Receiver Buffer Requirement for Video Streaming over TCP

Size: px
Start display at page:

Download "Receiver Buffer Requirement for Video Streaming over TCP"

Transcription

1 Receiver Buffer Requirement for Video Streaming over TCP Taehyun Kim a and Mostafa H. Ammar b a Wireless and Mobile Systems Grou, Freescale Semiconductor, Austin, TX 7735, USA taehyun.kim@freescale.com b Networking and Telecommunications Grou, College of Comuting, Georgia Institute of Technology, Atlanta, GA 333, USA ammar@cc.gatech.edu ABSTRACT TCP is one of the most widely used transort rotocols for video streaming. However, the rate variability of TCP makes it difficult to rovide good video quality. To accommodate the variability, video streaming alications require receiver-side buffering. In current ractice, however, there are no systematic guidelines for the rovisioning of the receiver buffer, and smooth layout is insured through over-rovisioning. In this work, we are interested in memory-constrained alications where it is imortant to determine the right size of receiver buffer in order to insure a rescribed video quality. To that end, we characterize video streaming over TCP in a systematic and quantitative manner. We first model a video streaming system analytically and derive an exression of receiver buffer requirement based on the model. Our analysis shows that the receiver buffer requirement is determined by the network characteristics and desired video quality. Exerimental results validate our model and demonstrate that the receiver buffer requirement achieves desired video quality. Keywords Media over Networks, Video Streaming, Streaming Video Protocols 1. INTRODUCTION A video streaming alication has to emloy a transort layer rotocol to transmit acketized video. Since TCP is the dominant rotocol in the Internet, it is reasonable to emloy TCP for video streaming: recent measurement study has reorted that % of video streaming flows are actually delivered over TCP. 11 Esecially, there are many situations in which video streaming servers are located behind firewalls that ermit only re-secified ort numbers. In this scenario, video streaming over TCP is the only choice to get around the firewalls over the well-known ort numbers (e.g., HTTP or RTSP). Also, the reliable acket delivery of TCP is imortant, when error resilience is not imlemented in a video codec. While the use of TCP rovides reliable video stream delivery, it is difficult to rovide good quality of streaming video over TCP: 1) the sawtooth behavior of additive increase and multilicative decrease (AIMD) incurs significant data rate variability, and ) the use of retransmission timeouts may introduce unaccetable end-to-end delay, and the retransmitted data may be delivered too late for dislay. 3, 5, 9 These drawbacks of TCP can be mitigated to some extent through the use of receiver-side buffering. The buffer size has to be large enough to insure that desired video quality can be achieved. In current ractice, however, there are no systematic guidelines for the rovisioning of the receiver buffer, and smooth layout is insured through over-rovisioning. We are interested in memory-constrained alications where it is desirable to determine the right receiver buffer size. This aer, therefore, considers the question of how large the receiver buffer should be in order to achieve desired erformances for streaming video over TCP. To this end, we characterize video streaming over TCP in a systematic and quantitative manner. Our starting oint is an analytic model of a streaming system of CBR video. Based on this model, we quantify the receiver buffer requirement. Exerimental results validate our model and demonstrate that the minimum buffering delay can achieve desired video quality. The remainder of the aer is organized as follows. In Section, we resent a video streaming model and derive the receiver buffer requirement. Section 3 shows exerimental results to validate our model. This aer is concluded in Section.

2 . MODEL AND ANALYSIS.1. Video Streaming Model over TCP Figure 1 shows a video streaming model which consists of a sender and a receiver. We assume that the sender transmits re-recorded CBR video over a unicast TCP connection, and the receiver is equied with a receiver buffer in front of a video decoder. The decoder waits to fill the buffer before dislaying video. There are two tyes of buffering delay caused by the receiver buffer. Initial buffering: to accommodate initial throughut variability or inter-acket jitters, it is needed to emloy initial buffering. While a streaming alication achieves more tolerance with larger initial buffering, it increases the startu latency and resonse time. Rebuffering: the decrease of throughut within a TCP streaming session might cause the receiver buffer starvation. When this haens, a decoder stos dislaying video until it receives enough video ackets. Note that rebufferings take lace in the middle of video streaming, and therefore the rebuffering delay requirement for a long video stream is determined by the congestion avoidance algorithm of TCP. In this aer, we assume that the amount of the initial buffering delay and the rebuffering delay is identical, so that the receiver buffer size for initial buffering and rebuffering is the same. Network k Sender Receiver Figure 1. A video streaming model over TCP Let λ k be the arrival rate of video ackets at round k, and λ be the video encoding rate, where a round is defined by a duration between the transmission of ackets and the recetion of the first acknowledgment (ACK) in a congestion window. It is assumed that a round is equal to the round-tri time (RTT) and indeendent of the congestion window size. Figure (a) shows a tyical behavior of a TCP flow. We consider the TCP Reno model in this aer, since it is one of the most oular imlementations in the current Internet. 7 In this model, the steady state throughut is determined by the congestion window size which is adjusted based on acket losses. A acket loss can be detected by either trile-dulicate ACKs or timeouts, where we denote the former events by TD and the latter by TO. Consider a TD eriod (TDP) in Figure (a). Each TDP starts immediately after trile-dulicate ACKs and increases the congestion window size by 1/b until trile-dulicate ACKs are encountered again. However, when multile ackets are lost and less than three dulicated ACKs are received, a TO eriod (TOP) begins. In each TOP, a sender stos transmitting data ackets for a timeout interval and retransmits non-acknowledged ackets. Note that the timeout interval in a TOP increases exonentially until it reaches T. On the other hand, Figure (b) shows the layout characteristic at a receiver, where it is assumed that the video layout rate is two ackets worth of data er RTT. We can observe that, if a right size of receiver buffering is emloyed, a consistent CBR layout can be achieved without any interrution. In this aer, the erformance of a video streaming alication is evaluated by the buffer underrun robability and the disrution frequency: Note that λ k is a function of time secified by round k, whereas there is no subscrit on λ, since the data rate fed into a video decoder is assumed to be CBR. Note that b =if delayed acknowledgment is imlemented at the receiver. Otherwise b =1.

3 TDP i TDP i+1 T T T TDP 1 3 k Z TD Z TO (a) Packet arrival characteristic at a receiver buffering delay (b) Playout characteristic at a decoder Figure. An illustration of receiver buffering time The buffer underrun robability is defined by n/n, where n is the number of buffer underrun events, and N is the number of eochs in a video stream. An eoch is defined by E[Z TD + Z TO ], where Z TO is the duration of a TOP, and Z TD is the duration between two TOPs. Note that a Z TD consists of one or more TDPs. The disrution frequency 1 is defined by n/t, where n is the number of buffer underrun events, and T is the duration of a video streaming session. Since T consists of N eochs, a disrution frequency can be exressed by the ratio of the buffer underrun robability to the duration of an eoch... Receiver Buffer Requirement We investigate the erformance when average TCP throughut matches video encoding rate. This is the case when the video encoding rate is determined by the access link bandwidth, and the available bandwidth is limited by the access link caacity. For examle, many video streaming websites rovide multile coies with identical content, generated at different data rates. A receiver selects an aroriate stream that matches with the access link caacity. We assume that the video encoding rate is equal to the average TCP throughut and does not change over time. Hence, the encoding rate is modeled by 7 1 λ = ackets/rtt, b 3 + T R min(1, 3 3b )(1 + 3 ) where is the acket loss rate of a TCP streaming flow, R is the round-tri time, and T is the retransmission timeout. Let q k be the receiver buffer size at round k. Since λ k ackets are received and λ ackets are drained in a TDP, the buffer size is given by q k = q k 1 + λ k λ, (1) where k =1,,...,X i ; and X i is the number of round where a TD loss is detected. On the other hand, since no acket is delivered to a receiver, the receiver buffer size in a TOP is given by where k =1,,..., Z TO /R. Notations in the aer are summarized in Table 1. q k = q k 1 λ, ()

4 Table 1. Notations q receiver buffer size at round q k receiver buffer size at round k q min minimum buffer size acket loss rate R round-tri time λ k arrival { rate of video ackets at round k: Wi 1 λ k = + k b 1 ackets/rtt, in TDP i, otherwise. λ video encoding rate b number of ackets that are acknowledged by an ACK W i congestion window size at the end of TDP i X i number of round where a TD loss is detected Y i number of ackets sent in TDP i α i the first acket lost in TDP i β i number of ackets sent in the last round T retransmission timeout desired buffer underrun robability P u We define the buffer underrun robability by the robability of the minimum buffer size to be non-ositive. Since a receiver is either in a TDP or in a TOP, the buffer underrun robability at time t is decomosed into the sum of conditional robabilities, such that P {q min } = P {q min t Z TD }P {t Z TD } + P {q min t Z TO }P {t Z TO }. (3) From the conditional buffer requirements in (3), we can derive the buffer size requirement under which the robability that the unconditional minimum buffer size goes non-ositive. Theorem.1 below states that the minimum buffer requirement is determined by the network characteristics and desired buffer underrun robability. THEOREM.1. Given network model characterized by the acket loss rate (), RTT (R), and retransmission timeout (T ), the receiver buffer size (q ) that achieves desired buffer underrun robability (P u ) is given by q.1 [ P u b (T 3b R ) min(1, 3 )(1 + 3 )]. Proof. See Aendix. Given receiver buffer size, required buffering delay is determined by d = q B(,R), where B(, R) is the steady state TCP throughut. 7 Therefore, d corresonds to the time delay for buffered ackets to be drained. The duration of an eoch can also be determined, 7 such that an eoch of a TCP flow is given by E[Z TD + Z TO ]= R( b 3 min(1,3 +1) f() 3b + T ) 1, where f() = EVALUATION In this section, we resent exerimental results by which layout disrution characteristics are evaluated. The exerimental results including simulation scrits are available in the comanion website.

5 3.1. Exerimental Setu TCP throughut dynamics are generated over a single bottleneck toology. The number of TCP streaming flows is set to 5. All access links have sufficient caacity so that any acket dro occurs at the bottleneck link: the access links have 1Mbs caacity and 1ms delay, whereas the bottleneck link has 1Mbs caacity and ms delay. We run ns- simulations over this toology. To model the TCP throughut dynamics, we use the throughut exerienced between streaming senders and receivers: the throughut is measured by counting the number of ackets delivered from a sender to a receiver. All data ackets are 1 bytes long. The queue management algorithm running on intermediate routers is the random early detection (RED). To construct dynamic network characteristics, cometing traffic (or cross traffic) is generated by triggering ersistent FTP flows 1 seconds rior to TCP streaming sessions. The number of cross traffic flows is varying to investigate the effect of the acket loss rate on the erformance of TCP streaming. Unless otherwise secified, following sets of configurations are examined, each of which generates 1 traces using different random seeds. In all configurations, the duration of simulation time is set to seconds. Configuration 1: the number of cometing FTP flows is assumed to be 3 that leads video streaming flows to have 1.3ms RTT, 179.ms T,.% acket loss rate, and 1.Mbs throughut. Configuration : the number of cometing flows is set to. Measured characteristics of video streaming flows are 11.3ms RTT, 1.3ms T,.79% acket loss rate, and 9.1kbs throughut. Configuration 3: the number of cometing flows is 9. Measurement results are 1.ms RTT, 11.ms T, 1.% acket loss rate, and 715.kbs throughut. It should be noted that measured round-tri delays are different in each configuration, because of the queuing delays in the intermediate routers as well as link delays. To estimate the acket loss rate in each configuration, we emloy the TCP throughut equation. 7 The equation rovides an analytic relationshi between the acket loss rate, RTT, T, and TCP throughut. However, as the relationshi is too comlicated to yield a closed form of a acket loss rate as a function of throughut and RTT, we develo an iterative algorithm in Figure 3 based on the bisection method. Since the TCP throughut equation is continuous and an estimated throughut must lie in the acket loss rate of [, 1], the existence of a root is guaranteed by the intermediate value theorem. Also the estimated acket loss rate is unique, since the estimated throughut is monotonically decreasing as the acket loss rate increases. 1: rocedure ComuteLossRate (R, B) : l =, h =1 3: while h l >ɛdo : =( l + h )/ 5: B = 1 : if B <B 7: h = : else 9: l = 1: enddo 11: endrocedure R b 3 +T min(1,3 3b )(1+3 ) Figure 3. Packet loss rate estimation algorithm The erformance of TCP streaming exeriments is evaluated by the buffer underrun robability and the disrution frequency as defined in Section.1. Note that the number of eochs is given by the simulation time ( seconds) divided by an eoch, and the disrution frequency is the buffer underrun robability divided by an eoch.

6 3.. Buffer Underrun Probability In the first exeriment, we measure the buffer underrun robability in each TCP streaming flow. We investigate 5 TCP streaming flows, since each configuration contains 1 traces, each of which contains 5 TCP streaming flows. Figure (a) shows the buffer underrun characteristics of configuration 1. The solid line secifies the minimum buffering delay requirements in Theorem.1 to achieve desired buffer underrun robability. Each error bar corresonds to the measured buffer underrun robability of 5 TCP streaming flows with 99% confidence interval. When RTT, T, and the acket loss rate are 1.3ms, 179.ms and.%, buffering delays targeting desired buffer underrun robabilities of %, %, and % are 3.53, 7., and 1.13 seconds resectively. Exerimental results show that measured buffer underrun robabilities are tightly bounded by the solid line of 99% confidence level. Observe that the range of the confidence interval is reduced as buffering delay is increased, since the variance of measured buffer underrun robabilities is decreased Underrun robability (%) Underrun robability (%) Underrun robability (%) (a) Configuration (b) Configuration (c) Configuration 3 Figure. Buffer underrun robability characteristics Note that the buffering delay characteristic is a non-linear curve. For examle, when buffering delay is increased from 3 seconds to 9 seconds in Figure (a), desired buffer underrun robability is reduced by.31%. However, when buffering delay is increased from 9 seconds to 15 seconds, the robability is reduced by only 1.%. Therefore, a system designer can find a oint of marginal return using the non-linear characteristics. Figure (b) shows the buffer underrun robability of configuration. Required buffering delays targeting P u =%, %, and % are.7, 5.1, and 1. seconds resectively. Comared with Figure (a), the 99% confidence intervals are loosely bounded by the buffering delay requirement curve. This is because, as the acket loss rate is increased, the o(1/) term in (1) gets more significant, and the measured buffer underrun robability deviates more from the desired buffer underrun robability curve. Figure (c) shows the buffer underrun robability of configuration 3. Required buffering delays for P u =%, %, and % are.,.5, and 9.1 seconds resectively. Exerimental results demonstrate that desired buffer underrun robability becomes more conservative, as the acket loss rate is increased Disrution Frequency In this exeriment, we investigate disrution frequency characteristics which was defined in Section.1. Measured disrution frequency is defined by the number of buffer underrun events during the second simulation time. Figure 5 shows disrution frequency characteristics for configuration 1,, and 3. The error bar secifies the 99% confidence interval, and the solid line shows desired disrution frequency which is defined by the ratio of desired buffer underrun robability to the duration of an eoch. Hence, Figure 5 exhibits the same characteristics as Figure : 99% confidence interval of measured disrution frequencies is tightly bounded by desired disrution frequency when the acket loss rate is small. However, as the acket loss rate is increased, desired disrution frequency becomes a conservative bound.

7 Disrution frequency (Hz).... Disrution frequency (Hz).... Disrution frequency (Hz) (a) Configuration (b) Configuration Figure 5. Disrution frequency characteristics (c) Configuration 3. CONCLUSION In this aer, we consider video streaming over TCP. While the use of TCP rovides the reliable video stream delivery, the bursty nature of TCP requires buffering at a receiver for smooth video layout. Since it is desirable to determine the right size of receiver buffer in memory-constrained alications, we quantify the buffering requirement to achieve desired buffer underrun robability by analytically modeling the CBR video streaming. Our analysis shows that the receiver buffer requirement is determined by the network characteristics and desired buffer underrun robability (or disrution frequency). Exerimental results validate our model and analysis. APPENDIX: Proof of Theorem.1 In a TDP, since the acket arrival rate is greater than zero, and it is increased linearly until it encounters trile dulicate ACKs, the receiver buffer size at round k in (1) is given by q k = q + k (λ j λ) j=1 = q + k b + (W i 1 λ 1)k. () On the other hand, the receiver buffer size in a TOP in () is given by To rove Theorem.1, the following relationshis 1 are used : q k = q k λ. (5) W i = W i 1 + X i b 1 () Y i = α i + W i 1 (7) Y i = X i (W i 1 + W i )+β i. () Note that the exressions in () and () are different from the original equations 7 by a constant term. However, for small values of, TCP throughut in a TDP can still be exressed by B TDP (, R) = 1 3 R b + o( 1 ). (9) We assume that a round in Z TO is equal to RTT, although no ACK acket is received during Z TO. Although three dulicated ackets are lost and not delivered to a receiver in a TDP, the data recetion rate can be aroximated by the data transmission rate for small. The relationshis can be verified from the ith TDP in Figure (a): the arameters given by W i 1 = W i =, X i =, Y i =39, α i =3, β i =3, and b =satisfy (), (7), and ().

8 To achieve a desired buffer underrun robability, we need to consider the minimum buffer size in () and (5). Using the Markovian inequality, the buffer underrun robability at time t in a TDP is given by P {q min t Z TD } = P {q b (W i 1 λ 1) } E{ b (W i 1 λ 1) } q = b (E{W } λe{w } + λ + λ E{W } +1), (1) q where E{W } stands for the average of Wi 1 and E{W } for the average of W i 1. Equation (1) can be solved using (), (7), and (). From (), it follows that E{X} = b E{W } + b. (11) Observe that squaring () leads to W i = W i 1 + Wi 1Xi b + X i b Xi b W i Hence, the average of X i is given by E{X } = 3b E{W } b E {W } + b E{W } + b. (1) Note that squaring () after maniulating the Wi 1 term yields W i W i W i 1 + W i 1 = X i b X i b +1. (13) From (11), (1), and (13), the correlation of congestion window sizes between adjacent TDPs is given by E{W i W i 1 } = 1 (E{W } + E {W }). (1) We consider (7) and () to derive E{W }. Since α i is the first acket lost in a TDP, α i can be assumed to have a geometric distribution with the robability. Hence, it follows that E{α i } = 1 and E{α i } =. With this assumtion, squaring (7) leads to E{Y } = + E{W } +1+ E{W } E{W }. (15) In the same way, E{Y } can also be obtained by () and (1). Since β i is the number of ackets in the last round, it can be assumed to have a uniform distribution in [1,W i ]. Therefore, squaring () yields E{Y } = E{X } ( 5E{W } + E{W i W i 1 })+E{β}E{X} 3E{W } + E{β } = b (3 E{W } 1 E {W } + E{W } + 1)( 7 E{W } + 1 E {W })+ 3b E {W }( 1 E{W } +1) + E{W } +3E{W } +1. (1) Since the average window size is given 7 by E{W } = 3b + o( 1 ), we assume E{W } = O( 1 ). By equating the relationshis in (15) and (1), we can derive a relationshi, such that Hence, 1b E {W } b 3 E{W } 9 = o( 1 ). E{W } = b + o( 1 ). (17)

9 Note that the long-term average of λ k is equal to λ. Therefore, TCP throughut in (9) can also be alied to λ, such that λ = 3 b + o( 1 ). From (17), the buffer underrun robability in a TDP in (1) is bounded by P {q min t Z TD } b [ q 3b 3 3 b 3b +( b ) ]+o( 1 ) =.1 q + o(1 ). (1) To derive an exression of the buffer underrun robability in a TOP, we consider (5) and aly the Markovian inequality. Since the minimum buffer size in a TOP is given at k = Z TO /R, wehave P {q min t Z TO } = P {q ZTO R λ} E{ZTO } q R λ, (19) Since the average duration of a TOP is described by E{Z TO f() } = T 1, where f() = , (19) leads to P {q min t Z TO } T 3 q R b + o( 1 ). () Now we derive the unconditional robability of buffer underrun from the conditional robabilities. Since W i is a regenerative rocess over the eriod of Z TD + Z TO,wehave P {t Z TD E{Z TD } }= E{Z TD } + E{Z TO }, P {t Z TO E{Z TO } }= E{Z TD } + E{Z TO }, where E{Z TD b } = E{n}(E{X} +1)R, E{X} = 3 + o( 1 ), and E{n} is the average number of TDPs in Z TD. Consider the robability of TO loss indication Q, which is given 7 by Q = 1 E{n} min(1, 3 3b ). From (1) and (), the buffer underrun robability is thus P {q min } = P {q min t Z TD }(E{X} +1)+QP {q min t Z TO }T f() 1 (E{X} +1)R + QT f() 1 3 b min(1, 3 3b )T f() 1.1 q R b 3 + T q R b R 3 + min(1, 3 3b.1 9. [1 + q b (T 3b R ) min(1, 3 )T f() 1 + o( 1 ) )(1 + 3 )] + o( 1 ). (1) Therefore, given desired buffer underrun robability, such that P {q min } P u, required buffer size is given by q.1 [ P u b (T 3b R ) min(1, 3 )(1 + 3 )].

10 REFERENCES 1. Z. Chen, T. Bu, M. Ammar, and D. Towsley, Comments on modeling TCP Reno erformance: a simle model and its emirical validation, to aear in IEEE/ACM Trans. Networking.. Comanion web site, htt:// streaming.html, P. de Cuetos and K. W. Ross, Adative rate control for streaming stored Fine-Grained Scalable video, NOSSDAV, Miami, FL, May.. Freescale alication rocessors, htt:// nodeid=1jfs C. Krasic, K. Li, and J. Walole, The case for streaming multimedia with TCP, idms 1, Lancaster, UK, Set. 1.. ns- network simulator, htt:// J. Padhye, V. Firoiu, D. Towsley, and J. Kurose, Modeling TCP reno erformance: a simle model and its emirical validation, IEEE/ACM Trans. Networking, vol., no., , Ar... W. H. Press, B. P. Flannery, S. A. Teukolsky, and W. T. Vetterling, Numerical recies in C, Cambridge university ress, D. Saarilla and K. W. Ross, Streaming stored continuous media over fair-share bandwidth, NOSSDAV, Chael Hill, NC, June. 1. W. Tan, W. Cui, and J. G. Aostolooulos, Playback buffer equalization for streaming media using stateless transort rioritization, Packet Video 3, Nantes, Fr, Ar Y. Wang, M. Clayool, and Z. Zuo, An emirical study of realvideo erformance across the Internet, ACM SIG- COMM IMW 1, San Francisco, CA, Nov. 1.

Red vs. Blue - Aneue of TCP congestion Control Model

Red vs. Blue - Aneue of TCP congestion Control Model In IEEE INFOCOM 2 A Study of Active Queue Management for Congestion Control Victor Firoiu Marty Borden 1 vfiroiu@nortelnetworks.com mborden@tollbridgetech.com Nortel Networks TollBridge Technologies 6

More information

Monitoring Frequency of Change By Li Qin

Monitoring Frequency of Change By Li Qin Monitoring Frequency of Change By Li Qin Abstract Control charts are widely used in rocess monitoring roblems. This aer gives a brief review of control charts for monitoring a roortion and some initial

More information

TCP, Active Queue Management and QoS

TCP, Active Queue Management and QoS TCP, Active Queue Management and QoS Don Towsley UMass Amherst towsley@cs.umass.edu Collaborators: W. Gong, C. Hollot, V. Misra Outline motivation TCP friendliness/fairness bottleneck invariant principle

More information

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks

TRANSMISSION Control Protocol (TCP) has been widely. On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area Networks On Parameter Tuning of Data Transfer Protocol GridFTP for Wide-Area etworks Takeshi Ito, Hiroyuki Ohsaki, and Makoto Imase Abstract In wide-area Grid comuting, geograhically distributed comutational resources

More information

Comparative Analysis of Congestion Control Algorithms Using ns-2

Comparative Analysis of Congestion Control Algorithms Using ns-2 www.ijcsi.org 89 Comparative Analysis of Congestion Control Algorithms Using ns-2 Sanjeev Patel 1, P. K. Gupta 2, Arjun Garg 3, Prateek Mehrotra 4 and Manish Chhabra 5 1 Deptt. of Computer Sc. & Engg,

More information

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks

On Multicast Capacity and Delay in Cognitive Radio Mobile Ad-hoc Networks On Multicast Caacity and Delay in Cognitive Radio Mobile Ad-hoc Networks Jinbei Zhang, Yixuan Li, Zhuotao Liu, Fan Wu, Feng Yang, Xinbing Wang Det of Electronic Engineering Det of Comuter Science and Engineering

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation

Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.

More information

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross

Sources: Chapter 6 from. Computer Networking: A Top-Down Approach Featuring the Internet, by Kurose and Ross Multimedia Communication Multimedia Systems(Module 5 Lesson 2) Summary: H Internet Phone Example Making the Best use of Internet s Best-Effort Service. Sources: H Chapter 6 from Computer Networking: A

More information

Web Application Scalability: A Model-Based Approach

Web Application Scalability: A Model-Based Approach Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research

More information

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.

Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29. Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks

Multi-Channel Opportunistic Routing in Multi-Hop Wireless Networks Multi-Channel Oortunistic Routing in Multi-Ho Wireless Networks ANATOLIJ ZUBOW, MATHIAS KURTH and JENS-PETER REDLICH Humboldt University Berlin Unter den Linden 6, D-99 Berlin, Germany (zubow kurth jr)@informatik.hu-berlin.de

More information

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation

Large-Scale IP Traceback in High-Speed Internet: Practical Techniques and Theoretical Foundation Large-Scale IP Traceback in High-Seed Internet: Practical Techniques and Theoretical Foundation Jun Li Minho Sung Jun (Jim) Xu College of Comuting Georgia Institute of Technology {junli,mhsung,jx}@cc.gatech.edu

More information

Buffer Sizing in 802.11 Wireless Mesh Networks

Buffer Sizing in 802.11 Wireless Mesh Networks Buffer Sizing in 80. Wireless Mesh Networks Kamran Jamshaid, Basem Shihada,LiXia, and Phili Levis MCSE Division, KAUST, Saudi Arabia. {kamran.jamshaid, basem.shihada, li.xia}@kaust.edu.sa Deartment of

More information

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network

Finding a Needle in a Haystack: Pinpointing Significant BGP Routing Changes in an IP Network Finding a Needle in a Haystack: Pinointing Significant BGP Routing Changes in an IP Network Jian Wu, Zhuoqing Morley Mao University of Michigan Jennifer Rexford Princeton University Jia Wang AT&T Labs

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 2011 757. Load-Balancing Spectrum Decision for Cognitive Radio Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 4, APRIL 20 757 Load-Balancing Sectrum Decision for Cognitive Radio Networks Li-Chun Wang, Fellow, IEEE, Chung-Wei Wang, Student Member, IEEE,

More information

17: Queue Management. Queuing. Mark Handley

17: Queue Management. Queuing. Mark Handley 17: Queue Management Mark Handley Queuing The primary purpose of a queue in an IP router is to smooth out bursty arrivals, so that the network utilization can be high. But queues add delay and cause jitter.

More information

An important observation in supply chain management, known as the bullwhip effect,

An important observation in supply chain management, known as the bullwhip effect, Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National

More information

Optimal Bandwidth Monitoring. Y.Yu, I.Cheng and A.Basu Department of Computing Science U. of Alberta

Optimal Bandwidth Monitoring. Y.Yu, I.Cheng and A.Basu Department of Computing Science U. of Alberta Optimal Bandwidth Monitoring Y.Yu, I.Cheng and A.Basu Department of Computing Science U. of Alberta Outline Introduction The problem and objectives The Bandwidth Estimation Algorithm Simulation Results

More information

Storage Basics Architecting the Storage Supplemental Handout

Storage Basics Architecting the Storage Supplemental Handout Storage Basics Architecting the Storage Sulemental Handout INTRODUCTION With digital data growing at an exonential rate it has become a requirement for the modern business to store data and analyze it

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

Rummage Web Server Tuning Evaluation through Benchmark

Rummage Web Server Tuning Evaluation through Benchmark IJCSNS International Journal of Comuter Science and Network Security, VOL.7 No.9, Setember 27 13 Rummage Web Server Tuning Evaluation through Benchmark (Case study: CLICK, and TIME Parameter) Hiyam S.

More information

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION 9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION

More information

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM)

The fast Fourier transform method for the valuation of European style options in-the-money (ITM), at-the-money (ATM) and out-of-the-money (OTM) Comutational and Alied Mathematics Journal 15; 1(1: 1-6 Published online January, 15 (htt://www.aascit.org/ournal/cam he fast Fourier transform method for the valuation of Euroean style otions in-the-money

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks

Static and Dynamic Properties of Small-world Connection Topologies Based on Transit-stub Networks Static and Dynamic Proerties of Small-world Connection Toologies Based on Transit-stub Networks Carlos Aguirre Fernando Corbacho Ramón Huerta Comuter Engineering Deartment, Universidad Autónoma de Madrid,

More information

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks

Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Seamless Congestion Control over Wired and Wireless IEEE 802.11 Networks Vasilios A. Siris and Despina Triantafyllidou Institute of Computer Science (ICS) Foundation for Research and Technology - Hellas

More information

Characterizing and Modeling Network Traffic Variability

Characterizing and Modeling Network Traffic Variability Characterizing and Modeling etwork Traffic Variability Sarat Pothuri, David W. Petr, Sohel Khan Information and Telecommunication Technology Center Electrical Engineering and Comuter Science Deartment,

More information

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)

Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11) Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint

More information

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis

Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,

More information

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements

Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17

More information

Requirements of Voice in an IP Internetwork

Requirements of Voice in an IP Internetwork Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.

More information

An Introduction to Risk Parity Hossein Kazemi

An Introduction to Risk Parity Hossein Kazemi An Introduction to Risk Parity Hossein Kazemi In the aftermath of the financial crisis, investors and asset allocators have started the usual ritual of rethinking the way they aroached asset allocation

More information

Risk in Revenue Management and Dynamic Pricing

Risk in Revenue Management and Dynamic Pricing OPERATIONS RESEARCH Vol. 56, No. 2, March Aril 2008,. 326 343 issn 0030-364X eissn 1526-5463 08 5602 0326 informs doi 10.1287/ore.1070.0438 2008 INFORMS Risk in Revenue Management and Dynamic Pricing Yuri

More information

Traffic Analysis for Voice in Wireless IP Networks

Traffic Analysis for Voice in Wireless IP Networks Traffic Analysis for Voice in Wireless IP Networks TONI JANEVSKI BORIS SPASENOVSKI Deartment of Telecommunicatis, Faculty of Electrical Engineering University Sv. Kiril i Metodij Karos 2 bb, 1000 Skoje

More information

Load Balancing Mechanism in Agent-based Grid

Load Balancing Mechanism in Agent-based Grid Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks

Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The

More information

Effect Sizes Based on Means

Effect Sizes Based on Means CHAPTER 4 Effect Sizes Based on Means Introduction Raw (unstardized) mean difference D Stardized mean difference, d g Resonse ratios INTRODUCTION When the studies reort means stard deviations, the referred

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Buffer Capacity Allocation: A method to QoS support on MPLS networks**

Buffer Capacity Allocation: A method to QoS support on MPLS networks** Buffer Caacity Allocation: A method to QoS suort on MPLS networks** M. K. Huerta * J. J. Padilla X. Hesselbach ϒ R. Fabregat O. Ravelo Abstract This aer describes an otimized model to suort QoS by mean

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Stochastic Derivation of an Integral Equation for Probability Generating Functions

Stochastic Derivation of an Integral Equation for Probability Generating Functions Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating

More information

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage

Lecture 15: Congestion Control. CSE 123: Computer Networks Stefan Savage Lecture 15: Congestion Control CSE 123: Computer Networks Stefan Savage Overview Yesterday: TCP & UDP overview Connection setup Flow control: resource exhaustion at end node Today: Congestion control Resource

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

WEB APPLICATION PERFORMANCE PREDICTION

WEB APPLICATION PERFORMANCE PREDICTION WEB APPLICATION PERFORMANCE PREDICTION H. Karlapudi and J. Martin Department of Computer Science Clemson University Clemson, SC 9-9 Email: hkarlap, jim.martin@cs.clemson.edu ABSTRACT In this paper, we

More information

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7

Risk and Return. Sample chapter. e r t u i o p a s d f CHAPTER CONTENTS LEARNING OBJECTIVES. Chapter 7 Chater 7 Risk and Return LEARNING OBJECTIVES After studying this chater you should be able to: e r t u i o a s d f understand how return and risk are defined and measured understand the concet of risk

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP

A Survey on Congestion Control Mechanisms for Performance Improvement of TCP A Survey on Congestion Control Mechanisms for Performance Improvement of TCP Shital N. Karande Department of Computer Science Engineering, VIT, Pune, Maharashtra, India Sanjesh S. Pawale Department of

More information

The risk of using the Q heterogeneity estimator for software engineering experiments

The risk of using the Q heterogeneity estimator for software engineering experiments Dieste, O., Fernández, E., García-Martínez, R., Juristo, N. 11. The risk of using the Q heterogeneity estimator for software engineering exeriments. The risk of using the Q heterogeneity estimator for

More information

First Midterm for ECE374 03/24/11 Solution!!

First Midterm for ECE374 03/24/11 Solution!! 1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your

More information

Local Connectivity Tests to Identify Wormholes in Wireless Networks

Local Connectivity Tests to Identify Wormholes in Wireless Networks Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University xban@cs.sunysb.edu Rik Sarkar Comuter Science Freie Universität Berlin sarkar@inf.fu-berlin.de

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

Data Networks Summer 2007 Homework #3

Data Networks Summer 2007 Homework #3 Data Networks Summer Homework # Assigned June 8, Due June in class Name: Email: Student ID: Problem Total Points Problem ( points) Host A is transferring a file of size L to host B using a TCP connection.

More information

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations

A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;

More information

Chapter 3 ATM and Multimedia Traffic

Chapter 3 ATM and Multimedia Traffic In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very

More information

Automatic Search for Correlated Alarms

Automatic Search for Correlated Alarms Automatic Search for Correlated Alarms Klaus-Dieter Tuchs, Peter Tondl, Markus Radimirsch, Klaus Jobmann Institut für Allgemeine Nachrichtentechnik, Universität Hannover Aelstraße 9a, 0167 Hanover, Germany

More information

Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows

Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows C. Mahlo, C. Hoene, A. Rostami, A. Wolisz Technical University of Berlin, TKN, Sekr. FT 5-2 Einsteinufer 25, 10587 Berlin, Germany. Emails:

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

The Problem with TCP. Overcoming TCP s Drawbacks

The Problem with TCP. Overcoming TCP s Drawbacks White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,

More information

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans

Answer: that dprop equals dtrans. seconds. a) d prop. b) d trans Chapter 1 1) p. 98: P-6 This elementary problem begins to explore propagation delay and transmission delay, two central concepts in data networking. Consider two hosts, A and B, connected by single link

More information

A Scalable Video-on-Demand Service for the Provision of VCR-Like Functions 1

A Scalable Video-on-Demand Service for the Provision of VCR-Like Functions 1 A Scalable Video-on-Demand Service for the Provision of VCR-Like Functions H.J. Chen, A. Krishnamurthy, T.D.C. Little, and D. Venkatesh, Boston University Multimedia Communications Laboratory Department

More information

Observingtheeffectof TCP congestion controlon networktraffic

Observingtheeffectof TCP congestion controlon networktraffic Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu

More information

Two-resource stochastic capacity planning employing a Bayesian methodology

Two-resource stochastic capacity planning employing a Bayesian methodology Journal of the Oerational Research Society (23) 54, 1198 128 r 23 Oerational Research Society Ltd. All rights reserved. 16-5682/3 $25. www.algrave-journals.com/jors Two-resource stochastic caacity lanning

More information

High-Speed TCP Performance Characterization under Various Operating Systems

High-Speed TCP Performance Characterization under Various Operating Systems High-Speed TCP Performance Characterization under Various Operating Systems Y. Iwanaga, K. Kumazoe, D. Cavendish, M.Tsuru and Y. Oie Kyushu Institute of Technology 68-4, Kawazu, Iizuka-shi, Fukuoka, 82-852,

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network

Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: j.cao@student.rmit.edu.au

More information

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and. Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February

More information

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON

DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON DAY-AHEAD ELECTRICITY PRICE FORECASTING BASED ON TIME SERIES MODELS: A COMPARISON Rosario Esínola, Javier Contreras, Francisco J. Nogales and Antonio J. Conejo E.T.S. de Ingenieros Industriales, Universidad

More information

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES

FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents

More information

Improving HTTP-based Video Performance using Network Flow Buffering

Improving HTTP-based Video Performance using Network Flow Buffering Improving HTTP-based Video Performance using Network Flow Buffering Jesse Steinberg and Joseph Pasquale Dept. of Computer Science and Engineering University of California, San Diego La Jolla, CA, USA {jsteinbe,

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

The impact of metadata implementation on webpage visibility in search engine results (Part II) q

The impact of metadata implementation on webpage visibility in search engine results (Part II) q Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan

Application Level Congestion Control Enhancements in High BDP Networks. Anupama Sundaresan Application Level Congestion Control Enhancements in High BDP Networks Anupama Sundaresan Organization Introduction Motivation Implementation Experiments and Results Conclusions 2 Developing a Grid service

More information

Using median filtering in active queue management for telecommunication networks

Using median filtering in active queue management for telecommunication networks Using median filtering in active queue management for telecommunication networks Sorin ZOICAN *, Ph.D. Cuvinte cheie. Managementul cozilor de aşteptare, filtru median, probabilitate de rejectare, întârziere.

More information

Oscillations of the Sending Window in Compound TCP

Oscillations of the Sending Window in Compound TCP Oscillations of the Sending Window in Compound TCP Alberto Blanc 1, Denis Collange 1, and Konstantin Avrachenkov 2 1 Orange Labs, 905 rue Albert Einstein, 06921 Sophia Antipolis, France 2 I.N.R.I.A. 2004

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

TCP in Wireless Mobile Networks

TCP in Wireless Mobile Networks TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer

More information

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,

More information

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex?

On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? On Packet Marking Function of Active Queue Management Mechanism: Should It Be Linear, Concave, or Convex? Hiroyuki Ohsaki and Masayuki Murata Graduate School of Information Science and Technology Osaka

More information

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links

An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Wireless Networks 6 (2000) 375 379 375 An enhanced TCP mechanism Fast-TCP in IP networks with wireless links Jian Ma a, Jussi Ruutu b and Jing Wu c a Nokia China R&D Center, No. 10, He Ping Li Dong Jie,

More information

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE

ANALYSING THE OVERHEAD IN MOBILE AD-HOC NETWORK WITH A HIERARCHICAL ROUTING STRUCTURE AALYSIG THE OVERHEAD I MOBILE AD-HOC ETWORK WITH A HIERARCHICAL ROUTIG STRUCTURE Johann Lóez, José M. Barceló, Jorge García-Vidal Technical University of Catalonia (UPC), C/Jordi Girona 1-3, 08034 Barcelona,

More information

Robust Router Congestion Control Using Acceptance and Departure Rate Measures

Robust Router Congestion Control Using Acceptance and Departure Rate Measures Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {ganeshg@microsoft.com}, Microsoft Corporation,

More information

Performance evaluation of TCP connections in ideal and non-ideal network environments

Performance evaluation of TCP connections in ideal and non-ideal network environments Computer Communications 24 2001) 1769±1779 www.elsevier.com/locate/comcom Performance evaluation of TCP connections in ideal and non-ideal network environments Hala ElAarag, Mostafa Bassiouni* School of

More information

Network congestion, its control and avoidance

Network congestion, its control and avoidance MUHAMMAD SALEH SHAH*, ASIM IMDAD WAGAN**, AND MUKHTIAR ALI UNAR*** RECEIVED ON 05.10.2013 ACCEPTED ON 09.01.2014 ABSTRACT Recent years have seen an increasing interest in the design of AQM (Active Queue

More information

On Traffic Fairness in Data Center Fabrics

On Traffic Fairness in Data Center Fabrics On Traffic Fairness in Data Center Fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi Sorbonne Universities, UPMC Univ Paris 6, UMR 766, LIP6, F-755, Paris, France. Email: firstname.lastname@umc.fr

More information

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project

Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used

More information

A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications

A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications Chinmay Padhye and Kenneth J. Christensen Computer Science and Engineering University of South Florida Tampa, FL 336 {padhye, christen}@csee.usf.edu

More information

The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN

The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN The Data Replication Bottleneck: Overcoming Out of Order and Lost Packets across the WAN By Jim Metzler, Cofounder, Webtorials Editorial/Analyst Division Background and Goal Many papers have been written

More information

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty

Burst Testing. New mobility standards and cloud-computing network. This application note will describe how TCP creates bursty Burst Testing Emerging high-speed protocols in mobility and access networks, combined with qualityof-service demands from business customers for services such as cloud computing, place increased performance

More information

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity

NUTSS: A SIP-based Approach to UDP and TCP Network Connectivity NUTSS: A SIP-based Aroach to UDP and TCP Network Connectivity Saikat Guha Det. of Comuter Science Cornell University Ithaca, NY 14853 saikat@cs.cornell.edu Yutaka Takeda Panasonic Communications San Diego,

More information

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi

Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi Transport layer issues in ad hoc wireless networks Dmitrij Lagutin, dlagutin@cc.hut.fi 1. Introduction Ad hoc wireless networks pose a big challenge for transport layer protocol and transport layer protocols

More information

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems

Re-Dispatch Approach for Congestion Relief in Deregulated Power Systems Re-Disatch Aroach for Congestion Relief in Deregulated ower Systems Ch. Naga Raja Kumari #1, M. Anitha 2 #1, 2 Assistant rofessor, Det. of Electrical Engineering RVR & JC College of Engineering, Guntur-522019,

More information

EECS 122: Introduction to Communication Networks Homework 3 Solutions

EECS 122: Introduction to Communication Networks Homework 3 Solutions EECS 22: Introduction to Communication Networks Homework 3 Solutions Solution. a) We find out that one-layer subnetting does not work: indeed, 3 deartments need 5000 host addresses, so we need 3 bits (2

More information

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks

On the (in)effectiveness of Probabilistic Marking for IP Traceback under DDoS Attacks On the (in)effectiveness of Probabilistic Maring for IP Tracebac under DDoS Attacs Vamsi Paruchuri, Aran Durresi 2, and Ra Jain 3 University of Central Aransas, 2 Louisiana State University, 3 Washington

More information

Chapter 2 - Porosity PIA NMR BET

Chapter 2 - Porosity PIA NMR BET 2.5 Pore tructure Measurement Alication of the Carmen-Kozeny model requires recise measurements of ore level arameters; e.g., secific surface area and tortuosity. Numerous methods have been develoed to

More information

POISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes

POISSON PROCESSES. Chapter 2. 2.1 Introduction. 2.1.1 Arrival processes Chater 2 POISSON PROCESSES 2.1 Introduction A Poisson rocess is a simle and widely used stochastic rocess for modeling the times at which arrivals enter a system. It is in many ways the continuous-time

More information