Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Size: px
Start display at page:

Download "Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks"

Transcription

1 Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) Fax: (65) engp7448@leonis.nus.edu.sg, eletck@nus.edu.sg Abstract - High speed networks employing ATM technology are becoming necessary as a result of increased traffic load and the transfer of multimedia information on computer networks. However, there is a large base of machines connected to local area networks (LANs) using Ethernet and FDDI technology. Thus, it is important for ATM networks and LANs to inter-operate. This paper gives an analysis of the performance issues of interconnected LAN and ATM networks under low and high load conditions, using two different scenarios. In particular, we simulate Video-on-Demand (VOD) traffic on the network and attention is given to analyse the end-to-end delays at each section of the entire network model. It is found that a severe bottleneck is over the Ethernet segment since congestion on the Ethernet bus arises as packets are routed into the Ethernet network. Otherwise, ATM technology provides a very efficient high speed data network. Figure 1(a) ATM Network (Scenario 1) 1. INTRODUCTION During recent years, significant advancement has been made in communications and computer technologies. Multimedia communications are expected in future high speed network, where many kinds of media data are carried over ATM networks. In this paper, the network transmission delays as packets are transferred from the server to the client application are studied in details. Two network scenarios used for our analysis are shown in Figure 1. In scenario one (Figure 1a), simulated video traffic, in the form of packet streams, is generated from a VOD server located on a FDDI ring on the NUS subnetwork as shown in Figure 1(b). These packets will travel around the ring before being routed into an Ethernet LAN. An Ethernet-ATM gateway located on this LAN will receive these packets and convert them into ATM cells, before sending to the first ATM switch. An ATM connection is subsequently established. At the destination, VOD packet streams are recreated by another router and subsequently channelled to the VOD client on the destination Ethernet LAN shown in Figure 1(c). In scenario two, we have a very similar set-up as that in scenario one, except that the NUS subnetwork is replaced by a group of ATM servers, (Figure 1d) each generating packets for the remote Ethernet subnetworks. Figure 1(b) NUS subnetwork (source) Figure 1(c) SingTel and ISS subnetwork (destination) Figure 1(d) ATM Network (Scenario 2) Figure 1 The two network scenario used for simulation.

2 2. SOFTWARE TOOLS For our study, we had made used of two software packages available commercially. One of the tool we used is a comprehensive engineering system capable of simulating large communication networks with detailed protocol modelling and performance analysis called Optimised Network Engineering Tools (OPNET). OPNET features include a graphical specification of models; a dynamic, eventscheduling simulation kernel; integrated data analysis tools; and hierarchical, object-based modelling [1]. The hierarchical modelling structure allows for complicated network problems to be solved by distributed algorithm development. The other tool we used for collection of VOD traffic characteristics was achieved with the Foreview ATM Network Management system [2]. Foreview includes graphing and logging usage utilities which allow us to track network usage. Some processing of the data collected reveals that the traffic pattern followed a normal distribution with mean of about 3000 packets/second and variance 5850 packets 2 /second MODEL IMPLEMENTATION Because the network models are intended for the purpose of simulation and performance estimation, certain parts of the protocol have been simplified or omitted. It is important to understand which mechanisms are modelled in order to have an idea of the level of accuracy of our simulation. We shall discuss the scope and limitations of our model implementations of the ATM, Ethernet and FDDI portions of our network [3]. 3.1 ATM The Asynchronous Transfer Mode (ATM) is a highbandwidth, low-delay, packet switching and multiplexing technique. ATM makes use of commonchannel signalling, with all control signals travelling on the same dedicated virtual channel. ATM allows multiple logical connections to exist on a single physical circuit and it uses cells of size 48 bytes (plus a 5 byte header). Due to the high reliability of modern highspeed digital networks, there is little overhead in each cell for error control Scope and Implementation Limitations The ATM layer model support many capabilities found in ATM networks. Dynamic call setup and teardown signalling procedures, is provided over subscription based virtual path connections (VPCs). Traffic control, which include Call Admission Control (CAC) and Usage Parameter Control (UPC), prevents any calls with unsupportable traffic requirements from establishing a connection and established calls from degrading network service below specified Quality of Service (QoS) specifications. A distributed, dynamic routing capability is also provided. The ATM layer supports virtual path (VP) and virtual channel (VC) switching. Delay is modelled for the switching process, as well as that due to the switch fabric. This model further assumes that the VP and VC switching is sufficiently fast to support the maximum rate of arriving cells, so input port buffering is not modelled. However, output port buffering is modelled since it is possible to switch cells to an output port faster than the port can transmit. A buffer is available for cells of each QoS class for each output port whose size (in cells) can be individually specified for each switch in our network. The relative priority of each buffer may also be specified. ATM traffic control functions are explicitly modelled. Call Admission Control (CAC) is based on the Peak Cell Rate (PCR) of a call attempting to be established. The CAC algorithm used guarantees that the sum of the PCRs of all virtual channel connections within a VPC must be less than the total bandwidth of the VPC. If a new call would cause the sum of the PCRs to exceed that value, the call will not be accepted. The ATM layer model supports distributed, dynamic routing. Each ATM node learns of all other connected ATM nodes and routes to them in a distributed manner, and over time, each node updates its routing tables to reflect changes in the network. Each node attempts to route a call to the destination node one at a time. The cost of a route is the sum of the costs of a hop. The cost computation is based on the amount of available bandwidth along the link. 3.2 Ethernet Ethernet is a bus-based local area network technology that is in common today. The operation of the local area network is managed by a media access protocol (MAC) which has been standardised as IEEE The role of this MAC protocol is to provide efficiency and fair sharing of the communication channel which is the bus connecting the stations of the LAN. The Ethernet MAC accepts data packets from a higher layer protocol (such as the Internet Protocol) and attempts to transmit them at appropriate times to other stations on the bus. Collisions are an unavoidable part of Ethernet MAC protocol and efficient handling of a collision is important. The first important feature of Ethernet is to detect collision quickly in order to invoke a recovery procedure. Upon deciding a collision, a transmitting station will continue to transmit for a short period of time called the

3 jam time. This ensures that other transmitting stations will also notice a collision. After the jam time, the transmission is aborted entirely. After a short period of time, the bus should be quiet since all stations will have noticed a collision and aborted their transmissions. The silence on the bus is noticed by the carrier sensing mechanisms in each station and those stations that have packets to send can begin transmitting. Provisions is also made to avoid repeated collisions between the same stations by ensuring that transmissions that collide wait a random amount of time before being retransmitted Scope and Implementation Limitations The Ethernet MAC model implement the carrier sensing, collision detection, and transmission mechanisms specified in the IEEE standard. Explicit modelling is performed for all features other than serialisation of bit transfers to and from the physical layer. 3.3 FDDI Ring The Fibre Distributed Data Interface (FDDI) provides general purpose networking at 100Mbps transmission rates for large numbers of communicating stations configured in a ring topology. Use of ring bandwidth is controlled through a time token rotation protocol, wherein stations must receive a token and meet a set of timing and priority criteria before transmitting frames Scope and Limitations of Implementations Our models are faced with two main limitations. Firstly, the ring initialisation and recovery processes are not modelled explicitly. Its usefulness is in obtaining measurements of steady state performance. Secondly, our model makes no attempt to implement the mechanisms related to the detection of damaged frames, or the reporting of errors to the station management entity (SMT). The interface between media access protocol (MAC) and SMT is, in fact, not presently incorporated into the implementation of MAC. The primary data transfer features of FDDI are modelled explicitly, including synchronous and asynchronous transmission, definable priority levels for asynchronous frames, and restricted tokens. The effects of station latency and propagation delay are also incorporated into the model. Implicit in the parameters listed above is a simplification made in the model: the station latency and inter-station propagation delay are assumed to be uniform across the ring. This is primarily done to conveniently accelerate simulation. 4. EXPERIMENTS The two scenarios described in Section 1 are analysed in this paper, each with simulations ran under low and high loading conditions. For low load conditions, we have two video servers sending out traffic compared to 14 servers under high load. The traffic generation patterns are the same for all video servers. Table 4.1 lists some of the parameters used in both sets of simulations. Table 4.1 Parameters used in both simulation sets Source Packet size 2048 bits Call waiting time 0.0 sec Call duration 4,500 sec Mean packet 3000 pkts/sec generation rate Variance packet 5850 pkts 2 /sec 2 generation rate IP layer IP processing rate 5000 pkts/sec FDDI Channel rate 100Mbps Ethernet Channel rate 10Mbps ATM Channel rate 155Mbps VP-VC delay sec VP switching delay sec Switch fabric delay 0.0 sec Priority scheme A Class B traffic switch 400 cells buffersize Routing update Every 15 sec frequency AAL type 5 Traffic QoS class B IP-AAL Maximum data rate 1.55Mbps Inactivity time-out 120s 5. RESULTS We shall now look at some of the simulation results, whereupon our conclusions are drawn. 5.1 Scenario One For ease of comparison, the low and high load results for Scenario 1 are referred as the (a) and (b) figures in our discussion below End to End Delays We shall look only at the steady state ETE delays experienced globally by the packets at the ATM, Ethernet, and FDDI portions of our network model. From Figure 5.1 and 5.2, we see that the ATM ETE delay and the FDDI ETE delay patterns are very similar whether in low or high load conditions. The order of magnitude of the delays experiences are about 20µs. The Ethernet ETE delays, on the other hand, are about 250µs under low load, and monotonically increasing (in the order of seconds) under high load. These results indicate that the Ethernet contributed most to the total

4 ETE delays of the packets. The monotonically increasing delay under high load is due to the low 10Mbps Ethernet bandwidth which is insufficient to support the high bandwidth demanded when all 14 video servers are in operation concurrently, each producing 12Mbps of traffic. Figure 5.1 ATM end-to-end delay under (a) low load and (b) high load Figure 5.3 Ethernet end-to-end delay under (a) low load and (b) high load. Besides the above, by comparing Figures 5.3 and 5.4, we observed an interesting fact. The bulk of the Ethernet ETE delays is contributed when packets are sent from the FDDI-Ethernet router to the Ethernet- ATM router through the Ethernet bus in the NUS subnetwork model. This is especially obvious during high load condition. The reason for this is that congestion results on the bus during high load. A proof of congestion is that under low load, the size of the Ethernet queues in the FDDI-Ethernet router is constant at about 2500 bits, whereas under high load, the queue size is monotonically increasing with time and of order bits (see Figure 5.5). Figure 5.2 FDDI end-to-end delay under (a) low load and (b) high load. Figure 5.4 Localised Ethernet end-to-end delay (to reach Ethernet-ATM router) under (a) low load and (b) high load

5 network to another. Figure 5.7 shows the ETE delays experienced by the ATM portions of our network. Figure 5.5 Ethernet queue bitsize at FDDI-Ethernet router under (a) low load and (b) high load Cell Loss Ratio in ATM Network The cell loss ratio present in our ATM network model is always zero whether under low or high load conditions. This suggests that the ATM network is very efficient even under high traffic loading. In fact, the ATM network is very lightly loaded even under the modelled high load condition. However, we also observe that the bottleneck at the Ethernet bus before the ATM network may have limited the amount of traffic carried by the ATM network. Figure 5.7 ATM end-to-end delay under(a) low load and (b) high load We observed from the two traces above that the ATM ETE delay is very similar (about 75µs) regardless of the loading conditions. This is intuitively correct since both loading conditions do not cause congestion on our ATM portions of the network. The ATM network is still lightly loaded during the high loading condition considered. Figure 5.6 Cell loss ratio under (a) low load and (b) high load. 5.2 Scenario Two We shall now look at the simulation results of our second simulation scenario which models an ATMbased server generating packets to an Ethernet-based client through our ATM testbed. Like scenario one, we have low and high load conditions generating similar traffic conditions as before. We shall label the charts generated by low load and high load simulations with suffix (a) and (b) respectively End to End Delays As in the previous scenario, we shall now look at the steady state global ATM and Ethernet end-to-end (ETE) delays experienced by packets as they travel from one Figure 5.8 AAL5 end-to-end delay under (a) low load and (b) high load Figure 5.8 shows the amount of ATM ETE delays including the AAL5 segmentation/reassembly delays. The observed delay is about 330µs under each loading conditions. This result is reasonable because the processing delay is very short at all the loading conditions considered, due to a very fast segmentation/reassembly processor modelled. It is also observed that on both high load simulations, the AAL5 ETE delay is almost identical.

6 of the queue length at the ATM-Ethernet router, as shown in Figure 5.11, also suggested that the traffic congestion results because the low bandwidth of 10Mbps Ethernet is unable to handle the high traffic volume of 16.8Mbps routed from the ATM network. The bottleneck link is thus the Ethernet bus between the router and the client workstation Cell Loss Ratio in ATM Network The cell loss ratio present in our ATM network model is always zero whether under low or high load conditions, as shown in Figure This condition is prevalent because the ATM network is lightly loaded in our network model in the three sets of simulations ran. Figure 5.9 Ethernet end-to-end delay under (a) low load and (b) high load Figure 5.9 shows the Ethernet ETE delays observed between congested and non-congested cases, which surfaced when the traffic reaches the Ethernet-based destination. When there is no congestion, we observed that the Ethernet ETE delay is constant at about 270µs at steady state. However, under congested conditions the Ethernet ETE delay is monotonically increasing in the order of seconds. To establish better understanding of the network under congestion, we ran further simulations on high load model with more local probes on the Ethernet network. Figure 5.10 Queueing delay at ATM-Ethernet router under high load with congestion Figure 5.11 Queue length at ATM-Ethernet router under high load Figure 5.10 shows the queueing delay experienced by packets at the ATM-Ethernet router. The similarity of Figure 5.9(b) and 5.10 suggests that the monotonically increasing end-to-end delay experienced by the Ethernet under congestion is contributed largely by the queueing delaying at the router. The similarly increasing bitsize Figure 5.12 Cell loss ratio under both low and high load 6. COMMENTS Some limitations are present in the our investigations. Firstly, our investigations were based on using video servers generating packets with identical video traffic patterns. This assumption is not necessarily true as different quality video sequences will generate traffic loads that are not identical. Secondly, our network model had used a topology whereby one single server will only transmit packets to one single destination. This is not generally true, as a video server in the real world should be able to serve multiple client applications at the same time. Thirdly, we had assumed certain parameters during simulations, as listed in Table 4.1. These parameters are not universal and may vary with the real equipment used in actual VOD implementations. However, our results should be accurate to a large extent. In future work, we plan to refine the network models and their parameterisation in order to improve the realism and accuracy of our simulations. We shall also compare simulation results with empirical results obtained from an ATM protocol analyser. 7. CONCLUSIONS In the first scenario, the ATM and FDDI portions of the network models contribute end-to-end delays of about 20µs. In the second scenario, the ATM portions of the network models contribute end-to-end delays of about

7 75µs. These delays are small compared to the contribution from Ethernet in either scenarios, which was observed to be 250s and 270s respectively under low load, and monotonically increasing (in the order of seconds) under high load, or congestion. The ATM network is an efficient network since zero cell loss ratio was observed from the simulations, and cells flowing through the network experienced low endto-end delays. The ATM network is lightly utilised even under the high load conditions considered. In this paper, we conclude that the Ethernet can be a major bottleneck in interconnected LAN and ATM networks. This bottleneck surface during high load conditions due to congestion. The low bandwidth of Ethernet is a cause of this bottleneck in an otherwise efficient ATM based network model. REFERENCES [1] OPNET Manual Vol 2, Modelling. MIL 3, Inc. (1996) [2] Foreview 4.0 Network Management User s Manual, Fore Systems. (1996) [3] OPNET Manual Vol 11, Protocols Models. MIL 3, Inc. (1996)

8

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control

What Is Congestion? Effects of Congestion. Interaction of Queues. Chapter 12 Congestion in Data Networks. Effect of Congestion Control Chapter 12 Congestion in Data Networks Effect of Congestion Control Ideal Performance Practical Performance Congestion Control Mechanisms Backpressure Choke Packet Implicit Congestion Signaling Explicit

More information

Congestion in Data Networks. Congestion in Data Networks

Congestion in Data Networks. Congestion in Data Networks Congestion in Data Networks CS420/520 Axel Krings 1 Congestion in Data Networks What is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet

More information

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues

What Is Congestion? Computer Networks. Ideal Network Utilization. Interaction of Queues 168 430 Computer Networks Chapter 13 Congestion in Data Networks What Is Congestion? Congestion occurs when the number of packets being transmitted through the network approaches the packet handling capacity

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

===================================================================== Exercises =====================================================================

===================================================================== Exercises ===================================================================== ===================================================================== Exercises ===================================================================== 1 Chapter 1 1) Design and describe an application-level

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel

Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Quality of Service Mechanism for MANET using Linux Semra Gulder, Mathieu Déziel Semra.gulder@crc.ca, mathieu.deziel@crc.ca Abstract: This paper describes a QoS mechanism suitable for Mobile Ad Hoc Networks

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

MQC Hierarchical Queuing with 3 Level Scheduler

MQC Hierarchical Queuing with 3 Level Scheduler MQC Hierarchical Queuing with 3 Level Scheduler The MQC Hierarchical Queuing with 3 Level Scheduler feature provides a flexible packet scheduling and queuing system in which you can specify how excess

More information

SIMULATION FRAMEWORK MODELING

SIMULATION FRAMEWORK MODELING CHAPTER 5 SIMULATION FRAMEWORK MODELING 5.1 INTRODUCTION This chapter starts with the design and development of the universal mobile communication system network and implementation of the TCP congestion

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

The Network Layer and Routers

The Network Layer and Routers The Network Layer and Routers Daniel Zappala CS 460 Computer Networking Brigham Young University 2/18 Network Layer deliver packets from sending host to receiving host must be on every host, router in

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

Simulation Study for a Broadband Multimedia VSAT Network

Simulation Study for a Broadband Multimedia VSAT Network Simulation Study for a Broadband Multimedia Yi Qian, Rose Hu, and Hosame Abu-Amara Nortel s 2201 Lakeside Blvd., Mail Stop 992-02-E70 Richardson, Texas 75082, USA Phone: 972-685-7264 Fax: 972-685-3463

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers)

EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers) DEPARTMENT OF ECE EC1009 HIGH SPEED NETWORKS (ELECTIVE) (2 marks Questions and answers) FINAL YEAR 7 th SEMESTER UNIT I HIGH SPEED NETWORKS 1) What is common channel signaling? The data s and control signals

More information

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross Part 5: Link Layer Technologies CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross 1 Outline PPP ATM X.25 Frame Relay 2 Point to Point Data Link Control One sender, one receiver,

More information

Lecture 4 Wide Area Networks - Congestion in Data Networks

Lecture 4 Wide Area Networks - Congestion in Data Networks DATA AND COMPUTER COMMUNICATIONS Lecture 4 Wide Area Networks - Congestion in Data Networks Mei Yang Based on Lecture slides by William Stallings 1 WHAT IS CONGESTION? congestion occurs when the number

More information

Real-Time Protocol (RTP)

Real-Time Protocol (RTP) Real-Time Protocol (RTP) Provides standard packet format for real-time application Typically runs over UDP Specifies header fields below Payload Type: 7 bits, providing 128 possible different types of

More information

Chapter 10. Circuits Switching and Packet Switching 10-1

Chapter 10. Circuits Switching and Packet Switching 10-1 Chapter 10 Circuits Switching and Packet Switching 10-1 Content Switched communication networks Circuit switching networks Circuit-switching concepts Packet-switching principles X.25 (mentioned but not

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

Asynchronous Transfer Mode (ATM) ATM concepts

Asynchronous Transfer Mode (ATM) ATM concepts Asynchronous Transfer Mode (ATM) Asynchronous Transfer Mode (ATM) is a switching technique for telecommunication networks. It uses asynchronous time-division multiplexing,[1][2] and it encodes data into

More information

IEEE standards for local area networks

IEEE standards for local area networks IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

Cisco IOS Switching Paths Overview

Cisco IOS Switching Paths Overview This chapter describes switching paths that can be configured on Cisco IOS devices. It contains the following sections: Basic Router Platform Architecture and Processes Basic Switching Paths Features That

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Module 16: Distributed System Structures

Module 16: Distributed System Structures Chapter 16: Distributed System Structures Module 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology Communication Structure Communication

More information

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

ISO IEC. INTERNATIONAL ISO/IEC STANDARD Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC)

ISO IEC. INTERNATIONAL ISO/IEC STANDARD Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC) INTERNATIONAL ISO/IEC STANDARD 9314-5 First edition 1995-02-01 Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC) Technologies de l'information Interface de

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Wireless Networks. Communication Networks

Wireless Networks. Communication Networks Wireless Networks Communication Networks Types of Communication Networks Traditional Traditional local area network (LAN) Traditional wide area network (WAN) Higher-speed High-speed local area network

More information

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing.

Figure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. Figure. Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. (a) PCI =,,, 4 4 PCI =, 4 4 6 PCI = 6, Link/Port RT Link/Port RT Link/Port RT In Port PCI 4 Out Port PCI 4 6 Port

More information

Data and Computer Communications

Data and Computer Communications Data and Computer Communications Chapter 16 High Speed LANs Eighth Edition by William Stallings Why High Speed LANs? speed and power of PCs has risen graphics-intensive applications and GUIs see LANs as

More information

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection

A Quality of Service Decision Model for ATM-LAN/MAN Interconnection A Quality of Service Decision for ATM-LAN/MAN Interconnection N. Davies, P. Francis-Cobley Department of Computer Science, University of Bristol Introduction With ATM networks now coming of age, there

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Chapter 1 Introduction

Chapter 1 Introduction Emerging multimedia, high-speed data, and imaging applications are generating a demand for public networks to be able to multiplex and switch simultaneously a wide spectrum of data rates. These networks

More information

DiffServ Architecture: Impact of scheduling on QoS

DiffServ Architecture: Impact of scheduling on QoS DiffServ Architecture: Impact of scheduling on QoS Abstract: Scheduling is one of the most important components in providing a differentiated service at the routers. Due to the varying traffic characteristics

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

SELECTION OF METRICS (CONT) Gaia Maselli

SELECTION OF METRICS (CONT) Gaia Maselli SELECTION OF METRICS (CONT) Gaia Maselli maselli@di.uniroma1.it Computer Network Performance 2 Selecting performance metrics Computer Network Performance 3 Selecting performance metrics speed Individual

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4 CSCD 330 Network Superhighway Network Programming Winter 2015 Lecture 13 Network Layer Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007

More information

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks

Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

ECEN Final Exam Fall Instructor: Srinivas Shakkottai

ECEN Final Exam Fall Instructor: Srinivas Shakkottai ECEN 424 - Final Exam Fall 2013 Instructor: Srinivas Shakkottai NAME: Problem maximum points your points Problem 1 10 Problem 2 10 Problem 3 20 Problem 4 20 Problem 5 20 Problem 6 20 total 100 1 2 Midterm

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Configuring Banyan VINES

Configuring Banyan VINES Configuring Banyan VINES This chapter describes how to configure Banyan VINES and provides configuration examples. For a complete description of the VINES commands in this chapter, refer to the Banyan

More information

ATM Logical Connections: VCC. ATM Logical Connections: VPC

ATM Logical Connections: VCC. ATM Logical Connections: VPC ATM Logical Connections: VCC Logical Connections in ATM are referred to as virtual channel connections (VCCs). Virtual channel (VC) is a generic term used to describe unidirectional transport of ATM cells

More information

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks

Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks Performance and Evaluation of Integrated Video Transmission and Quality of Service for internet and Satellite Communication Traffic of ATM Networks P. Rajan Dr. K.L.Shanmuganathan Research Scholar Prof.

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

ADVANCED COMPUTER NETWORKS

ADVANCED COMPUTER NETWORKS ADVANCED COMPUTER NETWORKS Congestion Control and Avoidance 1 Lecture-6 Instructor : Mazhar Hussain CONGESTION CONTROL When one part of the subnet (e.g. one or more routers in an area) becomes overloaded,

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Communication Networks - 3 general areas: data communications, networking, protocols

Communication Networks - 3 general areas: data communications, networking, protocols Communication Networks - Overview CSE 3213 Fall 2011 1 7 September 2011 Course Content 3 general areas: data communications, networking, protocols 1. Data communications: basic concepts of digital communications

More information

Switched LANs A Set of Local Area Networks Interconnected by Switches

Switched LANs A Set of Local Area Networks Interconnected by Switches Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help

More information

Asynchronous Transfer Mode

Asynchronous Transfer Mode ATM Asynchronous Transfer Mode CS420/520 Axel Krings Page 1 Protocol Architecture (diag) CS420/520 Axel Krings Page 2 1 Reference Model Planes User plane Provides for user information transfer Control

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Chapter 3 Packet Switching

Chapter 3 Packet Switching Chapter 3 Packet Switching Self-learning bridges: Bridge maintains a forwarding table with each entry contains the destination MAC address and the output port, together with a TTL for this entry Destination

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers

Introduction to ATM Traffic Management on the Cisco 7200 Series Routers CHAPTER 1 Introduction to ATM Traffic Management on the Cisco 7200 Series Routers In the latest generation of IP networks, with the growing implementation of Voice over IP (VoIP) and multimedia applications,

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 2. Switch Concepts and Configuration. Part I Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

QoS-Aware IPTV Routing Algorithms

QoS-Aware IPTV Routing Algorithms QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,

More information

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University

More information

P D1.1 RPR OPNET Model User Guide

P D1.1 RPR OPNET Model User Guide P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1

More information

Chapter 8 LAN Topologies

Chapter 8 LAN Topologies Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

What is the fundamental purpose of a communication system? Discuss the communication model s elements.

What is the fundamental purpose of a communication system? Discuss the communication model s elements. What is the fundamental purpose of a communication system? The fundamental purpose of a communication system is the exchange of data between two parties. Discuss the communication model s elements. The

More information

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition,

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition, Module 16: Distributed System Structures, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed System Structures Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and

Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?

More information

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management

different problems from other networks ITU-T specified restricted initial set Limited number of overhead bits ATM forum Traffic Management Traffic and Congestion Management in ATM 3BA33 David Lewis 3BA33 D.Lewis 2007 1 Traffic Control Objectives Optimise usage of network resources Network is a shared resource Over-utilisation -> congestion

More information

Progress Report No. 3. A Case Study on Simulation Scenario

Progress Report No. 3. A Case Study on Simulation Scenario NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 3 A Case Study on Simulation Scenario The University of Canterbury Team 21 December 2005 Progress Report This report

More information

ATM Hierarchical Shaping ATM VC into VP Shaping, page 1

ATM Hierarchical Shaping ATM VC into VP Shaping, page 1 ATM Hierarchical Shaping ATM VC into VP Shaping, page 1 Traffic shaping is a quality of service (QoS) mechanism that is used to manage the network traffic by shaping the traffic to a specified rate. Traffic

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Localization approaches based on Ethernet technology

Localization approaches based on Ethernet technology Localization approaches based on Ethernet technology Kees den Hollander, GM Garner, Feifei Feng, Paul Jeong, Eric H.S. Ryu Contact: Eric H.S. Ryu eric_ryu@samsung.com Abstract This document describes two

More information

2. Modelling of telecommunication systems (part 1)

2. Modelling of telecommunication systems (part 1) 2. Modelling of telecommunication systems (part ) lect02.ppt S-38.45 - Introduction to Teletraffic Theory - Fall 999 2. Modelling of telecommunication systems (part ) Contents Telecommunication networks

More information

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network

An Approach for Enhanced Performance of Packet Transmission over Packet Switched Network ISSN (e): 2250 3005 Volume, 06 Issue, 04 April 2016 International Journal of Computational Engineering Research (IJCER) An Approach for Enhanced Performance of Packet Transmission over Packet Switched

More information

Congestion Control Open Loop

Congestion Control Open Loop Congestion Control Open Loop Muhammad Jaseemuddin Dept. of Electrical & Computer Engineering Ryerson University Toronto, Canada References 1. A. Leon-Garcia and I. Widjaja, Communication Networks: Fundamental

More information

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang CompSci 356: Computer Network Architectures Lecture 7: Switching technologies Chapter 3.1 Xiaowei Yang xwy@cs.duke.edu Types of switching Datagram Virtual circuit Source routing Today Bridges and LAN switches

More information