Automated Planning for Open Network Architectures Alexey Rudenko

Size: px
Start display at page:

Download "Automated Planning for Open Network Architectures Alexey Rudenko"

From this document you will learn the answers to the following questions:

  • What is one reason for Adaptability Network variability?

  • What is the set of instructions to connect nodes?

  • What can be adapted with : Compression Distilling Encryption Prioritization Data storage?

Transcription

1 Automated Planning for Open Network Architectures Alexey Rudenko Advisors: Peter Reiher and Gerald J. Popek University of California, Los Angeles June

2 Motivation Goal Introduction Distributed adaptations can improve often-poor QoS How to perform adapter distribution? Automated solution is preferred Allocate adapters for a connection Under various constraints Challenge Build a planning system that can be used transparently for applications in programmable networks Introduction Planning Procedure Planning Algorithm Performance Conclusion 2

3 Accomplishments Designed and implemented an automated planning system that calculates and deploys plans Measured the performance of the planning system Demonstrated advantages of planning Results are being published Introduction Planning Procedure Planning Algorithm Performance Conclusion 3

4 Reasons for Adaptability Network variability Bandwidth, latency, jitter, security, reliability, monetary cost Network heterogeneity Internet, wireless, dial-up, specialized client devices Some applications require at least a particular level of service Real-time applications Introduction Planning Procedure Planning Algorithm Performance Conclusion 4

5 Adaptations Application data stream can be adapted with: Compression Distilling Encryption Prioritization Data storage (caching, prefetching, buffering) Scheduling wireless interface FEC Introduction Planning Procedure Planning Algorithm Performance Conclusion 5

6 Open Network Architectures Programmable networks whose behavior can be dynamically changed User data adaptation User data rerouting Active Networks, Conductor Dynamic deployment of adapters Introduction Planning Procedure Planning Algorithm Performance Conclusion 6

7 Planned Distributed Adaptation Select and distribute adapters within programmable networks to effectively improve QoS of applications Build automated planning system for unicast connections serving adaptationunaware applications Plan is a set of instructions to the connection nodes what adapter to use in what order with respect to available node resources Introduction Planning Procedure Planning Algorithm Performance Conclusion 7

8 Secure Low-Bandwidth Web WaveLAN Link characteristics: Low bandwidth Insecure Unreliable Adaptation: Prioritizing Compression Encryption FEC Internet Insecure Encryption Introduction Planning Procedure Planning Algorithm Performance Conclusion 8

9 Secure Low-Bandwidth Video Internet WaveLAN DSL Link characteristics: Low bandwidth Insecure Unreliable Adaptation: Compression Encryption FEC Low bandwidth Distilling Compression Insecure Encryption Introduction Planning Procedure Planning Algorithm Performance Conclusion 9

10 Exhaustive Search 4.00 First example Second example minutes # of plans (in millions) nodes 4 nodes 5 nodes 6 nodes 7 minutes > 1 second to select plan > 1 second to select plan > 1 second to select plan 4 minutes adapters 7 adapters 8 adapters 9 adapters 10 adapters 50 seconds # of adapters Introduction Planning Procedure Planning Algorithm Performance Conclusion 10

11 Naïve Template Planning Adapters always on problematic links Example of an inefficient solution Link characteristics: Low bandwidth Low bandwidth Naïve solution: Compress Decompress Compress Decompress Optimal solution: Compress Decompress Introduction Planning Procedure Planning Algorithm Performance Conclusion 11

12 Naïve Template Planning 2 Adapters always on end links Example of an infeasible solution Link characteristics: Low bandwidth Node can run 1 adapter only Insecurity Naïve solution: Compress Encrypt Decrypt Decompress Only solution: Decompress Compress Decrypt Encrypt Introduction Planning Procedure Planning Algorithm Performance Conclusion 12

13 Full-Scale Template Planning Exponential space of network situations is referred to a smaller number of precalculated plan templates Put real adapters during connection establishment Potentially inefficient, infeasible Introduction Planning Procedure Planning Algorithm Performance Conclusion 13

14 Solution: Online Automated Planning Allocate adapters Satisfy constraints Keep used link resources below offered limits Keep used node resource below offered limits Minimize nodes resources used Introduction Planning Procedure Planning Algorithm Performance Conclusion 14

15 Requirements to Planning Planning must be fast to benefit real-time applications Adapters must be consistent No adapter inhibits the work of another adapter Semantics of data is preserved Adapters must be efficiently selected, ordered, and located Introduction Planning Procedure Planning Algorithm Performance Conclusion 15

16 Requirements (cont.) Extensibility of the system Independent evolution of planners and adapters Resource management Accept or reject a new connection Stop, kill, or replan old connections Security of the planning procedure Fault-tolerance (what if node/adapter fails?) Accounting Introduction Planning Procedure Planning Algorithm Performance Conclusion 16

17 General Planning Procedure Planning data collection User preferences Application data stream requirements Network conditions Plan calculation with the planning algorithm Plan deployment Local planning and centralized planning 17

18 Local Planning Local plan between two neighbor nodes Assume planning data collected off-line adapters are locally available Local planning: adapter selection and ordering Chain of sequential local plans Can be used as a solution Calculated fast Potentially inefficient 18

19 Local Planning Sending User Destination Source Receiving User Adapters Planner 19

20 Centralized Planning Collects planning data about a connection Application requirements Network conditions Calculates a plan Deploys the plan More efficient but harder to calculate 20

21 Centralized Planning (cont.) Adapter storage site Planner Sending user Source Destination ONA node Planner Adapters Receiving user 21

22 Centralized Planning (cont.) Adapter storage site Planner Sending user Source ONA node Planner Adapters Destination Receiving user 22

23 Implementation with Panda Panda AN system designed in our lab Planner and adapter storage site on the source node Sending user Source Destination Panda node Planner Adapters Receiving user 23

24 Combined Planning Procedure Local planning is first Switch to a new central plan when it is ready Central plan may not be necessary for short (< 100 packets) connections Factors for longer life of local plan slow machines busy network central plan calculation delay or failure central plan deployment delay or failure 24

25 Combined Planning Procedure Network conditions can change during session Run centralized planning again Switch to a new central plan Now: how to calculate a plan? 25

26 Planning Algorithm Planner must understand adapter data Adapter data structure Problem ID Effects: Efficiency of solution, impact on data size, lossless (y/n), etc. Costs: Required executional resources, execution latency, monetary cost, delivery latency, etc. Preconditions Solution method Postconditions Example of compressor data Low bandwidth Effects: efficiency = 0.5 data size coefficient = 0.5 lossless = yes Costs: CPU, memory, HD Compressability = 1 LZ compression Compressability = 0 26

27 Planning Data What data is necessary for planning? Category Stream characteristics Stream requirements User preferences Link resources Node resources Attributes (example) Throughput, format, encrypted (y/n), compressed (y/n) Throughput, secret (y/n) User chooses a solution method if more than one exists Bandwidth, secure (y/n), reliable (y/n), etc. CPU, memory, HD 27

28 Heuristic Search in Plan Space Run sequentially Adapter selection using real adapters, handle plan feasibility and adapter consistency from the beginning of a planning process Adapter ordering templates can be calculated off-line Optimize of adapter locations in the results of adapter selection and ordering 28

29 Problem ID Planner Adapter Selection Adapter data method effects costs preconditions postconditions location Adaptation package A AP database Problem ID Planner database Adapter package A: location, interface to AP database Adapter package B: location, interface to AP database Adapter package C: location, interface to AP database Planner administrator realm Adapter query Adaptation package B AP database Adaptation package C AP database Adapter designer realm 29

30 Adapter Ordering One or more partial-order plans ordered by solution methods Format converter Distilling Compression Encryption FEC Data storage adapters Filter 30

31 Adapter Ordering (cont.) Additional constraints come from: Application-level protocol requirements Adapter preconditions/postconditions e.g., adapter requires a particular format Network conditions if users are not able to decrypt cached data, it should be cached unencrypted 31

32 Adapter Ordering (cont.) Conflicts between real adapters during ordering Detected through precondition and postcondition analysis Resolved through reorder, if partial order plan allows adding more adapters If not solvable, adapter selection must be repeated 32

33 Resulting Local Plans Result of adapter selection and ordering Chain of local per-link plans The result plan works But can be inefficient processes data longer wastes connection link resources 33

34 Optimization of Plan Optimization is needed Cover more connection hops with an adapter that improves link conditions (compression, encryption, etc.) Not with FEC, wireless interface scheduler, and some other adapters! Drop redundant adapters also reduce the latency of adaptation Stay feasible 34

35 Plan Optimization Recursive best-first search Local plan chain is the initial point Transformation: merging neighboring plans preserving adapter order Evaluation function f= k, m - weight coefficients lr k, nr m - link and node resources Find minimum of the function can be local link links resources k lr k k node nodesresources m m nr m 35

36 Example of Two Plans Merging Node A Node B Node C 36

37 Plan Merging (cont.) Plan merge can fail discouraged by an evaluation function insufficient knowledge about adapters unrecoverable constraint conflict insufficient computational resources on connection nodes time limit Best-effort plan is delivered 37

38 Example of Planning Source Link characteristics: Low bandwidth Insecure Unreliable Low bandwidth Insecure A B C D Destination WaveLAN 2000 kbps DSL Internet Adaptation: Compression Encryption FEC Distilling Compression Encryption 38

39 Format converter Example of Planning Distilling Compression Encryption FEC Data storage adapters Filter Source Destination A B C D WaveLAN 2000 kbps DSL Internet Adaptation: Compression Encryption FEC Distilling Compression Encryption 39

40 Example of Planning (cont.) Format converter Distilling Compression Encryption FEC Data storage adapters Filter Source Destination A B C D WaveLAN 2000 kbps Adaptation: Compression Encryption FEC DSL Distilling Compression Internet Encryption 40

41 Example of Planning (cont.) Format converter Distilling Compression Encryption FEC Data storage adapters Filter Source Destination A B C D WaveLAN 2000 kbps Adaptation: Compression Encryption FEC DSL Distilling Compression Internet Encryption 41

42 Example (cont.) Chain of local plans Source Destination A B C D Adapters: Compressor Encryptor FEC WaveLAN 2000 kbps DSL DeFEC Decryptor Decompressor Resolution Drop Compressor Decompressor Encryptor Internet Decryptor 42

43 Merge AB+BC Example (cont.) DeFEC stays on B Compression dropped Source Destination A B C D Adapters: WaveLAN 2000 kbps Compressor Resolution Drop Encryptor Compressor FEC Compressor Encryptor FEC DSL DeFEC Decryptor Decompressor Resolution Drop Compressor Decompressor Decryptor Encryptor Decompressor Decompressor Encryptor Internet Decryptor 43

44 Merge AC + CD Example (cont.) Encryption dropped Source Destination A B C D Adapters: WaveLAN 2000 kbps Resolution Drop Compressor Encryptor FEC Encryptor FEC DeFEC DSL Decryptor Decompressor Encryptor Internet Decryptor Decryptor Decompressor 44

45 Performance Results The planner testing on a separate machine Dell Inspiron, 333 MHz, 128MB Simulate connections number of nodes (2 to 15) problems of low bandwidth, very low bandwidth, and security for each link number of adapters a node can execute (1 to 10) Exhaustive search planner for heuristics search evaluation 45

46 Heuristics/Exhaustive Planning Latency Ratio T H /T ES nodes: 1.5 ms for ES 8.3 ms for H 3 nodes 4 nodes 5 nodes 6 nodes 3 nodes: 35.5 ms for ES 15.3 ms for H # of adapters in non-opyimized plan Given that an optimal plan exists, it was not found in: 1 case for 4-node connection (from 1000 tries) 3 cases for 5-node connection (from 1000 tries) 8 cases for 6-node connection (occurred in about 1 percent of tries) 46

47 Planning Algorithm Test 6 nodes, 14 adapters: 90 milliseconds at most nodes 4 nodes t H (msec) nodes 6 nodes # of adapters in non-optimized plan 47

48 Planning Algorithm Test (cont.) 12 nodes, 9 adapters: 160 milliseconds at most t H (msec) adapters 6 adapters 9 adapters # of nodes 48

49 Real-time Application Test HP Omnibook, 500 MHz, 128Mb Panda middleware with planner Applications Connector (test application) WaveVideo multimedia package [Fankhauser99] Adapters Null adapters, resolution-drop, encryption 49

50 Application Test (cont.) 2-, 3-, 4-node connections Link conditions 150 Kbps, 800 Kbps secure, insecure QoS is measured in db, peak signal-to-noise ratio (PSNR) Source Destination A B C D 50

51 PSNR (luminance) PSNR is 10 db higher for an adapted stream No Panda Panda & resolution-drop Panda, resolution-drop & encryption 40 PSNR (db) Throughput (kbps) 51

52 Centralized vs. Local Planning Link characteristics: Insecurity Low bandwidth Local plan: Encrypt Decrypt Distill Centralized plan: Distill Encrypt Decrypt 52

53 Centralized vs. Local Planning PSNR: centralized plan quality is 7 db higher than local Series1 30 PSNR (db) No Panda Local plan Centralized plan Throughput = 150 kbps 53

54 Planning Procedure Latency Planning procedure is 1.1 second at most 100 to150 packets under local plan before central plan is on Latency (msec) Incremental Local Local Centralized with Incremental local with in local background in background Centralized 0 node Node 1, 1 adapters 1 adapter 1 node Node 2, 2 adapters 1 adapter 1 Node node 3, 3 adapters 1 1 Node node 4, 4 adapters 1 1 Node node 4 4,adapters 3 3 Node node 44, 5 adapters 5 54

55 Related Work Naïve Planning (mostly proxies) Agent-proxy Mowgli [Liuljeberg96] Template Planning Conductor [Yarvis00] Online Planning Adaptation: CANS [Fu01] Inspirational AI Planning Approaches least-commitment planning [Kamphampati94] RBFS [Korf93] 55

56 Contribution Designed and implemented Heuristic planning algorithm for unicast connections adapter data structure adapter selection supporting system extensibility adapter ordering plan optimization Feasible automated planning procedure Combined local and centralized planning Replanning Shown that real-time applications benefit 56

57 Work was presented Demonstrations DARPA site visit UCLA CSD Annual Research Review Publications Openarch 2000 Dance 2002 Other papers in the works 57

58 Wider Applicability Beneficial for rescue/military missions Ad hoc networks with highly customized application protocols Applicable on various distributed systems Open network architectures Peer-to-peer networks Remote code invocation systems 58

59 Conclusion Feasible planning system for unicast connections is implemented Real-time applications benefit The planning system allows relatively independent development of planner and adapters The planning system improves active network resource distribution 59

60 End 60

Key Components of WAN Optimization Controller Functionality

Key Components of WAN Optimization Controller Functionality Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

Active Network Support Services Demonstration Columbia University, University of California Berkeley, University of California Los Angeles,

Active Network Support Services Demonstration Columbia University, University of California Berkeley, University of California Los Angeles, Active Network Support Services Demonstration Columbia University, University of California Berkeley, University of California Los Angeles, University of Utah December 6, 2000 Outline Introduction Description

More information

Multimedia Data Transmission over Wired/Wireless Networks

Multimedia Data Transmission over Wired/Wireless Networks Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: bb@cs.purdue.edu

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Question: 3 When using Application Intelligence, Server Time may be defined as.

Question: 3 When using Application Intelligence, Server Time may be defined as. 1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response

More information

Testing & Assuring Mobile End User Experience Before Production. Neotys

Testing & Assuring Mobile End User Experience Before Production. Neotys Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,

More information

How to Build a Massively Scalable Next-Generation Firewall

How to Build a Massively Scalable Next-Generation Firewall How to Build a Massively Scalable Next-Generation Firewall Seven measures of scalability, and how to use them to evaluate NGFWs Scalable is not just big or fast. When it comes to advanced technologies

More information

Understanding Latency in IP Telephony

Understanding Latency in IP Telephony Understanding Latency in IP Telephony By Alan Percy, Senior Sales Engineer Brooktrout Technology, Inc. 410 First Avenue Needham, MA 02494 Phone: (781) 449-4100 Fax: (781) 449-9009 Internet: www.brooktrout.com

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

Bandwidth-limited systems. Chapter 8 Bandwidth-Limited Systems. Two flavors of limited bandwidth - 1. Outline of the chapter

Bandwidth-limited systems. Chapter 8 Bandwidth-Limited Systems. Two flavors of limited bandwidth - 1. Outline of the chapter Bandwidth-limited systems Chapter 8 Bandwidth-Limited Systems the reliability and capacity of the underlying network is not sufficient for the task at hand e.g., wireless communication devices use of multimedia

More information

HyperIP : VERITAS Replication Application Note

HyperIP : VERITAS Replication Application Note QuickTime and a Graphics decompressor are needed to see this picture. HyperIP : VERITAS Replication Application Note Introduction HyperIP is a Linux software application that quantifiably and measurably

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds:

Fundamentals of VoIP Call Quality Monitoring & Troubleshooting. 2014, SolarWinds Worldwide, LLC. All rights reserved. Follow SolarWinds: Fundamentals of VoIP Call Quality Monitoring & Troubleshooting 2014, SolarWinds Worldwide, LLC. All rights reserved. Introduction Voice over IP, or VoIP, refers to the delivery of voice and multimedia

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

OPTIMIZING THE NETWORK FOR APPLICATIONS

OPTIMIZING THE NETWORK FOR APPLICATIONS OPTIMIZING THE NETWORK FOR APPLICATIONS Intelligent WAN and network optimization technology allow organizations to more effectively use enterprise networks as demands on bandwidth grow. Enterprises use

More information

Demonstration of Internet Protocol Television(IPTV) Khai T. Vuong, Dept. of Engineering, Oslo University College.

Demonstration of Internet Protocol Television(IPTV) Khai T. Vuong, Dept. of Engineering, Oslo University College. Demonstration of Internet Protocol Television(IPTV) 1 What is IPTV? IPTV is a general term of IP+TV = IPTV Delivery of traditional TV channels and video-ondemand contents over IP network. 2 IPTV Definition

More information

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study

Real-Time Communication in IEEE 802.11 Wireless Mesh Networks: A Prospective Study in IEEE 802.11 : A Prospective Study January 2011 Faculty of Engineering of the University of Porto Outline 1 Introduction 2 3 4 5 in IEEE 802.11 : A Prospective Study 2 / 28 Initial Considerations Introduction

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Digital Audio and Video Data

Digital Audio and Video Data Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each

More information

Dynamic Web Stream Customizers

Dynamic Web Stream Customizers Dynamic Web Stream Customizers Jesse Steinberg and Joseph Pasquale Department of Computer Science and Engineering University Of California, San Diego often not adequate for many of today s new wireless

More information

Network Simulation Traffic, Paths and Impairment

Network Simulation Traffic, Paths and Impairment Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating

More information

Mesh Network Testbed and Video Stream Measurement

Mesh Network Testbed and Video Stream Measurement Mesh Network Testbed and Video Stream Measurement Nan Li Email: nli@cs.uml.edu Abstract In this project, we set up a mesh network testbed with nine desktops and three laptops. We install on desktop two

More information

Measuring IP Performance. Geoff Huston Telstra

Measuring IP Performance. Geoff Huston Telstra Measuring IP Performance Geoff Huston Telstra What are you trying to measure? User experience Responsiveness Sustained Throughput Application performance quality Consistency Availability Network Behaviour

More information

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data

Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data White Paper Enhance Service Delivery and Accelerate Financial Applications with Consolidated Market Data What You Will Learn Financial market technology is advancing at a rapid pace. The integration of

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network

More information

Performance Comparison of low-latency Anonymisation Services from a User Perspective

Performance Comparison of low-latency Anonymisation Services from a User Perspective Performance Comparison of low-latency Anonymisation Services from a User Perspective Rolf Wendolsky Hannes Federrath Department of Business Informatics University of Regensburg 7th Workshop on Privacy

More information

Measurements on the Spotify Peer-Assisted Music-on-Demand Streaming System

Measurements on the Spotify Peer-Assisted Music-on-Demand Streaming System The Spotify Protocol on the Spotify Peer-Assisted Music-on-Demand Streaming System Mikael Goldmann KTH Royal nstitute of Technology Spotify gkreitz@spotify.com P2P 11, September 1 2011 on Spotify Spotify

More information

Application Note How To Determine Bandwidth Requirements

Application Note How To Determine Bandwidth Requirements Application Note How To Determine Bandwidth Requirements 08 July 2008 Bandwidth Table of Contents 1 BANDWIDTH REQUIREMENTS... 1 1.1 VOICE REQUIREMENTS... 1 1.1.1 Calculating VoIP Bandwidth... 2 2 VOIP

More information

Troubleshooting Common Issues in VoIP

Troubleshooting Common Issues in VoIP Troubleshooting Common Issues in VoIP 2014, SolarWinds Worldwide, LLC. All rights reserved. Voice over Internet Protocol (VoIP) Introduction Voice over IP, or VoIP, refers to the delivery of voice and

More information

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR

CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical

More information

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique

A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

Authors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt

Authors Mário Serafim Nunes IST / INESC-ID Lisbon, Portugal mario.nunes@inesc-id.pt Adaptive Quality of Service of Voice over IP Communications Nelson Costa Instituto Superior Técnico (IST) Lisbon, Portugal eng.ncosta@gmail.com Authors Mário Serafim Nunes Lisbon, Portugal mario.nunes@inesc-id.pt

More information

Best Practices in Legal IT. How to share data and protect critical assets across the WAN

Best Practices in Legal IT. How to share data and protect critical assets across the WAN Best Practices in Legal IT How to share data and protect critical assets across the WAN Agenda Requirements for Data Center outsourcing Timothy Titus, Director of Managed Network Services Overcoming WAN

More information

Security Sensor Network. Biswajit panja

Security Sensor Network. Biswajit panja Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks

More information

Experiences with Interactive Video Using TFRC

Experiences with Interactive Video Using TFRC Experiences with Interactive Video Using TFRC Alvaro Saurin, Colin Perkins University of Glasgow, Department of Computing Science Ladan Gharai University of Southern California, Information Sciences Institute

More information

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li

DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li DIRAC: A Software-based Wireless Router System Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo, Songwu Lu, Jefferey Jia-Ru Li Presented by: Stephen Kazmierczak Overview Background Issues Motivation

More information

The Internet. An Engineering Approach to Computer Networking

The Internet. An Engineering Approach to Computer Networking The Internet An Engineering Approach to Computer Networking My how you ve grown! The Internet has doubled in size every year since 1969 In 1996, 10 million computers joined the Internet By July 1997, 10

More information

A low-latency yet highly reliable wireless video transfer system

A low-latency yet highly reliable wireless video transfer system A low-latency yet highly reliable wireless video transfer system Tobias Welti Institute of Embedded Systems Team High Performance Multimedia & Data Acquisition Target Specifications 30 fps interactive

More information

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998

Oracle Applications Release 10.7 NCA Network Performance for the Enterprise. An Oracle White Paper January 1998 Oracle Applications Release 10.7 NCA Network Performance for the Enterprise An Oracle White Paper January 1998 INTRODUCTION Oracle has quickly integrated web technologies into business applications, becoming

More information

AlcAtel-lucent enterprise AnD sdnsquare sdn² network solution enabling highly efficient, volumetric, time-critical data transfer over ip networks

AlcAtel-lucent enterprise AnD sdnsquare sdn² network solution enabling highly efficient, volumetric, time-critical data transfer over ip networks AlcAtel-lucent enterprise AnD sdnsquare sdn² network solution enabling highly efficient, volumetric, time-critical data transfer over ip networks Internet technology has completely changed the networking

More information

Preparing Your IP Network for High Definition Video Conferencing

Preparing Your IP Network for High Definition Video Conferencing WHITE PAPER Preparing Your IP Network for High Definition Video Conferencing Contents Overview...3 Video Conferencing Bandwidth Demand...3 Bandwidth and QoS...3 Bridge (MCU) Bandwidth Demand...4 Available

More information

White Paper. Accelerating VMware vsphere Replication with Silver Peak

White Paper. Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Accelerating VMware vsphere Replication with Silver Peak Contents Overview...3 The Challenge of Replicating Over Distance...3 VMware vsphere Replication

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and

SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and SafeNet Network Encryption Solutions Safenet High-Speed Network Encryptors Combine the Highest Performance With the Easiest Integration and Management SafeNet Network Encryption and Isolation Solution

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Digital Advisory Services Professional Service Description Network Assessment

Digital Advisory Services Professional Service Description Network Assessment Digital Advisory Services Professional Service Description Network Assessment 1. Description of Services. 1.1. Network Assessment. Verizon will perform Network Assessment services for the Customer Network,

More information

1.1. Abstract. 1.2. VPN Overview

1.1. Abstract. 1.2. VPN Overview 1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making

More information

IVCi s IntelliNet SM Network

IVCi s IntelliNet SM Network IVCi s IntelliNet SM Network Technical White Paper Introduction...2 Overview...2 A True ATM Solution End to End...2 The Power of a Switched Network...2 Data Throughput:...3 Improved Security:...3 Class

More information

A Web Middleware Architecture for Dynamic Customization of Content for Wireless Clients

A Web Middleware Architecture for Dynamic Customization of Content for Wireless Clients A Web Middleware Architecture for Dynamic Customization of Content for Wireless Clients Jesse Steinb erg and Joseph Pasquale University of California, San Diego Department of Computer Science and Engineering

More information

Deploying in a Distributed Environment

Deploying in a Distributed Environment Deploying in a Distributed Environment Distributed enterprise networks have many remote locations, ranging from dozens to thousands of small offices. Typically, between 5 and 50 employees work at each

More information

Traffic Engineering & Network Planning Tool for MPLS Networks

Traffic Engineering & Network Planning Tool for MPLS Networks Traffic Engineering & Network Planning Tool for MPLS Networks Dr. Associate Professor, Department of Electrical Engineering Indian Institute of Technology Bombay, Powai, Mumbai 76 Founder & Director, Vegayan

More information

RAMCloud and the Low- Latency Datacenter. John Ousterhout Stanford University

RAMCloud and the Low- Latency Datacenter. John Ousterhout Stanford University RAMCloud and the Low- Latency Datacenter John Ousterhout Stanford University Most important driver for innovation in computer systems: Rise of the datacenter Phase 1: large scale Phase 2: low latency Introduction

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Southwest Arkansas Telephone Cooperative Network Management Practices

Southwest Arkansas Telephone Cooperative Network Management Practices Southwest Arkansas Telephone Cooperative Network Management Practices Page 1 of 11 Release Date 05/18/15 INTRODUCTION... 3 CORE NETWORK OVERVIEW... 3 DISTRIBUTION NETWORK OVERVIEW... 3 ACCESS NETWORK OVERVIEW...

More information

The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications.

The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications. The topic of this presentation is comparing cellular with other communication technologies. The focus is on Smart Grid applications. 1 Study Approach We have performed a study to analyze Smart Grid Communication

More information

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)

D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s) v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Mobile Communications Chapter 9: Mobile Transport Layer Motivation TCP-mechanisms Classical approaches Indirect TCP Snooping TCP Mobile TCP PEPs in general Additional optimizations Fast retransmit/recovery

More information

Cisco Application Networking for IBM WebSphere

Cisco Application Networking for IBM WebSphere Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP?

Goal We want to know. Introduction. What is VoIP? Carrier Grade VoIP. What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? Goal We want to know Introduction What is Meant by Carrier-Grade? What is Meant by VoIP? Why VoIP? VoIP Challenges 2 Carrier Grade VoIP Carrier grade Extremely high availability 99.999% reliability (high

More information

How To Improve Performance On A Network With A Slow Connection

How To Improve Performance On A Network With A Slow Connection The Three Components of Optimizing WAN Bandwidth Ashton, Metzler & Associates October 2002 1 Introduction There are two fundamental truths that characterize an enterprise Wide Area Network (WAN). The first

More information

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat

HPAM: Hybrid Protocol for Application Level Multicast. Yeo Chai Kiat HPAM: Hybrid Protocol for Application Level Multicast Yeo Chai Kiat Scope 1. Introduction 2. Hybrid Protocol for Application Level Multicast (HPAM) 3. Features of HPAM 4. Conclusion 1. Introduction Video

More information

MPLS. Packet switching vs. circuit switching Virtual circuits

MPLS. Packet switching vs. circuit switching Virtual circuits MPLS Circuit switching Packet switching vs. circuit switching Virtual circuits MPLS Labels and label-switching Forwarding Equivalence Classes Label distribution MPLS applications Packet switching vs. circuit

More information

Recommended QoS Configuration Settings for TP-LINK Archer C9 AC1900 Wireless Router

Recommended QoS Configuration Settings for TP-LINK Archer C9 AC1900 Wireless Router Recommended QoS Configuration Settings for TP-LINK Archer C9 AC1900 Wireless Router Recommended QoS Configuration TP-LINK C9 AC 1900 Contents Contents Introduction.......................................

More information

Steelcape Product Overview and Functional Description

Steelcape Product Overview and Functional Description Steelcape Product Overview and Functional Description TABLE OF CONTENTS 1. General Overview 2. Applications/Uses 3. Key Features 4. Steelcape Components 5. Operations Overview: Typical Communications Session

More information

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1)

Lecture Objectives. Lecture 07 Mobile Networks: TCP in Wireless Networks. Agenda. TCP Flow Control. Flow Control Can Limit Throughput (1) Lecture Objectives Wireless and Mobile Systems Design Lecture 07 Mobile Networks: TCP in Wireless Networks Describe TCP s flow control mechanism Describe operation of TCP Reno and TCP Vegas, including

More information

SHEET 5 CABLE TELEVISION SYSTEM

SHEET 5 CABLE TELEVISION SYSTEM SHEET 5 CABLE TELEVISION SYSTEM TRADITIONAL TELEVISION AND IPTV INTRODUCTION Access to full digital, as an inevitable technological development, clearly demonstrates the place of Digital Communication

More information

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

TCP and Wireless Networks Classical Approaches Optimizations TCP for 2.5G/3G Systems. Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme Chapter 2 Technical Basics: Layer 1 Methods for Medium Access: Layer 2 Chapter 3 Wireless Networks: Bluetooth, WLAN, WirelessMAN, WirelessWAN Mobile Networks: GSM, GPRS, UMTS Chapter 4 Mobility on the

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Real World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com

Real World Enterprise SQL Server Replication Implementations. Presented by Kun Lee sa@ilovesql.com Real World Enterprise SQL Server Replication Implementations Presented by Kun Lee sa@ilovesql.com About Me DBA Manager @ CoStar Group, Inc. MSSQLTip.com Author (http://www.mssqltips.com/sqlserverauthor/15/kunlee/)

More information

Restorable Logical Topology using Cross-Layer Optimization

Restorable Logical Topology using Cross-Layer Optimization פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical

More information

Caching Mechanisms for Mobile and IOT Devices

Caching Mechanisms for Mobile and IOT Devices Caching Mechanisms for Mobile and IOT Devices Masafumi Takahashi Toshiba Corporation JEDEC Mobile & IOT Technology Forum Copyright 2016 Toshiba Corporation Background. Unified concept. Outline The first

More information

Definition. A Historical Example

Definition. A Historical Example Overlay Networks This lecture contains slides created by Ion Stoica (UC Berkeley). Slides used with permission from author. All rights remain with author. Definition Network defines addressing, routing,

More information

Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks. Italo Dacosta and Patrick Traynor

Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks. Italo Dacosta and Patrick Traynor Proxychain: Developing a Robust and Efficient Authentication Infrastructure for Carrier-Scale VoIP Networks Italo Dacosta and Patrick Traynor Performance, Scalability and Security Finding the right balance

More information

Driving force. What future software needs. Potential research topics

Driving force. What future software needs. Potential research topics Improving Software Robustness and Efficiency Driving force Processor core clock speed reach practical limit ~4GHz (power issue) Percentage of sustainable # of active transistors decrease; Increase in #

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Minimum System Requirements What do I need to host or attend a meeting using Microsoft Windows? What do I need to host or attend a meeting using Mac OS? What do I need to host

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration

Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration Optimizing Dell Compellent Remote Instant Replay with Silver Peak Replication Acceleration A Dell Technical White Paper Abstract This technical report details the benefits that Silver Peak s replication

More information

Tranzeo s EnRoute500 Performance Analysis and Prediction

Tranzeo s EnRoute500 Performance Analysis and Prediction Tranzeo s EnRoute500 Performance Analysis and Prediction Introduction Tranzeo has developed the EnRoute500 product family to provide an optimum balance between price and performance for wireless broadband

More information

Deploying Silver Peak VXOA with EMC Isilon SyncIQ. February 2012. www.silver-peak.com

Deploying Silver Peak VXOA with EMC Isilon SyncIQ. February 2012. www.silver-peak.com Deploying Silver Peak VXOA with EMC Isilon SyncIQ February 2012 www.silver-peak.com Table of Contents Table of Contents Overview... 3 Solution Components... 3 EMC Isilon...3 Isilon SyncIQ... 3 Silver Peak

More information

diversifeye Application Note

diversifeye Application Note diversifeye Application Note Test Performance of IGMP based Multicast Services with emulated IPTV STBs Shenick Network Systems Test Performance of IGMP based Multicast Services with emulated IPTV STBs

More information

Classes of multimedia Applications

Classes of multimedia Applications Classes of multimedia Applications Streaming Stored Audio and Video Streaming Live Audio and Video Real-Time Interactive Audio and Video Others Class: Streaming Stored Audio and Video The multimedia content

More information

Throughput constraint for Synchronous Data Flow Graphs

Throughput constraint for Synchronous Data Flow Graphs Throughput constraint for Synchronous Data Flow Graphs *Alessio Bonfietti Michele Lombardi Michela Milano Luca Benini!"#$%&'()*+,-)./&0&20304(5 60,7&-8990,.+:&;/&."!?@A>&"'&=,0B+C. !"#$%&'()* Resource

More information

HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL

HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL White Paper HOW PUBLIC INTERNET IS FINALLY READY FOR HD VIDEO BACKHAUL EXPLORING THE CHALLENGES AND OPPORTUNITIES OF DELIVERING MORE CONTENT AT LESS COST Today s broadcasters are faced with an ever- present

More information

ProCurve Secure Access 700wl Series Wireless Data Privacy Technical Brief

ProCurve Secure Access 700wl Series Wireless Data Privacy Technical Brief ProCurve Networking by HP ProCurve Secure Access 700wl Series Wireless Data Privacy Technical Brief Introduction... 2 The Data Security Problem in the Wireless World... 2 ProCurve 700wl Series Wireless

More information

Ring Protection: Wrapping vs. Steering

Ring Protection: Wrapping vs. Steering Ring Protection: Wrapping vs. Steering Necdet Uzun and Pinar Yilmaz March 13, 2001 Contents Objectives What are wrapping and steering Single/dual fiber cut Comparison of wrapping and steering Simulation

More information

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB

Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides

More information

The Next Generation Network:

The Next Generation Network: JULY, 2012 The Next Generation Network: Why the Distributed Enterprise Should Consider Multi-circuit WAN VPN Solutions versus Traditional MPLS Tolt Solutions Network Services 125 Technology Drive Suite

More information

LTE Mobility Enhancements

LTE Mobility Enhancements Qualcomm Incorporated February 2010 Table of Contents [1] Introduction... 1 [2] LTE Release 8 Handover Procedures... 2 2.1 Backward Handover... 2 2.2 RLF Handover... 3 2.3 NAS Recovery... 5 [3] LTE Forward

More information

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University

Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting

More information

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters

COSC 6374 Parallel Computation. Parallel I/O (I) I/O basics. Concept of a clusters COSC 6374 Parallel Computation Parallel I/O (I) I/O basics Spring 2008 Concept of a clusters Processor 1 local disks Compute node message passing network administrative network Memory Processor 2 Network

More information

Computer System Management: Hosting Servers, Miscellaneous

Computer System Management: Hosting Servers, Miscellaneous Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation

More information

Narrow Bandwidth Streaming Video Codec

Narrow Bandwidth Streaming Video Codec Software Requirements Specification for Narrow Bandwidth Streaming Video Codec Version 1.0 approved Internal Supervisors Dr. Shantha Frenando Dr. Chathura de Silva External Supervisors Mr. Harsha Samarawicrama

More information

Achieving Mainframe-Class Performance on Intel Servers Using InfiniBand Building Blocks. An Oracle White Paper April 2003

Achieving Mainframe-Class Performance on Intel Servers Using InfiniBand Building Blocks. An Oracle White Paper April 2003 Achieving Mainframe-Class Performance on Intel Servers Using InfiniBand Building Blocks An Oracle White Paper April 2003 Achieving Mainframe-Class Performance on Intel Servers Using InfiniBand Building

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Dynamic Load Balancing and Node Migration in a Continuous Media Network

Dynamic Load Balancing and Node Migration in a Continuous Media Network Dynamic Load Balancing and Node Migration in a Continuous Media Network Anthony J. Howe Supervisor: Dr. Mantis Cheng University of Victoria Draft: April 9, 2001 Abstract This report examines current technologies

More information

Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper

Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper Release 2 October 2003 Copyright Copyright 2003 Mitel Networks Corporation. This document is unpublished and the following

More information