Service Management in Multi-Party Active Networks

Size: px
Start display at page:

Download "Service Management in Multi-Party Active Networks"

Transcription

1 Service Management in Multi-Party Active Networks Marcus Brunner 1 Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology Zurich (ETH Zurich), Switzerland Rolf Stadler Center for Telecommunications Research (CTR) Columbia University, New York, USA Abstract Active networking is an expanding field of research. It includes the ability to easily install and modify customized network services and to process packets within the network in a customized way. This paper addresses the question of how the benefits of active networking can be exploited in an environment, where a large number of customers must share a common network infrastructure. We introduce a management framework for active networks that allows customers to deploy and manage their own active services in a provider domain. The key concept in our framework is the Virtual Active Network (VAN). From the customers perspective, the VAN represents the environment in which the customer can install, run, and manage active services without interaction with the VAN provider. From the VAN provider s perspective the VAN represents the object of resource partitioning and customer isolation. Active networking combined with the VAN concept allows for new business models in the telecom industry. Keywords Management of Active Networks, Service Management, Virtual Networks, Customer- Control, Network Architecture. 1 Introduction Recent research in the area of active networking has demonstrated the potential of this new technology [1][2]. From the service point of view, active networking allows customized packet processing inside the network on a per-packet, per-flow, or per-service basis. Customized packet processing can be applied, e.g., to application-aware routing, information caching, multi-party communications, and packet filtering [1]. From the management perspective, active networking technology enables rapid service deployment and flexible service management [2]. While suggesting attractive benefits, active networking also poses serious challenges that must be overcome to gain wide-spread acceptance. This paper focuses on one of these challenges, the problem of engineering a multi-user multi-services active network environment. We formulate the problem in the following way: 1. The author is now with C&C Research Laboratories, NEC Europe Ltd. Hardenbergplatz 2, D Berlin, Germany, brunner@ccrle.nec.de 1 To appear in IEEE Communications Magazine: Special Issue on Active, Programmable, and Mobile Code Networks

2 How can a network provider, whose infrastructure is based on active networking technology, support a large number of customers, all of which independently install and run their own customized active services in the provider s domain? Note that the term customer has different meanings here. See Section 6 for a discussion of different business models. To solve this problem, we need the capabilities to enable each customer to create, run and manage his/her own customized active services, and isolate the customers to avoid interference among each other. Current approaches to active networking address this problem by introducing a trust relationship between the customer which installs the software in the network and the owner of the network ([3], [4], and [5]). The software is trusted by the network owner in the sense that its execution is assumed to consume no more than a certain amount of resources, and that its functions inside the network do not interfere with other network services. The difficulties with this approach are that (1) only few parties implementing services might be able to build up such a trust relationship with network owners (which might lead to monopolies and thus prevent a wider market for active network services from being created) and (2) even trusted parties will (unintentionally) produce faulty service code with potentially serious consequences for network operation, ranging from overconsumption of network resources to breaking down the whole network. We take a different approach. We propose to isolate customers from each other through network virtualization. The concept we have developed to provide this capability is the Virtual Active Network (VAN). In the same way as an active network can be understood as a generalization of a traditional network, a VAN can be seen as a generalization of a traditional Virtual Private Network (VPN). Similar to a traditional VPN, a VAN can be used by a customer to run network services, using a provider's physical infrastructure. However, in contrast to a traditional VPN, a VAN gives a customer a much higher degree of flexibility and control, because a customer can install, run, and manage new customized services in the provider domain without interaction with the provider. 2 Management Framework for Active Networks In the following, we outline our management framework for active networks, which we have first proposed in [2]. Figure 1 shows the interaction between a customer domain and a provider domain for service provisioning, service delivery and service management. We propose that the provisioning of a specific (active) network service X is split into two different operations: The provisioning of a generic service, which we call the VAN service, is performed via the cooperative VAN provisioning interface, in cooperation with the provider. VAN provisioning includes the negotiation of the VAN topology and allocating VAN resources. The installation of the specific service X is performed via the generic service inter- 2

3 Customer Domain Customer NMS VAN Provisioning Cooperative VAN Provisioning Interface Provider Domain Provider NMS VAN Provisioning Active Network Management Interface Active Network Management Interface VAN & Node Mgt. Service Management Service Service Management Service VAN & Node Mgt. Active Network Generic Service Interface Active Network Figure 1: Customer-Provider Interaction in Multi-Party Active Networks face, without further interaction with the provider. The same interface is used to control and manage service X during its lifetime. In Figure 1, three interfaces are defined, the generic service interface, the cooperative VAN management interface, and the active network management interface. Using active networking nodes enables the definition of a generic service interface for network services, based on the concept of active packets. In addition, this service interface can be used for service management interactions, i.e., for operations related to the installation, supervision, upgrading and removal of a specific service. Therefore, service management operations can be performed by a customer in a flexible way without interaction with the provider s management system. The management interface between network management systems of different domains, we call it the cooperative VAN provisioning interface, can be restricted to the task of VAN provisioning. Similar to the service interface, the management interface can be kept generic; it relates to a generic service abstraction (VAN) that allows for installing and running various network services. The active network management interface relates to the tasks of single-domain VAN configuration and network node management. Furthermore, the active network management interface becomes generic through the introduction of active packets replacing the standardized management protocols implementing the interaction between the network management system and the network to be managed. This allows each domain to implement its own management system. Additionally, the process of configuring the network elements on behalf of service provisioning and the process of monitoring of the network elements can profit from the active network technology in terms of information aggregation, customized filtering, and the delegation of network control [6]. 3

4 3 The Virtual Active Network A Virtual Active Network (VAN) can be described as a graph of virtual active nodes interconnected by Virtual Links. Virtual active nodes are also called Execution Environments (EEs), following the terminology of the AN working group. A virtual active node has resources attached to it in form of processing and memory resources, provided by the underlying active networking platform. Similarly, a Virtual Link has bandwidth allocated to it. We envision that a single (physical) active node can run several virtual active nodes belonging to different VANs, and a single (physical) network link can support several Virtual Links for different VANs. Figure 2 shows an active network with five nodes in a provider domain. On this network, two VANs have been installed, one for customer 1 and one for customer 2. The figure also shows the Management VAN, interconnecting the Management EEs, which are used by the provider for VAN provisioning and supervision (see Section 4). Node A Customer 1 EE Node E Customer 2 EE Customer 2 EE Management EE Management EE Customer 1 EE Customer 1 EE Management EE Node C Customer 1 EE Management EE Node B Customer 2 EE Management EE Node D Figure 2: An Active Network with nodes A-E, on which VANs for customers 1 and 2 and the provider s Management EEs have been installed. What problem exactly does the VAN concept address and what are its benefits? 1. The VAN provides a generic service abstraction for an active network environment. From a provider s point of view, the VAN is the entity according to which active network resources are partitioned and according to which the customers, using the provider s infrastructure, must be isolated from one another. The VAN is the only object shared between provider and customer, and it is the object of negotiation between the two parties. Specifically, the provider is not concerned about which specific service(s) a customer is running on its VAN. The task of the provider is solely to configure a VAN and to monitor and police the use of resources on the 4

5 VAN level. The provider has to ensure that the quality, as agreed upon between customer and provider, can be guaranteed. But the provider is relieved from managing services, which could get very complex these days. 2. In traditional network environments, the customer has a simple service abstraction and sees the service essentially as a black box with access points. In contrast, the VAN is a very flexible service abstraction compared to today s virtual path or flow based abstractions. The flexible selection of the VAN topology allows a customer to configure the service abstraction with different degrees of detail. The service abstraction can be very detailed for instance a VAN that spans over the whole physical active network of a provider, which allows a customer to detailed control the service. Or the VAN can also be very small and simple, e.g. only providing a Virtual Link through the network, comparable to the ATM Virtual Path abstraction without control of any virtual nodes. The level of detail is freely selectable and depends on the requirements of a customer s service, or on the management policy a customer selects. Some customers prefer a lot of control and management capabilities in the provider domain, others want to keep their service management lean and simple. The whole range of requirements concerning the service abstraction are possible with the VAN approach. 3. The VAN provisioning allows a customer for a fine-grained resource allocation, which enables a customer to optimize the overall resource consumption of a service. Since the VAN is a collection of computation, communication, and memory resources located on active nodes and links, a customer can fine-tune the usage of each resource on each node separately. For instance, some services need a lot of computation but little memory, and others need a lot of computing resource before packets are sent over an unreliable physical link. In addition, the service manager can trade one resource for another to minimize the cost and to maximize the service quality. 4. From a customer s perspective, the VAN concept allows for installation and management of active network services, without interaction with the provider. (As mentioned above, all interactions between customer and provider relate strictly to the VAN.) The customer can run a large variety of active network services on the VAN. These services are only restricted by the specific EEs the VAN supports. Furthermore, a customer can install service-specific customized service management functionality together with the service. Note that the high degree of customer control over services running in a provider s domain, which a VAN provides, is virtually impossible to realize with today s traditional networking technology. 5. Exploiting a general benefit of active networking, the VAN concept enables rapid deployment of new network services. Deploying and upgrading network services is difficult and time consuming in today s networks due to the closed, integrated architecture of network nodes. With the concept of a VAN the installation of any customer-specific service becomes feasible, and, as explained before, it can be accomplished by the customer alone, without interaction with the VAN provider, which heavily speeds up the service deployment. This is extremely useful in today s market place, where the time to market is essential for profitable business. 6. Customers can run a large variety of different network services on a single VAN in 5

6 parallel, which allows customers to perform dynamic re-allocation of VAN resources to the various services, according to their own control objectives and traffic characteristics -- again, without interaction with the VAN provider. The VAN concept can be compared to that of a Virtual Path (VP)-based Virtual Private Network (VPN). Similar to a VAN, a VP-based VPN provides customers with a service abstraction, on which they can run their own services, such as IP-based data or real-time services. Since a VP is a simple abstraction, a customer s ability to control traffic inside the provider s domain is very limited. A VAN, on the other hand, is a much more complex abstraction than a VP and, consequently, gives customers extensive control capabilities inside the provider s domain. In a similar way as dynamic bandwidth provisioning can be performed in a VP-based VPN, we envision that VAN resources can be re-negotiated during the lifetime of a particular VAN via the cooperative VAN provisioning interface shown in Figure 1. 4 Active Network Node Architecture Figure 3 gives an operating system point of view of an active network node. A node operating system layer configures and provides access to the node s resources, such as links, processing and memory resources. This layer runs the EEs, separates them from each other, and polices the use of the resources consumed by each EE. Service 1 Service Mgt 1... Execution Environment Service M Service Mgt M SPI VAN Management Node Configuration Management EE Customer 1... Customer N Provider Node Node Operating System System LVMI Memory CPU I/O Hardware SPI: Service Programming Interface LVMI: Local VAN Management Interface Figure 3: Architecture of an Active Network Node in a Telecom Environment Figure 3 specifically shows the case where a provider offers VANs to several customers (Customer 1,..., Customer N). The figure shows one such node containing EEs of different customers/vans. Each customer runs its services in a separate EE. The service components and service management components access the EE over the Service Programming Interface (SPI). The SPI includes functionality for running active packets, to configure the EE to service-specific needs in the functional and the run-time behavior. 6

7 A special EE called the Management EE runs the provider s VAN management and node configuration system. The Management EE uses the local VAN management interface, to create EEs for customers and is able to monitor, modify and terminate them. The VAN provisioning and configuration system is controlled by the provider s management system via the exchange of active packets. The provider s management system, as shown in Figure 1, maintains a global view of the provider s domain for the purpose of VAN provisioning. 4.1 VAN Provisioning Figure 4 depicts the same active network node architecture shown in Figure 3 in order to better visualize the mechanisms needed to setup a VAN, and to show how an EE is embedded into the node. Physical InPorts... Virtual InPort Execution Environment N Virtual OutPort... Physical OutPorts Demultiplex Incoming Packets... Storage Execution Environment 1 Virtual Memory Access control Virtual Processor Multiplexing Outgoing Packets Active Network Node Figure 4: Active Network Node Architecture During the VAN provisioning phase, the provider s network management system creates EEs on a set of active network nodes, according to a customer s topology requirements. The node operating system is configured to allocate the node resources specified. The EE consists of Virtual Ports, Virtual Memory, and a Virtual Processor to abstract from the real hardware. Active packets arriving at the physical InPort are demultiplexed and forwarded to the different EEs, where they get visible at the Virtual InPort of the EE. Active packets sent by the EEs at the Virtual OutPorts are multiplexed to a physical OutPort, constrained by the Virtual Link resource reserved during the VAN provisioning. Furthermore, Virtual Memory access is controlled, and the execution of the Virtual Processors need to be scheduled. 4.2 Node Operating System Requirements This section describes the functionality needed in the node OS in order to realize the VAN concept on an active networking platform. Conceptually, the functional requirements can be summarized in the following five points. Resource Partitioning: Resources, such as CPU-cycles, memory, and transmission... CPU Schedule Execution 7

8 bandwidth of the outgoing physical links have to be partitioned among different EEs, i.e., customers. Resource Policing and Isolation: An EE must be prevented from consuming more resources than granted by the VAN provider if other EEs need the resource. In addition, its allocated memory has to be protected from unauthorized read and write. Demultiplexing and Multiplexing: Active packets on an incoming physical link must be demultiplexed, identified and forwarded to their corresponding EEs. Furthermore, active packets leaving the EEs need to be multiplexed onto the outgoing physical links. Note that the multiplexing and demultiplexing has only local significance, which allows to choose any multiplexing identifier small. Cut-through Links: The node operating system needs to support cut-through links, allowing packets to directly pass through the node on a fast path, without being processed. This is needed because a VAN is not obliged to span the physical active network completely. Actually, this functionality can be easily supported by underlying hardware. Local VAN Management Interface: The node operating system has to provide a local VAN management interface. The interface needs the functionality to install and remove new EEs, new Virtual Ports, and Cut-through Links. Furthermore, it needs the function to reserve or modify the resources associated with EEs, Virtual OutPorts, and Cut-through Links. Additional, it should include access to usage information of the VAN elements for monitoring purposes. 5 Service Management Service management includes installation, update, running, monitoring, and removing an active service [6]. Without further interaction with the provider s management system, the customer configures its EEs (virtual nodes of the VAN) for the specific services it wants to run and for the service management functionality it needs. Figure 5 shows a VAN spanned over two customer networks and two provider networks. The service management system is controlled from a Service Management Station (Figure 5), which serves as the human-computer interface for the service management system. The station initiates service management actions and displays monitoring information. An active network service, as defined in our framework, consists of stationary service components installed on the EEs of a VAN. Active packets travel through a VAN, accessing stationary service components and the Service Programming Interface, when they execute on EEs. Active packets are the basic communication entity in terms of what information they transport, and they are the basic computation entity in terms of what functions they execute on the EEs. Active packets are used for two different tasks. First, they are the objects which implement an end-to-end networking service on behalf of a distributed application. Second, active packets are executing service control and management tasks on behalf of the service management system. In Figure 6, they are labeled active service management packets. Active service management packets prepare the EE to be used by an active service. 8

9 Service Management Station EEs Virtual Active Network (VAN) Physical Active Network Customer Physical Active Network Physical Active Network Customer Provider 2 Physical Active Network Provider 1 Figure 5: A Virtual Active Network over three Domains We take a hybrid approach to active networking. The active packet may carry program code, or the code can be pre-installed and bound to the active packet on arrival at the EE. Furthermore, active service management packets are used to install code and stationary service components on EEs and to configure the EEs to meet the run-time requirements of an active service. Figure 6 shows active packets arriving at a Virtual InPort of the EE, accessing stationary service components while executing, and leaving the EE on a Virtual OutPort. configure & monitor install & Stationary Service Components supervise Active Service Management Packet configure & monitor access access leave arrive Active Packet Virtual InPorts execute Execution Environment Virtual Processor Stationary Service Management Components configure & Virtual monitor OutPorts configure & monitor Virtual Memory Figure 6: Active Packets and Stationary Service Components The Service Programming Interface includes functions which are used by active packets to implement a service. Such functions are accessing memory, leaving the EE over Virtual OutPorts, and supporting active packet s run-time, such as creation, termination, and synchronization of active packets. Additionally, the interface contains functions mainly used by active service management packets for configuration and monitoring purposes. The configuration interface include functions to set and configure packet classifiers at the Virtual InPorts, packet schedulers at the Virtual OutPorts, CPU scheduler at the Virtual Processor, and memory management at the Virtual Memory. Service management functionality need to be installed together with the service code, because it is not known in advance what control and management requirements a service has. Furthermore, the monitoring of active services is very well supported by 9

10 active networking technology with the property to install programmable filters which pass or drop events, to install programs taking specific automated actions at the occurrence of events (management by delegation). Additionally, the collection of management information from a VAN takes advantage of easily aggregating information within the VAN. The service management system can install programs, which aggregate and filter management information within the VAN in a customized way. The aggregation reduces management data traffic, but still provides important management information. The programs installed can also take appropriate actions within the network on the occurrence of specific service behaviors, which is extracted from the management information gathered in the network [6]. 6 Business Models The deployment of the VAN concept requires a discussion of possible business models for all involved parties. They can take the following roles: AVAN provider is an organization owning an active networking infrastructure, which supports the VAN concept. An Active Service Provider is an organization, which runs one or more services on a VAN, purchased from one or more VAN providers. Note, that the Active Service Provider may buy an implementation of an active service from another party, or it may design and implement new services and new service management functionality. End-users utilize an active service and can range from large companies to households. They do not manage the services used. End-users can use active services by sending active packets including code which access service components installed and managed by an Active Service Provider. Besides these roles, a number of business interactions can be performed. Typically, a business interaction takes place between a customer, which buys a good, and a provider, which sells the good. A business entity may take more than one of the roles. A number of examples are discussed in the following subsections. In Section 2, we assumed that the same party is negotiating the VAN topology and the resources associated with the VAN over the cooperative VAN provisioning interface (Figure 1). In many of the following described scenarios, it makes sense that different parties perform topology negotiation and resource reservation. Which means one party decides on a topology of the VAN and negotiates the topology. Another party decides on the resources needed in a VAN and negotiates the resources. 6.1 Outsourcing Service Management A customer outsources different services to different Active Service Providers. In such a scenario, a customer acts as an end-user and a VAN provider at the same time. He only needs an active networking infrastructure on which a VAN is provisioned for each Active Service Provider. 10

11 The customer can choose the topology of the VAN himself, which allows him to choose at which end-points a specific service is accessible. But he has to partition the network resources according to the requirements defined by the Active Service Provider to run that service. For instance, assume a cable TV provider decides to offer other services on his network, but has no knowledge how to accomplish that. With an active networking infrastructure, he can contract with an Internet Service Provider 1 and a telephone company. He provisions for each of these companies a VAN. The topology of the VAN is such that each end-user subscribing to one of these services is connected to the VAN. In this scenario, the cable TV provider neither has to manage the IP network nor the voice network. For example, if the Internet service provider updates his network to an IPv6 network, the cable TV provider does not deal with this service update. 6.2 Virtual Private Networks End-users with distributed premises networks, which could be traditional networks or active networks, may need a Virtual Private Network in order to connect their premises securely. In this scenario, a customer acts in the role of an end-user and an Active Service Provider simultaneously. A VAN provider offers this customer a VAN which fulfills the customer s requirements (topology and resources). At this point, the end-user owns one large virtual network, spanning over its premises and one or more provider s networks, which the end-user can manage as a single entity. E.g., he can install the same service as installed in his premises and use traditional service management applications and protocols. In case the end-user runs an active network, he can install, upgrade, monitor, and remove whatever active services he likes. 6.3 Virtual Enterprises The virtual enterprise scenario is a special case of the VPN scenario mentioned previously. A virtual enterprise consists of different parts of different companies/organizations, building a virtual enterprise in order to produce (mostly electronic) goods. It will be very convenient for such a virtual enterprise to operate its own network and running its own services on that network. The VAN concept provides this functionality. Each company acts as a VAN provider towards the virtual enterprise. Additionally, a infrastructure provider offers a VAN to interconnect those VANs used by the virtual enterprise. 6.4 Multi-Service Networks Providers can combine the roles of a VAN provider and an Active Service Provider at the same time. Such a provider uses the VAN abstraction to offer different services to different customers (end-users). The provider benefits from the possibility to upgrade services very fast and to offer new services very fast. The isolation between VANs is mainly needed in order to protect services from each other. This functionality is very 1. Note that a Internet Service Provider is a special case of an Active Service Provider, where the service to be managed is based on the Internet Protocol. 11

12 convenient in the case where new services are deployed in a short time to market without being thoroughly tested. 6.5 Tripartite Scenario A tripartite scenario, where each role is taken by a different party is the most likely case how active networking could work. By connecting VANs located in different VAN provider domains into a single VAN, an Active Service Provider can rapidly setup a networking infrastructure with Active Service Provider s services running on top of the VAN. In this case, the Active Service Provider can reach many end-users in a very short time with new networking services. The Active Service Provider s service subscription system controls the topology of the VAN in order to connect end-users to VANs running the subscribed service. The resource reservation is also performed by the Active Service Provider, but it is heavily influenced by Quality of Service requirements given by the end-user to the Active Service Provider. It is in the duty of the Active Service Provider to map QoS parameters of the active service to VAN resources, which are negotiated with the VAN provider afterwards. 6.6 Content Providers Content providers are a special kind of service providers, which have another motivation to act in the role of an Active Service Provider. Content providers are very sensitive to what a customer really gets at the end-system, because otherwise they will be blamed for not providing good quality content. Therefore, a content provider wants to control the entire path from where the content is produced to where the content is consumed by an end-user. Furthermore, the content provider typically knows best, how its content is transported over a network. In such a scenario, it is beneficial for the content provider to contract with a VAN provider to setup a VAN connecting the content consumers with a certain quality and installing its specific networking service to transport the content in a content-aware fashion. As an example we take the scenario where e-business over the World Wide Web takes place. The seller of goods is interested that each customer can access its Web-server fast enough, because a potential buyer could otherwise change the seller and buy the good somewhere else. Such a scenario can be improved by allowing the seller to purchase a VAN with enough capacity, paying for it to make buyers happy. 7 Conclusions One of the key problems in the field of active networking is the prospect of users loading and executing untrusted code in the network. In this work, we took the approach of network virtualization, which solves this problem by isolating different customers. For that reason, we introduced a management architecture for active networks, which allows to separate service provisioning of a generic service called Virtual Active Network (VAN) from managing a specific service. With this framework, a customer manages a customized active service in the provider domain without interaction with the 12

13 provider. This functionality allows a customer to rapidly deploy new network services, which definitely helps if the customer sells the service to end-users. The framework further allows a customer to configure service abstractions with different degrees of detail and controllability. The functionality is to our knowledge not possible in today s network architectures. Additionally, we described how an active network node is designed and what functionality it needs in order to support the VAN concept. Furthermore, we showed how active service are installed, monitored, and updated in a scalable, programmable, and customized way. We implemented a functional prototype, which includes an active network (ANET), a VAN provisioning and supervision system, a service management system which runs in a VAN spanning over different domains, and different networking services [6]. The potential that active networking opens up by deploying the VAN concept is exemplified by business scenarios, which can hardly be accomplished by using today s networking technology. 8 References [1] D. Tennenhouse, J. Smith, W. Sincoskie, D. Weatherall, G. Minden, A Survey of Active Network Research, IEEE Communications Magazine, Vol. 35(1), [2] M. Brunner, R. Stadler, The Impact of Active Networking Technology on Service Management in a Telecom Environment, Sixth IFIP/IEEE International Symposium on Integrated Network Management (IM 99), Boston, USA, [3] D. Weatherall, J. Guttag, D. Tennenhouse, ANTS: A Toolkit for Building and Dynamically Deploying Network Protocols, IEEE Conference on Open Architecture and Network Programming (OPENARCH 98), San Francisco, USA, [4] S. Alexander, W. Arbaugh, M. Hicks, P. Kakkar, A. Keromytis, J. Moore, C. Gunter, S. Nettles, J. Smith, The Switchware Active Network Architecture, IEEE Network, Vol. 12(3), [5] D. Decasper, G. Parulkar, S. Choi, J. DeHart, T. Wolf, B. Plattner, A Scalable, High Performance Active Network Node, IEEE Network, Vol. 13(1), [6] M. Brunner, Service Management in a Telecom Environment based on Active Network Technology, Ph. D. thesis No , Swiss Federal Institute of Technology Zurich (ETH Zurich), Switzerland, Biography Marcus Brunner (brunner@ccrle.nec.de) is a research staff member of the C&C Research Laboratories of NEC Europe Ltd. in Berlin. He received his Ph. D. from the ETH Zurich in 2000, while working in the Computer Engineering and Networks Laboratory of the Electrical Engineering Department. Before, he got a diploma (M.S.) in Computer Science from the Swiss Federal Institute of Technology (ETH Zurich) in Rolf Stadler is a research scientist and adjunct professor at the Department of Electrical Engineering at Columbia University in New York. On leave from Columbia Uni- 13

14 versity, he currently is a Visiting Professor at ETH Zurich. Dr. Stadler received a master s degree in mathematics and a Ph.D. in computer science from the University of Zurich, Switzerland, in 1984 and 1990, respectively. During 1991 he was a postdoctoral researcher at the IBM Zurich Research Laboratory. From 1992 to 1994 he was a Visiting Scholar at the Center for Telecommunications Research, Columbia University. Dr. Stadler s current research is focused on active technology with respect to telecom networks and networked multimedia systems. Recently, he has been a guest editor of the IEEE JSAC issue on Service Enabling Platforms for Networked Multimedia Systems (Sept. 1999) and General Chair and Program Co-Chair of the Tenth IFIP/ IEEE International Workshop on Distributed Systems: Operations & Management (DSOM 99), Zurich, Oct

Virtual Active Networks Safe and Flexible Environments for Customer-Managed Services

Virtual Active Networks Safe and Flexible Environments for Customer-Managed Services Virtual Active Networks Safe and Flexible Environments for Customer-Managed Services Marcus Brunner 1 and Rolf Stadler 2 1 Computer Engineering and Networks Laboratory, TIK Swiss Federal Institute of Technology

More information

The Impact of Active Networking Technology on Service Management in a Telecom Environment

The Impact of Active Networking Technology on Service Management in a Telecom Environment The Impact of Active Networking Technology on Service Management in a Telecom Environment M. Brunner R. Stadler TIK, ETH Zurich CTR, Columbia University CH-8092 Zurich New York, NY 10027-6699 Switzerland

More information

Service Provisioning and Management in Virtual Private Active Networks

Service Provisioning and Management in Virtual Private Active Networks Service Provisioning and Management in Virtual Private Active Networks Fábio Luciano Verdi and Edmundo R. M. Madeira Institute of Computing, University of Campinas (UNICAMP) 13083-970, Campinas-SP, Brazil

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth.

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth. 5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se April 2008 Overview Service Management Performance Mgt QoS Mgt

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Conceptual Integration of Flow-based and Packet-based Network Intrusion Detection

Conceptual Integration of Flow-based and Packet-based Network Intrusion Detection Conceptual Integration of Flow-based and Packet-based Network Intrusion Detection Gregor Schaffrath, Burkhard Stiller Department of Informatics IFI, University of Zürich Communication Systems Group CSG

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Preparing Your IP network for High Definition Video Conferencing

Preparing Your IP network for High Definition Video Conferencing White Paper Global Services April 2007 Table of Contents 1.0 OVERVIEW...3 2.0 VIDEO CONFERENCING BANDWIDTH DEMAND...3 3.0 AVAILABLE BANDWIDTH...5 3.1 Converged Network Links... 6 3.2 Dedicated Network

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Router Architectures

Router Architectures Router Architectures An overview of router architectures. Introduction What is a Packet Switch? Basic Architectural Components Some Example Packet Switches The Evolution of IP Routers 2 1 Router Components

More information

#10. This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in in May 1995 in Tel Aviv, Israel.

#10. This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in in May 1995 in Tel Aviv, Israel. D A N T E I N P R I N T #10 Technical Options for a European High-Speed Backbone Michael Behringer This paper was presented by Michael Behringer at JENC, the annual conference of TERENA (RARE), held in

More information

Chapter 2 Addendum (More on Virtualization)

Chapter 2 Addendum (More on Virtualization) Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)

More information

Novel Systems. Extensible Networks

Novel Systems. Extensible Networks Novel Systems Active Networks Denali Extensible Networks Observations Creating/disseminating standards hard Prototyping/research Incremental deployment Computation may be cheap compared to communication

More information

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks

Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Inter-Domain QoS Control Mechanism in IMS based Horizontal Converged Networks Mehdi Mani Wireless Networks and Multimedia Service Department GET-INT Evry, France mehdi.mani@int-evry.fr Noel Crespi Wireless

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Virtualization Technologies (ENCS 691K Chapter 3)

Virtualization Technologies (ENCS 691K Chapter 3) Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

Three Key Design Considerations of IP Video Surveillance Systems

Three Key Design Considerations of IP Video Surveillance Systems Three Key Design Considerations of IP Video Surveillance Systems 2012 Moxa Inc. All rights reserved. Three Key Design Considerations of IP Video Surveillance Systems Copyright Notice 2012 Moxa Inc. All

More information

Customer Management and Control of Broadband VPN Services

Customer Management and Control of Broadband VPN Services Customer Management and Control of Broadband VPN Services M.C. Chan, A. A. Lazar and R. Stadler Center for Telecommunications Research Columbia University, New York, NY 10027 {mcchan, aurel, stadler}@ctr.columbia.edu

More information

Network support for tele-education

Network support for tele-education Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,

More information

Building integrated services intranets

Building integrated services intranets Building integrated services intranets A White Paper from Inalp Networks Inc Meriedweg 7 CH-3172 Niederwangen Switzerland http://www.inalp.com CONTENTS CONTENTS...2 1 EXECUTIVE SUMMARY...3 2 INTRODUCTION...4

More information

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features

Optimizing Enterprise Network Bandwidth For Security Applications. Improving Performance Using Antaira s Management Features Optimizing Enterprise Network Bandwidth For Security Applications Improving Performance Using Antaira s Management Features By: Brian Roth, Product Marketing Engineer April 1, 2014 April 2014 Optimizing

More information

Implementing VPN over MPLS

Implementing VPN over MPLS IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 3, Ver. I (May - Jun.2015), PP 48-53 www.iosrjournals.org Implementing VPN over

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

DSL Forum. Working Text WT-101

DSL Forum. Working Text WT-101 DSL Forum Working Text WT-101 Revision 1 Migration to Ethernet Based DSL Aggregation For Architecture and Transport Working Group May 2004 Abstract: This working text outlines how an ATM aggregation network

More information

Analysis of IP Network for different Quality of Service

Analysis of IP Network for different Quality of Service 2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith

More information

Lightpath Planning and Monitoring

Lightpath Planning and Monitoring Lightpath Planning and Monitoring Ronald van der Pol 1, Andree Toonk 2 1 SARA, Kruislaan 415, Amsterdam, 1098 SJ, The Netherlands Tel: +31205928000, Fax: +31206683167, Email: rvdp@sara.nl 2 SARA, Kruislaan

More information

Advanced Transportation Management Systems

Advanced Transportation Management Systems Advanced Transportation Management Systems Summary Many Department of Transportation agencies are looking for cost-saving ways to improve the efficiencies of roadways without making actual surface improvements

More information

Requirements & Reference Models for ADSL Access Networks: The SNAG Document

Requirements & Reference Models for ADSL Access Networks: The SNAG Document Technical Report TR-010 Requirements & Reference Models for ADSL Access Networks: The SNAG Document June 1998 Abstract: This document outlines architectural requirements and reference models for ADSL services

More information

Cisco NetFlow Generation Appliance (NGA) 3140

Cisco NetFlow Generation Appliance (NGA) 3140 Q&A Cisco NetFlow Generation Appliance (NGA) 3140 General Overview Q. What is Cisco NetFlow Generation Appliance (NGA) 3140? A. Cisco NetFlow Generation Appliance 3140 is purpose-built, high-performance

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Smart WWW Traffic Balancing

Smart WWW Traffic Balancing Smart WWW Traffic Balancing Erol Gelenbe Ricardo Lent Juan Arturo Nunez School of Electrical Engineering & Computer Science University of Central Florida Introduction The Internet is one of the biggest

More information

Virtual Machine in Data Center Switches Huawei Virtual System

Virtual Machine in Data Center Switches Huawei Virtual System Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Grid Computing Vs. Cloud Computing

Grid Computing Vs. Cloud Computing International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 6 (2013), pp. 577-582 International Research Publications House http://www. irphouse.com /ijict.htm Grid

More information

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES

Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Testing Network Virtualization For Data Center and Cloud VERYX TECHNOLOGIES Table of Contents Introduction... 1 Network Virtualization Overview... 1 Network Virtualization Key Requirements to be validated...

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)

More information

References and Requirements for CPE Architectures for Data Access

References and Requirements for CPE Architectures for Data Access Technical Report TR-018 References and Requirements for CPE Architectures for Data Access March 1999 '1999 Asymmetric Digital Subscriber Line Forum. All Rights Reserved. ADSL Forum technical reports may

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

RSVP- A Fault Tolerant Mechanism in MPLS Networks

RSVP- A Fault Tolerant Mechanism in MPLS Networks RSVP- A Fault Tolerant Mechanism in MPLS Networks S.Ravi Kumar, M.Tech(NN) Assistant Professor Gokul Institute of Technology And Sciences Piridi, Bobbili, Vizianagaram, Andhrapradesh. Abstract: The data

More information

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu

A Network Management Framework for Emerging Telecommunications Network. asamba@kent.edu Symposium on Modeling and Simulation Tools for Emerging Telecommunication Networks: Needs, Trends, Challenges, Solutions Munich, Germany, Sept. 8 9, 2005 A Network Management Framework for Emerging Telecommunications

More information

Virtualizing Open Text Fax Server with Realtime Fax over IP and Open Text Fax Gateway

Virtualizing Open Text Fax Server with Realtime Fax over IP and Open Text Fax Gateway Virtualizing Open Text Fax Server with Realtime Fax over IP and Open Text Fax Gateway Abstract Computer virtualization is a revolutionary concept that provides organizations with a powerful, simple, and

More information

QoS Integration in Web Services

QoS Integration in Web Services QoS Integration in Web Services M. Tian Freie Universität Berlin, Institut für Informatik Takustr. 9, D-14195 Berlin, Germany tian @inf.fu-berlin.de Abstract: With the growing popularity of Web services,

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

QoS-aware cross-layer communication for Mobile Web services with the WS-QoS framework Abstract: 1 Introduction 2 Related Work

QoS-aware cross-layer communication for Mobile Web services with the WS-QoS framework Abstract: 1 Introduction 2 Related Work QoS-aware cross-layer communication for Mobile Web services with the WS-QoS framework M. Tian, A. Gramm, H. Ritter, J. Schiller, and T. Voigt* Freie Universität Berlin, Institut für Informatik {tian, gramm,

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications

Best Effort gets Better with MPLS. Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications Best Effort gets Better with MPLS Superior network flexibility and resiliency at a lower cost with support for voice, video and future applications A White Paper on Multiprotocol Label Switching October,

More information

WOICE: a Decentralized System for Ubiquitous VoIP Services

WOICE: a Decentralized System for Ubiquitous VoIP Services : a Decentralized System for Ubiquitous VoIP Services Costas Kalogiros 1, Costas Courcoubetis 1, and Panayotis Antoniadis 2 1 Athens University of Economics and Business Department of Computer Science

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data

QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,

More information

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks

Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Beyond Limits... Volume: 2 Issue: 1 International Journal Of Advance Innovations, Thoughts & Ideas Analysis of Effect of Handoff on Audio Streaming in VOIP Networks Shivani Koul* shivanikoul2@gmail.com

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions This paper discusses the telephone network infrastructure commonly known as the Public Switched Telephone

More information

Building MPLS VPNs with QoS Routing Capability i

Building MPLS VPNs with QoS Routing Capability i Building MPLS VPNs with QoS Routing Capability i Peng Zhang, Raimo Kantola Laboratory of Telecommunication Technology, Helsinki University of Technology Otakaari 5A, Espoo, FIN-02015, Finland Tel: +358

More information

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks

An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile Networks An integrated management platform for the support of advanced Charging, Accounting & Billing schemes in Reconfigurable Mobile s Maria Koutsopoulou, Spyridon Panagiotakis, Athanassia Alonistioti, Alexandros

More information

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET

DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET DEVELOPMENT OF SMART FIREWALL LOAD BALANCING FRAMEWORK FOR MULTIPLE FIREWALLS WITH AN EFFICIENT HEURISTIC FIREWALL RULE SET 1 R. BALA KRISHNAN, 2 Dr. N. K. SAKTHIVEL 1 School of Computing, SASTRA University,

More information

Addressing Inter Provider Connections With MPLS-ICI

Addressing Inter Provider Connections With MPLS-ICI Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

How To Understand Cloud Computing

How To Understand Cloud Computing Overview of Cloud Computing (ENCS 691K Chapter 1) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ Overview of Cloud Computing Towards a definition

More information

Towards P2P-based Computer Network Management *

Towards P2P-based Computer Network Management * Towards P2P-based Computer Network Management * Hui Xu, and Debao Xiao Department of Computer Science, Huazhong Normal University Wuhan, P.R. China, 430079 xuhui_1004@hotmail.com Abstract Nowadays, the

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

ARCHITECTURE FOR A SERVICE-ORIENTED AND CONVERGENT CHARGING IN 3G MOBILE NETWORKS AND BEYOND

ARCHITECTURE FOR A SERVICE-ORIENTED AND CONVERGENT CHARGING IN 3G MOBILE NETWORKS AND BEYOND ARCHITECTURE FOR A SERVICE-ORIENTED AND CONVERGENT CHARGING IN 3G MOBILE NETWORKS AND BEYOND R. Kühne*,, U. Reimer*, M. Schläger*, F. Dressler,, C. Fan*, A. Fessi, A. Klenk, G. Carle University of Tübingen,

More information

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS

MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.

More information

Service Delivery Automation in IPv6 Networks

Service Delivery Automation in IPv6 Networks Service Delivery Automation in IPv6 Networks C. Jacquenet christian.jacquenet@orange.com Slide 1 Outline Rationale Beyond the SDN hype: a true need for automation Global framework From service negotiation

More information

Components and Concepts of the Ambient Networks Architecture

Components and Concepts of the Ambient Networks Architecture Components and Concepts of the Ambient Networks Architecture Andreas Schieder, Ericsson Deutschland GmbH, Ericsson Allee 1, 52134 Herzogenrath, Germany Lars Eggert, NEC Europe Ltd., Network Laboratories,

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

(Refer Slide Time: 4:45)

(Refer Slide Time: 4:45) Digital Voice and Picture Communication Prof. S. Sengupta Department of Electronics and Communication Engineering Indian Institute of Technology, Kharagpur Lecture - 38 ISDN Video Conferencing Today we

More information

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch.

PSTN IXC PSTN LEC PSTN LEC STP STP. Class 4. Class 4 SCP SCP STP. Switch. Switch STP. Signaling Media. Class 5. Class 5. Switch. As we enter the 21st century, we are experiencing a telecommunications revolution. From a technological perspective, the distinction between voice information and other kinds of data is blurring as circuit-switched

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

Wholesale IP Bitstream on a Cable HFC infrastructure

Wholesale IP Bitstream on a Cable HFC infrastructure Wholesale IP Bitstream on a Cable HFC infrastructure In order to understand the issues related to an ISP reselling Cable Based Internet access it is necessary to look at similarities and dissimilarities

More information

ETM System SIP Trunk Support Technical Discussion

ETM System SIP Trunk Support Technical Discussion ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with

More information

Managing Central Monitoring in Distributed Systems

Managing Central Monitoring in Distributed Systems Managing Central Monitoring in Distributed Systems White Paper Author: Daniel Zobel, Documentation and Support at Paessler AG Published: August 2010 PAGE 1 OF 11 Contents Introduction... 3 The probe principle

More information

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF

Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology TECHNOLOGY STRATEGY BRIEF TECHNOLOGY STRATEGY BRIEF Extreme Networks CoreFlow2 Technology Benefits INCREASED VISIBILITY Detailed monitoring of applications, their

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Development of the FITELnet-G20 Metro Edge Router

Development of the FITELnet-G20 Metro Edge Router Development of the Metro Edge Router by Tomoyuki Fukunaga * With the increasing use of broadband Internet, it is to be expected that fiber-tothe-home (FTTH) service will expand as the means of providing

More information

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL

DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: suvarna_jadhav@rediffmail.com

More information

Network Virtualization Mist to MUST

Network Virtualization Mist to MUST Network Virtualization Mist to MUST Ching-Wen Cheng ITRI ICL M100 2015.03.07 Motivation and background (ITU-T T Aspect) Objectives and motivation FNs are recommended to provide services whose functions

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Chapter 18. Network Management Basics

Chapter 18. Network Management Basics Network Management Basics > FCAPS Model Chapter 18. Network Management Basics This chapter covers the following topics: FCAPS Model Network Management Architecture Network Management Protocols An Introduction

More information

Challenges and Approaches in Providing QoS Monitoring

Challenges and Approaches in Providing QoS Monitoring Challenges and Approaches in Providing QoS Monitoring Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering National University of Singapore 10 Kent Ridge Crescent, Singapore

More information

Prevention of Spam over IP Telephony (SPIT)

Prevention of Spam over IP Telephony (SPIT) General Papers Prevention of Spam over IP Telephony (SPIT) Juergen QUITTEK, Saverio NICCOLINI, Sandra TARTARELLI, Roman SCHLEGEL Abstract Spam over IP Telephony (SPIT) is expected to become a serious problem

More information

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices

More information

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg

Management of Telecommunication Networks. Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Management of Telecommunication Networks Prof. Dr. Aleksandar Tsenov akz@tu-sofia.bg Part 1 Quality of Services I QoS Definition ISO 9000 defines quality as the degree to which a set of inherent characteristics

More information

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University

HPSR 2002 Kobe, Japan. Towards Next Generation Internet. Bijan Jabbari, PhD Professor, George Mason University HPSR 2002 Kobe, Japan Towards Next Generation Internet Bijan Jabbari, PhD Professor, George Mason University May 28, 2002 Overview! Scalability and Interoperability in Internet! Impediments in Deployment

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Converged Business Networks: Simplifying Network Complexity Sponsored by: Level 3 Melanie Posey November 2010 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Open Visual Communications Consortium

Open Visual Communications Consortium A Path to Ubiquitous, Any-to-Any Video Communication January 2015 Any Vendor. Any Network. Any Device. Introduction Over the last several years, great strides have been made to improve video communication

More information

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE Chandana Priyanka G. H., Aarthi R. S., Chakaravarthi S., Selvamani K. 2 and Kannan A. 3 Department of Computer

More information

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska

WANs and Routers. M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska WANs and Routers M.Sc. Aleksandra Kanevce M.Sc. Aleksandra Bogojeska 1 Introduction to WANs A WAN is a data communications network that spans a large geographic area such as a state, province, or country.

More information

GN1 (GÉANT) Deliverable D13.2

GN1 (GÉANT) Deliverable D13.2 Contract Number: IST-2000-26417 Project Title: GN1 (GÉANT) Deliverable 13.2 Technology Roadmap for Year 3 Contractual Date: 31 July 2002 Actual Date: 16 August 2002 Work Package: WP8 Nature of Deliverable:

More information

ASON for Optical Networks

ASON for Optical Networks 1/287 01-FGC1010609 Rev B ASON for Optical Networks Ericsson Control Plane for DWDM Optically Switched Networks ASON for MHL3000 Introduction The growing demand for multiple service is changing the network

More information

Virtual CPE and Software Defined Networking

Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Virtual CPE and Software Defined Networking Residential broadband service providers are looking for solutions that allow them to rapidly introduce innovative

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction... Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information