Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm

Size: px
Start display at page:

Download "Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm"

Transcription

1 Simulation of a Scheduling Algorithm Based on LFVC (Leap Forward Virtual Clock) Algorithm CHAN-SOO YOON*, YOUNG-CHOONG PARK*, KWANG-MO JUNG*, WE-DUKE CHO** *Ubiquitous Computing Research Center, ** Electronic System R&D Division Korea Electronic Technology Institute 7 th fl., Good friend Bank B/D 270-2, Seohyun, Pundang, Sungnam, Kyunggi, Korea Abstract: - In this paper, we modified some operations of LFVC algorithm to implemant the LFVC based scheduling algorithm in the bufferd switch system. We analyzed traffic charateristics of our algorithm when we changed input rates and guaranteed rates of each packet flow. Our algorithm shows that it satisfy guaranteed rate of packet flow on various source traffic rates, and congested traffic also doesn t affect on other traffic s rate. In addition, delay of congested traffic increased linearly, but, it does not affect on delay of other traffic as well. Key-Words: - Leap, Forward, Virtual, Clock, Scheduling, Algorithm, Simulation, QoS 1 Introduction To use fair share of limited network resources and to enable seamless transfer of real time multimedia data, QoS guarantee of data traffic is the most important one. To guarantee such a QoS, an efficient traffic management technique is needed in network devices. There are many techniques in traffic management area such as, congestion control and congestion avoidance, admission control, scheduling, resource reservation, and so on. And, scheduling algorithm is one of the most important parts of traffic management. Until now, many papers of scheduling algorithm have been proposed [1-6]. Generally, scheduling algorithm has some desirable features such as isolation of flow, bounded delay, fairness, simplicity of implementation, etc. The LFVC algorithm is regareded as an efficient algorithm that satisfies many desirable features of scheduling algorithms [1]. The LFVC algorithm is work conserving scheduling algorithm based on virtual clock scheduling algorithm which assigns tag value and services each packet with non decreasing order of that tag value [2]. The tag value represents the clock value of system at which the system must transmit the packet. The LFVC algorithm also needs assignment of guaranteed rate of each packet flow by means of prior call setup. Also, the buffered switch is the popular system architecture in switch system which handles input traffic under 5 Gbps [7]. It has some disadvantages that it needs fast switching block and high-speed memory operations. But, it also has useful advantages such as, high throughput, bounded queue length, packet to the different don t interfere each other, may provide QoS guarantee, etc. In this paper, we modified some operations of LFVC algorithm to implemant the LFVC based scheduling algorithm in the bufferd switch system. We analysed traffic charateristics of our algorithm when we changed input rates and guaranteed rates of each packet flow. This paper is organized as follows. In chap. 2, a pseudo code of LFVC algorithm was presented. In chap. 3 & 4, our applied system & details of modified LFVC algorithm was presented. In chap. 5, simulation and the results was presented. And finally, conclude in chap. 5 2 LFVC algorithm Pseudo code for LFVC algorithm and the related parameter are shown in table 1 and 2. Due to lack of space, we omit detailed explanation of LFVC algorithm. Please refer to [1] for details. B l(p) t s t f rate of server packet length of the packet p current server time current tag of flow f

2 r f f τ ρ Q f guaranteed rate of flow f the time needed to send the largest packet of a flow at its guaranteed rate (= l max f / r f ) the time to transmit a largest packet M in server at the server rate (= M / B) rounded tag FIFO queue for flow f Table 1 Related parameters port and buffers are placed in each port. According to packet s destination, incoming packets, which are switched by switch, are stored in each buffer. As shown in Fig. 2, each buffer is composed of 2 FIFOs and 2 priority queues. H_buffer stands for high priority queue and L_buffer stands for low priority queue respectively. Input Switch Output buffer Output ProcessHead(Q f ) if (Q f is empty) return; p head(q f ); t f T(p) max(t s, t f ) + l(p)/r f ; if (t f t s + f + τ + ρ) then Insert(H, p, t f ); else Insert(L, p, t f f); End Enqueue(*A new Packet P f arrives*) AddToTail(Q f ) if (Q f was empty) then ProcessHead(Q f ) Dequeue(*The Server is idle and there is a packet in the system.*) kmin MinKey(L) Let f be the flow corresponding the key k min. if (H is empty) then ts = max(t s, k min - ρ) (*Leap Forward*) while (kmin < t s + τ + ρ) p f ExtractMin(L); Insert(H, p f, T(t f )); (* Transfer*) kmin MinKey(L); end pf ExtractMin(H); t s t s + l(p f )/B; (*Start Service) RemovefromTail(Q f ) ProcessHead(Q f ); Transmit p f ; (*Real time elapses*) Table 2 LFVC algorithm pseudo code[1] 3 Output Buffered Switch System Our algorithm will be applied to the buffer switch system shown in Fig. 1. It displays one-way direction only. A switch is located right behind input In Classify Fig. 1 Output buffered switch system High Priority FIFO Low Priority FIFO Tagging H_buffer L_buffer scheduler Fig. 2 Output buffer Mux In buffer, incoming packets are classified by packet classifier according to packet s priority and then stored in high priority FIFO and low priority FIFO respectively. High priority FIFO, which stores high priority packets, stores time critical data such as alarm signals. Low priority FIFO stores low priority packets. Low priority packet is general data traffic and it also includes real-time multimedia traffic. The low priority packet, which passes through low priority FIFO, passes scheduler, and then, is transmitted to port. On the other hands, high priority packets bypass the scheduler. 4 Our Algorithm Figure 3, 4 show the flow chart of our algorithm. In this section, dequeue operation of the existing LFVC algorithm is modified in order to apply the LFVC scheduler to the buffered switch system in chap. 3. As shown in table 2, the dequeue operation of the existing LFVC scheduler is executed when the system is idle and packet is on the system. Also, the existing LFVC scheduler have one ts, which stands for Out

3 current server time, and updates the ts according to dequeue operation rate. In that case, the ts is increased with agregated rate of total packet flows the scheduler received, not with each packet flow s guaranteed rates. So, the existing scheduler do not know exactly how much each packet flow violates it s guaranteed rate. Also, the dequeue operation of the existing LFVC scheduler includes both ts update part and packet transmission part. In that case, if packet transmission rate are changed, for examle, due to temporal link congestion, ts update rate also are changed. Therefore, it also makes do not know exactly how much each packet flow violates it s guaranteed rate and change of the conditions, packet transfer to L_buffer and packet transfer from H_buffer. However, in our algorithm, each flow has it s own ts respectively, and the ts is updated according to each packet flow s assigned guaranteed rate. Also, dequeue operation is divided into two parts, ts_update and p_. In this paper, rounded tag value, ρ, for minimizing computational complexity when actually implementing the algorithm and compensation value, τ, for discrete server clock are not considered for simplicity[1]. The related parameters for the flowcharts are shown in Table 3. rf delta_f ts tf guaranteed rate of flow f the time needed to send a packet of flow f at its guaranteed rate (= packet length / r f ) current server time current tag of flow f Table 3 The related parameters 4.1 Enqueue flow chart As shown in Figure 3, enqueue operation is executed whenever the new packet is passed through low priority FIFO of the buffer and comes into the scheduler. Whenever a packet enters, tf, which stands for virtual clock tag of the packet, is increased with the value of delta_f. Therefore, it increases in proportion to incoming packet rate. Also, when the system is on, ts is initialized to 0, and increases its value with delta_f at the guaranteed rate of each packet flow. The expression max(ts,tf) shown in Figure 3 is to avoid credit accumulation in virtual clock algorithm[2]. We see that virtual clock tag, tf is driven either by incoming packets or by the ts, the current server time, whichever is faster. start packet receive tf = max(ts, tf) + delta_f tf ts + delta_f? Enqueue in H_buffer Fig. 3 Enqueue Enqueue in L_buffer By sudden increase of packets corresponded to a packet flow f, tf, virtual clock tag of a packet flow f, becomes larger than ts, which increases in proportion to guaranteed rate rf of flow f. It means that the corresponding packet flow f violated the contract, which is supposed to send to guaranteed rate rf. In this case, all packets corresponding packet flow f are transfered to L_buffer. On the other hand, if the packets corresponding flow f are decreasing, therefore, the rate of flow f is equal or less than guaranteed rate, then subsequent packets of flow 1 are transfered to H_buffer. 4.2 Dequeue flow chart Dequeue operation is divided into two parts: ts_update and p_. The ts_update operates according to guaranteed rate of packet flow and p_ operates according to rate of port. First of all, ts_update checks whether a packet exists in L_buffer or not. If there is no packet in L_buffer, it will search for a packet in H_buffer. If there are more than one packet in H_buffer, the packet which has minimum tag value among other packet in H_buffer. If there are packets in L_buffer, the procedure will pass through block-(1) in fig. 4. The block-(1) will be explained later. After block-(1), it searches for a packet to transfer from L_buffer to H_buffer. For this procedure, key value is required. Key value is the minimum value of virtual clock tag of packets within L_buffer subtracted by delta_f. This key value is compared with the ts. If the value of key is greater or equal to the ts, then, it means that the time currently remains are as much as current delta_f time to transmit the corresponding packet to link with it s guaranteed rate. In this

4 case, the corresponding packet are transmitted from L_buffer to H_buffer. start L_buffer is empty? key = min(tag of packets in L_buffer - delta_f) H_buffer is empty? ts_update runs in high rate key < ts? transfer the packet from L_buffer to H_buffer ts = ts + delta_f key = min(tag of packets in L_buffer - delta_f) Fig. 4 ts_update ts_update runs in normal rate block-(1) For simulation, 10-8 sec system clock was used. And constant rate flows and a single ON-OFF flow are applied to our algorithm [8-9]. The maximum of rate is 10 Mbps and packet length is fixed size of 100 bytes. The length of H_buffer and L_buffer of priority queues are not limited. And processing delay of enqueue and dequeue operation are not considered. The high rate operation clock of block-(1) are set up by 10-7 sec. 5.2 Simulation results Constant rate input Input Source: 2 constant rate source. case 1: flow1: Mbps, flow2: Mbps case 2: flow1: Mbps, flow2: 3.34 Mbps case 3: flow1: 3.34 Mbps, flow2: 2.50 Mbps start A packet exist in H_buffer? the packet in H_buffer which has minimum tag value Fig. 5 p_ block-(1) in ts_update is designed to guarantee the work conserving property of scheduling algorithm. It changes the operation frequency of ts_update. If H_buffer empty, then, a lot of packets in L_buffer are moved to H_buffer by increasing the operation frequency of ts_update. If H_buffer is not empty, ts_update operates at the packet flow s guaranteed rate. 5 Simulation 5.1 Simulation environment For simulation environment, we assumed that two packet flows are connected to single input port, and these packet flows have the same destination, pass through the scheduler, and to single port. We examined rate, delay of each packet flow, which is generated from port via scheduling algorithm, and the effect of congested packet flow, when setting up the guaranteed rate rf and changing the input rate of each packet flow. When we change the guaranteed rate rf of packet flow 1 and 2 in each case, the rates of each packet flow are shown in Table 4. From the result of 1~11 in Table 4, rate *, which stands for non-work conserving rate, it is without block-(1), is bounded to rf. Output rate +, which stands for work conserving rate, it is with block-(1), shows that more higher rates. In rate +, if there are packets in L_buffer when H-buffer is empty, then these packets are sent to port through H_buffer. Case 1 is congested with both input traffic flow 1 and 2. Case 2 is congested with traffic flow 1 only. Output rate * and rate + of each flow in case 1 and case 2 show fairness that the complying traffic does not affected by any congetsed traffic. case rf 6.60, 3, , , , 2.00 rate * 6.64, , , , 1.99 rate , , , , 4.64 case rf 6.60, 3, , , , 2.00 rate * 6.64, , , , 1.99 rate , , , , 3.34 * rate without block-(1) in ts_update + rate with block-(1) in ts_update

5 case rf , , , 2.00 rate * , , ,1.99 rate , , ,2.49 Table 4 The result of constant rate input Delay characteristics Fig. 7, 8 shows the mean delay of packets when we fix the input rate of flow 2 with 2 Mbps, and increase the input rate of flow 1. Input conditions and rates are shown in Table 5. Fig. 7 does not include block-(1), but, fig. 8 includes block-(1). Delay in this figures are the same as D(p) of Worst-case Fairness in Bennet & Zhang[1]. It is calculated by the arrival time to scheduler subtracted from the departure time of scheduler. The packet delays of each input rate are averaged on 10-4 sec interval. flow 1 flow2 input rate from 3.34 to 9.10 Mbps 2.00 Mbps rf 4.00 Mbps 2.00 Mbps rate * 3.94 Mbps 1.99 Mbps rate Mbps 1.99 Mbps Table 5 Input conditions and rates sample times and rate(peak rate) is 300 sample times. One sample time is 10-8 sec. Fig. 7 Delay characteristics Fig. 8 Delay characteristics Fig. 7 shows that the delay of flow 1 increases rapidly, when the input rate of flow 1 exceedes 4 Mbps, which corespond guranted rate rf of flow 1. But it does not effect on the delay of flow 2. In fig. 8, the delay of flow 1 rather decresed in comparision with fig. 7, because of block-(1) effects. Also does not effect on the delay of flow ON-OFF source input Input Source: single ON-OFF source mean rate: 4.67 Mbps, peak rate: 10 Mbps rf: 5 Mbps Fig. 9 ON-OFF source input & In order to analyze characteristics of our algorithm, when we apply the burst traffic, ON-OFF source is used for input traffic. Without block-(1), rate(mean rate) is plotted vs. time in fig. 9 and rate(peak rate) in fig. 10. Observation interval of rate(mean rate) is 2000

6 It will be also needed that scheduling algorithm is implemented as a form of software stack or chipset under real network environment and verification and comparison of simulation result with actual result. Fig. 10 ON-OFF source input & As shown in fig. 9, 10, both rate(mean rate) and rate(peak rate) are bounded within 5 Mbps, which is guaranteed rate rf. 5. Conclusion So far, we analyzed the rates, the delays and the effects of congested traffic, of our algorithm when we applied various rates of input traffic. Our algorithm shows that it satisfy guaranteed rate of each packet flow on various input traffic rates, and congested traffic also doesn t affect on other traffic s rates. In addition, the delay of congested traffic increased linearly with input rate, but, it does not affect on the delay of other traffic as well. In real implementation, however, the congested traffic will make the increase of system processing time, which including, both enqueue and dequeue time of L_buffer. Therefore, it is expected that the delay characteristics of other complied traffic will be degraded. If the delay is on real-time interactive traffic, for example, MoIP(Multimedia over IP), the effect on the delay could be serious. Considering this situation, if traffic congestion is happening, and the delay of MoIP traffic beyonds certain one-way delay bound, then, the methods such as congestion control and congestion avoidance are recommended to prevent congested flows from entering in system and with this, we can guarantee fairness of other flows, and maintain precious system resources. Consequently, as a future work, it will be needed to analyze the characteristics of scheduler regarding various input rates and types with the methods of congestion control and congestion avoidance. References [1] S. Suri, G. Varghese, G. Chandranmenon, Leap Forward Virtual Clock: A New Fair Queuing Scheme With Guaranteed Delays and Throughput Fairness, in Proc. of IEEE INFOCOM, [2] L. Zhang, VirtualClock: A New Traffic Control Algorith for Packet Switching Networks, ACM Transactions on Computer Systems, Vol. 9, [3] A. K. Parekh, R. G. Gallager, A Generized Processor Sharing Approach to Flow Control: The Single de Case, in Proc. of IEEE INFOCOM, [4] S. J. Golestani, A Self Clocked Fair Queueing Schem for High Speed Applications, in Proc. of IEEE INFOCOM, [5] A. Demers, S. Keshav, S. Shenker, Analysis and Simulation of a Fair Queuing Algorithm, in Proc. of Sigcomm 89, [6] J. Bennett, H. Zhang, Worst-case Fair Weighted Fair Queueing, in Proc. of IEEE INFOCOM, 1996 [7] L. Levendovszky, P. Boros, A. Molnar, Development of Home Station on a Chipest Congestion Control Algorithms, Technical Report of Budapest University of Technology & Economics, [8] A. Bhadra, M. N. O. Sadiku, Simulation of an ATM Network Using an ON-OFF Model, Southeastcon in Proc. of the IEEE, [9] Z. Zhifei, Q. Zhengding, A vel Approach For Real Time Equivalent Bandwidth Estimation, ICCT(International Conference on Communication Technologies) at 16th IFIP World Computer Congress, 2000.

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

Vertical Dimensioning: A Novel DRR Implementation for Efficient Fair Queueing

Vertical Dimensioning: A Novel DRR Implementation for Efficient Fair Queueing 1 Vertical Dimensioning: A Novel DRR Implementation for Efficient Fair Queueing Spiridon Bakiras 1 Feng Wang 2 Dimitris Papadias 2 Mounir Hamdi 2 1 Department of Mathematics and Computer Science John Jay

More information

Implementation of Start-Time Fair Queuing Algorithm in OPNET

Implementation of Start-Time Fair Queuing Algorithm in OPNET Implementation of Start-Time Fair Queuing Algorithm in OPNET CMPT885/ENSC835 Final Project by Daryn Mitchell daryn@cs.sfu.ca Jack Man Shun Yeung yeung@cs.sfu.ca April 4, 2002. Road map Background and Introduction

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

EP2210 Scheduling. Lecture material:

EP2210 Scheduling. Lecture material: EP2210 Scheduling Lecture material: Bertsekas, Gallager, 6.1.2. MIT OpenCourseWare, 6.829 A. Parekh, R. Gallager, A generalized Processor Sharing Approach to Flow Control - The Single Node Case, IEEE Infocom

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

MUD: Send me your top 1 3 questions on this lecture

MUD: Send me your top 1 3 questions on this lecture Administrivia Review 1 due tomorrow Email your reviews to me Office hours on Thursdays 10 12 MUD: Send me your top 1 3 questions on this lecture Guest lectures next week by Prof. Richard Martin Class slides

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

Pipelined Sections: A New Buffer Management Discipline for Scalable QoS Provision

Pipelined Sections: A New Buffer Management Discipline for Scalable QoS Provision Pipelined Sections: A New Buffer Management Discipline for Scalable QoS Provision Shun Y. Cheung and Corneliu S. Pencea Department of Mathematics and Computer Science, Emory University, Atlanta, Georgia

More information

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach Topic 4b: QoS Principles Chapter 9 Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 9-1 Providing multiple classes of service thus far: making

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

QoS Services with Dynamic Packet State

QoS Services with Dynamic Packet State QoS Services with Dynamic Packet State Ion Stoica Carnegie Mellon University (joint work with Hui Zhang and Scott Shenker) Today s Internet Service: best-effort datagram delivery Architecture: stateless

More information

The Network Layer and Routers

The Network Layer and Routers The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in

More information

Communication using Multiple Wireless Interfaces

Communication using Multiple Wireless Interfaces Communication using Multiple Interfaces Kameswari Chebrolu and Ramesh Rao Department of ECE University of California, San Diego Abstract With the emergence of different wireless technologies, a mobile

More information

OpenFlow based Flow Level Bandwidth Provisioning for CICQ Switches

OpenFlow based Flow Level Bandwidth Provisioning for CICQ Switches OpenFlow based Flow Level Bandwidth Provisioning for CICQ Switches Hao Jin, Deng Pan, Jason Liu, and Niki Pissinou Florida International University Abstract Flow level bandwidth provisioning offers fine

More information

Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET

Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Simulation-Based Performance Comparison of Queueing Disciplines for Differentiated Services Using OPNET Hafiz M. Asif and El-Sayed M. El-Alfy College of Computer Science and Engineering King Fahd University

More information

of-service Support on the Internet

of-service Support on the Internet Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

THERE are a growing number of Internet-based applications

THERE are a growing number of Internet-based applications 1362 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 14, NO. 6, DECEMBER 2006 The Stratified Round Robin Scheduler: Design, Analysis and Implementation Sriram Ramabhadran and Joseph Pasquale Abstract Stratified

More information

Differentiated Service Queuing Disciplines in NS-3

Differentiated Service Queuing Disciplines in NS-3 Differentiated Service Queuing Disciplines in NS-3 Robert Chang, Mahdi Rahimi, and Vahab Pournaghshband Advanced Network and Security Research Laboratory California State University, Northridge Northridge,

More information

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System

Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE System Efficient Uplink Scheduler Architecture of Subscriber Station in IEEE 82.16 System Woo-Jae Kim 1, Joo-Young Baek 1, Sun-Don Lee 1, Young-Joo Suh 1, Yun-Sung Kim 2, and Jin-A Kim 2 1 Department of Computer

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

IP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094

IP QOS Theory and Practice. eng. Nikolay Milovanov CCIE SP# 20094 IP QOS Theory and Practice eng. Nikolay Milovanov CCIE SP# 20094 QoS Architectures QoS Architecture Models Best Effort Service Integrated Service Differentiated Service 3 Best Effort Service What exactly

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13

Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Router Design: Table Lookups and Packet Scheduling EECS 122: Lecture 13 Department of Electrical Engineering and Computer Sciences University of California Berkeley Review: Switch Architectures Input Queued

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Weighted Fair Queuing Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng at cs.rice.edu

More information

Lottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs

Lottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs Lottery Scheduling for Flexible and Fine-grained Bandwidth Management in Wireless LANs Shravan Rayanchu Sharad Saha Department of Computer Sciences, University of Wisconsin, Madison, WI 537, USA {shravan,

More information

Approximate Fair Queueing: A Low Complexity Packet Scheduler for Embedded Networks

Approximate Fair Queueing: A Low Complexity Packet Scheduler for Embedded Networks Approximate Fair Queueing: A Low Complexity Packet Scheduler for Embedded Networks Arijit Ghosh Tony Givargis Technical Report CECS-09-02 April 14, 2009 Center for Embedded Computer Systems University

More information

Scheduling (Chapter 9) Outline

Scheduling (Chapter 9) Outline Scheduling (Chapter 9) An Engineering Approach to Computer Networking S. Keshav (Based on slides of S. Keshav http://www.cs.cornell.edu/home/skeshav/book/slides/index.html and material of J. Liebeherr,

More information

Router s Queue Management

Router s Queue Management Router s Queue Management Manages sharing of (i) buffer space (ii) bandwidth Q1: Which packet to drop when queue is full? Q2: Which packet to send next? FIFO + Drop Tail Keep a single queue Answer to Q1:

More information

Variable Step Fluid Simulation for Communication Network

Variable Step Fluid Simulation for Communication Network Variable Step Fluid Simulation for Communication Network Hongjoong Kim 1 and Junsoo Lee 2 1 Korea University, Seoul, Korea, hongjoong@korea.ac.kr 2 Sookmyung Women s University, Seoul, Korea, jslee@sookmyung.ac.kr

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

Stop-and-Go Service Using Hierarchical Round Robin

Stop-and-Go Service Using Hierarchical Round Robin Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid

More information

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course:

CS 349/449 Internet Protocols Final Exam Winter /15/2003. Name: Course: CS 349/449 Internet Protocols Final Exam Winter 2003 12/15/2003 Name: Course: Instructions: 1. You have 2 hours to finish 2. Question 9 is only for 449 students 3. Closed books, closed notes. Write all

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

A New Fair Weighted Fair Queuing Scheduling Algorithm in Differentiated Services Network

A New Fair Weighted Fair Queuing Scheduling Algorithm in Differentiated Services Network IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.11, November 26 267 A New Fair Weighted Fair Queuing Scheduling Algorithm in Differentiated Services Network M. A. Elshaikh,

More information

A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks

A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks Hoon-Tong Ngin and Chen-Khong Tham National University of Singapore, Department of Electrical and Computer Engineering,

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Telematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources)

Telematics 2. Chapter 3 Quality of Service in the Internet. (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources) Telematics 2 Chapter 3 Quality of Service in the Internet (Acknowledgement: These slides have been compiled from Kurose & Ross, and other sources) Telematics 2 (WS 14/15): 03 Internet QoS 1 Improving QOS

More information

Compensation Modeling for QoS Support on a Wireless Network

Compensation Modeling for QoS Support on a Wireless Network Compensation Modeling for QoS Support on a Wireless Network Stefan Bucheli Jay R. Moorman John W. Lockwood Sung-Mo Kang Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

TRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME

TRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME Malaysian Journal of Computer Science, Vol. 10 No. 2, December 1997, pp. 17-25 TRANSPORTING MPEG-II VIDEO STREAMS ON ATM NETWORKS WITH A MODIFIED J-EDD SCHEME Ting-Chao Hou, Chien-Chang Chen and Wen-Jer

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource.

Multiplexing. Common network/protocol functions. Multiplexing: Sharing resource(s) among users of the resource. Common network/protocol functions Goals: Identify, study common architectural components, protocol mechanisms Synthesis: big picture Depth: Important topics not covered in introductory courses Overview:

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Fair Queueing. Presented by Brighten Godfrey. Slides thanks to Ion Stoica (UC Berkeley) with slight adaptation by Brighten Godfrey

Fair Queueing. Presented by Brighten Godfrey. Slides thanks to Ion Stoica (UC Berkeley) with slight adaptation by Brighten Godfrey Fair Queueing Presented by Brighten Godfrey Slides thanks to Ion Stoica (UC Berkeley) with slight adaptation by Brighten Godfrey Traditional queueing Traditional Internet - Congestion control mechanisms

More information

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica CMU Scott Shenker Xerox PARC Hui Zhang CMU Congestion Control in Today s Internet Rely

More information

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Yuhua Chen Jonathan S. Turner Department of Electrical Engineering Department of Computer Science Washington University Washington University

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

An Efficient Implementation of Burst Fair Queuing for ATM Networking

An Efficient Implementation of Burst Fair Queuing for ATM Networking An Efficient Implementation of Burst Fair Queuing for ATM Networking Anthony T. Chronopoulos, Caimu Tang Abstract Fair queueing, which was developed in last decade and was aimed at general packet switching

More information

A Pipelined Memory Management Algorithm for Distributed Shared Memory Switches

A Pipelined Memory Management Algorithm for Distributed Shared Memory Switches A Pipelined Memory Management Algorithm for Distributed Shared Memory Switches Xike Li, Student Member, IEEE, Itamar Elhanany, Senior Member, IEEE* Abstract The distributed shared memory (DSM) packet switching

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

CSC 4900 Computer Networks: Network Layer

CSC 4900 Computer Networks: Network Layer CSC 4900 Computer Networks: Network Layer Professor Henry Carter Fall 2017 Villanova University Department of Computing Sciences Review What is AIMD? When do we use it? What is the steady state profile

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 37 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750-E or 3560-E switch. With QoS,

More information

Packet Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks

Packet Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks Washington University in St. Louis Washington University Open Scholarship All Computer Science and Engineering Research Computer Science and Engineering Report Number: WUCS-01-35 2001-11-13 Packet Scheduling

More information

Packet Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks

Packet Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks Packet Scheduling for Link-Sharing and Quality of Service Support in Wireless Local Area Networks Lars Wischhof John W. Lockwood WUCS-01-35 November 13, 2001 Department of Computer Science Applied Research

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems Lecture 22 Queue Management and Quality of Service (QoS) Overview Queue management & RED Fair queuing Khaled Harras School of Computer Science niversity 15 441 Computer Networks Based on slides from previous

More information

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011

Traffic Access Control. Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Traffic Access Control Hamid R. Rabiee Mostafa Salehi, Fatemeh Dabiran, Hoda Ayatollahi Spring 2011 Outlines Traffic Access Control Definition Traffic Shaping Traffic Policing The Leaky Bucket The Token

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 36 This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

Cross-protect: implicit service differentiation and admission control

Cross-protect: implicit service differentiation and admission control 1 Cross-protect: implicit service differentiation and admission control A. Kortebi, S. Oueslati and J. Roberts France Telecom R&D Abstract In this paper we present Cross-protect, a combination of router

More information

IV. PACKET SWITCH ARCHITECTURES

IV. PACKET SWITCH ARCHITECTURES IV. PACKET SWITCH ARCHITECTURES (a) General Concept - as packet arrives at switch, destination (and possibly source) field in packet header is used as index into routing tables specifying next switch in

More information

CS-534 Packet Switch Architecture

CS-534 Packet Switch Architecture CS-534 Packet Switch Architecture The Hardware Architect s Perspective on High-Speed Networking and Interconnects Manolis Katevenis University of Crete and FORTH, Greece http://archvlsi.ics.forth.gr/~kateveni/534

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY

PACKET HANDLING SCHEDULING IN MULTIPLE ROUTING CONFIGURATIONS FOR FAST IP NETWORK RECOVERY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ

A Probabilistic Approach for Achieving Fair Bandwidth Allocations in CSFQ A Probabilistic Approach for Achieving Fair Bandwidth Allocations in Peng Wang David L. Mills Department of Electrical & Computer Engineering University of Delaware Newark, DE 976 pwangee@udel.edu; mills@eecis.udel.edu

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

Chapter 4 ATM VP-Based Ring Network

Chapter 4 ATM VP-Based Ring Network ATM VP-based network architecture is essentially a compromise of the SONET/STM and ATM network architectures: it takes a system simplicity concept from the SONET/STM network and keeps the flexibility of

More information