Integration of CIF with ATM

Size: px
Start display at page:

Download "Integration of CIF with ATM"

Transcription

1 Integration of CIF with D. Meziat, A. García, G. López Departamento de Automática Universidad of Alcalá Escuela Politécnica Alcalá de Henares, Spain Phone: Fax: {jmarco, meziat, antonio, Abstract: In this article, the implementation of CIF together with is presented using Linux with scheduling algorithms plus the algorithm TPVP. Tests have been designed, with which to monitor the behaviour of parameters related to traffic in real time. The programs needed to carry out these tests have been developed. The results obtained, are in line with those attained previously. Keywords : QoS,,, Communication Protocols. 1 Introduction Many multimedia applications rely on the ability of the network to provide quality of service (QoS) guarantees in order to operate correctly. These guarantees are obtained by establishing certain parameters, usually bandwidth, delay, delay variation and packet loss rate. The main objective of this work is to improve the interconnection between the quality of service and classical networks like. One way of achieving this interconnection is based on the CIF architecture [1]. The generic topology is illustrated in figure 1. In the CIF operation, the Final (CIF F.S.) sends cells within an frame as well as a specific header. The CIF switch extracts the cells from the frames and sends them to the network. One of the elements necessary for the red to provide QoS is an appropriate scheduling algorithm, which needs to be implemented in the switches. A study of the different scheduling algorithms was carried out, which reached the conclusion that one doesn t exist that fully adapts to the necessities outlined, so we have proposed a new algorithm called Deficit Round Robin Alternated (DRRA) [2], with more suitable characteristics. An important limitation to this scene, is that the delay and the delay variation are not conveniently marked out for the necessities of multimedia applications in segments. To solve the problem, a new algorithm denominated Token Passing with Period Variable (TPVP) has been proposed, which reduces the maximum delay and its variation in the segments, so that finally it is possible t o provide end-to-end QoS. The algorithm DRRA together with other scheduling algorithms and the TPVP algorithm have been implemented in several scenarios, using Linux inside the CIF architecture. This implementation has allowed us to contrast the performances of the proposed algorithms. Tests has been also carried out to monitor the behaviour in real time of related parameters. 2 Implementations executed The generic topology, for which it is foreseen the results of the investigation will be applied, is shown in figure 1, in which local area networks are interconnected by an wide area network. The scenarios that have been worked with are modifications of the previous one. Video LAN WAN LAN Figure 1. Generic Topology Video

2 The first implementation has been made in the scenario shown in figure 2, which is a simplification of the network in figure 1. The simplification consists of joining two PCs, which act as final systems, by means of a single CIF switch and with half-duplex segments. (A) 100 Mbps full-duplex (B) 155 Mbps Figure 4. Scenario 2. (A) Hub 10 Mbps half-duplex Figure 2. Scenario 1. Hub 10 Mbps half-duplex (B) The last scenario considered (Figure 5), is a modification of the previous one which has been used to study the impact of the use of the TPVP algorithm when there is a half-duplex segment. Also in this case, tests have been carried out that are presented in this article. In this interconnection the protocol stack developed was entirely CIF (figure 3). We also worked to implement the proposed scheduling algorithm DRRA. Other algorithms have also been deployed in order to contrast them with the proposed one. The results show that with the inclusion of the scheduling algorithms, quality of service was obtained at the cost of some very insignificant losses, demonstrating that the DRRA performs better than the other algorithms tried [9]. (A) Hub 10 Mbps half-duplex CIFSwitch Figure 5. Scenario 3. (B) 155 Mbps APLICATION CS: AAL5 AAL SAR -CIF ETHERNET Final CIF (A) ETHERNET -CIF Physical Layer -CIF Physical Layer ETHERNET APLICATION CS: AAL5 AAL SAR -CIF ETHERNET Final CIF (B) The implementation of scenarios 2 and 3 has been developed starting from a Linux operating system with the Red Hat 4.2 distribution, the kernel version and with the protocol stack on Linux. 3 Kernel functions Figure 3. CIF Protocol stack. An important problem in figure 2, is that the delay and the delay variation are not bounded in the half-duplex segments. For this reason, the TPVP algorithm was implemented, having proven that it reduces the maximum delay and its variation, and causing losses tolerated by most multimedia applications [4]. The following scenario considered is shown in figure 4, where an network is introduced and the communication architecture, on Linux is used [3]. This architecture has been modified introducing CIF. Several scheduling algorithms have also been implemented in order to contrast their operations. Validation tests were carried out which will be described later. In this section, we discuss the changes we have made to both the final system and the switch in order to incorporate CIF in the architecture on Linux. These changes are included in a new network driver, called CIF logical driver which replaces the network adapter driver. These modifications have affected the final system A. The switch, in the other final system B, connected through has not been changed. Replacing the driver with the CIF logical driver, at the original levels, allows to work as if we had an network adapter, when in reality we have an network adapter, being an interface common to all the messages that use protocol stacks. In the above mentioned driver, the CIF layer and the communication with the network card are implemented. The initial protocol stack [5] has been modified as illustrated in figure 6.

3 socket PVC Signaling UNI 3.x BSD socket interface socket SVC socket INET TCP, UDP, ICMP,... In the phase in which a connection is established, the user's program calls the socket() function. Control is immediately transferred to the appropriate protocol, in this case. Then the atm_create() function reserves memory for a new Virtual Circuit VC. It then registers the VC in the list of circuits opened up by the logical driver by calling alloc_atm_vcc(). AAL0 AAL5 CIF Layer Classical IP Driver IP Figure 6. -CIF Protocol stack. Access Although there will be important similarities, the CIF logical driver will be different dependent upon whether it is located in the switch or the final system. The only significant differences however will be due to the fact that, the messages are not always sent to the switch but must be forwarded on. 3.1 Establishing a connection To see how our CIF logical driver works we will follow the steps needed to establish an communication, from the time a connection is made until the data is shipped. We will start with establishing a connection (Figure 5). socket() atm_create() alloc_atm_vcc() setsockopt() atm_setsockopt() bind() atm_connect() atm_do_connect() atm_init_aal5() adjust_tp() logicdev_open() cif_create_vcc() Then from the user's application, by means of atm_setsockopt(), we inform the system which quality of service describer we want for the connection. Then we call the bind(), function which calls the atm_connect() function telling it to establish the QoS parameters for the virtual circuit within its corresponding describer. This in turn calls the atm_do_connect() function which obtains the network device and binds it with the VC describer and also checks whether the vpi and vci values are within the preset ranges. Following this, the protocol initialisation function, situated in the VC describer s aal field, is called (on Linux in there are two possibilities, AAL0 or AAL5) in our case AAL5, so the function executed is atm_init_aal5(). Following this, calling adjust_tp(), depending on the layer of adaptation to, the maximum size of the PDU function is set. Finally the enter function of our CIF logical driver logicdev_open() is called, which activates several flags of the VC to indicate that it has been accepted by our driver. By means of the cif_create_vcc() function, the final action is to register the circuit in the list of circuits of the driver,. After executing all the previous functions the VC will be open with the requested quality of service. 3.2 Sending messages In the following phase connection use is described.the different functions that are called to both send and receive data can be seen in figure 6. We will now describe the functions in more detail. Sending data begins when the sendto() function is called from the user's application. One of the parameters being the message to be sent. Then the layer of functions are executed. The first being atm_sendmsg() where data from the user s space is copied to the kernel space in a skbuff structure [6]. Prior to this, the memory space needed in the kernel is reserved by means of alloc_tx(). After this the logicdev_send() function of our CIF logical driver, passes the user s PDU to the cif_send() function which fragments the PDU into one or more CIF frames for its subsequent transmission. Each CIF frame will be transmitted inside an frame by dev_queue_xmit(). Inside this function the scheduling algorithms are implemented. Finally our frame is delivered to the driver and from there to the network card. Figure 5. Establishing connections in -CIF.

4 sendto() atm_sendmsg() alloc_tx() logicdev_send() cif_send() cif_do_send() recvfrom() atm_recvmsg() atm_push_raw() atm_peek_aal5() measure network performance already exist, [13][14] they could not be used as they were designed for TCP/IP protocols, which are not used in our implementation. The tests have been carried out in scenarios 2 and 3. and in both the network connects final system A to the switch. The network, consisting of a cable, links the CIF switch to final B system. Final system A has a 3Com /100 Mbps network adapter. The CIF switch has an adapter similar to final system A and a PCA-200e adapter of Fore to 155 Mbps like that of final system B. The PCs used in the tests have a 266 MHz CPU and 32 Mbytes of RAM. dev_queue_xmit() dev->hard_start_xmit() 3.3. Frame reception Phisical media cif_recv() netif_rx() Figure 6: Sending and receiving messages. When an frame arrives at the network card, it is attended to by the interruption controller of that driver. Then the driver calls the netif_rx() function which passes the frame to the corresponding network protocol for processing. In our case the function called cif_recv(). Each frame this function receives may contain either pieces of a PDU or a complete one. If the PDU arrives in pieces the function will wait until it has the complete PDE joined together before it sends it to the superior layers for delivery to the user's program. This is done by means of a call to the protocol s atm_push_raw() function. The user's complete PDUs are queued in such a way that when the user's program calls recvfrom(), this takes the first PDU received by the atm_recvmsg() function and delivers it to the program copying the data from the kernel space the to that of the user s. 4 Validation tests To check the impact of implementing the switching algorithms and the TPVP algorithm in our scenario, we have measured traffic parameters such as throughput, delay, and delay variation (or jitter) and bandwidth allocation, in real time. We should point out, that the programs needed to carry out these tests have been especially developed, as although several applications to The tests have been repeated at least 4 times, enough to see that the results obtained were all very similar. As typical deviations are very low the reliability gap can be considered very narrow giving a high level of reliability. The main factors affecting the parameters measured are the following: size of the message, number of sessions, traffic flow direction, number of processes, kind of traffic and duration of tests. From the former parameters only message size will vary, the rest are fixed for reasons described in the following section. Tests have been made with a different number of sessions and it has been observed that they do not influence the results. The direction of traffic flow and the kind of traffic depends on each test. It can be unidirectional or bidirectional. Normally the kind of traffic is made by emitting packages periodically. The period is calculated from the emission speed introduced by keyboard. Control of the speed is not implemented in a closed loop. The number of processes determines how much of the computer s memory is occupied but it does not influence the loss of speed, that the implemented algorithm can cause. This is because the system alternates between the user s process and the kernel while sending the message. Thus, in theory, it does not matter when it returns to the user s process whether this is the same process or not. Consequently, an emitter process is located in one final system and the other process in the receptor of t he other. The time of each message was the habitual of 20 seconds. The size the message can be 40, 128, 512 and 1480 bytes. When it is fixed it is The throughput test was carried out to find the maximum transfer speed without losses. Delay measureme nts have been made indirectly by measuring the RTT between two final CIF systems, connected through the CIF switch. The kind of traffic generated consisted in sending a packet from one session

5 and waiting for the response before sending a packet from the following session. The delay variations are due to the transmission network and the operating system which can take more or less time to attend to the emission or reception of a message. 4.1 Tests with scheduling algorithms Figure 4 is the scenario for these tests in which there is a 100 Mbps full-duplex network and a 155 Mbps network. The first test is to measure throughput, and the results are shown in table 1. The average losses are approximately 5%. 155 Mbps network which has not been modified, as shown in figure 5. The results of the maximum speed without lost measured when introducing the algorithm TPVP, are shown in table 3. It can appreciated that the maximum losses are less than 1 Mbps. Without PTPV 4,19 6,68 8,9 9,64 With PTPV 3,56 5,89 8,04 9,49 Diff. en % 0,63 0,79 0,86 0,15 Table 3: Throughput (in Mbps) with and without the TPVP algorithm. DRRA 9,15 24,36 68,44 96,5 DRR 9,12 24,45 67,73 96,49 FIFO 9,6 25,55 72,06 96,59 Diff. FIFO-DRR 0,48 1,1 4,33 0,1 Diff. FIFO-DRRA 0,45 1,19 3,62 0,09 The delay tests gave results that are shown in table 4. In this table it can be observed that the different are low. Without PTPV With PTPV Diff Table 1: Throughput (in Mbps) with the scheduling algorithms. The second test is to measure the Round Trip Time or RTT, the results are shown in table 2. The maximum difference is of 4 usec. and in general it is worthless. FIFO DRR DRRA Diff. DRR2 -FIFO Diff. DRRA-FIFO Table 2: Delay (usec. ) with the scheduling algorithms. 4.2 Tests with the TPVP algorithm Table 4: Delay (usec.) with and without the TPVP algorithm. The result of the jitter tests with and without the TPVP algorithm, can be seen in figures 7 and 8. The average value measured without TPVP is usec. this value decreases 20% (2.212 usec.) with the TPVP algorithm. In the case of the maximum values, usec. without the TPVP, decreases 108 times to ( usec.). Jitter (usec.) Sample Figure 7. Variation in delay without the TPVP algorithm. It has been necessary to modify the scenario of the previous tests as the TPVP algorithm should be used in a scenario in which there is a half-duplex segment, so the 100 Mbps full-duplex network has been replaced by 10 Mbps half-duplex network and a

6 Jitter (usec.) Sample Figure 8. Variation in delay with the TPVP algorithm. 4.5 Conclusions From the results observed in the different tests, in the different scenarios, it can be concluded that the maximum speed without losses decreases slightly, with maximum losses of 5%. The additional delay is minimal, in the order of the usec. which is tolerated by most multimedia applications [10]. As for the variation in delay, it can be reduced to 10% of the of the maximum jitter value with the TPVP algorithm and totally eliminate the delay variation component commo n to. The results of these tests are in consonance with other works carried out previously [1][4]. [7] R. Jones "Netperf: A Benchmark for Measuring Network Performance. Homepage". [8] B. Adamson. "The MGEN Toolset". [9] J. M. Arco, B. Alarcos, D. Meziat, "A suitable service discipline for - interconnection European Conference on Universal Multiservice Networks ECUM 2000, pg , October [10] J. Rusell, chapter "Multimedia Networking Performance Requirements", from the " Networks" book. Ed. I. Viniotis and R.O. Onvural, Plenum, pp , References [1] J. M. Arco, A. Martínez, B. Alarcos, A. García, D. Meziat. Carrying Cells Over ". IEEE Euromicro 99, September [2] J. M. Arco, Propuesta de optimización de la interconexión de redes con calidad de servicio para aplicaciones multimedia". Tesis Doctoral, Universidad de Alcalá, January [3] W. Almesberger, on Linux: The Distribution. [4] J. M. Arco, D. Meziat. Reducción de la congestión y de la variación del retardo en redes. Libro de ponencias de las III Jornadas de Ingeniería Telemática JITEL 01, pp , September [5] W. Almesberger on Linux, 3rd International Linux Kongress, mayo [6] A. Cox, Network Buffers and memory Management". Linux Journal, September 1996.

Operating Systems. 17. Sockets. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 17. Sockets. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 17. Sockets Paul Krzyzanowski Rutgers University Spring 2015 1 Sockets Dominant API for transport layer connectivity Created at UC Berkeley for 4.2BSD Unix (1983) Design goals Communication

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

ATM Logical Connections: VCC. ATM Logical Connections: VPC

ATM Logical Connections: VCC. ATM Logical Connections: VPC ATM Logical Connections: VCC Logical Connections in ATM are referred to as virtual channel connections (VCCs). Virtual channel (VC) is a generic term used to describe unidirectional transport of ATM cells

More information

Why Your Application only Uses 10Mbps Even the Link is 1Gbps?

Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Why Your Application only Uses 10Mbps Even the Link is 1Gbps? Contents Introduction Background Information Overview of the Issue Bandwidth-Delay Product Verify Solution How to Tell Round Trip Time (RTT)

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract

Kernel Korner. Analysis of the HTB Queuing Discipline. Yaron Benita. Abstract 1 of 9 6/18/2006 7:41 PM Kernel Korner Analysis of the HTB Queuing Discipline Yaron Benita Abstract Can Linux do Quality of Service in a way that both offers high throughput and does not exceed the defined

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

ATM Technology in Detail. Objectives. Presentation Outline

ATM Technology in Detail. Objectives. Presentation Outline ATM Technology in Detail Professor Richard Harris Objectives You should be able to: Discuss the ATM protocol stack Identify the different layers and their purpose Explain the ATM Adaptation Layer Discuss

More information

The Network Layer and Routers

The Network Layer and Routers The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in

More information

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Packet Switching. Hongwei Zhang  Nature seems to reach her ends by long circuitous routes. Problem: not all networks are directly connected Limitations of directly connected networks: limit on the number of hosts supportable limit on the geographic span of the network Packet Switching Hongwei

More information

NT1210 Introduction to Networking. Unit 10

NT1210 Introduction to Networking. Unit 10 NT1210 Introduction to Networking Unit 10 Chapter 10, TCP/IP Transport Objectives Identify the major needs and stakeholders for computer networks and network applications. Compare and contrast the OSI

More information

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction

Packet Switching - Asynchronous Transfer Mode. Introduction. Areas for Discussion. 3.3 Cell Switching (ATM) ATM - Introduction Areas for Discussion Packet Switching - Asynchronous Transfer Mode 3.3 Cell Switching (ATM) Introduction Cells Joseph Spring School of Computer Science BSc - Computer Network Protocols & Arch s Based on

More information

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections

Protocol Architecture (diag) Computer Networks. ATM Connection Relationships. ATM Logical Connections 168 430 Computer Networks Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks Multiple logical connections over

More information

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode

William Stallings Data and Computer Communications 7 th Edition. Chapter 11 Asynchronous Transfer Mode William Stallings Data and Computer Communications 7 th Edition Chapter 11 Asynchronous Transfer Mode Protocol Architecture Similarities between ATM and packet switching Transfer of data in discrete chunks

More information

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1

6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6. Transport Layer 6.1 Internet Transport Layer Architecture 6.2 UDP (User Datagram Protocol) 6.3 TCP (Transmission Control Protocol) 6. Transport Layer 6-1 6.1 Internet Transport Layer Architecture The

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control

An Evaluation of Deficit Round Robin Fair Queuing Applied in Router Congestion Control JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 18, 333-339 (2002) Short aper An Evaluation of Deficit Round Robin Fair ueuing Applied in Router Congestion Control Department of Electrical Engineering National

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

Scheduling Data Flows using DRR

Scheduling Data Flows using DRR CS/CoE 535 Acceleration of Networking Algorithms in Reconfigurable Hardware Prof. Lockwood : Fall 2001 http://www.arl.wustl.edu/~lockwood/class/cs535/ Scheduling Data Flows using DRR http://www.ccrc.wustl.edu/~praveen

More information

ATM in TCP/IP environment: Adaptations and Effectiveness

ATM in TCP/IP environment: Adaptations and Effectiveness Bremen Institute of Industrial Technology and Applied Work Science ATM in TCP/IP environment: Adaptations and Effectiveness Dipl.-Ing. Kai-Oliver Detken, BIBA ATM Traffic Symposium, Mykonos, Greece, September

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3 HWP2 Application level query routing HWP1 Each peer knows about every other beacon B2 B1 B3 B4 B5 B6 11-Feb-02 Computer Networks 1 HWP2 Query routing searchget(searchkey, hopcount) Rget(host, port, key)

More information

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services 1 Computer network and QoS QoS ATM QoS implementations Integrated Services Differentiated Services Quality of Service (QoS) The data transfer requirements are defined with different QoS parameters + e.g.,

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

Sequence Number. Acknowledgment Number. Data

Sequence Number. Acknowledgment Number. Data CS 455 TCP, Page 1 Transport Layer, Part II Transmission Control Protocol These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make

More information

ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. D. Raychaudhuri & M. Ott

ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. D. Raychaudhuri & M. Ott ECE544 Mid-Term Page ECE 544 Computer Networks II Mid-Term Exam March 29, 2002 Profs. & M. Ott Instructions: This is a 2 hr, OPEN BOOK exam. (Only the textbook, Peterson & Davie, Computer Networks, A Systems

More information

Cell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets

Cell Switching (ATM) Commonly transmitted over SONET other physical layers possible. Variable vs Fixed-Length Packets Cell Switching (ATM) Connection-oriented packet-switched network Used in both WAN and LAN settings Signaling (connection setup) Protocol: Q2931 Specified by ATM forum Packets are called cells 5-byte header

More information

Asynchronous. nous Transfer Mode. Networks: ATM 1

Asynchronous. nous Transfer Mode. Networks: ATM 1 Asynchronous nous Transfer Mode (ATM) Networks: ATM 1 Issues Driving LAN Changes Traffic Integration Voice, video and data traffic Multimedia became the buzz word One-way batch Two-way batch One-way interactive

More information

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets

Performance of Multicast Traffic Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Performance of Coordinator Framework for Bandwidth Management of Real-Time Multimedia over Intranets Chin Hooi Tang, and Tat Chee Wan, Member, IEEE ComSoc. Abstract Quality of Service (QoS) schemes such

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS ATM SWITCHING ATM is a connection-oriented transport concept An end-to-end connection (virtual channel) established prior to transfer of cells Signaling used for connection

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Chapter 3 Packet Switching

Chapter 3 Packet Switching Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination

More information

Adaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997

Adaptation Problems and Solutions. MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 IP-over over-atm: Migrations, Adaptation Problems and Solutions MARCOM 97, Dipl.-Ing. Kai-Oliver Detken, BIBA Bremen, Germany, October the 16th, 1997 Content Introduction of the European ACTS project EIES

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - B COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 20 MIDTERM EXAMINATION #1 - A COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2008-75 minutes This examination document

More information

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A

5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI UNIT I FUNDAMENTALS AND LINK LAYER PART A 5105: BHARATHIDASAN ENGINEERING COLLEGE NATTARMPALLI 635 854. NAME OF THE STAFF : R.ANBARASAN DESIGNATION & DEPARTMENT : AP/CSE SUBJECT CODE : CS 6551 SUBJECT NAME : COMPUTER NETWORKS UNIT I FUNDAMENTALS

More information

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Intersession 2008 Last Name: First Name: Student ID: PLEASE

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION ATM stands for Asynchronous Transfer Mode ATM is a flexible high bandwidth, low delay network technology that is: Capable of handling voice, video and data

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department of Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Stephan Günther

More information

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony

Introduction to VoIP. Cisco Networking Academy Program Cisco Systems, Inc. All rights reserved. Cisco Public. IP Telephony Introduction to VoIP Cisco Networking Academy Program 1 Requirements of Voice in an IP Internetwork 2 IP Internetwork IP is connectionless. IP provides multiple paths from source to destination. 3 Packet

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network

CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network CS610 Computer Network Final Term Papers Solved MCQs with reference by Virtualians Social Network Question No: 1( M a r k s: 1 ) A ---------- Relies on the hardware manufacturer to assign a unique physical

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1

A T M. Cell Switched Technology. not SMDS. Defacto Standard Multimedia capable Use with SONET or SDH. Fixed Length - 53 bytes. DigiPoints Volume 1 A T M Cell Switched Technology Fixed Length - 53 bytes not SMDS Defacto Standard Multimedia capable Use with SONET or SDH SCTE VA 12.1 SONET Optical Carrier (OC) Rates and SDH Synchronous Transport Module

More information

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy)

ATM. Asynchronous Transfer Mode. (and some SDH) (Synchronous Digital Hierarchy) ATM Asynchronous Transfer Mode (and some SDH) (Synchronous Digital Hierarchy) Why use ATM? Circuit switched connections: After initial setup no processing in network nodes Fixed bit rates, fixed time delay

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

OSI Data Link Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Data Link Layer. Network Fundamentals Chapter Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Data Link Layer Network Fundamentals Chapter 7 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission on network

More information

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline

ATM. Asynchronous Transfer Mode. these slides are based on USP ATM slides from Tereza Carvalho. ATM Networks Outline ATM Asynchronous Transfer Mode these slides are based on USP ATM slides from Tereza Carvalho 1 ATM Networks Outline ATM technology designed as a support for ISDN Definitions: STM and ATM Standardization

More information

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK

High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK High bandwidth, Long distance. Where is my throughput? Robin Tasker CCLRC, Daresbury Laboratory, UK [r.tasker@dl.ac.uk] DataTAG is a project sponsored by the European Commission - EU Grant IST-2001-32459

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

Lighting the Blue Touchpaper for UK e-science - Closing Conference of ESLEA Project The George Hotel, Edinburgh, UK March, 2007

Lighting the Blue Touchpaper for UK e-science - Closing Conference of ESLEA Project The George Hotel, Edinburgh, UK March, 2007 Working with 1 Gigabit Ethernet 1, The School of Physics and Astronomy, The University of Manchester, Manchester, M13 9PL UK E-mail: R.Hughes-Jones@manchester.ac.uk Stephen Kershaw The School of Physics

More information

Service-to-Service Mapping of Differentiated Services to the ABR Service of ATM in Edge/Core Networks

Service-to-Service Mapping of Differentiated Services to the ABR Service of ATM in Edge/Core Networks Service-to-Service Mapping of Differentiated Services to the ABR Service of ATM in Edge/Core Networks Deepak Sreenivasamurthy Masters Thesis M.S. Computer Engineering University of Kansas October 22, 1999

More information

Ultra high-speed transmission technology for wide area data movement

Ultra high-speed transmission technology for wide area data movement Ultra high-speed transmission technology for wide area data movement Michelle Munson, president & co-founder Aspera Outline Business motivation Moving ever larger file sets over commodity IP networks (public,

More information

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Lecture 7 Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions? Thursday, September 15 CS 475 Networks - Lecture 7 1 Outline Chapter

More information

Switching / Forwarding

Switching / Forwarding Switching / Forwarding A switch is a device that allows interconnection of links to form larger networks Multi-input, multi-output device Packet switch transfers packets from an input to one or more outputs

More information

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments

Telematics. 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments 19531 - Telematics 5th Tutorial - LLC vs. MAC, HDLC, Flow Control, E2E-Arguments Bastian Blywis Department of Mathematics and Computer Science Institute of Computer Science 18. November, 2010 Institute

More information

Implementation of the hardwired AFDX NIC

Implementation of the hardwired AFDX NIC Implementation of the hardwired AFDX NIC Pusik Park, Hangyun Jung KETI #68 Yatap, Bundang, Seongnam, Gyeonggi, Korea +82-31-789-{7318, 7319} {parksik, junghg}@keti.kr Daekyo Shin, Kitaeg Lim KETI #68 Yatap,

More information

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin,

Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, Fundamental Questions to Answer About Computer Networking, Jan 2009 Prof. Ying-Dar Lin, ydlin@cs.nctu.edu.tw Chapter 1: Introduction 1. How does Internet scale to billions of hosts? (Describe what structure

More information

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing

521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing 521262S Computer Networks 2 (fall 2007) Laboratory exercise #4: Multimedia, QoS and testing Name Student ID Signature In this exercise we will take a little look at the multimedia and Quality of Service

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Comparison Between Ipv4 And Ipv6 Using Opnet Simulator

Comparison Between Ipv4 And Ipv6 Using Opnet Simulator IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 08 (August. 2014), V4 PP 44-50 www.iosrjen.org Comparison Between Ipv4 And Ipv6 Using Opnet Simulator Ghaida

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START MIDTERM EXAMINATION #2 NETWORKING CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R - S c h o o l o f C o m p u t e r S c i e n c e Fall 2011 Question Paper NOTE: Students may take this question

More information

Unicasts, Multicasts and Broadcasts

Unicasts, Multicasts and Broadcasts Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

The Linux ATM software (device driver and utilities) was developed and is supported by Werner Almsberger in Switzerland as part of the Linux-ATM API s

The Linux ATM software (device driver and utilities) was developed and is supported by Werner Almsberger in Switzerland as part of the Linux-ATM API s How to Congure Linux for ATM Networks Wayne Salamon High Performance Systems and Services Division National Institute of Standards and Technology wsalamon@nist.gov June 29, 1998 1 Introduction This article

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

Module 10 Frame Relay and ATM

Module 10 Frame Relay and ATM Module 10 Frame Relay and ATM Lesson 35 ATM: Virtual Path, Virtual Channel. ATM Adaptation Layer (AAL) 10.3.1 VIRTUAL PATH AND VIRTUAL CHANNEL Connection between two endpoints is accomplished through virtual

More information

Implementation of Differentiated Services over ATM

Implementation of Differentiated Services over ATM Implementation of Differentiated s over ATM Torsten Braun, Arik Dasen, and Matthias Scheidegger; Institute of Computer Science and Applied Mathematics, University of Berne, Switzerland Karl Jonas and Heinrich

More information

Migration Strategies for IP Service Growth: Cell-switched MPLS or IP-routed MPLS

Migration Strategies for IP Service Growth: Cell-switched MPLS or IP-routed MPLS White Paper Migration Strategies for IP Service Growth: Cell-switched MPLS or IP-routed MPLS Chuck Semeria Marketing Engineer Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408

More information

LS Example 5 3 C 5 A 1 D

LS Example 5 3 C 5 A 1 D Lecture 10 LS Example 5 2 B 3 C 5 1 A 1 D 2 3 1 1 E 2 F G Itrn M B Path C Path D Path E Path F Path G Path 1 {A} 2 A-B 5 A-C 1 A-D Inf. Inf. 1 A-G 2 {A,D} 2 A-B 4 A-D-C 1 A-D 2 A-D-E Inf. 1 A-G 3 {A,D,G}

More information

Open Source Traffic Analyzer

Open Source Traffic Analyzer Open Source Traffic Analyzer Daniel Turull June 2010 Outline 1 Introduction 2 Background study 3 Design 4 Implementation 5 Evaluation 6 Conclusions 7 Demo Outline 1 Introduction 2 Background study 3 Design

More information

estadium Project Lab 2: Iperf Command

estadium Project Lab 2: Iperf Command estadium Project Lab 2: Iperf Command Objectives Being familiar with the command iperf. In this Lab, we will set up two computers (PC1 and PC2) as an ad-hoc network and use the command iperf to measure

More information

Communication Networks

Communication Networks Communication Networks Spring 2018 Laurent Vanbever nsg.ee.ethz.ch ETH Zürich (D-ITET) April 30 2018 Materials inspired from Scott Shenker & Jennifer Rexford Last week on Communication Networks We started

More information

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015

Multi Protocol Label Switching (an introduction) Karst Koymans. Thursday, March 12, 2015 .. MPLS Multi Protocol Label Switching (an introduction) Karst Koymans Informatics Institute University of Amsterdam (version 4.3, 2015/03/09 13:07:57) Thursday, March 12, 2015 Karst Koymans (UvA) MPLS

More information

please study up before presenting

please study up before presenting HIDDEN SLIDE Summary These slides are meant to be used as is to give an upper level view of perfsonar for an audience that is not familiar with the concept. You *ARE* allowed to delete things you don t

More information

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL

STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL STUDY OF SOCKET PROGRAMMING AND CLIENT SERVER MODEL AIM: To conduct an experiment to demonstrate the working of file transfer with the UDP Server and Client. APPARATUS REQUIRED: PC with network simulation

More information

Using Time Division Multiplexing to support Real-time Networking on Ethernet

Using Time Division Multiplexing to support Real-time Networking on Ethernet Using Time Division Multiplexing to support Real-time Networking on Ethernet Hariprasad Sampathkumar 25 th January 2005 Master s Thesis Defense Committee Dr. Douglas Niehaus, Chair Dr. Jeremiah James,

More information

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy

Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Understanding How Routing Updates and Layer 2 Control Packets Are Queued on an Interface with a QoS Service Policy Document ID: 18664 Contents Introduction Prerequisites Requirements Components Used Conventions

More information

Intermediate Traffic Management

Intermediate Traffic Management Intermediate Traffic Management This presentation has been generated by the ATM Forum for the purpose of educating the public on ATM Technology and the ATM Forum s activities. This presentation is the

More information

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6

Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Comparison of QoS Performance Over WLAN, VoIP4 and VoIP6 Esra Musbah Mohammed Musbah 1 Khalid Hamed Bilal 2 Amin Babiker A./Nabi Mustafa 3 Abstract VoIP stands for voice over internet protocol. It is one

More information

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100

Question Score 1 / 19 2 / 19 3 / 16 4 / 29 5 / 17 Total / 100 NAME: Login name: Computer Science 461 Midterm Exam March 10, 2010 3:00-4:20pm This test has five (5) questions. Put your name on every page, and write out and sign the Honor Code pledge before turning

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

GLOSSARY. See ACL. access control list.

GLOSSARY. See ACL. access control list. GLOSSARY A access control list ACL API Application Programming Interface area AS ASN ATM autonomous system autonomous system number See ACL. access control list. application programming interface. APIs

More information

Lesson 3 Network technologies - Controlling

Lesson 3 Network technologies - Controlling Lesson 3 Network technologies - Controlling Objectives : Network control or traffic engineering is one of the important techniques in the network. Understanding QoS control, traffic engineering and OAM

More information

Configuring MPLS L2VPN

Configuring MPLS L2VPN Contents Configuring MPLS L2VPN 1 MPLS L2VPN overview 1 Basic concepts of MPLS L2VPN 2 Implementation of MPLS L2VPN 2 MPLS L2VPN configuration task list 4 Configuring MPLS L2VPN 5 Configuring CCC MPLS

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica CMU Scott Shenker Xerox PARC Hui Zhang CMU Congestion Control in Today s Internet Rely

More information

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL

Just enough TCP/IP. Protocol Overview. Connection Types in TCP/IP. Control Mechanisms. Borrowed from my ITS475/575 class the ITL Just enough TCP/IP Borrowed from my ITS475/575 class the ITL 1 Protocol Overview E-Mail HTTP (WWW) Remote Login File Transfer TCP UDP RTP RTCP SCTP IP ICMP ARP RARP (Auxiliary Services) Ethernet, X.25,

More information

Queuing Mechanisms. Overview. Objectives

Queuing Mechanisms. Overview. Objectives Queuing Mechanisms Overview Objectives This module describes the queuing mechanisms that can be used on output interfaces. It includes the following topics: Queuing Overview FIFO Queuing Priority Queuing

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information