Virtual Path Control for ATM Networks with Call Level Quality of Service Guarantees

Size: px
Start display at page:

Download "Virtual Path Control for ATM Networks with Call Level Quality of Service Guarantees"

Transcription

1 Virtual Path Control for ATM Networs with Call Level Quality of Service Guarantees Nios G. Aneroussis and Aurel A. Lazar Department of Electrical Engineering and Center for Telecommunications Research Columbia University, New Yor, NY Abstract We provide an algorithm for the VP distribution problem that satisfies nodal constraints on the processing load and blocing constraints for each Source-Destination pair. The algorithm maximizes the networ revenue under the above set of constraints and is independent of the number of traffic classes in the networ, the method of representation of networing resources, the admission control policy used in every lin and VP, and the networ routing scheme. We apply the algorithm to the Xunet ATM testbed and study several of its performance characteristics.. Introduction [ANE95a] presented a comprehensive management architecture that allows the networ manager to configure VP connection services under quality of service constraints and evaluate the resulting networ performance. The objective of this paper is to provide a supporting algorithmic framewor to the networ manager for formulating a bandwidth allocation policy for Virtual Paths (also referred to as the VP distribution policy), that guarantees Quality of Service (QOS) both at the cell and the call level. QOS at the cell level can be guaranteed through the concept of the Schedulable Region [HYM9]. At the call level, QOS is guaranteed by bounding the blocing probability of the VC service for every Source-Destination pair in the networ and the average connection setup time. User VC Service User Figure : The Networ Model Public Networ User VP Networ According to our model, users mae requests for the VC Service at the boundaries of the networ (Figure ). The networ operator establishes VPs within its administrative domain. This VP networ is transparent to the users and serves the purpose of carrying user calls through the public networ at reduced call processing costs. A separate routing mechanism determines how calls are to be routed through the VP networ. The VP distribution problem is a networ control problem with the following formulation: given the networ topology, the capacities of networ lins, the capacities of the signalling processors, and the matrix of offered networ load, calculate the routes and capacities of Virtual Paths in the networ such that the following requirements are satisfied:. The sum of VP capacities on each lin does not exceed its capacity. 2. The signalling load on each signalling processor is below a predefined upper bound. 3. The call blocing rate of each Source-Destination (SD) pair is below a predefined upper bound (also referred to as the SD blocing constraint). 4. The networ revenue is maximized under the above constraints. The requirement described in constraint 2) above is justified by our experiments with the Xunet III ATM testbed [ANE95b]. These experiments evaluated the relation between the transport and the signalling networ. When using wideband (video) calls, a small call arrival rate was sufficient to saturate the transport networ. If, however, we were to produce the same capacity demand using narrowband (voice) calls, we would have to apply much higher call arrival rates (the capacity of one video call in our experiments was roughly equivalent to 70 voice calls). In this case, however, there is a danger that the capacity of the signalling networ is exceeded. When this happens, only a small percentage of the total number of calls can be established (the remaining calls are rejected due to signalling message losses, excessive call setup times, etc.) and the transport networ operates well below its total capacity. In other words, even if the total capacity demand is the same, a small call arrival rate with high capacity demands puts pressure on the transport networ, whereas greater call arrival rates with small capacity demands shift the pressure to the signalling system. In reality, the signalling system can act as a bottlenec for the transport networ. Congestion in the signalling system can be relieved in two ways: by blocing the excessive call setup requests at their source, or by employing VPs to relieve the most loaded signalling nodes. If the first approach is followed, calls might be bloced even if there is

2 bandwidth available in the networ. Therefore, the second approach is superior, but at the expense of a reduced networ throughput due to end-to-end bandwidth reservation. This paper is organized as follows: Section 2 presents an overview of related wor on VP distribution algorithms. Section 3 presents an algorithm for VP distribution together with the concepts that provide our quality of service framewor. Section 4 applies the algorithm to the Xunet ATM testbed and maes observations on its performance characteristics. Finally, Section 5 summarizes our conclusions and proposes directions for further study. 2. Notation and Review of Related Wor 2. Notation Before starting the review of the individual approaches to the VP distribution problem it is worthwhile to define a common problem setting based on which all approaches can be compared. For this purpose, we introduce the following canonical model: Topology Information: The networ topology is represented as a directional graph G(V,L), where V is the set of vertices (networ nodes) and L is the set of networ lins. W is the set of Source-Destination (SD) pairs: W { w ( u, v) u, v V }. The networ supports, 2,..., K traffic classes each with its own QOS requirements. P is the set of Virtual Paths. For each SD pair w, R w { r wi, i, 2,, N w } is a set of routes of cardinality N w. Each route consists of an arbitrary combination of VPs and lins between the source and the destination node. We define the logical graph G (V, E ), where the set of edges E is derived from the set of edges of the original graph G by adding one edge between every VP source and termination point. Capacity Information: The networing capacity for lin l is denoted by S l and is given by the Schedulable Region [HYM9]. Loading Information: The call arrival rate and the inverse of the holding time of calls for each SD pair w is denoted by λ w and µ w, respectively. The traffic intensity (in Erlangs) is denoted by ρ w. For each switching node v V, µ v denotes the processing capacity of the node signalling processor in requests per unit of time. Finally, λ v denotes the total arrival rate of call setup requests at node v. Control Policy: For each p in P, we denote as C p the networing capacity assigned to p. The networing capacity is in general given by the Contract Region [HYM93b]. For every lin l we must have that the sum of VP capacities travelling over that lin is less or equal to the lin capacity. At every outgoing lin and VP operates an admission controller. Encoded in the admission controller is the admission control policy, denoted by u. The admission controller accepts or rejects calls based on their traffic class and the number of currently active calls in the lin or VP. The state of the admission controller is denoted by x ( x, x 2,, x K ). For each set R w with N w > there exists a routing policy R w which specifies the schedule for finding available routes. For example, an incoming call might try the first route in the set, and if no capacity is available, the second route and so on. In order to guarantee that every signalling processor is operating normally, an overload control rejects the surplus of call requests whenever λ v > µ v. Constraints: The blocing constraint for each SD pair and traffic class is denoted by β w. The blocing constraint enforces the Quality of Service requirements at the call level. The blocing probability P w is the percentage of call attempts of class for the above SD pair that are denied service due to the unavailability of resources. We must always have that P w β w. At every signalling processor, the arrival rate of call setup requests must be less than the node s processing capacity, i.e., λ v < µ v. For every route r R w, the call setup time t r on route r must be bounded, i.e., t r < T r. 2.2 Taxonomy of Algorithms The VP capacity allocation problem in ATM networs can also be regarded in a more general context: given a networ topology, a portion of the capacity of the physical lins is reserved on an end-to-end fashion for creating logical lins connecting non-neighboring nodes. This problem rises in circuit switched networs, in the configuration of leased lines and Virtual Truns (VT), and also in the configuration of logical channels in SONET based networs. For this reason, we will review a variety of approaches for capacity allocation that are equivalent to our VP distribution problem. We provide the following taxonomy Synchronous vs. Asynchronous Synchronous algorithms update the VP capacity in real-time based on the observed demand for call establishment. In this context, the bandwidth of VPs can be expanded or contracted at call arrival or departure times. Such is the scheme pre-

3 sented in [SAT90, OHT92]. On the other hand, asynchronous algorithms maintain a fixed VP distribution for a time period T (also referred to as the update interval). These algorithms are called asynchronous, because the modifications of VP capacity are not driven by the call arrival or departure process associated with each VP. The VP distribution policy is computed at the beginning of the period, and remains fixed during that period. The decision on choosing the appropriate VP distribution policy is based on estimates of the offered load during the coming period. For this purpose, a load estimator is usually needed to predict the offered load Centralized vs. Decentralized Asynchronous algorithms can be further distinguished in two major categories: centralized and decentralized. Centralized algorithms are run in one location (typically at the networ manager s site) and require the collection of up-todate information from all networ nodes, while decentralized algorithms are run in every networ switch and information is passed along between neighboring nodes. Such is the scheme of [SHI9] and the game-theoretic approach of [LAZ95] Form of the Cost Function Algorithms can be also categorized based on the cost (objective) function employed in the decision maing process for VP capacity assignment. The scheme of [SAT90, OHT92] does not use a cost function. For selecting the VP that will receive a bandwidth increase, [SHI9] uses a cost function based on the VP blocing probability. In its other variation, a linear combination of the carried traffic in every VP is employed. [LIN93] uses the total call blocing rate. [GER9] has selected multiple cost functions: the lin residual capacity and the amount of bandwidth demand that needs to be bloced overall among SD pairs. [GER94] defines a weighted sum of the total rejected bandwidth demand and the total load assigned to each lin. [HUI9] employs a linear combination of the reserved bandwidth on each lin, weighted by a cost factor. [KIM95] also uses a function of the reserved capacity on every lin in combination with a switching cost for every VP. The AT&T capacity design system [ASH9] uses a weighted combination of the residual lin capacities. [GOP9] uses the revenue for each iteration of the algorithm expressed as the difference of the expected blocing probabilities before and after increasing the capacity of a path times the expected load on the path. Essentially, the same cost function is used by [ARD94], slightly modified to incorporate the cost observed by other SD pairs when the capacity of every VP is increased, while the capacity of all others is held constant. Since the objective of the VP distribution problem is to achieve a satisfactory networ throughput, it is logical to include the call blocing rates in the cost function. This approach is taen by [SHI9], [LIN93], [GOP9] and [ARD94]. [GER9] and [GER94] incorporate the total rejected bandwidth demand in the cost function. The solution in this case maximizes the total carried capacity in the networ. This has some advantages because the call blocing rates (which are non-linear functions of the VP capacities) do not participate in the cost function, and the optimization problem becomes more tractable. However, in either case, in order to guarantee Quality of Service at the call level, the call blocing constraints must be introduced as constraints into the optimization problem. Only [ARD94] addresses this problem. In the other cases, even if the solution maximizes the networ throughput (or the carried capacity), the call blocing rates might be acceptable only for some SD pairs and violating the blocing constraints for others Trade-off between Signalling Costs and Capacity Allocation Most algorithms except [ASH9] and [KIM95] assume that one or more VPs are established between every SD pair, and thus the destination can be reached from the source in one hop only. In our opinion, this approach has two major flaws. Firstly, it is not scalable: a networ with hundreds of nodes will need a very large number of VPs, and consequently, the VP distribution tas will be overwhelming. Secondly, there is a substantial cost associated with loss of throughput due to the rigid capacity reservation for each VP. On the other extreme, a solution with no VPs at all implies increased call processing costs. We envision an intermediate solution that maes available to each SD pair a number of routes. Every route consists of any concatenation of physical lins and VPs. This scheme can maintain a natural balance between the processing costs and the cost due to the reservation of resources, since it does not require a single direct VP between every SD pair. Further, VPs can be used to carry traffic of different SD pairs. The scheme is similar to the AT&T real time networ routing system [ASH9]. This system achieves very low call blocing probabilities because it allows, in addition to a direct route, a large number of non-direct alternate routes to be followed (the equivalent of a call setup using 2 VPs and an intermediate node in an ATM environment) and has been shown to absorb well traffic load fluctuations. In this way, VPs can be used to reduce processing costs without maing significant throughput sacrifices. From all the capacity allocation algorithms reviewed, only [OHT92] investigates the trade-off between capacity utilization and signalling costs. The context is slightly different, because there is only one route available to each destination (using a VP), and the signalling cost is associated with the frequency of messages needed to expand or contract the capacity of the VP. These messages must travel along the route of the VP in the same way as the hop-by-hop call setup messages that would be used to establish a VC on the same route.

4 Thus, this wor models the cost for allocating capacity to VPs and we believe that this must be fully taen into account in a VP distribution algorithm. 3. The VP Distribution Problem By observing the limitations of previous approaches to the VP distribution problem, we propose an algorithm that satisfies the following basic requirements: supports any number of traffic classes. explicitly guarantees QOS at the call level by introducing hard bounds on the call blocing rates for each SD pair and bounds on the time to establish calls through the signalling system. As will be shown later in Section 3.4, a sufficient condition to guarantee bounded call setup times is to bound the call arrival rates at every signalling processor. can wor with any combination of admission control and routing scheme (i.e., static priority or adaptive routing). In addition, the algorithm has the following desirable properties: is independent of the abstraction used to describe the networing capacity of lins and VPs. is independent of the admission control policy used at every lin and VP. The algorithm tries to maximize the networ revenue (considered as the weighted sum of the throughputs for each traffic class and SD pair multiplied by the respective call holding times), while satisfying the node processing and SD blocing constraints. The algorithm is presented in Section 3.. Sections and 3.3 provide a methodology for computing the quantities needed by the algorithm for a simple static priority routing scheme. 3. An Algorithm for VP Distribution Initialization: Begin with all VPs at zero capacity. Traffic between all SD pairs follows a hop-by-hop call setup procedure, except for the SD pairs which are served only by routes comprised of VPs (in that case all traffic is bloced). Compute the blocing probabilities for all SD pairs for the given call arrival rates. Step : Find the SD pairs for which the blocing constraints are not satisfied. If none are found, proceed to step 2. Else consider every VP whose capacity can be increased as a Bandwidth Increase Candidate (BIC). The capacity of a VP is increased by removing the necessary resources from all the lins on the path of the VP. If the BIC set is empty then exit (i.e., there is no spare capacity available in the networ). Else, compute the blocing drift D b for the current vector of VP capacities (also referred to as the current solution) from: D b max( 0, Pw β w ), w W w,. (EQ ) This quantity represents how far we are from satisfying the blocing constraints. For each BIC create an alternative solution by assigning one unit of capacity to the BIC while holding all other VPs to their current capacity. For each alternative solution, compute the blocing drift. If a larger number is obtained for all alternatives, then there appears to be no way of satisfying the blocing constraints for the given networ load; exit. Else, select the alternative with the lowest blocing drift and mae it the current solution. Step 2: Chec for nodes that violate signalling capacity constraints. If none are found, and there are no blocing constraint violations, proceed to step 3, else return to step. Else (there exist capacity violations), compute the capacity drift D c from: D c max ( 0, λ v µ v ), v V. (EQ 2) v Similarly, this quantity represents our distance from satisfying signalling capacity constraints. Every VP whose capacity can be increased by one unit is considered a BIC and an alternative solution is constructed in the same way as above by adding capacity to the BIC while holding all other VPs at their present capacity. If the BIC set is empty then exit. For each alternative solution, compute the capacity drift. If all alternatives have a higher capacity drift from the current solution, there appears to be no way of satisfying the signalling capacity constraints; exit. Else, select the alternative with the lowest capacity drift, mae it the current solution and go to step. Step 3: Now we have satisfied all constraints. Every VP whose capacity can be increased by one unit is considered a BIC. First compute the throughput for each SD pair: γ w ( P w ) λ w The networ revenue is then given by: J γ w Fw. (EQ 3), (EQ 4) w where F w denotes the revenue obtained by accepting one call of SD pair w and class. For each BIC, create an alternative solution and compute the resulting networ revenue. Drop the alternatives for which blocing or signalling capacity constraints are violated. If there is no remaining alternative that produced a higher revenue, then STOP. Else select the alternative with the highest revenue increase and repeat step 3. Intuitively, the algorithm wors as follows: In steps and 2 capacity is added to VPs until a solution is reached that satisfies the problem s constraints. The objective used in each of these steps is representative of the corresponding set of constraints that need to be satisfied. Step 3 attempts to further improve the solution by adding capacity to the VPs that promise a higher increase in revenue, while satisfying all

5 constraints. Modeling Assumptions VPs are established hop-by-hop using a signalling protocol or a management function activated by a central networ management facility. Assuming non-blocing switches with output buffering, at every node along the route of the VP, the necessary networing capacity must be secured from the outgoing lin that the VP is traversing. The networing capacity of the output lins is described by the Schedulable Region (SR) and of the Virtual Paths by the Contract Region (CR). Informally, the Schedulable Region is a surface in a dimensional space (where is the number of traffic classes), that describes the allowable combinations of calls from each traffic class that can be accepted on the lin and be guaranteed Quality of Service. An analogous definition is given for the Contract Region (CR) of Virtual Paths. The Contract Region is a subregion of the SR reserved for exclusive use by a VP. Since the CR is by itself a region, the VP can carry calls of different traffic classes. The remaining region for a physical lin available for admitting VCs is obtained by subtracting from the SR the CRs of all VPs traversing this lin. The calculus of regions for this operation is described in [HYM93b]. We also mae the following modeling assumptions: the call arrival process for all SD pairs is Poisson, and each call has an exponentially distributed holding time. All logical lins (VPs or physical lins) bloc independently, and the overflow traffic is also Poisson. The Poisson model is widely used to model the call arrival process in current telephone networs, and we believe it will be adequate for modeling the call-level behavior in broadband networs as well. There has been no study so far to contradict this assumption, i.e., that other types of services lie video and data would be better described at the call level using a different model.. Representation of Capacity Regions The schedulable region is represented as an arbitrarily shaped region in the K-dimensional space. The Contract Regions however are represented as hyperplanes. This simplifies the implementation of the VP admission controller. Every hyperplanar region can be uniquely represented by a tuple (m,..., m K ), where m is the number of calls of class that can be admitted into the system when the number of calls from every other traffic class is 0. In this way the admission control test for VPs is given by: x (EQ 5) m xk m K The advantage of this representation is that higher accuracy can be achieved during addition and subtraction operations (which are performed in the K-dimensional space) while maintaining simplicity for the admission control test, at least for VPs..2 Selection of the Alternative Solution Set An important aspect in the execution of the algorithm is the construction of the alternative solution set. When adding capacity to a VP, the shape of the new hyperplanar region has to be specified as well. In order to determine what is the most appropriate shape, the following technique is employed: For each BIC, K alternative solutions are constructed. The CR of the BIC for each alternative is derived from the original one by expanding into one of the K possible directions by a certain amount (which can differ between classes). Thus, the alternative solution set consists of possibly more than one alternative for each BIC. The algorithm will then compute the objective function for each alternative, and will select the VP and the CR shape that provides the best improvement in the objective function. In this way, after several iterations of the algorithm, CRs can tae an arbitrary hyperplanar shape..3 The Route Selection Policy We assume a static priority route selection scheme, similar to dynamic hierarchical routing in circuit switched networs. This choice was made to simplify the analysis. The VP distribution algorithm however is not tied to a particular routing scheme. Other schemes such as adaptive routing (where the route for a call is dynamically determined based on real-time utilization information) can be applied as well. According to the static priority routing model, the route set R w consists of N w routes. An incoming call first attempts the first route in the set. If the call is bloced, the second route is attempted, and so on. The call is bloced if no available capacity was found on all the routes in the set. As mentioned previously, every route consists of one or more logical lins. Every logical lin is either a physical lin or a VP. A E D Figure 2: Example of route selection Figure 2 shows an example of a route selection policy. For the SD pair (A,B), the first attempted route is comprised of the direct VP from A to B. The second route consists of two VPs and the intermediate node D. The third route does not contain any VPs, In that case, the call request goes through the intermediate nodes E and F. 3.3 Finding the Blocing Probabilities Let us now focus on a single logical lin. We denote by λ l and µ l the arrival rate and the inverse of the holding time of class calls arriving on lin l. u l ( x), x Sl denotes the state dependent admission control policy for class calls [HYM93a]. We also define some set macros that will be used C F B

6 in the sequel: Lins(r): The set of (logical) lins composing route r. Nodes(r): The set of nodes on route r. First(r,l): The set of lins of route r prior to lin l. Routes(l): The set of routes traveling over lin l. Out(v): The set of outgoing lins from node v. Let π l ( x) be the equilibrium probabilities of the corresponding Marov chain. The global balance equations can be written as: π l ( x) q l ( x, y) y S l π ( l y ) y S l where q l ( x, y) u l ( x)λl x µ l y π l ( y)q l ( y, x), (EQ 6), (EQ 7) and e is the elementary vector with a at position and zeros everywhere. After solving the above system of equations, we can compute the blocing probability of the lin for each class as: P l. (EQ 8) x S l x S l : u l ( x) 0 Let us now focus on the route level. The probability that a call is bloced on route r wi is: P wi ( P l ) l Lins( r wi ) Therefore the call load offered to route r wi is:. (EQ 9) The blocing probability for SD pair w is given by: j and thus, he total load offered to lin l is: r Routes( l) q First( r, l) Finally, the load on the lin due to route r is: S l if y x + e if y x e u l ( x)πl ( x) π l ( x) λ wi λ w i i. (EQ 0) λ w P wj < i N w j λ l P w N w λ r P wj, (EQ ) ( P q ). (EQ 2) λ l, r λ r. (EQ 3) q First( r, l) It is usually realistic to assume that the time between the arrival of the call setup message on a lin (when the resources are actually reserved) and the time the resources are freed because the call setup request was not successful is negligible compared to the holding time of an accepted call. This is true for example when the signalling protocol supports timeouts during call setups. For example, in the Xunet ATM testbed, a call setup request is timed-out after 2 seconds if no reply has been received, an interval significantly smaller than the average holding time of a call. In this case, we have that: µ l, (EQ 4) r Routes( l) where µ µ r, for all routes r that belong to SD pair w. w The P l can be determined using a fixed point approximation. We can rewrite (EQ 8) as a function of the offered load, and the Capacity Region of the lin in the following form: The above set of equations defines a continuous mapping from the compact set [0,] L into itself, and thus, by Brouwer s fixed point theorem, there exists a solution. In [KEL86] it is proven that the solution is unique, and the loss probabilities calculated by this solution converge to the exact loss probabilities. Starting with an arbitrary initial value in [0,] for the P l, the λ l and µ l can be evaluated from (EQ 2) and (EQ 4), respectively. Using the obtained values, the P l can be determined from (EQ 8). The new values are then used in the next step. The procedure stops when the improvement to the solution has satisfied a convergence criterion. In our experiments, the procedure stops when the improvement for every P has dropped below 0-6 l. Note that, the above algorithm can be easily parallelized. At every step, a separate processor can compute the P for every lin only with the nowledge of the P l in the previous l computation step. 3.4 The Call Setup Times ( P q ) ---- λ l, r λ µ l r P l F λ l -----, S. (EQ 5) l, u l, l,, E' µ l At equilibrium, the arrival rate of signalling messages at a node v has two components. The first component is due to the messages used to setup calls. It is approximated by the sum of the call arrival rates at the outgoing logical lins. The second reflects the contribution of the messages used to tear down the established connections: λ v 2 λ l + l Out( v) 2 λ r ( P r ) l Out ( v) r Routes( l). (EQ 6)

7 The above formula depends on the nature of the signalling protocol. We have assumed a single pass call setup and teardown. Every action involves a request travelling in the forward direction and a reply in the reverse direction. For this reason, every arrival rate in the above equation is multiplied by 2 to tae into account the reply messages. By modeling the signalling processor as an M/M/ queue with service rate g v, the queueing and processing delay for a signalling message is given by: Tq v (EQ 7) g v λ v The M/M/ model has been used before in the literature to model the behavior of signalling processors [MUR89]. If we select an upper bound for the arrival rate of signalling messages µ v, the call setup time on route r is always bounded: t g v r T p l v Nodes( r) l Lins( r) (EQ 8) where T p l is the propagation delay on lin l. The above equation verifies that the call setup time increases with the number of intermediate nodes that process signalling messages, and so, by using VPs, significant savings in call setup time can be achieved. 4. Experimental Results g v µ v T p l l Lins( r) v Nodes( r) We applied the VP distribution algorithm on the Xunet ATM testbed. The topology of the networ is shown in Figure Figure 3: Xunet Topology All the lins are bi-directional with a capacity of 45 Mbps. We assume two traffic classes: class corresponds to a video service with a pea rate of 4Mbps; class 2 to a voice service with a pea of 64Kbps. The admission control policy is Complete Sharing. We used a blocing constraint of 0.6 for class and 0.3 for class 2. The capacity of the Xunet signalling processors is 400 calls/min. Our static priority routing scheme provided a direct VP for each SD pair and a linonly route for the overflow traffic of the VP. 0 2 After applying the VP distribution algorithm, we observed that the initial solution (Phase ) does not satisfy the signalling capacity constraints at nodes, 4 and 7. In particular, the arrival rate at node 4 is 766 calls/min. The blocing constraints however are satisfied for all SD pairs. The algorithm then enters the st and 2nd steps (Phase 2), where it attempts to satisfy the above constraint violations by assigning capacity to VPs. When this happens, it enters the 3rd step (Phase 3) where it attempts to further increase the networ revenue. The blocing probabilities for each SD pair are shown in Table. The first number in every box corresponds to class, Table : SD call arrival rates and blocing probabilities for Complete Sharing SD 0 SD SD 2 SD 3 SD 4 SD 5 SD 6 SD 7 Nodes Arrivals.0 0 Phase Phase Phase Xunet Experiment and the number below to class 2. The last row of the table provides experimental results after installing the configuration obtained at the end of Phase 3 on the Xunet testbed. We used the management system of [ANE95a] to configure the VPs and the call generators and obtain the blocing probabilities. The measurements were taen over a period of 6 hours, during which a total of approximately 300,000 calls were generated. Due to limited networ access we were not able to run the experiment repeatedly in order to obtain a reliable confidence interval for the above measurements. The experimental results show that the actual blocing probabilities approximate very closely the figures predicted by the VP distribution algorithm. The obtained figures when compared to the prediction (Phase 3) appear in general to be lower for class and higher for class 2. In either case, they are well below the SD blocing constraints. The reader may have noticed that we use rather high numbers for the blocing constraints. The reason is that when verifying the VP distribution on the testbed, the experiment requires a smaller number of generated calls to provide accurate blocing measurements. If we were using blocing constraints of the order of, e.g., 0-3, we would need to run the experiment for significantly longer times to obtain accurate measurements. Table 2 shows the VP capacities in Mbps and the resulting networ revenue. The CR of every VP is represented as a 2- dimensional hyperplane, and the VP capacities are given as the points where the hyperplane meets the axes. Note the decrease in revenue at the end of Phase 2. This is due to the fact that during that phase, the algorithm attempts to satisfy the constraints rather than increase the revenue. The latter happens exclusively during Phase 3, hence the small revenue increase at the end of that phase. The reader will quicly

8 Table 2: VP capacities and revenue for Complete Sharing VP Revenue Nodes Phase Phase 2 Phase 3 observe that the VPs that carry the traffic of the most loaded SD pairs have been assigned more capacity. Also, SD #6 and #7 that are not assigned any VP capacity experience increased blocing. Overall, the algorithm required a total of 0 iterations to complete. 5. Conclusions and Further Study In this paper we addressed the VP distribution problem for ATM networs. VPs can be used to tune the fundamental trade-off between call throughput and overall performance of the signalling system. We provided an algorithm for the VP distribution problem that for the first time satisfies the combination of nodal constraints on the processing of signalling messages, and constraints on blocing for each Source-Destination pair. The algorithm maximizes the networ revenue under the above set of constraints and wors independently of the number of traffic classes in the networ, the admission control policy used in every lin, and the networ routing scheme. We provided a solution methodology for a static priority routing scheme. The methodology can be easily extended to networs with adaptive routing policies. We finally applied the algorithm to the Xunet ATM testbed and studied various performance characteristics. This wor was funded in part by NSF Grant CDA , and in part by a Grant from the AT&T Foundation. A more detailed version of this paper can be obtained from ftp:// ftp.ctr.columbia.edu/ctr-research/comet/public/papers/ 95/ANE95c.ps.gz. References [ANE95a] N.G. Aneroussis and A.A. Lazar, Managing Virtual Paths on Xunet III: Architecture, Experimental Platform and Performance, Proceedings of the 995 IFIP/IEEE International Symposium on Integrated Networ Management, Santa Barbara, CA, May -5, 995. [ANE95b] N.G. Aneroussis, A.A. Lazar and D.E. Pendarais, Taming Xunet III, ACM Computer Communications Review, Vol. 25, No. 3, pp , October 995. [ARD94] Ae Ardvisson, Management of Reconfigurable Virtual Path Networs, Proceedings of the 994 International Teletraffic Congress, edited by J. Labetoulle and J.W. Roberts, Elsevier Science, 994. [ASH9] G.R. Ash, J.S. Chen, A.E. Frey, and B.D. Huang, Real-time Networ Routing in a Dynamic Class-of-Service Networ, in Proceedings Thirteenth Int. Teletraffic Congress, Copenhagen, Denmar, June 99. [GER94] A. Gersht and A. Shulman, Optimal Dynamic Virtual Path Bandwidth Allocation and Restoration in ATM Networs, Proceedings of Globecom 94, San Francisco, CA, November 994. [GER9] A. Gersht, and S. Kheradpir, Integrated Traffic Management in SONET-Based Multi-Service Networs, 3th International Teletraffic Congress, 99. [GOP9] Gita Gopal, Chong-Kwon Kim and Alan Weinrib, Algorithms for Reconfigurable Networs, 3th International Teletraffic Congress, 99. [HUI9] Joseph Y. Hui, Melie B. Gursoy, Nader Moayeri and Roy D. Yates, A Layered Broadband Switching Architecture with Physical or Virtual Path Configurations, IEEE Journal on Selected Areas in Communications, Vol. 9, No. 9, December 99. [HYM9] Jay M. Hyman, Aurel A. Lazar, and Giovanni Pacifici, Real-time scheduling with quality of service constraints, IEEE Journal on Selected Areas in Communications, vol. 9, pp , September 99. [HYM93a] Jay M. Hyman, Aurel A. Lazar, and Giovanni Pacifici, A Separation Principle between Scheduling and Admission Control for Broadband Switching, IEEE Journal on Selected Areas in Communications, Vol., No. 4, May 993, pp [HYM93b] Jay M. Hyman, Aurel A. Lazar, and Giovanni Pacifici, Modeling VC, VP and VN Bandwidth Assignment Strategies in Broadband Networs, Proceedings of the Worshop on Networ and Operating Systems Support for Digital Audio and Video, Lancaster, United Kingdom, November 3-5, 993, pp [KEL86] F.P. Kelly, Blocing Probabilities in Large Circuit- Switched Networs, in Adv. Appl. Prob., vol. 8, pp , 986. [KIM95] Sang-Baeg Kim, An Optimal Establishment of Virtual Path Connections for ATM Networs, in Proceedings of the 995 INFOCOM Conference, pp , Boston, MA, April 2-6, 995. [LAZ95] A.A. Lazar, A. Orda. and D.E. Pendarais, Virtual Path Allocation in Multi-User Networs: A Noncooperative Approach, Proceedings of the 995 IEEE INFOCOM, Boston MA, 995. [LIN93] F. Lin, K-T. Cheng, Virtual Path Assignment and Virtual Circuit Routing in ATM Networs, in Proceedings of the 993 Globecom Conference, pp , Houston, TX, Dec [MUR89] K. Muraami and M. Katoh, Control Architecture for Next-Generation Communication Networs Based on Distributed Databases, IEEE Journal on Selected Areas in Communications, Vol. 7., No. 3, April 989. [OHT92] Satoru Ohta and Ken-Ichi Sato Dynamic Bandwidth Control of the Virtual Path in an Asynchronous Transfer Mode Networ, IEEE Transactions on Communications, Vol. 40, No. 7, July 992. [SAT90] Ken-Ichi Sato, Satoru Ohta and Iuo Toizawa, Broadband ATM Networ Architecture based on Virtual Paths, IEEE Transactions on Communications, vol. 38, pp , August 990. [SHI9] Shigeo Shioda and Hisao Uose, Virtual Path Bandwidth Control Method for ATM Networs: Successive Modification Method, IECIE Transactions, Vol. E 74, No. 2, December 99.

IN OUR PREVIOUS work [1] we presented a comprehensive

IN OUR PREVIOUS work [1] we presented a comprehensive 222 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 6, NO. 2, APRIL 1998 Virtual Path Control for ATM Networks with Call Level Quality of Service Guarantees Nikolaos Anerousis, Member, IEEE, and Aurel A. Lazar,

More information

Managing VPs on Xunet III: Architecture, Experimental Platform and Performance

Managing VPs on Xunet III: Architecture, Experimental Platform and Performance Managing VPs on Xunet III: Architecture, Experimental Platform and Performance Nikos G. Aneroussis and Aurel A. Lazar Department of Electrical Engineering and Center for Telecommunications Research Rm.

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network

STATE UNIVERSITY OF NEW YORK AT STONY BROOK. CEASTECHNICAL REPe. Multiclass Information Based Deflection Strategies for the Manhattan Street Network ; STATE UNIVERSITY OF NEW YORK AT STONY BROOK CEASTECHNICAL REPe Multiclass Information Based Deflection Strategies for the Manhattan Street Network J.-W. Jeng and T.G. Robertazzi June 19, 1992 Multiclass

More information

Scheduling Unsplittable Flows Using Parallel Switches

Scheduling Unsplittable Flows Using Parallel Switches Scheduling Unsplittable Flows Using Parallel Switches Saad Mneimneh, Kai-Yeung Siu Massachusetts Institute of Technology 77 Massachusetts Avenue Room -07, Cambridge, MA 039 Abstract We address the problem

More information

Dimensioning and Resource Management of ATM Networks

Dimensioning and Resource Management of ATM Networks INDC 98-7 th IFIP/ICCC Conference on Information Networs and Data Communications Dimensioning and Resource Management of ATM Networs Rui T. Valadas University of / Institute of Telecommunications 3810,

More information

CS 204 Lecture Notes on Elementary Network Analysis

CS 204 Lecture Notes on Elementary Network Analysis CS 204 Lecture Notes on Elementary Network Analysis Mart Molle Department of Computer Science and Engineering University of California, Riverside CA 92521 mart@cs.ucr.edu October 18, 2006 1 First-Order

More information

A New Call Admission Control scheme for Real-time traffic in Wireless Networks

A New Call Admission Control scheme for Real-time traffic in Wireless Networks A New Call Admission Control scheme for Real-time traffic in Wireless Networks Maneesh Tewari and H.S. Jamadagni Center for Electronics Design and Technology, Indian Institute of Science, Bangalore, 5612

More information

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan

More information

An Architecture for Broadband Virtual Networks Under Customer Control

An Architecture for Broadband Virtual Networks Under Customer Control An Architecture for Broadband Virtual Networks Under Customer Control Mun Choon Chan, Hisaya Hadama* and Rolf Stadler Center for Telecommunications Research Columbia University, New York, N. Y, USA {mcchan,

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

Insensitive Traffic Splitting in Data Networks

Insensitive Traffic Splitting in Data Networks Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages

More information

A VIRTUAL PATH ROUTING ALGORITHM FOR ATM NETWORKS BASED ON THE EQUIVALENT BANDWIDTH CONCEPT

A VIRTUAL PATH ROUTING ALGORITHM FOR ATM NETWORKS BASED ON THE EQUIVALENT BANDWIDTH CONCEPT A VIRTUAL PATH ROUTING ALGORITHM FOR ATM NETWORKS BASED ON THE EQUIVALENT BANDWIDTH CONCEPT Kaan Bür burk@boun.edu.tr Cem Ersoy ersoy@boun.edu.tr Boðaziçi University Computer Engineering Department 80815

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.

More information

Efficient Signaling Algorithms for ATM Networks

Efficient Signaling Algorithms for ATM Networks Efficient Signaling Algorithms for ATM Networks See-Mong Tan Roy H. Campbell Department of Computer Science University of Illinois at Urbana-Champaign 1304 W. Springfield Urbana, IL 61801 stan,roy @cs.uiuc.edu

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

33 Managing Virtual Paths on Xunet lll: Architecture, Experimental Platform and Performance

33 Managing Virtual Paths on Xunet lll: Architecture, Experimental Platform and Performance 33 Managing Virtual Paths on Xunet lll: Architecture, Experimental Platform and Performance Nikos G. Aneroussis and Au rei A. Lazar Department of Electrical Engineering and Center for Telecommunications

More information

Chapter 4 ATM VP-Based Ring Network

Chapter 4 ATM VP-Based Ring Network ATM VP-based network architecture is essentially a compromise of the SONET/STM and ATM network architectures: it takes a system simplicity concept from the SONET/STM network and keeps the flexibility of

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

AGENT-BASED ROUTING ALGORITHMS ON A LAN

AGENT-BASED ROUTING ALGORITHMS ON A LAN AGENT-BASED ROUTING ALGORITHMS ON A LAN Y. Yang, A. N. Zincir-Heywood, M. I. Heywood, S. Srinivas Faculty of Computer Science, Dalhousie University {yang@cs.dal.ca, zincir@cs.dal.ca, mheywood@cs.dal.ca,

More information

Diversity Coded 5G Fronthaul Wireless Networks

Diversity Coded 5G Fronthaul Wireless Networks IEEE Wireless Telecommunication Symposium (WTS) 2017 Diversity Coded 5G Fronthaul Wireless Networks Nabeel Sulieman, Kemal Davaslioglu, and Richard D. Gitlin Department of Electrical Engineering University

More information

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

Stop-and-Go Service Using Hierarchical Round Robin

Stop-and-Go Service Using Hierarchical Round Robin Stop-and-Go Service Using Hierarchical Round Robin S. Keshav AT&T Bell Laboratories 600 Mountain Avenue, Murray Hill, NJ 07974, USA keshav@research.att.com Abstract The Stop-and-Go service discipline allows

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

A Fuzzy System for Adaptive Network Routing

A Fuzzy System for Adaptive Network Routing A Fuzzy System for Adaptive Network Routing A. Pasupuleti *, A.V. Mathew*, N. Shenoy** and S. A. Dianat* Rochester Institute of Technology Rochester, NY 14623, USA E-mail: axp1014@rit.edu Abstract In this

More information

Dynamic Routing and Resource Allocation in WDM Transport Networks

Dynamic Routing and Resource Allocation in WDM Transport Networks Dynamic Routing and Resource Allocation in WDM Transport Networks Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering (IND), Germany Email: spaeth@ind.uni-stuttgart.de

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

LSP Setup Arrival Reordering Approach for MPLS-TE Routing

LSP Setup Arrival Reordering Approach for MPLS-TE Routing LSP Setup Arrival Reordering Approach for MPLS-TE Routing Imène Chaieb and Jean-Louis Le Roux France Telecom R&D, Lannion 37, France Email: {imene.chaieb, jeanlouis.leroux}@orange-ftgroup.com Bernard Cousin

More information

A Call Admission Protocol for Wireless Cellular Multimedia Networks

A Call Admission Protocol for Wireless Cellular Multimedia Networks A Call Admission Protocol for Wireless Cellular Multimedia Networks Mokhtar A. Aboleaze Dept. of Computer Science and Engineering York University Toronto, ON. Canada aboelaze@cs.yorku.ca Fadi A. Aloul

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

A model for Endpoint Admission Control Based on Packet Loss

A model for Endpoint Admission Control Based on Packet Loss A model for Endpoint Admission Control Based on Packet Loss Ignacio Más and Gunnar Karlsson ACCESS Linneaus Center School of Electrical Engineering KTH, Royal Institute of Technology 44 Stockholm, Sweden

More information

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007

254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 254 IEEE TRANSACTIONS ON RELIABILITY, VOL. 56, NO. 2, JUNE 2007 A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures Changcheng Huang, Senior Member, IEEE, Minzhe

More information

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW

More information

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK

PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK PERFORMANCE OF PREMIUM SERVICE IN QOS IP NETWORK Wojciech Burakowski Monika Fudala Halina Tarasiuk Institute of Telecommunications, Warsaw University of Technology ul. Nowowiejska 15/19, 00-665 Warsaw,

More information

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues

FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues D.N. Serpanos and P.I. Antoniadis Department of Computer Science University of Crete Knossos Avenue

More information

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering

A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering A Connectionless Approach to Intra- and Inter-Domain Traffic Engineering Hema T. Kaur, Shivkumar Kalyanaraman ECSE Department, Rensselaer Polytechnic Institute, Troy, NY-12180 {hema,shivkuma}@networks.ecse.rpi.edu

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION

Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter -6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION Chapter 6 IMPROVED CONGESTION CONTROL MECHANISM FOR REAL TIME DATA TRANSMISSION 6.1 Introduction Supporting Quality of Service

More information

Scheduling Algorithms to Minimize Session Delays

Scheduling Algorithms to Minimize Session Delays Scheduling Algorithms to Minimize Session Delays Nandita Dukkipati and David Gutierrez A Motivation I INTRODUCTION TCP flows constitute the majority of the traffic volume in the Internet today Most of

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

INTERCONNECTION networks are used in a variety of applications,

INTERCONNECTION networks are used in a variety of applications, 1 Randomized Throughput-Optimal Oblivious Routing for Torus Networs Rohit Sunam Ramanujam, Student Member, IEEE, and Bill Lin, Member, IEEE Abstract In this paper, we study the problem of optimal oblivious

More information

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

Probability Admission Control in Class-based Video-on-Demand System

Probability Admission Control in Class-based Video-on-Demand System Probability Admission Control in Class-based Video-on-Demand System Sami Alwakeel and Agung Prasetijo Department of Computer Engineering College of Computer and Information Sciences, King Saud University

More information

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Yuhua Chen Jonathan S. Turner Department of Electrical Engineering Department of Computer Science Washington University Washington University

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

CS174 Lecture 11. Routing in a Parallel Computer

CS174 Lecture 11. Routing in a Parallel Computer CS74 Lecture Routing in a Parallel Computer We study the problem of moving pacets around in a parallel computer. In this lecture we will consider parallel computers with hypercube connection networs. The

More information

Dynamic resource allocation for virtual path connections

Dynamic resource allocation for virtual path connections COST257: traffic theory for the networks of future Dynamic resource allocation for virtual path connections Samuli Aalto Laboratory of Telecommunications Technology Helsinki University of Technology samuli.aalto@hut.fi

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science,

More information

10. Network planning and dimensioning

10. Network planning and dimensioning lect10.ppt S-38.145 - Introduction to Teletraffic Theory - Fall 2000 1 Contents Introduction Network planning Traffic forecasts Dimensioning 2 Telecommunication network A simple model of a telecommunication

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Traffic balancing-based path recommendation mechanisms in vehicular networks Maram Bani Younes *, Azzedine Boukerche and Graciela Román-Alonso

Traffic balancing-based path recommendation mechanisms in vehicular networks Maram Bani Younes *, Azzedine Boukerche and Graciela Román-Alonso WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2016; 16:794 809 Published online 29 January 2015 in Wiley Online Library (wileyonlinelibrary.com)..2570 RESEARCH ARTICLE Traffic

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

Simulating a General Purpose Mobile Computing Environment

Simulating a General Purpose Mobile Computing Environment Computer Science Technical Report Simulating a General Purpose Mobile Computing Environment Anurag Kahol, Sumit Khurana, Sandeep Gupta and Pradip Srimani Department of Computer Science Colorado State University

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA

A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS Aradhana Narula-Tam MIT Lincoln Laboratory Lexington, MA Thomas Macdonald MIT Lincoln Laboratory Lexington, MA Eytan Modiano MIT LIDS

More information

Traffic Management for IBC networks

Traffic Management for IBC networks Traffic Management for IBC networks by David Griffin (GPT Ltd) and Pravin Patel (Dowty Communications Ltd) 1 Introduction This paper concentrates on the traffic management functions for a multi-service

More information

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley?

From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Networking 2004 Athens 11 May 2004 From ATM to IP and back again: the label switched path to the converged Internet, or another blind alley? Jim Roberts France Telecom R&D The story of QoS: how to get

More information

Management and Analysis of Multi Class Traffic in Single and Multi-Band Systems

Management and Analysis of Multi Class Traffic in Single and Multi-Band Systems Wireless Personal Communication manuscript No. DOI 1.17/s11277-15-2391-5 Management and Analysis of Multi Class Traffic in Single and Multi-Band Systems Husnu S. Narman Md. Shohrab Hossain Mohammed Atiquzzaman

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS

Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS Advanced Topics UNIT 2 PERFORMANCE EVALUATIONS Structure Page Nos. 2.0 Introduction 4 2. Objectives 5 2.2 Metrics for Performance Evaluation 5 2.2. Running Time 2.2.2 Speed Up 2.2.3 Efficiency 2.3 Factors

More information

Precomputation Schemes for QoS Routing

Precomputation Schemes for QoS Routing 578 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 4, AUGUST 2003 Precomputation Schemes for QoS Routing Ariel Orda, Senior Member, IEEE, and Alexander Sprintson, Student Member, IEEE Abstract Precomputation-based

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science MDP Routing in ATM Networks Using the Virtual Path Concept 1 Ren-Hung Hwang, James F. Kurose, and Don Towsley Department of Computer Science Department of Computer Science & Information Engineering University

More information

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations

Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Rate-distortion Optimized Streaming of Compressed Light Fields with Multiple Representations Prashant Ramanathan and Bernd Girod Department of Electrical Engineering Stanford University Stanford CA 945

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 )

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) Abstract Traditionally, Content Delivery Networks (CDNs)

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Stateless RD Network Services

Stateless RD Network Services Stateless RD Network Services Maxim Podlesny and Sergey Gorinsky 2 University of Calgary, Calgary, Canada 2 Madrid Institute for Advanced Studies in Networks (IMDEA Networks), Madrid, Spain mpodlesn@ucalgary.ca,

More information

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

Analytic Performance Models for Bounded Queueing Systems

Analytic Performance Models for Bounded Queueing Systems Analytic Performance Models for Bounded Queueing Systems Praveen Krishnamurthy Roger D. Chamberlain Praveen Krishnamurthy and Roger D. Chamberlain, Analytic Performance Models for Bounded Queueing Systems,

More information

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks

Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 18, NO. 6, JUNE 2000 757 Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks Jinhan Song and Saewoong Bahk Abstract In this paper we

More information

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach

Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Traffic and Congestion Control in ATM Networks Using Neuro-Fuzzy Approach Suriti Gupta College of Technology and Engineering Udaipur-313001 Vinod Kumar College of Technology and Engineering Udaipur-313001

More information

Packet Switching. Hongwei Zhang Nature seems to reach her ends by long circuitous routes.

Packet Switching. Hongwei Zhang  Nature seems to reach her ends by long circuitous routes. Problem: not all networks are directly connected Limitations of directly connected networks: limit on the number of hosts supportable limit on the geographic span of the network Packet Switching Hongwei

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information