Using the Imprecise-Computation Technique for Congestion. Control on a Real-Time Trac Switching Element

Size: px
Start display at page:

Download "Using the Imprecise-Computation Technique for Congestion. Control on a Real-Time Trac Switching Element"

Transcription

1 Appeared in Proc. of the Int'l Conf. on Parallel & Distributed Systems, Hsinchu, Taiwan, December 994. Using the Imprecise-Computation Technique for Congestion Control on a Real-Time Trac Switching Element V. Millan-Lopez W. Feng and J. W.-S. Liu c/ Narciso Serra 4, 7A Department of Computer Science 287 Madrid University of Illinois at Urbana-Champaign Spain Urbana, IL 68 Abstract The Broadband Integrated Services Digital Network provides communication services with dierent requirements, including real-time services such as voice and video. Real-time services are aected by the probabilistic behavior of such a network. In particular, when the network becomes congested, the end-to-end packet delay may exceed the maximum allowed. Fortunately, many real-time services are willing to trade service quality for information timeliness. The imprecisecomputation technique, in combination with layered coding schemes, makes this tradeo possible. Introduction Using the asynchronous transfer mode (ATM), Broadband Integrated Services Digital Networks (B- ISDNs) can provide real-time communication services. These services have timing requirements, including end-to-end delay and delay jitter. End-to-end delay is the time interval between the time when a packet is generated by the source and the time when it is delivered to its destination. Delay jitter is the variation in the end-to-end delay. A packet misses its deadline if its end-to-end delay exceeds the maximum allowed value. The end user provides these requirements to the network during the connectionestablishment phase. A new connection is accepted only if there are enough resources to satisfy its requirements with a specied probability while still meeting the requirements of existing connections. Unfortunately, due to the non-deterministic behavior of trac sources, a good connection-acceptance strategy by itself cannot guarantee that all packets will meet their end-to-end delay requirement. Trac peaks can temporarily saturate a switching node, causing network congestion. A consequence of network congestion is the potential failure to meeting timing requirements. This paper presents a congestion-control scheme based on the imprecise-computation technique [] and shows that the scheme is eective in relieving network congestion due to uctuations in real-time trac. Section 2 discusses the applicability of the imprecisecomputation technique to congestion control and the network architecture based on this technique. Section 3 presents the scheduling policy. To assess the eectiveness of our congestion-control scheme, we present simulation results in Section 4. Finally, Section 5 summarizes our work and outlines future work. 2 Congestion-Control Scheme A message containing related information, such as video frames, consists of a number of xed-size packets. To apply the imprecise-computation technique [] to control congestion, we divide the packets in each message into two types: mandatory and optional. The mandatory packets carry the basic-quality portion of the message. When all mandatory packets over a connection are delivered in time, we achieve a reduced level of service quality which is acceptable to the end user. The optional packets carry the extra-quality portion, the additional information needed to achieve fullservice quality. Such a partition of packets can be achieved by using layered coding schemes [2]. Optional packets may be discarded, if necessary, so that the message and other messages can meet their deadlines. Our congestion-control scheme uses a two-level scheduling discipline basic quality versus extra quality. This scheme provides dierent qualities of service to dierent trac classes based on a prioritybased scheduling policy. Several studies have shown that this two-level scheduling discipline is eective in handling overloads in multiprocessor systems and providing ow control in networks [3-5]. While these studies assume that task arrivals are random, our

2 study focuses on real-time messages whose arrivals are periodic. Switching elements are the basic components which make up a B-ISDN network. As a rst step towards evaluating our congestion-control scheme, we focus on the congestion local to a switching element. We assume that the switching element, shown in Figure, is non-blocking and output-queuing. In such a switching element, streams of trac bound to dierent outputs do not interfere with each other. This allows us to focus in on the trac bound to a single output link. Without loss of generality, we restrict our attention to the portion of the switching element consisting of one output buer and its corresponding transmission circuits and output link. We refer to this portion as the output system. Output Buffer Voice Subbuffer Switched Traffic from the Input Links real-time Imprecision Filter Video Subbuffer Transmission Circuits discarded packets Data Subbuffer Scheduler L L Output Link Figure 2: The Output System Input Links L L SWIH L: Line Termination Circuit : Output Buffer : Transmission Circuit Output Links Figure : An Output-Queuing Switching Element Figure 2 shows the structure of the output system [6]. There are three kinds of communication services: videotelephone, telephone, and data transference. Likewise, the output buer is split into three independent subbuers which share the same output link. Each subbuer stores packets of a dierent class: video, voice, and data. The video and voice subbuers are real-time subbuers while the data subbuer is non-real-time. The use of the transmission circuits and the output link by the packets in the subbuers is arbitrated by the scheduler. The imprecision lter is the component that implements the congestioncontrol scheme. 3 Scheduling Policy The delay of a packet through a switching element consists of a constant part and a variable part. The delays introduced by the input-line termination circuit and the switch make up the constant part. Hereafter, we will ignore this part and focus on the variable part: packet delay through the output system the interval of time between the instant when the rst byte of the packet enters the output system and the instant when its last byte is transmitted down the output link (i.e., queuing delay plus packet transmission time). The maximum allowed value for packet delay through the output system is the relative deadline of the packet. Video and voice packets (i.e., real-time packets) have nite relative deadlines. Data packets are considered to be non-real-time, and thus their relative deadlines are theoretically innite; but we want data packets to have short delays on the average. When a connection is established, we assume that the end-to-end scheduling mechanism of the network derives the relative deadline of the packets at each switching element along the connection, based on the maximum allowed end-to-end delay on the connection. At each switching element, we assume that all packets in any trac class have the same relative deadline. This assumption allows us to consider each switching element in isolation. In practice, this assumption is restrictive since a packet may suer a short delay in a switching element and could therefore aord a longer delay in another switching element, and packets on a connection traversing a fewer number of switching elements can aord longer delays at each element. The scheduling policy for the output system is a non-preemptive one (since packet transmission should 2

3 not be interrupted) based on a combination of the earliest-deadline-rst algorithm [7], a periodic-server scheme [8], and the imprecise-computation technique. Whenever the scheduler chooses to send real-time packets, the packet with the nearest absolute deadline among all packets in the real-time subbuers is transmitted. Conicts are resolved on a rst-come- rst-serve (FCFS) basis. Since packets stored in a real-time subbuer all have the same relative deadline and are ordered by arrival time, it follows that they are also ordered by absolute deadline. Consequently, the earliest-deadline-rst algorithm is reduced to choosing the real-time subbuer whose rst available packet has the nearest absolute deadline and therefore can be implemented with negligible run-time overhead. Non-real-time packets in the data subbuer are transmitted on a FCFS basis. To reduce the delay of these packets, a periodic server [8] is used. A periodic server is dened by its period and the percentage of bandwidth that it reserves for non-real-time packets. Given this percentage, the transmission rate of the link, and the period of the server, we can determine the maximum number M of non-real-time trac packets that can be sent during each server period. Non-real-time packets are given higher priority than real-time packets within each server period until M packets have been transmitted or until the data subbuer is empty. After that point, higher priority reverts to real-time packets until the next server period. To distinguish between mandatory and optional packets, the Cell Loss Priority (CLP) bit in the packet header can be used. When the output system becomes congested, the imprecision lter may discard optional packets before they enter the output buer. But once in the output buer, every packet is transmitted regardless of whether its deadline has been missed. There are two reasons for doing this: () keeping late packets relaxes the restrictive condition of having a relative deadline per class, and (2) letting the imprecision lter be the only source of packet loss allows us to isolate the eect of the imprecision mechanism on the quality of real-time communication services. 4 Simulation Experiments To evaluate the eectiveness of the imprecision lter, we simulated the output system using a trac model which assumes that all trac sources use variable bit-rate coding and that packet interarrival time distributions resemble real trac sources. Specically, each videotelephone connection carries video and voice packets at an average bit rate of.28 Mbps and 3 frames per second [9]. Each telephone connection carries voice packets at an average bit rate of kbps (xed bit rate of 64 kbps when the subscriber is speaking) []. Each data-transference connection carries data packets at an average bit rate of Mbps. The bit rates above do not include the overhead due to the header of ATM packets. The parameters used in our experiments are listed in Table. Trac load determines the number of connections that the output system supports. A trac load consists of a background load and a foreground load. Each experiment starts with a background load and then gradually adds connections, as part of the foreground load, until the link reaches full utilization. The background load has 2 videotelephone connections, telephone connections, and 3 data connection, which results in a total link utilization of 37.4%. The foreground load consists of videotelephone connections for a video-predominant trac load and telephone connections for a voice-predominant trac load. To model the worst-case behavior, connections in the foreground trac load are added in phase; that is, the rst packets of all connections arrive at the same time. Trac Output System Parameters Trac Load Relative Deadlines Imprecision Ratio Congestion Threshold Reserved Bandwidth Periodic Server Period Table : Parameters for the Simulation Experiments The relative deadlines parameter, denoted by RD, is a pair of values in milliseconds the relative deadlines of video and voice packets: RD = (RD video ; RD voice ). The imprecision ratio IR is the ratio of the number of mandatory packets to optional packets. The congestion threshold Th is the number of packets in the real-time subbuers above which the output system is said to be congested. The periodic server is dened by its reserved bandwidth and period. We measure the performance of the output system by the miss ratio, loss ratio, and invalid ratio. Miss ratio is the fraction of packets that miss their deadlines, excluding discarded packets. Loss ratio is the fraction of packets that are discarded by the imprecision lter. Invalid ratio is the fraction of packets that are unusable by the receiver, which include late and 3

4 discarded packets. This measure gives us the overall performance of the output system. We also recorded data on link utilization, subbuer occupancy levels, packet delay through the output system, and packetdelay jitter. Due to space limitations, none of the results on buer-occupancy levels and packet-delay jitters are presented here. They can be found in []. For all the results presented here, the 9% condence intervals are negligibly small. 4. Base Experiment Based on the work of [, 2], we set the parameters for our base experiment (BE) to those listed in Table 2. When T h =, no packet is discarded, and hence the imprecision mechanism is not activated. Relative Deadline (,2) Imprecision Ratio / Reserved Bandwidth Periodic Server Period Congestion Threshold f5, 3, 5, 8, g Table 2: Parameters of the Base Experiment We rst ran the base experiment using a videopredominant trac load (BE;ViP). Figures 3 and 4 show the link utilization and loss ratio. The curves for nite values of Th coincide with that for Th = until the loss ratio becomes signicant (i.e., greater than?5, the resolution of the experiments). The number of connections at which this happens, for a given Th, is called the activation point. Beyond the activation points, the imprecision mechanism keeps link utilization relatively constant over a wide range of connections because the number of discarded packets nearly cancels the increase in trac oered to the output system. When nearly all optional packets are discarded, the imprecision mechanism can no longer cancel the increase in trac, and the utilization rises again quickly with the number of connections. Figure 4 shows that the loss ratio does not depend strongly on the congestion threshold Th. Figure 5 shows the mean delay of video packets in terms of packet slots; each slot is the transmission time of a packet. The mean packet delay is smaller for lower congestion thresholds. When the number of connections is low, packet delays are insensitive to increases in the number of connections. We call this at portion of the curves the rst stable region. As the number of connections grows, the delays increase rapidly in the rst unstable region. The border point between the rst stable region and rst unstable region is the rst saturation point. While the curve for Th = remains in the rst unstable region, the curves for nite values of Th reach their activation points and plateau again in the second stable region. Beyond a certain number of connections (i.e., the second saturation point), the delays increase again in their second unstable region. This pattern of stable and unstable regions of the output system is typical for nite values of T h. The mean delay for voice packets, as shown in Figure 6, is slightly higher than video packets because of the higher priorities of video packets due to their generally nearer absolute deadlines. It exhibits the same behavior as the mean delay for video packets as the number of connections increases []. Figure 7 shows the miss ratio of all packets in our base experiment with a video-predominant traf- c load. For Th =, the miss ratio grows linearly with the number of connections. For nite values of Th, the shape of the curves depends strongly on the value of Th. The curves corresponding to Th = 5 and Th = 8 have the typical structure of two stable and two unstable regions. However, the curves for Th = 5 and Th = 3 do not have a rst unstable region; their rst stable region extends to their second saturation points. So, we can obtain very dierent miss-ratio behavior by simply changing the value of Th. This is particularly remarkable since the loss-ratio curves for dierent values of Th are very similar to each other (see Figure 4). Therefore, we conclude that it is possible to signicantly improve the miss ratio at the expense of a slight increment in the loss ratio. Figure 8 shows the invalid ratio of all packets in our base experiment with a video-predominant trac load. By using a smaller congestion threshold, both the packet delay and the number of invalid packets can be kept small []. We repeated the base experiment using a voicepredominant trac load (BE;VoP). Unlike video predominance, we found that the eect of the imprecision mechanism is small. The reason for this dierence between video predominance and voice predominance lies in the structure of the trac. Videotelephone sources periodically generate frames of similar duration. Since the connections in the foreground load are in phase, the frames of all these connections are ready for transmission at the same time. This causes periodic peaks of trac that produce congestion and the consequent activation of the imprecision lter. On the other hand, for telephone connections, the cycles for speech and silence are not periodic and have dif- 4

5 ferent durations. Thus, the trac is more uniformly distributed in time than videotelephone trac. As the number of connections increases, link utilization gets close to unity before the loss ratio begins to be signicant. When it does, the imprecision mechanism cannot stabilize the system as it did when the videopredominant trac load was used. Consequently, all performance measures show only the rst stable and the rst unstable region []. 4.2 Experiments on System Parameters In a series of experiments, we changed each of the system parameters in turn while keeping the other parameters the same as in the base experiment. We rst changed the imprecision ratio of the trac sources to IR = =3. We found that the system behaves as expected. The link utilization for IR = /3 remains constant after the activation point for a wider range of connections than for IR = /. This is due to the fact that more packets can be discarded when IR = /3. The change in the imprecision ratio does not affect the values of the mean packet delay in the second stable region, but it does produce a longer second stable region. This is a consequence of the extended at region of the link utilization. The results on the invalid ratio exhibit the same behavior as when IR = /. Next, we repeated the base experiment but with the relative deadlines set to half their values, RD = (.5,.). Because the values of the relative deadlines do not aect the number of packets discarded by the imprecision lter, the loss ratio and the link utilization in this experiment are the same as in the base experiment. However, the packet delay for video and voice packets are noticeably dierent from those found in the base experiment. The mean delay of video packets is slightly longer for the shorter relative deadlines while for voice packets the opposite is true []. This phenomenon can be explained as follows: The values of the relative deadlines aect the way that real-time packets are scheduled since the earliest-deadline-rst algorithm is used. Suppose that a video packet and a voice packet have just arrived in empty buers. The video packet will be sent rst since its absolute deadline is sooner. Furthermore, subsequent video packets with absolute deadlines nearer than that of the voice packet will be sent rst. Since the ratio of the relative deadlines of video and voice packets is /2, all video packets arriving during an interval of time equal to a half of the relative deadline of the voice packet will be sent before the voice packet. It follows that when the relative deadlines are reduced, the number of video packets that are sent before the voice packets decreases. Thus, the performance of voice packets is improved at the expense of video packets. Similarly, the invalid ratios also dier substantially from those obtained in the base experiment. In fact, the performance obtained by using the congestion threshold Th = 5 for RD = (.5,.) is similar to that of Th = 3 for RD = (.,2.). These results indicate that if we reduce the values of the relative deadlines, we must also lower the congestion threshold to attain the same performance in terms of the invalid ratio. Finally, in the experiment on the congestion threshold (ECT), Figure 9 shows the miss, loss, and invalid ratios for packets of all trac classes when RD = (., 2.). The loss ratio is a monotonically decreasing function of the congestion threshold because fewer packets are discarded when a higher congestion threshold is used. The miss ratio is a monotonically increasing function of the congestion threshold. It shows an extremely abrupt increase at T h = 35 because in this unstable region, a small variation in the number of connections causes a large increase in the subbuer occupancy levels and the packet delays. By slightly decreasing the congestion threshold, we cancel the slight increase in the number of connections that makes the output system enter its rst unstable region. The invalid ratio is determined by two opposing factors, the miss and loss ratios. As we can see in Figure 9, the invalid ratio reaches its minimum value for a congestion threshold of 2. The results of this experiment when RD = (.5,.) again lead us to conclude that when the relative deadlines are shorter, it is necessary to lower the congestion threshold to achieve the same performance in terms of the invalid ratio. 5 Conclusions This paper presented the performance of a congestion-control scheme for an ATM-like switching element, based on the imprecise-computation technique and a priority-based scheduling scheme. Its objective is to reduce the number of packets which miss their deadlines under congestion conditions while guaranteeing a level of quality acceptable to the end users. The experimental results prove that our congestioncontrol scheme is eective. By discarding the optional packets under congestion, the system remains stable for a larger number of connections than if no packets were discarded. This number of connections is even larger if the trac load is bursty in nature. The con- 5

6 gestion threshold allows us to adjust the congestioncontrol scheme to the nature of the trac load. In general, lowering the congestion threshold achieves lower subbuer occupancy, lower packet delays, lower packet-delay jitters, and lower miss ratio. The cost for these benets is a higher loss ratio. Choosing an appropriate congestion threshold can greatly reduce the miss ratio at the expense of a little extra loss ratio. When the number of connections supported by the system is xed, the invalid ratio reaches a minimum for a certain congestion threshold. In the region around the minimum, the invalid ratio is fairly insensitive to the variation of the congestion threshold. In addition, by allowing a larger fraction of optional packets in messages, the system can support an increasing number of connections while still remaining stable but at the cost of a larger number of discarded packets and thus a reduction in the service quality. Two lines of future work are envisioned. First, we will extend the model of the switching element to the entire network, taking into account the interactions and dependencies among dierent switching elements. Second, we will study the complementary problem of using the imprecise-computation technique to develop a strategy for connection acceptance to the network. Acknowledgements This work was supported in part by ONR contract no. N4-J and AFOSR contract no. F References [5] W. Zhao, J. W.-S. Liu, and S. Vrbsky. Imprecise scheduling in multiprocessor systems. In Proceedings of the 5th IEEE International Conference on Parallel and Distributed Computing Systems, September 992. [6] J. M. Hyman, A. A. Lazar, and G. Pacici. Real-time scheduling with quality of service constraints. IEEE Journal on Selected Areas in Communications, 9(7), September 99. [7] C. L. Liu and J. W. Layland. Scheduling algorithms for multiprogramming in a hard realtime environment. Journal of the Association for Computing Machinery, 2():46{6, January 979. [8] J. P. Lehoczky, L. Sha, and J. Strosnider. Enhancing aperiodic responsiveness in a hard-realtime environment. In Proceedings of 8th IEEE Real-Time Systems Symposium, pages 26{27, December 987. [9] E. A. Fox. Advance in interactive digital multimedia system. IEEE Computer, pages 9{2, October 99. [] P. T. Brady. A statistical analysis of on-o patterns in 6 conversations. The Bell System Technical Journal, January 968. [] V. M. Millan-Lopez. A congestion control scheme for a real-time trac switching element using the imprecise computations technique. Master's thesis, Department of Computer Science, University of Illinois at Urbana-Champaign, 993. [2] D. Ferrari. Client requirements for real-time communication services. Technical Report TR-9-7, International Computer Science Institute, Berkeley, March 99. [] J. W.-S. Liu, K.-J. Lin, W.-K. Shih, A. C.-S. Yu, J.-Y. Chung, and W. Zhao. Algorithms for scheduling imprecise computations. IEEE Computer, 24(5):58{68, May 99. [2] Y.-Q. Zhang, W. W. Wu, K. S. Kim, R. L. Pickholtz, and J. Ramasastry. Variable-bit-rate video tranmission in the broadband-isdn environment. IEEE, 99. [3] T. Bially, B. Gold, and S. Sene. A technique for adaptive voice ow control in integrated packet networks. IEEE Transactions on Communications, COM-28(7):325{333, March 98. [4] B. G. Kim and D. Towsley. Dynamic ow control protocols for packet-switching multiplexers serving real-time multipacket messages. IEEE Transactions on Communications, COM-34(4), April 986. Utilization Link Utilization.65 Figure 3: Link Utilization (BE;ViP). 6

7 .5 Loss Ratio.9 Miss Ratio Loss Ratio Miss Ratio.6.5. Figure 4: Loss Ratio for All Packets (BE;ViP). Figure 7: Miss Ratio for All Packets (BE;ViP). Mean Delay of Video Packets.9 Invalid Ratio.8 Number of Packet Slots Video Relative Deadline Invalid Ratio Figure 5: Mean Delay of Video Packets (BE;ViP). Figure 8: Invalid Ratio for All Packets (BE;ViP). Mean Delay of Voice Packets.7.6 Miss, Loss, and Invalid Ratios Number of Packet Slots Voice Relative Deadline Ratio.5. Miss Ratio Loss Ratio Invalid Ratio Congestion Threshold Figure 6: Mean Delay of Voice Packets (BE;VoP). Figure 9: Miss, Loss, and Invalid Ratios for All Packets (ECT;ViP;RD = (., 2.)). 7

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988 SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS BY IAN RAMSAY PHILP B.S., University of North Carolina at Chapel Hill, 1988 M.S., University of Florida, 1990 THESIS Submitted in partial fulllment

More information

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science MDP Routing in ATM Networks Using the Virtual Path Concept 1 Ren-Hung Hwang, James F. Kurose, and Don Towsley Department of Computer Science Department of Computer Science & Information Engineering University

More information

Performance Comparison Between AAL1, AAL2 and AAL5

Performance Comparison Between AAL1, AAL2 and AAL5 The University of Kansas Technical Report Performance Comparison Between AAL1, AAL2 and AAL5 Raghushankar R. Vatte and David W. Petr ITTC-FY1998-TR-13110-03 March 1998 Project Sponsor: Sprint Corporation

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

On the Use of Multicast Delivery to Provide. a Scalable and Interactive Video-on-Demand Service. Kevin C. Almeroth. Mostafa H.

On the Use of Multicast Delivery to Provide. a Scalable and Interactive Video-on-Demand Service. Kevin C. Almeroth. Mostafa H. On the Use of Multicast Delivery to Provide a Scalable and Interactive Video-on-Demand Service Kevin C. Almeroth Mostafa H. Ammar Networking and Telecommunications Group College of Computing Georgia Institute

More information

THROUGHPUT IN THE DQDB NETWORK y. Shun Yan Cheung. Emory University, Atlanta, GA 30322, U.S.A. made the request.

THROUGHPUT IN THE DQDB NETWORK y. Shun Yan Cheung. Emory University, Atlanta, GA 30322, U.S.A. made the request. CONTROLLED REQUEST DQDB: ACHIEVING FAIRNESS AND MAXIMUM THROUGHPUT IN THE DQDB NETWORK y Shun Yan Cheung Department of Mathematics and Computer Science Emory University, Atlanta, GA 30322, U.S.A. ABSTRACT

More information

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar Simulation of an ATM{FDDI Gateway Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar milind@dworkin.wustl.edu kapoor@dworkin.wustl.edu guru@flora.wustl.edu (314) 935-4203 (314) 935 4203 (314) 935-4621

More information

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois Dynamic Multi-Path Communication for Video Trac Hao-hua Chu, Klara Nahrstedt Department of Computer Science University of Illinois h-chu3@cs.uiuc.edu, klara@cs.uiuc.edu Abstract Video-on-Demand applications

More information

A New Theory of Deadlock-Free Adaptive. Routing in Wormhole Networks. Jose Duato. Abstract

A New Theory of Deadlock-Free Adaptive. Routing in Wormhole Networks. Jose Duato. Abstract A New Theory of Deadlock-Free Adaptive Routing in Wormhole Networks Jose Duato Abstract Second generation multicomputers use wormhole routing, allowing a very low channel set-up time and drastically reducing

More information

Rate-Controlled Static-Priority. Hui Zhang. Domenico Ferrari. hzhang, Computer Science Division

Rate-Controlled Static-Priority. Hui Zhang. Domenico Ferrari. hzhang, Computer Science Division Rate-Controlled Static-Priority Queueing Hui Zhang Domenico Ferrari hzhang, ferrari@tenet.berkeley.edu Computer Science Division University of California at Berkeley Berkeley, CA 94720 TR-92-003 February

More information

PDQRAP - Prioritized Distributed Queueing Random Access Protocol. DQRAP Research Group Report 93-2

PDQRAP - Prioritized Distributed Queueing Random Access Protocol. DQRAP Research Group Report 93-2 PDQRAP - Prioritized Distributed Queueing Random Access Protocol Harn-Jier Lin Graham Campbell Computer Science Dept. Illinois Institute of Technology Chicago IL, 60616 DQRAP Research Group Report 93-2

More information

Stability in ATM Networks. network.

Stability in ATM Networks. network. Stability in ATM Networks. Chengzhi Li, Amitava Raha y, and Wei Zhao Abstract In this paper, we address the issues of stability in ATM networks. A network is stable if and only if all the packets have

More information

IBM Almaden Research Center, at regular intervals to deliver smooth playback of video streams. A video-on-demand

IBM Almaden Research Center, at regular intervals to deliver smooth playback of video streams. A video-on-demand 1 SCHEDULING IN MULTIMEDIA SYSTEMS A. L. Narasimha Reddy IBM Almaden Research Center, 650 Harry Road, K56/802, San Jose, CA 95120, USA ABSTRACT In video-on-demand multimedia systems, the data has to be

More information

Communication Networks

Communication Networks Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency

More information

Multimedia Applications Require Adaptive CPU Scheduling. Veronica Baiceanu, Crispin Cowan, Dylan McNamee, Calton Pu, and Jonathan Walpole

Multimedia Applications Require Adaptive CPU Scheduling. Veronica Baiceanu, Crispin Cowan, Dylan McNamee, Calton Pu, and Jonathan Walpole Multimedia Applications Require Adaptive CPU Scheduling Veronica Baiceanu, Crispin Cowan, Dylan McNamee, Calton Pu, and Jonathan Walpole Department of Computer Science and Engineering Oregon Graduate Institute

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Stop-and-Go Service Using Hierarchical Round Robin

Stop-and-Go Service Using Hierarchical Round Robin Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows

More information

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

V 1. volume. time. t 1

V 1. volume. time. t 1 On-line Trac Contract Renegotiation for Aggregated Trac R. Andreassen and M. Stoer a a Telenor AS, P.O.Box 83, 2007 Kjeller, Norway. Email: fragnar.andreassen, mechthild.stoerg@fou.telenor.no Consider

More information

Wireless Networks. Communication Networks

Wireless Networks. Communication Networks Wireless Networks Communication Networks Types of Communication Networks Traditional Traditional local area network (LAN) Traditional wide area network (WAN) Higher-speed High-speed local area network

More information

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom

2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Scheduling Periodic and Aperiodic. John P. Lehoczky and Sandra R. Thuel. and both hard and soft deadline aperiodic tasks using xed-priority methods.

Scheduling Periodic and Aperiodic. John P. Lehoczky and Sandra R. Thuel. and both hard and soft deadline aperiodic tasks using xed-priority methods. Chapter 8 Scheduling Periodic and Aperiodic Tasks Using the Slack Stealing Algorithm John P. Lehoczky and Sandra R. Thuel This chapter discusses the problem of jointly scheduling hard deadline periodic

More information

(Refer Slide Time: 2:20)

(Refer Slide Time: 2:20) Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture -23 X.25 and Frame Relay Hello and welcome to today s lecture on X.25 and

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

Connection Admission Control for Hard Real-Time Communication in ATM Networks

Connection Admission Control for Hard Real-Time Communication in ATM Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Connection Admission Control for Hard Real-Time Communication in ATM Networks Qin Zheng, Tetsuya Yokotani, Tatsuki Ichihashi, Yasunoni Nemoto

More information

A Modified Maximum Urgency First Scheduling Algorithm for Real-Time Tasks

A Modified Maximum Urgency First Scheduling Algorithm for Real-Time Tasks Vol:, o:9, 2007 A Modified Maximum Urgency irst Scheduling Algorithm for Real-Time Tasks Vahid Salmani, Saman Taghavi Zargar, and Mahmoud aghibzadeh International Science Index, Computer and Information

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS ATM SERVICE CATEGORIES Service Categories : represent particular combinations of traffic parameters and QoS parameters. These parameters are determined by users for a

More information

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder Real-Time Message Transmission Over The Scalable Coherent Interface (SCI) Lei Jiang Sarit Mukherjee Dept. of Computer Science & Engg. University of Nebraska-Lincoln Lincoln, NE 68588-0115 Email: fljiang,

More information

AAL2 Transmitter Simulation Study: Revised

AAL2 Transmitter Simulation Study: Revised The University of Kansas Technical Report AAL2 Transmitter Simulation Study: Revised Prema Sampath, Raghushankar R. Vatte, and David W. Petr ITTC-FY1998-TR-13110-01 March 1998 Project Sponsor: Sprint Corporation

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

MAINTAINING HIGH THROUGHPUT. Jonathan S. Turner. Washington University. be used to make routing and call acceptance decisions

MAINTAINING HIGH THROUGHPUT. Jonathan S. Turner. Washington University. be used to make routing and call acceptance decisions MAINTAINING HIGH THROUGHPUT DURING OVERLOAD IN ATM SWITCHES Jonathan S. Turner Washington University jst@cs.wustl.edu Abstract This paper analyzes two popular heuristics for ensuring packet integrity inatm

More information

The University of Kansas

The University of Kansas The University of Kansas Technical Report Rapidly Deployable Radio Network ATM/IP Analysis Gary J. Minden, Joseph B. Evans Information & Telecommunication Technology Center Department of Electrical Engineering

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS

ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS ANALYSIS OF THE CORRELATION BETWEEN PACKET LOSS AND NETWORK DELAY AND THEIR IMPACT IN THE PERFORMANCE OF SURGICAL TRAINING APPLICATIONS JUAN CARLOS ARAGON SUMMIT STANFORD UNIVERSITY TABLE OF CONTENTS 1.

More information

Adaptive Methods for Distributed Video Presentation. Oregon Graduate Institute of Science and Technology. fcrispin, scen, walpole,

Adaptive Methods for Distributed Video Presentation. Oregon Graduate Institute of Science and Technology. fcrispin, scen, walpole, Adaptive Methods for Distributed Video Presentation Crispin Cowan, Shanwei Cen, Jonathan Walpole, and Calton Pu Department of Computer Science and Engineering Oregon Graduate Institute of Science and Technology

More information

Allowing Cycle-Stealing Direct Memory Access I/O. Concurrent with Hard-Real-Time Programs

Allowing Cycle-Stealing Direct Memory Access I/O. Concurrent with Hard-Real-Time Programs To appear in: Int. Conf. on Parallel and Distributed Systems, ICPADS'96, June 3-6, 1996, Tokyo Allowing Cycle-Stealing Direct Memory Access I/O Concurrent with Hard-Real-Time Programs Tai-Yi Huang, Jane

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Number of bits in the period of 100 ms. Number of bits in the period of 100 ms. Number of bits in the periods of 100 ms

Number of bits in the period of 100 ms. Number of bits in the period of 100 ms. Number of bits in the periods of 100 ms Network Bandwidth Reservation using the Rate-Monotonic Model Sourav Ghosh and Ragunathan (Raj) Rajkumar Real-time and Multimedia Systems Laboratory Department of Electrical and Computer Engineering Carnegie

More information

Numerical Evaluation of Hierarchical QoS Routing. Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar. Computer Science Department and UMIACS

Numerical Evaluation of Hierarchical QoS Routing. Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar. Computer Science Department and UMIACS Numerical Evaluation of Hierarchical QoS Routing Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar Computer Science Department and UMIACS University of Maryland, College Park CS-TR-395 April 3, 1998

More information

9. D. Tse, R. Gallager, and J. Tsitsiklis. Statistical multiplexing of multiple timescale

9. D. Tse, R. Gallager, and J. Tsitsiklis. Statistical multiplexing of multiple timescale 9. D. Tse, R. Gallager, and J. Tsitsiklis. Statistical multiplexing of multiple timescale markov streams. Preprint. 10. J.S. Turner. Managing Bandwidth in ATM Networks with Bursty Trac. IEEE Network Magazine,

More information

Multimedia Traffic Management and Congestion Control in Satellite ATM Networks

Multimedia Traffic Management and Congestion Control in Satellite ATM Networks Multimedia Traffic Management and Congestion Control in Satellite ATM Networks by S. Annukka Piironen Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center Ecient Buer Sharing in Shared Memory ATM Systems With Space Priority Trac Rajarshi Roy and Shivendra S Panwar y Center for Advanced Technology in Telecommunications Polytechnic University 6 Metrotech Center

More information

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang Department of Electrical & Electronic Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong

More information

REAL-TIME SCHEDULING FOR DEPENDABLE MULTIMEDIA TASKS IN MULTIPROCESSOR SYSTEMS

REAL-TIME SCHEDULING FOR DEPENDABLE MULTIMEDIA TASKS IN MULTIPROCESSOR SYSTEMS REAL-TIME SCHEDULING FOR DEPENDABLE MULTIMEDIA TASKS IN MULTIPROCESSOR SYSTEMS Xiao Qin Liping Pang Zongfen Han Shengli Li Department of Computer Science, Huazhong University of Science and Technology

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

A QoS aware Packet Scheduling Scheme for WiMAX

A QoS aware Packet Scheduling Scheme for WiMAX A QoS aware Packet Scheduling Scheme for WiMAX Mahasweta Sarkar and Harpreet Sachdeva ABSTRACT WiMAX is one of the most promising broadband wireless technologies today. The WiMAX standard-802.16-is designed

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

QoS metrics and requirements

QoS metrics and requirements QoS metrics and requirements Lectured by Alexander Pyattaev Department of Communications Engineering Tampere University of Technology alexander.pyattaev@tut.fi March 5, 2012 Outline 1 Introduction 2 Performance

More information

cell rate bandwidth exploited by ABR and UBR CBR and VBR time

cell rate bandwidth exploited by ABR and UBR CBR and VBR time DI TECH.REP RT97-224 1 A comparison of and to support TCP trac Sam Manthorpe and Jean-Yves Le Boudec Abstract This paper compares the performance of and for providing high-speed network interconnection

More information

Analytical Modeling of Routing Algorithms in. Virtual Cut-Through Networks. Real-Time Computing Laboratory. Electrical Engineering & Computer Science

Analytical Modeling of Routing Algorithms in. Virtual Cut-Through Networks. Real-Time Computing Laboratory. Electrical Engineering & Computer Science Analytical Modeling of Routing Algorithms in Virtual Cut-Through Networks Jennifer Rexford Network Mathematics Research Networking & Distributed Systems AT&T Labs Research Florham Park, NJ 07932 jrex@research.att.com

More information

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations.

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations. A Framework for Embedded Real-time System Design? Jin-Young Choi 1, Hee-Hwan Kwak 2, and Insup Lee 2 1 Department of Computer Science and Engineering, Korea Univerity choi@formal.korea.ac.kr 2 Department

More information

ATM Traffic Control Based on Cell Loss Priority and Performance Analysis

ATM Traffic Control Based on Cell Loss Priority and Performance Analysis ENSC 833-3 : NETWORK PROTOCOLS AND PERFORMANCE FINAL PROJECT PRESENTATION Spring 2001 ATM Traffic Control Based on Cell Loss Priority and Performance Analysis Shim, Heung-Sub Shim_hs@hanmail.net Contents

More information

Jon M. Peha and Fouad A. Tobagi. Abstract. Applications with diverse performance objectives must be supported on a single packet-switched

Jon M. Peha and Fouad A. Tobagi. Abstract. Applications with diverse performance objectives must be supported on a single packet-switched IEEE Transactions on Communications, Vol. 44, No. 2, Feb. 1996, pp. 192-202. Cost-Based Scheduling and Dropping Algorithms To Support Integrated Services 1 Jon M. Peha and Fouad A. Tobagi Abstract Applications

More information

MPLS/RSVP-TE-BASED FUTURE UMTS RADIO ACCESS NETWORK

MPLS/RSVP-TE-BASED FUTURE UMTS RADIO ACCESS NETWORK 12th GI/ITG CONFERENCE ON MEASURING, MODELLING AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS 3rd POLISH-GERMAN TELETRAFFIC SYMPOSIUM MPLS/RSVP-TE-BASED FUTURE UMTS RADIO ACCESS NETWORK René Böringer*,

More information

Trace Traffic Integration into Model-Driven Simulations

Trace Traffic Integration into Model-Driven Simulations Trace Traffic Integration into Model-Driven Simulations Sponsor: Sprint Kert Mezger David W. Petr Technical Report TISL-10230-10 Telecommunications and Information Sciences Laboratory Department of Electrical

More information

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Suriti Gupta College of Technology and Engineering Udaipur-313001 Vinod Kumar College of Technology and Engineering Udaipur-313001

More information

An Enhanced Dynamic Packet Buffer Management

An Enhanced Dynamic Packet Buffer Management An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared

More information

Improving TCP Throughput over. Two-Way Asymmetric Links: Analysis and Solutions. Lampros Kalampoukas, Anujan Varma. and.

Improving TCP Throughput over. Two-Way Asymmetric Links: Analysis and Solutions. Lampros Kalampoukas, Anujan Varma. and. Improving TCP Throughput over Two-Way Asymmetric Links: Analysis and Solutions Lampros Kalampoukas, Anujan Varma and K. K. Ramakrishnan y UCSC-CRL-97-2 August 2, 997 Board of Studies in Computer Engineering

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

A Real-Time Network Simulation Application for Multimedia over IP

A Real-Time Network Simulation Application for Multimedia over IP A Real-Time Simulation Application for Multimedia over IP ABSTRACT This paper details a Secure Voice over IP (SVoIP) development tool, the Simulation Application (Netsim), which provides real-time network

More information

Optimistic Implementation of. Bulk Data Transfer Protocols. John B. Carter. Willy Zwaenepoel. Rice University. Houston, Texas.

Optimistic Implementation of. Bulk Data Transfer Protocols. John B. Carter. Willy Zwaenepoel. Rice University. Houston, Texas. Optimistic Implementation of Bulk Data Transfer Protocols John B. Carter Willy Zwaenepoel Department of Computer Science Rice University Houston, Texas Abstract During a bulk data transfer over a high

More information

Improved Collision Resolution Algorithms for Multiple Access Channels with Limited Number of Users * Chiung-Shien Wu y and Po-Ning Chen z y Computer a

Improved Collision Resolution Algorithms for Multiple Access Channels with Limited Number of Users * Chiung-Shien Wu y and Po-Ning Chen z y Computer a Improved Collision Resolution Algorithms for Multiple Access Channels with Limited Number of Users * Chiung-Shien Wu y and Po-Ning Chen z y Computer and Communication Research Labs. ITRI, Hsinchu, Taiwan

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Fixed-Length Packets versus Variable-Length Packets. in Fast Packet Switching Networks. Andrew Shaw. 3 March Abstract

Fixed-Length Packets versus Variable-Length Packets. in Fast Packet Switching Networks. Andrew Shaw. 3 March Abstract Fixed-Length Packets versus Variable-Length Packets in Fast Packet Switching Networks Andrew Shaw 3 March 1994 Abstract Fast Packet Switching (FPS) networks are designed to carry many kinds of trac, including

More information

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dongkun Shin Jihong Kim School of CSE School of CSE Seoul National University Seoul National University Seoul, Korea

More information

Lecture (05) Network interface Layer media & switching II

Lecture (05) Network interface Layer media & switching II Lecture (05) Network interface Layer media & switching II By: ElShafee ١ Agenda Circuit switching technology (cont,..) Packet switching technique Telephone network ٢ Circuit switching technology (cont,..)

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax:

Consistent Logical Checkpointing. Nitin H. Vaidya. Texas A&M University. Phone: Fax: Consistent Logical Checkpointing Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3112 hone: 409-845-0512 Fax: 409-847-8578 E-mail: vaidya@cs.tamu.edu Technical

More information

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst

An Evaluation of Information Retrieval Accuracy. with Simulated OCR Output. K. Taghva z, and J. Borsack z. University of Massachusetts, Amherst An Evaluation of Information Retrieval Accuracy with Simulated OCR Output W.B. Croft y, S.M. Harding y, K. Taghva z, and J. Borsack z y Computer Science Department University of Massachusetts, Amherst

More information

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Yuhua Chen Jonathan S. Turner Department of Electrical Engineering Department of Computer Science Washington University Washington University

More information

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi

More information

Module 10 Frame Relay and ATM

Module 10 Frame Relay and ATM Module 10 Frame Relay and ATM 10.0 INTRODUCTION Multimedia is basically a heterogeneous service which is characterized by different traffic types and variable bandwidths. Specifically Video bandwidth has

More information

A New Optical Burst Switching Protocol for Supporting. Quality of Service. State University of New York at Bualo. Bualo, New York ABSTRACT

A New Optical Burst Switching Protocol for Supporting. Quality of Service. State University of New York at Bualo. Bualo, New York ABSTRACT A New Optical Burst Switching Protocol for Supporting Quality of Service Myungsik Yoo y and Chunming Qiao z y Department of Electrical Engineering z Department of Computer Science and Engineering State

More information

T H. Runable. Request. Priority Inversion. Exit. Runable. Request. Reply. For T L. For T. Reply. Exit. Request. Runable. Exit. Runable. Reply.

T H. Runable. Request. Priority Inversion. Exit. Runable. Request. Reply. For T L. For T. Reply. Exit. Request. Runable. Exit. Runable. Reply. Experience with Real-Time Mach for Writing Continuous Media Applications and Servers Tatsuo Nakajima Hiroshi Tezuka Japan Advanced Institute of Science and Technology Abstract This paper describes the

More information

Switched Multi-hop Priority Queued Networks Influence of priority levels on Soft Real-time Performance

Switched Multi-hop Priority Queued Networks Influence of priority levels on Soft Real-time Performance Technical Report, IDE1044, June 2010 Switched Multi-hop Priority Queued Networks Influence of priority levels on Soft Real-time Performance Master s Programme in Computer Systems Engineering Submitted

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Multimedia Networking. Network Support for Multimedia Applications

Multimedia Networking. Network Support for Multimedia Applications Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING

UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING 1 UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING Syllabus: Physical layer and overview of PL Switching: Multiplexing: frequency division multiplexing, wave length division multiplexing, synchronous

More information

Chapter 10. Circuits Switching and Packet Switching 10-1

Chapter 10. Circuits Switching and Packet Switching 10-1 Chapter 10 Circuits Switching and Packet Switching 10-1 Content Switched communication networks Circuit switching networks Circuit-switching concepts Packet-switching principles X.25 (mentioned but not

More information

Real-Time Scalability of Nested Spin Locks. Hiroaki Takada and Ken Sakamura. Faculty of Science, University of Tokyo

Real-Time Scalability of Nested Spin Locks. Hiroaki Takada and Ken Sakamura. Faculty of Science, University of Tokyo Real-Time Scalability of Nested Spin Locks Hiroaki Takada and Ken Sakamura Department of Information Science, Faculty of Science, University of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo 113, Japan Abstract

More information

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems

Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems Worst-Case Utilization Bound for EDF Scheduling on Real-Time Multiprocessor Systems J.M. López, M. García, J.L. Díaz, D.F. García University of Oviedo Department of Computer Science Campus de Viesques,

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Real-time communication scheduling in a multicomputer video. server. A. L. Narasimha Reddy Eli Upfal. 214 Zachry 650 Harry Road.

Real-time communication scheduling in a multicomputer video. server. A. L. Narasimha Reddy Eli Upfal. 214 Zachry 650 Harry Road. Real-time communication scheduling in a multicomputer video server A. L. Narasimha Reddy Eli Upfal Texas A & M University IBM Almaden Research Center 214 Zachry 650 Harry Road College Station, TX 77843-3128

More information