Network Load Imposed by Software Agents in Distributed Plant Automation

Size: px
Start display at page:

Download "Network Load Imposed by Software Agents in Distributed Plant Automation"

Transcription

1 Network Load Imposed by Software Agents in Distributed Plant Automation Yoseba K. Penya Vienna University of Technology Institute of Computer Technology Gusshausstrasse 27/E384, A-1040 Wien Austria Thilo Sauter Vienna University of Technology Institute of Computer Technology Gusshausstrasse 27/E384, A-1040 Wien Austria Abstract The current state of the art in production planning is still dominated by largely centralized solutions. More distributed approaches require a substantial increase in communication, and network load becomes an important factor. This paper presents a distributed plant automation approach based on mobile software agents and investigates the network load generated by the agents in terms of communication and migration. Particular emphasis is given to the impact of the planning horizon and prioritization, which leads to extensive rescheduling processes. It appears that scheduling approaches that plan several steps in advance need substantially more communication overhead, but can be made less susceptible to snowball effects associated with rescheduling. I. INTRODUCTION As far as the production planning is concerned, the current state of the art in plant automation is still dominated by centralized solutions. Nevertheless, distributed approaches are the focus of much research work. The most obvious benefit of distributing functions of, e.g., the MES (manufacturing execution system) or the control level is a tremendous increase in flexibility, the ultimate goal being an autonomous self organization of the entire production process. Another advantage less often addressed is the scalability. Distributed approaches no longer need powerful central computers to execute the planning tasks, or at least they alleviate the performance requirements. This is beneficial especially in large plants. On the other hand, the reduction of local computing power in distributed systems comes at the price of an increased demand for communication. When the elements of such system increase their flexibility, autonomy and intelligence, they need to exchange more information in order successfully synchronize and coordinate themselves. The network constitutes a shared resource within the plant automation system. This is particularly important for distributed solutions (such as the one addressed by the EUfunded Project PABADIS, Plant Automation Based on Distributed Systems [1,2]) that make use of mobile software agents to enhance the control of the individual manufacturing process. In spite of their benefits, the necessary migration for every step of the production process increases the network traffic. Consequently, it is worthwhile to investigate the impact that a distributed approach has on the network load and where the limits of scalability are. The remainder of the paper is organized as follows: in the section II we introduce the main features of the multiagent system used in PABADIS, section III describes the scheduling approach, section IV explains the model used in the simulation, section V presents and discusses the results, and section VI draws conclusions and outlines future work. II. PLANT AUTOMATION AS AN INFORMATION SYSTEM The classical representation of Plant Automation is that of a three-layered pyramid, where the machinery is on the lowest (control) level and two layers of more complex plant-wide control functions are above it. This approach starts from the assumption that every production cell has a minimum degree of intelligence to give some information that will be used by the upper layer for scheduling, dispatching, and other management tasks. In other words, the plant is conceived as a network of information points. Traditionally, the information stream flows to a central place, where it is processed by an ERP (enterprise resource planning) system that controls the plant as a whole, issues production orders and logs the results. Unlike this approach of concentrating all the responsibility, intelligence, and production management in one point, latest trends tend to distribute these three tasks at least partly between several units that have smaller processing power but communicate and cooperate to enhance the overall plant automation functionalities. In PABADIS, a plant is composed from abstract entities called Cooperative Manufacturing Units () that comprise both an intelligence module and a production module, which can involve one or more machines. All the s are connected to a common network, so they can cooperate in the manufacturing process. There are three types of s (in [2], they are called BIIOs, Basic Intelligent Independent Object, which is essentially the same): Logical s for computational services such as complex scheduling algorithms, database search etc., Manufacturing s for the physical processing of the products, SCADA s providing an interface to the SCADA system that controls the plant. Basically, PABADIS can be seen as an enhancement of an MES, with a clear focus on a product-oriented view (this is why the approach is mainly targeted at single-piece production), rather than the more process-oriented approach of classical MES. According to [3], functions covered by the MES are the following: Resource allocation, scheduling, and dispatching: This most complicated function of the MES manages the resources of the plans and performs ERP order execution. On one hand, the goal of this function is to optimize the usage of resources, such as machines, tools, labor skills, or materials. On the other hand, the product creation must be optimized as well. In PABADIS this functionality is distributed in the community of software agents which act individually with respect to their own tasks, such as product creation or machine optimization.

2 Document control, data collection, product tracking and genealogy, process management and performance analysis: This function provides information to the ERP system regarding the current situation of the production and product processing. Maintenance management, which tracks and directs the activities to maintain the equipment and tools, in order to ensure their availability for manufacturing and to ensure scheduling for periodic or preventive maintenance. III. SCHEDULING IN A MULTI-AGENT SYSTEM As mentioned before, the s in PABADIS are composed of a manufacturing module and an intelligence module. The latter is in fact a stationary agent called Residential Agent () that represents the in the network. It provides the network with an interface to the physical resources and functionalities the offers. The interface is used by the Product Agents (PA), mobile software agents that guide the product through its manufacturing process. In the same way that the Residential Agents know everything about the they represent, the Product Agent possess all the necessary data to optimize the development of the product it is in charge of. Therefore, when a PA arrives at a, it exactly knows which parameters must be indicated to the, in order to get its workpiece processed. Product Agents are created in an entity called Agency, which is the interface of the PABADIS agent community to an ERP system. It processes the demand and transforms it into documents one per work order. The Agency parses the documents and creates a product agent that will be responsible for the creation of the correspondent workpiece. The Agency also collects the reports of the product agents. Finally, there is another key element within PABADIS: the Look-up Service (LUS). It acts as white-pages mechanism for the product agents, so they know where to migrate when they need a specific functionality. Every notifies the LUS of its joining the network, and provides it with data about the functionalities it offers. The LUS periodically renews its data, so that when a PA requests some information, it is up to date. Fig. 1 illustrates the main components of the PABADIS system. A. Scheduling -Parser PABADIS -Parser Agency ERP Much have been said, written and discussed about constrained scheduling and the benefits of using software agents in planning processes in general [4,5,6] in for specific use cases that implement different solutions to face the problem [7,8]. In PABADIS, the scheduling is distributed (physically and operatively); the problem is divided into small bits, since it is carried out in local operations at level between Product Agents and Residential Agents. On the one hand, PAs represent the resource consumers, on the other hand, s represent the resource owners. Consequently, they have to negotiate with each other to reach an agreement. Specifically, the scheduling is performed in two ways: Horizontal fashion: The s collect the incoming requests for processing and generates a schedule of tasks from different Pas that need to be processed on the respective. Vertical fashion: The PAs generates a list with all possible s where its task could be carried out. The combination of both tables forms a matrix representing the whole schedule. B. Depth of Scheduling and priorities The scheduling process is in its simplest form a kind of first-come first-serve model, which is easy to solve. Nevertheless, this simple schema does not fit the requirements imposed by current Plant Automation systems. There must be a mechanism to prioritize the manufacturing of special products to account for urgent demands. Therefore, PABADIS supports priority-based scheduling. When a PA requests a time slot that has been already reserved by a lower-priority PA, the s arbitrates the conflict by assigning the time slot to the high-priority PA. Since the lower-priority PA must reallocate its resources, the notifies it of the new situation to let the PA start a rescheduling process. If the PA stills has a higher priority than other PAs, this may lead to a rescheduling cascade effect [9] propagating through the whole agent community. The solution that PABADIS promotes to reduce this effect is the introduction of a depth of scheduling parameter. This variable gives the number of tasks a Product Agent plans before starting the manufacturing process. Depending on the value of this parameter, the scheduling can be classified in three categories: Advance scheduling: The PA allocates the resources for all tasks in the work order. Thus, the PA analyses the whole work order and chooses the best possible way of execution. The depth of scheduling parameter is equal to the number of tasks the work order comprises. Step-by-step scheduling: In this case a PA allocates a resource for the next task only when the current one is completed. In fact, real scheduling is not necessary for the, which makes the optimization of resource usage almost impossible. The depth of scheduling parameter is equal to 1. Hybrid approach: In this case a PA analyses a work order several steps in advance (the number specified by depth of scheduling parameter) and allocates resources for this certain number of tasks, but not for the whole work order.... -Parser Fig. 1. Components of the PABADIS system

3 C. Life Cycle of a Product Agent Fig. 2 illustrates the program flow of a Product Agent. After parsing the document with the work order, it contacts the Look-up Service to find out about which s provide the functionalities needed for the execution of the work order. The LUS returns a list of matching s and also adds a rough estimate for the time required by each to finish the task. This information is then used by the PA to outline a graph where all the possible paths for the accomplishment of the work order are represented and can be ordered with respect to their overall processing time. Of course, other criteria for the decision might be used as well: workload of the, cost, status of the stocks, etc. Subsequently, the PA selects the best path and starts allocating a depth of scheduling number of tasks on the s that compose such path. This process includes the negotiation with the s about which time-slot is available and which PA with lower priority can be forced to give way. Afterwards, the PA starts the migration and physical manufacturing of its associated workpiece. In case that the depth of scheduling was less than the total amount of tasks needed, it starts a new allocation procedure and so on, until the work piece is finished. IV. MODELING OF THE SYSTEM Allocation error Migration error parse work order ask LUS for needed list depth of scheduling tasks allocation Error? Move to next Error? Perform Task All tasks finished? Move to Agency and report Fig. 2. Program flow of a Product Agent. The objective of the simulation is to evaluate the influence that the behavior of the agents has on the network load. For this purpose, a model representing a worst-case PABADIS environment with the following characteristics is investigated: The objective is to measure the migrations of the agents and the interchanged messages, as well as the time when they are performed or sent. All the parameters (number of agents, number of tasks that compose a work order, etc.) remain fixed, whereas the depth of scheduling and number of product agents with higher priority are the variables to be tuned and observed. Only one kind of product is manufactured, hence the work orders of all Product Agents are identical. Moreover, all Residential Agents represent similar s, therefore each work order is composed of a fixed number of identical tasks. Migration time is supposed to be negligible. Hence, there is no need to include time slots for migrations in the scheduling. Furthermore, the migration is performed before as the task but in the same time slot. Although all s are alike, the PAs can not reserve two time slots with the same. They must perform a task and then move to a different machine. Each PA starts its life cycle at the Agency and it must return there upon completion of the work order to report about the operation that was carried out. Thus, there is always an extra movement (not necessary for the manufacturing of the product) that must be done by the Product Agent. The simulation itself is not based on a real agent platform (like the Grasshopper platform used in the PABADIS project) and several machines, but for the sake of simplicity on a multi-threaded Java program running on a single PC. The flow of the program is as follows: a daemon thread starts four Residential Agent threads and afterwards ten Product Agent threads consecutively and with a small pause in between to have enough time to finish the allocation of resources. The agents allocate their required resources from the first time step on, so the first time interval is devoted to initial operations. Furthermore, all the highpriority PAs are launched when the ordinary PAs have finished their respective allocation procedures. Since by that time the previous PAs have already reserved time slots in the s, the highest possible number of rescheduling processes will happen (one per task and high-priority PA). Table I shows the set-up details of the individual experiments. The work order length is set to ten tasks that require each one-time step for execution. The daemon thread acts also as the clock of the system, so every time it ticks, all the PAs and s are notified. After simulation starts, the Product Agents contact the LUS and then begin to allocate a number of tasks defined by the depth of scheduling parameter. According to the program flow shown in Fig. 2, they wait afterwards until they are able to move and perform an operation on a. Moreover, if the task was the last to do, they quit and return to the Agency. If the task is the last allocated but they needed to allocate more (thus, the depth of scheduling is less than the total number of tasks), they restart the allocation process. To account for the network traffic, the daemon thread

4 TABLE I EXPERIMENTS PERFORMED IN THE SIMULATION. Identifier Depth of Scheduling high-priority PAs A0 1 (step by step) 0 A2 1 (step by step) 2 A4 1 (step by step) 4 B0 5 (50% of tasks) 0 B2 5 (50% of tasks) 2 B4 5 (50% of tasks) 4 C0 10 (full advance) 0 C2 10 (full advance) 2 C4 10 (full advance) 4 registers all messages sent and migrations performed upon notification of the entity that did it. Effectively, only the numbers are counted. The final value of the network traffic is then estimated. Taking into account that the maximum length of an Ethernet packet is 1500 bytes, a segmentation of the agent is indispensable. Furthermore, the header information for Ethernet (11 bytes), IP (20 bytes), and TCP (20 bytes) must also be included. The agent size assumed here is 3,000 bytes for the code and 1,200 bytes for the data of the work order. This makes three packets and in total 4123 bytes that need to be moved, each time the agent migrates from one to another. The messages exchanged between the agents are very short, they are assumed to have just 10 bytes each, which is enough to convey information about status, time slot availability, or schedule details. However, the header overhead is significant, and so a total of 61 bytes must be sent over the network. Concerning the rescheduling processes that can be initiated be Product Agents with a higher priority, an additional restriction was imposed on the timing. It is essential to avoid rescheduling when the affected agent is migrating or is about to migrate. Therefore, the time slot that is going to be reassigned must be at least one time step after the request from the high-priority agent is received. V. RESULTS Table II shows the main results of the experiments. At first sight, it can be seen that migrations are not affected by the variation in the change of scheduling or the number of PAs with higher priority. They are always 11 per PA, this is, one for each task and one more for the return to the Agency (the high-priority agents are not counted to ensure comparability). Fig. 3 shows the average of the experiments (A for A0, A2 and A4; B for B0, B2 and B4, etc.). It illustrates the behaviors of the system over time. The number of rescheduling processes depends only on the number of high-priority PAs and the number of tasks to be performed. Thus, with 8 high-priority PAs and 10 tasks, 80 rescheduling processes happen. There is no snowball effect because there are only two different priorities, and the affected PAs are not able to cause more rescheduling processes (the other PAs have at least the same priority). Another interesting effect regarding the rescheduling is that if the PAs do some advance scheduling, a higher number of high-priority agents results in a decrease of total messages needed in the experiment. The reason is the scheduling strategy of the agents. The PA aims to allocate all the tasks consecutively. If there is a gap in its schedule, this means that other PAs reserved the slots in between. Thus, when rescheduling, the PA assumes that earlier time slots are already reserved and therefore does not try to allocate them, which spares messages. For instance, if a PA has allocated the following resources: t = 10, t = 11, t = 13, and it receives a notification of rescheduling at t = 10, the PA will start rescheduling from t = 13 on. It supposes that if it previously did not succeed in allocating resources for t = 12, it will not succeed in the future. This effect is especially relevant with advanced planning, since the saving is bigger than in step-by-step or hybrid scheduling (see Table II). Fig. 3 clearly shows the network load for each scheduling modality. Advance scheduling (type C) requires most of the network traffic at the beginning, where the PAs send all the messages. Afterwards, they migrate to the s without any further exchange of information. The hybrid approach (type B) presents a diagram with pronounced peaks, corresponding to the moments where the allocation is performed. Since the depth of scheduling is 5 and the PAs start allocating from t = 1, the time slots with higher network traffic are 6, 11, and then 16, 21, etc, but obviously the peaks are smaller since there are fewer agents. Finally, the type A experiments (step-by-step scheduling) do not show significant peaks (only when in the same time slot some PAs turn back to the Agency and others migrate to perform a task) and distribute the network load uniformly. Fig. 4 shows the average of the results with the number of high-priority PAs as parameter. It confirms what exposed for Fig. 3: experiments with a lower number of highpriority PAs need to interchange a higher amount of data, due to the previously explained improvement in the allocation procedure. VI. CONCLUSION AND FUTURE WORK The model presented in this paper illustrates the impact on the network load that different scheduling modalities for a plant automation system based on mobile software agents have. The simulation demonstrated that snowball effects due to rescheduling processes and extra migrations could be avoided by using only two different priority levels, and by ensuring that an agent to that is going to be Identifier Finishing Time Messages Migrations Bytes transmitted A A A B B B C C C TABLE II RESULTS OF THE MEASUREMENTS

5 Data Transmitted (bytes) A B C Time Elapsed (seconds) Fig. 3. Average behavior of the experiments regarding the depth of scheduling Data transmitted (bytes) high-p Pas 2 high-p Pas 4 high-p Pas Time elapsed (seconds) Fig. 4. Average behavior of the experiments regarding the number of high-priority Product Agents. rescheduled is not about to arrive at the targeted. Evidently, the simulation model used was rather coarse. In the course of the project, however, it will be refined to account for, e.g., non-uniform task execution times per, which will open new possibilities for optimization. The simulations seem to suggest that full in-advance scheduling creates an extremely high network load at the beginning of the process and is therefore inferior to a stepby-step scheduling or an approach with a low depth of scheduling where the load is more balanced. From the viewpoint of network load, this is certainly true. However, the simulation cannot judge the benefits of a larger scheduling depth such as better optimization results that might outweigh the temporarily higher network traffic. Still, future investigations have to explore the impact the number of agents has on the load. Particularly during the negotiation phase, it is anticipated that the load will dramatically increase with the number of agents. The available network bandwidth may therefore easily put an upper limit to the practically achievable scheduling depth. Of course, it has to be noted that it is highly unlikely that all PAs start at the same time. In practice, they can be released with short delays in between. The only critical situation will be then a rescheduling process affecting a large number of agents. REFERENCES [1] PABADIS, IST , [2] T. Sauter and P. Palensky, "Network Technology for Distributed Plant Automation", in Proceedings of the IEEE International Conference on Intelligent Engineering Systems (INES) 2001, pp [3] MES Association, [4] C. Le Pape, Classification of scheduling problems and selection of corresponding constraint-based techniques, in Proceedings of the IEE Colloquium on Advanced Software Technologies for Scheduling 1993, pp. 1/1-1/3. [5] P. Prosser, The future of scheduling-dai?, in Proceedings of the IEE Colloquium on Advanced Software Technologies for Scheduling 1993, pp. 8/1-8/2. [6] T. Grant, Overview And Conclusions, in Proceedings of the IEE Colloquium on Intelligent Planning and Scheduling Solutions 1996, pp. 7/1-7/4. [7] B. Drabble, Modern planning and scheduling technologies, in Proceedings of the IEE Colloquium on Intelligent Planning and Scheduling Solutions 1996, pp. 3/1-3/6. [8] J. Reaidy, P. Massotte, L. Yingjiu and D. Diep, Product and process reconfiguration based on intelligent agents, in Proceedings of the 2001 IEEE International Conference on Systems, Man, and Cybernetics, pp [9] M. Fletcher and S. M. Deen, Task rescheduling in multi-agent manufacturing, in Proceedings of the 1999 International Workshop on Database and Expert Systems Applications, pp

ERP Integration into Generic Plant Automation Model

ERP Integration into Generic Plant Automation Model Integration into Generic Plant Automation Model Yoseba K. Penya, Alexei Bratoukhine and Thilo Sauter Institute of Computer Technology VIENNA UNIVERSITY OF TECHNOLOGY Gußhausstraße 27/E384, A-1040 Wien

More information

Intelligent Software Agents in Plant Automation

Intelligent Software Agents in Plant Automation Intelligent Software Agents in Plant Automation Alexei Bratoukhine, Yoseba K. Penya and Thilo Sauter Institute of Computer Technology VIENNA UNIVERSITY OF TECHNOLOGY Gusshausstrasse 27/E384, A-1040 Wien

More information

19 Comparison of Ethernet Systems

19 Comparison of Ethernet Systems Frithjof Klasen Ever since the end of the 90 s, the usage of industrial Ethernet in automation has been a pursued target. Along with this, the desire emerged to have a universal and standard communication

More information

Performance Testing Process A Whitepaper

Performance Testing Process A Whitepaper Process A Whitepaper Copyright 2006. Technologies Pvt. Ltd. All Rights Reserved. is a registered trademark of, Inc. All other trademarks are owned by the respective owners. Proprietary Table of Contents

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools

A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools A Conceptual Approach to Data Visualization for User Interface Design of Smart Grid Operation Tools Dong-Joo Kang and Sunju Park Yonsei University unlimit0909@hotmail.com, boxenju@yonsei.ac.kr Abstract

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router*

FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 399-407 UDK: 004.738.5.057.4 FPGA Implementation of IP Packet Segmentation and Reassembly in Internet Router* Marko Carević 1,a,

More information

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING

CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

Dong-Joo Kang* Dong-Kyun Kang** Balho H. Kim***

Dong-Joo Kang* Dong-Kyun Kang** Balho H. Kim*** Visualization Issues of Mass Data for Efficient HMI Design on Control System in Electric Power Industry Visualization in Computerized Operation & Simulation Tools Dong-Joo Kang* Dong-Kyun Kang** Balho

More information

A New Approach to Enhance E-mail Performance Through SMTP Protocol

A New Approach to Enhance E-mail Performance Through SMTP Protocol IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.4, April 2008 299 A New Approach to Enhance E-mail Performance Through SMTP Protocol Hussein A.Al bazar,sureswaran Ramadass,

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

Measure wireless network performance using testing tool iperf

Measure wireless network performance using testing tool iperf Measure wireless network performance using testing tool iperf By Lisa Phifer, SearchNetworking.com Many companies are upgrading their wireless networks to 802.11n for better throughput, reach, and reliability,

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Capacity Planning Process Estimating the load Initial configuration

Capacity Planning Process Estimating the load Initial configuration Capacity Planning Any data warehouse solution will grow over time, sometimes quite dramatically. It is essential that the components of the solution (hardware, software, and database) are capable of supporting

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Real-Time Scheduling 1 / 39

Real-Time Scheduling 1 / 39 Real-Time Scheduling 1 / 39 Multiple Real-Time Processes A runs every 30 msec; each time it needs 10 msec of CPU time B runs 25 times/sec for 15 msec C runs 20 times/sec for 5 msec For our equation, A

More information

Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data

Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data Fifth International Workshop on Computational Intelligence & Applications IEEE SMC Hiroshima Chapter, Hiroshima University, Japan, November 10, 11 & 12, 2009 Extension of Decision Tree Algorithm for Stream

More information

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Muse Server Sizing. 18 June 2012. Document Version 0.0.1.9 Muse 2.7.0.0

Muse Server Sizing. 18 June 2012. Document Version 0.0.1.9 Muse 2.7.0.0 Muse Server Sizing 18 June 2012 Document Version 0.0.1.9 Muse 2.7.0.0 Notice No part of this publication may be reproduced stored in a retrieval system, or transmitted, in any form or by any means, without

More information

Dynamic Thread Pool based Service Tracking Manager

Dynamic Thread Pool based Service Tracking Manager Dynamic Thread Pool based Service Tracking Manager D.V.Lavanya, V.K.Govindan Department of Computer Science & Engineering National Institute of Technology Calicut Calicut, India e-mail: lavanya.vijaysri@gmail.com,

More information

Learning More About Load Testing

Learning More About Load Testing Welcome to this introduction to application performance testing and the LoadRunner load testing solution. This document provides a short overview of LoadRunner s features, and includes the following sections:

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols

Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji

More information

The Matrix - A framework for real-time resource management for video streaming in networks of heterogenous devices

The Matrix - A framework for real-time resource management for video streaming in networks of heterogenous devices The Matrix - A framework for real-time resource management for video streaming in networks of heterogenous devices Larisa Rizvanovic Mälardalen University Department of Computer Science and Electronics

More information

Semester Thesis Traffic Monitoring in Sensor Networks

Semester Thesis Traffic Monitoring in Sensor Networks Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006 Supervisors: Nicolas

More information

How To Test For Elulla

How To Test For Elulla EQUELLA Whitepaper Performance Testing Carl Hoffmann Senior Technical Consultant Contents 1 EQUELLA Performance Testing 3 1.1 Introduction 3 1.2 Overview of performance testing 3 2 Why do performance testing?

More information

NFS File Sharing. Peter Lo. CP582 Peter Lo 2003 1

NFS File Sharing. Peter Lo. CP582 Peter Lo 2003 1 NFS File Sharing Peter Lo CP582 Peter Lo 2003 1 NFS File Sharing Summary Distinguish between: File transfer Entire file is copied to new location FTP Copy command File sharing Multiple users can access

More information

Hadoop Fair Scheduler Design Document

Hadoop Fair Scheduler Design Document Hadoop Fair Scheduler Design Document October 18, 2010 Contents 1 Introduction 2 2 Fair Scheduler Goals 2 3 Scheduler Features 2 3.1 Pools........................................ 2 3.2 Minimum Shares.................................

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

An Overview of Distributed Databases

An Overview of Distributed Databases International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Parallel Scalable Algorithms- Performance Parameters

Parallel Scalable Algorithms- Performance Parameters www.bsc.es Parallel Scalable Algorithms- Performance Parameters Vassil Alexandrov, ICREA - Barcelona Supercomputing Center, Spain Overview Sources of Overhead in Parallel Programs Performance Metrics for

More information

D1.2 Network Load Balancing

D1.2 Network Load Balancing D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June ronald.vanderpol@sara.nl,freek.dijkstra@sara.nl,

More information

Priori ty ... ... ...

Priori ty ... ... ... .Maintenance Scheduling Maintenance scheduling is the process by which jobs are matched with resources (crafts) and sequenced to be executed at certain points in time. The maintenance schedule can be prepared

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

Distributed Data Management

Distributed Data Management Introduction Distributed Data Management Involves the distribution of data and work among more than one machine in the network. Distributed computing is more broad than canonical client/server, in that

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Encoding Text with a Small Alphabet

Encoding Text with a Small Alphabet Chapter 2 Encoding Text with a Small Alphabet Given the nature of the Internet, we can break the process of understanding how information is transmitted into two components. First, we have to figure out

More information

Overlapping Data Transfer With Application Execution on Clusters

Overlapping Data Transfer With Application Execution on Clusters Overlapping Data Transfer With Application Execution on Clusters Karen L. Reid and Michael Stumm reid@cs.toronto.edu stumm@eecg.toronto.edu Department of Computer Science Department of Electrical and Computer

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines

Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Reconfigurable Architecture Requirements for Co-Designed Virtual Machines Kenneth B. Kent University of New Brunswick Faculty of Computer Science Fredericton, New Brunswick, Canada ken@unb.ca Micaela Serra

More information

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page

More information

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks

Implementation of a Lightweight Service Advertisement and Discovery Protocol for Mobile Ad hoc Networks Implementation of a Lightweight Advertisement and Discovery Protocol for Mobile Ad hoc Networks Wenbin Ma * Department of Electrical and Computer Engineering 19 Memorial Drive West, Lehigh University Bethlehem,

More information

Manufacturing Planning and Control

Manufacturing Planning and Control 1 Chapter Manufacturing Planning and Control The manufacturing planning and control (MPC) system is concerned with planning and controlling all aspects of manufacturing, including managing materials, scheduling

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

Resources Management

Resources Management Resources Management. Introduction s we have seen in network scheduling, the basic inputs to criticalpath analysis are the individual project activities, their durations, and their dependency relationships.

More information

Distributed Load Balancing for FREEDM system

Distributed Load Balancing for FREEDM system Distributed Load Balancing for FREEDM system Ravi Akella, Fanjun Meng, Derek Ditch, Bruce McMillin, and Mariesa Crow Department of Electrical Engineering Department of Computer Science Missouri University

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

Development of a personal agenda and a distributed meeting scheduler based on JADE agents

Development of a personal agenda and a distributed meeting scheduler based on JADE agents Development of a personal agenda and a distributed meeting scheduler based on JADE agents Miguel Ángel Sánchez Álvaro Rayón Alonso Grupo de Sistemas Inteligentes Departamento de Ingeniería Telemática Universidad

More information

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana

More information

A Satellite Network Management Architecture based on Mobile Agents and SNMP

A Satellite Network Management Architecture based on Mobile Agents and SNMP 2012 4th International Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Singapore A Satellite Network Management Architecture based on Mobile Agents and SNMP Jianli

More information

Service oriented Architecture results from Arrowhead and its usage in EMC2

Service oriented Architecture results from Arrowhead and its usage in EMC2 1 Service oriented Architecture results from Arrowhead and its usage in EMC2 Professor Jerker Delsing Luleå University of Technology, Sweden www.arrowhead.eu 2 Building Automation Systems from IoT Arrowhead

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal

In: Proceedings of RECPAD 2002-12th Portuguese Conference on Pattern Recognition June 27th- 28th, 2002 Aveiro, Portugal Paper Title: Generic Framework for Video Analysis Authors: Luís Filipe Tavares INESC Porto lft@inescporto.pt Luís Teixeira INESC Porto, Universidade Católica Portuguesa lmt@inescporto.pt Luís Corte-Real

More information

CX2822x. Application Note. Feature Descriptions. Differential Delay Drain. Mindspeed Technologies 1. Background

CX2822x. Application Note. Feature Descriptions. Differential Delay Drain. Mindspeed Technologies 1. Background 500185A August 3, 2001 CX2822x Feature Descriptions Differential Delay Drain Background When an IMA group is first created, the IMA system adjusts the depth of the differential delay buffer in order to

More information

Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer

Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment Analyzer Version 2.0.0 Notes for Fixpack 1.2.0-TIV-W3_Analyzer-IF0003 Tivoli IBM Tivoli Web Response Monitor and IBM Tivoli Web Segment

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

Corporate Network Services of Tomorrow Business-Aware VPNs

Corporate Network Services of Tomorrow Business-Aware VPNs Corporate Network Services of Tomorrow Business-Aware VPNs Authors: Daniel Kofman, CTO and Yuri Gittik, CSO Content Content...1 Introduction...2 Serving Business Customers: New VPN Requirements... 2 Evolution

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

An Introduction to VoIP Protocols

An Introduction to VoIP Protocols An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

The Importance of Software License Server Monitoring

The Importance of Software License Server Monitoring The Importance of Software License Server Monitoring NetworkComputer How Shorter Running Jobs Can Help In Optimizing Your Resource Utilization White Paper Introduction Semiconductor companies typically

More information

Performance Workload Design

Performance Workload Design Performance Workload Design The goal of this paper is to show the basic principles involved in designing a workload for performance and scalability testing. We will understand how to achieve these principles

More information

A Hybrid Load Balancing Policy underlying Cloud Computing Environment

A Hybrid Load Balancing Policy underlying Cloud Computing Environment A Hybrid Load Balancing Policy underlying Cloud Computing Environment S.C. WANG, S.C. TSENG, S.S. WANG*, K.Q. YAN* Chaoyang University of Technology 168, Jifeng E. Rd., Wufeng District, Taichung 41349

More information

P2P VoIP for Today s Premium Voice Service 1

P2P VoIP for Today s Premium Voice Service 1 1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

An Oracle White Paper February 2010. Rapid Bottleneck Identification - A Better Way to do Load Testing

An Oracle White Paper February 2010. Rapid Bottleneck Identification - A Better Way to do Load Testing An Oracle White Paper February 2010 Rapid Bottleneck Identification - A Better Way to do Load Testing Introduction You re ready to launch a critical Web application. Ensuring good application performance

More information

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009

Rapid Bottleneck Identification A Better Way to do Load Testing. An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing An Oracle White Paper June 2009 Rapid Bottleneck Identification A Better Way to do Load Testing. RBI combines a comprehensive understanding

More information

ON-SITE/NEAR-SHORE/OFF-SITE DELIVERY MODELS

ON-SITE/NEAR-SHORE/OFF-SITE DELIVERY MODELS ON-SITE/NEAR-SHORE/OFF-SITE DELIVERY MODELS The delivery model utilized is based on the location(s) of the project resources in the service delivery. ONSITE DELIVERY MODEL Under the Onsite Delivery Model

More information

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,

More information

CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015

CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 CS423 Spring 2015 MP4: Dynamic Load Balancer Due April 27 th at 9:00 am 2015 1. Goals and Overview 1. In this MP you will design a Dynamic Load Balancer architecture for a Distributed System 2. You will

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

How To Balance A Web Server With Remaining Capacity

How To Balance A Web Server With Remaining Capacity Remaining Capacity Based Load Balancing Architecture for Heterogeneous Web Server System Tsang-Long Pao Dept. Computer Science and Engineering Tatung University Taipei, ROC Jian-Bo Chen Dept. Computer

More information

Agent vs. Agent-less auditing

Agent vs. Agent-less auditing Centennial Discovery Agent vs. Agent-less auditing Building fast, efficient & dynamic audits As network discovery solutions have evolved over recent years, two distinct approaches have emerged: using client-based

More information

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM

PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate

More information

RFC 2544 Testing of Ethernet Services in Telecom Networks

RFC 2544 Testing of Ethernet Services in Telecom Networks RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in

More information

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)

Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4) Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely

More information

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform

Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization

IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization 2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource

More information

Protocol Data Units and Encapsulation

Protocol Data Units and Encapsulation Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing

More information