Bandwidth Provisioning in ADSL Access Networks

Size: px
Start display at page:

Download "Bandwidth Provisioning in ADSL Access Networks"

Transcription

1 Bandwidth Provisioning in ADSL Access Networks Kaiqi Xiong, Harry Perros, and Steven Blake 2 Department of Computer Science, NC State University, Raleigh, NC , USA {xiong,hp}@csc.ncsu.edu 2 Extreme Networks Raleigh, NC, USA sblake@extremenetworks.com Abstract. We consider an ADSL access network consisting of subscribers, s, metro Ethernet switches and a broadband remote access aggregation server (BRAS). We obtain expressions for dimensioning the access network in the upstream direction. Specifically, we show that the bandwidth required at each, metro Ethernet switch, and BRAS can be expressed as an exponential function of the subscribers in a log scale when the number of subscribers does not surpass a certain value. After this value, it grows linearly as a function of the subscribers. Keywords: Network provisioning, ADSL networks, equivalent bandwidth INTRODUCTION Triple play services have dramatically increased the bandwidth required in an ADSL access network. In addition, it is anticipated that the number of subscribers that can be supported by a single ADSL access network will easily reach to a,. In this paper, we obtain efficient expressions for dimensioning the upstream links of the s, metro Ethernet switches, and a broadband remote access aggregation server (BRAS) in an access network. Network provisioning has been widely studied in the literature. For example, [3], [4], [9], [], and [2]. Cao and Zegura [3] considered the bandwidth allocation scheme for an available bit rate service. In Liao and Campbell [4], a mechanism was developed with the capability of delivering capacity provisioning in an efficient manner providing quantitative delay-bounds with differentiated loss across per-aggregate service classes. Nowak, et al. [9] developed a C++ event driven simulator to measure these values in optical networks. In paper [], the author proposed a dimensioning model of an access network using the bufferless Elrang loss model. Resource allocation has been studied for differentiated services in Xiong and Perros [2]. One of the challenging problems is the dimensioning of an output port buffer into which multiple bursty and correlated arrival streams flow. This buffer is modeled by a queueing system, known as the statistical multiplexer, which has

2 2 Xiong et al. been widely studied particularly within the context of ATM networks. For instance, Anick et al. [] analyzed an ATM multiplexer using fluid flow models. Both statistical multiplexing and statistical bandwidth allocation are quantitatively evaluated for ATM traffic in Saito et al. []. Jelenkovic and Lazar [8] analyzed the network traffic of multiplexing sub-exponential on-off sources. Hasslinger [6] provided a performance evaluation of statistical multiplexing, where traffic flows were modeled by autoregressive processes producing autocorrelated and Gaussian distributed workloads. The equivalent bandwidth provides a simple way for the calculation of the bandwidth required by a variable bit connection in a statistical multiplexer, so that it experiences a given packet loss. The calculation of equivalent bandwidth was originally proposed by Guérin and Ahmadi [5]. For a discussion of its behavior, see Perros [7]. Zukerman [3] used a Poisson Pareto burst process (PPBP) to fit Internet traffic traffic stream for the calculation of the parameters of the PPBP, and predict the queueing performance of a sample trace of aggregated Internet traffic. Recently, Cho et al. [2] reported aggregated traffic measurements collected over 2 months from seven ISPs covering 42% of the Japanese backbone traffic. Characterizing the Internet traffic of an entire country in [2] will certainly be very useful in bandwidth provisioning. In this paper, we obtain expressions for dimensioning the access network in the upstream direction, i.e., from the subscribers to the network. We decompose the problem of dimensioning an ADSL access network into three levels of hierarchically interconnected statistical multiplexers. The first level consists of statistical multiplexers each representing a number of subscribers served by a. Each subscriber is represented by an interrupted Poisson process (IPP), and there may be a large number of these multiplexers since we assume a large number of subscribers. The second level consists of a smaller number of multiplexers, each representing a number of s served by a metro Ethernet switch. Finally, the third level consists of a single multiplexer that represents the metro Ethernet switches served by the BRAS. We use the equivalent bandwidth expressions to dimension each multiplexer. A key requirement for this analysis is the characterization of the departure process from one multiplexer which becomes part of the arrival process to a higher level multiplexer. We note that despite the extensive literature on statistical multiplexers, the problem of characterizing the departure process from a multiplexer has not been adequately addressed. In this paper, we show that when the number of IPP arriving streams into a multiplexer is large, the departure process can also be approximated by an IPP as well, where the mean on and off periods can be easily computed approximately. This simplified the analysis of these multiplexers and permitted us to use the equivalent bandwidth for dimensioning the access network. Based on these dimensioning results, we show that the bandwidth requirement at a multiplexer can be predicted by the following formula: BW = { rca log U, for < U U ˆrCU + b for U > U ()

3 Bandwidth Provisioning in ADSL Access Networks 3 where U is the number of subscribers, C is the subscriber peak bit rate, and the base of log is. a, r, ˆr, and b are constants with a, r, ˆr>. All of them are determined for the multiplexer under study. Formula () states that the bandwidth requirement at a multiplexer can be expressed as an exponential function of the subscribers U in a log scale when U is less than a certain value U. For values of U > U, it grows linearly in U. Note that a log U = U log a is not equivalent to U when a is not equal to. To the best of our knowledge, no one has studied and verified () before. The rest of the paper is organized as follows. In Section 2, we describe the dimensioning problem for the upstream case of an ADSL access network. In Section 3, we characterize the departure process from a statistical multiplexer, and in Section 4 we give the equivalent bandwidth expressions for each of the three level multiplexers. Numerical results are given in Section 5. Finally, our conclusion and further work are given in Section 6. 2 The Bandwidth Provisioning Problem An ADSL access network consists of subscribers which are served by s. Groups of s are connected to a metro Ethernet switch, and all the switches are connected to a BRAS, as shown in Figure. We provide formulae for dimensioning such an access network. Central Office Metro Metro Ethernet Ethernet BRAS Internet Application Provider Central Office Fig.. An ADSL access network The upstream ADSL access network shown in Figure can be modeled by the queueing network depicted in Figure 2. The finite queues represent the upstream output ports of the s, metro Ethernet switches and BRAS. Each queue is served by a single server which represents an upstream link. The service rate, which is the capacity of the link, is the same for all queues, and it is the same for all the metro Ethernet switch queues. Let µ j, j =, 2, 3, be the service rate of a, metro Ethernet switch and BRAS. The queueing network consists of three levels of statistical multiplexers. The first level represents the s, where groups of subscribers are connected to a. Each subscriber generates traffic which is modelled as an interrupted Poisson process (IPP), i.e., it is an on-off process where the on and off periods are exponentially

4 4 Xiong et al. distributed. Packets arrive only during the on period in a Poisson fashion. All subscribers are assumed to have an identical IPP. Let us assume that the total number of s is N. Groups of s are connected to a metro Ethernet switch, and let N 2 be the total number of switches. These switches are all connected to a BRAS which is connected to the Internet. µ Metro switch µ 2 µ BRAS µ 3 µ Metro switch µ 2 µ Fig. 2. The Upstream Queueing Network Model To analyze this queueing network, we decompose it into the three levels of multiplexers. Since all the multiplexers are similar, it suffices to consider a single one. We use the equivalent bandwidth to dimension the queue for a fixed number of subscribers and IPP parameters. Likewise, it suffices to consider a single metro Ethernet switch multiplexer. The input to this multiplexer is the output of all the multiplexers connected to it. In view of this, we need to characterize the output process of the multiplexer. In the following section, we characterize the output process from a multiplexer as an IPP process. This characterization is correct for a large number of input sources, i.e. subscribers. This approach now permits us to treat the metro Ethernet switch multiplexer in the same way we treat the multiplexer. Consequently, we can use the equivalent bandwidth to dimension a switch. The same process applies to the BRAS multiplexer. 3 The Departure Process From a Multiplexer In this section, we characterize the departure process from a and a metro Ethernet switch. On-off sources have been widely studied in the literature as they capture the bursty nature of network traffic. Hence, in this paper, we assume that the traffic generated by each subscriber is an IPP. We consider the multiplexer shown in Figure 3. Let N be the number of IPP identical independent sources flowing into the multiplexer, and let µ be the service rate expressed in bits/sec. We assume exponentially distributed service times. Obviously, the departure process is an on-off process. The on and off periods correspond to the busy and idle periods of the multiplexer. Of interest is to identify the distribution of those two periods. In view of this, we simulated the multiplexer for different traffic

5 Bandwidth Provisioning in ADSL Access Networks 5 intensities and different values of N. In order to construct an efficient simulator, we did not simulate individual packets. Rather, since an on period of an IPP arrival stream represents a burst of packets, we treat each burst as a single customer. (Customers do not arrive instantaneously. It takes the equivalent of an on period for a customer to arrive.) This simplification may have an impact on the waiting time of an individual packet, but it does not alter the duration of the busy and idle periods of the multiplexer. N Sources µ Fig. 3. The Multiplexer Let us assume that the on and off periods of an IPP source have a mean of α and β respectively, expressed in seconds. Then, each source transmits one burst for a period of time which is equal to α on the average followed by an off period with a mean of β. As a result, the rate at which it transmits bursts is ( α )+( ). β Therefore, the total rate of transmission from all N sources in bursts/sec is N λ = ( α )+( β ). Let R be the peak bit rate of a source. Then, the total arrival rate to the multiplexer expressed in bits/sec is ˆλ N = ( α )+( )R α = λr α. Furthermore, β let τ be the mean idle period of the multiplexer expressed in seconds and ρ its utilization. We approximate τ by the burst inter-arrival time, i.e., τ = λ = ( ) N α β α+β = α+β N α β. Now, let s be the mean of the busy period of the multiplexer expressed in seconds. Then, is the percent of time that the multiplexer is s s+τ busy, which is equal to ρ, where ρ = ˆλ. (We recall that µ is also expressed in bits/sec.) That is, s s+τ = ρ, which derives that s = τ µ /ρ = ˆλ µ ˆλ λ = R µ N R β α. α+β From a large number of simulation experiments, we have concluded that the distribution of the on and off periods of the departure process can be approximated by an exponential distribution with a mean on and mean off as specified by τ and s above when N is not too small. In Figures 4, 5 and 6, we plot the cumulative distribution function of the busy and idle periods for N =5, 5, respectively. In addition, we have fitted an exponential distribution to the simulation data which is also shown in Figures 4, 5 and 6 as well. We note that the exponential distribution fits the simulation data very well when N = 5 and N = 5, but not when N =. A large number of our experiments showed that the larger the value of N, the better the fit. 4 Network Bandwidth Provisioning We calculate the required bandwidth at each multiplexer level, using the notion of the equivalent bandwidth. Let us consider that a source produces packets that

6 6 Xiong et al. Cumulative Distribution Function F(t) On Period(N=5).8.6 CDF.4 exponential fit Time t Cummulative Distribution Function F(t) Off Period (N=5)..8.6 data exponential fit Time t (a) On period (b) Off period Fig. 4. The departure process when N = 5 Cumulative Distribution Function F(t) On Period (N=5).8.6 CDF.4 exponential fit Time t Cummulative Distribution Function F(t) Off Period (N=5)..8 data.6 exponential fit Time t (a) On period (b) Off period Fig. 5. The departure process when N = 5 Cumulative Distribution Function F(t) On Period (N=).8.6 CDF.4 exponential fit Time t Cummulative Distribution Function F(t) Off Period (N=)..8.6 data exponential fit Time t (a) On period (b) Off period Fig. 6. The departure process when N =

7 Bandwidth Provisioning in ADSL Access Networks 7 are queued in a finite buffer which is served at a given rate. Then, the equivalent bandwidth of the source is defined as the service rate at which the queue is served that corresponds to a packet loss rate of ε. The equivalent bandwidth of a source falls somewhere between its average arrival rate and its peak arrival rate. If the source is very bursty, then it is closer to its peak service rate. Otherwise, it is closer to its average arrival rate. Various approximations have been suggested to compute the equivalent bandwidth of a source. One of the most commonly used approximations adopts the assumption that each source is an interrupted fluid process (IFP) characterized by the triplet (R j, ρ j, α j ) for j =, 2,, N, where R j is the peak bit rate of source j, ρ j the fraction of time that source j is active, defined as the ratio of the mean length of the on period divided by the sum of the mean on and off periods, and α j the mean duration of the on period. We further assume that the N sources flow into a finite-capacity queue with a constant service time, and let K be the size of the queue expressed in bits. Then, the equivalent bandwidth e j of source j is calculated by (refer to [7]): e j = [η j K + (η j K) 2 + 4Kη j ρ j ] R j 2η j (2) for j =, 2,, N, where η j = α j ( ρ j )R j ln ε. The equivalent bandwidth of N sources can be given by the expression (refer to [7]): E = min{γ + σ 2 ln(ε) ln(2π), N e j } (3) where γ is the average bit rate of all the sources, and σ the sum of the standard deviation of the bit rate of all the sources. σ is obtained below. Denote by ξ j the random variable representing the bit rate generated by source j. Then, the probability distribution of ξ j can be expressed by p(ξ j = R j ) = ρ j and p(ξ j = ) = ρ j. This implies that the expectation of ξ j is given by E(ξ j ) = ρ j R j + ( ρ j ) = ρ j R j. That is, the average bit rate of source j is ρ j R j denoted by δ j. Moreover, let σ j be the standard deviation of the bit rate of the j-th source. Then, σj 2 = E(ξ j E(ξ j )) 2 = ρ j (R j δ j ) 2 +( ρ j )( δ j ) 2 = ρ j R j (R j ρ j R j ) = δ j (R j δ j ), which means that σ j = δ j (R j δ j ). Subsequently, the sum of the standard deviation of the bit rate of N identical sources σ is computed by σ 2 = N j= σ2 j = N j= δ j(r j δ j ). N That is, σ = j= δ j(r j δ j ). Bandwidth Provisioning in the : In order that the has a packet loss rate of less than ε its bandwidth B should be more than the equivalent bandwidth E, i.e., B µ = min{γ + σ 2 ln(ε) ln(2π), N j= e j}.we have assumed that all N sources are assumed to be identical IPPs, with a mean on and off period given by α and β respectively. Therefore, for the j- th source we have R j = c j, where c j is the link speed between the j-th source and the multiplexer. ρ j = /α /α+/β = β α+β, η j = α ( ρ j)r j ln ε = R j α+β ln ε for j=

8 8 Xiong et al. j =, 2,, N. Let K d be the size of the finite-capacity queue of the expressed in bits. Thus, we have B min{γ + σ 2 ln(ε) ln(2π), Ne } (4) where σ = R Nρ ( ρ ) and e is determined by { [ e = R ln ] { [ ε K d (α + β) + R ln ε K d (α + β) +4K d R β ln ε This is because we have that } 2 } ( 2 ln ε ) e = η K d + (η K d ) 2 + 4K d η ρ R 2η = R α+β ln ε K d + ( R α+β ln ε K d) 2 + 4K d R α+β ln ε 2R α+β ln ε ] 2 β α+β from which the above expression of e can be easily derived. Bandwidth Provisioning in the Metro Ethernet Switch: As discussed in Section 3, the departure from each is approximated by an IPP process. This implies that the arrival process from each to a metro Ethernet switch is an IPP as well. According to Section 3, the off period of the process has a mean of α+β a mean of ρ = ˆλ Nαβ ρ α+β ρ Nαβ N R /α+/β α µ = α d = µ NR β α+β denoted by β d denoted by α d µ = NRβ µ (α+β) R expressed in seconds, and its on period has expressed in seconds, where ρ is given by, which derives that the on period has a mean of R α. Similarly, the equivalent bandwidth e m of a source at the metro Ethernet switch is given by e m = [η m K m + (η m K m ) 2 + 4K m η m ρ m ] R m 2η m (5) where η m = α d ( ρ m )R m ln ε, K m is the size of the finite-capacity queue of the metro Ethernet switch expressed in bits, R m is the peak bit rate of a source in the metro Ethernet switch, ρ m is the fraction of time that the source is active, defined as the ratio of the mean length of the on period divided by the sum of the mean on and off periods, that is, ρ m is given by ρ m = β d α d +β d. Notice that the traffic of N s flows into a metro Ethernet switch and we assume that all these flows are identical. Thus, in order that the has a packet loss rate of less than ε its bandwidth B 2 should be more than the equivalent bandwidth of all N sources, i.e., B 2 min{γ m + σ m 2 ln(ε) ln(2π), N e m } (6)

9 Bandwidth Provisioning in ADSL Access Networks 9 where γ m is the average bit rate of all the N sources flowing into a metro Ethernet switch, and σ m is the sum of the standard deviation of the bit rate of all the sources given by σ m = N δ m (R m δ m ) = R m N ρ m ( ρ m ) due to δ m = ρ m R m. Similarly, we can express e m as a function of inputs α and β like e. We omit it here. Bandwidth Provisioning in the BRAS: Assuming that more than 5 s are connected to a metro Ethernet switch, the departure process from a switch can be approximated by an IPP. The mean off period is expressed in burst/sec, and the mean on pe- α d +β d α N α d β d, or β m = N d β d α d +β d riod α m = ρ d α d +β d N ρ d, or α m = N ρ d α d β d NRmβ d µ 2 (α d +β d ). β m = ρ d α d β d α d +β d expressed in burst/sec, where ρ d is given by ρ d = Notice that the traffic of N 2 metro Ethernet switches flows into a BRAS router and assume that all these flows are identical. Then, in order for the BRAS to have a packet loss rate of less than ε its bandwidth B 3 should be more than the equivalent bandwidth of all N 2 sources, i.e., B 3 min{γ b + σ b 2 ln(ε) ln(2π), N2 e b } (7) where γ b is the average bit rate of all the N 2 metro switch s sources flowing into a BRAS router, and σ b is the sum of the standard deviation of the bit rate of all the sources given by σ b = R b N2 ρ b ( ρ b ). R b is the peak bit rate of a source at the BRAS, and e b is the equivalent bandwidth of a metro Ethernet switch source expressed by the equivalent bandwidth e m of a source at the metro Ethernet switch is calculated by [η b K b + ] (η b K b ) 2 + 4K b η b ρ b R b e b = (8) 2η b where η b = α m ( ρ b )R b ln ε, K b is the size of the finite-capacity queue of the metro Ethernet switch expressed in bits, and ρ b the fraction of time that the source is active, defined as the ratio of the mean length of the on period divided by the sum of the mean on and off periods, that is, ρ b is computed by ρ b = βm α m +β m. 5 Numerical Results In this section, we provide numerical results that illustrate the bandwidth required in the upstream link of a, a metro Ethernet switch and a BRAS based on the model assumptions given in Section 2. The bandwidth required was calculated using the equivalent bandwidth expressions (4), (6) and (7). Denote by K d, K m, and K b the buffer in the, the metro switch and the BRAS respectively. Let us first study the bandwidth required in the upstream link of a. Suppose that K d = 5 Mbits. That is, the buffer size is such that the maximum delay in the uplink output port is no more than 5 msec when the uplink capacity is Gbps. We also choose R = 25 Mbps, α =.667 sec, β =.6 sec, and ε = 6. The average size of a burst is equal to R /α, or

10 Xiong et al EB Expon. (EB) y = 6.24e.89x R 2 = EB Linear (EB) y = 2.677x R 2 = #Subscribers in a log scale #Subscribers (a) < U 272 (b) U > 272 Fig. 7. Bandwidth required in the upstream link Mbits, on the average. Figures 7(a) and 7(b) show the bandwidth required in the upstream link based on the expression (4) for the equivalent bandwidth as a function of the number of subscribers U when < U U = 272 and U > 272 respectively. We fitted various curves into the results obtained of which the best-fit curve is y = 6.24e.89x, where x = log U, with R 2 =.997, when < U 272. The value of U is estimated through a brute force search in the curve fitting. Note that Figure 7(a) is in log scale but Figure 7(b) is not. We use the R 2 value to indicate how close the curve fits the experimental data. (R 2 = means a perfect fit, R 2 = implies that the curve does not fit the experimental data at all.) That is, when < U 272 the bandwidth required in the upstream link of a as a function of the number of subscribers U is given as follows. B = 6.24e.89 log U = log U (9) Furthermore, we fitted various curves into the results obtained of which the bestfit curve is y = 2.677x , where x = U, with R 2 =.9999 when U > U = 272. That is, the bandwidth required in the upstream link of a as a function of the number of subscribers U is B = 2.677U , when U > 272. Actually, this linear relation between B and U can be mathematically confirmed below. Since the average load (γ) dominates the square root of N in the standard deviation (σ) for large values of N, (3) is O(N) in the case of a large number (N) of subscribers. This means that (4) is O(N) in the case of a large number (N) of subscribers as well. That is, B is a linear function of N or U n the case of a large number (U) of subscribers. However, it is not straightforward to mathematically prove that the rest of results given in the form () hold for, metro Ethernet switch and BRAS. Below we continue to focus on the numerical validations of the results given in the form (). As can be seen, the above expressions have the same form as () if a = 6.657, r =.6486, b = and ˆr =.43, since C = R = 25 Mbps. Thus, it follows from (9) that we can get U = 89 when B = Gbps. That is, a with GE uplink to a metro Ethernet switch can serve 89 subscribers. Of course, the number of subscribers will change if we change the subscriber s traffic characteristics /α and /β. (The arrival rate of packet during the on period is not of interest since we assume that the source transmits continuously during the on period.) Subsequently, we analyze a metro Ethernet switch. Specifically, we will calculate how many upstream links can be supported by a single GE

11 Bandwidth Provisioning in ADSL Access Networks EB Expon. (EB) x y = 49.7e R 2 = EB 4 Linear (EB) 3 2 y = 483.4x R 2 = #s in a log scale #s (a) < U 999 (b) U > 999 Fig. 8. Bandwidth required in the metro Ethernet switch uplink from a metro Ethernet switch to BRAS. We also assume that K m = Mbits. That is, the buffer size is such that the maximum delay in the uplink output port is no more than msec when the metro uplink capacity is Gbps. Using the formulas derived in Section 3, we have that the on and off means of the departure process from a are given by α d =.36 sec and β d =.35 = 3.6 Mbits. Figures 8(a) and 8(b) show the bandwidth requirement in the metro switch as a function of the number of s uplink D based on the implementation of (6). As shown in Figures 8(a) and 8(b), the best-fit curves to the calculated required bandwidth are y = 49.7e 2.326x, where x = log D, with R 2 =, when < x 5, and y = 483.4x + 295, where x = D, with R 2 =, when < x 5. That is, the bandwidth required in the metro Ethernet switch is given by sec. The size of a burst is equal to α d B 2 = { 49.7e log D = log D, for < D D 483.4D + 295, for D > D () where D is the total number of uplinks to the metro Ethernet switch served by the GbE uplink to BRAS, and D = 5 is estimated in the same way as U. Moreover, notice that a permits 89 subscribers. Hence, given a number of subscribers U, we need D = U 89 uplinks. Therefore, log D = log( U ) = log U and the bandwidth required in the metro Ethernet switch can be rewritten as { log B 2 = U, for < U 9639 () U + 295, for U > 9639 where U is the number of subscribers. This expression has the form of () if a =.2, r =.38, ˆr =.23, and b = 295, since C = R = 25 Mbps. It follows from () that D = 2 when B 2 = Gbps. Thus, one GE link from a metro Ethernet switch to BRAS can serve 2 s. Finally, we analyze the BRAS. As above, we will calculate how many metro Ethernet switch GE uplinks can be supported by a single GE uplink from BRAS to WAN. Let us also assume that K d = 2 Mbits. That is, the buffer size is such that the maximum delay in the uplink output GE port is no more than 2 msec. The departure traffic of the metro Ethernet switch can be determined

12 2 Xiong et al. 2 5 EB Expon. (EB) y = 9452e 2.326x 5 R 2 = EB y = 9452x + E-8 Linear (EB) R 2 = #Metro sw itches in a log scale #Metro switches (a) < U 684 (b) U > 684 Fig. 9. Bandwidth required in the BRAS by the use of the formulas presented in Section 3. They are respectively given by α m = / sec and β m = / burst/sec. The size of a burst is Mbits. Figures 9(a) and 9(b) show the bandwidth requirement in the BRAS upstream link as a function of the number of the metro Ethernet switch GE uplinks to BRAS, based on the implementation of (7). As we see in these figures, the best-fit curves are y = 9452e 2.326x, where x = log S, with R 2 = when < x 8, and y = 9452x + 8, where x = S, with R 2 = when x > 8. That is, the bandwidth required in the BRAS is given by B 3 = { 9452e log S = log S, for < S S 9452S + 8, for S > S (2) where S is the total number of GE uplinks from the metro Ethernet switches to the BRAS, and S = 8 is estimated in the same way as U and D. Again, notice that one GE uplink from a permits 89 subscribers and one GE uplink from a metro Ethernet switch permits 2 s. Hence, given U, we need U 89 D s, i.e., GE uplinks, and D 2 S s, i.e., GE metrio switch uplinks. Therefore, log S = log( D 2 ) = log( U ) log 2 = log U This means that the bandwidth required in the BRAS can be rewritten as { log B 3 = U, for < U U + 8 (3), for U > 684 where U is the number of subscribers. This expression has the same form as () when a =.2, r =.6, ˆr =.2, and b = 8, since C = R = 25 Mbps. When choosing B 3 = GE in (2), we get that S =. That is, one GE uplink from BRAS to WAN can support incoming GEs. It is interesting that in equation (3) the first expression is almost the same as the second one. This means that the traffic smoothes out after two levels of multiplexing and as a result there is no statistical gain when U is small. Of course, the result is dependent on how bursty the subscribers are. Thus, suppose that there are N s connected to a metro switch each via a GE link. Then, the number M of the required GE links from the switch to the BRAS is M = N 2. For instance, if N = 2, then M = 6.

13 Bandwidth Provisioning in ADSL Access Networks X 4X 6X #Subscribers in a log scale (a) at a metro Ethernet switch, one GE uplink X 4X 6X #s in a log scale (b) at a metro Ethernet switch, one GE uplink Fig.. Bandwidth required with the buffer sizes of X, 4X, and 6X Similarly, suppose that there are M GE uplinks from metro switches to a BRAS. Then, the number of the required GE uplinks from the BRAS to the WAN is BR = M. Hence, if M = 2, then BR = 2. Notice that the above conclusions hold based on our assumption about the subscriber traffic and buffer on the uplinks of the, the metro Ethernet switch and the BRAS. Formulas (9), (), and (3) have the same form as (). They also give the relationship between bandwidth requirements and the number of subscribers at each aggregation layer. For a given number of subscribers, the bandwidth required at each aggregation level can be estimated using these three formulas. Alternatively, given the capacity of each aggregation layer we can determine how many subscribers can be supported. We also studied the dimensioning problem with varied buffer sizes that are not reported in this paper due to space limit. Sensitivity Analysis The bandwidth required at each aggregation level was re-calculated assuming that the buffers at a, metro Ethernet switch, and BRAS were 4X and 6X, where X was the original buffer size, as shown in Table. Table. Buffer Sizes in the, the metro Ethernet switch and the BRAS Router Buffer Size (Mbits) X 4X 6X metro Ethernet switch BRAS router Figure (a) shows the bandwidth required at the with the buffer sizes of X, 4X and 6X. As indicated in the figure, the bandwidth requirement is almost the same for the buffer sizes of 5.2 Mbits and 2.48 Mbits when the number of subscribers U is more than (or log U = 2), but it requires about 3% less bandwidth for the buffer size of 8.92 Mbit (6X) compared to the buffer size of 5.2 Mbits (X).

14 4 Xiong et al. Fig.. Bandwidth Required at BRAS, one GbE uplink with the buffer sizes of X, 4X, and 6X The bandwidth requirements at a metro Ethernet switch and BRAS router are shown in Figures (b) and respectively. In the case of the metro Ethernet switch, it requires about 6.66% less bandwidth for a buffer size of 4X and about 8.25% less bandwidth for a buffer size of 6X compared to the metro Ethernet switch with a buffer size of X. However, the bandwidth required in BRAS is almost the same for all buffer sizes, i.e, X, 4X and 6X, as shown in Figures, which suggest that the X buffer size is sufficient. 6 Conclusions and Further Work In this paper, we considered the dimensioning of an ADSL access network in the upstream direction. The problem was decomposed into a number of statistical multiplexers, each depicting the s, metro Ethernet switches and BRAS that make up an ADSL access network. We used the equivalent bandwidth for dimensioning each multiplexer. We showed that the departure process from each multiplexer can be approximated by an IPP. We also demonstrated that the bandwidth required at an uplink of a, metro Ethernet switch, or BRAS can be expressed as an exponential function of the number of subscribers in a log scale when the number of subscribers does not surpass a certain value. After this value, it grows linearly as a function of the subscribers. Acknowledgments. The authors would like to thank the reviewers for their helpful comments that help improve the paper. This research was funded by a grant from the Center of Advanced Computing and Communication (CACC), NC State University.

15 References Bandwidth Provisioning in ADSL Access Networks 5. S. Anick, D. Mitra and M. Sondhi, Stochastic theory of a data-handling system with multiple sources, Bell System Technical Journal, 6(8), pp , October, K. Cho, K. Fukuda, H. Esaki, and A. Kato, The impact and implications of the growth in residential user-to-user traffic, In Proceedings of the ACM SIGCOMM, pp , Z. Cao and E. Zegura, Utility max-min: An application-oriented bandwidth allocaton scheme, In Proceedings of the IEEE INFOCOM, March R. Liao and A. Campbell, Dynamic core provisioning for quantitative differentiated services, IEEE/ACM Transactions on Networking, 2(3), pp , June, R. Guérin and H. Ahmadi, Equivalent Capacity and Its Application to Bandwidth Allocation in High-Speed Networks, IEEE Journal on Selected Areas in Communications, 9(7), pp , September, G. Hasslinger, Quality-of-Service Analysis for Statistical Multiplexing with Gaussian Distributed and Autoregressive Input, Telecommunication Systems, 6(3-4), pp , October Harry Perros, Connection-Oriented Networks: SONET/SDH, ATM, MPLS, and Optical Networks, John Wiley and Sons, P. Jelenkovic and A. Lazar, Asymptotic results for multiplexing subexponential on-off processes, Advances in Applied Probability, 3(2), pp , D. Nowak, P. Perry, and J. Murphy Bandwidth alocation for service agreement aware Ethernet passive optical networks, In Proceedings of the IEEE Globecom, 24.. O. Osterbo, Capacity Dimensioning for Real Time Services in Access Networks, pdf, 23.. H. Saito, M. Kawarasaki, and H. Yamada, An analysis of statistical multiplexing in an ATM transport network, IEEE Tran. Select Areas Commun., 9(3), pp , April K. Xiong and H. Perros, Computer Resource Optimization for Differentiated Customer Services, In Proceedings of the MASCOTS, pp , M. Zukerman, T. Neame, and R. Addie, Internet traffic modeling and future technology implications, In Proceedings of the IEEE INFOCOM, 23.

E ALLOCATION IN ATM BASED PRIVATE WAN

E ALLOCATION IN ATM BASED PRIVATE WAN APPLICATION OF INT TEGRATED MODELING TECHNIQ QUE FOR DATA SERVICES E F. I. Onah 1, C. I Ani 2,, * Nigerian Journal of Technology (NIJOTECH) Vol. 33. No. 1. January 2014, pp. 72-77 Copyright Faculty of

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project IEEE 802.16 Broadband Wireless Access Working Group Title 4IPP Traffic Model for IEEE 802.16.3 Date Submitted Source(s) 2000-10-31 C. R. Baugh, Ph.D. Harris Communications,

More information

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture

Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Design and Implementation of Measurement-Based Resource Allocation Schemes Within The Realtime Traffic Flow Measurement Architecture Robert D. allaway and Michael Devetsikiotis Department of Electrical

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Design and Implementation of Measurement-Based Resource Allocation Schemes Using the Realtime Traffic Flow Measurement Architecture

Design and Implementation of Measurement-Based Resource Allocation Schemes Using the Realtime Traffic Flow Measurement Architecture Design and Implementation of Measurement-Based Resource Allocation Schemes Using the Realtime Traffic Flow Measurement Architecture Robert D. Callaway, Michael Devetsikiotis, and Chao Kan Department of

More information

Edge Switch. setup. reject. delay. setup. setup ack. offset. burst. burst. release. φ l. long burst. short burst. idle. p s

Edge Switch. setup. reject. delay. setup. setup ack. offset. burst. burst. release. φ l. long burst. short burst. idle. p s Performance Modeling of an Edge Optical Burst Switching ode Lisong Xu, Harry G Perros, George Rouskas Computer Science Department orth Carolina State University Raleigh, C 27695-7534 E-mail: flxu2,hp,rouskasg@cscncsuedu

More information

On Optimal End-to-End QoS Budget Partitioning in Network Dimensioning

On Optimal End-to-End QoS Budget Partitioning in Network Dimensioning On Optimal End-to-End QoS Budget Partitioning in Network Dimensioning Hyunjoon Cho 1, André Girard 2, and Catherine Rosenberg 3 1 School of Electrical and Computer Engineering, Purdue University, hyunjoon@purdue.edu

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

Buffer Management for Self-Similar Network Traffic

Buffer Management for Self-Similar Network Traffic Buffer Management for Self-Similar Network Traffic Faranz Amin Electrical Engineering and computer science Department Yazd University Yazd, Iran farnaz.amin@stu.yazd.ac.ir Kiarash Mizanian Electrical Engineering

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,

More information

Advanced Internet Technologies

Advanced Internet Technologies Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Teletraffic theory (for beginners)

Teletraffic theory (for beginners) Teletraffic theory (for beginners) samuli.aalto@hut.fi teletraf.ppt S-38.8 - The Principles of Telecommunications Technology - Fall 000 Contents Purpose of Teletraffic Theory Network level: switching principles

More information

Stream Sessions: Stochastic Analysis

Stream Sessions: Stochastic Analysis Stream Sessions: Stochastic Analysis Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath and Dr. Kumar Outline Loose bounds

More information

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING

A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING A PRACTICAL APPROACH FOR MULTIMEDIA TRAFFIC MODELING Timothy D. Neame,l Moshe Zukerman 1 and Ronald G. Addie2 1 Department of Electrical and 2 Department of Mathematics Electronic Engineering, and Computer

More information

Using Low-power Modes for Energy Conservation in Ethernet LANs

Using Low-power Modes for Energy Conservation in Ethernet LANs Using Low-power Modes for Energy Conservation in Ethernet LANs Maruti Gupta Department of Computer Science Portland State University Portland, OR 9727 Email: mgupta@cs.pdx.edu Suresh Singh Department of

More information

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams

Characterizing Internet Load as a Non-regular Multiplex of TCP Streams Characterizing Internet Load as a Non-regular Multiplex of TCP Streams J. Aracil, D. Morató Dpto. Automática y Computación Universidad Pública de Navarra {javier.aracil,daniel.morato}@unavarra.es http://www.tlm.unavarra.es

More information

Bandwidth Estimation in Prerecorded VBR-Video Distribution Systems Exploiting Stream Correlation

Bandwidth Estimation in Prerecorded VBR-Video Distribution Systems Exploiting Stream Correlation Bandwidth Estimation in Prerecorded VBR-Video Distribution Systems Exploiting Stream Correlation G. Boggia, P. Camarda, and D. Striccoli Dipartimento di Elettrotecnica ed Elettronica Politecnico di Bari

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

END-TO-END estimation of the spare capacity along a network

END-TO-END estimation of the spare capacity along a network 130 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 A Stochastic Foundation of Available Bandwidth Estimation: Multi-Hop Analysis Xiliang Liu, Kaliappa Ravindran, and Dmitri Loguinov,

More information

Modelling data networks research summary and modelling tools

Modelling data networks research summary and modelling tools Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at

More information

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD

EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Journal of ELECTRICAL ENGINEERING, VOL. 57, NO. 6, 2006, 360 364 EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Peter Kvačkaj

More information

Self Similar Network Traffic present by Carl Minton. Definition of Self Similarity

Self Similar Network Traffic present by Carl Minton. Definition of Self Similarity Self Similar Network Traffic present by Carl Minton Agenda Definition of self similarity Quantifying self similarity Self similarity of network traffic Implications for network performance Pointers for

More information

A DYNAMIC BANDWIDTH ALLOCATION ALGORITHM IN EPON NETWORKS

A DYNAMIC BANDWIDTH ALLOCATION ALGORITHM IN EPON NETWORKS A DYNAMIC ANDWIDTH ALLOCATION ALGORITHM IN EPON NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, eijing, 1226, China ASTRACT With the rapid development

More information

Next Generation Networks MultiService Network Design. Dr. Ben Tang

Next Generation Networks MultiService Network Design. Dr. Ben Tang Next Generation Networks MultiService Network Design Dr. Ben Tang April 23, 2008 Operators face difficult network planning and design questions Can your current planning methods handle the complexity of

More information

A model for Endpoint Admission Control Based on Packet Loss

A model for Endpoint Admission Control Based on Packet Loss A model for Endpoint Admission Control Based on Packet Loss Ignacio Más and Gunnar Karlsson ACCESS Linneaus Center School of Electrical Engineering KTH, Royal Institute of Technology 44 Stockholm, Sweden

More information

Loss Performance Analysis for Heterogeneous

Loss Performance Analysis for Heterogeneous IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 10, NO. 1, FEBRUARY 2002 125 Loss Performance Analysis for Heterogeneous ON OFF Sources With Application to Connection Admission Control Guoqiang Mao, Student

More information

Resource Sharing for QoS in Agile All Photonic Networks

Resource Sharing for QoS in Agile All Photonic Networks Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:

More information

Active Queue Management for Self-Similar Network Traffic

Active Queue Management for Self-Similar Network Traffic Active Queue Management for Self-Similar Network Traffic Farnaz Amin*, Kiarash Mizanain**, and Ghasem Mirjalily*** * Electrical Engineering and computer science Department, Yazd University, farnaz.amin@stu.yazduni.ac.ir

More information

IP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols

IP Traffic Prediction and Equivalent Bandwidth for DAMA TDMA Protocols IP Traffic and Equivalent Bandwidth for DAMA TDMA Protocols J. Aracil, D. Morato, E. Magaña, M. Izal Universidad Pública de Navarra, 316 Pamplona, SPAIN email:javier.aracil@unavarra.es Abstract The use

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

3. Examples. Contents. Classical model for telephone traffic (1) Classical model for telephone traffic (2)

3. Examples. Contents. Classical model for telephone traffic (1) Classical model for telephone traffic (2) Contents Model for telephone traffic Packet level model for data traffic Flow level model for elastic data traffic Flow level model for streaming data traffic lect03.ppt S-38.45 - Introduction to Teletraffic

More information

Application of QNA to analyze the Queueing Network Mobility Model of MANET

Application of QNA to analyze the Queueing Network Mobility Model of MANET 1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

Comparison of Shaping and Buffering for Video Transmission

Comparison of Shaping and Buffering for Video Transmission Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012

Queuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012 Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing

More information

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks

The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Slides 11: Verification and Validation Models

Slides 11: Verification and Validation Models Slides 11: Verification and Validation Models Purpose and Overview The goal of the validation process is: To produce a model that represents true behaviour closely enough for decision making purposes.

More information

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks

Random Early Detection (RED) gateways. Sally Floyd CS 268: Computer Networks Random Early Detection (RED) gateways Sally Floyd CS 268: Computer Networks floyd@eelblgov March 20, 1995 1 The Environment Feedback-based transport protocols (eg, TCP) Problems with current Drop-Tail

More information

The effect of per-input shapers on the delay bound in networks with aggregate scheduling

The effect of per-input shapers on the delay bound in networks with aggregate scheduling The effect of per-input shapers on the delay bound in networks with aggregate scheduling Evgueni Ossipov and Gunnar Karlsson Department of Microelectronics and Information Technology KTH, Royal Institute

More information

Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment

Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment Switch Architecture for Efficient Transfer of High-Volume Data in Distributed Computing Environment SANJEEV KUMAR, SENIOR MEMBER, IEEE AND ALVARO MUNOZ, STUDENT MEMBER, IEEE % Networking Research Lab,

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation

Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Calculating Call Blocking and Utilization for Communication Satellites that Use Dynamic Resource Allocation Leah Rosenbaum Mohit Agrawal Leah Birch Yacoub Kureh Nam Lee UCLA Institute for Pure and Applied

More information

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina

More information

An Enhanced Dynamic Packet Buffer Management

An Enhanced Dynamic Packet Buffer Management An Enhanced Dynamic Packet Buffer Management Vinod Rajan Cypress Southeast Design Center Cypress Semiconductor Cooperation vur@cypress.com Abstract A packet buffer for a protocol processor is a large shared

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

A queueing network model to study Proxy Cache Servers

A queueing network model to study Proxy Cache Servers Proceedings of the 7 th International Conference on Applied Informatics Eger, Hungary, January 28 31, 2007. Vol. 1. pp. 203 210. A queueing network model to study Proxy Cache Servers Tamás Bérczes, János

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *

Dynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks * Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:

More information

Lecture 2 Physical Layer - Multiplexing

Lecture 2 Physical Layer - Multiplexing DATA AND COMPUTER COMMUNICATIONS Lecture 2 Physical Layer - Multiplexing Mei Yang Based on Lecture slides by William Stallings 1 MULTIPLEXING multiple links on 1 physical line common on long-haul, high

More information

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network

A Generalization of a TCP Model: Multiple Source-Destination Case. with Arbitrary LAN as the Access Network A Generalization of a TCP Model: Multiple Source-Destination Case with Arbitrary LAN as the Access Network Oleg Gusak and Tu rul Dayar Department of Computer Engineering and Information Science Bilkent

More information

Adaptive packet scheduling for requests delay guaranties in packetswitched computer communication network

Adaptive packet scheduling for requests delay guaranties in packetswitched computer communication network Paweł Świątek Institute of Computer Science Wrocław University of Technology Wybrzeże Wyspiańskiego 27 50-370 Wrocław, Poland Email: pawel.swiatek@pwr.wroc.pl Adam Grzech Institute of Computer Science

More information

Performance Study of a QoS scheduling algorithm over wireless networks

Performance Study of a QoS scheduling algorithm over wireless networks 1 Performance Study of a QoS scheduling algorithm over wireless networks Siew HuiPei Joanna, Student Member, IEEE Abstract With the proliferation of wireless networks, consumers are increasingly aware

More information

Homework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below:

Homework 1 50 points. Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: Homework 1 50 points Quantitative Comparison of Packet Switching and Circuit Switching 20 points Consider the two scenarios below: A circuit-switching scenario in which Ncs users, each requiring a bandwidth

More information

Some economical principles

Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications

Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Performance Analysis of Cell Switching Management Scheme in Wireless Packet Communications Jongho Bang Sirin Tekinay Nirwan Ansari New Jersey Center for Wireless Telecommunications Department of Electrical

More information

A closer look at network structure:

A closer look at network structure: T1: Introduction 1.1 What is computer network? Examples of computer network The Internet Network structure: edge and core 1.2 Why computer networks 1.3 The way networks work 1.4 Performance metrics: Delay,

More information

Performance Analysis of TCP Variants

Performance Analysis of TCP Variants 102 Performance Analysis of TCP Variants Abhishek Sawarkar Northeastern University, MA 02115 Himanshu Saraswat PES MCOE,Pune-411005 Abstract The widely used TCP protocol was developed to provide reliable

More information

Dimensioning Links for IP Telephony

Dimensioning Links for IP Telephony Dimensioning Links for IP Telephony Ian Marsh (SICS/KTH) Bengt Ahlgren, Anders Andersson (SICS) Olof Hagsand (Dynarc) ianm@sics.se Columbia University, USA Monday 2nd April, 2001 http://www.sics.se/ ianm/talks/columbia.

More information

Modeling and Performance Analysis with Discrete-Event Simulation

Modeling and Performance Analysis with Discrete-Event Simulation Simulation Modeling and Performance Analysis with Discrete-Event Simulation Chapter 10 Verification and Validation of Simulation Models Contents Model-Building, Verification, and Validation Verification

More information

A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks

A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks A Control-Theoretical Approach for Fair Share Computation in Core-Stateless Networks Hoon-Tong Ngin and Chen-Khong Tham National University of Singapore, Department of Electrical and Computer Engineering,

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability

A simple mathematical model that considers the performance of an intermediate node having wavelength conversion capability A Simple Performance Analysis of a Core Node in an Optical Burst Switched Network Mohamed H. S. Morsy, student member, Mohamad Y. S. Sowailem, student member, and Hossam M. H. Shalaby, Senior member, IEEE

More information

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES

INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES INTERNET OVER DIGITAL VIDEO BROADCAST: PERFORMANCE ISSUES Hakan Yılmaz TÜBİTAK Marmara Research Center Information Technologies Research Institute Kocaeli, Turkey hy@btae.mam.gov.tr Bülent Sankur Boğaziçi

More information

Core-Stateless Proportional Fair Queuing for AF Traffic

Core-Stateless Proportional Fair Queuing for AF Traffic Core-Stateless Proportional Fair Queuing for AF Traffic Gang Cheng, Kai Xu, Ye Tian, and Nirwan Ansari Advanced Networking Laboratory, Department of Electrical and Computer Engineering, New Jersey Institute

More information

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Performance of Optical Burst Switching Techniques in Multi-Hop Networks Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,

More information

Read Chapter 4 of Kurose-Ross

Read Chapter 4 of Kurose-Ross CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

Performance Study of Routing Algorithms for LEO Satellite Constellations

Performance Study of Routing Algorithms for LEO Satellite Constellations Performance Study of Routing Algorithms for LEO Satellite Constellations Ioannis Gragopoulos, Evangelos Papapetrou, Fotini-Niovi Pavlidou Aristotle University of Thessaloniki, School of Engineering Dept.

More information

Master s Thesis. TCP Congestion Control Mechanisms for Achieving Predictable Throughput

Master s Thesis. TCP Congestion Control Mechanisms for Achieving Predictable Throughput Master s Thesis Title TCP Congestion Control Mechanisms for Achieving Predictable Throughput Supervisor Prof. Hirotaka Nakano Author Kana Yamanegi February 14th, 2007 Department of Information Networking

More information

Maximizing the Number of Users in an Interactive Video-on-Demand System

Maximizing the Number of Users in an Interactive Video-on-Demand System IEEE TRANSACTIONS ON BROADCASTING, VOL. 48, NO. 4, DECEMBER 2002 281 Maximizing the Number of Users in an Interactive Video-on-Demand System Spiridon Bakiras, Member, IEEE and Victor O. K. Li, Fellow,

More information

Application of Network Calculus to the TSN Problem Space

Application of Network Calculus to the TSN Problem Space Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch

More information

Capacity planning and.

Capacity planning and. Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

Performance Analysis of the Signaling Channels of OBS Switches

Performance Analysis of the Signaling Channels of OBS Switches 296 Performance Analysis of the ignaling Channels of OB witches Hulusi YAHYAGİL A.Halim ZAİM M.Ali AYDIN Ö.Can TURNA İstanbul University, Computer Engineering Department, Avcılar İstanbul, TURKEY Abstract

More information

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet

More information

10. Network planning and dimensioning

10. Network planning and dimensioning lect10.ppt S-38.145 - Introduction to Teletraffic Theory - Fall 2000 1 Contents Introduction Network planning Traffic forecasts Dimensioning 2 Telecommunication network A simple model of a telecommunication

More information

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements

Virtual Circuit Blocking Probabilities in an ATM Banyan Network with b b Switching Elements Proceedings of the Applied Telecommunication Symposium (part of Advanced Simulation Technologies Conference) Seattle, Washington, USA, April 22 26, 21 Virtual Circuit Blocking Probabilities in an ATM Banyan

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks

Computer Networks and the Internet. CMPS 4750/6750: Computer Networks Computer Networks and the Inter CMPS 4750/6750: Computer Networks Outline What Is the Inter? Access Networks Packet Switching and Circuit Switching A closer look at delay, loss, and throughput Interconnection

More information

SIMULATION OF NETWORK CONGESTION RATE BASED ON QUEUING THEORY USING OPNET

SIMULATION OF NETWORK CONGESTION RATE BASED ON QUEUING THEORY USING OPNET SIMULATION OF NETWORK CONGESTION RATE BASED ON QUEUING THEORY USING OPNET Nitesh Kumar Singh 1, Dr. Manoj Aggrawal 2 1, 2 Computer Science, Sunriase University, (India) ABSTRACT Most University networks

More information

Cover sheet for Assignment 3

Cover sheet for Assignment 3 Faculty of Arts and Science University of Toronto CSC 358 - Introduction to Computer Networks, Winter 2018, LEC0101 Cover sheet for Assignment 3 Due Monday March 5, 10:00am. Complete this page and attach

More information

The difference between TTC JT-Y1221 and ITU-T Y.1221

The difference between TTC JT-Y1221 and ITU-T Y.1221 The difference between TTC JT-Y1221 and ITU-T Y.1221 Traffic control and congestion control in IP based networks (The English Edition) Version 1.0 Published on March 27, 2013 THE TELECOMMUNICATION TECHNOLOGY

More information

Multi-threaded, discrete event simulation of distributed computing systems

Multi-threaded, discrete event simulation of distributed computing systems Multi-threaded, discrete event simulation of distributed computing systems Iosif C. Legrand California Institute of Technology, Pasadena, CA, U.S.A Abstract The LHC experiments have envisaged computing

More information

On the application of forking nodes to product-form queueing networks

On the application of forking nodes to product-form queueing networks INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. (in press) Published online in Wiley InterScience (www.interscience.wiley.com)..881 On the application of forking nodes to product-form

More information

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS

PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS THE UNIVERSITY OF NAIROBI DEPARTMENT OF ELECTRICAL AND INFORMATION ENGINEERING FINAL YEAR PROJECT. PROJECT NO. 60 PARALLEL ALGORITHMS FOR IP SWITCHERS/ROUTERS OMARI JAPHETH N. F17/2157/2004 SUPERVISOR:

More information

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long

6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long 6.033 Spring 2015 Lecture #11: Transport Layer Congestion Control Hari Balakrishnan Scribed by Qian Long Please read Chapter 19 of the 6.02 book for background, especially on acknowledgments (ACKs), timers,

More information

Model suitable for virtual circuit networks

Model suitable for virtual circuit networks . The leinrock Independence Approximation We now formulate a framework for approximation of average delay per packet in telecommunications networks. Consider a network of communication links as shown in

More information

Fluid models for evaluating threshold-based control policies for survivability of a distributed network

Fluid models for evaluating threshold-based control policies for survivability of a distributed network Fluid models for evaluating threshold-based control policies for survivability of a distributed network Vineet Aggarwal ICF Consulting 9 Lee Highway, Fairfax, VA Nataraan Gautam Marcus Department of Industrial

More information

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways

Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of RED gateways INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS Int. J. Commun. Syst. 2002; 15:899 906 (DOI: 10.1002/dac.571) Low pass filter/over drop avoidance (LPF/ODA): an algorithm to improve the response time of

More information

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays

Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Stability Analysis of a Window-based Flow Control Mechanism for TCP Connections with Different Propagation Delays Keiichi Takagaki Hiroyuki Ohsaki Masayuki Murata Graduate School of Engineering Science,

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Report on Transport Protocols over Mismatched-rate Layer-1 Circuits with 802.3x Flow Control

Report on Transport Protocols over Mismatched-rate Layer-1 Circuits with 802.3x Flow Control Report on Transport Protocols over Mismatched-rate Layer-1 Circuits with 82.3x Flow Control Helali Bhuiyan, Mark McGinley, Tao Li, Malathi Veeraraghavan University of Virginia Email: {helali, mem5qf, taoli,

More information

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips

Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Cross Clock-Domain TDM Virtual Circuits for Networks on Chips Zhonghai Lu Dept. of Electronic Systems School for Information and Communication Technology KTH - Royal Institute of Technology, Stockholm

More information

Traffic Analysis and Modeling of Real World Video Encoders

Traffic Analysis and Modeling of Real World Video Encoders Traffic Analysis and Modeling of Real World Video Encoders KLIMIS NTALIANIS, NIKOLAOS DOULAMIS, ANASTASIOS DOULAMIS AND STEFANOS KOLLIAS Department of Electrical and Computer Engineering National Technical

More information

On the Relationship of Server Disk Workloads and Client File Requests

On the Relationship of Server Disk Workloads and Client File Requests On the Relationship of Server Workloads and Client File Requests John R. Heath Department of Computer Science University of Southern Maine Portland, Maine 43 Stephen A.R. Houser University Computing Technologies

More information

Introduction: Two motivating examples for the analytical approach

Introduction: Two motivating examples for the analytical approach Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline

More information