SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988

Size: px
Start display at page:

Download "SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988"

Transcription

1 SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS BY IAN RAMSAY PHILP B.S., University of North Carolina at Chapel Hill, 1988 M.S., University of Florida, 1990 THESIS Submitted in partial fulllment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 1997 Urbana, Illinois

2 ccopyright by IAN RAMSAY PHILP 1997

3 SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS Ian Ramsay Philp, Ph.D. Department of Computer Science University of Illinois at Urbana-Champaign, 1997 Jane W.S. Liu, Advisor In a real-time network, it is not practical to have one centralized scheduler manage all the network resources, e.g., the transmission links and buer space. Instead, each node has its own scheduler which manages the various resources at that node. In an ideal case, the schedulers are completely independent, and the well-known scheduling and analysis techniques developed for single-node systems can be used, thus greatly simplifying the real-time network design. However the use of independent schedulers may lead to buer overruns or missed deadlines and hence, network failure. This thesis addresses the problems that arise in scheduling realtime messages in a packet-switched network that has multiple schedulers and has limited buer space. In our development of the schedulers and the mechanisms for synchronization between the schedulers, we address the following issues: the complexity of the scheduler, the complexity of the synchronization mechanism, the scheme for admission control, the achievable utilization of the network, the ability of the scheduler to meet diverse real-time requests, and the robustness of the scheduler under unpredictable conditions such as temporary overload. iii

4 Table of Contents Chapter 1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Motivation : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Problems Addressed : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Organization of the Thesis : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 7 2 The Real-Time Packet Switching Problem : : : : : : : : : : : : : : : : : : : : Network Architecture : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Hard vs. Soft Real-Time Trac : : : : : : : : : : : : : : : : : : : : : : : : : : : : Message Models : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Admission Control : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Scheduler Implementation Issues : : : : : : : : : : : : : : : : : : : : : : : : : : : 15 3 Related Work : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Trac Models : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Scheduling Algorithms for Switches with Buers : : : : : : : : : : : : : : : : : : Scheduling Sporadic and Aperiodic Messages : : : : : : : : : : : : : : : : : : : : Scheduling Soft-Real-Time VBR Messages : : : : : : : : : : : : : : : : : : : : : : Scheduling Messages Through a Buerless Switch : : : : : : : : : : : : : : : : : : 27 4 Scheduling Hard-Real-Time Periodic Messages : : : : : : : : : : : : : : : : : Weighted-Round-Robin Scheduling : : : : : : : : : : : : : : : : : : : : : : : : : : Budgeted-Weighted-Round-Robin Scheduling : : : : : : : : : : : : : : : : : : : : Performance : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Summary : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 42 5 Scheduling Sporadic and Aperiodic Messages : : : : : : : : : : : : : : : : : : Background Scheduling : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Slot Swapping : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Summary : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 49 6 Scheduling Soft-Real-Time Periodic Messages : : : : : : : : : : : : : : : : : : Scheduling, Trac Shaping, and Packet-Dropping Algorithms : : : : : : : : : : : Scheduling Algorithms : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Trac Shaping : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Packet-Dropping Algorithms : : : : : : : : : : : : : : : : : : : : : : : : : 55 iv

5 6.2 Simulation Results for a Single Hop : : : : : : : : : : : : : : : : : : : : : : : : : Scheduling Algorithms : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Trac Shaping : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Packet-Dropping Algorithms : : : : : : : : : : : : : : : : : : : : : : : : : Simulation Results for Multiple Hops : : : : : : : : : : : : : : : : : : : : : : : : : Summary : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 67 7 Scheduling Periodic Messages Through Buerless Switches : : : : : : : : : Slot Assignment Algorithms : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Simulation Results : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Extensions to the Single-Pass Algorithms : : : : : : : : : : : : : : : : : : : : : : Single Swapping : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Allowing Buers : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Relaxing the Deadline : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Distribution of Periods : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Summary : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 84 8 Conclusion : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 86 Bibliography : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 90 Vita : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 95 v

6 List of Tables 3.1 Real-time scheduling algorithms. : : : : : : : : : : : : : : : : : : : : : : : : : : : Packet delay and buer requirements. : : : : : : : : : : : : : : : : : : : : : : : : U act with C = 100. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : U act with C = 1; 000. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : U act with C = 10; 000. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Completion time of sporadic message with wf 4 ree = 1. : : : : : : : : : : : : : : : : Response time distribution for FCFS, TT, WRR, and BWRR. : : : : : : : : : : Probability of generating a nonfeasible schedule from the aggregate density function. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Buer space required using packet-spreading technique. : : : : : : : : : : : : : : (1; k) failure rates for dierent values of k. : : : : : : : : : : : : : : : : : : : : : : 64 vi

7 List of Figures 1.1 Packet interarrival time at hop 2 is less than 10 ms. : : : : : : : : : : : : : : : : General network architecture. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : An example switch schedule. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Rate-Controlled Static-Priority Queuing. : : : : : : : : : : : : : : : : : : : : : : : Example showing selection of SDR. : : : : : : : : : : : : : : : : : : : : : : : : : : The completion time of the k-th group at the l-th hop depends on the completion time of the k-th group at the (l-1)-th hop and the completion time of the (k-1)-th group at the l-th hop. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Pseudocode for the BWRR scheduler. : : : : : : : : : : : : : : : : : : : : : : : : Replenishing the budget in the BWRR algorithm. : : : : : : : : : : : : : : : : : Worst-case phase and ideal phase for buer usage. : : : : : : : : : : : : : : : : : Spreading packet arrivals to reduce buer requirements. : : : : : : : : : : : : : : Probability density function for c i (a) and (b). Aggregate density function for 20 streams (c). : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Comparison of WRR (a) and FCFS (b) algorithms. : : : : : : : : : : : : : : : : : Achievable utilization with P(failure) 10?3. : : : : : : : : : : : : : : : : : : : : Multihop network topology. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Response times for spread and continuous packet arrivals. : : : : : : : : : : : : : Response times for dierent spread factors. : : : : : : : : : : : : : : : : : : : : : Example MP-TSA schedule. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Success rates for dierent schedule lengths, N = 4, U = 0:95. : : : : : : : : : : : Success rates for dierent switch dimensions, L = 30, U = 0:95. : : : : : : : : : : Success rates for average link utilization, N = 4, L = 30. : : : : : : : : : : : : : : Example of single swapping. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : Schedule where single swapping cannot remove conict. : : : : : : : : : : : : : : Success rates for MLF-SDR plus single swapping, N = 4, L = 30. : : : : : : : : : Success rates for switches with buers, U = 0:85, L = 30. : : : : : : : : : : : : : Success rates with relaxed deadline, U = 0:85, L = 30. : : : : : : : : : : : : : : : Success rates with relaxed deadline, N = 8, U = 0:85. : : : : : : : : : : : : : : : Success rates for dierent distributions of the period, N = 8, U = 0:85, L = vii

8 Chapter 1 Introduction Proper functioning of a real-time network requires not only that the real-time messages be delivered reliably to their destinations but also that the messages be delivered by specied times called the deadlines. In a real-time network, it is not practical to have one centralized scheduler manage all the network resources, e.g., the transmission links and buer space. Instead, each node in the network has its own scheduler that manages the resources at that node. The schedulers at each node make decisions about which packets to schedule on the transmission links and how to manage the buer space so that each real-time message is delivered by its deadline to its destination. 1.1 Motivation Ideally, from the points of view of scalability and simplicity, the schedulers at each node operate independently. However, sometimes this may not be possible. Non-real-time issues such as congestion control, which typically requires interaction among schedulers, must also be handled by a real-time network. In addition, certain timing issues requiring clock synchronization or other scheduler interaction may arise. A common approach for scheduling real-time messages is to assign intermediate deadlines to the messages in such a way that if each message meets its intermediate deadlines at the nodes along its way to the destination, it also meets its end-to-end deadline. Ideally, in this approach, once a message's intermediate deadlines have been assigned, the techniques that have been developed for single node systems can be used to schedule message transmissions and perform 1

9 the necessary schedulability analysis. This approach can greatly simplify the design of a realtime network. Unfortunately, the use of independent schedulers may lead to buer overruns or missed deadlines and hence, network failure. This fact is illustrated in the following two examples. The rst example shows how a network failure may occur in a multihop packet-switched network due to lack of buer space. Suppose that the network has two hops and each hop guarantees a relative deadline of 10 ms for the transmission of 20 packets of a particular message stream. If the rst hop is lightly loaded, it may transmit the packets immediately upon arrival. But if the second hop is heavily loaded, the packets may not be transmitted until their deadlines. Even if the average rate of packet transmission at the rst hop is 2,000 packets per second, the number of packets transmitted in a shorter interval may be higher. For example, the rst hop may transmit 2,000 packets in the rst 10 ms and then transmit no packets for 990 ms. If this happens and the second hop only transmits 20 packets every 10 ms, a queue of packets will build up in the second hop, and it may eventually run out of buer space resulting in lost packets and missed deadlines. The second example involves static-priority (SP) scheduling, a well-known scheduling technique in real-time systems, and shows how a failure may occur even if the short-term rate at which packets are transmitted is controlled. As in the rst example, we assume a multihop packet-switched network. In SP scheduling, each message stream declares its period and the maximum number of packets produced in each period. All packets belonging to that message stream are assigned the same xed priority, and at each node the scheduler always transmits the ready packet with the highest priority. The admission-control phase guarantees that if all message streams adhere to their contracted parameters, all messages will be transmitted by their deadlines. However, if a higher priority stream produces more packets than its declared maximum or if the period is shorter than what it declared, lower priority packets may be aected and miss their deadlines. Figure 1.1 shows an example of what can go wrong if independent schedulers are used in a two-hop network. The gure shows the times of packet transmissions at Hop 1. At Hop 1, 20 packets arrive at time 0, and 20 more packets arrive at time 10, i.e., the interarrival time of the two groups of 20 packets is 10 ms. The admission-control process and the SP scheduler guarantee that both groups of packets will be transmitted within 10 ms of their arrival times. However, suppose the rst group of packets is not transmitted until time 10 2

10 Hop time Figure 1.1: Packet interarrival time at hop 2 is less than 10 ms. and that the second group is transmitted by time 15. The interarrival time of the two groups of packets at the second hop is only 5 ms; therefore, lower priority packets at the second hop may miss their deadlines. As we showed in the preceding examples, it is not always possible to have completely independent schedulers. On the other hand, it is desirable to have the schedulers be as independent as possible. Interaction among schedulers such as clock synchronization or explicit message passing schemes that keep track of distributed state complicates the system design and takes up network bandwidth which could otherwise be used for transmitting application messages. 1.2 Problems Addressed This thesis addresses the problem of scheduling real-time messages in a packet-switched network that has multiple schedulers and limited buer space. In our development of the schedulers and the mechanisms for synchronization between the schedulers, we are concerned with the following issues: the complexity of the scheduler, the complexity of the synchronization mechanism, the scheme for admission control, the achievable utilization of the network, the ability of the scheduler to handle diverse real-time requirements, and the robustness of the scheduler under transient overload. The specic problems we address vary along three dimensions: the switch architecture, the types of deadline of the messages, and the message model. We consider two types of switch architecture: one in which the switches have nonzero but nite buer space and the other in which the switches have no buers. We consider both hard and soft deadlines. When a message has a hard deadline, the network must guarantee that all packets in the message are delivered to the destination at or before the deadline. In order to meet this hard deadline, an admission step must be performed before the message is allowed to enter the network, with worst-case 3

11 assumptions made on the number of packets generated. When a message has a soft deadline, it is permissible to occasionally miss a deadline or even to drop a small number of packets. we consider three types of message models: periodic messages in which packets arrive at regular intervals, sporadic messages which arrive at irregular intervals, and aperiodic messages which arrive at irregular intervals and do not have deadlines. Scheduling Hard-Real-Time Periodic Messages The rst problem we addressed is that of scheduling hard-real-time periodic messages in a multihop packet-switched network with nite buer space at each hop. For this problem, we developed the budgeted-weighted-round-robin (BWRR) algorithm. The BWRR algorithm is a modication of the weighted-round-robin (WRR) [29, 10, 23] algorithm which cycles through the message streams transmitting a limited number of packets from each stream, thus guaranteeing each stream a minimum fraction of the transmission bandwidth. The WRR algorithm allows the actual transmission rate to exceed the minimum rate, which, as we shall see, increases jitter and the required buer space. Like the WRR algorithm, the BWRR algorithm ensures a minimum transmission rate, but it also ensures that the maximum transmission rate of each message stream does not exceed its allocated rate. In this way, the BWRR algorithm signicantly reduces the jitter in message delivery and the buer space requirement per message stream. The BWRR algorithm has the advantages of the WRR algorithm: it has a simple hardware implementation; the admission test for determining whether a new message stream is schedulable is simple; it does not require a global clock or any explicit ow control messages; it can achieve high utilization of the network under most practical scenarios; and it reacts predictably under transient overloads. In addition, with the BWRR algorithm, the necessary buer space is predictable and can be xed at system conguration time. Scheduling Sporadic and Aperiodic Messages The second problem we addressed is that of scheduling sporadic and aperiodic messages along with the hard-real-time periodic messages in networks with nite-buer switches. Specically, we show how to integrate the scheduling of sporadic and aperiodic messages in a network where the periodic messages are scheduled according to the BWRR algorithm. For this problem, we developed two solutions. The rst, called background scheduling, simply uses the bandwidth 4

12 not used by the periodic messages for the transmission of sporadic and aperiodic messages, We show that by choosing to allocate at each hop the minimum available bandwidth among all hops along the path of a sporadic or aperiodic message, the minimum delay bound and buer space requirement are attained. By allocating more than this minimum bandwidth at the hops where more bandwidth is available, more buer space is required, but the delay bound is not improved. The second solution, called slot swapping, is able to achieve lower delay than the background scheduling solution, but its admission test and scheduler implementation are much more complex, making a high-speed implementation more dicult. Scheduling Soft-Real-Time Periodic Messages The third problem we addressed is that of scheduling soft-real-time periodic messages in networks with nite-buer switches. One way to schedule soft-real-time trac is to use one of the algorithms developed for hard-real-time trac and perform admission control based on the peak trac rate. However, soft-real-time trac frequently has a variable-bit-rate (VBR), with a peak rate many times higher than the average rate. Thus, in order to achieve a higher network utilization it is desirable to admit soft-real-time trac at a rate closer to its average rate and to handle overload conditions gracefully. We show that the hard-real-time algorithms perform quite poorly for soft-real-time trac admitted at less than the peak rate and that the rst-come-rst-serve (FCFS) algorithm performs best among all the evaluated algorithms. To gracefully handle buer overow, we developed a (1; k) fair packet dropping algorithm The (1; k) dropping algorithm tries to drop no more than one packet in any sequence of k packets from any stream. We show that although the (1; k) dropping algorithm does improve network performance, the same eect can be achieved by slightly lowering the network utilization and using the simple last-in-rst-discard (LIFD) dropping algorithm. Finally, we show that buer space requirements can be minimized by spreading the packet arrivals to the rst switch in the network over the period of the stream. Because we use a FCFS scheduler, reducing buer space at a hop also means reducing delay at that hop. We use this fact to show that by increasing delay outside the network, i.e., by spreading the packet arrivals to the rst switch, the delay inside the network decreases enough to result in lower total end-to-end delay. 5

13 Scheduling Periodic Messages Through Buerless Switches The nal problem we addressed is scheduling periodic real-time messages through buerless switches. For this problem, we assume that when a packet is transmitted through a switch, the switch maintains a physical connection between the appropriate input and output links for the duration of the packet transmission. When two or more packets arrive on dierent input links destined for the same output link a conict occurs and at most one of the packets is successfully transmitted. In order to prevent conicts, tight synchronization is needed between not only the switch and the sending processors but also between the sending processors themselves. In this problem, which we call the the multiple-period time slot assignment (MP-TSA) problem, messages are assigned time slots in which they are transmitted. The problem is to nd a set of time slot assignments that yields a conict-free schedule in which all messages are transmitted by their deadlines. Such a schedule is called a conict-free feasible schedule. In order to determine whether a conict-free feasible schedule of the switch exists for a set of periodic messages with arbitrary periods, we implemented a search program which exhaustively searches for all possible feasible schedules. We randomly generated over 10 5 message sets that had input and output link utilizations less than or equal to 1.0 and found a conict-free schedule for every set. Because the number of possible schedules grows enormously as the switch dimension and schedule length grow larger, performing an exhaustive search in order to nd a conict-free schedule is impractical. This motivated us to look for more ecient algorithms to solve the MP-TSA problem. We have designed four basic heuristic algorithms which make a single pass through the length of the schedule for this purpose. They are based on the earliestdeadline-rst (EDF), minimum-laxity-rst (MLF), and system of distinct representatives (SDR) algorithms. The success rate of an algorithm is the percentage of the time the algorithm nds a conict-free schedule when one exists. We evaluated the success rates of our heuristic algorithms through simulation and found that algorithms based on the MLF algorithm outperform those based on the EDF algorithm and that the algorithms based on the SDR algorithm outperform simpler extensions of the EDF and MLF algorithms. Even the best of our single-pass heuristic algorithms performs quite poorly as the size of the scheduling problem increases. We were thus motivated to nd better algorithms. We developed a more complex algorithm, called MLF with single swapping (MLF-SS), which makes multiple 6

14 passes over the length of the schedule. Although this algorithm performs better than any of the single-pass algorithms, it too suers from poor performance as the size of the problem increases. We then considered two extensions to the MP-TSA problem. In the rst we allowed a small number of buers in the switch. In the second, we extended the message deadlines by one time slot. In both cases, the success rate of our MLF-SS algorithm is signicantly better than when no buers are used and when the deadline is not extended. 1.3 Organization of the Thesis The rest of the thesis is organized as follows. Chapter 2 presents the real-time message switching problem. It presents the network architecture used in the thesis as well as the concept of hard and soft-real-time messages. It introduces the periodic, sporadic and aperiodic message models and discusses many admission control and scheduler implementation issues we are concerned with in designing a network for transmitting real-time messages. Chapter 3 discusses related work. It presents four trac models that have been used to describe real-time trac, including the periodic model used in the thesis. It also presents several algorithms that have been designed for scheduling real-time messages in a multihop packet-switched network. We classify these algorithms into two groups: priority-based and rate-based and discuss the advantages and disadvantages of each. This chapter also presents work related to the scheduling of sporadic and aperiodic messages and related work that is specic to the problem of scheduling soft-real-time trac and dealing with buer overow. It also discusses work related to the buerless switch scheduling problem. Chapter 4 addresses the problem of scheduling hard-real-time periodic messages in a multihop packet-switched network with limited buer space. It presents the BWRR scheduling algorithm and discusses the complexity of the scheduler and the admission-control procedure. This chapter also presents bounds for the end-to-end delay and the per message stream buer space requirement and discusses the achievable utilization of the network. Chapter 5 addresses the problem of scheduling sporadic and aperiodic messages along with the hard-real-time periodic messages discussed in Chapter 4. It presents the background scheduling and slot swapping solutions to this problem. 7

15 Chapter 6 addresses the problem of scheduling soft-real-time VBR trac. This chapter examines the applicability of the hard-real-time scheduling algorithms to the problem and discusses fair handling of overload conditions. It also shows how lower deadlines and jitter can be achieved by careful trac shaping. Chapter 7 addresses the problem of switching periodic messages through buerless switches. It discusses the achievable utilization of the network and the complexity of nding a schedule that transmits all messages by their deadlines. Chapter 8 concludes the thesis with a summary of our results. 8

16 Chapter 2 The Real-Time Packet Switching Problem In this chapter, we rst present the network architecture assumed in the thesis. Next, we present the concept of hard and soft-real-time messages. We then present the periodic, sporadic and aperiodic message models. We are also concerned with many admission control and scheduler implementation issues in designing a real-time network. This chapter also discusses these issues. 2.1 Network Architecture In this thesis, we are concerned with packet-switched networks. Messages submitted to such a network for transmission are rst broken up into packets. A message is completely transmitted when its last packet is received at the destination. Throughout the thesis, we assume that the packets have xed size. The use of xed size packets greatly simplies the design of the switch, resulting in less expensive and faster equipment. The components of these networks are switches. We assume that the switches are nonblocking, i.e., that a switch can route any incoming packet to the appropriate output link without conict. Packets from dierent input links destined for dierent output links do not interere with each other, and thus, the only possible queuing delay occurs at the output links. Figure 2.1b shows a general network whose components are switches (Figure 2.1a). A message is sent from switch S1, which is the source, to switch S5, which is the destination. 9

17 S4 S2 nxn src S1 S5 dst S3 S6 (a) (b) Figure 2.1: General network architecture. With this network model, the delay a message experiences when transmitted from one switch to another switch consists of the following three parts. 1. The queuing delay is the amount of time that a packet is blocked at the output link of a switch. This delay results from the fact that multiple packets may arrive at a single output link at the same time and must therefore be buered. 2. The propagation delay is the time that a single bit takes to traverse a link between two switches. For any pair of switches, the propagation delay is constant and depends on the length of the link between the switches. 3. The transmission delay is the amount of time required to transmit a packet. Since packets are of constant length, the transmission delay is constant and depends on the packet length and the transmission rate. We will ignore the propagation delay in our analysis, keeping in mind that the true delay of a message includes this delay. Hereafter, we call each switch and the output link traversed by a message a hop. A message originates at some source switch S src. The message is broken up into xed size packets and is sent across a path of length L, measured in the number of hops, to its destination switch S dst where the message is nally reassembled. From the perspective of the message, each hop is a one way point-to-point connection between two switches shared by many other messages. The 10

18 C B D D A A B D C A B B D A A B C 4X4 C A C B C D D Figure 2.2: An example switch schedule. end-to-end delay of a message is the sum of the queuing delays and transmission delays along all L hops. As mentioned in Chapter 1, we are interested in two types of switches: switches with nonzero but nite buer space and switches with no buers. The two corresponding types of networks demand dierent solutions. In the former, when two or more packets arrive at the same time destined for the same output link, the packets are buered at the output link. The packets buered at the output link are then scheduled for transmission. In the latter, when a packet is to be sent through a switch, the switch must maintain a physical connection between the appropriate input and output links for the duration of the packet transmission. Exactly one packet can be routed through the switch to a particular output link at a time. If the network attempts to transmit two or more packets through a switch destined for the same output link at the same time, a conict occurs and at most one of the packets is successfully transmitted. In order to prevent conicts, the network must maintain some sort of synchronization between the switches in the network. Here, we assume that the network avoids conicts by maintaining a global clock and that the times for message transmission are predetermined so that no two packets destined for the same output link are sent at the same time. The problem, then, is to determine a schedule for the message transmissions. Figure 2.2 shows an example schedule for a 4 4 switch. Each slot on the input links is labeled with the letter of the output link on which the packet is to be transmitted. As can be seen in the gure, during each time slot one packet arrives on each of the four input links and one packet is transmitted on each of the four output links. There are no conicts in the schedule; therefore the switch is able to successfully transmit all the packets. 11

19 2.2 Hard vs. Soft Real-Time Trac We divide real-time trac into two types: hard-real-time and soft-real-time. Hard-real-time trac requires guarantees on the delivery and delivery time of all packets. In order to achieve a hard guarantee, a message stream must specify its worst-case packet generation rate to the network before the stream can be admitted. During the admission process, the network reserves bandwidth on the links and buer space in the switches required to meet the delivery rate and time guarantees. Once the stream is admitted, as long as the stream adheres to its declared parameters, all deadlines are guaranteed to be met. Soft-real-time trac, on the other hand, does not have hard requirements. It is preferable that the network meet the delay, jitter, and loss requirements, but it is usually permissible to slightly exceed these values. Even with soft-real-time trac, it is desirable to admit a message stream M i to the network only if its delay and loss requirements can be met and its admission does not cause messages from other streams already admitted by the network to exceed their delay and loss requirements. Admission of a message stream with soft-real-time requirements is usually done based on a rate that is close to its average rate, and the network must handle overload conditions gracefully. We choose as our measure for graceful handling of overload conditions the (1; k) failure rate. A failure to deliver a packet occurs when the packet arrives at its destination after its deadline or is dropped in the network because of the lack of buer space. A (1; k) failure is said to occur for a message stream when more than 1 out of any k consecutive packets fail to be delivered to the destination. Network performance is measured by the number of (1; k) failures. The (1; k) failure rate is the number of (1; k) failures divided by the total number of packets transmitted. For example, if k = 10 and the 11th, 30th, 40th, and 41st packets are dropped, the number of failures is 2. Since the rst 10 packets are delivered, the dropping of the 11th packet is not a failure. Also, since packets 20 through 29 are delivered, the dropping of the 30th packet is not a failure. However, when the 40th packet is dropped, only 9 consecutive packets have been received, so a failure occurs. The dropping of the 41st packet also counts as one failure. In our example, if the total number of packets transmitted is 100, the (1; k) failure rate is

20 2.3 Message Models In this section we introduce the periodic, sporadic, and aperiodic message models which we use in the thesis. The Periodic Message Model We assume here that periodic processes generate periodic real-time messages. A periodic process is characterized by three parameters: its period, its worst-case execution time, and its deadline. Since real-time periodic messages are generated by periodic processes, they too t the periodic model. Each periodic message stream M i consists of a periodic sequence of message instances. We call the j-th instance of message stream M i M i;j. When it is not necessary to distinguish between individual instances, we refer to both the message stream and its instances as M i. We characterize a periodic message stream M i by the tuple (c i ; p i ; d i ; j i ; k i ). Here, c i is a probability distribution from which the number of packets c i;j (i.e., the length) of a message instance M i;j is drawn. When c i is deterministic, i.e., each c i;j is the same, or when we are only interested in the maximum value of any c i;j, we will refer to the number of packets generated per period simply as c i. The second parameter, p i, is the minimum length of the interval between the arrivals of any two consecutive instances of M i. The third parameter, d i, is the maximum allowable end-to-end delay of every instance. The fourth parameter, j i, is the maximum allowable jitter. The fth parameter, k i, describes the allowable loss rate of the stream and will be described later. We call p i the period of M i and d i the relative end-to-end deadline, or simply deadline, of M i. In addition to a deadline constraint, each periodic message may also have a constraint on the allowable jitter. Many applications that generate periodic messages at periodically xed intervals of time expect the network to deliver successive message instances with interdelivery time close to the period of the messages. For example, video frames are generated with a period of 33 ms and must be displayed at that rate. Jitter is dened as the maximum dierence in message interarrival times from the stream period. We will subsequently refer to M i in various simpler forms by leaving out some of the above parameters in M i 's specication. For example, we are often interested in nding the achievable value of the end-to-end delay and the maximum jitter of each message stream when given the 13

21 lengths and periods of all the message streams in the network. Therefore, we usually leave out the deadline, jitter, and loss rate in the tuple and simply refer to M i by (c i ; p i ). Unless otherwise stated, we take our basic time unit to be the time required to transmit one packet and call this time a slot. Each packet is transmitted in one slot. The utilization of a periodic P message M i is U i = c i =p i. The utilization of an input or output link l of a switch is U(l) = i U i where the sum is over all messages M i that are sent across link l. We let U be the average utilization of all the input and output links of a particular switch. The Sporadic Message Model A sporadic real-time message is a hard-real-time message instance that may arrive at the source at any time instant. The worst-case transmission time c i and deadline d i of each sporadic message becomes known upon the arrival of the message. We therefore specify the sporadic message by the tuple (c i ; d i ). Upon arrival of a sporadic message, the network executes an acceptance test which determines whether or not the network can deliver the message to its destination by its deadline. If the message is accepted, the network must deliver it by its deadline. If the network cannot guarantee delivery of the message by the deadline, the message is rejected immediately. The goal of the network is to accept as many sporadic messages as possible. The Aperiodic Message Model An aperiodic message may arrive at the source at any time and does not have a hard deadline. An aperiodic message is specied by the single parameter (c i ). The network always accepts aperiodic messages with the goal of minimizing the average response time of the aperiodic messages. 2.4 Admission Control In order to receive real-time service from the network, a message stream must rst go through an admission control process in which the network determines whether it has the needed resources to meet the requirements of the message. For this purpose, the application declares to the network its trac characteristics which we mean specically here the parameters (i.e., period 14

22 and maximum length) and requirements (i.e., deadline, jitter, and loss rate) of each message to be transmitted by the application. Based on the parameters provided by the application, the network admission control process proceeds and decides whether the network has enough available resources to admit each message of the application into the network. Specically, a message stream M i is admitted to the network if and only if it can be scheduled on each hop so that its end-to-end delay is no more than its deadline and its admission does not cause messages from other streams to miss their deadlines. In addition, the admission control process must consider the available buer space within the network which is a scarce resource and must be managed carefully. For hard-real-time messages, the network must ensure that no packets are dropped due to lack of buer space. 2.5 Scheduler Implementation Issues Once a message is admitted to the network, the schedulers must manage the network resources so the guarantees made during the admission control process are met. The following issues need to be carefully addressed during system design. Scheduler Complexity At each hop, the scheduler decides which packet to transmit next on the output link. In a highspeed network, the complexity of the scheduler is critical because it is likely to be the bottleneck which determines the achievable transmission rate of the switch. While a simple scheduling algorithm such as rst-come-rst-serve (FCFS) is likely to achieve the highest transmission rate, it may not be able to provide hard-real-time guarantees. On the other hand, some of the complex scheduling algorithms that have been developed for real-time processor scheduling are likely to incur so much overhead that they unduly limit the achievable transmission rate. A compromise must be found between these two seemingly conicting goals. Buer Space For soft-real-time messages, it may not be practical from a utilization standpoint to guarantee that no soft-real-time packets will be dropped due to lack of buer space. Instead, it is 15

23 sometimes better to allow buer overows, with the switch being responsible for providing fair buer space usage. Complexity of Admission Control Depending on the scheduling algorithm being used, the time taken to determine whether or not a periodic stream will be admitted can vary widely. In a network with a large number of periodic messages entering and leaving the network, it is important that the admission control processing be simple enough so the network can keep up with the incoming requests. Synchronization Between Schedulers In Chapter 1 we showed that it is not always possible to implement a real-time network with completely independent schedulers. On the other hand, it is desirable to have the schedulers be as independent as possible. Including clock synchronization or explicit message passing schemes to keep track of distributed state complicates the system design and uses network bandwidth which could otherwise be used for transmitting application messages. Network Utilization The achievable utilization of the network is the utilization beyond which no new messages can be admitted. In order to admit as many message streams as possible, this utilization threshold should be as high as possible. In other words, the scheduler should be able to meet the real-time constraints of the admitted messages at as high a utilization as possible. Flexibility The real-time network will likely receive diverse requests from the real-time applications. The applications will request for admission messages with dierent periods, lengths, and deadlines. The scheduler should be able to meet these diverse requirements. Robustness During the admission control phase, a decision is made as to whether the network can meet the real-time requirements of a periodic message under the assumption that the message adheres 16

24 to its declared parameters. If the message does not adhere to its parameters, the message has broken its contract with the network, and the network's guarantee no longer holds. However, if one periodic message breaks its contract, other periodic messages which are still adhering to theirs should still receive their guarantees. In other words, one misbehaving periodic message should not adversely aect the performance of others. 17

25 Chapter 3 Related Work In this chapter, we rst discuss four trac models that have been used to characterize realtime trac. We then discuss work closely related to two scheduling problems addressed in the thesis: scheduling hard and soft real-time periodic messages through a switch with nite buer space. Specically, there are several known scheduling disciplines for nite buer switches. We classify these algorithms into two groups: priority-based and rate-based. The priority-based approaches have fairly complex implementations. The rate-based approaches are simpler and more readily lend themselves to high-speed implementations. The BWRR algorithm which we describe in Chapter 4 is a rate-based approach which achieves a smaller end-to-end delay and requires less buer space than other rate-based algorithms. We discuss work related to the scheduling of sporadic and aperiodic messages as well as related work that is specic to the problem of scheduling soft-real-time trac. Finally, we discuss work related to the buerless switch scheduling problem. 3.1 Trac Models The commonly used models for characterizing real-time trac are: the periodic model, the (X min ; X ave ; I) model, the (; ) model, and the leaky bucket model. The Periodic Model The periodic message model was originally described in the context of processor scheduling [27]. As stated in Chapter 2, a periodic message M i is characterized by the tuple (c i ; p i ; d i ; j i ; k i ) or 18

26 more simply (c i ; p i ). We shall use the periodic model for describing real-time trac throughout the thesis. The (X min ; X ave ; I ) Model In the (X min ; X ave ; I) trac model [14, 12], three parameters are used to characterize the trac: X min is the minimum packet inter-arrival time, X ave is the average packet inter-arrival time, and I is the time interval over which X ave is computed. The two parameters X ave and I are used to characterize bursty trac and are not used in the description of hard-real-time trac which is solely described by the parameter X min. The (X min ; X ave ; I) model cannot accurately describe periodic trac because it cannot describe the bulk arrival of c i packets at the beginning of each period. Instead, the model assumes the packets arrive one at a time minimum interarrival time X min. We say that the arrivals are \spread out" in this case. The (; ) Model The (; ) model [9] describes trac in terms of a rate parameter and a burst parameter such that the total number of packets from a stream in any time interval t is no more than + t. Again, the (; ) model cannot accurately describe the arrival of c i packets at the beginning of a period. Leaky Bucket The Leaky Bucket model [41, 34] is characterized by two parameters: a rate r and a depth b. The bucket lls up with tokens at a rate r, with b being the maximum number of tokens in the bucket. The presence of a token in the bucket indicates that a packet may be sent to the network. 3.2 Scheduling Algorithms for Switches with Buers Several algorithms have been proposed for scheduling real-time messages through a switch with nite buer space. We classify them into two groups: priority-based and rate-based. The best known algorithms are listed in Table 3.1. The primary advantage of the priority-based algorithms is that they provide a great deal of exibility in providing dierent delay bounds for 19

27 Priority-Based Fair Queueing (FQ) [10] Virtual Clock (VC) [46] Delay Earliest-Due-Date (D-EDD) [14] Jitter Earliest-Due-Date (J-EDD) [42] Minimum-Laxity-First (MLF) [28] Rate-Controlled Static-Priority queuing (RCSP) [44] Rate-Based Framed-Round-Robin (FRR) [35, 22] Stop and Go (S&G) [15] Timed-Token (TT) [18] Table 3.1: Real-time scheduling algorithms. diverse messages. Priority-based algorithms require the scheduler to maintain a sorted priority queue, which for most priority assignments is expensive and may not be feasible in a high-speed switch. The RCSP algorithm also requires at each output port an expensive regulator which controls the number of packets admitted to the priority queue. The rate-based algorithms have a simpler implementation and are likely more suitable for high-speed switches. The BWRR algorithm which we describe in Chapter 4 is a rate-based algorithm. The dierence between our BWRR algorithm and the other rate-based algorithms is that, for the same cost, the BWRR algorithm achieves a smaller end-to-end delay and requires less buer space. The FRR and S&G algorithms can achieve the same end-to-end delay and buer space requirement as the BWRR algorithm, but they require global clock synchronization to do so. Fair Queueing The goal of the Fair Queueing (FQ) algorithm [10] is to emulate bit-by-bit round robin service among the message streams. Since bit-by-bit round robin is impractical, each packet is assigned a nish time that is the time at which the packet would have been transmitted if the outgoing link had actually been scheduled on the bit-by-bit round robin basis. The scheduler then transmits packets in order of their nish times. If there are N streams being transmitted, each stream gets 1=N of the total bandwidth when averaged over time. Alternatively, streams can 20

28 be given dierent fractions of the total bandwidth by assigning them weights. The weight of a stream is proportional to the number of bits transmitted during each round of round robin service. The biggest drawback of the FQ algorithm is that the scheduler must keep a sorted priority queue of messages, thus making a high-speed implementation impractical. In Chapter 4, we describe the weighted-round-robin (WRR) scheduling algorithm [23] which is similar to the FQ algorithm but has a much simpler implementation. Virtual Clock Just as the FQ algorithm tries to emulate bit-by-bit round robin, the Virtual Clock (VC) algorithm [46] tries to emulate the Time Division Multiplexing (TDM) service discipline. Each packet is allocated a virtual transmission time which is the time the packet would be transmitted if the scheduler were actually doing TDM. The packets are then scheduled according to their virtual transmission times. For example, if a stream requires a bandwidth of 100 packets per second, the packets from that stream are given virtual transmission times 10 ms apart. The VC algorithm has the same drawback as the FQ algorithm: it requires that the scheduler maintain a sorted priority queue. Delay Earliest-Due-Date The Delay Earliest-Due-Date (D-EDD) algorithm [14] is based on the Earliest-Deadline-First (EDF) algorithm [27] in which packets are assigned deadlines and the scheduler transmits packets in order of their deadlines. Liu and Layland proved that on a single link the EDF algorithm achieves 100% link utilization when used to transmit periodic messages whose relative deadlines are equal to their respective periods. The EDF algorithm is optimal for one link, i.e., it nds a schedule whenever such a schedule exists. According to the D-EDD algorithm, each message stream declares its maximum packet arrival rate and the scheduler guarantees a relative deadline on each hop in the path of the stream. The end-to-end relative deadline is simply the sum of the local relative deadlines. When a packet arrives at a hop it is assigned a local (absolute) deadline and is inserted into a sorted priority queue according to the local deadline. The scheduler always transmits the packet with the closest deadline. The local deadline at a hop is assigned based upon the 21

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 3 Baochun Li Department of Electrical and Computer Engineering University of Toronto Outline What is scheduling? Why do we need it? Requirements of a scheduling

More information

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services

Overview Computer Networking What is QoS? Queuing discipline and scheduling. Traffic Enforcement. Integrated services Overview 15-441 15-441 Computer Networking 15-641 Lecture 19 Queue Management and Quality of Service Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15-441-f16 What is QoS? Queuing discipline and scheduling

More information

Rate-Controlled Static-Priority. Hui Zhang. Domenico Ferrari. hzhang, Computer Science Division

Rate-Controlled Static-Priority. Hui Zhang. Domenico Ferrari. hzhang, Computer Science Division Rate-Controlled Static-Priority Queueing Hui Zhang Domenico Ferrari hzhang, ferrari@tenet.berkeley.edu Computer Science Division University of California at Berkeley Berkeley, CA 94720 TR-92-003 February

More information

Using the Imprecise-Computation Technique for Congestion. Control on a Real-Time Trac Switching Element

Using the Imprecise-Computation Technique for Congestion. Control on a Real-Time Trac Switching Element Appeared in Proc. of the Int'l Conf. on Parallel & Distributed Systems, Hsinchu, Taiwan, December 994. Using the Imprecise-Computation Technique for Congestion Control on a Real-Time Trac Switching Element

More information

Network Layer Enhancements

Network Layer Enhancements Network Layer Enhancements EECS 122: Lecture 14 Department of Electrical Engineering and Computer Sciences University of California Berkeley Today We have studied the network layer mechanisms that enable

More information

Resource allocation in networks. Resource Allocation in Networks. Resource allocation

Resource allocation in networks. Resource Allocation in Networks. Resource allocation Resource allocation in networks Resource Allocation in Networks Very much like a resource allocation problem in operating systems How is it different? Resources and jobs are different Resources are buffers

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master

More information

Master Course Computer Networks IN2097

Master Course Computer Networks IN2097 Chair for Network Architectures and Services Prof. Carle Department for Computer Science TU München Master Course Computer Networks IN2097 Prof. Dr.-Ing. Georg Carle Christian Grothoff, Ph.D. Chair for

More information

Chapter 24 Congestion Control and Quality of Service 24.1

Chapter 24 Congestion Control and Quality of Service 24.1 Chapter 24 Congestion Control and Quality of Service 24.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 24-1 DATA TRAFFIC The main focus of congestion control

More information

Episode 5. Scheduling and Traffic Management

Episode 5. Scheduling and Traffic Management Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality

More information

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this

More information

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman

A Preferred Service Architecture for Payload Data Flows. Ray Gilstrap, Thom Stone, Ken Freeman A Preferred Service Architecture for Payload Data Flows Ray Gilstrap, Thom Stone, Ken Freeman NASA Research and Engineering Network NASA Advanced Supercomputing Division NASA Ames Research Center Outline

More information

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007

CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 CS 344/444 Computer Network Fundamentals Final Exam Solutions Spring 2007 Question 344 Points 444 Points Score 1 10 10 2 10 10 3 20 20 4 20 10 5 20 20 6 20 10 7-20 Total: 100 100 Instructions: 1. Question

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service

CSCD 433/533 Advanced Networks Spring Lecture 22 Quality of Service CSCD 433/533 Advanced Networks Spring 2016 Lecture 22 Quality of Service 1 Topics Quality of Service (QOS) Defined Properties Integrated Service Differentiated Service 2 Introduction Problem Overview Have

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

Advanced Computer Networks

Advanced Computer Networks Advanced Computer Networks QoS in IP networks Prof. Andrzej Duda duda@imag.fr Contents QoS principles Traffic shaping leaky bucket token bucket Scheduling FIFO Fair queueing RED IntServ DiffServ http://duda.imag.fr

More information

Mohammad Hossein Manshaei 1393

Mohammad Hossein Manshaei 1393 Mohammad Hossein Manshaei manshaei@gmail.com 1393 Voice and Video over IP Slides derived from those available on the Web site of the book Computer Networking, by Kurose and Ross, PEARSON 2 Multimedia networking:

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) The Internet was originally designed for best-effort service without guarantee of predictable performance. Best-effort service is often sufficient for a traffic that is not sensitive

More information

Improving QOS in IP Networks. Principles for QOS Guarantees

Improving QOS in IP Networks. Principles for QOS Guarantees Improving QOS in IP Networks Thus far: making the best of best effort Future: next generation Internet with QoS guarantees RSVP: signaling for resource reservations Differentiated Services: differential

More information

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science

MDP Routing in ATM Networks. Using the Virtual Path Concept 1. Department of Computer Science Department of Computer Science MDP Routing in ATM Networks Using the Virtual Path Concept 1 Ren-Hung Hwang, James F. Kurose, and Don Towsley Department of Computer Science Department of Computer Science & Information Engineering University

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines

Queuing. Congestion Control and Resource Allocation. Resource Allocation Evaluation Criteria. Resource allocation Drop disciplines Queuing disciplines Resource allocation Drop disciplines Queuing disciplines Queuing 1 Congestion Control and Resource Allocation Handle congestion if and when it happens TCP Congestion Control Allocate resources to avoid

More information

QUALITY of SERVICE. Introduction

QUALITY of SERVICE. Introduction QUALITY of SERVICE Introduction There are applications (and customers) that demand stronger performance guarantees from the network than the best that could be done under the circumstances. Multimedia

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

Computer Networking. Queue Management and Quality of Service (QOS)

Computer Networking. Queue Management and Quality of Service (QOS) Computer Networking Queue Management and Quality of Service (QOS) Outline Previously:TCP flow control Congestion sources and collapse Congestion control basics - Routers 2 Internet Pipes? How should you

More information

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois Dynamic Multi-Path Communication for Video Trac Hao-hua Chu, Klara Nahrstedt Department of Computer Science University of Illinois h-chu3@cs.uiuc.edu, klara@cs.uiuc.edu Abstract Video-on-Demand applications

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Network Model for Delay-Sensitive Traffic

Network Model for Delay-Sensitive Traffic Traffic Scheduling Network Model for Delay-Sensitive Traffic Source Switch Switch Destination Flow Shaper Policer (optional) Scheduler + optional shaper Policer (optional) Scheduler + optional shaper cfla.

More information

Real-time Communication in Packet-Switched Networks. Abstract

Real-time Communication in Packet-Switched Networks. Abstract Real-time Communication in Packet-Switched Networks Caglan M. Aras 1, James F. Kurose 2, Douglas S. Reeves 1 and Henning Schulzrinne 3 Abstract The dramatically increased bandwidths and processing capabilities

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Simplified design flow for embedded systems

Simplified design flow for embedded systems Simplified design flow for embedded systems 2005/12/02-1- Reuse of standard software components Knowledge from previous designs to be made available in the form of intellectual property (IP, for SW & HW).

More information

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router

Scheduling. Scheduling algorithms. Scheduling. Output buffered architecture. QoS scheduling algorithms. QoS-capable router Scheduling algorithms Scheduling Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Scheduling: choose a packet to transmit over a link among all

More information

Worst-case Ethernet Network Latency for Shaped Sources

Worst-case Ethernet Network Latency for Shaped Sources Worst-case Ethernet Network Latency for Shaped Sources Max Azarov, SMSC 7th October 2005 Contents For 802.3 ResE study group 1 Worst-case latency theorem 1 1.1 Assumptions.............................

More information

Quality of Service (QoS)

Quality of Service (QoS) Quality of Service (QoS) A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you can add, modify, and delete

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering

Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang. Department of Electrical & Electronic Engineering Credit-Based Fair Queueing (CBFQ) K. T. Chan, B. Bensaou and D.H.K. Tsang Department of Electrical & Electronic Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong

More information

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service

Prof. Dr. Abdulmotaleb El Saddik. site.uottawa.ca mcrlab.uottawa.ca. Quality of Media vs. Quality of Service Multimedia Communications Multimedia Technologies & Applications Prof. Dr. Abdulmotaleb El Saddik Multimedia Communications Research Laboratory School of Information Technology and Engineering University

More information

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies

Priority Traffic CSCD 433/533. Advanced Networks Spring Lecture 21 Congestion Control and Queuing Strategies CSCD 433/533 Priority Traffic Advanced Networks Spring 2016 Lecture 21 Congestion Control and Queuing Strategies 1 Topics Congestion Control and Resource Allocation Flows Types of Mechanisms Evaluation

More information

Concurrent activities in daily life. Real world exposed programs. Scheduling of programs. Tasks in engine system. Engine system

Concurrent activities in daily life. Real world exposed programs. Scheduling of programs. Tasks in engine system. Engine system Real world exposed programs Programs written to interact with the real world, outside the computer Programs handle input and output of data in pace matching the real world processes Necessitates ability

More information

Delay Analysis of Fair Queueing Algorithms with the. Stochastic Comparison Approach. Nihal Pekergin

Delay Analysis of Fair Queueing Algorithms with the. Stochastic Comparison Approach. Nihal Pekergin Delay Analysis of Fair Queueing Algorithms with the Stochastic Comparison Approach Nihal Pekergin PRi SM, Universite de Versailles-St-Quentin 45 av des Etats Unis, 78 035 FRANCE CERMSEM, Universite de

More information

Lecture Outline. Bag of Tricks

Lecture Outline. Bag of Tricks Lecture Outline TELE302 Network Design Lecture 3 - Quality of Service Design 1 Jeremiah Deng Information Science / Telecommunications Programme University of Otago July 15, 2013 2 Jeremiah Deng (Information

More information

Internet Services & Protocols. Quality of Service Architecture

Internet Services & Protocols. Quality of Service Architecture Department of Computer Science Institute for System Architecture, Chair for Computer Networks Internet Services & Protocols Quality of Service Architecture Dr.-Ing. Stephan Groß Room: INF 3099 E-Mail:

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach

Topic 4b: QoS Principles. Chapter 9 Multimedia Networking. Computer Networking: A Top Down Approach Topic 4b: QoS Principles Chapter 9 Computer Networking: A Top Down Approach 7 th edition Jim Kurose, Keith Ross Pearson/Addison Wesley April 2016 9-1 Providing multiple classes of service thus far: making

More information

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder Real-Time Message Transmission Over The Scalable Coherent Interface (SCI) Lei Jiang Sarit Mukherjee Dept. of Computer Science & Engg. University of Nebraska-Lincoln Lincoln, NE 68588-0115 Email: fljiang,

More information

of-service Support on the Internet

of-service Support on the Internet Quality-of of-service Support on the Internet Dept. of Computer Science, University of Rochester 2008-11-24 CSC 257/457 - Fall 2008 1 Quality of Service Support Some Internet applications (i.e. multimedia)

More information

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems

Overview. Lecture 22 Queue Management and Quality of Service (QoS) Queuing Disciplines. Typical Internet Queuing. FIFO + Drop tail Problems Lecture 22 Queue Management and Quality of Service (QoS) Overview Queue management & RED Fair queuing Khaled Harras School of Computer Science niversity 15 441 Computer Networks Based on slides from previous

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

QoS Specification. Adaptation Interaction Layer Flow Mgmt/ Routing Advance Route Prediction Multicasting. HPF Packet Transport

QoS Specification. Adaptation Interaction Layer Flow Mgmt/ Routing Advance Route Prediction Multicasting. HPF Packet Transport The TIMELY Adaptive Resource Management Architecture Vaduvur Bharghavan Kang-Won Lee Songwu Lu Sungwon Ha Jia-Ru Li Dane Dwyer Coordinated Sciences Laboratory University of Illinois at Urbana-Champaign

More information

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service

TDDD82 Secure Mobile Systems Lecture 6: Quality of Service TDDD82 Secure Mobile Systems Lecture 6: Quality of Service Mikael Asplund Real-time Systems Laboratory Department of Computer and Information Science Linköping University Based on slides by Simin Nadjm-Tehrani

More information

Lecture 24: Scheduling and QoS

Lecture 24: Scheduling and QoS Lecture 24: Scheduling and QoS CSE 123: Computer Networks Alex C. Snoeren HW 4 due Wednesday Lecture 24 Overview Scheduling (Weighted) Fair Queuing Quality of Service basics Integrated Services Differentiated

More information

Performance Evaluation of Two New Disk Scheduling Algorithms. for Real-Time Systems. Department of Computer & Information Science

Performance Evaluation of Two New Disk Scheduling Algorithms. for Real-Time Systems. Department of Computer & Information Science Performance Evaluation of Two New Disk Scheduling Algorithms for Real-Time Systems Shenze Chen James F. Kurose John A. Stankovic Don Towsley Department of Computer & Information Science University of Massachusetts

More information

Internet QoS 1. Integrated Service 2. Differentiated Service 3. Linux Traffic Control

Internet QoS 1. Integrated Service 2. Differentiated Service 3. Linux Traffic Control Internet QoS 1. Integrated Service 2. Differentiated Service 3. Linux Traffic Control weafon 2001/9/27 Concept of IntServ Network A flow is the basic management unit Supporting accurate quality control.

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

RSVP 1. Resource Control and Reservation

RSVP 1. Resource Control and Reservation RSVP 1 Resource Control and Reservation RSVP 2 Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows

More information

Resource Control and Reservation

Resource Control and Reservation 1 Resource Control and Reservation Resource Control and Reservation policing: hold sources to committed resources scheduling: isolate flows, guarantees resource reservation: establish flows 2 Usage parameter

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Compensation Modeling for QoS Support on a Wireless Network

Compensation Modeling for QoS Support on a Wireless Network Compensation Modeling for QoS Support on a Wireless Network Stefan Bucheli Jay R. Moorman John W. Lockwood Sung-Mo Kang Coordinated Science Laboratory University of Illinois at Urbana-Champaign Abstract

More information

Jitter Control and Dynamic Resource Management. for Multimedia Communication Over Broadband. Network. Ahmed Bashandy, Edwin Chong, Arif Ghafoor,

Jitter Control and Dynamic Resource Management. for Multimedia Communication Over Broadband. Network. Ahmed Bashandy, Edwin Chong, Arif Ghafoor, Jitter Control and Dynamic Resource Management for Multimedia Communication Over Broadband Network Ahmed Bashandy, Edwin Chong, Arif Ghafoor, School of Electrical & Computer Engineering, 1285 Electrical

More information

Quality of Service in the Internet

Quality of Service in the Internet Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline

UNIVERSITY OF CALIFORNIA, SAN DIEGO. A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline UNIVERSITY OF CALIFORNIA, SAN DIEGO A Simulation of the Service Curve-based Earliest Deadline First Scheduling Discipline A thesis submitted in partial satisfaction of the requirements for the degree Master

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Configuring QoS. Understanding QoS CHAPTER

Configuring QoS. Understanding QoS CHAPTER 29 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic QoS (auto-qos) commands or by using standard QoS commands on the Catalyst 3750 switch. With QoS, you can provide

More information

COMP 249 Advanced Distributed Systems Multimedia Networking. The Integrated Services Architecture for the Internet

COMP 249 Advanced Distributed Systems Multimedia Networking. The Integrated Services Architecture for the Internet COMP 249 Advanced Distributed Systems Multimedia Networking The Integrated Services Architecture for the Internet Kevin Jeffay Department of Computer Science University of North Carolina at Chapel Hill

More information

Congestion Control in Communication Networks

Congestion Control in Communication Networks Congestion Control in Communication Networks Introduction Congestion occurs when number of packets transmitted approaches network capacity Objective of congestion control: keep number of packets below

More information

Real-Time Communication in Packet-Switched Networks. Abstract. requirements and trac characteristics of various real-time applications, survey recent

Real-Time Communication in Packet-Switched Networks. Abstract. requirements and trac characteristics of various real-time applications, survey recent Real-Time Communication in Packet-Switched Networks Caglan M. Aras, 1 James F. Kurose, 2 Douglas S. Reeves 3 and Henning Schulzrinne 4 Abstract The dramatically increased bandwidths and processing capabilities

More information

Congestion Control and Resource Allocation

Congestion Control and Resource Allocation Congestion Control and Resource Allocation Lecture material taken from Computer Networks A Systems Approach, Third Edition,Peterson and Davie, Morgan Kaufmann, 2007. Advanced Computer Networks Congestion

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

IBM Almaden Research Center, at regular intervals to deliver smooth playback of video streams. A video-on-demand

IBM Almaden Research Center, at regular intervals to deliver smooth playback of video streams. A video-on-demand 1 SCHEDULING IN MULTIMEDIA SYSTEMS A. L. Narasimha Reddy IBM Almaden Research Center, 650 Harry Road, K56/802, San Jose, CA 95120, USA ABSTRACT In video-on-demand multimedia systems, the data has to be

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p

perform well on paths including satellite links. It is important to verify how the two ATM data services perform on satellite links. TCP is the most p Performance of TCP/IP Using ATM ABR and UBR Services over Satellite Networks 1 Shiv Kalyanaraman, Raj Jain, Rohit Goyal, Sonia Fahmy Department of Computer and Information Science The Ohio State University

More information

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose

QoS Guarantees. Motivation. . link-level level scheduling. Certain applications require minimum level of network performance: Ch 6 in Ross/Kurose QoS Guarantees. introduction. call admission. traffic specification. link-level level scheduling. call setup protocol. reading: Tannenbaum,, 393-395, 395, 458-471 471 Ch 6 in Ross/Kurose Motivation Certain

More information

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dongkun Shin Jihong Kim School of CSE School of CSE Seoul National University Seoul National University Seoul, Korea

More information

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center

Space Priority Trac. Rajarshi Roy and Shivendra S. Panwar y. for Advanced Technology in Telecommunications, Polytechnic. 6 Metrotech Center Ecient Buer Sharing in Shared Memory ATM Systems With Space Priority Trac Rajarshi Roy and Shivendra S Panwar y Center for Advanced Technology in Telecommunications Polytechnic University 6 Metrotech Center

More information

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Leaky Bucket Algorithm Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

Dynamics of an Explicit Rate Allocation. Algorithm for Available Bit-Rate (ABR) Service in ATM Networks. Lampros Kalampoukas, Anujan Varma.

Dynamics of an Explicit Rate Allocation. Algorithm for Available Bit-Rate (ABR) Service in ATM Networks. Lampros Kalampoukas, Anujan Varma. Dynamics of an Explicit Rate Allocation Algorithm for Available Bit-Rate (ABR) Service in ATM Networks Lampros Kalampoukas, Anujan Varma and K. K. Ramakrishnan y UCSC-CRL-95-54 December 5, 1995 Board of

More information

Week 7: Traffic Models and QoS

Week 7: Traffic Models and QoS Week 7: Traffic Models and QoS Acknowledgement: Some slides are adapted from Computer Networking: A Top Down Approach Featuring the Internet, 2 nd edition, J.F Kurose and K.W. Ross All Rights Reserved,

More information

Introduction to IP QoS

Introduction to IP QoS Introduction to IP QoS Primer to IP Quality of Service Aspects Queuing, Shaping, Classification Agenda IP QoS Introduction Queue Management Congestion Avoidance Traffic Rate Management Classification and

More information

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation

Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Achieving Distributed Buffering in Multi-path Routing using Fair Allocation Ali Al-Dhaher, Tricha Anjali Department of Electrical and Computer Engineering Illinois Institute of Technology Chicago, Illinois

More information

Precedence Graphs Revisited (Again)

Precedence Graphs Revisited (Again) Precedence Graphs Revisited (Again) [i,i+6) [i+6,i+12) T 2 [i,i+6) [i+6,i+12) T 3 [i,i+2) [i+2,i+4) [i+4,i+6) [i+6,i+8) T 4 [i,i+1) [i+1,i+2) [i+2,i+3) [i+3,i+4) [i+4,i+5) [i+5,i+6) [i+6,i+7) T 5 [i,i+1)

More information

Implementing Scheduling Algorithms. Real-Time and Embedded Systems (M) Lecture 9

Implementing Scheduling Algorithms. Real-Time and Embedded Systems (M) Lecture 9 Implementing Scheduling Algorithms Real-Time and Embedded Systems (M) Lecture 9 Lecture Outline Implementing real time systems Key concepts and constraints System architectures: Cyclic executive Microkernel

More information

"Filling up an old bath with holes in it, indeed. Who would be such a fool?" "A sum it is, girl," my father said. "A sum. A problem for the mind.

Filling up an old bath with holes in it, indeed. Who would be such a fool? A sum it is, girl, my father said. A sum. A problem for the mind. We were doing very well, up to the kind of sum when a bath is filling at the rate of so many gallons and two holes are letting the water out, and please to say how long it will take to fill the bath, when

More information

On the Use of Multicast Delivery to Provide. a Scalable and Interactive Video-on-Demand Service. Kevin C. Almeroth. Mostafa H.

On the Use of Multicast Delivery to Provide. a Scalable and Interactive Video-on-Demand Service. Kevin C. Almeroth. Mostafa H. On the Use of Multicast Delivery to Provide a Scalable and Interactive Video-on-Demand Service Kevin C. Almeroth Mostafa H. Ammar Networking and Telecommunications Group College of Computing Georgia Institute

More information

Configuring QoS. Finding Feature Information. Prerequisites for QoS

Configuring QoS. Finding Feature Information. Prerequisites for QoS Finding Feature Information, page 1 Prerequisites for QoS, page 1 Restrictions for QoS, page 3 Information About QoS, page 4 How to Configure QoS, page 28 Monitoring Standard QoS, page 80 Configuration

More information

NOTE03L07: INTRODUCTION TO MULTIMEDIA COMMUNICATION

NOTE03L07: INTRODUCTION TO MULTIMEDIA COMMUNICATION NOTE03L07: INTRODUCTION TO MULTIMEDIA COMMUNICATION Some Concepts in Networking Circuit Switching This requires an end-to-end connection to be set up before data transmission can begin. Upon setup, the

More information

Kalev Kask and Rina Dechter. Department of Information and Computer Science. University of California, Irvine, CA

Kalev Kask and Rina Dechter. Department of Information and Computer Science. University of California, Irvine, CA GSAT and Local Consistency 3 Kalev Kask and Rina Dechter Department of Information and Computer Science University of California, Irvine, CA 92717-3425 fkkask,dechterg@ics.uci.edu Abstract It has been

More information

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks

Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Design of a Weighted Fair Queueing Cell Scheduler for ATM Networks Yuhua Chen Jonathan S. Turner Department of Electrical Engineering Department of Computer Science Washington University Washington University

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Configuring QoS CHAPTER

Configuring QoS CHAPTER CHAPTER 34 This chapter describes how to use different methods to configure quality of service (QoS) on the Catalyst 3750 Metro switch. With QoS, you can provide preferential treatment to certain types

More information

Lecture (08, 09) Routing in Switched Networks

Lecture (08, 09) Routing in Switched Networks Agenda Lecture (08, 09) Routing in Switched Networks Dr. Ahmed ElShafee Routing protocols Fixed Flooding Random Adaptive ARPANET Routing Strategies ١ Dr. Ahmed ElShafee, ACU Fall 2011, Networks I ٢ Dr.

More information

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for

Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc. Abstract. Direct Volume Rendering (DVR) is a powerful technique for Comparison of Two Image-Space Subdivision Algorithms for Direct Volume Rendering on Distributed-Memory Multicomputers Egemen Tanin, Tahsin M. Kurc, Cevdet Aykanat, Bulent Ozguc Dept. of Computer Eng. and

More information