Real-Time Billing Throughput Analysis of Wireless Telecommunication Systems
|
|
|
- Augusta Doyle
- 10 years ago
- Views:
Transcription
1 Real-Time Billing Throughput Analysis of Wireless Telecommunication Systems Jiacun Wang, Senior Member, IEEE Abstract Real-time billing is one of the most important functionalities in a telecommunication service system. In GPRS network, the load of billing traffic depends on the load of call traffic and the size of billing records. During busy hours, the GPRS network might not be able to transfer billing records on a timely basis if new billing records are generated too fast. This paper considers the capacity of the billing record collection and transfer system of the GPRS network. Stochastic timed Petri nets are employed to establish a template for the analysis of the capacity versus various factors. Index Terms Wireless telecommunication, GPRS network, throughput, billing, stochastic timed Petri nets T I. INTRODUCTION HE General Packet Radio Service (GPRS) is a new nonvoice value added service that allows information to be sent and received across a mobile telephone network [2, 3]. It supplements today's Circuit Switched Data and Short Message Service. GPRS has several unique features. The most distinguishing one is its high speed. Its theoretical maximum speeds of up to kilobits per second (kbps) is about three times as fast as the data transmission speeds possible over today's fixed telecommunications networks and ten times as fast as current Circuit Switched Data services on GSM networks. By allowing information to be transmitted more quickly, immediately and efficiently across the mobile network, GPRS provides a relatively less costly mobile data service compared to Short Message Services and Circuit Switched Data. GPRS facilitates several new applications that have not previously been available over GSM networks due to the limitations in speed of Circuit Switched Data (9.6 kbps) and message length of the Short Message Service (160 characters). GPRS fully enables the Internet applications we are used to on our desktop from web browsing to chat over the mobile network. Other new applications for GPRS, include Manuscript received September 30, J. Wang is with the Monmouth University, West Long Branch, NJ 07764, USA. [email protected] /05/$ IEEE file transfer and home automation- the ability to remotely access and control in-house appliances and machines. Billing is one of the most important functionalities of GPRS services. A billing record, which contains charging information and is referred as Call Detail Record (CDR) in wireless telecommunication society, is generated when a call is taken down, and it is then transferred to the billing system chosen by the network operators through a charging gateway [6]. The load of billing traffic depends on the load of call traffic and the size of a billing record. During busy hours, the GPRS network might not be able to transfer billing records on a timely basis if the network s data transferring threshold is reached. Therefore, it is important to know the network s billing information processing capacity. In this paper, a stochastic timed Petri net model is established to facilitate the capacity analysis. The paper is organized as follows: Section 2 briefly introduces the GPRS billing information collection mechanism. Section 3 describes the modeling and capacity analysis of the GPRS billing information collection system. Section 4 gives a concluding remark. II. BILLING FLOW OF GPRS A. Charging Gateway Functionality (CGF) As shown in Fig. 1, the Charging Gateway Functionality (CGF) provides a mechanism to transfer charging information from the Serving GPRS Support Nodes (SGSN) and Gateway GPRS Support Nodes (GGSN) to the network operator's chosen Billing Systems (BS). The Charging Gateway concept enables an operator to have just one logical interface between the GSNs and the BS. GGSN SGSN CGF CDR Billing System Fig. 1. Billing records collection flow.
2 The CGF provides the mechanism to transfer charging information from the SGSN and GGSN nodes to the network operator's chosen Billing Systems(s) (BSs). The main functions of the CGF are: - the collection of GPRS CDRs from the GPRS nodes generating CDRs; - intermediate CDR storage buffering; - the transfer of the CDR data to the billing systems. In addition to the above main functionalities, the CGF may also perform some other activities, such as consolidation of CDRs, pre-processing of CDR fields, filtering of un-required CDR fields, and adding of Operator defined fields for specific billing systems. These specific activities may be performed to optimise the charging information that is to be forwarded to the Billing System, which should reduce the load in the Billing System. The CGF can reside in a separate Network Element (Charging Gateway) or be integrated in the GSNs. It can receive CDR fields from the GSNs in real-time mode. It should have enough storage to enable it to transmit the collected charging data to the Billing System (BS) in file mode. direction. The SGSN-A shall create an S-CDR and the GGSN shall create a G-CDR for subscriber A, the SGSN- B shall create an S-CDR and the GGSN shall create a G- CDR for subscriber "B". If subscriber "A" and subscriber "B" use the same GGSN, both G-CDRs are produced at that GGSN. If session leg (2) requires a PDP context activation the respective PDP records will contain a network initiated PDP context activation-flag. The records generated are subsequently transferred to the CGF (A). The CGF transfers the CDRs to the BS. C. CDR Packet Transfer Fig. 3 represents the default mode of CDR transfer from the CDR generating entities (GSNs) to the CDR packet collecting entities (CGFs). GSN 1. Data Record Transfer Request: Send Data Record Packet 3. Data Record Transfer Response: Request Accepted CGF s volatile memory 2. CDRs are stored in a secure way Non-volatile CGF memory B. CDR Generation 4. < Succesfully sent CDRs are deleted from the GSN buffers > SGSN-B Fig. 3. CDR transfer from GSN to CGF. 2 A GGSN 1 SGSN-A CGF B B BS 1) The CDR generating entity (here the GSN symbolises either SGSN or GGSN) sends CDR(s) in a packet to CGF (that is the current primary Charging Gateway Functionality for the specific CDR generating node, "CGF1"). The sending is performed by using the Data Record Transfer Request message, with the Packet Transfer Command IE having the value Send Data Record Packet. A HPLMN Fig. 2. CDR generation for GPRS mobile to mobile call [6]. Fig. 2 illustrates a simple GPRS mobile to mobile context within the same Home Public Land Mobility Network (HPLMN). The respective A-party related PDP context is activated in the SGSN-A and the GGSN (1). After the location of subscriber "B" is determined, the B party related PDP context is activated (2) in the SGSN-B and the GGSN and PDP PDUs are routed in MO and MT 2) The CGF opens the received message and stores the packet contents in a safe way (to e.g. a redundant RAM memory unit or a mirrored non-volatile memory or even to another node). 3) The CDR receiving entity (CGF) sends confirmation of the successful packet reception to the CDR generating node (GSN). The confirmation is performed by using the Data Record Transfer Response message, with the Cause value being Request Accepted. 4) After the positive response Request Accepted is received by the GSN, it may delete the successfully sent CDRs from its send buffer. If the positive response has not been received within a configurable time-out limit, the GSN will retransmit the
3 request. The maximum amount of retries is a configurable value based on the GSPN transport protocol. D. CGF Downstream File Transfer The CGF downstream file transfer application transfers billing files from the CGF to a downstream system. It can transfer all available billing files in chronological order, including the currently open billing file, using FTP protocol. E. Backup Mode of CDR Transfer CGF billing throughput capacity includes many factors. The principal indicators are the Busy Hour Call Attempts (BHCA), and the billing record size. For the CGF this translates in how much billing data throughput can be processed (in Bytes/s). Other factors include the need to reserve CGF resources to recover from fault conditions. Whenever GSN billing data cannot be transferred to the CGF, CGF goes into a backup mode - the billing data is written in temporary files to disks on the GSN. The data is not stored redundantly in this mode. Once GSN is able to send billing data to the CGF, GSN goes into a recovery mode - in addition to sending the current billing records from the GSN to the CGF, the billing data from the backup files is also sent. F. CGF Real-Time Billing With streams configured to store the received billing records on the CGF, and configured for scheduled outbound file transfer, CGF supports a capability referred to as Real- Time Billing. This capability will transfer data downstream from the currently open billing file, as it is being written to the CGF disk, containing the most current billing records received from the GSN. The downstream system can thereby process the billing records received by the CGF in near realtime. Note that following a backup incident on the GSN, the records transferred from the GSN as part of the recovery substream are not delivered by Real-Time Billing; they will be transferred at the scheduled interval. The scheduled file transfer will also transfer any other closed files that were not sent by the real-time billing transfer process; this can occur, for example, when there is a network outage to the downstream system. III. BILLING THROUGHPUT ANALYSIS Billing capacity is one of a wireless service provider s most concerns. In this section we use stochastic timed Petri nets to model and analyze the billing capacity. A. Stochastic Timed Petri Nets A Petri net is a graphical and mathematical modeling tool [7]. It consists of places, transitions, and arcs that connect them. Input arcs connect places with transitions, while output arcs start at a transition and end at a place. Places can contain tokens; the current state of the modeled system (the marking) is given by the number (and type if the tokens are distinguishable) of tokens in each place. Transitions are active components. They model activities which can occur (the transition fires), thus changing the state of the system (the marking of the Petri net). Transitions are only allowed to fire if they are enabled, which means that all the preconditions for the activity must be fulfilled (there are enough tokens available in the input places). When the transition fires, it removes tokens from its input places and adds some at all of its output places. The number of tokens removed / added depends on the cardinality of each arc. Petri nets are a promising tool for describing and studying systems that are characterized as being concurrent, asynchronous, distributed, parallel, nondeterministic, and/or stochastic. As a graphical tool, Petri nets can be used as a visual-communication aid similar to flow charts, block diagrams, and networks. In addition, tokens are used in these nets to simulate the dynamic and concurrent activities of systems. As a mathematical tool, it is possible to set up state equations, algebraic equations, and other mathematical models governing the behavior of systems. The characteristics exhibited by the activities of information processing systems such as concurrency, decision making, synchronization and priorities are modeled very effectively with Petri nets. To study performance and dependability issues of systems it is necessary to include a timing concept into the model. There are several possibilities to do this for a Petri net; however, the most common way is to associate a firing delay with each transition. This delay specifies the time that the transition has to be enabled, before it can actually fire. If the delay is a random distribution function, the resulting net class is called stochastic timed Petri nets (STPNs) [1, 5, 9]. Different types of transitions can be distinguished depending on their associated delay, for instance immediate transitions (no delay), exponential transitions (delay is an exponential distribution), and deterministic transitions (delay is fixed). STPNs as a formalism developed in the field of computer science have gained wide applications for modeling system performance. A lot of software tools have been written to implement and solve models defined using STPN formalism. B. STPN Modeling of GPRS Billing Flow in GSN Side Fig. 4 shows the STPN model of CDR generation, store and transfer in the GSN side. All nodes are explained in Table 1. The model is composed of 8 transitions and 9 places. Place WSIZE models the sliding window size for the control of CDR packets transfer from GSN to CGF, and its capacity and initial marking are set to n, where n is the window size. Place BUF models the buffer threshold for switching the application from normal mode to backup mode; its capacity is set to m, while its initial marking is 0. The weight of directed arcs (BUF, bklg) and (bklg, BUF) are all set to m, meaning when there are m tokens accumulated in place BUF, transition bklg will fire. The firing of bklg will remove m tokens from and then put them back to BUF and put one token to place BKLG, meaning the system is in backlogged mode.
4 In normal mode (place NORM is marked), when call processing entity generates a billing record (transition call fires, and a token is added to place CINS), a process in the GSN will create a CDR packet and put it to the packet buffer pool (transition gcdr fires, a token added to each of places BUF and PACK). Then a second process sends the record to the CGF side through network link (transition send fires, a token added to TOCGF). On the CGF side, when the data from GSN is processed successfully, an ACK is sent to the GSN (a token is added to place ACK), and the GSN will remove the original data from buffer pool upon receiving the ACK (rmcdr fires, a token added to WSIZE). Notice that before an ACK is received by the GSN, it can only send up to n packets to the CGF due to the existence of place WSIZE of capacity n. disables transition send, indicating the normal packet transfer is halted. But the firing of bklg does not consume any token from BUF, as the switch of mode does not change the number of billing records in the buffer. After the firing of bklg, transition wbkp is enabled, indicating the system starts to write CDRs to a local disk. In this mode, no record will be transferred to CGF, because neither transition send nor transition sbkp is enabled. After certain time recovery mode occurs (transition rcov fires, and place NORM marked again), the data in backup file will join the main billing stream to be transferred to the CGF, and both of transitions send and sbkp are friable now. C. STPN Modeling of Billing Flow in CGF Side TOCGF strmgr RECRFD dma PRMDSK downstr SNTDWN CINS call gcdr bklg m NORM BKLG PAC K rcov BKP sbkp wbkp send n WSIZ E TOCG ACK k MGRAVL CPU ACKRDY sendack DMAVL MRDSK mirror updstat BUF Fig. 4. STPN model of CDR generation, store and transfer in the GSN side Table 1 Legend for Fig. 4. Place Description Capacity CINS New call instance BUF CDR packet in buffer PACK CDR packet to transmit NORM Normal transfer mode BKLG Backlogged mode BKP Backlogged packets WSIZE Window size of packet transfer n TOCGF Packet on the way to CGF ACK ACK from CGF to GSN Transition Description Call New call gcdr Generate new CDR packet blkg Change to backlog mode rcov Recovers from backlogged mode send Send normal packet sbkp Send backlogged packet wbkp Write packets to backup files rmcdr GSN removes ACK ed records from bufpool ACK If the CGF cannot catch up with the input from the GSN, more and more records will be accumulated in the buffer pool. If the number of accumulated records reaches the preset threshold (place BUF has m tokens or more), the CGF switches to backup mode (bklg fires, a token added to BKLG). The firing of bklg consumes the token in place NORM, which Fig. 5. STPN model of CDR transfer and processing in the CGF side. Table 2 Legend for Fig. 5. Place Description Capacity TOCBM Billing records in transit to CBM RECRFD Billing records reformatted PRMDSK Billing records in CGF primary disk MRDSK Waiting to write billing records to mirrored disk SNTDWN Records sent to downstream DMAVL DMA process available 1 ACKRDY Ready to send ACK CPU CPU available k MGRAVL Stream Manager available 1 ACK ACK to GSN Transition strmgr dma dwnstr updstat mirror sendack Description CBM stream manager processes records DMA writes records to disk Deliver data to downstream Update records attribute to sent DMA writes records to mirrored disk Send ACK Fig. 5 shows the STPN model of CDR transfer in the CGF side. Nodes are described in Table 2. The model is composed of 6 transitions and 10 places. (Notice that places TOCGF and ACK are duplicated here for the purpose of showing the connection between the GSN model and the CGF mode.) All transitions are timed transitions Place CPU s capacity and initial marking are k, meaning there are k CPUs in the CGF.
5 Places MGRAVL and DMAVL represent streammanager process, which is responsible for retreving and reformatting CDRs from the buffer, and DMA process, which stands for direct memory access and is responsible for writing records to storages, respectively; their capacities are all one. When a batch of billing record data is sent to CGF (a token added to TOCBM), on the CGF side, the stream manager picks up the record data and reformats it (strmgr fires, a token added to RECRFD and ACKRDY each). Then the DMAPROC process writes the billing data to the CGF primary disk (dma fires, a token added to PRMDSK). Now, downstream delivery process will transfer the data to down stream processor (downstr fires, a token added to SNTDWN), and the record data will be marked sent (updstat fires). Meanwhile, the same data will be written to the mirror memory, i.e. non-volatile memory (mirror fires). When the data from GSN is processed by stream manager, an ACK is sent to the GSN (sendack fires, and a token is added to ACK). D. Billing Throughput We want to know the maximum CDR throughput of the billing flow. Notice that in the GSN side STPN model depicted in Figure 4, if the number of tokens in place BUF reaches its capacity, a backup mode occurs, in other words, the billing flow reaches the network s maximum throughput. We can find the billing throughput either based on theoretical analysis [8], or through simulation. Here we provide the simulation results by using the tool STPNPlay [10]. Assume the firing rates of time transitions are as follows: r(send) = r(strmgr) = r(dma) = r(downstr) = 0.002, r(bklg) = r(sbkp) = r(wbkp) = r(rmcdr) = , r(sendack) = r(mirror) = r(updstat) = , r(rcov) = 5, r(gcdr) = r(call). Also assume k = 2, m = 50 and n = 20. The simulation covers steps of transition firings. Fig. 6 shows the number of tokens vs. transition firings when r(call) = At this billing rate the billing flow works in a normal mode, i.e., no backup mode happens, because the token number is always below 50. But if we increase the billing rate, backup mode will occur immediately. Fig. 7 shows the situation when r(call) = , that is, the backup occurs periodically. So in this example, the maximum throughput of the billing flow is 3600/ = 1.02 million CDRs per hour. E. Discussion The STPN model can be improved by taking into account a couple of practical factors of the GPRS billing flow. The first one we need to consider is the granularity of data blocks transferred from the GSN to the CGF. Let us say according to the communication protocol between the GSN and the CGF, each time the GSN can transfer up to b bytes of data to the CGF, while the CDR size is c bytes. Therefore, the GSN will transfer int(b/c) CDRs each time to the CGF, instead of one CDR. To incorporate this factor into our model, we only need to change the weight of the arcs (gcdr, PACK) and (gcdr, BUF) to int(b/c). Fig. 6. Number of tokens in place BUF when r(call) = Fig. 7. Number of tokens in place BUF when r(call) = Another one may have impact to the billing throughput is the sizes of CDRs generated from GGSN and SGSN. If the sizes of these two types of CDRs are different, then the processing and transfer times of these two types of CDRs will be different. In this case, we have two options to improve the model. The first one is to get the average CDR size assuming that the percentages of these two types of CRDs in the traffic are known. Then we can decide the processing and transfer times based on the average CRD size, and there is no need to change the models we built. The second approach is to deploy the colored Petri net modeling skills and differentiate types of CRDs using the colors of tokens [4]. The transitions firing times will also be different when they are triggered by different types of tokens.
6 IV. CONCLUDING REMARKS This paper presented a modeling and analysis approach to the real-time billing flow in a GPRS wireless telecommunication service based on the STPN formalism. In a GPRS, the load of billing traffic depends on the load of call traffic and the size of a billing record. During busy hours, the GPRS network might not be able to transfer billing records on a timely basis if new billing records are generated too fast and the network s data transferring threshold is reached. Therefore, it is important to know the network s billing information processing capacity. Although this paper focuses on GPRS billing flow analysis, the same approach can be applied to GSM and UMTS billing flow analysis as well. REFERENCES [1] M. Ajmone Marsan, G. Balbo, G. Conte, A class of generalized stochastic Petri nets for the performance analysis of multiprocessor systems, ACM Trans. on Computer Systems, 2(1), , May [2] G. Heine and H. Sagkob, GPRS: Gateway to Third Generation Mobile Networks, Artech House, Incorporated, 2003 [3] A. Kavanagh and J. Beckmeyer, GPRS Networks, Osborne Publishing, 2002 [4] K. Jensen, Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use, Springer-Verlag Telos, [5] M. Molloy, Performance analysis using stochastic Petri nets, IEEE Transactions on Computers, C-31(9), , [6] 3GPP Specifications, TS , [7] J. Wang, Timed Petri Nets: Theory and Application. Boston: Kluwer Academic Publishers, [8] J. Wang, M. Zhou and Y. Deng, Throughput analysis of discrete event systems based on stochastic Petri nets, International Journal of Intelligent Control and Systems, vol. 3, no. 3, , [9] W.M. Zuberek, Timed Petri nets: definitions, properties, and applications, Microelectron. Relib., 31(4) , [10] Jiacun Wang (SM 2000) received his Ph.D degree in Computer Science for Nanjing University of Science and Technology in He is currently an Associate Professor with Department of Software Engineering, Monmouth University, New Jersey, USA. He previously worked for Nortel Networks as a Scientific Staff Member in the Wireless Telecommunication Department. His research interests include software architecture, formal methods, real-time systems and wireless networking.
STAR-GATE TM. Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards.
STAR-GATE TM Annex: Intercepting Packet Data Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected]
CS556 Course Project Performance Analysis of M-NET using GSPN
Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 CS6 Course Project Performance Analysis of M-NET using GSPN Jinchun Xia. Introduction Performance is a crucial factor in software
Modeling and Simulation Firewall Using Colored Petri Net
World Applied Sciences Journal 15 (6): 826-830, 2011 ISSN 1818-4952 IDOSI Publications, 2011 Modeling and Simulation Firewall Using Colored Petri Net 1 2 Behnam Barzegar and Homayun Motameni 1 Department
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays
Remote Copy Technology of ETERNUS6000 and ETERNUS3000 Disk Arrays V Tsutomu Akasaka (Manuscript received July 5, 2005) This paper gives an overview of a storage-system remote copy function and the implementation
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
EXPLORER. TFT Filter CONFIGURATION
EXPLORER TFT Filter Configuration Page 1 of 9 EXPLORER TFT Filter CONFIGURATION Thrane & Thrane Author: HenrikMøller Rev. PA4 Page 1 6/15/2006 EXPLORER TFT Filter Configuration Page 2 of 9 1 Table of Content
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
Introducing STAR-GATE Enhancements for Packet Cable Networks
STAR-GATE TM Annex: Intercepting PacketCable Compliance with CALEA and ETSI Delivery and Administration Standards. In this document USA Tel: +1-703-818-2130 Fax: +1-703-818-2131 E-mail: [email protected]
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Chapter 6 Wireless and Mobile Networks
Chapter 6 Wireless and Mobile Networks A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
CURRENT wireless personal communication systems are
Efficient Radio Resource Allocation in a GSM and GPRS Cellular Network David E Vannucci & Peter J Chitamu Centre for Telecommunications Access and Services School of Electrical and Information Engineering
A Systemfor Scanning Traffic Detection in 3G WCDMA Network
2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology
Performance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing
www.ijcsi.org 227 Real Time Network Server Monitoring using Smartphone with Dynamic Load Balancing Dhuha Basheer Abdullah 1, Zeena Abdulgafar Thanoon 2, 1 Computer Science Department, Mosul University,
Mobile Wireless Overview
Mobile Wireless Overview A fast-paced technological transition is occurring today in the world of internetworking. This transition is marked by the convergence of the telecommunications infrastructure
Performance analysis and comparison of virtualization protocols, RDP and PCoIP
Performance analysis and comparison of virtualization protocols, RDP and PCoIP Jiri Kouril, Petra Lambertova Department of Telecommunications Brno University of Technology Ustav telekomunikaci, Purkynova
GPRS Systems Performance Analysis
GPRS Systems Performance Analysis Fátima de Lima Procópio Duarte, Antonio A.F. Loureiro, Leonardo Barbosa e Oliveira, Cláudio Márcio de Souza Vicente Federal University of Minas Gerais, Belo Horizonte,
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
Remus: : High Availability via Asynchronous Virtual Machine Replication
Remus: : High Availability via Asynchronous Virtual Machine Replication Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley,, Norm Hutchinson, and Andrew Warfield Department of Computer Science
GTP Security in 3G Core Network
2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing GTP Security in 3G Core Network Xuena Peng 1,2, Wen Yingyou 1,2, Zhao Dazhe 1,2, Zhao Hong 1,2 College
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks
Applying Active Queue Management to Link Layer Buffers for Real-time Traffic over Third Generation Wireless Networks Jian Chen and Victor C.M. Leung Department of Electrical and Computer Engineering The
ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; Guy.Reyniers@alcatel.
Contact: ALCATEL CRC Antwerpen Fr. Wellesplein 1 B-2018 Antwerpen +32/3/240.8550; [email protected] +32/3/240.7830; [email protected] Voice over (Vo) was developed at some universities to diminish
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899
Top 10 Tips for z/os Network Performance Monitoring with OMEGAMON Session 11899 Dean Butler [email protected] 2012 IBM Corporation Agenda IBM Software Group Tivoli software Best Practices in Monitoring
Real-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
Remote I/O Network Determinism
Remote I/O Network Determinism September 2011 by David Doggett & Manuel J. Palomino Make the most of your energy Summary Executive Summary... p 3 Introduction... p 4 Network Determinism vs Overall Performance...
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card
MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card Ranveer Chandra, Paramvir Pahl, Pradeep Bahl Cornell University & Microsoft Corp. Presented by Liang Chen Ideas Link 1
Packetized Telephony Networks
Packetized Telephony Networks Benefits of Packet Telephony Networks Traditionally, the potential savings on long-distance costs was the driving force behind the migration to converged voice and data networks.
Chapter 11 I/O Management and Disk Scheduling
Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization
Chapter 10 VoIP for the Non-All-IP Mobile Networks
Chapter 10 VoIP for the Non-All-IP Mobile Networks Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 10.1 GSM-IP: VoIP Service for GSM 256
VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0
VisorALARM-Manager Application Quick Guide. (Ver. 1.3) Dm 380-I. V:3.0 1. Installation Requirements 1.1. PC Pentium III processor or higher. Minimum RAM memory: 128 Mbytes Operating system: Windows XP
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices
Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer
GPRS and 3G Services: Connectivity Options
GPRS and 3G Services: Connectivity Options An O2 White Paper Contents Page No. 3-4 5-7 5 6 7 7 8-10 8 10 11-12 11 12 13 14 15 15 15 16 17 Chapter No. 1. Executive Summary 2. Bearer Service 2.1. Overview
FPGAs in Next Generation Wireless Networks
FPGAs in Next Generation Wireless Networks March 2010 Lattice Semiconductor 5555 Northeast Moore Ct. Hillsboro, Oregon 97124 USA Telephone: (503) 268-8000 www.latticesemi.com 1 FPGAs in Next Generation
Chapter 18: Database System Architectures. Centralized Systems
Chapter 18: Database System Architectures! Centralized Systems! Client--Server Systems! Parallel Systems! Distributed Systems! Network Types 18.1 Centralized Systems! Run on a single computer system and
Building Reliable, Scalable AR System Solutions. High-Availability. White Paper
Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System
Network Monitoring. Chu-Sing Yang. Department of Electrical Engineering National Cheng Kung University
Network Monitoring Chu-Sing Yang Department of Electrical Engineering National Cheng Kung University Outline Introduction Network monitoring architecture Performance monitoring Fault monitoring Accounting
7750 SR OS System Management Guide
7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted
NTT DOCOMO Technical Journal. Core Network Infrastructure and Congestion Control Technology for M2M Communications
M2M 3GPP Standardization Further Development of LTE/LTE-Advanced LTE Release 10/11 Standardization Trends Core Network Infrastructure and Congestion Control Technology for M2M Communications The number
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging
Achieving Nanosecond Latency Between Applications with IPC Shared Memory Messaging In some markets and scenarios where competitive advantage is all about speed, speed is measured in micro- and even nano-seconds.
Recovery Behavior of Communication Manager from Control Network Outages
WHITE PAPER Recovery Behavior of Communication Manager from Control Network Outages May 2007 Table of Contents Section 1: Introduction... 1 Section 2: IPSI Socket Sanity Timeout Feature... 1 2.1 Before
Ring Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
TCP in Wireless Networks
Outline Lecture 10 TCP Performance and QoS in Wireless s TCP Performance in wireless networks TCP performance in asymmetric networks WAP Kurose-Ross: Chapter 3, 6.8 On-line: TCP over Wireless Systems Problems
EView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this
EE6390. Fall 1999. Research Report. Mobile IP in General Packet Radio System
EE6390 Introduction to Wireless Communications Systems Fall 1999 Research Report Mobile IP in General Packet Radio System Kelvin K. W. Wong Ramzi Hamati Date: Dec. 6, 1999 1.0 Abstract Tunneling is one
White Paper. Bearer Independent Protocol (BIP)
White Paper Bearer Independent Protocol (BIP) - 2 - Contents 1 Executive summary...4 2 Introduction...5 3 Solution description...5 3.1 Standards compliance...5 3.2 Interface architecture...6 3.3 Data carriers...9
Performance Issues of TCP and MPEG-4 4 over UMTS
Performance Issues of TCP and MPEG-4 4 over UMTS Anthony Lo [email protected] 1 Wiskunde end Informatica Outline UMTS Overview TCP and MPEG-4 Performance Summary 2 1 Universal Mobile Telecommunications
NetFlow Collection and Processing Cartridge Pack User Guide Release 6.0
[1]Oracle Communications Offline Mediation Controller NetFlow Collection and Processing Cartridge Pack User Guide Release 6.0 E39478-01 June 2015 Oracle Communications Offline Mediation Controller NetFlow
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
Outline. Failure Types
Outline Database Management and Tuning Johann Gamper Free University of Bozen-Bolzano Faculty of Computer Science IDSE Unit 11 1 2 Conclusion Acknowledgements: The slides are provided by Nikolaus Augsten
On Cloud Computing Technology in the Construction of Digital Campus
2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore On Cloud Computing Technology in the Construction of Digital Campus
Remote Desktop Protocol Performance
MICROSOFT Remote Desktop Protocol Performance Presentation and Hosted Desktop Virtualization Team 10/13/2008 Contents Overview... 3 User Scenarios... 3 Test Setup... 4 Remote Desktop Connection Settings...
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006
Achieving High Availability & Rapid Disaster Recovery in a Microsoft Exchange IP SAN April 2006 All trademark names are the property of their respective companies. This publication contains opinions of
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Programma della seconda parte del corso
Programma della seconda parte del corso Introduction Reliability Performance Risk Software Performance Engineering Layered Queueing Models Stochastic Petri Nets New trends in software modeling: Metamodeling,
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Design of Wireless Home automation and security system using PIC Microcontroller
IJCAES ISSN: 2231-4946 Volume III, Special Issue, August 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on National Conference on Information and Communication
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
Connectivity. Alliance Access 7.0. Database Recovery. Information Paper
Connectivity Alliance Access 7.0 Database Recovery Information Paper Table of Contents Preface... 3 1 Overview... 4 2 Resiliency Concepts... 6 2.1 Database Loss Business Impact... 6 2.2 Database Recovery
LCMON Network Traffic Analysis
LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia [email protected] Abstract The Swinburne
Network Attached Storage. Jinfeng Yang Oct/19/2015
Network Attached Storage Jinfeng Yang Oct/19/2015 Outline Part A 1. What is the Network Attached Storage (NAS)? 2. What are the applications of NAS? 3. The benefits of NAS. 4. NAS s performance (Reliability
Mobile Communications
October 21, 2009 Agenda Topic 2: Case Study: The GSM Network 1 GSM System General Architecture 2 GSM Access network. 3 Traffic Models for the Air interface 4 Models for the BSS design. 5 UMTS and the path
Routing Security Server failure detection and recovery Protocol support Redundancy
Cisco IOS SLB and Exchange Director Server Load Balancing for Cisco Mobile SEF The Cisco IOS SLB and Exchange Director software features provide a rich set of server load balancing (SLB) functions supporting
ETSI TS 133 107 V3.1.0 (2000-12)
TS 133 107 V3.1.0 (2000-12) Technical Specification Universal Mobile Telecommunications System (UMTS); 3G Security; Lawful Interception Architecture and Functions (3GPP TS 33.107 version 3.1.0 Release
Chapter 12 Network Administration and Support
Chapter 12 Network Administration and Support Objectives Manage networked accounts Monitor network performance Protect your servers from data loss Guide to Networking Essentials, Fifth Edition 2 Managing
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
TCP in Wireless Mobile Networks
TCP in Wireless Mobile Networks 1 Outline Introduction to transport layer Introduction to TCP (Internet) congestion control Congestion control in wireless networks 2 Transport Layer v.s. Network Layer
ETSI TR 102 678 V1.2.1 (2011-05) Technical Report
TR 102 678 V1.2.1 (2011-05) Technical Report Speech and multimedia Transmission Quality (STQ); QoS Parameter Measurements based on fixed Data Transfer Times 2 TR 102 678 V1.2.1 (2011-05) Reference RTR/STQ-00184m
Performance Monitoring on Networked Virtual Environments
ICC2129 1 Performance Monitoring on Networked Virtual Environments Christos Bouras, Eri Giannaka Abstract As networked virtual environments gain increasing interest and acceptance in the field of Internet
Kirsten Sinclair SyntheSys Systems Engineers
Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB Executive Summary Oracle Berkeley DB is used in a wide variety of carrier-grade mobile infrastructure systems. Berkeley DB provides
GSM v. CDMA: Technical Comparison of M2M Technologies
GSM v. CDMA: Technical Comparison of M2M Technologies Introduction Aeris provides network and data analytics services for Machine-to- Machine ( M2M ) and Internet of Things ( IoT ) applications using multiple
ΤΕΙ Κρήτης, Παράρτηµα Χανίων
ΤΕΙ Κρήτης, Παράρτηµα Χανίων ΠΣΕ, Τµήµα Τηλεπικοινωνιών & ικτύων Η/Υ Εργαστήριο ιαδίκτυα & Ενδοδίκτυα Η/Υ Modeling Wide Area Networks (WANs) ρ Θεοδώρου Παύλος Χανιά 2003 8. Modeling Wide Area Networks
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
Implementation of the Remote Control and Management System. in the Windows O.S
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 11 Implementation of the Remote Control and Management System in the Windows O.S Seung-Ju Jang Dong-Eui University,
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis
Unlicensed Mobile Access (UMA) Handover and Packet Data Performance Analysis Andres Arjona Nokia Siemens Networks [email protected] Hannu Verkasalo Helsinki University of Technology [email protected]
Secure SCTP against DoS Attacks in Wireless Internet
Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea [email protected] Abstract. The Stream Control Transport Protocol
5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network
5.0 Network Architecture 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network 1 5.1The Internet Worldwide connectivity ISPs connect private and business users Private: mostly dial-up connections Business:
Network performance and capacity planning: Techniques for an e-business world
IBM Global Services Network performance and capacity planning: Techniques for an e-business world e-business is about transforming key business processes with Internet technologies. In an e-business world,
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network
Simulation-Based Comparisons of Solutions for TCP Packet Reordering in Wireless Network 作 者 :Daiqin Yang, Ka-Cheong Leung, and Victor O. K. Li 出 處 :Wireless Communications and Networking Conference, 2007.WCNC
ETSI TS 129 119 V9.0.0 (2010-01) Technical Specification
TS 129 119 V9.0.0 (2010-01) Technical Specification Universal Mobile Telecommunications System (UMTS); LTE; GPRS Tunnelling Protocol (GTP) specification for Gateway Location Register (GLR) (3GPP TS 29.119
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
Mobile SMS and Data Roaming Explained
Mobile SMS and Data Roaming Explained Mobile SMS and data roaming explained Roaming is the ability of customers to use their mobile phones or other mobile devices outside the geographical coverage area
Disaster Recovery Feature of Symfoware DBMS
Disaster Recovery Feature of Symfoware MS V Teruyuki Goto (Manuscript received December 26, 2006) The demands for stable operation of corporate information systems continue to grow, and in recent years
Fault-Tolerant Framework for Load Balancing System
Fault-Tolerant Framework for Load Balancing System Y. K. LIU, L.M. CHENG, L.L.CHENG Department of Electronic Engineering City University of Hong Kong Tat Chee Avenue, Kowloon, Hong Kong SAR HONG KONG Abstract:
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
