Mm1 Cellular Networks: GSM, GPRS, and UMTS. Mm2 Security aspects of wireless networks. Mm3 Security (cntd.), Header Compression

Size: px
Start display at page:

Download "Mm1 Cellular Networks: GSM, GPRS, and UMTS. Mm2 Security aspects of wireless networks. Mm3 Security (cntd.), Header Compression"

Transcription

1 Performance & Cross-Layer Aspects by Mm1 Cellular Networks: GSM, GPRS, and UMTS Mm2 Security aspects of wireless networks Mm3 Security (cntd.), Header Compression Mm4 Performance analysis: Simulation and analytic models Mm5 Reliability aspects Page 1 Content 1. Motivation & Background Performance Analysis in Wireless Settings Review of Basic Concepts: Random Variables, Exponential Distributions, Stochastic Processes 2. Simulation Models Basics: Discrete Event Simulation Random Number Generation Output Analysis 3. Optional: Simple Analytic Models Birth-Death Processes M/M/1 Queues Circuit-Switched case: Erlang formula Packet-based traffic models 4. Summary Page 2

2 Intro: Packet-Based Transport Advantages of Packet-Based Transport (as opposed to circuit switched) Flexibility Optimal Use of Link Capacities, Multiplex-Gain for bursty traffic Drawbacks Buffering/Queueing at routers can be necessary + Delay / Jitter / Packet Loss can occur Overhead from Headers (20 Byte IPv4, 20 Byte TCP)... and it makes performance modeling harder!! queueing ν Main motivation for Performance Modeling: Network Planning Evaluation/optimization of protocols/architectures/etc. Page 3 Challenges in Packet Switched Setting Challenges in IP networks: HTTP Multiplexing of packets at nodes (L3) TCP Burstiness of IP traffic (L3-7) IP Impact of Dynamic Routing (L3) Link-Layer Performance impact of transport layer, in particular TCP (L4) Wide range of applications different traffic & QoS requirements (L5-7) Feedback: performance traffic model, e.g. for TCP traffic, adaptive applications L5-7 L4 L3 L2 Challenges in Wireless Networks: Wireless link models (channel models) MAC & LLC modeling RRM procedures Mobility models Cross layer optimization Analysis frequently with stochastic models Page 4

3 Basic concepts Probabilities Random experiment with set of possible results Ω Axiomatic definition on event set V(Ω) 0 Pr(A) 1; Pr( )=0; Pr(A B)=Pr(A)+Pr(B) if A B= [ A,B (Ω) ] Conditional probabilities: Pr(A B)=Pr(A B) / Pr(B) Random Variables (RV) Definition: X: Ω ú; Pr(X=x)=Pr(X -1 (x)) Probability density function f(x), cumulative distribution function F(x)=Pr(X x), reliability function (complementary distr. Function) R(x)=1-F(x)=Pr(X>x) Expected value, moments: E(X n )= x n f(x) dx Relevant Examples, e.g.: number of packets that arrive at the access router in the next hour (discrete) Buffer occupancy (#packets) in switch x at time y (discrete) Number of downloads ( mouse clicks ) in the next web session (discrete) Time until arrival of the next IP packet at a base station (continuous) Page 5 Basic concepts: Exponential Distributions Important Case: Exponentially distributed RV Single parameter: rate Density function f(x)= exp(- x), x>0 Cdf: F(x)=1-exp(- x), Reliability function: R(x)=exp(- x) Moments: E{X}=1/ ; Var{X}=1/ 2, C 2 = Var{X} / [E{X}] 2 = 1 Important properties: Memory-less: Pr(X>x+y X>x) = exp(- y) Properties of two independent exponential RV: X with rate, Y with rate µ Distribution of min(x,y): exponential with rate (+µ) Pr(X<Y)= /(+µ) Page 6

4 Basic concepts III: Stochastic Processes Definition of process (X i ) (discrete) or (N t ) (continuous) Simplest type: X i independent and identically distributed (iid) Relevant Examples: Inter-arrival time process: X i Counting Process: n-1 N(t) = max{n Σ i=1 X i t}, alternatively N i ( ) = N(i ) N([i-1] ) Important Example: Poisson Process Assume i.i.d. exponential packet inter-arrival times (rate ): X i :=T i -T i-1 Counting Process: Number of packets N t until time t Pr(N t =n)= (t) n exp(- t) / n! Properties: Merging: arrivals from two independent Poisson processes with rate 1 and 2 Poisson process with rate ( ) Thinning: arrivals from a Poisson process of rate are discarded independently with probability p Poisson process with rate (1-p) Central Limit Theorem: superposition of n independent processes results in the limit n in a Poisson process (under some conditions on the processes) Page 7 Content 1. Motivation & Background Performance Analysis in Wireless Settings Review of Basic Concepts: Random Variables, Exponential Distributions, Stochastic Processes 2. Simulation Models Basics: Discrete Event Simulation Random Number Generation Output Analysis 3. Simple Analytic Models Birth-Death Processes M/M/1 Queues Circuit-Switched case: Erlang formula Packet-based traffic models 4. Summary Page 8

5 Simulation Models (I) Basic principles of discrete event simulation Virtual simulation time t System state S(t) Events occur at certain times t i Instantaneous changes of system state S(t i-1 ) S(t i ) Possibly scheduling of follow-up events Events stored in ordered event list System description: Entities, attributes, and activities Frequently object oriented implementation Important aspects Initial state S(0) Termination Criterion Fixed simulation time T Fixed number of packets/connections Occurrence of certain events (e.g. Loss of connectivity) Page 9 Simulation Models (II) Application to wireless networks:main components Topology definition: nodes and connectivity Link properties: e.g., Propagation models Node functionalities: e.g., schedulers, buffer management, L2/L3 protocol implementation Traffic models (and transport protocol implementation) Mobility Models probabilistic elements in several of these components stochastic simulation alternative : trace-driven simulations Output parameters, statistics collection, e.g. Packet based End-to-end packet delay packet loss rate energy per packet Connection based File Transfer times Fraction of blocked calls throughput Node/Link Properties Buffer occupancy Link utilizations throughput Page 10

6 Types and Examples of Simulation Tools Libraries and programming languages with basic functionalities and data types: Sim_lib [Watkins, Kevin: Discrete Event Simulation in C, 1993] Simula [e.g. R. Pooley: An Introduction to Programming in SIMULA, 1987] General Purpose Simulation Environments, e.g. DEMOS/MAOS [Birtwistle, A system for discrete event modelling on SIMULA (DEMOS), 1979] GPSS [ Network Simulation Tools, e.g. NS2 [ OPNET WIPSIM [ Glomosim [ Page 11 Random Number Generation Uniform Random Number Generator (RNG) Sequence U 1,U 2,... of i.i.d. random numbers, uniformly distributed in ]0,1[ Pseudo-random: same seed X 0 same sequence example: linear congruential generator X i+1 =(a X i + b) mod c, U i+1 =X i+1 /c E.g. a=7 5 =16807, b=0, c= (prime) Random Variables from general distributions Y 1,Y 2, with cumulative distribution function F(x) derived from uniform stream U 1,U 2, by Inversion: Y i =F -1 (U i ) Other Techniques: Rejection, Convolution/Composition, etc. Page 12

7 Output Analysis (I): General Goal: Obtain Estimator Ž of desired performance parameter µ Note: Ž often multi-dimensional Ž is a random variable with some distribution f Ž (x) Considered case here: Ž is estimator of µ=e(z) Properties of estimator: Ž t is called (t=simulation time) Unbiased when E(Ž t )=µ Consistent when lim Ž t =µ for t (stochastic convergence) Types of Simulations Terminating simulations ~ transient parameters Non-terminating simulations ~ Steady-state parameters Page 13 Output Analysis II: Terminating Simulations Terminating Simulations Explicite stopping criterion, e.g. Fixed simulation time Fixed number of arrivals/connections Specific event (e.g. Buffer overflow, component failure) Approach: Independent Replications Repeat Experiment R times, each time with different seeds independent outcomes Z 1,Z 2,...Z R Estimator Ž=1/R Σ Z i Unbiased Asymptotically normal distributed Relevant examples: Determine average buffer-occupancy during busy hours 9-17hrs (starting empty at 9hrs) Determine probability that call will be dropped before its desired end (given initial conditions) Determine probability of buffer-overflow within n packet arrivals (given empty buffer in beginning) Page 14

8 Output Analysis III: Confidence Intervals Example: Estimate Probability γ=pr(overflow before simulation time t) R replications with indep. outcomes Z i Estimator Ž=1/R Σ Z i E(Ž)= γ (unbiased!), Estimates Š 2 of Var(Z i ) Š 2 = 1/(R-1) Σ (Z i -Ž) 2 Š 2 /R is estimate of σ 2= Var(Ž) Approaches for Confidence Intervals, confidence level 1-α (often 1-α =95%): Convergence to normal distribution (Ž- γ)/ σ in the limit standard normal distributed Hence for n 1-α/2 =quantile of normal distribution at level (1-α)/2 Pr(Ž- σ n 1-α/2 < γ < Ž + σ n 1-α/2 ) = 1-α Using the variance estimate Š 2 /R: Pr(Ž- Š 2 / R n 1-α/2 < γ < Ž + Š 2 / R n 1-α/2 ) = 1-α General variance estimate use of Student t distribution (but only exact when Z i normal!) R (Ž- γ)/š approx. Student-t distribured with (R-1) degrees of freedom Other approaches, e.g. variance stabilization for probability estimates [see Heyman/Sobel] Page 15 Special case: Binary Outcome Example: Estimate Probability γ=pr(overflow before simulation time t) R replications with indep. outcomes Z i ={1 when overflow occurred, 0 otherwise} Estimator Ž=1/R Σ Z i R* Ž Binomially distributed: expected value γr, variance R γ(1- γ) E(Ž)= γ (unbiased!), Var(Ž)=γ(1- γ)/r Estimates Š 2 of Var(Z i )=σ 2 Š 2 = Ž(1-Ž) [for probabilities] Page 16

9 Output Analysis IV: non-terminating case Steady state parameters in theory infinite simulation needed Finite simulation length causes biased estimator Approaches: Independent replications, impact of transient phase avoid transient phase Single, long simulation run Problem: correlated samples require adjustment of variance estimate Alternatives Batching Regenerative Simulation Page 17 Content 1. Motivation & Background Performance Analysis in Wireless Settings Review of Basic Concepts: Random Variables, Exponential Distributions, Stochastic Processes 2. Simulation Models Basics: Discrete Event Simulation Random Number Generation Output Analysis 3. Simple Analytic Models Birth-Death Processes M/M/1 Queues Circuit-Switched case: Erlang formula Packet-based traffic models 4. Summary Page 18

10 Continuous Time Markov Processes Defined by State-Space: finite or countable infinite, w/o.l.g. E={0,1,2,...,K} (K= also allowed) Transition rates: µ jk Holding time in state j: exponential with rate Σ k j µ jk Transition probability from state j to k: µ jk / Σ l j µ jl =: µ jk / µ j X t = RV indicating the current state at time t; π i (t):=pr(x t =i) Markov Property : transitions do not depend on history but only on current state t 0 <t 1 <...<t n, i 0,i 1,...i n,j E Computation of steady-state probabilities Chapman Kolmogorov Equations: dπ i (t)/dt = - µ i π i (t) + Σ j i µ ji π j (t) Flow-balance equations, steady-state: µ i π i (t) = Σ j i µ ji π j (t) Here: restriction to irreducible, homogeneous processes Page 19 Queueing Models: Kendall Notation X/Y/C[/B] Queues (example: M/M/1, GI/M/2/10, M/M/10/10,...) X: Specifies Arrival Process M=Markovian Poisson GI=General Independent iid Y: Specifies Service Process (M,G(I),...) C: Number of Servers B: size of finite waiting room (buffer) [also counting the packet in service] If not specified: B= Often also specified: service discipline FIFO: First-In-First-Out (default) Processor Sharing: PS Last-in-first-out LIFO (preemptive or non-preemptive) Earliest Deadline First (EDF), etc. µ Finite buffer (size B) Scope here: Point-process models as opposed to fluidflow queues Page 20

11 M/M/1 queue Poisson arrival of packets (first M Markovian) with rate Exponentially distributed service times of rate µ (second M ) Single Server (1) FIFO service discipline Q t = Number of packets in system is continuous-time Markov Process Derived Parameter: Utilization, ρ= / µ : if ρ 1, instable case (no steady-state q.l.d) Infinite buffer µ Performance Parameters Queue-length distribution: π(t), steady-state limit: π=lim π(t) (if ρ<1) Queue-length that an arriving customer sees Waiting/System time distribution Buffer-Overflow Probability for level B = Pr(arriving customers sees buffer occupancy B or higher) Page 21 M/M/1 queue: Performance µ µ µ Birth-Death Process Probability of i packets in queue [using flow-balance equations] π i := Pr(Q=i) = (1-ρ)* ρ i, where ρ= / µ <1 Probability of idle server: π 0 = (1-ρ) Average Queue-length: E{Q}= ρ/(1-ρ) Average Delay (System Time): E{S}= E{Q}/ = 1/(µ-) Buffer Overflow Probabilities (PASTA principle) Pr(Q (a) B)= Pr(Q B) = ρ B Page 22

12 General Birth-Death Processes µ 1 µ 2 µ 3 Steady-State Probabilities (from balance equations): π i := Pr(Q=i) = π 0 k=0 i-1 k / k=1 i µ k Models in this class, e.g. M/M/1/B M/M/C, M/M/C/C Load-dependent services, discouraged arrivals Page 23 The circuit switched scenario K channels Users allocate one channel per call for certain call duration If all channels are allocated additional starting calls are blocked How many channels are necessary to achieve a call certain maximal blocking probability? Common Model Assumptions: Calls are arriving according to a Poission Process (justified for large user population, limit theorems for stochastic processes) with rate Call durations are exponentially distributed with mean T (okay for voice calls) Page 24

13 Computation of blocking probabilities: M/M/K/K model, Erlang-B formula K 1/T 2/T 3/T K/T Finite Birth-Death Process: Probability of i calls active π i := Pr(n=i) = π 0 (T) i /i!, i=1,,k where π 0 = 1/[Σ(T) i /i!] (sum taken over i=0 to K) Probability of blocked call: p (Blocking) = π K = π 0 (T) K /K! [also known as Erlang-B formula] Page 25 Packet-based link model: M/M/1/K queue Assumptions Poisson arrival of packets with rate Exponentially distributed service times of rate µ Single Server Finite waiting room (buffer) for K packets Suitable e.g. for modeling bottleneck link in packet-based wireless networks [Full network models: see traffic analysis lecture] Finite buffer (size K) µ Page 26

14 M/M/1/K queue: Performance K µ µ µ µ From Birth-Death Process Theory: Probability of i packets in queue π i := Pr(Q=i) = (1-ρ)/(1- ρ K+1 ) * ρ i, where ρ= / µ 1, i=0,,k Probability of packet loss: p (loss) = π K = (1-ρ)/(1- ρ K+1 ) * ρ K Average Delay: Ď = 1/[ (1-p K )] * ρ/(1- ρ K+1 ) * [(1- ρ K )/ (1-ρ) K ρ K ] Page 27 Extension: Models for packet traffic Poisson assumption for packet arrivals may be applicable for highly aggregated traffic (core networks), but otherwise traffic tends to be bursty High data rates in ftp download but less activity between downloads http: activities after mouse-clicks Video streaming: high data rates in frame transmissions Interactive Voice: talk and silent periods Model Modifications: Bulk Arrival processes ON/OFF models Hierarchical models Page 28

15 Bulk Arrival Models Queue-length at arrival instances increases not only by 1, but by a Random Variable B, the bulk-size Parameter set of model Bulk arrival process, e.g. exponential with rate Bulk-Size distribution: p i (e.g. geometric) Service rate (single packet) Steady-state solution for mean system time [Chaudhry & Templeton 83]: E{S} = [ E{B}+E{B 2 } ] / [2 E{B} µ (1-ρ) ] Example: M (B) /M/1 queue with geometrically distributed B Page 29 More realistic models: ON/OFF Models Parameters: N sources, each average rate κ During ON periods: peak-rate p bursty traffic, when p >> κ Mean duration of ON and OFF times κ = p ON/(ON+OFF) Page 30

16 Traffic models: General hierarchical models Frequently used: Several levels with increasing granularity E.g. 3 levels: sessions, connections, packets Or: 5-level model: Page 31 Example: HTTP traffic model Main objects contain zero or more embedded objects that the browser retrieves Correlated requests for embedded objects within retrieval of main object start browser HTTP Session (User A) HTTP Session (User B) click HTTP Session (User C)... click Download Phase 1 Idle time Download Phase 2 Dld. Phase 3... Read time click Dld. Phase K exit browser Get Main Object Get embedded Obj. 1 Get emb. Obj Get emb. Obj. N Session Level Connection/ Flow Level Packet Level, TCP dynamics (not shown here) Statistics: Session arrivals: Renewal process (Poisson) Idle time: heavy-tail # embedded objects: geometric (measurements e.g. mean 5) Object size: heavy-tailed Page 32

17 Summary 1. Motivation & Background Performance Analysis in Wireless Settings Review of Basic Concepts: Random Variables, Exponential Distributions, Stochastic Processes 2. Simulation Models Basics: Discrete Event Simulation Random Number Generation Output Analysis 3. Simple Analytic Models Birth-Death Processes M/M/1 Queues Circuit-Switched case: Erlang formula Packet-based traffic models 4. Summary Page 33 Exercises: 1. Simulations: Use the simulation program from MM1 to obtain blocking probabilities for GPRS sessions. Compute the 95% confidence intervals for these blocking probabilities via a) A single simulation run, using binomial distributions b) Independent replications and the normal approximation for the average blocking probability. 2. Analytic Models: Traffic measurements in a GPRS radio cell result in the following traffic model: voice calls arrive at Poisson rate 1call/min and have an average duration of 1.5 min. GPRS data sessions start at rate 1session/5min, have an average duration of 20min, and generate traffic with an averate rate of 10kb/sec using IP packets of 1500 byte size and CS-II. a) How many time-slots would have to be reserved to GSM voice calls to keep the call blocking probability below 1e-6? b) Compute the average RLC frame delay, if 4 GPRS time-slots are used for the data traffic (as simplification: use an M/M/1 queue on RLC layer, neglecting header overhead as well as the overhead of TBF assignments). [c) (optional): Develop a Markov model for a queueing model for packet switched traffic under the assumption that 6 time-slots are available in total (shared by voice and date) when voice traffic has preemptive priority over packet traffic. Compute the average queue-length for the RLC layer queue. ] Page 34

18 References Analytic Models Cassandras, Lafortune, Introduction to Discrete Event Systems, Chapts. 7 and 8, Kluwer, more details in lecture Traffic analysis I (H. Schiøler, 8th Sem DIRS/NPM) Simulation models Cassandras, Lafortune, Introduction to Discrete Event Systems, Chapt. 10, Kluwer, Heyman, Sobel (ed.), Stochastic Models, Chapt. 6 and 7, North-Holland, more details in lecture Discrete Event simulation (9th Sem DIRS/NPM) Page 35

Motivation: Wireless Packet-Based Transport

Motivation: Wireless Packet-Based Transport Wireless Networks I: Protocols & Architectures Hans-Peter Schwefel, Haibo Wang, Petar Popovski Mm1 IP Mobility Support (hps) Mm2 Wireless Multicast (hw) Mm3 Ad-hoc networks (pp) Mm4 Introduction to performance

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

Introduction to the course

Introduction to the course Introduction to the course Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/ moltchan/modsim/ http://www.cs.tut.fi/kurssit/tlt-2706/ 1. What is the teletraffic theory? Multidisciplinary

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego

Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego Stochastic Processing Networks: What, Why and How? Ruth J. Williams University of California, San Diego http://www.math.ucsd.edu/~williams 1 OUTLINE! What is a Stochastic Processing Network?! Applications!

More information

Introduction to Queuing Systems

Introduction to Queuing Systems Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability

More information

Teletraffic theory I: Queuing theory

Teletraffic theory I: Queuing theory Teletraffic theory I: Queuing theory Lecturer: Dmitri A. Moltchanov E-mail: moltchan@cs.tut.fi http://www.cs.tut.fi/kurssit/tlt-2716/ 1. Place of the course TLT-2716 is a part of Teletraffic theory five

More information

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner.

ETSN01 Exam. August 22nd am 1pm. Clearly label each page you hand in with your name and the page number in the bottom right hand corner. ETSN01 Exam August 22nd 2015 8am 1pm Instructions Clearly label each page you hand in with your name and the page number in the bottom right hand corner. Materials allowed: calculator, writing material.

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing theory and teletraffic systems Viktoria Fodor Laboratory of Communication Networks School of Electrical Engineering Lecture 1 If you want to model networks Or a complex data flow A queue's

More information

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1

Queuing Networks. Renato Lo Cigno. Simulation and Performance Evaluation Queuing Networks - Renato Lo Cigno 1 Queuing Networks Renato Lo Cigno Simulation and Performance Evaluation 2014-15 Queuing Networks - Renato Lo Cigno 1 Moving between Queues Queuing Networks - Renato Lo Cigno - Interconnecting Queues 2 Moving

More information

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh

TELCOM 2130 Queueing Theory. David Tipper Associate Professor Graduate Telecommunications and Networking Program. University of Pittsburgh TELCOM 2130 Queueing Theory David Tipper Associate Professor Graduate Telecommunications and Networking Program University of Pittsburgh Learning Objective To develop the modeling and mathematical skills

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Queuing Networks Modeling Virtual Laboratory

Queuing Networks Modeling Virtual Laboratory Queuing Networks Modeling Virtual Laboratory Dr. S. Dharmaraja Department of Mathematics IIT Delhi http://web.iitd.ac.in/~dharmar Queues Notes 1 1 Outline Introduction Simple Queues Performance Measures

More information

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks

Application of Importance Sampling in Simulation of Buffer Policies in ATM networks Application of Importance Sampling in Simulation of Buffer Policies in ATM networks SAMAD S. KOLAHI School of Computing and Information Systems Unitec New Zealand Carrington Road, Mt Albert, Auckland NEW

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing theory and teletraffic systems Viktoria Fodor Laboratory of Communication Networks School of Electrical Engineering Lecture 1 If you want to model networks Or a complex data flow A queue's

More information

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool

Lecture: Simulation. of Manufacturing Systems. Sivakumar AI. Simulation. SMA6304 M2 ---Factory Planning and scheduling. Simulation - A Predictive Tool SMA6304 M2 ---Factory Planning and scheduling Lecture Discrete Event of Manufacturing Systems Simulation Sivakumar AI Lecture: 12 copyright 2002 Sivakumar 1 Simulation Simulation - A Predictive Tool Next

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

Performance Analysis of WLANs Under Sporadic Traffic

Performance Analysis of WLANs Under Sporadic Traffic Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Traffic theory for the Internet and the future Internet

Traffic theory for the Internet and the future Internet Traffic theory for the Internet and the future Internet Orange Labs Jim Roberts, Research & Development 29 August 2008, MAS Seminar Internet traffic theory understanding the relationship between demand,

More information

Data Network Protocol Analysis & Simulation

Data Network Protocol Analysis & Simulation Module Details Title: Long Title: Data Network PENDING APPROVAL Data Network Module Code: EE509 Credits: 7.5 NFQ Level: 9 Field of Study: Electronic Engineering Valid From: 2017/18 (Sep 2017) Module Delivered

More information

Probability Models.S4 Simulating Random Variables

Probability Models.S4 Simulating Random Variables Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard Probability Models.S4 Simulating Random Variables In the fashion of the last several sections, we will often create probability

More information

Power Laws in ALOHA Systems

Power Laws in ALOHA Systems Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia

More information

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information

Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Connection-Level Scheduling in Wireless Networks Using Only MAC-Layer Information Javad Ghaderi, Tianxiong Ji and R. Srikant Coordinated Science Laboratory and Department of Electrical and Computer Engineering

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority?

Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? Institut für Technische Informatik und Kommunikationsnetze Philipp Sager Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? Post Diploma Thesis NA-2005-02 November 2004

More information

Time-Step Network Simulation

Time-Step Network Simulation Time-Step Network Simulation Andrzej Kochut Udaya Shankar University of Maryland, College Park Introduction Goal: Fast accurate performance evaluation tool for computer networks Handles general control

More information

Appendix A. Methodology

Appendix A. Methodology 193 Appendix A Methodology In this appendix, I present additional details of the evaluation of Sync-TCP described in Chapter 4. In Section A.1, I discuss decisions made in the design of the network configuration.

More information

Building and evaluating network simulation systems

Building and evaluating network simulation systems S-72.333 Postgraduate Course in Radiocommunications Fall 2000 Building and evaluating network simulation systems Shkumbin Hamiti Nokia Research Center shkumbin.hamiti@nokia.com HUT 06.02.2001 Page 1 (14)

More information

A model for Endpoint Admission Control Based on Packet Loss

A model for Endpoint Admission Control Based on Packet Loss A model for Endpoint Admission Control Based on Packet Loss Ignacio Más and Gunnar Karlsson ACCESS Linneaus Center School of Electrical Engineering KTH, Royal Institute of Technology 44 Stockholm, Sweden

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

Simulation Models for Manufacturing Systems

Simulation Models for Manufacturing Systems MFE4008 Manufacturing Systems Modelling and Control Models for Manufacturing Systems Dr Ing. Conrad Pace 1 Manufacturing System Models Models as any other model aim to achieve a platform for analysis and

More information

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks

Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Probabilistic Modeling of Leach Protocol and Computing Sensor Energy Consumption Rate in Sensor Networks Dezhen Song CS Department, Texas A&M University Technical Report: TR 2005-2-2 Email: dzsong@cs.tamu.edu

More information

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls

Analytical Model for an IEEE WLAN using DCF with Two Types of VoIP Calls Analytical Model for an IEEE 802.11 WLAN using DCF with Two Types of VoIP Calls Sri Harsha Anurag Kumar Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science Bangalore

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network A Generalization of a TCP Model: Multiple Source-Destination Case with Arbitrary LAN as the Access Network Oleg Gusak and Tu rul Dayar Department of Computer Engineering and Information Science Bilkent

More information

Flow-Level Analysis of Load Balancing in HetNets and Dynamic TDD in LTE

Flow-Level Analysis of Load Balancing in HetNets and Dynamic TDD in LTE Flow-Level Analysis of Load Balancing in HetNets and Dynamic TDD in LTE Pasi Lassila (joint work with Samuli Aalto, Abdulfetah Khalid and Prajwal Osti) COMNET Department Aalto University, School of Electrical

More information

UNIT 4: QUEUEING MODELS

UNIT 4: QUEUEING MODELS UNIT 4: QUEUEING MODELS 4.1 Characteristics of Queueing System The key element s of queuing system are the customer and servers. Term Customer: Can refer to people, trucks, mechanics, airplanes or anything

More information

Network Traffic Characterisation

Network Traffic Characterisation Modeling Modeling Theory Outline 1 2 The Problem Assumptions 3 Standard Car Model The Packet Train Model The Self - Similar Model 4 Random Variables and Stochastic Processes The Poisson and Exponential

More information

Using Queuing theory the performance measures of cloud with infinite servers

Using Queuing theory the performance measures of cloud with infinite servers Using Queuing theory the performance measures of cloud with infinite servers A.Anupama Department of Information Technology GMR Institute of Technology Rajam, India anupama.a@gmrit.org G.Satya Keerthi

More information

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA

CS 556 Advanced Computer Networks Spring Solutions to Midterm Test March 10, YOUR NAME: Abraham MATTA CS 556 Advanced Computer Networks Spring 2011 Solutions to Midterm Test March 10, 2011 YOUR NAME: Abraham MATTA This test is closed books. You are only allowed to have one sheet of notes (8.5 11 ). Please

More information

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3

ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 ECSE-4670: Computer Communication Networks (CCN) Informal Quiz 3 : shivkuma@ecse.rpi.edu Biplab Sikdar: sikdab@rpi.edu 1 T F Slotted ALOHA has improved utilization since the window of vulnerability is

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

QOS IN PACKET NETWORKS

QOS IN PACKET NETWORKS QOS IN PACKET NETWORKS THE KLUWER INTERNATIONAL SERIES IN ENGINEERING AND COMPUTER SCIENCE QOS IN PACKET NETWORKS by Kun I. Park, Ph.D. The MITRE Corporation USA Springer ebook ISBN: 0-387-23390-3 Print

More information

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 9 November 12, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 9 November 12, 2018 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2018-2019 Medium Access Control Scheduled access Classification of wireless

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

Providing QoS to Real and Non-Real Time Traffic in IEEE networks

Providing QoS to Real and Non-Real Time Traffic in IEEE networks Providing QoS to Real and Non-Real Time Traffic in IEEE 802.16 networks Joint work with my student Harish Shetiya Dept. of Electrical Communication Engg., Indian Institute of Science, Bangalore Overview

More information

Analysis of Simulation Results

Analysis of Simulation Results Analysis of Simulation Results Raj Jain Washington University Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse574-08/

More information

Congestion Avoidance

Congestion Avoidance Congestion Avoidance Richard T. B. Ma School of Computing National University of Singapore CS 5229: Advanced Compute Networks References K. K. Ramakrishnan, Raj Jain, A Binary Feedback Scheme for Congestion

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

Stochastic Admission Control for Quality of Service in Wireless Packet Networks

Stochastic Admission Control for Quality of Service in Wireless Packet Networks Stochastic Admission Control for Quality of Service in Wireless Packet Networks Majid Ghaderi 1, Raouf Boutaba 1, and Gary W. Kenward 2 1 University of Waterloo, Waterloo, ON N2L 3G1, Canada {mghaderi,rboutaba}@uwaterloo.ca

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction A Monte Carlo method is a compuational method that uses random numbers to compute (estimate) some quantity of interest. Very often the quantity we want to compute is the mean of

More information

TCP performance analysis through. processor sharing modeling

TCP performance analysis through. processor sharing modeling TCP performance analysis through processor sharing modeling Pasi Lassila a,b, Hans van den Berg a,c, Michel Mandjes a,d, and Rob Kooij c a Faculty of Mathematical Sciences, University of Twente b Networking

More information

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY

TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY TCP START-UP BEHAVIOR UNDER THE PROPORTIONAL FAIR SCHEDULING POLICY J. H. CHOI,J.G.CHOI, AND C. YOO Department of Computer Science and Engineering Korea University Seoul, Korea E-mail: {jhchoi, hxy}@os.korea.ac.kr

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Recap: Simulation Model Taxonomy 2 Recap: DES Model Development How to develop a

More information

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols

Module objectives. Integrated services. Support for real-time applications. Real-time flows and the current Internet protocols Integrated services Reading: S. Keshav, An Engineering Approach to Computer Networking, chapters 6, 9 and 4 Module objectives Learn and understand about: Support for real-time applications: network-layer

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Resource Allocation and Queuing Theory

Resource Allocation and Queuing Theory and Modeling Modeling Networks Outline 1 Introduction Why are we waiting?... 2 Packet-Switched Network Connectionless Flows Service Model Router-Centric versus Host-Centric Reservation Based versus Feedback-Based

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

Fundamentals of Queueing Models

Fundamentals of Queueing Models Fundamentals of Queueing Models Michela Meo Maurizio M. Munafò Michela.Meo@polito.it Maurizio.Munafo@polito.it TLC Network Group - Politecnico di Torino 1 Modeling a TLC network Modelization and simulation

More information

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation

Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation Fast Automated Estimation of Variance in Discrete Quantitative Stochastic Simulation November 2010 Nelson Shaw njd50@uclive.ac.nz Department of Computer Science and Software Engineering University of Canterbury,

More information

Improving Accuracy in End-to-end Packet Loss Measurement

Improving Accuracy in End-to-end Packet Loss Measurement Improving Accuracy in End-to-end Packet Loss Measurement Joel Sommers, Paul Barford, Nick Duffield, Amos Ron University of Wisconsin-Madison AT&T Labs-Research * * Background Understanding its basic characteristics

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

the past doesn t impact the future!

the past doesn t impact the future! Memoryless property: suppose time between session arrivals Z is exponentially distributed note: Pr{Z >y} = y be bt dt = e by suppose a session has not arrived for y seconds what is the probability that

More information

Kommunikationssysteme [KS]

Kommunikationssysteme [KS] Kommunikationssysteme [KS] Dr.-Ing. Falko Dressler Computer Networks and Communication Systems Department of Computer Sciences University of Erlangen-Nürnberg http://www7.informatik.uni-erlangen.de/~dressler/

More information

A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes

A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes D.D. Kouvatsos, K. Al-Begain, and I. Awan Department of Computing, School of Informatics, University of Bradford BD7 1DP, Bradford,

More information

Performance Evaluation of Scheduling Mechanisms for Broadband Networks

Performance Evaluation of Scheduling Mechanisms for Broadband Networks Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs

June 20th, École Polytechnique, Paris, France. A mean-field model for WLANs. Florent Cadoux. IEEE single-cell WLANs Initial Markov under Bianchi s École Polytechnique, Paris, France June 20th, 2005 Outline Initial Markov under Bianchi s 1 2 Initial Markov under Bianchi s 3 Outline Initial Markov under Bianchi s 1 2

More information

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks

Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Analytical Modeling of TCP Clients in Wi-Fi Hot Spot Networks Raffaele Bruno, Marco Conti, and Enrico Gregori Italian National Research Council (CNR) IIT Institute Via G. Moruzzi, 1-56100 Pisa, Italy {firstname.lastname}@iit.cnr.it

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Design and Implementation of Measurement-Based Resource Allocation Schemes Using the Realtime Traffic Flow Measurement Architecture

Design and Implementation of Measurement-Based Resource Allocation Schemes Using the Realtime Traffic Flow Measurement Architecture Design and Implementation of Measurement-Based Resource Allocation Schemes Using the Realtime Traffic Flow Measurement Architecture Robert D. Callaway, Michael Devetsikiotis, and Chao Kan Department of

More information

Combinatorial Search; Monte Carlo Methods

Combinatorial Search; Monte Carlo Methods Combinatorial Search; Monte Carlo Methods Parallel and Distributed Computing Department of Computer Science and Engineering (DEI) Instituto Superior Técnico May 02, 2016 CPD (DEI / IST) Parallel and Distributed

More information

Deadline-Based Scheduling in Support of Real-Time Data Delivery

Deadline-Based Scheduling in Support of Real-Time Data Delivery Deadline-Based Scheduling in Support of Real-Time Data Delivery Yanni Ellen Liu Department of Computer Science University of Manitoba Winnipeg, Manitoba, Canada R3T 2N2 yliu@cs.umanitoba.ca Johnny W. Wong

More information

ETSN01 Exam. March 16th am 1pm

ETSN01 Exam. March 16th am 1pm ETSN01 Exam March 16th 2017 8am 1pm Instructions Clearly label each page you hand in with your name or identifier and the page number in the bottom right hand corner. Materials allowed: calculator, writing

More information

B. Bellalta Mobile Communication Networks

B. Bellalta Mobile Communication Networks IEEE 802.11e : EDCA B. Bellalta Mobile Communication Networks Scenario STA AP STA Server Server Fixed Network STA Server Upwnlink TCP flows Downlink TCP flows STA AP STA What is the WLAN cell performance

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Transmission algorithm for video streaming over cellular networks

Transmission algorithm for video streaming over cellular networks Transmission algorithm for video streaming over cellular networks Y. Falik 1, A. Averbuch 1, U. Yechiali 2 1 School of Computer Science, Tel Aviv University Tel Aviv 69978, Israel 2 Department of Statistics

More information

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology

More information

COM-208: Computer Networks - Homework 1

COM-208: Computer Networks - Homework 1 COM-208: Computer Networks - Homework 1 1. Design an application-level protocol to be used between an TM (automatic teller machine) and a bank s centralized server. The protocol should allow: verifying

More information

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems

More information

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov.

Lecture 21. Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. Lecture 21 Reminders: Homework 6 due today, Programming Project 4 due on Thursday Questions? Current event: BGP router glitch on Nov. 7 http://money.cnn.com/2011/11/07/technology/juniper_internet_outage/

More information

2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring

2. Traffic lect02.ppt S Introduction to Teletraffic Theory Spring lect02.ppt S-38.145 - Introduction to Teletraffic Theory Spring 2005 1 Contents Traffic characterisation Telephone traffic modelling Data traffic modelling at packet level Data traffic modelling at flow

More information

Network Performance Analysis

Network Performance Analysis Network Performance Analysis Network Performance Analysis Thomas Bonald Mathieu Feuillet Series Editor Pierre-Noël Favennec First published 2011 in Great Britain and the United States by ISTE Ltd and

More information

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet

More information

Outline. Application examples

Outline. Application examples Outline Application examples Google page rank algorithm Aloha protocol Virtual circuit with window flow control Store-and-Forward packet-switched network Interactive system with infinite servers 1 Example1:

More information

Lecture 2: Introduction to Numerical Simulation

Lecture 2: Introduction to Numerical Simulation Lecture 2: Introduction to Numerical Simulation Ahmed Kebaier kebaier@math.univ-paris13.fr HEC, Paris Outline of The Talk 1 Simulation of Random variables Outline 1 Simulation of Random variables Random

More information

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks

Hybrid Control and Switched Systems. Lecture #17 Hybrid Systems Modeling of Communication Networks Hybrid Control and Switched Systems Lecture #17 Hybrid Systems Modeling of Communication Networks João P. Hespanha University of California at Santa Barbara Motivation Why model network traffic? to validate

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information