A Study of Adaptive Rate Algorithm in ATM Network Flow Control

Size: px
Start display at page:

Download "A Study of Adaptive Rate Algorithm in ATM Network Flow Control"

Transcription

1 A Study of Adaptive Rate Algorithm in ATM Network Flow Control Surasee Prahmkaew and Chanintorn Jittawiriyanukoon Faculty of Science and Technology Assumption University, Bangkok, Thailand Abstract In this paper we present a flow control algorithm designed to improve the performance of ATM network and to gain higher throughput by guaranteeing negotiated cell loss ratio (CLR) for all cell streams passing through the usage parameter control (UPC). In particular, the cases in which a Tahoe, Reno, New Reno, and SACK schemes are applicable in peak-cell-rate (PCR) are discussed. The proposed algorithm improves the performance by adjusting the growth and the declination of window size, rather than using advertised window per se, by means of incoming traffic rate, number of cell drop, current window size and cell delay time. Several simulations are performed to study how different kinds of flow control algorithm behave when congestion existed and compared to our proposed algorithm. By varying advertised windows size in each algorithm, we can obtain the impressive results that support our algorithm. Keywords: Flow control algorithm, cell loss ratio (CLR), usage parameter control (UPC) Tahoe, Reno, New Reno, SACK, sliding window. Introduction The Asynchronous Transfer Mode (ATM) can provide a variety of services using a unified interface and architecture. In ATM networks, information is segmented into fixed-sized blocked called cells and the necessary number of cells is transmitted for the amount of information in the network. Therefore, the traffic control methods (Allman, et al. 1999) used in other existing transfer modes is not applicable to ATM networks. The principle of ATM traffic flow control should be simple. At connection setup, the user specifies both Quality of Service (QoS) requirements and, using a source traffic descriptor (Shioda and Saito 1997), the anticipated traffic characteristic of the connection. Network resources for the connection are assigned on the basis of the source traffic descriptor values and the QoS requirements. If there are not enough network resources, the connection is rejected. If the characteristics do not conform with the source traffic descriptor specified at the connection set up by monitoring the cell stream from the connection. If the characteristics do not conform, a penalty is imposed on the connection, e.g. some cells from the connection may be discarded. To simplify traffic flow control specification base on best QoS requirements and monitoring by the network, the traffic descriptors are required to be observable and easily checked through some algorithm mechanisms. In this sense, the specification of, and the resources allocation based on, the best traffic pattern have recently become a key issue for ATM traffic control. There are many previous studies consideration in flow control algorithms (Pakdeepinit and Jittawiriyanukoon 22); the behavior of each flow control schemes (Rathgeb 11) with varying advertised windows sizes is not mentioned as well. In this paper, we proposed an algorithm that improves the performance of ATM network by adjusting the growth and declination of flow control 69

2 window sizes. Besides our proposed algorithm and four existing flow control schemes that are Tahoe, Reno, New Reno, and SACK (Leerujikul and Jittawiriyanukoon 23) are discussed. Finally, the performance evaluation, especially in term of throughput, number of cells loss, mean time in queue, mean queue length and utilization of ATM link, between different types of these algorithms and our proposed algorithm is compared. Background The existing congestion avoidance algorithms are discussed first. Tahoe algorithm includes Slow Start, Congestion Avoidance, and Fast Retransmit. The Reno implementation is the enhancement to Tahoe by modifying the Fast Retransmit operation to include Fast Recovery. Selective Acknowledgments (SACK) has been proposed to efficiently recover from multiple segment losses. It sends duplicate ACKs (SACKs) acknowledging the out-oforder segments it has received. From these SACKs, the sender can reconstruct information about the segments not received at the destination. Further details can be found in (Matthew, et al. 1996; Kevin and Sally 1996; and Yang 2). Adaptive Rate Control (ARC) and Proposed Algoritm Consider the Tahoe, Reno and New Reno, and SACK when the burst traffic occurred either in a short or long time situations. They started advertised windows size form 1 to maximum windows size. It is increased by 1 (slow-start technique) for very successful transmission. When the window is filled up to the maximum of setting, most of input traffic would be discarded or tagged for the reason of exceeding the capacity of finite window size. When this situation occurred, most of window size will start at congestion window (cwnd) size (recovery technique). Cwnd always set equal to 1 for Tahoe, half of maximum windows size for Reno, New Reno and up to multiple loss for SACK. Unlike the ARC proposed solution in alleviating the number of cells would shrink and expand the window size by automatic adjusting the windows size base on source rate, cells drop, and cells delay. With ARC algorithm, it works like a gate to control the arriving cells. When a cell arrives at the system and if a cell drop is not present, the cell is transmitted without delay. If cell drop is present, the dropped cell will be blocked in a cell queue (Q c ) and waiting to retransmit when ARC finishes adjusting the new windows size in order to overcome the cells drop. At the same time to maintain quality of service (QoS), the maximum cell delay time has been defined as CDVT that means the cells have been waiting in the cell queue longer than CDVT will be discarded finally. Fig. 1 illustrates the above situation according to the cell arriving process, two states of problem for ARC. Source rate ( λa ) Apply flow control (Tahoe, Reno, New Reno, Sack and ARC) Cell queue length (Qc) Non- conforming window size (1- Max_size) Fig. 1. Flow control In case that the arrival traffic (average arrival cell rate or traffic ( λ a ) is less than the cell drop rate (λ p ) and cell drop is not yet present. ARC will set window size to be one (the minimum size). In other hand, if (λ a ) is larger than (λ p ), ARC will adjust the window size regarding to cell drop rate (λ p ) and arrival traffic rate (λ a ). ARC will adjust the window size between one and three (the maximum size based on analytical model shown in Fig. 2). ARC algorithm is described as follows: Leak rate (λp) 7

3 Procedure calculate window size Find out current allocation rate (Ai) Input Traffic UPC Dropped cells Input buffer ATM Frabric Mbps Departing cells Output buffer Interface Find out current window size (Wi) do while cell is transmitting { if cell drop is found then { calculate new allocation rate current allocation rate = new allocation rate Input Traffic Input Traffic Departing cells UPC ARC ATM Frabric Mbps Output buffer Interface Dropped cells Departing cells UPC ATM Mbps Frabric Output buffer Interface Dropped cells Fig. 2. Simulation model calculate new windows size current window size = new window size } else no cell drop is found then { current allocation rate = current allocation rate current window size = current window size } } end_do where : Find current allocate rate (Ai) Source _ rate = WindowSize * Cellsize ( Cell _ drop * Cell _ delay _ time) Cell delay_time = cell traveling time between source to destination Find current window size (Wi) WindowSize = Bandwith* Cell_ delay_ time [8] Simulation Model Fig. 2 shows a simulation model used in this paper. A. Input Traffic The telecommunications traffic can be basically classified into five categories: data, voice, video, image and graphics (Al-Wakeel, et al. 1999). This research confines the discussion to mainly data, voice and video. Data sources are generally bursty in nature whereas, voice and video sources can be continuous or bursty, depending on the compression and coding techniques used. Continuous sources are said to generate constant bit rate (CBR) traffic and bursty sources are said to generate variable bit rate (VBR) (Kouvatsos 1995) traffic. Hence, only VBR traffic will be considered as an input for the study. B. Characteristics of a Queuing Network Model There are three components that have certain characteristics that must be examined before the simulation model is developed. 1. Arrival Characteristic: The pattern of arrival input traffic is mostly characterized to be Poisson arrival processes (Khoshnevis 1994). Like many random events, Poisson arrivals occur such that for each increment of time (T), no matter how large or small, the probability of arrival is independent of any previous history. These events may be individual cells, a burst of cells, cell or packet service completions, or other arbitrary events. The probability of the inter-arrival time between event t, is defined by the inter-arrival time probability density function (pdf). The following formula gives the resulting probability density function (pdf), which the inter-arrival time t is larger than some value x when the average arrival rate is λ events per second: 71

4 e fx( t) =, λt, for for p( t x) = Fx( x) = x t t < e λx x p( t > x) = 1 Fx( x) = λe λ dx = 1 λe λx Queuing theorists call Poisson arrivals a memory-less process, because the probability that the inter-arrival time will be X seconds is independent of the memory of how much time has already expired. The formula of memoryless process is shown accordingly: λs P( x > s + t X > t) = P( X > s) = e, for s t > This fact greatly simplifies the analysis of random processes since no past history, or memory, affects the processes commonly known as Markov processes. The probability that n independent arrivals occur in T seconds is given by the formula Poisson distribution: where P(n, T) = ( λt) n (e - λt )/ n! P(X) = probability of X arrivals, n = number of arrival per unit of time, λ = average arrival rate, E{n T} = λt = expected value of n for a given interval T, and e = The combination of these two thoughts in a commonly used model is called the Markov modulated Poisson process (MMPP) or ON/OFF bursty model. In this paper, the burstiness is varied by altering the T ON and T OFF. 2. Service Facility Characteristics: In this paper, service times are randomly distributed by the exponential probability distribution. This is a mathematically convenient assumption if arrival rates are Poisson distributed. In order to examine the traffic congestion at output of ATM link as STM-4 (622.8 Mbps), the service time in the simulation model is specified by the i speed of output link, giving that a service time is.6815 µs per cell. 3. Source Traffic Descriptor: The source traffic descriptor is the subset of traffic parameters requested by the source (user), which characterizes the traffic that will (or should) be submitted during the connection (Aida and Saito 1995). The relation of each traffic parameters referring to the ATM Forum (ATM Forum 1995) used in the simulation model is defined below. PCR = λ a = 1/T in units of cells/second, where T is the minimum inter-cell spacing in seconds (i.e., the time interval from the first bit of one cell to the first bit of the next cell). This research focuses on four cases as follows: PCR = λ a = Gbps (3, cells/s). Hence, T =.25 µs (1/3,998,956 s) PCR = λ a = 848 Mbps (1,999,732 cells/s). Hence, T =.5 µs (1/1,999,732 s). PCR = λ a = Mbps (1,333,152 cells/s). Hence, T =.75 µs (1/1,333,152 s). CDVT = τ in seconds. This traffic parameter normally cannot be specified by user, but is set instead by the network. Recommendation I.371 defines the minimum CDVT at a public UNI. For LB mechanism, a single bucket depth of CDVT cells and a nominal cell inter arrival spacing T, note that approximately CDVT/T cells can arrive back-toback. Results and Discussion The comparison between existing flow control algorithms (Tahoe, Reno, New Reno, SACK) and ARC is shown in graphs. The experiment has been set the maximum window size (WindowSize) to be 3 so does our proposed algorithm (ARC). With the burst/silence ratio 1:, the average inter-arrival cell rate defines as.25,.5 and.75 µs. Fig. 3 illustrates the throughput against inter-arrival cell rate. Fig. 4 illustrates utilization of link against interarrival cell rate. Fig. 5 illustrates cells drop 72

5 against inter-arrival cell rate. From Figs. 3-5, ARC gives the highest performance, follows by SACK, New Reno, Reno, and Tahoe. Conclusion ARC gives a highest performance in case of high congestion (where the input arrival traffic rate is greater than the ATM fabric service rate), it allows more cells drop to retransmit by adjusting the window size directed to the arrival traffic (λ a ) and number of cells drop. On the other hand, ARC also gives remarkable better performance compared to existing algorithms in the case of noncongestion Throughput Percentage (x1)% Utilization of link Reno New Reno Tahoe SACK ARC Inter arrival time (Microsec) Fig. 4. Utilization of link Number of Cells (x1) Number of Cells drop Reno New Reno Tahoe SACK ARC Inter arrival time (Microsec) Number of Cells drop (x1) Fig. 3. Throughput Reno New Reno Tahoe SACK ARC Inter arrival time (Microsec) Fig. 5. Number of Cells drop 73

6 References Aida, M.; and Saito, H Traffic contract parameters and CAC guaranteeing cell-loss ratio in ATM networks. IEICE Trans. Commu. E78-B(1). Al-Wakeel, S.S.; Rikli, N.E.; and Al-Wehaibi, A.A Evaluation of Fairness Strategies for ATM Congestion Control Policing Mechanisms. IASTED Proc. Int. Conf. Applied Modeling & Simulation (AMP 99). Allman, M.; Paxson, V.; and Stevens, W TCP Congestion Control. RFC2581. ATM Forum User-network interface (UNI) Specification version 3.1, The ATM Forum Technical Committee, Prentice Hall, Englewood Cliff, NJ, USA. Kevin, F.; and Sally, F Simulation-based Comparison of Tahoe, Reno, and SACK TCP. Computer Comm. Rev. 26: Khoshnevis, B Discrete Systems Simulations. McGraw-Hill, New York, NY, USA. Kouvatsos, D.D Performance Modelling and Evaluation of ATM Networks Vol. 1, Chapman & Hall, London, England. Leerujikul, G.; and Jittawiriyanukoon, C. 23. Evaluation of TCP over Satellite Network with the Proposed Sliding Window Algorithm. Proc. InTech 3, pp Low, S. 21.Equilibrium & Dynamic of TCP/AQM. Sigcomm. August 21 /TCPaqm.ppt Matthew, M.; Jamshid, M.; Sally, F.; and Allyn, R TCP Selective Acknowledgment Options. Internetdraft RFC 218. Pakdeepinit, P.; and Jittawiriyanukoon, C. 22. Performance Comparison of ATM Policy Mechanisms with Telecommunications Traffic. Proc. 6th World Multiconference on Systematics, Cybernetics and Informatics, pp Shioda, S.; and Saito, H Connection Admission Control Guaranteeing Negotiated Cell-Loss Ratio of cell Streams Passing through Usage Parameter Control. IEICE Trans. Commu., E8-B (3): Yang, D. 2. TCP performance and flow control. Candle Computer Rpt. 22 (2). 74

Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffics over ATM network

Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffics over ATM network 78 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.B, January 26 Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffics over ATM network Surasee Prahmkaew

More information

Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffic over ATM Network

Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffic over ATM Network Int. J. of Advanced Networking and Applications 224 Performance Evaluation of Adaptive Rate Control (ARC) for Burst Traffic over ATM Network V.Ramesh Research scholar, Sathyabama University,Chennai & Assoc.Prof,

More information

An Adaptive Fuzzy Control Traffic Shaping Scheme over Wireless Networks

An Adaptive Fuzzy Control Traffic Shaping Scheme over Wireless Networks Proceedings of Asia-Pacific Conference on Communications 2007 An Adaptive Fuzzy Control Traffic Shaping Scheme over Wireless Networks Somchai Lekcharoen* and Chun Che Fung * Faculty of Information Technology

More information

An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network

An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network An Adaptive Fuzzy Type-2 Control Double Token Leaky Bucket and Back-pressure over High-Speed Network Somchai Lekcharoen Faculty of Information Technology, Rangsit University, Thailand Email:s_lekcharoen@yahoo.com

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

A model of Fuzzy Control Backoff Schemes in Telecommunication Networks

A model of Fuzzy Control Backoff Schemes in Telecommunication Networks A model of Fuzzy Control Backoff Schemes in Telecommunication Networks SOMCHAI LEKCHAROEN 1 AND CHANINTORN JITTAWIRIYANUKOON 2 1 Faculty of Information Technology, Rangsit University THAILAND 2 Faculty

More information

Performance Analysis of TCP Variants

Performance Analysis of TCP Variants 102 Performance Analysis of TCP Variants Abhishek Sawarkar Northeastern University, MA 02115 Himanshu Saraswat PES MCOE,Pune-411005 Abstract The widely used TCP protocol was developed to provide reliable

More information

ATM Quality of Service (QoS)

ATM Quality of Service (QoS) ATM Quality of Service (QoS) Traffic/Service Classes, Call Admission Control Usage Parameter Control, ABR Agenda Introduction Service Classes and Traffic Attributes Traffic Control Flow Control Special

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

TCP Congestion Control

TCP Congestion Control TCP Congestion Control What is Congestion The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

TCP Congestion Control

TCP Congestion Control What is Congestion TCP Congestion Control The number of packets transmitted on the network is greater than the capacity of the network Causes router buffers (finite size) to fill up packets start getting

More information

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

Design Issues in Traffic Management for the ATM UBR+ Service for TCP over Satellite Networks: Report II

Design Issues in Traffic Management for the ATM UBR+ Service for TCP over Satellite Networks: Report II Design Issues in Traffic Management for the ATM UBR+ Service for TCP over Satellite Networks: Report II Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 1 Overview! Statement

More information

TCP based Receiver Assistant Congestion Control

TCP based Receiver Assistant Congestion Control International Conference on Multidisciplinary Research & Practice P a g e 219 TCP based Receiver Assistant Congestion Control Hardik K. Molia Master of Computer Engineering, Department of Computer Engineering

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

A Survey on Quality of Service and Congestion Control

A Survey on Quality of Service and Congestion Control A Survey on Quality of Service and Congestion Control Ashima Amity University Noida, U.P, India batra_ashima@yahoo.co.in Sanjeev Thakur Amity University Noida, U.P, India sthakur.ascs@amity.edu Abhishek

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP

Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP Chapter 23 Process-to-Process Delivery: UDP, TCP, and SCTP 23.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 23-1 PROCESS-TO-PROCESS DELIVERY The transport

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

Intermediate Traffic Management

Intermediate Traffic Management Intermediate Traffic Management This presentation has been generated by the ATM Forum for the purpose of educating the public on ATM Technology and the ATM Forum s activities. This presentation is the

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

Performance Analysis & QoS Guarantee in ATM Networks

Performance Analysis & QoS Guarantee in ATM Networks P a g e 131 Global Journal of Computer Science and Technology Performance Analysis & QoS Guarantee in ATM Networks Parag Jain!, Sandip Vijay!!, S. C. Gupta!!!! Doctoral Candidate, Bhagwant Univ. & Professor,

More information

Fuzzy Traffic Control of ATM Networks

Fuzzy Traffic Control of ATM Networks Fuzzy Traffic Control of ATM Networs MAHDI JALILI-KHARAAJOO and FARDAD ZAND Young Researchers Club, Islamic Azad University, Tehran, Iran P.O. Box: 14395'1355, Tehran, Iran Abstract: - In this paper, we

More information

Internet Networking recitation #10 TCP New Reno Vs. Reno

Internet Networking recitation #10 TCP New Reno Vs. Reno recitation #0 TCP New Reno Vs. Reno Spring Semester 200, Dept. of Computer Science, Technion 2 Introduction Packet Loss Management TCP Reno (RFC 258) can manage a loss of at most one packet from a single

More information

11. Traffic management in ATM. lect11.ppt S Introduction to Teletraffic Theory Spring 2003

11. Traffic management in ATM. lect11.ppt S Introduction to Teletraffic Theory Spring 2003 lect11.ppt S-38.145 - Introduction to Teletraffic Theory Spring 2003 1 Contents Introduction ATM technique Service categories and traffic contract Traffic and congestion control in ATM Connection Admission

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

11. Traffic management in ATM

11. Traffic management in ATM lect11.ppt S-38.145 - Introduction to Teletraffic Theory - Fall 2000 1 Contents Introduction ATM technique Service categories Traffic contract Traffic and congestion control in ATM Connection Admission

More information

FEC Performance in Large File Transfer over Bursty Channels

FEC Performance in Large File Transfer over Bursty Channels FEC Performance in Large File Transfer over Bursty Channels Shuichiro Senda, Hiroyuki Masuyama, Shoji Kasahara and Yutaka Takahashi Graduate School of Informatics, Kyoto University, Kyoto 66-85, Japan

More information

UNIT IV TRANSPORT LAYER

UNIT IV TRANSPORT LAYER Transport Layer UNIT IV TRANSPORT LAYER Congestion Control and Quality of Service Ref: Data Communication & Networking, 4 th edition, Forouzan IV-1 DATA TRAFFIC The main focus of congestion control and

More information

Improved Selective Acknowledgment Scheme for TCP

Improved Selective Acknowledgment Scheme for TCP Improved Selective Acknowledgment Scheme for TCP Rajkumar Kettimuthu and William Allcock Argonne National Laboratory, Globus Alliance Argonne, IL 60439, USA kettimut, allcock @mcs.anl.gov Abstract A selective

More information

image 3.8 KB Figure 1.6: Example Web Page

image 3.8 KB Figure 1.6: Example Web Page image. KB image 1 KB Figure 1.: Example Web Page and is buffered at a router, it must wait for all previously queued packets to be transmitted first. The longer the queue (i.e., the more packets in the

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Testing Policing in ATM Networks

Testing Policing in ATM Networks Testing Policing in ATM Networks Policing is one of the key mechanisms used in ATM (Asynchrous Transfer Mode) networks to avoid network congestion. The HP E4223A policing and traffic characterization test

More information

TCP Flavors Simulation Evaluations over Noisy Environment

TCP Flavors Simulation Evaluations over Noisy Environment International Journal of Information Engineering and Applications 2018; 1(1): 11-17 http://www.aascit.org/journal/information TCP Flavors Simulation Evaluations over Noisy Environment Elsadig Gamaleldeen

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER

PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER PERFORMANCE COMPARISON OF THE DIFFERENT STREAMS IN A TCP BOTTLENECK LINK IN THE PRESENCE OF BACKGROUND TRAFFIC IN A DATA CENTER Vilma Tomço, 1 Aleksandër Xhuvani 2 Abstract: The purpose of this work is

More information

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) TETCOS Transmission Control Protocol (TCP) Comparison of TCP Congestion Control Algorithms using NetSim @2017 Tetcos. This document is protected by copyright, all rights reserved Table of Contents 1. Abstract....

More information

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness

Recap. TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness Recap TCP connection setup/teardown Sliding window, flow control Retransmission timeouts Fairness, max-min fairness AIMD achieves max-min fairness 81 Feedback Signals Several possible signals, with different

More information

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 MODELING TRAFFIC MANAGEMENT IN ATM NETWORKS WITH OPNET Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 1. The Ohio State University, Department of Computer and Information Science, 2015

More information

Illustration of The Traffic Conformance in ATM Network

Illustration of The Traffic Conformance in ATM Network Illustration of The Traffic Conformance in ATM Network Tran Cong Hung (Post & Telecommunication Institute of Technology, Viet Nam) E-mail : conghung@ptithcm.edu.vn Pham Minh Ha (Hanoi University of Technology,

More information

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles

Quality of Service. Traffic Descriptor Traffic Profiles. Figure 24.1 Traffic descriptors. Figure Three traffic profiles 24-1 DATA TRAFFIC Chapter 24 Congestion Control and Quality of Service The main focus of control and quality of service is data traffic. In control we try to avoid traffic. In quality of service, we try

More information

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2

Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 MODELING TRAFFIC MANAGEMENT IN ATM NETWORKS WITH OPNET Rohit Goyal 1, Raj Jain 1, Sonia Fahmy 1, Shobana Narayanaswamy 2 1. The Ohio State University, Department of Computer and Information Science, 2015

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP

Page 1. Review: Internet Protocol Stack. Transport Layer Services. Design Issue EEC173B/ECS152C. Review: TCP EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Transport Layer Services Design Issue Underlying

More information

BROADBAND AND HIGH SPEED NETWORKS

BROADBAND AND HIGH SPEED NETWORKS BROADBAND AND HIGH SPEED NETWORKS ATM SERVICE CATEGORIES Service Categories : represent particular combinations of traffic parameters and QoS parameters. These parameters are determined by users for a

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Journal of ELECTRICAL ENGINEERING, VOL. 57, NO. 6, 2006, 360 364 EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Peter Kvačkaj

More information

cs/ee 143 Communication Networks

cs/ee 143 Communication Networks cs/ee 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Recap: Internet overview Some basic mechanisms n Packet switching n Addressing n Routing o

More information

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service

Page 1. Review: Internet Protocol Stack. Transport Layer Services EEC173B/ECS152C. Review: TCP. Transport Layer: Connectionless Service EEC7B/ECS5C Review: Internet Protocol Stack Review: TCP Application Telnet FTP HTTP Transport Network Link Physical bits on wire TCP LAN IP UDP Packet radio Do you remember the various mechanisms we have

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Rate Based Pacing with Various TCP Variants

Rate Based Pacing with Various TCP Variants International OPEN ACCESS Journal ISSN: 2249-6645 Of Modern Engineering Research (IJMER) Rate Based Pacing with Various TCP Variants Mr. Sreekanth Bandi 1, Mr.K.M.Rayudu 2 1 Asst.Professor, Dept of CSE,

More information

Quality Control Scheme for ATM Switching Network

Quality Control Scheme for ATM Switching Network UDC 621.395.345: 621.395.74 Quality Control Scheme for ATM Switching Network VMasafumi Katoh VTakeshi Kawasaki VSatoshi Kakuma (Manuscript received June 5,1997) In an ATM network, there are many kinds

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

Chapter 6: Congestion Control and Resource Allocation

Chapter 6: Congestion Control and Resource Allocation Chapter 6: Congestion Control and Resource Allocation CS/ECPE 5516: Comm. Network Prof. Abrams Spring 2000 1 Section 6.1: Resource Allocation Issues 2 How to prevent traffic jams Traffic lights on freeway

More information

Introduction to IP QoS

Introduction to IP QoS Introduction to IP QoS Primer to IP Quality of Service Aspects Queuing, Shaping, Classification Agenda IP QoS Introduction Queue Management Congestion Avoidance Traffic Rate Management Classification and

More information

Traffic Management. Service Categories CHAPTER

Traffic Management. Service Categories CHAPTER CHAPTER 3 The following traffic management functions are supported on the PNNI node: Asymmetrical traffic requirements. Connection Admission Control (CAC). Qbin for AutoRoute and PNNI Mapping of SVC/SPVC

More information

EVALUATING THE DIVERSE ALGORITHMS OF TRANSMISSION CONTROL PROTOCOL UNDER THE ENVIRONMENT OF NS-2

EVALUATING THE DIVERSE ALGORITHMS OF TRANSMISSION CONTROL PROTOCOL UNDER THE ENVIRONMENT OF NS-2 Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.157

More information

CS Transport. Outline. Window Flow Control. Window Flow Control

CS Transport. Outline. Window Flow Control. Window Flow Control CS 54 Outline indow Flow Control (Very brief) Review of TCP TCP throughput modeling TCP variants/enhancements Transport Dr. Chan Mun Choon School of Computing, National University of Singapore Oct 6, 005

More information

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET

IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET Nazy Alborz IMPLEMENTATION OF CONGESTION CONTROL MECHANISMS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road map Introduction to congestion control

More information

Lecture 4 Wide Area Networks - Asynchronous Transfer Mode

Lecture 4 Wide Area Networks - Asynchronous Transfer Mode DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Asynchronous Transfer Mode Mei Yang Based on Lecture slides by William Stallings 1 ATM a streamlined packet transfer interface similarities

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput

Topics. TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput Topics TCP sliding window protocol TCP PUSH flag TCP slow start Bulk data throughput 2 Introduction In this chapter we will discuss TCP s form of flow control called a sliding window protocol It allows

More information

Transport Protocols and TCP: Review

Transport Protocols and TCP: Review Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment

More information

Traffic Management over Satellite ATM Networks: A Status Report

Traffic Management over Satellite ATM Networks: A Status Report Traffic Management over Satellite ATM Networks: A Status Report http://www.cis.ohio-state.edu/~jain/ TIA/CIS Meeting, January 13, 1998 1 Overview Traffic Management for ATM over Satellite Document New

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

Chapter III. congestion situation in Highspeed Networks

Chapter III. congestion situation in Highspeed Networks Chapter III Proposed model for improving the congestion situation in Highspeed Networks TCP has been the most used transport protocol for the Internet for over two decades. The scale of the Internet and

More information

CS4700/CS5700 Fundamentals of Computer Networks

CS4700/CS5700 Fundamentals of Computer Networks CS4700/CS5700 Fundamentals of Computer Networks Lecture 15: Congestion Control Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang Alan Mislove amislove at ccs.neu.edu

More information

Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks

Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks Advanced Mechanisms for Available Rate Usage in ATM and Differentiated Services Networks Roland Bless, Dirk Holzhausen, Hartmut Ritter, Klaus Wehrle Institute of Telematics, University of Karlsruhe Zirkel

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

ENSC 835: COMMUNICATION NETWORKS

ENSC 835: COMMUNICATION NETWORKS ENSC 835: COMMUNICATION NETWORKS Evaluation of TCP congestion control mechanisms using OPNET simulator Spring 2008 FINAL PROJECT REPORT LAXMI SUBEDI http://www.sfu.ca/~lsa38/project.html lsa38@cs.sfu.ca

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

QOS in ATM Networks. Traffic control in ATM networks. Layered model. Call level. Pag. 1

QOS in ATM Networks. Traffic control in ATM networks. Layered model. Call level. Pag. 1 Traffic control in ATM networks Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ QoS Issues in Telecommunication Networks - 1 Layered model Used

More information

Chapter 24. Transport-Layer Protocols

Chapter 24. Transport-Layer Protocols Chapter 24. Transport-Layer Protocols 23.1 Introduction 23.2 User Datagram Protocol 23.3 Transmission Control Protocol 23.4 SCTP Computer Networks 24-1 Position of Transport-Layer Protocols UDP is an unreliable

More information

Traffic Management. Service Categories CHAPTER

Traffic Management. Service Categories CHAPTER CHAPTER 3 The following traffic management functions are supported on the PNNI node: Asymmetrical traffic requirements Connection admission control (CAC) Qbin for AutoRoute and PNNI Mapping of SVC/SPVC

More information

Computer Networking Introduction

Computer Networking Introduction Computer Networking Introduction Halgurd S. Maghdid Software Engineering Department Koya University-Koya, Kurdistan-Iraq Lecture No.11 Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and

More information

THE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2

THE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2 THE NETWORK PERFORMANCE OVER TCP PROTOCOL USING NS2 Ammar Abdulateef Hadi, Raed A. Alsaqour and Syaimak Abdul Shukor School of Computer Science, Faculty of Information Science and Technology, University

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 24: Congestion Control Prof. Alan Mislove (amislove@ccs.neu.edu) Slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica,

More information

ATG s Communications & Networking Technology Guide Series This guide has been sponsored by

ATG s Communications & Networking Technology Guide Series This guide has been sponsored by ATM Traffic Management ATG s Communications & Networking Technology Guide Series This guide has been sponsored by Table of Contents The Challenge: Efficiency with Service Integrity........................

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Improved Model for a Non-Standard TCP Behavior

Improved Model for a Non-Standard TCP Behavior IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011 45 Improved Model for a Non-Standard TCP Behavior Mohammed Abdullah Alnuem, King Saud University, Riyadh,

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

TCP Congestion Control

TCP Congestion Control 1 TCP Congestion Control Onwutalobi, Anthony Claret Department of Computer Science University of Helsinki, Helsinki Finland onwutalo@cs.helsinki.fi Abstract This paper is aimed to discuss congestion control

More information

TCP/IP over ATM using ABR, UBR, and GFR Services

TCP/IP over ATM using ABR, UBR, and GFR Services TCP/IP over ATM using ABR, UBR, and GFR Services Columbus, OH 43210 Jain@CIS.Ohio-State.Edu http://www.cis.ohio-state.edu/~jain/ 1 Overview Why ATM? ABR: Binary and Explicit Feedback ABR Vs UBR TCP/IP

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

An analytical model for evaluating utilization of tcp reno

An analytical model for evaluating utilization of tcp reno An analytical model for evaluating utilization of tcp reno mohammad mehdi hassani reza berangi Abstract: This paper presents an analytical model for TCP Reno. For this model an algorithm is derived to

More information