Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks
|
|
- Lilian Lee
- 5 years ago
- Views:
Transcription
1 Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) Fax: (65) engp7448@leonis.nus.edu.sg, eletck@nus.edu.sg Abstract - High speed networks employing ATM technology are becoming necessary as a result of increased traffic load and the transfer of multimedia information on computer networks. However, there is a large base of machines connected to local area networks (LANs) using Ethernet and FDDI technology. Thus, it is important for ATM networks and LANs to inter-operate. This paper gives an analysis of the performance issues of interconnected LAN and ATM networks under low and high load conditions, using two different scenarios. In particular, we simulate Video-on-Demand (VOD) traffic on the network and attention is given to analyse the end-to-end delays at each section of the entire network model. It is found that a severe bottleneck is over the Ethernet segment since congestion on the Ethernet bus arises as packets are routed into the Ethernet network. Otherwise, ATM technology provides a very efficient high speed data network. Figure 1(a) ATM Network (Scenario 1) 1. INTRODUCTION During recent years, significant advancement has been made in communications and computer technologies. Multimedia communications are expected in future high speed network, where many kinds of media data are carried over ATM networks. In this paper, the network transmission delays as packets are transferred from the server to the client application are studied in details. Two network scenarios used for our analysis are shown in Figure 1. In scenario one (Figure 1a), simulated video traffic, in the form of packet streams, is generated from a VOD server located on a FDDI ring on the NUS subnetwork as shown in Figure 1(b). These packets will travel around the ring before being routed into an Ethernet LAN. An Ethernet-ATM gateway located on this LAN will receive these packets and convert them into ATM cells, before sending to the first ATM switch. An ATM connection is subsequently established. At the destination, VOD packet streams are recreated by another router and subsequently channelled to the VOD client on the destination Ethernet LAN shown in Figure 1(c). In scenario two, we have a very similar set-up as that in scenario one, except that the NUS subnetwork is replaced by a group of ATM servers, (Figure 1d) each generating packets for the remote Ethernet subnetworks. Figure 1(b) NUS subnetwork (source) Figure 1(c) SingTel and ISS subnetwork (destination) Figure 1(d) ATM Network (Scenario 2) Figure 1 The two network scenario used for simulation.
2 2. SOFTWARE TOOLS For our study, we had made used of two software packages available commercially. One of the tool we used is a comprehensive engineering system capable of simulating large communication networks with detailed protocol modelling and performance analysis called Optimised Network Engineering Tools (OPNET). OPNET features include a graphical specification of models; a dynamic, eventscheduling simulation kernel; integrated data analysis tools; and hierarchical, object-based modelling [1]. The hierarchical modelling structure allows for complicated network problems to be solved by distributed algorithm development. The other tool we used for collection of VOD traffic characteristics was achieved with the Foreview ATM Network Management system [2]. Foreview includes graphing and logging usage utilities which allow us to track network usage. Some processing of the data collected reveals that the traffic pattern followed a normal distribution with mean of about 3000 packets/second and variance 5850 packets 2 /second MODEL IMPLEMENTATION Because the network models are intended for the purpose of simulation and performance estimation, certain parts of the protocol have been simplified or omitted. It is important to understand which mechanisms are modelled in order to have an idea of the level of accuracy of our simulation. We shall discuss the scope and limitations of our model implementations of the ATM, Ethernet and FDDI portions of our network [3]. 3.1 ATM The Asynchronous Transfer Mode (ATM) is a highbandwidth, low-delay, packet switching and multiplexing technique. ATM makes use of commonchannel signalling, with all control signals travelling on the same dedicated virtual channel. ATM allows multiple logical connections to exist on a single physical circuit and it uses cells of size 48 bytes (plus a 5 byte header). Due to the high reliability of modern highspeed digital networks, there is little overhead in each cell for error control Scope and Implementation Limitations The ATM layer model support many capabilities found in ATM networks. Dynamic call setup and teardown signalling procedures, is provided over subscription based virtual path connections (VPCs). Traffic control, which include Call Admission Control (CAC) and Usage Parameter Control (UPC), prevents any calls with unsupportable traffic requirements from establishing a connection and established calls from degrading network service below specified Quality of Service (QoS) specifications. A distributed, dynamic routing capability is also provided. The ATM layer supports virtual path (VP) and virtual channel (VC) switching. Delay is modelled for the switching process, as well as that due to the switch fabric. This model further assumes that the VP and VC switching is sufficiently fast to support the maximum rate of arriving cells, so input port buffering is not modelled. However, output port buffering is modelled since it is possible to switch cells to an output port faster than the port can transmit. A buffer is available for cells of each QoS class for each output port whose size (in cells) can be individually specified for each switch in our network. The relative priority of each buffer may also be specified. ATM traffic control functions are explicitly modelled. Call Admission Control (CAC) is based on the Peak Cell Rate (PCR) of a call attempting to be established. The CAC algorithm used guarantees that the sum of the PCRs of all virtual channel connections within a VPC must be less than the total bandwidth of the VPC. If a new call would cause the sum of the PCRs to exceed that value, the call will not be accepted. The ATM layer model supports distributed, dynamic routing. Each ATM node learns of all other connected ATM nodes and routes to them in a distributed manner, and over time, each node updates its routing tables to reflect changes in the network. Each node attempts to route a call to the destination node one at a time. The cost of a route is the sum of the costs of a hop. The cost computation is based on the amount of available bandwidth along the link. 3.2 Ethernet Ethernet is a bus-based local area network technology that is in common today. The operation of the local area network is managed by a media access protocol (MAC) which has been standardised as IEEE The role of this MAC protocol is to provide efficiency and fair sharing of the communication channel which is the bus connecting the stations of the LAN. The Ethernet MAC accepts data packets from a higher layer protocol (such as the Internet Protocol) and attempts to transmit them at appropriate times to other stations on the bus. Collisions are an unavoidable part of Ethernet MAC protocol and efficient handling of a collision is important. The first important feature of Ethernet is to detect collision quickly in order to invoke a recovery procedure. Upon deciding a collision, a transmitting station will continue to transmit for a short period of time called the
3 jam time. This ensures that other transmitting stations will also notice a collision. After the jam time, the transmission is aborted entirely. After a short period of time, the bus should be quiet since all stations will have noticed a collision and aborted their transmissions. The silence on the bus is noticed by the carrier sensing mechanisms in each station and those stations that have packets to send can begin transmitting. Provisions is also made to avoid repeated collisions between the same stations by ensuring that transmissions that collide wait a random amount of time before being retransmitted Scope and Implementation Limitations The Ethernet MAC model implement the carrier sensing, collision detection, and transmission mechanisms specified in the IEEE standard. Explicit modelling is performed for all features other than serialisation of bit transfers to and from the physical layer. 3.3 FDDI Ring The Fibre Distributed Data Interface (FDDI) provides general purpose networking at 100Mbps transmission rates for large numbers of communicating stations configured in a ring topology. Use of ring bandwidth is controlled through a time token rotation protocol, wherein stations must receive a token and meet a set of timing and priority criteria before transmitting frames Scope and Limitations of Implementations Our models are faced with two main limitations. Firstly, the ring initialisation and recovery processes are not modelled explicitly. Its usefulness is in obtaining measurements of steady state performance. Secondly, our model makes no attempt to implement the mechanisms related to the detection of damaged frames, or the reporting of errors to the station management entity (SMT). The interface between media access protocol (MAC) and SMT is, in fact, not presently incorporated into the implementation of MAC. The primary data transfer features of FDDI are modelled explicitly, including synchronous and asynchronous transmission, definable priority levels for asynchronous frames, and restricted tokens. The effects of station latency and propagation delay are also incorporated into the model. Implicit in the parameters listed above is a simplification made in the model: the station latency and inter-station propagation delay are assumed to be uniform across the ring. This is primarily done to conveniently accelerate simulation. 4. EXPERIMENTS The two scenarios described in Section 1 are analysed in this paper, each with simulations ran under low and high loading conditions. For low load conditions, we have two video servers sending out traffic compared to 14 servers under high load. The traffic generation patterns are the same for all video servers. Table 4.1 lists some of the parameters used in both sets of simulations. Table 4.1 Parameters used in both simulation sets Source Packet size 2048 bits Call waiting time 0.0 sec Call duration 4,500 sec Mean packet 3000 pkts/sec generation rate Variance packet 5850 pkts 2 /sec 2 generation rate IP layer IP processing rate 5000 pkts/sec FDDI Channel rate 100Mbps Ethernet Channel rate 10Mbps ATM Channel rate 155Mbps VP-VC delay sec VP switching delay sec Switch fabric delay 0.0 sec Priority scheme A Class B traffic switch 400 cells buffersize Routing update Every 15 sec frequency AAL type 5 Traffic QoS class B IP-AAL Maximum data rate 1.55Mbps Inactivity time-out 120s 5. RESULTS We shall now look at some of the simulation results, whereupon our conclusions are drawn. 5.1 Scenario One For ease of comparison, the low and high load results for Scenario 1 are referred as the (a) and (b) figures in our discussion below End to End Delays We shall look only at the steady state ETE delays experienced globally by the packets at the ATM, Ethernet, and FDDI portions of our network model. From Figure 5.1 and 5.2, we see that the ATM ETE delay and the FDDI ETE delay patterns are very similar whether in low or high load conditions. The order of magnitude of the delays experiences are about 20µs. The Ethernet ETE delays, on the other hand, are about 250µs under low load, and monotonically increasing (in the order of seconds) under high load. These results indicate that the Ethernet contributed most to the total
4 ETE delays of the packets. The monotonically increasing delay under high load is due to the low 10Mbps Ethernet bandwidth which is insufficient to support the high bandwidth demanded when all 14 video servers are in operation concurrently, each producing 12Mbps of traffic. Figure 5.1 ATM end-to-end delay under (a) low load and (b) high load Figure 5.3 Ethernet end-to-end delay under (a) low load and (b) high load. Besides the above, by comparing Figures 5.3 and 5.4, we observed an interesting fact. The bulk of the Ethernet ETE delays is contributed when packets are sent from the FDDI-Ethernet router to the Ethernet- ATM router through the Ethernet bus in the NUS subnetwork model. This is especially obvious during high load condition. The reason for this is that congestion results on the bus during high load. A proof of congestion is that under low load, the size of the Ethernet queues in the FDDI-Ethernet router is constant at about 2500 bits, whereas under high load, the queue size is monotonically increasing with time and of order bits (see Figure 5.5). Figure 5.2 FDDI end-to-end delay under (a) low load and (b) high load. Figure 5.4 Localised Ethernet end-to-end delay (to reach Ethernet-ATM router) under (a) low load and (b) high load
5 network to another. Figure 5.7 shows the ETE delays experienced by the ATM portions of our network. Figure 5.5 Ethernet queue bitsize at FDDI-Ethernet router under (a) low load and (b) high load Cell Loss Ratio in ATM Network The cell loss ratio present in our ATM network model is always zero whether under low or high load conditions. This suggests that the ATM network is very efficient even under high traffic loading. In fact, the ATM network is very lightly loaded even under the modelled high load condition. However, we also observe that the bottleneck at the Ethernet bus before the ATM network may have limited the amount of traffic carried by the ATM network. Figure 5.7 ATM end-to-end delay under(a) low load and (b) high load We observed from the two traces above that the ATM ETE delay is very similar (about 75µs) regardless of the loading conditions. This is intuitively correct since both loading conditions do not cause congestion on our ATM portions of the network. The ATM network is still lightly loaded during the high loading condition considered. Figure 5.6 Cell loss ratio under (a) low load and (b) high load. 5.2 Scenario Two We shall now look at the simulation results of our second simulation scenario which models an ATMbased server generating packets to an Ethernet-based client through our ATM testbed. Like scenario one, we have low and high load conditions generating similar traffic conditions as before. We shall label the charts generated by low load and high load simulations with suffix (a) and (b) respectively End to End Delays As in the previous scenario, we shall now look at the steady state global ATM and Ethernet end-to-end (ETE) delays experienced by packets as they travel from one Figure 5.8 AAL5 end-to-end delay under (a) low load and (b) high load Figure 5.8 shows the amount of ATM ETE delays including the AAL5 segmentation/reassembly delays. The observed delay is about 330µs under each loading conditions. This result is reasonable because the processing delay is very short at all the loading conditions considered, due to a very fast segmentation/reassembly processor modelled. It is also observed that on both high load simulations, the AAL5 ETE delay is almost identical.
6 of the queue length at the ATM-Ethernet router, as shown in Figure 5.11, also suggested that the traffic congestion results because the low bandwidth of 10Mbps Ethernet is unable to handle the high traffic volume of 16.8Mbps routed from the ATM network. The bottleneck link is thus the Ethernet bus between the router and the client workstation Cell Loss Ratio in ATM Network The cell loss ratio present in our ATM network model is always zero whether under low or high load conditions, as shown in Figure This condition is prevalent because the ATM network is lightly loaded in our network model in the three sets of simulations ran. Figure 5.9 Ethernet end-to-end delay under (a) low load and (b) high load Figure 5.9 shows the Ethernet ETE delays observed between congested and non-congested cases, which surfaced when the traffic reaches the Ethernet-based destination. When there is no congestion, we observed that the Ethernet ETE delay is constant at about 270µs at steady state. However, under congested conditions the Ethernet ETE delay is monotonically increasing in the order of seconds. To establish better understanding of the network under congestion, we ran further simulations on high load model with more local probes on the Ethernet network. Figure 5.10 Queueing delay at ATM-Ethernet router under high load with congestion Figure 5.11 Queue length at ATM-Ethernet router under high load Figure 5.10 shows the queueing delay experienced by packets at the ATM-Ethernet router. The similarity of Figure 5.9(b) and 5.10 suggests that the monotonically increasing end-to-end delay experienced by the Ethernet under congestion is contributed largely by the queueing delaying at the router. The similarly increasing bitsize Figure 5.12 Cell loss ratio under both low and high load 6. COMMENTS Some limitations are present in the our investigations. Firstly, our investigations were based on using video servers generating packets with identical video traffic patterns. This assumption is not necessarily true as different quality video sequences will generate traffic loads that are not identical. Secondly, our network model had used a topology whereby one single server will only transmit packets to one single destination. This is not generally true, as a video server in the real world should be able to serve multiple client applications at the same time. Thirdly, we had assumed certain parameters during simulations, as listed in Table 4.1. These parameters are not universal and may vary with the real equipment used in actual VOD implementations. However, our results should be accurate to a large extent. In future work, we plan to refine the network models and their parameterisation in order to improve the realism and accuracy of our simulations. We shall also compare simulation results with empirical results obtained from an ATM protocol analyser. 7. CONCLUSIONS In the first scenario, the ATM and FDDI portions of the network models contribute end-to-end delays of about 20µs. In the second scenario, the ATM portions of the network models contribute end-to-end delays of about
7 75µs. These delays are small compared to the contribution from Ethernet in either scenarios, which was observed to be 250s and 270s respectively under low load, and monotonically increasing (in the order of seconds) under high load, or congestion. The ATM network is an efficient network since zero cell loss ratio was observed from the simulations, and cells flowing through the network experienced low endto-end delays. The ATM network is lightly utilised even under the high load conditions considered. In this paper, we conclude that the Ethernet can be a major bottleneck in interconnected LAN and ATM networks. This bottleneck surface during high load conditions due to congestion. The low bandwidth of Ethernet is a cause of this bottleneck in an otherwise efficient ATM based network model. REFERENCES [1] OPNET Manual Vol 2, Modelling. MIL 3, Inc. (1996) [2] Foreview 4.0 Network Management User s Manual, Fore Systems. (1996) [3] OPNET Manual Vol 11, Protocols Models. MIL 3, Inc. (1996)
8
What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control
Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit
More informationCongestion in Data Networks. Congestion in Data Networks
Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet
More informationWhat Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues
168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More information===================================================================== Exercises =====================================================================
===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationInternetworking Part 1
CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:
More informationQuality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel
Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)
More informationMQC Hierarchical Queuing with 3 Level Scheduler
MQC Hierarchical Queuing with 3 Level Scheduler The MQC Hierarchical Queuing with 3 Level Scheduler feature provides a flexible packet scheduling and queuing system in which you can specify how excess
More informationSIMULATION FRAMEWORK MODELING
CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationThe Network Layer and Routers
The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in
More informationThis Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network
This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information
More informationSimulation Study for a Broadband Multimedia VSAT Network
Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationEC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers)
DEPARTMENT OF ECE EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers) FINAL YEAR 7 th SEMESTER UNIT I HIGH SPEED NETWORKS 1) What is common channel signaling? The data s and control signals
More informationPart 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross
Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,
More informationLecture 4 Wide Area Networks - Congestion in Data Networks
DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number
More informationReal-Time Protocol (RTP)
Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of
More informationChapter 10. Circuits Switching and Packet Switching 10-1
Chapter 10 Circuits Switching and Packet Switching 10-1 Content Switched communication networks Circuit switching networks Circuit-switching concepts Packet-switching principles X.25 (mentioned but not
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationCSCI Computer Networks
CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationAsynchronous Transfer Mode (ATM) ATM concepts
Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into
More informationIEEE standards for local area networks
IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer
More informationCisco IOS Switching Paths Overview
This chapter describes switching paths that can be configured on Cisco IOS devices. It contains the following sections: Basic Router Platform Architecture and Processes Basic Switching Paths Features That
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationModule 16: Distributed System Structures
Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication
More informationKing Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2
King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationCS610- Computer Network Solved Subjective From Midterm Papers
Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationISO IEC. INTERNATIONAL ISO/IEC STANDARD Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC)
INTERNATIONAL ISO/IEC STANDARD 9314-5 First edition 1995-02-01 Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC) Technologies de l'information Interface de
More informationCSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca
CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationWireless Networks. Communication Networks
Wireless Networks Communication Networks Types of Communication Networks Traditional Traditional local area network (LAN) Traditional wide area network (WAN) Higher-speed High-speed local area network
More informationFigure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing.
Figure. Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. (a) PCI =,,, 4 4 PCI =, 4 4 6 PCI = 6, Link/Port RT Link/Port RT Link/Port RT In Port PCI 4 Out Port PCI 4 6 Port
More informationData and Computer Communications
Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as
More informationA Quality of Service Decision Model for ATM-LAN/MAN Interconnection
A Quality of Service Decision for ATM-LAN/MAN Interconnection N. Davies, P. Francis-Cobley Department of Computer Science, University of Bristol Introduction With ATM networks now coming of age, there
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationChapter 1 Introduction
Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks
More informationDiffServ Architecture: Impact of scheduling on QoS
DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationSELECTION OF METRICS (CONT) Gaia Maselli
SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationNetwork Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4
CSCD 330 Network Superhighway Network Programming Winter 2015 Lecture 13 Network Layer Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationData & Computer Communication
Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects
More informationModule 1. Introduction. Version 2, CSE IIT, Kharagpur
Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical
More informationECEN Final Exam Fall Instructor: Srinivas Shakkottai
ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationConfiguring Banyan VINES
Configuring Banyan VINES This chapter describes how to configure Banyan VINES and provides configuration examples. For a complete description of the VINES commands in this chapter, refer to the Banyan
More informationATM Logical Connections: VCC. ATM Logical Connections: VPC
ATM Logical Connections: VCC Logical Connections in ATM are referred to as virtual channel connections (VCCs). Virtual channel (VC) is a generic term used to describe unidirectional transport of ATM cells
More informationPerformance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks
Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.
More informationChapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant
More informationADVANCED COMPUTER NETWORKS
ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationCommunication Networks - 3 general areas: data communications, networking, protocols
Communication Networks - Overview CSE 3213 Fall 2011 1 7 September 2011 Course Content 3 general areas: data communications, networking, protocols 1. Data communications: basic concepts of digital communications
More informationSwitched LANs A Set of Local Area Networks Interconnected by Switches
Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help
More informationAsynchronous Transfer Mode
ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control
More informationIntroduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15
Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay
More informationChapter 3 Packet Switching
Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationIntroduction to ATM Traffic Management on the Cisco 7200 Series Routers
CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,
More informationSwitching and Forwarding Reading: Chapter 3 1/30/14 1
Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any
More informationChapter 2. Switch Concepts and Configuration. Part I
Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationQoS-Aware IPTV Routing Algorithms
QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,
More informationThroughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1
455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University
More informationP D1.1 RPR OPNET Model User Guide
P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1
More informationChapter 8 LAN Topologies
Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road
More informationMcGill University - Faculty of Engineering Department of Electrical and Computer Engineering
McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access
More informationWhat is the fundamental purpose of a communication system? Discuss the communication model s elements.
What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The
More informationModule 16: Distributed System Structures. Operating System Concepts 8 th Edition,
Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationdifferent problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management
Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion
More informationProgress Report No. 3. A Case Study on Simulation Scenario
NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report
More informationATM Hierarchical Shaping ATM VC into VP Shaping, page 1
ATM Hierarchical Shaping ATM VC into VP Shaping, page 1 Traffic shaping is a quality of service (QoS) mechanism that is used to manage the network traffic by shaping the traffic to a specified rate. Traffic
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More information(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker
Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationLocalization approaches based on Ethernet technology
Localization approaches based on Ethernet technology Kees den Hollander, GM Garner, Feifei Feng, Paul Jeong, Eric H.S. Ryu Contact: Eric H.S. Ryu eric_ryu@samsung.com Abstract This document describes two
More information2. Modelling of telecommunication systems (part 1)
2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks
More informationAn Approach for Enhanced Performance of Packet Transmission over Packet Switched Network
ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched
More informationCongestion Control Open Loop
Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental
More informationCompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang
CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches
More information