Receiver Buffer Requirement for Video Streaming over TCP
|
|
- Godfrey Clark
- 8 years ago
- Views:
Transcription
1 Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA taehyun.kim@freescale.com b Networking and Telecommunications Grou, College of Comuting, Georgia Institute of Technology, Atlanta, GA 333, USA ammar@cc.gatech.edu ABSTRACT TCP is one of the most widely used transort rotocols for video streaming. However, the rate variability of TCP makes it difficult to rovide good video quality. To accommodate the variability, video streaming alications require receiver-side buffering. In current ractice, however, there are no systematic guidelines for the rovisioning of the receiver buffer, and smooth layout is insured through over-rovisioning. In this work, we are interested in memory-constrained alications where it is imortant to determine the right size of receiver buffer in order to insure a rescribed video quality. To that end, we characterize video streaming over TCP in a systematic and quantitative manner. We first model a video streaming system analytically and derive an exression of receiver buffer requirement based on the model. Our analysis shows that the receiver buffer requirement is determined by the network characteristics and desired video quality. Exerimental results validate our model and demonstrate that the receiver buffer requirement achieves desired video quality. Keywords Media over Networks, Video Streaming, Streaming Video Protocols 1. INTRODUCTION A video streaming alication has to emloy a transort layer rotocol to transmit acketized video. Since TCP is the dominant rotocol in the Internet, it is reasonable to emloy TCP for video streaming: recent measurement study has reorted that % of video streaming flows are actually delivered over TCP. 11 Esecially, there are many situations in which video streaming servers are located behind firewalls that ermit only re-secified ort numbers. In this scenario, video streaming over TCP is the only choice to get around the firewalls over the well-known ort numbers (e.g., HTTP or RTSP). Also, the reliable acket delivery of TCP is imortant, when error resilience is not imlemented in a video codec. While the use of TCP rovides reliable video stream delivery, it is difficult to rovide good quality of streaming video over TCP: 1) the sawtooth behavior of additive increase and multilicative decrease (AIMD) incurs significant data rate variability, and ) the use of retransmission timeouts may introduce unaccetable end-to-end delay, and the retransmitted data may be delivered too late for dislay. 3, 5, 9 These drawbacks of TCP can be mitigated to some extent through the use of receiver-side buffering. The buffer size has to be large enough to insure that desired video quality can be achieved. In current ractice, however, there are no systematic guidelines for the rovisioning of the receiver buffer, and smooth layout is insured through over-rovisioning. We are interested in memory-constrained alications where it is desirable to determine the right receiver buffer size. This aer, therefore, considers the question of how large the receiver buffer should be in order to achieve desired erformances for streaming video over TCP. To this end, we characterize video streaming over TCP in a systematic and quantitative manner. Our starting oint is an analytic model of a streaming system of CBR video. Based on this model, we quantify the receiver buffer requirement. Exerimental results validate our model and demonstrate that the minimum buffering delay can achieve desired video quality. The remainder of the aer is organized as follows. In Section, we resent a video streaming model and derive the receiver buffer requirement. Section 3 shows exerimental results to validate our model. This aer is concluded in Section.
2 . MODEL AND ANALYSIS.1. Video Streaming Model over TCP Figure 1 shows a video streaming model which consists of a sender and a receiver. We assume that the sender transmits re-recorded CBR video over a unicast TCP connection, and the receiver is equied with a receiver buffer in front of a video decoder. The decoder waits to fill the buffer before dislaying video. There are two tyes of buffering delay caused by the receiver buffer. Initial buffering: to accommodate initial throughut variability or inter-acket jitters, it is needed to emloy initial buffering. While a streaming alication achieves more tolerance with larger initial buffering, it increases the startu latency and resonse time. Rebuffering: the decrease of throughut within a TCP streaming session might cause the receiver buffer starvation. When this haens, a decoder stos dislaying video until it receives enough video ackets. Note that rebufferings take lace in the middle of video streaming, and therefore the rebuffering delay requirement for a long video stream is determined by the congestion avoidance algorithm of TCP. In this aer, we assume that the amount of the initial buffering delay and the rebuffering delay is identical, so that the receiver buffer size for initial buffering and rebuffering is the same. Network k Sender Receiver Figure 1. A video streaming model over TCP Let λ k be the arrival rate of video ackets at round k, and λ be the video encoding rate, where a round is defined by a duration between the transmission of ackets and the recetion of the first acknowledgment (ACK) in a congestion window. It is assumed that a round is equal to the round-tri time (RTT) and indeendent of the congestion window size. Figure (a) shows a tyical behavior of a TCP flow. We consider the TCP Reno model in this aer, since it is one of the most oular imlementations in the current Internet. 7 In this model, the steady state throughut is determined by the congestion window size which is adjusted based on acket losses. A acket loss can be detected by either trile-dulicate ACKs or timeouts, where we denote the former events by TD and the latter by TO. Consider a TD eriod (TDP) in Figure (a). Each TDP starts immediately after trile-dulicate ACKs and increases the congestion window size by 1/b until trile-dulicate ACKs are encountered again. However, when multile ackets are lost and less than three dulicated ACKs are received, a TO eriod (TOP) begins. In each TOP, a sender stos transmitting data ackets for a timeout interval and retransmits non-acknowledged ackets. Note that the timeout interval in a TOP increases exonentially until it reaches T. On the other hand, Figure (b) shows the layout characteristic at a receiver, where it is assumed that the video layout rate is two ackets worth of data er RTT. We can observe that, if a right size of receiver buffering is emloyed, a consistent CBR layout can be achieved without any interrution. In this aer, the erformance of a video streaming alication is evaluated by the buffer underrun robability and the disrution frequency: Note that λ k is a function of time secified by round k, whereas there is no subscrit on λ, since the data rate fed into a video decoder is assumed to be CBR. Note that b =if delayed acknowledgment is imlemented at the receiver. Otherwise b =1.
3 TDP i TDP i+1 T T T TDP 1 3 k Z TD Z TO (a) Packet arrival characteristic at a receiver buffering delay (b) Playout characteristic at a decoder Figure. An illustration of receiver buffering time The buffer underrun robability is defined by n/n, where n is the number of buffer underrun events, and N is the number of eochs in a video stream. An eoch is defined by E[Z TD + Z TO ], where Z TO is the duration of a TOP, and Z TD is the duration between two TOPs. Note that a Z TD consists of one or more TDPs. The disrution frequency 1 is defined by n/t, where n is the number of buffer underrun events, and T is the duration of a video streaming session. Since T consists of N eochs, a disrution frequency can be exressed by the ratio of the buffer underrun robability to the duration of an eoch... Receiver Buffer Requirement We investigate the erformance when average TCP throughut matches video encoding rate. This is the case when the video encoding rate is determined by the access link bandwidth, and the available bandwidth is limited by the access link caacity. For examle, many video streaming websites rovide multile coies with identical content, generated at different data rates. A receiver selects an aroriate stream that matches with the access link caacity. We assume that the video encoding rate is equal to the average TCP throughut and does not change over time. Hence, the encoding rate is modeled by 7 1 λ = ackets/rtt, b 3 + T R min(1, 3 3b )(1 + 3 ) where is the acket loss rate of a TCP streaming flow, R is the round-tri time, and T is the retransmission timeout. Let q k be the receiver buffer size at round k. Since λ k ackets are received and λ ackets are drained in a TDP, the buffer size is given by q k = q k 1 + λ k λ, (1) where k =1,,...,X i ; and X i is the number of round where a TD loss is detected. On the other hand, since no acket is delivered to a receiver, the receiver buffer size in a TOP is given by where k =1,,..., Z TO /R. Notations in the aer are summarized in Table 1. q k = q k 1 λ, ()
4 Table 1. Notations q receiver buffer size at round q k receiver buffer size at round k q min minimum buffer size acket loss rate R round-tri time λ k arrival { rate of video ackets at round k: Wi 1 λ k = + k b 1 ackets/rtt, in TDP i, otherwise. λ video encoding rate b number of ackets that are acknowledged by an ACK W i congestion window size at the end of TDP i X i number of round where a TD loss is detected Y i number of ackets sent in TDP i α i the first acket lost in TDP i β i number of ackets sent in the last round T retransmission timeout desired buffer underrun robability P u We define the buffer underrun robability by the robability of the minimum buffer size to be non-ositive. Since a receiver is either in a TDP or in a TOP, the buffer underrun robability at time t is decomosed into the sum of conditional robabilities, such that P {q min } = P {q min t Z TD }P {t Z TD } + P {q min t Z TO }P {t Z TO }. (3) From the conditional buffer requirements in (3), we can derive the buffer size requirement under which the robability that the unconditional minimum buffer size goes non-ositive. Theorem.1 below states that the minimum buffer requirement is determined by the network characteristics and desired buffer underrun robability. THEOREM.1. Given network model characterized by the acket loss rate (), RTT (R), and retransmission timeout (T ), the receiver buffer size (q ) that achieves desired buffer underrun robability (P u ) is given by q.1 [ P u b (T 3b R ) min(1, 3 )(1 + 3 )]. Proof. See Aendix. Given receiver buffer size, required buffering delay is determined by d = q B(,R), where B(, R) is the steady state TCP throughut. 7 Therefore, d corresonds to the time delay for buffered ackets to be drained. The duration of an eoch can also be determined, 7 such that an eoch of a TCP flow is given by E[Z TD + Z TO ]= R( b 3 min(1,3 +1) f() 3b + T ) 1, where f() = EVALUATION In this section, we resent exerimental results by which layout disrution characteristics are evaluated. The exerimental results including simulation scrits are available in the comanion website.
5 3.1. Exerimental Setu TCP throughut dynamics are generated over a single bottleneck toology. The number of TCP streaming flows is set to 5. All access links have sufficient caacity so that any acket dro occurs at the bottleneck link: the access links have 1Mbs caacity and 1ms delay, whereas the bottleneck link has 1Mbs caacity and ms delay. We run ns- simulations over this toology. To model the TCP throughut dynamics, we use the throughut exerienced between streaming senders and receivers: the throughut is measured by counting the number of ackets delivered from a sender to a receiver. All data ackets are 1 bytes long. The queue management algorithm running on intermediate routers is the random early detection (RED). To construct dynamic network characteristics, cometing traffic (or cross traffic) is generated by triggering ersistent FTP flows 1 seconds rior to TCP streaming sessions. The number of cross traffic flows is varying to investigate the effect of the acket loss rate on the erformance of TCP streaming. Unless otherwise secified, following sets of configurations are examined, each of which generates 1 traces using different random seeds. In all configurations, the duration of simulation time is set to seconds. Configuration 1: the number of cometing FTP flows is assumed to be 3 that leads video streaming flows to have 1.3ms RTT, 179.ms T,.% acket loss rate, and 1.Mbs throughut. Configuration : the number of cometing flows is set to. Measured characteristics of video streaming flows are 11.3ms RTT, 1.3ms T,.79% acket loss rate, and 9.1kbs throughut. Configuration 3: the number of cometing flows is 9. Measurement results are 1.ms RTT, 11.ms T, 1.% acket loss rate, and 715.kbs throughut. It should be noted that measured round-tri delays are different in each configuration, because of the queuing delays in the intermediate routers as well as link delays. To estimate the acket loss rate in each configuration, we emloy the TCP throughut equation. 7 The equation rovides an analytic relationshi between the acket loss rate, RTT, T, and TCP throughut. However, as the relationshi is too comlicated to yield a closed form of a acket loss rate as a function of throughut and RTT, we develo an iterative algorithm in Figure 3 based on the bisection method. Since the TCP throughut equation is continuous and an estimated throughut must lie in the acket loss rate of [, 1], the existence of a root is guaranteed by the intermediate value theorem. Also the estimated acket loss rate is unique, since the estimated throughut is monotonically decreasing as the acket loss rate increases. 1: rocedure ComuteLossRate (R, B) : l =, h =1 3: while h l >ɛdo : =( l + h )/ 5: B = 1 : if B <B 7: h = : else 9: l = 1: enddo 11: endrocedure R b 3 +T min(1,3 3b )(1+3 ) Figure 3. Packet loss rate estimation algorithm The erformance of TCP streaming exeriments is evaluated by the buffer underrun robability and the disrution frequency as defined in Section.1. Note that the number of eochs is given by the simulation time ( seconds) divided by an eoch, and the disrution frequency is the buffer underrun robability divided by an eoch.
6 3.. Buffer Underrun Probability In the first exeriment, we measure the buffer underrun robability in each TCP streaming flow. We investigate 5 TCP streaming flows, since each configuration contains 1 traces, each of which contains 5 TCP streaming flows. Figure (a) shows the buffer underrun characteristics of configuration 1. The solid line secifies the minimum buffering delay requirements in Theorem.1 to achieve desired buffer underrun robability. Each error bar corresonds to the measured buffer underrun robability of 5 TCP streaming flows with 99% confidence interval. When RTT, T, and the acket loss rate are 1.3ms, 179.ms and.%, buffering delays targeting desired buffer underrun robabilities of %, %, and % are 3.53, 7., and 1.13 seconds resectively. Exerimental results show that measured buffer underrun robabilities are tightly bounded by the solid line of 99% confidence level. Observe that the range of the confidence interval is reduced as buffering delay is increased, since the variance of measured buffer underrun robabilities is decreased Underrun robability (%) Underrun robability (%) Underrun robability (%) (a) Configuration (b) Configuration (c) Configuration 3 Figure. Buffer underrun robability characteristics Note that the buffering delay characteristic is a non-linear curve. For examle, when buffering delay is increased from 3 seconds to 9 seconds in Figure (a), desired buffer underrun robability is reduced by.31%. However, when buffering delay is increased from 9 seconds to 15 seconds, the robability is reduced by only 1.%. Therefore, a system designer can find a oint of marginal return using the non-linear characteristics. Figure (b) shows the buffer underrun robability of configuration. Required buffering delays targeting P u =%, %, and % are.7, 5.1, and 1. seconds resectively. Comared with Figure (a), the 99% confidence intervals are loosely bounded by the buffering delay requirement curve. This is because, as the acket loss rate is increased, the o(1/) term in (1) gets more significant, and the measured buffer underrun robability deviates more from the desired buffer underrun robability curve. Figure (c) shows the buffer underrun robability of configuration 3. Required buffering delays for P u =%, %, and % are.,.5, and 9.1 seconds resectively. Exerimental results demonstrate that desired buffer underrun robability becomes more conservative, as the acket loss rate is increased Disrution Frequency In this exeriment, we investigate disrution frequency characteristics which was defined in Section.1. Measured disrution frequency is defined by the number of buffer underrun events during the second simulation time. Figure 5 shows disrution frequency characteristics for configuration 1,, and 3. The error bar secifies the 99% confidence interval, and the solid line shows desired disrution frequency which is defined by the ratio of desired buffer underrun robability to the duration of an eoch. Hence, Figure 5 exhibits the same characteristics as Figure : 99% confidence interval of measured disrution frequencies is tightly bounded by desired disrution frequency when the acket loss rate is small. However, as the acket loss rate is increased, desired disrution frequency becomes a conservative bound.
7 Disrution frequency (Hz).... Disrution frequency (Hz).... Disrution frequency (Hz) (a) Configuration (b) Configuration Figure 5. Disrution frequency characteristics (c) Configuration 3. CONCLUSION In this aer, we consider video streaming over TCP. While the use of TCP rovides the reliable video stream delivery, the bursty nature of TCP requires buffering at a receiver for smooth video layout. Since it is desirable to determine the right size of receiver buffer in memory-constrained alications, we quantify the buffering requirement to achieve desired buffer underrun robability by analytically modeling the CBR video streaming. Our analysis shows that the receiver buffer requirement is determined by the network characteristics and desired buffer underrun robability (or disrution frequency). Exerimental results validate our model and analysis. APPENDIX: Proof of Theorem.1 In a TDP, since the acket arrival rate is greater than zero, and it is increased linearly until it encounters trile dulicate ACKs, the receiver buffer size at round k in (1) is given by q k = q + k (λ j λ) j=1 = q + k b + (W i 1 λ 1)k. () On the other hand, the receiver buffer size in a TOP in () is given by To rove Theorem.1, the following relationshis 1 are used : q k = q k λ. (5) W i = W i 1 + X i b 1 () Y i = α i + W i 1 (7) Y i = X i (W i 1 + W i )+β i. () Note that the exressions in () and () are different from the original equations 7 by a constant term. However, for small values of, TCP throughut in a TDP can still be exressed by B TDP (, R) = 1 3 R b + o( 1 ). (9) We assume that a round in Z TO is equal to RTT, although no ACK acket is received during Z TO. Although three dulicated ackets are lost and not delivered to a receiver in a TDP, the data recetion rate can be aroximated by the data transmission rate for small. The relationshis can be verified from the ith TDP in Figure (a): the arameters given by W i 1 = W i =, X i =, Y i =39, α i =3, β i =3, and b =satisfy (), (7), and ().
8 To achieve a desired buffer underrun robability, we need to consider the minimum buffer size in () and (5). Using the Markovian inequality, the buffer underrun robability at time t in a TDP is given by P {q min t Z TD } = P {q b (W i 1 λ 1) } E{ b (W i 1 λ 1) } q = b (E{W } λe{w } + λ + λ E{W } +1), (1) q where E{W } stands for the average of Wi 1 and E{W } for the average of W i 1. Equation (1) can be solved using (), (7), and (). From (), it follows that E{X} = b E{W } + b. (11) Observe that squaring () leads to W i = W i 1 + Wi 1Xi b + X i b Xi b W i Hence, the average of X i is given by E{X } = 3b E{W } b E {W } + b E{W } + b. (1) Note that squaring () after maniulating the Wi 1 term yields W i W i W i 1 + W i 1 = X i b X i b +1. (13) From (11), (1), and (13), the correlation of congestion window sizes between adjacent TDPs is given by E{W i W i 1 } = 1 (E{W } + E {W }). (1) We consider (7) and () to derive E{W }. Since α i is the first acket lost in a TDP, α i can be assumed to have a geometric distribution with the robability. Hence, it follows that E{α i } = 1 and E{α i } =. With this assumtion, squaring (7) leads to E{Y } = + E{W } +1+ E{W } E{W }. (15) In the same way, E{Y } can also be obtained by () and (1). Since β i is the number of ackets in the last round, it can be assumed to have a uniform distribution in [1,W i ]. Therefore, squaring () yields E{Y } = E{X } ( 5E{W } + E{W i W i 1 })+E{β}E{X} 3E{W } + E{β } = b (3 E{W } 1 E {W } + E{W } + 1)( 7 E{W } + 1 E {W })+ 3b E {W }( 1 E{W } +1) + E{W } +3E{W } +1. (1) Since the average window size is given 7 by E{W } = 3b + o( 1 ), we assume E{W } = O( 1 ). By equating the relationshis in (15) and (1), we can derive a relationshi, such that Hence, 1b E {W } b 3 E{W } 9 = o( 1 ). E{W } = b + o( 1 ). (17)
9 Note that the long-term average of λ k is equal to λ. Therefore, TCP throughut in (9) can also be alied to λ, such that λ = 3 b + o( 1 ). From (17), the buffer underrun robability in a TDP in (1) is bounded by P {q min t Z TD } b [ q 3b 3 3 b 3b +( b ) ]+o( 1 ) =.1 q + o(1 ). (1) To derive an exression of the buffer underrun robability in a TOP, we consider (5) and aly the Markovian inequality. Since the minimum buffer size in a TOP is given at k = Z TO /R, wehave P {q min t Z TO } = P {q ZTO R λ} E{ZTO } q R λ, (19) Since the average duration of a TOP is described by E{Z TO f() } = T 1, where f() = , (19) leads to P {q min t Z TO } T 3 q R b + o( 1 ). () Now we derive the unconditional robability of buffer underrun from the conditional robabilities. Since W i is a regenerative rocess over the eriod of Z TD + Z TO,wehave P {t Z TD E{Z TD } }= E{Z TD } + E{Z TO }, P {t Z TO E{Z TO } }= E{Z TD } + E{Z TO }, where E{Z TD b } = E{n}(E{X} +1)R, E{X} = 3 + o( 1 ), and E{n} is the average number of TDPs in Z TD. Consider the robability of TO loss indication Q, which is given 7 by Q = 1 E{n} min(1, 3 3b ). From (1) and (), the buffer underrun robability is thus P {q min } = P {q min t Z TD }(E{X} +1)+QP {q min t Z TO }T f() 1 (E{X} +1)R + QT f() 1 3 b min(1, 3 3b )T f() 1.1 q R b 3 + T q R b R 3 + min(1, 3 3b.1 9. [1 + q b (T 3b R ) min(1, 3 )T f() 1 + o( 1 ) )(1 + 3 )] + o( 1 ). (1) Therefore, given desired buffer underrun robability, such that P {q min } P u, required buffer size is given by q.1 [ P u b (T 3b R ) min(1, 3 )(1 + 3 )].
10 REFERENCES 1. Z. Chen, T. Bu, M. Ammar, and D. Towsley, Comments on modeling TCP Reno erformance: a simle model and its emirical validation, to aear in IEEE/ACM Trans. Networking.. Comanion web site, htt:// streaming.html, P. de Cuetos and K. W. Ross, Adative rate control for streaming stored Fine-Grained Scalable video, NOSSDAV, Miami, FL, May.. Freescale alication rocessors, htt:// nodeid=1jfs C. Krasic, K. Li, and J. Walole, The case for streaming multimedia with TCP, idms 1, Lancaster, UK, Set. 1.. ns- network simulator, htt:// J. Padhye, V. Firoiu, D. Towsley, and J. Kurose, Modeling TCP reno erformance: a simle model and its emirical validation, IEEE/ACM Trans. Networking, vol., no., , Ar... W. H. Press, B. P. Flannery, S. A. Teukolsky, and W. T. Vetterling, Numerical recies in C, Cambridge university ress, D. Saarilla and K. W. Ross, Streaming stored continuous media over fair-share bandwidth, NOSSDAV, Chael Hill, NC, June. 1. W. Tan, W. Cui, and J. G. Aostolooulos, Playback buffer equalization for streaming media using stateless transort rioritization, Packet Video 3, Nantes, Fr, Ar Y. Wang, M. Clayool, and Z. Zuo, An emirical study of realvideo erformance across the Internet, ACM SIG- COMM IMW 1, San Francisco, CA, Nov. 1.
Red vs. Blue - Aneue of TCP congestion Control Model
In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6
More informationMonitoring Frequency of Change By Li Qin
Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial
More informationTCP, Active Queue Management and QoS
TCP, Active Queue Management and QoS Don Towsley UMass Amherst towsley@cs.umass.edu Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle
More informationTRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks
On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources
More informationComparative Analysis of Congestion Control Algorithms Using ns-2
www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,
More informationOn Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks
On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering
More informationLow-rate TCP-targeted Denial of Service Attack Defense
Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu
More informationImproving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
More informationSources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross
Multimedia Communication Multimedia Systems(Module 5 Lesson 2) Summary: H Internet Phone Example Making the Best use of Internet s Best-Effort Service. Sources: H Chapter 6 from Computer Networking: A
More informationWeb Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
More informationBroadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
More informationTCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
More informationMulti-Channel Opportunistic Routing in Multi-Hop Wireless Networks
Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de
More informationLarge-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation
Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu
More informationBuffer Sizing in 802.11 Wireless Mesh Networks
Buffer Sizing in 80. Wireless Mesh Networks Kamran Jamshaid, Basem Shihada,LiXia, and Phili Levis MCSE Division, KAUST, Saudi Arabia. {kamran.jamshaid, basem.shihada, li.xia}@kaust.edu.sa Deartment of
More informationFinding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network
Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,
More information17: Queue Management. Queuing. Mark Handley
17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.
More informationAn important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
More informationOptimal Bandwidth Monitoring. Y.Yu, I.Cheng and A.Basu Department of Computing Science U. of Alberta
Optimal Bandwidth Monitoring Y.Yu, I.Cheng and A.Basu Department of Computing Science U. of Alberta Outline Introduction The problem and objectives The Bandwidth Estimation Algorithm Simulation Results
More informationStorage Basics Architecting the Storage Supplemental Handout
Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it
More information15-441: Computer Networks Homework 2 Solution
5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow
More informationRummage Web Server Tuning Evaluation through Benchmark
IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.
More informationA MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
More informationThe fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)
Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money
More informationPerformance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
More informationStatic and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks
Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,
More informationSeamless Congestion Control over Wired and Wireless IEEE 802.11 Networks
Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas
More informationCharacterizing and Modeling Network Traffic Variability
Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,
More informationPoint Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
More informationBasic Multiplexing models. Computer Networks - Vassilis Tsaoussidis
Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,
More informationLecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
More informationRequirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
More informationAn Introduction to Risk Parity Hossein Kazemi
An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation
More informationRisk in Revenue Management and Dynamic Pricing
OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri
More informationTraffic Analysis for Voice in Wireless IP Networks
Traffic Analysis for Voice in Wireless IP Networks TONI JANEVSKI BORIS SPASENOVSKI Deartment of Telecommunicatis, Faculty of Electrical Engineering University Sv. Kiril i Metodij Karos 2 bb, 1000 Skoje
More informationLoad Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
More informationA Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm
International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This
More informationApplying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The
More informationEffect Sizes Based on Means
CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred
More informationQuestion: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
More informationBuffer Capacity Allocation: A method to QoS support on MPLS networks**
Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean
More informationEINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
More informationStochastic Derivation of an Integral Equation for Probability Generating Functions
Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating
More informationLecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage
Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource
More informationNetwork Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University
More informationWEB APPLICATION PERFORMANCE PREDICTION
WEB APPLICATION PERFORMANCE PREDICTION H. Karlapudi and J. Martin Department of Computer Science Clemson University Clemson, SC 9-9 Email: hkarlap, jim.martin@cs.clemson.edu ABSTRACT In this paper, we
More informationRisk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7
Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk
More informationFinal for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
More informationA Survey on Congestion Control Mechanisms for Performance Improvement of TCP
A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of
More informationThe risk of using the Q heterogeneity estimator for software engineering experiments
Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for
More informationFirst Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
More informationLocal Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de
More informationVoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications
VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk
More informationData Networks Summer 2007 Homework #3
Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.
More informationA Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
More informationChapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
More informationAutomatic Search for Correlated Alarms
Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany
More informationAdaptive Coding and Packet Rates for TCP-Friendly VoIP Flows
Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows C. Mahlo, C. Hoene, A. Rostami, A. Wolisz Technical University of Berlin, TKN, Sekr. FT 5-2 Einsteinufer 25, 10587 Berlin, Germany. Emails:
More informationThe Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,
More informationThe Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
More informationAnswer: that dprop equals dtrans. seconds. a) d prop. b) d trans
Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link
More informationA Scalable Video-on-Demand Service for the Provision of VCR-Like Functions 1
A Scalable Video-on-Demand Service for the Provision of VCR-Like Functions H.J. Chen, A. Krishnamurthy, T.D.C. Little, and D. Venkatesh, Boston University Multimedia Communications Laboratory Department
More informationObservingtheeffectof TCP congestion controlon networktraffic
Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu
More informationTwo-resource stochastic capacity planning employing a Bayesian methodology
Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning
More informationHigh-Speed TCP Performance Characterization under Various Operating Systems
High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,
More informationPer-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
More informationPerformance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au
More informationMaster s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.
Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February
More informationDAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON
DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad
More informationFDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
More informationImproving HTTP-based Video Performance using Network Flow Buffering
Improving HTTP-based Video Performance using Network Flow Buffering Jesse Steinberg and Joseph Pasquale Dept. of Computer Science and Engineering University of California, San Diego La Jolla, CA, USA {jsteinbe,
More informationOn Growth of Parallelism within Routers and Its Impact on Packet Reordering 1
On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort
More informationPerformance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com
More informationThe impact of metadata implementation on webpage visibility in search engine results (Part II) q
Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra
More informationLatency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
More informationApplication Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan
Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service
More informationUsing median filtering in active queue management for telecommunication networks
Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.
More informationOscillations of the Sending Window in Compound TCP
Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004
More informationComputer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
More informationTCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
More informationQuality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
More informationOn Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex?
On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? Hiroyuki Ohsaki and Masayuki Murata Graduate School of Information Science and Technology Osaka
More informationAn enhanced TCP mechanism Fast-TCP in IP networks with wireless links
Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,
More informationANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE
AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,
More informationRobust Router Congestion Control Using Acceptance and Departure Rate Measures
Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,
More informationPerformance evaluation of TCP connections in ideal and non-ideal network environments
Computer Communications 24 2001) 1769±1779 www.elsevier.com/locate/comcom Performance evaluation of TCP connections in ideal and non-ideal network environments Hala ElAarag, Mostafa Bassiouni* School of
More informationNetwork congestion, its control and avoidance
MUHAMMAD SALEH SHAH*, ASIM IMDAD WAGAN**, AND MUKHTIAR ALI UNAR*** RECEIVED ON 05.10.2013 ACCEPTED ON 09.01.2014 ABSTRACT Recent years have seen an increasing interest in the design of AQM (Active Queue
More informationOn Traffic Fairness in Data Center Fabrics
On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr
More informationEffects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
More informationA New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications
A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications Chinmay Padhye and Kenneth J. Christensen Computer Science and Engineering University of South Florida Tampa, FL 336 {padhye, christen}@csee.usf.edu
More informationThe Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN
The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Background and Goal Many papers have been written
More informationBurst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty
Burst Testing Emerging high-speed protocols in mobility and access networks, combined with qualityof-service demands from business customers for services such as cloud computing, place increased performance
More informationNUTSS: A SIP-based Approach to UDP and TCP Network Connectivity
NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,
More informationTransport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi
Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols
More informationRe-Dispatch Approach for Congestion Relief in Deregulated Power Systems
Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,
More informationEECS 122: Introduction to Communication Networks Homework 3 Solutions
EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2
More informationOn the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks
On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington
More informationChapter 2 - Porosity PIA NMR BET
2.5 Pore tructure Measurement Alication of the Carmen-Kozeny model requires recise measurements of ore level arameters; e.g., secific surface area and tortuosity. Numerous methods have been develoed to
More informationPOISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes
Chater 2 POISSON PROCESSES 2.1 Introduction A Poisson rocess is a simle and widely used stochastic rocess for modeling the times at which arrivals enter a system. It is in many ways the continuous-time
More information