MEASURING LATENCY IN IRIDIUM SATELLITE CONSTELLATION DATA SERVICES
|
|
|
- Marlene Austin
- 9 years ago
- Views:
Transcription
1 MEASURING LATENCY IN IRIDIUM SATELLITE CONSTELLATION DATA SERVICES # 233 Margaret M. McMahon, Ph. D. Computer Science Department, US Naval Academy 572 M Holloway Rd, Stop 9F Annapolis, MD [email protected] Robert Rathburn ISDI TECHNOLOGIES, INC Kapiolani Blvd, Suite 1100 Honolulu, Hawaii [email protected]
2 Abstract The use of Satellite Communications (SATCOM) has become essential to operations in both Afghanistan and Iraq. In particular, the Iridium satellite constellation has demonstrated its usefulness and flexibility. It has had significant impact on how operations are conducted. Iridium provides users both voice and data services. There are two approaches to sending data over the Iridium network: a circuit-switched data service and message-switched data service. Use of the circuit-switched data service requires the overhead of a setup in the same manner as a voice call. There are two message-switched data services: Short Burst Data (SBD) and Short Message Service (SMS). Our testing involves the SBD message-switched data service, which is optimized for high capacity and efficiency when sending small amounts of data through the Iridium network. While there are many users for these services, little information can be found about their actual performance in fielded systems. The best sources of information are specifications or modeling of the performance of these services. We perceived that understanding the underlying network performance was needed, and we established experiments to capture that performance. We present results from both circuit-switched data service and message-switched SBD data service. We also address insights into the use of these services. 1 Relevance to Command and Control Effective command and control in regions without an established or accessible communication infrastructure relies on the communication paths provided by geosynchronous or satellite constellations. When a network application uses a satellite, there are expectations of latency. Network-centric application developers need to understand that underlying performance; and take into account operational characteristics of commercial services such as satellite call capacity and call setup times. With Low Earth Orbit (LEO) constellations such as Iridium, there are also considerations associated
3 with look angles to satellites and revisit and coverage times of the constellation. Contrary to common understanding, Iridium service does not cover the whole globe at all times. An important part of Command and Control systems is the timely delivery and fusion of data from multiple sensors that often have overlapping areas of coverage. The Tactical Component Network (TCN ) technology transparently integrates sensor and communications suites with distributed network applications. TCN has a local component, called the TCN Local Network that handles time-critical, peer-to-peer applications, and a wide-area capability called the TCN Global Network. The global TCN uses a hub-and-spoke architecture to allow geographically dispersed systems to share data, and to interact with applications resident on the hub. The Iridium constellation is used as one type of spoke in the hub-and-spoke architecture of the global version of the TCN. Iridium was employed during US Navy 7 th Fleet exercises, where TCN was used to integrate sensor data from multiple ships in a Beyond Line Of Site (BLOS) operational environment. At the end of each spoke into the hub was a Tactical Component Network (TCN) node, typically consisting of a local area network (LAN), multiple processors, cryptographic equipment and various peripherals. Some data provider nodes connected TCN to sensors such as the AN/SPS-48 radar on USS Essex, and others such as the USS Guardian provided mine information to other users. Currently, global TCN data is transmitted via circuit switched method via an encrypted Iridium data link. The message-based SBD service is being investigated as an alternative data transmission method for applications not requiring continuous connectivity. 2 Introduction This paper addresses the methods and experiments used to gain insight into the performance of spokes when they are implemented by the Iridium constellation. Our approach was to measure the actual latencies for these data services. In separate experiments, circuit-switched data calls and SBD message-switched data transmission latencies were
4 quantified. For the circuit-switched experiments, a custom client-server application was built and instrumented. The SBD types of transmissions analyzed were: Mobile Originated (MO), Mobile Terminated (MT) and Full Duplex. 3 Related Work In [1], the authors describe an application of the Iridium network to support communication needs of passenger, flight and cabin crews for voice, data and paging. Voice latency was estimated to be between milliseconds (ms). Effective channel throughput delay for data (1024 bit message) is estimated between 427 ms and 1.7 seconds. Simulation of Iridium satellite networks performed by [5] estimated an upper limit of the average end-to-end delay to be 210 ms when passing through twelve satellites. These studies were based on assumptions, rather than measurements. 4 Background The data transfer rate for Circuit-Switched Data (CSD) is 300 Bytes/sec and for SBD is 125 Bytes/sec. A CSD data requires that the satellite acquisition and call setup has been completed. However, an SBD transfer requires only that satellite acquisition has completed. This potentially makes SBD a better choice for Low Probability of Intercept (LPI) / Low Probability of Detection (LPD) applications [3]. Given that satellite acquisition has occurred, SBD is able to transfer 100 Bytes in approximately 1 second. Each SBD call can transfer a maximum of to 1960 Bytes from a mobile system to a gateway, and a maximum of 1,890 Bytes from gateway to a mobile system [3]. 5 The Experiments 5.1 Circuit-Switched Data Service Experiments
5 The CSD experiments used the hub-and-spoke architecture of Global TCN. The hub is similar to the telephone central switching office. In addition to facilitating communications between dissimilar systems, it contains a real-time repository of historical and current data. Combining these features enables the hub to be the central point host for network-centric applications. Although the hub is a centralized concept, its functions can be replicated to prevent having a single point of failure. Spokes, as well as the hub, can be redundant to maintain communication capability. A backup hub maintains the current hub configurations and can prevent disruption of the services and connections. The experiments for circuit switched applications were conducted using a hub located in Laurel, MD, and clients were located in Annapolis, MD. The direct distance is 21 statute miles (42 miles round trip). A combination of the Iridium constellation and land-line created a spoke into the hub. The Iridium gateway in Phoenix, AZ, was used. The Iridium satellite network carried traffic from the client laptop to the ground station in Arizona (2008 miles). The trip to the hub in Laurel was via land-line (1989 miles). To better understand the underlying network performance, we eliminated the global TCN application in our experiments and used representative data streams. 5.2 Message-Switched Experiments There are two types of message-switched services offered in the Iridium constellation: SBD and SMS. The SBD service allows the use of a modem, supporting communicating applications through a method similar to [3]. The SMS service is a text-messaging service for sending messages from one cell phone to another [4]. The message-switched experiments used the SBD service with both Mobile Originated (MO) Transmissions and Mobile Terminated (MT) Transmissions. These types of transmissions were operated simultaneously in full-duplex mode and are described in the next sections. The mobile equipment was located in Honolulu, HI, and the service used the gateway in Tempe, AZ. The distance from Honolulu to
6 Tempe is 2915 miles. Both the sender and receiver were mobile units; there was no land-line component in the SBD experiments. 6 Short Burst Data Overview 6.1 Mobile Originated Transmissions Overview MO transmissions originate from the mobile device and are sent to the Iridium gateway and ultimately to the destination address(es). The maximum size of a MO message is 1960 bytes (one 70 byte header segment followed by up to fourteen 135 byte data segments). The message uses the signaling path, vice a circuit switch call origination procedure, to transfer the message to the satellite. The message is then delivered to the Iridium gateway, formatted into an attachment on an message and forwarded immediately to the destination address. The mobile unit receives a status signal indicating whether the transmission was successful or not, allowing the controlling application to determine the next logical step (retry or skip). Two separate applications were required in order to facilitate the testing process: the MO Send application and the MO Receive application. The MO Send process is the main driver of the SBD process, controlling the mobile unit and checking the transmission status of the MO. To send an MO message, the controlling application must have the message, the message length, and the 2 digit checksum (least significant 2-bytes of the summation of the entire SBD message). The transmission is executed with standard modem AT commands to: load the message to the mobile unit, initiate the transfer, and clear the buffer. The MO process will provide notification to the application if any of the steps is unsuccessful. The MO Receive process is the means by which a mobile subscriber receives messages destined for its specific ID. The Receive process is not permanently connected to the server that holds s intended for delivery and must poll the server to determine if (s) are addressed to its specified ID. The mobile subscriber's Receive process may be configured to poll for incoming infrequently or
7 request at the maximum request rate. The MO Receive process functions as an client that connects directly to the server that is specified as the destination address. The client must recognize messages destined for the target address and select the messages with the correct mobile unit International Mobile Equipment Identity (IMEI) in the subject line. The IMEI serves as a serial number recognizable to the Iridium SBD system. As MO messages reach the gateway, they are immediately sent to the destination address. Additional functionality may be built into the receiving application to provide the option to either download a backlog of messages or selectively review the queue of previous messages. 6.2 Mobile Terminated Transmissions Overview MT transmissions are SBD transmissions that originate with an message to the Iridium gateway, which is destined for the mobile unit (identified by IMEI number). The maximum size of a MT message is 1890 bytes (up to fourteen 135 byte segments). The message to the Iridium gateway must be formatted with the actual MT message as an attachment. After the message has been sent to the gateway, an acknowledgement is received to indicate whether the message has been successfully queued or not. The mobile unit is then responsible for retrieving the MT message by sending a MO message that connects to the gateway and retrieves the next available message from the queue. The message is extracted from the mobile unit through a series of standard modem AT commands. The MT Send process must function as an client capable of sending and receiving messages to and from a specific account at a mobile terminate location. When a SBD message is to be sent, the MT Send process generates an message to the Iridium gateway and includes the SBD message as an attachment with the IMEI included in the subject line of the message. At the gateway a process runs every 30 seconds to gather the MT SBD messages and queue them for the individual mobile devices. An acknowledgement message is sent back to the originating address confirming whether or not the message was queued successfully for transmission. Iridium
8 Documentation indicates that the queue can store up to 50 messages per IMEI, however in our testing we found that the limit appeared to be 200 messages. If the queue is full, the acknowledgement will indicate an error and provide notification that the message was not queued successfully. If an error is indicated, the MT Send process can determine whether to suspend sends, resend the message or skip to a subsequent message. There is a secondary confirmation that the message was actually transmitted successfully, however this status must be extracted from the body of s that are sent as the result of an MO send (actual message or 0 byte mailbox check). According to documentation, testing, and discussions with Iridium, if the messages are queued successfully they will be transmitted successfully. We found nothing to contradict this assertion during our testing. The MT Receive process is responsible for periodically checking the Iridium gateway queue to see if any messages are waiting to be transferred. While some additional functionality may soon be available (e.g. MT Ring Alert, which is used to notify when a MT message is awaiting transmission), the Receive process must poll the mailbox to determine if there are messages to be transmitted and identify how many messages are currently in the queue. A mailbox check is performed by sending an empty (0 byte) MO message to check if there are MT messages stored in the queue waiting to be retrieved. The mailbox check is accomplished by the AT commands to: clear MO send buffer, initiate the SBD transfer, and retrieve MT message from the buffer. The MO Send process will also trigger a mailbox check. The Receive process can only retrieve one MT message at a time. In the process of initiating the transfer, the mobile unit will provide a receiving process status indicating whether a MT message was retrieved, the size of the message, and the number of messages still waiting in the queue to be transmitted. The Iridium gateway generates an message to the MO destination address that contains the transfer status to indicate that the MT message was successfully retrieved, which can be monitored to provide absolute verification that the MT message was transmitted successfully.
9 6.3 Full Duplex Overview Testing SBD in Full Duplex mode requires traffic flowing both to and from the mobile unit. The MO Receive and MT Send processes are tightly coupled. Whenever an MO message is sent, a query is performed to detect if there are any MT messages in the queue awaiting transmission. If a message is found, the mobile unit retrieves the message and makes it available to the MT Receive process. Additionally, if the period between sending MO messages is too long, additional mailbox checks may be required between MO messages. 7 Experimental Setup 7.1 Circuit-Switched We used a custom, instrumented, User Datagram Protocol (UDP) stateless echo client and server applications, implemented in the C programming language. The applications used blocking socket functions. Both computers ran Windows XP, and were synchronized to Universal Coordinated Time (UCT) attained from Global Positioning System (GPS) satellites. In these experiments, we used laptop computers running only the Windows XP operating system (OS) and the echo application. Communication functions were supported by the OS. Round trip time (RTT) was calculated by calculating the time elapsed by the client between sending and receiving a packet, subtracting the time between receiving and sending text at the server program. 7.2 Short Burst Data Using SBD service requires an Iridium phone with Data Kit attachments or the Iridium 9522 L-Band Transceiver (with power supply) and an antenna to meet the needs of a mobile unit. Using a Motorola Mobile phone requires a model capable of SBD and the flash version firmware that supports SBD. The L-Band transceiver functions as a modem for accessing the Iridium Satellite network from a computer. Additionally, software setup is required to support SBD. The unit (phone or transceiver) must
10 be provisioned and a SIM card provided by Iridium must be installed. Iridium also provides access to a software system for tracking system usage and performing simple maintenance on the SBD transmissions. In our SBD experiments, there are transmissions between a mobile unit and the Iridium gateway; one side of the transmission always involves a mobile unit. The Spnet2 Provisioning System, provided by Iridium, can be used to modify the delivery address for any of the SBD demo units in their account; monitor the activity and view reports for the SBD demo units in an account; send MT text messages directly to an SBD demo unit in an account; and delete MT messages that are pending in the download queue for an SBD demo unit in an account. This system was very useful in the testing process as it provided the ability to monitor the gateway queue and the ability to see the messages reach the gateway and subsequently be processed. This provisioning capability is not available to the system users. 8 Results 8.1 CSD Results A series of experiments were performed to baseline the client-server application performance on the same machine, in the same local area network (LAN) and dial-in service. These preliminary experiments are described in [2]. These tests were run interactively, with users typing the text transmitted and received by the echo client. The packet sizes were variable, with the average packet size for all the dynamic and static experiments was 14 Bytes. Our circuit-switched experiments used the Iridium network and land-line as the spoke into the hub. The Iridium gateway in Phoenix, AZ, was used. The Iridium satellite network carried traffic from the client laptop to the ground station in Arizona (2008 miles). The trip to the hub in Laurel was via land-line (1989 miles). They were run on both static and on dynamic platforms. The static experiments results, shown in Figure 1, had an average RTT of 1686 msec. Dynamic tests were conducted shipboard
11 in Annapolis, MD. Dynamic experiments had an average RTT of 1812 msec. This greater average was unlikely due to the moving platforms when using Iridium; the lowest RTT was recorded during a dynamic test (981 msec). More likely factors are traffic, routing delays, or the error correction Iridium uses for data service. Figure 2 contains results of the dynamic tests. Frequency Frequency RTT (msec) RTT (msec) Fig. 1. Static Iridium Test RTTs Fig. 2. Dynamic Iridium Test RTTs The combined data in the experiments had an average RTT of 1755 msec. This combined data is shown graphically in Figure Frequency RTT (msec) Fig. 3. Combined Iridium Test RTTs Statistical analysis indicated that there was no correlation between packet size and round-trip time. This was as expected, since each text message was sent in one UDP datagram. Table 1 presents the summary statistics for the Iridium tests. The modes for both the static and dynamic tests are between 1300 and 1400 milliseconds, providing us a more realistic round-trip time than using the average time. Table 1. Summary statistics for the Iridium tests Static Dynamic Combined Average RTT (msec) Standard Dev Max RTT (msec) Min RTT (msec) Mode (msec) Average Packet Size (Bytes) Percent <= 1700 msec
12 8.2 SBD Results The information provided summarizes at a high-level the findings of the SBD investigation project using commercial Iridium services. All aspects of the SBD service were exercised thoroughly. The initial impression is that the service is still relatively new and just positioning itself for production usage. During the course of testing various problems were encountered, one of which derailed testing for three days (Iridium process was generating incorrect random s to the device queue) and others that are planned to be fixed or enhanced in the next release(s) (e.g. mismatching MT message sequence number (MTMSN), socket access, MT Ring Alert, better MT status processing). Although there were issues, the service worked reasonably well, with the MO processing appearing to be the more reliable and controllable in comparison to MT processing. After completing this phase of the project, the team was exposed to the military version of the SBD service. In the initial investigation it was apparent that the military version of the service had enhanced functionality that was not available in the commercial service (e.g. direct Internet Protocol (IP) access, ftp access, MT ring alert). Table 2 shows the average modem processing times in milliseconds running in Full Duplex mode given MO messages of size 100, 500, 1500 Bytes and MT message sizes of 100, 300, 500, 1000, and 1500 Bytes. These packets were automatically generated by the applications, rather than by interactive users. While running in Full Duplex mode, some of the MO sends had corresponding MT receives in the same modem process, while some had no MT transmissions waiting in the queue. The Overall average includes the modem processing time for all MO transmissions, while the Simult MT includes the modem processing time for only those MO transmissions that included MT transmissions. The modem processing time increased significantly when the MT transmissions were involved and increased more based on the size of the MT message. Figures 4, 5, and 6 graphically depict the values for MO sizes of 100, 500 and 1500 Bytes respectively.
13 Table 2. MO/MT Full Duplex Processing Times (in milliseconds) Start of MO Send End of Mo Send Attempts MT Complete Complete Std. Simult MT Simult MT Std. Size Avg Overall Dev. Overall Avg Overall Dev. Overall MO SIZE = /22/ :00:22 10/22/ :46: /22/ :00:29 10/22/ :48: /22/ :00:24 10/22/ :51: /23/2004 0:00:20 10/23/2004 0:59: /23/2004 2:00:27 10/23/2004 3:05: MO SIZE = /23/2004 4:00:25 10/23/2004 4:51: /23/2004 6:00:25 10/23/2004 6:52: /23/2004 8:00:28 10/23/2004 8:56: /23/ :00:27 10/23/ :59: /23/ :00:25 10/23/ :08: MO SIZE = /23/ :00:26 10/23/ :06: /23/ :00:25 10/23/ :09: /23/ :00:25 10/23/ :10: /23/ :00:25 10/23/ :22: /23/ :00:24 10/23/ :21: Avg Modem Processing Time Overall Simult MT MT Message Size Avg Modem Processing Time Overall Simult MT MT Message Size Fig. 4. MO Size 100 [F ull Duplex Mode] Fig. 5. MO Size 500 [Full DuplexMode] Avg Modem Processing Time Overall Simult MT MT Message Size Fig. 6. MO Size = 1500 [Full Duplex Mode]
14 8.3 Analysis of combined results Although the time spent setting up the call was an issue for the CSD experiments, that time was not reflected in the data sets; only actual transmission time was captured. The SBD experiments focused on the processing time to send or receive on mobile equipment, and did not include the component of travel through the constellation. Given that the data transfer rate for CSD was more than two times faster than that of SBD, we would normally expect the CSD latency to be half of the SBD service. However in the CSD experiments, the distance that the CSD packet had to travel via land-lines to and from the hub accounts for the longer time estimated for a packet approximating the SBD packet size. In addition to the differences in the data rate of the two types of Iridium service, there were several other differences in the experiments: distance from the gateway, simultaneousness of incoming and outgoing transmissions, and packet size used for the experiments. The distance from the gateway in Tempe was approximately 2,915 miles for the SBD tests, and 2008 miles for the CSD experiments. Each actual distance is increased by the twice the altitude of the constellation orbit, 500 miles, for the up- and down-link. The CSD experiments incurred additional travel time due to the use of land-lines into the hub. CSD client and server were built as blocking applications and not capable of simultaneous transmissions. Results for the one-way and simultaneous SBD messages were captured. The CSD applications were interactive, and as a result had variable length and shorter messages than the SBD experiments. The average packet length in the combined CSD experiments was 14 Bytes, which was approximately 1/7 of the smallest SBD messages. The processing time for the smallest MO (100 Bytes) and smallest MT (100 Bytes) value was just over 7 seconds. Without having the actual latency to the gateway, a very rough estimate can be made using the distance to the constellation, though the constellation and down to the gateway ( miles). (The positions of the satellite need not
15 be directly over the gateways.) This estimate ignores queuing and switching times at the individual satellites in the constellation. Using that estimate of signal travel time adds much less than a second to the transmission time, and can be ignored. Comparing the 7 seconds to the CSD experiments, we can multiply the approximately 1.4 seconds of the shorter 14 Byte message by 7 to approximate a 100 Byte message, yielding 9.8 seconds. This is a round trip time, giving a one-way time of approximately 4.9 seconds. While we would expect the CSD to be twice as fast as the SBD times, we assume that the discrepancy between these values is due to the land-line component part of the CSD experiments. 8.4 Mobile Originated Insights Through discussions with Iridium, the optimal economic message size of an MO message is approximately 300 Bytes (when transmissions are regularly greater than this, one of the other Iridium services may be better suited). In technical testing, there did not appear to be a solid basis for the optimal message size of 300 bytes. The larger the message size, the greater the throughput and it also did not appear to increase the error rate as the message size increased. If the mobile unit is in an antenna disadvantaged location, then it may be better to keep the message size down, as the connect time will be shorter, resulting in fewer errors. The average time it takes to send an MO message is between 6 and 22 seconds (processing time in the modem including signaling channel negotiations from the modem to the satellite), depending on message size. The actual end-to-end time (from start of send to receive via e- mail) basically adds 2 to 4 seconds due to the modem processing time to allow delivery of the from the gateway to the destination address. This additional time from the gateway to the destination address appears to be fairly constant across the various message sizes. Overall end-toend times may vary by a few seconds; however these are the average end-to-end times obtained in numerous tests of the MO transmission process. Given good conditions, the average error rate on MO transmissions is approximately 2 to 3%. This error rate can increase significantly due to satellites not
16 operating at 100% capacity or due to bad weather affecting the transmissions. When utilizing the SBD MO transmissions, there are going to be error transmissions and this should be planned for in the controlling applications. Introducing a minimal delay of one second or more between transmissions appeared to help stabilize the process and lower the error rate. In the initial tests messages were processed sequentially as quickly as possible with no delay between sends, however, there was a lower error rate than when a delay was introduced. In a real-world production scenario, there may be delays between individual MO transmissions depending on the overarching application. Higher error rates were observed during periods where the satellite coverage in the test area was not optimum. These higher error rates should be handled by the error handling logic within the driving application. Testing was done to evaluate transmissions during different times of the day to determine if timings and/or throughput were significantly higher during any specific period. While it did appear that transmissions ran a little faster during off hours and weekends (Hawaii Standard Time), the difference was almost negligible. 8.5 Mobile Terminated Insights Overall the MT process was significantly different from the MO process. It was more difficult to attempt to maximize the throughput with MT transmissions as there were built-in delays at the Iridium gateway process. It was up to the receive side application to periodically check and retrieve the messages. If the sending application sends a large volume of messages, the messages will likely build up in the queue and the end-to-end (send to receive) time will increase dramatically. If the messages do build up in the queue due to a large volume of messages to process or in the case where the receive side is not functioning correctly, there is really no way to clear the messages in the queue. The receiving application processes messages one-by-one or uses a manual utility to delete the messages.
17 The MT message size did not have an effect on the MT Send process, however the modem processing time for the mailbox check process to retrieve an MT message from the queue averaged 6 20 seconds, depending on message size. There did not appear to be an optimal message size. Any optimal message size would be application and antenna location dependant. It is recommended that the sending process wait for the queue acknowledgement before sending another message. The average time from sending the message to receiving the acknowledgement was approximately 30 seconds. For all testing, if a successful acknowledgement was received from the queue, the MT message was eventually transmitted and no messages were lost. As long as all of the setup information is correct, there appears to be few instances where an error in the MT transmissions will occur. While the Iridium gateway queue may fill up, this should not be a problem if it is managed correctly by the controlling application. It appeared that attempting to correlate the message size to the physical make-up of the message, fourteen 135 byte segments and testing the boundaries provided very little benefit. A significant observation that was confirmed by Iridium is that the message sequence number (MSN) used for the MT transmissions does not match MSN on the receiving side. Overall it appears that the SBD MT transmissions are best used for relatively short and infrequent transmissions. An application with a high volume of messages and/or large messages would not be well suited for the SBD MT transmissions. The MT transmission is not a good method to support file transfers on a regular basis. If consistent, predictable processing and end-to-end times are desired, then the controlling program should not attempt to send more than one message every thirty seconds, based on the approximate time that is required to wait for acknowledgement and allowing time for the message to be queued and retrieved by the receive side application. 8.6 Full Duplex Insights When executing SBD in Full Duplex mode sharing the mobile unit, the application for sending MO transmissions and receiving MT transmissions must be integrated. Additionally, the application
18 must provide the controls to optimally support simultaneous transmission and reception. Since an MO Send performs an MT Receive, when there are many more MO transmissions than MT transmission on a regular basis, then there should not be a need to perform additional mailbox. However, if the period of MT transmissions is less than the period of MO transmissions or if they are close to equal, the application should perform the mailbox checks periodically between actual MO sends. Executing in full-duplex mode can generate a significant amount of that may be of interest to the MT sending process, the MO receiving process, or both. If the intent is to function in fullduplex, it may be more efficient to develop one client that feeds the appropriate information to the appropriate send or receive application. When running in Full Duplex mode the actual processing time for the modem increases significantly when an MO Send and MT Receive process are performed in the same transmission. It does not appear that the impact is equal to the sum of the MO Send and MT receive process, however the process of retrieving the MT message does impact the normal modem processing time for the MO. This also does not impact the end-to-end times of either the MO or MT transmissions; however, it does tie up the modem longer, so it is not available for performing the next transmission. 9 Conclusions SBD and CSD each have there own characteristics that are suited to different applications. avoids the time penalty of establishing a call, and the cost of maintaining a call and may be preferable for applications that need to intermittently exchange smaller packets of data. The SBD service is certainly more appropriate than the CSD service for an automated client-server application. The savings in power and transmission signature are also beneficial to users of systems in the field. Time-critical applications, or those applications needing large data transfers, may need to analyze whether the latencies incurred in SBD can be tolerated, or whether CSD may be more appropriate. For example in the TCN application sensor data is continuous from the viewpoint of a data
19 provider. However, for a data user there may only be a requirement for periodic updates of a summary of current sensor data. The hub and spoke approach allows a mix of both the CSD and SBD applications depending on the needs of the end-user. 10 Future Work Gathering data about the complete end-to-end latency for the SBD service will round out the experimental data already collected. Additional CSD experiments using comparable message sizes would also give a practical verification of the delays and support further comparisons between the service types. Eliminating the large land-line component in the CSD experiments, by using a hub closer to a gateway, would also be important in a more consistent comparison of the Iridium constellation for both types of service. An examination of the military version of SDB and the enhanced features of the service, over what is now available commercially, should yield valuable insights that may not affect performance directly, but may better support users in the field. Acknowledgements Raytheon Solipsys supported both research projects. For the CSD experiments they loaned the equipment used in the experiments. Many thanks go to LCDR Lori DeLooze, USN, for her invaluable participation in CSD testing. Much gratitude goes to the students of the Spring 2004 SI455 Advanced Networks of the US Naval Academy course for their assistance in carrying out the shipboard portion of the experiments. References [1 ] Lemme, P.W., Glenister, S.M., and Miller, A.W., "Iridium(R) Aeronautical Satellite Communications", Aerospace and Electronic Systems Magazine, IEEE, vol. 14 no. 11, 1999, pp [2] McMahon, M. M. and Firkin, E. C., "Performance of a Hub-based Network-Centric Application over the Iridium Satellite Network", accepted by the 4 th International Conference on Networking (ICN 2005), Reunion Island, April 17-21, 2005.
20 [3] NexGen Communications LLC, "An Introduction to Short Burst Data (SBD)", prepared for Enhanced Mobile Satellite System (EMSS) Program, 5 April 2004, Available from [4] Personal Satellite Network, Inc., "Iridium SMS and SBD FAQ", Jan 2005, available from [5] Pratt, S.R., Richard A. Raines. R.A., Fossa JR, C.E., and Temple, M. A., "An Operational and Performance Overview of the Iridium Low Earth Orbit Satellite System", IEEE Communications Surveys, Second Quarter 1999 vol. 2, no. 2, 1999available from
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Iridium Satellite Data Services White Paper. Version 1.0 June 2 nd 2003
Iridium Satellite Data Services White Paper Version 1.0 June 2 nd 2003 Purpose: This document describes Iridium Satellite s current data services. The objective is to provide an overview of the Iridium
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Computer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3
SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Wide Area Network Latencies for a DIS/HLA Exercise
Wide Area Network Latencies for a DIS/HLA Exercise Lucien Zalcman and Peter Ryan Air Operations Division Aeronautical & Maritime Research Laboratory Defence Science & Technology Organisation (DSTO) 506
Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA
CASE STUDY Enabling Modern Telecommunications Services via Internet Protocol and Satellite Technology Presented to PTC'04, Honolulu, Hawaii, USA Stephen Yablonski and Steven Spreizer Globecomm Systems,
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
What is Network Latency and Why Does It Matter?
What is Network Latency and Why Does It Matter? by O3b Networks This paper is presented by O3b Networks to provide clarity and understanding of a commonly misunderstood facet of data communications known
SwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
D. SamKnows Methodology 20 Each deployed Whitebox performs the following tests: Primary measure(s)
v. Test Node Selection Having a geographically diverse set of test nodes would be of little use if the Whiteboxes running the test did not have a suitable mechanism to determine which node was the best
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals
What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server
Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.
Delay Need for a Delay Budget The end-to-end delay in a VoIP network is known as the delay budget. Network administrators must design a network to operate within an acceptable delay budget. This topic
COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination
COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This
IP - The Internet Protocol
Orientation IP - The Internet Protocol IP (Internet Protocol) is a Network Layer Protocol. IP s current version is Version 4 (IPv4). It is specified in RFC 891. TCP UDP Transport Layer ICMP IP IGMP Network
Best practice for SwiftBroadband
Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
Using email over FleetBroadband
Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
The Shift to Wireless Data Communication
The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager [email protected] Recent developments in the wireless and industrial
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Introduction to Ethernet
Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and
Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)
School of Business Eastern Illinois University Wide Area Networks (Week 11, Thursday 3/22/2007) Abdou Illia, Spring 2007 Learning Objectives 2 Distinguish between LAN and WAN Distinguish between Circuit
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
Introduction to Metropolitan Area Networks and Wide Area Networks
Introduction to Metropolitan Area Networks and Wide Area Networks Chapter 9 Learning Objectives After reading this chapter, you should be able to: Distinguish local area networks, metropolitan area networks,
Whitepaper. A Guide to Ensuring Perfect VoIP Calls. www.sevone.com blog.sevone.com [email protected]
A Guide to Ensuring Perfect VoIP Calls VoIP service must equal that of landlines in order to be acceptable to both hosts and consumers. The variables that affect VoIP service are numerous and include:
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
VPN over Satellite A comparison of approaches by Richard McKinney and Russell Lambert
Sales & Engineering 3500 Virginia Beach Blvd Virginia Beach, VA 23452 800.853.0434 Ground Operations 1520 S. Arlington Road Akron, OH 44306 800.268.8653 VPN over Satellite A comparison of approaches by
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
Communication Protocol
Analysis of the NXT Bluetooth Communication Protocol By Sivan Toledo September 2006 The NXT supports Bluetooth communication between a program running on the NXT and a program running on some other Bluetooth
Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide
BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering
Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services
WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most
Introduction to LAN/WAN. Network Layer
Introduction to LAN/WAN Network Layer Topics Introduction (5-5.1) Routing (5.2) (The core) Internetworking (5.5) Congestion Control (5.3) Network Layer Design Isues Store-and-Forward Packet Switching Services
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
MEASURING WIRELESS NETWORK CONNECTION QUALITY
Technical Disclosure Commons Defensive Publications Series January 27, 2016 MEASURING WIRELESS NETWORK CONNECTION QUALITY Mike Mu Avery Pennarun Follow this and additional works at: http://www.tdcommons.org/dpubs_series
CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems
CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link
D1.2 Network Load Balancing
D1. Network Load Balancing Ronald van der Pol, Freek Dijkstra, Igor Idziejczak, and Mark Meijerink SARA Computing and Networking Services, Science Park 11, 9 XG Amsterdam, The Netherlands June [email protected],[email protected],
IP Office Technical Tip
IP Office Technical Tip Tip no: 195 Release Date: October 26, 2007 Region: GLOBAL Using Packet Capture Software To Verify IP Network VoIP Quality Of Service (QoS) Operation Converged networks can experience
Computer Network and Communication
2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and
Agilent Technologies Performing Pre-VoIP Network Assessments. Application Note 1402
Agilent Technologies Performing Pre-VoIP Network Assessments Application Note 1402 Issues with VoIP Network Performance Voice is more than just an IP network application. It is a fundamental business and
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Wide Area Monitoring, Control, and Protection
Wide Area Monitoring, Control, and Protection Course Map Acronyms Wide Area Monitoring Systems (WAMS) Wide Area Monitoring Control Systems (WAMCS) Wide Area Monitoring Protection and Control Systems (WAMPACS)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)
TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage)
VRT Testing What Makes BullsEye Better and Different from the rest (Our competitive Advantage) December 16 th, 2015 Table of Contents 1. Purpose... 3 2. What a typical internet speed test measures....
Ring Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Understanding TCP/IP. Introduction. What is an Architectural Model? APPENDIX
APPENDIX A Introduction Understanding TCP/IP To fully understand the architecture of Cisco Centri Firewall, you need to understand the TCP/IP architecture on which the Internet is based. This appendix
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
RTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
New protocol concept for wireless MIDI connections via Bluetooth
Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU
Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,
Latency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
The Impact of QoS Changes towards Network Performance
International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
Introduction to ACARS Messaging Services
Introduction to ACARS Messaging Services As implemented via Iridium satellite link 2006 April 17, Preliminary Release Table of Contents 1.0 Acronyms and Abbreviations...3 2.0 Additional References......
WAN Technology. Heng Sovannarith [email protected]
WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
ETM System SIP Trunk Support Technical Discussion
ETM System SIP Trunk Support Technical Discussion Release 6.0 A product brief from SecureLogix Corporation Rev C SIP Trunk Support in the ETM System v6.0 Introduction Today s voice networks are rife with
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
Key Components of WAN Optimization Controller Functionality
Key Components of WAN Optimization Controller Functionality Introduction and Goals One of the key challenges facing IT organizations relative to application and service delivery is ensuring that the applications
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
RARP: Reverse Address Resolution Protocol
SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Basic Multiplexing models. Computer Networks - Vassilis Tsaoussidis
Basic Multiplexing models? Supermarket?? Computer Networks - Vassilis Tsaoussidis Schedule Where does statistical multiplexing differ from TDM and FDM Why are buffers necessary - what is their tradeoff,
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
VOICE OVER IP AND NETWORK CONVERGENCE
POZNAN UNIVE RSITY OF TE CHNOLOGY ACADE MIC JOURNALS No 80 Electrical Engineering 2014 Assaid O. SHAROUN* VOICE OVER IP AND NETWORK CONVERGENCE As the IP network was primarily designed to carry data, it
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012. Network Chapter# 19 INTERNETWORK OPERATION
Faculty of Engineering Computer Engineering Department Islamic University of Gaza 2012 Network Chapter# 19 INTERNETWORK OPERATION Review Questions ٢ Network Chapter# 19 INTERNETWORK OPERATION 19.1 List
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
Backgrounds regarding data transmission in GSM and UMTS mobile networks for Sunny WebBox / Sunny Boy Control
GSM Backgrounds regarding data transmission in GSM and UMTS mobile networks for Sunny WebBox / Sunny Boy Control Contents In addition to telephony, services for digital fax and data transmission were already
The GSM and GPRS network T-110.300/301
The GSM and GPRS network T-110.300/301 History The successful analog 1:st generation mobile telephone systems proved that there is a market for mobile telephones ARP (AutoRadioPuhelin) in Finland NMT (Nordic
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
RockBLOCK+ Developer guide
RockBLOCK+ Developer guide Version 1.2-9th June 2016 Table of Contents Introduction 3 What is RockBLOCK? 3 About Short Burst Data 3 About Iridium 3 Getting Help 4 Functional Description 4 Power supply
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
