel ccess schemes provide tight chnnel ccess control tht cn provide tight dely bound. Therefore, these schemes re good cndidtes for QoS provision to pplictions with strict QoS requirements. 3.4 Scheduling Mechnisms scheduling is the mechnism tht selects pcket for trnsmission from the pckets witing in the trnsmission queue. It decides which pcket from which queue nd sttion re scheduled for trnsmission in certin period of time. scheduling controls bndwidth lloction to sttions, clsses, nd pplictions. As shown in Figure 3.6, there re two levels of pcket scheduling mechnisms: 1. Intrsttion pcket scheduling: The pcket scheduling mechnism tht retrieves pcket from queue within the sme host. 2. Intersttion pcket scheduling: The pcket scheduling mechnism tht retrieves pcket from queue from different hosts. scheduling cn be implemented using hierrchicl or flt pproches. Hierrchicl pcket scheduling: Bndwidth is llocted to sttions tht is, ech sttion is llowed to trnsmit t certin period of time. The mount of bndwidth ssigned to ech sttion is controlled by intersttion policy nd module. When sttion receives the opportunity to trnsmit, the intrsttion pcket scheduling module will decide which pckets to trnsmit. This pproch is sclble becuse intersttion pcket scheduling mintins the stte by sttion (not by connection or ppliction). Overll bndwidth is llocted bsed on sttions (in fct, they cn be groups, deprtments, or compnies). Then, sttions will hve the uthority to mnge or llocte their own bndwidth portion to pplictions or clsses within the host.

9 Scheduling Mechnisms 47 End Host Intermedite Host Scheduler Intrsttion pcket scheduling (determining pckets from which queue re llowed to be trnsmited) Scheduler Network Intersttion pcket scheduling (determining pckets from which sttion re llowed to be trnsmited) Figure 3.6 Scheduling Flt pcket scheduling: scheduling is bsed on ll queues of ll sttions. Ech queue receives individul service from the network. scheduling mechnism dels with how to retrieve pckets from queues, which is quite similr to queuing mechnism. Since in intrsttion pcket scheduling the sttus of ech queue in sttion is known, the intrsttion pcket scheduling mechnism is virtully identicl to queuing mechnism. Intersttion pcket scheduling mechnism is slightly different from queuing mechnism becuse queues re distributed mong hosts nd there is no centrl knowledge of the sttus of ech queue. Therefore, some intersttion pcket scheduling mechnisms require signling procedure to coordinte the scheduling mong hosts. Becuse of the similrities between pcket scheduling nd queuing mechnisms we introduce number of queuing schemes (First In First Out [FIFO], Strict Priority, nd Weight Fir [WFQ]) nd briefly discuss how they support QoS services First In First Out (FIFO) First In First Out (FIFO) is the simplest queuing mechnism. All pckets re inserted to the til of single queue. s re scheduled in order of their rrivl. Figure 3.7 shows FIFO pcket scheduling.

10 48 Chpter 3 QoS Mechnisms End Host App. App. App. App. First In First Out (FIFO) Scheduling Figure 3.7 FIFO Scheduling FIFO provides best effort service tht is, it does not provide service differentition in terms of bndwidth nd dely. The high bndwidth flows will get lrger bndwidth portion thn the low bndwidth flows. In generl, ll flows will experience the sme verge dely. If flow increses its bndwidth ggressively, other flows will be ffected by getting less bndwidth, cusing incresed verge pcket dely for ll flows. It is possible to improve QoS support by dding 1) trffic policing to limit the rte of ech flow nd 2) dmission control Strict Priority s re ssigned priority order. Strict priority pcket scheduling schedules pckets bsed on the ssigned priority order. s in higher priority queues lwys trnsmit before pckets in lower priority queues. A lower priority queue hs chnce to trnsmit pckets only when there re no pckets witing in higher priority queue. Figure 3.8 illustrtes the strict priority pcket scheduling mechnism. Strict priority provides differentited services (reltive services) in both bndwidth nd dely. The highest priority queue lwys receives bndwidth (up to the totl bndwidth) nd the lower priority queues receive the remining bndwidth. Therefore, higher priority queues lwys experience lower dely thn the lower priority queues. Aggressive bndwidth spending by the high priority queues cn strve the low priority queues. Agin, it is possible to improve the QoS support by dding 1) trffic policing to limit the rte of ech flow nd 2) dmission control.

11 Scheduling Mechnisms 49 End Host High Priority Low Priority Scheduler Strict Priority Scheduling Figure 3.8 Strict Priority Scheduling Weight Fir (WFQ) Weight Fir schedules pckets bsed on the weight rtio of ech queue. Weight, w i, is ssigned to ech queue i ccording to the network policy. For exmple, there re three queues A, B, C with weights w 1, w 2, w 3, respectively. s A, B, nd C receive the following rtios of vilble bndwidth: w 1 /(w 1 +w 2 +w 3 ), w 2 /(w 1 +w 2 +w 3 ), nd w 3 /(w 1 +w 2 +w 3 ), respectively, s shown in Figure 3.9. Host w 3 w 1 w 2 A B C w 2 /s w 1 /s w 3 /s Weight Weight Fir Scheduler s = w 1 +w 2 +w 3 Figure 3.9 Weight Fir Scheduling

12 50 Chpter 3 QoS Mechnisms Bndwidth buse from specific queue will not ffect other queues. WFQ cn provide the required bndwidth nd the dely performnce is directly relted to the llocted bndwidth. A queue with high bndwidth lloction (lrge weight) will experience lower dely. This my led to some mismtch between the bndwidth nd dely requirements. Some pplictions my require low bndwidth nd low dely. In this cse WFQ will llocte high bndwidth to these pplictions in order to gurntee the low dely bound. Some pplictions my require high bndwidth nd high dely. WFQ still hs to llocte high bndwidth in order for the pplictions to operte. Of course, pplictions will stisfy the dely but sometimes fr beyond their needs. This mismtch cn led to low bndwidth utiliztion. However, in rel life, WFQ mostly schedules pckets tht belong to ggregted flows, groups, nd clsses (insted of individul flows) where the gol is to provide link shring mong groups. In this cse dely is of less concern. The elementry queuing mechnisms introduced bove will be the bsis of number of pcket scheduling vritions. Before we move our discussion to the next QoS mechnisms, it is worth mentioning tht in some implementtions the chnnel ccess mechnism nd pcket scheduling mechnism re not mutully exclusive. There is some overlp between these two mechnisms nd sometimes they re blended into one solution. When we discuss QoS support of ech wireless technology in lter chpters, in some cses, we will discuss both mechnisms together. 3.5 Trffic Policing Mechnism Trffic policing is the mechnism tht monitors the dmitted sessions trffic so tht the sessions do not violte their QoS contrct. The trffic policing mechnism mkes sure tht ll trffic tht psses through it will conform to greed trffic prmeters. When violtion is found (e.g., more trffic is sent thn ws initilly greed upon in the QoS contrct), trffic policing mechnism is enforced by shping the trffic. Becuse trffic policing shpes the trffic bsed on some known quntittive trffic prmeters, multimedi (rel-time) pplictions re nturlly comptible to trffic policing. Most multimedi ppliction trffic (voice, video) is generted by stndrd codec which generlly provides certin knowledge of the quntittive trffic prmeters. Trffic policing cn be pplied to individul multimedi flows. Non-rel-time trffic does not provide quntittive trffic prmeters nd usully demnds bndwidth s much s possible. Therefore, trffic policing enforces non-rel-time trffic (i.e., limits the bndwidth) bsed on the network policy. Such policing is usully enforced on ggregted non-rel-time flows. Trffic policing cn be implemented on end hosts or intermedite hosts. Exmples of trffic policing mechnisms include the leky bucket nd the token bucket Leky Bucket The leky bucket mechnism is usully used to smooth the burstiness of the trffic by limiting the trffic pek rte nd the mximum burst size. This mechnism, s its nme describes, uses the nlogy of leky bucket to describe the trffic policing scheme. The bucket s prmeters such s its size nd the hole s size re nlogous to the trffic policing prmeters such s the

13 Trffic Policing Mechnism 51 (A) (B) (C) Rte R < r Rte R > r Rte R > r Bucket is empty Bucket rte r b Bucket is not empty, but not full Bucket is full Non-conformnt trffic - either dropped or sent s best effort trffic Rte R Rte r Rte r Figure 3.10 Leky Bucket Mechnism mximum burst size nd mximum rte, respectively. The leky bucket shpes the trffic with mximum rte of up to the bucket rte. The bucket size determines the mximum burst size before the leky bucket strts to drop pckets. The mechnism works in the following wy. The rriving pckets re inserted t the top of the bucket. At the bottom of the bucket, there is hole through which trffic cn lek out t mximum rte of r bytes per second. The bucket size is b bytes (i.e., the bucket cn hold t most b bytes). Let us follow the leky bucket opertion by observing the exmple shown in Figure We ssume first tht the bucket is empty. Figure 3.10 (A): Incoming trffic with rte R which is less thn the bucket rte r. The outgoing trffic rte is equl to R. In this cse when we strt with n empty bucket, the burstiness of the incoming trffic is the sme s the burstiness of the outgoing trffic s long s R < r. Figure 3.10 (B): Incoming trffic with rte R which is greter thn the bucket rte r. The outgoing trffic rte is equl to r (bucket rte). Figure 3.10 (C): Sme s (B) but the bucket is full. Non-conformnt trffic is either dropped or sent s best effort trffic Token Bucket The token bucket mechnism is lmost the sme s the leky bucket mechnism but it preserves the burstiness of the trffic. The token bucket of size b bytes is filled with tokens t rte r (bytes per second). When pcket rrives, it retrieves token from the token bucket (given such token is vilble) nd the pcket is sent to the outgoing trffic strem. As long s there re

14 52 Chpter 3 QoS Mechnisms (A) Token rte r b Token drined out with rte R Incoming trffic rte R < r Outgoing trffic rte R (B) Token rte r b Token drined out with rte R Incoming trffic rte R > r Outgoing trffic rte R (C) Token rte r b Bucket is empty Token drined out with rte r Incoming trffic rte R > r Outgoing trffic rte r Figure 3.11 Token Bucket Mechnism tokens in the token bucket, the outgoing trffic rte nd pttern will be the sme s the incoming trffic rte nd pttern. If the token bucket is empty, incoming pckets hve to wit until there re tokens vilble in the bucket, nd then they continue to send. Figure 3.11 shows n exmple of the token bucket mechnism. Figure 3.11 (A): The incoming trffic rte is less thn the token rrivl rte. In this cse the outgoing trffic rte is equl to the incoming trffic rte. Figure 3.11 (B): The incoming trffic rte is greter thn the token rrivl rte. In cse there re still tokens in the bucket, the outgoing trffic rte is equl to the incoming trffic rte. Figure 3.11 (C): If the incoming trffic rte is still greter thn the token rrivl rte (e.g., long trffic burst), eventully ll the tokens will be exhusted. In this cse the incoming trffic hs to wit for the new tokens to rrive in order to be ble to send out. Therefore, the outgoing trffic is limited t the token rrivl rte.

15 Reservtion Signling Mechnisms 53 The token bucket preserves the burstiness of the trffic up to the mximum burst size. The outgoing trffic will mintin mximum verge rte equl to the token rte, r. Therefore, the token bucket is used to control the verge rte of the trffic. In prcticl trffic policing, we use combintion of the token bucket nd leky bucket mechnisms connected in series (token bucket, then leky bucket). The token bucket enforces the verge dt rte to be bound to token bucket rte while the leky bucket (p) enforces the pek dt rte to be bound to leky bucket rte. Trffic policing, in coopertion with other QoS mechnisms, enbles QoS support. 3.6 Reservtion Signling Mechnisms The trffic hndling mechnisms (clssifiction, chnnel ccess, pcket scheduling, nd trffic policing) we lredy described enble QoS services in ech device. However, coordintion between devices is essentil to deliver end-to-end QoS services. reservtion signling mechnisms inform the network entities on the QoS requirements of the multimedi pplictions using the network resources. The network devices will use this informtion to mnge the network resources (i.e., bndwidth) in order to ccommodte such requirements. The network devices control the network resources nd provide QoS services by configuring the trffic hndling mechnisms. reservtion cn be pplied to individul flows or ggregted flows. reservtion closely coopertes with the dmission control mechnisms tht will be described in lter section. Figure 3.12 shows schemtic digrm tht describes the coordintion between these mechnisms. The resource reservtion mechnisms include the following functions: Provision of resource reservtion signling tht notifies ll devices long the communiction pth on the multimedi pplictions QoS requirements. Delivery of QoS requirements to the dmission control mechnism tht decides if there re vilble resources to meet the new request QoS requirements. Notifiction of the ppliction regrding the dmission result. Reservtion Protocol (RSVP) is well-known resource reservtion signling mechnism. RSVP opertes on top of IP, in the trnsport lyer, so it is comptible with the current TCP/IP bsed mechnisms (i.e., IPv4, IP routing protocol, nd IP multicst mechnism) nd cn run cross multiple networks. RSVP s min functionlity is to exchnge QoS requirement informtion mong the source host, the destintion host, nd intermedite devices. Using this informtion, ech network device will reserve the proper resources nd configure its trffic hndling mechnisms in order to provide the required QoS service. Once the reservtion process is complete, the sender host is llowed to trnsmit dt with n greed trffic profile. If device or network element on the communiction pth does not hve enough resources to ccommodte the trffic, the network element will notify the ppliction tht the network cnnot support this QoS requirement. In order to chieve end-to-end resource reservtion, ll the network elements long

16 54 Chpter 3 QoS Mechnisms Sender Host Intermedite Host Intermedite Host Receiver Host Appliction Appliction Reservtion Reservtion Reservtion Reservtion Admission Control Admission Control Trffic Hndling Trffic Hndling Trffic Hndling Trffic Hndling Signling Flow Figure 3.12 Reservtion Mechnism the pth (source host, destintion host, nd routers) need to be RSVP-enbled. Originlly, RSVP ws designed for supporting per-flow reservtion. Currently it is extended to support per-ggregte reservtion. 3.7 Admission Control Admission control is the mechnism tht mkes the decision whether to llow new session to join the network. This mechnism will ensure tht existing sessions QoS will not be degrded nd the new session will be provided QoS support. If there re not enough network resources to ccommodte the new sessions, the dmission control mechnism my either reject the new session or dmit the session while notifying the user tht the network cnnot provide the required QoS. Admission control nd resource reservtion signling mechnisms closely cooperte with ech other. Both re implemented in the sme device. There re two dmission control pproches: Explicit dmission control: This pproch is bsed on explicit resource reservtion. Applictions will send the request to join the network through the resource reservtion signling mechnism. The request tht contins QoS prmeters is forwrded to the dmission control mechnism. The dmission control mechnism decides to ccept or reject the ppliction bsed on the ppliction s QoS requirements, vilble resources, performnce criteri, nd network policy. Implicit dmission control: There is no explicit resource reservtion signling. The dmission control mechnism relies on bndwidth over-provisioning nd trffic control (i.e., trffic policing). The loction of the dmission control mechnism depends on the network rchitecture. For exmple, in cse we hve wide re network such s high-speed bckbone tht consists of number of interconnected routers, the dmission control mechnism is implemented on ech router. In shred medi networks, such s wireless networks, there is designted entity in the

17 QoS Architecture 55 network (e.g., sttion, ccess point, gtewy, bse sttion) tht hosts the dmission control gent. This gent is in chrge of mking dmission control decisions for the entire wireless network. This concept is similr to the SBM (subnet bndwidth mnger) which serves s the dmission control gent in 802 networks. In d hoc wireless networks, the dmission control functionlity cn be distributed mong ll hosts. In infrstructure wireless networks where ll communiction psses through the ccess point or bse sttion, the dmission control functionlity cn be implemented in the ccess point or bse sttion. 3.8 QoS Architecture This section shows how ll the QoS mechnisms described in the previous subsections re working together to provide QoS support. Different pplictions tht co-exist in the sme network my require different combintions of QoS mechnisms such s: Applictions with quntittive QoS requirements: These pplictions mostly require QoS gurnteed services. Therefore, explicit resource reservtion nd dmission control re needed. They lso require strict trffic control (trffic policing, pcket scheduling, nd chnnel ccess). Applictions with qulittive QoS requirements: These pplictions require high QoS levels but do not provide quntittive QoS requirements. In this cse we cn use resource reservtion nd dmission control. They lso require trffic hndling which delivers differentited services. Best effort: There is no need for QoS gurntees. The network should reserve bndwidth for such services. The mount of reserved bndwidth for best effort trffic is determined by the network policy. The QoS rchitecture which contins different QoS mechnisms is different for ech network topology. We will focus on the QoS rchitecture for d hoc nd infrstructure wireless networks QoS Architecture for Infrstructure Wireless Networks In infrstructure wireless networks, there re two types of sttions: end sttions (hosts) nd centrl sttion (i.e., ccess point, bse sttion). The centrl sttion regultes ll the communiction in the network tht is, there is no peer-to-peer communiction tht occurs directly between the hosts. The trffic from source host is sent to the centrl sttion nd then the centrl sttion forwrds the trffic to the destintion host. All trffic hndling (clssifiction, trffic policing, pcket scheduling, nd chnnel ccess) nd resource reservtion mechnisms reside in ll sttions (end hosts nd centrl sttion). In ddition, the centrl sttion lso includes n dmission control mechnism. Figure 3.13 shows QoS rchitecture for n infrstructure wireless network. There re some vritions in the signling mechnisms tht configure the trffic hndling mechnisms in ech sttion. We will point out these differences in ech wireless technology chpter.

18 56 Chpter 3 QoS Mechnisms End Host Appliction Access Point or Bse Sttion End Host Appliction fic r T t D Reservtion Reservtion Admission Control Reservtion fic r T t D Clssifiction Clssifiction Clssifiction Trffic Policing Trffic Policing Trffic Policing Scheduling Scheduling Scheduling Chnnel Access Chnnel Access Chnnel Access Wireless Medium Signling Flow Dt Flow Figure 3.13 QoS Architecture of n Infrstructure Wireless Network QoS Architecture For Ad Hoc Wireless Networks All hosts estblish peer-to-peer communiction in the shred wireless medi environment. All trffic hndling nd resource reservtion mechnisms reside in ll hosts. One of the hosts (either dedicted or regulr end host) will be designted to serve s n dmission control gent (i.e., designted SBM [DSBM]). Figure 3.14 shows QoS rchitecture for n d hoc wireless network.

19 QoS Architecture 57 End Host Appliction Designted SBM Appliction End Host Appliction fic tr t D Reservtion Reservtion Admission Control fic tr t D Reservtion fic tr t D Clssifiction Clssifiction Clssifiction Trffic Policing Trffic Policing Trffic Policing Scheduling Scheduling Scheduling Chnnel Access Chnnel Access Chnnel Access Wireless Medium Signling Flow Dt Flow Figure 3.14 QoS Architecture for n Ad Hoc Wireless Network

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

Dynamic TDMA Slot Assignment in Ad Hoc Networks

Dynamic TDMA Slot Assignment in Ad Hoc Networks Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Traffic Rank Based QoS Routing in Wireless Mesh Network

Traffic Rank Based QoS Routing in Wireless Mesh Network Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

A Network Management System for Power-Line Communications and its Verification by Simulation

A Network Management System for Power-Line Communications and its Verification by Simulation A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

How To Improve Network Performance

How To Improve Network Performance Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19

Kofax Reporting. Administrator's Guide 2.0.0 2013-09-19 Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE

More information

Performance Prediction of Distributed Load Balancing on Multicomputer Systems

Performance Prediction of Distributed Load Balancing on Multicomputer Systems Performnce Prediction of Distributed Lod Blncing on Multicomputer Systems Ishfq Ahmd *, Arif Ghfoor+, nd Kishn Mehrotr * * School of Computer nd Informtion Science, Syrcuse University, Syrcuse, NY 13244

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.16 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING

PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.16 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.6 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING Sid EL KAFHALI Abdelli EL BOUCHTI Mohmed HANINI nd Abdelkrim HAQIQ Computer, Networks, Mobility

More information

COMPONENTS: COMBINED LOADING

COMPONENTS: COMBINED LOADING LECTURE COMPONENTS: COMBINED LOADING Third Edition A. J. Clrk School of Engineering Deprtment of Civil nd Environmentl Engineering 24 Chpter 8.4 by Dr. Ibrhim A. Asskkf SPRING 2003 ENES 220 Mechnics of

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

How To Make A Network More Efficient

How To Make A Network More Efficient Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu

More information

Application Bundles & Data Plans

Application Bundles & Data Plans Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help

More information

Rotating DC Motors Part II

Rotating DC Motors Part II Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

Discovering General Logical Network Topologies

Discovering General Logical Network Topologies Discovering Generl Logicl Network Topologies Mrk otes McGill University, Montrel, Quebec Emil: cotes@ece.mcgill.c Michel Rbbt nd Robert Nowk Rice University, Houston, TX Emil: {rbbt, nowk}@rice.edu Technicl

More information

QoS Framework for SIP Signalling

QoS Framework for SIP Signalling QoS Frmework for SIP Signlling Alexnder A. Kist nd Richrd J. Hrris RMIT University Melourne BOX 2476V, Victori 3001, Austrli Emil: kist@ieee.org, richrd@ctt.rmit.edu.u ABSTRACT The Session Initition Protocol

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University

FAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k

SyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce

More information

Understanding Basic Analog Ideal Op Amps

Understanding Basic Analog Ideal Op Amps Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).

More information

Goals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing?

Goals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing? Gols of Routing Protocols 10: Inter nd intr AS, RIP, OSPF, GP, Router Architecture Lst Modified: 3/24/2003 2:39:16 PM Find the optiml route Rpid Convergence Robustness Configurble to respond to chnges

More information

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist

Test Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

SCRIBE: A large-scale and decentralized application-level multicast infrastructure

SCRIBE: A large-scale and decentralized application-level multicast infrastructure !! IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 2, NO. 8, OCTOBER 22 1 SCRIBE: A lrge-scle nd decentrlized ppliction-level multicst infrstructure Miguel Cstro, Peter Druschel, Anne-Mrie Kermrrec

More information

Week 7 - Perfect Competition and Monopoly

Week 7 - Perfect Competition and Monopoly Week 7 - Perfect Competition nd Monopoly Our im here is to compre the industry-wide response to chnges in demnd nd costs by monopolized industry nd by perfectly competitive one. We distinguish between

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge

More information

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT

COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Bandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput

Bandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput Bndwidth Alloction for Best Effort Trffic to Achieve 100% Throughput Msoumeh Krimi, Zhuo Sun, nd Deng Pn Florid Interntionl University, Mimi, FL E-mils: {mkri001, zsun003, pnd}@fiu.edu Abstrct Generlized

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

piecewise Liner SLAs and Performance Timetagment

piecewise Liner SLAs and Performance Timetagment i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.

More information

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones

Wireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones Wireless Wkeups Revisited: Energy Mngement for VoIP over Wi-Fi Smrtphones Yuvrj Agrwl, Rnveer Chndr,AlecWolmn, Prmvir Bhl, Kevin Chin, Rjesh Gupt Microsoft Reserch, Microsoft Corportion, University of

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

IaaS Configuration for Virtual Platforms

IaaS Configuration for Virtual Platforms IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To

More information

How To Study The Effects Of Music Composition On Children

How To Study The Effects Of Music Composition On Children C-crcs Cognitive - Counselling Reserch & Conference Services (eissn: 2301-2358) Volume I Effects of Music Composition Intervention on Elementry School Children b M. Hogenes, B. Vn Oers, R. F. W. Diekstr,

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Project 6 Aircraft static stability and control

Project 6 Aircraft static stability and control Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The

More information

Distributions. (corresponding to the cumulative distribution function for the discrete case).

Distributions. (corresponding to the cumulative distribution function for the discrete case). Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

The LENA TM Language Environment Analysis System:

The LENA TM Language Environment Analysis System: FOUNDATION The LENA TM Lnguge Environment Anlysis System: Audio Specifictions of the DLP-0121 Michel Ford, Chrles T. Ber, Dongxin Xu, Umit Ypnel, Shrmi Gry LENA Foundtion, Boulder, CO LTR-03-2 September

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

Innovative and applied research on big data platforms of smart heritage

Innovative and applied research on big data platforms of smart heritage Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge

More information

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Facilitating Rapid Analysis and Decision Making in the Analytical Lab. Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information