QoS Mechanisms C HAPTER Introduction. 3.2 Classification
|
|
- Gervais Armstrong
- 8 years ago
- Views:
Transcription
1 C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of this chpter, we provide generl frmework for nlyzing the QoS support of ech wireless technology presented in the rest of this book. QoS mechnisms cn be ctegorized into two groups bsed on how the ppliction trffic is treted: 1) trffic hndling mechnisms, nd 2) bndwidth mngement mechnisms (see Figure 3.1). Trffic hndling mechnisms (sometimes clled In-trffic mechnisms) re mechnisms tht clssify, hndle, police, nd monitor the trffic cross the network. The min mechnisms re: 1) clssifiction, 2) chnnel ccess, 3) pcket scheduling, nd 4) trffic policing. Bndwidth mngement mechnisms (sometimes clled Out-of-trffic mechnisms) re mechnisms tht mnge the network resources (e.g., bndwidth) by coordinting nd configuring network devices (i.e., hosts, bse sttions, ccess points) trffic hndling mechnisms. The min mechnisms re: 1) resource reservtion signling nd 2) dmission control. 3.2 Clssifiction The lowest service level tht network cn provide is best effort service, which does not provide QoS support. In best effort service, ll trffic is hndled eqully regrdless of the ppliction or host tht generted the trffic. However, some pplictions need QoS support, requiring better thn best effort service such s differentited or gurnteed service. For network to provide selective services to certin pplictions, first of ll, the network requires clssifiction mechnism tht cn differentite between the different pplictions. The clssifiction mechnism identifies nd seprtes different trffic into flows or groups of flows (ggregted flows or clsses). Therefore, ech flow or ech ggregted flow cn be hndled selectively. 39
2 40 Chpter 3 QoS Mechnisms Wireless Network QoS Mechnisms Trffic Hndling Mechnisms - Clssifiction - Chnnel Access - Scheduling - Trffic Policing Bndwidth Mngement Mechnisms - Reservtion - Admission Control Host Host Intermedite Devices (i.e., ccess point, bse sttion, stellite) Figure 3.1 QoS Mechnisms in Wireless Network The clssifiction mechnism cn be implemented in different network devices (i.e., end hosts, intermedite devices such s switches, routers, ccess points). Figure 3.2 shows simplified digrm of clssifiction module tht resides on n end host nd on n intermedited device. End Host Applictions Clssifiction Dt Trffic Incoming Trffic (from other hosts) Intermedite Device Clssifiction Scheduler Scheduler Dt s Dt s Figure 3.2 Clssifiction
3 Clssifiction 41 Appliction trffic (t the end host) or incoming trffic from other hosts (t the intermedite device) is identified by the clssifiction mechnism nd is forwrded to the pproprite queue witing service from other mechnisms such s the pcket scheduler. The grnulrity level of the clssifiction mechnism cn be per-user, per-flow, or per-clss depending on the type of QoS services provided. For exmple, per-flow QoS service requires per-flow clssifiction while per-clss QoS service requires per-clss clssifiction. To identify nd clssify the trffic, the trffic clssifiction mechnism requires some form of tgging or mrking of pckets. There re number of trffic clssifiction pproches. Some of pproches re suitble for end hosts nd some for intermedite hosts. Figure 3.3 shows n exmple of some trffic clssifiction pproches which re implemented in the different Open System Interconnection (OSI) lyers. OSI Lyer Clssifiction Techniques Appliction User/Appliction Identifiction Trnsport Flow (5-tuplet IP Address) Network IPTOS, DSCP Dt Link 802.1p/Q Clssifiction Physicl Lyer Figure 3.3 Exmples of Existing Clssifiction on Ech OSI Lyer Dt Link Lyer Clssifiction Dt link lyer, or Lyer 2, clssifies the trffic bsed on the tg or field vilble in Lyer 2 heder. An exmple of Lyer 2 clssifiction is IEEE (Institute of Electricl nd Electronics Engineers) 802 user priority. The IEEE 802 heder includes 3-bit priority field tht enbles eight priority clsses. It ims to support service differentition on Lyer 2 network such s LAN. The end host or intermedite host ssocites ppliction trffic with clss (bsed on the Policy, or the service tht the ppliction expects to receive) nd tgs the pckets priority field in the IEEE 802 heder. A clssifiction mechnism identifies pckets by exmining the priority field of the IEEE 802 heder nd forwrds the pckets to the pproprited queues. IEEE recommends mpping the priority vlue nd the corresponding service s shown in Tble 3.1.
4 42 Chpter 3 QoS Mechnisms Tble 3.1 Exmple of Mpping between Priority nd Services Priority Service 0 Defult, ssumed to be best effort service 1 Less thn best effort service 2 Reserved 3 Reserved 4 Dely sensitive, no bound 5 Dely sensitive, 100ms bound 6 Dely sensitive, 10ms bound 7 Network control Network Lyer Clssifiction Network lyer, or Lyer 3 clssifiction, clssifies pckets using Lyer 3 heder. Lyer 3 clssifiction enbles service differentition in Lyer 3 network. An exmple of Lyer 3 clssifiction is IPTOS (Internet protocol type of service), DSCP (Internet protocol differentil service code point). IPv4 nd IPv6 stndrd defined prioritiztion field in the IP heder which cn be used for Lyer 3 clssifiction. RFC 1349 defined TOS field in IPv4 heder. The type of service field consists of 3-bit precedence subfield, 4-bit TOS subfield, nd the finl bit which is unused nd is set to be 0. The 4-bit TOS subfield enbles 16 clsses of service. In IPv6 heder there is n 8-bit clss of service field (see Figure 3.4). Lter the Internet Engineering Tsk Force (IETF) differentited services working group redefined IPv4 IPTOS to be DSCP, which is shown in Figure 3.4. DSCP hs 6-bit field enbling 64 clsses of service.
5 Clssifiction 43 6-bit DSCP Unused DSCP bit Precedence 4-bit TOS 0 IPTOS bit 4-bit heder 8-bit TOS 16-bit totl length (in bytes) version length 16-bit identifiction 3-bit flg 13-bit frngment offset 8-bit TTL (Time To Live) 8-bit Protocol 16-bit heder checksum 32-bit source IP ddress 32-bit destintion IP ddress DATA IPv4 Heder bit 8-bit trffic clss Flow lbel version Pylod length Next Heder Hop limit Pylod length Pylod length IPv6 Heder Figure 3.4 Structure of IPTOS nd DSCP in IPv4 nd IPv Trnsport Lyer Clssifiction (5-tuplet IP Heder) A 5-tuplet IP heder (source IP, destintion IP, source port, destintion port, nd protocol IP) cn be used for trnsport lyer clssifiction. A 5-tuplet IP heder cn uniquely identify the individul ppliction or flow. This clssifiction provides the finest grnulrity nd supports per-flow QoS service. However, the 5-tuplet IP heder clssifiction hs some limittions: It is suitble for edge networks, but it is not suitble for core networks tht crry very lrge mounts of trffic. Mintining queues for ech individul flow cn be n overwhelming tsk.
6 44 Chpter 3 QoS Mechnisms If the trffic psses through firewll tht uses NAT (network ddress trnsltion), the rel IP ddress (i.e., the IP ddress of the trffic source) is hidden from networks outside the firewll. Therefore, the 5-tuplet IP heder exposed to network outside the firewll cnnot uniquely identify the ppliction Appliction or User Clssifiction The ppliction or user cn be uniquely identified by using user/ppliction identifiction (ID). The ID ssignment my be sttic (i.e., the policy or the contrct) or dynmic (i.e., connection signling). For the connection signling, there is centrl sttion or entity in the network tht is responsible for mking the decision whether to llow new session to join the network. First, the ppliction or user sends the connection request to the centrl sttion. Then, if the new connection is dmitted, it will be ssigned unique ID number. s from the ppliction will be ssocited with n ID number. 3.3 Chnnel Access Mechnism In wireless networks, ll hosts communicte through shred wireless medium. When multiple hosts try to trnsmit pckets on the shred communiction chnnel, collisions cn occur. Therefore, wireless networks need chnnel ccess mechnism which controls the ccess to the shred chnnel. There re two types of chnnel ccess mechnisms: 1) collision-bsed chnnel ccess nd 2) collision-free chnnel ccess. Ech type of chnnel ccess mechnism cn provide different QoS services Collision-Bsed Chnnel Access Collision-bsed chnnel ccess is distributed chnnel ccess method tht provides mechnisms to void collisions nd to resolve collisions in cse they occur. A clssic collision-bsed chnnel ccess mechnism developed for wired LANs nd implemented in Ethernet is CSMA/CD (Crrier Sense Multiple Access with Collision Detection). In collision-bsed chnnel ccess schemes, collisions cn occur leding to the need for retrnsmissions. The collision probbility depends on the number of ctive (with pckets for trnsmission) users in the network. High trffic lod increses the number of collisions nd retrnsmissions, incresing the dely. Since we del with stochstic trffic, the number of collisions nd re-trnsmissions is rndom s well, leding to n unbound dely. Therefore, collision-bsed chnnel ccess schemes cn provide best effort service. All hosts in the network receive equl bndwidth nd experience the sme unbounded dely. The service level cn be improved by: Over-provisioning, whereby ll trffic will receive mple of bndwidth nd experience low dely.
7 Chnnel Access Mechnism 45 Adding priority scheme in the collision-bsed chnnel ccess tht is, using different sized bckoff windows for different priority clsses. This will enble the provision of differentited services. An exmple of such solution is described in the proposed IEEE e (Chpter 4). Existing solutions in wireless networks such s IEEE DCF, HomeRF use collision-bsed chnnel ccess protocols similr to Ethernet CSMA/CD, denoted s CSMA/CA where CA stnds for Collision Avoidnce Collision-Free Chnnel Access In collision-free chnnel ccess mechnism the chnnel is rbitrted such tht no collisions cn occur. Only one host is llowed to trnsmit pckets to the chnnel t ny given time. Collision, therefore, will not occur. Exmples of collision-free chnnel ccess techniques re polling nd TDMA (Time Division Multiple Access) Polling A host in the network, or specilized network device such s n Access Point or Bse Sttion, is designted s the poller, which controls ll ccess to the wireless chnnel by the other hosts denoted s pollees. Pollees re not llowed to trnsmit pckets unless they receive polling pcket from the poller. Thus, there is no collision. Some pollees my receive the poll more often thn others. The polling frequency (the number of polls in period of time) reflects the bndwidth lloction. A poller cn dynmiclly llocte bndwidth to pollees by djusting the polling frequency dynmiclly TDMA (Time Division Multiple Access) A TDMA scheme divides the chnnel ccess opportunity into frmes nd ech frme is divided into time slots. A host is llowed to trnsmit pckets in predefined time slot, s shown in Figure 3.5. The number of time slots ssigned to host per frme reflects the bndwidth llocted for the host. This technique requires mster host tht is designted to mnge the time slot ssignment for ll the hosts in the network. This Mster host determines the number of time slots tht ech host will be llowed to trnsmit nd notifies the hosts using some signling mechnism. There re number of time slot ssignment philosophies: Sttic time slot ssignment: Ech host receives fixed time slot ssignment which cn be provided during the connection setup. Dynmic time slot ssignment: The time slot ssignment chnges dynmiclly during the lifetime of the session s function of the trffic lod, ppliction QoS requirements, nd chnnel conditions. This slot ssignment policy is more flexible nd leds to better chnnel utiliztion. However, it leds to signling overhed required to communicte the slot ssignment chnges to the different hosts.
8 46 Chpter 3 QoS Mechnisms Host Trnsmit pckets in ssigned time slots Host Time Slot Frme i Frme i+1 Figure 3.5 Time Division Multiple Access (TDMA) Scheme Collision-free chnnel ccess schemes provide tight chnnel ccess control tht cn provide tight dely bound. Therefore, these schemes re good cndidtes for QoS provision to pplictions with strict QoS requirements. 3.4 Scheduling Mechnisms scheduling is the mechnism tht selects pcket for trnsmission from the pckets witing in the trnsmission queue. It decides which pcket from which queue nd sttion re scheduled for trnsmission in certin period of time. scheduling controls bndwidth lloction to sttions, clsses, nd pplictions. As shown in Figure 3.6, there re two levels of pcket scheduling mechnisms: 1. Intrsttion pcket scheduling: The pcket scheduling mechnism tht retrieves pcket from queue within the sme host. 2. Intersttion pcket scheduling: The pcket scheduling mechnism tht retrieves pcket from queue from different hosts. scheduling cn be implemented using hierrchicl or flt pproches. Hierrchicl pcket scheduling: Bndwidth is llocted to sttions tht is, ech sttion is llowed to trnsmit t certin period of time. The mount of bndwidth ssigned to ech sttion is controlled by intersttion policy nd module. When sttion receives the opportunity to trnsmit, the intrsttion pcket scheduling module will decide which pckets to trnsmit. This pproch is sclble becuse intersttion pcket scheduling mintins the stte by sttion (not by connection or ppliction). Overll bndwidth is llocted bsed on sttions (in fct, they cn be groups, deprtments, or compnies). Then, sttions will hve the uthority to mnge or llocte their own bndwidth portion to pplictions or clsses within the host.
9 Scheduling Mechnisms 47 End Host Intermedite Host Scheduler Intrsttion pcket scheduling (determining pckets from which queue re llowed to be trnsmited) Scheduler Network Intersttion pcket scheduling (determining pckets from which sttion re llowed to be trnsmited) Figure 3.6 Scheduling Flt pcket scheduling: scheduling is bsed on ll queues of ll sttions. Ech queue receives individul service from the network. scheduling mechnism dels with how to retrieve pckets from queues, which is quite similr to queuing mechnism. Since in intrsttion pcket scheduling the sttus of ech queue in sttion is known, the intrsttion pcket scheduling mechnism is virtully identicl to queuing mechnism. Intersttion pcket scheduling mechnism is slightly different from queuing mechnism becuse queues re distributed mong hosts nd there is no centrl knowledge of the sttus of ech queue. Therefore, some intersttion pcket scheduling mechnisms require signling procedure to coordinte the scheduling mong hosts. Becuse of the similrities between pcket scheduling nd queuing mechnisms we introduce number of queuing schemes (First In First Out [FIFO], Strict Priority, nd Weight Fir [WFQ]) nd briefly discuss how they support QoS services First In First Out (FIFO) First In First Out (FIFO) is the simplest queuing mechnism. All pckets re inserted to the til of single queue. s re scheduled in order of their rrivl. Figure 3.7 shows FIFO pcket scheduling.
10 48 Chpter 3 QoS Mechnisms End Host App. App. App. App. First In First Out (FIFO) Scheduling Figure 3.7 FIFO Scheduling FIFO provides best effort service tht is, it does not provide service differentition in terms of bndwidth nd dely. The high bndwidth flows will get lrger bndwidth portion thn the low bndwidth flows. In generl, ll flows will experience the sme verge dely. If flow increses its bndwidth ggressively, other flows will be ffected by getting less bndwidth, cusing incresed verge pcket dely for ll flows. It is possible to improve QoS support by dding 1) trffic policing to limit the rte of ech flow nd 2) dmission control Strict Priority s re ssigned priority order. Strict priority pcket scheduling schedules pckets bsed on the ssigned priority order. s in higher priority queues lwys trnsmit before pckets in lower priority queues. A lower priority queue hs chnce to trnsmit pckets only when there re no pckets witing in higher priority queue. Figure 3.8 illustrtes the strict priority pcket scheduling mechnism. Strict priority provides differentited services (reltive services) in both bndwidth nd dely. The highest priority queue lwys receives bndwidth (up to the totl bndwidth) nd the lower priority queues receive the remining bndwidth. Therefore, higher priority queues lwys experience lower dely thn the lower priority queues. Aggressive bndwidth spending by the high priority queues cn strve the low priority queues. Agin, it is possible to improve the QoS support by dding 1) trffic policing to limit the rte of ech flow nd 2) dmission control.
11 Scheduling Mechnisms 49 End Host High Priority Low Priority Scheduler Strict Priority Scheduling Figure 3.8 Strict Priority Scheduling Weight Fir (WFQ) Weight Fir schedules pckets bsed on the weight rtio of ech queue. Weight, w i, is ssigned to ech queue i ccording to the network policy. For exmple, there re three queues A, B, C with weights w 1, w 2, w 3, respectively. s A, B, nd C receive the following rtios of vilble bndwidth: w 1 /(w 1 +w 2 +w 3 ), w 2 /(w 1 +w 2 +w 3 ), nd w 3 /(w 1 +w 2 +w 3 ), respectively, s shown in Figure 3.9. Host w 3 w 1 w 2 A B C w 2 /s w 1 /s w 3 /s Weight Weight Fir Scheduler s = w 1 +w 2 +w 3 Figure 3.9 Weight Fir Scheduling
12 50 Chpter 3 QoS Mechnisms Bndwidth buse from specific queue will not ffect other queues. WFQ cn provide the required bndwidth nd the dely performnce is directly relted to the llocted bndwidth. A queue with high bndwidth lloction (lrge weight) will experience lower dely. This my led to some mismtch between the bndwidth nd dely requirements. Some pplictions my require low bndwidth nd low dely. In this cse WFQ will llocte high bndwidth to these pplictions in order to gurntee the low dely bound. Some pplictions my require high bndwidth nd high dely. WFQ still hs to llocte high bndwidth in order for the pplictions to operte. Of course, pplictions will stisfy the dely but sometimes fr beyond their needs. This mismtch cn led to low bndwidth utiliztion. However, in rel life, WFQ mostly schedules pckets tht belong to ggregted flows, groups, nd clsses (insted of individul flows) where the gol is to provide link shring mong groups. In this cse dely is of less concern. The elementry queuing mechnisms introduced bove will be the bsis of number of pcket scheduling vritions. Before we move our discussion to the next QoS mechnisms, it is worth mentioning tht in some implementtions the chnnel ccess mechnism nd pcket scheduling mechnism re not mutully exclusive. There is some overlp between these two mechnisms nd sometimes they re blended into one solution. When we discuss QoS support of ech wireless technology in lter chpters, in some cses, we will discuss both mechnisms together. 3.5 Trffic Policing Mechnism Trffic policing is the mechnism tht monitors the dmitted sessions trffic so tht the sessions do not violte their QoS contrct. The trffic policing mechnism mkes sure tht ll trffic tht psses through it will conform to greed trffic prmeters. When violtion is found (e.g., more trffic is sent thn ws initilly greed upon in the QoS contrct), trffic policing mechnism is enforced by shping the trffic. Becuse trffic policing shpes the trffic bsed on some known quntittive trffic prmeters, multimedi (rel-time) pplictions re nturlly comptible to trffic policing. Most multimedi ppliction trffic (voice, video) is generted by stndrd codec which generlly provides certin knowledge of the quntittive trffic prmeters. Trffic policing cn be pplied to individul multimedi flows. Non-rel-time trffic does not provide quntittive trffic prmeters nd usully demnds bndwidth s much s possible. Therefore, trffic policing enforces non-rel-time trffic (i.e., limits the bndwidth) bsed on the network policy. Such policing is usully enforced on ggregted non-rel-time flows. Trffic policing cn be implemented on end hosts or intermedite hosts. Exmples of trffic policing mechnisms include the leky bucket nd the token bucket Leky Bucket The leky bucket mechnism is usully used to smooth the burstiness of the trffic by limiting the trffic pek rte nd the mximum burst size. This mechnism, s its nme describes, uses the nlogy of leky bucket to describe the trffic policing scheme. The bucket s prmeters such s its size nd the hole s size re nlogous to the trffic policing prmeters such s the
13 Trffic Policing Mechnism 51 (A) (B) (C) Rte R < r Rte R > r Rte R > r Bucket is empty Bucket rte r b Bucket is not empty, but not full Bucket is full Non-conformnt trffic - either dropped or sent s best effort trffic Rte R Rte r Rte r Figure 3.10 Leky Bucket Mechnism mximum burst size nd mximum rte, respectively. The leky bucket shpes the trffic with mximum rte of up to the bucket rte. The bucket size determines the mximum burst size before the leky bucket strts to drop pckets. The mechnism works in the following wy. The rriving pckets re inserted t the top of the bucket. At the bottom of the bucket, there is hole through which trffic cn lek out t mximum rte of r bytes per second. The bucket size is b bytes (i.e., the bucket cn hold t most b bytes). Let us follow the leky bucket opertion by observing the exmple shown in Figure We ssume first tht the bucket is empty. Figure 3.10 (A): Incoming trffic with rte R which is less thn the bucket rte r. The outgoing trffic rte is equl to R. In this cse when we strt with n empty bucket, the burstiness of the incoming trffic is the sme s the burstiness of the outgoing trffic s long s R < r. Figure 3.10 (B): Incoming trffic with rte R which is greter thn the bucket rte r. The outgoing trffic rte is equl to r (bucket rte). Figure 3.10 (C): Sme s (B) but the bucket is full. Non-conformnt trffic is either dropped or sent s best effort trffic Token Bucket The token bucket mechnism is lmost the sme s the leky bucket mechnism but it preserves the burstiness of the trffic. The token bucket of size b bytes is filled with tokens t rte r (bytes per second). When pcket rrives, it retrieves token from the token bucket (given such token is vilble) nd the pcket is sent to the outgoing trffic strem. As long s there re
14 52 Chpter 3 QoS Mechnisms (A) Token rte r b Token drined out with rte R Incoming trffic rte R < r Outgoing trffic rte R (B) Token rte r b Token drined out with rte R Incoming trffic rte R > r Outgoing trffic rte R (C) Token rte r b Bucket is empty Token drined out with rte r Incoming trffic rte R > r Outgoing trffic rte r Figure 3.11 Token Bucket Mechnism tokens in the token bucket, the outgoing trffic rte nd pttern will be the sme s the incoming trffic rte nd pttern. If the token bucket is empty, incoming pckets hve to wit until there re tokens vilble in the bucket, nd then they continue to send. Figure 3.11 shows n exmple of the token bucket mechnism. Figure 3.11 (A): The incoming trffic rte is less thn the token rrivl rte. In this cse the outgoing trffic rte is equl to the incoming trffic rte. Figure 3.11 (B): The incoming trffic rte is greter thn the token rrivl rte. In cse there re still tokens in the bucket, the outgoing trffic rte is equl to the incoming trffic rte. Figure 3.11 (C): If the incoming trffic rte is still greter thn the token rrivl rte (e.g., long trffic burst), eventully ll the tokens will be exhusted. In this cse the incoming trffic hs to wit for the new tokens to rrive in order to be ble to send out. Therefore, the outgoing trffic is limited t the token rrivl rte.
15 Reservtion Signling Mechnisms 53 The token bucket preserves the burstiness of the trffic up to the mximum burst size. The outgoing trffic will mintin mximum verge rte equl to the token rte, r. Therefore, the token bucket is used to control the verge rte of the trffic. In prcticl trffic policing, we use combintion of the token bucket nd leky bucket mechnisms connected in series (token bucket, then leky bucket). The token bucket enforces the verge dt rte to be bound to token bucket rte while the leky bucket (p) enforces the pek dt rte to be bound to leky bucket rte. Trffic policing, in coopertion with other QoS mechnisms, enbles QoS support. 3.6 Reservtion Signling Mechnisms The trffic hndling mechnisms (clssifiction, chnnel ccess, pcket scheduling, nd trffic policing) we lredy described enble QoS services in ech device. However, coordintion between devices is essentil to deliver end-to-end QoS services. reservtion signling mechnisms inform the network entities on the QoS requirements of the multimedi pplictions using the network resources. The network devices will use this informtion to mnge the network resources (i.e., bndwidth) in order to ccommodte such requirements. The network devices control the network resources nd provide QoS services by configuring the trffic hndling mechnisms. reservtion cn be pplied to individul flows or ggregted flows. reservtion closely coopertes with the dmission control mechnisms tht will be described in lter section. Figure 3.12 shows schemtic digrm tht describes the coordintion between these mechnisms. The resource reservtion mechnisms include the following functions: Provision of resource reservtion signling tht notifies ll devices long the communiction pth on the multimedi pplictions QoS requirements. Delivery of QoS requirements to the dmission control mechnism tht decides if there re vilble resources to meet the new request QoS requirements. Notifiction of the ppliction regrding the dmission result. Reservtion Protocol (RSVP) is well-known resource reservtion signling mechnism. RSVP opertes on top of IP, in the trnsport lyer, so it is comptible with the current TCP/IP bsed mechnisms (i.e., IPv4, IP routing protocol, nd IP multicst mechnism) nd cn run cross multiple networks. RSVP s min functionlity is to exchnge QoS requirement informtion mong the source host, the destintion host, nd intermedite devices. Using this informtion, ech network device will reserve the proper resources nd configure its trffic hndling mechnisms in order to provide the required QoS service. Once the reservtion process is complete, the sender host is llowed to trnsmit dt with n greed trffic profile. If device or network element on the communiction pth does not hve enough resources to ccommodte the trffic, the network element will notify the ppliction tht the network cnnot support this QoS requirement. In order to chieve end-to-end resource reservtion, ll the network elements long
16 54 Chpter 3 QoS Mechnisms Sender Host Intermedite Host Intermedite Host Receiver Host Appliction Appliction Reservtion Reservtion Reservtion Reservtion Admission Control Admission Control Trffic Hndling Trffic Hndling Trffic Hndling Trffic Hndling Signling Flow Figure 3.12 Reservtion Mechnism the pth (source host, destintion host, nd routers) need to be RSVP-enbled. Originlly, RSVP ws designed for supporting per-flow reservtion. Currently it is extended to support per-ggregte reservtion. 3.7 Admission Control Admission control is the mechnism tht mkes the decision whether to llow new session to join the network. This mechnism will ensure tht existing sessions QoS will not be degrded nd the new session will be provided QoS support. If there re not enough network resources to ccommodte the new sessions, the dmission control mechnism my either reject the new session or dmit the session while notifying the user tht the network cnnot provide the required QoS. Admission control nd resource reservtion signling mechnisms closely cooperte with ech other. Both re implemented in the sme device. There re two dmission control pproches: Explicit dmission control: This pproch is bsed on explicit resource reservtion. Applictions will send the request to join the network through the resource reservtion signling mechnism. The request tht contins QoS prmeters is forwrded to the dmission control mechnism. The dmission control mechnism decides to ccept or reject the ppliction bsed on the ppliction s QoS requirements, vilble resources, performnce criteri, nd network policy. Implicit dmission control: There is no explicit resource reservtion signling. The dmission control mechnism relies on bndwidth over-provisioning nd trffic control (i.e., trffic policing). The loction of the dmission control mechnism depends on the network rchitecture. For exmple, in cse we hve wide re network such s high-speed bckbone tht consists of number of interconnected routers, the dmission control mechnism is implemented on ech router. In shred medi networks, such s wireless networks, there is designted entity in the
17 QoS Architecture 55 network (e.g., sttion, ccess point, gtewy, bse sttion) tht hosts the dmission control gent. This gent is in chrge of mking dmission control decisions for the entire wireless network. This concept is similr to the SBM (subnet bndwidth mnger) which serves s the dmission control gent in 802 networks. In d hoc wireless networks, the dmission control functionlity cn be distributed mong ll hosts. In infrstructure wireless networks where ll communiction psses through the ccess point or bse sttion, the dmission control functionlity cn be implemented in the ccess point or bse sttion. 3.8 QoS Architecture This section shows how ll the QoS mechnisms described in the previous subsections re working together to provide QoS support. Different pplictions tht co-exist in the sme network my require different combintions of QoS mechnisms such s: Applictions with quntittive QoS requirements: These pplictions mostly require QoS gurnteed services. Therefore, explicit resource reservtion nd dmission control re needed. They lso require strict trffic control (trffic policing, pcket scheduling, nd chnnel ccess). Applictions with qulittive QoS requirements: These pplictions require high QoS levels but do not provide quntittive QoS requirements. In this cse we cn use resource reservtion nd dmission control. They lso require trffic hndling which delivers differentited services. Best effort: There is no need for QoS gurntees. The network should reserve bndwidth for such services. The mount of reserved bndwidth for best effort trffic is determined by the network policy. The QoS rchitecture which contins different QoS mechnisms is different for ech network topology. We will focus on the QoS rchitecture for d hoc nd infrstructure wireless networks QoS Architecture for Infrstructure Wireless Networks In infrstructure wireless networks, there re two types of sttions: end sttions (hosts) nd centrl sttion (i.e., ccess point, bse sttion). The centrl sttion regultes ll the communiction in the network tht is, there is no peer-to-peer communiction tht occurs directly between the hosts. The trffic from source host is sent to the centrl sttion nd then the centrl sttion forwrds the trffic to the destintion host. All trffic hndling (clssifiction, trffic policing, pcket scheduling, nd chnnel ccess) nd resource reservtion mechnisms reside in ll sttions (end hosts nd centrl sttion). In ddition, the centrl sttion lso includes n dmission control mechnism. Figure 3.13 shows QoS rchitecture for n infrstructure wireless network. There re some vritions in the signling mechnisms tht configure the trffic hndling mechnisms in ech sttion. We will point out these differences in ech wireless technology chpter.
18 56 Chpter 3 QoS Mechnisms End Host Appliction Access Point or Bse Sttion End Host Appliction fic r T t D Reservtion Reservtion Admission Control Reservtion fic r T t D Clssifiction Clssifiction Clssifiction Trffic Policing Trffic Policing Trffic Policing Scheduling Scheduling Scheduling Chnnel Access Chnnel Access Chnnel Access Wireless Medium Signling Flow Dt Flow Figure 3.13 QoS Architecture of n Infrstructure Wireless Network QoS Architecture For Ad Hoc Wireless Networks All hosts estblish peer-to-peer communiction in the shred wireless medi environment. All trffic hndling nd resource reservtion mechnisms reside in ll hosts. One of the hosts (either dedicted or regulr end host) will be designted to serve s n dmission control gent (i.e., designted SBM [DSBM]). Figure 3.14 shows QoS rchitecture for n d hoc wireless network.
19 QoS Architecture 57 End Host Appliction Designted SBM Appliction End Host Appliction fic tr t D Reservtion Reservtion Admission Control fic tr t D Reservtion fic tr t D Clssifiction Clssifiction Clssifiction Trffic Policing Trffic Policing Trffic Policing Scheduling Scheduling Scheduling Chnnel Access Chnnel Access Chnnel Access Wireless Medium Signling Flow Dt Flow Figure 3.14 QoS Architecture for n Ad Hoc Wireless Network
How To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationNetwork Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
More informationHow To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
More informationApplication-Level Traffic Monitoring and an Analysis on IP Networks
Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for
More informationT H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K
Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607
More informationDynamic TDMA Slot Assignment in Ad Hoc Networks
Dynmic TDMA Slot Assignment in Ad Hoc Networks Akimitsu KANZAKI, Toshiki UEMUKAI, Tkhiro HARA, Shojiro NISHIO Dept. of Multimedi Eng., Grd. Sch. of Informtion Science nd Technology, Osk Univ. Dept. of
More informationEfficient load-balancing routing for wireless mesh networks
Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,
More informationWEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER
Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationEcon 4721 Money and Banking Problem Set 2 Answer Key
Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in
More informationIntroducing Kashef for Application Monitoring
WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented
More information5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
More informationTraffic Rank Based QoS Routing in Wireless Mesh Network
Trffic Rnk Bsed QoS Routing in Wireless Mesh Network Deep P Kmble #1, Sujth P Terdl *2 #1 Deprtment of Computer Science nd Engineering, Poojy Doddp App College of Engineering, Gulbrg, Krntk, Indi. *2 Deprtment
More informationPolynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
More informationUnleashing the Power of Cloud
Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,
More informationDlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
More informationSection 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control
Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.
More informationGFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
More informationGFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports
More informationTreatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
More informationHealth insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
More informationA Network Management System for Power-Line Communications and its Verification by Simulation
A Network Mngement System for Power-Line Communictions nd its Verifiction y Simultion Mrkus Seeck, Gerd Bumiller GmH Unterschluerscher-Huptstr. 10, D-90613 Großhersdorf, Germny Phone: +49 9105 9960-51,
More informationAll pay auctions with certain and uncertain prizes a comment
CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin
More informationVendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
More informationEnterprise Risk Management Software Buyer s Guide
Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors
More informationEconomics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999
Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,
More informationHow To Improve Network Performance
Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network
More informationPerformance analysis model for big data applications in cloud computing
Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,
More informationAccording to Webster s, the
dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly
More informationJaERM Software-as-a-Solution Package
JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock
More informationKofax Reporting. Administrator's Guide 2.0.0 2013-09-19
Kofx Reporting 2.0.0 Administrtor's Guide 2013-09-19 2013 Kofx, Inc. All rights reserved. Use is subject to license terms. Third-prty softwre is copyrighted nd licensed from Kofx s suppliers. THIS SOFTWARE
More informationPerformance Prediction of Distributed Load Balancing on Multicomputer Systems
Performnce Prediction of Distributed Lod Blncing on Multicomputer Systems Ishfq Ahmd *, Arif Ghfoor+, nd Kishn Mehrotr * * School of Computer nd Informtion Science, Syrcuse University, Syrcuse, NY 13244
More informationData replication in mobile computing
Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL
More information2 DIODE CLIPPING and CLAMPING CIRCUITS
2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of
More informationPERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.16 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING
PERFORMANCE ANALYSIS FOR BANDWIDTH ALLOCATION IN IEEE 802.6 BROADBAND WIRELESS NETWORKS USING BMAP QUEUEING Sid EL KAFHALI Abdelli EL BOUCHTI Mohmed HANINI nd Abdelkrim HAQIQ Computer, Networks, Mobility
More informationCOMPONENTS: COMBINED LOADING
LECTURE COMPONENTS: COMBINED LOADING Third Edition A. J. Clrk School of Engineering Deprtment of Civil nd Environmentl Engineering 24 Chpter 8.4 by Dr. Ibrhim A. Asskkf SPRING 2003 ENES 220 Mechnics of
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationVoIP for the Small Business
Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll
More informationHow To Make A Network More Efficient
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Princeton University Princeton, NJ {minlnyu,yyi,jrex,chingm}@princeton.edu
More informationApplication Bundles & Data Plans
Appliction Appliction Bundles & Dt Plns We ve got plns for you. Trnsporttion compnies tody ren t one-size-fits-ll. Your fleet s budget, size nd opertions re unique. To meet the needs of your fleet nd help
More informationRotating DC Motors Part II
Rotting Motors rt II II.1 Motor Equivlent Circuit The next step in our consiertion of motors is to evelop n equivlent circuit which cn be use to better unerstn motor opertion. The rmtures in rel motors
More informationDEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.
Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER
More informationAn Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process
An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct
More information9 CONTINUOUS DISTRIBUTIONS
9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete
More informationDiscovering General Logical Network Topologies
Discovering Generl Logicl Network Topologies Mrk otes McGill University, Montrel, Quebec Emil: cotes@ece.mcgill.c Michel Rbbt nd Robert Nowk Rice University, Houston, TX Emil: {rbbt, nowk}@rice.edu Technicl
More informationQoS Framework for SIP Signalling
QoS Frmework for SIP Signlling Alexnder A. Kist nd Richrd J. Hrris RMIT University Melourne BOX 2476V, Victori 3001, Austrli Emil: kist@ieee.org, richrd@ctt.rmit.edu.u ABSTRACT The Session Initition Protocol
More informationLINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES
LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of
More informationFAULT TREES AND RELIABILITY BLOCK DIAGRAMS. Harry G. Kwatny. Department of Mechanical Engineering & Mechanics Drexel University
SYSTEM FAULT AND Hrry G. Kwtny Deprtment of Mechnicl Engineering & Mechnics Drexel University OUTLINE SYSTEM RBD Definition RBDs nd Fult Trees System Structure Structure Functions Pths nd Cutsets Reliility
More informationSpace Vector Pulse Width Modulation Based Induction Motor with V/F Control
Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:
More informationSyGEMe: Integrated Municipal Facilities Management of Water Ressources Swiss Geoscience Meeting, Neuchâtel, 21 novembre 2009 k
SyGEMe: Integrted Municipl Fcilities Mngement of Wter Ressources Tool presenttion, choice of technology, mn-mchine mchine interfce, business opportunities nd prospects 1. Introduction 2. Mn-mchine interfce
More informationUnderstanding Basic Analog Ideal Op Amps
Appliction Report SLAA068A - April 2000 Understnding Bsic Anlog Idel Op Amps Ron Mncini Mixed Signl Products ABSTRACT This ppliction report develops the equtions for the idel opertionl mplifier (op mp).
More informationGoals of Routing Protocols. 10: Inter and intra AS, RIP, OSPF, BGP, Router Architecture. Real Internet Routing? CIDR? Dynamic Routing?
Gols of Routing Protocols 10: Inter nd intr AS, RIP, OSPF, GP, Router Architecture Lst Modified: 3/24/2003 2:39:16 PM Find the optiml route Rpid Convergence Robustness Configurble to respond to chnges
More informationTest Management using Telelogic DOORS. Francisco López Telelogic DOORS Specialist
Test Mngement using Telelogic DOORS Frncisco López Telelogic DOORS Specilist Introduction Telelogic solution for Requirements Mngement DOORS Requirements mngement nd trcebility pltform for complex systems
More information2. Transaction Cost Economics
3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service
More informationOperations with Polynomials
38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationHealth insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
More informationTechniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist
Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements
More informationSCRIBE: A large-scale and decentralized application-level multicast infrastructure
!! IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 2, NO. 8, OCTOBER 22 1 SCRIBE: A lrge-scle nd decentrlized ppliction-level multicst infrstructure Miguel Cstro, Peter Druschel, Anne-Mrie Kermrrec
More informationWeek 7 - Perfect Competition and Monopoly
Week 7 - Perfect Competition nd Monopoly Our im here is to compre the industry-wide response to chnges in demnd nd costs by monopolized industry nd by perfectly competitive one. We distinguish between
More informationMathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100
hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by
More informationArchitecture and Data Flows Reference Guide
Architecture nd Dt Flows Reference Guide BlckBerry Enterprise Service 12 Version 12.0 Pulished: 2014-11-10 SWD-20141110103011848 Contents Components used in the BES12 solution... 5 Components used to mnge
More informationCOMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE. Skandza, Stockholm ABSTRACT
COMPARISON OF SOME METHODS TO FIT A MULTIPLICATIVE TARIFF STRUCTURE TO OBSERVED RISK DATA BY B. AJNE Skndz, Stockholm ABSTRACT Three methods for fitting multiplictive models to observed, cross-clssified
More information1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam
1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges
More informationBandwidth Allocation for Best Effort Traffic to Achieve 100% Throughput
Bndwidth Alloction for Best Effort Trffic to Achieve 100% Throughput Msoumeh Krimi, Zhuo Sun, nd Deng Pn Florid Interntionl University, Mimi, FL E-mils: {mkri001, zsun003, pnd}@fiu.edu Abstrct Generlized
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-234 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our
More informationBasic Analysis of Autarky and Free Trade Models
Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently
More informationpiecewise Liner SLAs and Performance Timetagment
i: Incrementl Cost bsed Scheduling under Piecewise Liner SLAs Yun Chi NEC Lbortories Americ 18 N. Wolfe Rd., SW3 35 Cupertino, CA 9514, USA ychi@sv.nec lbs.com Hyun Jin Moon NEC Lbortories Americ 18 N.
More informationTHE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION
KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system
More informationSmall Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
More informationSoftware Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning
Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology
More informationWireless Wakeups Revisited: Energy Management for VoIP over Wi-Fi Smartphones
Wireless Wkeups Revisited: Energy Mngement for VoIP over Wi-Fi Smrtphones Yuvrj Agrwl, Rnveer Chndr,AlecWolmn, Prmvir Bhl, Kevin Chin, Rjesh Gupt Microsoft Reserch, Microsoft Corportion, University of
More informationPortfolio approach to information technology security resource allocation decisions
Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationIaaS Configuration for Virtual Platforms
IS Configurtion for Virtul Pltforms vcloud Automtion Center 6.0 This document supports the version of ech product listed nd supports ll susequent versions until the document is replced y new edition. To
More informationHow To Study The Effects Of Music Composition On Children
C-crcs Cognitive - Counselling Reserch & Conference Services (eissn: 2301-2358) Volume I Effects of Music Composition Intervention on Elementry School Children b M. Hogenes, B. Vn Oers, R. F. W. Diekstr,
More informationGraphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
More informationExample 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.
2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this
More informationAN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS
AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology
More informationHow To Reduce Telecommunictions Costs
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationProject 6 Aircraft static stability and control
Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The
More informationDistributions. (corresponding to the cumulative distribution function for the discrete case).
Distributions Recll tht n integrble function f : R [,] such tht R f()d = is clled probbility density function (pdf). The distribution function for the pdf is given by F() = (corresponding to the cumultive
More informationFactoring Polynomials
Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationThe LENA TM Language Environment Analysis System:
FOUNDATION The LENA TM Lnguge Environment Anlysis System: Audio Specifictions of the DLP-0121 Michel Ford, Chrles T. Ber, Dongxin Xu, Umit Ypnel, Shrmi Gry LENA Foundtion, Boulder, CO LTR-03-2 September
More informationNew Internet Radio Feature
XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry
More informationInnovative and applied research on big data platforms of smart heritage
Innovtive nd pplied reserch on big dt pltforms of smrt heritge J. Qiu, J. Li, H. Sun * qiujie@thid.cn lijijun@thid.cn sunhuijio@thid.cn KEY WORDS: Smrt heritge, Big dt, Explntion ABSTRACT: Big dt hs huge
More informationFacilitating Rapid Analysis and Decision Making in the Analytical Lab.
Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires
More informationRegular Sets and Expressions
Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite
More informationExperiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
More informationCorporate Compliance vs. Enterprise-Wide Risk Management
Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationProtocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff
Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention
More information