SLAs and Auction Mechanisms in CATI

Size: px
Start display at page:

Download "SLAs and Auction Mechanisms in CATI"

Transcription

1 SLAs and Auction Mechanisms in CATI Noria Foukia 1, David Billard 1 Pr. Juergen Harms 1 Centre Universitaire d Informatique CUI, University of Geneva, Switzerland 1 [foukia billard]@cui.unige.ch Abstract Last year we present the new FNRS project, CATI (Charging and accounting Technology for the Internet). This new paper gives the state of progress of CATI. In this paper we focus our attention on a few points mentioned above, namely: we describe briefly the final CATI architecture interfacing IntServ and DiffServ technologies; we particularly focus on the topic concerning the charging and the accounting: we described in the previous paper the new RSVP extensions for charging and accounting; now we explain how we use these extensions in the framework of a new market-based pricing model which is based on auction and respects the principle of the incentive compatibility. In these scope we will provide new evaluation results achieved in CATI; we will show how to allow Virtual Private Network (VPN) management with QoS support using the Broker architecture in DiffServ as well as the Service Level Agreement (SLA). 1. Introduction The project, CATI (Charging and accounting Technology for the Internet) consists of the two projects CAPIV (Charging and Accounting Protocols in the Internet and in Virtual Private Networks) and MEDeB (Management, Evaluation, Demonstrators, and Business Models).The goals of CATI is the design, the implementation and the evaluation of charging and accounting and management mechanisms for value-added Internet services and Virtual Private Networks (VPN) [1]. These mechanisms were supposed to enable: high-quality Internet transport by economic incentives for E.Commerce scenarios Virtual Private network (VPN) management business models for packet-based Internet including cost and pricing models appropriate security and trust models proof of concepts by means of an IP-Phone as a sample application This new paper gives the state of progress of CATI. At the present time, many results have been achieved of which: final CATI architecture definition based on the IntServ over DiffServ model extension of IntServ model with charging, accounting and pricing objects mechanisms VPN management with QoS support business, security, and trust model definition definition of User Interface and metrics Among all these results, a number of new and intermediate results have been achieved concerning especially the Quality-of-Service (QoS) provisioning and that of a DiffServ-VPN core network taking care of the customers as well as of the Internet Service Providers (ISPs). The aspects of multiprovider models have been taken care of explicitly by the description of SLAs, their negotiation, their trading and their scopes. Another multiprovider aspect deals with the design and simulation of pricing model behaviors for dynamic market prices. It is achieved through the implementation of a new approach called CHiPS (Connection-Holder-is-Preferred-Scheme). The present paper is split into the following: section 1 gives the overview of the CATI issues and architecture. Section 2 presents the multiprovider pricing model proposed in CATI. Section 3 describes the VPN management with DiffServ-QoS support based on hierarchy of Bandwidth Brokers (BBs) which negotiate the SLAs. The last section draws the conclusion underlining the key achievements in CATI.

2 2. Problem Overview The objectives of CATI is to propose high quality transport with economic incentives for E-Commerce scenarios. For that purpose, charging, accounting and management mechanisms for value-added Internet services are required. The adopted approach in CATI tries to merge the Integrated Services architecture (IntServ) in the stub network as well as the Differentiated Services architecture (DiffServ) in the core network. For the IntServ approach we used the extensions of the Resource Reservation Protocol (RSVP) to carry relevant data for charging and pricing based on flows. These extensions were already mentioned in the paper [2], we presented last year. Since one year, the DiffServ approach focuses on appropriate signalling which considers BBs as well as SLAs as important components for a charging solution. Finally the IntServ/DiffServ interoperability for multi-provider scenarios is proposed with IntServ at the stub network and DiffServ interconnecting multiple ISPs in the core network, where transparent networking security is achieve through VPNs (Figure 1). Figure 1: Overall CATI Architecture 3. New RSVP Extension for Market-Based Pricing Model CHiPS The core architecture for CATI has been developed, based on bandwidth brokers and service level agreements being able to operate aggregated provisioning of network resources in a secure, scalable, and dynamic way. The access architecture utilizes the IntServ model as discussed in the previous section. A related micro-payment scheme, specially devoted to the payment of utilized network resources and based on micro cheques transported in a signaling protocol has been studied in the related MicPay project [3]. Due to these payment system extensions of the IntServ signalling protocol RSVP, a user can reserve resources and can be charged for the use of the network accordingly, even in a multi-provider environment. However, once the user utilizes all the technology to dynamically reserve and pay for network resources, the method to calculate the price of the service remains open. On one hand, how much the user has to pay is still mainly relying on flat fees, which do not reflect the real costs for the use of a network or its communication services. On the other hand, the notion of highly dynamic prices for communication services in such a networking environment seems to offer challenges for incentive-compatible pricing schemes. Therefore, the design and evaluation of a dynamic pricing model in a multi-provider scenario is a central task of interest. This paper focuses on dynamic pricing, which can be formulated as at a given time, the scarcer a resource is, the higher is the cost of using this resource, and conversely Design Objectives of CHiPS In this framework, the scheme CHiPS (Connection-Holder-is-Preferred-Scheme) has been designed as a flowbased dynamic pricing model using auctions in a multi-provider scenario [4] [5]. CHiPS reuses the smart market concept of [6], while extending in the following manner. CHiPS allows for the adaptation of bids to the currently valid market-price without loosing the central objective of the incentive compatibility.

3 Using auction mechanisms for end-to-end flows, supported by connections crossing more than one ISP, leads to a number of specific problems. Basically, it is necessary to perform separate auctions at least at all ISPs involved, which should be performed in an asynchronous fashion. Since a central scheme for their technical synchronization will remain too difficult, economic rules should be applied, which are in their nature decentralized in an open market environment. A practical approach for supporting the user participating in an auction for networking resources requires to set a spending cap for a requested flow. This spending cap limits the financial means to be spent for a communication service. Of course, being able to obtain the right to use a set of specified resources in the network, in a multi- ISP scenario, requires to win a set of auctions. Therefore, the (global) spending cap has to be subdivided in an efficient way into separate bids for each of these auctions. Finally, the loss of only one (local) auction has to be handled in order to prevent the entire connection from being torn down because of local fluctuations in the market Integration of Pricing and Reservations This dynamic pricing approach has been integrated recently into the currently used RSVP protocol by introducing new RSVP objects to satisfy the requirement for auctions. These new objects are able to transport pricing and bidding information, and RSVP messages are used to exchange bids. Figure 2 summarizes all different message sequences using RSVP in a multi-provider connection using auctions, but without CHiPS. ISP1 ISP 2... ISP n-1 ISP n PATH Message "Quote Phase" RESV Message "Collect Market Price" Time "Bid Phase" PATH Message "Set Bidfactor" RESV Message "Collect Market Price and Auction Result" "Bid Phase" PATH Message "Set Bidfactor" RESV Message "Collect Market Price and Auction Result" Figure 2: RSVP Message Sequence Extensions for Auctions Concerning the flow of messages, two phases are distinguished from the sender to the receiver and from the receiver to the sender Determining the Bid Factor in the Quote Phase A classical first PATH message is sent from the sender to the receiver choosing the routing and asking at each intermediate node whether sufficient resources are available for the sender. On the return path, the RESV message collects the current market-price m i of each link l i and sums it up in a newly defined sum object as follows: sum = m i Once the RESV message reaches the original sending node on its way back, a new factor, the bid factor, is calculated according to the formula: bidfactor = ( spending cap) ( sum) In this case, the spending cap determines the amount of money the user is willing to pay for the entire connection. This bid factor is envisioned as the optimal distribution factor or weight for the spending cap among all interconnected links, determining the path from the sender to the receiver.

4 Bid Phase The next PATH message contains the calculated bid factor in a new bid factor object. It is initialized once and saved at each node or in general, at every single ISP on its way to the receiver. As usual, the next RESV message is returned back to the sender collecting again all current market prices of each link l i and transmitting the sum to the source. At the source, the new bid factor is calculated and updated in the bid factor object of the next PATH message of the next Bid Phase, and so on. Only if the sender succeeds in the first complete cycle of Quote Phase and Bid Phase, can he start to transmit data until he finishes his communication or he cannot cope any more with the current market price The Connection Holder Problem Indeed, the fundamental enhancement compared to the classical RSVP protocol, is the computation of the current market price of each link, which is done locally at each provider. Users state the price they are willing to pay (the bid factor of the Bid Phase) for the resource they want to reserve. Afterwards, according to the concept of Generalized Vickrey Auctions [7], an auction mechanism establishes the current market price locally in routers or a dedicated router of the ISP. The flow will be transported, if the sender will win all local auctions. This performs economically excellent, however, it shows a major drawback, since a user already connected loses the entire connection, if he loses locally a single auction. This situation could easily happen, if new bidders arrive with higher bid factors than the ones that are currently using the link participating at the auction. This basic problem is avoided by CHiPS. The idea is to assign a slight priority to users already being connected, by giving them a second chance to keep the connection. This is performed by allowing for the improvement of their local bids, if those become too low according to the current market price. Hence, users that have lost a local auction need to be asked, whether they are willing to improve their bid for that auction afterwards above the current market price, while their respective connections are not torn down for the moment, but remain connected for one more auction cycle. Users may indeed be able to make a higher bid for specific auctions, because of two reasons: firstly, dividing the global spending cap equally among all auctions means that all the other bids might be higher than the respective local market prices. Therefore, it is possible to reshuffle this money to the auction it is needed for. Secondly, according to the concept of Generalized Vickrey Auctions, winning users normally pay less than their bids. Hence the spending cap that forms the basis for determining the bids, actually leaves some space for so-called extraordinary expenses. To be able to shuffle this gap between spending cap and real expenses towards critical places along the connection, a new bid structure has been introduced in CHiPS: b i = a i + m i f In this formula b i determines the current price the user is willing to pay for the link l i, f is the factor expressing a bid relative to the current or the previous market price, m i is the locally valid market price at ISP i, and a i is initialized to zero. Basically, a i determines an extra budget, the user could use, if he looses locally an auction on the link l i. In order to understand this new bid structure, the previous bid structure is re-used, including the bid factor. Assuming the latest definition: bidfactor = ( spending cap) ( sum) Thus, without any extra budget, b i was previously expressed as b i = m i bidfactor, because we could consider that the bid factor expresses the user bid weighted according to the current market price. Thus, the spending cap was split equally to all the links l i according to their current market prices. This new structure could be considered as a fictive one, taking into account the extra budget the user is willing to pay. Moreover, the new bid structure provides an elegant solution for the issue of signalling, where the sender is willing to increment his bid at the auction he has just lost. If a user loses a local auction for the use of the link l i, an RSVP message is transmitted from ISP i to both the sender and the receiver of that connection. This message contains the absolute value d of the difference between the price b i and the new valid market price for the link l i. On its way to the sender and the receiver, the message requests from every ISP, which are involved in the current connection, to subtract this value from the local a i. If the sender accepts to increase his spending cap for the link l i, by the value of d (i.e. he agrees to the rebidding procedure that will save his connection), he sends a rebidding RSVP message, which asks each ISP to increase a i by d. This mechanism ensures that only the bid responsible for the lost auction is changed, exactly by the necessary amount. Moreover, as the local a i is larger than 0 from now on, this means that each subsequent bid for this specific auction is slightly higher than it would be in the normal (equally distributed) case. This is justified by the fact that the respective auction has turned out to be critical, i.e. subject to unforeseen fluctuations of the market price.

5 3.4. Simulation and Results CHiPS has been investigated by a simulation tool for flow-based dynamic pricing schemes called flowsim [8]. A number of preliminary results are reported in the following paragraphs Topology The simulation topology of the chosen traffic scenario takes the following points into consideration: Different senders are able to send flows to different receivers. A congestion situation can happen in order to justify the auction mechanism. All link capacities are derived from real life scenarios: e.g., typically 155 Mbits/s in a backbone network. The sender, the receiver and all ISPs are represented by a single node in the topology. The sender can use different routes to connect to the receiver (useful in case of congestion of a link). The topology proposed in Figure 3 satisfies all of the above mentioned issues Bottleneck 8 13 Figure 3: Topology of the Simulation Scenario Simulation Context The following simulation parameters are used for the first set of evaluations: The required bandwidth per flow is set to 256 kbits/s. A new flow is generated every 4 seconds. The entire simulation has a duration of 30 minutes. An average duration of flow is 600 seconds. The mean arrival rate of the flow is 0.25 seconds. Normal links have a bandwidth of 155 Mbits/s. The link between nodes 4 and node 6 determines a bottleneck, because its capacity is reduced accordingly, down to 2 Mbits/s in the extreme case. All flows are started from two users (nodes 0 and 1). The receiver is for both senders the node Simulation Results Among a set of simulations [9], CHiPS was compared with other auction model without the notion of extra budget. The traffic summary is presented for the similar congested scenario with two users. In the first and quite simple case, both users have the same spending-cap (Table 1). Obviously, auctions running under CHiPS rarely interrupt running flows. This shows one interruption with CHiPS compared to 46 interruptions without CHiPS. In the second case, user 0 has doubled the spending cap (Table 2). In a fair scenario, the total cost of the congestion is approximately split equally among the two users. It is obvious that user 1 who has a lower spending-cap hardly has a chance to get his traffic to the receiver. That is why

6 he has a marginal cost compared to the one of the user 0. As long as the user 0 (unfair user) can fill the capacity of the link alone, he has to pay the full amount he offers. Table 1: Traffic Summary for the Congested Scenario with Two Users Link 4 6 Without CHiPS With CHiPS Accepted connections Refused connections Interrupted connections 46 1 Income node E E+11 Cost User E E+10 Cost User E E+10 Taking the numbers of interrupted connections, it has been shown that CHiPS prevents a currently active connection from being torn down abruptly. In the following it will be examined that the incentive compatibility of CHiPS is still valid and a multi-provider context can be achieved. Table 2: Traffic Summary for the Congested Scenario with Two Users. User 0 Doubled the Spending Cap Link 4 6 Without CHiPS With CHiPS Accepted connections Refused connections Interrupted connections 40 1 Income node E E+11 Cost User E E+11 Cost User E E Incentive Compatibility of CHiPS The following case is considered at this stage. If a user will get a profit by trying to fool the market, i.e. to offer a higher spending-cap that he is really willing to pay at the end, the incentive compatibility will not be achieved. Let us consider the defined variable s 1, which is the strategic factor. A user i expresses his spending-cap by the multiplication of the valuation and the strategic factor : D i D i = s i v i v i The utility function is expressed by the difference between the valuation and the price the user will pay at the end of the auction. Figure 4 shows the user s utility function according to the strategic factor with CHiPS. Figure 4: User Utility as a Function of the Strategic Factor

7 Since all bids are considered in the fictitious auction, the price paid by the allocated reservation equals essentially the correct market price. The utility has a local maximum where the strategic factor equals 1. For that reason, the user gains the highest utility by being honest and offering exactly the price he is willing to pay. This fact gives rise to think that the concept of incentive compatibility [7] is preserved by the CHiPS scheme. This concept is enhanced by the multi-provider aspect for CHiPS. Indeed a badly behaving node or ISP in the network (maybe an ISP which tends to increase its revenue by causing congestion or an ISP which lacks for capacity) could be easily found because the extra budget factor is distributed among all ISPs. CHiPS gives at least the possibility to know about effects an ISP does to other ISPs. CHiPS does not allow to renegotiate the quality during the call: CHiPS allows the user to change (increase) his price (spending-cap) with a new bid during the current communication, but as it is based currently on RSVP, it doesn t allow to change dynamically the quality users require for the same communication. The user is not allowed to lower his quantity with a new bid, as long as he has a successful bid in the auction. Therefore, the incentive compatibility is valid for static resource usages for a single connection. 4. VPN Management with DiffServ-QoS Support using the Broker Architecture as well as the Service Level Agreement 4.1. RSVP Interface for the Differentiated Service In CATI the IntServ resource reservation is successfully extended with a resource payment mechanism, that allows cost sharing between end-users. But Integrated Service allow only based flow reservation which does not scale to the core backbones (Internet). Resource reservation in the core network is more suitable using the Differentiated Service architecture. To do that, we present in CATI [10] a prototype implementation for mapping RSVP reservation to DiffServ reservation (Figure 5). In the stub network, an extended RSVP daemon (RSVP-DiffServ gateway - RDG) monitors the RESV messages and contacts the appropriate BB of the DiffServ architecture. The BB maps the IntServ reservation to a DiffServ reservation. That is the BB at the ingress router (Linux boxes in the scheme), is responsible to decide how to handle the received requests according to negotiated SLAs (source and destination addresses, network provisioning, accounting, reservation method). Figure 5: Single ISP Scenario with two DiffServ and two Linux routers 4.2. VPN-DiffServ Network In CATI, we propose to use a VPN-DiffServ architecture to address the problem of providing QoS and resource provisioning [11]. As we know, the Internet was not design to guarantee QoS, the design of new protocols and services are necessary to add the QoS to the Internet. Recently, the emergence of the Differentiated Services for IP backbones allows different levels of QoS. In this scope, the reserved flows are aggregated to big tunnels or VPNs between the border routers. The BB which aggregates flows has to resize the tunnel according to the actual load of the network as well as to the specific service type. Bandwidth Brokers as proposed in the DiffServ framework negotiate the SLAs and use local mechanisms to grant the agreed Per-Hop-Behaviour (PHB) for in-profile traffic. Therefore they have to reserve network resource. We propose to provision and allocate resource dynamically both at the edge and in the interior of the VPN-Diff- Serv network in order to support end-to-end QoS for the VPN connection. The user specifies his requirements as a range of quantitative services in SLAs for the VPN connections because the user is unable to predict the load

8 between the VPN endpoints. That is, the user who wants to establish a VPN between two stub networks and who does not know exactly the resource he needs can specify his requirements in term of range of bandwidth to his access ISP. The ISP could offer the possibility to the user to select such range of bandwidth and to activate the service dynamically on the fly, which is more flexible to the user s point of view. For supporting such services, we propose a Bandwidth Broker based automated provisioning systems in order to partition the capacity at the edge nodes to various classes of VPNs and manage them efficiently to allow resource sharing among the groups. At the edge nodes, each VPN connection uses certain amount of resource according to the SLAs. But there is the need to provision the interior nodes of the transit core network to allow the required provisioning at the edge nodes. For that, we proposed a two-layered model for VPN-DiffServ provisioning: one layer for the edge node provisioning and one layer for interior node provisioning using the BB architecture; a BB prototype has been deployed which provide the required provisioning and the connection admission based on user preferences and negotiated SLAs (Figure 6). Figure 6: Components of a Bandwidth Broker for Resource Provisioning 4.3. Major Components In this prototype, the admission process checks resource availability at the edge nodes but also the availability of quantitative resource at each node in the interior network. For that, the system needs to keep track of existing connections and available resources. It should also update the relevant databases to reflect the most recent network state. The different components which play a role are: The SLA database that contains the user identification and specifies the maximum amount of bandwidth one can have to build a VPN-DiffServ tunnel. That is, the user can choose any available option without the possibility to exceed the maximum amount. A connection database which contains a list of currently active VPNs. If a request arrives for a new VPN connection or for a VPN termination, the BB makes its decision after checking if this connection already exists or not. The storage of the established connections allows to know how much resources have been used by VPN users at the edge and interior nodes. The resource databases contains the record of quantitative resource provisioned and current resource consumption of various router interfaces (edge and interior). The topology database contains default and alternate routing paths for various VPNs source destination pairs Systems flows and Connections A user sends a connection request to the BB for a new request from the web or using any other signalling mechanism such as RSVP. This request contains user id, user password, source and remote address for the tunnel, amount of bandwidth and encryption method. The BB contacts the SLA database that is responsible for validating the user and his request. If the user is identified correctly, (his source and remote address conform the contract, the bandwidth request is less or equal to the agreed traffic contract), the BB sends a positive response. After his validation, the BB sends a signal to the configuration daemon (CD) to check its status (busy, available or down). If the CD is available, the BB contacts the connection database to allocate an encrypted tunnel of certain amount. The resource database responds to the BB and either allocates the resource or denies, based on availability. If end-to-

9 end resource allocation is needed the interior resource database is invoked. If everything goes fine, appropriate routers are configured accordingly SLA Definition in CATI Bandwidth Brokers as proposed in the DiffServ framework negotiate the SLAs. Between two ISPs or an ISP and a end-user, this SLA is a contract which specifies what service is performed during which period at what cost. In our scenario we define SLAs at each ISPs by the following parameters [12]: A traffic description which gives the support for the Per-Hop-Behaviour (PHB) and QoS parameters (bandwidth or delay) for describing a specific traffic. A geographical information from the ISP s network to the destination. A duration of the SLA: the SLA will terminate after the specified duration in the contract. The cost of the agreement: the SLA is associated with a price computed according to a local pricing model as well as to some business strategy. 5. Conclusion The work in CATI and its proposed solutions is compliant as far as possible with a number of standards and quasi standards products. The proof-of-concept for a valid usage-sensitive pricing scheme as well as a suitable and efficient charging and accounting implementation has been performed by means of an IP telephony as a sample application. In particular, CATI has achieved up to now the following key issues, ranging from important conceptual work and evaluations, including its documentation, to prototypal implementations: Definition of an Integrated CATI scenario and architecture for IntServ/DiffServ models in support of charging, accounting, and VPN management mechanisms which is complemented by a security, a trust, and a business model. Development and implementation of charging and accounting extensions in reservation which are demonstrated by a sample IP telephony application and a graphical user Interface. Design and implementation of VPN service management based on hierarchy of brokers which is demonstrated by a Web-based VPN configuration user interface. Acknowledgments This work has been performed in the framework of the project Charging and Accounting Technology for the Internet CATI (CAPIV /1 and MEDeB /1) which is funded by the Swiss National Science Foundation, SNF, Berne, Switzerland.The authors also like to acknowledge contributions of their project colleagues from the following organizations: Computer Engineering and Networks Laboratory, ETH Zürich:G. Frankhauser, G. Joller, P. Reichl, N. Weiler, D. Schweikert; IBM Research Laboratory, Zürich, Communication Systems: G.Dermler; Institute of Computer Science, Information and Communication Management, University of Zürich: H. Kneer, C. Matt, U. Zurfluh: Institute of Computer Science and Applied Mathematics IAM, University of Bern: F. Baumgarter, M. Kasumi, I. Khalil; SWITCH, Zürich: S. Leinen. References [1] B. Stiller, T. Braun, M. Günter, B. Plattner: The CATI Project: Charging and Accounting Technology for the Internet; 5th European Conference on Multimedia Applications, Services, and Techniques (ECMAST 99); Madrid, Spain, May 26 28, 1999, LNCS, Springer, Heidelberg, Germany, Vol. 1629, pp [2] N.Foukia, D. Billard: Charging and Accounting Technology for the Internet: The CATI Project; HPOVUA 1999; June [3] H. Petersen, M. Michels, D. Som, G. Fankhauser, B. Stiller, N. Weiler, R. Cantini, F. Baessler, D. Konstantas, J.-H. Morain: MicPay Micropayments for Correlated Payments; Informatik/Informatique, SI Publication, Switzerland, December 1999, No. 6. [4] P. Reichl, G. Fankhauser, B. Stiller: Auction Models for Multi-Provider Internet Connections; 10. GI/ITG Fachtagung Messung, Modellierung und Bewertung von Rechen- und Kommunikationssystemen (MMB'99), Trier, Germany, September 22-24, 1999, Session 4a: Internet. [5] N.Foukia, D, Billard, P. Reichl, B. Stiller: User Behavior for a Pricing Scheme in a Multiprovider Scenerio; Workshop on Internet Service Quality Economics; MIT, Boston, USA, December 2-3, 1999.

10 [6] J. K. MacKie-Mason: A Smart Market for Resource Reservation in a Multiple Quality of Service Information Network; Technical Report, University of Michigan, U.S.A., September [7] N. Brownlee, C. Mills, G. Ruth: Traffic Flow Measurement: Architecture; RFC 2063, January [8] D. Schweikert: QOS Routing and Pricing in Large Scale Internetworks; Diploma Thesis, ETH Zürich, TIK, March [9] B. Spielman: Design and Evaluation of Efficient Pricing Schemes for Integrated Internet Services; Diploma Thesis, ETH Zürich, TIK, Summer [10] R. Balmer, F. Baumgarter, M. Günter, T. Braun: RSVP Interface for the Differentiated Service VPN; Project Deliverable CATI-IAM-IM-I , March 15, [11] I. Khalil, T. Braun: Resource Provisioning in VPN-DiffServ Networks; Project Deliverable CATI-IAM-DE-I , March 15, [12] G. Fankhauser, D. Schweikert, B. Plattner: Service Level Agreement Trading for Differentiated Services Architecture: Computer Engineering and Networks Lab, Swiss Federal Institut of Technology, Zürich, Switzerland.

Charging and Accounting Technology for the Internet The CATI Project:

Charging and Accounting Technology for the Internet The CATI Project: Charging and Accounting Technology for the Internet The CATI Project: Noria Foukia, David Billard Teleinformatics and Operating Systems, Geneva University, Switzerland E-Mail: noria.foukia@cui.unige.ch,

More information

A Model for Value-added Internet Service Provisioning

A Model for Value-added Internet Service Provisioning 26 A Model for Value-added Internet Service Provisioning Helmut Kneer, Urs Zurfluh, Burkhard Stiller2 Department of Information Technology IFI, University of Zur ich, Switzerland Computer Engineering and

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 Quality of Services 1. Terminology 2. Technologies 2 Terminology Quality of service Ability to control network performance in order to meet application and/or end-user requirements Examples of parameters

More information

CATI Scenario and Architecture

CATI Scenario and Architecture CATI Charging and Accounting Technology for the Internet SNF SPP Projects 5003-054559/1 and 5003-054560/1 CATI Scenario and Architecture Gabriel Dermler IBM Research Division, Zürich Laboratories Workpackage

More information

Research Report of the Research Group "Computer Networks and Distributed Systems"

Research Report of the Research Group Computer Networks and Distributed Systems Research Report of the Research Group "Computer Networks and Distributed Systems" Personal Head Prof. Dr. Torsten Braun, Tel.: +41 31 631 4994, email: braun@iam.unibe.ch Secretary Sylvia Schaad, Tel.:

More information

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

A Bandwidth-Broker Based Inter-Domain SLA Negotiation A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β

More information

Internet Pricing. Abstract. 1 Introduction. 2 Interconnection. Md. Rafiqul Hasan Chowdhury Helsinki University of Technology

Internet Pricing. Abstract. 1 Introduction. 2 Interconnection. Md. Rafiqul Hasan Chowdhury Helsinki University of Technology Internet Pricing Md. Rafiqul Hasan Chowdhury Helsinki University of Technology rafiqul.chowdhury@hut.fi Abstract Internet pricing can be seen from two points of view - between service providers and end-users

More information

Evaluation of Bandwidth Broker Signaling

Evaluation of Bandwidth Broker Signaling Evaluation of Bandwidth Broker Signaling Manuel Günter Torsten Braun IAM-99-002 May 1999 1 . 2 Abstract The Differentiated Service (DiffServ) architecture for the Internet implements a scalable mechanism

More information

Differentiated Services

Differentiated Services 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service Definition of

More information

Evaluation of Bandwidth Broker Signaling

Evaluation of Bandwidth Broker Signaling Evaluation of Bandwidth Broker Signaling Manuel Günter, Torsten Braun Institute of Computer Science and Applied Mathematics University of Berne Neubrückstrasse 10, CH-3012 Bern, Switzerland http://www.iam.unibe.ch/

More information

Differentiated Services

Differentiated Services Diff-Serv 1 Differentiated Services QoS Problem Diffserv Architecture Per hop behaviors Diff-Serv 2 Problem: QoS Need a mechanism for QoS in the Internet Issues to be resolved: Indication of desired service

More information

Networking Quality of service

Networking Quality of service System i Networking Quality of service Version 6 Release 1 System i Networking Quality of service Version 6 Release 1 Note Before using this information and the product it supports, read the information

More information

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning

Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Investigating Bandwidth Broker s inter-domain operation for dynamic and automatic end to end provisioning Christos Bouras and Dimitris Primpas Research Academic Computer Technology Institute, N.Kazantzaki

More information

TOWARDS A SCALABLE SYSTEM FOR PER-FLOW CHARGING IN THE INTERNET

TOWARDS A SCALABLE SYSTEM FOR PER-FLOW CHARGING IN THE INTERNET TOWARDS A SCALABLE SYSTEM FOR PER-FLOW CHARGING IN THE INTERNET Gabriel Dermler 1, Manuel Günter 2, Torsten Braun 2, Burkhard Stiller 3 1 IBM Research Laboratory, Zürich, Switzerland 2 Institute of Computer

More information

Active Adaptation in QoS Architecture Model

Active Adaptation in QoS Architecture Model Active Adaptation in QoS Architecture Model Drago agar and Snjeana Rimac -Drlje Faculty of Electrical Engineering University of Osijek Kneza Trpimira 2b, HR-31000 Osijek, CROATIA Abstract - A new complex

More information

Virtual Private Network Architecture

Virtual Private Network Architecture Virtual Private Network Architecture T. Braun, M. Günter, M. Kasumi, I. Khalil IAM-99-01 April 1999 Virtual Private Network Architecture 2 T. Braun, M. Günter, M. Kasumi, I. Khalil Virtual Private Network

More information

Deploying MPLS & DiffServ

Deploying MPLS & DiffServ Deploying MPLS & DiffServ Thomas Telkamp Director, Data Architecture & Technology Global Crossing Telecommunications, Inc. telkamp@gblx.net MPLS and DiffServ technologies are getting a lot of attention

More information

Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains

Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains Implementation of a Bandwidth Broker for Dynamic End-to-End Capacity Reservation over Multiple Diffserv Domains Ibrahim Khalil and Torsten Braun Computer Networks and Distributed Systems (RVS) Institute

More information

Domain Based Approach for QoS Provisioning in Mobile IP

Domain Based Approach for QoS Provisioning in Mobile IP Domain Based Approach for QoS Provisioning in Mobile IP Ki-Il Kim and Sang-Ha Kim Department of Computer Science 220 Gung-dong,Yuseong-gu, Chungnam National University, Deajeon 305-764, Korea {kikim, shkim}@cclab.cnu.ac.kr

More information

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d)

Problems with IntServ. EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) DiffServ (cont d) Problems with IntServ EECS 122: Introduction to Computer Networks Differentiated Services (DiffServ) Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Internet Engineering Task Force (IETF) December 2014

Internet Engineering Task Force (IETF) December 2014 Internet Engineering Task Force (IETF) Request for Comments: 7417 Category: Experimental ISSN: 2070-1721 G. Karagiannis Huawei Technologies A. Bhargava Cisco Systems, Inc. December 2014 Extensions to Generic

More information

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model

Principles. IP QoS DiffServ. Agenda. Principles. L74 - IP QoS Differentiated Services Model. L74 - IP QoS Differentiated Services Model Principles IP QoS DiffServ Differentiated Services Architecture DSCP, CAR Integrated Services Model does not scale well flow based traffic overhead (RSVP messages) routers must maintain state information

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

Entity. Collection. Object. List. query reply request reply commit reply. cancel reply. has (a) or an ObjectCollection.

Entity. Collection. Object. List. query reply request reply commit reply. cancel reply. has (a) or an ObjectCollection. Video Streaming in a DiffServ/IP Multicast Network Roland Balmer, Torsten Braun, and Manuel Günter Institute of Computer Science and Applied Mathematics University of Bern Neubrückstrasse 10 CH-3012 Bern

More information

RSVP Petri Jäppilä Nokia Telecommunications P.O Box Nokia Group, Finland

RSVP Petri Jäppilä Nokia Telecommunications P.O Box Nokia Group, Finland RSVP Petri Jäppilä Nokia Telecommunications P.O Box 330 0004 Nokia Group, Finland Email: petri.jappila@nokia.com Abstract Resource ReSerVation Protocol, RSVP, is a protocol to provide resources reservation,

More information

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class

Network Layer. Goals of This Lecture. Internet Reference Model. Outline of the Class Goals of This Lecture Network Layer Kuang Chiu Huang TCM NCKU Through the lecture and in-class discussion, students are enabled to describe role and functions of the network layer, and compare different

More information

IP Differentiated Services

IP Differentiated Services Course of Multimedia Internet (Sub-course Reti Internet Multimediali ), AA 2010-2011 Prof. 7. IP Diffserv introduction Pag. 1 IP Differentiated Services Providing differentiated services in IP networks

More information

Implementation of Differentiated Services over ATM

Implementation of Differentiated Services over ATM Implementation of Differentiated s over ATM Torsten Braun, Arik Dasen, and Matthias Scheidegger; Institute of Computer Science and Applied Mathematics, University of Berne, Switzerland Karl Jonas and Heinrich

More information

Differentiated Services - Panacea of Networking?

Differentiated Services - Panacea of Networking? Differentiated Services - Panacea of Networking? Kalevi Kilkki Principal Scientist, Nokia Docent, HUT NOKIA DiffServ / December 1999 / KKi page: 1/34 Panacea pan a ce a (p²n -s ) n. A remedy for all diseases,

More information

Page 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service.

Page 1. Quality of Service. CS 268: Lecture 13. QoS: DiffServ and IntServ. Three Relevant Factors. Providing Better Service. Quality of Service CS 268: Lecture 3 QoS: DiffServ and IntServ Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Protecting Network Quality of Service Against Denial of Service Attacks

Protecting Network Quality of Service Against Denial of Service Attacks Protecting Network Quality of Service Against Denial of Service Attacks Douglas S. Reeves Peter Wurman NC State University S. Felix Wu U.C. Davis Dan Stevenson Xiaoyong Wu MCNC DARPA FTN PI Meeting January

More information

Lecture 13. Quality of Service II CM0256

Lecture 13. Quality of Service II CM0256 Lecture 13 Quality of Service II CM0256 Types of QoS Best Effort Services Integrated Services -- resource reservation network resources are assigned according to the application QoS request and subject

More information

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University

INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2. Roch H. Glitho- Ericsson/Concordia University INSE 7110 Winter 2009 Value Added Services Engineering in Next Generation Networks Week #2 1 Outline 1. Basics 2. Media Handling 3. Quality of Service (QoS) 2 Basics - Definitions - History - Standards.

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Quality of Service II

Quality of Service II Quality of Service II Patrick J. Stockreisser p.j.stockreisser@cs.cardiff.ac.uk Lecture Outline Common QoS Approaches Best Effort Integrated Services Differentiated Services Integrated Services Integrated

More information

Reaping the Benefits of Managed Services

Reaping the Benefits of Managed Services Figure 1. Converged Network with Managed Services These services complement each other when bundled together. For example, an IP VPN service makes managing an IP voice network simpler and more effective

More information

Domain Based Metering

Domain Based Metering Domain Based Metering Róbert Párhonyi 1 Bert-Jan van Beijnum 1 1 Faculty of Computer Science, University of Twente P.O. Box 217, 7500 AE Enschede, The Netherlands E-mail: {parhonyi, beijnum}@cs.utwente.nl

More information

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services

Quality of Service (QoS) Computer network and QoS ATM. QoS parameters. QoS ATM QoS implementations Integrated Services Differentiated Services 1 Computer network and QoS QoS ATM QoS implementations Integrated Services Differentiated Services Quality of Service (QoS) The data transfer requirements are defined with different QoS parameters + e.g.,

More information

A Flow Label Based QoS Scheme for End-to-End Mobile Services

A Flow Label Based QoS Scheme for End-to-End Mobile Services A Flow Label Based QoS Scheme for End-to-End Mobile Services Tao Zheng, Lan Wang, Daqing Gu Orange Labs Beijing France Telecom Group Beijing, China e-mail: {tao.zheng; lan.wang; daqing.gu}@orange.com Abstract

More information

Basics (cont.) Characteristics of data communication technologies OSI-Model

Basics (cont.) Characteristics of data communication technologies OSI-Model 48 Basics (cont.) Characteristics of data communication technologies OSI-Model Topologies Packet switching / Circuit switching Medium Access Control (MAC) mechanisms Coding Quality of Service (QoS) 49

More information

IPv6-based Beyond-3G Networking

IPv6-based Beyond-3G Networking IPv6-based Beyond-3G Networking Motorola Labs Abstract This paper highlights the technical issues in IPv6-based Beyond-3G networking as a means to enable a seamless mobile Internet beyond simply wireless

More information

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures

Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures Analysis of the interoperation of the Integrated Services and Differentiated Services Architectures M. Fabiano P.S. and M.A. R. Dantas Departamento da Ciência da Computação, Universidade de Brasília, 70.910-970

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Transaction Management for Sender/Receiver-Payment Schemes in Charging and Accounting Systems for Interconnected Networks

Transaction Management for Sender/Receiver-Payment Schemes in Charging and Accounting Systems for Interconnected Networks Transaction Management for Sender/Receiver-Payment Schemes in Charging and Accounting Systems for Interconnected Networks Junseok Hwang σ θ, Jörn Altmann φ κ, Ibrahim Okumus θ, Praveen Aravamudham θ σ

More information

BPP: A Protocol for Exchanging Pricing Information between Autonomous Systems

BPP: A Protocol for Exchanging Pricing Information between Autonomous Systems BPP: A Protocol for Exchanging Pricing Information between Autonomous Systems Vincent Oberle, Hartmut Ritter, Klaus Wehrle University of Karlsruhe Institute of Telematics Zirkel 2, D 76128 Karlsruhe, Germany

More information

RNAP: A Resource Negotiation and Pricing Protocol

RNAP: A Resource Negotiation and Pricing Protocol RNAP: A Resource Negotiation and Pricing Protocol Xin Wang, Henning Schulzrinne Dept. of Computer Science Columbia University 1214 Amsterdam Avenue New York, NY 10027 xwang@ctr.columbia.edu, schulzrinne@cs.columbia.edu

More information

Institute of Computer Technology - Vienna University of Technology. L73 - IP QoS Integrated Services Model. Integrated Services Model

Institute of Computer Technology - Vienna University of Technology. L73 - IP QoS Integrated Services Model. Integrated Services Model Integrated Services Model IP QoS IntServ Integrated Services Model Resource Reservation Protocol (RSVP) Agenda Integrated Services Principles Resource Reservation Protocol RSVP Message Formats RSVP in

More information

Admission Control over DiffServ using Pre-Congestion Notification

Admission Control over DiffServ using Pre-Congestion Notification Admission Control over DiffServ using Pre-Congestion Notification Philip Eardley, Bob Briscoe, Dave Songhurst - BT Research Francois Le Faucheur, Anna Charny Cisco Kwok-Ho Chan, Joe Babiarz - Nortel IETF-64

More information

Design Intentions. IP QoS IntServ. Agenda. Design Intentions. L73 - IP QoS Integrated Services Model. L73 - IP QoS Integrated Services Model

Design Intentions. IP QoS IntServ. Agenda. Design Intentions. L73 - IP QoS Integrated Services Model. L73 - IP QoS Integrated Services Model Design Intentions Integrated Services Model IP QoS IntServ Integrated Services Model Resource Reservation Protocol (RSVP) The Internet was based on a best effort packet delivery service, but nowadays the

More information

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler

Advanced Lab in Computer Communications Meeting 6 QoS. Instructor: Tom Mahler Advanced Lab in Computer Communications Meeting 6 QoS Instructor: Tom Mahler Motivation Internet provides only single class of best-effort service. Some applications can be elastic. Tolerate delays and

More information

Internet Quality of Service: an Overview

Internet Quality of Service: an Overview Internet Quality of Service: an Overview W. Zhao and et al, Columbia University presented by 리준걸 2006.10.25 INC Lab, Seoul Nat l University Outline Introduce QoS framework IntServ DiffServ Detailed mechanism

More information

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time).

Real-Time Applications. Delay-adaptive: applications that can adjust their playback point (delay or advance over time). Real-Time Applications Tolerant: can tolerate occasional loss of data. Intolerant: cannot tolerate such losses. Delay-adaptive: applications that can adjust their playback point (delay or advance over

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

Internetworking with Different QoS Mechanism Environments

Internetworking with Different QoS Mechanism Environments Internetworking with Different QoS Mechanism Environments ERICA BUSSIKI FIGUEIREDO, PAULO ROBERTO GUARDIEIRO Laboratory of Computer Networks, Faculty of Electrical Engineering Federal University of Uberlândia

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Pricing QoS in Campus Networks

Pricing QoS in Campus Networks Session: ENT 102-065 Pricing QoS in Campus Networks Nazli Mollah, Marcos S. Pinto Melville University, City Tech, CUNY Abstract Campus Quality of Service (QoS) concerns the transformation of current campuses

More information

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER

Routing Basics. What is Routing? Routing Components. Path Determination CHAPTER CHAPTER 5 Routing Basics This chapter introduces the underlying concepts widely used in routing protocols Topics summarized here include routing protocol components and algorithms In addition, the role

More information

Lecture 14: Performance Architecture

Lecture 14: Performance Architecture Lecture 14: Performance Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 14-1 Background Performance: levels for capacity, delay, and RMA. Performance

More information

Call Admission Control in IP networks with QoS support

Call Admission Control in IP networks with QoS support Call Admission Control in IP networks with QoS support Susana Sargento, Rui Valadas and Edward Knightly Instituto de Telecomunicações, Universidade de Aveiro, P-3810 Aveiro, Portugal ECE Department, Rice

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Introduction: With the rapid growth of the Internet, customers are demanding multimedia applications such as telephony and video on demand, to be available

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2002 Lecture 10: Quality of Service Stefan Savage Today s class: Quality of Service What s wrong with Best Effort service? What kinds of service do applications

More information

In the world of networks, control techniques

In the world of networks, control techniques NEM470 12/23/02 7:09 PM Page 1 INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2003; 13: 000 000 (DOI: 10.1002/nem.470) Resource allocation in the new fixed and mobile Internet generation

More information

Types of Network Support for Service Quality p. 62 Capacity reservation p. 64 Differentiated treatment p. 65 Differentiation of service quality

Types of Network Support for Service Quality p. 62 Capacity reservation p. 64 Differentiated treatment p. 65 Differentiation of service quality Preface p. xi Acknowledgements p. xv List of Figures p. xvii List of Tables p. xxi Abbreviations p. xxiii Drivers for the Adoption of Multi-service Networks p. 1 Customer Perspective p. 2 Network Operator

More information

On Network Dimensioning Approach for the Internet

On Network Dimensioning Approach for the Internet On Dimensioning Approach for the Internet Masayuki Murata ed Environment Division Cybermedia Center, (also, Graduate School of Engineering Science, ) e-mail: murata@ics.es.osaka-u.ac.jp http://www-ana.ics.es.osaka-u.ac.jp/

More information

Trafffic Engineering 2015/16 1

Trafffic Engineering 2015/16 1 Traffic Engineering 2015/2016 Traffic Engineering: from ATM to MPLS fernando.silva@tecnico.ulisboa.pt Instituto Superior Técnico Trafffic Engineering 2015/16 1 Outline Traffic Engineering revisited Traffic

More information

Quality of Service in Ultrabroadband models

Quality of Service in Ultrabroadband models Quality of Service in Ultrabroadband models Elias Aravantinos ICT Consultant, CITI Managing Director, Exelixisnet earavantinos@exelixisnet.com April 4, 2008 TELECOM ParisTech Contents 1 2 3 4 UBB & QoS

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Multimedia Networking. Network Support for Multimedia Applications

Multimedia Networking. Network Support for Multimedia Applications Multimedia Networking Network Support for Multimedia Applications Protocols for Real Time Interactive Applications Differentiated Services (DiffServ) Per Connection Quality of Services Guarantees (IntServ)

More information

Comparative Performance Analysis of RSVP and RMD

Comparative Performance Analysis of RSVP and RMD Comparative Performance Analysis of RSVP and RMD András Császár and Attila Takács HSNLab, Budapest University of Technology and Economics TrafficLab, Ericsson Telecommunication Hungary 2003.09.19. 1 Outline

More information

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000

Network Working Group Request for Comments: 2996 Category: Standards Track November 2000 Network Working Group Y. Bernet Request for Comments: 2996 Microsoft Category: Standards Track November 2000 Status of this Memo Format of the RSVP DCLASS Object This document specifies an Internet standards

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application Table of Contents L2TP Configuration 1 L2TP Overview 1 Introduction 1 Typical L2TP Networking Application 1 Basic Concepts of L2TP 2 L2TP Tunneling Modes and Tunnel Establishment Process 4 L2TP Features

More information

Internet QoS : A Big Picture

Internet QoS : A Big Picture Internet QoS : A Big Picture Xipeng Xiao and Lionel M. Ni, M, Michigan State University IEEE Network, March/April 1999 Oct 25, 2006 Jaekyu Cho Outline Introduction IntServ/RSVP DiffServ MPLS Traffic Engineering/CBR

More information

11:1 Anonymous Internet Access Method for Wireless Systems

11:1 Anonymous Internet Access Method for Wireless Systems 11:1 Anonymous Internet Access Method for Wireless Systems Petri Jokela Juha-Petri Kärnä NomadicLab, Ericsson Research FIN-02420 Jorvas Finland {petri.jokela, juha-petri.karna}@ericsson.com 1 Introduction

More information

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo.

QoS in IPv6. Madrid Global IPv6 Summit 2002 March Alberto López Toledo. QoS in IPv6 Madrid Global IPv6 Summit 2002 March 2002 Alberto López Toledo alberto@dit.upm.es, alberto@dif.um.es Madrid Global IPv6 Summit What is Quality of Service? Quality: reliable delivery of data

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang

A Flexible Model for Resource Management in Virtual Private Networks. Presenter: Huang, Rigao Kang, Yuefang A Flexible Model for Resource Management in Virtual Private Networks Presenter: Huang, Rigao Kang, Yuefang Overview Introduction of VPN Hose model Implementation scenarios Simulation experiments Simulation

More information

EE 122: Differentiated Services

EE 122: Differentiated Services What is the Problem? EE 122: Differentiated Services Ion Stoica Nov 18, 2002 Goal: provide support for wide variety of applications: - Interactive TV, IP telephony, on-line gamming (distributed simulations),

More information

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements

Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Resilience-Differentiated QoS Extensions to RSVP and DiffServ to Signal End-to-End IP Resilience Requirements Achim Autenrieth (1) *, Andreas Kirstädter (2) (1) Munich University of Technology Institute

More information

QoS Requirements and Implementation for IMS Network

QoS Requirements and Implementation for IMS Network QoS Requirements and Implementation for IMS Network Manish Kumar Rana, Hemant Narayan Abstract: The issue of converged networks is to ensure the sufficient quality of services for entire duration of communication

More information

Presented by: B. Dasarathy OMG Real-Time and Embedded Systems Workshop, Reston, VA, July 2004

Presented by: B. Dasarathy OMG Real-Time and Embedded Systems Workshop, Reston, VA, July 2004 * This work is supported by DARPA Contract NBCH-C-03-0132. Network QoS Assurance through Admission Control* by B. Coan, B. Dasarathy, S. Gadgil, K. Parmeswaran, I. Sebuktekin and R. Vaidyanathan, Telcordia

More information

Multi-Protocol Label Switching

Multi-Protocol Label Switching Rheinisch-Westfälische Technische Hochschule Aachen Lehrstuhl für Informatik IV Prof. Dr. rer. nat. Otto Spaniol Multi-Protocol Label Switching Seminar: Datenkommunikation und Verteilte Systeme SS 2003

More information

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Internet protocol aspects Transport

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Internet protocol aspects Transport International Telecommunication Union ITU-T Y.1315 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (09/2006) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Networking Issues in LAN Telephony. Brian Yang

Networking Issues in LAN Telephony. Brian Yang Networking Issues in LAN Telephony Brian Yang 5-3-00 Topics Some background Flow Based QoS Class Based QoS and popular algorithms Strict Priority (SP) Round-Robin (RR), Weighted Round Robin (WRR) and Weighted

More information

Cost-based Pricing for Multicast Streaming Services

Cost-based Pricing for Multicast Streaming Services Cost-based Pricing for Multicast Streaming Services Eiji TAKAHASHI, Takaaki OHARA, Takumi MIYOSHI,, and Yoshiaki TANAKA Global Information and Telecommunication Institute, Waseda Unviersity 29-7 Bldg.,

More information

1 Energy Efficient Protocols in Self-Aware Networks

1 Energy Efficient Protocols in Self-Aware Networks Energy Efficient Protocols in Self-Aware Networks Toktam Mahmoodi Centre for Telecommunications Research King s College London, London WC2R 2LS, UK Stanford NetSeminar 13 December 2011 1 Energy Efficient

More information

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM

Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Multicast OLSP Establishment Scheme in OVPN over IP/GMPLS over DWDM Jeong-Mi Kim 1, Oh-Han Kang 2, Jae-Il Jung 3, and Sung-Un Kim 1,4 1 Pukyong National University, 599-1 Daeyeon 3-Dong Nam-Gu, Busan,

More information

Networking: Network layer

Networking: Network layer control Networking: Network layer Comp Sci 3600 Security Outline control 1 2 control 3 4 5 Network layer control Outline control 1 2 control 3 4 5 Network layer purpose: control Role of the network layer

More information

Towards Service Differentiation on the Internet

Towards Service Differentiation on the Internet Towards Service Differentiation on the Internet from New Internet and Networking Technologies and Their Application on Computational Sciences, invited talk given at Ho Chi Minh City, Vietnam March 3-5,

More information

Quality of service for mobile ad hoc networks

Quality of service for mobile ad hoc networks Research Collection Master Thesis Quality of service for mobile ad hoc networks Author(s): Stuedi, Patrick Publication Date: 2003 Permanent Link: https://doi.org/10.3929/ethz-a-004585160 Rights / License:

More information

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017

Integrated and Differentiated Services. Christos Papadopoulos. CSU CS557, Fall 2017 Integrated and Differentiated Services Christos Papadopoulos (Remixed by Lorenzo De Carli) CSU CS557, Fall 2017 1 Preliminary concepts: token buffer 2 Characterizing Traffic: Token Bucket Filter Parsimonious

More information

General comments on candidates' performance

General comments on candidates' performance BCS THE CHARTERED INSTITUTE FOR IT BCS Higher Education Qualifications BCS Level 5 Diploma in IT March 2016 Sitting EXAMINERS' REPORT Computer Networks General comments on candidates' performance The pass

More information

GPRS billing: getting ready for UMTS

GPRS billing: getting ready for UMTS GPRS billing: getting ready for UMTS In his first article about UMTS, Lucas Baugé looks into the key challenges of GPRS billing. He seeks to show how solving these challenges will help operators succeed

More information

Resource reservation in a connectionless network

Resource reservation in a connectionless network 13 Resource reservation in a connectionless network A. Eriksson Ericsson Telecom Dialoggatan 1, S-126 25 Stockholm, Sweden phone: +46-8-719 2253, fax: +46-8-7196677 e-mail: etxaeon@kk.etx.ericsson.se Abstract

More information

Open ContEnt Aware Networks

Open ContEnt Aware Networks Open ContEnt Aware Networks Nathalie Amann, Yann Levené Orange Labs Workshop "Optimization of Network Resources for Content Access and Delivery September 6 th, 2012 www.ict-ocean.eu V.2004-10-01 Agenda

More information