for Multimedia Applications over All-Optical WDM Multi-Rings M. Ajmone Marsan, A. Bianco, E. Leonardi, A. Morabito, F. Neri
|
|
- Hugh Poole
- 6 years ago
- Views:
Transcription
1 SR 3 : a Bandwidth-Reservation MAC Protocol for Multimedia Applications over All-Optical WDM Multi-Rings M. Ajmone Marsan, A. Bianco, E. Leonardi, A. Morabito, F. Neri Dipartimento di Elettronica { Politecnico di Torino { Italy fajmone,bianco,leonardi,nerig@polito.it Abstract The paper describes SR 3 (Synchronous Round Robin with Reservations), a collision-free medium access control protocol for all-optical slotted packet networks based on WDM multi-channel ring topologies where nodes are equipped with one xed-wavelength receiver and one wavelength-tunable transmitter. SR 3 is derived from the SRR and MMR protocols previously proposed by the same authors for the same class of all-optical networks. SRR and MMR already achieve an ecient exploitation of the available bandwidth, while guaranteeing a throughput-fair access to each node. SR 3, in addition, allows nodes to reserve slots, thereby achieving a stronger control on access delays; it is thus well suited to meet tight delay requirements, as it is the case for multimedia applications. Simulation results show that SR 3 provides very good performance to guaranteed quality trac, but also brings signicant performance improvements for besteort trac. 1 Introduction In all-optical networks, data generated in the electronic domain by the source user are converted into the optical domain at the ingress UNI (User/Network Interface), and transported to the destination with no conversion into an electronic format before the egress UNI. Wavelength division multiplexing (WDM) [1] is normally used to partition the very large bandwidth available on the ber into a number of channels whose rates match the speeds of electronic interfaces. In this paper we consider all-optical networks where one logical channel is associated with each destination node. Logical channels are assumed to be obtained with a combination of WDM and space diversity, since in this case the feasibility of the proposed approach was veried [, 3]. Since one channel for each destination exists, nodes are equipped with one tunable This work was supported in part by the Italian National Research Council, and the Italian Ministry for University and Scientic Research. transmitter and one xed receiver. We focus on the particular case of ring topologies (more precisely on multi-channel rings), which have become an attractive solution for all-optical LANs and MANs, mainly thanks to the successful progress achieved in optical ampliers to compensate for insertion losses at intermediate nodes. With respect to other topologies (e.g., stars) rings ease the synchronization at extremely high data rates, permitting a slotted access, hence an ecient and exible use of the available optical bandwidth for packet communications. Providing one channel for each destination means that all that need to transmit to the same destination must share the corresponding channel. Medium Access Control (MAC) protocols are thus needed to arbitrate the access to the shared channels. This paper proposes a collision-free access protocol, which, in spite of its simplicity, allows an almost optimal exploitation of the available re while guaranteeing a fair access to all nodes. In addition, it permits a very ecient integration of guaranteed quality and best-eort services. For these reasons, it is well suited to support multimedia applications. Network Topology We consider ring networks providing one logical channel for transmissions to each destination. If we denote by M the number of nodes in the network, a total of M logical channels is available in the ring. All nodes that need to transmit to the same destination share the same logical channel. Fig. 1 depicts the logical network architecture for the case M =. The M logical channels run in parallel; they are slotted and synchronized, so that M slots (one for each destination node) simultaneously arrive at a node every slot time. Full connectivity is achieved by tuning the transmitter at the source node on a packet-by-packet basis. Fixed-length data packets are transmitted, and the slot size is such that one packet exactly ts into one slot. Since each channel
2 SR 3 : a Bandwidth-Reservation MAC Protocol for Multimedia Applications to the possible transmissions of M? upstream nodes. We assume nodes not to transmit to themselves. 3 In Fig. 1, node has the best access opportunity on channel 3 (leading to node 3), and the worst access opportunity on channel 1, where it must defer to transmissions of nodes and 3. 1 We say that the trac directed to node j from node i has lower access priority than trac directed to j 3 1 from nodes jj + 1j M ; jj + j M ; ; ji? j M ; ji? 1j M. In particular, we say that node i has access priority ji? jj M when transmitting to node j, 1 being the highest access priority, and M? 1 the lowest. When a packet is ready for transmission from node i to node j, the access must be delayed if the channel leading to j is already occupied with a transmission by one of the nodes with higher access priority with respect to Figure 1: The logical network topology when M = destination j. 3 Access Protocol The access protocol that we propose, called Synchronous Round Robin with Reservations (SR 3 ), can brings information to one destination, we assume that be subdivided in three hierarchical layers: the access the transmitted information is removed from the channel by the destination node: each logical ring is inter- strategy, the fairness control scheme, and the reservation scheme. rupted at a (dierent) node, and the multi-channel 3.1 Access strategy ring can be viewed as a set of staggered logical busses folded in a physical ring layout. The aim of the access strategy is to minimize the In order to avoid collisions (i.e., simultaneous accesses to the same slot) among packets directed to the number of contentions among packets whose transmission is attempted in the same slot to the same receiver. same destination, nodes exploit a channel inspection We consider access strategies with a priori packet capability on each logical channel. Thus the source selection: each transmitter selects the packet to be node, prior to transmitting a new packet with a given transmitted in a given slot without the knowledge of destination, inspects the activity on the channel associated with such destination. If an empty slot is ob- the channel status. This comes from the assumption that the selection of the packet whose transmission served, the packet can be transmitted, and it will reach is attempted in a given slot is normally performed in its destination without collision; otherwise, contention the electronic domain, hence at low speed, during the arises, and priority is given to in-transit packets: the previous slot interval, when the channel status is unknown. We further assume that only one packet can transmission attempt is delayed. The channel inspection operation can be implemented with the subcarrier be transmitted per slot time, since only one transmitter is available at each node. signalling technique (see []). It can be observed that, due to ring symmetries, The access strategy called SRR (Synchronous each node has a better-than-average access to the Round Robin), presented in [5], avoids collisions and channels leading to some, and a worsethan-average access to other channels, leading to other arbitrates contentions, permitting a good exploitation of the available bandwidth.. If we assume node numbers to be increasing in the transmission direction, the channel on In order to implement the SRR protocol, nodes must keep one separate packet queue for every possible destination. Since we assume that a node does which node i, i = ; 1; ; M? 1, has the best access chance is the one leading to node 1 ji? 1j M, since to not transmit to itself, M?1 FIFO queues exist at each access this channel, node i needs not defer to transmissions of any other node; the channel on which node i node. Each queue stores packets at a dierent priority in the channel access; such priority can be associated has the worst access chance is the one leading to node with the queue. ji+1j M, since, to access this channel, node i must defer With SRR, in an arbitrary time slot identied by the label s, node i schedules for transmission a packet 1 The notation j jm indicates the modulo M operator. with destination ji + k + 1j M, with k = jsj M?1. If the
3 INFOCOM 1997, Kobe Japan 3 corresponding queue is empty, the transmission of the ported in []. In this paper we only point out that rst packet from the longest queue is attempted in slot fairness in MMR is granted by the circulation on the s. If more then one longest queues exists (a tie for the ring of M control messages, named SAT's (standing longest queue occurs) the lowest priority among the for SATised). Each node has a transmission quota longest queues is selected. for each channel, which is restored when a SAT is received (i.e., only a given amount of packets can be In any case, if transmission in slot s is not possible because it would generate a collision, a new packet is transmitted between two SAT visits). Each SAT regulates the access on one channel: the j-sat restores selected in the following slot (labeled s + 1). We call SRR frame one SRR scheduling period, i.e., the quotas for channel j. the time between two slots in which the same queue Each node forwards SAT messages to the upstream at one node has a preferential access. The duration of node, thus SAT messages logically rotate in the opposite direction with respect to data (although the the SRR frame is M? 1 slots. The selection of the next packet to be transmitted requires the information about the lengths of all physical propagation is obviously co-directional). queues, as well as a common knowledge at all nodes about the slot label s, i.e., a global (network-wide) synchronization on the slot sequence. Moreover, the ring latency must be equalized in order to be a multiple of the SRR frame duration. SRR tends to a Time Division Multiple Access (TDMA) scheme under high load, but allows a dynamic partitioning (i.e., statistical multiplexing) of the channel bandwidth among transmitting nodes under asymmetric trac, and an unregulated access to the channel under light trac. SRR can cope, with minor modications, also with several trac classes at dierent user priorities (Upriorities ). In this case, nodes must be equipped with one queue for each trac class for each destination. In an arbitrary time slot identied by the label s, node i schedules for transmission a packet from the highest-u-priority non-empty queue with destination d = ji + k + 1j M, where k is dened as above. If all queues associated with destination d are empty, the transmission of the rst packet from the longest among non-empty highest-u-priority queues is attempted in slot s. If more than one non-empty highest-u-priority queue exists, the queue at lowest priority with respect to the access to the ring (i.e., packets directed to the closest destination) is selected. 3. Fairness scheme SRR can lead to starvation of low access priority nodes in overloaded channels under unbalanced traf- c patterns. We thus use on top of SRR a fairness control algorithm called MMR (Multi-MetaRing) [5, ], derived from the Metaring fairness control algorithm proposal for high speed metropolitan area networks [7]. A complete description of the MMR scheme is re- We use the term \U-priority" to make clear the dierence with the access priorities due to the considered network topology. 3.3 Reservation scheme In the considered network packet access delays (i.e., the time elapsing from the instant when a packet reaches the head of its queue until transmission starts) experienced under non-uniform high-load conditions can be very large (see Fig. in Sect. 5) when the SRR+MMR protocols are used. In order to obtain a stronger control on access delays, we rely on slot reservation. We propose a reservation scheme to be used in conjunction with SRR+MMR, which only requires a marginal algorithmic complexity increase, with no additional signaling messages. A slot reserved by node i on the channel leading to destination j cannot be used by any higher access priority node (but can be eectively used by nodes at a lower priority, i.e., downstream on the logical bus leading to the intended destination). Nodes have therefore a guaranteed access to slots that were reserved. Only slots to which node i has preferential access according to the SRR frame can be reserved on the channel leading to destination j, i.e., slots in position jj? ij M inside the SRR frame. Time is subdivided into successive periods called reservation frames. Each reservation frame comprises P SRR frames. Each node can reserve up to P slots with a given destination per reservation frame, i.e., at most one slot per destination per SRR frame. Reservations are eective if all network nodes are aware of other nodes' reservations. We use SAT messages to broadcast the reservation information: each SAT distributes information regarding current reservations on the channel it regulates. We assume that each SAT contains a Reservation Field (SAT-RF), which is subdivided in M? 1 sub- elds; each sub-eld is assigned to a particular node for reservations. If node i needs to reserve h slots per reservation frame on channel j, it waits until it receives the j-sat; it then forwards the reservation request by properly
4 SR 3 : a Bandwidth-Reservation MAC Protocol for Multimedia Applications setting the i-th SAT-RF subeld to the value h. The j-sat visits all nodes during the next tour of the multi-ring. By the time node i receives again the j-sat, all nodes in the network are aware of the request of node i. Node i can thus update its reservation request on channel j every time it releases the j-sat. According to our reservation scheme, each SAT must carry channel reservation requests for every node in its SAT-RF. However, this does not limit the network scalability. Indeed, only the number of reserved slots, i.e., an integer h P, per reservation frame must be notied by a node to other nodes: the position of the h reserved slots in the reservation frame is automatically established by running the SRR access strategy in every node (remember that a global synchronization on the slot sequence is assumed). Reservation Strategies The reservation scheme can be very eective in controlling queuing delays (i.e., the time from packet generation until packet transmission). We will see that this performance improvement is benecial to besteort datagram trac transmitted on low priority channels in non-uniform trac scenarios, and that it is even more eective when guaranteed-quality services are oered, or multiple trac classes are to be handled. In both cases, nodes must be able to evaluate whether they need to reserve slots: algorithms to determine the number of slots to be reserved must be provided. A very aggressive reservation policy, where nodes tend to reserve all reservable slots, would lead to performance limitations similar to those observed for the TDMA scheme. A very conservative reservation policy, instead, would leave us with delay and contention problems exhibited by SRR..1 Reservation strategy for guaranteedquality trac Applications with Quality of Service (QoS) requirements usually exploit connection-oriented protocols. At call set-up, the desired performance and the connection characteristics are specied. A Call Admission Control (CAC) algorithm can be introduced, using concepts similar to those developed in the ATM community (see, for example, [, Sect..3]); this would control the amount of statistical multiplexing in the network. Since SR 3 allows nodes to reserve only preferential slots, no interference is observed among slots reserved by dierent nodes on the same channel; each node can thus implement a call admission control policy based on local information, without any need for coordination with other nodes. It is outside the aims of this paper to dene an optimized bandwidth allocation strategy; we will show in Sect. 5 that by reserving slots it is possible to have a really strong control of access and queuing delays. The nice characteristic of the proposed network is that the bandwidth allocation and connection establishment procedures can be naturally introduced in a system whose \native" mode of operation is connectionless. No hybrid solutions (i.e., dierent algorithms and access protocols) nor partitionings of the available re between connection-oriented and datagram trac are necessary. Packets belonging to guaranteed QoS streams do not necessarily have to be transmitted in reserved slots. Moreover, reserved slots not used by the node that made the reservation can be \reused" for transmission by downstream nodes. As a consequence, in multi-class trac scenarios, network performances are not degraded because of too aggressive allocation policies. Furthermore, connections with Variable Bit Rate (VBR) trac, for which the average and peak bandwidth requirements are often not known, are more easily accommodated in our system. The amount of re allocated to connections can be easily varied during the lifetime of each connection, thereby providing good exibility.. Reservation strategy for datagram applications In the case of datagram (best-eort) trac, when a node observes a degraded access (i.e., large access delays) to a channel, it can improve the quality of its access on that channel by reserving slots. Nodes must however be able to evaluate the needed amount of reserved slots: if too many slots are reserved, they may go unused, leading to a degradation of the overall network performance. We use packet queuing delays as a quality index of the channel access. When a node receives a SAT, the queuing delay experienced by the packet at the head of the corresponding transmission queue is used to compute the number of slots to be reserved. We assume that nodes can increase, or decrease, at most by one 3 the number of reserved slots per reservation frame every time they update the reservation requests, i.e., every time they receive the SAT for that channel. Nodes use two thresholds in order to decide whether the number of reserved slots must be increased, de- 3 We could use only two bits to specify a unit reservation change in the SAT-RF subelds. We chose to load every time the current number h of reserved slots for reliability considerations: dierential systems are much more error prone.
5 HT = C M?1 (1? s) when < h < P, and HT = 1 when h = P. M?1 (1? s) is the expression for the expected TDMA delay with node load s, and C1, C, and LT P are constants, with C1 < C. When h = P, hence s = 1, LT cannot be computed as a function of the expected TDMA delay, since the latter grows to in- nity. Thus, the LT P constant was introduced, which can be computed similarly to LT for < h < P, with s very close to 1 (e.g., s = :9). By varying the values taken by constants C1, C and LT P, it is possible to make the allocation strategy more or less aggressive. It must be noted that an under-estimation of the locally oered load (i.e., of s ) leads to an under- INFOCOM 1997, Kobe Japan 5 creased, or left unchanged. estimation of thresholds values; similarly, an overestimation of the local load leads to an over-estimation Let us dene a High Threshold (HT) and a Low Threshold (LT), with (HT LT). Let D be the queuing delay for the packet at the head of the queue; if tem tends to compensate dierences between s and of the thresholds values. As a consequence, the sys- D < LT, the number of reserved slots is decreased by the real oered load. one; if LT D < HT, the number of reserved slots is left unchanged; nally, if D HT, the number of 5 Simulation Results reserved slots is increased by one. This section presents simulation results for a 1- Threshold values must be chosen so that nodes reserve only the number of slots necessary to improve slots (i.e., km at 1 Gb/s for slots of bits). Each node multi-ring. The length of the multi-ring is 3 their performance when experiencing problems in the node transmission queue can store up to packets, access to the channel, without needlessly subtracting and the MMR transmission quota K (see []) is equal slots to other nodes. to. The reservation frame is set to SRR frames. As a rst approximation, we can assume that a We have already shown in [5] that SRR+MMR node has a degraded access to a given channel if, on achieves an almost optimal exploitation of the available bandwidth, while guaranteeing a throughput-fair the average, it has less than one transmission opportunity (i.e., it gets less than one free slot) per SRR access to every node. In this paper we focus on frame on that channel. In this case, the queuing delay the benets achievable by superposing the reservation is expected to be greater than the one that the node scheme to SRR+MMR. would experience under a TDMA scheme. Each node In the simulation model, packets are assumed to could thus compare the experienced delay with the expected delay under TDMA, in order to decide whether ing to a Poisson process with xed rate P i at node i. always t into one slot, and to be generated accord- a degraded access to the channel is being experienced, The total trac in the network is = M?1 i= i. We and the reservation of extra slots is necessary. assume that nodes do not transmit to themselves. To compute the delay expected under TDMA, the We consider a simple client-server scenario: one amount of load oered at a node must be known. `server' (node ) is present in the network; the remaining M?1 `client' nodes direct half of their trac to the Nodes should therefore locally measure the trac offered to each channel. Local load measures entail a server, while the other half of the trac is uniformly non-negligible algorithmic complexity, and cannot be distributed among clients. The server generates an \cheaply" performed by nodes. amount of trac equal to half the total trac generated by clients, and evenly distributes it to clients. We therefore use the bandwidth allocation parameter s = h=p, equal to the ratio between the number 5.1 Queuing delays for guaranteed quality h of slots reserved per reservation frame and the maximum number P of reservable slots, as an indicator This subsection presents simulation results to assess trac of the local trac oered to the network, and we de- the performance of guaranteed quality trac (which ne threshold values as a function of s. In particular can be considered to belong to a trac class at higher we let LT = when h =, LT = C1 M?1 (1? s) when < h < P, and LT = LT P when h = P ; we let U-priority). We consider the following simple traf- c pattern. All nodes generate datagram (best-eort) trac according to the client-server scenario described above. In addition to this trac, the client node S l at the lowest priority on the channel leading to the server also transmits to the server a trac stream with a higher U-priority, which is meant to belong to a stream with QoS guarantee requirements. To study the eect of the reservation strategy on guaranteed trac, we assume that reservations are issued only by node S l. The packets at higher U-priority are assumed to always t into one slot, and to be generated according to a Poisson process with xed rate hp = :=(M? 1). The Poisson assumption for the stream with QoS requirements was introduced for simplicity, and can be considered unrealistic, since the generation of packets with QoS requirements is usually strongly correlated.
6 SR 3 : a Bandwidth-Reservation MAC Protocol for Multimedia Applications s = : s = : s = :3 s = :5 d q d a q a s = : s = : s = :3 s = :5 d q d a q a Table 1: Queuing and access delays for dierent values of the bandwidth allocation parameter s in overload conditions ( = 3:3) We present simulation results for the average d and standard deviation of queueing (subscript q) and access delays (subscript a) experienced by node S l. The average and standard deviation of access delays provide meaningful information about the network behavior. In overload conditions the average access delay is equal to the reciprocal of the throughput, hence it tells whether the channel bandwidth is eciently and fairly shared by nodes. The standard deviation of the access delay provides an even more important information. Large standard deviations mean that certain packets are facing much larger access delays than other packets; this also implies that queuing delays are large. Table 1 refers to overload conditions. We can observe that, if no slot is reserved, node S l experiences large queuing delays on the channel leading to the server. S l does not experience losses of packets at the higher U-priority, because the MMR fairness scheme guarantees the bandwidth necessary for transmissions. However, the experienced standard deviation of the access delay is very large, since node S l gets free slots only when most of the nodes at higher priority on the server channel exhausted their quota. By reserving slots, node S l can improve its access on the server channel. Table 1 shows that the average, and even more the standard deviation, of the access delay can be very eectively controlled by reserving slots. As mentioned above, the standard deviation of the access delay is the key parameter, and it can be reduced by more than an order of magnitude with slot reservations. Table shows results when the load on the server channel is slightly smaller than 1 (i.e., = :93), i.e., just below channel saturation. Also in this case, node S l experiences large queuing delays on the channel leading to the server if it does not reserve any slot. The standard deviation of the access delay is still large, although appreciably smaller than in Table 1. By reserving slots, node S l can again signicantly reduce the average and the standard deviation of its access delay, obtaining a large improvement of queuing delay Table : Queuing and access delays for dierent values of the bandwidth allocation parameter s ( = :95) access delay Figure : Average access delays for a client-server scenario with = :95 when s = : performance. The results presented in the tables show that, by reserving slots, nodes can quite eectively control their channel access, managing to almost completely decouple the performance of trac streams with QoS guarantee requirements from the amount of best-eort trac. 5. Queuing delays for best-eort trac In this subsection we show that slot reservation can improve the queuing delay performance of datagram (best-eort) applications as well. All results presented in this subsection refer to a client-server trac scenario in which the trac from and to the server is very close to one ( = :93). Figs., 3, and show, respectively, the average access delays, the standard deviations of the access delays, and the average queuing delays, when nodes do not reserve slots for any source/destination pair. Focus rst on the server performance. The server experiences an average access delay approximately equal to M? 1 = 15 slots for the client-bound channel at the highest priority, i.e., for the channel leading to node 15. Since the load is rather high (almost 1),
7 INFOCOM 1997, Kobe Japan 7 For transmissions to the server, the client at the highest priority experiences a very small average and standard deviation of the access delay, and a very small average queuing delay, since it always observes a free channel, and can transmit packets to the server as soon as they are generated. Instead, clients at lower priorities towards the server experience larger average access delays (e.g., the average access delay of the lowest priority client is very close to 15), and access delay standard deviations, because they can transmit only if higher priority clients have not transmitted on the server channel. Also queuing delays are rather large. 1 MMR does not inuence the system behavior (i.e., the MMR blocking eect is negligible), as already shown in [5], in non-overload conditions. A dierent behavior among client nodes is instead Figure 3: Standard deviations of the access delay for observed on client-bound channels. Clients with the a client-server scenario with = :95 when s = : higher priorities on the channel leading to the server exhibit a negligible access delay on client channels, while clients at lower priority when transmitting to the server face access delays slightly larger than (M? 1)= = 7:5 slots, i.e., slightly larger than half the SRR frame. The transmission queues storing packets directed to the server at higher priority clients are empty most of the time, since these clients experience a small queuing delay on the server channel. As a consequence, higher priority clients very often attempt transmission of packets directed to other clients immediately after the packet is generated. 1 On the contrary, the transmission queues towards the server at lower priority clients are almost always non-empty and quite long, because lower priority clients experience large queuing delays on the server Figure : Average queuing delays for a client-server channel. Thus, client-to-client packets are transmitted scenario with = :95 when s = : only when the corresponding transmission queues are selected according to the SRR scheduling algorithm. The queuing delays of client-to-client packets are almost identical (this cannot be seen from Fig. due the server executes an almost perfect round robin service of transmission queues. It may however happen to the very large vertical scale) to access delays, since that the server empties the queues at higher priorities, thus gaining some \extra slot" in which it can the load is very small. By reserving slots, it is possible to improve the performance of the server and of the clients at lower pri- attempt transmissions of lower priority packets. However, these extra slots are not enough to compensate ority on the server channel. Figs. 5,, 7, and, show, for slots \stolen" in a similar way by clients, so that respectively, the average queuing delays, the average the server still suers a slight bandwidth loss on the normalized numbers of reserved slots (i.e., the average values of lower priority channels (the experienced access delay is larger than M? 1 = 15). s ), the average access delays and the standard deviations of the access delays, when nodes The impact of this phenomenon on the queuing delays faced by the server (see Fig. ) is very strong: reserve slots according to the datagram reservation strategy described in Sect... The values :5, :, very large queuing delays, and non-null loss probabilities, are experienced on client-bound channels where and were respectively chosen for the constants C1, C, and LT the server is at low priority. P of the reservation algorithm. standard deviation of access delay queueing delay 1 1
8 SR 3 : a Bandwidth-Reservation MAC Protocol for Multimedia Applications 35 1 queueing delay Figure 5: Average queuing delays for a datagram reservation strategy with C1 = :5 and C = : Similar queuing delays are experienced by the server on every client-bound channel; the values taken by these queuing delays are close to those experienced by the server on the highest priority channel when it does not reserve slots. No packet losses are observed on any client-bound channel. The server, indeed, reserves almost all reservable slots (see Fig. ) on every client-bound channel, so that no client can \steal" slots from it. Average access delays are, in this case, below the M? 1 = 15 value, and standard deviations are very small. Also clients at lower priorities on the server channel experience smaller queuing delays with respect to the case in which no reservations are allowed. Lower priority clients, indeed, by reserving slots can eectively control the standard deviation of the access delay on the server channel (see Fig. ), thereby improving the queuing delay performance. It must be noted that, while lower priority clients are not successful in reducing their average access delay on the server channel by slot reservation, they achieve a benecial reduction of the standard deviation of the access delay on the same channel. Note that the average queuing delays experienced by lower priority clients on the server channel are smaller than those achievable in a pure TDMA system (which are approximately 5 slots). The average queuing delays, and the average and standard deviations of the access delays, instead, increase with respect to TDMA because of the unavailability of slots reserved by lower priority nodes. Other simulation results not reported here, showed that the reservation strategy is not really sensitive to reserved slots Figure : Normalized numbers of reserved slots for a datagram reservation strategy with C1 = :5 and C = : the values taken by its parameters C1, C, and LT P. As already mentioned, the behavior is self-adjusting, and the number of reserved slots rapidly adapts to the status of local queues. Conclusions The paper described SR 3, an access protocol designed for all-optical packet networks based on WDM multi-channel ring topologies devoting one logical channel for transmissions to each destination. SR 3 is derived from the protocols already presented in [5, ], which exhibit an ecient exploitation of the available bandwidth, and guarantee a throughput-fair access to each node. With respect to these protocols, SR 3 introduces a novel slot reservation scheme, which allows nodes to dynamically allocate a portion of the available bandwidth, and can thus provide quality of service guarantees for the support of multimedia applications. The interesting feature of the proposed protocol is that, although its \native" mode of operation is the provision of connectionless best-eort services, connection-oriented guaranteed services are naturally supported without aecting the basic access mechanisms. The bandwidth left unused by guaranteed services can be very eectively shared by best-eort traf- c, with a full exploitation of the advantages oered by statistical multiplexing. Even for the basic best-eort service, that requires no service guarantee, the reservation scheme can be very benecial: the averages and variances of access delays are greatly reduced when slots are reserved, leading to improved performance and fairness.
9 INFOCOM 1997, Kobe Japan access delay Figure 7: Average access delays for a datagram reservation strategy with C1 = :5 and C = : References [1] C.A. Brackett, \Dense Wavelength Division Multiplexing Networks: Principles and Applications", IEEE Journal on Selected Areas in Communications, vol., n., pp. 9-9, Aug [] I. Chlamtac, A. Fumagalli, L.G. Kazovsky, P.T. Poggiolini, \A Multi-Gbit/s WDM Optical Packet Network with Physical Ring Topology and Multi-Subcarrier Header Encoding", ECOC '93, Montreux, Switzerland, Sept [3] M. Ajmone Marsan, A. Fumagalli, E. Leonardi, F. Neri, \R-Daisy: an All-Optical Packet Network," EUROPTO European Symposium on Advanced Networks and Services, Amsterdam, The Netherlands, March [] A. Budman et al., \Multigigabit optical packet switch for self-routing networks with subcarrier addressing", OFC'9, paper Tu, San Jose (CA), Febr [5] M. Ajmone Marsan, A. Bianco, E. Leonardi, M. Meo, F. Neri, \MAC Protocols and Fairness Control in WDM Multirings with Tunable Transmitters and Fixed Receivers", IEEE/OSA Journal of Lightwave Technology, vol., n., June 199 standard deviation of access delay Figure : Standard deviations of the access delay for a datagram reservation strategy with C1 = :5 and C = : Transactions on Communications, vol. 1, n. 1, pp. 1-, Jan [] R.O. Onvural, Asynchronous Transfer Mode Networks - Performance Issues, Artech House, 199 [] M. Ajmone Marsan, A. Bianco, E. Leonardi, F. Neri, S. Toniolo, \Metaring Fairness Control Schemes in All-Optical WDM Rings", IN- FOCOM '97, Kyoto, Japan, April [7] I. Cidon, Y. Ofek, \MetaRing { a Full-Duplex Ring with Fairness and Spatial Reuse", IEEE
A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network
A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A. K. Turuk, R. Kumar, and R. Badrinath Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More informationTHROUGHPUT IN THE DQDB NETWORK y. Shun Yan Cheung. Emory University, Atlanta, GA 30322, U.S.A. made the request.
CONTROLLED REQUEST DQDB: ACHIEVING FAIRNESS AND MAXIMUM THROUGHPUT IN THE DQDB NETWORK y Shun Yan Cheung Department of Mathematics and Computer Science Emory University, Atlanta, GA 30322, U.S.A. ABSTRACT
More informationUnavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols
More informationScheduling Variable-Size Packets in the DAVID Metropolitan Area Network
Scheduling Variable-Size Packets in the DAVID Metropolitan Area Network A. Bianco, J.M. Finochietto, F. Neri, and V. Sarra Politecnico di Torino Corso Duca degli Abruzzi 24, 29 Torino, Italy Email: {bianco,
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationQoS Provisioning in WDM Ring Networks with Tunable Transceivers
QoS Provisioning in WDM Ring Networks with Tunable Transceivers Ashok K. Turuk and Rajeev Kumar Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Kharagpur, WB 721
More informationA Mirroring Strategy for SANs in a Metro WDM Sectioned Ring Architecture under Different Traffic Scenarios
89 J. Opt. Commun. 29 (2008), 89-97 A Mirroring Strategy for SANs in a Metro WDM Sectioned Ring Architecture under Different Traffic Scenarios Taisir E.H. El-Gorashi, Bernardi Pranggono, Rashid Mehmood
More informationA NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE
A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,
More informationA multichannel Ethernet protocol for a WDM local area star network
A multichannel Ethernet protocol for a WDM local area star network D. Rodellar, C. Bungarzeanu, H. Garcia, C. Brisson, A. Küng, Ph. Robert Telecommunications Laboratory (1), Metrology Laboratory Swiss
More informationResource Sharing for QoS in Agile All Photonic Networks
Resource Sharing for QoS in Agile All Photonic Networks Anton Vinokurov, Xiao Liu, Lorne G Mason Department of Electrical and Computer Engineering, McGill University, Montreal, Canada, H3A 2A7 E-mail:
More informationDistributed STDMA in Ad Hoc Networks
Distributed STDMA in Ad Hoc Networks Jimmi Grönkvist Swedish Defence Research Agency SE-581 11 Linköping, Sweden email: jimgro@foi.se Abstract Spatial reuse TDMA is a collision-free access scheme for ad
More informationA DISTRIBUTED FAIRNESS MECHANISM FOR SLOTTED WDM
A DISTRIBUTED FAIRNESS MECHANISM FOR SLOTTED WDM RINGS J. D. ANGELOPOULOS H-C. LELIGOU H. LINARDAKIS A. STAVDAS National Technical University of Athens Telecom Lab, Polytechniopolis Zographou GR15753,
More informationAWG-based Optoelectronic Router with QoS Support
AWG-based Optoelectronic Router with QoS Support Annette Böhm, Magnus Jonsson, and Kristina Kunert School of Information Science, Computer and Electrical Engineering, Halmstad University Box 823, S-31
More informationn = 2 n = 1 µ λ n = 0
A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University Abstract We consider wavelength
More informationRetransmission schemes for Optical Burst Switching over star networks
Retransmission schemes for Optical Burst Switching over star networks Anna Agustí-Torra, Gregor v. Bochmann*, Cristina Cervelló-Pastor Escola Politècnica Superior de Castelldefels, Universitat Politècnica
More informationAn optically transparent ultra high speed LAN-ring employing OTDM
An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,
More informationFIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues
FIRM: A Class of Distributed Scheduling Algorithms for High-speed ATM Switches with Multiple Input Queues D.N. Serpanos and P.I. Antoniadis Department of Computer Science University of Crete Knossos Avenue
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 623 Multicast Capacity of Packet-Switched Ring WDM Networks Michael Scheutzow, Martin Reisslein, Senior Member, IEEE, Martin Maier,
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationExtensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc
Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,
More informationOptical networking technology
1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the
More informationReduction of Periodic Broadcast Resource Requirements with Proxy Caching
Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota
More informationInternet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks
Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),
More informationIBM Almaden Research Center, at regular intervals to deliver smooth playback of video streams. A video-on-demand
1 SCHEDULING IN MULTIMEDIA SYSTEMS A. L. Narasimha Reddy IBM Almaden Research Center, 650 Harry Road, K56/802, San Jose, CA 95120, USA ABSTRACT In video-on-demand multimedia systems, the data has to be
More informationMulticonfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks
Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Jason P. Jue, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract Wavelength-division multiplexing
More informationModelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks
Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationRate-Controlled Static-Priority. Hui Zhang. Domenico Ferrari. hzhang, Computer Science Division
Rate-Controlled Static-Priority Queueing Hui Zhang Domenico Ferrari hzhang, ferrari@tenet.berkeley.edu Computer Science Division University of California at Berkeley Berkeley, CA 94720 TR-92-003 February
More informationMDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science
MDP Routing in ATM Networks Using the Virtual Path Concept 1 Ren-Hung Hwang, James F. Kurose, and Don Towsley Department of Computer Science Department of Computer Science & Information Engineering University
More informationUNIT- 2 Physical Layer and Overview of PL Switching
UNIT- 2 Physical Layer and Overview of PL Switching 2.1 MULTIPLEXING Multiplexing is the set of techniques that allows the simultaneous transmission of multiple signals across a single data link. Figure
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationFault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee
DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical
More informationGeneralized Burst Assembly and Scheduling Techniques for QoS Support in Optical Burst-Switched Networks
Generalized Assembly and cheduling Techniques for Qo upport in Optical -witched Networks Vinod M. Vokkarane, Qiong Zhang, Jason P. Jue, and Biao Chen Department of Computer cience, The University of Texas
More informationA Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing
A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,
More informationcell rate bandwidth exploited by ABR and UBR CBR and VBR time
DI TECH.REP RT97-224 1 A comparison of and to support TCP trac Sam Manthorpe and Jean-Yves Le Boudec Abstract This paper compares the performance of and for providing high-speed network interconnection
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationCombating Packet Loss in OPS networks: A Case for Network Coding. Gergely Biczók and Harald Øverby NTNU Dept. of Telematics.
Combating Packet Loss in OPS networks: A Case for Network Coding Gergely Biczók and Harald Øverby NTNU Dept. of Telematics Abstract Fighting packet loss in optical packet-switched networks has been a priority
More informationMultimedia Services. Shahab Baqai, Miae Woo, Arif Ghafoor. Purdue University. West Lafayette, Indiana
Network Resource Management for Enterprise-wide Multimedia Services Shahab Baqai, Miae Woo, Arif Ghafoor Distributed Multimedia Systems Lab. School of Electrical Engineering Purdue University West Lafayette,
More informationPerformance of Optical Burst Switching Techniques in Multi-Hop Networks
Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,
More informationNumerical Evaluation of Hierarchical QoS Routing. Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar. Computer Science Department and UMIACS
Numerical Evaluation of Hierarchical QoS Routing Sungjoon Ahn, Gayathri Chittiappa, A. Udaya Shankar Computer Science Department and UMIACS University of Maryland, College Park CS-TR-395 April 3, 1998
More informationATM SIMULATION WITH CLASS. Corso Duca degli Abruzzi 24, Torino { Italy. Technical University of Budapest, Sztoczek 2, 1111 Budapest { Hungary
ATM SIMULATION WITH CLASS M.Ajmone Marsan 1, A.Bianco 1, T.V.Do 2, L.Jereb 2, R.Lo Cigno 1, M.Munafo 1 1 Dipartimento di Elettronica, Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Torino {
More informationUNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING
1 UNIT-II OVERVIEW OF PHYSICAL LAYER SWITCHING & MULTIPLEXING Syllabus: Physical layer and overview of PL Switching: Multiplexing: frequency division multiplexing, wave length division multiplexing, synchronous
More informationDQDB Networks with and without Bandwidth Balancing
DQDB Networks with and without Bandwidth Balancing Ellen L. Hahne Abhijit K. Choudhury Nicholas F. Maxemchuk AT&T Bell Laboratories Murray Hill, NJ 07974 ABSTRACT This paper explains why long Distributed
More informationInvestigating MAC-layer Schemes to Promote Doze Mode in based WLANs
Investigating MAC-layer Schemes to Promote Doze Mode in 802.11-based WLANs V. Baiamonte and C.-F. Chiasserini CERCOM - Dipartimento di Elettronica Politecnico di Torino Torino, Italy Email: baiamonte,chiasserini
More informationMAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS
MAC SIMULATOR FOR HYBRID TDMA/CDMA ACCESS NETWORKS Danny Goderis, Rudy Hoebeke, Kristiaan Venken. Alcatel Corporate Research Center Department Access to Networks Francis Wellesplein 1, 2018 Antwerp, Belgium
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationA QoS aware Packet Scheduling Scheme for WiMAX
A QoS aware Packet Scheduling Scheme for WiMAX Mahasweta Sarkar and Harpreet Sachdeva ABSTRACT WiMAX is one of the most promising broadband wireless technologies today. The WiMAX standard-802.16-is designed
More informationWorst-case running time for RANDOMIZED-SELECT
Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationrequests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor
Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationPerformance Analysis of WLANs Under Sporadic Traffic
Performance Analysis of 802.11 WLANs Under Sporadic Traffic M. Garetto and C.-F. Chiasserini Dipartimento di Elettronica, Politecnico di Torino, Italy Abstract. We analyze the performance of 802.11 WLANs
More informationStability in ATM Networks. network.
Stability in ATM Networks. Chengzhi Li, Amitava Raha y, and Wei Zhao Abstract In this paper, we address the issues of stability in ATM networks. A network is stable if and only if all the packets have
More informationA New Optical Burst Switching Protocol for Supporting. Quality of Service. State University of New York at Bualo. Bualo, New York ABSTRACT
A New Optical Burst Switching Protocol for Supporting Quality of Service Myungsik Yoo y and Chunming Qiao z y Department of Electrical Engineering z Department of Computer Science and Engineering State
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationOptical Packet Switching
Optical Packet Switching DEISNet Gruppo Reti di Telecomunicazioni http://deisnet.deis.unibo.it WDM Optical Network Legacy Networks Edge Systems WDM Links λ 1 λ 2 λ 3 λ 4 Core Nodes 2 1 Wavelength Routing
More informationA Hybrid Multicast Scheduling Algorithm for Single-Hop WDM Networks
A Hybrid Multicast Scheduling Algorithm for Single-Hop WDM Networks Hwa-Chun Lin and Chun-Hsin Wang Abstract This paper shows that, for single-hop WDM networks, a multicast scheduling algorithm which always
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationJitter Control and Dynamic Resource Management. for Multimedia Communication Over Broadband. Network. Ahmed Bashandy, Edwin Chong, Arif Ghafoor,
Jitter Control and Dynamic Resource Management for Multimedia Communication Over Broadband Network Ahmed Bashandy, Edwin Chong, Arif Ghafoor, School of Electrical & Computer Engineering, 1285 Electrical
More informationAD-A STARNET: 1) A MultiGbit/s Optical Local Area Network With Both Packet and Circuit Switching IX MAR I94l. IVo 0 o 0q -5i-:U-- I SS7
l-c I "^ J,' 1 AD-A247 617 DTIC IX MAR 18192 STARNET: 1) A MultiGbit/s Optical Local Area Network With Both Packet and Circuit Switching I94l L. Kazovsky, P. Poggiolini Department of Electrical Engineering,
More informationA token-based distributed algorithm to support QoS in a WDM ring network
A token-based distributed algorithm to support QoS in a WDM ring network Ashok Kumar Turuk, Rajeev Kumar * Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, WB
More informationFB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network
Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu
More informationBuffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 18, NO. 6, JUNE 2000 757 Buffered Fixed Routing: A Routing Protocol for Real-Time Transport in Grid Networks Jinhan Song and Saewoong Bahk Abstract In this paper we
More informationCommunication and Networks. Problems
Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationDelayed reservation decision in optical burst switching networks with optical buffers
Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of
More informationACLASS of users that has drawn much attention over the
296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,
More informationLecture 9. Quality of Service in ad hoc wireless networks
Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement
More informationAsynchronous vs Synchronous Input-Queued Switches
Asynchronous vs Synchronous Input-Queued Switches Andrea Bianco, Davide Cuda, Paolo Giaccone, Fabio Neri Dipartimento di Elettronica, Politecnico di Torino (Italy) Abstract Input-queued (IQ) switches are
More informationPerformance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License
Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications
More informationCHAPTER TWO LITERATURE REVIEW
CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access
More informationJOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 23, NO. 3, MARCH
JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 23, NO. 3, MARCH 2005 937 The FT 3 FR 3 AWG Network: A Practical Single-Hop Metro WDM Network for Efficient Uni- and Multicasting Chun Fan, Stefan Adams, and Martin
More information2 J. Karvo et al. / Blocking of dynamic multicast connections Figure 1. Point to point (top) vs. point to multipoint, or multicast connections (bottom
Telecommunication Systems 0 (1998)?? 1 Blocking of dynamic multicast connections Jouni Karvo a;, Jorma Virtamo b, Samuli Aalto b and Olli Martikainen a a Helsinki University of Technology, Laboratory of
More informationPrioritization scheme for QoS in IEEE e WLAN
Prioritization scheme for QoS in IEEE 802.11e WLAN Yakubu Suleiman Baguda a, Norsheila Fisal b a,b Department of Telematics & Communication Engineering, Faculty of Electrical Engineering Universiti Teknologi
More informationQuality of Service in the Internet
Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:
More informationMulti Protocol Label Switching
MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Network Management and QoS Provisioning - 1 MPLS: introduction
More informationThe Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks
The Design and Performance Analysis of QoS-Aware Edge-Router for High-Speed IP Optical Networks E. Kozlovski, M. Düser, R. I. Killey, and P. Bayvel Department of and Electrical Engineering, University
More informationPerformance Assessment and Comparison between Star-ring based and Tree based EPONs
Performance Assessment and Comparison between Star-ring based and Tree based EPONs Zen-Der Shyu 1 Department of General Education, Army Academy, Taiwan I-Shyan Hwang 2,3, Chun-Wei Huang 3, and I-Cheng
More informationNetwork Systems for Emerging WAN Applications
Network Systems for Emerging WAN Applications Hitachi Review Vol. 48 (1999), No. 4 169 Akihiko Takase, D.Sc. OVERVIEW: This paper describes wide-area-network architecture from the viewpoints of networking
More informationMPLS Multi-Protocol Label Switching
MPLS Multi-Protocol Label Switching Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Computer Networks Design and Management - 1 MPLS: introduction
More informationMulticast Traffic in Input-Queued Switches: Optimal Scheduling and Maximum Throughput
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 11, NO 3, JUNE 2003 465 Multicast Traffic in Input-Queued Switches: Optimal Scheduling and Maximum Throughput Marco Ajmone Marsan, Fellow, IEEE, Andrea Bianco,
More informationHeadend Station. Headend Station. ATM Network. Headend Station. Station. Fiber Node. Station. Station Trunk Splitter.
ATM Trac Control in Hybrid Fiber-Coax Networks { Problems and Solutions Nada Golmie y Mark D. Corner z Jorg Liebeherr z David H. Su y y NIST { National Institute of Standards and Technology Gaithersburg,
More informationComparison of Shaping and Buffering for Video Transmission
Comparison of Shaping and Buffering for Video Transmission György Dán and Viktória Fodor Royal Institute of Technology, Department of Microelectronics and Information Technology P.O.Box Electrum 229, SE-16440
More information/$10.00 (c) 1998 IEEE
Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu
More informationImproving TCP Performance over Wireless Networks using Loss Predictors
Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it
More informationCommunication Networks
Communication Networks Chapter 3 Multiplexing Frequency Division Multiplexing (FDM) Useful bandwidth of medium exceeds required bandwidth of channel Each signal is modulated to a different carrier frequency
More informationP D1.1 RPR OPNET Model User Guide
P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1
More informationOn Scheduling Unicast and Multicast Traffic in High Speed Routers
On Scheduling Unicast and Multicast Traffic in High Speed Routers Kwan-Wu Chin School of Electrical, Computer and Telecommunications Engineering University of Wollongong kwanwu@uow.edu.au Abstract Researchers
More informationConfiguration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic
Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Anupam Soni and Yatindra Nath Singh anusoni@iitk.ac.in,ynsingh@iitk.ac.in. Abstract In Optical Burst Switching
More informationAll-Optical IP-over-DWDM MAN Ring Network with CSMA/CP MAC Protocol
All-Optical IP-over-DWDM MAN Ring Network with CSMA/CP MAC Protocol Chien-Chun Li and Wen-Shyang Hwang Computer Network Protocol and Applications Laboratory Department of Electrical Engineering National
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationCHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA)
92 CHAPTER 4 CALL ADMISSION CONTROL BASED ON BANDWIDTH ALLOCATION (CACBA) 4.1 INTRODUCTION In our previous work, we have presented a cross-layer based routing protocol with a power saving technique (CBRP-PS)
More informationBridge Channel Access Algorithms for Integrated Services Ethernets
Bridge Channel Access Algorithms for Integrated Services Ethernets Jim M. Ng, Edward Chan Dept. of Computer Science City Polytechnic of Hong Kong Tat Chee Ave., Kowloon Hong Kong Abstract: To provide integrated
More informationUNIT 2 TRANSPORT LAYER
Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management
More informationA simulation study of optical burst switching and access protocols for WDM ring networks
Computer Networks 41 (2003) 143 160 www.elsevier.com/locate/comnet A simulation study of optical burst switching and access protocols for WDM ring networks Lisong Xu, Harry G. Perros *, George N. Rouskas
More informationCHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION
CHAPTER 5 QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION 5.1 PRINCIPLE OF RRM The success of mobile communication systems and the need for better QoS, has led to the development of 3G mobile systems
More informationMaster s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006
Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology
More information