CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY
|
|
|
- Abner Lee
- 10 years ago
- Views:
Transcription
1 CONTROL SYSTEM FOR INTERNET BANDWIDTH BASED ON JAVA TECHNOLOGY SEIFEDINE KADRY, KHALED SMAILI Lebanese University-Faculty of Sciences Beirut-Lebanon ABSTRACT This paper presents a Java-based real-time Internet access estimation tool for Quality of Service (QoS) in Internet accesses for Multimedia applications (JEQoSIM). It is specially aimed for real-time multimedia applications which use the User Datagram Protocol (UDP). The system is capable of estimating access capacity, available bandwidth and delay as the critical end-to-end QoS parameters for this kind of applications. The algorithm used for QoS estimations is one-way, and is based on the packet train technique. Real-time QoS estimation elements are distributed among a central server and the Internet end user. The central server contains a UDP packet bursts server and a web server that hosts the Java applet that implements the UDP packet bursts client. JEQoSIM has been validated using several commercial Internet accesses with different technologies: Asymmetric Digital Subscriber Loop (ADSL), General Packet Radio Service (GPRS) and Universal Mobile Telecommunications System (UMTS). KEY WORDS: QoS, Internet Access, Real-time, Multimedia. 1. INTRODUCTION From its beginning, Internet has experienced a huge increase in the number of users, services and data transferred. Different Internet access characteristics lead to very diverse levels of Quality of Service (QoS) [1], which can have a great impact on service performance, particularly on real-time ones. There are several players interested in estimating QoS, namely network operators, Internet Service Providers (ISP) and end users. Network operators are concerned about network planning; ISPs want to ensure a certain degree of service for the end user, who finally wants to assess the QoS obtained. Thus, these three agents can greatly benefit from a system designed to estimate QoS, making it possible for them to compare what is theoretically offered with what is actually obtained from an Internet access. This is especially important for end users, given the fact that over the last years, problems derived from poor Internet accesses are at the top positions in the number of complaints to consumer associations. Moreover, QoS can also be considered from different points of view: security, performance, speed, reliability, overall user impression, etc. As a result, the complex set of elements that influences QoS makes its measurement a difficult task. Several QoS-related network parameters estimation tools have been designed through the last years, being bandwidth one of the most widely measured parameters. Other parameters such as delay or packet loss rate are also frequently used, but to a lesser extent. A review of some bottleneck link bandwidth estimation techniques is presented within [2, 3 and 4]. However, other estimation tools use a more direct approach to bandwidth estimation, especially the common real-time bandwidth speed tests [5 and 6]. The majority of these systems measure the time required to transfer one or several fixed-size files to different servers in order to calculate bandwidth. Nevertheless, this method has a major drawback: only the bandwidth for Transmission Control Protocol (TCP) file transfers is estimated. Real-time applications, on the other hand, are usually transmitted using the Real-time Transport Protocol (RTP) [7], which in turn uses the User Datagram Protocol (UDP), so existing bandwidth speed tests are not well suited to this type of applications. In this context, this paper presents a Javabased real-time QoS estimation system for 512
2 Internet accesses specially aimed at real-time multimedia applications called evaluation of QoS in Internet accesses for Multimedia applications (JEQoSIM). It is capable of estimating access capacity, available bandwidth and delay as QoS parameters using UDP packet trains. It has been developed using Java, so it can be easily and quickly accessible for the end user. The rest of the article is structured as follows: section II presents the materials and methods used in JEQoSIM. Section III presents an overview of the system architecture. A description of the tests carried out to evaluate JEQoSIM performance is included in section IV. Finally, section V presents the evaluation results obtained and the conclusions are summarized in section VI. Clearly explain the nature of the problem, previous work, purpose, and contribution of the paper. 2. MATERIALS AND METHODS As has been stated in the introduction, the majority of the publicly available real-time bandwidth speed tests use TCP files transfers as the basis to estimate bandwidth [5 and 8]. This approach, however, has several drawbacks: Only the bandwidth for TCP file transfers can be estimated. UDP-based applications, mainly real-time ones, are not considered. The bandwidth estimation process is highly intrusive, and it is frequently required that the user does not send any other network traffic while the bandwidth speed test is being carried out. This is not a realistic situation since typical Internet users generate different traffics at the same time and the access capacity is a value not as useful as the available bandwidth [8]. Usually, delay and packet loss rate are not considered. There are specific tools that take them into account, but they are not intended for the non-expert Internet user [9 and 10]. A. Methodology In the communication path there is usually a link that sets QoS parameters, and it is commonly called the bottleneck link [2], [8], [11]. Different estimation tools focused on discovering bandwidth in the bottleneck link (also called the bottleneck bandwidth) use measurement methods that can be classified into passive [10], [12], and active [3], [4]. Active measurement methods can be further divided into those that measure Round Trip Time (RTT) [13] and those that only measure one traffic direction (One-Way) [3]. The most used protocols in these measurement systems are UDP, TCP and Internet Control Message Protocol (ICMP). Once the different measurement acquisition methods have been presented, it is very important to identify the most relevant QoS parameters for real-time applications. Two common and ubiquitous parameters are used to measure QoS levels are bandwidth and delay [2], [8]-[9], [14]-[15]. These two parameters have been selected for JEQoSIM because they make it possible for the client to check the performance of his Internet access, especially when it is used for real-time communications. As this kind of communications mainly uses RTP, which in turn uses UDP, this is the protocol selected for the estimations. The bandwidth estimation algorithm selected for JEQoSIM is One-way, and it is based on the transmission, in both directions of communication, of bursts of k UDP packets with constant packet size (S) (packet trains). B. Bandwidth estimation algorithm Given a path between two network end points that includes n links L 1, L 2, L n with bandwidths BW 1, BW 2,, BW n, the bottleneck bandwidth (BBW) can be defined as: BBW = min (BW 1, BW 2 BW n ) (1) Next, given a link L i with bandwidth BW i and traffic load TL i, the available bandwidth (ABW) in the link is defined as: (2) ABW i = BW i TL i We present a two-step algorithm in order to obtain the available bandwidth. In the first step, we send the packets in the burst as close in time as possible, that is, with the minimum gap between them. In such conditions, other packets sharing the link are not likely to merge with the so closely ones in the burst. As explained in [13], when the burst crosses a link with less 513
3 bandwidth, the packet spacing becomes higher (the packet rate becomes smaller). This increment in the packet spacing is preserved when the burst crosses higher speed links (Figure 1), allowing us to measure the bottleneck link capacity at the reception of the burst as the sum of the length of the packets received in response to the burst, divided into the time between the reception of the first and the last answer (3). The second step (Figure 2) consists on sending the packets in the burst at a rate equal to the nominal capacity just obtained. Now, a packet spacing increase will be due to other packets in the link merging with the burst. This increase allows us to estimate the available bandwidth in the bottleneck, by using the formula shown in (3) again. (( n 1) packet_ size) bottleneckbandwith= ( t n t 1 ) (3) An important factor to consider is the number of packets to include in the burst, as well as the size of these packets. The aim is to obtain a good estimation of the links but being as less intrusive for the network as possible. In fact, the greater the number of packets in the burst and the greater their size, the more intrusive the method. But having more packets in the burst implies more accurate estimations. Studies carried out by other authors [11] show that using five packets by burst allows reaching a trade-off between good bandwidth estimation and little bandwidth required for the estimation method. Figure 1. First step: packet burst through a bottleneck link Figure 2. Packet burst sent in the second step The parameters that characterize this algorithm (packet length, number of packets per burst, packet spacing in a burst and time between bursts) are fully configurable to select those better suited for each particular scenario. It is important to note that this estimation method is much less intrusive than traditional bandwidth speed tests because transmits less information (UDP) than other methods (TCP) and produces acceptable results with a minimum bandwidth waste. It is also capable of estimating bandwidth under realistic circumstances, i.e. when the user is generating other network traffics, which makes the value of ABW a crucial parameter in order to decide whether a particular real-time application can be used in conjunction with other traffics. C. Java technology Java has been selected as the underlying technology for JEQoSIM because it is platformindependent and widely used in Internet. A Java applet is responsible for the client side of the system, that in turn communicates with a Java application running in the web server from which the applet has been downloaded, making the appropriate measurements. Java applets have their specific security restrictions and limitations [16], especially regarding time accuracy, but they do not cause important estimation errors when working with low speed accesses (up to 1 Mbps in the downlink). Moreover, in a real application there is a clock granularity (G), which can be defined as the maximum time interval in which the system clock measures the same moment. Thus, it is possible to divide the time in discrete intervals (timeslots) and to consider that the exact timeslot where a frame has arrived is known (instead of knowing its exact arrival time t). Therefore, the time difference between the last (t k ) and the first 514
4 (t 1 ) frame is unknown, but the number of intervals (n) between their arrivals is known. Time precision depends on clock resolution and affects time synchronization and parameter acquisition accuracy. In Java it is determined by the Java Virtual Machine (JVM) implementation in each operating system and computer architecture [17]. This resolution problem increases when S is small or the access rate is high, because the measured time intervals can be very small. Nevertheless, if more time resolution were needed, Java Native Interface (JNI) could be used to add C++ code [17]. Journal of Theoretical and Applied Information Technology 3. SYSTEM ARCHITECTURE JEQoSIM has been developed according to the scenario presented in Fig. 3 as can be seen; there is a central node where users come to get their QoS measurements. This central node contains a web server that hosts Hypertext Mark-up Language (HTML) pages and the Java applet that implements the client-side application to be displayed in a Java-compatible browser. In addition, a Network Time Protocol (NTP) server and an UDP bursts server (the server that receives the UDP packet bursts and replies to them) that takes the appropriate measurements are installed. The data flow diagram of Fig. 4 shows the process of making QoS estimation with JEQoSIM. When a user loads the main web page, an applet is downloaded showing three different versions: simple, advanced (for advanced users) and monitoring (designed to do scheduled QoS estimations). Then, the applet sends the user identifier and the server confirms it. The next step for the applet is to exchange NTP messages with the server in order to be synchronized. As soon as the time offset between the server and the client is corrected, TCP communications are used to establish the burst parameters (number of bursts, frames per burst, frame length, etc.). When the server processes those parameters, the UDP bursts client is accepted or refused through the TCP connection. Figure 3. General network scenario. Figure 4. Data flow diagram. If the answer is affirmative, several UDP bursts are sent in the uplink and in the downlink. To notice the end of the UDP bursts, two TCP End of Burst messages are sent. Once these TCP messages reach the client and the server, both of them exchange their measurements using TCP. By this way, the results can be displayed by the applet in the user s browser and stored by the server for further processing. 515
5 4. EVALUATION TESTS A. Test scenarios Journal of Theoretical and Applied Information Technology JEQoSIM has been validated in commercial Internet accesses. This paper presents several evaluation results obtained with the following commercial accesses: - Asymmetric Digital Subscriber Loop (ADSL): 300 kbps in the uplink and 1 Mbps in the downlink, with 10% guaranteed in the contract. The capacity is greater than that of an analog modem, but only a percentage of it is available. Information is transmitted using fixed size Asynchronous Transfer Mode (ATM) cells [11]. As its name indicates, both capacity and available bandwidth are asymmetrical. - General Packet Radio Service (GPRS) and Universal Mobile Telecommunication System (UMTS): These accesses are shared between several users. However, available bandwidth should remain almost constant, but its value can vary depending on the radio link conditions. Delay is greater than in the other accesses due to channel coding and interleaving. It is important to remark that a typical user of JEQoSIM only knows the access parameters given by his ISP (access capacity and guaranteed bandwidth), but this is not enough in order to characterize the behavior of the access in a working situation. The bandwidth available to a particular user may vary through the time in a particular access, since ISPs only guarantee a certain percentage of it. As a result, real tests with commercial accesses can produce more significant results. A bandwidth monitoring process would be of special interest, and for that reason JEQoSIM has the monitoring option. B. Test parameters The results presented in the next section correspond to several tests that consisted of: - Number of bursts sent: 48 bursts in both uplink and downlink. - Time between two consecutive bursts: 1 min. - Variable frame size (S): 100, 400 and 1000 bytes of UDP data without overhead. - Packets per burst: k=5 and k=10 have been chosen. - Test conditions: No competing traffic, in order to measure BBW instead of ABBW. - Different tests over the same link have been interleaved to concur at the same hour of the day. 5. RESULTS AND DISCUSSION The results obtained in the evaluation tests are presented in Table I. It shows the mean ( µ ) and the standard deviation (σ ) of the BBW for each of the tests presented in the previous section. In general, if S and k are low (S=100 and k=5) in order for the QoS estimations not to be very intrusive, σ increases. On the other hand, if S and k are high (S=1000 and k=10), σ decreases but the QoS estimations are more intrusive for the network. The following points discuss the relevant aspects of the test results for each technology in more detail: ADSL: Depending on the value of S used, the BBW at the IP layer (ADSL-I) varies. ADSL-II results have been obtained by taking into account ATM headers and represent bandwidth at the ATM layer. The variations in the value of µ depending on S in ADSL-I do not appear in ADSL-II. Finally, the percentage of the contract bandwidth that the ISP is really providing can be calculated. In all cases, the downlink and uplink reach almost 100% of the contract. GPRS and UMTS: In these accesses, µ results using S=100 are different from the rest. In order for the QoS 516
6 estimation can be less reliable using this value of S. Furthermore, delay is much greater than in the previous wired accesses. 6. CONCLUSIONS A Java-based real-time QoS estimation system specially aimed at real-time multimedia applications has been developed to evaluate Internet accesses. This system is especially useful for End users who want to estimate the quality of their Internet access and check its performance regarding the use of real-time multimedia applications. The usefulness of this system has been evidenced in the evaluation of commercial Internet accesses, since ISPs offer wide QoS ranges that can vary through the time. Evaluation results show that the number of packets per burst and the packet size have a big influence on the estimated QoS, so it is very important to study the particular technologies in depth, obtaining a suitable characterization of each access. The results obtained for ADSL, GPRS and UMTS accesses fit the expected ones, but further research is required in order to obtain a more complete characterization of these accesses. JEQoSIM only provides QoS estimations between the end user and a central server, but real-time applications are frequently used in a peer-to-peer basis, so a modification of the application in order to take measurements not only between the user and the central node, but also directly between two users is being considered. REFERENCES [1] A. Vogel, B. Kerhervé, G. von Bochmann and J. Gecsei, Distributed Multimedia and QoS: A Survey, IEEE Multimedia, pp , [2] J. Curtis, T. McGregor, Review of Bandwidth Estimation, Techniques, Dept. Computer Science, Univ. of Waikato, [3] K. Lai and M. Baker, Nettimer: A Tool for Measuring Bottleneck Link Bandwidth, Proc. USENIX Symposium on Internet Technologies and Systems, Mar [4] A. B. Downey and C. College, Using path char to estimate Internet link characteristics, Proc. SIGCOMM, pp , Sept [5] Bandwidth Speed Test. URL: [6] Test de velocidad del acceso a Internet, URL: [7] H. Schulzrinne, S. Casner, R. Frederick, V. Jacobson, RTP: A Transport Protocol for Real-Time Applications, Internet RFC 3550, July [8] N. Hu and P. Steenkiste, Evaluation and Characterization of Available Bandwidth Probing Techniques, IEEE J. Select. Areas Commun. Vol. 21, No. 6, pp , Aug [9] J. C. Bolot, Characterizing End-to-End Packet Delay and Loss in the Internet, Journal of High Speed Networks, Sep [10] Cooperative Association for Internet Data Analysis (CAIDA), CAIDA Tools, URL: [11] Mark Crovella, Robert Carter, Dynamic Server Selection in the Internet, Proceedings of the 3rd. IEEE HPCS '95, [12] NLANR Measurement and Network Analysis, URL: [13] Z. Wang, A. Zeitoun and S. Jamin, Challenges and Lessons Learned in Measuring Path RTT for Proximity-based Applications, Passive and Active Measurement Workshop, [14] K. Lai and M. Baker, Measuring Bandwidth, Proc. IEEE INFOCOM'99, Mar [15] C. Dovrolis, P. Ramanathan and D. Moore, What do packet dispersion techniques measure Proc. IEEE Infocom, Apr [16] Applet Security, URL: [17] V. Roubtsov, My kingdom for a good timer Reach sub millisecond timing precision in Java, "URL: 517
Bandwidth Measurement in xdsl Networks
Bandwidth Measurement in xdsl Networks Liang Cheng and Ivan Marsic Center for Advanced Information Processing (CAIP) Rutgers The State University of New Jersey Piscataway, NJ 08854-8088, USA {chengl,marsic}@caip.rutgers.edu
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
How To Compare Available Bandwidth On A Network With A Powerline To A Network On A Testbed On A Computer Or Network On An Ipad Or Ipad On A 2Mbb (Or Ipad) On A 4Ghz Network On The
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Path-F3: Improving Accuracy and Network Load in Available Estimation
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
VoIP over WiMAX: Quality of Experience Evaluation
VoIP over WiMAX: Quality of Experience Evaluation Vitor Bernardo, Bruno Sousa, Marilia Curado Laboratory of Communications and Telematics Department of Informatics Engineering, University of Coimbra {vmbern,bmsousa,marilia}@dei.uc.pt
Module 7 Internet And Internet Protocol Suite
Module 7 Internet And Internet Protocol Suite Lesson 21 Internet and IPv4 LESSON OBJECTIVE General The lesson will discuss a popular network layer protocol, i.e. the Internet Protocol Specific The focus
Path Optimization in Computer Networks
Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host
Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows
Adaptive Coding and Packet Rates for TCP-Friendly VoIP Flows C. Mahlo, C. Hoene, A. Rostami, A. Wolisz Technical University of Berlin, TKN, Sekr. FT 5-2 Einsteinufer 25, 10587 Berlin, Germany. Emails:
Challenges and Approaches in Providing QoS Monitoring
Challenges and Approaches in Providing QoS Monitoring Yuming Jiang, Chen-Khong Tham, Chi-Chung Ko Department of Electrical Engineering National University of Singapore 10 Kent Ridge Crescent, Singapore
The Problem with TCP. Overcoming TCP s Drawbacks
White Paper on managed file transfers How to Optimize File Transfers Increase file transfer speeds in poor performing networks FileCatalyst Page 1 of 6 Introduction With the proliferation of the Internet,
QoS of Internet Access with GPRS
Dept. of Prof. Dr. P. Tran-Gia QoS of Internet Access with GPRS Dirk Staehle 1, Kenji Leibnitz 1, and Konstantin Tsipotis 2 1 [staehle,leibnitz]@informatik.uni-wuerzburg.de 2 Libertel-Vodafone [email protected]
Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone
The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 343 Measurement of V2oIP over Wide Area Network between Countries Using Soft Phone and USB Phone Mohd Ismail Department
Bandwidth Measurement in Wireless Networks
Bandwidth Measurement in Wireless Networks Andreas Johnsson, Bob Melander, and Mats Björkman {andreas.johnsson, bob.melander, mats.bjorkman}@mdh.se The Department of Computer Science and Engineering Mälardalen
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
First Midterm for ECE374 03/24/11 Solution!!
1 First Midterm for ECE374 03/24/11 Solution!! Note: In all written assignments, please show as much of your work as you can. Even if you get a wrong answer, you can get partial credit if you show your
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
Implementing VoIP support in a VSAT network based on SoftSwitch integration
Implementing VoIP support in a VSAT network based on SoftSwitch integration Abstract Satellite communications based on geo-synchronous satellites are characterized by a large delay, and high cost of resources.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Top-Down Network Design
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET
A Well-organized Dynamic Bandwidth Allocation Algorithm for MANET S.Suganya Sr.Lecturer, Dept. of Computer Applications, TamilNadu College of Engineering, Coimbatore, India Dr.S.Palaniammal Prof.& Head,
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE
THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE Remote Path Identification using Packet Pair Technique to Strengthen the Security for Online Applications R. Abinaya PG Scholar, Department of CSE, M.A.M
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran
Bandwidth Control in Multiple Video Windows Conferencing System Lee Hooi Sien, Dr.Sureswaran Network Research Group, School of Computer Sciences Universiti Sains Malaysia11800 Penang, Malaysia Abstract
MONITORING AVAILABLE BANDWIDTH OF UNDERLYING GRID NETWORKS
MONITORING AVAILABLE BANDWIDTH OF UNDERLYING GRID NETWORKS Marcia Zangrilli Bruce B. Lowekamp, advisor Department of Computer Science College of William and Mary Abstract Harnessing the complete power
A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications
A New Adaptive FEC Loss Control Algorithm for Voice Over IP Applications Chinmay Padhye and Kenneth J. Christensen Computer Science and Engineering University of South Florida Tampa, FL 336 {padhye, christen}@csee.usf.edu
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
1 Introduction to mobile telecommunications
1 Introduction to mobile telecommunications Mobile phones were first introduced in the early 1980s. In the succeeding years, the underlying technology has gone through three phases, known as generations.
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Performance monitoring and analysis of wireless communication protocols for mobile devices
Performance monitoring and analysis of wireless communication protocols for mobile devices Almudena Díaz, Pedro Merino, F. Javier Rivas Departamento de Lenguajes y Ciencias de la Computación, University
Computer Networks Homework 1
Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.
DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL
IJVD: 3(1), 2012, pp. 15-20 DESIGN AND VERIFICATION OF LSR OF THE MPLS NETWORK USING VHDL Suvarna A. Jadhav 1 and U.L. Bombale 2 1,2 Department of Technology Shivaji university, Kolhapur, 1 E-mail: [email protected]
Computer Networks CS321
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
An Introduction to VoIP Protocols
An Introduction to VoIP Protocols www.netqos.com Voice over IP (VoIP) offers the vision of a converged network carrying multiple types of traffic (voice, video, and data, to name a few). To carry out this
Requirements of Voice in an IP Internetwork
Requirements of Voice in an IP Internetwork Real-Time Voice in a Best-Effort IP Internetwork This topic lists problems associated with implementation of real-time voice traffic in a best-effort IP internetwork.
IP Network Monitoring and Measurements: Techniques and Experiences
IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France [email protected] 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration
Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance
Analysis and Enhancement of QoS in Cognitive Radio Network for Efficient VoIP Performance Tamal Chakraborty 1, Atri Mukhopadhyay 2 1 Dept. of Electronics and Telecommunication Engineering 2 School of Mobile
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking
Accelerating Service Discovery in Ad-hoc Zero Configuration Networking Se Gi Hong, Suman Srinivasan and Henning Schulzrinne Columbia University, New York, NY {segihong, sumans, hgs}@cs.columbia.edu Abstract
EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY
EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks
A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering
Implementation of Video Voice over IP in Local Area Network Campus Environment
Implementation of Video Voice over IP in Local Area Network Campus Environment Mohd Nazri Ismail Abstract--In this research, we propose an architectural solution to integrate the video voice over IP (V2oIP)
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
SwiftBroadband and IP data connections
SwiftBroadband and IP data connections Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure
AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK
Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link
Priority Queuing of Network Game Traffic over a DOCSIS Cable Modem Link Jason But, Shaun Burriss and Grenville Armitage Centre for Advanced Internet Architectures Swinburne University of Technology Melbourne,
Voice over IP. Overview. What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP
Voice over IP Andreas Mettis University of Cyprus November 23, 2004 Overview What is VoIP and how it works. Reduction of voice quality. Quality of Service for VoIP 1 VoIP VoIP (voice over IP - that is,
Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report
Bandwidth Estimation using Passive Monitoring for WLANs Case Study Report Investing in the future by working together for a sustainable and competitive region Bandwidth Estimation using Passive Monitoring
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems
Extended-rtPS Algorithm for VoIP Services in IEEE 802.16 systems Howon Lee, Taesoo Kwon and Dong-Ho Cho Department of Electrical Engineering and Computer Science Korea Advanced Institute of Science and
Performance analysis and simulation in wireless mesh networks
Performance analysis and simulation in wireless mesh networks Roberto Cusani, Tiziano Inzerilli, Giacomo Di Stasio University of Rome Sapienza INFOCOM Dept. Via Eudossiana 8, 84 Rome, Italy Abstract Wireless
Titolo del paragrafo. Titolo del documento - Sottotitolo documento The Benefits of Pushing Real-Time Market Data via a Web Infrastructure
1 Alessandro Alinone Agenda Introduction Push Technology: definition, typology, history, early failures Lightstreamer: 3rd Generation architecture, true-push Client-side push technology (Browser client,
Technote. SmartNode Quality of Service for VoIP on the Internet Access Link
Technote SmartNode Quality of Service for VoIP on the Internet Access Link Applies to the following products SmartNode 1000 Series SmartNode 2000 Series SmartNode 4520 Series Overview Initially designed
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
VoIP Bandwidth Considerations - design decisions
VoIP Bandwidth Considerations - design decisions When calculating the bandwidth requirements for a VoIP implementation the two main protocols are: a signalling protocol such as SIP, H.323, SCCP, IAX or
How To Test A Network Performance
A.Jabbar : A Simulation Study of Tunneled Voice over Internet Protocol System A Simulation Study of Tunneled Voice over Internet Protocol System A. I. A. Jabbar D. M. Ali Electrical Department - Collage
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
Per-Flow Queuing Allot's Approach to Bandwidth Management
White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth
A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks
1 A Slow-sTart Exponential and Linear Algorithm for Energy Saving in Wireless Networks Yang Song, Bogdan Ciubotaru, Member, IEEE, and Gabriel-Miro Muntean, Member, IEEE Abstract Limited battery capacity
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service
Requirements and Service Scenarios for QoS enabled Mobile VoIP Service Kyu Ouk Lee, Ho Young Song Electronics and Telecommunications Research Institute (ETRI) [email protected], [email protected] Abstract.
Region 10 Videoconference Network (R10VN)
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
A Policy-Based Admission Control Scheme for Voice over IP Networks
Journal of Computer Science 5 (11): 817-821, 2009 ISSN 1549-3636 2009 Science Publications A Policy-Based Admission Control Scheme for Voice over IP Networks Sami Alwakeel and Agung Prasetijo Department
Traffic Analyzer Based on Data Flow Patterns
AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System
VIDEO STREAMING OVER SOFTWARE DEFINED NETWORKS WITH SERVER LOAD BALANCING. Selin Yilmaz, A. Murat Tekalp, Bige D. Unluturk
VIDEO STREAMING OVER SOFTWARE DEFINED NETWORKS WITH SERVER LOAD BALANCING Selin Yilmaz, A. Murat Tekalp, Bige D. Unluturk College of Engineering, Koç University, 34450 Sariyer, Istanbul, Turkey ABSTRACT
On real-time delay monitoring in software-defined networks
On real-time delay monitoring in software-defined networks Victor S. Altukhov Lomonosov Moscow State University Moscow, Russia [email protected] Eugene V. Chemeritskiy Applied Research Center for
ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; [email protected] Voice over (Vo) was developed at some universities to diminish
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks Khaled Alutaibi and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada E-mail: {kalutaib, ljilja}@sfu.ca Abstract
CTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
Digital Subscriber Line (DSL) Transmission Methods
Digital Subscriber Line (DSL) Transmission Methods 1. Overview... 1 2. SHDSL Transmission Methods... 1 SHDSL Transmission System Versions... 1 SHDSL Transmission Subsystem Structure... 1 SHDSL Modulation
Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?
18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
Fixed Line Broadband Performance (ADSL) in New Zealand. April June 2013
Fixed Line Broadband Performance (ADSL) in New Zealand April June 213 Copyright Epitiro Group Limited, 213. No reproduction, copy, transmission or translation of this publication may be made without written
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Voice over Internet Protocol (VoIP) systems can be built up in numerous forms and these systems include mobile units, conferencing units and
1.1 Background Voice over Internet Protocol (VoIP) is a technology that allows users to make telephone calls using a broadband Internet connection instead of an analog phone line. VoIP holds great promise
