Avoiding Utilization Inefficiency in.1qbv
|
|
- Britton Osborne Jones
- 6 years ago
- Views:
Transcription
1 Avoiding Utilization Inefficiency in.1qbv IEEE 802 Interim Meeting, Norfolk, VA, May/2014 (preliminary version) Wilfried Steiner, Corporate Scientist Page 1
2 From 802.1Qbv-D1.2 In a Bridge that supports enhancements for scheduled traffic ( ), a transmission gate is associated with each traffic class queue. In addition to the other checks carried out by the transmission selection algorithm, a frame on a traffic class queue is not available for transmission (as required for tests (a) and (b) in this clause) if the transmission gate is in the closed state or there is insufficient time available to transmit the entirety of that frame before the next gate-close event (3.1) associated with that queue. Page 2
3 From 802.1Qbv-D1.2 (cont.) Page 3
4 Bandwidth Inefficiency Just duplicating the figure here to show the guard band before the end of T2 Page 4
5 Bandwidth Inefficiency Just duplicating the figure here to show the guard band before the end of T2 Page 5
6 Bandwidth Inefficiency Observation 1: the guard band problem occurs at every gate-closing event, not only before some protected window. Conclusion 1: simple implementations need to block traffic for about a maximum sized frame before the end of each gate-closing event. What about intelligent implementations (e.g., the ones that track frame lengths)? Page 6
7 Bandwidth Inefficiency Intelligent GB Usage Max size frame Frame ready Page 7
8 Bandwidth Inefficiency Intelligent GB Usage Observation 2: in the worst-case, a slightly smaller frame than the max sized frame becomes ready for relay at a time that is too late for complete transmission. Conclusion 2: intelligent use of the guard band does not significantly improve the bandwidth utilization in the worst case. How about using the bandwidth for other traffic classes? Page 8
9 Bandwidth Inefficiency Intelligent GB Usage Max size frame Protected Window Traffic Non-Protected Window Traffic Start of non-protected (T3) Delayed transmission causes a violation of T2 Frame ready Page 9
10 Bandwidth Inefficiency Intelligent GB Usage Observation 3: when overlapping windows, there is a threat that lower priority traffic will cause higher priority traffic not to fit into the window. Conclusion 3: overlapping only at the size of a minimum frame at max. Page 10
11 Proposed Modification In a Bridge that supports enhancements for scheduled traffic ( ), a transmission gate is associated with each traffic class queue. In addition to the other checks carried out by the transmission selection algorithm, a frame on a traffic class queue is not available for transmission (as required for tests (a) and (b) in this clause) if the transmission gate is in the closed state. or there is insufficient time available to transmit the entirety of that frame before the next gate-close event (3.1) associated with that queue. Page 11
12 Proposed Solution Max size frame This behavior becomes legal. This behavior is still possible. Frame ready or there is insufficient time available to transmit the entirety of that frame before the next gate-close event (3.1) associated with that queue. is replaced by additional constraints on the gate event list. Page 12
13 Main Conclusions The current formulation is too restrictive and a source of bandwidth inefficiency. Continuing frame transmission beyond the gate-closing event is more bandwidth efficient than the current proposal. The schedule (i.e., the gate event list) can be constructed in a way that the current behavior (i.e., non-transmission beyond the gate-closing event) is maintained. There are still worst-case boundaries for the minimum/maximum sizes of windows. Page 13
14 E n s u r i n g R e l i a b l e N e t w o r k s w w w. t t t e c h. c o m Page 14
Gate Operations and Automatic Guard Band Feature
automotive mobile automation embedded systems Gate Operations and Automatic Guard Band Feature Christian Boiger christian.boiger@b-plus.com IEEE 802 Plenary July 2015 Waikoloa Village, HI Current Problem
More informationDependability Entering Mainstream IT Networking Standards (IEEE 802.1)
Dependability Entering Mainstream IT Networking Standards (IEEE 802.1) 64th Meeting of the IFIP 10.4 Working Group on Dependable Computing and Fault Tolerance Visegrád, Hungary, June 27-30, 2013 Wilfried
More informationScheduled queues, UBS, CQF, and Input Gates
Scheduled queues, UBS, CQF, and Input Gates Norman Finn Cisco Systems V03 January 12, 2015 new-nfinn-input-gates-0115-v03.pdf IEEE 802.2 interim, Atlanta, January, 2015 1 1. Building a robust network has
More informationTime-Sensitive Networking (TSN) How the additional value will meet your requirements
Time-Sensitive Networking (TSN) How the additional value will meet your requirements 3. Vector Automotive Ethernet Symposium May 3 rd 2017 V1.00.00 2017-04-27 Time-Sensitive Networking (TSN) How the additional
More informationGiancarlo Vasta, Magneti Marelli, Lucia Lo Bello, University of Catania,
An innovative traffic management scheme for deterministic/eventbased communications in automotive applications with a focus on Automated Driving Applications Giancarlo Vasta, Magneti Marelli, giancarlo.vasta@magnetimarelli.com
More informationScheduled queues, UBS, CQF, and Input Gates
Scheduled queues, UBS, CQF, and Input Gates Norman Finn Cisco Systems V04 January 14, 2015 new-nfinn-input-gates-0115-v04.pdf IEEE 802.2 interim, Atlanta, January, 2015 1 1. Building a robust network has
More informationToward a Reliable Data Transport Architecture for Optical Burst-Switched Networks
Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University
More informationScheduling Real-Time Communication in IEEE 802.1Qbv Time Sensitive Networks
Scheduling Real-Time Communication in IEEE 802.1Qbv Time Sensitive Networks Silviu S. Craciunas, Ramon Serna Oliver, Martin Chmelik, Wilfried Steiner TTTech Computertechnik AG RTNS 2016, Brest, France,
More informationPeristaltic Shaper: updates, multiple speeds
Peristaltic Shaper: ups, multiple speeds Michael Johas Teener Broadcom, mikejt@broadcom.com 00 IEEE 80. TimeSensitive Networking TG Agenda Objectives review History Baseline design and assumptions Higher
More informationIEEE TSN Standards Overview & Update
IEEE 802.1 TSN Standards Overview & Update 2017 IEEE Standards Association (IEEE-SA) Ethernet & IP @ Automotive Technology Day Presented by Kevin Stanton Chairman, Avnu Alliance Content by Don Pannell
More informationStream Metering for Guaranteed Low-Latency of Industrial Control-Data Streams
Towards a new PAR for IEEE 802.1 TSN Stream Metering for Guaranteed Low-Latency of Industrial Control-Data Streams IEEE 802.1 Interim Meeting - Sept. 2014, Ottawa, Canada Feng Chen, Franz-Josef Goetz,
More informationAV Streaming Quality of Service in 802 Networks (or: where does all this fit?)
AV Streaming Quality of Service in 802 Networks (or: where does all this fit?) Michael Johas Teener mikejt@broadcom.com 1 AV Streaming QoS Requirements Once a stream is established, the quality of that
More informationIndex. Numerics. Index p priority (QoS) definition Q VLAN standard w as a region 5-54
Index Numerics 802.1p priority (QoS) 802.1Q VLAN standard 5-7 802.1w as a region 5-54 A active path 5-5 address IP 7-8 advertisement 3-3 applicable products 1-ii ARP age setting 7-10 cache 7-4 cache table
More informationDistinguished minimum latency traffic in a converged traffic environment DMLT Ludwig Winkel
Distinguished minimum latency traffic in a converged traffic environment DMLT Ludwig Winkel IEEE 802.3 Ethernet Working Group IEEE 802.3 DMLT SG Liaison report to IEEE 802.1 March, 21, 2013 Orlando, FL
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationDiscussion of Failure Mode Assumptions for IEEE 802.1Qbt
Discussion of Failure Mode Assumptions for IEEE 802.1Qbt Wilfried Steiner, Corporate Scientist wilfried.steiner@tttech.com www.tttech.com Page 1 Clock Synchronization is a core building block of many RT
More informationNetwork Layer Enhancements
Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable
More informationYANG Models for CNC. Astrit Ademaj, TTTech Rodney Cummings, National Instruments. IEEE TSN Interim Meeting, Atlanta January 16th-18th 2017
YANG Models for CNC Astrit Ademaj, TTTech Rodney Cummings, National Instruments IEEE TSN Interim Meeting, Atlanta January 16th-18th 2017 1 Fully Centralized Configuration 2 CNC Input and Output Interfaces
More informationPriority Considerations for Fronthaul Traffic. Raghu M. Rao, Xilinx Inc.
Priority Considerations for Fronthaul Traffic Raghu M. Rao, Xilinx Inc. Compliance with IEEE Standards Policies and Procedures Subclause 5.2.1 of the IEEE-SA Standards Board Bylaws states, "While participating
More informationAN-1482 APPLICATION NOTE
APPLICATION NOTE One Technology Way P.O. Box 9106 Norwood, MA 02062-9106, U.S.A. Tel: 781.329.4700 Fax: 781.461.3113 www.analog.com A Network By Example by Volker E. Goller INTRODUCTION The time sensitive
More informationBasics (cont.) Characteristics of data communication technologies OSI-Model
48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49
More informationSoftware. Linux. Squid Windows
Proxy Server Introduction A proxy server services client requests by forwarding : the requests to the destination server. The requests appear to come from the proxy server and not from the client. the
More informationVLANs and SAS. Robert Castellano. 10/25/04 rc_sasvlan_01 Page 1
VLANs and 802.17 Robert Castellano 10/25/04 rc_vlan_01 Page 1 Introduction VLANs provide method for partitioning physical LAN networks into logical LAN segments. VLAN A A VLAN A VLAN B B VLAN B VLAN C
More informationJoint IEEE-SA and ITU Workshop on Ethernet. Stream Reservation Protocol (SRP) Craig Gunther Senior Principal Engineer Harman International
Joint IEEE-SA and ITU Workshop on Ethernet Stream Reservation Protocol (SRP) Craig Gunther Senior Principal Engineer Harman International What is SRP? The dynamic control protocol used to create a path
More informationVERIZON MARYLAND LLC PRODUCT GUIDE. Containing IntraLATA Intrastate Communications Services for Maryland by Verizon Maryland LLC
TITLE PAGE Containing IntraLATA Intrastate Communications Services for Maryland by Verizon Maryland LLC GENERAL REGULATIONS st Revised 2 Cancels Original 2 PART A (CONT D) LIMITATIONS AND USE OF SERVICE...
More informationLink Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE Classes
Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE Classes Kehang Wu Douglas S. Reeves Capacity Planning for QoS DiffServ + MPLS QoS in core networks DiffServ provides
More informationOrder of Packet Transmission and Dropping
Laboratory 9 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for
More informationSDN-BASED CONFIGURATION SOLUTION FOR IEEE TIME SENSITIVE NETWORKING (TSN)
SDN-BASED CONFIGURATION SOLUTION FOR IEEE 802.1 TIME SENSITIVE NETWORKING (TSN) SIWAR BEN HADJ SAID, QUANG HUY TRUONG, AND MICHAEL BOC CONTEXT Switch to IEEE standard Ethernet in Industrial and automotive
More informationPolygon decomposition. Motivation: Art gallery problem
CG Lecture 3 Polygon decomposition 1. Polygon triangulation Triangulation theory Monotone polygon triangulation 2. Polygon decomposition into monotone pieces 3. Trapezoidal decomposition 4. Convex decomposition
More information802.1Qcc findings. Astrit Ademaj. Sept 2018
802.1Qcc findings Astrit Ademaj astrit.ademaj@tttech.com Sept 2018 Background Present Qcc findings - mainly related to but not limited to centralized configuration model Information sharing, with the WG
More informationDiscussion of Congestion Isolation Changes to 802.1Q
Discussion of Congestion Isolation Changes to 802.1Q Paul Congdon (Huawei), IEEE 802.1 DCB Geneva, Switzerland January 2018 High Level Questions Do we support and define end-station behavior? Should we
More informationProposals for TSN Stream Reservation Class
Proposals for TSN Stream Reservation Class Feng Chen, Jürgen Schmitt, Marcel Kießling, Franz-Josef Goetz Siemens AG IEEE 802.1 Interim, Sept. 2016, York UK siemens.com Introduction The previous presentation
More informationData Center Bridging Consortium
Data Center Bridging Consortium 802.1Qau Congestion Notification Test Suite Version 1.1 Technical Document Last Updated: April 10, 2012 Data Center Bridging Consortium HTTP://WWW.IOL.UNH.EDU/CONSORTIUMS/DCB
More informationQueuing Mechanism Interactions
Queuing Mechanism Interactions Getting the AVB shaper, time scheduled selection, weighted priorities, and preemption to work together Norman Finn v01 March 3, 2015 bv-nfinn-queue-interactions-0315-v01.pdf
More informationMultiaccess in Ethernet Passive Optical Networks (EPON)
Multiaccess in Ethernet Passive Optical Networks (EPON) Marek Hajduczenia, PhD Principal Engineer Advanced Commercial Engineering Charter Communications 1 What is Passive Optical Network (PON)? Passive
More informationQueuing Disciplines. Order of Packet Transmission and Dropping. Laboratory. Objective. Overview
Laboratory 2 Queuing Disciplines Order of Packet Transmission and Dropping Objective The objective of this lab is to examine the effect of different queuing disciplines on packet delivery and delay for
More informationTable of Contents. Cisco Spanning Tree Protocol Enhancements using Loop Guard and BPDU Skew Detection Features
Table of Contents Spanning Tree Protocol Enhancements using Loop Guard and BPDU Skew Detection Features...1 Document ID: 10596...1 Introduction...1 Feature Availability...1 Brief Summary of STP Port Roles...2
More informationCredit based Flow Control PAR, 5 Criteria & Objectives
Credit based Flow Control PAR, 5 Criteria & Objectives Results of 2/20/14 DCB TG CC discussion new dcb lynch cb flow control par 5c obj 0214 v02 1 PROJECT AUTHORIZATION REQUEST Based on IEEE 802 LMSC Operations
More informationCENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC
CENTRALIZED MANAGEMENT DELL POWERVAULT DL 2100 POWERED BY SYMANTEC EXECUTIVE SUMMARY The PowerVault DL2100 Powered by Symantec Backup Exec offers the industry s only fully integrated backup-to-disk solution
More information802.1Q Queues for non-bridges. Norman Finn Huawei Technologies Co. Ltd
802.1Q Queues for non-bridges Norman Finn Huawei Technologies Co. Ltd Introduction! This presentation is offered as food for thought.! It anticipates a new PAR for adoption in March, 2018, but does not
More informationIntroduction to WiFi Networking. Training materials for wireless trainers
Introduction to WiFi Networking Training materials for wireless trainers Goals The goal of this lecture is to introduce 802.11 family of radio protocols 802.11 radio channels wireless network topologies
More informationRouting Optimization of AVB Streams in TSN Networks
Downloaded from orbit.dtu.dk on: Apr 05, 2018 Routing Optimization of AVB Streams in TSN Networks Laursen, Sune Mølgaard; Pop, Paul; Steiner, Wilfried Published in: ACM SIGBED Review Link to article, DOI:
More informationDeterministic Ethernet as Reliable Communication Infrastructure for Distributed Dependable Systems
Deterministic Ethernet as Reliable Communication Infrastructure for Distributed Dependable Systems DREAM Seminar UC Berkeley, January 21 st, 2014 Wilfried Steiner, Corporate Scientist wilfried.steiner@tttech.com
More informationSimplifying Seamless Redundancy
Simplifying Seamless Redundancy Norman Finn Cisco Systems January 18, 2016 IEEE 802.1 interim, Atlanta GA USA, Jan. 2016 cb-finn-simplifying-seamless-redundancy-0116-v01.pdf 1 This document supports a
More informationFormal Timing Analysis of Ethernet AVB for Industrial Automation
Formal Timing Analysis of Ethernet AVB for Industrial Automation 802.1Qav Meeting, Munich, Jan 16-20, 2012 Jonas Rox, Jonas Diemer, Rolf Ernst {rox diemer}@ida.ing.tu-bs.de January 16, 2012 Outline Introduction
More informationAddressing the Challenges of Web Data Transport
Addressing the Challenges of Web Data Transport Venkata N. Padmanabhan Microsoft Research UW Whistler Retreat December 1998 Outline Challenges Solutions TCP Session Fast Start Ongoing and Future Work The
More informationWhite Paper. The ATTO Diamond Storage Array Support for Serial ATA Features. Tom Kolniak ATTO Technology, Inc. attotech.
White Paper The ATTO Diamond Storage Array Support for Serial ATA Features 3/18/200 Tom Kolniak ATTO Technology, Inc. attotech.com Contents Introduction 3 SATA versus PATA... 4 ATTO Diamond Array s Supported
More informationConfiguring VTP. Understanding How VTP Works CHAPTER
CHAPTER 13 This chapter describes how to configure the VLAN Trunking Protocol (VTP) on the Cisco 7600 series routers. For complete syntax and usage information for the commands used in this chapter, refer
More informationResource Allocation Protocol (RAP) based on 802.1CS Link-local Registration Protocol
Resource Allocation Protocol (RAP) based on 802.1CS Link-local Registration Protocol Feature Proposal Marcel Kießling, Franz-Josef Götz Siemens AG IEEE 802.1 Interim Meeting May 2017, Stuttgart, Germany
More informationLANCOM Techpaper IEEE n Indoor Performance
Introduction The standard IEEE 802.11n features a number of new mechanisms which significantly increase available bandwidths. The former wireless LAN standards based on 802.11a/g enable physical gross
More informationIntroduction to SGX (Software Guard Extensions) and SGX Virtualization. Kai Huang, Jun Nakajima (Speaker) July 12, 2017
Introduction to SGX (Software Guard Extensions) and SGX Virtualization Kai Huang, Jun Nakajima (Speaker) July 12, 2017 1 INTEL RESTRICTED SECRET Agenda SGX Introduction Xen SGX Virtualization Support Backup
More informationThe University of Kansas
The University of Kansas Technical Report Rapidly Deployable Radio Network ATM/IP Analysis Gary J. Minden, Joseph B. Evans Information & Telecommunication Technology Center Department of Electrical Engineering
More informationPhysical Layer: Multiplexing, Spectrum Spreading and Switching. Covers Chapters# 06 & 08 from Text Book
Physical Layer: Multiplexing, Spectrum Spreading and Switching Covers Chapters# 06 & 08 from Text Book 2 Multiplexing From Chapter#06 3 Multiplexing If bandwidth of a medium linking two devices is greater
More information9. Heap : Priority Queue
9. Heap : Priority Queue Where We Are? Array Linked list Stack Queue Tree Binary Tree Heap Binary Search Tree Priority Queue Queue Queue operation is based on the order of arrivals of elements FIFO(First-In
More informationData and Computer Communications. Protocols and Architecture
Data and Computer Communications Protocols and Architecture Characteristics Direct or indirect Monolithic or structured Symmetric or asymmetric Standard or nonstandard Means of Communication Direct or
More informationITU-T G /Y
International Telecommunication Union ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU G.8261.1/Y.1361.1 (02/2012) SERIES G: TRANSMISSION SYSTEMS AND MEDIA, DIGITAL SYSTEMS AND NETWORKS Packet over
More informationConfiguring Basic Wireless Settings on the RV130W
Article ID: 5027 Configuring Basic Wireless Settings on the RV130W Objective Wireless networking operates by sending information over radio waves, which can be more vulnerable to intruders than a traditional
More informationIEEE Time-Sensitive Networking (TSN)
IEEE 802.1 Time-Sensitive Networking (TSN) Norman Finn, IEEE 802.1CB, IEEE 802.1CS Editor Huawei Technologies Co. Ltd norman.finn@mail01.huawei.com Geneva, 27 January, 2018 Before We Start This presentation
More informationCurrent state of IEEE Time-Sensitive Networking
IETF91 Honolulu Current state of IEEE 802.1 Time-Sensitive Networking Task Group 1 Current state of IEEE 802.1 Time-Sensitive Networking Task Group Norman Finn, Cisco Systems IETF91 Honolulu Current state
More informationLivingston Communications. Network TRANSPARENCY statement
Livingston Communications Network TRANSPARENCY statement Livingston Communications provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules to ensure that
More informationApplicability of TSN to 5G services Tongtong Wang, Xinyuan Wang Huawei Technologies
Applicability of TSN to 5G services Tongtong Wang, Xinyuan Wang Huawei Technologies HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN Chicago, March 2018 Background Conclusion from ITU-T/IEEE joint workshop,
More informationSPI-3, rev 7, Section 7 Table and Figure Clarification
SPI-3, rev 7, Section 7 Table and Figure Clarification Table 15 appears to be the extreme cases whenever a device is not included in the subclauses of section 7. Is this statement clear enough? The statement
More informationDeterministic Communications for Protection Applications Over Packet-Based Wide-Area Networks
Deterministic Communications for Protection Applications Over Packet-Based Wide-Area Networks Kenneth Fodero, Christopher Huntley, and Paul Robertson Schweitzer Engineering Laboratories, Inc. 2018 SEL
More informationIEEE 802.1AE (MacSec) & IEEE 802.1Qbb (PFC)
www.huawei.com IEEE 802.1AE (MacSec) & IEEE 802.1Qbb (PFC) Authors: Hesham ElBakoury Version: 1.0 HUAWEI TECHNOLOGIES CO., LTD. Objectives Provides Quick overview of MACSec (IEEE 802.1AE) Discuss the impact
More information(Refer Slide Time: 2:20)
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture -23 X.25 and Frame Relay Hello and welcome to today s lecture on X.25 and
More informationUNIT IV -- TRANSPORT LAYER
UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission
More informationConfiguring Link Fragmentation and Interleaving for Multilink PPP
Configuring Link Fragmentation and Interleaving for Multilink PPP The Cisco IOS Link Fragmentation and Interleaving (LFI) feature uses Multilink PPP (MLP). MLP provides a method of splitting, recombining,
More informationDraft 5 Criteria, v6 (Wordsmithed to align with Draft PAR, v7) September Interim, IEEE 802 September 06. AVB task group
Standard for Local and Metropolitan Area Networks Virtual Bridged Local Area Networks Amendment 12: Forwarding and Queuing Enhancements for Time-Sensitive Streams Draft 5 Criteria, v6 (Wordsmithed to align
More informationPer Hop Worst Case Class A Latency
Per Hop Worst Case Class A Latency Christian Boiger christian.boiger@fh-deggendorf.de IEEE 802 Plenary Meeting March 2011 Singapore 1 Latency Calculations - The latency calculations in this presentation
More informationIEEE TSN (Time-Sensitive Networking): A Deterministic Ethernet Standard
Page 1 IEEE : A Deterministic Ethernet Standard More than ten years ago, TTTech started a research program to answer the question as to whether it would be possible to provide real-time and safety capabilities
More informationIntrusion Prevention Performance Tuning
The following topics describe how to refine intrusion prevention performance: About, page 1 Limiting Pattern Matching for Intrusions, page 2 Regular Expression Limits Overrides for Intrusion Rules, page
More informationComp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am
Question 1 1. Which of the following are related to two crucial tasks of a network interface cards? a. Establishes and manages the computer s network connection b. Connect the different parts of a motherboard
More informationDE62 TELECOMMUNICATION SWITCHING SYSTEMS JUN 2015
Q.2 a. With neat diagrams explain the configuration of a step-by-step switching system. (8) b. List the basic functions of a switching system. (8) The switching office performs the following basic functions
More informationAn Introduction to TTEthernet
An Introduction to thernet TU Vienna, Apr/26, 2013 Guest Lecture in Deterministic Networking (DetNet) Wilfried Steiner, Corporate Scientist wilfried.steiner@tttech.com Copyright TTTech Computertechnik
More informationSimulating Time-Sensitive Networking. Harri Laine
Simulating Time-Sensitive Networking Harri Laine Kongens Lyngby 2015 Technical University of Denmark Department of Applied Mathematics and Computer Science Richard Petersens Plads, building 324, 2800 Kongens
More informationInformation and Communication Networks. Communication
Information Technology Communication Information and Communication Networks Integrating IP and : Delivering QoS in an IP Environment Multiservice Platforms G One infrastructure supporting voice, video
More informationQuery Evaluation in Wireless Sensor Networks
Query Evaluation in Wireless Sensor Networks Project Presentation for Comp 8790 Student: Yongxuan Fu Supervised by: Prof. Weifa Liang Presented on: 07/11/13 Outline Background Preliminary Algorithm Design
More informationCSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service
CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have
More informationDHP-W313AV. PowerLine AV500 Wireless AC600 Starter Kit. Product Release
DHP-W313AV PowerLine AV500 Wireless AC600 Starter Kit Product Release Key Selling Points Wireless AC600 PowerLine AV500 (500Mbps) Draft IEEE 1905.1 Hybrid Technology Wall-Plug design for more convenience
More informationSpectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks
Spectrum Allocation Policies in Fragmentation Aware and Balanced Load Routing for Elastic Optical Networks André C. S. Donza, Carlos R. L. Francês High Performance Networks Processing Lab - LPRAD Universidade
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationJEDEC STANDARD. High Temperature Storage Life. JESD22-A103C (Revision of JESD22-A103-B) JEDEC SOLID STATE TECHNOLOGY ASSOCIATION NOVEMBER 2004
JEDEC STANDARD High Temperature Storage Life JESD22-A103C (Revision of JESD22-A103-B) NOVEMBER 2004 JEDEC SOLID STATE TECHNOLOGY ASSOCIATION NOTICE JEDEC standards and publications contain material that
More informationClass A Bridge Latency Calculations
Class A Bridge Latency Calculations Christian Boiger IEEE 802 Plenary Meeting November 2010 Dallas, TX 1 Example - 15 port FE Bridge - 13 FE talkers, each is sending one stream - 1 FE listener L, is receiving
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationPacketisation in Optical Packet Switch Fabrics using adaptive timeout values
Packetisation in Optical Packet Switch Fabrics using adaptive timeout values Brian B. Mortensen COM DTU Technical University of Denmark DK-28 Kgs. Lyngby Email: bbm@com.dtu.dk Abstract Hybrid electro-optical
More informationSafety-related controls SIRIUS Safety Integrated
Functional Example CD-FE-I-018-V30-EN Safety-related controls SIRIUS Safety Integrated with monitored start up to SIL 1 acc. to IEC 62061 and PL c acc. to ISO 13849-1 with a SIRIUS safety relay 3TK28 with
More informationChapter 13: I/O Systems
Chapter 13: I/O Systems DM510-14 Chapter 13: I/O Systems I/O Hardware Application I/O Interface Kernel I/O Subsystem Transforming I/O Requests to Hardware Operations STREAMS Performance 13.2 Objectives
More informationQuery Control Mechanisms for the Zone Routing Protocol (ZRP)
Query Control Mechanisms for the Zone Routing Protocol (ZRP) Zygmunt J. Haas and Marc R. Pearlman Wireless Networks Laboratory Cornell University 9/3/98 SIGCOMM '98 1 Agenda Introduction - Routing in Mobile
More informationPriority Queues (Heaps)
Priority Queues (Heaps) October 11, 2016 CMPE 250 Priority Queues October 11, 2016 1 / 29 Priority Queues Many applications require that we process records with keys in order, but not necessarily in full
More informationLecture (05) Network interface Layer media & switching II
Lecture (05) Network interface Layer media & switching II By: ElShafee ١ Agenda Circuit switching technology (cont,..) Packet switching technique Telephone network ٢ Circuit switching technology (cont,..)
More informationREAL IMAGE RETAIL TARIFFS FOR THE YEAR 2018/2019 Subscribers are advised to contact Real Image for any further information
REAL IMAGE RETAIL TARIFFS FOR THE YEAR 2018/2019 Subscribers are advised to contact Real Image for any further information Service : Leased Line/Fibre (1:2) Service : Leased - Line /FIBRE (1:1) Technology:Leased
More informationEtiquette protocol for Ultra Low Power Operation in Sensor Networks
Etiquette protocol for Ultra Low Power Operation in Sensor Networks Samir Goel and Tomasz Imielinski {gsamir, imielins}@cs.rutgers.edu DataMan Lab, Department of Computer Science Acknowledgement: Prof.
More informationThe Best Protocol for Real-time Data Transport
The Definitive Guide to: The Best Protocol for Real-time Data Transport Assessing the most common protocols on 6 important categories Identifying the Best Protocol For strategic applications using real-time
More informationInfiniBand Credit-Based Link-Layer Flow-Control
InfiniBand Credit-Based Link-Layer Flow-Control 802.1 DCB TG - IEEE 802 Plenary March 2014 Introduction to InfiniBand Credit Based Flow Control Credit Represents Receiver Commitment In-band Delivery of
More informationRiverStreet Networks Network TRANSPARENCY Statement
RiverStreet Networks Network TRANSPARENCY Statement RiverStreet Networks ( RiverStreet or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom Rules
More informationThis document forms part of NBN Co s Wholesale Broadband Agreement, which is a Standard Form
Product Description nbn Ethernet Product Module Wholesale Broadband Agreement This document forms part of NBN Co s Wholesale Broadband Agreement, which is a Standard Form of Access Agreement for the purposes
More informationWireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 2: Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Sep. 2006 1 Outline Introduction
More informationCloud Computing Lectures. Cloud Security
Cloud Computing Lectures Cloud Security 1/17/2012 Why security is important for cloud computing? Multi Tenancy, that is same infrastructure, platform, Service is shared among vendors. It is accessed over
More informationWilkes Communications, Inc. Network TRANSPARENCY Statement
Wilkes Communications, Inc. Network TRANSPARENCY Statement Wilkes Communications, Inc. ( Wilkes or Company ) provides this Network Transparency Statement in accordance with the FCC s Restore Internet Freedom
More informationINTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION )454 1 TELECOMMUNICATION (02/95) STANDARDIZATION SECTOR OF ITU ")3$.!00,)#!4)/. 02/4/#/,3 &/2!##%33 3)'.!,,).' "2/!$"!.$ ).4%'2!4%$ 3%26)#%3 $)')4!,.%47/2+ ")3$. $)')4!,
More information